Under construction

New design coming soon!

CIC News engine statistics

CIC News for 02-02-2014 contains 31 articles

CIC News update contains 31 articles for today, have fun reading.

Tor-based ChewBacca botnet is infecting POS stealing Credit Card data (EN) | securityaffairs.co
| 01-02-2014 | Researchers at RSA discovered a new variant of Tor-based malware ‘ChewBacca’, is able to infect Point-of-Sale stealing Credit Card data.The recent data breachesat US retailersTarget,Neiman Marcus and Michaelshave raised the alert level ofmalware-based attacks against POS systems. ...
Read more

Stealthy Botnet Bug Infects Macs, PCs, Linux Machines (EN) | www.tomsguide.com
| 29-01-2014 | The more complex software gets, the more complex malware becomes in return, as a new Trojan that infects Windows PCs, Macs and Linux boxes alike demonstrates.The Trojan, dubbed "HEUR:Backdoor.Java.Agent.a" by researchers at Kaspersky Lab in Moscow, is written entirely in Java, the ind...
Read more

Researchers uncover months-old POS malware botnet (EN) | www.net-security.org
| 31-01-2014 | With the Target and Neiman Marcus breach being all over the news in the last few weeks, the topic of malware that collects card data directly from Point-of-Sale devices has received renewed interest. The PoS malware used in the former has been identified as a modified version of the B...
Read more

Newly released Web based DDoS/Passwords stealing-capable DIY botnet generating tool spotted in the wild (EN) | www.webroot.com
| 30-01-2014 | Driven by the never ending supply of newly released DIY (do it yourself)underground market releases, in combination with the systematically rebooted life cycles of releases currently in circulation, cybercriminals continue actively developing new cybercrime-friendly malware generating...
Read more

Kaspersky identifies lethal cross platform Java DDoS botnet (EN) | www.theeasterntribune.com
| 30-01-2014 | PERTH: A botnet malware has recently been discovered by the Kaspersky penetration testing gurus when they received a complex system for analysis. This malware owns the capability of affecting systems which run on Mac OS X, Linux and Windows and have Oracle’s Java software framework ...
Read more

More card-stealing malware found (EN) | www.zdnet.com
| 30-01-2014 | Hot on the heels of the Target point of sale credit card breach,researchers at RSA have uncovered a botnet of credit card data-stealing malware running on point of sale systems.The actual bot code is called ChewBacca and was described in detail recently by Kaspersky Lab. A...
Read more

Panel: Cyber just one part of securing critical infrastructure (EN) | www.federalnewsradio.com
| 31-01-2014 | When Hurricane Sandy blew through New York and New Jersey in the fall of 2012, power and transportation systems were crippled for days and weeks.That, in part, fueled the government's efforts to make these systems, known as critical infrastructure, more "resilient" â€" better able to ...
Read more

Growing Threat Environment Spurs Security Software (EN) | news.investors.com
| 31-01-2014 | The spiraling growth of the Internet has helped companies strengthen their relations with customers and vendors. It has also provided a haven for criminal hackers seeking new ways to steal customer credit card numbers, bank account numbers and other sensitive data.Recent breaches at b...
Read more

NIST's finalized cybersecurity framework receives mixed reviews (EN) | www.csoonline.com
| 31-01-2014 | January 31, 2014 â€" CSO â€" There has never been a successful catastrophic cyberattack on North America's critical infrastructure (CI) â€" yet. The National Institute of Standards and Technology's (NIST) Cybersecurity Framework 1.0, to be issued Feb. 13 in response to an ...
Read more

Security Is Key To Business Transformation: Cyberoam (EN) | www.crn.in
| 31-01-2014 | The year 2013 should be remembered as the stepping stone for things to come and for the disruptive trends and technologies that will become more entrenched and widespread. While the role of ICT grew more dynamic, the world also got ambushed by a barrage of sophisticated cy...
Read more

How Intel Plans To Secure Android Devices (EN) | www.lifehacker.com.au
| 31-01-2014 | Securing Android devices isn’t quite as fiddly as trying to manage iOS, but still lacks options compared to the well-established principles for desktop PCs and laptops. At this year’s Consumer Electronics Show, Intel outlined plans to make Android devices more manageable, but just...
Read more

RSA ontdekt ChewBacca-trojan voor stelen van creditcarddata (EN) | tweakers.net
| 31-01-2014 | Beveiligingsonderzoekers van RSA hebben op apparatuur waarop creditcardbetalingen worden verwerkt de zogenaamde ChewBacca-trojan gevonden. De malware doorzoekt het werkgeheugen naar bepaalde patronen en is voorzien van keylogging-functionaliteit.De geheugenscanner van de ChewBacca-tro...
Read more

Disaster recovery ontbrak bij Exacthost (EN) | www.computable.nl
| 31-01-2014 | De storing bij Exacthost had minder omvangrijk kunnen zijn als het hostingbedrijf een disaster recovery-omgeving had gehad. Ja, er vielen hard disks van EMC uit, maar dit waren er twee en niet tien zoals Exacthost eerder beweerde. Nadeel was wel dat deze twee schijven allebei in dezel...
Read more

2013 Druk Jaar Voor Nationaal Cyber Security Centrum (NL) | www.nutech.nl
| 30-01-2014 | HetNationaal Cyber Security Centrum (NCSC) heeft in 2013 1885 beveiligingsadviezen gegeven, met name door de groei van DDoS-aanvallen op banken. Dat meldt het NCSC. Bij een DDoS-aanval worden de servers overbelast met verzoeken waardoor websites of diensten offline gaan.Het NCSC heeft...
Read more

Internationale bedrijven vliegen op Israëlische cyber​​security (NL) | itrade.gov.il
| 30-01-2014 | De Israëlische cyber-security-industrie is in de afgelopen 3 jaar enorm gegroeid van enkele tientallen bedrijven naar meer dan 200. Deze groei heeft het interesse van de wereld gewekt en trekt als gevolgbuitenlandse bedrijven aan om naar de mogelijkheden in Israël te kijken. Een van...
Read more

Factsheet Office macro's (NL) | www.ncsc.nl
| 30-01-2014 | De kans is groot dat in uw organisatie Microsoft Office wordt gebruikt. Eén van de vele functies die Office biedt is die van macro's. Daarmee kunnen gebruikers taken automatiseren, maar virusschrijvers gebruiken het ook om in onschuldig ogende documenten malware te verstoppen. Het NC...
Read more

12 cybercimes a second: Beware rise in mobile app fraud, Russian anti-hacking czar warns (EN) | rt.com
| 30-01-2014 | Every second at least 12 internet users in the world fall victim to cyber criminals and the number keeps increasing every year, it has been revealed. A surge in viruses targeting mobile apps is a new disturbing trend in cyber-attacks. A significant number attacks â€" 19 percent â€" ta...
Read more

Former Vinton Woman Charged with Stealing from Care Facility (EN) | www.kcrg.com
| 31-01-2014 | VINTON, Iowa -- A Des Moines woman faces several theft and burglary charges for credit card fraud and stealing from care facility residents.According to the Benton County Sheriff's Office, Tammy A. Hearn, 47, formerly of Vinton, has been charged with first-degree theft, se...
Read more

Online Cyber Crime And Bullying Is Now Becoming A Daily Routine Phenomenon In The Gambia!!! (EN) | www.freedomnewspaper.com
| 01-02-2014 | When Jallow Kanilai lamented about Gambia's moral bankruptcy in his New Year interview with Kebba Dibba, we agree in tandem with him. But JK has woefully failed to convincingly articulate the main reasons behind the nation's morality deficit. Moral bankruptcy is a recipe for gross ind...
Read more

Nigerian fraud cases in Pune: Cops to probe Tiwari’s role (EN) | www.dnaindia.com
| 01-02-2014 | Considering the possibility of Pune-based hacker Amit Tiwari having some clues regarding the prevalent Nigerian frauds in the city, has led the Pune Cyber Crime Cell (CCC) officials to approach the Central Bureau of Investigations (CBI), Delhi, to get information about Tiwari and the ...
Read more

'Nitro cyber attacks, a threat to chemical companies' (EN) | timesofindia.indiatimes.com
| 01-02-2014 | VISAKHAPATNAM: "The latest emerging threat in cyber space is the deadly Nitro attack targeting chemical and defence companies to steal information," P Krishna Sastry, fraud management and digital forensics head of Tata Consultancy Services (TCS), said on Friday. Participating in the n...
Read more

Dear Nigerian internet users, have y'all seen the proposed Cyber Crime bill? (NL) | lindaikeji.blogspot.nl
| 31-01-2014 | How many of you internet users in Nigeria have seen the proposed Cyber-Crime bill which is before the House of Reps? For insulting someone online, you can get a 5year jail term. Like, for real? I don't understand why this government is not focusing on important things. They are now tr...
Read more

Indian cyber security expert appointed as Special Advisor to UN (EN) | zeenews.india.com
| 31-01-2014 | New Delhi: Renowned aerospace and cyber security expert Vivek Lall has been appointed Special Advisor to United Nations to help steer the multi-nation body frame a policy and ensure its implementation in the area of broadband and associated cyber security issues. Lall, who...
Read more

Arizona looks at cyber harassment bill, but will it trample free speech, business rights? (EN) | www.bizjournals.com
| 30-01-2014 | A bipartisan group of Arizona lawmakers have proposed a bill that would make it a crime to forward naked or sexual pictures of someone without their written consent. The measure is aimed at cyber bullies and those posting or texting embarrassing images of others.Legal issues arise sur...
Read more

Cyber Bullies Target Kenyas Womes (EN) | www.iede.co.uk
| 30-01-2014 | NAIROBI, Jan 30 (IPS) - For a seasoned politician like Kenyas Rachael Shebesh, few things hold her back from rallying for womenas rights. But when it comes to furthering her platform on social media - it is the one thing that this Nairobi County womenas representative avoids.Like all ...
Read more

Malware verspreid via eHow.com en Livestrong.com (NL) | www.security.nl
| 02-01-2014 | Aanvallers hebben de websites eHow.com en Livestrong.com gehackt en voorzien van kwaadaardige code waardoor er geprobeerd werd om bezoekers met malware te infecteren. Op beide websites werd een iframe aangebracht die exploitcode vanaf een ander domein laadde.De exploitcode maakte misb...
Read more

Chrome Geeft Waarschuwingen Bij 'Gekaapte' Instellingen (NL) | www.nutech.nl
| 01-02-2014 | Google waarschuwt gebruikers van de Windows-versie van Chrome voor malware die de veiligheidsinstellingen van de browser aanpast. De browser zal vanaf nu automatisch een melding geven wanneer het denkt te herkennen dat de instellingen zijn aangepast door een script, meldt Google op zi...
Read more

Valse e-mail PostNL: 'uw pakket is beschikbaar' (NL) | www.opgelicht.nl
| 30-01-2014 | Pas op voor een valse e-mail, verstuurd uit naam van PostNL. Het bericht gaat over Track & Trace, het volgen van een pakket of zending. De Fraudehelpdesk waarschuwt voor deze zogeheten malwaremail. Logo misbruiktHet bericht heeft als onderwerp 'uw pakket is besch...
Read more

Cybercriminelen Stelen Duizenden Creditcardnummers In Elf Landen (NL) | www.nutech.nl
| 31-01-2014 | Cybercriminelen hebben in elf landen gegevens over zo'n 49.000 creditcards weten te stelen, door malware op kassa's te installeren. Dat stelt het Amerikaanse beveiligingsbedrijf RSA vrijdag. De hackers sloegen in ieder geval in de VS, Rusland, Canada en Australië toe. Of ook Europese...
Read more

Nederland betrokken bij actie tegen beruchte SpyEye-maker (NL) | webwereld.nl
| 31-01-2014 | Team High Tech Crime deed onderzoek naar supercybercrimineel, die ook Nederlandse bankklanten beroofde. Trots meldt de Nederlandse politie dat het betrokken was bij een internationaal onderzoek naar het brein achter de beruchte banking trojan SpyEye. Aleksandr P., bij de FBI gewoon vo...
Read more

PayPal ontkent social engineering van medewerker (NL) | www.security.nl
| 30-01-2014 | PayPal ontkent dat een medewerker van de betaaldienst zich heeft laten social engineeren en gegevens van een klant heeft verstrekt, die later werden gebruikt om een bijzondere Twitternaam te stelen. GoDaddy, dat ook bij het incident was betrokken, heeft wel bekend dat een werknemer we...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish