Feeds

Hackers convention rolls into Vegas

They'll be shooting craps no doubt

  • alert
  • submit to reddit

Seven Steps to Software Security

A spangly oasis in the middle of the Nevada desert is to host a massive jamboree for hackers at the weekend. It will be the seventh year on the trot that the "annual computer underground party" for hackers will have been staged, and Las Vegas is gearing up for one heck of a party. "We are not trying to teach you to learn how to hack in a weekend, but what we are trying to do is create an environment where you can hang out with people from all different backgrounds," trills the DEF CON publicity. "All of them are interested in the same thing, computer security." So the gamblers of Las Vegas are going to rub shoulders with another bunch of chancers -- how quaint. But could this annual get-together be the reason behind the spate of high-profile Web attacks that have received so much publicity over the last six weeks or so? Only last weekend the official site for the state of Hawaii was trashed when vandals reportedly sprayed "violate-the-state" all over its cyberwalls. Network Solutions was also recently targeted along with other top drawer sites including the US Army, the department of agriculture and the FBI. Could it be that all these high profile hacks have been done merely to give the hackers and crackers at DEF CON something to brag about during the conference? After all, it is a reunion of sorts and at such tedious events nothing is more fun than playing one-upmanship with your peers. You can just hear the overblown conversations now as the delegates at one of the DEF CON soirees juggle a glass of wine and a plate of canapés while trying to nibble on a flaky vol-au-vent. "You trashed the National Oceanic and Atmospheric Agency -- cool. But I turned over the FBI man, it was a breeze..." ®

Boost IT visibility and business value

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.