Virginia’s Board of Elections voted unanimously to decertify all of the state’s touchscreen voting machines, which are considered by cybersecurity experts to be vulnerable to manipulation by hackers.
When 650 thousand Tennesseans voted in the Memphis area, they probably didn’t expect their personal information would eventually be picked apart at a hacker conference at Caesars Palace Las Vegas.
A noisy cheer went up from the crowd of hackers clustered around the voting machine tucked into the back corner of a casino conference room—they’d just managed to load Rick Astley’s “Never Gonna Give You Up” onto the WinVote, effectively rickrolling democracy.
Facebook is sponsoring the efforts of former Hillary Clinton and Mitt Romney campaign managers to combat hacking and disinformation campaigns designed to interfere with elections.
There are a lot of unusual things to do at DEF CON, the annual hacker conference that draws tens of thousands of security enthusiasts to Las Vegas in the depths of summer—you can learn to lockpick, go fed-spotting, or hack an internet-connected sex toy. But last year offered something new. Jeff Moss, the founder of…
Chris Rock, an independent security researcher, is pissed that the Director of National Intelligence, James Clapper, is more afraid of ISIS than hackers. He’s hoping to change that by teaching hackers how to overthrow governments.
Nowhere is the distinction between the haves and have-nots more apparent than when waiting for a flight at the airport. But it turns out you might not need an actual first class ticket to get into a swanky airport lounge—just a custom Android app that spits out a boarding pass-spoofing QR code.
“You don’t want to end up on the Wall of Sheep.” That’s the last thing my editor told me before I flew to Las Vegas to hang out at the infamous hacker convention DEF CON. A week later, I found myself standing in front of the wall, looking frantically for my name and password. Despite my obsessive caution, I knew I’d…
The scene was set: a surveillance camera, a safe full of money in a Las Vegas casino, a pair of thieves with lock picking tools and a laptop. I watched in awe as the skinny geeks clipped wires and rewired the feed so that it would loop ad infinitum. Basically, they recreated the climax of Ocean’s 11 before my very…
At this point, it feels like everything that can be hacked, will be hacked: Computers, phones, industrial systems, cars, baby monitors, and now... electric skateboards.
Getting hacked, whether on a desktop or smartphone, pretty much sucks. In a way, your entire digital life is an open book and even the control of your devices can be wrenched away from you. But imagine it's not a smartphone getting ripped from your hands but rather your car's steering wheel.
One thing that sort of irks me is when people mistake DEFCON 5 as worse and crazier and insane and severe than DEFCON 1. I know more always sounds better but it's not. That has nothing to do with the world's largest hacking conference, DEFCON, but I just wanted to put it out there. DEFCON: The Documentary shows what…
The annual hackers' conference, DEF CON, wrapped up yesterday, but one of the weekend's many great mysteries still persists. The images above are an encryption puzzle ("Encryption is Key") that was printed on the Electronic Frontier Foundation's fundraising t-shirts from the event. As of Sunday morning, no one had…
Be honest, how often do you use unsecured Wi-Fi for something you shouldn't? You know, just a quick Facebook login at Starbucks. If you've done it even once, that's too much, because making a secret spy computer that can steal all that data is dumb easy. And cheap to boot.
The Obama administration's big push for improved cyber security just hit a roadblock after the organizers for the hacker conference DEF CON banned feds from attending. Maybe next year?
Over the past few months, three of the most influential conventions in geekdom — Readercon (for science fiction writers), The Amazing Meeting (for skeptics), and DefCon (for hackers) — have been at the center of very public discussions about sexism and sexual harassment in their communities. After all three…
A post on the Full Disclosure mailing list claims both CDMA and 4G WiMAX wireless networks were compromised using a man-in-the middle attack at Defcon earlier this week.
Meet Melvin Guzman. He somehow ended up with a Mac stolen from Zoz, a rather crafty hacker who happens to love that computer "like his firstborn." Here's a hilarious account of what happened—complete with some poorly censored nudity.
Last week the high tech world got just a bit more dangerous - or a bit safer, depending on your perspective. And it was all because of research presented at computer security conferences Black Hat and Defcon. Here's the lowdown.