Under construction

New design coming soon!

CIC News engine statistics

CIC News for 26-02-2014 contains 54 articles

CIC News update contains 54 articles for today, have fun reading.

Cyber extortionists on the prowl: Dubai residents fall victims of sexual blackmail via social media (EN) | www.emirates247.com
| 25-02-2014 | Some residents of Dubai have fallen victims of sexual blackmail after they were lured into having video chats via apps on social networking sites such as Badoo Facebook and Skype, according to the Arabic daily ‘Emarat Al Youm’.The newspaper said the victims didn’t re...
Read more

(EN) | www.cr80news.com
| 25-02-2014 | Identity theft and financial fraud has grown more advanced in recent years, and the latest trend could see college students become the primary target.According to the Javelin Strategy and Research 2013 Identity Theft Report, The Federal Trade Commission reported roughly one-in-five fr...
Read more

House oversight panel seeks documents on Target breach (EN) | news.yahoo.com
| 25-02-2014 | WASHINGTON (Reuters) - A House of Representatives committee with broad investigative jurisdiction has turned up the heat on Target Corp, demanding that the No. 3 U.S. retailer turn over internal documents and messages describing how and when it learned of a recent massive consumer dat...
Read more

(EN) | indianapublicmedia.org
| 25-02-2014 | The names, social security numbers and addresses of 146,000 Indiana University students and recent graduates have been compromised in a data breach.People across all seven campuses who attended IU from 2011-2014 are potentially at risk.University officials say the problem wasn’t a t...
Read more

Computer Malware Helping Thieves In Bitcoin Mining Operations (EN) | www.redorbit.com

| 25-02-2014 |Malware-ridden computers are being used to help mine Bitcoins, according to computer scientists at the University of California, San Diego.

...
Read more

Sofware designed to thwart attempts to perform unauthorized actions (EN) | www.upi.com
| 25-02-2014 | ATLANTA, Feb. 25 (UPI) -- U.S. researchers say they've developed software to prevent malware from sending spam emails and instant messages or making unauthorized money transfers.Created at the Georgia Tech College of Computing, Gyrus is intended to stop malware from, for example, conv...
Read more

Cybercrime Hits U.S. Companies Harder Than Most (EN) | www.entrepreneur.com
| 25-02-2014 | Companies everywhere are increasingly vulnerable to cybercrime, but U.S. companies appear to be even more threatened than most, says a new report.According to PricewaterhouseCooper's 2014 Global Economic Crime Survey, U.S. businesses were hit harder financially by cybercrime relative ...
Read more

‘Obama blokkeerde cyberaanval op Syrië’ (NL) | www.nrc.nl
| 25-02-2014 | Niet lang na het uitbreken van de oorlog in Syrië in 2011 hebben het Pentagon en de NSA een aanvalsplan ontwikkeld, waarvan een geraffineerde cyberaanval op het regime en het leger van Assad deel uitmaakte. De plannen werden gevetood door Obama, meldt The New York Times. Het doel van...
Read more

Cybercriminelen zetten botnet in om bitcoins te stelen (NL) | www.nu.nl
| 25-02-2014 | Cybercriminelen hebben een botnet opgezet van enkele honderdduizendencomputers, om eventuele virtuele portemonnees te ontdoen van bitcoins en andere virtuele valuta. Dat meldt Reuters, op basis van beveiligingsbedrijf Trustwave.Het botnet is opgebouwd uit pc's die ge...
Read more

Tilburg denkt dat het niet zo'n vaart loopt met beveiliging Windows XP (NL) | www.brabantsdagblad.nl
| 25-02-2014 | TILBURG - In Tilburg wordt, net als in veel andere gemeenten, nog volop gewerkt met Windows XP. Ook nu bekend is dat Microsoft het verouderde systeem per 8 april niet meer ondersteunt, zoals het bedrijf vermeldt op zijn site. Dit betekent dat deze versie van Windows geen beveiligingsu...
Read more

Exclusive: New thesis on how Stuxnet infiltrated Iran nuclear facility (EN) | www.csmonitor.com
| 25-02-2014 | One enduring mystery about Stuxnet, the first cyberweapon the world has known, is this: Just how did that “digital missile” infiltrate Iran’s secret Natanz nuclear fuel-enrichment facility in the first place? Skip to next paragraph A new thesis about that, to be outl...
Read more

MasterCard tied to your mobile phone location prevents credit card fraud (EN) | www.examiner.com
| 25-02-2014 | According to an announcement from Forbes today, Master Card is in the testing phase of creating a system that only allows charges to process if your credit card is near you, or essentially near your mobile phone.Syniverse, a global telecommunications company, will be partnering with M...
Read more

Big Data Breach: 360 Million Newly Stolen Credentials For Sale (EN) | www.nbcnews.com
| 26-02-2014 | A cybersecurity firm said on Tuesday that it uncovered stolen credentials from some 360 million accounts that are available for sale on cyber black markets, though it is unsure where they came from or what they can be used to access.The discovery could represent more of a risk to cons...
Read more

ST. PAUL, Minn.: Minn. lawmakers object to data-breach bill (EN) | www.theolympian.com
| 25-02-2014 | ST. PAUL, Minn. â€" Objections to a bill that would expand the victim-notification process after a retail or wholesale business data breach were strident and frequent during a hearing Tuesday afternoon of the Minnesota House commerce committee.State representatives also doubted the wi...
Read more

450 Million WhatsApp Users Vulnerable to Malware Reported (EN) | www.digitaljournal.com
| 25-02-2014 | (PRWEB) February 25, 2014 WhatsApp was recently purchased by Facebook for 19 million dollars, a high price to pay for an inherently insecure application. All of the estimated 450 Million active WhatsApp users remain vulnerable to having their entire conversation histories stolen by ma...
Read more

Apple security flaw could be a backdoor for the NSA (EN) | rt.com
| 25-02-2014 | Was the National Security Agency exploiting two just-discovered security flaws to hack into the iPhones and Apple computers of certain targets? Some skeptics are saying there is cause to be concerned about recent coincidences regarding the NSA and Apple. Within hours of one another ov...
Read more

Oliver: Massive data breach brings reality check (EN) | www.nwherald.com
| 26-02-2014 | Normally I’m not one to do much shopping in late November and early December.I’m not a fan of crowds, and I rarely want anything badly enough to sit in a long line.But a friend had just had a baby, so I took a deep breath and headed to Target on Dec. 5 for a gift. Little did I kno...
Read more

Android malware using TOR anonymity network makes a debut (EN) | www.pcworld.com
| 25-02-2014 | Kaspersky Lab has spotted malware for the Android mobile operating system employing the TOR anonymity network, a development previously only seen on Windows.TOR, short for The Onion Router, is software that offers users a greater degree of privacy when browsing the Internet by routing...
Read more

New JackPOS PoS Malware Evades Anti-Virus Products to Compromise at Least 4,500 Payment Cards (EN) | www.seculert.com
| 25-02-2014 | SCMagazine.com is reporting that at least 4,500 debit and credit cards in the US and Canada have been compromised by JackPOS: a new type of PoS malware based on the RAM scraping Alina family.According to researchers at IntelCrawler who discovered the campaign, the threat actors used w...
Read more

Credentials of 200,0000 People Compromised in Global Botnet Attack (EN) | www.bitdefender.com
| 25-02-2014 | Nearly 200,000 people had account credentials, Bitcoins and other virtual currencies stolen by a small group of cybercriminals in a global botnet attack, according to a Trustwave Spider Labs blog announcement. The attack, carried out in the last four months, used a Pony botnet to stea...
Read more

Cybercrime causes RM108 million in losses (EN) | www.nst.com.my
| 26-02-2014 | IPOH: Cybercrime caused losses of RM108 million in Perak last year. This was revealed in a seminar organised by Batu Gajah police to raise awareness on the growing threat of cybercrime. Attended by over 200 participants, the seminar focused on the increasing prevalence of online love ...
Read more

Hacktivists attack govt websites to 'protect' online freedom of expression (EN) | www.gmanetwork.com
| 26-02-2014 | A group claiming affiliation with hacktivists attacked early Wednesday several government websites, including that of the Office of the Vice President, supposedly to defend Filipinos' right to freedom of expression online. PrivateX posted on its social media accounts a list of website...
Read more

AFP, NSW Cybercrime Squad arrest man for 96 fraud offences (EN) | www.computerworld.com.au
| 26-02-2014 | A 23-year-old man alleged to have committed 96 offences including credit card fraud and online marketplace scams has been arrested in Brisbane by the NSW Police Fraud and Cybercrime Squad and Australian Federal Police (AFP). Some of the other alleged offences include forging of driver...
Read more

Bill to criminalize cyber bullying passes House Education committee (EN) | www.thedenverchannel.com
| 24-02-2014 | DENVER - A bill that makes cyberbullying a crime, unanimously passed the House Education Committee Monday."Bullying is no longer in our playgrounds ...(It) has gone high-tech. Cyberbullyingis when a child or a teenager is harassed, humiliated, embarrassed, threatened or tormented usin...
Read more

Cyber crime, threats and viruses Have you heard of spear phishing? (EN) | www.bradenton.com
| 26-02-2014 | Computer and network security is an important issue to many business owners and managers. One of the most common security threats companies come across is phishing. Because phishing has become so prevalent, most people are aware of these underhanded methods. This has led hackers to co...
Read more

Strasbourg round-up: New Europol report makes some progress but is still 'lacking' (EN) | www.theparliament.com
| 26-02-2014 | Despite some improvements scrutiny of Europol remains a contentious issue, particularly regarding data protection, and on this the report 'falls short', according to shadow rapporteurs Timothy Kirkhope and Cornelia Ernst Timothy Kirkhope is parliament's ECR shadow rapporteur on Europe...
Read more

CORRECTED-Hackers target Brazil's World Cup for cyber attacks (EN) | www.chicagotribune.com
| 26-02-2014 | SAO PAULO (Reuters) - Brazilian hackers are threatening to disrupt the World Cup with attacks ranging from jamming websites to data theft, adding cyber warfare to the list of challenges for a competition already marred by protests, delays and overspending. In a country wit...
Read more

Apple beset by Angry Birds malware (EN) | www.gmanetwork.com
| 26-02-2014 | It may take no less than these Angry Birds to remind users of Apple computers running OS X that their machines are not invulnerable to malware. A new wave of malware is disguising itself as cracked versions of Angry Birds, as well as popular apps such as Pixelmator, security research...
Read more

ZeuS KICKS that SaaS: Trojan raids Salesforce.com accounts (EN) | www.theregister.co.uk
| 26-02-2014 | Miscreants have forged a variant of the infamous ZeuS banking Trojan that targets enterprise data held by clients of CRM giant Salesforce.com.The ZeuS variant does not exploit a vulnerability in the Salesforce.com platform itself but rather penetrates the insecure devices of corporate...
Read more

Android users warned vs WhatsApp malware (EN) | www.gmanetwork.com
| 26-02-2014 | Users of mobile devices running Google's Android operating system may have to think twice and check their math before downloading and installing the popular WhatsApp application. Panda Security said perpetrators of the new attack used advertising on Facebook to trick victims into dow...
Read more

IE zero-day exploit that struck VFW website being used in widespread attacks (EN) | www.pcworld.com
| 26-02-2014 | The number of attacks exploiting a yet-to-be-patched vulnerability in Internet Explorer has increased dramatically over the past few days, indicating the exploit is no longer used just in targeted attacks against particular groups of people.The vulnerability affects Internet Explorer ...
Read more

Tide of mobile malware rising and diversifying (EN) | www.channelweb.co.uk
| 26-02-2014 | Massive expansion in the smart device market has spurred the development of mobile phone malware, especially when it comes to Android-based gadgets.The news is from Sophos' mobile security threat report released at Mobile World Congress in Barcelona this week.According to SophosLabs p...
Read more

Malware is Everywhere. Now, so is Advanced Malware Protection from Cisco. (EN) | blogs.cisco.com
| 26-02-2014 | Malware is everywhere and it’s incredibly challenging to combat, using whatever unprotected path exists to reach its target and accomplish its mission.Malware has become the weapon of choice for hackers. According to the 2013 Verizon Data Breach Investigation Report, of the top 20 t...
Read more

Sophisticated Malware Serial Attacks Irk U.S. Judiciary (EN) | tech.co
| 26-02-2014 | Malware attacks are harmful enough, but serial attacks can be devastating. Many people and businesses around the world rely on computers for their daily needs. Although computers offer a fast and easy form of communication, they are also targets. This is especially true with computers...
Read more

Mobile malware will be a very real threat, just ask Apple ... (EN) | medcitynews.com
| 26-02-2014 | This week, the RSA Conference will draw its annual pilgrimage of data security professionals seeking insights on market and technology trends.As a seed-stage security investor in this industry, it has been my job to predict the future of cybersecurity, and so now’s a good time to sh...
Read more

136 Pct Increase In Cyber Threats And Attacks Against Govt In India In 2013 (EN) | www.siliconindia.com
| 26-02-2014 | Data centers are a target for DDoS attacks · More than 70 percent operating data centers reported DDoS attacks this year, up dramatically from under half last year. · More than a third experienced attacks that exceeded total available Internet connectivity, nearly double that of las...
Read more

Bitly Suffers DDoS Attack, All Links Working Now (EN) | mashable.com
| 26-02-2014 | Bitly, the popular URL shortening tool, suffered a distributed denial-of-service (DDoS) attack on Wednesday, which impacted portions of its website.The company confirmed the attack with the following statement on the main page of its site on Wednesday morning: "Bitly is currently work...
Read more

'Geheime diensten verwoesten opzettelijk reputaties' (NL) | www.rtlnieuws.nl
| 26-02-2014 | Geheime diensten proberen opzettelijk reputaties van personen en bedrijven te beschadigen, bijvoorbeeld op sociale media. In een gelekt document staat uitgelegd hoe geheim agenten reputaties kunnen manipuleren en kapot kunnen maken. Een groep journalisten kwam achter de praktijken toe...
Read more

Twitter restores rare username @N to hijacking victim (EN) | www.independent.co.uk
| 26-02-2014 | Twitter has restored the account of a Naoki Hiroshima, a computer developer whose coveted single-letter username was stolen in January.Hiroshima’s twitter account, @N, was the target of an alarming blackmail campaign by an anonymous thief, intent on securing the rare use...
Read more

How malware operators use infected computers to mine cryptocoins (EN) | phys.org
| 26-02-2014 | A team of computer scientists at the University of California, San Diego, has taken an unprecedented, in-depth look at how malware operators use the computers they infect to mine Bitcoin, a virtual currency whose value is highly volatile. Researchers examined more than 2,0...
Read more

Will Apple's iBeacon prove to be a useful feature or just mobile spam (EN) | www.pfhub.com
| 25-02-2014 | Apple Inc. (NASDAQ:AAPL) has recently introduced its iBeacon system at retail stores and a few select sports stadiums, with many more venues slated for inclusion in the near future. This device communicates with iOS 7 mobile devices such as iPhones and iPads via a low energy Bluetooth...
Read more

Apple data breach compromises users of iOS and OS X (EN) | www.insidecounsel.com
| 26-02-2014 | Hacking and cybersecurity breaches are more common these days than any consumer, business or government agency likes, and they occur not just on the fringes of the Web, but within major corporations, affecting millions of users. The most recent data breach comes from one of the most h...
Read more

Target warns data breach could hurt future profit (EN) | www.chicagotribune.com
| 26-02-2014 | NEW YORK/BOSTON (Reuters) - Target Corp warned that costs tied to a cyber attack that affected tens of millions of shoppers could hurt its results in the first quarter and beyond, but shares rose as its full-year outlook was better than some investors had feared. The third-lar...
Read more

Alleged ATM 'skimming' ringleader due in court (EN) | online.wsj.com
| 26-02-2014 | NEWARK, N.J. â€" The alleged ringleader of a group that federal prosecutors say stole at least $5 million by installing "skimming" devices in cash machines is due in court.Romanian national Marius Vintila was indicted last week on counts including bank fraud conspiracy and aggravated ...
Read more

Law Enforcement Aims to Prevent Cyber-Attacks: Secret Service Agent (EN) | www.eweek.com
| 26-02-2014 | A special agent reminds us that when it comes to cyber-crime it's all about the money. SAN FRANCISCOâ€"What role does law enforcement play in helping prevent and stop cyber-crime? That question was tackled during a press event hosted by Verizon at the RSA conference Feb. 25.Cyber-crim...
Read more

Patchen is het halve beveiligingswerk (EN) | www.automatiseringgids.nl
| 26-02-2014 | Patches zonder dralen aanbrengen verkleint de risico's op een besmetting met malware aanzienlijk. Alleen al het up-to-date houden van Windows maakt 32 procent van de malware onschadelijk. Dat concludeert Simon Edwards van Dennis Technology Labs uit een test van de toegevoegde waarde v...
Read more

Android-targeting botnet creators jump on Tor source code (EN) | www.zdnet.com
| 26-02-2014 | As technology evolves and network providers shore up their security, hackers -- as usual -- generally remain several steps ahead. Botnets, often used to force compromised slave computers to flood websites with traffic and bring them down in distributed-denial-of-service (DDoS) attacks...
Read more

Cybercriminelen Zetten Botnet In Om Bitcoins Te Stelen (NL) | www.nutech.nl
| 25-02-2014 | Cybercriminelen hebben een botnet opgezet van enkele honderdduizendencomputers, om eventuele virtuele portemonnees te ontdoen van bitcoins en andere virtuele valuta. Dat meldt Reuters, op basis van beveiligingsbedrijf Trustwave.Het botnet is opgebouwd uit pc's die geïnfecteerd zijn m...
Read more

Australian companies are world's second most-attacked: Fortinet (EN) | www.cso.com.au
| 26-02-2014 | Customers in Australia comprised a third of all malware victims reported to security research facility FortiGuard Labs during 2013, according to new figures in Fortinet's 2014 Threat Landscape Report.With 33.19 per cent of all incidents handled by the research team, Australia appeared...
Read more

Banks mull limits on withdrawals to combat ATM theft (EN) | www.abs-cbnnews.com
| 26-02-2014 | MANILA, Philippines - The increasing incidence of ATM theft is prompting banks to study the option of further limiting ATM withdrawals, according to a bank official.In 2013 alone, around P220 million was lost due to ATM theft, much higher than the P175 million lost in 2012.Rene Nativi...
Read more

More gov't websites defaced after 'Black Tuesday' (EN) | www.abs-cbnnews.com
| 26-02-2014 | MANILA - Hackers defaced more government websites on Wednesday, a day after the so-called Black Tuesday protest against the Cybercrime Prevention Act of 2012.The websites of the Pilipinas Anti-Piracy Team, TESDA Region 11, Mandaluyong City and the Philippine Embassy in Rome displayed ...
Read more

Int'l media group joins calls to repeal Anti-Cybercrime law (EN) | www.gmanetwork.com
| 26-02-2014 | An international media watchdog group on Wednesday joined a Philippine media group in condemning the Supreme Court's upholding of the constitutionality of the Anti-Cybercrime law - and seeking its repeal. The International Federation of Journalists echoed the National Union of Journal...
Read more

Why international cooperation is needed to thwart cybercrime (EN) | www.cbronline.com
| 26-02-2014 | RSA calls for unity among nations and cyber security specialists. Executive VP of EMC Corporation and executive chairman of RSA, Art Coviello, used his keynote speech at RSA Conference 2014 to call for international government and industry cooperation on major issues including cyber w...
Read more

Huge turnout at RSA shows hackers are winning (EN) | www.computerworld.com.au
| 26-02-2014 | SAN FRANCISCO -- In the battle between enterprises and malicious hackers, the bad guys are clearly winning, judging by the sheer number of people and exhibitors at the RSA security conference going on here this week.With an estimated 30,000 attendees and more than 400 exhibitors, RSA ...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish