Under construction

New design coming soon!

CIC News engine statistics

CIC News for 24-01-2014 contains 17 articles

CIC News update contains 17 articles for today, have fun reading.

Hollandse webwinkels dagenlang DDoS-doelwit (NL) | webwereld.nl
| 23-01-2014 | Fikse problemen bij de bereikbaarheid van honderden Hollandse webshops. De oorzaak blijkt een dagenlange en gerichte DDoS-aanval. AdvertentieOpnieuw DDoS-problemen in Nederland. Een gerichte aanval op hostingprovider FXW, onderdeel van Flexwebhosting, heeft sinds zaterdagavond 450 web...
Read more

Computer security gets serious: Cisco report identifies Java software as major risk factor (EN) | www.smartcompany.com.au
| 30-11-2013 | Network giant Cisco Systems released its 2014 Annual Security Report last week, which should make sobering reading for every business manager and owner. If you’re looking at a career change, the survey even suggests a possible new job.Over two million of Cisco’s customers were exa...
Read more

Happy 10th Birthday Mobile Malware (EN) | www.mspnews.com
| 23-01-2014 | In this informative piece we’ll discuss the evolution of mobile malware threats in the past and what we can look forward to in the future.2004: The First Attempt!Cabir was the world’s first mobile worm. Designed to infect the Nokia Series 60, its attack resulted in the word “Car...
Read more

Future Shock: The Internet of Compromised Things (EN) | www.informationweek.com
| 23-01-2014 | It's doubtful that the average consumer would be aware that his or her refrigerator was participating in a DDoS attack. Even fewer would have any idea how to stop it.If it contains software, it can be hacked. If it is connected to the Internet, it can be hacked remotely. This is the u...
Read more

Activate anti-cybercrime laws! (EN) | www.saudigazette.com.sa
| 23-01-2014 | JEDDAH â€" A number of youths in Jeddah have called for activating anti-cybercrime laws especially in instances where personal insults are made on social networking websites. There were also calls for instilling awareness through the media and establishing curricula in universities ab...
Read more

New Android malware disconnects calls, intercepts texts of victims (EN) | www.scmagazine.com
| 22-01-2014 | Researchers have discovered a new Android malware family that disguises itself as a security app, and intercepts the incoming texts and calls of victims.According to Hitesh Dharmdasani, a malware researcher at FireEye who blogged about the threat on Tuesday, six variants of the Androi...
Read more

SCADA Security Basics (EN) | www.cyberoam.com
| 23-01-2014 | Supervisory control and data acquisition (SCADA) networks contain computers and softwares that perform critical tasks and provide essential services within the critical infrastructure. SCADA systems are considered to be backbone of the nation. Industrial Control Systems (ICS) requires...
Read more

Europe and its battle against cyber crime (EN) | www.international.to
| 24-01-2014 | The European Union is raising concern over cyber attacks. In February 2013 the European Commission published a cyber security strategy called “The Strategy”. BENELUX, EUROPE, , January 24, 2014 /EINPresswire.com/ -- 2013 was the year for new cyber security laws and regulations acr...
Read more

Mobile caution crucial as new Android malware intercepts phone calls (EN) | www.cso.com.au
| 24-01-2014 | Security threat reports are be finding mobile malware to be an ongoing and growing threat, but malware researcher Hitesh Dharmdasani has some simple advice for those concerned about getting infected by nasty, insidious, and occasionally downright surprising malware.“The best way to ...
Read more

US FBI Warns Retailers of Further Cyber Attacks Similar to Target Data Breach (EN) | www.ibtimes.co.uk
| 24-01-2014 | The US Federal Bureau of Investigation (FBI) has warned the country's retailers of further cyber attacks following the massive data breach at Target Corp, the third largest retailer in the country.The FBI issued a confidential report last week to retailers detailing risks ...
Read more

Biomat USA Employee Sentenced on Identity Theft Charges (EN) | www.fbi.gov
| 23-01-2014 | Michael J. Moore, United States Attorney for the Middle District of Georgia, announced that Bridgette Williams, aged 31, of Macon, Georgia, was sentenced by Chief U.S. District Court Judge C. Ashley Royal on Thursday, January 23, 2014, to serve six months’ imprisonment in a case of ...
Read more

Shape-shifting tech 'defeats hacks' (EN) | www.bbc.co.uk
| 22-01-2014 | A technology that constantly changes websites' code to defeat hackers has been unveiled by a US start-up. Shape Security says its product works with the HTML, JavaScript and CSS languages, transforming a site's code into a "moving target" to prevent cybercriminals from carrying out sc...
Read more

Southern Times-Cybercrime a catastrophic threat to Africa (EN) | www.southerntimesafrica.com
| 23-01-2014 | Cybercrime is one of the biggest challenges in our hyper-connected age and it is putting Africa’s security under threat. Social media platforms, smart phones and increasing reliance on credit cards are making the mother continent â€" Africa increasingly vulnerable to cybercrimes. Cy...
Read more

DDoS: The Next-Generation Solution (EN) | www.bankinfosecurity.com
| 23-01-2014 | In 2013, attackers proved that sophisticated DDoS attacks could be launched as effective disruptions and distractions. What are the evolving solutions that now help organizations mitigate these strikes?Bryant Rump, senior solutions engineer at Neustar, has spent years tracking the evo...
Read more

App Pays Attention to Phone’s Behavior to Spot New Malware (EN) | www.technologyreview.com
| 23-01-2014 | A mobile security startup is launching software that learns how your smartphone behaves in order to better spot and stop new security threats before they can cause harm or spread to other handsets.Today, San Francisco-based Zimperium unveiled its zIPS Android app (the “IPS” stands...
Read more

Malware demands ransom from businesses (EN) | www.startribune.com
| 23-01-2014 | Raleigh, N.C. â€" The first thing Mark Wilson noticed was a drag on the computer system that he and five others used at his company. “Everything was just crawling,” said Wilson, president and co-owner of Apex Cary Insurance in Apex, N.C. Wilson called Raleigh-based Petronella Tech...
Read more

Data Breach Wall of Shame: 2013′s Highlights and Lessons (EN) | www.natlawreview.com
| 22-01-2014 | Since 2009, the HHS Office for Civil Rights (“OCR”) has posted all large data breaches â€" those that involve 500 or more individuals â€" online on its so-called“Wall of Shame.” In 2013, 160 large data breaches were reported to OCR and posted on the Wall of Shame. Taken togeth...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish