Kiwicon 6
It is the end of days; the sky has torn asunder, for it is Kiwicon six hundred sixty six. Organised by and for the NZ hacker community, Kiwicon brings together hackers, their whitehat chums, and curious bystanders who are interested in the very very thin veneer of robustness spackled over our technological world.
Hackers' guide to grounding drones 
By Darren Pauli | Nov 20, 2013 | Comment Now 
Podcast: GPS jamming, HERF guns bring down birds.
 
Enterprise software bugs, zero day and communication failures 
By Darren Pauli | Nov 14, 2013 | Comment Now 
Podcast: Money doesn't buy security.
 
Kiwis ink bug reporting guidelines 
By Darren Pauli | Nov 13, 2013 | Comment Now 
Podcast: Hackers want better vulnerability disclosure in business and government.
 
Video: MEGA fronts security critics 
By Darren Pauli | Nov 11, 2013 | Comment Now 
Mathias Ortmann explains why MEGA uses JavaScript in end to end crypto.
 
Barnaby Jack: The good hacker. Tribute by Amberleigh Jack and Mark Dowd 
By Darren Pauli | Nov 10, 2013 | Comment Now 
Kiwicon 7 opens with hacker thrash metal.
 
Christchurch transport card flaws expose identities, grant free bus rides 
 
Kiwi researchers demo third world bank hack 
By Darren Pauli | Feb 4, 2013 | Comment Now 
Audio one time passwords broken.
 
Security's 2013 con wishlist  
By Darren Pauli | Dec 18, 2012 | Comment Now 
What events deserve your cash?
 
Pen testing with single board computers  
By Darren Pauli | Nov 26, 2012 | Comment Now 
Lizardb0y talks do-it-yourself penetration testing with Raspberry Pi and Beagle Boards.
 
Sysadmin creates tool to scour web for hacked data 
By Darren Pauli | Nov 26, 2012 | Comment Now 
Track leaky staff, hackers.
 
Researchers use Exchange for smartphone mayhem 
By Darren Pauli | Nov 26, 2012 | Comment Now 
Wipe phones, steal data.
 
Penetration tester builds wardriving motorbike 
By Darren Pauli | Nov 26, 2012 | Comment Now 
Brings subtlety to trashing wireless networks.
 
Pen tester builds wifi war-bike  
By Darren Pauli | Nov 23, 2012 | Comment Now 
Motorbike kitted out with wifi kit, helmet display.
 
Kaseya patches platform vulnerability 
By Darren Pauli | Nov 23, 2012 | Comment Now 
Customers receive automatic patch.
 
Free tool finds hacked data, stolen cards 
By Darren Pauli | Nov 22, 2012 | Comment Now 
Track leaky staff, hackers over Twitter, Reddit and Stack Exchange.
 
Kaseya patches platform vulnerability 
By Darren Pauli | Nov 22, 2012 | Comment Now 
Customers receive automatic patch.
 
Biohacking: Why is my kitten glowing? 
By Darren Pauli | Nov 20, 2012 | Comment Now 
Edith Cowan University security researcher and former gene manipulator Andrew Woodward explains the science behind biohacking.
 
Pwning Androids, iPhones with Exchange 
By Darren Pauli | Nov 19, 2012 | Comment Now 
Wipe phones, steal data and cause mayhem with ActiveSync.
 
In pictures: #Kiwicon day two 
By Darren Pauli | Nov 19, 2012 | Comment Now 
Organised by and for the New Zealand hacker community, Kiwicon brings together hackers, whitehats, bystanders and baby-killers who are interested in the very thin veneer of ...
 
Kiwicon opening time-lapse 
By Darren Pauli | Nov 18, 2012 | Comment Now 
The first hour in 16 seconds.
 
Researcher owns blue chip managed service platforms 
By Darren Pauli | Nov 18, 2012 | Comment Now 
Zero day dropped at #Kiwicon.
 
In pictures: #Kiwicon day one 
By Darren Pauli | Nov 17, 2012 | Comment Now 
Organised by and for the New Zealand hacker community, Kiwicon brings together hackers, whitehats, bystanders and baby-killers who are interested in the very thin veneer of ...
 
RedHat project fights Java vulnerabilities 
By Darren Pauli | Oct 25, 2012 | Comment Now 
Aussie security boffin builds vulnerability database to track flawed JARs.
 
Tool flags vulnerability news, bypasses Twitter dribble 
By Darren Pauli | May 15, 2012 | Comment Now 
Web app highlights technical security posts, silences tweets about lunch.
 
Hollywood flicks hacked  
By James Hutchinson | Nov 22, 2011 | Comment Now 
But holes aren't remote exploitable.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  13%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 437

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 210

Vote