Since Friday the DEF CON 18 Archive Page is running! Currently, you will find all of the presentation slides, white papers and extras posted, as well as the DEF CON 18 Program in pdf format! In the next days you will find the contest results, press releases, and even a few early release videos, too.
This is one of the findings of a new study of vulnerability researcher Qualys. Qualys presented the study at this years BlackHat in Las Vegas. WordPress websites have been rated quite good. The whitepaper says that only 4% of the WordPress sites are affected by critical vulnerabilities: Versions before 2.5 are affected by a Critical [...]
According to The Register Sam Bowne said “IPv6 is a security nightmare” in large part because IT professionals haven’t worked out a large number of security threats facing those who rely on it to route traffic over the net. You will find slides and other materials from Bowne’s talk at his website.
You will find a quite good questions and answers page at the F-Secure blog about a site called jailbreakme.com that enables you to jailbreak your iPhones and iPads just by visiting the site. The problem is that the site uses a zero-day vulnerability to execute code on the device.
There is work to do for the German chancellery which is the responsible authority for information services in Germany. Some retired Federal Information Service Agents (BND) were searching for new jobs at the social network XING. Now there is a fuss in German Press, because they revealed their former positions at the BND. One XING [...]
The Google Hacking Diggity Project published version 0.1 of its security scanner GoogleDiggity. The command line tool brings 1623 automated queries to your desk and writes the answers to a txt file. Although the tool promises to stop after 64 queries (according to Googles terms and conditions) it made all 1623 queries in my test [...]