At DefCon’s Aviation Village, experts convene to explore planes’ burgeoning hacking vulnerabilities and highlight a need for proactive collaboration to protect their systems.
Using off-the-shelf parts and the help of a nurse enthusiast, a biohacking group designed, built, and subcutaneously implanted three networked hard drives. We inquired and watched.
LAS VEGAS—Are you too sexy for your license plate? Hacker and fashion designer Kate Rose thinks not.
Until now, most antisurveillance fashion has surrounded... Read More...
Alongside key U.S. businesses, the desktop manufacturers of unofficial conference badges explain how the president’s trade war against China has put their razor-thin margins at risk.
On stage at DefCon, veteran NSA leader Rob Joyce says the agency’s ability to monitor and counteract international cyberattacks relies on recruiting—and working well—with hackers.
Cryptographer and security technologist Bruce Schneier coined the term "security theater" in 2004. How has the term been appropriated since then—and is it ever appropriate? We asked Schneier.
California Secretary of State Alex Padilla discusses the importance of preventing (and addressing) system breaches alongside misinformation campaigns. There’s a lot to balance.
Following the massacre from the Mandalay Bay, hotel security personnel began routinely checking rooms. They’re now clashing with privacy advocates attending security conferences.
At the HOPE hacker conference, a talk about turning oxycodone into its overdose antidote prompts a broader look at the expanding definition—and increasing relevance—of biohacking.
Retailers rely on point-of-sale readers to process purchases and protect customer data. Due to lax security within the devices and at stores, they make for tantalizing hacking targets.
While riding my motorcycle to DefCon and Black Hat, I visualized the security industry’s high-water mark—that place, Hunter S. Thompson wrote, “where the wave finally broke and rolled back.”
Addressing EVM vulnerabilities uncovered at DefCon—and plugging related holes across disparate election systems—would require years of concentrated work, experts say.
Like the Trojan horse of Greek mythology, malware like Kronos carries a destructive payload, helping criminals steal hundreds of millions of dollars. Here’s what to look out for.
At DefCon, hackers discuss flaws—and real dangers—in dozens of biomedical devices, from pacemakers and insulin pumps to glucose monitors and digital intravenous drips.
During a fireside chat in Las Vegas, Reps. Will Hurd of Texas and Jim Langevin of Rhode Island plead for proactive hacker-lawmaker collaboration and voice concerns about election security.
The longtime world chess champion and Putin foe, now a human rights activist, says we should be fostering a deepening human-computer partnership rather than trying to fight the inevitable.
Unaffiliated, limited-edition conference badges are utilitarian status symbols among the hacker community. They also are effective (and safe) tools for learning how to hack connected devices.
Empower the individual. Keep private information private. Make the complex simple. And detect an intruder in milliseconds. McAfee and hacker Eijah say these ideas are driving their new business.
“No. 1: Fire or massively retrain every employee in the U.S. government responsible for implementing cybersecurity,” advises the software entrepreneur, a former presidential candidate.