Under construction

New design coming soon!

CIC News engine statistics

CIC News for 31-12-2013 contains 25 articles

CIC News update contains 25 articles for today, have fun reading.

Spyware op harde schijven, routers en nieuwe pc's (BE) | www.zdnet.be
| 30-12-2013 | In een nieuw artikel onthult het Duitse magazine Der Spiegel meer details over hoe de NSA achterdeurtjesen andere spyware installeerde op pc’s en elektronische apparaten.Het blad baseert zich op interne NSA-documenten die door Edward Snowden (foto) werden gelekt. Het nie...
Read more

Mannix Marketing Acknowledges Data Breach (EN) | www.esecurityplanet.com
| 30-12-2013 | Mannix Marketing recently notified the New Hampshire Attorney General's Office that customer data for four of its clients (Saratoga Sweets, Barkeater Chocolates, Olde Bryan Inn and Coffee Planet) may have been exposed when its servers were hacked (h/t DataBreaches.net)."Mannix has rem...
Read more

UK FIRMS JOIN FORCES TO TACKLE CYBER CRIME (EN) | www.acumin.co.uk
| 30-12-2013 | A group of IT companies in the West Midlands have joined forces to stop hackers in the fight against cyber crime.The BBC reports that Serious Games in Coventry, a team of organisational psychologists from Aston University in Birmingham, and a cyber security specialist, are...
Read more

De grootste IT-bedreigingen van 2013 (NL) | www.zdnet.nl
| 30-12-2013 | Samenvatting:Ransomware, aanvallen op mobiele toestellen en malware voor Macs. Dat waren enkele van de grootste bedreigingen voor onze onlineveiligheid dit jaar, volgens het Threat Report van Malwarebytes.De tijd dat we bestookt werden met zwendel-sms’jes of knullige phi...
Read more

Mobile malware set to spread in 2014: Security pro (EN) | www.cnbc.com
| 30-12-2013 | Malware will go more mobile next year as digital currencies fuel malicious ransomware attacks worldwide, according to computer security firm McAfee Labs. After the data breach at Target this month exposed a growing threat from hackers, companies and individuals alike should be careful...
Read more

Bitcoin: Survey says 12,000 computers infected worldwide (EN) | profit.ndtv.com
| 30-12-2013 | New Delhi: The craze for bitcoins is turning into a fertile ground for cyber fraudsters as thousands of computers, including in India, are being infected with malware related to the virtual currency. The findings of a survey, which has pegged the count of computers infected with bitc...
Read more

NSA Catalog Lists Vulnerabilities to Exploit Networking Gear: Report (EN) | www.eweek.com
| 30-12-2013 | The National Security Agency has a "mail-order" catalog of security vulnerabilities it uses to exploit networking equipment, according to a new published report. The U.S. National Security Agency (NSA) has its own catalog of vulnerabilities that it uses to exploit commercial networkin...
Read more

Cash machines raided with USB sticks (EN) | www.bbc.co.uk
| 30-12-2013 | Researchers have revealed how cyber-thieves sliced into cash machines in order to infect them with malware earlier this year. The criminals cut the holes in order to plug in USB drives that installed their code onto the ATMs. Details of the attacks on an unnamed European bank's cash d...
Read more

Neverquest banking malware more dangerous than Zeus trojan (EN) | www.techrepublic.com
| 30-12-2013 | For over five years, Zeushas been the undisputed king of banking malware. Once this trojan was loaded onto a victim's machine, it could:Detect when the owner entered banking information into a web browser.Steal passwords and other pertinent login information.Encrypt the stolen informa...
Read more

Hacking: Number One Fear among Consumers (EN) | midsizeinsider.com
| 30-12-2013 | Hacking is the biggest concern that Internet users in the U.S. have, according to a new study. People are extremely concerned about the theft of their information, and they want the federal government to take more steps to protect them. Growing consumer fears about cybercrime are impo...
Read more

Dell, Cisco 'Deeply Concerned' Over NSA Backdoor Exploit Allegations (EN) | www.crn.com
| 30-12-2013 | Leading IT companies say they are "deeply concerned" over reports a special unit within the National Security Agency (NSA) has been planting backdoors in new computing and networking hardware from major U.S. vendors including Cisco (NSDQ:CSCO), Juniper Networks (NSDQ:JNPR) and Dell (N...
Read more

Gen. Michael Hayden on NSA surveillance, new Benghazi report (EN) | video.foxnews.com
| 30-12-2013 | Former NSA and CIA director weighs in...
Read more

NSA team spies, hacks to gather intelligence on targets, report says (EN) | edition.cnn.com
| 30-12-2013 | (CNN) -- A top-secret National Security Agency team uses spyware and hacking to gather intelligence on targets, according to a new report based on internal agency documents.According to Der Spiegel, a German magazine that published some of the documents, the unit's interception techni...
Read more

Get ready for more mobile ransomware in 2014, says McAfee (EN) | www.itworldcanada.com
| 30-12-2013 | Mobile threats will increase next year, says the security company, with attackers getting more sophisticated Innovation is usually a positive word, ascribed to the efforts of organizations to improve profitability and productivity.Regretably, creators of IT threats are expected to be ...
Read more

Global cyber threat index (EN) | video.foxbusiness.com
| 30-12-2013 | Alvarez and Marsal's Managing Director for Cyber Protection, Tom Kellermann, joins Firewall to discuss a new index that measures international cyber r......
Read more

Seniors: learn how to prevent cyber crime (EN) | www.wickedlocal.com
| 31-12-2013 | Seniors used to be warned about purse snatchings and home repair scams. Now the focus is on cyber crime and online identity theft. The Norwell public library will present a free program at 7 p.m. Jan. 15, 2014 on how to protect yourselves. The Merrimack Analysis Group will cover curre...
Read more

'NSA plantte spyware in online bestelde hardware' (EN) | www.automatiseringgids.nl
| 30-12-2013 | De NSA onderschept soms via internet aangekochte hardware, om er zijn eigen spyware op te installeren. Dat concludeert Der Spiegel uit NSA-documenten die het kreeg toegespeeld. De beschreven praktijken zouden zijn uitgevoerd door het in hacking gespecialiseerde NSA-onderdeel TAO. De g...
Read more

Attackers Wage Network Time Protocol-Based DDoS Attacks (EN) | www.darkreading.com
| 30-12-2013 | Attackers have begun exploiting an oft-forgotten network protocol in a new spin on distributed denial-of-service (DDoS) attacks, as researchers spotted a spike in so-called NTP reflection attacks this month.The Network Time Protocol, or NTP, syncs time between machines on the network,...
Read more

Police clueless on cyber crimes (EN) | www.deccanchronicle.com
| 31-12-2013 | visakhapatnam:Even as cases of cyber crime have jumped by leaps and bounds in the city in the last one year, sleuths of the cyber crime investigation cell (CCIC) are at a loss on how to check and nab the tech savvy criminals.Of late, internet has become an easy tool for frauds and thr...
Read more

BBC server hacked by Russian cyber criminal (EN) | www.telegraph.co.uk
| 30-12-2013 | Access to the server could have allowed hackers to gain further access to internal BBC resources, experts claim.A Russian hacker secretly infiltrated a computer server at the BBC and tried to convince other cyber criminals to pay him for access to the system, according to ...
Read more

Cybercrime in Healthcare: Can It Be Stopped? (EN) | www.healthcare-informatics.com
| 30-12-2013 | In healthcare, the access to data and information is so strongly demanded by patients, providers, payers and employees, that it is fast becoming a target of security and risk. Regulations such as the Health Insurance Portability and Accountability Act (HIPAA) require organizations to ...
Read more

UK CPNI Releases Spear Phishing Paper (EN) | www.newsroomamerica.com
| 30-12-2013 | The United Kingdom's Centre for the Protection of National Infrastructure (CPNI) has recently released a paper titled "Spear Phishing - Understanding the Threat;" this document provides guidance on how spear phishing attacks work, whether you are likely to be a target, and the steps o...
Read more

Hackers maken League of Legends tijdelijk onspeelbaar (NL) | www.metronieuws.nl
| 31-12-2013 | Hackers zijn soms geniale mensen, maar soms halen ze ook het bloed onder je nagels vandaan. Zo is er nu weer een onplezierige situatie ontstaan voor de gewone gamer. Een groep hackers genaamd Derp (Ja, goeie naam!) heeft namelijk DDoS-aanvallen uitgevoerd op een aantal games en sites....
Read more

New malware roosting place: Inside your SD Card? (EN) | news.cnet.com
| 30-12-2013 | Security researchers have found a way to hack SD Cards, the most common form of flash-memory cards used to store data mobile phones and digital cameras, and run software that intercepts data.Andrew "bunnie" Huang and Sean "xobs" Cross disclosed the approach Sunday in a blog post and t...
Read more

To detect 100 percent of malware, try whitelisting 'lite' (EN) | www.infoworld.com
| 31-12-2013 | Few want to live with whitelisting's overhead and restrictions -- so run it in audit mode to detect all malware coming your way Every antimalware scanner claims to catch 99 to 100 percent of malware. But how can that be true? If it were, our computers wouldn't get infected...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish