News

A security researcher has found a way that an attacker could leverage the macOS version of Zoom to gain access over the entire operating system. Details of the exploit were released in a ...
In one sense, it’s the normal course of events: Every August, hackers at the DEF CON conference find security gaps in voting equipment, and every year the long and complex process of fixing them ...
Children as young as 5 will compete to hack election results websites, and DEF CON has partnered with children’s hacking organization r00tz Asylum to award prizes to the first and youngest kids ...
She and her government cyber and AI experts convinced President Biden to issue a call for hackers to come to Defcon, to try to break (hack) the new AI products. This kind of red team effort is ...
According to Kitchen, the new Rubber Ducky was his company’s most in-demand product at Def Con, and the 500 or so units that Hak5 brought to the conference sold out on the first day. Safe to say ...
Dubbed Moonlighter, the satellite will be the core of Hack-a-Sat, an annual space security competition hosted at DEF CON, the world’s largest hacking conference. The project is a collaboration ...
The mission for NASA carried, along with other supplies, the Moonlighter satellite that will be the target of the hacking contest at DEFCON. More Screengrab from video feed/Courtesy SpaceX Hack-A ...
The hack was revealed at a talk at DEF CON, a security conference run in Nevada each year. Sick Codes demonstrated his mastery of the hardware by showing the John Deere touchscreen running a ...
DEF CON has partnered with the largest water facility ... different villages we think are interesting: the AI village, the hack-a-sat village, the biohacking village, and so on,” Braun said.
The competition is called Hack-a-Sat, and it’s technically the fourth of its kind (though this is the first to occur at Defcon). Designed and managed by the US Air Force, the competition’s ...
Security researchers Dennis Giese and Braelynn Luedtke are due to speak at the Def Con hacking conference on ... number of issues that can be abused to hack the robots via Bluetooth and ...