Journalists expelled from Black Hat for hacking competitors

Powered by SC Magazine
 

Three French journalists from Global Security Magazine have been thrown out of the Black Hat conference in Las Vegas for hacking into fellow journalist’s computers.

Hacking is usually part of the fun at Black Hat and delegates are warned that hackers are patrolling the conference’s public Wi-Fi network trying to steal data. That data is then posted on a public ‘Wall of Sheep’ at the venue, to embarrass security specialists who should know better.

However, as the organisers don’t expect journalists to be as adept at network security the press area is off limits to hacking and runs on a private network. Nevertheless the three journalists decided to do it anyway and try and get the login details for journalists from CNET and eWeek onto the Wall of Sheep.

However the trio, Dominique Jouniot, Mauro Israel and Marc Brami, were rebuffed by staff, asked to leave the conference and banned from attending this year’s DEFCON event as well.

The attack seems to have used a network-sniffing tool called Cain and while it was successful in obtaining details from an eWeek journalists CNET report that the data retrieved on them was incomplete.

The French journalists have reportedly said that it was all a joke and designed to make journalists more aware of their own security, an excuse commonly used in hacking attacks.

But a representative of the Electronic Frontier Foundation is apparently looking into the affair to see if any laws have been broken.

Copyright ©v3.co.uk


 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 337

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 140

Vote