Under construction

New design coming soon!

CIC News engine statistics

CIC News for 03-02-2014 contains 48 articles

CIC News update contains 48 articles for today, have fun reading.

Building defence out of disaster; learning from the Target breach (EN) | www.information-age.com
| 31-01-2014 | Between November 27 and December 15 last year, unknown attackers breached the network of US retail giant Target and stole the debit and credit card data of 40 million account holders, including an additional 70 million accounts with personally identifying information (PII).More than a...
Read more

RSA: Malware Impacts 45 Retailers (EN) | www.bankinfosecurity.com
| 31-01-2014 | Security vendor RSA has uncovered a point-of-sale malware operation originating from the Ukraine that has stolen payment card and personal data from 45 small and midsize retailers. Some 50,000 cards were affected, RSA says.The malware used in these attacks is less sophisticated than w...
Read more

Popular antivirus tools for OS X tested, again (EN) | reviews.cnet.com
| 31-01-2014 | Recently Mac security researcher and analyst Thomas Reed put to the test a number of popular antivirus tools for OS X, to see which perform the best for detecting known malware threats for OS X. This effort follows similar assessments done by Reed in past years, but has been repeated ...
Read more

Android banking malware with a twist in the delivery (EN) | nakedsecurity.sophos.com
| 31-01-2014 | In baseball (or so I am told), it's a curveball or a knuckleball.In cricket, an altogether more slippery and treacherous game, it's a googly or a doosra.You're expecting the ball to come at you in a predictable direction.But a hidden twist in the action brings the onslaught from anoth...
Read more

Pwn2Own hack contest puts record $645K on prize table (EN) | www.computerworld.com
| 31-01-2014 | Hewlett-Packard's Zero Day Initiative (ZDI) yesterday spelled out the rules for its March hacking contest, Pwn2Own, which will put two-thirds of a million dollars in prize money on the table for researchers who can hack the biggest browsers and most popular plug-ins.ZDI is HP's bug-bo...
Read more

PoC mobile malware records swipes on touch screen smartphones (EN) | www.net-security.org
| 31-01-2014 | A security researcher has developed proof-of-concept malware capable of capturing screenshots and finger swipes on mobile devices, and is set to demonstrate his creation at the RSA Conference in San Francisco in February. As users inexorably switch from computers to mobile...
Read more

Researcher Creates Malware to Captures Every Tap on Your Smartphone or Tablet (EN) | www.ibtimes.co.uk
| 31-01-2014 | While some believe that voice is the future for computer interfaces, for the moment and the foreseeable future touch will be the way most people interact with their computing devices, be it smartphones, tablets and - increasing â€" touchscreen laptops and PCs.This trend led one resear...
Read more

Researcher to demo hack for logging Android, iOS touchscreen movements (EN) | www.scmagazine.com
| 30-01-2014 | At next month's RSA Conference, a security researcher will demo a hack that could allow an attacker to capture all the touchscreen movements a user makes on their Android or iOS device. According to Neal Hindocha, a senior security consultant at Trustwave, the “touchlogging” attac...
Read more

New Trojan targets Android, infects 350K devices (EN) | www.gmanetwork.com
| 31-01-2014 | Owners of mobile devices running Google's Android operating system were warned against a new Trojan that launches in the early loading stage and resides in the machine's memory. Russian anti-virus company Doctor Web said the malignant program is operating on more than 350,000 mobile d...
Read more

10,000+ UK systems affected by ICEPOL Trojan ransomware (EN) | www.net-security.org
| 31-01-2014 | At least 10,331 successful installs of ICEPOL Trojan ransomware took place in the UK last year.Bitdefender’s Cybercrime Investigation Unit analysed the disk images of the servers used to distribute ICEPOL Trojan in cooperation with the Romanian National Police. The serve...
Read more

Yahoo reveals attempted hack against email accounts (EN) | www.theguardian.com
| 30-01-2014 | Yahoo has uncovered an attempt to hack into customers’ Yahoo Mail and ordered passwords be re-set on all affected accounts.The company said the security attack had been a “coordinated effort to gain unauthorized access to Yahoo Mail accounts” and said it had taken immediate acti...
Read more

Target: Cybercrooks used stolen vendor ID to hack into system (EN) | www.buffalonews.com
| 30-01-2014 | Target Corp. said Wednesday that the huge data breach it suffered late last year happened after an intruder stole a vendor’s credentials and used them to gain access to the company’s computer system.A Target spokeswoman wouldn’t identify the vendor or type of credentials because...
Read more

Tor-enabled malware stole credit card data from PoS systems at dozens of retailers (EN) | www.pcworld.com
| 30-01-2014 | Payment card data was stolen during the past three months from several dozen retailers that had their point-of-sale systems infected with a memory-scraping malware program called ChewBacca.The cybercriminal operation was investigated by antifraud researchers from RSA, the security div...
Read more

More than 350,000 Android devices impacted by bootkit trojan (EN) | www.scmagazine.com
| 29-01-2014 | A particularly clever trojan has been discovered operating as a bootkit on more than 350,000 Android mobile devices, including a small percentage in the United States, according to a Friday post by Russian anti-virus company Dr. Web.“To spread the trojan, which entered the Dr.Web vi...
Read more

Mobile Malware Captures Keystrokes and Screengrabs (EN) | threatpost.com
| 30-01-2014 | New proof-of-concept mobile malware logs keystrokes and captures screen-grabs on jailbroken iOS and Android devices in order to steal online log-in credentials and other sensitive information from targeted devices.In an interview with Threatpost, Trustwave senior security consultant N...
Read more

Over 11 million mobile devices are infected with malware (EN) | thefonecast.com
| 30-01-2014 | A new report from Alcatel-Lucent suggests that more than 11.6 million mobile devices are infected with malware. It’s based on figures from Alcatel-Lucent’s Kindsight subsidiary, which is able to measure the impact of network traffic.Mobile malware infections were said to be up by ...
Read more

Securing your website against hackers and malware (EN) | www.computing.co.uk
| 30-01-2014 | Securing your website against hackers and malware - Computing ondemand web seminar In today's 24/7 connected world, organisations need to support their customers with web-based services, such as online shopping and social media, to stay competitive. However, giving access to customers...
Read more

Web video service Vimeo hit by a denial-of-service attack (EN) | www.itv.com
| 31-01-2014 | Web video service Vimeo has been hit by a denial-of-service attack which caused the site to be unavailable to members and visitors to the site.In a statement, the firm said: On Friday, Vimeo fell victim to a denial-of-service attack that caused the site to be unavail...
Read more

Global view of attack traffic and security (EN) | www.net-security.org
| 31-01-2014 | Akamai released its latest report, which provides insight into key global statistics on attack traffic and security. Akamai maintains a distributed set of unadvertised agents deployed across the Internet that log connection attempts, which the company classifies as attack traffic. Bas...
Read more

Arbor Networks Reports Surge in DDoS Attacks (EN) | www.esecurityplanet.com
| 30-01-2014 | According to the results of a recent survey of 220 service provider, enterprise, cloud, hosting and other network operators worldwide, more than 70 percent of respondents operating data centers experienced DDoS attacks between November 2012 and October 2013, a significant increase fro...
Read more

Email hack opens door to swindlers (EN) | www.nzherald.co.nz
| 03-02-2014 | The email accounts of tens of thousands of Telecom Xtra customers have been hacked again, and this time there could be no end in sight to the deluge of spam from pranksters and fraudsters. Cyber hackers have attacked Yahoo, Xtra's email provider, resulting in malware-infested spam and...
Read more

What to do if hackers swipe your information (EN) | www.mydesert.com
| 01-02-2014 | Q: My credit card number was stolen in the Target data breach and I don’t know where to turn to for help.A: Up to 110 million people have been affected by the Target data breach. Because credit card numbers, email addresses and passwords were stolen, there are a number of things you...
Read more

User Suffers as GoDaddy Falls Prey to Social Engineering (EN) | www.toptechnews.com
| 30-01-2014 | GoDaddy told Naoki Hiroshima it was unable to help him solve the hijacking of his Web sites because it said he wasn't the "current registrant." Hiroshima said GoDaddy asked the attacker if it was OK to change account information, but never asked Hiroshima if it was OK when the attacke...
Read more

Spam drops in 2013, says security software firm (EN) | technology.inquirer.net
| 31-01-2014 | MANILA, Philippinesâ€"Could the days of spam or unwanted and unsolicited messages received through email be over?According to a study by international computer security software companyKaspersky, there was fewer number of spam messages in emails in 2013 compared to previous years.“T...
Read more

