Ruxcon
Rolling news and photo slideshows from Ruxcon, home to live demos, CTF, and presentations from security experts across Australia and the world. This page includes stories from 2012 and 2011. You can check out content exclusively from the 2012 event on SC's feed, or watch some presentations from past cons on YouTube.
Tool boosts iOS, Android app security testing 
By Darren Pauli | Nov 5, 2013 | Comment Now 
Security profiling for blackbox tests.
 
Hacker uses bots to top music charts, bumps P!nk, Nicki Minaj 
By Darren Pauli | Oct 31, 2013 | Comment Now 
Trumped by algorithms and virtual machines.
 
Car hackers mess with speedos, odometers, alarms and locks 
By Darren Pauli | Oct 29, 2013 | Comment Now 
Produce cheap, open-source and modular hack tool.
 
Printer jammed? Try Ruxcon's 60-second brute force hack 
By Darren Pauli | Oct 28, 2013 | Comment Now 
Never deal with PC Load Letters again.
 
Ruxcon 2013 photos #ruxcon 
By Darren Pauli | Oct 26, 2013 | Comment Now 
Photos from Ruxcon 2013 in Melbourne. Continually updated over the two days.
 
Researcher says iCloud backups have security shortfalls 
 
Here's how you can catch phish like Twitter 
By Darren Pauli | Aug 29, 2013 | Comment Now 
Project akin to the immune system.
 
UNSW launches student CTF comp 
By SC Australia Staff | Aug 23, 2013 | Comment Now 
@Ruxcon tickets, cash on offer.
 
Security's 2013 con wishlist  
By Darren Pauli | Dec 18, 2012 | Comment Now 
What events deserve your cash?
 
RedHat project fights Java vulnerabilities 
By Darren Pauli | Oct 25, 2012 | Comment Now 
Aussie security boffin builds vulnerability database to track flawed JARs.
 
FaceDancer board snatches USB firmware 
By Darren Pauli | Oct 25, 2012 | Comment Now 
USB protocol riddled with 'absurd design decisions'.
 
Students crack state transport system 
By Darren Pauli | Oct 22, 2012 | Comment Now 
Copied cards enable free rides.
 
#Ruxcon day 1 in pictures 
By Darren Pauli | Oct 20, 2012 | Comment Now 
Ruxcon, home to live demos, CTF, and presentations from security experts across Australia and the world. Here's photos from day one of the con.
 
Exclusive: Researchers crack Aussie state transport system, get free rides 
 
Network intel tool outs tweeting spooks 
By Darren Pauli | Oct 18, 2012 | Comment Now 
Maltego showcased at Breakpoint.
 
Phonetic attack commands crash bank phone lines 
By Darren Pauli | Sep 17, 2012 | Comment Now 
Touch tone and voice activated systems open to attack.
 
Tool detects software plagiarism, theft and malware outbreaks 
By Darren Pauli | Sep 13, 2012 | Comment Now 
Tracks applications across Windows and Linux.
 
Tool flags vulnerability news, bypasses Twitter dribble 
By Darren Pauli | May 15, 2012 | Comment Now 
Web app highlights technical security posts, silences tweets about lunch.
 
Aussie exploit challenges for noob to leet 
By Darren Pauli | Dec 14, 2011 | Comment Now 
Learn to beat Linux non-executable memory, ASLR, and stack smashing protection.
 
Hollywood flicks hacked  
By James Hutchinson | Nov 22, 2011 | Comment Now 
But holes aren't remote exploitable.
 
Tool kills hidden Linux bugs, vulnerabilities 
By Darren Pauli | Nov 22, 2011 | Comment Now 
Seeks out holes in embedded libraries.
 
Malware myth-busting: Proliferation, perpetrators, and porn  
 
#Ruxcon 2011 in pictures 
Nov 20, 2011 | Comment Now 
Photos from the Ruxcon 2011 security conference in Melbourne. About 600 people packed the conference sessions, renowned for their technical insight.
 
Photos: Hacker skills tested at Ruxcon 2010 
Nov 23, 2010 | Comment Now 
Spend the day with Mahesh Sharma as he attends Melbourne's premiere IT security event.
 
Ruxcon tournament calls for local Jack Bauer 
By Liz Tay | Oct 26, 2010 | Comment Now 
ATM, networks set up for Capture the Flag game.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 785

Vote