This is a comprehensive list of all articles known to have been written about DEF CON. Many publications are no longer in existence, and much of this history is lost. If you have press you would like included in the archive, send links and titles to neil [at] defcon ]dot[ org!
A note to journalists: Please stop writing clever articles entitled 'Fear and Hacking in Las Vegas', as it becomes difficult to tell them apart.
Keynote
- NSA Boss Wants More Control Over the Net - Technology Review
- U.S. Spy Chief Asks Hackers to Help Government Secure Internet - Reuters
- NSA Chief: 'Internet at Great Risk, Needs Defense System' - MSNBC
- NSA Chief Tells Hackers His Agency Doesn't Create Dossiers on All Americans - Wired
Badge News
Aviation
- Next-Gen Air Traffic Control Vulnerable To Hackers Spoofing Planes Out Of Thin Air - Forbes.com
- Curious hackers inject ghost airplanes into radar, track celebrities' flights - Computer World
SCADA
- Power Plant Hack Talk, Free Tools Pulled From Def Con Lineup - Dark Reading
The Cloud
- Researchers To Launch New Tools For Search Engine Hacking - Dark Reading
Consumer Protection
Event Reviews
- Day One of DEF CON 20 - Computer World
- DEFCON 20 Roundup: Lessons in Security - PC World
- DEF CON Hackers Go Mainstream But Still Love to Party - MSNBC
- Defcon Vending Room Showcases Tech of All Ages - CNet
Routers
- Critical Vulnerabilities in Huawei Routers Laid Bare at DEF CON Tech Spot
- Persistent Router Botnets on the Horizon, Researcher Says at DEF CON - IT World
- Expert: Huawei Routers are Riddled with Vulnerabilities
VPN Security
- Tools Released at Defcon Can Crack Widely Used PPTP Encryption - PC World
- New Tool From Moxie Marlinspike Cracks Some Crypto Password - Wired
- Defcon Wi-Fi Hack Called No Threat to Enterprise WLANs - Network World
Physical Security
- Kids Can Open Gun Safes With Straws and Paper Clips, Researchers Say - Wired
- Kid Opens a Gun Safe Just by Jostling It Around - Gizmodo
The Singularity
- Hacking Humanity: Human Augmentation on the Horizon - Network World
- Cell Phone Battery Catches Fire, Burns Hacker's Tail at DEF CON - CNet
DEF CON Kids
- DEF CON Kids: Hacking Roller Coasters and the Power Grid with Cell Phones - Network World
- Gold Medal For Hacking? CyFi Should Win It - Huffington Post
- DEFCON Kids Returns, Now With 0-Day - Wired
- Notes from DEFCON and DEFCON Kids - BoingBoing
- 10-year old Girl Scout Owns Slow Game - BoingBoing
- 10-Year-Old Presents App Exploit at DefCon - PC Mag
NinjaTel
- Defcon 20 Visitors Get Their Own 'Pirate' Cellular Network in Ninja Tel, Exclusive One V to Match - Engadget
- A Phone Network Just for Hackers - WSJ.com
- Meet Ninja Tel, DEF CON's Van-powered Pirate Cellphone Network - The Verge
Social Engineering
- How a Lying 'Social Engineer' Hacked Wal-Mart - CNN Money
- Rick Lax Tries Gaming the Gamers at DEFCON - Las Vegas Weekly
- Social Engineer Hacks Wal-Mart from Defcon - BoingBoing
Movie Night
- Hacking Vegas: 'MIT Mike' Aponte, Professional Blackjack Instructor, Teaches You to Count Cards - The Verge
General
- When Hackers Become The Man - CNet
- Wit and lethality: Preview of DEFCON 2011 - TechRepublic
- DEFCON 19 - 2011 – Overview of the Conference - Global Security Mag
- Lessons from Black Hat & Defcon 19 - It's Easier to be the Bad Guy - HP Community Blog
- Picking Locks and Hacking Servers at Defcon - NY Times
- Jailbreak Experts Comex, Geohot And Many More Spotted Together At DEFCON Party - Appadvice
- Deb does DEFCON: Hacking conference tackles cyberwar and civil liberties - TechRepublic
Mobile Devices
- Android could allow mobile ad or phishing pop-ups - CNet News
- DefCon Dings Reveal Google Product Security Risks - Gizmodo
- Vulnerability Found In Android That Allows For Phishing Scams and Pop-up Ads - Phandroid.com
- Mobiles become emergency data network - BBC
Feds
- Facebook Offers Cash To 'Bug Bounty Hunters' At DefCon Hacker Conference - Huffington Post
CDMA Phone Hack
- CDMA and 4G Connections Compromised At DefCon 19? - TechCrunch
- DEF CON 19 - hackers get hacked! - Full Disclosure
UAV/Aerial Hacking
- WASP: The Linux-powered flying spy drone that cracks Wi-Fi & GSM networks - Geek.com
- DIY aerial drone monitors Wi-Fi, GSM networks - The Register
- Do-It-Yourself Hacker Drone Highlight of Hacker Conference - International Business Times
- Build Your Own Camera, Launch It Like a Grenade - PCWorld
- Geek hacks flare gun into wireless camera drone shooter - Slash Gear
Anonymous/LulzSec
- Building A Better 'Anonymous'? - Information Week
- Is LulzSec's Leader at DefCon? - PC Magazine
- In Search of Anonymous: Down and Out in the Digital Age - Deliberately Considered (blog)
- Search of Anonymous: Down and Out in the Digital Age Pt II - Deliberately Considered (blog)
- Infosec Island's Scot Terban Replaces Aaron Barr at DEFCON - Infosec Island
- Defcon panel: Anonymous is here. LulzSec is here. They're everywhere - Venture Beat
- Hackers debate 'Anonymous' tactics at DefCon gathering - Agence France-Presse
- Five Questions About Aaron Barr's DEFCON (by Aaron Barr) - Threatpost
DEF CON Kids
- DEF CON Opens Its Doors To Pre-Teen And Teen Hackers - Washington Post
- 10-Year-Old Hacker Finds Flaws in Video Games - Fox News
- Tween Hacker's Time-Travel Trick - Dark Reading
- 10-Year-Old Outs Security Flaw in iOS and Android Games - PCWorld
- DefCon 19: 10-year-old code cracker reveals zero-day smartphone gaming security flaw - Infosecurity.com
Steven Levy
Mikko Hypponen
Wall of Sheep
Marc Weber Tobias
- Defcon Lockpickers Open Card-And-Code Government Locks In Seconds - Forbes
- Wire pops lock certified for US defense facilities - AFP
- Hackable High-Tech Locks Pose National Security Risks - Security News Daily
Hacking Through Power Lines
- Hacking Home Automation Systems Through Your Power Lines - Wired Threat Level Blog
- Def Con 19: Expert hacks X10 home-automation system - Consumer Reports
Social Engineering
- Defcon Hacking Contest Targets Big Corporations (VIDEO) - Huffington Post
Moxie Marlinspike
- DEFCON 2011: SSL and the future of authenticity - Naked Security Blog (Sophos)
CTF
- European Nopsled Team win DEFCON 19 CTF - blog.satori.com
General
- The hackers life – my weekend at Defcon - National Geographic Assignment Blog
- Governments Battle to Stay Ahead of Threats on Internet, 'The Great Leveler' - PBS News Hour
- Hackers Convene At Def Con 18 - NPR
- Hackers With Enigmatic Motives Vex Companies - New York Times
- Hacker Wonderland: DefCon 18 in Photos - Wired Threat Level Blog
- Seven dangerous new computer hacks (and one silly one) that will change the future - io9
- Hackers to flock to Black Hat, Defcon this week - CNet
- Conference Wrap-Up: Apple, Google, BP And Others Spill Sensitive Data On The Phone - Forbes: The Firewall
- Hackers turned gatekeepers: Digital vigilantes with a moral code - The Independent
- Hackapalooza: ATM Spews Cash, Android App Swipes User Data, Digital Game Badges Battle - Fast Company
- A tale of two conferences: Black Hat and Defcon photo gallery - Venture Beat
- Takeaways from Black Hat and DEF CON - CNet: Reporter's Roundtable - ep 43
- DEFCON 18 - Hurricane Labs
GSM Base Station
- Week in review: Hacker intercepts phone calls, Facebook buys 18 patents - Reuters
- Cell Phone Snooping: Cheaper And Easier Than Ever - Forbes
- Hacker Spoofs Cell Phone Tower to Intercept Calls - Wired - Threat Level
- Researcher Intercepts GSM Cell Phones During Defcon Demo - Dark Reading
- FCC Concerned Over DefCon Mobile Hacking Talk - PC World
Social Engineering
- Smooth-talking hackers test hi-tech titans' skills - Google News
- Contest finds workers at big firms handing data to hackers - CNet News
- FBI sought data on Defcon 'social engineering' contest - Computer World
- How to Steal Corporate Secrets in 20 Minutes: Ask - PC World
- Social Engineers Successfully Gather Info - Dark Reading
- Tech Insight: Building The Right Defense Against Social Engineering - Dark Reading
- Cyber 'capture the flag' contest will premiere at DefCon - Federal News Radio
Badges
- A Defcon badge unlike anything you have ever seen - CIO
- This year's Defcon badge has a persistent display - Computer World
- The Defcon Badge: Sleek, Stylish and Hackable - PC World
- Exclusive Sneak Peek: DefCon Ninja Party Badge - Wired - Threat Level
- DefCon Ninja Badges Let Hackers Do Battle - Slashdot
Google Malware
- Google Has Two Times More Malware Than Bing, Yahoo, Twitter Combined - Dark Reading
- Be Careful What You Search For - Information Week
WPA2
- Wireless network security weakness to demo at DEFCON - The Register
- AirTight Demonstrates WIPS Detection and Location Methodology for WPA2 'Hole196' Exploit Presented at Black Hat and DEF CON - Reuters
Other
- Adobe to fix Reader hole unveiled at Black Hat - CNet News
- Got an iPhone? There's an App for Hacking That - Technology Review
- Hack attack hits ATM jackpots - Google News
- Hackers to flock to Black Hat, Defcon this week - ZDNet
- A Simple, But Effective, Way to Beat Internet Censorship - MIT Technology Review
- How to Locate a Web User with a Few Clicks - MIT Technology Review
- Warning Issued on Web Programming Interfaces - MIT Technology Review
- Facebook's former top security officer says military and commercial cyber defense should be united - Social Beat
- Software released for attacking Android phones - Reuters
- Biometric and Other Locks Fail to Foil Hackers at DefCon - Wired - Threat Level
- Researcher Reads RFID Tag From Hundreds Of Feet Away - Dark Reading
- DEFCON 18 Quals: writeups collection - VN Security
- DEFCON 18: LOCKS, LIES, AND VIDEOTAPE - The Sidebar
- Black Hat USA 2010 and DEF CON 18 Wrap Up - It's Tactical
- See you at the Rio in 2011 - WiFi WLAN Media Blog
- [Defcon] You Spent All That Money And You Still Got Owned… - Catch 22 InSecurity
- [Defcon] SHODAN for Penetration Testers - Catch 22 InSecurity
- [Defcon] Hacking Oracle From Web Apps - Catch 22 InSecurity
- [Defcon] Exploiting WebSphere Application Server's JSP Engine - Catch 22 InSecurity
Video Coverage
- Behind the Firewall – episode 010: Defcon 18 - Hacker News Network
- TDSSKiller: Stop Google Malware, iPad Charging Help, New Kindle, Defcon 18, Lapt - Tekzilla
- DEFCON 18 - Hak5
- DEFCON 18 registration line at Black Hat USA - Kingpin's YouTube
- DC18 Badge Hack: DEFCON Super Rocker 18 Guitar - Kingpin's YouTube
- DC18 Badge Hack: DEFCON + Ninja Badge Combo - Kingpin's YouTube
- DC18 Badge Hack: Virus Propagation - Kingpin's YouTube
- DC18 Badge Hack: Web-of-Trust - Kingpin's YouTube
- DC18 Badge Hack: GoatBar UPC Barcode Writer/Emulator - Kingpin's YouTube
- DC18 Badge Hack: Slot Machine - Kingpin's YouTube
- DC18 Badge Hack: "You're Busted" Police Lights - Kingpin's YouTube
- DC18 Badge Hack: Personal Oscilloscope - Kingpin's YouTube
- DC18 Badge Hack: TV-B-Gone - Kingpin's YouTube
- DC18 Badge Hack: Coffee/Drink Mixer - Kingpin's YouTube
- DC18 Badge Hack: Paper Badge Display - Kingpin's YouTube
- DC18 Badge Hack: XXX Interactive - Kingpin's YouTube
- DC18 Badge Hack: Porn Theater - Kingpin's YouTube
- DC18 Badge Hack: Boob-Ma-Tron - Kingpin's YouTube
- DC18 Badge Hack: Flava Flav Badge - Kingpin's YouTube
- Tom and Andrew talk about Defcon 18 - GFQ Network
- Defcon 18 - Goon Pirates storm the Toool presentation - Kallahar's YouTube
- Defcon 18 - Siviak gets a goon hug - Kallahar's YouTube
- Defcon 18 - Police firearms trainer - Humphrey Cheung's Vimeo
- Defcon 18 - Las Vegas Gringo Warrior Lockpick - Routergods' YouTube
- w00tb0t-Gringo-Warrior-Defcon-18 w00tb0t's YouTube
- More Retro Computing at Defcon 18 Tekarien's YouTube
- Defcon18 encrypted wifi effffn's YouTube
- Dan Kaminski... I don't care - idontcare296's YouTube
Access Control
- Electronic High-Security Locks Easily Defeated at DefCon - WIRED -Threat Level
- Open Sesame! Network Attack Literally Unlocks Doors - WIRED -Threat Level
Badge
- Exclusive Peek Inside DEF CON's High-Tech Badge - WIRED -Threat Level
- Hacking The DEF CON 17 Badges - WIRED -Threat Level
- Photos: Defcon badge inspires hacks - CNET
- Hacking the Defcon 2009 badge - NetworkWorld.TV (YouTube)
- DEF CON 17: Early Badge Details - Hack a Day
- The Hacker's Badge Of Honor - Forbes
- Kingpin's Defcon 17 badge - MAKE
- Hacking the Defcon badges - CNET News, InSecurity Complex
Browser Sniffing
- A Browser's View of Your Computer - MIT Technology Review
Credit Hacking
- DefCon: ‘Credit Hackers’ Win the Credit Card Game … Legally - WIRED -Threat Level
CSRF
- cPanel, Netgear and Linksys susceptible to nasty attack - The Register
Fake ATM
- Fake ATM doesn't last long at hacker meet - IDG News
- Hackers spot fake ATM. Could you? - Internet News
Feds
- Defense Department eyes hacker con for new recruits - IDG News
- Hackers: Uncle Sam (still) wants you! - Internet News
Hacking Sleep
- Hacking Sleep - Forbes
Espionage
- Korean 'journalists' booted from Defcon - IDG News
IP Video Hijacking
- Researchers Hack IP Video - Dark Reading
- Researchers offer tools for eavesdropping and video hijacking - CNET News - InSecurity Complex
- Security Camera Hack Conceals Heists Behind Dummy Video - WIRED -Threat Level
- Surveillance camera hack swaps live feed with spoof video - The Register
Social Engineering
- Defcon air traffic control hacker: Excuse me while I change your aircraft’s flight plan - Venturebeat
Misc
- Hack-Proofing The Hackers - Forbes
MMORPG Expolits
- Hackers Game a Multiplayer World - MIT Technology Review
Mystery Challenge
- DEF CON 17 Mystery Challenge - WIRED -Threat Level
- Mystery Challenge - DEF CON 17 - Security Ripcord
NOC
- Inside The World's Most Hostile Network - WIRED -Threat Level
Overview
- At Black Hat and Defcon, hackers talk shop - CNET
- Ax0n's DEF CON 17 Wrap-up - HIR Information Report
- DEF CON 17 - The Pulse Review
- Defcon 17 hacks into Vegas - Las Vegas Weekly
- Defcon: What to leave at home and other do's and don'ts - CNET
- Hacking, Lock-Picking, Booze and Bacon: DEF CON 17 In Review - WIRED -Threat Level
- Hanging with hackers can make you paranoid - CNN
RFID
- Feds at DefCon Alarmed After RFIDs Scanned - WIRED -Threat Level
- Fed's RFIDiocy pwnd at DEF CON - ZDNet Blog
Social Networks
- Twitter: More Secure Than You Think - Forbes
SSL Hijacking
- Dan Kaminsky Feels a disturbance in The Internet - SemiAccurate
- Hackers expose weakness in visiting trusted sites - Associated Press
- Researcher Exposes Flaws In Certificate Authority Web Applications - Dark Reading
- Secure Browsing Takes A Beating - Forbes
UAV
- Boffins showcase do-it-yourself flying spy drone - The Register
Software Update MITM
- Defcon: New Hack Hijacks Application Updates Via WiFi - Dark Reading
- Software Updates Vulnerable To Hijacking - Information Week
- Using Software Updates to Spread Malware - CBS News
Badges
- Defcon badges kill TVs - The Inquirer
- Exclusive Defcon 16 Badge Sneak Peek - Wired Threat Level Blog
BGP Exploit
- Hackers hacked at infamous DefCon gathering - Yahoo News
- Revealed: The Internet's Biggest Security Hole - Wired Threat Level Blog
- More on BGP Attacks -- Updated - Wired Threat Level Blog
- Researchers exploit web protocol to hijack traffic - ZDNet.co.uk
Captcha
- Captchas are easily hackable - The Inquirer
Crackpots
- Dozier Internet Law: Hackers Hack Away at DefCon Annual Convention - John W. Dozier Jr. Blog - Another take on DEF CON
CTF
- Naval Postgraduate School Wins Hacking Contest - Dark Reading
- 3@stplace?!? - atlas wandering blog
- DefCon CTF 2008 - Nice walkthrough of CTF Event
Encryption
- Encrypting Your Hard Disk is Not Safe Anymore: New Vulnerability Affects Microsoft, Intel, HP and Others - Market Watch
UAT
- UAT Delivers at DEF CON - Market Watch
iPhone
- Defcon 16 -- iPhone Used to Hack Wireless Systems - TechTree India
Lock Picking
- Researchers Crack Medeco High-Security Locks With Plastic Keys - Wired Threat Level Blog
- Shrinky Dinks As a Threat To National Security - Slashdot
- Cracking high-security locks is child's play: experts - AFP
- DEF CON 16: Plastic Keys; and JennaLynn Does it Again! - inSecurity.org - Marc Weber Tobias
MBTA vs. MIT
- Agency sues to stop Defcon speakers from revealing gaping holes - The Register
- Mass. transit authority flaw disclosure: A student speaks up - Computer World
- MIT Students: 'T' Card System Easily Hacked - The Boston Channel
- Federal judge halts Defcon talk on subway card hacking - The Register
- Judge orders halt to Defcon speech on subway card hacking - Cnet News
- Federal Judge in DefCon Case Equates Speech with Hacking - Wired Threat Level Blog
- Judge orders halt to Defcon speech on subway card hacking - CNET News
- Students blocked from presenting paper on security flaws in subway fare cards - USA Today Blog
- MIT Coders' Free Speech At Stake - EFF.org
- MBTA Makes A Mistake, Details On MIT Hack Released To Public - Chattahbox
- Computer Scientists Ask Court to Reconsider Gag Order in DefCon Case - Wired Threat Level Blog
- Boston Subway Hack Debate Intensifies - PC World
- Judge lifts gag order on subway security hack - OUT-LAW News
- Gag order lifted for students who hacked subway card - The Register
- Judge Lifts MIT Subway Hack Gag Order - PC Magazine
- Judge lifts fare card hack gag order, punts on 1st Amendment - Ars Technica
- Exclusive Interview with MIT Subway Hacker Zack Anderson - Popular Mechanics
- 3 takeaways from security-flaw legal flap between MBTA, MIT students - Computer World
Mystery Challenge
- The DefCon 16 Mystery Challenge - Wired Threat Level Blog
- Mystery Box Challenge - Day One - Security Ripcord
NOC
- A First Ever Look Inside The Defcon Network Operations Center - Wired Threat Level Blog
Overview
- DEF CON Conference - Best of the Web Buzz Blog
- Defcon opens with a bang, contests, and intrigue - Cnet News
- Defcon ends with researchers muzzled, viruses written - Cnet News
- DEF CON 16: List of tools and stuff released - ZDNet Zero Day Blog
- Attack of the Show - Def Con Convention - G4 TV
- Cookie-jacking: Potential security risk largely ignored by public - The Tech Herald
Social Networks
- Facebook's (futile) malware exorcism - can social networks fight back? - ZDNet Blogs
- LinkedIn Hack Demonstrates Ease of Impersonation - Dark reading
- The ugly truth: Satan, social networks and security - ZDNet Blogs
SSL Cookie Hijiacking
- Fighting fire with fire - IT News AU
- A Good Reason To Go Full-Time SSL For Gmail - Slashdot
- Security Researcher Defends Plan To Release Gmail Hacking Tool - Information Week
Wall of Sheep
- Busted by Defcon's Wall of Sheep - The Norman Transcript
Warballooning
- Covert operation floats network-sniffing balloon - Network World
Badges
- Badge Hack at DefCon - Wired News
Banks
- Security Bites Podcast: Defeating online banking security - Cnet News
- How phishers defeat online banking controls - Cnet News
- New Bank Practices Make Hacking Easier - Dark Reading
CTF
- Capture the Experience - Dark Reading
Cyber War
- Flash mob in Estonia - Cnet News
Disclosure
- The Vulnerability Disclosure Game: Are We More Secure? - CSO Magazine
- Hackers Welcome - Forbes
E-voting
Feds
- hackers:new allies in war on terror - The Times of India
- Hackers sought as allies in war on terrorism and cyber crim - AFP
- Defense Cyber Crime Center profiled - Federal Computer Week
- I Married a Fed at DefCon - Wired News
General
- Defcon 2007 – Mayhem, mystery and marriage - TG Daily
- In defense of Black Hat and Defcon - Cnet News
- Black Hat 'supersizes' in Las Vegas - Cnet News
- Letter From Hackerdom: Not the Same Old DEF CON, Black Hat - Washington Post Blog
- Hackers, researchers gather for Black Hat, Defcon conventions - Mercury News
- Basics: Black Hat Briefings and Defcon 15 - Mercury News
- Takahashi: Foes mingle at Las Vegas hacking conferences - Mercury News
- Takahashi: Good hackers and bad (53%) - Mercury News
- The romance and mystery of a good hack - The Register
- Hacking for hijinks - The Register
- A Defcon survival guide - The Register
- Forbes Offers a Sympathetic Portrayal of Hackers - Slashdot
- The past is prologue at Black Hat Briefings - Government Computer News
- L0pht in Transition - CSO Magazine
- DefCon Recap - Dark Reading
- How to Land the Best Security Job - Dark Reading
- Overheard at DefCon - Security Focus
- Black Hat wrap-up: Less hackers, but plenty of flaws - SC Magazine
- Educating hackers and defenders Hindu - Business Line
- Podcast: News to know midday: Fake Steve; New iMac; DEF CON flap revisited - ZD Net
- Top 10 geek vacations, Part II - InfoWorld
Germany
- Hacker space movement sought for U.S. - Wired Blog
- Germany enact 'anti-hacker' law - Channel Register
- Germany enacts 'anti-hacker' law - The Register
Honeypots
- Websense to Unveil Web 2.0 Threat Detection at Defcon - PC Magazine
- Websence Protects Web 2.0 - ABC News
- Websense to Unveil Web 2.0 Threat Detection at Defcon - Eweek
- DEF CON - Websense lures Web 2.0 attackers with HoneyJax - Network World
iPhone
- Iphone partially unlocked - TG Daily
- Will the iPhone be iPwned? - Security Focus
Lock Picking
- Picking locks the old-school way - Wired News
- Medeco Readies Assembly-Line Fix for DefCon Lock Hack - Wired News
- Ultra-High Security Locks Used by White House Easily Opened by 12-Year Old Girl - InfoWorld
- Lockpicking for Geekkids - Wired Blog
- White House High-Security Locks Broken: Bumped and Picked at DefCon - Wired News
- Hackers click locks open at conference in US - AFP
- The Study of Physical Hacks at DefCo - Slashdot
- Anti-theft technology - Government Computer News
- Simple Hack Can Unlock Most Any Office Door - CSO Magazine
Malware
- Polymorphic Malware: A Threat That Changes on the Fly - CSO Magazine
Media Players
- Researcher: Media players have critical flaws - MSNBC
- Researcher: media players invite malware - ABC News
NBC Undercover
- How an undercover NBC reporter was outed by hackers - Salon.com
- Defcon: Hacks, Lies, and Videotape - Cio-Today
- Dateline Mole Allegedly at DefCon with Hidden Camera -- Updated: Mole Caught on Tape - Wired News
- Defcon drama: Undercover reporter bolts after outing - Cnet News
- Middle America, Meet The Hacker - Forbes
- Exposed undercover reporter flees hackers conference - AFP
- Undercover 'Dateline' Reporter Outed, Flees from Defcon - PC Magazine
- Undercover TV Producer Bootd from DefCon - ABC News
- NBC muckraker gets hacked at Defcon - The Register
- Dateline NBC Mole Outed At Defcon - Slashdot
- DefCon: Hacking meetup infiltrated by Dateline 'media mole' - CIO Magazine
- Undercover NBC Dateline reporter bolts from DEF CON 2007 - ZD Net
- DefCon's Moss: Undercover Reporter Damages 'Neutral Zone' - Information Week
- NBC Dateline's "Catch a Predator" Series Pays Cops and Undercover "Victims" -- UPDATED - Wired News
Rootkits
- The Great Rootkit Debate - Dark Reading
SCADA
- Hacker shows flaw in software that controls key infrastructure - Computer Crime Research Center
- America's Hackable Backbone - Forbes
- Researcher: Flaw Exposes Hack Threat - Fox
- Researcher worries about cyber-hijackers - MSNBC
- Hacker shows flaw in software that controls key infrastructure - Mercury News
Social Networks
- FaceBook code leaked on Site - ABC News
MySpace
- Hackers: Networking Sites Flawed - The St. Petersburg Times
- By and thanks for the MySpace 'cookies' - The Brunei Times
- - Hackers: Social Networking Sites Flawed Fox
- Hackers: Social networks vulnerable - USA Today
- MySpace weakness patched, hacker's profile deleted - AFP
- Myspace Hacker's Profile Deleted - ABC News
- Morning Buzz: Aug. 6, 2007 - U.S. News and World Report
- 'myspace, others vulnerable to hackers" - Time
Speakers
Sam Bowne
- Teaching hacking helps students, professors say - Security Focus
- Teaching hacking helps students, professors say - Dark Reading
Zac Franken
- 2 Screws, 1 Plastic Cover, How Many Airports Infiltrated? - Eweek
- Open Sesame: Access Control Hack Unlocks Doors - Wired News
- Access Card Systems -- Trivially Vulnerable - Washington Post Blog
Lukas Grunwald
- Buffer Overflow Found in RFID Passport Readers - Slashdot
- Arphid Watch: A Passport Crashing Technique - Wired Blog
- Scan this guy's e-passport and watch your system crash - ABC News
Thomas Holt
- An Inside Look at Internet Attackers' Black Marke - PCWorld
- Online Crooks Fine-tune Selling of Malware - CIO India
- Malware: Serious Business - Forbes
- An Inside Look at Internet Attackers' Black Marke - ABC News
- Black market for malware a thriving place - The Register
- Malware: Serious Business - Dark Reading
Mikko Hyyponen
- There's hope for stopping mobile malware - InfoWorld
Charlie Miller
HD Moore
- Hacking Without Exploits - Dark Reading
Scott Moulton
- A Visit to the Drive Doctor - Dark Reading
Vendors
AirDefense
- New Wireless Security Threats Revealed at Defcon 15 - Government Technology
- AirDefense Makes New Detection And Protection Methods Available to Customers - Networkcomputing
AirTight
- AirTight Revealed Potent Variant of Evil Twin at DEF CON 15 - Web Services Journal NJ
AMD
- Is AMD's 65nm SOI process broken? - ZD Net
Finjan
- Finjan Identifies Important Vulnerability in Windows Vista's Contact Gadget, Leading to a Security Update Issued by Microsoft - ITNews Italy
Immunity
- Exploits in the Fast Lane - Dark Reading
- Security firm makes it easy to come up with attack code - ComputerWorld UK
- Defcon: Security firm automates generation of attack code - ComputerWorld
- Immunity releases new exploit-writing tool - ComputerWeeklyUK
- Security firm makes it easy to come up with attack code - Tech World
- Security firm makes it easy to come up with attack cod - ComputerWorld UK
- Defcon: Security firm automates generation of attack code - ComputerWorld
- Immunity releases new exploit-writing tool - ComputerWeeklyUK
- Immunity releases new exploit-writing tool - Search Security
- Immunity says debugger tool will cut zero-day attacks - ComputerWeeklyUK
- Immunity Unleashes Automatic Exploit Tool - PC Magazine
- Securty Firm Autmates Attack Code Generation - ABC News
- Defcon: Security firm automates generation of attack code - CIO Magazine
ISEC
- How to break forensics software - The Inquirer
- Researcher Finds Media Player Flaws - Fox
- Researcher: media players invite malware - USA Today
Microsoft
- Attackers target two Microsoft security flaws - Search Security
- Microsoft to update critical Windows, Office, flaws. - Search Security
Mozilla
- Mozilla: 10-Day Patch Guarantee 'Not our Policy' - IDG News Service
Wall of Sheep
- net.wars: Wall of sheep - Newswireless.com
Web Hacking
- Browsing the Intranet Problem - Dark Reading
- Internet Explorer and Your Web Site's Privac - Washington Post Blog
- Hackers bite into "cookies" to plunder user data from websites - AFP
Wi-Fi
- Wi-Fi hot spots are easy prey for hackers - Detroit Free Press
- Your Wi-Fi can tell people a lot about you - Cnet News
- Public Wi-Fi use raises hacking risk - USA Today
- Flash: Public Wi-Fi even more insecure than previously thought - The Register
- DEF CON to Demo New Wi-Fi Hacks - Security News Portal
Xerobank
- XeroBank Launches Anonymizing Tool Suite - Dark Reading
Badges
- Defcon aims to thwart counterfeit badges - ABC News
- Defcon Badges go high tech - The Inquirer
Blackberry
- BlackBerry a Juicy Hacker Target - Wired News
- BlackBerry flaw highlights growing mobile device risks - Search Security
- D'Aguanno demonstrates Blackberry attack - The Inquirer
- Is Your Blackberry a Hacker's Back Door? - CFO
- Security Researcher To Release Code That Could Help Exploit BlackBerry Security Flaw - Information Week
- The Week Ahead, Aug. 14-18, 2005 - Forbes
- Trojan malware takes a bite out of BlackBerry - Computer World
- BlackBerry hacking peril exposed - The Register
Blue Pill
- Introducing Blue Pill - The Invisible Things
Bots
- Defcon Speakers Team Up to Fight 'Queen Bots' - Washington Post
Conference Overview
- Defcon 14 report: DAY TWO Zone-H
- Piratas informáticos a todo vapor - BBC Mundo
- Black Hat and Defcon 2006: SecurityFest - PC World
- Defcon 14 report: DAY ONE - Zone-H
- Defcon 14 Wrapup, at Long Last - Washington Post
- DefCon Delays Can't Stop the Madness - Washington Post
- Defcon gets off to a late start - CNET News
- Defcon growing pains - Rush of people delay opening - TG Daily
- Hacker Pranks at Defcon and Black Hat in Las Vegas Emphasize Computer Security - MIT Tech Review
- Hackers and G-men to descend on Las Vegas - MSNBC.com
- Hackers and trackers mixing and mingling - International Herald Tribune
- Hackers gather at confab to penetrate computers, pick locks, spray pellets - Washington Post
- Hackers meet to exploit computer flaws - Fox News
- Las Vegas braces for computer security gurus - TG Daily
- Las Vegas hosts computer security events - SEATTLE POST-INTELLIGENCER
- Reunión mundial de piratas informáticos en Las Vegas - El Pais
- Suits and punks convene in Las Vegas for hacker conferences - USA Today
- Talking with the Dark Tangent - Washington Post
- Two Former Federal Agents Talk About Computer Forensics, Network Security and Computer Crime. - CyberSpeak
Contests
- IT Security through contests, sponsored by Pepsi - The Inquirer
- Hackers meet to exploit computer flaws - Fox News
CTF
- Elite programmers compete in CTF at DEF CON - ZD Net
- UF security professionals win world's largest ‘hacking’ competition - University of Florida News
Device Driver
- Even offline computers can be hacked, researchers say - USA Today
- Experts Discuss Wireless Vulnerability - MS Money
- Researchers show 'systemic' wireless vulnerability - International Herald Tribune
DNS
- DNS amplification attacks explained - The Inquirer
Feds
- Defcon 2006: Hackers can work for the Feds - no degree required - TG Daily
- FBI: Cybercriminals Taking Cues From Mafia - PC World
- Feds court infosec pros in fight against cybercrime - Search Security
- Meeting the Feds at the Def Con Hacker Fair - NPR Radio
- When Online Crooks Advertise - Washington Post
- Johnny Long interview - CyberSpeak
Hardware
- Defcon 14 Full of Amazing Hardware Hacks - Slashdot
IBM
- - Legacy protocol puts IBM mainframes at risk Search Security
IPv6
- The state of IPv6 has to be seen to be believed - The Inquirer
Jackpotters
Malware
- Cult Of The Dead Cow Puts Malware Samples Online - Windows IT Pro
Microsoft
- Microsoft Challenges Hackers On Vista - CBS News
Offensive Computing
- Cult Of The Dead Cow Puts Malware Samples Online - Windows IT Pro
Oracle
- Defcon 2006: Oracle not so "unbreakable" - TG Daily
Passport
- Is RFID tracking you? - CNN
- Researchers: E-passports pose security risk - CNET
- Biometric passports cracked - Computing
- British biometric passport hacked - The Inquirer
- E-Passport ally responds to cloning claims - Security Focus
- Hacker Cracks, Clones RFID Passport - Tech News World
- Researchers expose e-passport vulnerability - Search Security
- Researchers: E-passports pose security risk - ZD Net Asia
- Security fears threaten RFID adoption - ITWeek
Traveling Terabyte
VOIP
- VoIP Abuse at BlackHat, Zimmermann to kick off DEF CON - VON Magazine
- E-mail security hero takes on VoIP - CNET News
- Zfone for VoIP ready for testing - The Inquirer
- Zimmermann: Borderware Licenses Zfone Technology - VON Magazine
Wall of Sheep
War Driving/Wi-Fi
- War driving by rocket at 6,800 feet - Security Focus
- A wireless hacking computer that can't be hacked - TG Daily
- The Black Hat Wi-Fi exploit coverup - NewsForge
Worms
- Researchers warn over Web worms - Security Focus
Conference Overview
- Zero Day - Infoworld Blog
- Security Fix - Washington Post Blog - Defcon Day 1
- Slashdot | DEF CON Coverage Round-up at Make
- Hackers and foes exchange ideas - International Herald Tribune - AP
- Las Vegas Weekly - Written by Defcon Speaker Patty Walsh
- Hackers prowess on display - Statesman
- Kisses and Renderman brave INQ snapperazzi - The Inquirer
- Hacking hardware on display- The Inquirer
- Hackers Head To DefCon In Vegas
- Hackers show off abilities at Defcon - Miami Herald
Conference Overview - Blogs
- RantMedia at DEF CON XIII | Rantmedia Community - Blog by RantRadio
- Otinia - Blog entry with impressions of DC
- DefCon 13 - Trip Report for the Distributed systems department at Lawrence Berkely Lab
- Andrew Mudd [AndrewMudd.com] :: DefCon 13 No-Pictures-Yet Wrap Up - Blog
- My EXCEPTIONALLY lengthy and yet contentless DEF CON review! - Blog by attendee on Johnny Long's forum
- Freedom Lives: Defcon 13 Archives - Blog
- Kitchen Sink Web Blog Archive DefCon 13 roundup - Blog from attendee
- Insomnygen: Defcon 13 - Blog
- Defcon 101: no show speakers, long lines, and total chaos. - The Jason Calacanis Weblog - calacanis.weblogsinc.com _ - Blog
- Emergent Chaos: Defcon Coverage? - Blog of Adam Shostack
- Who Has Time For This?: CiscoGate at DEF CON - Blog by David Cowan
- Blog for DIAMONDKT - Blog by attendee - extensive length
- DEF CON 13 Reading List at Daniel Spisak on Technology - Blog entry highlighting authors favorite talks
- DEF CON 13 Aftermath at Daniel Spisak on Technology - Blog of attendee
- SynapticTransmissions.com - Attendee Blog
- SynapticTransmissions.com - Attendee Blog - Day 3
- SynapticTransmissions.com - Attendee Blog - day 2
- SynapticTransmissions.com - Attendee Blog - Day 1
- Ants on the MelonBlog Archive Friday at DefCon 13 - Blog entry
- Ants on the MelonBlog Archive Saturday at DefCon, Blackjack in Vegas - Blog
- Ants on the MelonBlog Archive End of DefCon, Deep Fried Twinkies - Blog (day 3 review)
- Russell's blog - Blog entry by attendee
- timbrown: Okay, so I'm back on UK time... - Blog entry by attendee
- http://sneak.datavibe.net/blog/read?id=1076 - Blog entry by attendee
- Carbon Ring: DefCon 13 Part II - Blog entry by attendee
- Carbon Ring: DefCon 13 Part I - Blog entry by attendee
- The Edge of I-Hacked DEF CON 13!! - Blog entry
WiFi Shootout
- Rupert Goodwins' Diary - ZDNet UK Comment - Blog
- Team iFiber Redwire Sets New WiFi Distance Record - Digital-Lifestyles.info
- Slashdot | 125-Mile WiFi Connection - Slashdot article on WiFi shootout
- New wireless record claimed | Tech News on ZDNet
- Boing Boing: Third Annual Defcon Wifi Shootout Contest - Pre DC Coverage of WiFi Shootout
- Boing Boing: DefCon WiFi shootout champions crowned: 125 miles - BoingBoing Blog Entry after event
- Belkin intros sub-$100 G Plus MIMO router line - Engadget - www.engadget.com - Product announcement mentioning recent DC Wi-Fi world record
- Unamplified WiFi distance record set at 125 miles - Engadget - www.engadget.com - Blog
- Record Set at DefCon WiFi Shootout - By Pedro Hernandez [enterpriseplanet]
- heise online - New WLAN long-distance world record
- Tom's Hardware Guide: Tom's Hard News - WiFi Shootout record
- Wi-Fi Toys - Wi-Fi blog entry on shootout record
- Wired News: Hackers Annihilate Wi-Fi Record
Bluetooth
KegBot
- Opposable Thumbs: Meet KegBot, son of Kegerator
- Security Fix- Washinton Post
- Boing Boing: Defcon, Makezine, kegbot
- The Kegbot - It Gives You Beer : Gizmodo
- Slashdot | Kegbot: The Future of Robotic Drink Service, Now
- MAKE: Blog: @ DEF CON - The Kegbot project
Wall of Sheep
- Wall of Sheep - I see stupid people
- [ISN] Wall of Sheep - I see stupid people
- Passing the conference 'sniff' test - Talks about several conferences.
- Security Awareness for Ma, Pa and the Corporate Clueless: Into the Valley of Death - Blog by Winn Shwartau (he gives pre-con advice on avoiding the wall of sheep)
Capture The Flag
WiFi Security
- WiFi access points go nuclear
- Live from DefCon: WiFi bouncing - Engadget - www.engadget.com - Engadget blog entry (Live from DC)
- Wireless access security tool moves past prototype stage - WaveSEC story
- AirDefense Reports Nearly 2,500 Wireless Attacks at DefCon; Evil Twin Attacks Moving from Masquerading to Injection - Forbes.com - AirDefense PR regarding hostile activity on the Defcon network.
- Wireless Noise Hampers DefCon; Impact of Non-Wi-Fi Interference Surprises Observers at Hacker Conference - Press release by company analyzing interference issues [AirMagnet]
- Nevada legalizes wireless handheld gambling - Engadget - www.engadget.com - Pre-DC article mentioning how DC hackers will enjoy wireless handheld gambling
- The INQ Guide to finding wardriving supplies
- Wireless Developer Network
- Internet News Article | Reuters.co.uk | PluggedIn: Wireless networks -- easy pickings for hackers
- Tom's Hardware Guide: Tom's Hard News - WiFi pistol appears at Defcon
- InformationWeek > Wireless > When Networking Wirelessly, Beware The Microwave > August 2, 2005
Lockpicking
- How to pick an IT lock at Defcon 13 - Article with pictures (The Register/TheInquirer)
EFF
- Dunk the hacker and be a net society contributor - The Inquirer
Feds
- Macworld UK - Defcon draws federal recruiters - Macworld staff blurb quoting Wells from Reuters report
- US officials go to hackers' convention to recruit - Reuters
- PC Pro: News: US authorities recruiting at Defcon - Short blurb by Simon Aughton
- CNN.com - Feds recruiting hackers at Defcon - Aug 11, 2005 - CNN copy of reuters article
- U.S. government hiring more hackers
Infra-red
- Infrared exploits open the door to hotel hacking | The Register
- Hacking the hotel through the TV - Hotel News Resource
- Hacking the hotel through the TV | Tech News on ZDNet
- WatchGuard Wire: RSS Feed | WatchGuard Technologies, Inc.
- Wired News: A Hacker Games the Hotel
- GoldBlogger Hacker Teaches Click Fraud At Conference! - Blog entry on Adwords hacking
- Hacking Google Adwords - Defcon Panel recap - The Jason Calacanis Weblog - Lengthy Blog by attendee on the hacking google adwords
- Hacker Teaches Click Fraud At Conference! - addict3d.org
RFID
- Hackers demonstrate their skills in Vegas - Business Week, Aug 1. Greg Sandoval
- RFID: There you are!: ZDNet Australia: News: Hardware
Print Articles
- Red Herring (Feb 2005): DT comments on Antivirus Guarantee.
- Wired Magazine (Dec 2004): Bluesnarfing and other DC12 coverage in the article "When Cell Phone Hackers Attack".
- FHM Magazine (Dec 2004): DEF CON was featured in the December 2004 issue of FHM.
- Wired Magazine (Nov 2004): Blurb on the DC 12 Wi Fi Shootout.
General/Misc
- Slashdot - Defcon 12 Running Man Contest - Local Copy
- Slashdot - Slashdot | Blackhat/Defcon Report - Local Copy
- Slashdot - DEF CON 12 - After the Hangover - Local Copy
- Slashdot - Combining Port Knocking With OS Fingerprinting - Local Copy
- The Register - Rampant capitalism upsets delicate Reg reader - Local Copy
- The Register - Vegas braces for DEF CON | The Register - Local Copy
- The Register - VoIP hackers gut Caller ID - Local Copy
- PC World - PDA Viruses Could Get Nasty - Local Copy
- PC World - PCWorld.com - School for Hackers - Local Copy
- Blogs.PC World - Today @ PC World - New MyDoom Strikes Search Engines - Local Copy
- The Inquirer - Hackers and establishment to mingle at DEF CON - Local Copy
- The Inquirer - DEF CON 12: Feds Yes, Anarchy No. - Local Copy
- TomsHardware - Hackers descend on Las Vegas - Local Copy
- TomsHardware - Defcon 12's Fear and Hacking in Vegas - Local Copy
- Las Vegas Sun - Las Vegas SUN: Hackers gather in Vegas for annual digital huddles - Local Copy
- MarketPlace Public Radio - Marketplace Morning Report for August 2, 2004 - Local Copy
- Las Vegas City Life - Hacking the planet - Local Copy
- Searchsecurity - REPORTER'S NOTEBOOK: Impressions of DefCon 12 - Local Copy
- Searchsecurity - Capture the Flag competitions can net far more than fun - Local Copy
- PCWorld - Feds Seek a Few Good Hackers - Local Copy
- ZDNet - Hackers plan global game of 'capture the flag' - Local Copy
- Geek.Com - Global Capture the Flag game for hackers - Local Copy
- ZDNet - Why you should Google yourself--and often - Local Copy
- NewsForge - Google hacks are for real - Local Copy
- NewsForge - Blackhat/Defcon: The final report - Local Copy
- NewsForge - DEF CON 12: Opening Day - Local Copy
- ComputerWeekly - Hackers conference shown how to bypass Active Directory controls - Local Copy
- eBCVG - Training Ethical Hackers: Training the Enemy? - Local Copy
- Forbes Technology Playing Role in GOP Protests - Local Copy
EFF & DVR
- Wired - Group Warns DVRs Endangered - Local Copy
- Telecom Web - EFF's Digital Television Liberation Project Starts Its Engines - Local Copy
Wireless & Wifi Shootout
- Slashdot - DefCon WiFi Distance Competition Calls For Entrants - Local Copy
- Slashdot - DEF CON WiFi Shootout Winners Set A Land Record - Local Copy
- Slashdot - The Dark Side Of DefCon's Wireless Network - Local Copy
- Slashdot - Ready, Aim, HACK! - Local Copy
- Wi-Fi Planet - High Noon for High Range Wireless - Local Copy
- USA Today - Teens' wireless feat could be world record - Local Copy
- LocalTechWire - AirDefense Says Hackers Growing More Sophisticated - Local Copy
- TechWeb - Techweb > News > WLAN security > Wireless Hacks Growing Threat > August 3, 2004 - Local Copy
- Wired - Wired News: Wi-Fi Shootout in the Desert - Local Copy
- TomsHardware - Wireless Wizardy and chaos during at talk at Defcon - Local Copy
- ComputerWire - WiFi and Bluetooth Distance Records Smashed - No Local Copy - pay site
- TheRegister - Wi-Fi 'sniper rifle' debuts at DEF CON | The Register - Local Copy
- P2PNet - Wi-Fi ground distance record - Local Copy
- P2PNet - Bringing goatse - Local Copy
- InternetWeek - WLAN Attacks Getting More Sophisticated, Vendor Says - Local Copy
Bluetooth
- Slashdot - Bluesniper Creator Interviewed on Gizmodo - Local Copy
- Gizmodo - IMterview With Bluetooth Hacking Flexilis's John Hering - Local Copy
- PCWorld - PCWorld.com - Bluetooth Phones Could Leak Data - Local Copy
- P2PNet - Bluetooth mobile snipers - Local Copy
- Wired - Wired News: Security Cavities Ail Bluetooth - Local Copy
- Esato - Bluetooth-cracking gun - Local Copy
- SearchNetWorking - Bluetooth: Security's 'silent killer' - Local Copy
Evoting
- NYTimes - The New York Times > Opinion > Editorial Observer: Rolling Down the Highway, Looking Out for Flawed Elections - Local Copy
- IHT (same as NYTIMEs story) - Meanwhile: Chasing down flaws in electronic voting - Local Copy
- Slashdot - Hackers, Public Differ Greatly On E-voting - Local Copy
- News.com - Poll: E-voters not so afraid of election-day hacks | CNET News.com - Local Copy
- GCN - Government Computer News (GCN) daily news -- Public and experts split over e-voting security - Local Copy
- ZDNet - Poll: E-voters not so afraid of election-day hacks - News - ZDNet - Local Copy
- ComputerWorld - Can you hack the vote? - Local Copy
- ComputerWorld - Public, security experts' e-voting views differ sharply - Local Copy
- GCN - Government Computer News (GCN) daily news; Public and experts split over e-voting security - Local Copy
DNS
- News.com - Internet's 'white pages' allow data attacks - Local Copy
- Slashdot - Network Attacks Via DNS - Local Copy
- Silicon.Com - DNS hack leaves corporate networks wide open - silicon.com - Local Copy
- CBROnline - Researcher says DNS can stream voice, control Trojans - Computer Business Review - Local Copy
Anonymity
- Slashdot - Tor: A JAP Replacement - Local Copy
- Wired - Wired News: Onion Routing Averts Prying Eyes - Local Copy
- CBROnline - Tor offers onion routing for anonymity - Local Copy
- CBROnline - Freenet project struggles with overload - Local Copy
Press Releases
- Net Security - Syngress Publishing Announces the Release of "Zero Day Exploit ... - Local Copy
- Itseccity - DEF CON : One-Hundred Leading Hackers to Present New Material to ... - Local Copy
- Biz.Yahoo - Wireless LAN Attacks are Moving from Discovery Mode to Manipulation - Local Copy
- BusinessWire - LinuxWorld Conference & Expo Exhibitor Profiles - Local Copy
- MarketWire - Immunix Introduces YaST GUI to Help Users of Novell's SUSE LINUX Enterprise Server Simplify Application Security Management - Local Copy
- LockerGnome - No Starch Press Authors To Make Appearance At DEF CON 12 - Local Copy
Blogs/Small Articles
- FSecure - Mikko's blogging on DC12 - Local Copy
- Engadget - Live from DefCon: The Sniper Yagi - Engadget - www.engadget.com - Local Copy
- Engadget - Who you gonna call? The BlueSniper - Engadget - www.engadget.com - Local Copy
- Engadget - Live from DefCon: WiFi bouncing - Local Copy
- BoingBoing - Replace every image on a WiFi network with goatse.cx - Local Copy
- BoingBoing - Defcon Wi-Fi shootout results - Local Copy
- BoingBoing - Sniper rifle modded to be WiFi antenna - Local Copy
- BoingBoing - Defcon Wifi Shootout Contest - Local Copy
- BoingBoing - WiFi shootout in Vegas - Local Copy
- DC404 - Defcon Atlanta Group Write-up - Local Copy
- The Trade Show Floor: Def Con 0xB - Darth Elmo, Linux Journal - Local Copy
- Security pros talk, but can they walk? - CNET news.com - Local Copy
- Waiting for the worm to turn up - CNET news.com - Local Copy
- Robot 'guard dog' protects Wi-Fi setups - CNET news.com - Local Copy
- Hacking contest promotes security - CNET news.com - Local Copy
- DEF CON '03: Myth, Reality and Pictures - the inquirer - Local Copy
- COMPUTER SECURITY: Searching for the full truth - Las Vegas Review Journal - Local Copy
- Vegas' Hackers' Meeting Stresses e-danger - Las Vegas Sun - Local Copy
- Wireless network worries? Get a dog! - geek.com - Local Copy
- Internet threat looms as thousands of hackers meet - Forbes.com - Local Copy
- Hand-Held Devices Easy to Hack, Security Experts Say - Washington Post - No Local Copy (please provide!)
- Hackers get lesson in the law - CNET news.com - Local Copy
- Has 'haven' for questionable sites sunk? - CNET news.com - Local Copy
- Mitnick unveiled in more crazy DEF CON 03 photos, Root-Fu ceremony captured - the inquirer - Local Copy
- Programmer shows why he's got game - In Business Las Vegas - No Local Copy (please provide!)
- HavenCo's Gilbert & Sullivan Journey - the inquirer - Local Copy
- Vegas Braces for Hackers - Wired
- Defcon: Va-Va-Va Voom, Las Vegas - Wired
- Defcon: A Veritable Hack Fest - Wired
- Patrick's Def Con X Report: Day One
- How to Win Def Con's Capture the Flag Contest
- Putting fun back into hacking - ZDNet
- Shock! Maturity rules at hack fest - SMH
- Hackers Called Truthseekers, Problem-Solvers
- Reality Douses DefCon Camaraderie - PCWorld
- Patrick Brauch of C'T talks about Defcon (auf Deutsch) - Local Copy
- Defcon 9 Review - En Espanol! - Local Copy
- CNET - Defcon Grows Up - Robert Lemos - Local Copy
- CNET - Hacking for Human Rights - Robert Lemos - Local Copy
- IDG - CdC Redefines Hacktivism - Sam Costello
- The Guardian - Hats off to the Hackers - Simon Edwards - Local Copy
- DFWCUG - What I did on my summer vacation - Opcom - Local Copy
- BBC News - FBI Arrests alleged copyright hacker - Mark Ward - Local Copy
- ZDNet - Are 'White Hat' hackers unfairly under seige? - Robert Vamosi - Local Copy
- The Register - Hackers run amok during Defcon - John Leyden - Local Copy
- IDG - A Virus to fight viruses[sic] - Sam Costello - Local Copy
- Jon Sullivan's Blog on DC9, Part 1 - Local Copy
- Jon Sullivan's Blog on DC9, Part 2 - Local Copy
- ABC News has an intersting but shallow slide show overview of DEF CON 8.
- TechTV.com's cybercrime had extensive coverage of the convention. This is the main page.
- Hackers aren't criminals - they're the best kind of security - Laird Brown
- Black Hat/Def Con: The Magic is in the Mix. - Richard Thieme
- VarBusiness messes up an article and mis quotes Russ. - Carol Ellison - Local Copy
- Specter Of Network Attacks Looms Anew, - Max Smetannikov, Inter@ctive Week - Local Copy
- Hackers won't give Pentagon a break - Jim Wolf, Reuters - Local Copy
- Specter Of Network Attacks Looms Anew: Computer Snatchers Invade - Local Copy
- Is DEF CON turning legit? - Robert Lemos, ZDNet - Local Copy
- Hackers: Uncle Sam wants you! - Robert Lemos, ZDNet - Local Copy
- Do security holes demand full disclosure? - Weld Pond, @Stake - Local Copy
- Why DEF CON beats H2K. - Drew Ulricksen, ZDNet News
- Why it's a 'Summer of Hacking'. - Joel Deane, ZDNet News - Local Copy
- Jason Scott has a DEF CON Diary located at cow.net - Local Copy
- Boardwatch Magazine - Doug Mohney - THROUGH THE LOOKING GLASS - DEF CON 7 - September Issue, 1999
- Wired News - Two pretty good articles from
- Wired News - Polly Sprenger - Fear and Hacking in Las Vegas - July 10, 1999 - Local Copy
- Wired News - Polly Sprenger - Def Con: Brin in Da Noise - July 8, 1999 - Local Copy
- The Arizona Republic - Bruce Meyerson - Tools of the trade - July 9, 1999
- CBS.com - Hacker Eline Meet In Vegas - July 10, 1999
- ABC NEWS.com - Michael J. Martines - Hackers Having a Blast - July 9, 1999
- ZD TV has a section in the CyberCrime area for DEF CON with these different articles
- ZDTV - Alex Wellen - Def Con Writ Large - July 13, 1999
- ZDTV - Alex Wellen - Closing in on Def Con - July, 1999
Remembering the First Def Con. (Note: Contains some factual errors, but still good) - Local Copy - ZDNet - Inter@ctive Week Online - Doug Mohney - Hacker Fest: Serious Party - July 28, 1999
- Kevin Poulson had a few pieces about DEF CON
- My First Def Con - On finding decadence and dialogue in the desert - July 14, 1999
- He had this to say about InfoWar, in a question that was brought up to him at DEF CON 7.0.
- MSNBC had a couple of articles
- XDNNs Robert Lemos had an article about the media causing hacking.
- MSNBC - Should you care about DEF CON? - July 12, 1999
- MSNBC - Bob Sullivan - Hackers descend on Las Vegas - July 9, 1999.
- CNET News.com - Tim Clark - Hackers attack their own kind - July 9, 1999 Local Copy
- CNN had several articles:
- CNN - DefCon '99 draws security experts from both sides - July 12, 1999 - Local Copy
- CNN - DefCon 99: Games hackers play - July 13, 1999 - Local Copy
- CNN - Convicted hacker gives advice at DefCon - July 13, 1999 - Local Copy
- CNN - DefCon demos the latest chaos - July 14, 1999 - Local Copy
- CNN - Back Orifice 2000 under control - July 15, 1999 - Local Copy
- CNN - Bad rap for Back Orifice 2000? - July 21, 1999 - Local Copy
- USA Today newspaper wrote Hacking into a new age.
- Infoworld had a couple pieces about Black Hat and DEF CON.
- this nice piece about Black Hat and DEF CON. - Local Copy
- Infoworld - Matthew Nelson - 2,500 hackers gather in Las Vegas for DefCon - July 11, 1999
- Computerworld had this short piece: Latest hacker tool will target NT desktops.
- PCWorld News - Andrew Brandt - Hacker Games: From Trivia to Wrestling July 10, 1999 - Local Copy
PCWorld News - Hackers Gather in Vegas.
PCWorld News - Andrew Brandt - Hack-a-thon Demos the Latest Chaos - July 12, 1999 - Local Copy
Parse has several Real Media interviews of stuff around DEF CON.. check it out in the
section.
Psuedo has some Video of DC7
- NYTimes - Hacker Convention Takes On a Corporate Tone by By MATT RICHTEL - Local Copy
- NYTimes - The Hacker Myth Crumbles at Convention - Local Copy
- CNN - Hackers: the good, the bad, the ugly - Local Copy - Wav File from CNN Story
- CNN - Hackers claim to find security holes in Microsoft's Windows - Local Copy
- Infoworld - Attendees beware: A Black Hat in the sun can scorch your brain - Local Copy
- Infoworld - Black Hat: We have seen the enemy and they are ... being interviewed on CNN - Local Copy
- ZDNet - DEF CON: Fear and fascination in Las Vegas - Local Copy
- ABC News with a picture of AJ and Deth Veggie. By Angie Bluethman.
- Hackers turn up heat at DEF CON V, from the Secure Computing Security Newsletter. By Holly Knox, Internet Security Editor
- ZDNet's Hackers invade Vegas. By Robert Lemos.
- Netly News If you build it, they will Con. By Declan McCullagh - Local Copy
- The Site's Fear and Hacking in Las Vegas by Joel Deane.
- Crooks Hook Clueless Hackers by Joel Deane.
- Special to the Mercury News West magazine It takes a hacker to catch a hacker Four parts, by Jonathan Littman.
- Here are the pictures from the article thanks to Lockheed for scanning them.
- Computer World's Fear and Hacking in Las Vegas (Common article title, eh?) by Michael Schrenk. - Local Copy
- The Vominator's heart wrenching experiences at DEF CON V.
- Krusty's TDYC review of DEF CON V.
- Soul to Squeeze writes about the con.
- Lockheed's account of what the hell happened.
- Thanks to Ophie for sending this Comic from Computer World.
- TekLord and Plucky's review page for DEF CON 5. - Local Copy(scroll to near end of document)
- What Plucky, TekLord and Zytek did.
- DefCon V Adventure: System Failure Debut, by pinguino.
- This piece, called Hackers Do Vegas ran in The Australian on August 2.
- Hacker Lessons learned by Matt Willis and told at DEF CON 5, written by Sharon Machlis for Computerworld 07/21/97.
- Ira Winkler Spy Catcher talks about what he had to say at DEF CON 5, written by Steve Ulfelder for Computerworld, 08/11/97.
- Hackers swap secrets on cracking computers By Angie Bluethman of the Associated Press.
- Count the Cliches in a recent story published by the Associated Press.
- DEF CON Hackers television transcript from The Discovery Channel "Cyber Life."
- FBI lectures hackers at convention By Adam Steinhauer, Sunday, July 28, 1996 in the Las Vegas Review-Journal and Las Vegas Sun
- The Orange County Register and this short piece about the FBI at DEF CON IV.
- The review from SunWorld Online News.
- The archive of stories about the hack of MGM's Hackers movie home page (Which happened right before the con.
- Business Week had a pretty cool write up on the whole matter.
- John Markhoff from the NY Times was there, this is what he had to say.
- Cyber Christ(Who was seen at several cons that year) showed up.
- Theora had a review
- The Financial Times write up was very poor attempt by the author to evaluate a convention he never attended, with an anti virus spin job.
- Fear and Loathing in Las Vegas.
- A super short blurb about the con in the Iron Feather Journal.
- John C. Dvorak wrote a bit about it in PC Magazine.
- Robert X. Cringley from Infoworld was there also.
- What Robert X. Cringely had to say about DEF CON I in Info World.
- Robert X. Cringley previews the convention in Infoworld (Unformatted)

