Under construction

New design coming soon!

CIC News engine statistics

CIC News for 21-02-2014 contains 56 articles

CIC News update contains 56 articles for today, have fun reading.

Malware has changed, but its name hasn't â€" and likely won't (EN) | www.csoonline.com
| 20-02-2014 | â€" CSO â€" What's in a name? For one security expert, not enough when the name is "malware." In a recent blog post, Seculert CTO Aviv Raff argued that, especially in the security industry, being, "stuck using the same old terms to describe completely new things," can be dangero...
Read more

Adobe Flash exploit targets security, public policy sites (EN) | www.pcworld.com
| 20-02-2014 | Abobe planned to release an emergency update for Flash Player on Thursday, after security vendor FireEye pointed to a zero-day exploit used by attackers to target visitors to websites of three nonprofits, two of which focus on national security and public policy.The Flash exploit allo...
Read more

Facebook WhatsApp Charge? ‘Pay 5 Dollars’ to Keep Using is Fake; Could Spread Malware, Scams (EN) | www.theepochtimes.com
| 20-02-2014 | A viral post on Facebook is saying that WhatsApp, which recently entered a partnership with Facebook, will start charging $5 to users to keep using it.“Pay 5 dollar (sic) to keep using WhatsApp,” one of the scam posts reads.However, that’s a long-running hoax since the service b...
Read more

Beware Greeks bearing lists: Bank-raiding nasty Zeus smuggles attack orders in JPEGs (EN) | www.theregister.co.uk
| 20-02-2014 | A new variant of the bank-account-raiding Zeus malware apparently uses the ancient technique of steganography to update its list of websites to subvert.Dubbed ZeusVM, the crafty strain is just like its cousins in that it intercepts activity in a victim's web browser, siphons off passw...
Read more

Fake Flappy Bird apps may contain malware (EN) | www.wxyz.com
| 20-02-2014 | Flappy Bird fans, this news may feel worse than crashing into one of those green pipes.The Better Business Bureau is warning smartphone users that fake versions of the popular app Flappy Bird may plant unwanted malware on your phone.After the original creator of Flappy Bird discontinu...
Read more

More than 7,000 FTP Websites and servers Hijacked to Distribute Malware (EN) | www.spamfighter.com
| 21-02-2014 | Security experts of security firm Hold Security say that around 7,000 FTP (File Transfer Protocol) websites and web servers have been hijacked to serve malicious software or malware.The function of FTP sites as Internet file caches are reachable remotely mainly via Web bro...
Read more

Internet Explorer users warned of zero-day exploit used in targeted attacks (EN) | grahamcluley.com
| 21-02-2014 | Microsoft has issued a warning about a critical zero-day vulnerability in versions of Internet Explorer, that is being exploited in “limited, targeted attacks”.The Seattle-based software giant said in an advisory that only Internet Explorer 9 and Internet Explorer 10 are affected ...
Read more

Source code for Android iBanking bot surfaces on underground forum (EN) | www.pcworld.com
| 21-02-2014 | The source code for an Android mobile banking Trojan app was released on an underground forum, making it possible for a larger number of cybercriminals to launch attacks using this kind of malware in the future.The Trojan app had initially appeared on the underground market late last ...
Read more

Proof that revenge sucks (EN) | www.thehindu.com
| 21-02-2014 | Success may have different hues, but when it comes to varying tastes, there’s nothing like revengeThe dreaded underworld from the cyberworld was in session. This was a splinter group that called itself Cosa Moustra (loosely translated into ‘The mouse’s thing’) and was actively...
Read more

Azerbaijani special services use spyware to monitor computers (EN) | www.panorama.am
| 21-02-2014 | Four cyber sleuths claim to have found evidence of "untraceable," government-grade surveillance software in use in 21 countries, including Azerbaijan, with dubious practices in human rights and Internet freedom.It is noted that this is the first time that the researchers c...
Read more

Kentucky Creating Cyber Crime Task Force (EN) | www.wtvq.com
| 20-02-2014 | The Kentucky Department of Financial Institutions is setting up a cyber crimes task force to protect banks and their customers from thieves.The task force will work closely with banks and law enforcement agencies across the state to stay up to date on the latest online sca...
Read more

Irish cyberpsychologist Mary Aiken inspires latest CSI TV spin-off (EN) | www.siliconrepublic.com
| 20-02-2014 | From RCSI to CSI - a potential new spin-off from the TV series CSI: Crime Scene Investigation has been inspired by the work of Irish cyberpsychologist Mary Aiken at the Royal College of Surgeons in Ireland. The planned spin-off will explore technology and human behaviour and will revo...
Read more

Senators seek to decriminalize libel in wake of anti-cybercrime law (EN) | www.philstar.com
| 20-02-2014 | MANILA, Philippines - At least four senators have renewed calls to decriminalize libel after the Supreme Court ruled that the online libel provision of the Cybercrime Prevention Act is constitutional.Senator Teofisto Guingona III has filed Senate Bill No. 2128 to decriminalize libel "...
Read more

Cybercrime hits US companies harder: Report (EN) | hereisthecity.com
| 20-02-2014 | U.S. businesses have been hit the hardest financially by cybercrime compared with other countries around the world, according to a new report.According to PricewaterhouseCooper's 2014 Global Economic Crime Survey, U.S. businesses were hit harder financially by cybercrime relative to o...
Read more

New state task force given job of preventing, detecting, responding to cybercrime activity (EN) | www.kyforward.com
| 19-02-2014 | The Department of Financial Institutions has formed a new task force with an objective to prevent, detect and respond to cybercriminal activity. The Financial Cybercrime Task Force of Kentucky intends to serve and protect both the financial services industry and the public. DFI’s ma...
Read more

Over 200 Android apps most vulnerable to cybercrime (EN) | www.informationweek.in
| 20-02-2014 | A cautionary advice has been issued by India’s first independent CERT for mobile and electronic security, CERT-ISAC (Computer Emergency Response Team â€" Information Sharing and Analysis Centre)Speaking on the sidelines on launching the Western Zone office of CERT-ISAC, ...
Read more

Microsoft Hosts the First Annual Cybercrime Enforcement Summit (EN) | windowsitpro.com
| 20-02-2014 | Last week, Microsoft brought together over 60 cybercrime experts from all over the world to kick off the first annual Cybercrime Enforcement Summit. The two-day event situated at the company's Redmond campus showcased closed-door sessions discussing best practices and further steps re...
Read more

Former Hedge Fund Analyst Charged With Stealing Data (EN) | dealbook.nytimes.com
| 20-02-2014 | A former hedge fund analyst has been charged with stealing confidential computer data from his previous employer, the latest crackdown by the Manhattan district attorney on suspected violations of cybersecurity.The five felony charges against Kang Gao, who worked at the hedge fund Two...
Read more

‘Cyber crime police units need of hour’ (EN) | www.thehindu.com
| 21-02-2014 | Currently, there is just one cyber crime unit functioning under the Central Crime Branch of the Chennai police. With the number of cyber crimes reported in the city on the rise, it is probably time for the police to take a re-look at a long-pending proposal to either establish an excl...
Read more

Financial sector hit hard by data breach cleanup costs (EN) | nakedsecurity.sophos.com
| 21-02-2014 | Cybercrime is all about the money. It motivates most cyber crooks, from hackers penetrating company networks looking for information to sell or exploit, through the operators of online underground marketplaces, to DDoSers hired to take out a rival firm's web infrastructure.And, in the...
Read more

10,000 euro bounty offered for Wurm Online DDoSer (EN) | nakedsecurity.sophos.com
| 21-02-2014 | A bounty of 10,000 euros (around $13,700) has been offered in return for information that leads to the conviction of those responsible for a recent DDoS attack on MMORPG (massively multiplayer online role-playing game) Wurm Online.On Tuesday, shortly after the release of update 1.2, W...
Read more

Cisco Fixes Unauthorized Access, Denial-of-service Flaws in Several Products (EN) | www.cio.com
| 20-02-2014 | The vulnerabilities could allow attackers to take control of affected devices or cause them to become unresponsive IDG News Service â€" Cisco Systems has released security updates to fix serious vulnerabilities in a range of products including its Intrusion Prevention Syst...
Read more

Namecheap targeted in monumental DDoS attack (EN) | news.cnet.com
| 20-02-2014 | The service known for hosting millions of Web sites is the victim of a cyberattack that knocked out connections for domains around the world. The Web-hosting service Namecheap was hit with what it says was one the largest distributed-denial-of-service attacks "anyone has s...
Read more

Cyberattack victim gaming website offers $13,000 to bring hackers to justice (EN) | www.zdnet.com
| 20-02-2014 | Summary: The developers of an online game that was subject to a DDoS attack at launch has offered a bounty to catch those responsible. Online gaming website Wurm, a recent victim of a cyberattack, has offered a bounty not for the discovery of bugs -- but of hackers.<...
Read more

'Wolf of Wall Street' muse gets sued by a friend over credit card fraud (EN) | www.lawyerherald.com
| 21-02-2014 | Former investment advisor Dana Giacchetto appeared in a federal court on Thursday over charges filed by a friend, Reuters said in a report. Giacchetto is facing two counts of fraud for allegedly using a friend's credit card to buy liquor, plane ticket and food purchases, among others ...
Read more

Huge ATM Skimming Case Progresses (EN) | www.bankinfosecurity.com
| 21-02-2014 | The arrest, extradition and indictment of a Romanian who's alleged to have orchestrated one of the biggest ATM skimming rings in the U.S. illustrates how collaboration among international authorities is working to more swiftly bring global cybercrime leaders to justice (see Charges in...
Read more

City man charged with credit card fraud (EN) | www.johnsoncitypress.com
| 20-02-2014 | Johnson City police arrested a city man Wednesday after an investigation into several unauthorized uses of a credit card.According to investigators, Kevin E. Gross, 46, 617 N. Barton St., used an acquaintance's credit card on multiple occasions without permission to do so.Authorities ...
Read more

North Platte man charged with skimming cash while on the job at motel (EN) | www.dailyjournal.net
| 20-02-2014 | NORTH PLATTE, Nebraska â€" A 29-year-old North Platte man has been accused of stealing more than $3,400 from his employer. Online court records say Robert "Robbie" Richards is charged with felony theft. Lexington radio station KRVN says (http://bit.ly/1oVVXkN ) Richards was arrested e...
Read more

'China Valt Amerikaanse Denktanks Aan Via Flash-Lek' (NL) | www.nutech.nl
| 20-02-2014 | China gebruikt een ernstig lek in Adobe Flash om Amerikaanse denktanks aan te vallen en gevoelige informatie over denationale veiligheid en openbare orde buit te maken. Dat meldt beveiligingsbedrijf Fireeye in een blog. Volgens het bedrijf zijn de Flash-aanvallen uitgevoerd door Chine...
Read more

Nieuwe valse e-mail ING bevat alleen link (NL) | www.opgelicht.nl
| 20-02-2014 | Niet alle valse e-mails staan vol informatie. Deze variant is gemaakt door klaarblijkelijk luie oplichters en bevat enkel een link naar een dubieuze website. Ook deze mail is niet door ING verzonden, maar door criminelen die uit zijn op uw bankgegevens. Klik no...
Read more

Play Store lijkt strijd tegen malware te verliezen (EN) | www.automatiseringgids.nl
| 20-02-2014 | Meer dan 42.000 android-apps in de Play Store van Google bevatten malware. Een jaar geleden bleef het nog bij 11.000 apps die de gebruikers bespioneren en ongevraagd gegevens doorsturen. Met name zorgwekkend is dat Google steeds minder succesvol lijkt in de strijd tegen de malware in ...
Read more

Large Hadron Collider used vulnerable SCADA system (EN) | www.itnews.com.au
| 21-02-2014 | The Large Hadron Collider has used a SCADA platform revealed last month to contain holes that allowed attackers to gain 'full control' of industrial machinery. Siemens developed patches for the SIMATIC WinCC Open Architecture application this month after researchers Sergey Gordeychik ...
Read more

Smart Grid: Hope for grid security? The federal government may actually get something done (EN) | www.smartgridnews.com
| 20-02-2014 | Quick Take: It appears the current U.S. Congress will go down in history as passing less legislation and getting less accomplished than any other. Despite its do-nothing reputation, however, it did recently take two small steps toward a safer grid. This is important stuff. We warned y...
Read more

White House Launches Infrastructure Cyber Security Initiative (EN) | jewishvoiceny.com
| 19-02-2014 | Policies intended to improve public and private security effortsLast week the White House announced new policies improving public and private security efforts to protect critical U.S. infrastructures against the growing threat of cyber attacks.“Cyber threats pose one the gravest nat...
Read more

