Breakpoint, by the makers of Ruxcon, bring 14 security experts from around the world to Melbourne to showcase a wide range of cutting edge security topics. Here you'll find rolling stories from the con.
Car hackers mess with speedos, odometers, alarms and locks 
By Darren Pauli | Oct 29, 2013 | Comment Now 
Produce cheap, open-source and modular hack tool.
Video: Advanced iOS kernel debugging for exploit developers  
By Darren Pauli | Oct 27, 2013 | Comment Now 
Advanced iOS kernel debugging for exploit developers:.
Aussie govt passwords stolen by Chinese hacker group 
By Darren Pauli | Oct 25, 2013 | Comment Now 
Logins found on APT1 server.
#BPX audio: Michael Sulmeyer: The Political Economy of the Cyber-security and Malware Markets 
Smart TVs a spying portal for hackers, researcher finds 
By Darren Pauli | Oct 24, 2013 | Comment Now 
Don't keep your TV in the bedroom, consumers warned.
Hardware hack grants remote persistent password bypassing 
By Darren Pauli | Oct 23, 2013 | Comment Now 
Modified disks can throw errors to prevent wholesale data copying.
Here's how you can catch phish like Twitter 
By Darren Pauli | Aug 29, 2013 | Comment Now 
Project akin to the immune system.
Security's 2013 con wishlist  
By Darren Pauli | Dec 18, 2012 | Comment Now 
What events deserve your cash?
FaceDancer board snatches USB firmware 
By Darren Pauli | Oct 25, 2012 | Comment Now 
USB protocol riddled with 'absurd design decisions'.
Researcher finds pacemakers open to deadly hack 
By Darren Pauli | Oct 22, 2012 | Comment Now 
Vulnerability allows firmware rewrites from 30 feet away.
Breakpoint 2012 in pictures 
By Darren Pauli | Oct 18, 2012 | Comment Now 
Breakpoint, by the makers of Ruxcon, saw 14 security experts demo their l33t hacking skills to about a hundred infosec pros. Credits SC Magazine and Stephen Ridley.
Network intel tool outs tweeting spooks 
By Darren Pauli | Oct 18, 2012 | Comment Now 
Maltego showcased at Breakpoint.
Microsoft engineer crafts exploitability index tool  
Hacked terminals capable of causing pacemaker deaths 
By Darren Pauli | Oct 17, 2012 | Comment Now 
Security holes enable attackers to switch off pacemakers, rewrite firmware from 30 feet away.
Tool detects software plagiarism, theft and malware outbreaks 
By Darren Pauli | Sep 13, 2012 | Comment Now 
Tracks applications across Windows and Linux.
Sign up to receive iTnews email bulletins
Latest Comments
Should law enforcement be able to buy and use exploits?

   |   View results
Only in special circumstances
Yes, but with more transparency