Archive for the ‘hacking conference’ Category

DARPA Challenges Hackers to Create Automated Hacking System — WIN $2 Million

July 14th, 2016

Why we can’t detect all security loopholes and patch them before hackers exploit them?

Because… we know that humans are too slow at finding and fixing security bugs, which is why vulnerabilities like Heartbleed, POODLE and GHOST remained undetected for decades and rendered almost half of the Internet vulnerable to theft by the time patches were rolled out.

Now to solve this hurdle, DARPA

Posted in automated penetration testing, capture the flag, DARPA, def con hacking conference, hacking competition, hacking conference, Penetration testing tools, vulnerability assessment, vulnerability assessment tools | Comments (0)

Hack the Pentagon — US Government Challenges Hackers to Break its Security

March 3rd, 2016

The United States Department of Defense (DoD) has the plan to boost their internal and network security by announcing what it calls “the first cyber Bug Bounty Program in the history of the federal government,” officially inviting hackers to take up the challenge.

Dubbed “Hack the Pentagon,” the bug bounty program invites the hackers and security researchers only from the United States to

Posted in Bug Bounty Program, capture the flag, ethical hacking training, Hack the Pentagon, hacking competition, hacking conference, hacking news, The Pentagon, United States, US Military | Comments (0)

Next Hacker to Organize Biggest Java Programming Competition In Germany

January 16th, 2016

Great news for Hackers and Bug-hunters who enjoy Programming and playing around with Software.

A worldwide group of like-minded computer programmers is hosting The Next Hacker IPPC event on the 26th and 27th of February in Berlin, Germany, where participants can meet hackers and programmers from around the world while getting an opportunity to participate in one of the major

Posted in bug hunting, hackathon, hacker next conference, hacking competition, hacking conference, Java, Java Programming, Programming, Programming competition | Comments (0)

Researchers to Share Details of Cyber-Terrorists Targeting Indian Government Officials

August 8th, 2015

The Potential threat, range from very narrow to very broad, posed by Cyber-Terrorism has provoked considerable alarm.

Terrorists involved in Cyber Espionage and Operations aim at gaining access to Nation’s critical infrastructure involving both Government as well as Private sectors.

The Frequency and Intensity of such Cyber-attacks are increasing rapidly and extending into absolute

Posted in Cyber Attack, cyber espionage, Cyber Terrorism, cyber war, hacking conference, hacking news, Indian Hackers, Pakistan, terrorist groups, Zero-Day Vulnerability | Comments (0)