Under construction

New design coming soon!

CIC News engine statistics

CIC News for 15-02-2014 contains 22 articles

CIC News update contains 22 articles for today, have fun reading.

Kippo Honeypot BotNet Takedown (EN) | barracudalabs.com
| 14-02-2014 | Just as I’m contemplating the next article to write it comes to me. Literally came to me in the form of an unnamed source. Let’s call the unnamed source…Bob!Bob maintains a Kippo honeypot and last weekend the honeypot was infiltrated by a Linux botnet. Bob is an intelligent secu...
Read more

Should We Blame Russia for the Target Breach? (EN) | www.huffingtonpost.com
| 14-02-2014 | Is it time to hold the Russian government responsible for the rise in sophisticated cybercrime attacks on the U.S. economy?As Congress recently held hearings on the Target data breach to discuss new ways to protect consumer information and prevent future data breaches, one key issue t...
Read more

Abusing Cloud Services for Cybercrime (EN) | www.darkreading.com
| 14-02-2014 | At the upcoming RSA conference, researchers will discuss how a lack of anti-automation protections allow attackers to take advantage of free cloud services.Building a botnet typically involves infecting a PC. But at the upcoming RSA Conference, two researchers plan to show how to buil...
Read more

Diploma in fighting cyber-crime (EN) | www.nation.lk
| 16-02-2014 | The much sought after cyber-crime fighting diploma offered by the Institute of Chartered Accountants of Sri Lanka (CA Sri Lanka) will kick off in mid-February and will be conducted by a versatile expert from India, who specializes in the subject. The Diploma in Information Systems Sec...
Read more

iOS 7 vulnerability can disable 'Find my iPhone' without password (EN) | www.gmanetwork.com
| 14-02-2014 | Bad news for owners of iPhones using iOS 7: the anti-theft app "Find my iPhone" can be disabled even without a password, no thanks to a flaw in the operating system. Enthusiast site MacRumors said the bug in effect can potentially allow the iPhone to be "hidden" from Apple's iCloud.co...
Read more

Ukraine hit by cyberattack using newest ATM trojan (EN) | www.atmmarketplace.com
| 14-02-2014 | ATMs located in public areas and belonging to one of the largest Ukrainian banks were simultaneously attacked in all regions of the country last weekend by malicious code. According to a report from Russian software security firm SafenSoft, ATMs that had been loaded with money on Frid...
Read more

How criminals are taking cash out of ATMs using USB sticks (EN) | www.informationweek.in
| 15-02-2014 | In what could be a sign of what's ahead in ATM fraud, a highly sophisticated and well-funded criminal gang targeted an overseas bank and commandeered at least four of its ATM machines with malware-rigged USB sticks in order to empty them of cashTillmann Werner, a researche...
Read more

Microsoft verklapt zelf exploits na XP-deadline (NL) | computerworld.nl
| 15-02-2014 | De rooftocht voor malwaremakers begint op 8 april, wanneer Microsoft een einde maakt aan de ondersteuning voor Windows XP. Met Microsofts maandelijkse patchronde als leidraad. Malware-experts zijn erover eens: het is op z'n minst onverstandig om na 8 april nog Windows XP te gebruiken....
Read more

Target Had Warnings Before Data Breach (EN) | www.marketwatch.com
| 14-02-2014 | Target Corp.'s computer security staff raised concerns about vulnerabilities in the retailer's payment card system at least two months before hackers stole 40 million credit and debit card numbers from its servers, people familiar with the matter said. At least one analyst...
Read more

Woman arrested for identity theft (EN) | www.ccenterdispatch.com
| 14-02-2014 | The Sheriff’s Department arrested Barbara Jolene Hedberg-Kitt, 31, on Thursday, Feb. 13, for identity theft and theft. She bonded on a $3,000 cash or surety bond. The Sheriff’s Department arrested Glenn Doyle Manning, 72, on Monday, Feb. 10, for failure to appear. He remains in Cl...
Read more

'Patchwork' of state laws complicates data breach response (EN) | fcw.com
| 14-02-2014 | After recent high-profile data breaches at several retailers, Congress is reacting with a revived push to pass laws addressing data breach investigation and notification. Industry might like to see a national standard replace a patchwork of state laws, but there is less agreement abou...
Read more

Three Jailed for $2.2 Million Identity Theft Scheme Using Inmates' Identities (EN) | www.esecurityplanet.com
| 14-02-2014 | Frantz Pierre, Terry Pierre and Christmanie Bissainthe were sentenced to 208 months, 121 months and 84 months in prison, respectively. Frantz Pierre, 34, Terry Pierre, 29, and Christmanie Bissainthe, 33, were recently sentenced to prison for their participation in a stolen...
Read more

Local College Data Breach May Have Affected 2,800 Students (EN) | www.kwtx.com
| 14-02-2014 | WACO (February 14, 2014) Texas State Technical College was notifying more than 2,800 former students Friday about a server breach in which personal information may have been accessed. The information about students who attended TSTC Waco in the summer of 2006 and during the 2007 acade...
Read more

Baton Rouge woman sentenced in identity theft case; pay $491,000 restitution (EN) | www.dailyjournal.net
| 14-02-2014 | BATON ROUGE, Louisiana â€" A 32-year-old Baton Rouge woman has been sentenced to just under 5½ years in federal prison for filing false tax returns with stolen identities. The Advocate reports (http://bit.ly/1nyjSTH ) U.S. District Judge Shelly Dick also ordered Mona R. Hill to pay t...
Read more

UK Ministry of Justice downed by DDoS attack linked to NSA spying revelations (EN) | www.itproportal.com
| 14-02-2014 | Hackers took down the UK Ministry of Justice website for several hours earlier this week in a distributed denial of service attack [DDoS] that is part of the fall out from the US National Security Agency [NSA] spying revelations.The government agency admitted through a Twe...
Read more

$2.7 Million In Bitcoin Stolen! Will Latest Setback Kill Digital Currencies? (EN) | etfdailynews.com
| 14-02-2014 | What a week for Bitcoin. First the popular digital currency suffered a massive cyberattack on its public register or ledger, via a distributed denial of service (DDOS) attack on Bitcoin exchanges. The ledger notes every bitcoin transaction, and malicious parties were entering fake tra...
Read more

Thief's conviction shines light on ATM skimming (EN) | www.sfgate.com
| 15-02-2014 | NORFOLK, Va. (AP) â€" The Bulgarian man stuck a device to the front of a Virginia Beach ATM, federal investigators said. He pointed a nearby camera at its keypad and walkedaway.From there, it was just a matter of time before he and his compatriots back in Eastern Europe could start li...
Read more

Cybersecurity Act Awaiting Approval In Congress (EN) | www.inquisitr.com
| 14-02-2014 | The National Cybersecurity and Critical Infrastructure Protection Act (HR3696) was introduced in Congress as the power grid attacks of 2013 finally filtered into the American consciousness. The cyber security legislation is supposed to allow communications integration centers within t...
Read more

5 lessons we learned from Obama's new cyber security framework (EN) | www.itproportal.com
| 14-02-2014 | On Wednesday, US President Barack Obama's administration issued an executive order aimed and setting out a comprehensive framework for the nation's cyber security.The framework is designed to help operators of critical infrastructure develop up-to-date and effective cybersecurity prog...
Read more

HSD Campus Officially Opened by Minister of Security & Justice (EN) | www.thehaguesecuritydelta.com
| 14-02-2014 | 14 February 2014 National Security, Cyber Security, Critical Infrastructure, Urban Security, Forensics, Education Minister Opstelten (Security and Justice) and Mayor Van Aartsen (municipality of The Hague) have officially opened the HSD Campus. Minister Opstelten: "Security issues are...
Read more

Where do you draw the line on securing critical infrastructure? (EN) | gcn.com
| 14-02-2014 | The National Institute of Standards and Technology released its Cybersecurity Framework for critical infrastructure this week, a set of voluntary standards and best practices that the administration would like to see widely adopted by operators of systems critical to the nation’s ec...
Read more

Smart Grid: End-to-end, multi-layer smart grid security - How Altalink did it (EN) | www.smartgridnews.com
| 14-02-2014 | Quick Take: There's plenty of talk about smart grid security. And plenty of handwringing. But still far too few examples of successful implementations. One early success story comes from AltaLink, Alberta's largest transmission provider. It set out in 2010 to modernize its 12,000 km t...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish