Under construction

New design coming soon!

CIC News engine statistics

CIC News for 05-03-2014 contains 35 articles

CIC News update contains 35 articles for today, have fun reading.

What Will A Russia-Ukraine Cyberwar Look Like? (EN) | www.forbes.com
| 04-03-2014 | The following post appeared in securitycurrent on Monday, March 3. I have added updates to reflect recent events. This playbook has already been written. Peaceful street protests. Government crack down. Russian agitation on behalf of “Russian speakers.” And finally, Russian tanks ...
Read more

Wederom skimming geldautomaat Nieuwstraat (NL) | www.112vallei.nl
| 04-03-2014 | BARNEVELD - Er heeft dinsdag 4 maart wederom skimming plaatsgevonden op de SNS geldautomaat aan de Nieuwstraat in Barneveld. Deze keer was de politie er snel bij en heeft drie personen kunnen aanhouden.Zaterdagavond 1 maart werd er ook al skim apparatuur op de geldautomaat van de SNS ...
Read more

Cyber a priority in DHS spending blueprint (EN) | fcw.com
| 04-03-2014 | President Barack Obama's $38.2 billion discretionary budget for the Department of Homeland Security in fiscal 2015 includes more than a half-billion dollars to support continued implementation of the Einstein managed security service. DHS Secretary Jeh Johnson said the topline figure ...
Read more

Chanteur legt betalingsweigeraar plat met DDoS (NL) | webwereld.nl
| 04-03-2014 | Meetup.com werd het hele weekend ge'DDoSt door een onverlaat die het bedrijf wilde afpersen.De CEO van Meetup, Scott Heiferman, kreeg vorige week donderdag een e-mailtje waarin iemand beweerde dat een concurrent hem had ingehuurd om de site te DDoS'en, zo meldt hij op het ...
Read more

Researchers Create Legal Botnet Abusing Free Cloud Service Offers (EN) | www.darkreading.com
| 04-03-2014 | Last week at the RSA Conference, a pair of researchers demonstrated how it was possible to legally create a botnet for free by abusing trial accounts made available by high-powered platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS) offerings. "We were curi...
Read more

Bank teller sentenced in fraud, identity theft (EN) | www.washingtonpost.com
| 04-03-2014 | BALTIMORE â€" A bank teller who conspired to use customers’ information to order fraudulent checks and steal money their accounts has been sentenced to more than five years in prison. Twenty-four-year-old Jayad Zainab Ester Conteh of Glenarden was also ordered to pay more than $36,0...
Read more

Wichita man indicted for identity theft, attempted bank fraud (EN) | www.kake.com
| 04-03-2014 | Wichita, Kan. -- A Wichita man is under federal indictment for identity theft and attempted bank fraud. The U.S. Attorney's Office says 45-year-old John William Kerbow is charged with six counts of aggravated identity theft and six counts of attempted bank fraud. The indictment allege...
Read more

Meetup.com brought down in series of "massive" DDoS attacks (EN) | www.itproportal.com
| 04-03-2014 | Those of you attempting to make some new friends via Meetup.com might end up hanging out alone for the time being.The social networking site was battling a massive cyberattack over the weekend and on Monday against hackers who are demanding $300 (£180) to call off the assault, which ...
Read more

Cyberattacks Rise as Ukraine Crisis Spills to Internet (EN) | bits.blogs.nytimes.com
| 04-03-2014 | The crisis in Ukraine has spread to the Internet, where hackers from both sides are launching large cyberattacks against opposing news organizations.Security experts say that they are currently witnessing unusually large denial-of-service attacks, also called DDoS attacks, in which ha...
Read more

Cyber Crime Ravages Nearly Four in 10 Global Financial Firms (EN) | www.ibtimes.co.uk
| 04-03-2014 | Financial firms around the world are being hit the hardest by cyber attacks, with a new survey showing that over a third of these companies suffered from cyber crime in 2013.According to PwC's 2014 global economic crime survey, 39% of financial services companies were hit by cyber att...
Read more

Microsoft Signs Global Partnerships with OAS, Europol and FIS (EN) | www.hstoday.us
| 04-03-2014 | Homeland Security Today is the leading source for independent news and analysis on homeland security affairs cybercrime and helping build a safer Internet. Microsoft officials signed memorandums of understanding with representatives of the three organizations during the co...
Read more

FBI plans malware-tracking system to alert users (EN) | tech-authors.com
| 02-03-2014 | The director of the FBI said last week that the agency plans to introduce a malware-analysis system later this year that will let businesses and the public, report newly identified malware attacks, upload malware samples and receive reports on them.Speaking at the RSA Security Confere...
Read more

Zeus Trojan Gets Persistent with New Rootkit (EN) | www.infosecurity-magazine.com
| 04-03-2014 | The Zeus banking trojan and botnet has had a number of iterations over the years, particularly since the source code was leaked online. Researchers say that the most widespread Zeus derivative is the Gameover bot, also known as Zeus P2P because of its use of peer-to-peer network conne...
Read more

Android-based malware: the good, the bad and the ugly (EN) | www.networkworld.com
| 05-03-2014 | When it comes to mobile devices, it's well known that malware writers like to target Android. But a threat report published today by security firm F-Secure puts in perspective why Android malware attacks often flop and why Android itself is no pushover.In a look back at 2013, the bi-a...
Read more

Pre-installed malware turns up on new phones (EN) | www.pcworld.com
| 04-03-2014 | David Jevans, CTO and founder of Marble Security, recently received some bad feedback from a potential customer testing his company’s product, which helps organizations manage and secure their mobile devices.“They basically said ‘Your stuff doesn’t work’,” Jevans said. “...
Read more

Israeli reports accuse US of denying entry visas to Israeli spies (EN) | intelnews.org
| 05-03-2014 | Articles in the Israeli media have accused the United States of quietly instituting a policy of denying entry visa requests from members of Israel’s security and intelligence agencies. In an article published on Tuesday, centrist newspaper Maariv cited “senior security personnelâ€...
Read more

Susceptibility to Malignant Code: Google’s Android Platform, #1 Mobile Malware Target in 2013 (EN) | www.businesskorea.co.kr
| 05-03-2014 | Malicious code is reportedly infecting Android devices at a rapid speed. Therefore, Android phone users are advised to take extra precautions.On April 4, US-based network security company Fortinet announced the findings of its report about last year’s malware trends. The majority of...
Read more

How Criminal Hackers Turn Legit (EN) | motherboard.vice.com
| 04-03-2014 | Cal Leeming is exhausted. Black crescent moons underscore his reddened eyeballs as he slumps in front of a screen to talk over Skype. “I was up til around 3 AMcoding ...I feel pretty fucked.”In a past life, Leeming’s late nights were filled with a more nefarious activity: Pilfer...
Read more

Cybersex, media, privacy, and the cybercrime law (EN) | www.rappler.com
| 04-03-2014 | MANILA, Philippines â€" After discussing the important provisions of the recent Supreme Court decision on the cybercrime law, particularly online libel, we proceed to other equally important sections. (READ: Making sense of online libel)The High Court ruled on February 18 that most pr...
Read more

F-Secure report warns XP zero-day attack is imminent (EN) | www.pcworld.com
| 04-03-2014 | Are you still using Windows XP? In its latest Threat Report, security vendor F-Secure warns that a powerful zero-day attack against Windows XP is a matter of whenâ€"not ifâ€"and provides some guidance for those stalwart (or foolhardy) PC warriors who plan to ignore theApril 8 “XPoca...
Read more

Malware threats making anti-virus software ‘totally useless’ - Technology & Science - CBC News (EN) | www.cbc.ca
| 05-03-2014 | Some computer consultants say the global malware threat has gotten so bad that conventional security measures, such as anti-virus software, are no longer adequate to fight them.Anti-virus programs are “totally useless,” says Mohammad Mannan, an assistant professor at the Concordia...
Read more

