Donald Sears

Def Con 18 In Images

Roughly 10,000 computer hacking enthusiasts, poseurs, geeks, nerds and government agents gathered for DefCon this weekend. In its 18th year, the world’s largest hacker convention draws people from all walks of life to learn about the latest hacking techniques. Read the full article. [Wired]

MIT Students Reported to Aid Wikileaks

Two students from the Massachusetts Institute of Technology (MIT) may have helped WikiLeaks suspect Bradley Manning spirit classified information out of military databases, according to a CNN report. Read the full article. [Computerworld]


According to a newly published report, upon obtaining access to a mini ZeuS botnet dubbed Mumba, researchers at AVG found 60GB of stolen data such as, accounting details for social networking sites, banking accounts, credit card numbers and intercepted emails. Read the full article. [ZDNet]

A hardware hacking expert here at Defcon18
successfully faked several attendees’ cell phones into connecting to his
phony GSM base station during a live demonstration that had initially
raised concerns at the Federal Communications Commission (FCC). Read the full article. [Dark Reading]

IT security researchers Nicholas Percoco and Christian Papathanasiou demonstrated what they claim is the first rootkit for Android. Their aim was to show how slight the obstacles to the development of a such a rootkit are and how powerful the result can be. Read the full article. [The H Security]

Most respondents in a recently released RSA study (93.2%) answered “Yes” when asked if allowing
employees to connect their personal mobile devices to the corporate
network poses a security threat to their organization, but only 1.8%
reported a “serious incident” as a result of an employee’s mobile device
use. Read the full article. [Help Net Security]

A research group led by computer scientists at the UCLA Henry Samueli
School of Engineering and Applied Science has proved that cryptography
— the practice and study of hiding information — that is based solely
on physical location is possible by using quantum mechanics. Such a method, the researchers say, allows one to encrypt and decrypt
data at a secure location without pre-sharing any cryptographic keys
that can be used to lock or unlock sensitive information. Read the full article. [Science Daily]