10.000 euro voor tip DDoS Wurm Online (NL) | www.xgn.nl
| 20-02-2014 | De ontwikkelaar van Wurm Online looft een beloning uit van 10.000 euro voor de gouden tip die leidt naar de dader of daders van de DDoS-aanvallen op de game. Enkele gamers laten hun frustratie blijken op het forum van Wurm Online over de aanvallen. Gisteren werd een langve...
Read more

Zuid-Korea wil Stuxnet-achtige cyberwapens ontwikkelen (NL) | www.security.nl
| 21-02-2014 | Het Zuid-Koreaanse leger wil Stuxnet-achtige cyberwapens gaan ontwikkelen om de nucleaire installaties en raketten van Noord-Korea te ontregelen. Deze week onthulde het Koreaanse Ministerie van Defensie een plan, waarbij er ook aan de ontwikkeling van offensieve cybertools zoals Stuxn...
Read more

Nearly 200 Cyber crime related incidents reported in SL each month (EN) | www.dailymirror.lk
| 21-02-2014 | The Sri Lanka Computer Emergency Readiness Team Coordination Centre (Sri Lanka CERT CC) established in 2007 to protect the country’s information infrastructure and coordinate protective measures against cyber security revealed that it receives about 200 complaints monthly related to...
Read more

New Cybersecurity Framework Aims at Protecting Nation's Critical Infrastructure (EN) | www.tottenhamnews.org
| 20-02-2014 | ARMONK, NY â€" IBM announced a new service offering to help critical infrastructure organizations utilize a new Cybersecurity Framework announced by the Administration at the White House.-nbsp; The new New Cybersecurity Framework Aims at Protecting Nation's Critical Infras...
Read more

National cybersecurity framework released â€" has your organisation considered the implications? (EN) | www.thelawyer.com
| 20-02-2014 | By Catherine D Meyer, Meighan E O’Reardon, Deborah S Thoren-Peden and Amy L PierceOn 12 February 2014, the National Institute of Standards and Technology (NIST) released the final version of its Framework for Improving Critical Infrastructure Cybersecurity and the companion NIST Roa...
Read more

Hacked in 20 Minutes: Social Engineering Done Right (EN) | securitywatch.pcmag.com
| 20-02-2014 | How long would it take for an attacker to break into a business? Get on the corporate network as an authenticated user? If you think it would take a few days or even a few hours, you are way, way off.Try 20 minutes.It took David Jacoby, a senior security researcher with the Global Res...
Read more

S. Korea Seeks Cyber Weapons to Target North Korea’s Nukes (EN) | thediplomat.com
| 21-02-2014 | South Korea is developing offensive cyber weapons to target North Korea’s nuclear weapons program, according to the country’s defense ministry said on Wednesday.According to Yonhap News Agency, South Korea’s Defense Ministry outlined its long-term cyberpolicy to the parliamentâ€...
Read more

South Korea green lights Stuxnet-like code weapons to nark NORKS (EN) | www.theregister.co.uk
| 21-02-2014 | The South Korean government has approved plans to develop a Stuxnet-like virus to disrupt Pyongyang’s missile and atomic capabilities, according to local reports.The plans are part of a new defence ministry strategy designed to enhance Seoul’s offensive capabilities, in a bid to c...
Read more

Top 10 worst state-sponsored hack campaigns: From PRISM to Stuxnet and Mask (EN) | www.v3.co.uk
| 21-02-2014 | Since the first computer was connected to the internet we've seen a steady stream of a new malware variants and cyber scams doing the rounds. However, it's only in the last few years things have really heated up, with a number of startling revelations showing it's not just criminals p...
Read more

Australian Government Data Breach Exposes Info on 10,000 Asylum Seekers (EN) | www.esecurityplanet.com
| 19-02-2014 | Names, nationalities, locations, boat arrival information and arrival dates were mistakenly published online. The Guardian reports that a database containing the personal details of almost 10,000 asylum seekers in Australia, both adults and children, was mistakenly made av...
Read more

University of Maryland Hit By Massive Data Breach Stretching Back 16 Years (EN) | www.wggb.com
| 20-02-2014 | COLLEGE PARK, Md. (AP) â€" The president of the University of Maryland says there has been a breach of a database that contains personal information about more than 300,000 faculty, staff, students, and others.Wallace Loh said in a statement posted Wednesday on the university’s webs...
Read more

