Under construction

New design coming soon!

CIC News engine statistics

CIC News for 10-01-2014 contains 39 articles

CIC News update contains 39 articles for today, have fun reading.

Google Slated For Opening Gmail Inboxes To Google+ Spam (EN) | www.techweekeurope.co.uk
| 10-01-2014 | Googlehas set off another privacy row by making changes to Gmailthat are intended to bolster its social network Google+. Gmail users fear the changes will let strangers contact them without needing to know their email address.The new feature â€" which is coming to all Gmail and Google...
Read more

Prison Locker: A load of überhyped malware FUD over... internet chatter (EN) | www.theregister.co.uk
| 10-01-2014 | An underground advert seeking help in developing a file-encrypting ransomware kit that might be sold for just $100 a go sparked something of a panic on the interwebs this week.But security watchers are yet to see any samples of the so-called Prison Locker ransomware, leading at least ...
Read more

It’s alive! Once-prolific Flashback trojan still infecting 22,000 Macs (EN) | arstechnica.com
| 09-01-2014 | The Flashback trojan that hijacked well over 500,000 Macs at its peak is still clinging to life, with about 22,000 infected machines in recent days, a security researcher said.The compromised Macs were observed connecting to command and control servers that had been "sinkholedâ€"meani...
Read more

Yahoo malware turned up to TWO MILLION European computers into 'Bitcoin slaves' (EN) | www.dailymail.co.uk
| 09-01-2014 | As Bitcoin’s value continues to rise, hackers have found increasingly sophisticated ways to illegally ‘mine’ the virtual currency. Now a new method has been uncovered which uses malware infected adverts on Yahoo to make computers Bitcoin slaves.Yahoo has confirmed that the breac...
Read more

Fake AV served to Dailymotion visitors via malicious ads (EN) | www.net-security.org
| 09-01-2014 | The extremely popular video-sharing website Dailymotion (dailymotion.com) has been found serving malicious ads that trigger fake infection warnings and try to make visitors install a fake AV solution. This malware delivery campaign has been spotted on Tuesday by researchers from secur...
Read more

Malware At Work: Why Managed Security Services Are Taking Off (EN) | www.crn.com
| 09-01-2014 | Employees that spend part of their day visiting social networks, blogs and forums or checking personal webmail could be introducing malware and other threats to business systems, according to security experts surveyed in a recent study. Businesses are increasingly attempting to find a...
Read more

RSA talkers dropping like flies (EN) | www.cbronline.com
| 09-01-2014 | Influential speakers are withdrawing from upcoming conference following allegations of NSA collusion. A list of speakers due to appear at the upcoming RSA Conference have withdrawn themselves from the event after stories appeared implicating the RSA in NSA surveillance projects.Althou...
Read more

HBGary updates security for Windows systems (EN) | www.bizjournals.com
| 09-01-2014 | HBGary released a new version of its Responder Pro security software which allows users to discover and then perform forensics on cyber attacks on Windows systems.The company says its new version can detect and find malware rootkits, Trojan horse programs and other problems that are i...
Read more

OpenSUSE forums hack raises vBulletin zero-day exploit possibility (EN) | www.computerworld.com.au
| 09-01-2014 | A compromise of the community forums for the openSUSE Linux distribution Tuesday sparked concern that hackers have access to a previously unknown exploit for the popular vBulletin Internet forum software.The attack resulted in hackers replacing some pages on the forums.opensuse.org we...
Read more

Sierra Wireless industrial gateways security vulnerabilities (EN) | threatpost.com
| 08-01-2014 | A wireless gateway suitable for a number of industrial applications is vulnerable to remote exploit because of a lack of encryption in its update and reprogramming processes, an advisory from the Industrial Control Systems Cyber Emergency Response Team said yesterday.The Sierra Wirele...
Read more

Malware suspected in Japanese nuclear plant control room - but don't panic (EN) | nakedsecurity.sophos.com
| 09-01-2014 | The control centre of a nuclear power plant really doesn't sound like the sort of place you'd want to see a malware infection.So, when we hear that an infection is suspected to have hit a machine at a Japanese plant, it raises immediate fears of cyber-terrorism, or at the very least a...
Read more

Posting photos, abusive messages lands girl student in jail (EN) | www.thehindu.com
| 10-01-2014 | A 20-year-old girl student was arrested by the Cyber Crime Police on Thursday on the charge of creating a fake Facebook id. on the name of another girl and posting her photographs, phone numbers and some abusive messages and causing mental agony to her. On a complaint filed by K. Veer...
Read more

Cybercriminals are waking up to the value of e-commerce (EN) | www.chinaeconomicreview.com
| 10-01-2014 | As Chinese consumers grow in sophistication and seek to benefit more and more from international trends, they might sometimes pause to think what they are asking for.In the first few days of this year, Chinese media broke the news that swathes of customer data had been stolen from the...
Read more

Sexual assault, child porn among charges laid by Cyber Crime Unit (EN) | london.ctvnews.ca
| 09-01-2014 | The London Police Service has laid several charges in two separate Cyber Crime Unit investigations this week. On Wednesday, police executed a search warrant at a Clarke Road residence in Granton, Ont. As a result of the evidence found, Andrew Shainline, 27, has been charged with: tele...
Read more

20-year-old women college student arrested for cybercrime (EN) | zeenews.india.com
| 09-01-2014 | Visakhapatnam: A 20-year-old woman, student of a private college, was today arrested by the Cyber Crime Investigation Cell (CCIC) for allegedly defaming her batchmate, police said.The accused woman, a final year B Sc student of a private college, was arrested for creating ...
Read more

Cybercrime Report: New Mobile Ransomware Threats (EN) | midsizeinsider.com
| 09-01-2014 | Cybercrime in the form of ransomware targeting mobile will hit new highs this year, according to a report by McAfee Labs. Details about the security risks are important for IT professionals at midsize firms to understand as they continue to adopt bring-your-own-device (BYOD) policies ...
Read more

Prosecutors used this cybercrime law against Aaron Swartz. Now a senator wants to strengthen it. (EN) | www.washingtonpost.com
| 09-01-2014 | A high-ranking Democratic senator is trying to beef up the law that let prosecutors go after Internet activist Aaron Swartz.Sen. Patrick Leahy (D-Vt.) on Wednesday introduced the Personal Data Privacy and Security Act, making it the fifth time since 2005 that the chairman of the power...
Read more

HackSurfer Launches Suite of Cybercrime API and Report Offerings (EN) | www.sacbee.com
| 09-01-2014 | GLENELG, Md., Jan. 9, 2014 -- /PRNewswire/ --HackSurfer LLC, an independent cybercrime data and analytics social collaboration network, announced the launch of a suite of premium API and report options. These new offerings include HackSurfer Reports, which are monthly in-depth cybercr...
Read more

Mobile messaging security market up 70% in 2013, says Infonetics (EN) | www.telecomlead.com
| 10-01-2014 | Mobile messaging security market rose 70 percent in 2013 as telecom operators have stepped up battle against spam, said Infonetics.“The popularity of SMS and MMS has soared over the last decade, but carriers around the globe are just now beginning to seriously evaluate and deploy mo...
Read more

Target data breach exposes serious threat of POS malware and botnets (EN) | www.techrepublic.com
| 09-01-2014 | In the wake of Target's massive data breach, Michael Kassner explores the rise of POS malware and botnets. After the Target data breach, I became curious as to how digital criminals were able to manipulate Point of Sale(PoS) systems without raising red flags. From what I’ve read, it...
Read more

Some 80,000 Emails Compromised in Forum Data Breach (EN) | www.bitdefender.com
| 09-01-2014 | The openSUSE forums have been defaced, leaving account information of thousands of users vulnerable, according to The Hacker News. A Pakistani hacker called 'H4x0r HuSsY managed to exploit a vulnerability in the forum’s software “that allows him to browse, read or write/overwrite ...
Read more

Data breach reporting mandate may be a needless distraction (EN) | www.fiercegovernmentit.com
| 09-01-2014 | Federal agencies must report data breaches involving personally identifiable information to the Homeland Security Department within an hour of discovery, which is not a particularly useful endeavor, the Government Accountability Office says.After just an hour, agencies often have litt...
Read more

Snapchat Apologizes for Data Breach (EN) | techland.time.com
| 09-01-2014 | Sometimes it’s hard to say “sorry.” But Snapchat finally did just that on Thursday, more than a week after 4.6 million users’ phone records were compromised by hackers. The apology came tied to a blog post announcing that users of the photo-sharing service would no longer have...
Read more

10 Reasons You’re a Target for Identity Theft (EN) | www.moneytalksnews.com
| 08-01-2014 | You’ve probably heard about identity theft time and time again and brushed it off while saying to yourself, “Oh, it could never happen to me.” Think again, as all it takes is something as simple as a single glance at your credit card information or a dumpster dive by a fraudster...
Read more

Phishing and diet spam attacks hit Twitter users (EN) | grahamcluley.com
| 09-01-2014 | If someone appears on highbrow TV history programs do you trust what they say on social media? Do you believe everything that gets posted on a politician’s Twitter account?I would hope you don’t. And maybe the following news will make you remain rightly cautious.Firstly, if you ha...
Read more

Attackers using new technique to bring down websites (EN) | www.techradar.com
| 09-01-2014 | Earlier this week a number of high-profile gaming services were taken down by distributed denial-of-service attacks (DDoS) that used a technique not seen before.Instead of directly flooding the targeted services with torrents of data, an attack group calling itself DERP Trolling sent ...
Read more

Infonetics Research Report Identifies Arbor Networks As World Leader in DDoS Prevention (EN) | www.whatech.com
| 09-01-2014 | Arbor Networks, Inc. was identified as the top supplier of DDoS prevention solutions overall as well as in the Carrier, Enterprise and Mobile market segments in a new report from Infonetics Research, titled DDoS Prevention Appliance Market Outlook. According to Infonetics, the increas...
Read more

Encrypted chips help fight credit card fraud (EN) | www.usatoday.com
| 09-01-2014 | DES MOINES, Iowa -- Bruce Schmiedlin does not worryabout a criminal counterfeiting his credit card. The Grimes accountant's MasterCard is embedded with an encrypted chip that requires a personal identification number to access.The cards represent the latest weapon in the battle agains...
Read more

24,000 Android devices are hit by XXXX.apk mobile botnet (EN) | www.theinquirer.net
| 09-01-2014 | JUST WHEN YOU THOUGHT Android security couldn't get any worse, another class of mobile spy malware has been uncovered and is said to be affecting thousands of Android devices, gleaning users' location information from nearby hotspots and connections home Wifi. LA based cybercrime rese...
Read more

'Bitnets big business voor hackers' (EN) | www.automatiseringgids.nl
| 09-01-2014 | Advertenties op Yahoo waren besmet met malware die de computer van de gebruiker invoegt in een grid dat wordt ingezet voor het berekenen van bitcoin-codes ('Bit-coin mining'). Dat kan de hackers tonnen hebben opgeleverd. De malware-verspreidende advertenties stonden gedurende vier dag...
Read more

'Door Yahoo verspreide malware werd gebruikt voor Bitcoin-mining' (EN) | tweakers.net
| 08-01-2014 | De malware die gedurende vier dagen via de website van Yahoo in advertenties was verstopt, werd gebruikt om de pc's van slachtoffers Bitcoins te laten minen, zo stellen beveiligingsonderzoekers die de aanval analyseerden. De malware in de advertenties op Yahoo, die van 31 december tot...
Read more

Malware verspreid via advertenties op Dailymotion.com (NL) | www.security.nl
| 09-01-2014 | Aanvallers zijn erin geslaagd om advertenties op de populaire videosite Dailymotion.com te plaatsen die gebruikers naar een website doorstuurden die malware probeerde te installeren. Dailymotion.com behoort tot de 100 meest bezochte websites op internet. Volgens internetbedrijf Alexa ...
Read more

Aanvallers stuiten op nieuwe DDoS-methode (NL) | webwereld.nl
| 09-01-2014 | DDoS'ers hebben een weinig gebruikte aanvalsmethode ingezet om servers van grote organisaties plat te leggen. DDoS-aanvallers hebben in december en januari een vrij onbekende methode gebruikt om organisaties tot wanhoop te drijven. Grote gameservers, waaronder die van EA.com en server...
Read more

Hackers gain 'full control' of critical SCADA systems (EN) | www.itnews.com.au
| 10-01-2014 | Researchers have found vulnerabilities in industrial control systems that they say grant full control of systems running energy, chemical and transportation systems. The vulnerabilities were discovered by Russian researchers who over the last year probed popular and high-end ICS and s...
Read more

Companies Receive Grant To Develop Smart Grid Automation Communication Solution (EN) | www.renewgridmag.com
| 09-01-2014 | Information technology security solutions company Patriot Technologies and RADiFlow, a provider of secure industrial Ethernet solutions for critical infrastructure, have received a conditional grant from the Israeli/U.S. Binational Industrial Research and Development Foundation to dev...
Read more

Yahoo malware turns "millions" of PCs into Bitcoin network (EN) | www.pcpro.co.uk
| 10-01-2014 | Millions of PCs may have been infected by malware inserted into ads on Yahoo websites - and then used to mine bitcoins.Yahoo confirmed this week that hackers had managed to insert malware into ads displayed on some of its European sites, but hasn't said how many users have been affect...
Read more

Smart Grid: We’re not doing enough about security: But what SHOULD we do? (EN) | www.smartgridnews.com
| 09-01-2014 | In the first article in our Next Next Thing series, industry professionals contributed their thoughts and recommendations on how to manage and wring the most value from Big Data from a variety of perspectives. Now we turn our attention to cybersecurity and physical security, which has...
Read more

The security realities of the Internet of Things (EN) | www.net-security.org
| 09-01-2014 | SANS announced results of its 2013 Securing the Internet of Things survey, in which 391 IT professionals answered questions about the current and future security realities of the Internet of Things (IoT)."The Internet of Things is not just a buzzword, nor is it merely a vi...
Read more

The 2014 cyber security roadmap (EN) | www.information-age.com
| 09-01-2014 | This month, we asked a wide range of security experts and solutions vendors to consider the enterprise security issues that will define the next 12 months. They highlighted the most pertinent themes that every IT department will need to put on their list of security priorities, and ho...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish