Do-it-yourself: How to build your own electric car, hacker style

By day, David Brown is a security consultant at Booz Allen Hamilton. But in his spare time, he’s one of a growing number of do-it-yourself electric vehicle creators. In the past couple of years, Brown retrofitted a 1974 Volkswagen Beetle into an electric car, and he talked about his “Voltswagon” project at the Defcon hacker conference on Saturday in Las Vegas.

Humble Introversion Bundle sales rising over 150,000 with 6 days left

The Humble Bundle releases have become quite an event in the world of indie gaming, and the recent Humble Introversion Bundle is certainly no exception. With six days until its completion, the Bundle has already sold over 150,000 copies, earning the developers and the supported charities over $630,000.

Photos show the cultural difference between Black Hat and Defcon hacker events

Thousands of security professionals, hackers, federal agents and media descended on Las Vegas this week to attend the Black Hat and Defcon conferences. The two conferences exhibit the extremes of hacker and security culture, with federal agents and major corporations descending on Black Hat in large numbers and mohawk-styled hackers and Electronic Frontier Foundation lawyers attending Defcon. It’s like the difference between law enforcement and pranksterism, where both have the object of protecting freedom.

Hacking water meters is easier than it should be

The smarter water meters become, the easier they’re getting to hack. Like many things in electronics, water meters become easier for hackers to break into and misuse when they are upgraded to include wireless and computer technology.

Author Steven Levy tells young hackers about their religion

Steven Levy wrote his first book, Hackers: Heroes of the Computer Revolution, in 1984. At the Defcon hacker conference in Las Vegas today, he talked about the word “hacker” and its origins amid a crowd of young practitioners of the craft, many of whom weren’t born when he published that book.

How one researcher helped Uncle Sam beat China’s censors

The U.S. government has used a special email program to “bust through internet censorship filters” in order to deliver news to people in countries such as China where censorship is in effect, according to Fox News. Fox News cites a report from the federal Broadcasting Board of Governors, which said it used the email program, known as Feed Over email, or FOE, to bypass the Chinese government’s censors.

A tale of two conferences: Black Hat and Defcon photo gallery

Black Hat and Defcon have become the must-attend conferences for both computer security professionals and fringe hackers alike. I’ve been attending for a number of years and have always been struck by the stark contrast between the people attending, ranging from federal computer security experts on the one hand and mohawk-adorned rebellious teens on the other. (Pictured is Black Hat/Defcon founder Jeff Moss, also known as Dark Tangent). For all of our stories on Black Hat and Defcon, click here.

How North Korea could build a cyber army to defeat the U.S.

It wouldn’t be that hard for North Korea to build a cyber army to take on the U.S. in a war fought only in cyberspace. North Korea has an estimated cyber war budget of $56 million, and the cheap way it could attack the U.S. is by herding a bunch of compromised computers to do its bidding.