DefConSecurityPatch Your OnStar iOS App to Avoid Getting Your Car HackedBy Andy GreenbergSecurityHackers Remotely Kill a Jeep on the Highway—With Me in ItBy Andy GreenbergSecurityOnline Anonymity Project ProxyHam Mysteriously VanishesBy Andy GreenbergSecurityBrainflayer: A Password Cracker That Steals Bitcoins From Your BrainBy Andy GreenbergSecurityResearchers Develop DIY System to Detect Malware on Mobile PhonesBy Kim ZetterSecurityMillions of Kwikset Smartkey Locks Vulnerable to Hacking, Say ResearchersBy Kim ZetterSecurityHidden Circuits and Handmade Clockwork: The Striking Intricacies of Def Con BadgesBy Kim ZetterSecurityNSA Chief Tells Hackers His Agency Doesn't Create Dossiers on All AmericansBy Kim ZetterSecurityKids Can Open Gun Safes With Straws and Paper Clips, Researchers SayBy Kim ZetterSecurityDefCon 20 Badges, the Big Reveal: A Secret Society, Crypto Challenges and Easter EggsBy Kim ZetterSecurityDefCon: 20 Years of Hackers, Hijinks and Snooping FedsBy Kim ZetterBusinessOracle Hit With ‘Friendly’ Hacks at Defcon ContestBy Caleb GarlingSecurityResearchers: Anonymous and LulzSec Need to Focus their ChaosBy Kim ZetterSecurityHacking Home Automation Systems Through Your Power LinesBy Kim ZetterSecurityResearchers Say Vulnerabilities Could Let Hackers Spring Prisoners From CellsBy Kim ZetterSecuritySecret-Spilling Sources at Risk Following Cryptome BreachBy Kim ZetterSecurityHacker Wonderland: DefCon 18 in PhotosBy Dave BullockSecurityUpdate: Ex-Hacker Denies Alleged WikiLeaker Gave Him Classified DocumentsBy Kim Zetter and Kevin PoulsenSecurityHacker Spoofs Cell Phone Tower to Intercept CallsBy Kim ZetterSecurityBiometric and Other Locks Fail to Foil Hackers at DefConBy Kim ZetterSecurityExclusive Sneak Peek: DefCon Ninja Party BadgeBy Dave BullockSecurityHacking, Lock-Picking, Booze and Bacon: DefCon 17 In ReviewBy Dave BullockSecurityInside the World's Most Hostile NetworkBy Dave BullockSecurityHacking the DefCon 17 BadgesBy Dave BullockMore Stories