CCC demonstrates photo-based fingerprint reproduction
Advises politicians to 'wear gloves.'
Advises politicians to 'wear gloves.'
Researcher's employer nixes presentation.
Big prizes on offer for product ideas.
Break-outs, open drivers and SDR promised.
Decides digital offence is the best defence.
Taking retro game hacks to extremes, Project Unity combines 15 original consoles in one box.
Crackers need not apply.
ARM-based machine boasts impressive power.
Hacking group announces plans to disband, following scores of website security breaches.
Sony has succumbed to new hacker attacks in Thailand and Japanese.
Square-Enix suffers hacker attack from Anonymous splinter group.
A study commissioned by CPP warns that almost half of UK Wi-Fi networks are insecure.
A new hacker conference - HacKid - aims to teach children the joys of true hacking.
The coder behind the Samy MySpace work has released a ulility which allows users to connect to another computer despite both being behind NAT routers - with potential P2P benefits.
The Pwn2Own contest is under way, and the first day saw Firefox, Safari, and Internet Explorer 8 all used to penetrate host systems.
Qi Hardware has launched a $99, ultra-portable Linux-based handheld with an almost-full keyboard and the ability to boot custom operating systems - clearly a challenge to hackers.
Pwn2Own - long a staple of the CanSecWest security conference - is putting more than half of its prize fund towards exploits in popular smartphone platforms.
California-based security consultant Christopher Tarnovsky wowed audiences at the Black Hat 2010 conference with a presentation on how he broke the Trusted Platform Module.
Nokia's flagship N900 smartphone - built around the Maemo 5 operating system - has been hacked and made to boot Google's rival Android platform.
An enterprising hacker has successfully forced his Kindle 2 e-book reader to run the ARM port of popular Linux distribution Ubuntu.
A security researcher has announced an open-source distributed computing project which aims to generate a rainbow table for the A5/1 algorithm used in mobile 'phones.
A bug in the way the iPhone handles SMS messages which can lead to remote code execution - first spotted by security pro Charlie Miller - has been patched by Apple.
A Polish hacker has successfully installed a copy of Windows 3.1 on the Nokia N95 Symbian-based handset - complete with emulated mouse support.
A hacker at the Black Hat conference has demonstrated a tool dubbed SSLstrip, which is capable of fooling browsers into giving up SSL encrypted data.
Security researcher Charlie Miller has unveiled a rather worrying security hole in Google's Android platform - one which allows for arbitrary code execution.
Kaspersky - anti-virus and security software vendor - has had its website attacked by crackers, who have made off with a full copy of the company's database.
The Janus team - creators of the pro-privacy JanusVM - has announced a hardware based 'privacy adaptor' that routes all traffic across a VPN or the TOR network.
Another security flaw has been discovered in Windows Vista, this time allowing for a buffer overflow in the networking subsystem to overwrite kernel memory.
If you're a G1 owner hoping to get a little more power out of your Android-based device, take a leaf out of Jay Freeman's book and install Debian on it.
The first commercial Android implementation, the T-Mobile G1, has been officially 'jailbroken' with a backdoor discovered that allows users full system access.
A pair of security researchers are to give a presentation at PacSec this week demonstrating a method of cracking WPA wireless encryption in under fifteen minutes.
The news has come down from Steve Jobs himself that the application blacklist discovered hidden in the iPhone is very real - but will only be used against 'malicious' apps.
A presentation demonstrating major security weaknesses in the MiFare Classic-based CharlieCard RFID system has been gagged via court order this weekend.
The US Department of Justice announced on Tuesday that it has indicted eleven individuals believed to have been involved in the penetration of networks owned by TJX.
A flaw in the popular Photobucket photo-sharing site opened up private albums to anyone capable of guessing a filename has been patched, according to a security researcher.
Hacker Chris Anderson has developed a tool which allows web applications developed on the Google App Engine SDK to run on any Unix-like server.
Several eager hackers have got their hands on the beta release of the iPhone 2.0 firmware, and have already cracked it wide open before the official release date.
A security researcher and Mac fan has discovered that the latest Apple operating system keeps plain-text copies of user passwords in RAM with no security at all.
Hacker Adam Laurie has demonstrated a contactless attack on an RFID-equipped American Express card at the Black Hat DC conference.
If you use wireless networks in a busy area you could probably do with a spectrum analyser, and hacker Jason Hecker has designed just what you're after.
Research carried out by RISE Security shows that the popular Eee PC is vulnerable to attack via an outdated copy of the Samba package that is activated by default.