Under construction

New design coming soon!

CIC News engine statistics

CIC News for 27-02-2014 contains 27 articles

CIC News update contains 27 articles for today, have fun reading.

1,208 vulnerabilities in the 50 most popular programs - 76% from third-party programs (EN) | www.digitaljournal.com
| 26-02-2014 | COPENHAGEN, Denmark, Feb. 26, 2014 /PRNewswire/ -- Third-party programs are responsible for 76% of the vulnerabilities discovered in the 50 most popular programs in 2013.The result was published today in the Secunia Vulnerability Review 2014. Secunia is a leading provider of IT securi...
Read more

VS onderzoekt handel in bitcoins (NL) | nos.nl
| 26-02-2014 | De Amerikaanse autoriteiten starten een onderzoek naar mogelijke misstanden bij de elektronische beurzen waar bitcoins worden verhandeld. Ze willen van die handelsplatformen onder meer weten hoe zij zijn omgegaan met de recente cyberaanvallen door hackers.Vanwege DDos-aanvallen kwam e...
Read more

Cisco voegt malwarebeveiliging toe aan portfolio (EN) | www.telecompaper.com
| 26-02-2014 | Cisco voegt zijn Advanced Malware Protection (AMP), oorspronkelijk ontwikkeld door Sourcefire, toe aan zijn Content Security Portfolio. De integratie biedt klanten wereldwijd veelomvattende voorzieningen om malware aan te pakken, waaronder detectie, blokkade en continue analyse van ge...
Read more

Bank of Ireland confirms skimming attacks on ATM's in Borris & Graiguenamanagh (EN) | kclr96fm.com
| 26-02-2014 | Bank of Ireland has confirmed skimming attacks at its ATM’s in Borris & Graiguenamanagh.Its understood a considerable amount of money was skimmed from customer accounts â€" the bank says it will be in touch with customers affected.Local Gardai say they’ve received a number of ...
Read more

Mobiel botnet onderschept 27.000 mobiele TAN-codes (NL) | www.security.nl
| 26-02-2014 | Een mobiel botnet dat van een groot aantal bankklanten in het Midden-Oosten de smartphone infecteerde heeft meer dan 27.000 mobiele TAN-codes onderschept. Dat beweert het beveiligingsbedrijf IntelCrawler. De sms-berichten met codes voor internetbankieren werden tussen april 2013 en fe...
Read more

Apple issues major security fix for Macs (EN) | www.cbronline.com
| 26-02-2014 | Apple has released a major security fix to address SSL security flaw in its Macintosh computers that allows hackers to intercept sensitive information such as email.Addressing an embarrassing glitch that emerged several days ago, the latest update issue for Apple PCs powered by OS X o...
Read more

CSA Summit 2014: Using the Cloud to Protect Critical Infrastructure (EN) | www.infosecurity-magazine.com
| 26-02-2014 | By the end of 2014, more than half of all computing workloads will be processed by cloud based-services, based on data provided by Trend Micro’s JD Sherry. With much US-based critical infrastructure being operated by the private sector, there are both security risks and opportunitie...
Read more

NBI raids cybersex den in Navotas City (EN) | www.rappler.com
| 26-02-2014 | MANILA, Philippines â€" The National Bureau of Investigation (NBI) on Wednesday, February 25, raided an alleged cybersex den in Navotas City, rescuing 4 minors and apprehending 2 suspects in the operation.The tandem allegedly in charge of the illegal streaming of child pornography wer...
Read more

Cybercrime causes $41.6 million in losses in Perak (EN) | news.asiaone.com
| 26-02-2014 | IPOH - Cybercrime caused losses of RM108 million (S$41.6 million) in Perak last year. This was revealed in a seminar organised by Batu Gajah police to raise awareness on the growing threat of cybercrime.Attended by over 200 participants, the seminar focused on the increasing prevalenc...
Read more

Teen beauty queen now battles ‘sextortion’ (EN) | www.ktvu.com
| 26-02-2014 | SAN FRANCISCO â€" A teenage beauty queen turned advocate was in the Bay Area Wednesday urging people to pay attention to their cyber security.Cassidy Wolf is the reigning Miss Teen USA. She was also the victim of cyber stalking.“I honestly didn't believe that could happen,” said W...
Read more

Android apps tested for Nokia contain malware (EN) | www.deccanchronicle.com
| 26-02-2014 | BARCELONA: Ahead of the launch of the Nokia X, the Finnish smartphone manufacturer claimed that nine percent of the Android apps it tested contained malware. This highlighted the growing number of threats on the Android platform.During an interview with The INQUIRER at MWC, VP of deve...
Read more

The Malware Factory (EN) | www.cso.com.au
| 27-02-2014 | The days of malware being the pastime of bored teenagers are well behind us. Not only has the malware business become a lucrative revenue stream for some of society's seedier elements but it's entered the age of automation in a big way. Chris Elisan is a member of RSA's FirstWatch tea...
Read more

Apple Patches Serious SSL Exploit That Could Have Exposed OS X, iOS Users to NSA Snooping (EN) | www.dailytech.com
| 26-02-2014 | SSL-breaking bug was present for the last year and a half, but is fortunately finally fixed on both platforms Apple, Inc. (AAPL) is the master of trying minimize image damage when it comes to security problems, but as its products have become more popular, rising numbers of attacks ha...
Read more

Schneier on Security: ENTOURAGE: NSA Exploit of the Day (EN) | www.schneier.com
| 26-02-2014 | Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:ENTOURAGE(S//SI//REL) Direction Finding application operating on the HOLLOWPOINT platform. The system is capable of providing line of bearing for GSM/UMTS/CDMA2000/FRS signals. A band-specific antenna a...
Read more

Cyber Security Startup Announces Release of Cyber War Games DDoS Module (EN) | www.digitaljournal.com
| 26-02-2014 | Today, MazeBolt Technologies, an Israeli based Cyber Security Startup announced the release of their DDoS Simulation module to strengthen their posture in the Cyber Security arena.A methodology commonly known in cyber security circles as a “War Games Simulation”. A roleplay of rea...
Read more

DDoS: More Defenses Needed (EN) | www.bankinfosecurity.com
| 26-02-2014 | While January's seemingly isolated distributed-denial-of-service attacks against JPMorgan Chase and Bank of America may have been a blip, DDoS expert Barrett Lyon says stronger attacks are on the way. Attackers continue to successfully wage DDoS strikes that are capable of taking down...
Read more

Approaches to DDoS Protection: An Overview on Keeping Your Networks Approaches to DDoS Protection: An Overview on Keeping Your Networks (EN) | www.informationweek.com
| 26-02-2014 | Overview:Distributed Denial of Service (DDoS) attacks today are targeting businesses of all sizes and types. This article provides an expert overview of common methods of DDoS attacks and four main ways enterprises and providers of Web applications can protect themselves and their cus...
Read more

Bitly suffers temporary shutdown of services due to DDoS attack (EN) | post.jagran.com
| 27-02-2014 | “We are currently working to mitigate a DDoS attack. Some of our sites may be unavailable, but we're working to restore full functionality,” tweeted the official Twitter handle of Bitly.The company informed its users about this attack on the day and assured its users that the serv...
Read more

DDoS Mitigation And DNS Availability Should Be Key Components of Your Resiliency Strategy (EN) | www.bankinfosecurity.com
| 26-02-2014 | DDoS attacks continue to grow in size, frequency and complexity, forcing network-dependent companies to implement a plan for protection. However, recent research from Forrester suggests many companies are coming up short in their DDoS attack protection strategy. Learn how changes in p...
Read more

Indiana University reports data breach (EN) | www.southbendtribune.com
| 26-02-2014 | Staff and Wire Report The names, addresses and Social Security numbers of about 146,000 Indiana University students and recent graduates across seven campuses may have been exposed during a security breach, IU officials on Tuesday told the Indiana attorney general’s office. Subscrip...
Read more

Data Breach At Indiana University Puts 146K Students, Recent Graduates At Risk (EN) | www.universityherald.com
| 26-02-2014 | The personal data of about 146,000 students and recent graduates of Indiana University may have been inadvertently exposed, the Associated Press reported. Among those affected are people who were enrolled in the university between 2011 and 2014 at seven of its campuses, Reuters report...
Read more

Verizon 2014 Data Breach Report: The Bad Guys Are Winning (EN) | www.crn.com
| 26-02-2014 | Organizations are falling asleep at the wheel, failing to proactively monitor or properly configure existing security systems and address common weaknesses being targeted by cybercriminals, say incident responders, investigators and other experts at RSA Conference 2014.Over the past 1...
Read more

Makers Androidbotnets verschuilen zich achter Tor-netwerk (BE) | www.zdnet.be
| 27-02-2014 | Samenvatting:De eerste Android-trojan die gebaseerd is op een Tor-cliënt is gevonden. De server die de trojan controleert, gebruikt Tor om zichzelf onzichtbaar te maken. Malware die gebruik maakt van Tor (The Onion Network) dook al eerder op op desktop pc’s, maar nu bli...
Read more

UK publishes smart grid routemap (EN) | www.businessgreen.com
| 27-02-2014 | The UK is set to undertake a phased rollout of smart grid technologies that will slash greenhouse gas emissions, curb increases in energy bills and enhance energy security over the coming decades. That is the vision set out in a major new government and industry-backed "routemap" for ...
Read more

Successful targeted attack could cost you $85 million: survey (EN) | www.computerworld.com.au
| 27-02-2014 | The financial cost of a successful targeted attack could top $85 million for some Australian businesses, according to the findings of a new report. The BAE Systems Applied Intelligence report Business and the Cyber Threat: The rise of Digital Criminality is based on research conducted...
Read more

Universities get £3m research fund to fight hackers' mobile malware (EN) | www.computing.co.uk
| 27-02-2014 | Research teams across four UK universities have been given shares of £3m in funding by Engineering and Physical Sciences Research Council (EPSRC) to help counter the threat of malware distributed through mobile applications.Teams at Royal Holloway University of London, City Universit...
Read more

Third-party programs responsible for 76% of vulnerabilities in popular software (EN) | www.net-security.org
| 27-02-2014 | Third-party programs are responsible for 76% of the vulnerabilities discovered in the 50 most popular programs in 2013, say the results of Secunia's Vulnerability Review 2014, which is based on a sampling of the company’s seven million PSI users.The Secunia Vulnerability...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish