Under construction

New design coming soon!

CIC News engine statistics

CIC News for 05-02-2014 contains 39 articles

CIC News update contains 39 articles for today, have fun reading.

Target is going to fight credit card fraud with chip-enabled smart cards starting in 2015 (EN) | pulse2.com
| 04-02-2014 | Target Corporation is going to accelerate a program that involves credit card security in retail stores. Target chief financial officer John Mulligan said that the company is going to utilize chip-enabled smart cards and will roll out the technology in stores by early 2015, which woul...
Read more

Mobile Security Moving to Biometric Authentication: Gartner (EN) | www.eweek.com
| 04-02-2014 | Gartner recommends that security leaders evaluate biometric authentication methods where higher-assurance authentication is required. By 2016, 30 percent of organizations will use biometric authentication on mobile devices, up from5 percent today, as the consumerization of IT and busi...
Read more

UK retail takes on cyber crime (EN) | business-technology.co.uk
| 04-02-2014 | Cyber security is one of the government’s top priorities for 2014, but online safety is an ongoing battle between hackers, businesses, and the government.As science and universities minister David Willets announces a new £8 million initiative to bring technological inno...
Read more

The Mask is nieuwe supermalware voor Windows, Mac en Linux (NL) | webwereld.nl
| 04-02-2014 | Vergeet Stuxnet, want volgens de Russisch anti-virusmaker Kaspersky wordt de wereld sinds 2007 door een zeer geavanceerd stuk malware bedreigd. Zelf noemen ze het 'The Mask'. Details over deze nieuwste telg binnen de familie van cyberspionage worden volgende week onthuld. AdvertentieK...
Read more

AV-Test beoordeelt 30 beveiligingssuites voor Android (NL) | www.techzine.nl
| 04-02-2014 | In een uitgebreide test heeft AV-Test een groot aantal applicaties voor de beveiliging van Android beoordeeld. Van de in totaal 30 geteste applicaties bleken 16 in staat om 100% van de malware te detecteren. Van die 16 apps bleken een aantal wel ook bestanden als gevaarlijk aan te mer...
Read more

Abandoned computer leads to child porn charges (EN) | www.londoncommunitynews.com
| 04-02-2014 | A 61-year-old London man is facing a pair of child pornography charges after an abandoned computer was discovered in a storage locker. The London Police Cyber Crime Unit received a complaint from a citizen reporting they had discovered child pornographic images on an abandoned compute...
Read more

Target apologizes for data breach at Senate hearing (EN) | www.cnbc.com
| 04-02-2014 | A senior official at Target told U.S. lawmakers on Tuesday the retailer was "deeply sorry'" for the massive data breach it suffered over the holiday shopping period, and said it was determined to win back customers' trust. In prepared testimony for his appearance before a U.S. Senate ...
Read more

Yet Another Data Breach Bill Introduced (EN) | www.bankinfosecurity.com
| 03-02-2014 | Yet another bill to create a federal requirement for data breach notification has been introduced, this time by Democratic leaders of the Senate Commerce, Science and Transportation Committee.The Data Security and Breach Notification Act of 2014 would, for the first time, provide a fe...
Read more

Dangerous Android Trojan Oldboot hits 350,000 devices (EN) | www.itproportal.com
| 04-02-2014 | Oldboot is a persistent Android Trojan which has infected over 350,000 devices worldwide, according to Russian security firm Doctor Web.Info Security notes that the Trojan has spread itself mostly across China (with 92 per cent of infections there), but also the US and Brazil, and a b...
Read more

Malware hides behind JavaScript, PNGs to bypass browser security (EN) | www.infoworld.com
| 04-02-2014 | A newly discovered cross-site scripting attack uses a sly variant on an existing hack to deliver malware in a way that's so heavily obfuscated, even experts didn't notice it at first. Said experts were the folks at Sucuri, the security researchers who unearthed hacks on Web servers in...
Read more

Google's Pwnium 4 offers hackers $2.7 million to exploit their software (EN) | www.techrepublic.com
| 04-02-2014 | All software has bugs, and sometimes those bugs can be hard to find. With millions of lines of code, it can be difficult for even the most seasoned developers to find every potential problem with a product. Because of this, many companies have turned to hackers for help; and no, we're...
Read more

Fewer than 1.1 mln accounts exposed in Neiman breach: executive (EN) | in.reuters.com
| 04-02-2014 | (Reuters) - A recently revealed cybersecurity breach at Neiman Marcus potentially exposed 1.1 million accounts to malware, but the upscale U.S. retailer believes the actual number affected was less than that, its chief information officer said on Tuesday.U.S. retail executives includi...
Read more

Professor reportedly hacked by NSA/GCHQ questions proof of attack (EN) | www.scmagazine.com
| 04-02-2014 | Contrary to reports, famed Belgian cryptography professor Jean-Jacques Quisquater is questioning whether the National Security Agency (NSA) and the Britain's GCHQ compromised his PC and extracted encrypted data. Earlier this week Belgian newspaper De Standaard reported that as a resul...
Read more

