🦄 Tech

Hacking Drones at DEFCON: “All Skyz Belong To Us”

Las Vegas, NV – This years DEFCON hacking conference featured a new village called “DroneWarz”, which focused on the research and development of offensive and defensive drone technologies. The Drone Hacking Village (DroneWarz) offered multiple hacking challenges, including more than twelve skill-based drone hacking challenges…

🦄 Tech

Cryptocurrency & Blockchain Gain Momentum at DEFCON

Las Vegas, NV – This year, for the first time, a space was dedicated to blockchain and cryptocurrency at DEFCON 26. The Blockchain & Cryptocurrency Open Security Village (BCOS Village) was created in an effort to grow the community and make “blockchain technology & cryptocurrencies…

🦄 LGBTQ+

Queercon Brings Together LGBTQ InfoSec Community at DEFCON

Las Vegas, NV – Over the past 15 years, Queercon has grown from a social group to a complete con-within-a-con at the yearly DEFCON hacking conference. Queercon has grown into the largest social network of LGBTQ hackers from around the world, and offers a space…

🦄 Tech

Winn Schwartau Discusses Cyber Security at DEFCON

Las Vegas, NV – Winn Schwartau, author and cyber security expert who has been working in information security since 1983, sat down Unicorn Riot at the 26th annual DEFCON hacking conference.
Since the early days of the conference Schwartau has been known for his appearances…

🦄 Labor

Sex Work After SESTA/FOSTA: A Discussion With Maggie Mayhem at DEFCON

Las Vegas, NV – According to sex workers’ rights activist Maggie Mayhem, the Stop Enabling Sex Traffickers Act (SESTA), and FOSTA, have created a more dangerous environment for sex workers in the United States, driving them back onto the street.

A November 2017 research paper found…

🦄 Social Control

Pwning Targets Through Social Engineering at DEFCON

Las Vegas, NV – Social engineering (SE) is defined as “any act that influences a person to take an action that may or may not be in their best interest”, according to the website social-engineer.org.

The art of social engineering can be used for a…