3 arrested for identity theft in metro Phoenix (EN) | ktar.com
| 30-01-2014 | PHOENIX -- Maricopa County Sheriff's Office detectives have arrested three people on identity theft charges, one in Mesa and two in Phoenix. Authorities said a 34-year-old man has been arrested for using stolen identification to get a job at a Mesa restaurant. The investigation began ...
Read more

Bangalore cops need trained staff, cash for dream cyber lab (EN) | timesofindia.indiatimes.com
| 03-02-2014 | BANGALORE: While information technology has become an average Bangalorean's lifeline in more ways than one, it has also brought with it the virus of cyber crime. But the city has to live with the reality that law-enforcing authorities lack the skills and personnel to combat hi-tech cr...
Read more

A new cybercrimes law (EN) | tribune.com.pk
| 02-02-2014 | After a long struggle by the civil society and digital rights activists, the Pakistani government is pushing forward a cybercrime act. The government is in the process of not only passing the Electronic Documents and Prevention of Cybercrimes Act, 2014 but would also be setting up a c...
Read more

Kerala plans steps against cyber crimes (EN) | www.thehindubusinessline.com
| 02-02-2014 | Kochi, February 2:Kerala Home Minister Ramesh Chennithala has said the Government will soon come out with a special scheme to check cyber crimes in the State.At a public function at Kochi on Saturday, Chennithala said the number of cyber crimes was increasing rapidly and that the laws...
Read more

'Hackers' to curb cyber crime (EN) | timesofindia.indiatimes.com
| 02-02-2014 | RANCHI: Identifying the potential of cyber threat in future warfare, a group of ethical hackers led by cyber buff and founder National Anti-hacking Group (NAG) Vineet Kumar in partnership with Jharkhand police, state Unicef and NGO Citizen foundation launched Cyber Peace Foundation he...
Read more

Cybercrime awareness drive for youth launched (EN) | timesofindia.indiatimes.com
| 02-02-2014 | AHMEDABAD: Mehsana police have started a drive to make students aware of cyber crime and how to prevent it. The aim is to keep the youngsters away from online criminal offenses. The drive being carried out under its Suraksha Setu project saw the cops organizing a seminar at Ganpat Uni...
Read more

S'pore retailers 'slow to adapt to cyber threats' (EN) | www.chinapost.com.tw
| 02-02-2014 | SINGAPORE--A spate of high-profile cybercrimes has targeted major retailers in the U.S. Despite this, many shops worldwide have been slow to adopt more sophisticated cyber security systems, experts say. The problem: Most retailers â€" and consumers â€" believe that cybercrime affects ...
Read more

New Icepol malware found as hacking 'industry' florishes (EN) | www.smh.com.au
| 03-02-2014 | Authorities in Romania have identified new malware that claims to be from police enforcing copyright and anti-porn laws.Called the Icepol trojan, the ransomware sends a message to victims accusing them of software piracy or downloading illegal porn, then locks the victim's computer an...
Read more

Bell Canada data breach (EN) | www.chch.com
| 02-02-2014 | Bell Canada revealed today that over 22,000 of its small business customers have had their account information compromised.Bell says one of its third-party suppliers based in Ottawa was hacked. User names and passwords were taken.A group that calls itself “Nullcrew” has taken cred...
Read more

Hackers use a trick to deliver Zeus banking malware (EN) | www.pcworld.com
| 02-02-2014 | Hackers found a new way to slip past security software and deliver Zeus, a long-known malicious software program that steals online banking details.Security company Malcovery Security, based in Georgia, alerted security analysts after finding that none of 50 security programs on Googl...
Read more

A closer look at why Android is the “Windows XP” of the mobile world (EN) | www.itproportal.com
| 02-02-2014 | If your ISP contracts with Kindsight's Identity Theft Protection service, you'll get an extra layer of protection for your home network without installing any software. The service watches for malware and other threats; if it finds anything, it notifies you and serves up a fix. It als...
Read more

Hacker claimt nieuwe iboot-exploitmethode voor Apple A5-soc (EN) | tweakers.net
| 02-02-2014 | Een hacker claimt een nieuwe iboot-exploit te hebben gevonden die benut zou kunnen worden op alle Apple-hardware met een A5- of A5X-processor. Mogelijk is de exploit ook te gebruiken op A6- en A7-processors van Apple.Hacker iH8sn0w, eerder betrokken bij een aantal jailbrea...
Read more

Canada’s New Way to Spy on You (at the Airport) (EN) | www.nextgov.com
| 31-01-2014 | Canada's electronic spy agency snooped on travelers who used free airport Wi-Fiâ€"and tracked them long after they left, according to newly released files provided by former NSA contractor Edward Snowden. And while our northern neighbors squabble over the legality of Communications Se...
Read more

NHS website hit by MASSIVE malware security COCKUP (EN) | www.theregister.co.uk
| 03-02-2014 | Hundreds of URLs on the NHS website have been flooded with malware by hackers and - at time of writing - it remains exposed.The security blunder was first spotted early this morning and an alert was posted on Reddit along with a list of 587 pages said to have been compromised on the w...
Read more

Hackers use '.enc' trick to deliver Zeus banking malware (EN) | www.computerworld.com
| 03-02-2014 | Hackers found a new way to slip past security software and deliver Zeus, a long-known malicious software program that steals online banking details. Security company Malcovery Security, based in Georgia, alerted security analysts after finding that none of 50 security programs on Goog...
Read more

Websites livestrong.com en eHow.com verspreiden malware (NL) | informatiebeveiliging.nl
| 02-02-2014 | De websites livestrong.com en eHow.net verspreiden via een ‘drive-by download’ malware. Deze malware maakt geïnfecteerde computers onderdeel van een botnet, wat wordt bestuurd via een Nederlandse server.Livestrong.com is een partner van de Livestrong Foundation (voorheen bekend a...
Read more

Cyber bullies target Kenyan women (NL) | www.rnw.nl
| 03-02-2014 | Cyber criminals have taken to targetting Kenyan women online. The lack of effective legislation and technical expertise has only made their work easier.By David Njagi, NairobiFor a seasoned politician like Kenya’s Rachael Shebesh, few things hold her back from rallying for women’s...
Read more

Hacker steals teacher's direct deposit paycheck: University says too bad so sad (EN) | blogs.computerworld.com
| 03-02-2014 | No matter how much you love your job, very few people work for free. About 80% of Americans receive their paychecks via direct deposit, but if a hacker manages to reroute your paycheck to his or her account, is that just tough luck and you don’t get paid? That’s basically what a f...
Read more

Server WWA de dupe van DDoS aanval (NL) | www.westerwoldeactueel.nl
| 03-02-2014 | WESTERWOLDE â€" Sinds gisteren heeft de website van WesterwoldeActueel last van DDoS aanvallen.DDoS staat voor Distributed Denial of Service. Met een DDoS aanval maken heel veel computers verbinding met één server. De server is het doelwit: de mensen achter de computers proberen dez...
Read more

Nieuwe malware slaat swipes op smartphones en tablets op (NL) | infosecuritymagazine.nl
| 03-02-2014 | Het is mogelijk de swipes en bewegingen op het scherm van een smartphone op te slaan. Hierdoor is het bijvoorbeeld mogelijk te achterhalen welke activiteiten een gebruiker op zijn smartphone uitvoert, maar met welk patroon gebruikers hun Android-smartphone ontgrendelen.Neal Hindocha, ...
Read more

Pwn2Own 2014: $150,000 for an "exploit unicorn" (EN) | www.net-security.org
| 03-02-2014 | There are a few new rules for this years' edition of the Pwn2Own hacking contest and a huge new prize for an "Exploit Unicorn worthy of myth and legend" - $150,000 for a system-level code execution on Windows 8.1 x64 on Internet Explorer 11 x64 with EMET bypass.The news ha...
Read more

Target Data Breach is Focus of Several Hearings at U.S. Capitol (EN) | www.kaaltv.com
| 03-02-2014 | The massive data breach at Target over the holiday season impacted millions of customers. This week, that breach is taking center stage at the nation's capitol. A series of hearings will discuss what went wrong, and the breach may even spark new laws to protect consumers. The three he...
Read more

New Mexico Data Breach Notification Bill Includes Payment Card Breach Provisions (EN) | www.bna.com
| 03-02-2014 | A data breach notification bill (H.B. 224) introduced in the New Mexico House Jan. 29 would require covered entities to notify affected individuals within 10 days of discovering a breach of their unencrypted personal information and notify the state attorney general within 10 business...
Read more

Cyberporn dens posing as call centers? (EN) | www.philstar.com
| 04-02-2014 | Kudos to the Philippine National Police (PNP) Anti-Cybercrime Group-7 for arresting the owners of a cybercrime operation in Barangay Guadalupe, Cebu City, which fronted as a “call center.” ACG-7 Senior Insp. Michael Vertudazo and his men rescued 13 people, including 7 women who we...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish