Under construction

New design coming soon!

CIC News engine statistics

CIC News for 27-01-2014 contains 38 articles

CIC News update contains 38 articles for today, have fun reading.

African banks investigated for cybercrime complicity | news.idg.no
| 24-01-2014 | Details are emerging about investigations into African banks that allegedly have been complicit in the growing incidence of cybercrime in the region.Details are emerging about investigations into African banks that allegedly have been complicit in the growing incidence of ...
Read more

DEITY starts process for cyber security centres, training (EN) | www.business-standard.com
| 26-01-2014 | The Department of Electronics and IT has initiated the process for setting up of two critical cyber security centres and launching programme for human resource development in the emerging field. The Cabinet eight months ago had cleared the National Cyber Security policy, w...
Read more

Michaels Stores May Have Been Latest Victim Of Data Breach (EN) | americanlivewire.com
| 26-01-2014 | Michaels stores says that it is investigating a potential data breach that may have put some of its customer’s credit and debit cards at risk. This potential breach of information security was targeted around the company’s customer account information. In the wake of other major r...
Read more

Target data breach fuels drive for new laws (EN) | www.startribune.com
| 26-01-2014 | WASHINGTON â€" Computer hackers’ massive theft of ­customer data from Target Corp. could break a near-decade long congressional gridlock over proposals to better protect credit and debit card information. Hearings in February will examine not only the details of how cyber thieves s...
Read more

Why hackers are difficult to track (EN) | articles.timesofindia.indiatimes.com
| 26-01-2014 | PUNE: The strictly virtual nature of underground hacking groups makes it difficult for cops to trace their physical whereabouts, said experts. These groups are in thousands and deal in people's credentials, which means that when paid, they could leak almost everything online, be it ba...
Read more

A Data Breach Might Not Be Target's Biggest Problem (EN) | www.dailyfinance.com
| 25-01-2014 | It is now estimated that last month's massive Target data breach may have affected more than 100 million customers, with stolen information dating back a decade. Over the next few weeks or months, new facts will emerge as to what exactly happened and why.However, this data breach migh...
Read more

Critical infrastructure vulnerable to attack, warns cyber security expert (EN) | www.gsnmagazine.com
| 26-01-2014 | “It has been proven routinely in one security test after another that any hacker with a bit of skill and time can take control of equipment on safety-critical networks,” said Andrew Ginter, vice president of industrial security at Waterfall Security. Waterfall, of Calgary, CA spec...
Read more

A hacker's story: Mitchell Frost explains his motivation (EN) | www.pcworld.com
| 26-01-2014 | In 2006, Mitchell Frost, then a 19-year-old college student at the University of Akron, used the school’s computer network to control the botnets he had created. Authorities say between August 2006 and March 2007, Frost launched a series of denial of service (DDOS) attacks against s...
Read more

Internet abuse is most definitely an 'in real life' problem (EN) | www.canada.com
| 26-01-2014 | With so much press recently, both in Canada and the United States, about how online bullying has led to suicide, often the discussions tend to be framed in terms of online versus “in real life.” This is also the case in many other discussions that happen when someone decides to pu...
Read more

FBI: US court websites went down due to “technical problems,” not DDOS (EN) | arstechnica.com
| 25-01-2014 | While the rest of us were fretting about the Gmail outage on Friday, lawyers and those involved in the United States judicial system were concerned that uscourts.gov and other federal courts’ sites had been hit by a distributed denial-of-service (DDOS) attack.Also suffering an outag...
Read more

Spear phishing against Microsoft, exposed law enforcement inquiries (EN) | securityaffairs.co
| 26-01-2014 | Attackers breached the email accounts of Microsoft staff, probably with a spear phishing attack, accessing to documents on law enforcement inquiries.Spear phishing attacks are within most insidious attacks for private companies and organizations, they are primarily caused for data bre...
Read more

Cyber insurance sales up 30% as hacker attacks on business soar (EN) | www.independent.ie
| 26-01-2014 | SALES of cyber insurance in Ireland have shot up by almost a third over the last three months as businesses rush to shield themselves against the rising threat of hacking attacks. More than half of Irish firms have been hacked over the last year, according to recent resear...
Read more

Seven Grafton teens arrested on felony witness intimidation charges for allegedly cyber-bullying the victim of a violent crime (EN) | www.boston.com
| 25-01-2014 | Seven Grafton teens have been arrested on felony witness-intimidation charges for allegedly harassing the 15-year-old victim of a violent crime, Grafton Police Chief Normand Crepeau, Jr. said.On Jan. 18, the victim’s mother told police of the alleged harassment of her child, Crepeau...
Read more

Serving malware through Ad-networks (EN) | www.ciol.com
| 27-01-2014 | Cyber Criminals have been using the medium of advertisements, either to peddle their wares or target unsuspecting victims with scams Features | by Govind Rammurthy NEW DELHI, INDIA: Serving malware instead of news is news in itself. Recently, Yahoo! servers were found to be serving a ...
Read more

Much more than Outage: 2013 DDoS Market Review (EN) | blog.radware.com
| 27-01-2014 | What comes to mind when the term “Denial of Service” is mentioned? Probably website outage.This image has been crafted over the last couple of years with media, analysts and bloggers all talking about Denial of Service attacks, but mostly when the result of the DoS attack caused a...
Read more

First Mobile Malware Turns 10 (EN) | www.gadget.co.za
| 27-01-2014 | 2014 marks the 10th anniversary of Cabir, the world’s first mobile phone malware. Fortinet’s FortiGuard Labs takes a stroll down virus memory lane. From Cabir to FakeDefend, the last decade has seen the number of mobile malware explode. In 2013, Fortinet’s FortiGuard Labs has se...
Read more

Kaspersky Labs Warns against Downloading Malware that Disguises as WhatsApp for PC (EN) | www.morningnewsusa.com
| 26-01-2014 | It should be a common knowledge to all of us that malware now usually comes in the form of non-suspicious files to deceive users into downloading it. In many cases, seemingly legit files are downloaded, leading to compromising the user’s PC.Kaspersky Labs has always been among the s...
Read more

A New Malware Has Been Found To Infect Phones While They're Connected To PCs (EN) | www.androidheadlines.com
| 25-01-2014 | We all at one point or another, have connected our phones to our computers to transfer a file, to root our devices, or to simply browse our system in a manner we are used to seeing. People, myself included, view this way as the most secure way of transferring files, especially since w...
Read more

Google to give away $2.7 mn at Pwnium hacking contest (EN) | www.business-standard.com
| 26-01-2014 | Company will also pay $150,000 for providing an exploit to be able to persistently compromise an HP or Acer Chromebook, i.e. hacking the device to retain control even after a reboot Search engine giant Google will offer $2.7 million to researchers who can hack its browser-...
Read more

Malware threatens small businesses' data, livelihood (EN) | www.thonline.com
| 26-01-2014 | The first thing Mark Wilson noticed was a drag on the computer system that he and five others used at his company. "Everything was just crawling," said Wilson, president and co-owner of Apex Cary Insurance in Apex, N.C. Wilson called Raleigh, N.C.-based Petronella Technology Group, wh...
Read more

Cyber attacks on Gwent websites "inevitable" ahead of NATO summit says chief constable (EN) | www.southwalesargus.co.uk
| 27-01-2014 | ORGANISED protests and cyber attacks on council and police websites are "inevitable" in the run-up to Gwent hosting the NATO summit this September, according to the Chief Constable of Gwent Police. Two-thirds of Britain's police support units are set to descend on Newport to beef up s...
Read more

62% have experienced attempted cybercrime â€" survey (EN) | www.humanipo.com
| 27-01-2014 | A survey by Kaspersky Labs and B2B International has revealed 62 per cent of respondents experienced at least one incident of cybercriminals attempting to steal financial information. Kaspersky said the convenience of online shopping and banking services introduce worrying security ri...
Read more

African banks investigated for cybercrime complicity | news.idg.no (EN) | news.idg.no
| 24-01-2014 | Details are emerging about investigations into African banks that allegedly have been complicit in the growing incidence of cybercrime in the region.Details are emerging about investigations into African banks that allegedly have been complicit in the growing incidence of ...
Read more

Michaels crafts store admits possible data breach (EN) | www.cbc.ca
| 25-01-2014 | Michaels, the biggest U.S. arts and crafts retailer, said on Saturday that it is working with federal law enforcement officials to investigate a possible data breach on its systems that process payment cards."We are concerned there may have been a data security attack on Michaels that...
Read more

Korea's historic data breach: Analysis (EN) | www.arirang.co.kr
| 27-01-2014 | Korean regulators have vowed harsh corporate penalties for data theft, as angry customers have been swamping credit card offices for the past week after 20 million people had their financial information stolen. Last week's data leak was the nation's largest-ever of private...
Read more

Chrome extensions targeted for malware (EN) | www.itweb.co.za
| 27-01-2014 | Criminals are targeting Google's Chrome Web browser, buying up popular plugins and then modifying them to display ads, track users, and deliver malware.This is a worrying development for enterprises, which may find their users and data exposed to malware, despite exercising control ov...
Read more

Whitepaper: How Big Data fights back against APTs and malware (EN) | www.net-security.org
| 27-01-2014 | This whitepaper is essential reading for CEOs, CTOs, Network Security Professionals, and everyone else who needs to know why “Big Data = Big Protection” in today’s threat landscape. APTs and malware threats are getting harder to spot, as adversaries step up their att...
Read more

Cyber security project boosted (EN) | www.lep.co.uk
| 27-01-2014 | A cyber security specialist has secured £65,000 for research and development to fund projects to expand its services to combat internet crime. With cyber security breaches costing the UK economy £27 billion a year, Xyone Cyber Security plans to use the funding to set up a dedicated ...
Read more

Beveiligingslek in Thunderbird al twee jaar genegeerd (NL) | www.security.nl
| 27-01-2014 | Een beveiligingslek in de e-mailclient Thunderbird waardoor links in e-mailberichten niet door de externe webbrowser maar door Thunderbird zelf worden geopend wacht al meer dan twee jaar op een patch. De kwetsbaarheid werd door beveiligingsonderzoeker Mike Cardwell ontdekt en aan Mozi...
Read more

Security Still Seen as Major Concern (EN) | www.smartmeters.com
| 27-01-2014 | In a new survey, 61 percent of energy executives polled say they consider security to be a significant problem for the smart grid, and nearly two-thirds believe that the grid is not prepared for security threats. However, only eight percent of utilities plan to invest more than $5 mil...
Read more

Types of Malware Targeting Point of Sale Systems (EN) | www.truedigitalsecurity.com
| 27-01-2014 | In light of the recent Target event, there has been an uptick in activity around malware that specifically targets Point of Sale systems. The most common ones that seem to be referenced are the following:BlackPOS: Affects Windows-based Point of Sale systems. The attack essentially sit...
Read more

Microsoft houdt vinger aan de pols bij XP (EN) | www.automatiseringgids.nl
| 27-01-2014 | Microsoft houdt ook na 8 april op alle systemen met Windows XP gereedschap actief om ze te controleren op besmetting. Microsoft houdt Malicious Software Removal Tool (MSRT) van Windows XP actief en actueel met behulp van Windows Update voor alle pc's waar het besturingssys...
Read more

Speelgoedfabrikant Hasbro verspreidde malware via website (NL) | www.security.nl
| 27-01-2014 | Criminelen hebben de afgelopen weken meerdere keren malware via de website van speelgoedfabrikant Hasbro verspreid. De aanvallers, die toegang tot Hasbro.com hadden, plaatsten een verwijzing naar een exploitkit die via lekken in Java malware op de computers van bezoekers probeerde te ...
Read more

How the threat of cybercrime is heightened for Main Street (EN) | www.cnbc.com
| 27-01-2014 | The data breaches at Target and Neiman Marcus have expanded, as millions of consumers' personal information has been stolen. Large retailers naturally are paying more attention to securing data, but the threat may be heightened for small to midsized businesses. Smaller ventures are pa...
Read more

Technical Glitch Cripples US Federal Courts (EN) | www.techweekeurope.co.uk
| 27-01-2014 | The FBI says Friday’s downtime was caused by a technical issue, while the European Cyber Army takes credit for DDoSThe US federal court system suffered from technical issues on Friday which temporarily blocked access to websites, electronic document filing and public rec...
Read more

Prolexic Sponsors Ovum White Paper: "Delivering Effective DDoS Protection" (EN) | virtualization.sys-con.com
| 27-01-2014 | FORT LAUDERDALE, Florida, Jan. 27, 2014 /PRNewswire/ -- Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) protection services, today announced that UK industry analyst firm OVUM has published a white paper sponsored by Prolexic. A complimentary copy of "...
Read more

'NSA bespioneert data verzameld door iPhone- en Android-apps' (NL) | www.nu.nl
| 27-01-2014 | De NSA en de GCHQ verzamelen data die verstuurd wordt door smartphone-apps, zoals Angry Birds. Dat melden onder meer The Guardian en de New York Times, op basis van documenten die ze van Edward Snowden ontvingen.Uit de documenten blijkt dat data zoals leeftijd, gesla...
Read more

McAfee vreest cyberaanvallen Sotsji (NL) | www.volkskrant.nl
| 27-01-2014 | De Olympische Winterspelen in Sotsji worden bedreigd door een golf cyberaanvallen door hackers. Daarvoor vreest veiligheidsbedrijf McAfee. Volgens het bedrijf zijn politiek en religieus gemotiveerde criminelen en jihadisten erop uit om de digitale infrastructuur rond de Spelen plat te...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish