This is a comprehensive list of all articles known to
have been written about DEF CON. Many publications are no longer in
existence, and much of this history is lost. If you have press you
would like included in the archive, send links and titles to sleestak [at]
defcon ]dot[ org!
A note to journalists: Please stop writing clever
articles entitled 'Fear and Hacking in Las Vegas', as it becomes
difficult to tell them apart.
DEF CON 31
AI
CTF
DARPA Challenge
Evacuation
General
Hack-a-Sat
iPhone Spoof
Policy
Subway Hacking 2.0
Veilid
Voting Village
DEF CON 30
DEF CON Bans OAN | Vice
This String of Emojis is Actually Malware | Vice
Hackers Took Over a Commercial Satellite to Broadcast Hacker Movies | Vice
Hackers Come Home to Vibrant Community | Dark Reading
StarLink Ground Stations Successfully Hacked | Hackaday
John Deere Tractor Runs Doom | The Register
Black Hat and DEF CON visitors differ on physical risk management | The Register
How Sanctions Impact Internet Operators | Infosecurity Magazine
#DEFCON: CISA Director Praises Congress and International Cybersecurity Cooperation | Infosecurity Magazine
The Next Big Jailbreak in Tech: John Deere Tractors | Gizmodo
Black Hat and DEF CON Roundup | Threatpost
Carnegie-Mellon Team Wins DEF CON Hacking Competition | Business Wire
*****m Patches Mac Auto-Updater Vuln that Granted Root Access | Ars Technica
Election Disinformation Fears Loom Over Hacker Confab | Politico
Sick Codes Jailbreaks Tractor at DEF CON | Fierce Electronics
John Deere Jailbreak Shows It’s All Built on Outdated, Unpatched Hardware | Boing Boing
A New Jailbreak for John Deere Tractors Rides the Right-to-Repair Wave | Wired
Playing for All the Jelly Beans at the EFF Benefit Poker Tournament at DEF CON | EFF
Reproductive Justice in the Age of Surveillance: Panel at DEF CON 30 | EFF
What to watch for as 'Hacker Summer Camp' gets underway in Las Vegas | Cyberscoop
Eclypsium Calls Out Microsoft Over Bootloader Security Woes | Tech Target
Russian Hackers Are Escalating and Diversifying Their Attacks on Ukraine, Research Says | Gizmodo
US Emergency Alert System Has ‘Huge Flaw’ — Broadcasters Must Patch NOW | Security Boulevard
New exploits can bypass Secure Boot and modern UEFI security protections | CSO Online
DEF CON 30 Comes of Age with Hacker Homecoming | Security Systems News
Logran hackear Starlink por solo 25 dólares Muy Computer
Up Close at DEF CON 30 | PC Mag
‘Hackers against conspiracies’: Cyber sleuths take aim at election disinformation | Politico
The *****m installer let a researcher hack his way to root access on macOS The Verge
White House Cyber Director: ‘Defense is the New Offense’ for Cyber | Nextgov
Inglis: People, companies need to replicate collective cyber defense seen in Ukraine | The Record
Potential hack vulnerability for some Boeing planes fixed: Researchers | Business Insurance
*****m acaba de corregir una falla de seguridad importante | Digital Trends (Espagnol)
A Flaw in the VA’s Medical Records Platform May Put Patients at Risk | Wired
DC30 Car Hacking Village Badge | Intrepid Control Systems
(YouTube)
Designing the DEF CON 29 and 30 Badges (featuring MK Factor) Hacker Hangouts (YouTube)
DEF CON 30 OBD-Kill Badge First Flight | Intrepid Control Systems
(YouTube)
Defcon 30 badge release the patch/fix to the bug of smoked badge. | Reddit
DEF CON 29
Badgelife
Farm Hacking
EBooks
Twitter Algo
DHS
Satellite Hacking
PunkSpider
RNG
Conference News
DEF CON 28 Safe Mode
DEF CON 27
Election Security
IOT
Badge Talk
Auto Hacking
General Con Talk
- What a security researcher learned from monitoring traffic at Defcon | CNET
- Black Hat and Defcon look to boost diversity through day care | CNET
- Securing Devices for DEF CON | Security Boulevard
- Should you send your security staff to a hacker conference? | Information Week
- It's Black Hat and DEF CON in Vegas this week. And yup, you know what that means. Hotel room searches for guns | The Register
- No, You Don’t Need a Burner Phone at a Hacking Conference | VICE
- Watch a Drone Take Over a Nearby Smart TV | Wired
- How to Join in on the Security Policy Conversation at DEF CON | Rapid7 Blog
- DEF CON has been and gone, what did you miss? | SentinelOne
- DEF CON 27 Demonstrates Real-World Security Issues for MCUs, Medical Devices, Cars, and More | All About Circuits
- DEF CON 27 Megathread | /r/DEFCON
- We asked DEF CON attendees why people are still getting hacked | VICE
- DEF CON - The Ultimate Guide for First- Timers | Medium
- DEF CON Stack Overflow Traffic Data Trends | Stack Overflow
- How I Hacked DEF CON | Medium
- Why Software Security and DevOps were the Talk of the Town at Black Hat and DEF CON 2019 | Security Boulevard
- DEF CON Goons, Badges and Talks – Inside the Largest Hacker Con in the World | Security Boulevard
- What’s the Most Vulnerable Part of Your Network? | Security Boulevard
- 8 Free Tools to be Showcased at Black Hat and DEF CON | Dark Reading
- It's Black Hat and DEF CON in Vegas this week. And yup, you know what that means. Hotel room searches for guns | The Register
- August 12, 2019: DEF CON 27 | My Blue Tesla
- Thoughts from DEF CON 27 | CSO Online
- Black Hat, DEF CON, and BSides 2019: Highlights and Emerging Industry Trends | Rapid7 Blog
- Cal Poly to Bring Learn by Doing to Global Hacker Convention in August | Cal Poly News
- ***** Security Researcher Suspended for Exposing Vulnerabilities in His School’s Software | Vice
- ***** Tells DEF CON How He Hacked Millions of Student Records From Popular Education Software [Update] | Gizmodo
- This ***** Hacker Found Bugs in School Software That Exposed Millions of Records | Wired
- DEF CON 27: r00tz Asylum Opening Ceremonies | EFF
- 15 Hot Tools to Come Out of Black Hat and DEF CON | Security Boulevard
- DEF CON 27: WISP Leadership Panel | EFF
- Critical Windows 10 Warning: Millions Of Users At Risk | Forbes
- US Senator Says Wireless Carriers Helping Trump Build 'Surveillance State’ | Tom’s Guide
- Hundreds of exposed Amazon cloud backups found leaking sensitive data | TechCrunch
- SELECT code_execution FROM * USING SQLite: Eggheads lift the lid on DB security hijinks | The Register
- On 12th June 2019, a crazy idea just popped into my mind “i want to fly to USA and attend Defcon 27” | Medium
- Nmap 7.80 DEF CON Release: First Stable Version in Over a Year | Bleeping Computer
- #DEFCON: Hackers Can Use Netflix Account to Steal Banking Info | InfoSecurity
- Def Con 2019 and Hacking iOS Contacts | The Mac Observer
- NFC Business Cards to FPGA Cubes, Skull Badges to Bandoliers, Here’s the Hardware from Breakfast at DEF CON | Hackaday
- Minnesota team places 2nd in national 'hacking' competition | KARE11
- Critical Windows 10 Warning: Millions Of Users At Risk | Forbes
- Clever attack uses SQLite databases to hack other apps, malware servers | ZDNet
- Remotely hacking elevator phones shouldn't be this easy | Mashable
- Wyden rallies Def Con in speeches chastising telecom sector on privacy, Sen. McConnell on elections | Inside Cybersecurity
- Those Elevatort Emergency Call Buttons are Actually Pretty Janky | Hackaday
- Hacker Jeopardy, Wrong Answers Only Edition | Security Boulevard
CTF
Aviation Village
License Plates
DEF CON SecureDrop
DEF CON 26
Vote Hacking
- Election-Hacking Lessons from the 2018 Def Con Hackers Conference | The New Yorker
- Senators Kamala Harris, Susan Collins, Mark Warner and James Lankford letter to ES&S | Harris.Senate.Gov
- Iowa needs just a little more Vegas | TheGazette.com
- Secretaries of State Blast Election Hacking Exercise | RouteFifty
- Harris Public Policy announces first-of-its-kind initiative to inform cyber policy | University of Chicago
- The ABCs of Hacking a Voting Machine | Dark Reading
- Smartphones or pen and paper? Cybersecurity experts split on tech in voting | NBC News
- #DEFCON Vote Hacking Village Refute NASS 'Unfair' Claims | InfoSecurity Magazine
- Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms | Dark Reading
- Def Con Hackers Easily Bust Into Voting Machines, But Will Tech Companies Listen? | Huffington Post
- Election officials say money, training needed to improve security | Review Journal
- US officials hope hackers at Defcon find more voting machine problems | MSN
- At DEF CON '18, ***** as ***** as 5 challenged to hack election results websites, voting machines | ABC News
- At DEF CON, the Biggest Election Threat is Lack of Funding | WIRED
- DNC-led DEF CON event tests election websites against ***** hackers | MSN
- At DEF CON ’18 ***** Challenged to Hack Election Results Websites Voting Machines | KRYN.com
- DEF CON plans to show US election hacking is so easy ***** can do it | The Register
- Louisiana doesn't need any hacks in its election system | NOLA.com
- 11-year-old hacks replica of Florida state website, changes election results | USA Today
- Election officials' concerns turn to information warfare as hackers gather in Vegas | CNN
- Grimes: Kentucky Needs More Funding To Update Voting Infrastructure | WKMS.org
- Manfra highlights DHS election security work, pitches collaboration to ‘Def Con’ crowd | Inside CyberSecurity
- ***** Maine hacker shows off skills | WMTW.com
- An 11-Year-Old Changed The Results Of Florida's Presidential Vote At A Hacker Convention. Discuss. | BuzzFeed News
- States have a lot of work to do on cybersecurity, and they shouldn’t wait for ***** to find the problems | Washington Examiner
- 11-year-olds hack replica of Florida's election website in less than 15 minutes | Orlando Sentinel
- I Just Hacked a State Election. I’m 17. And I’m Not Even a Very Good Hacker. | Politico
- DEFCON Video Shows a Voting Machine Used in 18 States Is Hacked in 2 Minutes | Inverse
- Pre-***** Hackers Prove It: The U.S. Election System Simply Isn’t Secure Enough | Futurism
- Pen and paper is still king in America election security | The Register
- DEF CON 26: First Day Review and Voting Machine Hacking | InCyberDefense
Auto Hacking
IoT
#badgelife
Medical Hacking
Policy
General
Write-ups
DEF CON 25
Voting Village
"The stakeholders for voting machines are everyone in the country. So it's important the problems get fixed."
-Matt Blaze
- Hackers plan to break into voting machines to test election meddling Geobeats, AOL.com
- Personal Info of 650,000 Voters Discovered on Poll Machine Sold on eBay. Kevin Collier, Gizmodo
- Hackers and DEF CON took only 12 minutes to hack US Voting Machines. Agent Smith, LatestHackingNews.com
- DEF CON hackers find it's very easy to break voting machines. Alfred Ng, c|net
- At hacker convention, a spotlight on weaknesses in election security Hari Sreenivasan, PBS Newshour Weekend
- Hackers scour voting machines for election bugs. Jim Finkle, Reuters
- Report: Defcon 2017 to feature election hacking exhibition. Bradley Barth, SC Media
- Worried about vote hackers? Hackers are here to help. S*****R.org
- It took DEF CON hackers minutes to pwn these US voting machines Iain Thomson, The Register
- Top hacker conference to target voting machines. Edward-Isaac Dovere, Politico
- How Hackers Are Teaching Election Officials To Protect Their Voting Machines Steven Melendez, Fast Company
- To fix voting machines, hackers tear them apart Lily Hay Newman, WIRED
- These Hackers Reveal How Easy It Is To Hack US Voting Machines Thomas Fox-Brewster, Forbes
- DEF CON rocks the vote with live machine hacking. Kelly Jackson Higgins, Dark Reading
- Hacker cracks voting machine in less than 2 hours. Robert McMillan and Byron Tau, Wall street Journal
- Hackers breach dozens of voting machines brought to conference Joe Uchill, The Hill
- DEF CON vote-hacking village shows that "secure" voting machines can be broken in minutes. Cory Doctorow, BoingBoing
- For decades-old flaws in voting machines, no quick fix Seth Rosenblatt, The Parallax
- Worried about election hacking, LA County officials are turning to hackers for help Jill Leovy, LA Times
- DEF CON hackers made short work of voting machines. Now what? Matt Leonard, GCN
- Hackers break into voting machines within 2 hours at DEF CON CBS News
Internet of Things
Hardware
Con News
- Everything looks like a hack when you're paranoid at DEF CON. Alfred Ng, c|net
- Security pros at hacker conference: be more boring. Joe Uchill, The Hill
- DEF CON's hotel business center won't print from links or USBs Cory Doctorow, BoingBoing
- Las Vegas locks down ahead of DEF CON hacking conference Iain Thomson, The Register
- Congressmen at DEF CON: Please help us, hackers! Seth Rosenblatt, The Parallax
- Paranoia and break dance battles: My first crazy hacker fest Alfred Ng, c|net
- UPS is scared of getting hacked during DEF CON Alejandro Alba, Gizmodo
- Black Hat and DEF CON: The evolution of hacker summer camp George Hulme, CSO
- Salesforce "red team" members present tool at Defcon, get fired Sean Gallagher, Ars Technica
- Black Hat at 20, DefCon at 25: Not just about breaking things Stephen Cobb, WeLiveSecurity
- Salesforce fires red team staffers who gave DEF CON. talk Zach Whittaker, ZDNet
- DEF CON's greatest hacks and the Internet of Twizzlers Stacey on IoT podcast and cybersecurity
- Kasparov talks calculated odds, AI and cyber security Seth Rosenblatt, The Parallax
Badgelife
- Building a DEF CON badge in two weeks. Brian Benchoff, Hackaday
- DEF CON Badgelife: The ESP rules all. Brian Benchoff, Hackaday
- Retro DEF CON badge made from '80s parts. John Baichtal, Hackaday
- DEF CON Badgelife: Someone finally did it Brian Benchoff, Hackaday
- Hands-on: New AND!XOR unofficial DEF CON badge Mike Szczys, Hackaday
- DEF CON Badgelife: Blinky Bling Brian Benchoff, Hackaday
- DEF CON Badgelife: The puffy that runs Linux Brian Benchoff, Hackaday
- All the hardware badges of DEF CON 25 Mike Szcys, Hackaday
- Badge from Diamond Age comes to DEF CON Mike Szczys, Hackaday
- The exquisite art and subculture of DEF CON's (unofficial) badges Roberto Baldwin, Engadget
- Behind hackers' love affair with unofficial conference badges Seth Rosenblatt, The Parallax
- IDES of DEF CON: Badge post-mortem Ides of DEF CON, Medium
- Inside this year's Queercon badge Brian Benchoff, Hackaday
Wireless
DEF CON 24
Automotive
Badge Talk
CTF
Cyber Grand Challenge
- Three Teams Earn Prizes in DARPA Cyber Grand Challenge Cheryl Pellerin, DoD News, Defense Media Activity
- Despite Obstacles, UCSB Hacking Team Places 3rd at 2016 Cyber Grand Challenge Sonia Fernandez, Noozhawk.com
- Bug Hunting Cyber Bots Set to Square Off at DEF CONChris Brook, Threatpost
- Automating Cybersecurity Kenneth Chang, New York Times
- Watch AI hack into AI at DARPA’s Cyber Grand Challenge Cecil Kleine, TheNextWeb
- Pittsburgh-based team wins $2M DARPA Grand Cyber Challenge Greg Otto, fedscoop
- AI hackers will make the world a safer place -- hopefully Roberto Baldwin, Engadget
- Like Battlebots, Except These Robots Automatically Patch CyberSecurity Holes Aliya Sternstein, DefenseOne
- White hat hacker AI bots prepare for DARPA's DEF CON cyber brawl Iain Thomson, The Register
- DARPA's Cyber Grand Challenge Heads to DefCon Sean Michael Kerner, eWeek
- DARPA's Cyber Grand Challenge Is A Glimpse Of Our Human-Free Future William Turton, Gizmodo
- DARPA Cyber Grand Challenge Ends With Mayhem Sean Michael Kerner, eWeek
- Hackers Don’t Have to Be Human Anymore. This Bot Battle Proves It Cade Metz, WIRED
- Geeks win millions for teaching computers to battle each other Jim Finkle, Reuters
- Carnegie Mellon’s Mayhem AI takes home $2 million from DARPA’s Cyber Grand Challenge Devin Coldewy, TechCrunch
- DARPA Challenge Takes AI To War Games John Markman, Forbes
- Seven automated hacking systems will compete for a $2 million prize on Thursday Russell Brandom, The Verge
- DARPA Competition Aims to Help Automate Computer Security Jay Clemens, ExecutiveGov.com
- DARPA's Machine Challenge Solves CrackAddr Puzzle Sean Michael Kerner, eSecurity Planet
- 'Mayhem' program wins grand hacking challenge BBC News
- 'Mayhem' Takes $2M First Prize in DARPA Cyber Grand Challenge Dan Heilman, Top Tech News
- Should we be worried about robot bug hunters? Nicole Kobie, ITPro.co.uk
- Forget Rio Olympics, DefCon Is Giving 2 Million USD For Hacking Suchayan Mandal, Lifehacker In dia
- A supercomputer is taking on humans in a hacking contest at DEF CON Michael Kan, PC World
- Hackers demonstrated first ransomware for IoT thermostats at DEF CON Darlene Storm, ComputerWorld
- Chinese team shows strength in int'l network security competition Xinhua, Shanghai Daily
Fed Talk
- US Politicians tell DEF CON it'll take Congress ages to sort out how to regulate crypto Iain Thomson, The Register
- DEF CON: How feds' outreach plays with the hacker crowd Randy Apuzzo, GCN
- #DefCon US Government Only Holds Dozens of Zero-Days Dan Raywood, Infosecurity Magazine
- NSA denies ‘Raiders of the Lost Ark' stockpile of security vulnerabilities Alex Hern, The Guardian
- Feds Keep a Lower Cyber Arsenal Than Tech World Believes Newsmax
- #DefCon FTC Stresses IoT Concerns Dan Raywood, Infosecurity Magazine
- FTC Goes to DEF CON Lorrie Cranor, FTC.gov
- FTC seeks research help from DEF CON hackers Tim Greene, NetworkWorld
- FTC Commissioner Looking for Hackers' Help With Consumer Privacy Sean Michael Kerner, eWeek
- How the Government ins Waging Crypto War 2.0 Daniel Oberhaus, Moterboard
- When Government Secrets Keep You Safe Robert Hackett, Fortune
General
- Here's what it's like at America's largest hacking convention Daniel Howley, Yahoo! Finance
- Impressions From DEF CON 24: The Machines Are Rising Paul Ionescu, SecurityIntelligence.com
- Def Con Has Always Been Straight, White, and Male, But It’s Finally Changing Daniel Oberhaus, Motherboard
- How to hack a government Roberto Baldwin, Engadget
- DEF CON 24: THE OFFICIAL SOUNDTRACK beatport.com
- You can buy lock picks, Wi-Fi hacking tools, and more at the world's biggest hacking conference Paul Szoldra, Business Insider
- Defcon deals: Five hacking tools for $100 or less Laura Hautala, c|net
- John McAfee declares war on Kim Dotcom: Fight erupts between tech's most controversial figures Mary-Ann Russon, International Business Times
- DefCon: How the Hacker Tracker Mobile App Stays Secure Sean Michael Kerner, eWeek
- Elliot’s reality is murky, but Mr. Robot tech advisors remind us the show’s is not Nathan Mattise, Ars Technica
- DEF CON 24's "Rise of the Machines" Warns of Robot Uprising Catrina Dennis, Inverse
- Not Going to DEF CON? 5 Things to Wach from the Hacker Con Nathaniel Mott, Inverse
- "The Stakes are Higher Then Ever" for Hackers at DEF CON 24 Nickolaus Hines, Inverse
- This Guy Let Me Control His Hacked Wheelchair With An Xbox Gamepad Thomas Fox-Brewster, Forbes
- Blue Screen of Death Brain Benchoff, Hackaday
- Data Sheet—Saturday, August 6, 2016 Robert Hackett, Fortune
- Def Con: The hackers bringing Mr Robot to life Mark Ward, BBC News
- The state of cybersecurity: we're all screwed Dan Tynan, The Guardian
- Gov't thinks it has right to data, Lavabit founder says Teri Robertson, SC Magazine
- DEF CON 24: Day One Tom Palarz, Veracode
- DEF CON: a Hacker's ParadiseClick, BBC
- Lessons from a digital mercenary: Beware the ‘October Surprise' Sara Sorcher, The Christian Science Monitor
- Disable WPAD now or have your accounts and private data compromised Lucian Constantin, IT World
- Road Warriors: Beware of 'Video Jacking' Brian Krebs, Krebs on Security
Internet of Things
- #DefCon: Thermostat Control Hacked to Host Ransomware Dan Raywood, Infosecurity Magazine
- DEFCON: BtleJuice MitM Hacks Bluetooth (and belittles Bluetooth Padlock security) Sean Michael Kerner, InternetNews.com
- DEF CON Researchers Hack A Dell Monitor To Show Any Pixels They Want Logan Booker, Gizmodo Australia
- High-security electronic safes can be hacked Lucian Constantin, ComputerWorld
- US seismic sensors let hackers trigger false alerts and fake data James Walker, Digital Journal
- Hacker Unlocks ‘High Security’ Electronic Safes Without a Trace Lily Hay Newman, Wired
- If you use ‘smart’ Bluetooth locks, you're asking to be burgled Iain Thomson, The Register
- Researchers Infect IoT Thermostat with Ransomware Catalin Cimpanu, Softpedia
- Your 'intimate personal massager' – cough – is spying on you Iain Thomson, The Register
- Defcon heats up with smart thermometer ransomware Jon Martindale, Yahoo! Tech
- Hackers Make the First-Ever Ransomware for Smart Thermostats Lorenzo Franceschi-Bicchierai, Motherboard
- Proof-of-concept ransomware for smart thermostats demoed at Defcon Cory Doctorow, BoingBoing
- Researcher finds huge security flaws in Bluetooth locks Roberto Baldwin, Engadget
- Hacking Hotel Keys and Point of Sale Systems at DEF CON Sean Michael Kerner, eSecurity Planet
- How to prevent your security camera from being hacked Taylor Martin, c|net
- Someone made a smart vibrator, so of course it got hacked Alex Hern, The Guardian
- Black Hat USA and DefCon: Finding Security Risks in All the ThingsSean Michael Kerner, eWeek
- Solar panels, vacation Wi-Fi at risk for hacking Elizabeth Weise, USA Today
- This ***** toy tells the manufacturer every time you use it Kashmir Hill, Fusion
- #DefCon: Thermostat Control Hacked to Host Ransomware Dan Raywood, Infosecurity Magazine
- Hedberg is a Bionic Hand Made From a Single Keurig Cameron Coward, Hackaday
- Thermostat Ransomware: a Hack Explained Sue Walsh, RTInsights.com
- Not even your vibrator is safe from data-mining, hackers prove Ariel Bogle, Mashable
- Hackers Could Break Into Your Computer Monitor And Manipulate Your Pixels Kavita Iyer, TechWorm
- Def Con: Do smart devices mean dumb security? BBC News
- The Internet of Dildos is Watching You Daniel Oberhaus, Motherboard
- This PC monitor hack can manipulate pixels for malicious effect Michael Kan, ITWorld
- Your monitor can be hacked, used to spy on you Shawn Knight, TechSpot
- Hackers can force your monitor to permanently display images James Walker, Digital Journal
- Researchers: Hackers could weaponize up to a billion monitors to spy on everyone Joel Hruska, ExtremeTech
- 1 billion computer monitors vulnerable to undetectable firmware attacks Cory Doctorow, BoingBoing
Mobility
- Major Qualcomm chip security flaws expose 900M Android users Tom Mendelsohn, Ars Technica
- How Qualcomm Flaws Left 900 Million Android Devices Vulnerable to Spies David Meyer, Fortune
- Android chip vulnerability leaves millions of devices open to attack Greg Otto, fedscoop
- Quadrooter: More than 900 million Android devices have a critical security flaw Kyle Wiggers, Digital Trends
- Newly Announced Chipset Vuln Affects 900 Million Android Devices Ericka Chickowski, Dark Reading
- Quadrooter is the Latest Android Malware Scare Reminding You to Stick to Google Play Kellex, DroidLife
- Researchers Find Serious Bugs in Android Devices that Use Qualcomm Chips Alina Maring, CDA News
- Qualcomm Vulnerabilities Put 900 Million Android Devices at Risk Jeffrey Burt, eWeek
- Hacker Creates Fake, Effective Boarding Passes David Z. Morris, Fortune
- Fake QR code app gets hacker into luxury airport lounges for free Lisa Vaas, Naked Security
- Traveler Hacks His Way Into Fancy Airport Lounges Laura Northrup, Consumerist
- Samsung Pay hack lets attackers skim cards to make fraudulent payments James Vincent, The Verge
- Samsung Pay Warning: How Hackers Can Intercept Credit Card Info Karl Utermohlen, InvestorPlace
- DEF CON: Samsung Pay Hacked Sean Michael Kerner, InternetNews
- Samsung downplays Def Con 24 claims that Samsung Pay can be hacked John Kennedy, Silicon Republic
DEF CON 23
Automotive
- Want to hack a car? Don't try hacking a Tesla. Yoni Heisler, BGR
- Hacking a Tesla Model S: What we found and what we learned Kevin Mahaffey, Lookout Blog
- How Hackers Tore Apart A Tesla Model S To Kill The Car Mid-Drive Thomas Fox-Brewster, Forbes Tech
- Here is how you learn to hack a car Andrea Peterson, The Washington Post
- This Hacker’s Tiny Device Unlocks Cars And Opens Garages Andy Greenberg, Wired
- DEF CON 23: la panoplie de hacker pour voler une voiture connectée Gilbert Kallenborn, 01net.com
- DEF CON 23: comment des hackers ont piraté la Tesla Model S Gilbert Kallenborn, 01net.com
- Automakers trying to prevent hackers from comandeering cars Tom Krisher, AP
- Hacked Jeep Cherokee Exposes Weak Underbelly of High-Tech Cars Jordan Robertson, Bloomberg
- 10 years after his epic MySpace hack, Samy Kamkar is trying to turn hackers into heroes Kashmir Hill, Fusion
- More Car Hacks from DEF CON 23 Douglas Mechaber, Tom's Hardware
- OwnStar Wi-Fi attack now grabs BMW, Mercedes, and Chrysler cars’ virtual keys Sean Gallagher, Ars Technica
- Highway to hack: why we’re just at the beginning of the auto-hacking era Sean Gallagher, Ars Technica
- Tesla hackers explain how they did it at DEF CON Antuan Goodman, CNET
- Black Hat and DEF CON Tech Tent, BBC World Service
- This piece of $30 Electronics Can Unlock Your Keyless Entry Car Aaron Mamiit, Tech Times
- This $30 device defeats almost any keyless car or garage door Steve Dent, Engadget
- Hackers Might Help Defending Tesla's High-Tech Cars Vlad Tverdohleb, Itechpost
- DEF CON focuses on vehicle security and beyond in wake of Jeep hack Heidi Hoopes, Gizmag.com
- Hackers Take Control of a Tesla, Sort Of Danny Yadron, Wall Street Journal
- Tesla's Model S hack still proves it's better than other car makers Devindra Hardawar, Engadget
DEF CON Badge
Clickjacking
Crypto
CTF
Cyber Grand Challenge
DEF CON Shoot
Disclosure
Drones
Internet of Things
Interviews
Kali Linux
Mobile
Overview
- Imploding Barrels and Other Highlights from Hackfest DEF CON Kim Zetter, Wired
- Paranoia Made Me a Better Computer User Adam Clark Estes, Gizmodo
- 10 scary hacks from Black Hat and DEF CON Lucian Constantin, Computerworld
- DEF CON 2015 Fr, Robert Ballecer, TWit/Coding 101
- Hackers share intelligence and compete in Las Vegas David Grossman, BBC Newsnight
- Hackers and Feds Clash in Las Vegas Luke Rudkowski, WeAreChange
- TekThing 32 Patrick Norton, Shannon Morse, TekThing
- News from DEF CON 23: fake deaths, DHS and Tesla court hackers Violet Blue, ZDNet
- What's the Top Story at This Year's DEF CON? Emily Chang, BloombergBusiness
- Bugcrowd podcast Bugcrowd
- Want to be Totally Secure on the Internet? Good Luck. Laura Hautala, CNet
- A Million Ways to Break In at the World's Largest Security Gathering Laura Hautala, CNet
- Heists go Hollywood with DEF CON Hacks Glenn Chapman, Phys.org
- Abandon All Hope, Ye Who Log On Here Joe Bernstein, BuzzFeed
- A look inside the hostile, helpful world of hacking conventions Amanda Schupak, CBS News
- Meet the World's Most Dangerous Geeks Dan Tynan, Yahoo! Tech
- Hacking Tesla, Breaking Banks and Killing People Online: The Best of DEF CON 2015 Jeff Stone, IBT Pulse
- Cybersecurity: Viva Lessons from Las Vegas Steve Weisman, USA Today
- When Fear of Being Hacked Takes Hold Lily Hay Newman, Slate
- Surviving the DEF CON Hacker Conference Roberto Baldwin, Engadget
- What I Learned at DEF CON Nathan White, AccessNow Blog
- VITB Podcast: DEF CON 23 Recap Vince, Vince in the Bay Podcast
- Post DEF CON Depression Gr3ynoise Podcast
- Six Scary Revelations from 2015 DEF CON Hacker Conference Clint Davis, ABCActionNews.com
- Salted Hash: Live from DEF CON 23 Steve Regan, CSOOnline.com
- Skateboards, Drones and Your Brain, Everything Got Hacked Alex Hern, The Guardian
Physical Security
Politics
Queercon
Robocalls
Rootz
Rumor Department
SCADA
Social Engineering
DEF CON 22
Airplane Hacking
Blackphone
Car Hacking
Crypto
DEF CON General
Email Hacking
Hacking Politics
Hacking the Internet of Things
Physical Security
Privacy
SOHOpelessly Broken
War Kitteh
Zapping Rachel
DEF CON 21
General
- 5 Tips for surviving DEF CON 21 |
C/NET
- 5 scariest cybersecurity threats at Black Hat, Defcon |
CBS
- The five scariest hacks we saw last week |
CNN
- Def Con 21: Hacks, Cracks und Edward Snowden |
Computer Bild
- Black Hat, DEF CON Put Spotlight on Major Security Issues, Hacks |
eWeek
- Hackers take over Las Vegas |
FoxNews
- Democratizing the creep factor: Anyone can play NSA, "Ocean's 11″ and cyberstalker |
Gigaom
- How to tell DEF CON and Black Hat Apart |
Gigaom
- False sense of security: Your TV, car, neighborhood may be hackable |
Gizmag
- Don't get pwned at Black Hat, DEF CON |
Help Net Security
- DEF CON: Hacking for the Rest of Us |
Huffington Post
- Al via Defcon: quando gli hacker esplorano i limiti della sicurezza
informatica ("At the start Defcon: when hackers explore the limits of
computer security") |
Il Sole 24 Or
- Black Hat / Def Con 2013 |
Zataz
- A DEF CON postscript: Said the FBI agent to the taxi driver |
ZDNet
- DEF CON 21 in Pictures |
ZDNet
- DEF CON 21: Best in Show |
ZDNet
- Postcards from DEF CON 21 |
ZDNet
- Tech Week That Was: Suspicious Searches, Def Con And Moto X |
NPR
- What We're Watching As World's Big Hackers Meet In Las Vegas |
NPR
- At Def Con, hackers join together to 'hack everything' |
NPR/Marketplace
- An Inside Look At The Hacker Conferences |
NPR/WGBH
- How Not to Get Hacked at Black Hat and DefCon |
PCMagazine
- Surveillance drones and Uncle Sam: Hackers take on all at DefCon 21 |
RT
- Slideshow: August 2013 threat stats |
SC Magazine
- What Happens At DefCon Stays With Us All |
TechCrunch
- Hack the mini bar, spot the feds, DEF CON is back |
The Conversation
- Hackers gather—and mourn a big loss |
The Economist
- The best of Black Hat and Def Con 2013 |
The Verge
- The top 10 new reasons to be afraid of hackers |
The Verge
- Tin tặc thế giới hội tụ ở Las Vegas ("Hackers world converged in Las Vegas") |
tienphong online
- DEFCON 21: THINGS YOU MAY HAVE MISSED |
Tripwire
- Def Con, Day One: Can I Use Your Wi-Fi Please? |
Vice
- Def Con, Day Two: Def Con Is for Winners |
Vice
- How To Get Hacked At Defcon |
Vice
Car Hacking
Lock Security/Sport
Bitcoin
Rootz Kidcon
Legal/Civil Rights
Feds
Smart Devices and Homes
Mobile Security/Malware
Badge/Badge Challenge
Will Smith
Social Engineering
EFF Crypto Shirt
Documentary
IPV6
Facebook
Wireless
Misc
DEF CON 20
Keynote
Badge News
Aviation
SCADA
The Cloud
Consumer Protection
Event Reviews
Routers
VPN Security
Physical Security
The Singularity
DEF CON *****
NinjaTel
Social Engineering
Movie Night
DEF CON 19
General
Mobile Devices
Feds
Facebook
CDMA Phone Hack
UAV/Aerial Hacking
Anonymous/LulzSec
DEF CON *****
Steven Levy
Mikko Hypponen
Wall of Sheep
Marc Weber Tobias
Hacking Through Power Lines
Social Engineering
Moxie Marlinspike
CTF
DEF CON 18
General
GSM Base Station
Social Engineering
Badges
Google Malware
WPA2
Other
Video Coverage
DEF CON 17
Access Control
Badge
Browser Sniffing
Credit Hacking
CSRF
Fake ATM
Feds
Hacking Sleep
Espionage
IP Video Hijacking
Social Engineering
Misc
MMORPG Expolits
Mystery Challenge
NOC
Overview
RFID
Social Networks
SSL Hijacking
UAV
Software Update MITM
DEF CON 16
Badges
BGP Exploit
Captcha
Crackpots
CTF
Encryption
UAT
iPhone
Lock Picking
MBTA vs. MIT
Mystery Challenge
NOC
Overview
Social Networks
SSL Cookie Hijiacking
Wall of Sheep
Warballooning
Badges
Banks
CTF
Cyber War
Disclosure
E-voting
Feds
General
Germany
Honeypots
iPhone
Lock Picking
Malware
Media Players
NBC Undercover
Rootkits
SCADA
Social Networks
FaceBook
MySpace
Speakers
Sam Bowne
Zac Franken
Lukas Grunwald
Thomas Holt
Mikko Hyyponen
Charlie Miller
HD Moore
Scott Moulton
Vendors
AirDefense
AirTight
AMD
Finjan
Immunity
ISEC
Microsoft
Mozilla
Wall of Sheep
Web Hacking
Wi-Fi
Xerobank
DEF CON 14
Badges
Blackberry
Blue Pill
Bots
Conference Overview
Contests
CTF
Device Driver
DNS
Feds
Google
Hardware
IBM
IPv6
Jackpotters
Malware
Microsoft
Offensive Computing
Oracle
Passport
Traveling Terabyte
VOIP
Wall of Sheep
War Driving/Wi-Fi
Worms
DEF CON 13
Conference Overview
Conference Overview - Blogs
WiFi Shootout
Bluetooth
KegBot
Wall of Sheep
Capture The Flag
WiFi Security
Lockpicking
EFF
Feds
Infra-red
Google
RFID
top of the page
DEF CON 12
Print Articles
- Red Herring (Feb 2005): DT comments on Antivirus Guarantee.
- Wired Magazine (Dec 2004): Bluesnarfing and other DC12 coverage in the article "When Cell Phone Hackers Attack".
- FHM Magazine (Dec 2004): DEF CON was featured in the December 2004 issue of FHM.
- Wired Magazine (Nov 2004): Blurb on the DC 12 Wi Fi Shootout.
General/Misc
EFF & DVR
Wireless & Wifi Shootout
Bluetooth
Evoting
DNS
Anonymity
Press Releases
Blogs/Small Articles
top of the page
DEF CON 11
top of the page
DEF CON 10
top of the page
DEF CON 9
top of the page
DEF CON 8
top of the page
DEF CON 7
top of the page
DEF CON 6
top of the page
DEF CON 5
- ABC News with a picture of AJ and Deth Veggie. By Angie Bluethman.
- Hackers turn up heat at DEF CON V, from the Secure Computing Security Newsletter. By Holly Knox, Internet Security Editor
- ZDNet's Hackers invade Vegas. By Robert Lemos.
- Netly News If you build it, they will Con. By Declan McCullagh - Local Copy
- The Site's Fear and Hacking in Las Vegas by Joel Deane.
- Crooks Hook Clueless Hackers by Joel Deane.
- Special to the Mercury News West magazine It takes a hacker to catch a hacker Four parts, by Jonathan Littman.
- Here are the pictures from the article thanks to Lockheed for scanning them.
- Computer World's Fear and Hacking in Las Vegas (Common article title, eh?) by Michael Schrenk. - Local Copy
- The Vominator's heart wrenching experiences at DEF CON V.
- Krusty's TDYC review of DEF CON V.
- Soul to Squeeze writes about the con.
- Lockheed's account of what the hell happened.
- Thanks to Ophie for sending this Comic from Computer World.
- TekLord and Plucky's review page for DEF CON 5. - Local Copy(scroll to near end of document)
- What Plucky, TekLord and Zytek did.
- DefCon V Adventure: System Failure Debut, by pinguino.
- This piece, called Hackers Do Vegas ran in The Australian on August 2.
- Hacker Lessons learned by Matt Willis and told at DEF CON 5, written by Sharon Machlis for Computerworld 07/21/97.
- Ira Winkler Spy Catcher talks about what he had to say at DEF CON 5, written by Steve Ulfelder for Computerworld, 08/11/97.
- Hackers swap secrets on cracking computers By Angie Bluethman of the Associated Press.
- Count the Cliches in a recent story published by the Associated Press.
top of the page
DEF CON 4
top of the page
DEF CON 3
- The review from SunWorld Online News.
- The archive of stories about the hack of MGM's Hackers movie home page (Which happened right before the con.
top of the page
DEF CON 2
top of the page
DEF CON 1
- What Robert X. Cringely had to say about DEF CON I in Info World.
- Robert X. Cringley previews the convention in Infoworld (Unformatted)
top of the page