• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

DEF CON Has Come a Long Way from Its Underground Roots

July 28, 2017 By The Editor

hackerDEF CON, the annual hacking conference in Las Vegas, is now in its 25th year and has come a long way from its humble beginnings as an all-night hacker party. The first conference held in June 1993 had only 100 attendees. Over 16,000 attendees are in Vegas for Black Hat now and the event is only expected to grow in years to come. If you need more proof that DEF CON is finally breaking out of the underground hacker subculture, look at a recent GQ article covering the history of the event. It’s not every day you see a magazine like that covering a bunch of computer geeks!

DEF CON has kept its unique culture over the years, with plenty of Mohawk hairdos, all-night hardware hacking events and disdain for authority. DEF CON founder Jeff Moss turned spotting federal agents into a conference game. “I openly invited Feds to attend the con knowing that they would be there undercover anyway,” recollects Moss. “At the end of the first DEF CON someone came up to me and showed me his US Secret Service Badge and said he had a blast. I turned that into a game of “I spotted the FED”, giving away shirts to those who legitimately spotted undercover Feds, as well as to those who were spotted. In the years to come, Feds were spotting other Feds to get shirts, and they were gaming the system as well as any hacker.”

This “spot the fed” game and the presence of law enforcement and other “outsiders” at DEF CON helped to break hacker stereotypes and get people to realize that hackers are not evil, they’re just people with a very specific set of skills. 

Another early event that made it into the archives of DEF CON history is when the organizers invited a prosecutor to give a presentation about what was legal and illegal online…and one of the people being prosecuted by this particular lawyer was attending DEF CON. Talk about awkward. 

This year, DEF CON will include a variety of activities focusing on the Internet of Things (IoT), hardware hacking and bio-hacking. There will also be a “Rootz Asylum” for kids to learn about how white-hat hacking.

Read the full article at GQ and more from WatchGuard on past DEF CON badge puzzles here.

Share This:

Related

Filed Under: Editorial Articles, Featured Tagged With: cyber security, DEF CON, Hacking, Phishing, ransomware

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • US National Cybersecurity Strategy
  • Here Come The Regulations
  • Cybersecurity’s Toll on Mental Health

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use