Under construction

New design coming soon!

CIC News engine statistics

CIC News for 18-12-2013 contains 52 articles

CIC News update contains 52 articles for today, have fun reading.

Cyber security concerns will rise for all in 2014 (EN) | www.computing.co.uk
| 17-12-2013 | Government, businesses and consumers all need to think more carefully about cyber threats as 2014 will see the most advanced attempts at hacking and cyber crime yet.That's according to Malcolm Marshall, UK and global leader of the Information Protection and Business Resilience team at...
Read more

Database as a Service uncovered as new malware platform (EN) | www.itproportal.com
| 17-12-2013 | Database as a Service, otherwise known as DBaaS, has been discovered as a new malware platform for cyber-criminals.According toresearchby Imperva, the DBaaS model allows them to set up a shared platform to host command and control (C&C) servers. This model gives illegitimate users...
Read more

Industry Predictions for 2014; Part 2: Malware (EN) | www.infosecurity-magazine.com
| 17-12-2013 | In Part 2 of our series on the information security industry's predictions for 2014 we examine the future of malware and how malware-related attacks are likely to evolve. If there is one consistent theme, it is this: despite increased activity from law enforcement, things are not goin...
Read more

Banking Malware Infections Rise 253 Percent QoQ in India: Trend Micro (EN) | www.computerworld.in
| 17-12-2013 | The online banking malware volume surged this quarter, with India seeing a 253 percent increase in malware infections in Q3 2013 over Q2 2013, according to a report by security vendor Trend Micro."As with other app types, users may encounter Trojanized or fake apps disguised as legiti...
Read more

iOS 7 Jailbreak in Danger: iOS 7.1 Beta Patches Mobilebackup2 Exploit (EN) | www.ibtimes.co.uk
| 17-12-2013 | Stefan Esser (aka i0n1c) tweeted recently that someone close to the evad3rs Dream Team had stolen some jailbreak exploits and sold them to a private buyer. However, Pod2g (a key member of the evad3rs team) later rubbished i0n1c's claimsas "complete bullsh**", adding that "the jailbrea...
Read more

Lessons for CSOs in Snowden exploit of NSA networks (EN) | www.csoonline.com
| 16-12-2013 | â€" CSO â€" How Edward Snowden roamed the National Security Agency network, stealing documents that would later be released to select media, raises a number of red flags chief security officers should pay attention to, experts say.While working as an NSA contractor, Snowde...
Read more

GCHQ should have more oversight of Huawei (EN) | www.pcpro.co.uk
| 17-12-2013 | GCHQ staff and civil servants should be keeping a closer eye on Huawei's security operations in the UK, a government investigation has concluded.The UK's national security adviser, Kim Darroch, has proposed stricter governance over Huawei after MPs expressed concerns that a multi-bill...
Read more

Advanced Power Botnet: Firefox Users, Beware (EN) | www.informationweek.com
| 16-12-2013 | Malicious Firefox plugin scans websites for exploitable SQL injection vulnerabilities.Beware a malicious Firefox browser add-on that infects PCs and makes them scan websites for known exploitable vulnerabilities.The Firefox plugin, which has infected more than 12,500 systems to date, ...
Read more

Malware voor internetbankieren verstopt zich in geheugen (NL) | www.security.nl
| 17-12-2013 | Een Trojaans paard dat ontwikkeld is om geld van online bankrekeningen te stelen heeft een update gekregen waardoor het zich in het geheugen van de computer kan verstoppen, wat detectie door virusscanners lastiger moet maken. Daarvoor waarschuwt het Duitse anti-virusbedrijf G Data.De ...
Read more

Data Breach Affects 18,800 Colorado State Employees (EN) | www.esecurityplanet.com
| 17-12-2013 | According to idRADAR, the personal data of 18,800 current and former Colorado state employees may have been exposed when a state employee lost a USB drive (h/t Softpedia)."A state employee lost the drive while transporting it between work locations," the Governor's Office of Informati...
Read more

EMCVoice: Will The E.U.'s Data Breach Notification Policy Inspire U.S. Policy? (EN) | www.forbes.com
| 17-12-2013 | European Union rules implemented this summermay pave the way for stricter U.S. cybersecurity legislation. On Aug. 25, 2013, data breach notification regulations went into effect in the E.U. The regulations require telecom operators and ISPs to notify national authorities within 24 hou...
Read more

The Top 10 Most Common Identity Theft Myths (EN) | blog.identitytheftcouncil.org
| 16-12-2013 | Every year around this time we see the same experts dole out the same identity theft prevention tips. And yet, identity theft keeps getting worse. Maybe it’s because we have to take a step back, and start by exposing some of the myths that can lead to consumer apathy about identity ...
Read more

Spam text firm fined £175,000 by ICO for 'menacing' public (EN) | www.v3.co.uk
| 17-12-2013 | The Information Commissioner’s Office (ICO) has fined a spam text company a whopping £175,000, as the crackdown on nuisance marketing continues.The firm, First Financial, was found to have sent a total of 4,031 messages to mobile phone owners who had not consented to receive them d...
Read more

EFCC Partners Australia Police To Fight Cyber Crime (EN) | leadership.ng
| 17-12-2013 | The Economic and Financial Crimes Commission (EFCC) and the Western Australia Police are to work together to combat internet fraud and money laundering. This was contained in the Memorandum of Understanding. (MoU) that was signed by both parties under the sponsorship of the Comm...
Read more

Public sector cyber security suppliers will need badge of approval (EN) | www.supplymanagement.com
| 16-12-2013 | Companies that supply cyber security products and services to the government will need to demonstrate their credentials to potential export customers.The government’s plans to tackle cyber crime in the coming months include introducing a Cyber Supplier to HMG badge. It will allow bu...
Read more

VARs Talk Up Mobile Security As New Android Malware Surfaces (EN) | www.crn.com
| 17-12-2013 | New Android malware that is tied to more than 60 mobile botnet campaigns has been stealthily emailing personal SMS messages to a remote server, according to FireEye security researchers.The mobile spyware, called MisoSMS, has infected hundreds of users and is tied to command-and-contr...
Read more

Advanced persistent threats now hitting mobile devices | news.idg.no
| 17-12-2013 | Smartphones, tablets and other mobile devices have become the target of malware and are even getting hit by highly targeted attacks known as "advanced persistent threats" that intended to steal sensitive data, according to a survey of 676 IT and security professionals.Smar...
Read more

Cybercrims will use ransomware to target businesses: McAfee (EN) | www.arnnet.com.au
| 18-12-2013 | Cybercriminals will increasingly use ransomware, malware and hacktivism over the next year to move further into the lucrative business market.McAfee has released it 2014 A/NZ threat predictions which highlights the treand towards ransomware and targeted attacks over the next 12 months...
Read more

BlackHole arrest sending cyber-crims back to exploit drawing board: Websense (EN) | www.cso.com.au
| 18-12-2013 | The recent arrest of alleged BlackHole exploit kit creator 'Paunch' has driven criminal groups to reconsider new approaches to generating malware and will see many reverting to “less sophisticated” delivery methods in 2014, security firm Websense has advised.Noting that at least o...
Read more

€1.69B for security research on cybercrime, natural disasters and better border security (EN) | bulletin.sciencebusiness.net
| 18-12-2013 | ‘Secure societies - protecting the freedom and security of Europe and its citizens’, may seem an unlikely theme for scientific research. Science|Business looks at what is involved in the first calls of this Horizon 2020 programmeWith the first calls for Horizon 2020, t...
Read more

How Microsoft’s Cybercrime Center put together its first case (EN) | blogs.seattletimes.com
| 18-12-2013 | When Microsoft opened its sleek new Cybercrime Center last month, the company said the center was designed to showcase some of its latest technologies and to bring together different units that work on fighting everything from malware to intellectual-property theft.Now, Microsoft is f...
Read more

'ChewBacca' Malware Taps Tor Network (EN) | www.informationweek.com
| 18-12-2013 | Malicious Trojan sporting a Star Wars theme uses Tor anonymizing network to disguise its command-and-control communications. The next Star Wars film may not be scheduled to arrive until the summer of 2015, but the marketing tie-ins have already begun -- at least when it co...
Read more

Smartphones Lack Security as Mobile Shopping Grows: Tripwire (EN) | www.eweek.com
| 18-12-2013 | A surprising number of consumers are associating insecure mobile devices with their financial info, which can make them easier targets for cybercrime. Nearly two-thirds of U.S. consumers (59 percent) and U.K. consumers (65 percent) have no security software on their mobile devices, ac...
Read more

2,464 cases of cyber crimes in 2012: Milind Deora (EN) | www.dnaindia.com
| 18-12-2013 | Crime data or information maintained by National Crime Record Bureau (CRB) revealed that 2,464 cases of crime such as hacking and others were registered in 2012. Crime data or information maintained by National Crime Record Bureau (CRB) revealed that 2,464 cases of crime s...
Read more

Nieuw ChewBacca-botnet verstopt zich via Tor-netwerk (NL) | www.security.nl
| 18-12-2013 | Een nieuw botnet genaamd ChewBacca gebruikt het Tor-netwerk om zich te verstoppen. Tor is een anonimiseringsnetwerk dat onder andere het IP-adres van gebruikers verbergt. Dit biedt verschillende voordelen voor malware en de laatste tijd zijn er meer botnets ontdekt die Tor gebruiken.H...
Read more

Nieuw factsheet Certificaten met 1024-bit RSA worden uitgefaseerd gepubliceerd (NL) | www.ncsc.nl
| 18-12-2013 | Gebruikt uw organisatie nog certificaten met een RSA-sleutellengte van hoogstens 1024 bits? Het NCSC adviseert om deze te vervangen.Beveiligingscertificaten moeten sleutels gebruiken van voldoende lengte. Voor een certificaat op basis van het RSA-algoritme is een sleutel van 1024 bits...
Read more

DDoS-malware infecteert Linux- en Windowscomputers (NL) | www.security.nl
| 18-12-2013 | Sinds begin december is er een nieuw botnet actief dat zowel Linux- als Windowscomputers infecteert en gebruikt voor het uitvoeren van gedistribueerde Denial of Service (DDoS)-aanvallen. Het botnet en de bijbehorende malware werden door het Poolse Computer Emergency Response Team (CER...
Read more

Gamers gewild doelwit hackers (NL) | www.telegraaf.nl
| 18-12-2013 | Gamers hebben in 2013 in totaal 11,7 miljoen aanvallen met virussen en andere malware voor de kiezen gekregen. Dat meldt anti-virusbedrijf Kaspersky op basis van onderzoek. De hackers lokken gamers met beloftes over zogenaamde uitgelekte games of methodes om spellen aan te passen. Zo ...
Read more

Microsoft security unit files first theft case (EN) | seattletimes.com
| 17-12-2013 | Microsoft is filing its first case emerging from the work of the Cybercrime Center team. Microsoft filed a civil lawsuit in the U. S. District Court of Western Washington against Sichuan Changhong Electric Co., a Sichuan, China-based manufacturer of household appliances. W...
Read more

Mitigating Cyber Security Threats (EN) | www.lightreading.in
| 18-12-2013 | Global cyber security threats continue to evolve with greater volume and sophistication than ever before. Even so, it is possible to confidently protect your business from the impact of current and future cyber-attacks if you are proactive and give security the prominence it demands w...
Read more

2014 is the tipping point year of mobile malware: RSA chief Art Coviello (EN) | www.cio.co.nz
| 18-12-2013 | RSA executive chairman Art Coviello sees 2014 as the tipping point year of mobile malware, as businesses continue to provide greater mobile access to critical business applications and sensitive data, and consumers increasingly adopt mobile banking.Amidst this backdrop, “it is easy ...
Read more

‘Indian gamers 4th most vulnerable to cyberattacks’ (EN) | articles.timesofindia.indiatimes.com
| 17-12-2013 | NEW DELHI: India is among the four countries that faced the highest number of cyberattacks on gamers in 2013, security solutions provider Kaspersky Lab said. India, which faced 2.07 lakh attempts, followed Russia, Vietnam and China in that order. The number of such attacks could go up...
Read more

Criminal gangs offer large scale Malware-as-a-Service: Websense (EN) | www.arnnet.com.au
| 18-12-2013 | The arrest of masterhacker ‘Paunch’ has led to cybercriminals to revert to less sophisticated methods of Malware delivery, including exploit kits offering large scale Malware-as-a-Service.Websense security research director, Alexander Watson, said the aftermath of ‘Paunch’s’...
Read more

Beware, nasty 'Confessions' can fetch you trouble (EN) | timesofindia.indiatimes.com
| 18-12-2013 | PUNE: Within months of its launch, the 'Confessions' platform of a popular social networking site is being plagued by offensive messages . In fact, the city police's cybercrime cell has already registered four cases for offensive and abusive remarks appearing on the platform. Started ...
Read more

Texans warned of data breach (EN) | www.mysanantonio.com
| 17-12-2013 | Texas unemployment insurance recipients were among the prepaid debit card users who may have had their personal information hacked in a breach of the JPMorgan Chase server, the Texas Workforce Commission said late Tuesday.Chase will be informing the approximately 20,000 claimants regi...
Read more

Madigan charges three in debit card identity theft ring (EN) | www.buglenewspapers.com
| 17-12-2013 | Attorney General Lisa Madigan today announced charges against a trio of identity thieves for obtaining and using fraudulent debit cards to access thousands of dollars in cash.Defendants Nikolay Bozov, Yuliyan Kehayov and Dan Stoica were charged in Cook County Criminal Court with conti...
Read more

NSA: Foreign nation built self-destructing BIOS malware (EN) | www.fiercecio.com
| 17-12-2013 | A foreign nation tried to infect computers with a BIOS-level malware that would have resulted in them being bricked remotely, alleged senior officials from the National Security Agency. This allegation was made in the program "60 Minutes" by NSA Director General Keith Alexander and In...
Read more

Romanian National Gets 18-Months in Jail for ATM Skimming Scheme (EN) | greenwich.patch.com
| 17-12-2013 | A Romanian national has been sentenced 18 months in jail for his role in an ATM machine skimming scheme.U.S. AttorneyDeirdre M. Daly announced Tuesday that Ionut-Iulian Vlad,29, a citizen of Romania, was sentenced today by U.S. District Judge Janet Bond Arterton in New Hav...
Read more

Man charged with Sydney card skimming (EN) | www.heraldsun.com.au
| 18-12-2013 | A MAN has been charged with credit card skimming after police spotted two cards and PIN numbers discarded on the ground outside a Sydney shopping centre. The officers allegedly spotted the cards outside a Campsie shopping centre on Monday night and stopped two men who were nearby. The...
Read more

Companies warned on dangers of Android...and iPhone too (EN) | www.scmagazineuk.com
| 17-12-2013 | Massive Android botnet discovered, as APWG chairman warns on dangers of jailbroken iPhones. The largest ever mobile botnet on the Android platform has been spotted by FireEye and is said to be integral to more than 60 spyware campaigns.At the same time, a US re...
Read more

Big Botnet, Posing as Firefox Add-on, Scans Web for SQL Vulnerabilities (EN) | www.infosecurity-magazine.com
| 17-12-2013 | A slaving operation masquerading as a legitimate add-on for the Mozilla Firefox browser has created a 12,500-PC strong botnet army whose purpose is to find exploitable websites. According to security researcher Brian Krebs, the botnet, which calls itself Advanced Power, conducts SQL i...
Read more

Information Sharing on Our Cyber Attacks Today and Last Week (EN) | www.lawfareblog.com
| 17-12-2013 | They say that the lack of information sharing is one of the major exacerbating factors behind cyber-insecurity. So I’ve decided thatLawfare is going to be entirely transparent about the attacks against our system last week and today.Last Wednesday,Lawfareexperienced a brief outage, ...
Read more

The Year DDoS Got Real for Credit Unions (EN) | www.cutimes.com
| 18-12-2013 | Before 2013, Distributed Denial of Service attacks seemed to many credit union executives as something the other guys worried about. The prevailing attitude was: We’re not on anyone’s radar. We aren’t on anyone’s enemies list. Why worry?Then came January 2013 when the $1.6 bil...
Read more

UNC Data Breach Leaks Personal Info Of 6,000 (EN) | chapelboro.com
| 17-12-2013 | CHAPEL HILL â€" For almost four months, the personal information housed by UNC of more than 6,500 individuals was publically accessible because of an accidental breach of data.“Primarily the vast majority of people who were impacted were existing staff or former staff at the Univers...
Read more

Driver steals card of German national, does Rs3L shopping (EN) | www.dnaindia.com
| 18-12-2013 | Arrested culprit visited mall, jewellery shops but no one checked the credit card The Cyber Crime Cell (CCC) of Pune police have arrested a person who was working as the car driver for a private firm for allegedly stealing a credit card of a German national and doing a shopping of Rs3...
Read more

Advanced persistent threats now hitting mobile devices | news.idg.no | news.idg.no
| 17-12-2013 | Smartphones, tablets and other mobile devices have become the target of malware and are even getting hit by highly targeted attacks known as "advanced persistent threats" that intended to steal sensitive data, according to a survey of 676 IT and security professionals.Smar...
Read more

Advanced persistent threats now hitting mobile devices | news.idg.no | news.idg.no | news.idg.no
| 17-12-2013 | Smartphones, tablets and other mobile devices have become the target of malware and are even getting hit by highly targeted attacks known as "advanced persistent threats" that intended to steal sensitive data, according to a survey of 676 IT and security professionals.Smar...
Read more

DGA Changer Malware Able to Modify Domain-Generation Seed on the Fly (EN) | threatpost.com
| 18-12-2013 | Malware authors have been using domain-generation algorithms for a few years now, often in botnet-related malware that needs to stay one step ahead of takedown attempts and law enforcement agencies. Now, researchers have discovered that a strain of malware that may have been part of t...
Read more

Hackers who breached php.net exposed visitors to highly unusual malware (EN) | arstechnica.com
| 18-12-2013 | Eight weeks after hackers compromised the official PHP website and laced it with attack code, outside security researchers have uncovered evidence that some visitors were exposed to malware that's highly unusual, if not unique.Israel-based Seculert said about 6,500 computers are infec...
Read more

Crime and punishment in the cyber world (EN) | www.dhakatribune.com
| 19-12-2013 | Electronic crime is at present a very live issue in Bangladesh. Every day the number of internet users is increasing and with the advent of smartphone devices, information is literally in your palm now. However, the open nature of the cyber world allows people to interact with a level...
Read more

DDoS botnet spreading on Linux and Windows machines (EN) | www.net-security.org
| 18-12-2013 | A blended DDoS botnet consisting of both Windows and Linux machines has been detected by researchers working with the Polish CERT. The botnet is exclusively dedicated to mounting DDoS attacks, mainly DNS amplification attacks. "This means that the attackers were interested only in inf...
Read more

Advanced persistent threats now hitting mobile devices | news.idg.no | news.idg.no | news.idg.no (EN) | news.idg.no
| 17-12-2013 | Smartphones, tablets and other mobile devices have become the target of malware and are even getting hit by highly targeted attacks known as "advanced persistent threats" that intended to steal sensitive data, according to a survey of 676 IT and security professionals.Smar...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish