A presentation at the Chaos Communication Congress (a large hacker convention in Hamburg, Germany that attracted about 10,000 visitors this year – sort of, kind of, like Defcon here) demonstrated the ability to reproduce fingerprints of a target subject from just photographs. Reports in PC Magazine say that the researcher, Jan Krissler, took photographs of Ursula von […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Der Spiegel wrote an article on efforts by the NSA and GCHQ (their British equivalent) to crack encryption of various sorts. Take the article at what it is worth; it is based on documents that Snowden released, so it is a little bit old. I apologize that this post is pretty long, but there is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
BBC and others are reporting that a German steel mill was hacked. The report came not from the news media or the mill, but rather the German Federal Office for Information Security (BSI). As a result, not a lot of details are known, but the posting are new, so perhaps more information will come out […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This is the time of year that people make lists, so I will also. These are not in any particular order, but the total is pretty amazing. I had already forgotten some of these — Michaels and its subsidiary Aaron Bros Art Framing (January) – 3.4 million records, credit and debit cards information from their […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Seems far fetched, but it is not. Of course, it is expensive. It took Stephen Hilt almost two weeks and $400. Of course that is the “quantity one” price. With a little work and volume, the price would go down. Dark Reading is reporting that Stephen, who works for the industrial control security firm Digital […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
SC Magazine is reporting that a flaw signaling System 7, the telephone industry standard for setting up, managing and tearing down phone calls allows anyone to listen in on cell phone calls, read texts and locate a user. Two separate researchers have identified the flaw and are going to demonstrate it at a hackers conference […]
Continue reading →
[DISPLAY_ACURAX_ICONS]