• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2019
  • 2018
  • 2017
  • 2016
Edition logo

BSides Manchester 2016

2016-08-18
  • Video will not be published
    Welcome And Opening Rambles
    - BSides MCR Crew
  • Thumbnail for the video - click to play

    ►

    Breaking Out Of The Infosec Echo Chamber
    - Gavin Millard
  • Thumbnail for the video - click to play

    ►

    Breaking And Entering: Hacking Consumer Security Systems
    - Dominic Chell & Matt Hickey
  • Thumbnail for the video - click to play

    ►

    21st Century War Stories!
    - Ben Turner
  • Thumbnail for the video - click to play

    ►

    Building Your Own Hardware For Hardware Hacking
    - Steve Lord
  • Thumbnail for the video - click to play

    ►

    Gender Diversity In Cyber Security: What Works?
    - Jane Frankland
  • Thumbnail for the video - click to play

    ►

    What's In Your Pocket?
    - Henri Watson
  • Thumbnail for the video - click to play

    ►

    From CSV To CMD To Qwerty
    - Jerome Smith
  • Video will not be published
    Accessing The Personal Details Of InfoSec Proffessionals & Responsible Disclosure Process
    - Dr. Grigorios Fragkos
  • Thumbnail for the video - click to play

    ►

    What Can Information Security Learn From DevOps
    - James McKinlay
  • Thumbnail for the video - click to play

    ►

    Basic Malware Analysis: Dispelling Malware FUD
    - Ian Trump
  • Thumbnail for the video - click to play

    ►

    Hunting Asynchronous Vulnerabilities
    - James Kettle
  • Thumbnail for the video - click to play

    ►

    Hooking The Linux Kernel Without Getting Caught
    - Gregory Fudge
  • Video will not be published
    Exploring & Exploiting Video Game Security
    - Elliot Ward
  • Thumbnail for the video - click to play

    ►

    Enforcing Web Security And Privacy With Zero-Knowledge Protocols
    - Ignat Korchagin
  • Video will not be published
    Vehicle Cyber Security And Innovative Advertising Campaigns
    - Andy Davis
  • Thumbnail for the video - click to play

    ►

    Exploiting P2P Protocols For Fun And Profit
    - Matthew Di Ferrante
  • Thumbnail for the video - click to play

    ►

    50 Million Downloads And All I Got Was Malware
    - Andrew Pannell
  • Thumbnail for the video - click to play

    ►

    Ensuring Password Cracking Ain't Easy REDUX
    - Michael Jack
  • Video will not be published
    12 Steps To An Affordable, Effective Forensics Lab
    - Oxana Sereda
  • Thumbnail for the video - click to play

    ►

    Hacking The Mitsubishi Outlander: A Lesson In Automotive IoT Security
    - Ken Munro
  • Thumbnail for the video - click to play

    ►

    Object Oriented Exploitation: New Techniques In Windows Mitigation Bypass
    - Sam Thomas
  • Video will not be published
    Flash It Baby!
    - Soroush Dalili
  • Video will not be published
    Designing Systems To Be Hard To Attack
    - Richard Crowther
  • Thumbnail for the video - click to play

    ►

    CSP SRI STS PKP ETC OMG WTF BBQ
    - Scott Helme
  • Thumbnail for the video - click to play

    ►

    Three Laws Of Cyber. Thou Shalt Not Pass!
    - Dr. Daniel Dresner
  • Video will not be published
    Thanks, Comedy, Questions & Closing Remarks
    - BSides MCR Crew