What’s the difference between Def Con and Black Hat hacker conventions?

dvarian

Both hacker conventions are taking place at the same time in the same place, which seems a little odd to me. What’s the difference between the two?

Topic: Security
Answer this Question

Answers

2 total
landon
Vote Up (8)

I guess I would say that Black Hat is much more of a corporate, business oriented event. A lot of attendees are security professionals hawking their wares and glad-handing in the pursuit of more business. Def Con is closer to what most people would probably imagine a hacker event to be, more freewheeling and less corporate, with more emphasis on fun to boot.

Waldo
Vote Up (7)

Blackhat will cost you $2500 to attend in business casual attire.  Defcon will cost you $180 to attend in bluejeans and tshirts. You will enjoy yourself at Defcon much more than you will at Blackhat.

 

Ask a question

Join Now or Sign In to ask a question.
The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around US$111,000, for a method to identify users on the Tor network.
Public certificate authorities (CAs) are warning that as of Nov. 1 they will reject requests for internal SSL server certificates that don't conform to new internal domain naming and IP address conventions designed to safeguard networks.
European data protection authorities still have questions after meeting with Google, Microsoft and Yahoo about the implementation of a recent ruling that gave European citizens the right to be forgotten by search engines.
An iPhone user has filed a lawsuit for invasion of privacy against Apple, about a week after a Chinese state broadcaster raised security concerns about the device's location-tracking functions.
Handling a software flaw can be messy, both for a security researcher who found it and for the company it affects. But a new set of guidelines aims to make that interaction less mysterious and confrontational.
A hacker group calling itself "Anonymous Kenya" has poked holes at the government's cybersecurity preparedness by hacking two official Twitter accounts.
New guidance from Microsoft researchers suggests that users re-use simple passwords and avoid password management services.
Apple has "inadvertently admitted" to creating a "backdoor" in iOS, according to a post by a forensics scientist, iOS author and ex-hacker.
A critical vulnerability found recently in a popular newsletter plug-in for WordPress is actively being targeted by hackers and was used to compromise an estimated 50,000 sites so far.
Google, Microsoft and Yahoo are meeting with European data protection authorities Thursday to discuss how to implement a recent ruling that gives people the right to have personal information excluded from search results.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+