Univ. Of Md. Data Breach Impacts More Than 300K With IDs Issued Since 1998 (EN) | baltimore.cbslocal.com
| 20-02-2014 | COLLEGE PARK, Md. (WJZ) â€" Massive data breach at the University of Maryland. Personal information of more than 300,000 faculty, staff and students is exposed.Derek Valcourt has more on what hackers compromised and what’s being done about it.It affects some people who were issued u...
Read more

Spam phone calls cost US small businesses half a billion dollars in lost productivity (EN) | www.zdnet.com
| 20-02-2014 | Summary: Spam phone calls are annoying, and expensive for businesses. Small businesses in the US lose nearly half a billion dollars a year in lost productivity by handling telemarketing and other unwanted calls,. Spam callers are an unending source of frustration for many ...
Read more

UMD Data Breach: What You Need to Know (EN) | www.nbcwashington.com
| 20-02-2014 | Hackers broke into the University of Maryland database system this week, stealing full names, Social Security numbers and birthdays (among other personal information) of hundreds of thousands of students and staff. This data breach is very different from other recent hacks, such as th...
Read more

Man Sues Wells Fargo over Kafkaesque Identity Theft Nightmare (EN) | www.esecurityplanet.com
| 20-02-2014 | Carlos Gomez spent two weeks in jail and seven months under house arrest after a bank employee stole his identity and used it to launder stolen money. The Miami Herald reports that Carlos M. Gomez, 36, of Kendall, Fla., is suing Wells Fargo for "malicious prosecution" afte...
Read more

Insurance Company Fined $6.8 Million for Data Breach (EN) | www.esecurityplanet.com
| 20-02-2014 | TSS mistakenly exposed 13,336 beneficiaries' Medicare Health Insurance Claim Numbers. The Wall Street Journal reports that Triple-S Management will be fined $6.8 million by the Puerto Rico Health Insurance Administration following a data breach at the Puerto Rican insuranc...
Read more

Well.ca Data Breach Exposes Customer Credit Card Information (EN) | www.esecurityplanet.com
| 21-02-2014 | Names, billing addresses, credit card numbers, expiration dates and CVV codes were exposed. ITBusiness.ca reports that health and beauty retailer Well.ca was recently breached (h/t DataBreaches.net).According to the company, a "few thousand" customer names, bil...
Read more

Android Malware teller: G Data ziet bijna 1,2 miljoen nieuwe malwareprogramma’s in 2013 (NL) | www.marqit.nl
| 21-02-2014 | In het afgelopen jaar werden er 877 miljoen Android smartphones en tablets verkocht (bron: Gartner). Niet vreemd dat ook malwareschrijvers zich volop op dit platform storten. Alleen al in de tweede helft van 2013, zag beveiligingsexpert G Data 673.000 nieuwe malwaregevallen voor Andro...
Read more

Unnecessary admin accounts behind malware risks (EN) | www.itworldcanada.com
| 20-02-2014 | By being more discriminate in doling out administrator accounts, chief security officers (CSO) can significantly lower the risk of their organization’s network being infected by malware, according to a recent study.An administrator account typically allows computer users to modify o...
Read more

Google tweaking Gmail malware scanner to unblock research routes (EN) | www.techradar.com
| 20-02-2014 | Google is apparently changing its practice of how it scans Gmail attachments following a security researcher's failed attempt at sharing information with another researcher.Detail the issue in his blog, digital forensics expert Brian Baskin attempted to email malware binary samples to...
Read more

Cybercriminals Target UK Smartphone Users with Porn Apps (EN) | www.ibtimes.co.uk
| 20-02-2014 | Just as marketeers and advertisers will tailor ad campaigns depending on the audience they are talking to, mobile malware campaigns are now evolving to create malicious apps which target a specific region or country.While premium rate SMS fraud remained the primary type of malware aff...
Read more

2 Different Hacker Groups Exploit The Same IE 0-Day (EN) | www.darknet.org.uk
| 19-02-2014 | It hasn’t been too long since the last serious Internet Explorer 0-day, back in November it was used in drive-by attacks â€" Another IE 0-Day Hole Found &amp; Used By In-Memory Drive By Attacks.And earlier last year there was an emergency patch issued â€" Microsoft Rushes Out ‘Fix...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish