. GPS News .




.
CYBER WARS
Children learn hacker ways at DefCon
by Staff Writers
Las Vegas, Nevada (AFP) Aug 7, 2011

Nine-year-old Anna focused intently as she screwed a circuit board into place in a first-ever "DefCon Kids village" created to tutor children in the ways of hacking.

Her 10-year-old brother, Jake, was working on a similar task and beginning to suspect that the screws he was using were refusing to cooperate.

"I'm not really a hacker, but my brother is," Anna confided as her dad stood proudly nearby in a room set aside for child-oriented sessions at the world's largest hacker gathering. "I'd like to be a hacker."

Anna and her brother were building small robots that paint on spherical objects such as ping pong balls or Easter eggs.

Jake told of being no stranger to cracking computer software.

"The secret is you don't add code," he said. "You just move the code around."

Chris Hadnagy and other DefCon Kids tutors were adamant that in a world where children are surrounded by technology it is smart to provide guidance and a place where they can safely, and legally, test hacker skills.

Hadnagy, whose book Social Engineering: The Art of Human Hacking came out this year, tailored a "Capture the Flag" game for the event.

The game included deciphering clues, picking locks, coaxing information out of people, and reading subtle facial expressions.

About ten pairs of children competed, with the average age being 9.5 years old.

The teams, shadowed by supportive parents, darted about DefCon chasing clues and getting strangers in the notoriously edgy assembly to reveal secrets or do odd things.

Each of the teams finished the contest, with one almost conning its way to first place by talking people into revealing hints instead of decoding ciphers.

"For DefCon it was a very weird experience," Hadnagy said.

"Kids were hugging their moms and hanging out with them," he continued. "I am used to people walking around with Mohawk (haircuts) and boobs hanging out...I might have to go drink something."

Top prize in the "social engineering" contest was night-vision goggles and a remote control helicopter equipped with a surveillance camera.

"Some of these kids have skills," Hadnagy said. "They are amazing."

Lock-cracker Marc Weber Tobias enthralled children with Japanese puzzle boxes as he provided a glimpse into the mind of a lock-picker.

"They loved it," Tobias said. "Their parents were amazed that the kids hunkered down for hours trying to open puzzle boxes."

DefCon Kids sessions included hacking hardware, software and websites.

"They are really in their element here," Earl Malmrose said of his children, Jake and Anna. "They really jumped in."

Malmrose, a software engineer who has a computer company, smiled as he noted how badly his two children want lock picks. He was considering the buy.

"Our second oldest, now in college, was about 10 when we lost a key to our fireproof safe," Malmrose recalled.

"He looked up how to pick a lock on his own and he opened it for us with a paperclip," he continued. "That was useful."

The 10-year-old daughter of a pair of DefCon stalwarts unveiled a new way to hack games on smartphones or tablets running on Apple or Android mobile software.

The girl, who went by the hacker name CyFi, found the vulnerability after she got tired of waiting for virtual crops to grow in farming games. She figured out a way to tamper with in-game time.

Her discovery was deemed a new class of vulnerability and shared with makers of the software.

Since DefCon debuted in 1993, many once-nefarious attendees have become computer security good guys bent on defending companies and homes against cyberattacks.

DefCon founder Jeff Moss, whose hacker handle is Dark Tangent, is on a White House homeland defense council and heads security for the agency in charge of Internet addresses.

Some have also become parents keen on sharing the hacker world with their offspring.

Government agents once flushed out in a game called "Spot the Fed" are now welcomed on panels such as "Meet the Fed," a version of which was tailored for DefCon Kids at the notorious hacker gathering that ended Sunday in Las Vegas.

The US National Security Agency, which recruits talented hackers at the event, brought a cryptography exhibit to show the children.




Related Links
Cyberwar - Internet Security News - Systems and Policy Issues

.
Get Our Free Newsletters Via Email
...
Buy Advertising Editorial Enquiries




Smooth talk a slick hacker tool
Las Vegas, Nevada (AFP) Aug 7, 2011 - Hackers at DefCon have long understood that there is no patch for human stupidity.

Skills honed by software renegades at the renowned hacker gathering that ended Sunday included the art of talking workers into revealing information that can be used to crack into computer networks.

A "Schmooze Strikes Back" contest challenged hackers to test their "social engineering" skills on companies such as Apple, Oracle, Symantec, and Walmart. The contest debuted at the annual DefCon gathering in Las Vegas last year.

"The results are worse than they were last year," said Chris Hadnagy, a social engineering specialist running the contest.

"From what we found, we would own everyone on of these companies."

Hackers were able to talk workers at various companies into disclosing anything from the versions of software used in networks to who provided cafeteria food service.

Knowing specifics about software in company computers lets hackers figure out weaknesses to exploit, and sharing operational information could enable someone intent on corporate espionage to sneak into facilities.

The most effective ruses involved calling companies and posing as a potential customer out to be reassured about the safety of doing business together, according to Hadnagy.

Pretending to be calling from another department in a company, or a remote technical support team, proved to be another effective tactic for hackers.

Retail operations were consistently harder targets, possibly because they are more accustomed to interacting with customers, according to Hadnagy.

"Women seemed to be more security conscious," he said of the contest findings, which will be published in a report later this year.

"We call back and get a guy on the phone and we get everything we want," continued Hadnagy, who runs the social-engineer.org website.





. Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle



CYBER WARS
Raytheon Chosen by DARPA for Critical Cybersecurity Research Program on Insider Threats
Dulles, VA (SPX) Aug 08, 2011
Raytheon has been selected to support an insider threat research program led by the Defense Advanced Research Projects Agency (DARPA). The goal of the DARPA Anomaly Detection at Multiple Scales (ADAMS) program is to create, adapt and apply technology to the problem of anomaly characterization and detection in large data sets. In order to build algorithms to better detect anomalous be ... read more


CYBER WARS
Carbon hitches a ride from field to market

China awash with counterfeit vintage wine

Research helps breeders really know their onions to enhance global food security

Tokyo rice exchange starts amid radiation scare

CYBER WARS
Breakthrough in photonic chip research paves way for ultrafast information sharing

Engineers solve longstanding problem in photonic chip technology

Designing diamond circuits for extreme environments

'Bendable' computer developed in Canada

CYBER WARS
Cathay Pacific first-half net profit falls 59%

Model will help monitor airport security

Making airport runways safer

Boeing Delivers Milestone 737 with High-Altitude And High-Temperature Operation Features

CYBER WARS
University of Virginia researchers uncover new catalysis site

China auto sales up 2.2% in July

AviCoS replaces vehicle owner manuals

Honda to recall over 2m vehicles in US, China

CYBER WARS
China's surplus leaps as July exports hit new high

China vows to keep up support for Sudan

Russia to beat Canada in Arctic shipping: France

Hong Kong gears up for landmark labour case

CYBER WARS
Fungi helped destroy forests during mass extinction 250 million years ago

Genetic evidence clears Ben Franklin

Seeing the wood for the trees: New study shows sheep in tree-ring records

DR Congo entrusts forest management to Canada's ERA

CYBER WARS
NPP Satellite Completes Comprehensive Testing

Tohoku Tsunami Created Icebergs In Antarctica

Critical Milestone Reached for 2012 Landsat Mission

Software on the Fly

CYBER WARS
Pioneers get close-up view of miracle material graphene

Hydrogen may be key to growth of high-quality graphene

The wonders of graphene on display

City dwellers produce as much CO2 as countryside people do


Memory Foam Mattress Review
Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News
.

The content herein, unless otherwise known to be public domain, are Copyright 1995-2011 - Space Media Network. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement