. Solar Energy News .




.
CYBER WARS
Children learn hacker ways at DefCon
by Staff Writers
Las Vegas, Nevada (AFP) Aug 7, 2011

Nine-year-old Anna focused intently as she screwed a circuit board into place in a first-ever "DefCon Kids village" created to tutor children in the ways of hacking.

Her 10-year-old brother, Jake, was working on a similar task and beginning to suspect that the screws he was using were refusing to cooperate.

"I'm not really a hacker, but my brother is," Anna confided as her dad stood proudly nearby in a room set aside for child-oriented sessions at the world's largest hacker gathering. "I'd like to be a hacker."

Anna and her brother were building small robots that paint on spherical objects such as ping pong balls or Easter eggs.

Jake told of being no stranger to cracking computer software.

"The secret is you don't add code," he said. "You just move the code around."

Chris Hadnagy and other DefCon Kids tutors were adamant that in a world where children are surrounded by technology it is smart to provide guidance and a place where they can safely, and legally, test hacker skills.

Hadnagy, whose book Social Engineering: The Art of Human Hacking came out this year, tailored a "Capture the Flag" game for the event.

The game included deciphering clues, picking locks, coaxing information out of people, and reading subtle facial expressions.

About ten pairs of children competed, with the average age being 9.5 years old.

The teams, shadowed by supportive parents, darted about DefCon chasing clues and getting strangers in the notoriously edgy assembly to reveal secrets or do odd things.

Each of the teams finished the contest, with one almost conning its way to first place by talking people into revealing hints instead of decoding ciphers.

"For DefCon it was a very weird experience," Hadnagy said.

"Kids were hugging their moms and hanging out with them," he continued. "I am used to people walking around with Mohawk (haircuts) and boobs hanging out...I might have to go drink something."

Top prize in the "social engineering" contest was night-vision goggles and a remote control helicopter equipped with a surveillance camera.

"Some of these kids have skills," Hadnagy said. "They are amazing."

Lock-cracker Marc Weber Tobias enthralled children with Japanese puzzle boxes as he provided a glimpse into the mind of a lock-picker.

"They loved it," Tobias said. "Their parents were amazed that the kids hunkered down for hours trying to open puzzle boxes."

DefCon Kids sessions included hacking hardware, software and websites.

"They are really in their element here," Earl Malmrose said of his children, Jake and Anna. "They really jumped in."

Malmrose, a software engineer who has a computer company, smiled as he noted how badly his two children want lock picks. He was considering the buy.

"Our second oldest, now in college, was about 10 when we lost a key to our fireproof safe," Malmrose recalled.

"He looked up how to pick a lock on his own and he opened it for us with a paperclip," he continued. "That was useful."

The 10-year-old daughter of a pair of DefCon stalwarts unveiled a new way to hack games on smartphones or tablets running on Apple or Android mobile software.

The girl, who went by the hacker name CyFi, found the vulnerability after she got tired of waiting for virtual crops to grow in farming games. She figured out a way to tamper with in-game time.

Her discovery was deemed a new class of vulnerability and shared with makers of the software.

Since DefCon debuted in 1993, many once-nefarious attendees have become computer security good guys bent on defending companies and homes against cyberattacks.

DefCon founder Jeff Moss, whose hacker handle is Dark Tangent, is on a White House homeland defense council and heads security for the agency in charge of Internet addresses.

Some have also become parents keen on sharing the hacker world with their offspring.

Government agents once flushed out in a game called "Spot the Fed" are now welcomed on panels such as "Meet the Fed," a version of which was tailored for DefCon Kids at the notorious hacker gathering that ended Sunday in Las Vegas.

The US National Security Agency, which recruits talented hackers at the event, brought a cryptography exhibit to show the children.




Related Links
Cyberwar - Internet Security News - Systems and Policy Issues

.
Get Our Free Newsletters Via Email
...
Buy Advertising Editorial Enquiries


Smooth talk a slick hacker tool
Las Vegas, Nevada (AFP) Aug 7, 2011 - Hackers at DefCon have long understood that there is no patch for human stupidity.

Skills honed by software renegades at the renowned hacker gathering that ended Sunday included the art of talking workers into revealing information that can be used to crack into computer networks.

A "Schmooze Strikes Back" contest challenged hackers to test their "social engineering" skills on companies such as Apple, Oracle, Symantec, and Walmart. The contest debuted at the annual DefCon gathering in Las Vegas last year.

"The results are worse than they were last year," said Chris Hadnagy, a social engineering specialist running the contest.

"From what we found, we would own everyone on of these companies."

Hackers were able to talk workers at various companies into disclosing anything from the versions of software used in networks to who provided cafeteria food service.

Knowing specifics about software in company computers lets hackers figure out weaknesses to exploit, and sharing operational information could enable someone intent on corporate espionage to sneak into facilities.

The most effective ruses involved calling companies and posing as a potential customer out to be reassured about the safety of doing business together, according to Hadnagy.

Pretending to be calling from another department in a company, or a remote technical support team, proved to be another effective tactic for hackers.

Retail operations were consistently harder targets, possibly because they are more accustomed to interacting with customers, according to Hadnagy.

"Women seemed to be more security conscious," he said of the contest findings, which will be published in a report later this year.

"We call back and get a guy on the phone and we get everything we want," continued Hadnagy, who runs the social-engineer.org website.





. Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle



CYBER WARS
Raytheon Chosen by DARPA for Critical Cybersecurity Research Program on Insider Threats
Dulles, VA (SPX) Aug 08, 2011
Raytheon has been selected to support an insider threat research program led by the Defense Advanced Research Projects Agency (DARPA). The goal of the DARPA Anomaly Detection at Multiple Scales (ADAMS) program is to create, adapt and apply technology to the problem of anomaly characterization and detection in large data sets. In order to build algorithms to better detect anomalous be ... read more


CYBER WARS
Ethanol-loving bacteria accelerate cracking of pipeline steels

A new catalyst for ethanol made from biomass

Scientists find way to identify manmade biofuels in atmosphere

Growth slowing in EU biofuels market

CYBER WARS
Wearable device that vibrates fingertip could improve sense of touch

Bionic microrobot mimics the 'water strider' and walks on water

Taiwan's Foxconn to use one million robots by 2014

Robot seagull flies in Scotland

CYBER WARS
Scotland offshore wind farm ready to go

US fund Blackstone plans two big German wind farms

European wind power output tipped to treble by 2020: report

Estonian wind farm taps GE for turbines

CYBER WARS
University of Virginia researchers uncover new catalysis site

China auto sales up 2.2% in July

AviCoS replaces vehicle owner manuals

Honda to recall over 2m vehicles in US, China

CYBER WARS
Sudan grants China oil exploration licence

UN oil devastation report to be taken 'seriously': Shell

Fusion diagnostic developed at PPPL sheds light on plasma behavior at EAST

Vietnam slams China sea survey in disputed area

CYBER WARS
Pioneers get close-up view of miracle material graphene

Hydrogen may be key to growth of high-quality graphene

The wonders of graphene on display

City dwellers produce as much CO2 as countryside people do

CYBER WARS
Iraq power plans short-circuit

Boeing And Siemens Form Strategic Alliance for DOD Energy Modernization

Iraq PM moves to fire minister over power deals

Japan's power supply dilemma

CYBER WARS
Fungi helped destroy forests during mass extinction 250 million years ago

Genetic evidence clears Ben Franklin

Seeing the wood for the trees: New study shows sheep in tree-ring records

DR Congo entrusts forest management to Canada's ERA


Memory Foam Mattress Review
Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News
.

The content herein, unless otherwise known to be public domain, are Copyright 1995-2011 - Space Media Network. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement