Under construction

New design coming soon!

CIC News engine statistics

CIC News for 23-01-2014 contains 30 articles

CIC News update contains 30 articles for today, have fun reading.

Waarschuwing: pas op voor telefoon-DDoS aanval (NL) | computerworld.nl
| 22-01-2014 | De telefonische bereikbaar van bedrijven en overheden is in gevaar door vloedgolf aan valse, automatische telefoontjes. Zo'n aanval afkopen is niet verstandig. Niet alleen websites zijn plat te krijgen met een DDoS-aanval, ook belangrijke telefoonnummers. De techniek is niet nieuw maa...
Read more

Chrome Exploit Can Allow Hackers To Listen In Even After A Tab Is Closed (EN) | www.ubergizmo.com
| 22-01-2014 | There’s an exploit in Google’s popular Chrome browser that can allow hackers to listen in to a user’s offline conversation through their computer’s microphone even after the tab has been closed. The exploit lies in Chrome’s microphone settings, if a website is given permissi...
Read more

Not Enough Evidence the Internet of Things Botnet Actually Exists (EN) | securitywatch.pcmag.com
| 22-01-2014 | There was a report last week about a spam botnet using "Internet of Things" devicesâ€"a refrigerator, even!â€"but the evidence supporting this claim feels a little circumstantial.As PCMag.comreported late last week, cloud security company Proofpoint claimed a botnet sent out 750,000 s...
Read more

Data breach affects 16M in Germany (EN) | www.scmagazine.com
| 22-01-2014 | A data breach affecting 16 million German internet users was announced this week by the country's Federal Office for Information Security (BSI). The agency was made aware of the millions of compromised online accounts by law enforcement and research institutions that were analyzing bo...
Read more

Global cybercrime dominated by 50 core groups, CrowdStrike report finds (EN) | news.techworld.com
| 22-01-2014 | Cybercrime in 2013 was dominated by a core of around 50 active groups, including Russian and Chinese ‘threat actors’ whose activities are only now coming to light, a report from monitoring firm CrowdStrike has found.Using an approach that foregrounds the ‘threat actors’ above ...
Read more

An ICS Cyber Vulnerability Beyond Stuxnet (EN) | www.infosecisland.com
| 22-01-2014 | Ralph Langner and other ICS cyber security experts have warned that the critical ICS vulnerabilities that can cause significant damage and/or personal injuries lie in the functional design of the instrumentation and control systems. Additionally, a presentation was made at the October...
Read more

Healthcare.gov vulnerable to 'massive identity theft' (EN) | www.bccourier.com
| 23-01-2014 | To ensure the safety and security of Americans' personal data, Science, Space, and Technology Committee Chairman Lamar Smith recently called on President Barack Obama to formally certify the safety and security of Healthcare.gov."When the Obama Administration launched Healthcare...
Read more

German Data Breach Exposes 16 Million E-Mail Addresses, Passwords (EN) | www.esecurityplanet.com
| 22-01-2014 | Germany's Federal Office for Information Security (BSI) recently announced that 16 million stolen e-mail addresses and passwords were recently uncovered during an analysis of botnets (h/t The Inquirer)The BSI now hosts a Web page where users can enter their e-mail addresses to check w...
Read more

Bill would criminalize cyber bullying (EN) | www.sfgate.com
| 22-01-2014 | JUNEAU, Alaska (AP) â€" A bill proposed in the Alaska Senate would criminalize sending certain insulting or taunting electronic messages tochildren.SB128, by Sen. Kevin Meyer, says a person would be committing the crime of second-degree harassment if that person sent an electronic com...
Read more

Cyber Cell to be strengthened with engineering graduates (EN) | www.deccanherald.com
| 22-01-2014 | The State government has planned to recruit engineering graduates as Cyber Sub-Inspectors (technical cadre) to investigate increasing cyber crimes, revealed N S Megharik, ADGP, Crime and Technical, Commissioner of Road and Traffic Safety. Megharik was in the city to inaugurate the Nat...
Read more

Microsoft stopt ondersteuning Windows XP (NL) | www.bndestem.nl
| 23-01-2014 | AMSTERDAM - Vergeet virussen, spyware en andere schadelijke software. Het grootste gevaar voor internet is vanaf april het gebruik van Windows XP. Microsoft stopt namelijk per 8 april met de ondersteuning van het systeem. Elke pc die na die datum nog draait op XP, is kwets...
Read more

16 Miljoen Duitsers slachtoffer botnet: wat is het en hoe wapen je je ertegen? (NL) | www.ad.nl
| 22-01-2014 | vijf vragen Duitsland is in de ban van een botnet dat meer dan 16 miljoen e-mailadressen plus de bijbehorende wachtwoorden heeft buitgemaakt. Dergelijke aanvallen komen vaker voor, hoewel de schaal deze keer wel erg groot is. Wat is een botnet en hoe verklein je de kans dat je slachto...
Read more

13 indicted in $2M gas station card-skimming scheme (EN) | news.cnet.com
| 22-01-2014 | Pump-mounted devices used Bluetooth chips that allowed the thieves to retrieve the data without having to physically connect to the devices, prosecutors allege. Prosecutors have charged 13 defendants with using card skimmers installed at gas stations to steal more than $2 ...
Read more

Two new pieces of malware for OS X discovered (EN) | securityspread.com
| 22-01-2014 | Sophos discovered a new piece of malware that finds it way onto a users system through a phishing attack. A user will receive an email from a courier company stating there is a package waiting for you and there is a link in the message that looks like it will download a copy of the pa...
Read more

Ten Years of Mobile Malware (EN) | www.itbusinessedge.com
| 22-01-2014 | Hard to believe that it was 10 years ago when the first piece of mobile malware made its attack. According to Axelle Apvrille, senior mobile anti-virus researcher with Fortinet, the first piece of mobile malware, a worm, was called Cabir and was targeted specifically to attack the Nok...
Read more

Target hackers will be tough to find say cybercrime experts (EN) | www.sctimes.com
| 22-01-2014 | NEW YORK â€" The hackers behind the recent Target data breach are likely a world away and nearly impossible to find.That’s the consensus among outside cybercrime experts as Target, the Secret Service and the FBI continue their investigation of the pre-Christmas data heist in which h...
Read more

Microsoft Maps Out Malware Haves And Have-Nots (EN) | www.darkreading.com
| 22-01-2014 | Malware infections declined an average of 23.3 percent overall in 2011-2012 among more than 100 countries, but the story was very different for developing nations with fast-growing Internet connectivity.A new study by Microsoft shows how some nations suffer more malware infections at ...
Read more

Fraudsters get 13 credit cards, dupe firm of Rs 75 lakh (EN) | timesofindia.indiatimes.com
| 23-01-2014 | NOIDA: The cyber crime cell of Noida police has lodged a case against eight fraudsters for creating fake identities and procuring more than a dozen credit cards from a financial major's Gurgaon office. The accused have allegedly duped the organization of Rs 75 lakh within a period of ...
Read more

President Jonathan sends Cybercrime Bill to Senate (EN) | www.theheraldng.com
| 22-01-2014 | President Goodluck Jonathan has sent the Cybercrime Bill 2013 to the Senate to be enacted into law.The bill titled, “Cybercrime Bill, 2013” was sent to Senate President David Mark.“I hereby introduce for formal consideration and enactment into law by the Distinguished Senate of ...
Read more

Telefoon-DDoS aanvallen gaan gepaard met afpersing (BE) | www.beveiligingnieuws.nl
| 23-01-2014 | Niet alleen websites zijn plat te krijgen met een DDoS-aanval, ook belangrijke telefoonnummers. De techniek met een vloedgolf aan valse, automatische telefoontjes is niet nieuw maar het komt wel steeds vaker voor. Experts en opsporingsinstanties waarschuwen voor Telefoon-DoS, kortweg ...
Read more

Bange Duitsers blijven botnetcontrolesite DDoS'en (NL) | webwereld.nl
| 22-01-2014 | Overheid heeft site wekenlang voorbereid, maar capaciteit schiet zwaar tekort. AdvertentieNog steeds proberen talloze Duitsers (en wellicht niet-Duitsers) te controleren of ze zijn geïnfecteerd met botnet-malware. Deze testsite, opgezet door de Duitse cybersecurityorganisatie BSI, gi...
Read more

Cyberattacks may cost world economy $3 trillion-WEF (EN) | www.itnewsafrica.com
| 22-01-2014 | Failing to improve cyber security could cost the world economy dearly. This according to a new report released today by the World Economic Forum in collaboration with McKinsey & Company.The Risk and Responsibility in a Hyperconnected World report addresses options that...
Read more

Gambia: Cyber Crime (EN) | allafrica.com
| 23-01-2014 | The use of computers and the internet to harm others is becoming a cause for concern.People complain of receiving unsolicited emails on a daily basis from persons they do not even know. These persons pretend to be someone you know, asking you for a favour such as financial assistance ...
Read more

Symantec uncovers malware that uses Windows to infect Android devices (EN) | www.theinquirer.net
| 23-01-2014 | SECURITY FIRM Symantec has discovered a form of Windows malware that infects Android devices, as opposed to more established forms that work the other way around. "We've seen Android malware that attempts to infect Windows systems before," the firm said in a post on its company blog. ...
Read more

Financial Malware has Become More Advanced and Sophisticated, Says NSS Labs (EN) | www.spamfighter.com
| 23-01-2014 | A report released recently by security firm NSS Labs highlights the most recent trends in banking malware which speaks about a great innovation which has taken place ever since NSS launched its last study on financial sector in Q1-2013. Ken Baylor, Research VP of NSS Labs unveiled the...
Read more

Venafi Predicts: 100 Percent of Mobile Malware Will Misuse Compromised Digital Certificates by the End of 2014 (EN) | productivityapps.itbusinessnet.com
| 22-01-2014 | SALT LAKE CITY, UT (Marketwired) 01/22/14 Venafi, the leading provider of Next-Generation Trust Protection, today released predictions for cybersecurity market trends in 2014. Key predictions provide insights into how cybercriminals and nation-backed operators will continue to exploit...
Read more

Most SMB employees in fear of identity theft in the workplace (EN) | www.net-security.org
| 22-01-2014 | The smaller business workplace has transformed into a mobile-enabled, agile, and satisfying environment, but one where the workforce is acutely aware and worried about the threat to their personal online information, an independent study funded by GFI Software has revealed. ...
Read more

Android-malware onderschept telefoongesprekken (NL) | www.security.nl
| 23-01-2014 | Een kwaadaardige Android app die zich als update voor het besturingssysteem voordoet blijkt in werkelijkheid sms-berichten en telefoongesprekken te onderscheppen, waardoor gebruikers niet meer door bepaalde telefoonnummers te bereiken zijn.De app zou via "onbetrouwbare marktplaatsen" ...
Read more

Censuurfaal zorgt voor grootste internetstoring ooit (NL) | webwereld.nl
| 23-01-2014 | Oh ironie: China's Great Firewall stuurt internetters juist richting anti-censuurproxy's. Een foutje of de grootste DDoS-aanval ooit? AdvertentieVoor zo'n 500 miljoen Chinezen was dinsdag acht uur lang het internet stuk, hoogstwaarschijnlijk de grootste storing ooit. Terwijl de Chines...
Read more

Power Utility Substations At Risk (EN) | www.darkreading.com
| 21-01-2014 | Nearly 30 security vulnerabilities so far have been found in products using a popular ICS/SCADA communications protocol, prompting about half of the affected vendors to patch their products, and at least one vendor to pull its affected software from the market and urge its customers t...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish