Malware

Not Found

The server has not found anything matching the Request-URI. No indication is given of whether the condition is temporary or permanent. The 410 (Gone) status code SHOULD be used if the server knows, through some internally configurable mechanism, that an old resource is permanently unavailable and has no forwarding address. This status code is commonly used when the server does not wish to reveal exactly why the request has been refused, or when no other response is applicable.

[return to home page]

DEF CON Sites

Link to DEF CON Forums Forums
Link to DEF CON Media Server Media Server

Follow us!

DEF CON RSS Feed DEF CON Twitter DEF CON Facebook Page DEF CON on Google Plus DEF CON YouTube Page Instagram Logo Reddit logo Canary logo

Past Media

Link to DEF CON PicsTorrents Page
Link to DEF CON Media ServerDEF CON Media Server

The Goods

DEF CON on eBay Logo Official Swag
Source of Knowledge Logo Conference Recordings


DEF CON Announcements!

[[badge.metadataBadgeRenderer.label]] [[badge.metadataBadgeRenderer.tooltip]]

[[getSimpleString_(item)]]

[[getSimpleString(data.indexText)]]

[[getCastDeviceName_(isCasting_)]]

[[ariaLabel]]

[[item.tabRenderer.title]]

[[getSimpleString(data.text)]]

[[computeLabel_(selected)]]

[[item.title]]

[[getSimpleString(data.text)]] [[computeTooltip_(data.untoggledTooltip, data.toggledTooltip, data.isToggled)]]

[[getSimpleString(data.title)]]

[[getSimpleString(data.subscriberCountText)]] [[getSimpleString(data.videoCountText)]]

[[getSimpleString(data.title)]]

[[errorMessage]]

[[getSimpleString(voteCount)]]

[[data.tooltip]]

[[getSimpleString(data.question)]]

[[data.iconText]]

[[getSimpleString(data.title)]]

[[reason]]

[[getSimpleString(content)]]

Ad

-

[[menuStrings_.LANGUAGE_LABEL]] [[clientSettings_.language]]

[[menuStrings_.COUNTRY_LABEL]] [[clientSettings_.country]]

[[menuStrings_.RESTRICTED_MODE_LABEL]] [[computeRestrictedModeText_(clientSettings_.restrictedMode)]]

[[menuStrings_.SETTINGS_LABEL]] [[menuStrings_.HELP_LABEL]] [[menuStrings_.FEEDBACK_LABEL]] [[menuStrings_.CLASSIC_YOUTUBE_LABEL]]

[[menuStrings_.RESTRICTED_MODE_TEXT_LINE_1]]

[[menuStrings_.RESTRICTED_MODE_TEXT_LINE_2]]

[[computeRestrictedModeText_(clientSettings_.restrictedMode)]]

[[menuStrings_.SHARE_LABEL]]


DEF CON Announcements!

Security products should make our computers more secure, not less. Little Snitch is the de facto personal firewall for OS X that aims to secure a Mac by blocking unauthorized network traffic. Unfortunately bypassing this firewall's network monitoring mechanisms is trivial...and worse yet, the firewall's kernel core was found to contain an exploitable ring-0 heap-overflow. #fail Though briefly touching on generic firewall bypass techniques, this talk will largely focus on the kernel-mode vulnerability. Specifically, I’ll discuss bypassing OS X specific anti-debugging mechanisms employed by the product, reverse-engineering the firewall's I/O Kit kernel interfaces and 'authentication' mechanisms, and the discovery of the exploitable heap-overflow.

Finally, methods of exploitation will be briefly discussed, including how an Apple kernel-fix made this previously un-exploitable bug, exploitable on OS X 10.11

So if you simply want to see yet another 'security' product fall, or more generically, learn methods of OS X kernel extension reversing in a practical manner, then this talk is for you 🙂

Bio:
Patrick Wardle is the Director of Research at Synack, where he leads cyber R&D efforts. Having worked at NASA, the NSA, and Vulnerability Research Labs (VRL), he is intimately familiar with aliens, spies, and talking nerdy. Currently, Patrick’s focus is on automated vulnerability discovery, and the emerging threats of OS X and mobile malware. In his personal time, Patrick collects OS X malware and writes free OS X security tools. Both can be found on his website; www.Objective-See.com


DEF CON Announcements!

Gary Numan said it best. Cars. They’re everywhere. You can hardly drive down a busy freeway without seeing one. But what about their security?

In this talk I’ll reveal new research and real attacks in the area of wirelessly controlled gates, garages, and cars. Many cars are now controlled from mobile devices over GSM, while even more can be unlocked and ignitions started from wireless keyfobs over RF. All of these are subject to attack with low-cost tools (such as RTL-SDR, GNU Radio, HackRF, Arduino, and even a Mattel toy).

We will investigate how these features work, and of course, how they can be exploited. I will be releasing new tools and vulnerabilities in this area, such as key-space reduction attacks on fixed-codes, advanced "code grabbers" using RF attacks on encrypted and rolling codes, and how to protect yourself against such issues.

By the end of this talk you’ll understand not only how vehicles and the wirelessly-controlled physical access protecting them can be exploited, but also learn about various tools for car and RF research, as well as how to use and build your own inexpensive devices for such investigation.

Ladies and gentlemen, start your engines. And other people’s engines.

Samy Kamkar is a security researcher, best known for creating The MySpace Worm, one of the fastest spreading viruses of all time. He (attempts to) illustrate terrifying vulnerabilities with playfulness, and his exploits have been branded:

“Controversial”, -The Wall Street Journal
“Horrific”, -The New York Times
“Now I want to fill my USB ports up with cement”, -Gizmodo

He’s demonstrated usurping typical hardware for surreptitious means such as with KeySweeper, turning a standard USB wall charger into a covert, wireless keyboard sniffer, and SkyJack, a custom drone which takes over any other nearby drones allowing them to be controlled as a massive zombie swarm. He’s exposed issues around privacy, such as by developing the Evercookie which appeared in a top-secret NSA document revealed by Edward Snowden, exemplifying techniques used by governments and corporations for clandestine web tracking, and has discovered and released research around the illicit GPS and location tracking performed by Apple, Google and Microsoft mobile devices. He continues to produce new research and tools for the public as open source and open hardware.

Twitter: @samykamkar


DEF CON Announcements!

We now have new torrent links in and eMule collections for most of the past DEF CON Media. For torrents, there are many clients including BitTorrent (most platforms), uTorrent (most platforms), and Transmission (OS X, Unix, Linux, and some embedded systems).

BitTorrent Logo uTorrent Logo Transmission Logo

For eMule collections, eMule (Windows) and aMule (all platforms), are good choices.

eMule Logo aMule Logo

For the individual files in these collections and so much more, Check out the DEF CON Media Server!

DEF CON Media Server

If you could do us a favor as these files build p2p momentum, leave your client running for a bit after you download to share these files and help spread the media love!


DEF CON: The Documentary

DEF CON the Documentary in 720p: Torrent Icon Torrent

DEF CON the Documentary in 1080p: Torrent Icon Torrent

DEF CON the Documentary - all files including music, extra clips, and interview: Torrent Icon Torrent

DEF CON Documentary soundtrack: Check out the music from the artists (Zoe Blade, Broke For Free, Chris Zabriskie, Revolution Void, The Insiders, and others) that made the DEF CON Documentary soundtrack possible! Torrent Icon Torrent

DEF CON Documentary extra bonus clips: 21 Extra clips that didn't make the documentary. Interviews, background stories, and past trivia. If you finished watching the DEF CON Documentary wanting more, here it is! Torrent Icon Torrent

Multi-year collections:

All Conference CDs and DVDs with Presentation PDF files (updated 2015): Torrent Icon Torrent | emule Icon Emule collection
All Conference Programs: Torrent Icon Torrent | emule Icon Emule collection
DEF CON Filler from DCTV: Torrent Icon Torrent

HACKER RELATED DOCUMENTARIES:

Collection of Hacker Documentaries hosted on defcon.org (Updated to include DEF CON: The Documentary and Sneak Peek): Torrent Icon Torrent

DEF CON 1

Speeches:
Collection of all Audio from DEF CON 1: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

DEF CON 2

Speeches:
Collection of all Audio from DEF CON 2: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

DEF CON 3

Speeches:
Collection of all Audio from DEF CON 3: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

DEF CON 4

Speeches:
Collection of all Audio from DEF CON 4: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

DEF CON 5

Speeches:
Collection of all Audio from DEF CON 5: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

DEF CON 6

Speeches:
Collection of all Audio from DEF CON 6: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

DEF CON 7

Speeches:
Collection of all Video from DEF CON 7: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Audio from DEF CON 7: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

DEF CON 8

Speeches:
Collection of all Video from DEF CON 8: Torrent Icon Torrent | rss Icon RSS Feed
Collection of all Audio from DEF CON 8: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

DEF CON 9

Speeches:
Collection of all Video from DEF CON 9: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Audio from DEF CON 9: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

Music:
Collection of all Music from DEF CON 9: Torrent Icon Torrent | rss Icon RSS Feed

DEF CON 10

Speeches:
Collection of all Video from DEF CON 10: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Audio from DEF CON 10: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

Music:
Collection of all Music from DEF CON 10: Torrent Icon Torrent | rss Icon RSS Feed

DEF CON 11

Speeches:
Collection of all Video from DEF CON 11: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Audio from DEF CON 11: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

Music:
Collection of all Music from DEF CON 11: Torrent Icon Torrent | rss Icon RSS Feed

DEF CON 12

Speeches:
Collection of all Video from DEF CON 12: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Audio from DEF CON 12: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

Music:
Collection of all Music from DEF CON 12: Torrent Icon Torrent | rss Icon RSS Feed

DEF CON 13

Speeches:
Collection of all Video from DEF CON 13: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Audio from DEF CON 13: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

Music:
Collection of all Music from DEF CON 13: Torrent Icon Torrent | rss Icon RSS Feed
Collection of all Music Videos from DEF CON 13: rss Icon RSS Feed

DEF CON 14

Speeches:
Collection of all Video from DEF CON 14: Torrent Icon Torrent | rss Icon RSS Feed
Collection of all Audio from DEF CON 14: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

Music:
Collection of all Music from DEF CON 14: Torrent Icon Torrent | rss Icon RSS Feed

DEF CON 15

Speeches:
Collection of all Video from DEF CON 15: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Audio from DEF CON 15: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

Badge Files:
Collection of files relating to the electronic badge from DEF CON 15: Torrent Icon Torrent

Other Fun Stuff:
Collection of other items of interest from DEF CON 15: Torrent Icon Torrent

DEF CON 16

Speeches:
Collection of all Speaker & Slides Video from DEF CON 16: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Slides Video from DEF CON 16: Torrent Icon Torrent | rss Icon RSS Feed
Collection of all Audio from DEF CON 16: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

Badge Files:
Collection of files relating to the electronic badge from DEF CON 16: Torrent Icon Torrent

Tools:
Collection of tools released at DEF CON 16: Torrent Icon Torrent

DEF CON 17

Speeches:
Collection of all Speaker & Slides Video from DEF CON 17: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Slides Video from DEF CON 17: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Audio from DEF CON 17: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

Music:
Collection of all Music from DEF CON 17: Torrent Icon Torrent

Badge Files:
Collection of files relating to the electronic badge from DEF CON 17: Torrent Icon Torrent

CTF Files:
Collection of files related to the Capture the Flag contest at DEF CON 17: Torrent Icon Torrent

Tools:
Collection of tools released at DEF CON 17: Torrent Icon Torrent

Other Fun Stuff:
Collection of other items of interest from DEF CON 17: Torrent Icon Torrent

DEF CON 18

Speeches:
Collection of all Speaker & Slides Video from DEF CON 18: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Slides Video from DEF CON 18: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Audio from DEF CON 18: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

Music:
Collection of all Music from DEF CON 18: Torrent Icon Torrent | rss Icon RSS Feed

Other Video:
Hacker Jeopardy: Torrent Icon Torrent | emule Icon Emule collection

CTF Files:
Collection of files related to the Capture the Flag contest at DEF CON 18: Torrent Icon Torrent

Tools:
Collection of tools released at DEF CON 18: Torrent Icon Torrent

DEF CON 19

Speeches:
Speaker materials: rss Icon RSS Feed
Collection of all Speaker & Slides Video from DEF CON 19: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Slides Video from DEF CON 19: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Audio from DEF CON 19: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

Short Story Contest:
Collection of short stories from the contest at DEF CON 19: Torrent Icon Torrent

Other Video:
10,000¢ Hacker Pyramid and Hacker Jeopardy: Torrent Icon Torrent | emule Icon Emule collection

CTF Files:
Collection of files related to the Capture the Flag contest at DEF CON 19: Torrent Icon Torrent

Other Fun Stuff:
Collection of other items of interest from DEF CON 19: Torrent Icon Torrent

DEF CON 20

Speeches:
Speaker materials: rss Icon RSS Feed
Collection of all Speaker & Slides Video from DEF CON 20: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Slides Video from DEF CON 20: Torrent Icon Torrent | rss Icon RSS Feed
Collection of all Audio from DEF CON 20: Torrent Icon Torrent | emule Icon Emule collection | rss Icon RSS Feed

CTF:
Collection of files related to the Capture the Flag contest at DEF CON 20: Torrent Icon Torrent

Music:
Collection of all Music from DEF CON 20: Torrent Icon Torrent

Other Video:
Hacker Jeopardy: Torrent Icon Torrent | emule Icon Emule collection
Hacker Pyramid: Torrent Icon Torrent

Short Story Contest:
Collection of short stories from the contest at DEF CON 20: Torrent Icon Torrent

Artwork:
Collection of Conference Artwork from DEF CON 20: Torrent Icon Torrent
Collection of Art from the DEF CON 20 Artwork Contest: Torrent Icon Torrent

Pictures: Collection of photos from various photographers at DEF CON 20: Torrent Icon Torrent

DEF CON 21

Conference CD:
Updated Conference CD: Torrent Icon Torrent

Speaker Materials:
Updated Speaker Materials: Torrent Icon Torrent | rss Icon RSS Feed

Speeches:
Collection of all Speaker & Slides Video from DEF CON 21: Torrent | rss Icon RSS Feed
Collection of all Slides Video from DEF CON 21: Torrent | rss Icon RSS Feed
Collection of all Audio from DEF CON 21: Torrent | emule Icon Emule collection | rss Icon RSS Feed

Music:
Collection of music from the performances at DEF CON 21: Torrent Icon Torrent

Photos:
DEF CON 21 Pictures 1 torrent: Torrent
DEF CON 21 Pictures 2 torrent: Torrent

CTF:
Complete packet captures from the Capture the Flag contest at DEF CON 21 - Friday: Torrent
Complete packet captures from the Capture the Flag contest at DEF CON 21 - Saturday: Torrent
Complete packet captures from the Capture the Flag contest at DEF CON 21 - Sunday: Torrent
Binaries and Tools from the Capture the Flag contest at DEF CON 21: Torrent

DEF CON 22

Badge:
Collection of files related to hacking the DEF CON 22 Badge: Torrent Icon Torrent

Speaker Materials:
Updated Speaker Materials: Torrent Icon Torrent | rss Icon RSS Feed

Speeches:
Collection of all Speaker & Slides Video from DEF CON 22: Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Slides Video from DEF CON 22: Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Speaker Video from DEF CON 22: Torrent | emule Icon Emule collection | rss Icon RSS Feed
Collection of all Audio from DEF CON 22: Torrent | emule Icon Emule collection | rss Icon RSS Feed

Villages:
Collection of talks from the Wifi Village at DEF CON 22: Torrent Icon Torrent | emule Icon Emule collection

Contests:
Collection of Entries from the X-hour film contest at DEF CON 22: Torrent Icon Torrent | emule Icon Emule collection
Collection of entries from the Short Story Contest at DEF CON 22: Torrent

CTF:
Complete packet captures from the Capture the Flag contest at DEF CON 22: Torrent

Music:
Music CD: Torrent Icon Torrent
Collection of music from the performances at DEF CON 22: Torrent Icon Torrent

Photos
Collection of Photos from DEF CON 22: Torrent Icon Torrent

DEF CON 23

Speaker Materials:
Updated Speaker Materials: Torrent Icon Torrent

Speeches:
Collection of all Speaker & Slides Video from DEF CON 23: Torrent | rss Icon RSS Feed
Collection of all Video from DEF CON 23: Torrent | rss Icon RSS Feed
Collection of all Slides Video from DEF CON 23: Torrent | rss Icon RSS Feed
Collection of all Villages Speaker & Slides Video from DEF CON 23: Torrent | rss Icon RSS Feed
Collection of all Villages Speaker Video from DEF CON 23: Torrent
Collection of all Villages Slides Video from DEF CON 23: Torrent
Collection of all Audio from DEF CON 23: Torrent | rss Icon RSS Feed

CTF:
Complete packet captures from the Capture the Flag contest at DEF CON 23: Torrent

Music:
Music CD: Torrent Icon Torrent

Photos
Collection of Photos from DEF CON 23: Torrent Icon Torrent

DEF CON 24

Speaker Materials:
Updated Speaker Materials: Torrent Icon Torrent

Speeches:
Collection of all Speaker & Slides Video from DEF CON 24: Torrent | rss Icon RSS Feed
Collection of all Audio from DEF CON 24: Torrent rss Icon RSS Feed
Collection of all Villages from DEF CON 24: Torrent

Cyber Grand Challenge:
CGC Files from DEF CON 24: Torrent Icon Torrent

Conference CD:
CD: Torrent Icon Torrent

Music:
Music CD: Torrent Icon Torrent

CTF:
Files relted to the Capture the Flag contest at DEF CON 24: Torrent

Photos
Collection of Photos from DEF CON 24: Torrent Icon Torrent

DEF CON RSS Feed DEF CON Twitter DEF CON Facebook Page DEF CON on Google Plus DEF CON YouTube Page Instagram Logo Reddit logo Canary logo

DEF CON Sites

Link to DEF CON Forums Forums
Link to DEF CON Media Server Media Server

The Goods

DEF CON on eBay Logo Official Swag
FAQ about DEF CON Hotels... - DEF CON Forums

  • If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Working...


DEF CON Announcements!

This is not just another "I found a problem in a single IOT device" talk. Focusing on attacking three major consumer product lines that have grown rapidly in the past years, Zack and Erin will review flaws they’ve discovered and weaponized against home Windows installs, DIY security solutions, personal fitness tracking devices, and digital notification devices. We’ll review the security of these popular products and services in a ‘consumer reports’ style walkthrough, the attack methods against the 21 devices reviewed, release some tools for the lulz, and highlight the threats facing similar products. It's time to Fight for the Users. END OF LINE.

Zack Fasel and Erin Jacobs are Partners at Urbane Security, a solutions-focused vendor-neutral information security services firm focusing on providing innovative defense, sophisticated offense and refined compliance services.

Heading up Urbane's Research and Security Services divisions, Zack brings his years of diverse internal and external experience to drive Urbane's technical solutions to organizations top pain points. His previous research and presentations at conferences have spread across numerous domains including Windows authentication flaws, femtocells, open source defensive security solutions, cloud security, and unique network and application attack vectors. When not selling out, he can be found lost in the untz unce wubs, dabbling in instagram food photography, or eating scotch and drinking gummy bears (that's right, right?). More information on Zack can be found by searching for "zfasel" and on Urbane Security at UrbaneSecurity.com.

Leading the charge of Urbane’s Compliance and Enterprise Risk Management divisions, Erin brings her years of executive level experience coupled with deep and diverse technical knowledge to help organizations accurate prioritize and address the security and compliance risks they face. Her prior talks and research have spread across numerous domains, including technical solutions for compliance requirements, OSX reversing, diversity in tech, and IOT. More information on Erin can be found by following @SecBarbie on twitter.

Twitter: @UrbaneSec @zfasel @SecBarbie


DEF CON Announcements!

MR. ROBOT is a rare treat - a network television show whose hacker protagonist is a fully realized character with a realistically attainable set of skills. No hyper-typing, no gibberish masquerading as tech jargon, no McGuffins to magically paper over plot holes with hacker dust. MR. ROBOT takes the tech as seriously as the drama.

One of the main reasons for this verisimilitude is the work of Kor Adana, MR. ROBOT's advisor on all things hackish. His fingerprints are on every terminal window in the show. Another advisor to the show is our very own CJunky - known to the outside world as hacker and raconteur Marc Rogers. Join Dark Tangent for a panel discussion of MR. ROBOT: the phenomenon, the hacks and the crazy ways the show seems to pull its storylines from the future. Bring your questions, and keep an eye out for late-breaking special guests.

Kor Adana’s interest in technology started as a child when he tried to build a red box to get free calls on pay phones. By the time he was in middle school, he was building his own computer systems and getting into trouble. After obtaining a B.S. in IT Network Administration, Kor went on to work in enterprise network security for one of the world’s largest automakers. He performed penetration testing, designed security policies, managed enterprise-wide eDiscovery, and conducted forensics for legal and HR matters. While there, he also worked alongside NASA in a high-profile government investigation. He eventually left the IT world to pursue his true passion, writing for film and television. He’s worked with the producers of THE WALKING DEAD, THE SHIELD, LOST, and DEXTER. He is currently a writer and technical supervisor for USA's Golden Globe Award-winning drama, MR. ROBOT. He also has one of his own projects in development with Universal Cable Productions.

Ryan Kazanciyan is the Chief Security Architect for Tanium and has thirteen years of experience in incident response and forensics, penetration testing, and security architecture. Prior to joining Tanium, Ryan was a technical director and lead investigator at Mandiant, where he worked with dozens of Fortune 500 organizations impacted by targeted attacks.

Ryan has presented security research at dozens of events worldwide, including Black Hat, DEFCON, and RSA. He has led training sessions for hundreds of the FBI's cyber squad agents, and was a contributing author for "Incident Response and Computer Forensics, 3rd Edition", published in 2014.

Andre McGregor is at DEFCON 24 celebrating his one-year anniversary as Tanium’s Director of Security responsible for internal cybersecurity. Prior to joining Tanium, Andre was a fresh-faced new agent with the FBI working cases like the NYC Subway bomber and Times Square car bomb while arresting his share of Italian Organized Crime bosses. His computer engineering background led him to help form FBI New York’s first cyber national security squad focused on computer intrusions from China, Russia, and Iran. Having deploying with NSA Blue Team and DHS US-CERT/ICS-CERT as a technically-trained cyber agent, Andre has led numerous large-scale cyber investigations ranging from financial crimes to critical infrastructure protection. In his free time, when he wasn’t sifting through terabytes of Netflow with SiLK and playing around with Autopsy and IDA, Andre was an FBI firearms instructor, dive team medic, and a volunteer firefighter driving fire trucks. After graduating from Brown University, Andre worked as an engineer at Goldman Sachs and later transitioned to IT Director at Cardinal Health/Advogent. Having shed the badge and gun last year, Andre currently serves as the FBI cyber technical consultant for the TV show Mr. Robot.

Kim Zetter is an award-winning, senior staff reporter at Wired covering cybercrime, privacy, and security. She is writing a book about Stuxnet, a digital weapon that was designed to sabotage Iran's nuclear program.


DEF CON Announcements!

What if your wireless mouse was an effective attack vector? Research reveals this to be the case for mice from Logitech, Microsoft, Dell, Lenovo, Hewlett-Packard, Gigabyte, and Amazon. Dubbed 'MouseJack', this class of security vulnerabilities allows keystroke injection into non-Bluetooth wireless mice. Imagine you are catching up on some work at the airport, and you reach into your laptop bag to pull out your phone charger. As you glance back at your screen, you see the tail end of an ASCII art progress bar followed by your shell history getting cleared.

Before you realize what has happened, an attacker has already installed malware on your laptop. Or maybe they just exfiltrated a git repository and your SSH keys. In the time it took you to plug in your phone, you got MouseJacked. The attacker is camped out at the other end of the terminal, equipped with a commodity USB radio dongle and a directional patch antenna hidden in a backpack, and boards her plane as soon as the deed is done. The reality of MouseJack is that an attacker can inject keystrokes into your wireless mouse dongle from over 200 meters away, at a rate of up to 7500 keystrokes per minute (one every 8ms).

Most wireless keyboards encrypt the data going between the keyboard and computer in order to deter sniffing, but wireless mouse traffic is generally unencrypted. The result is that wireless mice and keyboards ship with USB dongles that can support both encrypted and unencrypted RF packets. A series of implementation flaws makes it possible for an attacker to inject keystrokes directly into a victim's USB dongle using easily accessible, cheap hardware, in most cases only requiring that the user has a wireless mouse. The majority of affected USB dongles are unpatchable, making it likely that vulnerable computers will be common in the wild for the foreseeable future.

This talk will explain the research process that lead to the discovery of these vulnerabilities, covering specific tools and techniques. Results of the research will be detailed, including protocol behavior, packet formats, and technical specifics of each vulnerability. Additional vulnerabilities affecting 14 vendors are currently in disclosure, and will be revealed during this talk.

Marc is a security researcher and software engineer at Bastille Networks, where he focuses on RF/IoT threats present in enterprise environments. He has been hacking on software defined radios since 2013, when he competed as a finalist in the DARPA Spectrum Challenge. In 2011, he wrote software to reassemble shredded documents for the DARPA Shredder Challenge, finishing the competition in third place out of 9000 teams.

Twitter: @marcnewlin


DEF CON Announcements!

This is a comprehensive list of all articles known to have been written about DEF CON. Many publications are no longer in existence, and much of this history is lost. If you have press you would like included in the archive, send links and titles to neil [at] defcon ]dot[ org!
A note to journalists: Please stop writing clever articles entitled 'Fear and Hacking in Las Vegas', as it becomes difficult to tell them apart.

DEF CON 24

Automotive

  • Hackers show how they tricked a Tesla into hitting objects in its path Paul Szoldra, Business Insider
  • Hackers Fool Tesla S’s Autopilot to Hide and Spoof Obstacles Andy Greenberg, WIRED
  • Researchers show anyone can hack Tesla’s Autopilot software and force a crash Yoni Heisler, BGR
  • Hackers find it's not so hard to blind Tesla's Autopilot Nick Jaynes, Mashable
  • Man says Tesla Autopilot saved his life by driving him to the hospital Robert Ferris, CNBC
  • Researchers trick Tesla Model S Autopilot Brandon Turkus, Autoblog.com
  • Tesla Model S’s autopilot can be blinded with off-the-shelf hardware Lisa Vaas, Naked Security
  • Hackers Trick Tesla S’s Autopilot Into Making Obstacles ‘Disappear’ And Crash Kavita Iyer, TechWorm
  • Car Hacking: DEF CON Style Cameron Camp, WeLiveSecurity

Badge Talk

  • The Incredibly Intricate Badges of DEF CON Roberto Baldwin, Engadget
  • Sabotage, Hallucinations, and Hacking at DEF CON 24 Mike Brown, Inverse
  • Badge Challenge Writeup DC24 Winners, Council of Nine
  • Hands-On the AND!XOR Unofficial DEF CON Badge Mike Szczys, Hackaday
  • Badge Challenge Writeup Degenerate Metric
  • This DEF CON Badge Has a Classic 'Contra' Easter Egg Mike Brown, Inverse
  • DEF CON's X86 Badge Brian Benchoff, Hackaday

CTF

  • Strong showing for Pittsburgh teams in DARPA's hacking contest Paul Gough, Pittsburgh Business Times
  • Carnegie Mellon Wins Third ‘World Series of Hacking’ Title in Four Years Sarah Masuda, MeriTalk
  • Baidu Blue-Lotus Finishes 2nd at DEFCON, Shows China's Strength in Network Security PR Newswire
  • 電腦踢館 14 國駭客!趨勢科技帶你看 DEF CON 2016 重點:「自動化找漏洞系統」 Semicon Taiwan Tech News
  • Why Is This College Hacking Team So Freaking Good? Kastalia Medrano, Inverse
  • Our CTF Hosts, The Legitimate Business Syndicate legitbs.net
  • Major update drops for popular Pwntools penetration showbag Darren Pauli, The Register
  • Carnegie Mellon Conquers All in 3rd DEF CON Capture the Flag Victory Dian Schaffhauser, Campus Technology

Cyber Grand Challenge

  • Three Teams Earn Prizes in DARPA Cyber Grand Challenge Cheryl Pellerin, DoD News, Defense Media Activity
  • Despite Obstacles, UCSB Hacking Team Places 3rd at 2016 Cyber Grand Challenge Sonia Fernandez, Noozhawk.com
  • Bug Hunting Cyber Bots Set to Square Off at DEF CONChris Brook, Threatpost
  • Automating Cybersecurity Kenneth Chang, New York Times
  • Watch AI hack into AI at DARPA’s Cyber Grand Challenge Cecil Kleine, TheNextWeb
  • Pittsburgh-based team wins $ 2M DARPA Grand Cyber Challenge Greg Otto, fedscoop
  • AI hackers will make the world a safer place -- hopefully Roberto Baldwin, Engadget
  • Like Battlebots, Except These Robots Automatically Patch CyberSecurity Holes Aliya Sternstein, DefenseOne
  • White hat hacker AI bots prepare for DARPA's DEF CON cyber brawl Iain Thomson, The Register
  • DARPA's Cyber Grand Challenge Heads to DefCon Sean Michael Kerner, eWeek
  • DARPA's Cyber Grand Challenge Is A Glimpse Of Our Human-Free Future William Turton, Gizmodo
  • DARPA Cyber Grand Challenge Ends With Mayhem Sean Michael Kerner, eWeek
  • Hackers Don’t Have to Be Human Anymore. This Bot Battle Proves It Cade Metz, WIRED
  • Geeks win millions for teaching computers to battle each other Jim Finkle, Reuters
  • Carnegie Mellon’s Mayhem AI takes home $ 2 million from DARPA’s Cyber Grand Challenge Devin Coldewy, TechCrunch
  • DARPA Challenge Takes AI To War Games John Markman, Forbes
  • Seven automated hacking systems will compete for a $ 2 million prize on Thursday Russell Brandom, The Verge
  • DARPA Competition Aims to Help Automate Computer Security Jay Clemens, ExecutiveGov.com
  • DARPA's Machine Challenge Solves CrackAddr Puzzle Sean Michael Kerner, eSecurity Planet
  • 'Mayhem' program wins grand hacking challenge BBC News
  • 'Mayhem' Takes $ 2M First Prize in DARPA Cyber Grand Challenge Dan Heilman, Top Tech News
  • Should we be worried about robot bug hunters? Nicole Kobie, ITPro.co.uk
  • Forget Rio Olympics, DefCon Is Giving 2 Million USD For Hacking Suchayan Mandal, Lifehacker In dia
  • A supercomputer is taking on humans in a hacking contest at DEF CON Michael Kan, PC World
  • Hackers demonstrated first ransomware for IoT thermostats at DEF CON Darlene Storm, ComputerWorld
  • Chinese team shows strength in int'l network security competition Xinhua, Shanghai Daily

Fed Talk

  • US Politicians tell DEF CON it'll take Congress ages to sort out how to regulate crypto Iain Thomson, The Register
  • DEF CON: How feds' outreach plays with the hacker crowd Randy Apuzzo, GCN
  • #DefCon US Government Only Holds Dozens of Zero-Days Dan Raywood, Infosecurity Magazine
  • NSA denies ‘Raiders of the Lost Ark' stockpile of security vulnerabilities Alex Hern, The Guardian
  • Feds Keep a Lower Cyber Arsenal Than Tech World Believes Newsmax
  • #DefCon FTC Stresses IoT Concerns Dan Raywood, Infosecurity Magazine
  • FTC Goes to DEF CON Lorrie Cranor, FTC.gov
  • FTC seeks research help from DEF CON hackers Tim Greene, NetworkWorld
  • FTC Commissioner Looking for Hackers' Help With Consumer Privacy Sean Michael Kerner, eWeek
  • How the Government ins Waging Crypto War 2.0 Daniel Oberhaus, Moterboard
  • When Government Secrets Keep You Safe Robert Hackett, Fortune

General

  • Here's what it's like at America's largest hacking convention Daniel Howley, Yahoo! Finance
  • Impressions From DEF CON 24: The Machines Are Rising Paul Ionescu, SecurityIntelligence.com
  • Def Con Has Always Been Straight, White, and Male, But It’s Finally Changing Daniel Oberhaus, Motherboard
  • How to hack a government Roberto Baldwin, Engadget
  • DEF CON 24: THE OFFICIAL SOUNDTRACK beatport.com
  • You can buy lock picks, Wi-Fi hacking tools, and more at the world's biggest hacking conference Paul Szoldra, Business Insider
  • Defcon deals: Five hacking tools for $ 100 or less Laura Hautala, c|net
  • John McAfee declares war on Kim Dotcom: Fight erupts between tech's most controversial figures Mary-Ann Russon, International Business Times
  • DefCon: How the Hacker Tracker Mobile App Stays Secure Sean Michael Kerner, eWeek
  • Elliot’s reality is murky, but Mr. Robot tech advisors remind us the show’s is not Nathan Mattise, Ars Technica
  • DEF CON 24's “Rise of the Machines” Warns of Robot Uprising Catrina Dennis, Inverse
  • Not Going to DEF CON? 5 Things to Wach from the Hacker Con Nathaniel Mott, Inverse
  • This Guy Let Me Control His Hacked Wheelchair With An Xbox Gamepad Thomas Fox-Brewster, Forbes
  • Blue Screen of Death Brain Benchoff, Hackaday
  • Data Sheet—Saturday, August 6, 2016 Robert Hackett, Fortune
  • Def Con: The hackers bringing Mr Robot to life Mark Ward, BBC News
  • The state of cybersecurity: we're all screwed Dan Tynan, The Guardian
  • Gov't thinks it has right to data, Lavabit founder says Teri Robertson, SC Magazine
  • DEF CON 24: Day One Tom Palarz, Veracode
  • DEF CON: a Hacker's ParadiseClick, BBC
  • Lessons from a digital mercenary: Beware the ‘October Surprise' Sara Sorcher, The Christian Science Monitor
  • Disable WPAD now or have your accounts and private data compromised Lucian Constantin, IT World
  • Road Warriors: Beware of 'Video Jacking' Brian Krebs, Krebs on Security

Internet of Things

  • #DefCon: Thermostat Control Hacked to Host Ransomware Dan Raywood, Infosecurity Magazine
  • DEFCON: BtleJuice MitM Hacks Bluetooth (and belittles Bluetooth Padlock security) Sean Michael Kerner, InternetNews.com
  • DEF CON Researchers Hack A Dell Monitor To Show Any Pixels They Want Logan Booker, Gizmodo Australia
  • High-security electronic safes can be hacked Lucian Constantin, ComputerWorld
  • US seismic sensors let hackers trigger false alerts and fake data James Walker, Digital Journal
  • Hacker breaks into electronic safes without a trace at DEF CON Staff, Tech2
  • If you use ‘smart’ Bluetooth locks, you're asking to be burgled Iain Thomson, The Register
  • Researchers Infect IoT Thermostat with Ransomware Catalin Cimpanu, Softpedia
  • Your 'intimate personal massager' – cough – is spying on you Iain Thomson, The Register
  • Defcon heats up with smart thermometer ransomware Jon Martindale, Yahoo! Tech
  • Hackers Make the First-Ever Ransomware for Smart Thermostats Lorenzo Franceschi-Bicchierai, Motherboard
  • Proof-of-concept ransomware for smart thermostats demoed at Defcon Cory Doctorow, BoingBoing
  • Researcher finds huge security flaws in Bluetooth locks Roberto Baldwin, Engadget
  • Hacking Hotel Keys and Point of Sale Systems at DEF CON Sean Michael Kerner, eSecurity Planet
  • How to prevent your security camera from being hacked Taylor Martin, c|net
  • Someone made a smart vibrator, so of course it got hacked Alex Hern, The Guardian
  • Black Hat USA and DefCon: Finding Security Risks in All the ThingsSean Michael Kerner, eWeek
  • Solar panels, vacation Wi-Fi at risk for hacking Elizabeth Weise, USA Today
  • This sex toy tells the manufacturer every time you use it Kashmir Hill, Fusion
  • #DefCon: Thermostat Control Hacked to Host Ransomware Dan Raywood, Infosecurity Magazine
  • Hedberg is a Bionic Hand Made From a Single Keurig Cameron Coward, Hackaday
  • Thermostat Ransomware: a Hack Explained Sue Walsh, RTInsights.com
  • Not even your vibrator is safe from data-mining, hackers prove Ariel Bogle, Mashable
  • Hackers Could Break Into Your Computer Monitor And Manipulate Your Pixels Kavita Iyer, TechWorm
  • Def Con: Do smart devices mean dumb security? BBC News
  • The Internet of Dildos is Watching You Daniel Oberhaus, Motherboard
  • This PC monitor hack can manipulate pixels for malicious effect Michael Kan, ITWorld
  • Your monitor can be hacked, used to spy on you Shawn Knight, TechSpot
  • Hackers can force your monitor to permanently display images James Walker, Digital Journal
  • Researchers: Hackers could weaponize up to a billion monitors to spy on everyone Joel Hruska, ExtremeTech
  • 1 billion computer monitors vulnerable to undetectable firmware attacks Cory Doctorow, BoingBoing

Mobility

  • Major Qualcomm chip security flaws expose 900M Android users Tom Mendelsohn, Ars Technica
  • How Qualcomm Flaws Left 900 Million Android Devices Vulnerable to Spies David Meyer, Fortune
  • Android chip vulnerability leaves millions of devices open to attack Greg Otto, fedscoop
  • Quadrooter: More than 900 million Android devices have a critical security flaw Kyle Wiggers, Digital Trends
  • Newly Announced Chipset Vuln Affects 900 Million Android Devices Ericka Chickowski, Dark Reading
  • Quadrooter is the Latest Android Malware Scare Reminding You to Stick to Google Play Kellex, DroidLife
  • Researchers Find Serious Bugs in Android Devices that Use Qualcomm Chips Alina Maring, CDA News
  • Qualcomm Vulnerabilities Put 900 Million Android Devices at Risk Jeffrey Burt, eWeek
  • Hacker Creates Fake, Effective Boarding Passes David Z. Morris, Fortune
  • Fake QR code app gets hacker into luxury airport lounges for free Lisa Vaas, Naked Security
  • Traveler Hacks His Way Into Fancy Airport Lounges Laura Northrup, Consumerist
  • Samsung Pay hack lets attackers skim cards to make fraudulent payments James Vincent, The Verge
  • Samsung Pay Warning: How Hackers Can Intercept Credit Card Info Karl Utermohlen, InvestorPlace
  • DEF CON: Samsung Pay Hacked Sean Michael Kerner, InternetNews
  • Samsung downplays Def Con 24 claims that Samsung Pay can be hacked John Kennedy, Silicon Republic

DEF CON 23

Automotive

  • Want to hack a car? Don't try hacking a Tesla. Yoni Heisler, BGR
  • Hacking a Tesla Model S: What we found and what we learned Kevin Mahaffey, Lookout Blog
  • How Hackers Tore Apart A Tesla Model S To Kill The Car Mid-Drive Thomas Fox-Brewster, Forbes Tech
  • Here is how you learn to hack a car Andrea Peterson, The Washington Post
  • This Hacker’s Tiny Device Unlocks Cars And Opens Garages Andy Greenberg, Wired
  • DEF CON 23: la panoplie de hacker pour voler une voiture connectée Gilbert Kallenborn, 01net.com
  • DEF CON 23: comment des hackers ont piraté la Tesla Model S Gilbert Kallenborn, 01net.com
  • Automakers trying to prevent hackers from comandeering cars Tom Krisher, AP
  • Hacked Jeep Cherokee Exposes Weak Underbelly of High-Tech Cars Jordan Robertson, Bloomberg
  • 10 years after his epic MySpace hack, Samy Kamkar is trying to turn hackers into heroes Kashmir Hill, Fusion
  • More Car Hacks from DEF CON 23 Douglas Mechaber, Tom's Hardware
  • OwnStar Wi-Fi attack now grabs BMW, Mercedes, and Chrysler cars’ virtual keys Sean Gallagher, Ars Technica
  • Highway to hack: why we’re just at the beginning of the auto-hacking era Sean Gallagher, Ars Technica
  • Tesla hackers explain how they did it at DEF CON Antuan Goodman, CNET
  • Black Hat and DEF CON Tech Tent, BBC World Service
  • This piece of $ 30 Electronics Can Unlock Your Keyless Entry Car Aaron Mamiit, Tech Times
  • This $ 30 device defeats almost any keyless car or garage door Steve Dent, Engadget
  • Hackers Might Help Defending Tesla's High-Tech Cars Vlad Tverdohleb, Itechpost
  • DEF CON focuses on vehicle security and beyond in wake of Jeep hack Heidi Hoopes, Gizmag.com
  • Hackers Take Control of a Tesla, Sort Of Danny Yadron, Wall Street Journal
  • Tesla's Model S hack still proves it's better than other car makers Devindra Hardawar, Engadget

DEF CON Badge

  • Is this the most puzzling DEF CON attendee badge yet on record? Neil McAllister, The Register
  • Uber badges, coveted by hackers, glow radioactive at Def Con The Japan Times
  • Badge Challenge Writeup Elgin
  • All the unofficial electronic badges of DEF CON Mike Szczys
  • The man making puzzles for hackers Mark Ward, BBC News
  • DEF CON 23 Badge Challenge PotatoHat Security Blog

Clickjacking

  • Kaminsky Creates Clickjacking-Killer Kelly Jackson Higgins, Dark Reading

Crypto

  • DefCon ProxyHam Talk Disappears but Technology is No Secret Sean Michael Kerner, eWeek
  • Why Did A Security Firm Mysteriously Ditch a 'Privacy' Product? Yael Grauer, Forbes Tech

CTF

  • DEF CON Coverage Cyberfed YT Channel
  • How to Prepare Your Team for a CTF Competition, DEF CON Style OnWebSecurity Blog
  • CS Student Duo Brings Victory in International Hacking Competition Tyler Sharp, cc.gatech.edu
  • Korean team wins top prize at 'Hackers World Cup' for first time Donga.com
  • DEF CON 2015 CTF Finals Cybersmashup
  • DEFKOR CTF Win Writeup (Korean) Daum.net

Cyber Grand Challenge

  • DEF CON 23: Attention, les robots-hackers vont débarquer Gilbert Kallenborn, 01net.com
  • Hackers to Military: Replace Us with Robots? HA! Patrick Tucker, DefenseOne

DEF CON Shoot

  • A journey into DEF CON country Mark Ward, BBC
  • Shoot Badge Overview 533ess

Disclosure

  • DEF CON 23: Two major roadblocks to cyber diplomacy, says former US diplomat Warwick Ashford, ComputerWeekly.com

Drones

  • Drone at DEF CON Hacks from the Sky Kelsey Atherton, Popular Science
  • Aerial Assault Drone, the new Hacking Weapon presented at the Defcon Pierlugi Paganini, Security Affairs
  • Someone at DEF CON Made a Drone That Hacks Computers Patrick Tucker, DefenseOne

Internet of Things

  • Why 'Smart' Objects May be a Dumb Idea Zeynep Tufekci, The New York Times
  • DEF CON 23 “How To Train Your RFID Hacking Tools” Preview Craig Young, Tripwire Blog
  • Iranian hackers broke into what they thought was a Chevron gas pump — but it was a honeypot Kashmir Hill, Fusion
  • DEF CON 23 to host Internet of Things slaughterfest Darren Pauli, The Register
  • Hackers can steal Gmail passwords from Samsung “smart” refrigerators Jennifer Abel, Consumer Affairs

Interviews

  • 20 Minutes with the Dark Tangent Kelly Jackson Higgins, Dark Reading
  • Black Hat, DEF CON Founder Offers Insights Into Security Shows, Trends Chris Preimesberger, eWeek
  • DEF CON Interview: John McAfee Gr3ynoise Podcast
  • DEF CON Interview: Cooper Quintin Gr3ynoise Podcast
  • DEF CON Interview: Josh Pitts Gr3ynoise Podcast
  • DEF CON Interview: Nikhil Mittal Gr3ynoise Podcast
  • DEF CON Interview: Kelley Misata Gr3ynoise Podcast
  • Facebook security chief Alex Stamos' ambitious plan to connect the world—securely Robert Hackett, Fortune

Kali Linux

  • Kali Linux 2.0 to launch at DEF CON 23Darren Pauli, The Register

Mobile

  • Chinese Unicorn Team Hacks GPS at DefCon Sean Michael Kerner, eWeek
  • Stagefright: Everything you need to know about Google's Android megabug Robert Hackett, Fortune
  • DEF CON 23: Digital certificates key to mobile security, says researcher Warwick Ashford, ComputerWeekly.com

Overview

  • Imploding Barrels and Other Highlights from Hackfest DEF CON Kim Zetter, Wired
  • Paranoia Made Me a Better Computer User Adam Clark Estes, Gizmodo
  • 10 scary hacks from Black Hat and DEF CON Lucian Constantin, Computerworld
  • DEF CON 2015 Fr, Robert Ballecer, TWit/Coding 101
  • Hackers share intelligence and compete in Las Vegas David Grossman, BBC Newsnight
  • Hackers and Feds Clash in Las Vegas Luke Rudkowski, WeAreChange
  • TekThing 32 Patrick Norton, Shannon Morse, TekThing
  • News from DEF CON 23: fake deaths, DHS and Tesla court hackers Violet Blue, ZDNet
  • What's the Top Story at This Year's DEF CON? Emily Chang, BloombergBusiness
  • Bugcrowd podcast Bugcrowd
  • Want to be Totally Secure on the Internet? Good Luck. Laura Hautala, CNet
  • A Million Ways to Break In at the World's Largest Security Gathering Laura Hautala, CNet
  • Heists go Hollywood with DEF CON Hacks Glenn Chapman, Phys.org
  • Abandon All Hope, Ye Who Log On Here Joe Bernstein, BuzzFeed
  • A look inside the hostile, helpful world of hacking conventions Amanda Schupak, CBS News
  • Meet the World's Most Dangerous Geeks Dan Tynan, Yahoo! Tech
  • Hacking Tesla, Breaking Banks and Killing People Online: The Best of DEF CON 2015 Jeff Stone, IBT Pulse
  • Cybersecurity: Viva Lessons from Las Vegas Steve Weisman, USA Today
  • When Fear of Being Hacked Takes Hold Lily Hay Newman, Slate
  • Surviving the DEF CON Hacker Conference Roberto Baldwin, Engadget
  • What I Learned at DEF CON Nathan White, AccessNow Blog
  • VITB Podcast: DEF CON 23 Recap Vince, Vince in the Bay Podcast
  • Post DEF CON Depression Gr3ynoise Podcast
  • Six Scary Revelations from 2015 DEF CON Hacker Conference Clint Davis, ABCActionNews.com
  • Salted Hash: Live from DEF CON 23 Steve Regan, CSOOnline.com
  • Skateboards, Drones and Your Brain, Everything Got Hacked Alex Hern, The Guardian

Physical Security

  • DEF CON Hackers Tell How They Cracked a Brinks Safe in 60 Seconds Sean Kerner, eWeek
  • Fiber Optic Tapping - Tapping Setup Josh Ruppe, DC23 Demo Labs

Politics

  • A Congressman Goes to DEF CON Patrick Turner, DefenseOne
  • Death to DRM Iain Thompson, The Register

Queercon

  • Let’s hack Grindr! Queercon helps diversify tech field Wesley Juhl, Washington Blade

Robocalls

  • RoboKiller wins FTC prize by annihilating robocalls Sean Gallagher, ArsTechnica
  • FTC to Use DEF CON Event to Strike Back Against Robocalls Sean Michael Kerner, eWeek
  • Why the FTC is Showing Up at Hackers' Biggest Conferences Andrea Peterson, Washington Post

Rootz

  • Children of DEF CON Roberto Baldwin, Engadget

Rumor Department

  • DEF CON is Cancelled, Again Jordan Pearson, Motherboard

SCADA

  • Breaking critical infrastructure in a quest for solutions Blake Sobczak, eenews.net
  • Physical Damage: SCADA Attacks Easily Theorized, Hard to Execute Owen Lystrup, OpenDNS Blog
  • How to Damage a Chemical Plant Over the Internet Tom Simonite, MIT Technology Review

Social Engineering

  • DEF CON Hacker Details How to Forge Death, Birth Records Online Sean Michael Kerner, eWeek
  • How this hacker can virtually kill you and what to do about it Sara Sorcher, Christian Science Monitor
  • Yes You Can Help Me Today: Social Engineering at DEF CON 23 OpenDNS Blog
  • DEF CON Social Engineering CTF Recap Brett DeWall, DeWall on Security
  • Hackers now using conversation skills to get your info FoxNews.com
  • Chris Hadnagy on the DEF CON Hackers Posing as Your Co-workers Joe Uchill, Christian Science Monitor
  • Birth Then Kill a Virtual Baby for Fun But Mostly Profit Roberto Baldwin, Engadget
  • It's Incredibly Easy to Bump Someone Off Online Iain Thomson, The Register

DEF CON 22

Airplane Hacking

sc magazine logo

the register logo

heise logo

decrytped tech logo

image description

Blackphone

description

techie news logo

fierce it logo

delhi daily news logo

computerbase logo

image description

Car Hacking

computerworld logo

reuters logo

reuters logo

Cnet logo

wall street journal logo

the motor report logo

Tom's Guide logo

venture beat logo

image description

Crypto

boingboing logo

Tom's Guide logo

golem logo

image description

DEF CON General

wired logo

forbes logo

zdnet logo

venture beat logo

motherboard logo

zdnet logo

washington post logo

01net logo

venture beat logo

ars technica logo

time logo

venture beat logo

wired logo

time logo

financial times logo

description

time logo

scmag logo

the register logo

decrypted tech logo

politico logo

krebs logo

toms guide logo

forbes logo

register logo

dark reading logo

image description

Email Hacking

01net logo

Tom's Guide logo

the register logo

time logo

Cnet logo

image description

Hacking Politics

description

duo security logo

sc magazine logo

it world logo

image description

Hacking the Internet of Things

smart data collective logo

decrytped tech logo

spiegel logo

forbes logo

beware of the thing sign

Physical Security

cso online logo

decrypted tech logo

venture beat logo

image description

Privacy

ars technica logo

la times logo

the register logo

tomsguide logo

venture beat logo

esecurity planet logo

forbes logo

reuters logo

wall street journal logo

bbc logo

cone of silence

SOHOpelessly Broken

arstechnica logo

fierce cio logo

lmi logo

v3.co.uk logo

herald online logo

vpn creative logo

recombu

image description

War Kitteh

wired logo

inquisitr logo

the register logo

chinabyte logo

gulli logo

war kitteh

Zapping Rachel

time logo

venturebeat logo

pc mag logo

network world logo

war kitteh

DEF CON 21

General

  • 5 Tips for surviving DEF CON 21 - C/NET
  • 5 scariest cybersecurity threats at Black Hat, Defcon - CBS
  • The five scariest hacks we saw last week - CNN
  • Def Con 21: Hacks, Cracks und Edward Snowden - Computer Bild
  • Black Hat, DEF CON Put Spotlight on Major Security Issues, Hacks - eWeek
  • Hackers take over Las Vegas - FoxNews
  • Democratizing the creep factor: Anyone can play NSA, "Ocean's 11″ and cyberstalker - Gigaom
  • How to tell DEF CON and Black Hat Apart - Gigaom
  • False sense of security: Your TV, car, neighborhood may be hackable - Gizmag
  • Don't get pwned at Black Hat, DEF CON - Help Net Security
  • DEF CON: Hacking for the Rest of Us - Huffington Post
  • Al via Defcon: quando gli hacker esplorano i limiti della sicurezza informatica ("At the start Defcon: when hackers explore the limits of computer security") - Il Sole 24 Or
  • Black Hat / Def Con 2013 - Zataz
  • A DEF CON postscript: Said the FBI agent to the taxi driver - ZDNet
  • DEF CON 21 in Pictures - ZDNet
  • DEF CON 21: Best in Show - ZDNet
  • Postcards from DEF CON 21 - ZDNet
  • Tech Week That Was: Suspicious Searches, Def Con And Moto X - NPR
  • What We're Watching As World's Big Hackers Meet In Las Vegas - NPR
  • At Def Con, hackers join together to 'hack everything' - NPR/Marketplace
  • An Inside Look At The Hacker Conferences - NPR/WGBH
  • How Not to Get Hacked at Black Hat and DefCon - PCMagazine
  • Surveillance drones and Uncle Sam: Hackers take on all at DefCon 21 - RT
  • Slideshow: August 2013 threat stats - SC Magazine
  • What Happens At DefCon Stays With Us All - TechCrunch
  • Hack the mini bar, spot the feds, DEF CON is back - The Conversation
  • Hackers gather—and mourn a big loss - The Economist
  • The best of Black Hat and Def Con 2013 - The Verge
  • The top 10 new reasons to be afraid of hackers - The Verge
  • Tin tặc thế giới hội tụ ở Las Vegas ("Hackers world converged in Las Vegas") - tienphong online
  • DEFCON 21: THINGS YOU MAY HAVE MISSED - Tripwire
  • Def Con, Day One: Can I Use Your Wi-Fi Please? - Vice
  • Def Con, Day Two: Def Con Is for Winners - Vice
  • How To Get Hacked At Defcon - Vice

Car Hacking

  • Car hacking code released at Defcon - C/NET
  • White hat hackers to release software used to crack critical car systems at Def Con - Afterdawn
  • Hackers Offer Advice To Automakers On How To Prevent Attacks - AOL
  • Hackers break into cars, steer them with old game controllers - Calgary Herald
  • Wireless Car Hacking Demonstrated in New Video - Carscoops
  • Sleuths To Demo Car Hack Gone Steer-Crazy - CIO Today
  • Hackers Control Car's Steering And Brakes - CNN Money
  • Hackers hijack software in a CAR and remotely control the steering, brakes and horn using a laptop - Daily Mail UK
  • Car Hackers Release Tools - Dark Reading
  • Networked Cars Are Coming, But Their Hacks Are Already Here - Discover
  • Car Hacking: Here's Code, Have at It - EETimes
  • TI Illustrates Car Security Threats - EETimes
  • Automotive takeover schemes to be detailed at Defcon hacker conference - Engadget
  • Hackers Reveal Nasty New Car Attacks--With Me Behind The Wheel (Video) - Forbes
  • Hackers plan to offer blueprint for taking over Prius, Escape - FoxNews
  • Cisco's remedy for connected car security: Treat the car like an enterprise - Gigaom
  • DEFCON: Hackeando autos y vehículos no tripulados ("DEFCON: Hacking cars and unmanned vehicles") - el semanario
  • Researchers reveal methods behind car hack at Defcon - IDG/Techworld
  • DEF CON:黑客公布入侵汽车工具 ("DEF CON: Hackers publish invasion Automotive ") - China Byte
  • Hacker safety risk for new cars - Motoring
  • Tools, code to control Ford and Toyota test cars released - SC Magazine
  • DefCon car hacking talk will detail how an outsider can "physically control" the vehicle - SCMagazine
  • Defcon 21 : des explications sur le piratage de voitures ("Defcon 21: explanation of piracy Car") - IDG/Lemonde Informatique
  • Hackers to detail methods used to overtake Prius, Escape at Def Con - TechSpot
  • Duo hacks cars with '80s Nintendo controller - The Vancouver Sun
  • Hackers Hijack Prius with Mac Laptop - Tom's Guide
  • Defcon hackers release Ford and Toyota car hijack data - v3.co.uk
  • How driverless cars will be wide open to hacking - VentureBeat
  • How Easily Can a Moving Car Be Hacked? - Vice
  • Defcon to deliver auto industry wake-up call - Japan Times/AFP JIJI
  • Software experts attack cars, to release code as hackers meet - Reuters
  • Hackers 'take control' of Toyota Prius - Telegraph UK
  • Here's how hackers could crash your car - The Washington Post

Lock Security/Sport

  • 'Do Not Duplicate' Means Nothing to the MIT Students Replicating High-Security Keys with a 3D Printer - BostInno
  • No cameras! MIT students 3D print 'high security' keys — all they need is a photo - Boston.Com
  • DEF CON Reminds Us of the Importance of Physical Security - eWeek
  • US students plan to release program that will copy high-security keys - Metro
  • Picking Locks and Hacking Servers at Defcon - The New York Times
  • Why Are We Still Using Keys? - Vice
  • Millions of Kwikset Smartkey Locks Vulnerable to Hacking, Say Researchers - Wired

Bitcoin

  • Raspberry Pi-powered briefcase converts loose change into bitcoin - CoinDesk
  • Bitcoin Suitcase Converts Spare Change Into Digital - PSFK
  • Bitcoin suitcase eats your pocket change, spits out digital currency - The Verge

Rootz Kidcon

  • DEF CON Kids To Get Badges That Hack - Dark Reading
  • At Def Con, Kids Can Hack Too - The Wall Street Journal

Legal/Civil Rights

  • ACLU at DEF CON 21! - ACLU Blog
  • Even with EFF's Congressphone, activism is a hard sell - C/NET
  • What Security Researchers Need to Know About the Law - eWeek
  • NSA And Aaron Swartz Hot Topics At Hacking Conferences - NPR/WBUR

Feds

  • Relatie NSA en 'goede' hackers sterk bekoeld ("Relationship NSA and "good" hackers strongly cooled") - AutomatiseringGids
  • At hacker conferences, government surveillance takes center stage - CBS
  • Gov't surveillance overshadows hacker conferences - CBS
  • Leaker Snowden riles hacker conferences - CNBC
  • Defcon founder's message to feds fair to some, hypocritical to others - Computerworld
  • FBI turning to private sector to hack phones, exploit unknown security holes - Engadget
  • Hackers Just Banned the Feds from Attending DEF CON This Year - Gizmodo India
  • Agenten bitte draußen bleiben! ("agents please stay out!") - Golem
  • Defcon no dejará entrar a los federales a la conferencia de hackers ("Defcon not the feds will let the hacker conference") - Fayerwayer
  • DefCon Hacker Conference to Feds: 'We Need Some Time Apart' - Mashable
  • FBI Spies on Suspected Criminals by Hacking Into Computers - Mashable
  • NSA at Defcon? More like No Spooks Allowed - NBC
  • There May Be Some Feds at Defcon After All - Nextgov (blog)
  • Hackere kaster ut FBI ("Hackers throw out FBI") - NRK
  • Ex-CIA official to address government-wary hackers - Reuters
  • NSA revelations could hurt collaboration with 'betrayed' hackers - Reuters
  • Feds asked not to attend Def Con hacker meeting over NSA scandal - RT
  • DefCon: Former DHS cyber official to private sector: Gov't can't help you with intelligence - SCMagazine
  • At a Hacker Conference, Plenty of Friendly Federal Agents - The New York Times
  • Security bods boycott DEF CON over closed door for feds - The Register
  • After Snowden leaks, feds lose their hacker cred at Def Con - The Verge
  • Def Con founder asks feds to skip hacker conference, citing high tensions after NSA leaks - The Verge
  • FBI Taps Hacker Tactics to Spy on Suspects - The Wall Street Journal
  • Obama: Technologies Can Block Snooping - The Wall Street Journal
  • Where Hackers and Spooks Mingle - The Wall Street Journal
  • FBI Tor exploit appears on Metasploit penetration tester forum - v3.co.uk
  • The Big Def Con Question: Would You Work for the NSA? - Vice
  • The NSA Is Not Spying on You, Claims NSA Official at DefCon - Vice
  • Without Def Con, the Feds Have a Hacker Recruitment Problem - Vice
  • Правительство США впервые не пригласили на конференцию хакеров DefCon ("The U.S. government is not the first time invited to the DefCon hacker conference") - VZ.ru
  • NSA SPY SCANDAL SPARKS HACKER REBELLION - WND
  • NSA shows how to really screw up a PR campaign - VentureBeat
  • Hacker community Ripped by Surveillance scandal - spyghana.com
  • US Government War On Hackers Backfires: Now Top Hackers Won't Work With US Government - Techdirt

Smart Devices and Homes

  • Can your "smart TV" watch you? - CBS
  • Smart TV camera hack creates a window into your home - CBS
  • Samsung's Smart TV can spy on you - Channel 24
  • 'Smart homes' are vulnerable, say hackers - CNN
  • With the Rise of Malware, Your Dumb Home May Be Safer Than a Smart Home - Gotta Be Mobile
  • TVs to toilets: What will hackers target next? - MSN News
  • If you think cybercrime is scary now, just wait until hackers can control and monitor every object in your environment - Quartz
  • Consumer Device Hacking Concerns Getting Lost In Translation - Slashdot
  • How to Spy on Your Neighbors With a USB TV Tuner - Tom's Guide
  • Das Internet der gehackten Dinge ("The Internet of things chopped") - Zeit Online

Mobile Security/Malware

  • Can you hear me now? Yeah, hacked Verizon device can nab your texts and photos too - Computerworld
  • Femtocell hack reveals mobile phones' calls, texts and photos - CNN Money
  • Fake charger lets hackers infect iPhones - CBS
  • This Fake Charger Will Hide A Trojan In Your iPhone's Facebook App - Forbes
  • PIN-punching $ 200 robot can brute force every Android numeric screen-password in 19 hours - Boingboing
  • PIN-Punching Robot Can Crack Your Phone's Security Code In Less Than 24 Hours (Video) - Forbes
  • Russia home to text fraud 'cottage industry' - AFP/GloabalTimes
  • Russia home to text message fraud "cottage industry" - AFP/Phys . ORG
  • Anatomy Of A Russian Cybercrime Ecosystem Targeting Android - Dark Reading
  • DIY Total Information Awareness spying for cheap with CreepyDOL - Computerworld
  • 'Creepy' spy computer turns your real big brother into the NSA - Digital Trends
  • One Hacked Android User Can Lead To An Enterprise Breach - Dark Reading
  • Hacker's Tiny Spy Computers Aim To Track Targets Around Entire Neighborhoods And Cities - Forbes
  • One third of all mobile malware is produced by just 10 Russian companies - Gigaom
  • Android's One-Click Google Auth Is a Buffet for Hackers - Gizmodo
  • Disposable Spy Computers Are Disturbingly Easy And Cheap To Make - Gizmodo AU
  • Compromising Google Accounts and enterprises via flaw in Android SSO - Help Net Security
  • Researchers create DIY IDS for identifying hacked smartphones - Help Net Security
  • Android Malware Will Hit One Million Mark in 2013 - IBTimes
  • Android one-click Google authentication method puts users, businesses at risk - IDG/Computerworld
  • Android One-Click Google Apps Access Cracked - InformationWeek
  • Hackers Convert Verizon Device Into Mobile Spy Stations - Mashable
  • Operation 'Dragon Lady' Uncovers Huge Russian Android SMS Fraud Network - Mashable
  • Malware-as-a-service blossoms in Russia, vendor research finds - Network World
  • Def Con conference: Android phone bug allows hackers to read texts and email - New York Daily News
  • How hackers tapped into my cellphone for less than $ 300 - NPR
  • Hack this: Researchers turn Verizon device into 'mobile spy station' - RT
  • Creativity in the cloud and traps of Russian malware - Russia Beyond the Headlines
  • Android hack opens access to users' email - T3
  • DEF CON: 30 Percent Of Mobile Malware Made By 10 Russian Firms - Techweek Europe
  • 3D-printed 'Robotic Button Basher' cracks phones' PINs using persistence, luck - The Independent
  • A Cheap Spying Tool With a High Creepy Factor - The New York Times
  • Earn £8,000 a MONTH with bogus apps from Russian malware factories - The Register
  • Android mobile frauds: Russian malware leads - The Times of India/AFP
  • Inexpensive Cellular IDS Allows for Inspection of Cell Traffic - Threatpost
  • Researchers Hack Verizon Device, Turn it Into Mobile Spy Station - Voice of America
  • Researchers Develop DIY System to Detect Malware on Mobile Phones - Wired

Badge/Badge Challenge

  • Gutting and solving the heart of the cards at Def Con 21 - C/NET
  • Hidden Circuits and Handmade Clockwork: The Striking Intricacies of Def Con Badges - Wired

Will Smith

  • Will Smith makes unexpected appearance at Defcon hacker conference - IDG/TechHive
  • Actor Will Smith Hangs Out With Hackers - Infopackets
  • Will Smith hace aparición sorpresa en la conferencia de hackers Defcon - PYSN Noticias
  • Will Smith faz aparição inesperada na conferência hacker Defcon - IDG Now

Social Engineering

  • Dating guru resurrects Robin Sage by social engineering TS/SCI holders on LinkedIn - CSO
  • DEF CON attendees demonstrate social engineering prowess in CTF contest - CSO
  • How to avoid a social engineering attack at Black Hat and Def Con - CSO
  • Hacking people - ITWeb
  • Dating coach 'hacks people' to find sensitive defence secrets - News.com.au
  • Dating coach shows how to get classified military intel using social engineering - The Verge

EFF Crypto Shirt

  • Decrypting EFF's DEFCON crypto-challenge tee - Boingboing
  • Can You Solve the Encryption Puzzle In the EFF's Def Con T-Shirt? (Updated) - Gizmodo

Documentary

  • DEFCON: A Documentary About the World's Largest Hacking Conference - Gizmodo
  • DEFCON: The Documentary, a record of the 20th annual conference - Metafilter
  • Hacker-Doku online: "Defcon: The Documentary" - Zeit Online
  • Watch this: 'Def Con: The Documentary' covers two decades of a giant hacker meetup - The Verge

IPV6

  • Researchers release tool to pickup the SLAAC in Man-In-The-Middle attacks using IPv6 - CSO
  • Easy-to-use attack exploits IPv6 traffic on IPv4 networks - GCN
  • DEFCON: Ataques al protocolo IPv6 ("DEFCON: Attacks to IPv6") - el semanario

Facebook

  • What is Facebook doing at a hacker convention in Vegas? - The Verge
  • Facebook Makes Friends With Hackers - The Wall Street Journal

Wireless

  • Wi-Fi routers: More security risks than ever - C/NET
  • WiFi Pineapple Penetration-Testing Tool Sparks Interest at DEF CON - eWeek
  • The WiFi Pineapple makes it easy to hack wireless devices - FierceCIO

Misc

  • U of C prof heads to hackers' conference in Vegas - Calgary Herald
  • 10 Sci-Fi Hacks That Are Now a Reality - Huffington Post
  • Researchers demo new IPv6 attack against Windows 8 PCs - ComputerWorldUK/Techworld
  • Criminal minds in the channel - CRN
  • Def Con 'Crack Me if You Can' Contest Picks Apart Passwords - eWeek
  • 5 Top Targets for Today's Hackers - Forbes
  • The Type Of People Who Get Suckered By A Twitter Bot - Forbes
  • Wall Of Sheep Hacker Group Exposes NFC's Risks At Def Con 2013 - Forbes
  • Researcher builds botnet-powered distributed file storage system using JavaScript - IDG/Javaworld
  • Le botnet utilisé pour le stockage de fichier ("The botnet used for file storage") - ICT Journal
  • Q+A: Ralph 'The Ethical Hacker' Echemendia talks Snowden, Feds and DefCon - Las Vegas Sun
  • HOW DOES A VEGAS CASINO STAY SAFE DURING DEF CON? - Las Vegas Weekly
  • McAfee CTO Expected to Join Department of Homeland Security - Law.com
  • Defcon 21 : l'accès simplifié aux services Google pointé du doigt ("Defcon 21: simplified access to Google services fingered") - Lemonde Informatique
  • The 26-Year-Old Montana Legislator Fighting for Your Online Privacy - Mashable
  • DEF CON 21大会 那些跌破眼球的创意 ("DEF CON 21 meeting those below the eye of the creative") - Zol . COM . cn
  • 图片报道:全球最大黑客大会DEF CON 21 ("Photo Report: the world's largest hacker conference DEF CON 21") - Enet . com . cn
  • Forensic Experts Poke Holes in Snapchat and Facebook - Mashable
  • Def Con und Black Hat: Hacker und Geheimdienste treffen sich in Las Vegas - Netzpolitik
  • DEF CON Hackers Unveil a New Way of Visualizing Web Vulnerabilities - Slashdot
  • How should you protect yourself from cyber surveillance? - The Guardian
  • How should you protect yourself from cyber surveillance? - Raw Story
  • Convenient Google WebLogin Tokens Can Expose User Accounts, Data - Threatpost
  • Why making 'consent' the center of privacy law is important - VentureBeat

DEF CON 20

Keynote

  • NSA Boss Wants More Control Over the Net - Technology Review
  • U.S. Spy Chief Asks Hackers to Help Government Secure Internet - Reuters
  • NSA Chief: 'Internet at Great Risk, Needs Defense System' - MSNBC
  • NSA Chief Tells Hackers His Agency Doesn't Create Dossiers on All Americans - Wired

Badge News

  • Badges Meld Heiroglyphs, Circuitry and Cryptography for Hacker Scavenger Hunt - Engadget

Aviation

  • Next-Gen Air Traffic Control Vulnerable To Hackers Spoofing Planes Out Of Thin Air - Forbes.com
  • Curious hackers inject ghost airplanes into radar, track celebrities' flights - Computer World

SCADA

  • Power Plant Hack Talk, Free Tools Pulled From Def Con Lineup - Dark Reading

The Cloud

  • Researchers To Launch New Tools For Search Engine Hacking - Dark Reading

Consumer Protection

  • Hacker Delves into Secret World of Warranties - CNet

Event Reviews

  • Day One of DEF CON 20 - Computer World
  • DEFCON 20 Roundup: Lessons in Security - PC World
  • DEF CON Hackers Go Mainstream But Still Love to Party - MSNBC
  • Defcon Vending Room Showcases Tech of All Ages - CNet

Routers

  • Critical Vulnerabilities in Huawei Routers Laid Bare at DEF CON Tech Spot
  • Persistent Router Botnets on the Horizon, Researcher Says at DEF CON - IT World
  • Expert: Huawei Routers are Riddled with Vulnerabilities

VPN Security

  • Tools Released at Defcon Can Crack Widely Used PPTP Encryption - PC World
  • New Tool From Moxie Marlinspike Cracks Some Crypto Password - Wired
  • Defcon Wi-Fi Hack Called No Threat to Enterprise WLANs - Network World

Physical Security

  • Kids Can Open Gun Safes With Straws and Paper Clips, Researchers Say - Wired
  • Kid Opens a Gun Safe Just by Jostling It Around - Gizmodo

The Singularity

  • Hacking Humanity: Human Augmentation on the Horizon - Network World
  • Cell Phone Battery Catches Fire, Burns Hacker's Tail at DEF CON - CNet

DEF CON Kids

  • DEF CON Kids: Hacking Roller Coasters and the Power Grid with Cell Phones - Network World
  • Gold Medal For Hacking? CyFi Should Win It - Huffington Post
  • DEFCON Kids Returns, Now With 0-Day - Wired
  • Notes from DEFCON and DEFCON Kids - BoingBoing
  • 10-year old Girl Scout Owns Slow Game - BoingBoing
  • 10-Year-Old Presents App Exploit at DefCon - PC Mag

NinjaTel

  • Defcon 20 Visitors Get Their Own 'Pirate' Cellular Network in Ninja Tel, Exclusive One V to Match - Engadget
  • A Phone Network Just for Hackers - WSJ.com
  • Meet Ninja Tel, DEF CON's Van-powered Pirate Cellphone Network - The Verge

Social Engineering

  • How a Lying 'Social Engineer' Hacked Wal-Mart - CNN Money
  • Rick Lax Tries Gaming the Gamers at DEFCON - Las Vegas Weekly
  • Social Engineer Hacks Wal-Mart from Defcon - BoingBoing

Movie Night

  • Hacking Vegas: 'MIT Mike' Aponte, Professional Blackjack Instructor, Teaches You to Count Cards - The Verge

DEF CON 19

General

  • When Hackers Become The Man - CNet
  • Wit and lethality: Preview of DEFCON 2011 - TechRepublic
  • DEFCON 19 - 2011 – Overview of the Conference - Global Security Mag
  • Lessons from Black Hat & Defcon 19 - It's Easier to be the Bad Guy - HP Community Blog
  • Picking Locks and Hacking Servers at Defcon - NY Times
  • Jailbreak Experts Comex, Geohot And Many More Spotted Together At DEFCON Party - Appadvice
  • Deb does DEFCON: Hacking conference tackles cyberwar and civil liberties - TechRepublic

Mobile Devices

  • Android could allow mobile ad or phishing pop-ups - CNet News
  • DefCon Dings Reveal Google Product Security Risks - Gizmodo
  • Vulnerability Found In Android That Allows For Phishing Scams and Pop-up Ads - Phandroid.com
  • Mobiles become emergency data network - BBC

Feds

  • At a Hacker Conference, Plenty of Friendly Federal Agents - NY Times

Facebook

  • Facebook Offers Cash To 'Bug Bounty Hunters' At DefCon Hacker Conference - Huffington Post

CDMA Phone Hack

  • CDMA and 4G Connections Compromised At DefCon 19? - TechCrunch
  • DEF CON 19 - hackers get hacked! - Full Disclosure

UAV/Aerial Hacking

  • WASP: The Linux-powered flying spy drone that cracks Wi-Fi & GSM networks - Geek.com
  • DIY aerial drone monitors Wi-Fi, GSM networks - The Register
  • Do-It-Yourself Hacker Drone Highlight of Hacker Conference - International Business Times
  • Build Your Own Camera, Launch It Like a Grenade - PCWorld
  • Geek hacks flare gun into wireless camera drone shooter - Slash Gear

Anonymous/LulzSec

  • Building A Better 'Anonymous'? - Information Week
  • Is LulzSec's Leader at DefCon? - PC Magazine
  • In Search of Anonymous: Down and Out in the Digital Age - Deliberately Considered (blog)
  • Search of Anonymous: Down and Out in the Digital Age Pt II - Deliberately Considered (blog)
  • Infosec Island's Scot Terban Replaces Aaron Barr at DEFCON - Infosec Island
  • Defcon panel: Anonymous is here. LulzSec is here. They're everywhere - Venture Beat
  • Hackers debate 'Anonymous' tactics at DefCon gathering - Agence France-Presse
  • Five Questions About Aaron Barr's DEFCON (by Aaron Barr) - Threatpost

DEF CON Kids

  • DEF CON Opens Its Doors To Pre-Teen And Teen Hackers - Washington Post
  • 10-Year-Old Hacker Finds Flaws in Video Games - Fox News
  • Tween Hacker's Time-Travel Trick - Dark Reading
  • 10-Year-Old Outs Security Flaw in iOS and Android Games - PCWorld
  • DefCon 19: 10-year-old code cracker reveals zero-day smartphone gaming security flaw - Infosecurity.com

Steven Levy

  • Author Steven Levy tells young hackers about their religion - DevBeat

Mikko Hypponen

  • Viruses: Destroying your systems for 25 years - CNet

Wall of Sheep

  • Charging Stations May be 'Juice-Jacking' Data from Your Cellphone - PCWorld

Marc Weber Tobias

  • Defcon Lockpickers Open Card-And-Code Government Locks In Seconds - Forbes
  • Wire pops lock certified for US defense facilities - AFP
  • Hackable High-Tech Locks Pose National Security Risks - Security News Daily

Hacking Through Power Lines

  • Hacking Home Automation Systems Through Your Power Lines - Wired Threat Level Blog
  • Def Con 19: Expert hacks X10 home-automation system - Consumer Reports

Social Engineering

  • Defcon Hacking Contest Targets Big Corporations (VIDEO) - Huffington Post

Moxie Marlinspike

  • DEFCON 2011: SSL and the future of authenticity - Naked Security Blog (Sophos)

CTF

  • European Nopsled Team win DEFCON 19 CTF - blog.satori.com

DEF CON 18

General

  • The hackers life – my weekend at Defcon - National Geographic Assignment Blog
  • Governments Battle to Stay Ahead of Threats on Internet, 'The Great Leveler' - PBS News Hour
  • Hackers Convene At Def Con 18 - NPR
  • Hackers With Enigmatic Motives Vex Companies - New York Times
  • Hacker Wonderland: DefCon 18 in Photos - Wired Threat Level Blog
  • Seven dangerous new computer hacks (and one silly one) that will change the future - io9
  • Hackers to flock to Black Hat, Defcon this week - CNet
  • Conference Wrap-Up: Apple, Google, BP And Others Spill Sensitive Data On The Phone - Forbes: The Firewall
  • Hackers turned gatekeepers: Digital vigilantes with a moral code - The Independent
  • Hackapalooza: ATM Spews Cash, Android App Swipes User Data, Digital Game Badges Battle - Fast Company
  • A tale of two conferences: Black Hat and Defcon photo gallery - Venture Beat
  • Takeaways from Black Hat and DEF CON - CNet: Reporter's Roundtable - ep 43
  • DEFCON 18 - Hurricane Labs

GSM Base Station

  • Week in review: Hacker intercepts phone calls, Facebook buys 18 patents - Reuters
  • Cell Phone Snooping: Cheaper And Easier Than Ever - Forbes
  • Hacker Spoofs Cell Phone Tower to Intercept Calls - Wired - Threat Level
  • Researcher Intercepts GSM Cell Phones During Defcon Demo - Dark Reading
  • FCC Concerned Over DefCon Mobile Hacking Talk - PC World

Social Engineering

  • Smooth-talking hackers test hi-tech titans' skills - Google News
  • Contest finds workers at big firms handing data to hackers - CNet News
  • FBI sought data on Defcon 'social engineering' contest - Computer World
  • How to Steal Corporate Secrets in 20 Minutes: Ask - PC World
  • Social Engineers Successfully Gather Info - Dark Reading
  • Tech Insight: Building The Right Defense Against Social Engineering - Dark Reading
  • Cyber 'capture the flag' contest will premiere at DefCon - Federal News Radio

Badges

  • A Defcon badge unlike anything you have ever seen - CIO
  • This year's Defcon badge has a persistent display - Computer World
  • The Defcon Badge: Sleek, Stylish and Hackable - PC World
  • Exclusive Sneak Peek: DefCon Ninja Party Badge - Wired - Threat Level
  • DefCon Ninja Badges Let Hackers Do Battle - Slashdot

Google Malware

  • Google Has Two Times More Malware Than Bing, Yahoo, Twitter Combined - Dark Reading
  • Be Careful What You Search For - Information Week

WPA2

  • Wireless network security weakness to demo at DEFCON - The Register
  • AirTight Demonstrates WIPS Detection and Location Methodology for WPA2 'Hole196' Exploit Presented at Black Hat and DEF CON - Reuters

Other

  • Adobe to fix Reader hole unveiled at Black Hat - CNet News
  • Got an iPhone? There's an App for Hacking That - Technology Review
  • Hack attack hits ATM jackpots - Google News
  • Hackers to flock to Black Hat, Defcon this week - ZDNet
  • A Simple, But Effective, Way to Beat Internet Censorship - MIT Technology Review
  • How to Locate a Web User with a Few Clicks - MIT Technology Review
  • Warning Issued on Web Programming Interfaces - MIT Technology Review
  • Facebook's former top security officer says military and commercial cyber defense should be united - Social Beat
  • Software released for attacking Android phones - Reuters
  • Biometric and Other Locks Fail to Foil Hackers at DefCon - Wired - Threat Level
  • Researcher Reads RFID Tag From Hundreds Of Feet Away - Dark Reading
  • DEFCON 18 Quals: writeups collection - VN Security
  • DEFCON 18: LOCKS, LIES, AND VIDEOTAPE - The Sidebar
  • Black Hat USA 2010 and DEF CON 18 Wrap Up - It's Tactical
  • See you at the Rio in 2011 - WiFi WLAN Media Blog
  • [Defcon] You Spent All That Money And You Still Got Owned… - Catch 22 InSecurity
  • [Defcon] SHODAN for Penetration Testers - Catch 22 InSecurity
  • [Defcon] Hacking Oracle From Web Apps - Catch 22 InSecurity
  • [Defcon] Exploiting WebSphere Application Server's JSP Engine - Catch 22 InSecurity

Video Coverage

  • Behind the Firewall – episode 010: Defcon 18 - Hacker News Network
  • TDSSKiller: Stop Google Malware, iPad Charging Help, New Kindle, Defcon 18, Lapt - Tekzilla
  • DEFCON 18 - Hak5
  • DEFCON 18 registration line at Black Hat USA - Kingpin's YouTube
  • DC18 Badge Hack: DEFCON Super Rocker 18 Guitar - Kingpin's YouTube
  • DC18 Badge Hack: DEFCON + Ninja Badge Combo - Kingpin's YouTube
  • DC18 Badge Hack: Virus Propagation - Kingpin's YouTube
  • DC18 Badge Hack: Web-of-Trust - Kingpin's YouTube
  • DC18 Badge Hack: GoatBar UPC Barcode Writer/Emulator - Kingpin's YouTube
  • DC18 Badge Hack: Slot Machine - Kingpin's YouTube
  • DC18 Badge Hack: "You're Busted" Police Lights - Kingpin's YouTube
  • DC18 Badge Hack: Personal Oscilloscope - Kingpin's YouTube
  • DC18 Badge Hack: TV-B-Gone - Kingpin's YouTube
  • DC18 Badge Hack: Coffee/Drink Mixer - Kingpin's YouTube
  • DC18 Badge Hack: Paper Badge Display - Kingpin's YouTube
  • DC18 Badge Hack: XXX Interactive - Kingpin's YouTube
  • DC18 Badge Hack: Porn Theater - Kingpin's YouTube
  • DC18 Badge Hack: Boob-Ma-Tron - Kingpin's YouTube
  • DC18 Badge Hack: Flava Flav Badge - Kingpin's YouTube
  • Tom and Andrew talk about Defcon 18 - GFQ Network
  • Defcon 18 - Goon Pirates storm the Toool presentation - Kallahar's YouTube
  • Defcon 18 - Siviak gets a goon hug - Kallahar's YouTube
  • Defcon 18 - Police firearms trainer - Humphrey Cheung's Vimeo
  • Defcon 18 - Las Vegas Gringo Warrior Lockpick - Routergods' YouTube
  • w00tb0t-Gringo-Warrior-Defcon-18 w00tb0t's YouTube
  • More Retro Computing at Defcon 18 Tekarien's YouTube
  • Defcon18 encrypted wifi effffn's YouTube
  • Dan Kaminski... I don't care - idontcare296's YouTube

DEF CON 17

Access Control

  • Electronic High-Security Locks Easily Defeated at DefCon - WIRED -Threat Level
  • Open Sesame! Network Attack Literally Unlocks Doors - WIRED -Threat Level

Badge

  • Exclusive Peek Inside DEF CON's High-Tech Badge - WIRED -Threat Level
  • Hacking The DEF CON 17 Badges - WIRED -Threat Level
  • Photos: Defcon badge inspires hacks - CNET
  • Hacking the Defcon 2009 badge - NetworkWorld.TV (YouTube)
  • DEF CON 17: Early Badge Details - Hack a Day
  • The Hacker's Badge Of Honor - Forbes
  • Kingpin's Defcon 17 badge - MAKE
  • Hacking the Defcon badges - CNET News, InSecurity Complex

Browser Sniffing

  • A Browser's View of Your Computer - MIT Technology Review

Credit Hacking

  • DefCon: 'Credit Hackers' Win the Credit Card Game … Legally - WIRED -Threat Level

CSRF

  • cPanel, Netgear and Linksys susceptible to nasty attack - The Register

Fake ATM

  • Fake ATM doesn't last long at hacker meet - IDG News
  • Hackers spot fake ATM. Could you? - Internet News

Feds

  • Defense Department eyes hacker con for new recruits - IDG News
  • Hackers: Uncle Sam (still) wants you! - Internet News

Hacking Sleep

Espionage

  • Korean 'journalists' booted from Defcon - IDG News

IP Video Hijacking

  • Researchers Hack IP Video - Dark Reading
  • Researchers offer tools for eavesdropping and video hijacking - CNET News - InSecurity Complex
  • Security Camera Hack Conceals Heists Behind Dummy Video - WIRED -Threat Level
  • Surveillance camera hack swaps live feed with spoof video - The Register

Social Engineering

  • Defcon air traffic control hacker: Excuse me while I change your aircraft's flight plan - Venturebeat

Misc

  • Hack-Proofing The Hackers - Forbes

MMORPG Expolits

  • Hackers Game a Multiplayer World - MIT Technology Review

Mystery Challenge

  • DEF CON 17 Mystery Challenge - WIRED -Threat Level
  • Mystery Challenge - DEF CON 17 - Security Ripcord

NOC

  • Inside The World's Most Hostile Network - WIRED -Threat Level

Overview

  • At Black Hat and Defcon, hackers talk shop - CNET
  • Ax0n's DEF CON 17 Wrap-up - HIR Information Report
  • DEF CON 17 - The Pulse Review
  • Defcon 17 hacks into Vegas - Las Vegas Weekly
  • Defcon: What to leave at home and other do's and don'ts - CNET
  • Hacking, Lock-Picking, Booze and Bacon: DEF CON 17 In Review - WIRED -Threat Level
  • Hanging with hackers can make you paranoid - CNN

RFID

  • Feds at DefCon Alarmed After RFIDs Scanned - WIRED -Threat Level
  • Fed's RFIDiocy pwnd at DEF CON - ZDNet Blog

Social Networks

  • Twitter: More Secure Than You Think - Forbes

SSL Hijacking

  • Dan Kaminsky Feels a disturbance in The Internet - SemiAccurate
  • Hackers expose weakness in visiting trusted sites - Associated Press
  • Researcher Exposes Flaws In Certificate Authority Web Applications - Dark Reading
  • Secure Browsing Takes A Beating - Forbes

UAV

  • Boffins showcase do-it-yourself flying spy drone - The Register

Software Update MITM

  • Defcon: New Hack Hijacks Application Updates Via WiFi - Dark Reading
  • Software Updates Vulnerable To Hijacking - Information Week
  • Using Software Updates to Spread Malware - CBS News

DEF CON 16

Badges

  • Defcon badges kill TVs - The Inquirer
  • Exclusive Defcon 16 Badge Sneak Peek - Wired Threat Level Blog

BGP Exploit

  • Hackers hacked at infamous DefCon gathering - Yahoo News
  • Revealed: The Internet's Biggest Security Hole - Wired Threat Level Blog
  • More on BGP Attacks -- Updated - Wired Threat Level Blog
  • Researchers exploit web protocol to hijack traffic - ZDNet.co.uk

Captcha

  • Captchas are easily hackable - The Inquirer

Crackpots

  • Dozier Internet Law: Hackers Hack Away at DefCon Annual Convention - John W. Dozier Jr. Blog - Another take on DEF CON

CTF

  • Naval Postgraduate School Wins Hacking Contest - Dark Reading
  • [email protected]?!? - atlas wandering blog
  • DefCon CTF 2008 - Nice walkthrough of CTF Event

Encryption

  • Encrypting Your Hard Disk is Not Safe Anymore: New Vulnerability Affects Microsoft, Intel, HP and Others - Market Watch

UAT

  • UAT Delivers at DEF CON - Market Watch

iPhone

  • Defcon 16 -- iPhone Used to Hack Wireless Systems - TechTree India

Lock Picking

  • Researchers Crack Medeco High-Security Locks With Plastic Keys - Wired Threat Level Blog
  • Shrinky Dinks As a Threat To National Security - Slashdot
  • Cracking high-security locks is child's play: experts - AFP
  • DEF CON 16: Plastic Keys; and JennaLynn Does it Again! - inSecurity.org - Marc Weber Tobias

MBTA vs. MIT

  • Agency sues to stop Defcon speakers from revealing gaping holes - The Register
  • Mass. transit authority flaw disclosure: A student speaks up - Computer World
  • MIT Students: 'T' Card System Easily Hacked - The Boston Channel
  • Federal judge halts Defcon talk on subway card hacking - The Register
  • Judge orders halt to Defcon speech on subway card hacking - Cnet News
  • Federal Judge in DefCon Case Equates Speech with Hacking - Wired Threat Level Blog
  • Judge orders halt to Defcon speech on subway card hacking - CNET News
  • Students blocked from presenting paper on security flaws in subway fare cards - USA Today Blog
  • MIT Coders' Free Speech At Stake - EFF.org
  • MBTA Makes A Mistake, Details On MIT Hack Released To Public - Chattahbox
  • Computer Scientists Ask Court to Reconsider Gag Order in DefCon Case - Wired Threat Level Blog
  • Boston Subway Hack Debate Intensifies - PC World
  • Judge lifts gag order on subway security hack - OUT-LAW News
  • Gag order lifted for students who hacked subway card - The Register
  • Judge Lifts MIT Subway Hack Gag Order - PC Magazine
  • Judge lifts fare card hack gag order, punts on 1st Amendment - Ars Technica
  • Exclusive Interview with MIT Subway Hacker Zack Anderson - Popular Mechanics
  • 3 takeaways from security-flaw legal flap between MBTA, MIT students - Computer World

Mystery Challenge

  • The DefCon 16 Mystery Challenge - Wired Threat Level Blog
  • Mystery Box Challenge - Day One - Security Ripcord

NOC

  • A First Ever Look Inside The Defcon Network Operations Center - Wired Threat Level Blog

Overview

  • DEF CON Conference - Best of the Web Buzz Blog
  • Defcon opens with a bang, contests, and intrigue - Cnet News
  • Defcon ends with researchers muzzled, viruses written - Cnet News
  • DEF CON 16: List of tools and stuff released - ZDNet Zero Day Blog
  • Attack of the Show - Def Con Convention - G4 TV
  • Cookie-jacking: Potential security risk largely ignored by public - The Tech Herald

Social Networks

  • Facebook's (futile) malware exorcism - can social networks fight back? - ZDNet Blogs
  • LinkedIn Hack Demonstrates Ease of Impersonation - Dark reading
  • The ugly truth: Satan, social networks and security - ZDNet Blogs

SSL Cookie Hijiacking

  • Fighting fire with fire - IT News AU
  • A Good Reason To Go Full-Time SSL For Gmail - Slashdot
  • Security Researcher Defends Plan To Release Gmail Hacking Tool - Information Week

Wall of Sheep

  • Busted by Defcon's Wall of Sheep - The Norman Transcript

Warballooning

  • Covert operation floats network-sniffing balloon - Network World

Badges

  • Badge Hack at DefCon - Wired News

Banks

  • Security Bites Podcast: Defeating online banking security - Cnet News
  • How phishers defeat online banking controls - Cnet News
  • New Bank Practices Make Hacking Easier - Dark Reading

CTF

  • Capture the Experience - Dark Reading

Cyber War

  • Flash mob in Estonia - Cnet News

Disclosure

  • The Vulnerability Disclosure Game: Are We More Secure? - CSO Magazine
  • Hackers Welcome - Forbes

E-voting

  • E-Voting Certification Gets Security Completely Backward - Wired News

Feds

  • hackers:new allies in war on terror - The Times of India
  • Hackers sought as allies in war on terrorism and cyber crim - AFP
  • Defense Cyber Crime Center profiled - Federal Computer Week
  • I Married a Fed at DefCon - Wired News

General

  • Defcon 2007 ‚Äì Mayhem, mystery and marriage - TG Daily
  • In defense of Black Hat and Defcon - Cnet News
  • Black Hat 'supersizes' in Las Vegas - Cnet News
  • Letter From Hackerdom: Not the Same Old DEF CON, Black Hat - Washington Post Blog
  • Hackers, researchers gather for Black Hat, Defcon conventions - Mercury News
  • Basics: Black Hat Briefings and Defcon 15 - Mercury News
  • Takahashi: Foes mingle at Las Vegas hacking conferences - Mercury News
  • Takahashi: Good hackers and bad¬†(53%) - Mercury News
  • The romance and mystery of a good hack - The Register
  • Hacking for hijinks - The Register
  • A Defcon survival guide - The Register
  • Forbes Offers a Sympathetic Portrayal of Hackers - Slashdot
  • The past is prologue at Black Hat Briefings - Government Computer News
  • L0pht in Transition - CSO Magazine
  • DefCon Recap - Dark Reading
  • How to Land the Best Security Job - Dark Reading
  • Overheard at DefCon - Security Focus
  • Black Hat wrap-up: Less hackers, but plenty of flaws - SC Magazine
  • Educating hackers and defenders Hindu - Business Line
  • Podcast: News to know midday: Fake Steve; New iMac; DEF CON flap revisited - ZD Net
  • Top 10 geek vacations, Part II - InfoWorld

Germany

  • Hacker space movement sought for U.S. - Wired Blog
  • Germany enact 'anti-hacker' law - Channel Register
  • Germany enacts 'anti-hacker' law - The Register

Honeypots

  • Websense to Unveil Web 2.0 Threat Detection at Defcon - PC Magazine
  • Websence Protects Web 2.0 - ABC News
  • Websense to Unveil Web 2.0 Threat Detection at Defcon - Eweek
  • DEF CON - Websense lures Web 2.0 attackers with HoneyJax - Network World

iPhone

  • Iphone partially unlocked - TG Daily
  • Will the iPhone be iPwned? - Security Focus

Lock Picking

  • Picking locks the old-school way - Wired News
  • Medeco Readies Assembly-Line Fix for DefCon Lock Hack - Wired News
  • Ultra-High Security Locks Used by White House Easily Opened by 12-Year Old Girl - InfoWorld
  • Lockpicking for Geekkids - Wired Blog
  • White House High-Security Locks Broken: Bumped and Picked at DefCon - Wired News
  • Hackers click locks open at conference in US - AFP
  • The Study of Physical Hacks at DefCo - Slashdot
  • Anti-theft technology - Government Computer News
  • Simple Hack Can Unlock Most Any Office Door - CSO Magazine

Malware

  • Polymorphic Malware: A Threat That Changes on the Fly - CSO Magazine

Media Players

  • Researcher: Media players have critical flaws - MSNBC
  • Researcher: media players invite malware - ABC News

NBC Undercover

  • How an undercover NBC reporter was outed by hackers - Salon.com
  • Defcon: Hacks, Lies, and Videotape - Cio-Today
  • Dateline Mole Allegedly at DefCon with Hidden Camera -- Updated: Mole Caught on Tape - Wired News
  • Defcon drama: Undercover reporter bolts after outing - Cnet News
  • Middle America, Meet The Hacker - Forbes
  • Exposed undercover reporter flees hackers conference - AFP
  • Undercover 'Dateline' Reporter Outed, Flees from Defcon - PC Magazine
  • Undercover TV Producer Bootd from DefCon - ABC News
  • NBC muckraker gets hacked at Defcon - The Register
  • Dateline NBC Mole Outed At Defcon - Slashdot
  • DefCon: Hacking meetup infiltrated by Dateline 'media mole' - CIO Magazine
  • Undercover NBC Dateline reporter bolts from DEF CON 2007 - ZD Net
  • DefCon's Moss: Undercover Reporter Damages 'Neutral Zone' - Information Week
  • NBC Dateline's "Catch a Predator" Series Pays Cops and Undercover "Victims" -- UPDATED - Wired News

Rootkits

  • The Great Rootkit Debate - Dark Reading

SCADA

  • Hacker shows flaw in software that controls key infrastructure - Computer Crime Research Center
  • America's Hackable Backbone - Forbes
  • Researcher: Flaw Exposes Hack Threat - Fox
  • Researcher worries about cyber-hijackers - MSNBC
  • Hacker shows flaw in software that controls key infrastructure - Mercury News

Social Networks

FaceBook

  • FaceBook code leaked on Site - ABC News

MySpace

  • Hackers: Networking Sites Flawed - The St. Petersburg Times
  • By and thanks for the MySpace 'cookies' - The Brunei Times
  • - Hackers: Social Networking Sites Flawed Fox
  • Hackers: Social networks vulnerable - USA Today
  • MySpace weakness patched, hacker's profile deleted - AFP
  • Myspace Hacker's Profile Deleted - ABC News
  • Morning Buzz: Aug. 6, 2007 - U.S. News and World Report
  • 'myspace, others vulnerable to hackers" - Time

Speakers

Sam Bowne

  • Teaching hacking helps students, professors say - Security Focus
  • Teaching hacking helps students, professors say - Dark Reading

Zac Franken

  • 2 Screws, 1 Plastic Cover, How Many Airports Infiltrated? - Eweek
  • Open Sesame: Access Control Hack Unlocks Doors - Wired News
  • Access Card Systems -- Trivially Vulnerable - Washington Post Blog

Lukas Grunwald

  • Buffer Overflow Found in RFID Passport Readers - Slashdot
  • Arphid Watch: A Passport Crashing Technique - Wired Blog
  • Scan this guy's e-passport and watch your system crash - ABC News

Thomas Holt

  • An Inside Look at Internet Attackers' Black Marke - PCWorld
  • Online Crooks Fine-tune Selling of Malware - CIO India
  • Malware: Serious Business - Forbes
  • An Inside Look at Internet Attackers' Black Marke - ABC News
  • Black market for malware a thriving place - The Register
  • Malware: Serious Business - Dark Reading

Mikko Hyyponen

  • There's hope for stopping mobile malware - InfoWorld

Charlie Miller

  • An interview with hacker Charlie Miller on dealing with Apple, hacking the iPhone, the vulnerabilities of Leopard, and responsible disclosure - Mercury News

HD Moore

  • Hacking Without Exploits - Dark Reading

Scott Moulton

  • A Visit to the Drive Doctor - Dark Reading

Vendors

AirDefense

  • New Wireless Security Threats Revealed at Defcon 15 - Government Technology
  • AirDefense Makes New Detection And Protection Methods Available to Customers - Networkcomputing

AirTight

  • AirTight Revealed Potent Variant of Evil Twin at DEF CON 15 - Web Services Journal NJ

AMD

  • Is AMD's 65nm SOI process broken? - ZD Net

Finjan

  • Finjan Identifies Important Vulnerability in Windows Vista's Contact Gadget, Leading to a Security Update Issued by Microsoft - ITNews Italy

Immunity

  • Exploits in the Fast Lane - Dark Reading
  • Security firm makes it easy to come up with attack code - ComputerWorld UK
  • Defcon: Security firm automates generation of attack code - ComputerWorld
  • Immunity releases new exploit-writing tool - ComputerWeeklyUK
  • Security firm makes it easy to come up with attack code - Tech World
  • Security firm makes it easy to come up with attack cod - ComputerWorld UK
  • Defcon: Security firm automates generation of attack code - ComputerWorld
  • Immunity releases new exploit-writing tool - ComputerWeeklyUK
  • Immunity releases new exploit-writing tool - Search Security
  • Immunity says debugger tool will cut zero-day attacks - ComputerWeeklyUK
  • Immunity Unleashes Automatic Exploit Tool - PC Magazine
  • Securty Firm Autmates Attack Code Generation - ABC News
  • Defcon: Security firm automates generation of attack code - CIO Magazine

ISEC

  • How to break forensics software - The Inquirer
  • Researcher Finds Media Player Flaws - Fox
  • Researcher: media players invite malware - USA Today

Microsoft

  • Attackers target two Microsoft security flaws - Search Security
  • Microsoft to update critical Windows, Office, flaws. - Search Security

Mozilla

  • Mozilla: 10-Day Patch Guarantee 'Not our Policy' - IDG News Service

Wall of Sheep

  • net.wars: Wall of sheep - Newswireless.com

Web Hacking

  • Browsing the Intranet Problem - Dark Reading
  • Internet Explorer and Your Web Site's Privac - Washington Post Blog
  • Hackers bite into "cookies" to plunder user data from websites - AFP

Wi-Fi

  • Wi-Fi hot spots are easy prey for hackers - Detroit Free Press
  • Your Wi-Fi can tell people a lot about you - Cnet News
  • Public Wi-Fi use raises hacking risk - USA Today
  • Flash: Public Wi-Fi even more insecure than previously thought - The Register
  • DEF CON to Demo New Wi-Fi Hacks - Security News Portal

Xerobank

  • XeroBank Launches Anonymizing Tool Suite - Dark Reading

DEF CON 14

Badges

  • Defcon aims to thwart counterfeit badges - ABC News
  • Defcon Badges go high tech - The Inquirer

Blackberry

  • BlackBerry a Juicy Hacker Target - Wired News
  • BlackBerry flaw highlights growing mobile device risks - Search Security
  • D'Aguanno demonstrates Blackberry attack - The Inquirer
  • Is Your Blackberry a Hacker's Back Door? - CFO
  • Security Researcher To Release Code That Could Help Exploit BlackBerry Security Flaw - Information Week
  • The Week Ahead, Aug. 14-18, 2005 - Forbes
  • Trojan malware takes a bite out of BlackBerry - Computer World
  • BlackBerry hacking peril exposed - The Register

Blue Pill

  • Introducing Blue Pill - The Invisible Things

Bots

  • Defcon Speakers Team Up to Fight 'Queen Bots' - Washington Post

Conference Overview

  • Defcon 14 report: DAY TWO Zone-H
  • Piratas informáticos a todo vapor - BBC Mundo
  • Black Hat and Defcon 2006: SecurityFest - PC World
  • Defcon 14 report: DAY ONE - Zone-H
  • Defcon 14 Wrapup, at Long Last - Washington Post
  • DefCon Delays Can't Stop the Madness - Washington Post
  • Defcon gets off to a late start - CNET News
  • Defcon growing pains - Rush of people delay opening - TG Daily
  • Hacker Pranks at Defcon and Black Hat in Las Vegas Emphasize Computer Security - MIT Tech Review
  • Hackers and G-men to descend on Las Vegas - MSNBC.com
  • Hackers and trackers mixing and mingling - International Herald Tribune
  • Hackers gather at confab to penetrate computers, pick locks, spray pellets - Washington Post
  • Hackers meet to exploit computer flaws - Fox News
  • Las Vegas braces for computer security gurus - TG Daily
  • Las Vegas hosts computer security events - SEATTLE POST-INTELLIGENCER
  • Reunión mundial de piratas informáticos en Las Vegas - El Pais
  • Suits and punks convene in Las Vegas for hacker conferences - USA Today
  • Talking with the Dark Tangent - Washington Post
  • Two Former Federal Agents Talk About Computer Forensics, Network Security and Computer Crime. - CyberSpeak

Contests

  • IT Security through contests, sponsored by Pepsi - The Inquirer
  • Hackers meet to exploit computer flaws - Fox News

CTF

  • Elite programmers compete in CTF at DEF CON - ZD Net
  • UF security professionals win world's largest ‘hacking’ competition - University of Florida News

Device Driver

  • Even offline computers can be hacked, researchers say - USA Today
  • Experts Discuss Wireless Vulnerability - MS Money
  • Researchers show 'systemic' wireless vulnerability - International Herald Tribune

DNS

  • DNS amplification attacks explained - The Inquirer

Feds

  • Defcon 2006: Hackers can work for the Feds - no degree required - TG Daily
  • FBI: Cybercriminals Taking Cues From Mafia - PC World
  • Feds court infosec pros in fight against cybercrime - Search Security
  • Meeting the Feds at the Def Con Hacker Fair - NPR Radio
  • When Online Crooks Advertise - Washington Post

Google

  • Johnny Long interview - CyberSpeak

Hardware

  • Defcon 14 Full of Amazing Hardware Hacks - Slashdot

IBM

  • - Legacy protocol puts IBM mainframes at risk Search Security

IPv6

  • The state of IPv6 has to be seen to be believed - The Inquirer

Jackpotters

  • Defcon 2006: Casinos could be losing millions to slot machine hackers - TG Daily

Malware

  • Cult Of The Dead Cow Puts Malware Samples Online - Windows IT Pro

Microsoft

  • Microsoft Challenges Hackers On Vista - CBS News

Offensive Computing

  • Cult Of The Dead Cow Puts Malware Samples Online - Windows IT Pro

Oracle

  • Defcon 2006: Oracle not so "unbreakable" - TG Daily

Passport

  • Is RFID tracking you? - CNN
  • Researchers: E-passports pose security risk - CNET
  • Biometric passports cracked - Computing
  • British biometric passport hacked - The Inquirer
  • E-Passport ally responds to cloning claims - Security Focus
  • Hacker Cracks, Clones RFID Passport - Tech News World
  • Researchers expose e-passport vulnerability - Search Security
  • Researchers: E-passports pose security risk - ZD Net Asia
  • Security fears threaten RFID adoption - ITWeek

Traveling Terabyte

  • Traveling Terabyte Project helps soldiers keep in touch with Defcon - TG Daily

VOIP

  • VoIP Abuse at BlackHat, Zimmermann to kick off DEF CON - VON Magazine
  • E-mail security hero takes on VoIP - CNET News
  • Zfone for VoIP ready for testing - The Inquirer
  • Zimmermann: Borderware Licenses Zfone Technology - VON Magazine

Wall of Sheep

  • Wall of Sheep at DEF CON illustrates what not to do - ZD Net

War Driving/Wi-Fi

  • War driving by rocket at 6,800 feet - Security Focus
  • A wireless hacking computer that can't be hacked - TG Daily
  • The Black Hat Wi-Fi exploit coverup - NewsForge

Worms

  • Researchers warn over Web worms - Security Focus

DEF CON 13

Conference Overview

  • Zero Day - Infoworld Blog
  • Security Fix - Washington Post Blog - Defcon Day 1
  • Slashdot | DEF CON Coverage Round-up at Make
  • Hackers and foes exchange ideas - International Herald Tribune - AP
  • Las Vegas Weekly - Written by Defcon Speaker Patty Walsh
  • Hackers prowess on display - Statesman
  • Kisses and Renderman brave INQ snapperazzi - The Inquirer
  • Hacking hardware on display- The Inquirer
  • Hackers Head To DefCon In Vegas
  • Hackers show off abilities at Defcon - Miami Herald

Conference Overview - Blogs

  • RantMedia at DEF CON XIII | Rantmedia Community - Blog by RantRadio
  • Otinia - Blog entry with impressions of DC
  • DefCon 13 - Trip Report for the Distributed systems department at Lawrence Berkely Lab
  • Andrew Mudd [AndrewMudd.com] :: DefCon 13 No-Pictures-Yet Wrap Up - Blog
  • My EXCEPTIONALLY lengthy and yet contentless DEF CON review! - Blog by attendee on Johnny Long's forum
  • Freedom Lives: Defcon 13 Archives - Blog
  • Kitchen Sink Web Blog Archive DefCon 13 roundup - Blog from attendee
  • Insomnygen: Defcon 13 - Blog
  • Defcon 101: no show speakers, long lines, and total chaos. - The Jason Calacanis Weblog - calacanis.weblogsinc.com _ - Blog
  • Emergent Chaos: Defcon Coverage? - Blog of Adam Shostack
  • Who Has Time For This?: CiscoGate at DEF CON - Blog by David Cowan
  • Blog for DIAMONDKT - Blog by attendee - extensive length
  • DEF CON 13 Reading List at Daniel Spisak on Technology - Blog entry highlighting authors favorite talks
  • DEF CON 13 Aftermath at Daniel Spisak on Technology - Blog of attendee
  • SynapticTransmissions.com - Attendee Blog
  • SynapticTransmissions.com - Attendee Blog - Day 3
  • SynapticTransmissions.com - Attendee Blog - day 2
  • SynapticTransmissions.com - Attendee Blog - Day 1
  • Ants on the MelonBlog Archive Friday at DefCon 13 - Blog entry
  • Ants on the MelonBlog Archive Saturday at DefCon, Blackjack in Vegas - Blog
  • Ants on the MelonBlog Archive End of DefCon, Deep Fried Twinkies - Blog (day 3 review)
  • Russell's blog - Blog entry by attendee
  • timbrown: Okay, so I'm back on UK time... - Blog entry by attendee
  • http://sneak.datavibe.net/blog/read?id=1076 - Blog entry by attendee
  • Carbon Ring: DefCon 13 Part II - Blog entry by attendee
  • Carbon Ring: DefCon 13 Part I - Blog entry by attendee
  • The Edge of I-Hacked DEF CON 13!! - Blog entry

WiFi Shootout

  • Rupert Goodwins' Diary - ZDNet UK Comment - Blog
  • Team iFiber Redwire Sets New WiFi Distance Record - Digital-Lifestyles.info
  • Slashdot | 125-Mile WiFi Connection - Slashdot article on WiFi shootout
  • New wireless record claimed | Tech News on ZDNet
  • Boing Boing: Third Annual Defcon Wifi Shootout Contest - Pre DC Coverage of WiFi Shootout
  • Boing Boing: DefCon WiFi shootout champions crowned: 125 miles - BoingBoing Blog Entry after event
  • Belkin intros sub-$ 100 G Plus MIMO router line - Engadget - www.engadget.com - Product announcement mentioning recent DC Wi-Fi world record
  • Unamplified WiFi distance record set at 125 miles - Engadget - www.engadget.com - Blog
  • Record Set at DefCon WiFi Shootout - By Pedro Hernandez [enterpriseplanet]
  • heise online - New WLAN long-distance world record
  • Tom's Hardware Guide: Tom's Hard News - WiFi Shootout record
  • Wi-Fi Toys - Wi-Fi blog entry on shootout record
  • Wired News: Hackers Annihilate Wi-Fi Record

Bluetooth

  • The Car Whisperer, Bluesnarfing for hands-free - Engadget - www.engadget.com

KegBot

  • Opposable Thumbs: Meet KegBot, son of Kegerator
  • Security Fix- Washinton Post
  • Boing Boing: Defcon, Makezine, kegbot
  • The Kegbot - It Gives You Beer : Gizmodo
  • Slashdot | Kegbot: The Future of Robotic Drink Service, Now
  • MAKE: Blog: @ DEF CON - The Kegbot project

Wall of Sheep

  • Wall of Sheep - I see stupid people
  • [ISN] Wall of Sheep - I see stupid people
  • Passing the conference 'sniff' test - Talks about several conferences.
  • Security Awareness for Ma, Pa and the Corporate Clueless: Into the Valley of Death - Blog by Winn Shwartau (he gives pre-con advice on avoiding the wall of sheep)

Capture The Flag

  • Annual hacking game teaches security lessons
  • twin stars DEF CON 13: Capture The Flag - Blog

WiFi Security

  • WiFi access points go nuclear
  • Live from DefCon: WiFi bouncing - Engadget - www.engadget.com - Engadget blog entry (Live from DC)
  • Wireless access security tool moves past prototype stage - WaveSEC story
  • AirDefense Reports Nearly 2,500 Wireless Attacks at DefCon; Evil Twin Attacks Moving from Masquerading to Injection - Forbes.com - AirDefense PR regarding hostile activity on the Defcon network.
  • Wireless Noise Hampers DefCon; Impact of Non-Wi-Fi Interference Surprises Observers at Hacker Conference - Press release by company analyzing interference issues [AirMagnet]
  • Nevada legalizes wireless handheld gambling - Engadget - www.engadget.com - Pre-DC article mentioning how DC hackers will enjoy wireless handheld gambling
  • The INQ Guide to finding wardriving supplies
  • Wireless Developer Network
  • Internet News Article | Reuters.co.uk | PluggedIn: Wireless networks -- easy pickings for hackers
  • Tom's Hardware Guide: Tom's Hard News - WiFi pistol appears at Defcon
  • InformationWeek > Wireless > When Networking Wirelessly, Beware The Microwave > August 2, 2005

Lockpicking

  • How to pick an IT lock at Defcon 13 - Article with pictures (The Register/TheInquirer)

EFF

  • Dunk the hacker and be a net society contributor - The Inquirer

Feds

  • Macworld UK - Defcon draws federal recruiters - Macworld staff blurb quoting Wells from Reuters report
  • US officials go to hackers' convention to recruit - Reuters
  • PC Pro: News: US authorities recruiting at Defcon - Short blurb by Simon Aughton
  • CNN.com - Feds recruiting hackers at Defcon - Aug 11, 2005 - CNN copy of reuters article
  • U.S. government hiring more hackers

Infra-red

  • Infrared exploits open the door to hotel hacking | The Register
  • Hacking the hotel through the TV - Hotel News Resource
  • Hacking the hotel through the TV | Tech News on ZDNet
  • WatchGuard Wire: RSS Feed | WatchGuard Technologies, Inc.
  • Wired News: A Hacker Games the Hotel

Google

  • GoldBlogger Hacker Teaches Click Fraud At Conference! - Blog entry on Adwords hacking
  • Hacking Google Adwords - Defcon Panel recap - The Jason Calacanis Weblog - Lengthy Blog by attendee on the hacking google adwords
  • Hacker Teaches Click Fraud At Conference! - addict3d.org

RFID

  • Hackers demonstrate their skills in Vegas - Business Week, Aug 1. Greg Sandoval
  • RFID: There you are!: ZDNet Australia: News: Hardware

top of the page

DEF CON 12

Print Articles

  • Red Herring (Feb 2005): DT comments on Antivirus Guarantee.
  • Wired Magazine (Dec 2004): Bluesnarfing and other DC12 coverage in the article "When Cell Phone Hackers Attack".
  • FHM Magazine (Dec 2004): DEF CON was featured in the December 2004 issue of FHM.
  • Wired Magazine (Nov 2004): Blurb on the DC 12 Wi Fi Shootout.

General/Misc

  • Slashdot - Defcon 12 Running Man Contest - Local Copy
  • Slashdot - Slashdot | Blackhat/Defcon Report - Local Copy
  • Slashdot - DEF CON 12 - After the Hangover - Local Copy
  • Slashdot - Combining Port Knocking With OS Fingerprinting - Local Copy
  • The Register - Rampant capitalism upsets delicate Reg reader - Local Copy
  • The Register - Vegas braces for DEF CON | The Register - Local Copy
  • The Register - VoIP hackers gut Caller ID - Local Copy
  • PC World - PDA Viruses Could Get Nasty - Local Copy
  • PC World - PCWorld.com - School for Hackers - Local Copy
  • Blogs.PC World - Today @ PC World - New MyDoom Strikes Search Engines - Local Copy
  • The Inquirer - Hackers and establishment to mingle at DEF CON - Local Copy
  • The Inquirer - DEF CON 12: Feds Yes, Anarchy No. - Local Copy
  • TomsHardware - Hackers descend on Las Vegas - Local Copy
  • TomsHardware - Defcon 12's Fear and Hacking in Vegas - Local Copy
  • Las Vegas Sun - Las Vegas SUN: Hackers gather in Vegas for annual digital huddles - Local Copy
  • MarketPlace Public Radio - Marketplace Morning Report for August 2, 2004 - Local Copy
  • Las Vegas City Life - Hacking the planet - Local Copy
  • Searchsecurity - REPORTER'S NOTEBOOK: Impressions of DefCon 12 - Local Copy
  • Searchsecurity - Capture the Flag competitions can net far more than fun - Local Copy
  • PCWorld - Feds Seek a Few Good Hackers - Local Copy
  • ZDNet - Hackers plan global game of 'capture the flag' - Local Copy
  • Geek.Com - Global Capture the Flag game for hackers - Local Copy
  • ZDNet - Why you should Google yourself--and often - Local Copy
  • NewsForge - Google hacks are for real - Local Copy
  • NewsForge - Blackhat/Defcon: The final report - Local Copy
  • NewsForge - DEF CON 12: Opening Day - Local Copy
  • ComputerWeekly - Hackers conference shown how to bypass Active Directory controls - Local Copy
  • eBCVG - Training Ethical Hackers: Training the Enemy? - Local Copy
  • Forbes Technology Playing Role in GOP Protests - Local Copy

EFF & DVR

  • Wired - Group Warns DVRs Endangered - Local Copy
  • Telecom Web - EFF's Digital Television Liberation Project Starts Its Engines - Local Copy

Wireless & Wifi Shootout

  • Slashdot - DefCon WiFi Distance Competition Calls For Entrants - Local Copy
  • Slashdot - DEF CON WiFi Shootout Winners Set A Land Record - Local Copy
  • Slashdot - The Dark Side Of DefCon's Wireless Network - Local Copy
  • Slashdot - Ready, Aim, HACK! - Local Copy
  • Wi-Fi Planet - High Noon for High Range Wireless - Local Copy
  • USA Today - Teens' wireless feat could be world record - Local Copy
  • LocalTechWire - AirDefense Says Hackers Growing More Sophisticated - Local Copy
  • TechWeb - Techweb > News > WLAN security > Wireless Hacks Growing Threat > August 3, 2004 - Local Copy
  • Wired - Wired News: Wi-Fi Shootout in the Desert - Local Copy
  • TomsHardware - Wireless Wizardy and chaos during at talk at Defcon - Local Copy
  • ComputerWire - WiFi and Bluetooth Distance Records Smashed - No Local Copy - pay site
  • TheRegister - Wi-Fi 'sniper rifle' debuts at DEF CON | The Register - Local Copy
  • P2PNet - Wi-Fi ground distance record - Local Copy
  • P2PNet - Bringing goatse - Local Copy
  • InternetWeek - WLAN Attacks Getting More Sophisticated, Vendor Says - Local Copy

Bluetooth

  • Slashdot - Bluesniper Creator Interviewed on Gizmodo - Local Copy
  • Gizmodo - IMterview With Bluetooth Hacking Flexilis's John Hering - Local Copy
  • PCWorld - PCWorld.com - Bluetooth Phones Could Leak Data - Local Copy
  • P2PNet - Bluetooth mobile snipers - Local Copy
  • Wired - Wired News: Security Cavities Ail Bluetooth - Local Copy
  • Esato - Bluetooth-cracking gun - Local Copy
  • SearchNetWorking - Bluetooth: Security's 'silent killer' - Local Copy

Evoting

  • NYTimes - The New York Times > Opinion > Editorial Observer: Rolling Down the Highway, Looking Out for Flawed Elections - Local Copy
  • IHT (same as NYTIMEs story) - Meanwhile: Chasing down flaws in electronic voting - Local Copy
  • Slashdot - Hackers, Public Differ Greatly On E-voting - Local Copy
  • News.com - Poll: E-voters not so afraid of election-day hacks | CNET News.com - Local Copy
  • GCN - Government Computer News (GCN) daily news -- Public and experts split over e-voting security - Local Copy
  • ZDNet - Poll: E-voters not so afraid of election-day hacks - News - ZDNet - Local Copy
  • ComputerWorld - Can you hack the vote? - Local Copy
  • ComputerWorld - Public, security experts' e-voting views differ sharply - Local Copy
  • GCN - Government Computer News (GCN) daily news; Public and experts split over e-voting security - Local Copy

DNS

  • News.com - Internet's 'white pages' allow data attacks - Local Copy
  • Slashdot - Network Attacks Via DNS - Local Copy
  • Silicon.Com - DNS hack leaves corporate networks wide open - silicon.com - Local Copy
  • CBROnline - Researcher says DNS can stream voice, control Trojans - Computer Business Review - Local Copy

Anonymity

  • Slashdot - Tor: A JAP Replacement - Local Copy
  • Wired - Wired News: Onion Routing Averts Prying Eyes - Local Copy
  • CBROnline - Tor offers onion routing for anonymity - Local Copy
  • CBROnline - Freenet project struggles with overload - Local Copy

Press Releases

  • Net Security - Syngress Publishing Announces the Release of "Zero Day Exploit ... - Local Copy
  • Itseccity - DEF CON : One-Hundred Leading Hackers to Present New Material to ... - Local Copy
  • Biz.Yahoo - Wireless LAN Attacks are Moving from Discovery Mode to Manipulation - Local Copy
  • BusinessWire - LinuxWorld Conference & Expo Exhibitor Profiles - Local Copy
  • MarketWire - Immunix Introduces YaST GUI to Help Users of Novell's SUSE LINUX Enterprise Server Simplify Application Security Management - Local Copy
  • LockerGnome - No Starch Press Authors To Make Appearance At DEF CON 12 - Local Copy

Blogs/Small Articles

  • FSecure - Mikko's blogging on DC12 - Local Copy
  • Engadget - Live from DefCon: The Sniper Yagi - Engadget - www.engadget.com - Local Copy
  • Engadget - Who you gonna call? The BlueSniper - Engadget - www.engadget.com - Local Copy
  • Engadget - Live from DefCon: WiFi bouncing - Local Copy
  • BoingBoing - Replace every image on a WiFi network with goatse.cx - Local Copy
  • BoingBoing - Defcon Wi-Fi shootout results - Local Copy
  • BoingBoing - Sniper rifle modded to be WiFi antenna - Local Copy
  • BoingBoing - Defcon Wifi Shootout Contest - Local Copy
  • BoingBoing - WiFi shootout in Vegas - Local Copy
  • DC404 - Defcon Atlanta Group Write-up - Local Copy

top of the page

DEF CON 11

  • The Trade Show Floor: Def Con 0xB - Darth Elmo, Linux Journal - Local Copy
  • Security pros talk, but can they walk? - CNET news.com - Local Copy
  • Waiting for the worm to turn up - CNET news.com - Local Copy
  • Robot 'guard dog' protects Wi-Fi setups - CNET news.com - Local Copy
  • Hacking contest promotes security - CNET news.com - Local Copy
  • DEF CON '03: Myth, Reality and Pictures - the inquirer - Local Copy
  • COMPUTER SECURITY: Searching for the full truth - Las Vegas Review Journal - Local Copy
  • Vegas' Hackers' Meeting Stresses e-danger - Las Vegas Sun - Local Copy
  • Wireless network worries? Get a dog! - geek.com - Local Copy
  • Internet threat looms as thousands of hackers meet - Forbes.com - Local Copy
  • Hand-Held Devices Easy to Hack, Security Experts Say - Washington Post - No Local Copy (please provide!)
  • Hackers get lesson in the law - CNET news.com - Local Copy
  • Has 'haven' for questionable sites sunk? - CNET news.com - Local Copy
  • Mitnick unveiled in more crazy DEF CON 03 photos, Root-Fu ceremony captured - the inquirer - Local Copy
  • Programmer shows why he's got game - In Business Las Vegas - No Local Copy (please provide!)
  • HavenCo's Gilbert & Sullivan Journey - the inquirer - Local Copy

top of the page

DEF CON 10

  • Vegas Braces for Hackers - Wired
  • Defcon: Va-Va-Va Voom, Las Vegas - Wired
  • Defcon: A Veritable Hack Fest - Wired
  • Patrick's Def Con X Report: Day One
  • How to Win Def Con's Capture the Flag Contest
  • Putting fun back into hacking - ZDNet
  • Shock! Maturity rules at hack fest - SMH 
  • Hackers Called Truthseekers, Problem-Solvers
  • Reality Douses DefCon Camaraderie - PCWorld

top of the page

DEF CON 9

  • Patrick Brauch of C'T talks about Defcon (auf Deutsch) - Local Copy
  • Defcon 9 Review - En Espanol! - Local Copy
  • CNET - Defcon Grows Up - Robert Lemos - Local Copy
  • CNET - Hacking for Human Rights - Robert Lemos - Local Copy
  • IDG - CdC Redefines Hacktivism - Sam Costello
  • The Guardian - Hats off to the Hackers - Simon Edwards - Local Copy
  • DFWCUG - What I did on my summer vacation - Opcom - Local Copy
  • BBC News - FBI Arrests alleged copyright hacker - Mark Ward - Local Copy
  • ZDNet - Are 'White Hat' hackers unfairly under seige? - Robert Vamosi - Local Copy
  • The Register - Hackers run amok during Defcon - John Leyden - Local Copy
  • IDG - A Virus to fight viruses[sic] - Sam Costello - Local Copy
  • Jon Sullivan's Blog on DC9, Part 1 - Local Copy
  • Jon Sullivan's Blog on DC9, Part 2 - Local Copy

top of the page

DEF CON 8

  • ABC News has an intersting but shallow slide show overview of DEF CON 8.
  • TechTV.com's cybercrime had extensive coverage of the convention. This is the main page.
  • Hackers aren't criminals - they're the best kind of security - Laird Brown
  • Black Hat/Def Con: The Magic is in the Mix. - Richard Thieme
  • VarBusiness messes up an article and mis quotes Russ. - Carol Ellison - Local Copy
  • Specter Of Network Attacks Looms Anew, - Max Smetannikov, [email protected] Week - Local Copy
  • Hackers won't give Pentagon a break - Jim Wolf, Reuters - Local Copy
  • Specter Of Network Attacks Looms Anew: Computer Snatchers Invade - Local Copy
  • Is DEF CON turning legit? - Robert Lemos, ZDNet - Local Copy
  • Hackers: Uncle Sam wants you! - Robert Lemos, ZDNet - Local Copy
  • Do security holes demand full disclosure? - Weld Pond, @Stake - Local Copy
  • Why DEF CON beats H2K. - Drew Ulricksen, ZDNet News
  • Why it's a 'Summer of Hacking'. - Joel Deane, ZDNet News - Local Copy
  • Jason Scott has a DEF CON Diary located at cow.net - Local Copy

top of the page

DEF CON 7

  • Boardwatch Magazine - Doug Mohney - THROUGH THE LOOKING GLASS - DEF CON 7 - September Issue, 1999
  • Wired News - Two pretty good articles from
    • Wired News - Polly Sprenger - Fear and Hacking in Las Vegas - July 10, 1999 - Local Copy
    • Wired News - Polly Sprenger - Def Con: Brin in Da Noise - July 8, 1999 - Local Copy
  • The Arizona Republic - Bruce Meyerson - Tools of the trade - July 9, 1999
  • CBS.com - Hacker Eline Meet In Vegas - July 10, 1999
  • ABC NEWS.com - Michael J. Martines - Hackers Having a Blast - July 9, 1999
  • ZD TV has a section in the CyberCrime area for DEF CON with these different articles
    • ZDTV - Alex Wellen - Def Con Writ Large - July 13, 1999
    • ZDTV - Alex Wellen - Closing in on Def Con - July, 1999
      Remembering the First Def Con. (Note: Contains some factual errors, but still good) - Local Copy
    • ZDNet - [email protected] Week Online - Doug Mohney - Hacker Fest: Serious Party - July 28, 1999
  • Kevin Poulson had a few pieces about DEF CON
    • My First Def Con - On finding decadence and dialogue in the desert - July 14, 1999
    • He had this to say about InfoWar, in a question that was brought up to him at DEF CON 7.0.
  • MSNBC had a couple of articles
    • XDNNs Robert Lemos had an article about the media causing hacking.
    • MSNBC - Should you care about DEF CON? - July 12, 1999
    • MSNBC - Bob Sullivan - Hackers descend on Las Vegas - July 9, 1999.
  • CNET News.com - Tim Clark - Hackers attack their own kind - July 9, 1999 Local Copy
  • CNN had several articles:
    • CNN - DefCon '99 draws security experts from both sides - July 12, 1999 - Local Copy
    • CNN - DefCon 99: Games hackers play - July 13, 1999 - Local Copy
    • CNN - Convicted hacker gives advice at DefCon - July 13, 1999 - Local Copy
    • CNN - DefCon demos the latest chaos - July 14, 1999 - Local Copy
    • CNN - Back Orifice 2000 under control - July 15, 1999 - Local Copy
    • CNN - Bad rap for Back Orifice 2000? - July 21, 1999 - Local Copy
  • USA Today newspaper wrote Hacking into a new age.
  • Infoworld had a couple pieces about Black Hat and DEF CON.
    • this nice piece about Black Hat and DEF CON. - Local Copy
    • Infoworld - Matthew Nelson - 2,500 hackers gather in Las Vegas for DefCon - July 11, 1999
  • Computerworld had this short piece: Latest hacker tool will target NT desktops.
  • PCWorld News - Andrew Brandt - Hacker Games: From Trivia to Wrestling July 10, 1999 - Local Copy
    PCWorld News - Hackers Gather in Vegas.
    PCWorld News - Andrew Brandt - Hack-a-thon Demos the Latest Chaos - July 12, 1999 - Local Copy
    Parse has several Real Media interviews of stuff around DEF CON.. check it out in thesection.
    Psuedo has some Video of DC7

top of the page

DEF CON 6

  • NYTimes - Hacker Convention Takes On a Corporate Tone by By MATT RICHTEL - Local Copy
  • NYTimes - The Hacker Myth Crumbles at Convention - Local Copy
  • CNN - Hackers: the good, the bad, the ugly - Local Copy - Wav File from CNN Story
  • CNN - Hackers claim to find security holes in Microsoft's Windows - Local Copy
  • Infoworld - Attendees beware: A Black Hat in the sun can scorch your brain - Local Copy
  • Infoworld - Black Hat: We have seen the enemy and they are ... being interviewed on CNN - Local Copy
  • ZDNet - DEF CON: Fear and fascination in Las Vegas - Local Copy

top of the page

DEF CON 5

  • ABC News with a picture of AJ and Deth Veggie. By Angie Bluethman.
  • Hackers turn up heat at DEF CON V, from the Secure Computing Security Newsletter. By Holly Knox, Internet Security Editor 
  • ZDNet's Hackers invade Vegas. By Robert Lemos.
  • Netly News If you build it, they will Con. By Declan McCullagh - Local Copy
  • The Site's Fear and Hacking in Las Vegas by Joel Deane.
  • Crooks Hook Clueless Hackers by Joel Deane.
  • Special to the Mercury News West magazine It takes a hacker to catch a hacker Four parts, by Jonathan Littman.
  • Here are the pictures from the article thanks to Lockheed for scanning them.
  • Computer World's Fear and Hacking in Las Vegas (Common article title, eh?) by Michael Schrenk. - Local Copy
  • The Vominator's heart wrenching experiences at DEF CON V.
  • Krusty's TDYC review of DEF CON V.
  • Soul to Squeeze writes about the con.
  • Lockheed's account of what the hell happened.
  • Thanks to Ophie for sending this Comic from Computer World.
  • TekLord and Plucky's review page for DEF CON 5. - Local Copy(scroll to near end of document)
  • What Plucky, TekLord and Zytek did.
  • DefCon V Adventure: System Failure Debut, by pinguino.
  • This piece, called Hackers Do Vegas ran in The Australian on August 2.
  • Hacker Lessons learned by Matt Willis and told at DEF CON 5, written by Sharon Machlis for Computerworld 07/21/97.
  • Ira Winkler Spy Catcher talks about what he had to say at DEF CON 5, written by Steve Ulfelder for Computerworld, 08/11/97.
  • Hackers swap secrets on cracking computers By Angie Bluethman of the Associated Press.
  • Count the Cliches in a recent story published by the Associated Press.

top of the page

DEF CON 4

  • DEF CON Hackers television transcript from The Discovery Channel "Cyber Life."
  • FBI lectures hackers at convention By Adam Steinhauer, Sunday, July 28, 1996 in the Las Vegas Review-Journal and Las Vegas Sun
  • The Orange County Register and this short piece about the FBI at DEF CON IV.

top of the page

DEF CON 3

  • The review from SunWorld Online News.
  • The archive of stories about the hack of MGM's Hackers movie home page (Which happened right before the con.

top of the page

DEF CON 2

  • Business Week had a pretty cool write up on the whole matter.
  • John Markhoff from the NY Times was there, this is what he had to say.
  • Cyber Christ(Who was seen at several cons that year) showed up.
  • Theora had a review
  • The Financial Times write up was very poor attempt by the author to evaluate a convention he never attended, with an anti virus spin job.
  • Fear and Loathing in Las Vegas.
  • A super short blurb about the con in the Iron Feather Journal.
  • John C. Dvorak wrote a bit about it in PC Magazine.
  • Robert X. Cringley from Infoworld was there also.

top of the page

DEF CON 1