Breakpoint, by the makers of Ruxcon, bring 14 security experts from around the world to Melbourne to showcase a wide range of cutting edge security topics. Here you'll find rolling stories from the con.
Car hackers mess with speedos, odometers, alarms and locks 
By Darren Pauli | Oct 29, 2013 | Comment Now 
Produce cheap, open-source and modular hack tool.
Video: Advanced iOS kernel debugging for exploit developers  
By Darren Pauli | Oct 27, 2013 | Comment Now 
Advanced iOS kernel debugging for exploit developers:.
Aussie govt passwords stolen by Chinese hacker group 
By Darren Pauli | Oct 25, 2013 | Comment Now 
Logins found on APT1 server.
#BPX audio: Michael Sulmeyer: The Political Economy of the Cyber-security and Malware Markets 
Smart TVs a spying portal for hackers, researcher finds 
By Darren Pauli | Oct 24, 2013 | Comment Now 
Don't keep your TV in the bedroom, consumers warned.
Hardware hack grants remote persistent password bypassing 
By Darren Pauli | Oct 23, 2013 | Comment Now 
Modified disks can throw errors to prevent wholesale data copying.
Here's how you can catch phish like Twitter 
By Darren Pauli | Aug 29, 2013 | Comment Now 
Project akin to the immune system.
Security's 2013 con wishlist  
By Darren Pauli | Dec 18, 2012 | Comment Now 
What events deserve your cash?
FaceDancer board snatches USB firmware 
By Darren Pauli | Oct 25, 2012 | Comment Now 
USB protocol riddled with 'absurd design decisions'.
Researcher finds pacemakers open to deadly hack 
By Darren Pauli | Oct 22, 2012 | Comment Now 
Vulnerability allows firmware rewrites from 30 feet away.
Breakpoint 2012 in pictures 
By Darren Pauli | Oct 18, 2012 | Comment Now 
Breakpoint, by the makers of Ruxcon, saw 14 security experts demo their l33t hacking skills to about a hundred infosec pros. Credits SC Magazine and Stephen Ridley.
Network intel tool outs tweeting spooks 
By Darren Pauli | Oct 18, 2012 | Comment Now 
Maltego showcased at Breakpoint.
Microsoft engineer crafts exploitability index tool  
Hacked terminals capable of causing pacemaker deaths 
By Darren Pauli | Oct 17, 2012 | Comment Now 
Security holes enable attackers to switch off pacemakers, rewrite firmware from 30 feet away.
Tool detects software plagiarism, theft and malware outbreaks 
By Darren Pauli | Sep 13, 2012 | Comment Now 
Tracks applications across Windows and Linux.
Sign up to receive iTnews email bulletins
Latest Comments
In which area is your IT shop hiring the most staff?

   |   View results
IT security and risk
Sourcing and strategy
IT infrastructure (servers, storage, networking)
End user computing (desktops, mobiles, apps)
Software development

Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results