Feeds

Snowden picks up 'Epic 0wnage' gong in Vegas... well, not literally

And Barnaby Jack wins posthumous lifetime achievement Pwnie

Next gen security for virtualised datacentres

Security researcher Barnaby Jack, famous for his "jackpot" hack on ATMs, which forced them to spit out cash, has won a lifetime achievement award less than a week after his death.

The honour was announced yesterday at the Pwnie awards, Infosec's equivalent to the Oscars.

Jack, 35, died last Thursday just days before he was due to give a talk on electronic medical implants for humans at Black Hat. The slot at the Las Vegas conference was left open, allowing friends and colleagues to gather together and swap anecdotes about the famed white hat hacker.

Chris Valasek, director of security intelligence at IOActive – where Jack had worked as director of embedded device security – paid tribute to the famed ATM and medical device ethical hacker during the award ceremony.

Friends of Barnaby Jack have set up a fund which aims to raise $25,000, with donations thus far topping $13,000. "While there are no words to ever fully capture the man that Barnaby was, this fund is here to address any needs that the family may have and allow them to choose the way in which they feel best honors their beloved son," a statement on the donation page explains.

The Pwnie awards take place each year at the Black Hat conference, celebrating both the best and worst in the field of information security.

NSA leaker Edward Snowden unsurprisingly won the Pwnie for "Epic 0wnage" at this year's ‪ceremony.‬ General Keith Alexander, director of the NSA, who delivered to opening conference keynote, was mischievously named at the joint nominee for the award.

An award for the most innovative research went to Mateusz "j00ru" Jurczyk and Gynvael Coldwind for their study into Windows kernel vulnerabilities that resulted in the discovery of 37 previously unknown flaws.

An Adobe Reader buffer overflow and sandbox escape flaw (CVE-2013-0641) won a gong for best client-side bug, while Ben Murphy scooped the equivalent server-side award for unearthing serious vulnerabilities in a Ruby on Rails library (CVE-2013-0156).

David Wang (AKA planetbeing) and the evad3rs team scored the Best Privilege Escalation Bug accolade for developing ways to circumventing code signing in iOS.

The Pwnie for Epic Fail went to Hakin9 magazine, a publication best known for spamming security researchers with requests to write articles without payment that has made it the target of the occasional prank.

Best Song Pwnie went to ‪Dual Core's ‬All The Things rap, ‪which features the chorus "We drink all the booze, hack all the things", showing if nothing else a keen awareness of the target audience.‬

The full list of winners of this year's Pwnies is here. A list of nominees for the awards can be found here. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New twist as rogue antivirus enters death throes
That's not the website you're looking for
ISIS terror fanatics invade Diaspora after Twitter blockade
Nothing we can do to stop them, says decentralized network
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.