ING kampt met vier storingen in drie dagen (NL) | www.nu.nl
| 05-02-2014 | ING is maandag, dinsdag en woensdag getroffen door in totaal vier storingen. De problemen waren woensdagochtend rond 8.30 uur opgelost.Dat laat een woordvoerder aan NUtech.nl weten.Volgens ING gaat het om losstaande incidenten. Er zou ook geen sprake zijn van een DDo...
Read more

HP publiceert Cyber Risk Report 2013 en legt belangrijkste cyberdreiging bedrijfsleven bloot (NL) | www.marqit.nl
| 04-02-2014 | 80% van kwetsbaarheden applicaties betreft de configuratie en niet de broncode â€" inconsistentie antivirusprogramma’s bemoeilijkt risico-analyses.HP publiceert vandaag het Cyber Risk Report 2013, waarin de grootste cyberdreigingen en -kwetsbaarheden voor het bedrijfslev...
Read more

Java botnet hits Mac, Linux and Windows machines (EN) | www.theinquirer.net
| 04-02-2014 | CYBER CROOKS are once again targeting Java users, but this time taking advantage of the cross-platform design to threaten Linux and Mac users, Kaspersky researchers have claimed. The malware is a functioning botnet written entirely in Java and is capable of infecting computers running...
Read more

Finding the hidden zombie in your network (EN) | www.ecnmag.com
| 04-02-2014 | How do you detect a "botnet", a network of computers infected with malware -so-called zombies - that allow a third party to take control of those machines? The answer may lie in a statistical tool first published in 1966 and brought into the digital age researchers writing this month ...
Read more

Senator releases report on governments poor security track record (EN) | www.scmagazine.com
| 04-02-2014 | A senator has released a report detailing numerous oversights, which have threatened the security of sensitive government data and critical infrastructure operations. On Tuesday, Sen. Tom Coburn, R-Okla., published the 19-page report (PDF), called “The Federal Government's Track Rec...
Read more

Spy agencies, prime minister's adviser defend Wi-Fi data collection (EN) | www.cbc.ca
| 03-02-2014 | The head of Canada's communications surveillance agency defended its use of metadata Monday and argued a test using Canadian passengers' data â€"revealed by CBC News last week â€"didn'trun in real-time and wasn't an actual operation.John Forster, chief of the Communications Security E...
Read more

GOP Report Stresses Gov't InfoSec Flaws (EN) | www.govinfosecurity.com
| 05-02-2014 | Days before the Obama administration will release a framework aimed at securing the nation's critical infrastructure, Senate Republicans issued a report detailing vulnerabilities in federal IT, suggesting the White House get its own house in order before advising others.The report fro...
Read more

Experts Use Digital Forensics to Crack Down on Cyber Crime (EN) | www.abcfoxmontana.com
| 04-02-2014 | MISSOULA - Law enforcement agents said the exploitation of children and human sex trafficking are two crimes on the rise in Montana. And in this day and age, they said perpetrators are using the Internet and mobile devices to their advantage. "A good portion of our crimes we investiga...
Read more

As Cyber Crime Matures, More Hacked Accounts Expected (EN) | www.i4u.com
| 03-02-2014 | Last week’s arrest of Russian bank hacker extraordinaire Aleksander “SpyEye” Panin doesn’t mean online bank accounts are suddenly safer. Not that anyone thought they were. Bank fraud is here to stay and the guys behind it â€" many of them Russsian â€" are multiplying and becom...
Read more

Critical Infrastructure Protection (CIP): Infrastructure Resilience is Key (EN) | americansecurityproject.org
| 04-02-2014 | Speculations and investigations related to national security have identified a growing concern: the potential exploitation of weaknesses in national infrastructure. An intrusion may be a highly unlikely one (as Nassim Nicholas Taleb may categorize them, a “Black Swan” event), and ...
Read more

Obama administration calls for tougher cyber security law (EN) | www.ksdk.com
| 04-02-2014 | WASHINGTON -- The Obama Administration recommends a uniform federal standard requiring businesses to quickly report data breaches and thefts of electronic personal information, acting Assistant Attorney General Mythili Raman told a Senate Judiciary Committee hearing Tuesday.The hearin...
Read more

ICEPOL a Trojan Ransomware Installed on Over 10K UK Machines (EN) | www.spamfighter.com
| 05-02-2014 | BitDefender says that during 2013, 10,331-or-so computers were infected with Trojan ICEPOL, an infamous ransomware, in UK.The Cyber-Crime Investigation division of BitDefender studied images inside servers' disks utilized for disseminating ICEPOL and for this the Romanian ...
Read more

Two University students in Fiji charged for laundering $24,000 from bank accounts (EN) | www.islandsbusiness.com
| 05-02-2014 | SUVA, Fiji--- Two tertiary students appeared in the Suva Magistrate Court Tuesday charged with five to ten counts of money laundering.It was alleged that sometime between Christmas and New Year last year, the two hacked into a bank account and transferred a total of $24,000 (US$12,703...
Read more

Adobe issues emergency Flash update to patch zero-day exploit (EN) | news.en.softonic.com
| 04-02-2014 | Adobe released an emergency update today for its Flash Player to guard against a zero-day exploit, which could allow attackers to gain remote access to an affected machine. The security flaw has been elevated to "critical" status, which is Adobe's highest threat level. Ars Technica re...
Read more

The FBI Is in the Market for Malware (EN) | www.nextgov.com
| 04-02-2014 | Federal detectives want to buy viruses and other types of malicious software for assistance in cracking criminal cases, according to a "combined synopsis/solicitation for malware" published this week on the government's contracting database. The specific organization in need is the FB...
Read more

New Google Chrome feature warns users of Malware intrusion (EN) | www.tweaktown.com
| 04-02-2014 | Today, Google announced that its engineers working on the company's Chrome Browser have built-in a new feature that automatically warns users of changes made to browsing settings by malicious software. The announcement came via a blog post from Linus Upson, Google's vice president of ...
Read more

Eastern European hackers caught selling Target customer card data (EN) | www.v3.co.uk
| 04-02-2014 | Eastern European cyber criminals have been caught selling customer data stolen during a raid on US retailer Target, say security researchers at FireEye.The Target breach is believed to have occurred between 27 November and 15 December. It saw hackers break into Target's systems and co...
Read more

'ChewBacca' Malware Poses Big, Hairy Security Problem for Retailers (EN) | www.eweek.com
| 04-02-2014 | A cyber-criminal group has infected point-of-sale terminals at more than 45 retailers, grabbing credit- and debit-card data from the stores, says security firm RSA. A criminal group has used custom-built malicious software, cheekily named "ChewBacca," to infect systems at more than 45...
Read more

Identity Theft Affecting 14,000 Midland School District Students and Graduates (EN) | wtaw.com
| 04-02-2014 | MIDLAND, Texas (AP) _ The identity information of 14,000 past and present Midland Independent School District students has been compromised by a computer theft.Midland school Superintendent Ryder Warren says a laptop computer and external hard drive containing the information was stol...
Read more

Tax return identity theft on rise (EN) | www.ksat.com
| 04-02-2014 | SAN ANTONIO - Fake tax returns is the fastest growing identity theft scheme going, according to the Federal Trade Commission.And, the IRS says the combating the growing threat is a top priority."Identity theft is a huge deal for the IRS right now," said IRS special agent Michael Lemoi...
Read more

Watch Out for Olympic Spam, Phishing, Malware (EN) | securitywatch.pcmag.com
| 04-02-2014 | While much of the world's scrutiny has focused on the possibility of a terrorist attack at the XXII Olympic Games in Sochi, Russia, "there are several cyber-related risks to consider," the Department of Homeland Security warned in an advisory.Cyber-criminals may use the Winter Olympic...
Read more

UPDATE 1-Credit card data breach targets Marriott, Sheraton, other hotels (EN) | uk.reuters.com
| 04-02-2014 | Feb 3 (Reuters) - A credit card data breach has beendetected that exposed guests at certain Marriott, Holiday Inn,Sheraton and other hotel properties to theft, hotel managementfirm White Lodging Services Corp said on Monday.The breach occurred at food and beverage outlets at 14hotels,...
Read more

The plight of gaming networks and the threat of DDoS on the modern Internet (EN) | siliconangle.com
| 04-02-2014 | It’s the evening and numerous video game players are getting home from work and schoolâ€"but when they try to log into their favorite game but in this scenario they can’t because the servers are down. Not because of a configuration error, or an employee accidentally flipping the w...
Read more

The New Snowden Revelation Is Dangerous for Anonymous â€" And for All of Us (EN) | www.wired.com
| 04-02-2014 | The latest Snowden-related revelation is that Britain’s Government Communications Headquarters (GCHQ) proactively targeted the communications infrastructure used by the online activist collective known as Anonymous.Specifically, they implemented distributed denial of service (DDoS) ...
Read more

GCHQ secret unit uses DDOS attack tactics against Anonymous â€" Snowden leak (EN) | rt.com
| 05-02-2014 | British intelligence has its own hacker subdivision that uses questionable practices for hunting down enemies of the state, reveals a new leak from Edward Snowden. GCHQ is fighting Anonymous and LulzSec hacktivists with DDoS attacks and malware. A classified document obtained by NBC N...
Read more

Franken, Leahy: Time for Data Breach, Notification Legislation (EN) | www.multichannel.com
| 04-02-2014 | Sen. Al Franken (D-Minn.), who presided over portions of a Judiciary Committee hearing on data breaches summed up the tenor of the times when he said it was clear such breaches were a systemic problem, an assessment shared by Committee chairman Patrick Leahy (D-Vt.). There was less un...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish