Gambling + Pwn, seems fun, #GeekPwn in Macao.

tombkeeper's tweet image. Gambling + Pwn, seems fun, #GeekPwn in Macao.

Had a great time with DARWINATOR from Drones Autonomous Systems Lab, University of Nevada. The Humanoid robot and Hexapod robot surprised us by getting out of a parcel, placing a covert listening device & pressing password of a safe in order to open it. #GeekPwn #defcon #maker

GeekPwn's tweet image. Had a great time with DARWINATOR from Drones Autonomous Systems Lab, University of Nevada. The Humanoid robot and Hexapod robot surprised us by getting out of a parcel, placing a covert listening device & pressing password of  a safe in order to open it. #GeekPwn #defcon #maker
GeekPwn's tweet image. Had a great time with DARWINATOR from Drones Autonomous Systems Lab, University of Nevada. The Humanoid robot and Hexapod robot surprised us by getting out of a parcel, placing a covert listening device & pressing password of  a safe in order to open it. #GeekPwn #defcon #maker
GeekPwn's tweet image. Had a great time with DARWINATOR from Drones Autonomous Systems Lab, University of Nevada. The Humanoid robot and Hexapod robot surprised us by getting out of a parcel, placing a covert listening device & pressing password of  a safe in order to open it. #GeekPwn #defcon #maker
GeekPwn's tweet image. Had a great time with DARWINATOR from Drones Autonomous Systems Lab, University of Nevada. The Humanoid robot and Hexapod robot surprised us by getting out of a parcel, placing a covert listening device & pressing password of  a safe in order to open it. #GeekPwn #defcon #maker

#PS4 4.01 Jailbreak showcased by Chinese hackers at Geekpwn convention wololo.net/2016/10/24/ps4… #GeekPwn #PS4Jailbreak

frwololo's tweet image. #PS4 4.01 Jailbreak showcased by Chinese hackers at Geekpwn convention wololo.net/2016/10/24/ps4… #GeekPwn #PS4Jailbreak

#geekpwn shanghai hijacking wheelchair?

klotxl404's tweet image. #geekpwn shanghai hijacking wheelchair?

NOTE: The rules set no limitation on the PWN target at #GeekPwn, geeks can choose their targets freely (from smart devices to AI services).

GeekPwn's tweet image. NOTE: The rules set no limitation on the PWN target at #GeekPwn, geeks can choose their targets freely (from smart devices to AI services).
GeekPwn's tweet image. NOTE: The rules set no limitation on the PWN target at #GeekPwn, geeks can choose their targets freely (from smart devices to AI services).

GeekPwn。前年在北京围观,去年在上海围观,今年在Palo Alto围观。。感觉这里好小众🐱(例行喵 #GeekPwn

HaskRay's tweet image. GeekPwn。前年在北京围观,去年在上海围观,今年在Palo Alto围观。。感觉这里好小众🐱(例行喵 #GeekPwn
HaskRay's tweet image. GeekPwn。前年在北京围观,去年在上海围观,今年在Palo Alto围观。。感觉这里好小众🐱(例行喵 #GeekPwn

Happen to be around the bay area on Nov 13 (Mon)? Hang out at #GeekPwn ! Free for all.

pkqzy888's tweet image. Happen to be around the bay area on Nov 13 (Mon)? Hang out at #GeekPwn ! Free for all.

We are so excited to announce that #GeekPwn will be @DEFCON 26 this August! Come on by and check us out at geekpwn.org. #robot #CAAD #whitehats


The unique moment: empty hall an hour before Chinese cybersecurity conference #GeekPwn. Empty hall. Chinese conference.

makrushind's tweet image. The unique moment: empty hall an hour before Chinese cybersecurity conference #GeekPwn. Empty hall. Chinese conference.

Yeah, man, we did it! We got main achievements on the level: new point of presence on the map, new friends and tons of ideas. #GeekPwn

makrushind's tweet image. Yeah, man, we did it! We got main achievements on the level: new point of presence on the map, new friends and tons of ideas. #GeekPwn

Ever wondered what a Chinese hacker looks like? Here's one at #geekpwn contest in Macau explaining smartphone hack


Biometric authentication technologies are used for the machine identification of individuals. Haibing Wang, director of GeekPwn Lab, will demonstrate some hack examples shown in previous #GeekPwn events. (pics of GeekPwn2017 SH)

GeekPwn's tweet image. Biometric authentication technologies are used for the machine identification of individuals. Haibing Wang, director of GeekPwn Lab, will demonstrate some hack examples shown in previous #GeekPwn events. (pics of GeekPwn2017 SH)
GeekPwn's tweet image. Biometric authentication technologies are used for the machine identification of individuals. Haibing Wang, director of GeekPwn Lab, will demonstrate some hack examples shown in previous #GeekPwn events. (pics of GeekPwn2017 SH)
GeekPwn's tweet image. Biometric authentication technologies are used for the machine identification of individuals. Haibing Wang, director of GeekPwn Lab, will demonstrate some hack examples shown in previous #GeekPwn events. (pics of GeekPwn2017 SH)

#GeekPwn held a big worldwide security geek contest yesterday in Shanghai. #TopXGun is one of their tech partners.

TopXGunSupport's tweet image. #GeekPwn held a big worldwide security geek contest yesterday in Shanghai. #TopXGun is one of their tech partners.
TopXGunSupport's tweet image. #GeekPwn held a big worldwide security geek contest yesterday in Shanghai. #TopXGun is one of their tech partners.
TopXGunSupport's tweet image. #GeekPwn held a big worldwide security geek contest yesterday in Shanghai. #TopXGun is one of their tech partners.

You can find us @defcon Caesar s’ this morning, from 1000 to 1300, Main Stage of Contest Area.#GeekPwn #Defcon #CAAD

GeekPwn's tweet image. You can find us @defcon Caesar s’ this morning, from 1000 to 1300, Main Stage of Contest Area.#GeekPwn #Defcon #CAAD
GeekPwn's tweet image. You can find us @defcon Caesar s’ this morning, from 1000 to 1300, Main Stage of Contest Area.#GeekPwn #Defcon #CAAD
GeekPwn's tweet image. You can find us @defcon Caesar s’ this morning, from 1000 to 1300, Main Stage of Contest Area.#GeekPwn #Defcon #CAAD
GeekPwn's tweet image. You can find us @defcon Caesar s’ this morning, from 1000 to 1300, Main Stage of Contest Area.#GeekPwn #Defcon #CAAD

Deep Learning is improving security capabilities, on the other side, AI is in the presence of attackers. (Prof. Dawn Song, UC Bekeley) #AI #machinelearning #GeekPwn #security #cybersecurity

GeekPwn's tweet image. Deep Learning is improving security capabilities, on the other side, AI is in the presence of attackers. (Prof. Dawn Song, UC Bekeley) #AI #machinelearning #GeekPwn #security #cybersecurity

Blocco impronte digitali ? Rotto in 20 minuti Durante la conferenza #GeekPwn 2019 a #Shanghai ricercatori di #CyberSecurity hanno chiesto ad alcuni tra il pubblico di toccare un vetro. Le impronte digitali lasciate nel vetro sono state poi fotografate…lnkd.in/g2xp_nN


Did you miss the #GeekPwn at @defcon26? A friendly reminder - a couple of important deadlines are approaching! Check out for more: 2018.geekpwn.org/en/index.html #hacker #bugbounty #inforsec

Congrats to #Intel’s Wei Li and Xiaojin Jiao in placing 2nd in @GeekPwn’s first global #AI Competition of Adversarial Attacks and Defense, Capture the Flag event at #defcon. on.mktw.net/2MUzVTC #IamIntel

JimCGordon's tweet image. Congrats to #Intel’s Wei Li and Xiaojin Jiao in placing 2nd in @GeekPwn’s first global #AI Competition of Adversarial Attacks and Defense, Capture the Flag event at #defcon. on.mktw.net/2MUzVTC #IamIntel


.@PRNewswire All the latest details from #GeekPWN 2018 courtesy of PR Newswire! Have you been out to Las Vegas for @GeekPwn? prnewswire.com/news-releases/…


Had a great time with DARWINATOR from Drones Autonomous Systems Lab, University of Nevada. The Humanoid robot and Hexapod robot surprised us by getting out of a parcel, placing a covert listening device & pressing password of a safe in order to open it. #GeekPwn #defcon #maker

GeekPwn's tweet image. Had a great time with DARWINATOR from Drones Autonomous Systems Lab, University of Nevada. The Humanoid robot and Hexapod robot surprised us by getting out of a parcel, placing a covert listening device & pressing password of  a safe in order to open it. #GeekPwn #defcon #maker
GeekPwn's tweet image. Had a great time with DARWINATOR from Drones Autonomous Systems Lab, University of Nevada. The Humanoid robot and Hexapod robot surprised us by getting out of a parcel, placing a covert listening device & pressing password of  a safe in order to open it. #GeekPwn #defcon #maker
GeekPwn's tweet image. Had a great time with DARWINATOR from Drones Autonomous Systems Lab, University of Nevada. The Humanoid robot and Hexapod robot surprised us by getting out of a parcel, placing a covert listening device & pressing password of  a safe in order to open it. #GeekPwn #defcon #maker
GeekPwn's tweet image. Had a great time with DARWINATOR from Drones Autonomous Systems Lab, University of Nevada. The Humanoid robot and Hexapod robot surprised us by getting out of a parcel, placing a covert listening device & pressing password of  a safe in order to open it. #GeekPwn #defcon #maker

You can find us @defcon Caesar s’ this morning, from 1000 to 1300, Main Stage of Contest Area.#GeekPwn #Defcon #CAAD

GeekPwn's tweet image. You can find us @defcon Caesar s’ this morning, from 1000 to 1300, Main Stage of Contest Area.#GeekPwn #Defcon #CAAD
GeekPwn's tweet image. You can find us @defcon Caesar s’ this morning, from 1000 to 1300, Main Stage of Contest Area.#GeekPwn #Defcon #CAAD
GeekPwn's tweet image. You can find us @defcon Caesar s’ this morning, from 1000 to 1300, Main Stage of Contest Area.#GeekPwn #Defcon #CAAD
GeekPwn's tweet image. You can find us @defcon Caesar s’ this morning, from 1000 to 1300, Main Stage of Contest Area.#GeekPwn #Defcon #CAAD

WOW! It's on #GeekPwn Contest, Friday 10:00-13:00, Contest Main Stage at Caesars #defcon #CAADCTF

I'll be giving a talk on how to break face detectors with Adversarial Attacks at @GeekPwn at #Defcon tomorrow. Here's a sneak preview of a perturbation that I used to attack my face! Consider coming to the talk for more cool perturbations.

bose_joey's tweet image. I'll be giving a talk on how to break face detectors with Adversarial Attacks at @GeekPwn at #Defcon tomorrow. Here's a sneak preview of a perturbation that I used to attack my face! Consider coming to the talk for more cool perturbations.
bose_joey's tweet image. I'll be giving a talk on how to break face detectors with Adversarial Attacks at @GeekPwn at #Defcon tomorrow. Here's a sneak preview of a perturbation that I used to attack my face! Consider coming to the talk for more cool perturbations.


"GP" stands for #GeekPwn. #GeekPwn badges are delivered @defcon , grab one before they are gone!

ทวีตนี้ไม่สามารถใช้งานได้อีกต่อไป

“Weapons for Dog Fight: Adapting Malware to Anti-Detection based on GAN ” with speakers Zhuang Zhang, Bo Shi and Hangfeng Dong from Tencent Yunding Laboratory@YDLab9 on Friday, August 10. #defcon26 #CAADVillage #GeekPwn bit.ly/2LtE5Sn


Really excited to be part of #GEEKPWN Party on Friday at 20:30, located in Scenic at Flamingo It’s going to be pretty exciting, entertaining & educational!!! Hope to hug you there!!! 🤗😊🤗


Reminder: #GeekPwn Contest will be held on Aug 10 (Friday) from 10:00 - 13:00 in the Contest Area at Caesar's Palace. Hope to see you there.

Now that you’ve had some time to absorb the epic Village list, we’ve got some more goodies for you. The #defcon26 Contests and Events page is now LIVE! Commence pre-con recon. defcon.org/html/defcon-26…

defcon's tweet image. Now that you’ve had some time to absorb the epic Village list, we’ve got some more goodies for you. The #defcon26 Contests and Events page is now LIVE! Commence pre-con recon.

defcon.org/html/defcon-26…


@ChaitinTech Lab is one of top hacker teams in the world, which is also a frequent contestant at #GeekPwn. From main stream brands of routers to PS4, they did an excellent job of finding bugs. Looking forward to seeing more talents at geekpwn.org


Gambling + Pwn, seems fun, #GeekPwn in Macao.

tombkeeper's tweet image. Gambling + Pwn, seems fun, #GeekPwn in Macao.

#PS4 4.01 Jailbreak showcased by Chinese hackers at Geekpwn convention wololo.net/2016/10/24/ps4… #GeekPwn #PS4Jailbreak

frwololo's tweet image. #PS4 4.01 Jailbreak showcased by Chinese hackers at Geekpwn convention wololo.net/2016/10/24/ps4… #GeekPwn #PS4Jailbreak

Had a great time with DARWINATOR from Drones Autonomous Systems Lab, University of Nevada. The Humanoid robot and Hexapod robot surprised us by getting out of a parcel, placing a covert listening device & pressing password of a safe in order to open it. #GeekPwn #defcon #maker

GeekPwn's tweet image. Had a great time with DARWINATOR from Drones Autonomous Systems Lab, University of Nevada. The Humanoid robot and Hexapod robot surprised us by getting out of a parcel, placing a covert listening device & pressing password of  a safe in order to open it. #GeekPwn #defcon #maker
GeekPwn's tweet image. Had a great time with DARWINATOR from Drones Autonomous Systems Lab, University of Nevada. The Humanoid robot and Hexapod robot surprised us by getting out of a parcel, placing a covert listening device & pressing password of  a safe in order to open it. #GeekPwn #defcon #maker
GeekPwn's tweet image. Had a great time with DARWINATOR from Drones Autonomous Systems Lab, University of Nevada. The Humanoid robot and Hexapod robot surprised us by getting out of a parcel, placing a covert listening device & pressing password of  a safe in order to open it. #GeekPwn #defcon #maker
GeekPwn's tweet image. Had a great time with DARWINATOR from Drones Autonomous Systems Lab, University of Nevada. The Humanoid robot and Hexapod robot surprised us by getting out of a parcel, placing a covert listening device & pressing password of  a safe in order to open it. #GeekPwn #defcon #maker

#geekpwn shanghai hijacking wheelchair?

klotxl404's tweet image. #geekpwn shanghai hijacking wheelchair?

NOTE: The rules set no limitation on the PWN target at #GeekPwn, geeks can choose their targets freely (from smart devices to AI services).

GeekPwn's tweet image. NOTE: The rules set no limitation on the PWN target at #GeekPwn, geeks can choose their targets freely (from smart devices to AI services).
GeekPwn's tweet image. NOTE: The rules set no limitation on the PWN target at #GeekPwn, geeks can choose their targets freely (from smart devices to AI services).

We are so excited to announce that #GeekPwn will be @DEFCON 26 this August! Come on by and check us out at geekpwn.org. #robot #CAAD #whitehats


The unique moment: empty hall an hour before Chinese cybersecurity conference #GeekPwn. Empty hall. Chinese conference.

makrushind's tweet image. The unique moment: empty hall an hour before Chinese cybersecurity conference #GeekPwn. Empty hall. Chinese conference.

Happen to be around the bay area on Nov 13 (Mon)? Hang out at #GeekPwn ! Free for all.

pkqzy888's tweet image. Happen to be around the bay area on Nov 13 (Mon)? Hang out at #GeekPwn ! Free for all.

GeekPwn。前年在北京围观,去年在上海围观,今年在Palo Alto围观。。感觉这里好小众🐱(例行喵 #GeekPwn

HaskRay's tweet image. GeekPwn。前年在北京围观,去年在上海围观,今年在Palo Alto围观。。感觉这里好小众🐱(例行喵 #GeekPwn
HaskRay's tweet image. GeekPwn。前年在北京围观,去年在上海围观,今年在Palo Alto围观。。感觉这里好小众🐱(例行喵 #GeekPwn

Biometric authentication technologies are used for the machine identification of individuals. Haibing Wang, director of GeekPwn Lab, will demonstrate some hack examples shown in previous #GeekPwn events. (pics of GeekPwn2017 SH)

GeekPwn's tweet image. Biometric authentication technologies are used for the machine identification of individuals. Haibing Wang, director of GeekPwn Lab, will demonstrate some hack examples shown in previous #GeekPwn events. (pics of GeekPwn2017 SH)
GeekPwn's tweet image. Biometric authentication technologies are used for the machine identification of individuals. Haibing Wang, director of GeekPwn Lab, will demonstrate some hack examples shown in previous #GeekPwn events. (pics of GeekPwn2017 SH)
GeekPwn's tweet image. Biometric authentication technologies are used for the machine identification of individuals. Haibing Wang, director of GeekPwn Lab, will demonstrate some hack examples shown in previous #GeekPwn events. (pics of GeekPwn2017 SH)

You can find us @defcon Caesar s’ this morning, from 1000 to 1300, Main Stage of Contest Area.#GeekPwn #Defcon #CAAD

GeekPwn's tweet image. You can find us @defcon Caesar s’ this morning, from 1000 to 1300, Main Stage of Contest Area.#GeekPwn #Defcon #CAAD
GeekPwn's tweet image. You can find us @defcon Caesar s’ this morning, from 1000 to 1300, Main Stage of Contest Area.#GeekPwn #Defcon #CAAD
GeekPwn's tweet image. You can find us @defcon Caesar s’ this morning, from 1000 to 1300, Main Stage of Contest Area.#GeekPwn #Defcon #CAAD
GeekPwn's tweet image. You can find us @defcon Caesar s’ this morning, from 1000 to 1300, Main Stage of Contest Area.#GeekPwn #Defcon #CAAD

Yeah, man, we did it! We got main achievements on the level: new point of presence on the map, new friends and tons of ideas. #GeekPwn

makrushind's tweet image. Yeah, man, we did it! We got main achievements on the level: new point of presence on the map, new friends and tons of ideas. #GeekPwn

Deep Learning is improving security capabilities, on the other side, AI is in the presence of attackers. (Prof. Dawn Song, UC Bekeley) #AI #machinelearning #GeekPwn #security #cybersecurity

GeekPwn's tweet image. Deep Learning is improving security capabilities, on the other side, AI is in the presence of attackers. (Prof. Dawn Song, UC Bekeley) #AI #machinelearning #GeekPwn #security #cybersecurity

#GeekPwn held a big worldwide security geek contest yesterday in Shanghai. #TopXGun is one of their tech partners.

TopXGunSupport's tweet image. #GeekPwn held a big worldwide security geek contest yesterday in Shanghai. #TopXGun is one of their tech partners.
TopXGunSupport's tweet image. #GeekPwn held a big worldwide security geek contest yesterday in Shanghai. #TopXGun is one of their tech partners.
TopXGunSupport's tweet image. #GeekPwn held a big worldwide security geek contest yesterday in Shanghai. #TopXGun is one of their tech partners.

Coming up on @AJEnglish China's best smart device hackers are competing for top honours in #macau #geekpwn

sarahclarkeaus's tweet image. Coming up on @AJEnglish China's best smart device hackers are competing for top honours in #macau #geekpwn

“Robust Physical-World Attacks on Machine Learning Models” by Bo Li from UC Berkeley, at #GeekPwn #GANs, Nov. 13th goo.gl/xjTDPt

GeekPwn's tweet image. “Robust Physical-World Attacks on Machine Learning Models” by Bo Li from UC Berkeley, at #GeekPwn #GANs, Nov. 13th goo.gl/xjTDPt

“How dose this girl unlock the phone with nose?“ Nich Stephen from UC Santa Barbara will disclose more details in ”Behind the PWN of the TrustZone” at #GeekPwn. #whitehat #security #trustzone goo.gl/Hj57rd


Loading...

Something went wrong.


Something went wrong.


United States Trends