Tags: atRemove, defconRemove

Router hacking competition announced for Defcon 
By Juha Saarinen | Jul 21, 2014 | Comment Now 
Compelling manufacturers to lift their game.
 
US considers blocking Chinese hackers from DefCon  
May 26, 2014 | Comment Now 
Follows cyber espionage charges.
 
Researchers 'physically' hijack cars 
By Dan Kaplan | Jul 25, 2013 | Comment Now 
Controller area networks and automobile firmware used in Defcon research.
 
Femtocell vuln allows mobile call, SMS, data interception 
 
Pen testing firm pulls DEF CON talk over Fed exclusion 
By Darren Pauli | Jul 12, 2013 | Comment Now 
Says DEF CON should 'encourage openness'.
 
Feds barred from DEF CON 21 
By Darren Pauli | Jul 11, 2013 | Comment Now 
Recent revelations made delegates uncomfortable.
 
Kinectasploit makes hacking a game 
By Darren Pauli | May 14, 2013 | Comment Now 
Merges gaming with the art of exploitation.
 
Hypertwish lets cons spear more phish 
By Darren Pauli | Nov 5, 2012 | Comment Now 
Automated Twitter spear phishing.
 
Hypertwish lets cons spear more phish 
By Darren Pauli | Oct 30, 2012 | Comment Now 
Automated Twitter spear phishing.
 
HP suppresses ToorCon router bug reveal  
By Dan Kaplan | Oct 23, 2012 | Comment Now 
Major holes found in Huawei and H3C routers.
 
#Defcon: Marlinspike expands Cloudcracker 
By Juha Saarinen | Jul 30, 2012 | Comment Now 
Web-based tool cracks more than just WPA.
 
Marlinspike expands cloud cracking tool 
By Juha Saarinen | Jul 30, 2012 | Comment Now 
Touts web-based protocol cracker at DefCon.
 
US spy agency sponsors DefCon booth 
By Jim Finkle, Joseph Menn | Jul 30, 2012 | Comment Now 
NSA asks hackers to help secure the internet.
 
Android concept app siphons sensitive data 
By Darren Pauli | Apr 11, 2012 | Comment Now 
Application bypasses permissions to steal SD and app data.
 
Mobile charging stations steal data from devices 
By Darren Pauli | Aug 22, 2011 | Comment Now 
USB mode silently comes to life.
 
Jailbroken idevices pwned by charging stations 
By Darren Pauli | Aug 19, 2011 | Comment Now 
USB mode silently comes to life.
 
Oracle employees hand data to hackers 
By Jim Finkle | Aug 9, 2011 | Comment Now 
Security competition.
 
Kids develop hacking skills at Defcon 
 
US government hankers for hackers 
By Tabassum Zakaria | Aug 3, 2011 | Comment Now 
The upsides and downsides of taking a formal hacking role.
 
Former HBGary Federal CEO exits Defcon 
By Angela Moscaritolo | Jul 29, 2011 | Comment Now 
Threatened with legal action.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  39%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  7%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  20%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  6%
TOTAL VOTES: 1778

Vote
Do you support the abolition of the Office of the Information Commissioner?