Under construction

New design coming soon!

CIC News engine statistics

CIC News for 17-01-2014 contains 70 articles

CIC News update contains 70 articles for today, have fun reading.

Homeland security subcommittee approves the National Cybersecurity and Critical Infrastructure Protection Act of 2013 (EN) | www.gsnmagazine.com
| 16-01-2014 | The Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies has approved the National Cyber Security and Critical Infrastructure Protection Act of 2013. The legislation primarily aims to fortify and codify many of the pre-existing national...
Read more

UK critical infrastructure at risk from SCADA security flaw (EN) | www.v3.co.uk
| 16-01-2014 | The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has called for businesses involved in critical infrastructure to be extra vigilant as it investigates a potential critical flaw in a commonly used SCADA system.ICS-CERT issued the warning in a security advisory af...
Read more

SCADA Researcher Drops Zero-Day, ICS-CERT Issues Advisory (EN) | www.darkreading.com
| 15-01-2014 | S4x14 CONFERENCE -- Miami â€" A well-known and prolific ICS/SCADA vulnerability researcher here today revealed a zero-day flaw in a Web server-based system used for monitoring, controlling, and viewing devices and systems in process control environments. Luigi Auriemma, CEO of Malta-b...
Read more

IT Governance reveals most useful tools for implementing a cyber-resilience strategy (EN) | www.international.to
| 15-01-2014 | ELY, UK, January 15, 2014 /EINPresswire.com/ -- IT Governance, the global leader in cyber security and ISO 27001 expertise, is advising organisations to become ‘cyber resilient’, not just ‘cyber secure’ in 2014. As the probability of a successful cyber attack increases, there ...
Read more

Is a Cyber Resilience Program the Tool Needed Against Cyberattacks? (EN) | www.itbusinessedge.com
| 15-01-2014 | I caught snippets of an interview on NPR the other day with the author of a book about cybersecurity and cyberwar, written for the average person. It’s good timing, with the recent high-profile breaches on the minds of just about everyone lately. In fact, I’d like to read the book...
Read more

Microsoft's secret battle against the Tor botnet (EN) | www.dailydot.com
| 16-01-2014 | In August 2013, 4 million infected computers woke up and waited instructions from their master. The pathogen was Sefnit, a nasty bit of malware that makes infected computers mine bitcoins. Once the computers woke up, they worked under the command of Ukranian and Israeli hackers named ...
Read more

Critical infrastructure cyber bill gets goahead from Homeland Security committee (EN) | www.scmagazine.com
| 16-01-2014 | The Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies has pushed legislation forward that aims to curb cyber attacks against the nation's most critical assets. The National Cybersecurity and Critical Infrastructure Protection Act of 2...
Read more

Tekort aan security professionals op komst (BE) | www.beveiligingnieuws.nl
| 17-01-2014 | Door alle ontwikkelingen op technologisch gebied, is er in 2014 een tekort van 1 miljoen aan security professionals,voorspelt Cisco. Op netwerken van grote multinationals wordt vaak per abuis contact gelegd met kwaadaardige websites.Uit het vandaag gepresenteerde Cisco 201...
Read more

DDoS Attacks Target Network Timing Protocol (EN) | www.techweekeurope.co.uk
| 16-01-2014 | Distributed denial-of-service (DDoS) attacks often utilise different techniques to drown Websites under a flood of traffic.But now the United States Computer Emergency Readiness Team (US-CERT) is warning of an increased risk from DDoS attacks that leverage the Network Time Protocol (N...
Read more

Cisco: Thousands of web hosting centers now launchpads for attacks (EN) | www.networkworld.com
| 16-01-2014 | Web hosting centers around the world are being compromised by cyber-criminals that use them to launch major attacks against business and government, says Cisco in its annual security report. This threat really gained full steam last year, the company says.“They’re installing malwa...
Read more

Retail store malware pinpointed in holiday hacking attacks (EN) | www.cbsnews.com
| 16-01-2014 | A private company revealed Thursdayhow, apparently, hackers were able to hit Target at the height of the holiday shopping season. Forty million credit and debit cardaccounts were compromised and as many as 70 million customers had theirpersonal information stolen.The private security ...
Read more

BlackPOS malware used in Target heist (EN) | www.itnews.com.au
| 19-01-2014 | Hackers installed off-the-shelf malware to siphon more than 110 millions of credit and debit cards and personal records from Target as early as November last year. The unknown crackers reportedly used malware similar to the Russian made BlackPOS which was designed to scrape credit and...
Read more

Krebs: Cheap, Crude but Effective PoS Malware Likely Responsible for Target Breach (EN) | www.infosecurity-magazine.com
| 16-01-2014 | The Target breach saga continues to roll on, with the focus of attention now moving to the bug responsible for lifting the data of 110 million in-store shoppers in the period between the US Thanksgiving holiday and Christmas. Target has officially said that point-of-sale (PoS) malware...
Read more

Amazon's public cloud fingered as US's biggest MALWARE LAIR (EN) | www.theregister.co.uk
| 16-01-2014 | Amazon's public cloud is the largest haven of malware spreaders in the US, according to security company Solutionary.The claims are in the outfit's "Quarterly Threat Intelligence Report" [PDF], which uses data from Solutionary's ActiveGuard Security and Compliance Platform. It was pub...
Read more

Likely candidate for Target breach malware found (EN) | www.zdnet.com
| 16-01-2014 | While Target still hasn't said how it was hacked, details about what's thought to be the malware found on the retailer's point-of-sale (POS) systems have surfaced.Following last week's admission by Target CEO Gregg Steinhafel that the company removed malware from its POS m...
Read more

Point-of-sale malware infecting Target found hiding in plain sight (EN) | arstechnica.com
| 16-01-2014 | Independent security journalist Brian Krebs has uncovered important new details about the hack that compromised as many as 110 million Target customers, including the malware that appears to have infected point-of-sale systems and the way attackers first broke in.According to a post p...
Read more

Microsoft Delays Windows XP Antivirus Doomsday (EN) | www.informationweek.com
| 16-01-2014 | Security Essentials for XP gets 15-month extension, but some antivirus vendors promise updates through 2017 and beyond. Microsoft announced Wednesday that even after it ceases support for its aging Windows XP operating system in April, it won't stop issuing new signatures ...
Read more

NSA on Text Messages: 'A Goldmine to Exploit' (EN) | www.thewire.com
| 16-01-2014 | If you were curious: Yes, the National Security Agency is collecting and filtering text messages to the tune of 194 million a day. It's a collection of data that one agency slide, obtained by The Guardianfrom leaker Edward Snowden, called "a goldmine to exploit."The Guardi...
Read more

Java 'Icefog' Malware Variant Infects U.S. Businesses (EN) | www.darkreading.com
| 15-01-2014 | Beware Java-based malware that's been used to exploit at least three US-based organizations.That warning of a new advanced persistent threat (APT) attack campaign came via Kaspersky Lab, which said that it's traced a malicious Java archive (a.k.a. JAR) file to eight infected systems i...
Read more

How long will 3rd party anti-malware companies support XP? (EN) | www.zdnet.com
| 16-01-2014 | Summary: Nearly all significant anti-malware vendors have announced they will extend support for Windows XP users for at least one year, most for two or more. Microsoft will keep on supplying signatures for Microsoft Security Essentials, but that doesn't mean it's a good i...
Read more

MS extends XP anti-malware updates (EN) | www.itweb.co.za
| 16-01-2014 | Microsoft has extended the time period for anti-malware updates on Windows XP, giving customers an extra year of signature updates before the final cut-off. Operating system updates and security patches will still cease in April, however.Windows XP's official end of support date is 8 ...
Read more

Microsoft extends XP anti-malware, temporary reprieve to 2015 (EN) | www.tweaktown.com
| 16-01-2014 | Microsoft has given Windows XP users a brief reprieve by announcing anti-malware support for the 12-year-old operating system will be extended into 2015. The XP end of life scheduled for April 8 will still take place as scheduled, but anti-malware protection will give stragglers an ad...
Read more

Malware, Hackers Behind Target Data Breach Tentatively Identified (EN) | www.tomsguide.com
| 16-01-2014 | Customers, card issuers and banks are still reeling from the massive Christmas-season data breaches at Target and Neiman Marcus, which resulted in millions of stolen credit- and debit-card accounts, and millions more stolen names, addresses and email addresses. Now, however, there's s...
Read more

Tanzanian Woman charged for Identity Theft (EN) | www.guardian.bz
| 16-01-2014 | On Wednesday, January 15th, 55-year-old Tanzanian national Teena Isacc was escorted to the Belize City Magistrates Court to face criminal charges for trying to steal a Corozal woman’s identity. According to reports, Isacc visited the Immigration Department in Belize City...
Read more

Retail cyber-breaches: Stealthy hackers two-steps ahead (EN) | www.examiner.com
| 15-01-2014 | The attacks on both Target and Neiman Marcus highlight the growing vulnerabilities in attacks on computer systems by determined and focused hackers. As Jay Foley from the ID Theft Info Source has said numerous times, “Whatever program a security specialist can develop there is anoth...
Read more

Citi to replace debit cards involved in Target data breach (EN) | www.euronews.com
| 16-01-2014 | Citigroup <C.N> will replace all customer debit cards involved in the data breach at Target Corp <TGT.N>, the No.3 U.S. retailer, the New York Times reported quoting a person briefed on the bank’s decision. The bank did not replace the debit cards sooner because it wante...
Read more

Amerikaanse spionnen hackten iPhones (NL) | www.portablegear.nl
| 16-01-2014 | De Amerikaanse spionnen zouden sms'jes en contactlijsten kunnen onderscheppen en tevens zouden zij op afstand de microfoon en de camera op de iPhonekunnen activeren. Voor deze spionagepraktijken moest wel malware op de iPhones worden geactiveerd, waarvoor de spionnen meestal toegang t...
Read more

'Amerikaanse Winkels Gehackt Met Russische Code' (NL) | www.nutech.nl
| 16-01-2014 | De software die werd gebruikt om miljoenen creditcardgegevens buit te maken bij Amerikaanse winkelketens blijkt deels te zijn geschreven in het Russisch. Dat meldt CNBC op Twitter.De Amerikaanse overheid heeft een document opgesteld met daarin alle informatie die tot nog toe bekend is...
Read more

Malware verhuist naar de cloud (EN) | www.automatiseringgids.nl

44 procent van de malware wordt gehost in de VS, volgens beveiliger Solutionary. De flexibiliteit van cloudcontracten en de betrouwbare IP-adressen zijn ook voor mensen met minder goede bedoelingen aantrekkelijk.