This is a comprehensive list of all articles known to have been written about DEF CON. Many publications are no longer in existence, and much of this history is lost. If you have press you would like included in the archive, send links and titles to neil [at] defcon ]dot[ org!

A note to journalists: Please stop writing clever articles entitled 'Fear and Hacking in Las Vegas', as it becomes difficult to tell them apart.

Pick a DEF CON:

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

DEF CON 28 Safe Mode

DEF CON 27

Election Security

IOT

Badge Talk

Auto Hacking

General Con Talk

CTF

Aviation Village

License Plates

DEF CON SecureDrop

DEF CON 26

Vote Hacking

Auto Hacking

IoT

# badgelife

Medical Hacking

Insecure medical equipment protocols let attackers spoof diagnostic information - BoingBoing

Policy

General

Write-ups

DEF CON 25

Voting Village

"The stakeholders for voting machines are everyone in the country. So it's important the problems get fixed."

-Matt Blaze

Internet of Things

Hardware

Con News

Badgelife

Wireless

DEF CON 24

Automotive

Badge Talk

CTF

Cyber Grand Challenge

Fed Talk

General

Internet of Things

Mobility

DEF CON 23

Automotive

DEF CON Badge

Clickjacking

Kaminsky Creates Clickjacking-Killer Kelly Jackson Higgins, Dark Reading

Crypto

CTF

Cyber Grand Challenge

DEF CON Shoot

Disclosure

Drones

Internet of Things

Interviews

Kali Linux

Kali Linux 2.0 to launch at DEF CON 23Darren Pauli, The Register

Mobile

Overview

Physical Security

Politics

Queercon

Let’s hack Grindr! Queercon helps diversify tech field Wesley Juhl, Washington Blade

Robocalls

Rootz

Children of DEF CON Roberto Baldwin, Engadget

Rumor Department

DEF CON is Cancelled, Again Jordan Pearson, Motherboard

SCADA

Social Engineering

DEF CON 22

DEF CON 21

General

Car Hacking

Lock Security/Sport

Bitcoin

Rootz Kidcon

Legal/Civil Rights

Feds

Smart Devices and Homes

Mobile Security/Malware

Badge/Badge Challenge

Will Smith

Social Engineering

EFF Crypto Shirt

Documentary

IPV6

Facebook

Wireless

Misc

DEF CON 20

Keynote

Badge News

Aviation

SCADA

Power Plant Hack Talk, Free Tools Pulled From Def Con Lineup - Dark Reading

The Cloud

Researchers To Launch New Tools For Search Engine Hacking - Dark Reading

Consumer Protection

Hacker Delves into Secret World of Warranties - CNet

Event Reviews

Routers

VPN Security

Physical Security

The Singularity

DEF CON Kids

NinjaTel

Social Engineering

Movie Night

DEF CON 19

General

Mobile Devices

Feds

At a Hacker Conference, Plenty of Friendly Federal Agents - NY Times

Facebook

CDMA Phone Hack

UAV/Aerial Hacking

Anonymous/LulzSec

DEF CON Kids

Steven Levy

Author Steven Levy tells young hackers about their religion - DevBeat

Mikko Hypponen

Wall of Sheep

Marc Weber Tobias

Hacking Through Power Lines

Social Engineering

Defcon Hacking Contest Targets Big Corporations (VIDEO) - Huffington Post

Moxie Marlinspike

DEFCON 2011: SSL and the future of authenticity - Naked Security Blog (Sophos)

CTF

DEF CON 18

General

GSM Base Station

Social Engineering

Badges

Google Malware

WPA2

Other

Video Coverage

DEF CON 17

Access Control

Badge

Browser Sniffing

A Browser's View of Your Computer - MIT Technology Review

Credit Hacking

CSRF

cPanel, Netgear and Linksys susceptible to nasty attack - The Register

Fake ATM

Feds

Hacking Sleep

Hacking Sleep - Forbes

Espionage

Korean 'journalists' booted from Defcon - IDG News

IP Video Hijacking

Social Engineering

Misc

MMORPG Expolits

Hackers Game a Multiplayer World - MIT Technology Review

Mystery Challenge

NOC

Inside The World's Most Hostile Network - WIRED -Threat Level

Overview

RFID

Social Networks

SSL Hijacking

UAV

Boffins showcase do-it-yourself flying spy drone - The Register

Software Update MITM

DEF CON 16

Badges

BGP Exploit

Captcha

Captchas are easily hackable - The Inquirer

Crackpots

Dozier Internet Law: Hackers Hack Away at DefCon Annual Convention - John W. Dozier Jr. Blog - Another take on DEF CON

CTF

Encryption

UAT

UAT Delivers at DEF CON - Market Watch

iPhone

Defcon 16 -- iPhone Used to Hack Wireless Systems - TechTree India

Lock Picking

MBTA vs. MIT

Mystery Challenge

NOC

A First Ever Look Inside The Defcon Network Operations Center - Wired Threat Level Blog

Overview

Social Networks

SSL Cookie Hijiacking

Wall of Sheep

Busted by Defcon's Wall of Sheep - The Norman Transcript

Warballooning

Covert operation floats network-sniffing balloon - Network World

DEF CON 15

Badges

Badge Hack at DefCon - Wired News

Banks

CTF

Capture the Experience - Dark Reading

Cyber War

Flash mob in Estonia - Cnet News

Disclosure

E-voting

E-Voting Certification Gets Security Completely Backward - Wired News

Feds

General

Germany

Honeypots

iPhone

Lock Picking

Malware

Polymorphic Malware: A Threat That Changes on the Fly - CSO Magazine

Media Players

NBC Undercover

Rootkits

The Great Rootkit Debate - Dark Reading

SCADA

Social Networks

FaceBook

FaceBook code leaked on Site - ABC News

MySpace

Speakers

Sam Bowne

Zac Franken

Lukas Grunwald

Thomas Holt

Mikko Hyyponen

Charlie Miller

HD Moore

Hacking Without Exploits - Dark Reading

Scott Moulton

A Visit to the Drive Doctor - Dark Reading

Vendors

AirDefense

AirTight

AirTight Revealed Potent Variant of Evil Twin at DEF CON 15 - Web Services Journal NJ

AMD

Finjan

Immunity

ISEC

Microsoft

Mozilla

Wall of Sheep

Web Hacking

Wi-Fi

Xerobank

XeroBank Launches Anonymizing Tool Suite - Dark Reading

DEF CON 14

Badges

Blackberry

Blue Pill

Introducing Blue Pill - The Invisible Things

Bots

Conference Overview

Contests

CTF

Device Driver

DNS

DNS amplification attacks explained - The Inquirer

Feds

Google

Johnny Long interview - CyberSpeak

Hardware

Defcon 14 Full of Amazing Hardware Hacks - Slashdot

IBM

- Legacy protocol puts IBM mainframes at risk Search Security

IPv6

The state of IPv6 has to be seen to be believed - The Inquirer

Jackpotters

Defcon 2006: Casinos could be losing millions to slot machine hackers - TG Daily

Malware

Cult Of The Dead Cow Puts Malware Samples Online - Windows IT Pro

Microsoft

Microsoft Challenges Hackers On Vista - CBS News

Offensive Computing

Cult Of The Dead Cow Puts Malware Samples Online - Windows IT Pro

Oracle

Passport

Traveling Terabyte

Traveling Terabyte Project helps soldiers keep in touch with Defcon - TG Daily

VOIP

Wall of Sheep

Wall of Sheep at DEF CON illustrates what not to do - ZD Net

War Driving/Wi-Fi

Worms

Researchers warn over Web worms - Security Focus

DEF CON 13

Conference Overview

Conference Overview - Blogs

WiFi Shootout

Bluetooth

KegBot

Wall of Sheep

Capture The Flag

WiFi Security

Lockpicking

How to pick an IT lock at Defcon 13 - Article with pictures (The Register/TheInquirer)

EFF

Dunk the hacker and be a net society contributor - The Inquirer

Feds

Infra-red

Google

RFID

top of the page



DEF CON 12

Print Articles

Red Herring (Feb 2005): DT comments on Antivirus Guarantee.

Wired Magazine (Dec 2004): Bluesnarfing and other DC12 coverage in the article "When Cell Phone Hackers Attack".

FHM Magazine (Dec 2004): DEF CON was featured in the December 2004 issue of FHM.

Wired Magazine (Nov 2004): Blurb on the DC 12 Wi Fi Shootout.

General/Misc

EFF & DVR

Wireless & Wifi Shootout

Bluetooth

Evoting

DNS

Anonymity

Press Releases

Blogs/Small Articles

top of the page



DEF CON 11

top of the page



DEF CON 10

top of the page



DEF CON 9

top of the page



DEF CON 8

top of the page



DEF CON 7

top of the page



DEF CON 6

top of the page



DEF CON 5

top of the page



DEF CON 4

DEF CON Hackers television transcript from The Discovery Channel "Cyber Life."

FBI lectures hackers at convention By Adam Steinhauer, Sunday, July 28, 1996 in the Las Vegas Review-Journal and Las Vegas Sun

The Orange County Register and this short piece about the FBI at DEF CON IV.

top of the page



DEF CON 3

The review from SunWorld Online News.

The archive of stories about the hack of MGM's Hackers movie home page (Which happened right before the con.

top of the page



DEF CON 2

Business Week had a pretty cool write up on the whole matter.

John Markhoff from the NY Times was there, this is what he had to say.

Cyber Christ(Who was seen at several cons that year) showed up.

Theora had a review

The Financial Times write up was very poor attempt by the author to evaluate a convention he never attended, with an anti virus spin job.

Fear and Loathing in Las Vegas.

A super short blurb about the con in the Iron Feather Journal.

John C. Dvorak wrote a bit about it in PC Magazine.

Robert X. Cringley from Infoworld was there also.

top of the page



DEF CON 1

What Robert X. Cringely had to say about DEF CON I in Info World.

Robert X. Cringley previews the convention in Infoworld (Unformatted)

top of the page

