Download.com takes a glimpse at what goes on inside one of the world's oldest and largest annual hacking conferences known to man.
Artist Ai Weiwei is a social activist who has championed human rights issues in China. He understands a thing or two about dealing with unwanted surveillance. Weiwei turned his artistry and knowledge into a set of instructions for making a spray-paint lifter to reach cameras in high places.
The instructions appear in Hans Ulrich Obrist's book, "Do It: The Compendium," a volume of instructionals from artists on how to make art. The CCTV spray project involves a stick, nylon rope, a screw, a brake bar, a bottle cage, a wine bottle opener, and a can of spray paint.… Read more
From hackathons and wifi sheep hunts to cryptography seminars and locking villages, Def Con is full of security ninjas, both veteran and amateur alike. Take a glimpse at what goes on behind the doors, where goons, humans, and uber-level veterans come together to share their skills and pwn n00bz.
Now users have the option to approve log-in requests more directly via their mobile device, instead of relying on a text message containing a short code.
After updating you'll need to launch the app and head to the Settings page. On iOS, … Read more
Privacy has been big news lately after revelations of NSA activities hit hard. But apparently it's not just your phone calls and Internet activity you need to be concerned about. There could be hackers gunning for your toilet, too.
Security company Trustwave issued a warning about potential bathroom breaches of luxury Satis smart toilets from Lixil. The toilets can be controlled using an Android app, but the Bluetooth PIN is hard-coded to "0000." Just knowing that code number means the awesome power of the Satis could fall into evil hands. All a hacker would have to do is download the My Satis app, get in range, pair it to the toilet using the code, and flush away.… Read more
While Def Con packs more events, workshops, and contests than the storage space of a ZIP drive, one of the longest lasting traditions revolves around the mysteries of the conference badge, itself.
This year, Def Con celebrates its 21st birthday with a card-themed cryptographic challenge based on the standard playing card deck -- except this is no ordinary card deck.
Attendees of Def Con 21 are all given custom badges, which are actually elegantly fabricated PCB boards complete with delicately carved copper contact points, mathematical constants, binary numbers, Chinese characters, and more.
In an improved and renewed focus on social … Read more
On Tuesday, McAfee updated its Mobile Security app (now called McAfee Antivirus & Security) for Android and added several new features that include custom profile setups, improved analysis of data exposure, and backup operations over Wi-Fi.
These updates are added on top of Mobile Security's Basic free tier features like mobile antivirus, anti-theft, and backup services. McAfee aims to protect their users through both preventative and post-catastrophic measures, with added security features in the Premium service.
According to Ari Jaaksi, McAfee's SVP of Mobile Engineering, "When consumers contemplate securing their smartphones and tablets, they often think in … Read more
As far as I am aware, the FBI doesn't usually send you a pop-up online notice, asking if you could kindly pay a fine for child pornography.
Perhaps I should check with Edward Snowden to be sure.
Still, 21-year-old Virginian Jay Riley was sufficiently stunned to receive a pop-up "FBI Warning" telling him to pay a fine for child pornography that he went to his local police station in Prince William County.… Read more
The old standby four-digit PIN passcode for smartphones is a mere speed bump to R2B2, a PIN-guessing robot that shares pretty much no physical resemblance with the famous "Star Wars" droid. But just as R2-D2 was good at opening starship doors and hacking into the Death Star, so is R2B2 good at hacking into Android phones.
The device consists of a robotic fingertip that taps out different passcodes until it manages to hit on the right one. Instead of a hacker having to sit there and try all the potential combinations in a mind-numbing exercise in boredom, the indefatigable robot provides the labor.… Read more
At the end of a sweltering wedding season, many of us may be familiar with that drunken guest who falls asleep at dinner and is startled awake later, exclaiming "What's going on? Where am I? ... Where are the cookies?"
Those hazy, existential queries of the inappropriately inebriated aren't much different than the plaintive cries of modern PC users. Amid a shifting landscape of services, processes, modules, add-ons, plug-ins, drivers, BHOs, and DLLs--new Windows and Mac users trying to learn what the operating system is actually doing as their boxes suddenly whir can often feel overwhelmed. Here … Read more