• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 15
  • 14
  • 13
  • 11
  • 10
  • 9
  • 8
Edition logo

Nullcon 9

2018-03-01 - 2018-03-03
  • Thumbnail for the video - click to play

    ►

    Blackshield Awards
    -
  • Thumbnail for the video - click to play

    ►

    I Boot When U-Boot
    - Vincent Ruijter and Bernardo Maia Rodrigues
  • Thumbnail for the video - click to play

    ►

    DARWIN (A Parasite Covert Wirelss Network)
    - Rushikesh Nandedkar
  • Thumbnail for the video - click to play

    ►

    Looting Your Bank Savings Using Digital India
    - Indrajeet Bhuyan
  • Thumbnail for the video - click to play

    ►

    Welcome Note
    - Aseem Jakhar
  • Thumbnail for the video - click to play

    ►

    Opening Note
    - Rajeev Chandrasekhar
  • Thumbnail for the video - click to play

    ►

    Making A Dent, Making A Difference And Making A Dollar
    - Haroon Meer
  • Thumbnail for the video - click to play

    ►

    Cybersecurity And Privacy From The Global Lens
    - Eva Galperin
  • Thumbnail for the video - click to play

    ►

    KRACKing WPA2 Using Key Reinstallation Attacks
    - Mathy Vanhoef
  • Video will not be published
    Information Security Of Government Data: Practices And Challenges
    - Srinivas Kodali
  • Thumbnail for the video - click to play

    ►

    The Complexity Of Regulation & Cybersecurity
    -
  • Thumbnail for the video - click to play

    ►

    Expanding Exploitation Beyond X86 And ARM, Into The Realm Of Xtensa: A Comparitive Short Study
    - Carel van Rooyen and Philipp Promeuschel
  • Video will not be published
    Regulating Cybersecurity: The Trouble With, In, And For Policy
    - Dr. Anja Kovacs
  • Video will not be published
    OONI: Measuring Internet Filters And Their Unexpected Impact
    - Leonid Evdokimov
  • Thumbnail for the video - click to play

    ►

    Economics Of Hacks And Data Breaches: Who Pays, Who Secures & Who Wins
    -
  • Thumbnail for the video - click to play

    ►

    White-Stingray: Bypassing Stingray Detectors
    - Altaf Shaik
  • Video will not be published
    The Tor Report
    - Amogh Pradeep
  • Thumbnail for the video - click to play

    ►

    Panel: Contributing To Society As Cyber Sec Professional
    -
  • Thumbnail for the video - click to play

    ►

    Should All CISO Promote Hall Of Fame Within Their Organisations
    -
  • Thumbnail for the video - click to play

    ►

    Unleashing D* On Android Kernel Drivers
    - Aravind Machiry
  • Thumbnail for the video - click to play

    ►

    Lateral Thinking - Staying Ahead Of The Curve - Items On The CXO Checklist That Can Help Them Surf The Wave.
    -
  • Thumbnail for the video - click to play

    ►

    Security Through Obscurity And Fear
    - Abhinav Srivastava
  • Video will not be published
    Hacker Insight
    -
  • Thumbnail for the video - click to play

    ►

    Keynote
    - Dr. Sanjay Bahl
  • Thumbnail for the video - click to play

    ►

    Next Generation Cyber SOC
    -
  • Thumbnail for the video - click to play

    ►

    Bootstomp: On The Security Of Bootloaders In Mobile Device
    - Nilo Redini
  • Thumbnail for the video - click to play

    ►

    Smells Like Teen Spirit - Internet Of Teens
    - Eric Sesterhenn
  • Thumbnail for the video - click to play

    ►

    IoT: How Long Till D Day?
    -
  • Thumbnail for the video - click to play

    ►

    A Game Between Adversary And AI Scientist
    - Satnam Singh
  • Video will not be published
    Software Supply Chain Cyber Attack
    - Samiran Ghatak
  • Thumbnail for the video - click to play

    ►

    Forensic Challenges and Road Ahead
    -
  • Thumbnail for the video - click to play

    ►

    Comprehensive Hacker Techniques In Mobile Networks
    - Kirill Puzankov
  • Thumbnail for the video - click to play

    ►

    SpotPhish: Zero-Hour Phishing Protection
    - Ganesh Varadarajan
  • Thumbnail for the video - click to play

    ►

    Managing Cyber Risk In The Connected Environment
    -
  • Video will not be published
    Abusing And Attacking Content Sharing Solutions
    - Pratap Chandra Allena
  • Thumbnail for the video - click to play

    ►

    Privacy And Survellance Talk
    - Saikat Datta
  • Video will not be published
    Breaking Into Container Orchestrators
    - Nadeem Hussain Shaikh
  • Video will not be published
    Social Engineering Village
    - Neelu Tripathy
  • Video will not be published
    Closing Note
    - Antriksh Shah