Tag: ruxcon

Tool boosts iOS, Android app security testing 
By Darren Pauli | Nov 5, 2013 | Comment Now 
Security profiling for blackbox tests.
 
Hacker uses bots to top music charts, bumps P!nk, Nicki Minaj 
By Darren Pauli | Oct 31, 2013 | Comment Now 
Trumped by algorithms and virtual machines.
 
Car hackers mess with speedos, odometers, alarms and locks 
By Darren Pauli | Oct 29, 2013 | Comment Now 
Produce cheap, open-source and modular hack tool.
 
Printer jammed? Try Ruxcon's 60-second brute force hack 
By Darren Pauli | Oct 28, 2013 | Comment Now 
Never deal with PC Load Letters again.
 
Ruxcon 2013 photos #ruxcon 
By Darren Pauli | Oct 26, 2013 | Comment Now 
Photos from Ruxcon 2013 in Melbourne. Continually updated over the two days.
 
Researcher says iCloud backups have security shortfalls 
 
Here's how you can catch phish like Twitter 
By Darren Pauli | Aug 29, 2013 | Comment Now 
Project akin to the immune system.
 
UNSW launches student CTF comp 
By SC Australia Staff | Aug 23, 2013 | Comment Now 
@Ruxcon tickets, cash on offer.
 
Security's 2013 con wishlist  
By Darren Pauli | Dec 18, 2012 | Comment Now 
What events deserve your cash?
 
RedHat project fights Java vulnerabilities 
By Darren Pauli | Oct 25, 2012 | Comment Now 
Aussie security boffin builds vulnerability database to track flawed JARs.
 
FaceDancer board snatches USB firmware 
By Darren Pauli | Oct 25, 2012 | Comment Now 
USB protocol riddled with 'absurd design decisions'.
 
Students crack state transport system 
By Darren Pauli | Oct 22, 2012 | Comment Now 
Copied cards enable free rides.
 
#Ruxcon day 1 in pictures 
By Darren Pauli | Oct 20, 2012 | Comment Now 
Ruxcon, home to live demos, CTF, and presentations from security experts across Australia and the world. Here's photos from day one of the con.
 
Exclusive: Researchers crack Aussie state transport system, get free rides 
 
Network intel tool outs tweeting spooks 
By Darren Pauli | Oct 18, 2012 | Comment Now 
Maltego showcased at Breakpoint.
 
Phonetic attack commands crash bank phone lines 
By Darren Pauli | Sep 17, 2012 | Comment Now 
Touch tone and voice activated systems open to attack.
 
Tool detects software plagiarism, theft and malware outbreaks 
By Darren Pauli | Sep 13, 2012 | Comment Now 
Tracks applications across Windows and Linux.
 
Tool flags vulnerability news, bypasses Twitter dribble 
By Darren Pauli | May 15, 2012 | Comment Now 
Web app highlights technical security posts, silences tweets about lunch.
 
Aussie exploit challenges for noob to leet 
By Darren Pauli | Dec 14, 2011 | Comment Now 
Learn to beat Linux non-executable memory, ASLR, and stack smashing protection.
 
Hollywood flicks hacked  
By James Hutchinson | Nov 22, 2011 | Comment Now 
But holes aren't remote exploitable.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  38%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  20%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  5%
TOTAL VOTES: 1063

Vote