Under construction

New design coming soon!

CIC News engine statistics

CIC News for 14-02-2014 contains 56 articles

CIC News update contains 56 articles for today, have fun reading.

Vodafone Wil Aantal Taps En Dataverzoeken Openbaren (NL) | www.nutech.nl
| 12-02-2014 | Vodafone wil openbaren hoe vaak de overheid verzoeken doet om taps te plaatsen bij de provider. Het bedrijf heeft afgelopen week verzoeken gestuurd aan verschillende ministeries waarin het om toestemming vraagt. Dat meldt Vodafone Nederlandwoensdag op zijn site, nadat het internationa...
Read more

Focus op zwakke punten om sterker te worden (EN) | www.computable.nl
| 13-02-2014 | ‘If you fail to plan, you’re planning to fail’, een prachtige Engelse uitspraak waar absoluut een kern van waarheid in zit. Zeker ook wanneer je die uitspraak bekijkt met het onderwerp it-security in het achterhoofd.Want eerlijk is eerlijk, zou niet de eerste discussie richting ...
Read more

Nederlandse ntp-servers misbruikt bij grote ddos-aanval op Cloudflare (EN) | tweakers.net
| 13-02-2014 | Bij de ddos-aanval op Cloudflare, naar verluidt de grootste ddos-aanval ooit, zijn ook Nederlandse ntp-servers gebruikt. Door een kwetsbaarheid in het network time protocol kunnen ntp-servers worden gebruikt door een aanvaller om zijn capaciteit te vergroten.In totaal werden bij de dd...
Read more

Statistics Point to Increased Physical Danger Risks of Cyberterrorism (EN) | www.computerworld.in
| 13-02-2014 | Are current laws enough to prevent the growing threat of cyber terrorists? "Traditional terrorism refers to violent acts that indiscriminately target civilians," says Jon Iadonisi, former Navy SEAL, cyber security expert and co-founder, White Canvas Group. Traditional terrorists are l...
Read more

UKs Ministry of Justice website knocked offline by DDoS attack (EN) | www.scmagazine.com
| 13-02-2014 | The website of the UK's Ministry of Justice was taken offline for several hours as a result of a distributed denial-of-service (DDoS) attack on Wednesday. In a Twitter post, the government agency confirmed the attack: “Unfortunately the Justice website is down following a DDoS attac...
Read more

DDOS in 2014: The New Distributed Denial of Service Attacks and How to Fight Them (EN) | blog.continuum.net
| 13-02-2014 | In early days of the Web, no one heard of a Distributed Denial of Service (DDoS) attack; malware came to us through other vectors. Then in early 2000, a series of them DDoS attacks knocked off the air such popular websites as Yahoo, CNN, and Amazon. Today, DDoS attacks are thicker tha...
Read more

Financial Security: What smaller Institutions can learn from DDoS attacks on big banks (EN) | www.cio.com
| 13-02-2014 | Since last fall, several waves of distributed denial of service (DDoS) attacks have targeted major players in the U.S. banking industry. In the months to come, security experts would praise the banks' collective response, from heightened DDoS protection to candid customer communicatio...
Read more

Netherlands attracts second highest number of botnets in the world (EN) | www.international.to
| 13-02-2014 | According to the Netherlands’ NCSC, there were 779 incidents in the country last year, which included 91 alerts to the NCSC website itself. , BENELUX, BELGIUM, February 10, 2014 /EINPresswire.com/ -- According to the Netherlands’ National Cyber Security Centre (NCSC) there were 77...
Read more

Ministry of Justice website hit by DDoS attack (EN) | www.v3.co.uk
| 13-02-2014 | The Ministry of Justice (MoJ) website was hit by a Distributed Denial of Service (DDoS) attack on Wednesday, in the latest high-profile incident of this nature.The government department revealed on Twitter that the attack was taking place on Wednesday morning, making its website inacc...
Read more

GCHQ website falls after threats from Anonymous (EN) | news.netcraft.com
| 14-02-2014 | GCHQ's website at www.gchq.gov.uk is exhibiting some noticeable performance issues today, suggesting that it could be suffering from a denial of service attack. Last week, documents from whistle-blower Edward Snowden revealed that GCHQ carried out denial of service (DoS) a...
Read more

Gartner: Big data will soon revolutionise cyber security (EN) | www.itproportal.com
| 13-02-2014 | Big data will soon usher in a new age of cyber security, according to a new study by Gartner.Gartner found that by 2016, more than 25 per cent of global firms will adopt big data analytics for at least one security and fraud detection use case, up from the current eight per cent.The r...
Read more

Cyber valentines: hearts and money on the line (EN) | www.abc.net.au
| 13-02-2014 | So you've met someone special online, but do they really want you this Valentine's Day or do they want your money? The Queensland Police Cyber Fraud and Crime Group's Detective Superintendent Brian Hay says they expect to see a spike in romantic online fraud this Valentine...
Read more

Industry Comes Together To Take Action Against Cyberattacks (EN) | www.pymnts.com
| 14-02-2014 | The banking, payments and retail industries on Feb. 13 took major strides to put aside their finger-pointing and combine their efforts to combat cybercrimes. The new partnership reportedly will focus on sharing more information, developing better technology to protect consumers and di...
Read more

Ghana ranks second in Cyber-crime has no evidence (EN) | www.spyghana.com
| 14-02-2014 | Communication Minister Dr. Edward Omane Boamah has rejected claims Ghana ranks the second highest Cyber-crime country on the continent, insisting no evidence has been produced to back such claims.“I’m willing to change my position only if the evidence has been put before me,” Dr...
Read more

SA moves to curb rife cybercrime (EN) | www.bdlive.co.za
| 14-02-2014 | THE government has now made its first big move in curbing cybercrime with an electronic security needs analysis of the country, which the State Security Agency will conduct.The regulations relating to the process were published in the Government Gazette on January 29.The process would...
Read more

Cumbria Police issue advice against online fraud (EN) | www.itv.com
| 13-02-2014 | Cumbria Police are advising people to take simple steps to help prevent online fraud, as part of their week-long cybercrime campaign.“The internet is a definitely a key target for fraudsters due to the sheer amount of personal and financial information people now provide online. "Th...
Read more

Microsoft Teams Up with Europol, FIS and OAS Against Cybercrime (EN) | news.softpedia.com
| 13-02-2014 | In an effort to increase cooperation on cybercrime between the private sector and international law enforcement agencies, Microsoft has entered into partnerships with three organizations: Europol, FIS and the Organization of American States (OAS). The organizations have agreed to work...
Read more

`Rajasthan lacks facilities to deal with cyber crime` (EN) | zeenews.india.com
| 13-02-2014 | Jaipur: Rajasthan police today expressed concern over the lack of important infrastructure in the state to counter cyber crime.Speaking at a two-day training programme on information technology, the ADGP (Crime) Ajit Singh said Rajasthan lacked important facilities, infras...
Read more

Steps to Mitigate Spear Phishing (EN) | www.bankinfosecurity.com
| 13-02-2014 | While many organizations rely on employee training to help mitigate the risks of spear phishing, such efforts are generally ineffective, says Eric Johnson of Vanderbilt University, who explains why a technical solution might be more effective.Vanderbilt conducted a study that conclude...
Read more

Men plead guilty to Springdale ATM 'skimming' (EN) | www.fox19.com
| 13-02-2014 | CINCINNATI, OH (FOX19) - Two Chicago men pleaded guilty to placing a hidden camera on a Springdale ATM in an effort to steal bank card information.MOREAdditional Links Dimitar Angelov, 29, and Dimitar Kolev, 26, each pleaded guilty in U.S. District Court to placing a device known as a...
Read more

Social engineering: Mitigating a stealthy risk (EN) | www.australiansecuritymagazine.com.au
| 13-02-2014 | Can an organisation get victimised by social engineering? And if so, what can that organisation do about it? Social engineering is everywhere and used constantly by everybody. Mostly in a quiet, harmless matter and not intended to harm an organisation or person. However, these skills ...
Read more

Revenue Ministry: Attackers Send Viral Spam From Its Domain (EN) | un.ua
| 13-02-2014 | The Ministry of Revenue and Duties of Ukraine says that hackers send viral spam from the domain of the authority, press service of the ministry has said.The mail is sent from unofficial addresses in a form of bills or complaints for inability to receive letters and contain application...
Read more

Apple finally declares war on something other than Android (EN) | bgr.com
| 13-02-2014 | A new Apple patent describes the methods the company has come up with in an effort to fight the increased number of spam messages that flood email accounts, AppleInsider reveals. According to the patent, called “Disposable email address generation and mapping to a regular email acco...
Read more

Dallas-based Employees Credit Union sues Target over Black Friday data breach (EN) | bizbeatblog.dallasnews.com
| 13-02-2014 | To the ever-expanding pile of lawsuits filed against Target over the data breach that began on Black Friday, add a freshly minted local offering: Dallas-based Employees Credit Union sued the retailing giant in federal court Thursday morning, claiming that the data breach is going to c...
Read more

Apple patent could make disposable email addresses easier, help you dodge spam (EN) | venturebeat.com
| 13-02-2014 | What if you could avoid spam by more easily using a disposable email address? Apple has filed a patent application to do just that.The patent application, “Disposable Email Address Generation and Mapping to a Regular Email Account,” was published Thursday by the U.S. Patent and Tr...
Read more

Investment In Data Breach Responders Lacking, Study Finds (EN) | www.crn.com
| 13-02-2014 | The most effective response to security incidents and potential data breaches in the organization involves a team of people, an investment that many organizations say their firms are not willing to make, according to a new study.A survey of 674 IT security professionals in the United ...
Read more

Miami Police Officer Gets 12 Years in Prison for Identity Theft (EN) | www.esecurityplanet.com
| 13-02-2014 | Malinsky Bazile used Florida's driver's license database to steal the identities of 700 middle-aged women. Malinsky Bazile, 28, of North Miami Beach, Fla., was recently sentenced to 12 years in prison for his involvement in a stolen identity tax refund (SIRF) scheme....
Read more

Beebe Healthcare Acknowledges Potential Data Breach (EN) | www.esecurityplanet.com
| 13-02-2014 | After a contractor failed to show up for work, the company discovered that she had previously been arrested for 'incidents related to identity theft.' Delaware's Beebe Healthcare recently began notifying approximately 1,900 patients that a temporary contractor may have ina...
Read more

INFOGRAPHIC: Love shouldn’t spam your inbox, it should spam your heart (EN) | blog.avast.com
| 13-02-2014 | Love is in the air! People are going out to buy boxes of chocolates and flowers for their loved ones, preparing for romantic dinners, and some are hoping that a secret admirer will confess their love. Some seek help from the Internet to make Valentine’s Day as romantic as possible a...
Read more

Target's Massive Data Breach Originated With A Singe Phishing Email (EN) | www.businessinsider.in
| 13-02-2014 | The massive data breach at Target that affected up to 110 million shoppers has been traced back to a single phishing email, security blogger Brian Krebs is reporting. The malware-laced email was sent to an employee of Fazio Mechanical, a Pennsylvania heating and air conditioning compa...
Read more

Data Breach Roundup: January 2014 (EN) | www.esecurityplanet.com
| 14-02-2014 | Many data breaches that occurred in January highlight the importance of user education. Knowledgeable users are less likely to engage in behavior that poses security risks. Each month, eSecurity Planet looks back at the data breaches we’ve covered over the past 30 days o...
Read more

'The Mask' malware sets standards hackers are sure to follow (EN) | www.networkworld.com
| 12-02-2014 | A recently discovered hacking group called "The Mask" has set a new standard for malware used in sophisticated attacks against government agencies, industry and research organizations, experts say.On Monday, Kaspersky Lab reported discovering the advanced Spanish-speaking group that h...
Read more

Fake Flappy Bird Apps Run Malware Instead (EN) | www.ubergizmo.com
| 12-02-2014 | It goes without saying that the Flappy Bird craze is not going to die down anytime soon, and we have even heard of reports that a certain Mr. Nelson is renting out his iPhone that has Flappy Bird installed at a rate of $1 per minute, now how about that? Having said that, it must also ...
Read more

Seculert Offers Customized Malware Analysis Report for RSA Conference Attendees (EN) | www.digitaljournal.com
| 13-02-2014 | SANTA CLARA, CA--(Marketwired - Feb 13, 2014) - Seculert, a leader in advanced threat protection and malware solutions, today announced that it is offering an advanced malware analysis to businesses ahead of the RSA Conference 2014 to help them discover any hidden, unknown or new cybe...
Read more

Bizarre attack infects Linksys routers with self-replicating malware (EN) | arstechnica.com
| 13-02-2014 | Researchers say they have uncovered an ongoing attack that infects home and small-office wireless routers from Linksys with self-replicating malware, most likely by exploiting a code-execution vulnerability in the device firmware.Johannes B. Ullrich, CTO of the Sans Institute, told Ar...
Read more

Online banking, mobile OS malware rising (EN) | www.humanipo.com
| 13-02-2014 | Online banking and mobile operating system (OS) malware saw a marked increase during 2013, according to a TrendLabs study. The fourth quarter of 2013 saw a 200 per cent increase in the number of banking-related malware incidents.“Online banking malware took center stage in terms of ...
Read more

IE10 under attack as hackers exploit zero-day bug (EN) | www.computerworld.com
| 13-02-2014 | FireEye uncovers attacks emanating from a U.S. website just two days after Microsoft issued huge IE patch collection.FireEye today said it had discovered that attackers are actively exploiting a new, unpatched vulnerability in Internet Explorer 10 (IE10).Micros...
Read more

Chinese hackers target military personnel by planting malware on VFW.org (EN) | www.theverge.com
| 13-02-2014 | A new report by malware research firm FireEye has uncovered an attack against the website of the Veterans of Foreign Wars, believed to be carried out by a group based in China. Using a tactic known as a watering-hole attack, the group used a previously unpublished exploit in Microsoft...
Read more

NSA probably developing Masktype malware (EN) | www.scmagazineuk.com
| 13-02-2014 | "Logic suggests that the NSA is developing its own cyber weapons. It has its own malware, and its own C&C servers" says Sarb Sembhi, Incoming Thought Analyst. A leading security analyst says that the Mask malware - identified earlier this week as quietly hitting victim...
Read more

Retail's chess game with point-of-sale malware (EN) | blogs.computerworld.com
| 14-02-2014 | The recent point-of-sale (POS) malware targeted at major retailers is just the latest in a growing number of attacks in recent years which have collectively cost the worldwide economy billions of dollars. gross fraud losses of $11.27 billion, up 14.6% over the prior year. The issue is...
Read more

New malware threat hits Google Play (EN) | www.gmanetwork.com
| 14-02-2014 | A new wave of malware has hit Google's app store Google Play and may have infected at least 300,000 people, a security vendor said Thursday. Panda Security said its research team indicated the number of those infected may go up to 1.2 million as the malicious apps can be downloaded fr...
Read more

Sophisticated Malware Poses as Your Favorite News Site, Steals Your Data (EN) | english.farsnews.com
| 14-02-2014 | TEHRAN (FNA)- A new extremely sophisticated malware of totally unknown origin has hit the web. It poses as your favorite news site tempts you to click on intriguing links, then subsequently steals all of your sensitive information. Nowadays, malware tends to focus on one thing: gainin...
Read more

Thousands of FTP sites compromised to serve malware and scams (EN) | www.net-security.org
| 14-02-2014 | Some 7,000 FTP sites and servers have been compromised to serve malware, and its administrators are usually none the wiser, claim Hold Security researchers. FTP sites function as online file caches and are accessible remotely - usually via Web browsers. Users w...
Read more

The NIST Cybersecurity Framework: A Significant Milestone towards Critical Infrastructure Resiliency (EN) | blogs.technet.com
| 13-02-2014 | Yesterday, the Administration released the much anticipated Cybersecurity Framework. What does the Framework mean for the critical infrastructures, both in the United States and beyond? The Framework, developed over the past year by the National Institute of Standards and Technology (...
Read more

US debuts cyber security framework to protect critical infrastructure (EN) | www.scmagazineuk.com
| 13-02-2014 | The Obama administration has launched the Cybersecurity Framework, which aims to educate organisations on the risks facing critical infrastructure systems. The 41-page framework is a result of a year-long project in which businesses and individuals collaborated on the best...
Read more

White House unveils cybersecurity standards for private businesses (EN) | rt.com
| 12-02-2014 | The White House on Wednesday released the final version of the voluntary cybersecurity standards that President Barack Obama called for the creation of exactly one year ago in an effort to reduce risks to the United States’ critical infrastructure. But after 12 whole months of devel...
Read more

Cybersecurity Framework for U.S. Critical Infrastructure (EN) | threatpost.com
| 12-02-2014 | Critical infrastructure operators have been delivered a cybersecurity framework by the U.S. government that paints broad strokes as to how to defend IT and SCADA networks in some of the country’s most sensitive industries such as energy, water and financial services.NIST today annou...
Read more

Windows XP Could Be Infected Within 10 Minutes of Support Ending (EN) | www.tomshardware.com
| 12-02-2014 | In an article published by the Wisconsin Law Journal, Michael Menor, a former military computer specialist and network engineer at Tech Experts in Monroe, Mich., indicated that hackers will likely pounce on Windows XP ten minutes after Microsoft pulls the plug on support this April 8,...
Read more

Op vrouwen gerichte malware steelt nummer uit WhatsApp voor sms-fraude (EN) | tweakers.net
| 14-02-2014 | Een beveiligingsbedrijf heeft een vorm van Android-malware ontdekt waarbij een app het telefoonnummer van de gebruiker steelt uit WhatsApp om zich daarmee te abonneren op premium-sms-diensten. De malware is tussen de 300.000 en 1,2 miljoen keer gedownload.De malware zat volgens Panda ...
Read more

Nieuwe malware richt zich op Linksys-routers (EN) | tweakers.net
| 13-02-2014 | Meerdere routers van Linksys zijn het slachtoffer van een worm. De worm verspreidt zich waarschijnlijk via een gat in de routersoftware. Het is nog onduidelijk welk doel de malware precies voor ogen heeft.Onderzoeker Johannes Ullrich van het Internet Storm Center onderzoch...
Read more

'Malware maakt vaker opnames tijdens internetbankieren' (NL) | www.security.nl
| 13-02-2014 | Malware maakt steeds vaker opnames tijdens internetbankieren om zo effectiever geld van online rekeningen te stelen. Dat beweren onderzoekers van Dell SecureWorks. Het bedrijf analyseerde acht veel gebruikte banking Trojans die worden ingezet tegen consumenten die internetbankieren.De...
Read more

Exploit legt Apache Tomcat servers plat (EN) | www.automatiseringgids.nl
| 13-02-2014 | Apache Tomcat-webserver blijken relatief makkelijk op de knieën te krijgen met een opzettelijke fout geconfigureerd http-verzoek. De kwetsbaarheid werd aangetoond door IT-beveiligingsonderzoekers van Trustwave met een proof-of-concept. Het lek zit in de Apache Common FileUpload, een ...
Read more

Android-malware op Google Play besmet 300.000 gebruikers (NL) | www.security.nl
| 13-02-2014 | Op Google Play zijn verschillende kwaadaardige apps ontdekt die zeker 300.000 gebruikers hebben geinfecteerd. Het gaat om Spaanstalige apps genaamd "Dietas Abdomen", "Cupcakes Recetas", "GYM" en "Paneidos Faciles", die onder andere informatie over afvallen, bakken en make-up bevatten....
Read more

Apple patenteert anti-spam e-mailsysteem (NL) | www.apparata.nl
| 13-02-2014 | Niks zo irritant als spam moeten ze bij Apple gedacht hebben. Gelukkig hebben de knappe koppen in Cupertino een manier bedacht om daar een einde aan te maken.Veel mensen maken nu al gebruik van aliassen of alternatieve e-mailadressen om de hoeveelheid spam op hun primaire adres te bep...
Read more

Europol maakt zich zorgen over sterke encryptie (NL) | www.security.nl
| 13-02-2104 | Het hoofd van het Cyber Crime Centre van Europol maakt zich zorgen over het gebruik van sterke encryptie. Dat liet Troels Oerting tijdens een conferentie op de Dominicaanse Republiek weten. Door de onthullingen van Edward Snowden over de NSA passen steeds meer bedrijven sterke encrypt...
Read more

'Snowden Kreeg Wachtwoord Van Nsa-Collega' (NL) | www.nutech.nl
| 13-02-2014 | Snowden heeft toegang weten te krijgen tot geheime documenten van de NSA, nadat hij een collega zijn wachtwoord liet intypen op zijn eigen computer. Dat stelt de NSA in een memo aan Amerikaanse congresleden, die in handen is van NBC News.De medewerker zou niet hebben geweten dat Snowd...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish