Under construction

New design coming soon!

CIC News engine statistics

CIC News for 29-12-2013 contains 22 articles

CIC News update contains 22 articles for today, have fun reading.

Lessons From Five Advanced Attacks Of 2013 (EN) | www.darkreading.com
| 26-12-2013 | Distributed denial-of-service attacks targeted application and business-logic weaknesses to take down systems; fraudsters used encryption to scramble victims' data until they paid a ransom; and, attackers increasingly targeted providers as a weak link in the chain of the digital secur...
Read more

Banks react decisively to Target data breach (EN) | www.norwalkreflector.com
| 28-12-2013 | Several financial institutions serving central Ohio are contacting their debit- and credit-card customers who have been affected by the major information breach that recently struck Target.Most of the banks are monitoring customer accounts for fraudulent activity and telling customers...
Read more

OpenSSL bug, DDoS bust, Snapchat SNAFU and a free Threatsaurus - 60 Sec Security (EN) | nakedsecurity.sophos.com
| 28-12-2013 | Can a bug ever be good?• What's the prison sentence for DDoS criminality?• How well does Snapchat protect your data?• What's a Threatsaurus, and why do you want one?Watch 60 Second Security for 28 December 2013, and find out!...
Read more

NatWest Bank Targeted in Cyber-Attack (EN) | www.ibtimes.co.uk
| 28-12-2013 | A cyber-attack on NatWest in the UKleft customers unable to access their online bank accounts on Friday.The Distributed Denial of Service attack (DDoS), in which a system is overwhelmed by simultaneous online requests, froze the bank's website, leaving customers unable to pay bills or...
Read more

Data Breaches, Privacy and Cyber-Insurance - "What You Need To Know To Protect Your Business" (EN) | www.itbusinessnet.com
| 28-12-2013 | In light of the recent front page issues involving data breaches and data leakage Edward Snowden, the NSA and the PRISM Program from the governmental side and Facebook's year-long data breach which exposed the information of over 6 million users on the private side it seems like an ap...
Read more

Customers take precautions after Boston restaurant data breach (EN) | www.necn.com
| 28-12-2013 | (NECN: Katelyn Tivnan) - Phil Oullette stopped by The Harp in Boston before the Celtics game Saturday.While he didn't know who was going to win, he did know how he was going to pay."We paid cash today to be safe," said Oullette.Ouellette says he pla...
Read more

Another SC Data Breach (EN) | www.fitsnews.com
| 28-12-2013 | It’s happened again …A year after the massive #SCHacked scandal â€" in which S.C. Gov. Nikki Haley’s Revenue Department coughed up 3.8 million Social Security numbers, 3.3 million bank account numbers, tax info for more than 650,000 businesses and nearly 400,000 credit and debit...
Read more

HONOLULU: Target data breach affects up to 121K in Hawaii (EN) | www.modbee.com
| 27-12-2013 | HONOLULU â€" The state Office of Consumer Protection says as many as 121,000 Hawaii shoppers appear to have been affected by the credit and debit card security breach at the retailer Target.Executive Director Bruce Kim said in a statement Friday the office is working with Target to en...
Read more

Android trojan steals banking data, targets Korean users (EN) | www.gmanetwork.com
| 29-12-2013 | A new Android Trojan that steals banking data is making the rounds online and is presently targeting Korean users, a security vendor reported this week. MalwareBytes said the Trojan disguises itself as the Google Play Store app, then replace legitimate banking apps and capture user d...
Read more

Analyzing Stealth Malware (EN) | resources.infosecinstitute.com
| 16-12-2013 | Advanced malware employs many hiding techniques in order to evade anti-virus measures and to deceive the victim. Trojans come in the form of bound executables in a legitimate application in which the malware in decompressed/decrypted and executed. In this article, we are going to disc...
Read more

Trend Micro Incorporated : Australia : Bitcoin-mining Malware is rising in APAC region (EN) | www.4-traders.com
| 27-12-2013 | Bitcoin has become a well discussed topic during the past few weeks, especially this virtual currency is as valuable as the real currencies, and it is tradable. The Bitcoin has gained much attention and interest of the hackers and cybercriminals. Trend Micro Corp., the global leading ...
Read more

Banken beveiligen geldautomaat tegen besmette USB-sticks (NL) | www.security.nl
| 28-12-2013 | Om te voorkomen dat criminelen geldautomaten leegtrekken via USB-sticks met malware, hebben verschillende banken het opstarten vanaf de USB-poort uitgeschakeld. Toch is nog steeds een groot aantal machines wereldwijd kwetsbaar.Dat lieten twee Duitse beveiligingsonderzoekers gisteren t...
Read more

Target: Deceive first, answer questions later (EN) | www.computerworld.com.au
| 28-12-2013 | For Target to get beyond its data breach disaster, it needs to regain the trust of its shoppers. Mystifyingly, it has opted to issue statements that are, at best, misleading. Some tiptoe beyond misleading, since the chain had to know they were untrue when it issued them.The latest exa...
Read more

2013: Criminal cases dip in Hyderabad, cyber crimes shoot up (EN) | www.deccanchronicle.com
| 28-12-2013 | Hyderabad: There has been a dip in number of criminal cases registered under IPC and SLL (Special and Local Laws) during 2013 in Hyderabad City, which saw 18,013 cases as compared to 18,744 cases during 2012, city Police Commissioner said on Monday.However, crimes against women and cy...
Read more

Israel Sends Virus-Laced Letter to Iranian Mission in New York (EN) | english.farsnews.com
| 28-12-2013 | TEHRAN (FNA)- The Iranian embassy in New York received a virus-infected letter from Israel which threatened to make more biological attacks in the future. The Iranian mission at the UN headquarters in New York received a suspicious letter sealed with an Israeli stamp which contained a...
Read more

NSA has a 50-page catalog of exploits for software, hardware, and firmware (EN) | boingboing.net
| 29-12-2013 | A Snowden leak accompanying today's story on the NSA's Tailored Access Operations group (TAO) details the NSA's toolbox of exploits, developed by an NSA group called ANT (Advanced or Access Network Technology). ANT's catalog runs to 50 pages, and lists electronic break-in tools, wiret...
Read more

NSA reportedly intercepts shipments of electronics equipment to plant spyware (EN) | news.cnet.com
| 29-12-2013 | Based on internal NSA documents, Der Spiegel revealed that the spy agency planted backdoors to access computers, hard drives, routers and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor and Samsung. A new report from Der Spiegel, based on...
Read more

Cybercrooks turn to other exploits after Blackhole bust (EN) | www.pcworld.com
| 29-12-2013 | The Blackhole Exploit kit was good, so good in fact that criminals are having trouble finding anything with the capabilities to take its place, security firm Websense has noticed.According to the firm’s monitoring, phishing campaigns sent via the important Cutwail bot that once made...
Read more

Hacker took over BBC server, tried to 'sell' access (EN) | www.worldbulletin.net
| 29-12-2013 | The attack was first identified by Hold Security LLC, a cybersecurity firm in Milwaukee that monitors underground cyber-crime forums in search of stolen information. A hacker secretly took over a computer server at the BBC, Britain's public broadcaster, and then launched a...
Read more

The NSA Intercepts Laptops Purchased Online to Install Malware (EN) | news.yahoo.com
| 29-12-2013 | According to a new report from Der Spiegel on the National Security Agency's top team of hackers, the agency intercept electronics purchased online before delivery to install malware and other spying tools.  The NSA's Tailored Access Operations (TAO) division is responsible for the b...
Read more

OTHER OPINION: CYBER-CRIME Credit card use safer in Europe (EN) | psdispatch.com
| 29-12-2013 | News that cyber-criminals have put accounts of 40 million customers of retail giant Target at risk is a sober reminder that as much as you might think your credit and debit card transactions are safe from theft, they’re not. Target isn’t the first, or the largest. Nor will it be t...
Read more

Firms unite to fight cyber crime (EN) | www.bbc.co.uk
| 29-12-2013 | Several IT firms in the West Midlands are leading the fight against hackers with the help of a computer game. Serious Games in Coventry have teamed up with a cyber security specialist and a team of organisational psychologists from Aston University in Birmingham, to create software th...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish