Posts filtered by tags: Chaos Communication Congress[x]


 

A ton of Ruckus Wireless routers are vulnerable to hackers

A security researcher has found several vulnerabilities in a number of Ruckus Wireless routers, which the networking giant has since patched. Gal Zror told TechCrunch that the vulnerabilities he found lie inside in the web user interface software that runs on the company’s Unleashed line of routers. The flaws can be exploited without needing a router’s password, and can be used to take complete control of affected routers from over the internet. Routers act as a gateway between a home or office ...
Tags: Security, Hardware, Congress, Germany, Tech, Spokesperson, Vulnerability, Router, Computing, Cyberwarfare, Computer Security, Chaos Communication Congress, Internet Traffic, Gal Zror, Zror, Aharon Etengoff


Hackers Make a Fake Hand to Beat Vein Authentication

Devices and security systems are increasingly using biometric authentication to let users in and keep hackers out, be that fingerprint sensors or perhaps the iPhone's FaceID. Another method is so-called 'vein authentication,' which, as the name implies, involves a computer scanning the shape, size, and position of a users' veins under the skin of their hand. But hackers have found a workaround for that, too. From a report: On Thursday at the annual Chaos Communication Congress hacking conferenc...
Tags: Berlin, Tech, Motherboard, Albrecht, DPA, Leipzig Germany, Chaos Communication Congress, BND Germany, Jan Krissler, Julian Albrecht, Krissler


Major Hacker Conference Organizers Accused of Ignoring Harassment, Enabling Abusers

This week, at the prominent hacking conference Chaos Communication Congress, Iranian-Canadian internet researcher Mahsa Alimardani was scheduled to give a talk on censorship and surveillance in Iran. But during the presentation, Alimardani decided to go off-topic, taking a moment to highlight allegations of assault…Read more...
Tags: Science, Iran, Chaos Computer Club, Chaos Communication Congress, Hackerspace, C4c3, Ccc Conference, Infosec Community, Harassment And Assault, Mahsa Alimardani, Alimardani


European Commission to investigate airline reservation (in)security

Fifteen years after I published my first critique of the extreme insecurity of airline reservations stored by computerized reservations systems (CRSs) and made available without passwords or access logs on public Web sites, and four months after the continued existence 15 years later of those same vulnerabilities was publicly demonstrated by hackers inspired in part by reading an interview with me on a German IT news site, I've finally found the right unit of the European Commission to investiga...
Tags: Travel, Google, White House, Eu, European Union, Canada, Commission, European Commission, Brussels, EC, Edward, European Parliament, Sophie, U S Embassy, CRS, Chaos Communication Congress


Ultrasound Tracking Could Be Used To Deanonymize Tor Users

New submitter x_t0ken_407 quotes a report from BleepingComputer: Ultrasounds emitted by ads or JavaScript code hidden on a page accessed through the Tor Browser can deanonymize Tor users by making nearby phones or computers send identity beacons back to advertisers, data which contains sensitive information that state-sponsored actors can easily obtain via a subpoena. This attack model was brought to light towards the end of 2016 by a team of six researchers, who presented their findings at the ...
Tags: Tech, Chaos Communication Congress


Security Without Borders is here to help activists and NGOs with cybersecurity

Security Without Borders is a new organization launched by security researchers that will be providing free services to NGOs, activists, dissidents, and journalists that need help with securing their information. The post Security Without Borders is here to help activists and NGOs with cybersecurity appeared first on Digital Trends.
Tags: Trends, Web, Computing, Ngos, Chaos Communication Congress, Citizen Lab, Claudio Guarnieri


Report says hackers have easy access to flight bookings due to legacy systems

The Global Distribution Systems (GDS) used by airlines and travel agencies to manage your flight bookings are far too easy to access for hackers and other evildoers due to a lack of secure authentication. The post Report says hackers have easy access to flight bookings due to legacy systems appeared first on Digital Trends.
Tags: Trends, Computing, Amadeus, Sabre, Travelport, Chaos Communication Congress


North Korea's Android Tablet Takes a Screenshot Every Time You Open an App (slashdot)

An anonymous reader quotes a report from Motherboard: When you think of North Korea, the first thing that springs to mind is probably not a well-featured tablet PC. But that's just what researchers at the Chaos Communication Congress hacking festival revealed on Tuesday. Called Woolim, this tablet is designed to limit the distribution of contraband media, track its users, and generally act as a propaganda platform for the Democratic People's Republic of Korea (DPRK). Woolim is a small, white And...
Tags: News, North Korea, Republic of Korea, Chaos Communication Congress, BeauHD


North Korea's Android Tablet Takes a Screenshot Every Time You Open an App

An anonymous reader quotes a report from Motherboard: When you think of North Korea, the first thing that springs to mind is probably not a well-featured tablet PC. But that's just what researchers at the Chaos Communication Congress hacking festival revealed on Tuesday. Called Woolim, this tablet is designed to limit the distribution of contraband media, track its users, and generally act as a propaganda platform for the Democratic People's Republic of Korea (DPRK). Woolim is a small, white And...
Tags: North Korea, Tech, Republic of Korea, Chaos Communication Congress


Jacob Appelbaum Banned From Prominent Hacker Conference Following Sexual Assault Allegations

Jacob Appelbaum has been banned from Chaos Computer Club events following numerous allegations that he sexually assaulted women and acted inappropriately at hacker events. Appelbaum regularly spoke at CCC events like Chaos Communication Congress and Chaos Communication Camp.Read more...
Tags: Ccc, Jacob Appelbaum, Chaos Computer Club, Chaos Communication Congress, Appelbaum


I spoke with a hacker who could have taken down the internet in 30 minutes

"I'm informed that, you think that within 30 minutes the seven of you could make the internet unusable for the entire nation, is that correct?" That question came from Sen. Fred Thompson (R-Tenn.) on May 19, 1998, while speaking with members of a Cambridge, Massachusetts hacker group known as The L0pht. "That's correct. Actually one of us with just, a few packets," said Peiter Zatko, who is better known by his hacker pseudonym of Mudge. Sitting alongside Mudge were six other members of L0pht who...
Tags: London, Nsa, Senate, New York City, Trends, Karsten Nohl, Ashley Madison, Thomas, Calif, Cambridge Massachusetts, Chaos Communication Congress, Ted Lieu, Mudge, Peiter Zatko


Tor Project to Start Bug Bounty Program — Get Paid for HACKING!

The non-profit organization behind TOR – the largest online anonymity network that allows people to hide their real identity online – will soon be launching a "Bug Bounty Program" for researchers who find loopholes in Tor apps. The bounty program was announced during the recurring 'State of the Onion' talk by Tor Project at Chaos Communication Congress held in Hamburg, Germany. Bug [Author: [email protected] (Mohit Kumar)]
Tags: Tor, Hacking News, Tor anonymity network, Bug Bounty Program, Hamburg, Onion Router, Tor Privacy, Mohit Kumar, Start Bug Bounty Program, Chaos Communication Congress


North Korea's Operating System Analyzed (slashdot)

Bruce66423 points out an analysis at The Guardian of North Korea's Red Star Linux-based OS, based on a presentation Sunday to the Chaos Communication Congress in Berlin : The features of their Fedora based OS include a watermarking system to enable tracking of files — even if unopened. The operating system is not just the pale copy of western ones that many have assumed, said Florian Grunow and Niklaus Schiess of the German IT security company ERNW, who downloaded the software from a website out...
Tags: Apple, North Korea, Berlin, Kim Jong, Chaos Communication Congress, Florian Grunow, Niklaus Schiess, Red Star Linux, ERNW


North Korea's Operating System Analyzed

Bruce66423 points out an analysis at The Guardian of North Korea's Red Star Linux-based OS, based on a presentation Sunday to the Chaos Communication Congress in Berlin : The features of their Fedora based OS include a watermarking system to enable tracking of files — even if unopened. The operating system is not just the pale copy of western ones that many have assumed, said Florian Grunow and Niklaus Schiess of the German IT security company ERNW, who downloaded the software from a website out...
Tags: North Korea, Berlin, Kim Jong, Chaos Communication Congress, Florian Grunow, Niklaus Schiess, Red Star Linux, ERNW


Hacker fakes German minister's fingerprints using photos of her hands

Jan Krissler used high resolution photos, including one from a government press office, to successfully recreate the fingerprints of Germany’s defence ministerIt’s an old cliché of security researchers: fingerprints might appear more secure than passwords. But if your password gets stolen, you can change it to a new one; what happens when your fingerprint gets copied?That’s no longer an abstract fear: a speaker at the Chaos Communication Congress, an annual meeting of hackers in Germany, demonst...
Tags: Technology, Germany, Hacking, Computing, Data and computer security, Biometrics, Chaos Communication Congress, Ursula von der Leyen