Download.com takes a glimpse at what goes on inside one of the world's oldest and largest annual hacking conferences known to man.
Leaked from today's 404 episode:
- A luxury toilet controlled by a smartphone app is vulnerable to attack.
- Tooth sensor stops you from lying to your dentist.
LAS VEGAS -- You may hate parallel parking, but you're going to hate it even more when somebody commandeers control of your car with you in it.
That was the scary scenario painted over the first two hours at the 21st annual Defcon hacker conference.
"Car hacking is definitely coming," said Zoz, of Cannytophic Design, who presented on how to hack autonomous cars.
Zoz's talk on vulnerabilities that autonomous autos will face followed a fast-paced explanation by well-known computer security experts Charlie Miller and Christopher Valasek of how they spent the past 10 months hacking the … Read more
While the National Security Agency has gotten most of the recent flak for spying on people via the Internet and cell phone records, the Federal Bureau of Investigation appears to be doing some cyber spying of its own.
According to a report by the Wall Street Journal, the FBI has been allegedly developing surveillance tools that work much like what hackers use to collect information on suspects -- including Trojans, spyware, and malware. Supposedly, the FBI created some of these tools internally, while others were purchased.
The FBI "hires people who have hacking skill, and they purchase tools that … Read more
A security flaw in Apple's iOS 6 that could theoretically allow malware to be uploaded to iOS devices via a malicious power adapter will be patched in the next version of Apple's mobile operating system, Apple said Wednesday.
The hack, dubbed Mactrans by the three researchers from the Georgia Institute of Technology who discovered the flaw, was demonstrated Wednesday at the Black Hat security conference in Las Vegas. The trio announced in June that they had developed a proof-of-concept that showed how a malicious iPhone charger lets them hack into the mobile device running the latest version of … Read more
The computer-security community is in mourning following news that superstar hacker Barnaby Jack died on Thursday. The San Francisco resident was 35 years old.
The New Zealand native was the director of embedded device security at IOActive, a Seattle-based security evaluation company. He rose to prominence beyond the hacker community in 2010 when he demonstrated what he called "jackpotting" an ATM. He dragged two ATMs on-stage in front of a rapt audience, and then forced them to spew fake cash into the air.
The demonstration had been highly anticipated, delayed by a year after an ATM vendor pressured … Read more
The recent attack against Apple's Web site for developers has prompted a flood of phishing e-mails asking people to change their passwords.
Users have taken to Twitter to warn others of the attacks. But as convincing as the e-mail might be at a glance, grammar mistakes, a missing capital letter in "Apple," and a fake Apple domain for the Web site the e-mail points to mark the message and the site as bogus.
Still, scammers often use emotional responses to a recent event to induce panic in users -- which may make them less likely to double-check … Read more
The subject of love bedevils us all.
Yet once you've found it, how do you propose to the woman with whom you want to spend your doddering dotage?
For one gamer, there was an absolute solution: create a game that she would have to play to the end to win his heart.
I am tearfully grateful to Kotaku for revealing the tale of EquinnoxX, a passionate gamer.
He decided to meddle with a Contra cartridge in order to create the perfect proposal for his one true love.… Read more
Five men have been accused by the U.S. government of perpetrating the largest hacking scheme ever prosecuted in the United States.
Court documents revealed Thursday in federal court in New Jersey said the five men from Russia and Ukraine were able to hack into the computer systems at the Nasdaq, J.C. Penney, 7-Eleven, and JetBlue Airways, among other companies. Obtaining around 160 million credit and debit card numbers, the individuals allegedly were able to steal more than $300 million from at least three of the targeted companies, The Wall Street Journal has reported.
The hacking began in 2005 … Read more
Our vehicles are becoming more like consumer electronics -- more like mobile computers on wheels -- and a pair of "digital carjackers" demonstrated what happens when all of the tech beneath the sheet metal falls into mischievous hands.
More and more components of modern vehicles have begun to fall under the control of computers. And we're not just talking about infotainment and dashboard apps. Think about it: a modern vehicle's engine, brakes, electronic power steering, active safety systems, and sometimes even the throttle are ultimately controlled by little electronic brains somewhere behind the dashboard.
In the … Read more