Defcon - News, Features, and Slideshows


  • Ten scary hacks I saw at Black Hat and DEF CON

    Security researchers and hackers gathered in Las Vegas over the past week to show off and learn about the latest vulnerabilities that affect devices and software that the world relies on every day. Black Hat and DEF CON, the world's top security conferences, did not disappoint.

    Written by Lucian Constantin13 Aug. 15 04:06
  • Hackers show off long-distance Wi-Fi radio proxy at DEF CON

    A talk about a radio-based privacy device dubbed ProxyHam that promised to allow hackers to connect to Wi-Fi networks from as far as 2.5 miles away was abruptly pulled from the DEF CON schedule by its creator a few weeks ago.

    Written by Lucian Constantin09 Aug. 15 02:53
  • Is your Dropcam live feed being watched by someone else?

    Dropcam, the popular video monitoring camera, bills itself as "super simple security." But a pair of researchers plan to show at the Defcon hacking conference later this week how having a Dropcam could get a lot more complicated.

    Written by Jeremy Kirk04 Aug. 14 14:00
  • TrustyCon vs. RSA and NSA: New conference pushes trustworthy agenda

    Who do you trust? That's a question asked increasingly by a security industry with a growing sense that the National Security Agency (NSA) has sought to weaken encryption or get backdoors into computers, based on documents leaked by Edward Snowden to the media. Now, trust is also the theme of a new conference called TrustyCon that will vie for attention on Feb. 27 in San Francisco while the big RSA Conference for security pros is also taking place in that city.

    Written by Ellen Messmer22 Jan. 14 18:06
  • Hackers hit oil, gas, defense companies in Norway

    A single group of hackers using spearphishing has stolen industrial drawings, contracts and more from at least 10 oil, gas and defense companies in Norway, according to a published report.

    Written by Tim Greene19 Nov. 11 08:29
  • 10 scariest hacks from Black Hat and Defcon

    Hack week in Vegas

    During the Black Hat and Defcon conferences in Las Vegas last week, researchers wheeled out their best new attacks on everything from browsers to automobiles, demonstrating ingenuity and diligence in circumventing security efforts or in some cases in exploiting systems that were built without security in mind. Here's a handful of the ones that deserve the most concern.

    Written by Tim Greene18 Aug. 11 23:45
  • The changing face of identity and location security

    For two decades, the dominant security model has been location-centric. We instinctively trust insiders and distrust outsiders, so we build security to reflect that: a hard perimeter surrounding a soft inside. The model works best when there's only one connection to the outside, offering a natural choke point for firewall defense.

    Written by Andreas M. Antonopoulos15 Aug. 11 20:41
  • Defcon: VoIP makes a good platform for controlling botnets

    LAS VEGAS -- Botnets and their masters can communicate with each other by calling into the same VoIP conference call and swapping data using touch tones, researchers demonstrated at Defcon.

    Written by Tim Greene10 Aug. 11 07:49
  • Defcon: The lesson of Anonymous? Corporate security sucks

    LAS VEGAS -- Anonymous has run up quite a score against corporations, governments and law enforcement agencies, but for all these warnings corporate executives are turning their heads from the real problem -- their network security is terrible, a panel of experts concluded at Defcon.

    Written by Tim Greene09 Aug. 11 00:42
  • Researchers show off homemade spy drone at Black Hat

    LAS VEGAS -- Two security researchers Wednesday unveiled a remote controlled, unmanned aerial vehicle (UAV) that is capable of cracking Wi-Fi passwords, exploiting weak wireless access points and mimicking a GSM tower to intercept cell phone conversations.

    Written by Jaikumar Vijayan05 Aug. 11 01:18