Sched.com Conference Mobile Apps
44CON LONDON 2015 has ended
Create Your Own Event
44CON LONDON 2015
Schedule
Simple
Expanded
Grid
By Stage
Speakers
Sponsors
Attendees
Search
or browse by date + venue
Film
Networking
Track 1 Talk
Track 2 Talk
Workshop
Workshop Talk
Popular
menu
Menu
Log in
Sign up
Schedule
Speakers
Sponsors
Attendees
Search
Popular Events
#1
Stegosploit - Drive-by Browser Exploits using only Images
#2
How to drive a malware analyst crazy
#3
44CON LONDON 2015 Community Evening Opening
#4
Get in the Ring0 - Understanding Windows drivers
#5
Registration opens
#6
Film: Hackers
#7
Registration opens
#8
44CON LONDON 2015 Opening
#9
Dark Fairytales from a Phisherman (Vol.II)
#10
Meterpreter: Understanding the New Shiny
#11
Smart Muttering; a story and toolset for smart meter platform
#12
Playing with Fire: Attacking the FireEye MPS
#13
Indicators of Compromise: From malware analysis to eradication
#14
Analyzing Malicious Office Documents
#15
DDoS mitigation EPIC FAIL collection
#16
Old Dog, New Tricks: Forensics With PowerShell
#17
reverse reverse engineering
#18
The IOT Evening Workshop
#19
Barbarians At The Gate(way): An Examination Of The Attacker's Tool Box
#20
Attacking VxWorks: from Stone Age to Interstellar
#21
Reverse engineering and exploiting font rasterizers: the OpenType saga
#22
A Trek to the Emerald City: Ring -1 Based AV
#23
Inside Terracotta VPN
#24
44CON LONDON 2015 Gin O'Clock
#25
Jtagsploitation: 5 wires, 5 ways to root
#26
Is there an EFI monster inside your apple?
#27
44CON LONDON 2015 Evening Session
#28
44CON LONDON 2015 Pub Quiz
#29
Exploiting 64-bit IE on Windows 8.1 - The Pwn2Own Case Study
#30
Registration opens
#31
Introduction to Reverse Engineering C++
#32
44CON LONDON 2015 afternoon tea
#33
Lunch
#34
Registration opens
#35
Lunch
#36
Film: Sneakers
#37
Film: Blade Runner - Director's Cut
#38
15-Minute Linux Incident Response Live Analysis
#39
MITMf: Bringing Man-In-The-Middle attacks to the 21'st century
#40
Windows 10: 2 Steps Forward, 1 Step Back
#41
44CON LONDON 2015 Closing
#42
Forging the USB armory
#43
Responsible disclosure: who cares?
#44
Hunting Asynchronous Vulnerabilities
#45
Software Defined Networking (SDN) Security
#46
Hands-on JTAG for fun and root shells
#47
Old Dog, New Tricks: Forensics With PowerShell
#48
Bar open until late
#49
44CON LONDON 2015 Day 2 Open
#50
Lunch
Popular by Type
All Types
Film
Networking
Track 1 Talk
Track 2 Talk
Workshop
Workshop Talk
Popular by Day
All days
Wednesday, Sep 9
Thursday, Sep 10
Friday, Sep 11
Recently Active Attendees
L
lukasz
S4
Sched 44CON
Michael Macnair
E
Endless
OB
Oren Benshabat
Mick Vaites
J
John
Thomas V Fischer
More →