Hackers Got “Wired In”

Competition in the CTF contests is intense, with teams of hackers “wired in” (as they might say in The Social Network) and crowded around tables filled with laptops, cabling, soda, booze and junk food. Age is no obstacle, either, with some of the most skilled and technical hackers unable to legally buy a beer. This is a shot of one fresh-faced team at the official CTF tournament.

Competition in the CTF contests is intense, with teams of hackers “wired in” (as they might say in The Social Network) and crowded around tables filled with laptops, cabling, soda, booze and junk food. Age is no obstacle, either, with some of the most skilled and technical hackers unable to legally buy a beer. This is a shot of one fresh-faced team at the official CTF tournament.

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.