This is a comprehensive list of all articles known to
have been written about DEF CON. Many publications are no longer in
existence, and much of this history is lost. If you have press you
would like included in the archive, send links and titles to sleestak [at]
defcon ]dot[ org!
A note to journalists: Please stop writing clever
articles entitled 'Fear and Hacking in Las Vegas', as it becomes
difficult to tell them apart.
DEF CON 31
AI
- Hackers explore ways to misuse AI in major security test | axios
- Chatbots: Why does White House want hackers to trick AI? | BBC
- Are you a robot? | Bloomberg
- Hackers take on ChatGPT with support from White House | CNN
- Fifty minutes to hack ChatGPT: Inside the DEF CON competition to break AI | CyberScoop
- Researchers at DEF CON Attend Three-Day Competition to Expose Flaws in AI Chatbots | Fagen Wasanni Technologies
- 2024: The Nightmare of Personalized Disinformation and AI Vulnerabilities | Fagen Wasanni Technologies
- Hackers red-teaming A.I. are ‘breaking stuff left and right,’ but don’t expect quick fixes from DefCon: ‘There are no good guardrails’ | Fortune
- The Most Fearsome Hackers Just Went Ham on ChatGPT | Futurism
- The biggest companies in AI gave hackers a chance to do their worst | NBC News
- Strength in Numbers: NVIDIA and Generative Red Team Challenge Unleash Thousands to Vet Security at DEF CON | NVIDIA Blog
- Infosec elites and veterans gathered at DEF CON for Generative Team Red Challenge aimed for bolstering AI inclusivity and trustworthiness | Tech Critter
- How did DefCon hackers do against AI chatbots? | The Columbian
- Google AI red team lead talks real-world attacks on ML | The Register
- Meet the hackers who are trying to make AI go rogue | The Washington Post
- Legions of DEF CON hackers will attack generative AI models | Venture Beat
CTF
- Carnegie Mellon’s Hacking Team Wins 7th DEF CON Capture the Flag Title | Carnegie Mellon University
- Carnegie Mellon University Scholars’ Team Wins 7th DEF CON Capture The Flag Title | India Education Diary
DARPA Challenge
- US Government Launches $20 Million AI Cyber Challenge to Strengthen National Cybersecurity | Cryptopolitan
- DARPA Launches 2-Year Contest to Build AI Tools to Fix Vulnerabilities | Dark Reading
- Black Hat 2023 – AI gets big defender prize money | welivesecurity
Evacuation
- Bomb hoax disrupts Defcon | Boing Boing
- Hacking conference evacuated after reports of a ‘suspicious package’ | Review Journal
- Bomb threat causes mass evacuation at DEF CON convention | TechCrunch
- Bomb scare causes mass evacuation at DEF CON | The Register
General
- Exclusive: Email security vendor leaves 2M domains open to phishing hacks, study finds | axios
- Transport app vulnerabilities could have been exploited in the wild | Cyber Security Connect
- Dissecting the UN Cybercrime Convention’s Threat to Coders’ Rights at DEFCON | EFF
- Data centres vulnerable, researchers tell DEF CON | itnews
- Researchers uncover data center risks from CyberPower, Dataprobe products | SC Magazine
- TSA Chief Says He Needs More Staff To Help Protect Pipelines, Railroads and Air Travel From Hackers | The Messenger
- Power supply flaws can be exploited to shut off datacenters | The Register
Hack-a-Sat
- You Can Win $50,000 If You Successfully Hack a US Government Satellite | Business Insider
- Italian hackers manage to hack a satellite in a US contest and hit the jackpot | gearrice.com
- Moonlighter Is the First Ever Space-Based Capture the Flag Target for DEF CON 31 | hackster.io
- For the first time, U.S. government lets hackers break into satellite in space | Politico
iPhone Spoof
Policy
- For U.S. officials, the world’s largest hacking conference isn’t all fun and games | Politico
- Why the US Military Wants You To Rethink the Idea of 'Cyber War' | The Messenger
Subway Hacking 2.0
- Bugs in transportation app Moovit gave hackers free rides | TechCrunch
- Researchers discover vulnerabilities in Moovit software allowing free subway rides | The Record
- *****s Hacked Boston Subway Cards to Get Infinite Free Rides—and This Time, Nobody Got Sued | Wired
Veilid
- America's original hacking supergroup creates a free framework to improve app security | Engadget
- US hacker group forges a new free app security framework | Interesting Engineering
- Veilid unveiled by Cult of the Dead Cow | itnews
- Cult of Dead Cow Hacktivists Design Encryption System for Mobile Apps | Slashdot
- Cult of the Dead Cow unveils Veilid peer-to-peer project | The Register
- Hacking group plans system to encrypt social media and other apps | The Washington Post
- Veilid Website | Veilid
Voting Village
- Voting Village at DEF CON Hacker Convention Bolsters Physical Security Measures | Gillette news
- How DEF CON’s election hackers are trying to protect themselves | Politico
DEF CON 30
DEF CON Bans OAN | Vice
This String of Emojis is Actually Malware | Vice
Hackers Took Over a Commercial Satellite to Broadcast Hacker Movies | Vice
Hackers Come Home to Vibrant Community | Dark Reading
StarLink Ground Stations Successfully Hacked | Hackaday
John Deere Tractor Runs Doom | The Register
Black Hat and DEF CON visitors differ on physical risk management | The Register
How Sanctions Impact Internet Operators | Infosecurity Magazine
#DEFCON: CISA Director Praises Congress and International Cybersecurity Cooperation | Infosecurity Magazine
The Next Big Jailbreak in Tech: John Deere Tractors | Gizmodo
Black Hat and DEF CON Roundup | Threatpost
Carnegie-Mellon Team Wins DEF CON Hacking Competition | Business Wire
*****m Patches Mac Auto-Updater Vuln that Granted Root Access | Ars Technica
Election Disinformation Fears Loom Over Hacker Confab | Politico
Sick Codes Jailbreaks Tractor at DEF CON | Fierce Electronics
John Deere Jailbreak Shows It’s All Built on Outdated, Unpatched Hardware | Boing Boing
A New Jailbreak for John Deere Tractors Rides the Right-to-Repair Wave | Wired
Playing for All the Jelly Beans at the EFF Benefit Poker Tournament at DEF CON | EFF
Reproductive Justice in the Age of Surveillance: Panel at DEF CON 30 | EFF
What to watch for as 'Hacker Summer Camp' gets underway in Las Vegas | Cyberscoop
Eclypsium Calls Out Microsoft Over Bootloader Security Woes | Tech Target
Russian Hackers Are Escalating and Diversifying Their Attacks on Ukraine, Research Says | Gizmodo
US Emergency Alert System Has ‘Huge Flaw’ — Broadcasters Must Patch NOW | Security Boulevard
New exploits can bypass Secure Boot and modern UEFI security protections | CSO Online
DEF CON 30 Comes of Age with Hacker Homecoming | Security Systems News
Logran hackear Starlink por solo 25 dólares Muy Computer
Up Close at DEF CON 30 | PC Mag
‘Hackers against conspiracies’: Cyber sleuths take aim at election disinformation | Politico
The *****m installer let a researcher hack his way to root access on macOS The Verge
White House Cyber Director: ‘Defense is the New Offense’ for Cyber | Nextgov
Inglis: People, companies need to replicate collective cyber defense seen in Ukraine | The Record
Potential hack vulnerability for some Boeing planes fixed: Researchers | Business Insurance
*****m acaba de corregir una falla de seguridad importante | Digital Trends (Espagnol)
A Flaw in the VA’s Medical Records Platform May Put Patients at Risk | Wired
DC30 Car Hacking Village Badge | Intrepid Control Systems
(YouTube)
Designing the DEF CON 29 and 30 Badges (featuring MK Factor) Hacker Hangouts (YouTube)
DEF CON 30 OBD-Kill Badge First Flight | Intrepid Control Systems
(YouTube)
Defcon 30 badge release the patch/fix to the bug of smoked badge. | Reddit
DEF CON 29
Badgelife
- AND!XOR’s DEF CON 29 Electronic Badge Is An Assembly Puzzle | Hackaday
- Hands On: DEF CON 29 Badge Embraces The New Normal | Hackaday
- Index of Articles | Hackaday
- Hands-On: Whiskey Pirates DC29 Hardware Badge Blings With RISC-V | Hackaday
Farm Hacking
- Connected Farms Easy Pickings for Global Food Supply-Chain Hack | Threat Post
- Being “root” on two Agriculture Companies (in Good Faith). Maxing out the John Deere Operations Center Worldwide and Case Industrial in Brazil (ft. PEGA CVE, SQLi, exposed Java Melody) | Reddit
- This Week In Security: John Deere, ProxyLogin Detailed, And Pneumatic Tubes | Hackaday
- Hacker Says He Found a ‘Tractorload of Vulnerabilities’ at John Deere | Vice
EBooks
- #DEFCON: A Bad eBook Can Take Over Your Kindle (or Worse) | Infosecurity
- Amazon Kindle Hack Needs Just One Evil Ebook To Take Over Your Ereader—And Maybe Your Amazon Account Too | Forbes
- Amazon fixes security issues e-reader Kindle: Check Point | infotechlead
Twitter Algo
- Winner of Twitter’s Algorithmic Bias Bounty Competition Speaks Out | Adweek
- Twitter’s photo-cropping algorithm prefers *****, beautiful, and light-skinned faces | The Verge
- Twitter's AI image-crop algo is biased towards people who look *****er, skinnier, and whiter, bounty challenge at DEF CON reveals | The Register
- Twitter competition reveals bias in image-cropping algorithm | Arab News
- Student proves Twitter algorithm ‘bias’ toward lighter, slimmer, *****er faces | The Guardian
- After accusations, Twitter will pay hackers to find biases in its automatic image crops | The Verge
- Twitter issues cash bounty challenge for undoing 'racist' photo cropping | Mashable
DHS
- We Have Questions for DEF CON's Puzzling Keynote Speaker, DHS Secretary Mayorkas | EFF
- 'SPOT THE FED’: DEF CON hacker event roasted on social media after inviting top US Homeland Security official as keynote speaker | RT
- DEF CON offers beginner-level Spot the Fed this year: He'll be on stage giving a keynote | The Register
Satellite Hacking
- Hacking space on the horizon for 2023 | README_
- DEF CON 29: Satellite hacking 101 | welivesecurity
- Aerospace Corp. Sees Need for Tools to Test Black Box Software in Spacecraft | Air Force Magazine
PunkSpider
- Reboot of PunkSpider Tool at DEF CON Stirs Debate | Threatpost
- A Controversial Tool Calls Out Thousands of Hackable Websites | Wired
RNG
- FUNDAMENTAL FLAW IN RNGS AFFECTS MANY IOT DEVICES | Decipher
- You're Doing IoT RNG | Reddit
Conference News
- The Cybersecurity 202: The year’s biggest cybersecurity conferences are back, but limited | Washington Post
- Nmap 7.92 Defcon Release! | Seclists.org
- #DEFCON: Exploiting Physical Shopping Carts for Denial of Shopping | Infosecurity Magazine
- #DEFCON: Exploiting Vulnerabilities in the Global Food Supply Chain | Infosecurity Magazine
- (BPRW) Blacks In Cybersecurity Makes History with Black Badge laden Capture The Flag Competition at DEF CON 29 | Black PR Wire
- Black Hat USA 2021 and DEF CON 29: What to expect from the security events | Tech Republic
- The World’s Largest Hacking Conferences Are Back IRL This Summer | Vice
- Privacy Without Monopoly: DEFCON 29 | EFF
- #DEFCON: Hacking RFID Attendance Systems with a Time Turner | Infosecurity Magazine
- #DEFCON: Why Social Media Security is Election Security | Infosecurity Magazine
- Using a time turner to hack RFID attendance systems | Bolly Inside
- Black Hat USA 2021 & DefCon 29: Hybride IT-Security-Konferenzen starten in Kürze | Heise.de
- Excel is still a security headache after 30 years because of this one feature | Tech Republic
- #DEFCON: Ransomware Moves from Nuisance to Scourge | Infosecurity Magazine
- Windham election auditor presents findings during DEFCON convention | WMUR9
- Making the Joint Cyber Defense Collaborative Work | LawFare
- Using AI to Scale Spear Phishing | Schneier on Security
DEF CON 28 Safe Mode
- Hands-On: The Pandemic DEF CON Badge Is An Audio Cassette | Hackaday
- As Defcon goes virtual, organizers step up efforts to prevent online harassment | CNET
- Separation Between WiFi And Bluetooth Broken By The Spectra Co-Existence Attack | Hackaday
- US Defense, Air Force Departments invite hackers to re-imagine how space systems are secured | U.S. Air Force
- Qualcomm chip vulnerability puts millions of phones at risk | Computer Weekly
- Nearly 50% of all smartphones affected by Qualcomm Snapdragon bugs | Bleeping Computer
- Researcher Demonstrates Several *****m Vulnerabilities at DEF CON 28 | The Hacker News
- DEF CON: New tool brings back 'domain fronting' as 'domain hiding' | ZDNet
- Separation Between WiFi And Bluetooth Broken By The Spectra Co-Existence Attack | Hackaday
- iPhone apps just as unsafe as Android apps, says security researcher | Tom's Guide
- Boeing Still Used Floppy Disks to Update the Software in Its 747s | ExtremeTech
- The United States Air Force Would Like You To Hack Into Their Satellite | Hackaday
- *****m Vulnerabilities Demonstrated in DEF CON Talk | Dark Reading
- DEF CON 28: ILS and TCAS Spoofing | Pen Test Partners
- DragonOS: Installing Crocodile Hunter For Detecting Fake 4G Cell Sites | rtl-sdr.com
- DEF CON 28: Introduction to ACARS | Pen Test Partners
- Hands-On: AND!XOR Unofficial DC28 Badge Embraces The Acrylic Stackup | Hackaday
- Pakistan Infosec Community representation on the stage of DEFCON hacking convention Technology Times Pakistan
- AnChain.AI's Twitter Hack Investigation to Keynote DEFCON Blockchain Village 2020 | Benzinga
- DEF CON 'Safe Mode': edição online do evento hacker começa nesta quinta | Olhar Digital
- Def Con 2020: Weltweit Satellitenkommunikation belauschen – für unter 300 Euro | heise online
- Defcon Speaker Discusses Liberating $300K Worth of Bitcoin From an Encrypted File | Bitcoin News
DEF CON 27
Election Security
- Election Security Tested at DEF CON | NPR:
- At DEF CON, Teaching Disinformation is *****’s Play | CNET
- 2020 and the Black-Box Ballot Box | TechCrunch
- Hackers Take on DARPA’s $10 Million Voting Machine | Wired
- At DEF CON, hackers and lawmakers came together to examine holes in elections security | Washington Post
- DARPA’s $10 million voting machine couldn't be hacked at Defcon (for the wrong reasons) | CNET
- DARPA to Bring its Smart Ballot Boxes to DEF CON for Hacking | DarkReading
- Hackers Take on DARPA’s $10 Million Voting Machine | WIRED
- Hackers were told to break into U.S. voting machines. They didn’t have much trouble. | Washington Post
- Lawmakers embrace hackers in Vegas as 2020 election looms | CNN
- ***** to Tackle Election hacking at DEF CON | MeriTalk
- This tech to secure voting machines won’t be real by 2020 | Yahoo! Finance
- Lawmakers turn to hackers at Defcon for election security | CNET
- DEF CON Invites ***** to Crack Campaign Finance Portals | DarkReading
- Tech conference presents big vulnerabilities for the 2020 elections | Salon
- At hacking conference, Pentagon's transparency highlights voting companies' secrecy | CNN
- Why Paper is Considered State of the Art Voting Technology | Brookings Blog
- Watch this hacker break into a voting machine | CNN
- Hackers can easily break into voting machines used across the U.S.; play Doom, Nirvana | Salon
- Better Together: Election Officials Join Hackers At DEF CON Conference | Election Academy
- Georgians Demand More Testing of New Voting System | Courthouse News Service
- The malware election: Returning to paper ballots only way to prevent hacking | The Hill
- Georgians Demand Secretary of State Re-Examine Voting System | WhoWhatWhy
- Hackers Expose Vulnerabilities in Popular E-poll Books | WhoWhatWhy
- US still 'not prepared' in event of a serious cyber attack and Congress can't help if it happens | The Register
- #DEFCON: How the US's CISA Works to Improve Election Security | Info Security
- DEF CON Voting Village Report Calls for Standards & Fixes | Info Security
IOT
- DEF CON 2019: Researchers Demo Hacking Google Home for RCE | Threatpost
- DEF CON2019: Picture Perfect Hack of a Canon EOS 80D DSLR | ThreatPost
- Hacker Discovers Way to Cheat in Zwift, the Virtual Bike Racing Exercise Game | VICE
- DEF CON 2019: 35 Bugs in Office Printers Offer Hackers an Open Door | ThreatPost
- Warning as Macs Remotely Hacked by Malicious iPhone Cable On Sale for $200 | Forbes
- A Hacker’s Fall Fashion Line Features Faux License Plates. Here’s Why | The Parallax
- Hackers Can Hurt Victims with Noise | DarkReading
- How eBay scammers turned Nespresso lovers into money mules | Mashable
- Surveillance cameras can misread and be misled too | LiveMint
- Why You Should Never Borrow Someone Else’s Charging Cable | Forbes
- You Probably Shouldn't Use a Random Cable to Charge Your iPhone | Popular Mechanics
- BACnet IoT building automation devices vulnerable to attack | Computer Weekly
- Created Lightning cable, which you can use to hack Mac | Mice Times of Asia
- Safecrackers Can Unlock ATMs as Easily as Hacking a Baby Monitor | Observer
- Hackers Can Turn Everyday Speakers into Acoustic Cyberweapons | WIRED
- DEF CON 2019: Delta ICS. Flaw Allows Total Industrial Takeover | ThreatPost
- How a 10-Year-Old Desk Phone Bug Came Back From the Dead | WIRED
- How Safecrackers Can Unlock an ATM in Minutes - Without Leaving a Trace | WIRED
- Behind the Scenes at ICS Village | Dark Reading
- Buttplug Hacker Talks Security, Consent and Why He Hacked a Buttplug | Gizmodo
- Internet of Santorum | BoingBoing
- Hackers are Going After Medical Devices and Manufacturers are Helping Them | Washington Post
- A Model Hospital Where the Devices Get Hacked - on Purpose | WIRED
Badge Talk
- DEF CON 27: THE BADGE TALK; OR THAT ONE TIME JOE GRAND SOURCED 30,000 GEMSTONES | Hackaday
- FIRST LOOK AT DEF CON 27 OFFICIAL BADGE; KINGPIN IS BACK! | Hackaday
- HANDS-ON: AND!XOR DEF CON 27 BADGE DITCHES BENDER, ADOPTS LIGHT PIPES | Hackaday
- DEF CON 27: THE BADGE TALK; OR THAT ONE TIME JOE GRAND SOURCED 30,000 GEMSTONES | Hackaday
- THE BADGIES: CLEVER, CRAZY, AND CREATIVE IDEAS IN ELECTRONIC DESIGN | Hackaday:
- Badge life: The story behind DEFCON’s hackable crystal electronic badge | Ars Technica
- Trump’s tariffs just about killed DefCon #badgelife | The Parallax
- Meet Joe Grand - the Hacker Extaordinare at DEF CON 27 | blog.NXP.com
- HOLONOMIC DRIVES, BADGES OF DEF CON, WE DON’T DO ON-CHIP DEBUGGING, AND SMALL RUN MANUFACTURING SNAFUS | HACKADAY PODCAST 031
- A Portable Honeypot, the DEF CON 27 Blue Team Village Electronic Badge | Fyrm Associates
Auto Hacking
- Sledgehammers can’t even stop these hackers | Mashable
- Car Makers Befriend Hackers to Learn About Cyber Vulnerabilities | Insurance Journal
- This Tesla Mod Turns a Tesla S into a Mobile ‘Surveillance Station’ | WIRED
- Woman Seen on Video Getting Tesla Model Chip Implanted | WDRB
- Automakers Learn from White Hat Hackers | Fenderbender.com
- Tesla Model 3 owner creates a novel DIY solution for a supercharged Sentry Mode | Teslarati
- Tesla Surveillance Hack | Futurism
General Con Talk
- What a security researcher learned from monitoring traffic at Defcon | CNET
- Black Hat and Defcon look to boost diversity through day care | CNET
- Securing Devices for DEF CON | Security Boulevard
- Should you send your security staff to a hacker conference? | Information Week
- It's Black Hat and DEF CON in Vegas this week. And yup, you know what that means. Hotel room searches for guns | The Register
- No, You Don’t Need a Burner Phone at a Hacking Conference | VICE
- Watch a Drone Take Over a Nearby Smart TV | Wired
- How to Join in on the Security Policy Conversation at DEF CON | Rapid7 Blog
- DEF CON has been and gone, what did you miss? | SentinelOne
- DEF CON 27 Demonstrates Real-World Security Issues for MCUs, Medical Devices, Cars, and More | All About Circuits
- DEF CON 27 Megathread | /r/DEFCON
- We asked DEF CON attendees why people are still getting hacked | VICE
- DEF CON - The Ultimate Guide for First- Timers | Medium
- DEF CON Stack Overflow Traffic Data Trends | Stack Overflow
- How I Hacked DEF CON | Medium
- Why Software Security and DevOps were the Talk of the Town at Black Hat and DEF CON 2019 | Security Boulevard
- DEF CON Goons, Badges and Talks – Inside the Largest Hacker Con in the World | Security Boulevard
- What’s the Most Vulnerable Part of Your Network? | Security Boulevard
- 8 Free Tools to be Showcased at Black Hat and DEF CON | Dark Reading
- It's Black Hat and DEF CON in Vegas this week. And yup, you know what that means. Hotel room searches for guns | The Register
- August 12, 2019: DEF CON 27 | My Blue Tesla
- Thoughts from DEF CON 27 | CSO Online
- Black Hat, DEF CON, and BSides 2019: Highlights and Emerging Industry Trends | Rapid7 Blog
- Cal Poly to Bring Learn by Doing to Global Hacker Convention in August | Cal Poly News
- ***** Security Researcher Suspended for Exposing Vulnerabilities in His School’s Software | Vice
- ***** Tells DEF CON How He Hacked Millions of Student Records From Popular Education Software [Update] | Gizmodo
- This ***** Hacker Found Bugs in School Software That Exposed Millions of Records | Wired
- DEF CON 27: r00tz Asylum Opening Ceremonies | EFF
- 15 Hot Tools to Come Out of Black Hat and DEF CON | Security Boulevard
- DEF CON 27: WISP Leadership Panel | EFF
- Critical Windows 10 Warning: Millions Of Users At Risk | Forbes
- US Senator Says Wireless Carriers Helping Trump Build 'Surveillance State’ | Tom’s Guide
- Hundreds of exposed Amazon cloud backups found leaking sensitive data | TechCrunch
- SELECT code_execution FROM * USING SQLite: Eggheads lift the lid on DB security hijinks | The Register
- On 12th June 2019, a crazy idea just popped into my mind “i want to fly to USA and attend Defcon 27” | Medium
- Nmap 7.80 DEF CON Release: First Stable Version in Over a Year | Bleeping Computer
- #DEFCON: Hackers Can Use Netflix Account to Steal Banking Info | InfoSecurity
- Def Con 2019 and Hacking iOS Contacts | The Mac Observer
- NFC Business Cards to FPGA Cubes, Skull Badges to Bandoliers, Here’s the Hardware from Breakfast at DEF CON | Hackaday
- Minnesota team places 2nd in national 'hacking' competition | KARE11
- Critical Windows 10 Warning: Millions Of Users At Risk | Forbes
- Clever attack uses SQLite databases to hack other apps, malware servers | ZDNet
- Remotely hacking elevator phones shouldn't be this easy | Mashable
- Wyden rallies Def Con in speeches chastising telecom sector on privacy, Sen. McConnell on elections | Inside Cybersecurity
- Those Elevatort Emergency Call Buttons are Actually Pretty Janky | Hackaday
- Hacker Jeopardy, Wrong Answers Only Edition | Security Boulevard
CTF
- Carnegie Mellon team flexes hacking prowess with fifth DefCon title in seven years | Yahoo! Finance
- Team HITCON, with Second State's developer as a core, scored the second in DEF CON | Second State
- Taiwan team places second at DEF CON hacker competition in Las Vegas | Taiwan News
- Carnegie Mellon Wins Fifth “World Cup” of Hacking | CMU.edu
Aviation Village
- Hackers Just Found Serious Vulnerabilities in a US Military Fighter Jet | Washington Post
- Ethical Hackers Sabotage F-15 Fighter Jet, Expose Serious Vulnerabilities | Newsweek
- At DEF CON’s aviation village, the military is interested in more than just the hacks | Cyberscoop
- US military swoops into DEF CON seeking a few good hackers for debut aviation pwning village | The Register
- The Air Force is all in on software | C4ISANET
License Plates
- “NULL” vanity plate hack to dodge parking tickets backfires to the tune of $12,000 | Graham Cluley
- This Guy Got Stuck with $12000 in Parking Tickets | CarBuzz
- Vanity license plates have proven traffic ticket systems faulty for four decades | SlashGear
- ’NULL’ license plate gets security researcher $12K in tickets | Naked Security
- A new clothing line confuses automated license plate readers | MIT Technology Review
- Geeky license plate earns hacker $12,000 in parking tickets | Ars Technica
- A hacker’s fall fashion line features faux license plates. Here’s why. | The Parallax
- Hacker Gets $12,000 In Parking Tickets After 'NULL' License Plate Trick Backfires | Forbes
- Hilariously Geeky ‘NULL’ License Plate Gets Security Researcher All the Tickets | geek.com
- He tried to prank the DMV. Then his vanity license plate backfired big time. | Mashable
- The Fashion Line Designed to Trick Surveillance Cameras | The Guardian
DEF CON SecureDrop
- DHS’ Krebs: Def Con initiative could reach new communities with conduit for vulnerability disclosure | Inside Cybersecurity
- DEF CON and Feds Partner on Anonymous Bug Submission Program | Threatpost
- Feds plan to use SecureDrop as a vulnerability reporting portal | Cyberscoop
- From Vegas: A scoop, zero-days and cyber weapons | Politico
- CISA chief Krebs to speak on vulnerability reporting at Def Con | Inside Cybersecurity
DEF CON 26
Vote Hacking
- Election-Hacking Lessons from the 2018 Def Con Hackers Conference | The New Yorker
- Senators Kamala Harris, Susan Collins, Mark Warner and James Lankford letter to ES&S | Harris.Senate.Gov
- Iowa needs just a little more Vegas | TheGazette.com
- Secretaries of State Blast Election Hacking Exercise | RouteFifty
- Harris Public Policy announces first-of-its-kind initiative to inform cyber policy | University of Chicago
- The ABCs of Hacking a Voting Machine | Dark Reading
- Smartphones or pen and paper? Cybersecurity experts split on tech in voting | NBC News
- #DEFCON Vote Hacking Village Refute NASS 'Unfair' Claims | InfoSecurity Magazine
- Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms | Dark Reading
- Def Con Hackers Easily Bust Into Voting Machines, But Will Tech Companies Listen? | Huffington Post
- Election officials say money, training needed to improve security | Review Journal
- US officials hope hackers at Defcon find more voting machine problems | MSN
- At DEF CON '18, ***** as ***** as 5 challenged to hack election results websites, voting machines | ABC News
- At DEF CON, the Biggest Election Threat is Lack of Funding | WIRED
- DNC-led DEF CON event tests election websites against ***** hackers | MSN
- At DEF CON ’18 ***** Challenged to Hack Election Results Websites Voting Machines | KRYN.com
- DEF CON plans to show US election hacking is so easy ***** can do it | The Register
- Louisiana doesn't need any hacks in its election system | NOLA.com
- 11-year-old hacks replica of Florida state website, changes election results | USA Today
- Election officials' concerns turn to information warfare as hackers gather in Vegas | CNN
- Grimes: Kentucky Needs More Funding To Update Voting Infrastructure | WKMS.org
- Manfra highlights DHS election security work, pitches collaboration to ‘Def Con’ crowd | Inside CyberSecurity
- ***** Maine hacker shows off skills | WMTW.com
- An 11-Year-Old Changed The Results Of Florida's Presidential Vote At A Hacker Convention. Discuss. | BuzzFeed News
- States have a lot of work to do on cybersecurity, and they shouldn’t wait for ***** to find the problems | Washington Examiner
- 11-year-olds hack replica of Florida's election website in less than 15 minutes | Orlando Sentinel
- I Just Hacked a State Election. I’m 17. And I’m Not Even a Very Good Hacker. | Politico
- DEFCON Video Shows a Voting Machine Used in 18 States Is Hacked in 2 Minutes | Inverse
- Pre-***** Hackers Prove It: The U.S. Election System Simply Isn’t Secure Enough | Futurism
- Pen and paper is still king in America election security | The Register
- DEF CON 26: First Day Review and Voting Machine Hacking | InCyberDefense
Auto Hacking
- Tesla Plan To Release Source Code For Their In-Car Security Technology | Latest Hacking News
- Car Hacking at DEF CON 26 | Hackaday
- Elon Musk says Tesla will open part of its self-driving software to the public as a safety measure | CNBC
IoT
- New Cyberattacks Against Urban Water Services Can Be Launched Using A Botnet Of Smart Commercial Irrigation Systems – Def Con Presentation | Water Online
- Faxploit – Fax Machines Allow Hackers To Take Over An Entire Network | Latest Hacking News
- DEF CON Update: Researchers Find A Method To Turn Amazon Echo Into A Spy | Latest Hacking News
- Hackers Can Turn Body Cameras Into Malware Spewing Machines, Security Expert Says | Gizmodo
- Faxploit: Retro hacking of fax machines can spread malware | The Register
- Hackers Can Edit Police Body Cam Footage Without Anybody Noticing | Motherboard
- Hackers accessing PayPal via voicemail? Security expert says it's possible | The Guardian
- Hackers found a(not-so-easy) way to make the Amazon Echo a spy bug | WIRED
- Check Point shows hackers can infiltrate networks via fax machines | VentureBeat
- Footage from police body cameras can be altered by hackers, researcher says | Newsweek
- Alexa's Listening: Hackers Turn Amazon Echo Into a Snitch | Tom’s Hardware
- Attackers could ‘faxploit’ all-in-one printer to penetrate network and steal data | CSO Online
#badgelife
- BadgeLife - A Hackaday Documentary | Hackaday
- FIRST LOOK AT DEF CON 26 OFFICIAL BADGE | Hackaday
- Honoring the ’80s, Def Con’s badge is also a text adventure | Are Technica
- Hacker convention’s badge contains an old-school text adventure | Polygon
- This year, badges get blockchains | Hackaday
- All of the badges of DEF CON 26 (vol 1) | Hackaday
- All of the badges of DEF CON 26 (vol 2) | Hackaday
- This cute DEF CON badge beckons you to hack it | Engadget
- Teardown: Queercon 15 badge (and the game hidden within) | Hackaday
- Video Review: AND!XOR DEF CON 26 badge | Hackaday
Medical Hacking
Policy
- NSA Brings Nation-State Details to DEF CON | Dark Reading
- Former NSA top hacker names the filthy four of nation-state hacking | The Register
- #DEFCON DHS Says Collaboration Needed for Secure Infrastructure and Elections | InfoSecurity
- #DEFCON L0pht Reunite to Find Security Unimproved | InfoSecurity
- #DEFCON Government Attacks and Surveillance Continue to Increase | InfoSecurity
- DHS cybersecurity rhetoric offers contradictions at DEF CON | SearchSecurity
General
- The Most Terrifying Device Hacks From This Year’s Def Con | Slate
- Hackers Can Hijack Macs with Fake Mouse Clicks | Tom’s Guide
- SECURITY NOW 676: THE MEGA FAXSPLOIT | TWiT
- ex-NSA Hacker Discloses macOS High Sierra Zero-Day Vulnerability | The Hacker News
- Many Pre-Installed Apps In Android Have Severe Vulnerabilities | Latest Hacking News
- DEF CON Update: Researcher Shows How To Hack VPN Services Via VORACLE Attacks | Latest Hacking News
- Hacker convention in Vegas is full of tin-foil hats. Literally | Mashable
- Stylistic analysis can de-anonymize code, even compiled code | BoingBoing
- Caesars Palace not-so-Praetorian guards intimidate DEF CON goers with searches | Ars Technica
- Malware has no trouble hiding and bypassing MacOS user warnings | Ars Technica
- Google Spectre whizz kicked out of Caesars, blocked from DEF CON over hack 'attack' tweet | The Register
- In post-massacre Vegas, security policies clash with privacy values | The Parallax
- A tweet about hacking gets a google engineer in trouble | WIRED
- Invisible mouse clicks let hackers burrow deep into MacOS | WIRED
- Vegas hotel room checks raise privacy, safety concerns at DEF CON, Black Hat | CSO Online
- Bluetooth Devices at Risk From Btlejacking Takeover Attack | eWeek
- Backdoor Mechanism Discovered in VIA C3 x86 Processors | BleepingComputer
- DEF CON 2018: Telltale URLs Leak PII to Dozens of Third Parties | ThreatPost
- Hackers could hijack devices using a laptop’s USB-C charger | TechRadar
Write-ups
- Breaking Badge - The DEF CON Crazy 8s | Dead Dialect
- AI Driven Malware: DeepLocker at DEF CON | HardO*****
- A hacker's best friend is a nice employee | USA Today
- DEF CON hacking challenge swings a sledgehammer at unlucky computers | cNet
- Lessons Learned at DEF CON 26 | eSecurityPlanet
- Until next year: A look back at hacker summer camp | Portswigger
- What we hacked at Black Hat and DEF CON | Axios Breakfast at DEF CON - the greatest illicit meet up of all | Hackaday
DEF CON 25
Voting Village
"The stakeholders for voting machines are everyone in the country. So it's important the problems get fixed."
-Matt Blaze
- Hackers plan to break into voting machines to test election meddling Geobeats, AOL.com
- Personal Info of 650,000 Voters Discovered on Poll Machine Sold on eBay. Kevin Collier, Gizmodo
- Hackers and DEF CON took only 12 minutes to hack US Voting Machines. Agent Smith, LatestHackingNews.com
- DEF CON hackers find it's very easy to break voting machines. Alfred Ng, c|net
- At hacker convention, a spotlight on weaknesses in election security Hari Sreenivasan, PBS Newshour Weekend
- Hackers scour voting machines for election bugs. Jim Finkle, Reuters
- Report: Defcon 2017 to feature election hacking exhibition. Bradley Barth, SC Media
- Worried about vote hackers? Hackers are here to help. S*****R.org
- It took DEF CON hackers minutes to pwn these US voting machines Iain Thomson, The Register
- Top hacker conference to target voting machines. Edward-Isaac Dovere, Politico
- How Hackers Are Teaching Election Officials To Protect Their Voting Machines Steven Melendez, Fast Company
- To fix voting machines, hackers tear them apart Lily Hay Newman, WIRED
- These Hackers Reveal How Easy It Is To Hack US Voting Machines Thomas Fox-Brewster, Forbes
- DEF CON rocks the vote with live machine hacking. Kelly Jackson Higgins, Dark Reading
- Hacker cracks voting machine in less than 2 hours. Robert McMillan and Byron Tau, Wall street Journal
- Hackers breach dozens of voting machines brought to conference Joe Uchill, The Hill
- DEF CON vote-hacking village shows that "secure" voting machines can be broken in minutes. Cory Doctorow, BoingBoing
- For decades-old flaws in voting machines, no quick fix Seth Rosenblatt, The Parallax
- Worried about election hacking, LA County officials are turning to hackers for help Jill Leovy, LA Times
- DEF CON hackers made short work of voting machines. Now what? Matt Leonard, GCN
- Hackers break into voting machines within 2 hours at DEF CON CBS News
Internet of Things
- Smart car wash systems can be hacked and hurt people ehackingnews.com
- BBC’s Micro:bit turns out to be an excellent drone hijacking tool. Iain Thomson, The Register
- Hackers are now targeting car washes Rebecca Wilkin, New York Post
- 3Dprinted safe-cracking robot impresses at DEF CON 25 Michael Petch, 3D Printing Industry
- Hackers are coming for your jewels with this safe-cracking robot Jack Morse, Mashable
- Yes, your life-saving medical devices can be hacked Dan Tynan, The Parallax
- The $10 hack that wrecks IoT Security Lily Hay Newman, WIRED
Hardware
- $15 magnet hack turns smart gun into regular gun Alejandro Alba, Gizmodo
- Anybody can fire this 'locked' smart gun with $15 worth of magnets Andy Greenberg, WIRED
- Hacker unlocks a 'secure' smart gun with $15 magnets Alfred Ng, c|net
- Hackers Show Proofs of Concept to Beat Hardware-Based 2FA Joseph Cox, Motherboard
- Sandsifter checks your processor for secrets John Biggs, TechCrunch
Con News
- Everything looks like a hack when you're paranoid at DEF CON. Alfred Ng, c|net
- Security pros at hacker conference: be more boring. Joe Uchill, The Hill
- DEF CON's hotel business center won't print from links or USBs Cory Doctorow, BoingBoing
- Las Vegas locks down ahead of DEF CON hacking conference Iain Thomson, The Register
- Congressmen at DEF CON: Please help us, hackers! Seth Rosenblatt, The Parallax
- Paranoia and break dance battles: My first crazy hacker fest Alfred Ng, c|net
- UPS is scared of getting hacked during DEF CON Alejandro Alba, Gizmodo
- Black Hat and DEF CON: The evolution of hacker summer camp George Hulme, CSO
- Salesforce "red team" members present tool at Defcon, get fired Sean Gallagher, Ars Technica
- Black Hat at 20, DefCon at 25: Not just about breaking things Stephen Cobb, WeLiveSecurity
- Salesforce fires red team staffers who gave DEF CON. talk Zach Whittaker, ZDNet
- DEF CON's greatest hacks and the Internet of Twizzlers Stacey on IoT podcast and cybersecurity
- Kasparov talks calculated odds, AI and cyber security Seth Rosenblatt, The Parallax
Badgelife
- Building a DEF CON badge in two weeks. Brian Benchoff, Hackaday
- DEF CON Badgelife: The ESP rules all. Brian Benchoff, Hackaday
- Retro DEF CON badge made from '80s parts. John Baichtal, Hackaday
- DEF CON Badgelife: Someone finally did it Brian Benchoff, Hackaday
- Hands-on: New AND!XOR unofficial DEF CON badge Mike Szczys, Hackaday
- DEF CON Badgelife: Blinky Bling Brian Benchoff, Hackaday
- DEF CON Badgelife: The puffy that runs Linux Brian Benchoff, Hackaday
- All the hardware badges of DEF CON 25 Mike Szcys, Hackaday
- Badge from Diamond Age comes to DEF CON Mike Szczys, Hackaday
- The exquisite art and subculture of DEF CON's (unofficial) badges Roberto Baldwin, Engadget
- Behind hackers' love affair with unofficial conference badges Seth Rosenblatt, The Parallax
- IDES of DEF CON: Badge post-mortem Ides of DEF CON, Medium
- Inside this year's Queercon badge Brian Benchoff, Hackaday
Wireless
- Michael Ossman pulls DSSS out of nowhere Mike Szczys, Hackaday
- It's shockingly easy for hacker to remotely scan and clone your work security badge Jack Morse, Mashable
- CableTap Vulnerabilities Detailed at DefCon Expose ISP Gateway Risks Sean Michael Kerner, eWeek
DEF CON 24
Automotive
- Hackers show how they tricked a Tesla into hitting objects in its path Paul Szoldra, Business Insider
- Hackers Fool Tesla S’s Autopilot to Hide and Spoof Obstacles Andy Greenberg, WIRED
- Researchers show anyone can hack Tesla’s Autopilot software and force a crash Yoni Heisler, BGR
- Hackers find it's not so hard to blind Tesla's Autopilot Nick Jaynes, Mashable
- Man says Tesla Autopilot saved his life by driving him to the hospital Robert Ferris, CNBC
- Researchers trick Tesla Model S Autopilot Brandon Turkus, Autoblog.com
- Tesla Model S’s autopilot can be blinded with off-the-shelf hardware Lisa Vaas, Naked Security
- Hackers Trick Tesla S’s Autopilot Into Making Obstacles ‘Disappear’ And Crash Kavita Iyer, TechWorm
- Car Hacking: DEF CON Style Cameron Camp, WeLiveSecurity
Badge Talk
- The Incredibly Intricate Badges of DEF CON Roberto Baldwin, Engadget
- Sabotage, Hallucinations, and Hacking at DEF CON 24 Mike Brown, Inverse
- Badge Challenge Writeup DC24 Winners, Council of Nine
- Hands-On the AND!XOR Unofficial DEF CON Badge Mike Szczys, Hackaday
- Badge Challenge Writeup Degenerate Metric
- This DEF CON Badge Has a Classic 'Contra' Easter Egg Mike Brown, Inverse
- DEF CON's X86 Badge Brian Benchoff, Hackaday
CTF
- Strong showing for Pittsburgh teams in DARPA's hacking contest Paul Gough, Pittsburgh Business Times
- Carnegie Mellon Wins Third ‘World Series of Hacking’ Title in Four Years Sarah Masuda, MeriTalk
- Baidu Blue-Lotus Finishes 2nd at DEFCON, Shows China's Strength in Network Security PR Newswire
- 電腦踢館 14 國駭客!趨勢科技帶你看 DEF CON 2016 重點:「自動化找漏洞系統」 Semicon Taiwan Tech News
- Why Is This College Hacking Team So Freaking Good? Kastalia Medrano, Inverse
- Our CTF Hosts, The Legitimate Business Syndicate legitbs.net
- Major update drops for popular Pwntools penetration showbag Darren Pauli, The Register
- Carnegie Mellon Conquers All in 3rd DEF CON Capture the Flag Victory Dian Schaffhauser, Campus Technology
Cyber Grand Challenge
- Three Teams Earn Prizes in DARPA Cyber Grand Challenge Cheryl Pellerin, DoD News, Defense Media Activity
- Despite Obstacles, UCSB Hacking Team Places 3rd at 2016 Cyber Grand Challenge Sonia Fernandez, Noozhawk.com
- Bug Hunting Cyber Bots Set to Square Off at DEF CONChris Brook, Threatpost
- Automating Cybersecurity Kenneth Chang, New York Times
- Watch AI hack into AI at DARPA’s Cyber Grand Challenge Cecil Kleine, TheNextWeb
- Pittsburgh-based team wins $2M DARPA Grand Cyber Challenge Greg Otto, fedscoop
- AI hackers will make the world a safer place -- hopefully Roberto Baldwin, Engadget
- Like Battlebots, Except These Robots Automatically Patch CyberSecurity Holes Aliya Sternstein, DefenseOne
- White hat hacker AI bots prepare for DARPA's DEF CON cyber brawl Iain Thomson, The Register
- DARPA's Cyber Grand Challenge Heads to DefCon Sean Michael Kerner, eWeek
- DARPA's Cyber Grand Challenge Is A Glimpse Of Our Human-Free Future William Turton, Gizmodo
- DARPA Cyber Grand Challenge Ends With Mayhem Sean Michael Kerner, eWeek
- Hackers Don’t Have to Be Human Anymore. This Bot Battle Proves It Cade Metz, WIRED
- Geeks win millions for teaching computers to battle each other Jim Finkle, Reuters
- Carnegie Mellon’s Mayhem AI takes home $2 million from DARPA’s Cyber Grand Challenge Devin Coldewy, TechCrunch
- DARPA Challenge Takes AI To War Games John Markman, Forbes
- Seven automated hacking systems will compete for a $2 million prize on Thursday Russell Brandom, The Verge
- DARPA Competition Aims to Help Automate Computer Security Jay Clemens, ExecutiveGov.com
- DARPA's Machine Challenge Solves CrackAddr Puzzle Sean Michael Kerner, eSecurity Planet
- 'Mayhem' program wins grand hacking challenge BBC News
- 'Mayhem' Takes $2M First Prize in DARPA Cyber Grand Challenge Dan Heilman, Top Tech News
- Should we be worried about robot bug hunters? Nicole Kobie, ITPro.co.uk
- Forget Rio Olympics, DefCon Is Giving 2 Million USD For Hacking Suchayan Mandal, Lifehacker In dia
- A supercomputer is taking on humans in a hacking contest at DEF CON Michael Kan, PC World
- Hackers demonstrated first ransomware for IoT thermostats at DEF CON Darlene Storm, ComputerWorld
- Chinese team shows strength in int'l network security competition Xinhua, Shanghai Daily
Fed Talk
- US Politicians tell DEF CON it'll take Congress ages to sort out how to regulate crypto Iain Thomson, The Register
- DEF CON: How feds' outreach plays with the hacker crowd Randy Apuzzo, GCN
- #DefCon US Government Only Holds Dozens of Zero-Days Dan Raywood, Infosecurity Magazine
- NSA denies ‘Raiders of the Lost Ark' stockpile of security vulnerabilities Alex Hern, The Guardian
- Feds Keep a Lower Cyber Arsenal Than Tech World Believes Newsmax
- #DefCon FTC Stresses IoT Concerns Dan Raywood, Infosecurity Magazine
- FTC Goes to DEF CON Lorrie Cranor, FTC.gov
- FTC seeks research help from DEF CON hackers Tim Greene, NetworkWorld
- FTC Commissioner Looking for Hackers' Help With Consumer Privacy Sean Michael Kerner, eWeek
- How the Government ins Waging Crypto War 2.0 Daniel Oberhaus, Moterboard
- When Government Secrets Keep You Safe Robert Hackett, Fortune
General
- Here's what it's like at America's largest hacking convention Daniel Howley, Yahoo! Finance
- Impressions From DEF CON 24: The Machines Are Rising Paul Ionescu, SecurityIntelligence.com
- Def Con Has Always Been Straight, White, and Male, But It’s Finally Changing Daniel Oberhaus, Motherboard
- How to hack a government Roberto Baldwin, Engadget
- DEF CON 24: THE OFFICIAL SOUNDTRACK beatport.com
- You can buy lock picks, Wi-Fi hacking tools, and more at the world's biggest hacking conference Paul Szoldra, Business Insider
- Defcon deals: Five hacking tools for $100 or less Laura Hautala, c|net
- John McAfee declares war on Kim Dotcom: Fight erupts between tech's most controversial figures Mary-Ann Russon, International Business Times
- DefCon: How the Hacker Tracker Mobile App Stays Secure Sean Michael Kerner, eWeek
- Elliot’s reality is murky, but Mr. Robot tech advisors remind us the show’s is not Nathan Mattise, Ars Technica
- DEF CON 24's "Rise of the Machines" Warns of Robot Uprising Catrina Dennis, Inverse
- Not Going to DEF CON? 5 Things to Wach from the Hacker Con Nathaniel Mott, Inverse
- "The Stakes are Higher Then Ever" for Hackers at DEF CON 24 Nickolaus Hines, Inverse
- This Guy Let Me Control His Hacked Wheelchair With An Xbox Gamepad Thomas Fox-Brewster, Forbes
- Blue Screen of Death Brain Benchoff, Hackaday
- Data Sheet—Saturday, August 6, 2016 Robert Hackett, Fortune
- Def Con: The hackers bringing Mr Robot to life Mark Ward, BBC News
- The state of cybersecurity: we're all screwed Dan Tynan, The Guardian
- Gov't thinks it has right to data, Lavabit founder says Teri Robertson, SC Magazine
- DEF CON 24: Day One Tom Palarz, Veracode
- DEF CON: a Hacker's ParadiseClick, BBC
- Lessons from a digital mercenary: Beware the ‘October Surprise' Sara Sorcher, The Christian Science Monitor
- Disable WPAD now or have your accounts and private data compromised Lucian Constantin, IT World
- Road Warriors: Beware of 'Video Jacking' Brian Krebs, Krebs on Security
Internet of Things
- #DefCon: Thermostat Control Hacked to Host Ransomware Dan Raywood, Infosecurity Magazine
- DEFCON: BtleJuice MitM Hacks Bluetooth (and belittles Bluetooth Padlock security) Sean Michael Kerner, InternetNews.com
- DEF CON Researchers Hack A Dell Monitor To Show Any Pixels They Want Logan Booker, Gizmodo Australia
- High-security electronic safes can be hacked Lucian Constantin, ComputerWorld
- US seismic sensors let hackers trigger false alerts and fake data James Walker, Digital Journal
- Hacker Unlocks ‘High Security’ Electronic Safes Without a Trace Lily Hay Newman, Wired
- If you use ‘smart’ Bluetooth locks, you're asking to be burgled Iain Thomson, The Register
- Researchers Infect IoT Thermostat with Ransomware Catalin Cimpanu, Softpedia
- Your 'intimate personal massager' – cough – is spying on you Iain Thomson, The Register
- Defcon heats up with smart thermometer ransomware Jon Martindale, Yahoo! Tech
- Hackers Make the First-Ever Ransomware for Smart Thermostats Lorenzo Franceschi-Bicchierai, Motherboard
- Proof-of-concept ransomware for smart thermostats demoed at Defcon Cory Doctorow, BoingBoing
- Researcher finds huge security flaws in Bluetooth locks Roberto Baldwin, Engadget
- Hacking Hotel Keys and Point of Sale Systems at DEF CON Sean Michael Kerner, eSecurity Planet
- How to prevent your security camera from being hacked Taylor Martin, c|net
- Someone made a smart vibrator, so of course it got hacked Alex Hern, The Guardian
- Black Hat USA and DefCon: Finding Security Risks in All the ThingsSean Michael Kerner, eWeek
- Solar panels, vacation Wi-Fi at risk for hacking Elizabeth Weise, USA Today
- This ***** toy tells the manufacturer every time you use it Kashmir Hill, Fusion
- #DefCon: Thermostat Control Hacked to Host Ransomware Dan Raywood, Infosecurity Magazine
- Hedberg is a Bionic Hand Made From a Single Keurig Cameron Coward, Hackaday
- Thermostat Ransomware: a Hack Explained Sue Walsh, RTInsights.com
- Not even your vibrator is safe from data-mining, hackers prove Ariel Bogle, Mashable
- Hackers Could Break Into Your Computer Monitor And Manipulate Your Pixels Kavita Iyer, TechWorm
- Def Con: Do smart devices mean dumb security? BBC News
- The Internet of Dildos is Watching You Daniel Oberhaus, Motherboard
- This PC monitor hack can manipulate pixels for malicious effect Michael Kan, ITWorld
- Your monitor can be hacked, used to spy on you Shawn Knight, TechSpot
- Hackers can force your monitor to permanently display images James Walker, Digital Journal
- Researchers: Hackers could weaponize up to a billion monitors to spy on everyone Joel Hruska, ExtremeTech
- 1 billion computer monitors vulnerable to undetectable firmware attacks Cory Doctorow, BoingBoing
Mobility
- Major Qualcomm chip security flaws expose 900M Android users Tom Mendelsohn, Ars Technica
- How Qualcomm Flaws Left 900 Million Android Devices Vulnerable to Spies David Meyer, Fortune
- Android chip vulnerability leaves millions of devices open to attack Greg Otto, fedscoop
- Quadrooter: More than 900 million Android devices have a critical security flaw Kyle Wiggers, Digital Trends
- Newly Announced Chipset Vuln Affects 900 Million Android Devices Ericka Chickowski, Dark Reading
- Quadrooter is the Latest Android Malware Scare Reminding You to Stick to Google Play Kellex, DroidLife
- Researchers Find Serious Bugs in Android Devices that Use Qualcomm Chips Alina Maring, CDA News
- Qualcomm Vulnerabilities Put 900 Million Android Devices at Risk Jeffrey Burt, eWeek
- Hacker Creates Fake, Effective Boarding Passes David Z. Morris, Fortune
- Fake QR code app gets hacker into luxury airport lounges for free Lisa Vaas, Naked Security
- Traveler Hacks His Way Into Fancy Airport Lounges Laura Northrup, Consumerist
- Samsung Pay hack lets attackers skim cards to make fraudulent payments James Vincent, The Verge
- Samsung Pay Warning: How Hackers Can Intercept Credit Card Info Karl Utermohlen, InvestorPlace
- DEF CON: Samsung Pay Hacked Sean Michael Kerner, InternetNews
- Samsung downplays Def Con 24 claims that Samsung Pay can be hacked John Kennedy, Silicon Republic
DEF CON 23
Automotive
- Want to hack a car? Don't try hacking a Tesla. Yoni Heisler, BGR
- Hacking a Tesla Model S: What we found and what we learned Kevin Mahaffey, Lookout Blog
- How Hackers Tore Apart A Tesla Model S To Kill The Car Mid-Drive Thomas Fox-Brewster, Forbes Tech
- Here is how you learn to hack a car Andrea Peterson, The Washington Post
- This Hacker’s Tiny Device Unlocks Cars And Opens Garages Andy Greenberg, Wired
- DEF CON 23: la panoplie de hacker pour voler une voiture connectée Gilbert Kallenborn, 01net.com
- DEF CON 23: comment des hackers ont piraté la Tesla Model S Gilbert Kallenborn, 01net.com
- Automakers trying to prevent hackers from comandeering cars Tom Krisher, AP
- Hacked Jeep Cherokee Exposes Weak Underbelly of High-Tech Cars Jordan Robertson, Bloomberg
- 10 years after his epic MySpace hack, Samy Kamkar is trying to turn hackers into heroes Kashmir Hill, Fusion
- More Car Hacks from DEF CON 23 Douglas Mechaber, Tom's Hardware
- OwnStar Wi-Fi attack now grabs BMW, Mercedes, and Chrysler cars’ virtual keys Sean Gallagher, Ars Technica
- Highway to hack: why we’re just at the beginning of the auto-hacking era Sean Gallagher, Ars Technica
- Tesla hackers explain how they did it at DEF CON Antuan Goodman, CNET
- Black Hat and DEF CON Tech Tent, BBC World Service
- This piece of $30 Electronics Can Unlock Your Keyless Entry Car Aaron Mamiit, Tech Times
- This $30 device defeats almost any keyless car or garage door Steve Dent, Engadget
- Hackers Might Help Defending Tesla's High-Tech Cars Vlad Tverdohleb, Itechpost
- DEF CON focuses on vehicle security and beyond in wake of Jeep hack Heidi Hoopes, Gizmag.com
- Hackers Take Control of a Tesla, Sort Of Danny Yadron, Wall Street Journal
- Tesla's Model S hack still proves it's better than other car makers Devindra Hardawar, Engadget
DEF CON Badge
- Is this the most puzzling DEF CON attendee badge yet on record? Neil McAllister, The Register
- Uber badges, coveted by hackers, glow radioactive at Def Con The Japan Times
- Badge Challenge Writeup Elgin
- All the unofficial electronic badges of DEF CON Mike Szczys
- The man making puzzles for hackers Mark Ward, BBC News
- DEF CON 23 Badge Challenge PotatoHat Security Blog
Clickjacking
- Kaminsky Creates Clickjacking-Killer Kelly Jackson Higgins, Dark Reading
Crypto
- DefCon ProxyHam Talk Disappears but Technology is No Secret Sean Michael Kerner, eWeek
- Why Did A Security Firm Mysteriously Ditch a 'Privacy' Product? Yael Grauer, Forbes Tech
CTF
- DEF CON Coverage Cyberfed YT Channel
- How to Prepare Your Team for a CTF Competition, DEF CON Style OnWebSecurity Blog
- CS Student Duo Brings Victory in International Hacking Competition Tyler Sharp, cc.gatech.edu
- Korean team wins top prize at 'Hackers World Cup' for first time Donga.com
- DEF CON 2015 CTF Finals Cybersmashup
- DEFKOR CTF Win Writeup (Korean) Daum.net
Cyber Grand Challenge
- DEF CON 23: Attention, les robots-hackers vont débarquer Gilbert Kallenborn, 01net.com
- Hackers to Military: Replace Us with Robots? HA! Patrick Tucker, DefenseOne
DEF CON Shoot
- A journey into DEF CON country Mark Ward, BBC
- Shoot Badge Overview 533ess
Disclosure
- DEF CON 23: Two major roadblocks to cyber diplomacy, says former US diplomat Warwick Ashford, ComputerWeekly.com
Drones
- Drone at DEF CON Hacks from the Sky Kelsey Atherton, Popular Science
- Aerial Assault Drone, the new Hacking Weapon presented at the Defcon Pierlugi Paganini, Security Affairs
- Someone at DEF CON Made a Drone That Hacks Computers Patrick Tucker, DefenseOne
Internet of Things
- Why 'Smart' Objects May be a Dumb Idea Zeynep Tufekci, The New York Times
- DEF CON 23 "How To Train Your RFID Hacking Tools" Preview Craig *****, Tripwire Blog
- Iranian hackers broke into what they thought was a Chevron gas pump — but it was a honeypot Kashmir Hill, Fusion
- DEF CON 23 to host Internet of Things slaughterfest Darren Pauli, The Register
- Hackers can steal Gmail passwords from Samsung "smart" refrigerators Jennifer Abel, Consumer Affairs
Interviews
- 20 Minutes with the Dark Tangent Kelly Jackson Higgins, Dark Reading
- Black Hat, DEF CON Founder Offers Insights Into Security Shows, Trends Chris Preimesberger, eWeek
- DEF CON Interview: John McAfee Gr3ynoise Podcast
- DEF CON Interview: Cooper Quintin Gr3ynoise Podcast
- DEF CON Interview: Josh Pitts Gr3ynoise Podcast
- DEF CON Interview: Nikhil Mittal Gr3ynoise Podcast
- DEF CON Interview: Kelley Misata Gr3ynoise Podcast
- Facebook security chief Alex Stamos' ambitious plan to connect the world—securely Robert Hackett, Fortune
Kali Linux
- Kali Linux 2.0 to launch at DEF CON 23Darren Pauli, The Register
Mobile
- Chinese Unicorn Team Hacks GPS at DefCon Sean Michael Kerner, eWeek
- Stagefright: Everything you need to know about Google's Android megabug Robert Hackett, Fortune
- DEF CON 23: Digital certificates key to mobile security, says researcher Warwick Ashford, ComputerWeekly.com
Overview
- Imploding Barrels and Other Highlights from Hackfest DEF CON Kim Zetter, Wired
- Paranoia Made Me a Better Computer User Adam Clark Estes, Gizmodo
- 10 scary hacks from Black Hat and DEF CON Lucian Constantin, Computerworld
- DEF CON 2015 Fr, Robert Ballecer, TWit/Coding 101
- Hackers share intelligence and compete in Las Vegas David Grossman, BBC Newsnight
- Hackers and Feds Clash in Las Vegas Luke Rudkowski, WeAreChange
- TekThing 32 Patrick Norton, Shannon Morse, TekThing
- News from DEF CON 23: fake deaths, DHS and Tesla court hackers Violet Blue, ZDNet
- What's the Top Story at This Year's DEF CON? Emily Chang, BloombergBusiness
- Bugcrowd podcast Bugcrowd
- Want to be Totally Secure on the Internet? Good Luck. Laura Hautala, CNet
- A Million Ways to Break In at the World's Largest Security Gathering Laura Hautala, CNet
- Heists go Hollywood with DEF CON Hacks Glenn Chapman, Phys.org
- Abandon All Hope, Ye Who Log On Here Joe Bernstein, BuzzFeed
- A look inside the hostile, helpful world of hacking conventions Amanda Schupak, CBS News
- Meet the World's Most Dangerous Geeks Dan Tynan, Yahoo! Tech
- Hacking Tesla, Breaking Banks and Killing People Online: The Best of DEF CON 2015 Jeff Stone, IBT Pulse
- Cybersecurity: Viva Lessons from Las Vegas Steve Weisman, USA Today
- When Fear of Being Hacked Takes Hold Lily Hay Newman, Slate
- Surviving the DEF CON Hacker Conference Roberto Baldwin, Engadget
- What I Learned at DEF CON Nathan White, AccessNow Blog
- VITB Podcast: DEF CON 23 Recap Vince, Vince in the Bay Podcast
- Post DEF CON Depression Gr3ynoise Podcast
- Six Scary Revelations from 2015 DEF CON Hacker Conference Clint Davis, ABCActionNews.com
- Salted Hash: Live from DEF CON 23 Steve Regan, CSOOnline.com
- Skateboards, Drones and Your Brain, Everything Got Hacked Alex Hern, The Guardian
Physical Security
- DEF CON Hackers Tell How They Cracked a Brinks Safe in 60 Seconds Sean Kerner, eWeek
- Fiber Optic Tapping - Tapping Setup Josh Ruppe, DC23 Demo Labs
Politics
- A Congressman Goes to DEF CON Patrick Turner, DefenseOne
- Death to DRM Iain Thompson, The Register
Queercon
- Let’s hack Grindr! Queercon helps diversify tech field Wesley Juhl, Washington Blade
Robocalls
- RoboKiller wins FTC prize by annihilating robocalls Sean Gallagher, ArsTechnica
- FTC to Use DEF CON Event to Strike Back Against Robocalls Sean Michael Kerner, eWeek
- Why the FTC is Showing Up at Hackers' Biggest Conferences Andrea Peterson, Washington Post
Rootz
- *****ren of DEF CON Roberto Baldwin, Engadget
Rumor Department
- DEF CON is Cancelled, Again Jordan Pearson, Motherboard
SCADA
- Breaking critical infrastructure in a quest for solutions Blake Sobczak, eenews.net
- Physical Damage: SCADA Attacks Easily Theorized, Hard to Execute Owen Lystrup, OpenDNS Blog
- How to Damage a Chemical Plant Over the Internet Tom Simonite, MIT Technology Review
Social Engineering
- DEF CON Hacker Details How to Forge Death, Birth Records Online Sean Michael Kerner, eWeek
- How this hacker can virtually kill you and what to do about it Sara Sorcher, Christian Science Monitor
- Yes You Can Help Me Today: Social Engineering at DEF CON 23 OpenDNS Blog
- DEF CON Social Engineering CTF Recap Brett DeWall, DeWall on Security
- Hackers now using conversation skills to get your info FoxNews.com
- Chris Hadnagy on the DEF CON Hackers Posing as Your Co-workers Joe Uchill, Christian Science Monitor
- Birth Then Kill a Virtual Baby for Fun But Mostly Profit Roberto Baldwin, Engadget
- It's Incredibly Easy to Bump Someone Off Online Iain Thomson, The Register
DEF CON 22
Blackphone
Car Hacking
Crypto
DEF CON General
Email Hacking
Hacking Politics
Hacking the Internet of Things
Physical Security
Privacy
SOHOpelessly Broken
War Kitteh
Zapping Rachel
DEF CON 21
General
- 5 Tips for surviving DEF CON 21 | C/NET
- 5 scariest cybersecurity threats at Black Hat, Defcon | CBS
- The five scariest hacks we saw last week | CNN
- Def Con 21: Hacks, Cracks und Edward Snowden | Computer Bild
- Black Hat, DEF CON Put Spotlight on Major Security Issues, Hacks | eWeek
- Hackers take over Las Vegas | FoxNews
- Democratizing the creep factor: Anyone can play NSA, "Ocean's 11″ and cyberstalker | Gigaom
- How to tell DEF CON and Black Hat Apart | Gigaom
- False sense of security: Your TV, car, neighborhood may be hackable | Gizmag
- Don't get pwned at Black Hat, DEF CON | Help Net Security
- DEF CON: Hacking for the Rest of Us | Huffington Post
- Al via Defcon: quando gli hacker esplorano i limiti della sicurezza informatica ("At the start Defcon: when hackers explore the limits of computer security") | Il Sole 24 Or
- Black Hat / Def Con 2013 | Zataz
- A DEF CON postscript: Said the FBI agent to the taxi driver | ZDNet
- DEF CON 21 in Pictures | ZDNet
- DEF CON 21: Best in Show | ZDNet
- Postcards from DEF CON 21 | ZDNet
- Tech Week That Was: Suspicious Searches, Def Con And Moto X | NPR
- What We're Watching As World's Big Hackers Meet In Las Vegas | NPR
- At Def Con, hackers join together to 'hack everything' | NPR/Marketplace
- An Inside Look At The Hacker Conferences | NPR/WGBH
- How Not to Get Hacked at Black Hat and DefCon | PCMagazine
- Surveillance drones and Uncle Sam: Hackers take on all at DefCon 21 | RT
- Slideshow: August 2013 threat stats | SC Magazine
- What Happens At DefCon Stays With Us All | TechCrunch
- Hack the mini bar, spot the feds, DEF CON is back | The Conversation
- Hackers gather—and mourn a big loss | The Economist
- The best of Black Hat and Def Con 2013 | The Verge
- The top 10 new reasons to be afraid of hackers | The Verge
- Tin tặc thế giới hội tụ ở Las Vegas ("Hackers world converged in Las Vegas") | tienphong online
- DEFCON 21: THINGS YOU MAY HAVE MISSED | Tripwire
- Def Con, Day One: Can I Use Your Wi-Fi Please? | Vice
- Def Con, Day Two: Def Con Is for Winners | Vice
- How To Get Hacked At Defcon | Vice
Car Hacking
- Car hacking code released at Defcon | C/NET
- White hat hackers to release software used to crack critical car systems at Def Con | Afterdawn
- Hackers Offer Advice To Automakers On How To Prevent Attacks | AOL
- Hackers break into cars, steer them with old game controllers | Calgary Herald
- Wireless Car Hacking Demonstrated in New Video | Carscoops
- Sleuths To Demo Car Hack Gone Steer-Crazy | CIO Today
- Hackers Control Car's Steering And Brakes | CNN Money
- Hackers hijack software in a CAR and remotely control the steering, brakes and horn using a laptop | Daily Mail UK
- Car Hackers Release Tools | Dark Reading
- Networked Cars Are Coming, But Their Hacks Are Already Here | Discover
- Car Hacking: Here's Code, Have at It | EETimes
- TI Illustrates Car Security Threats | EETimes
- Automotive takeover schemes to be detailed at Defcon hacker conference | Engadget
- Hackers Reveal Nasty New Car Attacks--With Me Behind The Wheel (Video) | Forbes
- Hackers plan to offer blueprint for taking over Prius, Escape | FoxNews
- Cisco's remedy for connected car security: Treat the car like an enterprise | Gigaom
- DEFCON: Hackeando autos y vehículos no tripulados ("DEFCON: Hacking cars and unmanned vehicles") | el semanario
- Researchers reveal methods behind car hack at Defcon | IDG/Techworld
- DEF CON:黑客公布入侵汽车工具 ("DEF CON: Hackers publish invasion Automotive ") | China Byte
- Hacker safety risk for new cars | Motoring
- Tools, code to control Ford and Toyota test cars released | SC Magazine
- DefCon car hacking talk will detail how an outsider can "physically control" the vehicle | SCMagazine
- Defcon 21 : des explications sur le piratage de voitures ("Defcon 21: explanation of piracy Car") | IDG/Lemonde Informatique
- Hackers to detail methods used to overtake Prius, Escape at Def Con | TechSpot
- Duo hacks cars with '80s Nintendo controller | The Vancouver Sun
- Hackers Hijack Prius with Mac Laptop | Tom's Guide
- Defcon hackers release Ford and Toyota car hijack data | v3.co.uk
- How driverless cars will be wide open to hacking | VentureBeat
- How Easily Can a Moving Car Be Hacked? | Vice
- Defcon to deliver auto industry wake-up call | Japan Times/AFP JIJI
- Software experts attack cars, to release code as hackers meet | Reuters
- Hackers 'take control' of Toyota Prius | Telegraph UK
- Here's how hackers could crash your car | The Washington Post
Lock Security/Sport
- 'Do Not Duplicate' Means Nothing to the MIT Students Replicating High-Security Keys with a 3D Printer | BostInno
- No cameras! MIT students 3D print 'high security' keys — all they need is a photo | Boston.Com
- DEF CON Reminds Us of the Importance of Physical Security | eWeek
- US students plan to release program that will copy high-security keys | Metro
- Picking Locks and Hacking Servers at Defcon | The New York Times
- Why Are We Still Using Keys? | Vice
- Millions of Kwikset Smartkey Locks Vulnerable to Hacking, Say Researchers | Wired
Bitcoin
- Raspberry Pi-powered briefcase converts loose change into bitcoin | CoinDesk
- Bitcoin Suitcase Converts Spare Change Into Digital | PSFK
- Bitcoin suitcase eats your pocket change, spits out digital currency | The Verge
Rootz Kidcon
- DEF CON ***** To Get Badges That Hack | Dark Reading
- At Def Con, ***** Can Hack Too | The Wall Street Journal
Legal/Civil Rights
- ACLU at DEF CON 21! | ACLU Blog
- Even with EFF's Congressphone, activism is a hard sell | C/NET
- What Security Researchers Need to Know About the Law | eWeek
- NSA And Aaron Swartz Hot Topics At Hacking Conferences | NPR/WBUR
Feds
- Relatie NSA en 'goede' hackers sterk bekoeld ("Relationship NSA and "good" hackers strongly cooled") | AutomatiseringGids
- At hacker conferences, government surveillance takes center stage | CBS
- Gov't surveillance overshadows hacker conferences | CBS
- Leaker Snowden riles hacker conferences | CNBC
- Defcon founder's message to feds fair to some, hypocritical to others | Computerworld
- FBI turning to private sector to hack phones, exploit unknown security holes | Engadget
- Hackers Just Banned the Feds from Attending DEF CON This Year | Gizmodo India
- Agenten bitte draußen bleiben! ("agents please stay out!") | Golem
- Defcon no dejará entrar a los federales a la conferencia de hackers ("Defcon not the feds will let the hacker conference") | Fayerwayer
- DefCon Hacker Conference to Feds: 'We Need Some Time Apart' | Mashable
- FBI Spies on Suspected Criminals by Hacking Into Computers | Mashable
- NSA at Defcon? More like No Spooks Allowed | NBC
- There May Be Some Feds at Defcon After All | Nextgov (blog)
- Hackere kaster ut FBI ("Hackers throw out FBI") | NRK
- Ex-CIA official to address government-wary hackers | Reuters
- NSA revelations could hurt collaboration with 'betrayed' hackers | Reuters
- Feds asked not to attend Def Con hacker meeting over NSA scandal | RT
- DefCon: Former DHS cyber official to private sector: Gov't can't help you with intelligence | SCMagazine
- At a Hacker Conference, Plenty of Friendly Federal Agents | The New York Times
- Security bods boycott DEF CON over closed door for feds | The Register
- After Snowden leaks, feds lose their hacker cred at Def Con | The Verge
- Def Con founder asks feds to skip hacker conference, citing high tensions after NSA leaks | The Verge
- FBI Taps Hacker Tactics to Spy on Suspects | The Wall Street Journal
- Obama: Technologies Can Block Snooping | The Wall Street Journal
- Where Hackers and Spooks Mingle | The Wall Street Journal
- FBI Tor exploit appears on Metasploit penetration tester forum | v3.co.uk
- The Big Def Con Question: Would You Work for the NSA? | Vice
- The NSA Is Not Spying on You, Claims NSA Official at DefCon | Vice
- Without Def Con, the Feds Have a Hacker Recruitment Problem | Vice
- Правительство США впервые не пригласили на конференцию хакеров DefCon ("The U.S. government is not the first time invited to the DefCon hacker conference") | VZ.ru
- NSA SPY SCANDAL SPARKS HACKER REBELLION | WND
- NSA shows how to really screw up a PR campaign | VentureBeat
- Hacker community Ripped by Surveillance scandal | spyghana.com
- US Government War On Hackers Backfires: Now Top Hackers Won't Work With US Government | Techdirt
Smart Devices and Homes
- Can your "smart TV" watch you? | CBS
- Smart TV camera hack creates a window into your home | CBS
- Samsung's Smart TV can spy on you | Channel 24
- 'Smart homes' are vulnerable, say hackers | CNN
- With the Rise of Malware, Your Dumb Home May Be Safer Than a Smart Home | Gotta Be Mobile
- TVs to toilets: What will hackers target next? | MSN News
- If you think cybercrime is scary now, just wait until hackers can control and monitor every object in your environment | Quartz
- Consumer Device Hacking Concerns Getting Lost In Translation | Slashdot
- How to Spy on Your Neighbors With a USB TV Tuner | Tom's Guide
- Das Internet der gehackten Dinge ("The Internet of things chopped") | Zeit Online
Mobile Security/Malware
- Can you hear me now? Yeah, hacked Verizon device can nab your texts and photos too | Computerworld
- Femtocell hack reveals mobile phones' calls, texts and photos | CNN Money
- Fake charger lets hackers infect iPhones | CBS
- This Fake Charger Will Hide A Trojan In Your iPhone's Facebook App | Forbes
- PIN-punching $200 robot can brute force every Android numeric screen-password in 19 hours | Boingboing
- PIN-Punching Robot Can Crack Your Phone's Security Code In Less Than 24 Hours (Video) | Forbes
- Russia home to text fraud 'cottage industry' | AFP/GloabalTimes
- Russia home to text message fraud "cottage industry" | AFP/Phys . ORG
- Anatomy Of A Russian Cybercrime Ecosystem Targeting Android | Dark Reading
- DIY Total Information Awareness spying for cheap with CreepyDOL | Computerworld
- 'Creepy' spy computer turns your real big brother into the NSA | Digital Trends
- One Hacked Android User Can Lead To An Enterprise Breach | Dark Reading
- Hacker's Tiny Spy Computers Aim To Track Targets Around Entire Neighborhoods And Cities | Forbes
- One third of all mobile malware is produced by just 10 Russian companies | Gigaom
- Android's One-Click Google Auth Is a Buffet for Hackers | Gizmodo
- Disposable Spy Computers Are Disturbingly Easy And Cheap To Make | Gizmodo AU
- Compromising Google Accounts and enterprises via flaw in Android SSO | Help Net Security
- Researchers create DIY IDS for identifying hacked smartphones | Help Net Security
- Android Malware Will Hit One Million Mark in 2013 | IBTimes
- Android one-click Google authentication method puts users, businesses at risk | IDG/Computerworld
- Android One-Click Google Apps Access Cracked | InformationWeek
- Hackers Convert Verizon Device Into Mobile Spy Stations | Mashable
- Operation 'Dragon Lady' Uncovers Huge Russian Android SMS Fraud Network | Mashable
- Malware-as-a-service blossoms in Russia, vendor research finds | Network World
- Def Con conference: Android phone bug allows hackers to read texts and email | New York Daily News
- How hackers tapped into my cellphone for less than $300 | NPR
- Hack this: Researchers turn Verizon device into 'mobile spy station' | RT
- Creativity in the cloud and traps of Russian malware | Russia Beyond the Headlines
- Android hack opens access to users' email | T3
- DEF CON: 30 Percent Of Mobile Malware Made By 10 Russian Firms | Techweek Europe
- 3D-printed 'Robotic Button Basher' cracks phones' PINs using persistence, luck | The Independent
- A Cheap Spying Tool With a High Creepy Factor | The New York Times
- Earn £8,000 a MONTH with bogus apps from Russian malware factories | The Register
- Android mobile frauds: Russian malware leads | The Times of India/AFP
- Inexpensive Cellular IDS Allows for Inspection of Cell Traffic | Threatpost
- Researchers Hack Verizon Device, Turn it Into Mobile Spy Station | Voice of America
- Researchers Develop DIY System to Detect Malware on Mobile Phones | Wired
Badge/Badge Challenge
- Gutting and solving the heart of the cards at Def Con 21 | C/NET
- Hidden Circuits and Handmade Clockwork: The Striking Intricacies of Def Con Badges | Wired
Will Smith
- Will Smith makes unexpected appearance at Defcon hacker conference | IDG/TechHive
- Actor Will Smith Hangs Out With Hackers | Infopackets
- Will Smith hace aparición sorpresa en la conferencia de hackers Defcon | PYSN Noticias
- Will Smith faz aparição inesperada na conferência hacker Defcon | IDG Now
Social Engineering
- Dating guru resurrects Robin Sage by social engineering TS/SCI holders on LinkedIn | CSO
- DEF CON attendees demonstrate social engineering prowess in CTF contest | CSO
- How to avoid a social engineering attack at Black Hat and Def Con | CSO
- Hacking people | ITWeb
- Dating coach 'hacks people' to find sensitive defence secrets | News.com.au
- Dating coach shows how to get classified military intel using social engineering | The Verge
EFF Crypto Shirt
- Decrypting EFF's DEFCON crypto-challenge tee | Boingboing
- Can You Solve the Encryption Puzzle In the EFF's Def Con T-Shirt? (Updated) | Gizmodo
- EFFのDefConシャツ、解読できる人?("DefCon shirt EFF, somebody who can decipher?") | Gizmodo Japan
Documentary
- DEFCON: A Documentary About the World's Largest Hacking Conference | Gizmodo
- DEFCON: The Documentary, a record of the 20th annual conference | Metafilter
- Hacker-Doku online: "Defcon: The Documentary" | Zeit Online
- Watch this: 'Def Con: The Documentary' covers two decades of a giant hacker meetup | The Verge
IPV6
- Researchers release tool to pickup the SLAAC in Man-In-The-Middle attacks using IPv6 | CSO
- Easy-to-use attack exploits IPv6 traffic on IPv4 networks | GCN
- DEFCON: Ataques al protocolo IPv6 ("DEFCON: Attacks to IPv6") | el semanario
- What is Facebook doing at a hacker convention in Vegas? | The Verge
- Facebook Makes Friends With Hackers | The Wall Street Journal
Wireless
- Wi-Fi routers: More security risks than ever | C/NET
- WiFi Pineapple Penetration-Testing Tool Sparks Interest at DEF CON | eWeek
- The WiFi Pineapple makes it easy to hack wireless devices | FierceCIO
Misc
- U of C prof heads to hackers' conference in Vegas | Calgary Herald
- 10 Sci-Fi Hacks That Are Now a Reality | Huffington Post
- Researchers demo new IPv6 attack against Windows 8 PCs | ComputerWorldUK/Techworld
- Criminal minds in the channel | CRN
- Def Con 'Crack Me if You Can' Contest Picks Apart Passwords | eWeek
- 5 Top Targets for Today's Hackers | Forbes
- The Type Of People Who Get Suckered By A Twitter Bot | Forbes
- Wall Of Sheep Hacker Group Exposes NFC's Risks At Def Con 2013 | Forbes
- Researcher builds botnet-powered distributed file storage system using JavaScript | IDG/Javaworld
- "安全宝蓝莲花"盛放全球黑客海天盛筵 (" "Safe Treasure Blue Lotus" bloom global hacker Rendez-Vous ") | CCTV
- Le botnet utilisé pour le stockage de fichier ("The botnet used for file storage") | ICT Journal
- Q+A: Ralph 'The Ethical Hacker' Echemendia talks Snowden, Feds and DefCon | Las Vegas Sun
- HOW DOES A VEGAS CASINO STAY SAFE DURING DEF CON? | Las Vegas Weekly
- McAfee CTO Expected to Join Department of Homeland Security | Law.com
- Defcon 21 : l'accès simplifié aux services Google pointé du doigt ("Defcon 21: simplified access to Google services fingered") | Lemonde Informatique
- The 26-Year-Old Montana Legislator Fighting for Your Online Privacy | Mashable
- DEF CON 21大会 那些跌破眼球的创意 ("DEF CON 21 meeting those below the eye of the creative") | Zol . COM . cn
- 图片报道:全球最大黑客大会DEF CON 21 ("Photo Report: the world's largest hacker conference DEF CON 21") | Enet . com . cn
- Forensic Experts Poke Holes in Snapchat and Facebook | Mashable
- Def Con und Black Hat: Hacker und Geheimdienste treffen sich in Las Vegas | Netzpolitik
- DEF CON Hackers Unveil a New Way of Visualizing Web Vulnerabilities | Slashdot
- How should you protect yourself from cyber surveillance? | The Guardian
- How should you protect yourself from cyber surveillance? | Raw Story
- Convenient Google WebLogin Tokens Can Expose User Accounts, Data | Threatpost
- Why making 'consent' the center of privacy law is important | VentureBeat
DEF CON 20
Keynote
- NSA Boss Wants More Control Over the Net | Technology Review
- U.S. Spy Chief Asks Hackers to Help Government Secure Internet | Reuters
- NSA Chief: 'Internet at Great Risk, Needs Defense System' | MSNBC
- NSA Chief Tells Hackers His Agency Doesn't Create Dossiers on All Americans - Wired
Badge News
Aviation
- Next-Gen Air Traffic Control Vulnerable To Hackers Spoofing Planes Out Of Thin Air | Forbes.com
- Curious hackers inject ghost airplanes into radar, track celebrities' flights | Computer World
SCADA
- Power Plant Hack Talk, Free Tools Pulled From Def Con Lineup | Dark Reading
The Cloud
- Researchers To Launch New Tools For Search Engine Hacking | Dark Reading
Consumer Protection
Event Reviews
- Day One of DEF CON 20 | Computer World
- DEFCON 20 Roundup: Lessons in Security | PC World
- DEF CON Hackers Go Mainstream But Still Love to Party | MSNBC
- Defcon Vending Room Showcases Tech of All Ages | CNet
Routers
- Critical Vulnerabilities in Huawei Routers Laid Bare at DEF CON Tech Spot
- Persistent Router Botnets on the Horizon, Researcher Says at DEF CON | IT World
- Expert: Huawei Routers are Riddled with Vulnerabilities
VPN Security
- Tools Released at Defcon Can Crack Widely Used PPTP Encryption | PC World
- New Tool From Moxie Marlinspike Cracks Some Crypto Password | Wired
- Defcon Wi-Fi Hack Called No Threat to Enterprise WLANs | Network World
Physical Security
- ***** Can Open Gun Safes With Straws and Paper Clips, Researchers Say | Wired
- Kid Opens a Gun Safe Just by Jostling It Around | Gizmodo
The Singularity
- Hacking Humanity: Human Augmentation on the Horizon | Network World
- Cell Phone Battery Catches Fire, Burns Hacker's Tail at DEF CON | CNet
DEF CON *****
- DEF CON *****: Hacking Roller Coasters and the Power Grid with Cell Phones | Network World
- Gold Medal For Hacking? CyFi Should Win It | Huffington Post
- DEFCON ***** Returns, Now With 0-Day | Wired
- Notes from DEFCON and DEFCON ***** | BoingBoing
- 10-year old Girl Scout Owns Slow Game | BoingBoing
- 10-Year-Old Presents App Exploit at DefCon | PC Mag
NinjaTel
- Defcon 20 Visitors Get Their Own 'Pirate' Cellular Network in Ninja Tel, Exclusive One V to Match | Engadget
- A Phone Network Just for Hackers | WSJ.com
- Meet Ninja Tel, DEF CON's Van-powered Pirate Cellphone Network | The Verge
Social Engineering
- How a Lying 'Social Engineer' Hacked Wal-Mart | CNN Money
- Rick Lax Tries Gaming the Gamers at DEFCON | Las Vegas Weekly
- Social Engineer Hacks Wal-Mart from Defcon | BoingBoing
Movie Night
- Hacking Vegas: 'MIT Mike' Aponte, Professional Blackjack Instructor, Teaches You to Count Cards | The Verge
DEF CON 19
General
- When Hackers Become The Man | CNet
- Wit and lethality: Preview of DEFCON 2011 | TechRepublic
- DEFCON 19 - 2011 – Overview of the Conference | Global Security Mag
- Lessons from Black Hat & Defcon 19 - It's Easier to be the Bad Guy | HP Community Blog
- Picking Locks and Hacking Servers at Defcon | NY Times
- Jailbreak Experts Comex, Geohot And Many More Spotted Together At DEFCON Party | Appadvice
- Deb does DEFCON: Hacking conference tackles cyberwar and civil liberties | TechRepublic
Mobile Devices
- Android could allow mobile ad or phishing pop-ups | CNet News
- DefCon Dings Reveal Google Product Security Risks | Gizmodo
- Vulnerability Found In Android That Allows For Phishing Scams and Pop-up Ads | Phandroid.com
- Mobiles become emergency data network | BBC
Feds
- Facebook Offers Cash To 'Bug Bounty Hunters' At DefCon Hacker Conference | Huffington Post
CDMA Phone Hack
- CDMA and 4G Connections Compromised At DefCon 19? | TechCrunch
- DEF CON 19 - hackers get hacked! | Full Disclosure
UAV/Aerial Hacking
- WASP: The Linux-powered flying spy drone that cracks Wi-Fi & GSM networks | Geek.com
- DIY aerial drone monitors Wi-Fi, GSM networks | The Register
- Do-It-Yourself Hacker Drone Highlight of Hacker Conference | International Business Times
- Build Your Own Camera, Launch It Like a Grenade | PCWorld
- Geek hacks flare gun into wireless camera drone shooter | Slash Gear
Anonymous/LulzSec
- Building A Better 'Anonymous'? | Information Week
- Is LulzSec's Leader at DefCon? | PC Magazine
- In Search of Anonymous: Down and Out in the Digital Age | Deliberately Considered (blog)
- Search of Anonymous: Down and Out in the Digital Age Pt II | Deliberately Considered (blog)
- Infosec Island's Scot Terban Replaces Aaron Barr at DEFCON | Infosec Island
- Defcon panel: Anonymous is here. LulzSec is here. They're everywhere | Venture Beat
- Hackers debate 'Anonymous' tactics at DefCon gathering | Agence France-Presse
- Five Questions About Aaron Barr's DEFCON (by Aaron Barr) | Threatpost
DEF CON *****
- DEF CON Opens Its Doors To Pre-***** And ***** Hackers | Washington Post
- 10-Year-Old Hacker Finds Flaws in Video Games | Fox News
- Tween Hacker's Time-Travel Trick | Dark Reading
- 10-Year-Old Outs Security Flaw in iOS and Android Games | PCWorld
- DefCon 19: 10-year-old code cracker reveals zero-day smartphone gaming security flaw | Infosecurity.com
Steven Levy
Mikko Hypponen
Wall of Sheep
Marc Weber Tobias
- Defcon Lockpickers Open Card-And-Code Government Locks In Seconds | Forbes
- Wire pops lock certified for US defense facilities | AFP
- Hackable High-Tech Locks Pose National Security Risks | Security News Daily
Hacking Through Power Lines
- Hacking Home Automation Systems Through Your Power Lines | Wired Threat Level Blog
- Def Con 19: Expert hacks X10 home-automation system | Consumer Reports
Social Engineering
- Defcon Hacking Contest Targets Big Corporations (VIDEO) | Huffington Post
Moxie Marlinspike
- DEFCON 2011: SSL and the future of authenticity | Naked Security Blog (Sophos)
CTF
- European Nopsled Team win DEFCON 19 CTF | blog.satori.com
DEF CON 18
General
- The hackers life – my weekend at Defcon | National Geographic Assignment Blog
- Governments Battle to Stay Ahead of Threats on Internet, 'The Great Leveler' | PBS News Hour
- Hackers Convene At Def Con 18 | NPR
- Hackers With Enigmatic Motives Vex Companies | New York Times
- Hacker Wonderland: DefCon 18 in Photos | Wired Threat Level Blog
- Seven dangerous new computer hacks (and one silly one) that will change the future | io9
- Hackers to flock to Black Hat, Defcon this week | CNet
- Conference Wrap-Up: Apple, Google, BP And Others Spill Sensitive Data On The Phone | Forbes: The Firewall
- Hackers turned gatekeepers: Digital vigilantes with a moral code | The Independent
- Hackapalooza: ATM Spews Cash, Android App Swipes User Data, Digital Game Badges Battle | Fast Company
- A tale of two conferences: Black Hat and Defcon photo gallery | Venture Beat
- Takeaways from Black Hat and DEF CON | CNet: Reporter's Roundtable - ep 43
- DEFCON 18 | Hurricane Labs
GSM Base Station
- Week in review: Hacker intercepts phone calls, Facebook buys 18 patents | Reuters
- Cell Phone Snooping: Cheaper And Easier Than Ever | Forbes
- Hacker Spoofs Cell Phone Tower to Intercept Calls | Wired - Threat Level
- Researcher Intercepts GSM Cell Phones During Defcon Demo | Dark Reading
- FCC Concerned Over DefCon Mobile Hacking Talk | PC World
Social Engineering
- Smooth-talking hackers test hi-tech titans' skills | Google News
- Contest finds workers at big firms handing data to hackers | CNet News
- FBI sought data on Defcon 'social engineering' contest | Computer World
- How to Steal Corporate Secrets in 20 Minutes: Ask | PC World
- Social Engineers Successfully Gather Info | Dark Reading
- Tech Insight: Building The Right Defense Against Social Engineering | Dark Reading
- Cyber 'capture the flag' contest will premiere at DefCon | Federal News Radio
Badges
- A Defcon badge unlike anything you have ever seen | CIO
- This year's Defcon badge has a persistent display | Computer World
- The Defcon Badge: Sleek, Stylish and Hackable | PC World
- Exclusive Sneak Peek: DefCon Ninja Party Badge | Wired - Threat Level
- DefCon Ninja Badges Let Hackers Do Battle | Slashdot
Google Malware
- Google Has Two Times More Malware Than Bing, Yahoo, Twitter Combined | Dark Reading
- Be Careful What You Search For | Information Week
WPA2
- Wireless network security weakness to demo at DEFCON | The Register
- AirTight Demonstrates WIPS Detection and Location Methodology for WPA2 'Hole196' Exploit Presented at Black Hat and DEF CON | Reuters
Other
- Adobe to fix Reader hole unveiled at Black Hat | CNet News
- Got an iPhone? There's an App for Hacking That | Technology Review
- Hack attack hits ATM jackpots | Google News
- Hackers to flock to Black Hat, Defcon this week | ZDNet
- A Simple, But Effective, Way to Beat Internet Censorship | MIT Technology Review
- How to Locate a Web User with a Few Clicks | MIT Technology Review
- Warning Issued on Web Programming Interfaces | MIT Technology Review
- Facebook's former top security officer says military and commercial cyber defense should be united | Social Beat
- Software released for attacking Android phones | Reuters
- Biometric and Other Locks Fail to Foil Hackers at DefCon | Wired - Threat Level
- Researcher Reads RFID Tag From Hundreds Of Feet Away | Dark Reading
- DEFCON 18 Quals: writeups collection | VN Security
- DEFCON 18: LOCKS, LIES, AND VIDEOTAPE - The Sidebar
- Black Hat USA 2010 and DEF CON 18 Wrap Up | It's Tactical
- See you at the Rio in 2011 | WiFi WLAN Media Blog
- [Defcon] You Spent All That Money And You Still Got Owned… | Catch 22 InSecurity
- [Defcon] SHODAN for Penetration Testers | Catch 22 InSecurity
- [Defcon] Hacking Oracle From Web Apps | Catch 22 InSecurity
- [Defcon] Exploiting WebSphere Application Server's JSP Engine | Catch 22 InSecurity
Video Coverage
- Behind the Firewall – episode 010: Defcon 18 | Hacker News Network
- TDSSKiller: Stop Google Malware, iPad Charging Help, New Kindle, Defcon 18, Lapt | Tekzilla
- DEFCON 18 | Hak5
- DEFCON 18 registration line at Black Hat USA | Kingpin's YouTube
- DC18 Badge Hack: DEFCON Super Rocker 18 Guitar | Kingpin's YouTube
- DC18 Badge Hack: DEFCON + Ninja Badge Combo | Kingpin's YouTube
- DC18 Badge Hack: Virus Propagation | Kingpin's YouTube
- DC18 Badge Hack: Web-of-Trust | Kingpin's YouTube
- DC18 Badge Hack: GoatBar UPC Barcode Writer/Emulator | Kingpin's YouTube
- DC18 Badge Hack: Slot Machine | Kingpin's YouTube
- DC18 Badge Hack: "You're Busted" Police Lights | Kingpin's YouTube
- DC18 Badge Hack: Personal Oscilloscope | Kingpin's YouTube
- DC18 Badge Hack: TV-B-Gone | Kingpin's YouTube
- DC18 Badge Hack: Coffee/Drink Mixer | Kingpin's YouTube
- DC18 Badge Hack: Paper Badge Display | Kingpin's YouTube
- DC18 Badge Hack: XXX Interactive | Kingpin's YouTube
- DC18 Badge Hack: ***** Theater | Kingpin's YouTube
- DC18 Badge Hack: Boob-Ma-Tron | Kingpin's YouTube
- DC18 Badge Hack: Flava Flav Badge | Kingpin's YouTube
- Tom and Andrew talk about Defcon 18 - GFQ Network
- Defcon 18 - Goon Pirates storm the Toool presentation | Kallahar's YouTube
- Defcon 18 - Siviak gets a goon hug | Kallahar's YouTube
- Defcon 18 - Police firearms trainer | Humphrey Cheung's Vimeo
- Defcon 18 - Las Vegas Gringo Warrior Lockpick - Routergods' YouTube
- w00tb0t-Gringo-Warrior-Defcon-18 w00tb0t's YouTube
- More Retro Computing at Defcon 18 Tekarien's YouTube
- Defcon18 encrypted wifi effffn's YouTube
- Dan Kaminski... I don't care | idontcare296's YouTube
DEF CON 17
Access Control
- Electronic High-Security Locks Easily Defeated at DefCon | WIRED -Threat Level
- Open Sesame! Network Attack Literally Unlocks Doors | WIRED -Threat Level
Badge
- Exclusive Peek Inside DEF CON's High-Tech Badge | WIRED -Threat Level
- Hacking The DEF CON 17 Badges | WIRED -Threat Level
- Photos: Defcon badge inspires hacks | CNET
- Hacking the Defcon 2009 badge | NetworkWorld.TV (YouTube)
- DEF CON 17: Early Badge Details | Hack a Day
- The Hacker's Badge Of Honor | Forbes
- Kingpin's Defcon 17 badge | MAKE
- Hacking the Defcon badges | CNET News, InSecurity Complex
Browser Sniffing
- A Browser's View of Your Computer | MIT Technology Review
Credit Hacking
- DefCon: 'Credit Hackers' Win the Credit Card Game … Legally | WIRED -Threat Level
CSRF
- *****anel, Netgear and Linksys susceptible to nasty attack | The Register
Fake ATM
- Fake ATM doesn't last long at hacker meet | IDG News
- Hackers spot fake ATM. Could you? | Internet News
Feds
- Defense Department eyes hacker con for new recruits | IDG News
- Hackers: Uncle Sam (still) wants you! | Internet News
Hacking Sleep
- Hacking Sleep | Forbes
Espionage
- Korean 'journalists' booted from Defcon | IDG News
IP Video Hijacking
- Researchers Hack IP Video | Dark Reading
- Researchers offer tools for eavesdropping and video hijacking | CNET News - InSecurity Complex
- Security Camera Hack Conceals Heists Behind Dummy Video | WIRED -Threat Level
- Surveillance camera hack swaps live feed with spoof video | The Register
Social Engineering
- Defcon air traffic control hacker: Excuse me while I change your aircraft's flight plan | Venturebeat
Misc
- Hack-Proofing The Hackers | Forbes
MMORPG Expolits
- Hackers Game a Multiplayer World | MIT Technology Review
Mystery Challenge
- DEF CON 17 Mystery Challenge | WIRED -Threat Level
- Mystery Challenge - DEF CON 17 | Security Ripcord
NOC
- Inside The World's Most Hostile Network | WIRED -Threat Level
Overview
- At Black Hat and Defcon, hackers talk shop | CNET
- Ax0n's DEF CON 17 Wrap-up | HIR Information Report
- DEF CON 17 | The Pulse Review
- Defcon 17 hacks into Vegas | Las Vegas Weekly
- Defcon: What to leave at home and other do's and don'ts | CNET
- Hacking, Lock-Picking, Booze and Bacon: DEF CON 17 In Review | WIRED -Threat Level
- Hanging with hackers can make you paranoid | CNN
RFID
- Feds at DefCon Alarmed After RFIDs Scanned | WIRED -Threat Level
- Fed's RFIDiocy pwnd at DEF CON | ZDNet Blog
Social Networks
- Twitter: More Secure Than You Think | Forbes
SSL Hijacking
- Dan Kaminsky Feels a disturbance in The Internet | SemiAccurate
- Hackers expose weakness in visiting trusted sites | Associated Press
- Researcher Exposes Flaws In Certificate Authority Web Applications | Dark Reading
- Secure Browsing Takes A Beating | Forbes
UAV
- Boffins showcase do-it-yourself flying spy drone | The Register
Software Update MITM
- Defcon: New Hack Hijacks Application Updates Via WiFi | Dark Reading
- Software Updates Vulnerable To Hijacking | Information Week
- Using Software Updates to Spread Malware | CBS News
DEF CON 16
Badges
- Defcon badges kill TVs | The Inquirer
- Exclusive Defcon 16 Badge Sneak Peek | Wired Threat Level Blog
BGP Exploit
- Hackers hacked at infamous DefCon gathering | Yahoo News
- Revealed: The Internet's Biggest Security Hole | Wired Threat Level Blog
- More on BGP Attacks -- Updated | Wired Threat Level Blog
- Researchers exploit web protocol to hijack traffic | ZDNet.co.uk
Captcha
- Captchas are easily hackable | The Inquirer
Crackpots
- Dozier Internet Law: Hackers Hack Away at DefCon Annual Convention | John W. Dozier Jr. Blog - Another take on DEF CON
CTF
- Naval Postgraduate School Wins Hacking Contest | Dark Reading
- 3@stplace?!? | atlas wandering blog
- DefCon CTF 2008 | Nice walkthrough of CTF Event
Encryption
- Encrypting Your Hard Disk is Not Safe Anymore: New Vulnerability Affects Microsoft, Intel, HP and Others | Market Watch
UAT
- UAT Delivers at DEF CON | Market Watch
iPhone
- Defcon 16 -- iPhone Used to Hack Wireless Systems | TechTree India
Lock Picking
- Researchers Crack Medeco High-Security Locks With Plastic Keys | Wired Threat Level Blog
- Shrinky Dinks As a Threat To National Security | Slashdot
- Cracking high-security locks is *****'s play: experts | AFP
- DEF CON 16: Plastic Keys; and JennaLynn Does it Again! | inSecurity.org - Marc Weber Tobias
MBTA vs. MIT
- Agency sues to stop Defcon speakers from revealing gaping holes | The Register
- Mass. transit authority flaw disclosure: A student speaks up | Computer World
- MIT Students: 'T' Card System Easily Hacked | The Boston Channel
- Federal judge halts Defcon talk on subway card hacking | The Register
- Judge orders halt to Defcon speech on subway card hacking | Cnet News
- Federal Judge in DefCon Case Equates Speech with Hacking | Wired Threat Level Blog
- Judge orders halt to Defcon speech on subway card hacking | CNET News
- Students blocked from presenting paper on security flaws in subway fare cards | USA Today Blog
- MIT Coders' Free Speech At Stake | EFF.org
- MBTA Makes A Mistake, Details On MIT Hack Released To Public | Chattahbox
- Computer Scientists Ask Court to Reconsider Gag Order in DefCon Case | Wired Threat Level Blog
- Boston Subway Hack Debate Intensifies | PC World
- Judge lifts gag order on subway security hack | OUT-LAW News
- Gag order lifted for students who hacked subway card | The Register
- Judge Lifts MIT Subway Hack Gag Order | PC Magazine
- Judge lifts fare card hack gag order, punts on 1st Amendment | Ars Technica
- Exclusive Interview with MIT Subway Hacker Zack Anderson | Popular Mechanics
- 3 takeaways from security-flaw legal flap between MBTA, MIT students | Computer World
Mystery Challenge
- The DefCon 16 Mystery Challenge | Wired Threat Level Blog
- Mystery Box Challenge - Day One | Security Ripcord
NOC
- A First Ever Look Inside The Defcon Network Operations Center | Wired Threat Level Blog
Overview
- DEF CON Conference | Best of the Web Buzz Blog
- Defcon opens with a bang, contests, and intrigue | Cnet News
- Defcon ends with researchers muzzled, viruses written | Cnet News
- DEF CON 16: List of tools and stuff released | ZDNet Zero Day Blog
- Attack of the Show - Def Con Convention | G4 TV
- Cookie-jacking: Potential security risk largely ignored by public | The Tech Herald
Social Networks
- Facebook's (futile) malware exorcism - can social networks fight back? | ZDNet Blogs
- LinkedIn Hack Demonstrates Ease of Impersonation | Dark reading
- The ugly truth: Satan, social networks and security | ZDNet Blogs
SSL Cookie Hijiacking
- Fighting fire with fire | IT News AU
- A Good Reason To Go Full-Time SSL For Gmail | Slashdot
- Security Researcher Defends Plan To Release Gmail Hacking Tool | Information Week
Wall of Sheep
- Busted by Defcon's Wall of Sheep | The Norman Transcript
Warballooning
- Covert operation floats network-sniffing balloon | Network World
Badges
- Badge Hack at DefCon | Wired News
Banks
- Security Bites Podcast: Defeating online banking security | Cnet News
- How phishers defeat online banking controls | Cnet News
- New Bank Practices Make Hacking Easier | Dark Reading
CTF
- Capture the Experience | Dark Reading
Cyber War
- Flash mob in Estonia | Cnet News
Disclosure
- The Vulnerability Disclosure Game: Are We More Secure? | CSO Magazine
- Hackers Welcome | Forbes
E-voting
Feds
- hackers:new allies in war on terror | The Times of India
- Hackers sought as allies in war on terrorism and cyber crim | AFP
- Defense Cyber Crime Center profiled | Federal Computer Week
- I Married a Fed at DefCon | Wired News
General
- Defcon 2007 – Mayhem, mystery and marriage | TG Daily
- In defense of Black Hat and Defcon | Cnet News
- Black Hat 'supersizes' in Las Vegas | Cnet News
- Letter From Hackerdom: Not the Same Old DEF CON, Black Hat | Washington Post Blog
- Hackers, researchers gather for Black Hat, Defcon conventions | Mercury News
- Basics: Black Hat Briefings and Defcon 15 | Mercury News
- Takahashi: Foes mingle at Las Vegas hacking conferences | Mercury News
- Takahashi: Good hackers and bad (53%) | Mercury News
- The romance and mystery of a good hack | The Register
- Hacking for hijinks | The Register
- A Defcon survival guide | The Register
- Forbes Offers a Sympathetic Portrayal of Hackers | Slashdot
- The past is prologue at Black Hat Briefings | Government Computer News
- L0pht in Transition | CSO Magazine
- DefCon Recap | Dark Reading
- How to Land the Best Security Job | Dark Reading
- Overheard at DefCon | Security Focus
- Black Hat wrap-up: Less hackers, but plenty of flaws | SC Magazine
- Educating hackers and defenders Hindu | Business Line
- Podcast: News to know midday: Fake Steve; New iMac; DEF CON flap revisited | ZD Net
- Top 10 geek vacations, Part II | InfoWorld
Germany
- Hacker space movement sought for U.S. | Wired Blog
- Germany enact 'anti-hacker' law | Channel Register
- Germany enacts 'anti-hacker' law | The Register
Honeypots
- Websense to Unveil Web 2.0 Threat Detection at Defcon | PC Magazine
- Websence Protects Web 2.0 | ABC News
- Websense to Unveil Web 2.0 Threat Detection at Defcon | Eweek
- DEF CON - Websense lures Web 2.0 attackers with HoneyJax | Network World
iPhone
- Iphone partially unlocked | TG Daily
- Will the iPhone be iPwned? | Security Focus
Lock Picking
- Picking locks the old-school way | Wired News
- Medeco Readies Assembly-Line Fix for DefCon Lock Hack | Wired News
- Ultra-High Security Locks Used by White House Easily Opened by 12-Year Old Girl | InfoWorld
- Lockpicking for Geek***** | Wired Blog
- White House High-Security Locks Broken: Bumped and Picked at DefCon | Wired News
- Hackers click locks open at conference in US | AFP
- The Study of Physical Hacks at DefCo | Slashdot
- Anti-theft technology | Government Computer News
- Simple Hack Can Unlock Most Any Office Door | CSO Magazine
Malware
- Polymorphic Malware: A Threat That Changes on the Fly | CSO Magazine
Media Players
- Researcher: Media players have critical flaws | MSNBC
- Researcher: media players invite malware | ABC News
NBC Undercover
- How an undercover NBC reporter was outed by hackers | Salon.com
- Defcon: Hacks, Lies, and Videotape | Cio-Today
- Dateline Mole Allegedly at DefCon with Hidden Camera -- Updated: Mole Caught on Tape | Wired News
- Defcon drama: Undercover reporter bolts after outing | Cnet News
- Middle America, Meet The Hacker | Forbes
- Exposed undercover reporter flees hackers conference | AFP
- Undercover 'Dateline' Reporter Outed, Flees from Defcon | PC Magazine
- Undercover TV Producer Bootd from DefCon | ABC News
- NBC muckraker gets hacked at Defcon | The Register
- Dateline NBC Mole Outed At Defcon | Slashdot
- DefCon: Hacking meetup infiltrated by Dateline 'media mole' | CIO Magazine
- Undercover NBC Dateline reporter bolts from DEF CON 2007 | ZD Net
- DefCon's Moss: Undercover Reporter Damages 'Neutral Zone' | Information Week
- NBC Dateline's "Catch a Predator" Series Pays Cops and Undercover "Victims" -- UPDATED | Wired News
Rootkits
- The Great Rootkit Debate | Dark Reading
SCADA
- Hacker shows flaw in software that controls key infrastructure | Computer Crime Research Center
- America's Hackable Backbone | Forbes
- Researcher: Flaw Exposes Hack Threat | Fox
- Researcher worries about cyber-hijackers | MSNBC
- Hacker shows flaw in software that controls key infrastructure | Mercury News
Social Networks
- FaceBook code leaked on Site | ABC News
MySpace
- Hackers: Networking Sites Flawed | The St. Petersburg Times
- By and thanks for the MySpace 'cookies' | The Brunei Times
- | Hackers: Social Networking Sites Flawed Fox
- Hackers: Social networks vulnerable | USA Today
- MySpace weakness patched, hacker's profile deleted | AFP
- Myspace Hacker's Profile Deleted | ABC News
- Morning Buzz: Aug. 6, 2007 | U.S. News and World Report
- 'myspace, others vulnerable to hackers" | Time
Speakers
Sam Bowne
- Teaching hacking helps students, professors say | Security Focus
- Teaching hacking helps students, professors say | Dark Reading
Zac Franken
- 2 Screws, 1 Plastic Cover, How Many Airports Infiltrated? | Eweek
- Open Sesame: Access Control Hack Unlocks Doors | Wired News
- Access Card Systems -- Trivially Vulnerable | Washington Post Blog
Lukas Grunwald
- Buffer Overflow Found in RFID Passport Readers | Slashdot
- Arphid Watch: A Passport Crashing Technique | Wired Blog
- Scan this guy's e-passport and watch your system crash | ABC News
Thomas Holt
- An Inside Look at Internet Attackers' Black Marke | PCWorld
- Online Crooks Fine-tune Selling of Malware | CIO India
- Malware: Serious Business | Forbes
- An Inside Look at Internet Attackers' Black Marke | ABC News
- Black market for malware a thriving place | The Register
- Malware: Serious Business | Dark Reading
Mikko Hyyponen
- There's hope for stopping mobile malware | InfoWorld
Charlie Miller
HD Moore
- Hacking Without Exploits | Dark Reading
Scott Moulton
- A Visit to the Drive Doctor | Dark Reading
Vendors
AirDefense
- New Wireless Security Threats Revealed at Defcon 15 | Government Technology
- AirDefense Makes New Detection And Protection Methods Available to Customers | Networkcomputing
AirTight
- AirTight Revealed Potent Variant of Evil Twin at DEF CON 15 | Web Services Journal NJ
AMD
- Is AMD's 65nm SOI process broken? | ZD Net
Finjan
- Finjan Identifies Important Vulnerability in Windows Vista's Contact Gadget, Leading to a Security Update Issued by Microsoft | ITNews Italy
Immunity
- Exploits in the Fast Lane | Dark Reading
- Security firm makes it easy to come up with attack code | ComputerWorld UK
- Defcon: Security firm automates generation of attack code | ComputerWorld
- Immunity releases new exploit-writing tool | ComputerWeeklyUK
- Security firm makes it easy to come up with attack code | Tech World
- Security firm makes it easy to come up with attack cod | ComputerWorld UK
- Defcon: Security firm automates generation of attack code | ComputerWorld
- Immunity releases new exploit-writing tool | ComputerWeeklyUK
- Immunity releases new exploit-writing tool | Search Security
- Immunity says debugger tool will cut zero-day attacks | ComputerWeeklyUK
- Immunity Unleashes Automatic Exploit Tool | PC Magazine
- Securty Firm Autmates Attack Code Generation | ABC News
- Defcon: Security firm automates generation of attack code | CIO Magazine
ISEC
- How to break forensics software | The Inquirer
- Researcher Finds Media Player Flaws | Fox
- Researcher: media players invite malware | USA Today
Microsoft
- Attackers target two Microsoft security flaws | Search Security
- Microsoft to update critical Windows, Office, flaws. | Search Security
Mozilla
- Mozilla: 10-Day Patch Guarantee 'Not our Policy' | IDG News Service
Wall of Sheep
- net.wars: Wall of sheep | Newswireless.com
Web Hacking
- Browsing the Intranet Problem | Dark Reading
- Internet Explorer and Your Web Site's Privac | Washington Post Blog
- Hackers bite into "cookies" to plunder user data from websites | AFP
Wi-Fi
- Wi-Fi hot spots are easy prey for hackers | Detroit Free Press
- Your Wi-Fi can tell people a lot about you | Cnet News
- Public Wi-Fi use raises hacking risk | USA Today
- Flash: Public Wi-Fi even more insecure than previously thought | The Register
- DEF CON to Demo New Wi-Fi Hacks | Security News Portal
Xerobank
- XeroBank Launches Anonymizing Tool Suite | Dark Reading
DEF CON 14
Badges
- Defcon aims to thwart counterfeit badges | ABC News
- Defcon Badges go high tech | The Inquirer
Blackberry
- BlackBerry a Juicy Hacker Target | Wired News
- BlackBerry flaw highlights growing mobile device risks | Search Security
- D'Aguanno demonstrates Blackberry attack | The Inquirer
- Is Your Blackberry a Hacker's Back Door? | CFO
- Security Researcher To Release Code That Could Help Exploit BlackBerry Security Flaw | Information Week
- The Week Ahead, Aug. 14-18, 2005 | Forbes
- Trojan malware takes a bite out of BlackBerry | Computer World
- BlackBerry hacking peril exposed | The Register
Blue Pill
- Introducing Blue Pill | The Invisible Things
Bots
- Defcon Speakers Team Up to Fight 'Queen Bots' | Washington Post
Conference Overview
- Defcon 14 report: DAY TWO Zone-H
- Piratas informáticos a todo vapor | BBC Mundo
- Black Hat and Defcon 2006: SecurityFest | PC World
- Defcon 14 report: DAY ONE | Zone-H
- Defcon 14 Wrapup, at Long Last | Washington Post
- DefCon Delays Can't Stop the Madness | Washington Post
- Defcon gets off to a late start | CNET News
- Defcon growing pains - Rush of people delay opening | TG Daily
- Hacker Pranks at Defcon and Black Hat in Las Vegas Emphasize Computer Security | MIT Tech Review
- Hackers and G-men to descend on Las Vegas | MSNBC.com
- Hackers and trackers mixing and mingling | International Herald Tribune
- Hackers gather at confab to penetrate computers, pick locks, spray pellets | Washington Post
- Hackers meet to exploit computer flaws | Fox News
- Las Vegas braces for computer security gurus | TG Daily
- Las Vegas hosts computer security events | SEATTLE POST-INTELLIGENCER
- Reunión mundial de piratas informáticos en Las Vegas | El Pais
- Suits and punks convene in Las Vegas for hacker conferences | USA Today
- Talking with the Dark Tangent | Washington Post
- Two Former Federal Agents Talk About Computer Forensics, Network Security and Computer Crime. | CyberSpeak
Contests
- IT Security through contests, sponsored by Pepsi | The Inquirer
- Hackers meet to exploit computer flaws | Fox News
CTF
- Elite programmers compete in CTF at DEF CON | ZD Net
- UF security professionals win world's largest ‘hacking’ competition | University of Florida News
Device Driver
- Even offline computers can be hacked, researchers say | USA Today
- Experts Discuss Wireless Vulnerability | MS Money
- Researchers show 'systemic' wireless vulnerability | International Herald Tribune
DNS
- DNS amplification attacks explained | The Inquirer
Feds
- Defcon 2006: Hackers can work for the Feds - no degree required | TG Daily
- FBI: Cybercriminals Taking Cues From Mafia | PC World
- Feds court infosec pros in fight against cybercrime | Search Security
- Meeting the Feds at the Def Con Hacker Fair | NPR Radio
- When Online Crooks Advertise | Washington Post
- Johnny Long interview | CyberSpeak
Hardware
- Defcon 14 Full of Amazing Hardware Hacks | Slashdot
IBM
- - Legacy protocol puts IBM mainframes at risk Search Security
IPv6
- The state of IPv6 has to be seen to be believed | The Inquirer
Jackpotters
Malware
- Cult Of The Dead Cow Puts Malware Samples Online | Windows IT Pro
Microsoft
- Microsoft Challenges Hackers On Vista | CBS News
Offensive Computing
- Cult Of The Dead Cow Puts Malware Samples Online | Windows IT Pro
Oracle
- Defcon 2006: Oracle not so "unbreakable" | TG Daily
Passport
- Is RFID tracking you? | CNN
- Researchers: E-passports pose security risk | CNET
- Biometric passports cracked | Computing
- British biometric passport hacked | The Inquirer
- E-Passport ally responds to cloning claims | Security Focus
- Hacker Cracks, Clones RFID Passport | Tech News World
- Researchers expose e-passport vulnerability | Search Security
- Researchers: E-passports pose security risk | ZD Net Asia
- Security fears threaten RFID adoption | ITWeek
Traveling Terabyte
VOIP
- VoIP ***** at BlackHat, Zimmermann to kick off DEF CON | VON Magazine
- E-mail security hero takes on VoIP | CNET News
- Zfone for VoIP ready for testing | The Inquirer
- Zimmermann: Borderware Licenses Zfone Technology | VON Magazine
Wall of Sheep
War Driving/Wi-Fi
- War driving by rocket at 6,800 feet | Security Focus
- A wireless hacking computer that can't be hacked | TG Daily
- The Black Hat Wi-Fi exploit coverup | NewsForge
Worms
- Researchers warn over Web worms | Security Focus
DEF CON 13
Conference Overview
- Zero Day | Infoworld Blog
- Security Fix | Washington Post Blog - Defcon Day 1
- Slashdot | DEF CON Coverage Round-up at Make
- Hackers and foes exchange ideas | International Herald Tribune - AP
- Las Vegas Weekly | Written by Defcon Speaker Patty Walsh
- Hackers prowess on display | Statesman
- Kisses and Renderman brave INQ snapperazzi | The Inquirer
- Hacking hardware on display- The Inquirer
- Hackers Head To DefCon In Vegas
- Hackers show off abilities at Defcon | Miami Herald
Conference Overview - Blogs
- RantMedia at DEF CON XIII | Rantmedia Community | Blog by RantRadio
- Otinia | Blog entry with impressions of DC
- DefCon 13 | Trip Report for the Distributed systems department at Lawrence Berkely Lab
- Andrew Mudd [AndrewMudd.com] :: DefCon 13 No-Pictures-Yet Wrap Up | Blog
- My EXCEPTIONALLY lengthy and yet contentless DEF CON review! | Blog by attendee on Johnny Long's forum
- Freedom Lives: Defcon 13 Archives | Blog
- Kitchen Sink Web Blog Archive DefCon 13 roundup | Blog from attendee
- Insomnygen: Defcon 13 | Blog
- Defcon 101: no show speakers, long lines, and total chaos. - The Jason Calacanis Weblog - calacanis.weblogsinc.com _ | Blog
- Emergent Chaos: Defcon Coverage? | Blog of Adam Shostack
- Who Has Time For This?: CiscoGate at DEF CON | Blog by David Cowan
- Blog for DIAMONDKT | Blog by attendee - extensive length
- DEF CON 13 Reading List at Daniel Spisak on Technology | Blog entry highlighting authors favorite talks
- DEF CON 13 Aftermath at Daniel Spisak on Technology | Blog of attendee
- SynapticTransmissions.com | Attendee Blog
- SynapticTransmissions.com | Attendee Blog - Day 3
- SynapticTransmissions.com | Attendee Blog - day 2
- SynapticTransmissions.com | Attendee Blog - Day 1
- Ants on the MelonBlog Archive Friday at DefCon 13 | Blog entry
- Ants on the MelonBlog Archive Saturday at DefCon, Blackjack in Vegas | Blog
- Ants on the MelonBlog Archive End of DefCon, Deep Fried Twinkies | Blog (day 3 review)
- Russell's blog | Blog entry by attendee
- timbrown: Okay, so I'm back on UK time... | Blog entry by attendee
- https://sneak.datavibe.net/blog/read?id=1076 | Blog entry by attendee
- Carbon Ring: DefCon 13 Part II | Blog entry by attendee
- Carbon Ring: DefCon 13 Part I | Blog entry by attendee
- The Edge of I-Hacked DEF CON 13!! | Blog entry
WiFi Shootout
- Rupert Goodwins' Diary - ZDNet UK Comment | Blog
- Team iFiber Redwire Sets New WiFi Distance Record - Digital-Lifestyles.info
- Slashdot | 125-Mile WiFi Connection | Slashdot article on WiFi shootout
- New wireless record claimed | Tech News on ZDNet
- Boing Boing: Third Annual Defcon Wifi Shootout Contest | Pre DC Coverage of WiFi Shootout
- Boing Boing: DefCon WiFi shootout champions crowned: 125 miles | BoingBoing Blog Entry after event
- Belkin intros sub-$100 G Plus MIMO router line - Engadget - www.engadget.com | Product announcement mentioning recent DC Wi-Fi world record
- Unamplified WiFi distance record set at 125 miles - Engadget - www.engadget.com | Blog
- Record Set at DefCon WiFi Shootout | By Pedro Hernandez [enterpriseplanet]
- heise online - New WLAN long-distance world record
- Tom's Hardware Guide: Tom's Hard News | WiFi Shootout record
- Wi-Fi Toys | Wi-Fi blog entry on shootout record
- Wired News: Hackers Annihilate Wi-Fi Record
Bluetooth
KegBot
- Opposable Thumbs: Meet KegBot, son of Kegerator
- Security Fix- Washinton Post
- Boing Boing: Defcon, Makezine, kegbot
- The Kegbot - It Gives You Beer : Gizmodo
- Slashdot | Kegbot: The Future of Robotic Drink Service, Now
- MAKE: Blog: @ DEF CON - The Kegbot project
Wall of Sheep
- Wall of Sheep - I see stupid people
- [ISN] Wall of Sheep - I see stupid people
- Passing the conference 'sniff' test | Talks about several conferences.
- Security Awareness for Ma, Pa and the Corporate Clueless: Into the Valley of Death | Blog by Winn Shwartau (he gives pre-con advice on avoiding the wall of sheep)
Capture The Flag
WiFi Security
- WiFi access points go nuclear
- Live from DefCon: WiFi bouncing - Engadget - www.engadget.com | Engadget blog entry (Live from DC)
- Wireless access security tool moves past prototype stage | WaveSEC story
- AirDefense Reports Nearly 2,500 Wireless Attacks at DefCon; Evil Twin Attacks Moving from Masquerading to Injection - Forbes.com | AirDefense PR regarding hostile activity on the Defcon network.
- Wireless Noise Hampers DefCon; Impact of Non-Wi-Fi Interference Surprises Observers at Hacker Conference | Press release by company analyzing interference issues [AirMagnet]
- Nevada legalizes wireless handheld gambling - Engadget - www.engadget.com | Pre-DC article mentioning how DC hackers will enjoy wireless handheld gambling
- The INQ Guide to finding wardriving supplies
- Wireless Developer Network
- Internet News Article | Reuters.co.uk | PluggedIn: Wireless networks -- easy pickings for hackers
- Tom's Hardware Guide: Tom's Hard News | WiFi pistol appears at Defcon
- InformationWeek > Wireless > When Networking Wirelessly, Beware The Microwave > August 2, 2005
Lockpicking
- How to pick an IT lock at Defcon 13 | Article with pictures (The Register/TheInquirer)
EFF
- Dunk the hacker and be a net society contributor | The Inquirer
Feds
- Macworld UK - Defcon draws federal recruiters | Macworld staff blurb quoting Wells from Reuters report
- US officials go to hackers' convention to recruit | Reuters
- PC Pro: News: US authorities recruiting at Defcon | Short blurb by Simon Aughton
- CNN.com - Feds recruiting hackers at Defcon - Aug 11, 2005 | CNN copy of reuters article
- U.S. government hiring more hackers
Infra-red
- Infrared exploits open the door to hotel hacking | The Register
- Hacking the hotel through the TV - Hotel News Resource
- Hacking the hotel through the TV | Tech News on ZDNet
- WatchGuard Wire: RSS Feed | WatchGuard Technologies, Inc.
- Wired News: A Hacker Games the Hotel
- GoldBlogger Hacker Teaches Click Fraud At Conference! | Blog entry on Adwords hacking
- Hacking Google Adwords - Defcon Panel recap - The Jason Calacanis Weblog | Lengthy Blog by attendee on the hacking google adwords
- Hacker Teaches Click Fraud At Conference! - addict3d.org
RFID
- Hackers demonstrate their skills in Vegas | Business Week, Aug 1. Greg Sandoval
- RFID: There you are!: ZDNet Australia: News: Hardware
DEF CON 12
Print Articles
- Red Herring (Feb 2005): DT comments on Antivirus Guarantee.
- Wired Magazine (Dec 2004): Bluesnarfing and other DC12 coverage in the article "When Cell Phone Hackers Attack".
- FHM Magazine (Dec 2004): DEF CON was featured in the December 2004 issue of FHM.
- Wired Magazine (Nov 2004): Blurb on the DC 12 Wi Fi Shootout.
General/Misc
- Slashdot - Defcon 12 Running Man Contest | Local Copy
- Slashdot - Slashdot | Blackhat/Defcon Report | Local Copy
- Slashdot - DEF CON 12 - After the Hangover | Local Copy
- Slashdot - Combining Port Knocking With OS Fingerprinting | Local Copy
- The Register - Rampant capitalism upsets delicate Reg reader | Local Copy
- The Register - Vegas braces for DEF CON | The Register | Local Copy
- The Register - VoIP hackers gut Caller ID | Local Copy
- PC World - PDA Viruses Could Get Nasty | Local Copy
- PC World - PCWorld.com - School for Hackers | Local Copy
- Blogs.PC World - Today @ PC World - New MyDoom Strikes Search Engines | Local Copy
- The Inquirer - Hackers and establishment to mingle at DEF CON | Local Copy
- The Inquirer - DEF CON 12: Feds Yes, Anarchy No. | Local Copy
- TomsHardware - Hackers descend on Las Vegas | Local Copy
- TomsHardware - Defcon 12's Fear and Hacking in Vegas | Local Copy
- Las Vegas Sun - Las Vegas SUN: Hackers gather in Vegas for annual digital huddles | Local Copy
- MarketPlace Public Radio - Marketplace Morning Report for August 2, 2004 | Local Copy
- Las Vegas City Life - Hacking the planet | Local Copy
- Searchsecurity - REPORTER'S NOTEBOOK: Impressions of DefCon 12 | Local Copy
- Searchsecurity - Capture the Flag competitions can net far more than fun | Local Copy
- PCWorld - Feds Seek a Few Good Hackers | Local Copy
- ZDNet - Hackers plan global game of 'capture the flag' | Local Copy
- Geek.Com - Global Capture the Flag game for hackers | Local Copy
- ZDNet - Why you should Google yourself--and often | Local Copy
- NewsForge - Google hacks are for real | Local Copy
- NewsForge - Blackhat/Defcon: The final report | Local Copy
- NewsForge - DEF CON 12: Opening Day | Local Copy
- ComputerWeekly - Hackers conference shown how to bypass Active Directory controls | Local Copy
- eBCVG - Training Ethical Hackers: Training the Enemy? | Local Copy
- Forbes Technology Playing Role in GOP Protests | Local Copy
EFF & DVR
- Wired - Group Warns DVRs Endangered | Local Copy
- Telecom Web - EFF's Digital Television Liberation Project Starts Its Engines | Local Copy
Wireless & Wifi Shootout
- Slashdot - DefCon WiFi Distance Competition Calls For Entrants | Local Copy
- Slashdot - DEF CON WiFi Shootout Winners Set A Land Record | Local Copy
- Slashdot - The Dark Side Of DefCon's Wireless Network | Local Copy
- Slashdot - Ready, Aim, HACK! | Local Copy
- Wi-Fi Planet - High Noon for High Range Wireless | Local Copy
- USA Today - *****s' wireless feat could be world record | Local Copy
- LocalTechWire - AirDefense Says Hackers Growing More Sophisticated | Local Copy
- TechWeb - Techweb > News > WLAN security > Wireless Hacks Growing Threat > August 3, 2004 | Local Copy
- Wired - Wired News: Wi-Fi Shootout in the Desert | Local Copy
- TomsHardware - Wireless Wizardy and chaos during at talk at Defcon | Local Copy
- ComputerWire - WiFi and Bluetooth Distance Records Smashed | No Local Copy - pay site
- TheRegister - Wi-Fi 'sniper rifle' debuts at DEF CON | The Register | Local Copy
- P2PNet - Wi-Fi ground distance record | Local Copy
- P2PNet - Bringing goatse - Local Copy
- InternetWeek - WLAN Attacks Getting More Sophisticated, Vendor Says - Local Copy
Bluetooth
- Slashdot - Bluesniper Creator Interviewed on Gizmodo | Local Copy
- Gizmodo - IMterview With Bluetooth Hacking Flexilis's John Hering | Local Copy
- PCWorld - PCWorld.com - Bluetooth Phones Could Leak Data | Local Copy
- P2PNet - Bluetooth mobile snipers | Local Copy
- Wired - Wired News: Security Cavities Ail Bluetooth | Local Copy
- Esato - Bluetooth-cracking gun | Local Copy
- SearchNetWorking - Bluetooth: Security's 'silent killer' | Local Copy
Evoting
- NYTimes - The New York Times > Opinion > Editorial Observer: Rolling Down the Highway, Looking Out for Flawed Elections | Local Copy
- IHT (same as NYTIMEs story) - Meanwhile: Chasing down flaws in electronic voting | Local Copy
- Slashdot - Hackers, Public Differ Greatly On E-voting | Local Copy
- News.com - Poll: E-voters not so afraid of election-day hacks | CNET News.com | Local Copy
- GCN - Government Computer News (GCN) daily news -- Public and experts split over e-voting security | Local Copy
- ZDNet - Poll: E-voters not so afraid of election-day hacks - News - ZDNet | Local Copy
- ComputerWorld - Can you hack the vote? | Local Copy
- ComputerWorld - Public, security experts' e-voting views differ sharply | Local Copy
- GCN - Government Computer News (GCN) daily news; Public and experts split over e-voting security | Local Copy
DNS
- News.com - Internet's 'white pages' allow data attacks - Local Copy
- Slashdot - Network Attacks Via DNS | Local Copy
- Silicon.Com - DNS hack leaves corporate networks wide open - silicon.com | Local Copy
- CBROnline - Researcher says DNS can stream voice, control Trojans - Computer Business Review | Local Copy
Anonymity
- Slashdot - Tor: A JAP Replacement | Local Copy
- Wired - Wired News: Onion Routing Averts Prying Eyes | Local Copy
- CBROnline - Tor offers onion routing for anonymity | Local Copy
- CBROnline - Freenet project struggles with overload | Local Copy
Press Releases
- Net Security - Syngress Publishing Announces the Release of "Zero Day Exploit ... | Local Copy
- Itseccity - DEF CON : One-Hundred Leading Hackers to Present New Material to ... | Local Copy
- Biz.Yahoo - Wireless LAN Attacks are Moving from Discovery Mode to Manipulation | Local Copy
- BusinessWire - LinuxWorld Conference & Expo Exhibitor Profiles | Local Copy
- MarketWire - Immunix Introduces YaST GUI to Help Users of Novell's SUSE LINUX Enterprise Server Simplify Application Security Management | Local Copy
- LockerGnome - No Starch Press Authors To Make Appearance At DEF CON 12 | Local Copy
Blogs/Small Articles
- FSecure - Mikko's blogging on DC12 | Local Copy
- Engadget - Live from DefCon: The Sniper Yagi - Engadget - www.engadget.com | Local Copy
- Engadget - Who you gonna call? The BlueSniper - Engadget - www.engadget.com | Local Copy
- Engadget - Live from DefCon: WiFi bouncing | Local Copy
- BoingBoing - Replace every image on a WiFi network with goatse.cx - Local Copy
- BoingBoing - Defcon Wi-Fi shootout results - Local Copy
- BoingBoing - Sniper rifle modded to be WiFi antenna - Local Copy
- BoingBoing - Defcon Wifi Shootout Contest - Local Copy
- BoingBoing - WiFi shootout in Vegas - Local Copy
- DC404 - Defcon Atlanta Group Write-up | Local Copy
DEF CON 11
- The Trade Show Floor: Def Con 0xB | Darth Elmo, Linux Journal - Local Copy
- Security pros talk, but can they walk? | CNET news.com - Local Copy
- Waiting for the worm to turn up | CNET news.com - Local Copy
- Robot 'guard dog' protects Wi-Fi setups | CNET news.com - Local Copy
- Hacking contest promotes security | CNET news.com - Local Copy
- DEF CON '03: Myth, Reality and Pictures | the inquirer - Local Copy
- COMPUTER SECURITY: Searching for the full truth | Las Vegas Review Journal - Local Copy
- Vegas' Hackers' Meeting Stresses e-danger | Las Vegas Sun - Local Copy
- Wireless network worries? Get a dog! | geek.com - Local Copy
- Internet threat looms as thousands of hackers meet | Forbes.com - Local Copy
- Hand-Held Devices Easy to Hack, Security Experts Say | Washington Post - No Local Copy (please provide!)
- Hackers get lesson in the law | CNET news.com - Local Copy
- Has 'haven' for questionable sites sunk? | CNET news.com - Local Copy
- Mitnick unveiled in more crazy DEF CON 03 photos, Root-Fu ceremony captured | the inquirer - Local Copy
- Programmer shows why he's got game | In Business Las Vegas - No Local Copy (please provide!)
- HavenCo's Gilbert & Sullivan Journey | the inquirer - Local Copy
DEF CON 10
- Vegas Braces for Hackers | Wired
- Defcon: Va-Va-Va Voom, Las Vegas | Wired
- Defcon: A Veritable Hack Fest | Wired
- Patrick's Def Con X Report: Day One
- How to Win Def Con's Capture the Flag Contest
- Putting fun back into hacking | ZDNet
- Shock! Maturity rules at hack fest | SMH
- Hackers Called Truthseekers, Problem-Solvers
- Reality Douses DefCon Camaraderie | PCWorld
DEF CON 9
- Patrick Brauch of C'T talks about Defcon (auf Deutsch) | Local Copy
- Defcon 9 Review - En Espanol! | Local Copy
- CNET - Defcon Grows Up - Robert Lemos - Local Copy
- CNET - Hacking for Human Rights - Robert Lemos - Local Copy
- IDG - CdC Redefines Hacktivism - Sam Costello
- The Guardian - Hats off to the Hackers - Simon Edwards - Local Copy
- DFWCUG - What I did on my summer vacation | Opcom - Local Copy
- BBC News - FBI Arrests alleged copyright hacker - Mark Ward - Local Copy
- ZDNet - Are 'White Hat' hackers unfairly under seige? | Robert Vamosi - Local Copy
- The Register - Hackers run amok during Defcon - John Leyden - Local Copy
- IDG - A Virus to fight viruses[sic] - Sam Costello - Local Copy
- Jon Sullivan's Blog on DC9, Part 1 | Local Copy
- Jon Sullivan's Blog on DC9, Part 2 | Local Copy
DEF CON 8
- ABC News has an intersting but shallow slide show overview of DEF CON 8.
- TechTV.com's cybercrime had extensive coverage of the convention. This is the main page.
- Hackers aren't criminals | they're the best kind of security - Laird Brown
- Black Hat/Def Con: The Magic is in the Mix. - Richard Thieme
- VarBusiness messes up an article and mis quotes Russ. - Carol Ellison - Local Copy
- Specter Of Network Attacks Looms Anew, | Max Smetannikov, Inter@ctive Week - Local Copy
- Hackers won't give Pentagon a break | Jim Wolf, Reuters - Local Copy
- Specter Of Network Attacks Looms Anew: Computer Snatchers Invade - Local Copy
- Is DEF CON turning legit? | Robert Lemos, ZDNet - Local Copy
- Hackers: Uncle Sam wants you! | Robert Lemos, ZDNet - Local Copy
- Do security holes demand full disclosure? | Weld Pond, @Stake - Local Copy
- Why DEF CON beats H2K. - Drew Ulricksen, ZDNet News
- Why it's a 'Summer of Hacking'. | Joel Deane, ZDNet News - Local Copy
- Jason Scott has a DEF CON Diary located at cow.net - Local Copy
DEF CON 7
- Boardwatch Magazine - Doug Mohney - THROUGH THE LOOKING GLASS - DEF CON 7 | September Issue, 1999
- Wired News - Two pretty good articles from
- Wired News - Polly Sprenger - Fear and Hacking in Las Vegas | July 10, 1999 - Local Copy
- Wired News - Polly Sprenger - Def Con: Brin in Da Noise | July 8, 1999 - Local Copy
- The Arizona Republic - Bruce Meyerson - Tools of the trade | July 9, 1999
- CBS.com - Hacker Eline Meet In Vegas | July 10, 1999
- ABC NEWS.com - Michael J. Martines - Hackers Having a Blast | July 9, 1999
- ZD TV has a section in the CyberCrime area for DEF CON with these different articles
- ZDTV - Alex Wellen - Def Con Writ Large | July 13, 1999
- ZDTV - Alex Wellen - Closing in on Def Con | July, 1999
Remembering the First Def Con. (Note: Contains some factual errors, but still good) - Local Copy - ZDNet - Inter@ctive Week Online - Doug Mohney - Hacker Fest: Serious Party | July 28, 1999
- Kevin Poulson had a few pieces about DEF CON
- My First Def Con - On finding decadence and dialogue in the desert | July 14, 1999
- He had this to say about InfoWar, in a question that was brought up to him at DEF CON 7.0.
- MSNBC had a couple of articles
- XDNNs Robert Lemos had an article about the media causing hacking.
- MSNBC - Should you care about DEF CON? | July 12, 1999
- MSNBC - Bob Sullivan - Hackers descend on Las Vegas | July 9, 1999.
- CNET News.com - Tim Clark - Hackers attack their own kind | July 9, 1999 Local Copy
- CNN had several articles:
- CNN - DefCon '99 draws security experts from both sides | July 12, 1999 - Local Copy
- CNN - DefCon 99: Games hackers play | July 13, 1999 - Local Copy
- CNN - Convicted hacker gives advice at DefCon | July 13, 1999 - Local Copy
- CNN - DefCon demos the latest chaos | July 14, 1999 - Local Copy
- CNN - Back Orifice 2000 under control | July 15, 1999 - Local Copy
- CNN - Bad rap for Back Orifice 2000? | July 21, 1999 - Local Copy
- USA Today newspaper wrote Hacking into a new age.
- Infoworld had a couple pieces about Black Hat and DEF CON.
- this nice piece about Black Hat and DEF CON. - Local Copy
- Infoworld - Matthew Nelson - 2,500 hackers gather in Las Vegas for DefCon | July 11, 1999
- Computerworld had this short piece: Latest hacker tool will target NT desktops.
- PCWorld News - Andrew Brandt - Hacker Games: From Trivia to Wrestling July 10, 1999 - Local Copy
PCWorld News - Hackers Gather in Vegas.
PCWorld News - Andrew Brandt - Hack-a-thon Demos the Latest Chaos | July 12, 1999 - Local Copy
Parse has several Real Media interviews of stuff around DEF CON.. check it out in thesection.
Psuedo has some Video of DC7
DEF CON 6
- NYTimes - Hacker Convention Takes On a Corporate Tone by By MATT RICHTEL | Local Copy
- NYTimes - The Hacker Myth Crumbles at Convention | Local Copy
- CNN - Hackers: the good, the bad, the ugly | Local Copy | Wav File from CNN Story
- CNN - Hackers claim to find security holes in Microsoft's Windows | Local Copy
- Infoworld - Attendees beware: A Black Hat in the sun can scorch your brain | Local Copy
- Infoworld - Black Hat: We have seen the enemy and they are ... being interviewed on CNN | Local Copy
- ZDNet - DEF CON: Fear and fascination in Las Vegas | Local Copy
DEF CON 5
- ABC News with a picture of AJ and Deth Veggie. By Angie Bluethman.
- Hackers turn up heat at DEF CON V, from the Secure Computing Security Newsletter. By Holly Knox, Internet Security Editor
- ZDNet's Hackers invade Vegas. By Robert Lemos.
- Netly News If you build it, they will Con. By Declan McCullagh - Local Copy
- The Site's Fear and Hacking in Las Vegas by Joel Deane.
- Crooks Hook Clueless Hackers by Joel Deane.
- Special to the Mercury News West magazine It takes a hacker to catch a hacker Four parts, by Jonathan Littman.
- Here are the pictures from the article thanks to Lockheed for scanning them.
- Computer World's Fear and Hacking in Las Vegas (Common article title, eh?) by Michael Schrenk. - Local Copy
- The Vominator's heart wrenching experiences at DEF CON V.
- Krusty's TDYC review of DEF CON V.
- Soul to Squeeze writes about the con.
- Lockheed's account of what the hell happened.
- Thanks to Ophie for sending this Comic from Computer World.
- TekLord and Plucky's review page for DEF CON 5. - Local Copy(scroll to near end of document)
- What Plucky, TekLord and Zytek did.
- DefCon V Adventure: System Failure Debut, by pinguino.
- This piece, called Hackers Do Vegas ran in The Australian on August 2.
- Hacker Lessons learned by Matt Willis and told at DEF CON 5, written by Sharon Machlis for Computerworld 07/21/97.
- Ira Winkler Spy Catcher talks about what he had to say at DEF CON 5, written by Steve Ulfelder for Computerworld, 08/11/97.
- Hackers swap secrets on cracking computers By Angie Bluethman of the Associated Press.
- Count the Cliches in a recent story published by the Associated Press.
DEF CON 4
- DEF CON Hackers television transcript from The Discovery Channel "Cyber Life."
- FBI lectures hackers at convention By Adam Steinhauer, Sunday, July 28, 1996 in the Las Vegas Review-Journal and Las Vegas Sun
- The Orange County Register and this short piece about the FBI at DEF CON IV.
DEF CON 3
- The review from SunWorld Online News.
- The archive of stories about the hack of MGM's Hackers movie home page (Which happened right before the con.
DEF CON 2
- Business Week had a pretty cool write up on the whole matter.
- John Markhoff from the NY Times was there, this is what he had to say.
- Cyber Christ(Who was seen at several cons that year) showed up.
- Theora had a review
- The Financial Times write up was very poor attempt by the author to evaluate a convention he never attended, with an anti virus spin job.
- Fear and Loathing in Las Vegas.
- A super short blurb about the con in the Iron Feather Journal.
- John C. Dvorak wrote a bit about it in PC Magazine.
- Robert X. Cringley from Infoworld was there also.
DEF CON 1
- What Robert X. Cringely had to say about DEF CON I in Info World.
- Robert X. Cringley previews the convention in Infoworld (Unformatted)