ICT Security-Sécurité PC et Internet
87.1K views | +0 today
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

31C3: CCC-Tüftler hackt Merkels Iris und von der Leyens Fingerabdruck

31C3: CCC-Tüftler hackt Merkels Iris und von der Leyens Fingerabdruck | ICT Security-Sécurité PC et Internet | Scoop.it
Der Hacker Starbug zeigte auf dem Hackerkongress, wie man mit einer normalen Digitalkamera bei öffentlichen Veranstaltungen an Fingerabdrücke Dritter gelangen kann, um biometrische Authentifizierungssysteme zu überwinden.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics


Gust MEES's insight:
Der Hacker Starbug zeigte auf dem Hackerkongress, wie man mit einer normalen Digitalkamera bei öffentlichen Veranstaltungen an Fingerabdrücke Dritter gelangen kann, um biometrische Authentifizierungssysteme zu überwinden.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Nobody Is Perfect: Chaos Computer Club breaks Apple TouchID

Nobody Is Perfect: Chaos Computer Club breaks Apple TouchID | ICT Security-Sécurité PC et Internet | Scoop.it

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security




Via Gust MEES
Gust MEES's insight:

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 22, 2013 4:47 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, September 22, 2013 4:49 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Scooped by Gust MEES
Scoop.it!

Possible Governmental Backdoor found ("case R2D2") - F-Secure Weblog : News from the Lab

Possible Governmental Backdoor found ("case R2D2") - F-Secure Weblog : News from the Lab | ICT Security-Sécurité PC et Internet | Scoop.it
F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.

 

Chaos Computer Club from Germany has tonight announced that they have located a backdoor trojan used by the German Goverment.

No comment yet.
Scooped by Gust MEES
Scoop.it!

German Defense Minister von der Leyen's fingerprint copied by Chaos Computer Club | CyberSecurity | Biometrics

German Defense Minister von der Leyen's fingerprint copied by Chaos Computer Club | CyberSecurity | Biometrics | ICT Security-Sécurité PC et Internet | Scoop.it
A speaker at the yearly conference of the Chaos Computer Club has shown how you can fake fingerprints using only a few photographs. Jan Krissler has warned the world about relying on certain security technologies.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics


Gust MEES's insight:
A speaker at the yearly conference of the Chaos Computer Club has shown how you can fake fingerprints using only a few photographs. Jan Krissler has warned the world about relying on certain security technologies.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics


No comment yet.
Scooped by Gust MEES
Scoop.it!

Chaos Computer Club - Bundestrojaner sendet Daten in die USA - Politik - Berliner Morgenpost - Berlin

Chaos Computer Club - Bundestrojaner sendet Daten in die USA - Politik - Berliner Morgenpost - Berlin | ICT Security-Sécurité PC et Internet | Scoop.it
Der Bundestrojaner existiert - er ist verfassungswidrig und schlecht programmiert, so der Chaos Computer Club, der Festplatten mit der Späh-Software anonym zugeschickt bekam. Daten sendet das Spionage-Programm in die USA.
No comment yet.
Scooped by Gust MEES
Scoop.it!

CCC | Chaos Computer Club analysiert Staatstrojaner

CCC | Chaos Computer Club analysiert Staatstrojaner | ICT Security-Sécurité PC et Internet | Scoop.it

Der Chaos Computer Club (CCC) hat eine eingehende Analyse staatlicher Spionagesoftware vorgenommen. Die untersuchten Trojaner können nicht nur höchst intime Daten ausleiten, sondern bieten auch eine Fernsteuerungsfunktion zum Nachladen und Ausführen beliebiger weiterer Schadsoftware. Aufgrund von groben Design- und Implementierungsfehlern entstehen außerdem eklatante Sicherheitslücken in den infiltrierten Rechnern, die auch Dritte ausnutzen können.

No comment yet.