Under construction

New design coming soon!

CIC News engine statistics

CIC News for 03-01-2014 contains 27 articles

CIC News update contains 27 articles for today, have fun reading.

Snapchat Data Breach Exposes Personal Info: Video (EN) | www.bloomberg.com
| 02-01-2014 | Jan. 2 (Bloomberg) â€"- Shape Security Director of Product Security Michael Coates and Bloomberg’s Michael Riley discuss the flaws in Snapchat’s infrastructure that led to the security breach at Snapchat with Emily Chang on Bloomberg Television’s “Bloomberg West.” (Source: B...
Read more

Apple denies working with the NSA to compromise iPhone security (EN) | www.bizjournals.com
| 02-01-2014 | This weekend, news broke about a branch of the National Security Agency that physically compromises tough targets for the intelligence community, going so far as to physically intercept shipments of laptops and electronics on the way to customers so that spyware could be secretly adde...
Read more

TA14-002A: Malware Targeting Point of Sale Systems (EN) | www.newsroomamerica.com
| 02-01-2014 | Overview Point of Sale SystemsWhen consumers purchase goods or services from a retailer, the transaction is processed through what are commonly referred to as Point of Sale (POS) systems. POS systems consist of the hardware (e.g. the equipment used to swipe a credit or debit card and ...
Read more

FireEye Buys Mandiant In $1 Billion Blockbuster Deal (EN) | www.crn.com
| 02-01-2014 | FireEye, which sells a line of appliances that analyzes suspicious files to detect custom malware and other advanced threats, has acquired Mandiant in a deal estimated at nearly $1 billion.The transaction closed on Dec. 30, but FireEye didn't formally announce the acquisition until af...
Read more

Blurring Boundaries To Up Mobile Threats In 2014: Trend Micro (EN) | www.lightreading.in
| 02-01-2014 | Trend Micro has put together a look at the threat landscape for 2014 and beyond, titled Blurring Boundaries. There are many interesting developments going on today; but these come with their own risks that we must all be aware of. It highlighting few upcoming threats to watch out for ...
Read more

Marine Cybersecurity: Is Your Ship Safe? Are You Sure? (EN) | www.marinelink.com
| 02-01-2014 | On February 12, 2013, President Obama issued Executive Order 13636 â€" Improving Critical Infrastructure Cybersecurity. Citing repeated electronic intrusions into critical infrastructure, the document states that it is the policy of the United States Government to increase the volume,...
Read more

4 plead guilty to skimming 4,700 ATM cards (EN) | www.ajc.com
| 02-01-2014 | The Atlanta Journal-Constitution Four people believed part of a large ATM card skimming scam have pleaded guilty in federal court to stealing more than $380,000 from the bank accounts of at least 4,700 people, the U.S. Attorney’s Office said Thursday.Stoyno Filtshev, Plamen Atanasov...
Read more

Over 50% of Taiwanese internet accounts have been hacked: poll (EN) | www.wantchinatimes.com
| 02-01-2014 | Most Taiwanese people have encountered internet security problems due to bad password habits, according to a survey published by the state-funded Taiwan Network Information Center.The survey, conducted through telephone interviews from Nov. 25 to Dec. 4 last year, found that 56.5% of ...
Read more

Snapchat Data Breach: What Went Wrong and What to Do (EN) | www.tomsguide.com
| 02-01-2014 | Last week, popular private-messaging service Snapchat was publicly warned that its app contained two critical security vulnerabilities, but the company did little to fix the flaws and dismissed the warning as "theoretical." Yesterday (Jan. 1), someone used the vulnerabilities to colle...
Read more

Cyber terrorism (EN) | lloyds.com
| 02-01-2014 | Industrial facilities from nuclear plants to dams are increasingly coming under attack from cyber terrorists bent on causing physical damage and disruption from behind their computer terminals. But with the insurance market yet to plug the gap between cyber and physical terrorism risk...
Read more

Britse overheid waarschuwt voor spear phishing (NL) | www.security.nl
| 02-01-2014 | Een adviesorgaan van de Britse overheid waarschuwt organisaties in een nieuw document voor spear phishing. Dit zijn op maat gemaakte e-mails waarbij de ontvanger wordt verleid tot het openen van een meegestuurde link of bijlage. Vervolgens wordt er malware op het systeem geïnstalleer...
Read more

NCSC publiceerde 1885 veiligheidsadviezen in 2013 (NL) | www.security.nl
| 02-01-2014 | Het Nationaal Cyber Security Center (NCSC) van de overheid heeft het afgelopen jaar 1885 veiligheidsadviezen afgegeven, wat neerkomt op 5 adviezen per dag. Het gaat hier om waarschuwingen voor beveiligingslekken en andere kwetsbaarheden in allerlei software, alsmede actuele dreigingen...
Read more

Is Apple Faking Innocence? Denies Helping NSA Hack iPhone System (EN) | au.ibtimes.com
| 02-01-2014 | Apple has reacted to the allegation that it co-operated with the National Security Agency of the United States in compromising user data on iPhones. The official statement on behalf of the company was released on Tuesday, Dec 31, 2013. The tech giant has claimed that it has never work...
Read more

Cyber Wars / Job-seeker turned into ‘money mule’ (EN) | the-japan-news.com
| 02-01-2014 | Information technology deeply permeates our daily lives, from banking transactions to shopping to photography to chatting with friends, to name only a few ways. This constant state of connectedness has been accompanied by a growing number of cases in which people become unknowingly in...
Read more

McAfee voorziet stijging in mobiele ransomware (EN) | www.computable.nl
| 02-01-2014 | McAfee Labs verwacht dat in 2014 het grootste deel van de ‘innovatie’ op het gebied van cyberdreigingen zich zal richten op mobiele platforms. Zo zal het aanbod aan ransomware â€" malware die de bestanden op een computer ‘gijzelt’ door ze te versleutelen â€" voor mobiele appar...
Read more

Preventing internet-crime on your computers and smartphones (EN) | www.newvision.co.ug
| 02-01-2014 | Use secure passwords. Often, the beginning of the end is a weak password. Make sure your passwords are foolproof and use a different password for each account that you have. A secure password should have uppercase, lowercase and numbers included and also beware of Pop-Ups. Never enter...
Read more

Cash machine 'skimmers' steal £3000 from customer's account (EN) | www.eveningtimes.co.uk
| 02-01-2014 | CASH machine bandits used a hi-tech skimming device to steal thousands of pounds after targeting people in a plush city suburb. Police today warned residents and visitors to be on their guard after they discovered the sophisticated equipment from the cash machine in Giffnock, East Ren...
Read more

News: EA's Origin down following DDoS attack (EN) | www.computerandvideogames.com
| 03-01-2014 | EA's Origin digital distribution service has seemingly fallen victim to a DDoS attack.The attack has brought down login servers, preventing users from gaining access to the digital service via the web or via games that utilise it, including - as CVG has verified - via Battlefield 4 an...
Read more

Government holds total access to your iPhone (EN) | www.fiercecio.com
| 03-01-2014 | The NSA can install malware onto an iPhone that will give the government agency access that rivals those offered by bundled apps, according to newly leaked NSA documents. This ranges from the ability to install or download files from the device, retrieve SMS and contact lists, know th...
Read more

7 InfoSec Predictions For 2014: Good, Bad & Ugly (EN) | www.informationweek.com
| 03-01-2014 | First, the bad news: Windows XP doomsday, escalating ransomware, botnet-driven attacks, emerging SDN threats. The good news: Threat intelligence goes mainstream. Predicting the future, of course, is impossible. But based on the dynamic events I've witnessed in information security thi...
Read more

Nederlands beveiligingsbedrijf: Yahoo serveerde malware (EN) | tweakers.net
| 03-01-2014 | Via advertenties binnen de webmaildienst van Yahoo is vrijdag malware verspreid, zo ontdekten medewerkers van de Nederlandse beveiligingsbedrijven Fox-IT en Surfright. Banners van het advertentienetwerk van Yahoo verwezen gebruikers door naar een exploitkit.Fox-IT ontdekte malware op ...
Read more

Security Horizon: Mobile Malware Up, U.S.-Based Infections Down (EN) | www.eweek.com
| 03-01-2014 | Separate studies from security vendors Kaspersky and Sophos evaluate the security events and exploits that were center stage in 2013 and will, no doubt, set the scene for this year. A key trend observed during 2013 was the continued risk from botnets and, in particular, the ZeroAccess...
Read more

Vijf jaar cel voor schrijver Mariposa-malware (NL) | webwereld.nl
| 03-01-2014 | De schrijver van de beruchte malware Mariposa heeft een gevangenisstraf van bijna 5 jaar gekregen. De infectie met Mariposa creerde een botnet van 12 miljoen computers en HTC-smartphones. De Sloveense virusschrijver met de codenaam Iderdo is door een rechtbank in zijn eigen land veroo...
Read more

Origin offline na DDoS-aanval op servers Electronic Arts (NL) | www.gamersnet.nl
| 03-01-2014 | Sinds gisteravond hebben gamers over de hele wereld problemen om in te loggen op de servers van Electronic Arts. Na een periode van stilte heeft EA laten weten dat een hackersgroep genaamd DERP een DDoS-aanval heeft uitgevoerd, waardoor onder andere EA's online platform Origin offline...
Read more

Equip police to tackle terrorism, cyber crime: President (EN) | www.business-standard.com
| 03-01-2014 | Police forces in India must be equipped to tackle different forms of terrorism and increasing dimensions of crime, including cyber crimes, President Pranab Mukherjee said Friday."In present times, the forms of terrorism have changed and dimensions of crime have increased. Cyber crimes...
Read more

Slovenian jailed for creating code behind 12 MILLION strong 'Mariposa' botnet army (EN) | www.theregister.co.uk
| 03-01-2014 | A Slovenian virus writer who created an infamous strain of malware used to infect an estimated 12 million computers worldwide has been jailed for almost five years.Matjaž Škorjanc (who operated under the handle Iserdo) was sentenced by a Slovenian court for writing the code used to ...
Read more

BadBios malware prototype communicates via microphone (EN) | www.examiner.com
| 02-01-2014 | In October, a new malware phenomenon became public. It was so strange that some responses suggested it was a hoax. A new report from two German researchers confirms it's possible for infected systems to communicate over an air gap using sound waves transmitted from a speaker to a micr...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish