12 Results for

shmoocon

Article

Hacking the lobby telephone

Two researchers demonstrate how unprotected, public VoIP phones could expose the internal network of a company or organization.

By February 17, 2008

Article

Google looks for talent at hacker con

Solving a puzzle gets you a T-Shirt. Handing in your business card may get you a call from a recruiter.

By April 20, 2007

Article

Exploiting QuickTime flaws in 'Second Life'

Researchers show how objects with multimedia attributes within Second Life can unleash malware on unsuspecting users.

By February 16, 2008

Article

With improvements, e-voting could be good, says researcher.

Researcher who found vulnerabilities in California's e-voting systems looks ahead to better auditing.

By February 16, 2008

Article

Cisco patches three critical flaws

Patches address vulnerabilities in the Cisco Voice Portal and Secure Shell server (SSH) implementations.

By May 22, 2008

Article

Hacking public-information kiosks

A researcher at ShmooCon demonstrates how browser hot keys can expose the internal network running behind a Citrix presentation server.

By February 17, 2008

Article

BlackBerry has spyware risk too, researcher says

Veracode researcher demonstrates spyware that allows someone to steal a stranger's contact list, read text messages in real time, and track the location of the phone.

By February 7, 2010

Article

Evidence presented in New Jersey e-voting discrepancies

Printed voting audits may help to detect fraud--unless the vendor offers a good excuse.

By April 29, 2008

Article

Sequoia Voting Systems site hacked

Under fire for New Jersey vote discrepancies and legal threats against electronic voting systems researchers, the Sequoia Voting Systems blot site went dark Thursday.

By March 20, 2008