Articles about defcon

Alexa photo via Shutterstock

Hackers manage – just – to turn Amazon Echoes into snooping devices

DEF CON Hackers have managed to hack Amazon's Echo digital assistant and effectively turn it into a listening device, albeit through a complex and hard-to-reproduce approach. Talking at the DEF CON hacking conference in Las Vegas, two Chinese security researchers working for Tencent, outlined how they had used a specially modified …
Kieren McCarthy, 14 Aug 2018
Raised hands vote

Virginia scraps poke-to-vote machines hackers destroyed at DefCon

Virginia's State Board of Elections has decided its current generation of electronic voting machines is potentially vulnerable, and wants them replaced in time for the gubernatorial election due on November 7th, 2017. The decision was announced in the minutes of the Board's September 8th meeting: “The Department of Elections …
Pic: Shutterstock

Dark web doesn't exist, says Tor's Dingledine. And folks use network for privacy, not crime

DEF CON A Tor Project grandee sought to correct some misconceptions about the anonymizing network during a presentation at the DEF CON hacking convention in Las Vegas on Friday. Roger Dingledine, one of the three founders of the Tor Project, castigated journos for mischaracterizing the pro-privacy system as a bolthole exclusively used …
Iain Thomson, 29 Jul 2017

Proxyham Wi-Fi relay SUPPRESSED. CONSPIRACY, yowl tinfoilers

Rhino Security has suddenly pulled the plug on its “ProxyHam” Wi-Fi relay project and withdrawn from the upcoming DefCon conference. The company's Bun Cuadill made the “announcement” in the way most likely to send conspiracists hyperventilating: a couple of Twitter messages that offered no explanation. Since the aim of …
Winnie-the-Pooh honey

Feds salute plucky human ROBOT-FIGHTERS

The United States Federal Trade Commission (FTC) has announced over US$12,000 in prizes in its “Zapping Rachel” robocall contest, which was held at this year's DEFCON hacking conference in Las Vegas. The FTC has been on something of a crusade against the curse of the robocall, both because they are illegal and also because it …
Iain Thomson, 29 Aug 2014
Wifi grumpy cat

Wi-Fi WarKitteh and DDoS Dog to stalk Defcon 22

A security boffin has created a 'WarKitteh' capable of sniffing Wi-Fi packets. Tenacity evil genius researcher Gene Bransfield (@gbransfield) combined a series of garden-variety technologies to evolve the humble house cat into a walking, purring WiFi war machine capable of pawing packets while maintaining enough agility to …
Darren Pauli, 23 Jun 2014

Hackers reverse-engineer NSA spy kit using off-the-shelf parts

Last year Edward Snowden leaked the NSA's Advanced Network Technology catalog, a listing of the hardware and software tools the agency makes available to agents for spying. Now enterprising security experts are using the catalog to build similar tools using available electronics. The team, led by Michael Ossmann of Great Scott …
Iain Thomson, 19 Jun 2014
Winnie-the-Pooh honey

FTC seeks DEFCON help to finger illegal robocallers

The Federal Trade Commission is to host a cash competition at this year's DEFCON hacking conference in Las Vegas, with the goal of building a honeypot that can lure in robocallers and allow technologists to analyze how to block them in the future. "Honeypots have been used extensively among information security specialists, …
Iain Thomson, 17 Jun 2014
Car hacking device

Want to remotely control a car? $20 in parts, some oily fingers, and you're in command

Spanish hackers have been showing off their latest car-hacking creation; a circuit board using untraceable, off-the-shelf parts worth $20 that can give wireless access to the car's controls while it's on the road. Car hacking device Car cracking on a budget The device, which will be shown off at next month's Black Hat Asia …
Iain Thomson, 6 Feb 2014
Evil Android

Hey, you know Android apps can 'access ALL' of your Google account?

The single-click Google account login for Android apps is a little too convenient for hackers, according to Tripwire's Craig Young, who has demonstrated a flaw in the authentication method. The mechanism is called “weblogin”, and basically it allows users to use their Google account credentials as authentication for third- …
Bill Ray, 6 Aug 2013

Snowden picks up 'Epic 0wnage' gong in Vegas... well, not literally

Security researcher Barnaby Jack, famous for his "jackpot" hack on ATMs, which forced them to spit out cash, has won a lifetime achievement award less than a week after his death. The honour was announced yesterday at the Pwnie awards, Infosec's equivalent to the Oscars. Jack, 35, died last Thursday just days before he was …
John Leyden, 2 Aug 2013
The Register breaking news

Feds BANNED from DEF CON by founder (who is Obama's cyber-expert)

DEF CON 21 Jeff Moss - the US government security advisor who founded the DEF CON hacking convention - has urged federal agents to stay away from the conference next month. For the first time in the annual event's 20-year history, g-men and spooks have been made unwelcome. Exactly how effective the request will be remains to be seen. …
John Leyden, 12 Jul 2013
The Register breaking news

SEC staffers slammed for serious security snafus

There are red faces at the Securities and Exchange Commission after a report highlighted computer security failings by agency staff that forced it to spend $200,000 to check whether it had lost critical information. Staff at the Trading and Markets Division were found to have stored highly confidential and market-sensitive …
Iain Thomson, 9 Nov 2012

Huawei looking into critical router flaw claims

Chinese telecoms kit maker Huawei has said it is investigating claims by researchers that two of its router products contain serious vulnerabilities which could allow hackers to remotely take control of the devices. Felix Lindner and Gregor Kopf of Berlin-based Recurity Labs announced their findings at the Defcon hacking show …
The Register breaking news

Black Hat draws world hacking gang – and Apple – to Sin City

Black Hat 2012 The 2012 Black Hat conference is kicking off in Las Vegas, and this year's session will see Apple presenting for the first time, as well as a reunion of some of the team behind the first briefings 15 years ago. Black Hat, and the associated DefCon sessions which follows it, is probably the largest collection of hardcore …
Iain Thomson, 25 Jul 2012
The Register breaking news

Android respawn horror: Hacker says hackers' phones hacked

Claims that both CDMA and 4G networks were compromised at the recent Defcon security event in Las Vegas have raised little surprise, but the vulnerability of handsets is hotly debated. The claim was made by coderman, a stalwart of security conferences, who reports that he witnessed an advanced man-in-the-middle attack …
Bill Ray, 12 Aug 2011
The Register breaking news

10-year old hacker finds flaw in mobile games

A 10-year-old hacker has won the admiration of her adult peers for finding a previously unknown vulnerability in games on iOS and Android devices. The young girl, who has adopted the hacker handle CyFi, discovered the timing related bug after she got bored with the slow progress of a FarmVille-style games. For example, crops …
John Leyden, 8 Aug 2011
The Register breaking news

DIY aerial drone monitors Wi-Fi, GSM networks

Defcon Hobbyist hackers have built a DIY flying spy drone that's capable of intercepting communications over remote Wi-Fi and cellular networks and beaming them to snoops located half a world away. Short for wireless aerial surveillance platform, the WASP is equipped with a battery of off-the-shelf hacking tools that can secretly …
Dan Goodin, 5 Aug 2011

Create a news alert about defcon, or find more stories about defcon.

Biting the hand that feeds IT © 1998–2018