CCC Chaos Computer Club

Type: Organization
Name: CCC Chaos Computer Club
First reported Oct 20 2014 - Updated Oct 20 2014 - 1 reports

Hacker Myths Debunked

By: David BissonWe’ve been hearing a lot about hackers recently, mostly in connection to serious data breaches. We think of hackers compromising the nude photographs of popular female celebrities , including Jennifer Lawrence and Kate Upton. We think ... [Published Infosec Island - Oct 20 2014]
First reported Oct 10 2014 - Updated Oct 10 2014 - 1 reports

The Brain Dump

Of you Internet world people, many know our new bad troubles here in Ukraine. Beloved cool techno-culture center "Izolyatsia" is seized by ethnic rebels in city of Donetsk. Armed separatists get real drunk, bust up the art gallery, carry off all our ... [Published Motherboard Magazine - Oct 10 2014]
First reported Oct 06 2014 - Updated Oct 07 2014 - 1 reports

Bugzilla Zero-Day could trigger another Internet earthquake

A zero-day in Bugzilla bug-tracking tool allows anyone to view detailed reports about unfixed vulnerabilities in a wide range of vulnerability repositories. A new vulnerability in Bugzilla is scaring the security industry, it affects the Mozilla’s ... [Published Security Affairs - Oct 06 2014]
First reported Sep 30 2014 - Updated Sep 30 2014 - 1 reports

27c3 - Keynote: We come in Peace

27C3 KeynoteWe come in PeaceSpeaker: Rop GonggrijpEventID: 4302Event: 27th Chaos Communication Congress (27C3) by the Chaos Computer Club [CCC]Location: Berlin Congress Center [bcc]; Alexanderstr. 11; 10178 Berlin; GermanyLanguage: englishFor More Information ... [Published SecurityTube.Net - Sep 30 2014]
First reported Sep 29 2014 - Updated Sep 29 2014 - 1 reports

Jacob Appelbaum: Revolutionary times

Jacob Appelbaum: New Berliner, exiled hacktivist, passionate idealistA longtime collaborator of Julian Assange, a close friend of Edward Snowden confidants Laura Poitras and Glenn Greenwald and now himself a trusted ally of the NSA whistleblower, this ... [Published Ex-Berliner - Sep 29 2014]
First reported Sep 26 2014 - Updated Sep 26 2014 - 1 reports

27c3 - interactive light installation inspired by blinkenlights

AllColoursAreBeautifulinteractive light installation inspired by blinkenlightsStarting in the beginning of August 2010 and lasting until the mid of November, the project AllColoursAreBeautiful by the Munich chapter of the Chaos Computer Club was serving ... [Published SecurityTube.Net - Sep 26 2014]
First reported Sep 24 2014 - Updated Sep 25 2014 - 2 reports

Researcher Foils iPhone 6 Touch ID

Apple's Touch ID fingerprint scanner is a step up from passcodes for protecting iPhones, but it's far from totally secure, as a researcher showed on Monday. Lookout Mobile Security's Marc Rogers fooled Touch ID on Apple's new iPhone 6 by crafting a ... [Published TechNewsWorld - Sep 24 2014]
First reported Sep 10 2014 - Updated Sep 10 2014 - 2 reports

So you want to hack Apple Pay?

A decade ago, a group of Johns Hopkins University grad students tried to hack one of the first commercially popular Near Field Communication payment systems – the kind of technology at the heart of Apple’s new mobile payment system. It took a few thousand ... [Published Faster Forward - Sep 10 2014]
Entities: Apple Inc, Apple Pay, iPhone
First reported Jul 17 2014 - Updated Jul 17 2014 - 3 reports

Chaos Computer Club bolsters NSA spying complaint with Tor snooping evidence

The German Chaos Computer Club said Wednesday that it has added to its legal complaint about U.S. spying on German citizens evidence that the NSA allegedly snooped on at least one of its Tor servers. The CCC filed a complaint with Germany’s federal ... [Published PC World: Techlog - Jul 17 2014]
First reported Jul 03 2014 - Updated Jul 04 2014 - 3 reports

How NSA Tracks All German 'Tor' Users As 'Extremists' - XKeyscore Exposed

RT: The NSA has been revealed to mark and consider potential "extremists" all users of the internet anonymizer service Tor. Among those are hundreds of thousands of privacy concerned people like journalists, lawyers and rights activists. Searching ... [Published St George West - Jul 03 2014]
First reported Jul 02 2014 - Updated Jul 03 2014 - 5 reports

7 international ISPs sue UK’s surveillance agency

Above: GCHQ Image Credit: GCHQ British signals intelligence agency GCHQ has a new foe — a lawsuit from an international group of Internet Service Providers (ISPs). The lawsuit has been filed by UK-based Privacy International and ISPs from the ... [Published Venturebeat - Jul 02 2014]
First reported May 14 2014 - Updated May 15 2014 - 3 reports

German University Votes To Give Snowden a Degree

(BERLIN) — Academics at the University of Rostock in Germany have approved a proposal to give NSA leaker Edward Snowden an honorary doctorate. Members of the philosophy faculty voted 20 in favor, one against and one abstention to award the title in ... [Published TIME.com - May 14 2014]

Quotes

23. Porter, David (February 28, 2011). "Suspect in iPad Data Theft"

More Content

All (37) | News (11) | Reports (0) | Blogs (26) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Lücken in der technischen Selbstverteidigung [D... [Published VideoGold.de - Oct 25 2014]
Hacker Myths Debunked [Published Infosec Island - Oct 20 2014]
[tt] Wikipedia: weev [Published TranshumanTech - Oct 13 2014]
The Brain Dump [Published Motherboard Magazine - Oct 10 2014]
Bugzilla Zero-Day could trigger another Interne... [Published Security Affairs - Oct 06 2014]
27c3 - Keynote: We come in Peace [Published SecurityTube.Net - Sep 30 2014]
Jacob Appelbaum: Revolutionary times [Published Ex-Berliner - Sep 29 2014]
27c3 - interactive light installation inspired ... [Published SecurityTube.Net - Sep 26 2014]
Cyber-psychopathy: what goes on in a hacker's head [Published Engineering and Technology Magazine - Sep 25 2014]
Researcher Foils iPhone 6 Touch ID [Published TechNewsWorld - Sep 24 2014]
Apple should LOOK BELOW to beat TouchID fingerp... [Published The Register - Sep 24 2014]
The iPhone 6 Touch ID fingerprint reader is sti... [Published Security Affairs - Sep 24 2014]
So you want to hack Apple Pay? [Published Faster Forward - Sep 10 2014]
So you want to hack Apple Pay? [Published Post Tech - Sep 10 2014]
Berlin's digital rebellion [Published Ex-Berliner - Sep 10 2014]
Chaos Computer Club bolsters NSA spying complai... [Published PC World: Techlog - Jul 17 2014]
Chaos Computer Club bolsters NSA spying complai... [Published Computerworld - Security RSS feed - Jul 17 2014]
Chaos Computer Club bolsters NSA spying complai... [Published Techworld.com Security - Jul 17 2014]
infrastructure review [Easterhegg 2014] [Published VideoGold.de - Jul 16 2014]
How NSA Tracks All German 'Tor' Users As 'Extre... [Published St George West - Jul 03 2014]
NSA targeted Tor server administrator in German... [Published GigaOM - Jul 03 2014]
NSA targeted Tor server administrator in German... [Published GigaOM Network - Jul 03 2014]
7 international ISPs sue UK’s surveillance agency [Published Venturebeat - Jul 02 2014]
Privacy International, others file new lawsuit ... [Published Telecompaper - Jul 02 2014]
ISPs sue UK spooks over network spying [Published PC World: Techlog - Jul 02 2014]
Activist communications providers sue UK spies ... [Published GigaOM Network - Jul 02 2014]
Activist communications providers sue UK spies ... [Published GigaOM - Jul 02 2014]
CCC Camp 11 Legal, illegal, decentral: Post-hac... [Published SecurityTube.Net - Jul 02 2014]
German University Votes To Give Snowden a Degree [Published TIME.com - May 14 2014]
German University Votes To Give Snowden a Degree [Published The China Blog - May 14 2014]
1 2
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Lücken in der technischen Selbstverteidigung [D... [Published VideoGold.de - Oct 25 2014]
Lücken in der technischen SelbstverteidigungOpen the Blackbox, Close the BugdoorTraue keiner Hardware, die nicht nachvollziehbar verifizierbar ist. Ein Parcour durch Mittel und Methoden zur Verifkation von Hardware.Link list:https://en.wikipedia.org/ ...
[tt] Wikipedia: weev [Published TranshumanTech - Oct 13 2014]
weev - Wikipedia, the free encyclopedia http://en.wikipedia.org/w/index.php?title=Weev&printable=yes [Thanks to Sarah for this.]Andrew Alan Escher Auernheimer^[1] (/|O:r@nhaIm@r/AW-r@n-hy-m@r;^[2] born (1985-09-01)September 1, 1985), also knownby his ...
Bugzilla Zero-Day could trigger another Interne... [Published Security Affairs - Oct 06 2014]
A zero-day in Bugzilla bug-tracking tool allows anyone to view detailed reports about unfixed vulnerabilities in a wide range of vulnerability repositories. A new vulnerability in Bugzilla is scaring the security industry, it affects the Mozilla’s ...
27c3 - Keynote: We come in Peace [Published SecurityTube.Net - Sep 30 2014]
27C3 KeynoteWe come in PeaceSpeaker: Rop GonggrijpEventID: 4302Event: 27th Chaos Communication Congress (27C3) by the Chaos Computer Club [CCC]Location: Berlin Congress Center [bcc]; Alexanderstr. 11; 10178 Berlin; GermanyLanguage: englishFor More Information ...
27c3 - interactive light installation inspired ... [Published SecurityTube.Net - Sep 26 2014]
AllColoursAreBeautifulinteractive light installation inspired by blinkenlightsStarting in the beginning of August 2010 and lasting until the mid of November, the project AllColoursAreBeautiful by the Munich chapter of the Chaos Computer Club was serving ...
1 2 3 4 5 6
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.