A speaker at the yearly conference of the Chaos Computer Club has shown how fingerprints can be faked using only a few photographs. To demonstrate, he copied the thumbprint of the German defense minister.
Jan Krissler, also know by his alias “Starbug,” told a conference of hackers he has copied the thumbprint of German Defense Minister Ursula von der Leyen. Speaking at the 31st annual conference of the Chaos Computer Club in Hamburg, Krissler highlighted the dangers in relying on security technology.
Krissler explained that he didn’t even need an object that von der Leyen had touched to create the copy. Using several close-range photos in order to capture every angle, Krissler used a commercially available software called VeriFinger to create an image of the minister’s fingerprint.
Along with fellow hacker Tobias Fiebig, Krissler has been working at the Technical University of Berlin on research into weaknesses of
Computerworld – Hacker group AntiSec has published what it claims is about 1 million unique device identifier numbers (UDIDs) for Apple devices that it said it accessed earlier this year from a computer belonging to an FBI agent.
The group, which is a splinter operation of the Anonymous hacking collective, claims that it has culled more than 12 million UDIDs and personal data linking the devices to users from the FBI computer. AntiSec said it chose to publish a portion of those records to prove it has them.
In an unusually lengthy note on Pastebin, a member of AntiSec said the group had culled some personal data such as full names and cell numbers from the published data. Instead, the group said it published enough information such as device type, device ID and Apple Push Notification Service tokens to let users determine whether their devices are on the list. Apple device owners who want to Read more…
The Anonymous hacking group may soon have the ability to launch an attack on global power networks, a US official has warned.
The claim was immediately rejected by the loosely-linked group of hackers, who accused the National Security Agency of “fear-mongering” after its director, General Keith Alexander, made the claims in the Wall Street Journal.
Hackers also launched a “comments flash mob” attack on the newspaper’s website, and warned “We do not forgive. We do not forget. Expect us!”
Gen Alexander is said to have warned that the hackers could develop the ability to bring about a limited power outage across the United States and beyond within a “year or two”.
In the report, Gen Alexander was said to have briefed the White House and other top officials about the growing threat from Anonymous.
He said that cyber-attackers could disable or damage computer networks linked to national grids across the globe.
The general has not spoken publicly about the supposed fears, but one unnamed industry executive told the Read more…
Image: wikipedia commons
Commander of the new U.S. Cyber Command General Keith Alexander said Tuesday that he’s most concerned about attacks targeting America’s electrical grid, and destroying large public machinery.
Gen. Alexander says cyber-attacks over the Internet are shifting from data theft to physical assaults.
To illustrate his point the General used two examples.
Think of it as carjacking for the Digital Age.
The increasingly sophisticated systems running a car may lead to new vulnerabilities, according to a study (PDF) released today from security software provider McAfee in partnership with mobile software provider Wind River and embedded security provider Escrypt. Those systems could allow hackers to take control of the car, track its location, and even access devices that are connected to it, including smartphones and tablets carrying valuable personal data.
The potential threat comes as hackers have increasingly shown a willingness to attack companies, government officials and agencies, and even Hollywood. Hacker groups such as Anonymous have caused headaches as they have stolen and released private information.
Those same threats could arrive in your Read more…
A programme broadcast on the military channel of China’s state TV raises new questions about Beijing’s support for cyber attacks.
Amid growing US concerns over ongoing Chinese cyber attacks, attribution remains the most complex issue. At the open source level at least, it has been hard to find a ‘smoking cursor.’ That is, until the broadcast of a recent cyber warfare programme on the military channel of China’s state TV network.
The programme appeared to show dated computer screenshots of a Chinese military institute conducting a rudimentary type of cyber attack against a US-based dissident entity. However modest, ambiguous—and, from China’s perspective, defensive—this is possibly the first direct piece of visual evidence from an official Chinese government source to undermine Beijing’s official claims that it never engages in overseas hacking of any kind for government purposes. Clearly, Washington and Beijing have Read more…