Almost all of the complex exploits that make news at the Defcon hacker conference are scary.
In a venue like DefCon this would be difficult, so I looked for another solution.
FORBES: AppleTV Is The Best Tool For Delivering Live Wireless Video Presentations
"The traffic that comes to Defcon's public IP address takes a jog through New York, " says Kapela.
When Nick Harbour walked into to the Defcon hacker conference last week, he wasn't expecting to write a virus.
This year we are again presenting at DefCon in Las Vegas.
FORBES: AppleTV Is The Best Tool For Delivering Live Wireless Video Presentations
For Mr Abbott especially, politics is being conducted at the Defcon 1 level.
BBC: The scandal that could bring down Australia's government
The bricks and mortar lobbying and PR armies were already at Defcon 1.
But a lucrative day job leaves DefCon's hackers to focus on what Dead Addict says is the original sense of hacking.
David Ulevitch was a broke college student looking for a place to sleep during the 2001 Defcon hacker conference in Las Vegas.
In a presentation at August's DefCon hacker conference, security researcher Michael Brooks showed how those audio CAPTCHAs can be disassembled by computers.
Their man-in-the-middle positioning adds some latency to users' connection, but the Defcon rerouting suggests that it's too small for most people to notice.
Defcon said it notified the two largest anti-virus software providers, McAfee and Symantec, about "Race to Zero, " but the companies declined to participate.
Harbour and two colleagues from security consulting firm Mandiant were one of four teams to enter Defcon's controversial "Race to Zero" virus-writing contest.
Appearing last weekend at a Defcon conference, she reported how she could manually advance the clock as well as circumvent protective technology.
By focusing on the bad apples, Priest says, Madigan was glossing over DefCon's true spirit: smart people getting together to mess around with technology.
Let us not forget that this year at DEFCON there was an initiative to hand out red cards to men who sexually harass women.
That's what Dateline NBC's Associate Producer Michelle Madigan learned at this year's DefCon, the largest gathering of hackers, crackers and security professionals in the world.
Sunday at the Defcon hacker conference, Kapela and Pilosov are presenting a new technique that allows hackers to remotely reroute Internet traffic without the target's knowledge.
But as the danger of online crime shifts from amateur hackers to organized cybergangs in Eastern Europe and Asia, the Feds are increasingly cooperative with DefCon's shenanigans.
"The people who built the Mars rovers are hackers, " says Jeff Moss, also known as "Dark Tangent, " the hacker who has organized DefCon for the last 15 years.
When DefCon's hackers do venture into the illegal, it's often based on impulses that are more libertarian than malicious, says a hacker known as "Dead Addict, " another of DefCon's organizers.
The separate five-stage combat alert level, known as "Defcon, " has not changed and remains at stage 4, South Korean defense spokesman Won Tae-jae said at Thursday's briefing, according to Yonhap.
CNN: South Korean, U.S. forces raise surveillance alert level
Dead Addict says that many of the hackers that gave DefCon its renegade reputation in earlier days have now grown up and, like himself, launched legitimate careers in security with big-name tech companies.
Defcon said it notified the two largest anti-virus software providers, McAfee (nyse: MFE - news - people ) and Symantec, about "Race to Zero, " but the companies declined to participate.
In fact, DefCon's species of armchair hackers are more of a distraction for law enforcement than a real menace, says Jim Christy, director of future exploration at the Department of Defense's Cyber Crime Center.
In the next two months, dozens of more vulnerabilities will likely be revealed at security research conferences like the HOPE conference in New York and the Black Hat and Defcon conferences in Las Vegas.
Creating a false base station is one of the tricks that researcher Chris Paget is expected to perform on Saturday in a talk at Defcon, a more hacker-friendly conference that immediately follows Black Hat.
To prove the feasibility of the technique, Kapela and Pilosov, both owners of small networking companies, collaborated with conference organizers to reroute all of Defcon's Los Vegas Internet traffic through Pilosov's company servers in New York.
According to new research presented at both the annual Black Hat USA and DefCon conferences this week in Las Vegas, hardware flaws, heat and cosmic rays may be flipping 1s and 0s and changing URL addresses.
In a presentation at the Black Hat and Defcon security conference in July, for instance, French security researcher Andre Costin presented vulnerabilities in the next-generation air traffic control system known as ADS-B that he said would allow a hacker with a software-defined radio to track and even spoof planes in the sky, potentially creating dangerous distractions for pilots.
FORBES: DARPA-Funded Radio HackRF Aims To Be A $300 Wireless Swiss Army Knife For Hackers
应用推荐