Netwerk KLM onbeveiligd door gebruik standaardwachtwoord (NL) | www.nu.nl
| 05-03-2014 | Het interne netwerk van KLM blijkt nagenoeg onbeveiligd te zijn geweest, omdat een belangrijke router het standaard fabriekswachtwoord gebruikte. Het lek is inmiddels gedicht, maar het bedrijf zwijgt over het incident. Het probleem werd ontdekt door beveiligingsexpert Vict...
Read more

ColdFusion botnet (EN) | krebsonsecurity.com
| 04-03-2014 | Jam and jelly maker Smucker’s last week shuttered its online store, notifying visitors that the site was being retooled because of a security breach that jeopardized customers’ credit card data. Closer examination of the attack suggests that the company was but one of several doze...
Read more

Cyber 'stand-off' in Ukraine crisis (EN) | www.bbc.com
| 05-03-2014 | As diplomatic efforts are stepped up to ease tensions in Ukraine, security experts have warned that Kiev and Moscow are locked in a cyber stand-off. Security forces in Ukraine have accused the Russian army of disrupting mobile communications. Smaller-scale attacks have seen news websi...
Read more

What Does Kaspersky Lab Really Know about the Duqu Trojan? (EN) | www.adi-news.com
| 05-03-2014 | Discovered on 1st September 2011, Duqu is a complex Trojan that is thought to have been created by the same people who came up with the destructive Stuxnet worm. However, the Duqu Trojan is very different from the Stuxnet work because it was formed with an aim of gathering intelligenc...
Read more

Target’s CIO resigns after massive data breach (EN) | nypost.com
| 05-03-2014 | Target Corp. Chief Information Officer Beth Jacob is resigning effective Wednesday as the retailer overhauls its information security and compliance division in the wake of a massive pre-Christmas data breach.Target Chairman, President and CEO Gregg Steinhafel said in a statement rele...
Read more

Lost Devices, Data Leakage Remain Top Mobile Threats (EN) | www.crn.com
| 05-03-2014 | Mobile malware continues to trend upward, targeting Google Android devices in certain regions where third-party application stores are popular, and looser carrier restrictions enable the proliferation of premium text-messaging Trojans, according to a new threat report.Lost and stolen ...
Read more

Data Breach: 'Persistence' Gives Hackers the Upper Hand (EN) | www.informationweek.com
| 05-03-2014 | Hackers are winning on speed and determination. But we can stack the odds in our favor by shifting the time frames of an attack. Here's how.Over the past few years attackers have proved adept at compromising even the most secure organizations. A common theme in successful attacks is p...
Read more

Next-Level Mobile Malware Threats: Touch Logging & Tor (EN) | www.knowyourmobile.com
| 05-03-2014 | Now touches and gestures on your phone aren't safe. New tool gives hackers access to touches and swipes made on Android/iPhone handsets Whilst it’s debateable whether mobile malware is really a serious threat to the average use, it’s clear innovation in malicious...
Read more

Aggressive adware and PUPS increase vulnerability to malware (EN) | www.scmagazineuk.com
| 05-03-2014 | Android mobiles are increasingly being targeted by Potentially Unwanted Programs (PUPs), often offered through legitimate channels, but which mislead people and then bombard the user with aggressive advertising and in-app purchases, as well as taking unnecessary amounts of personal da...
Read more

Ads 'biggest mobile malware risk' (EN) | www.bbc.com
| 05-03-2014 | Adverts on websites are now the biggest source of malware on mobile phones, according to a study. Research by security company Blue Coat suggests web adverts have overtaken pornography as the most common way for users to encounter a malware threat. On one in five occasions when a mobi...
Read more

Web crawler takes virtual bite out of cybercrime (EN) | phys.org
| 04-03-2014 | Simon Fraser University researcher Richard Frank is helping to take a virtual bite out of cybercrime. His web crawler, designed to track websites that exploit children, will be among the School of Criminology's demonstrations at the SFU Surrey campus Global Community Open House on Mar...
Read more

Cybercrime Strikes More Fear than NSA Spying, New Survey Finds (EN) | www.broadwayworld.com
| 05-03-2014 | Despite the NSA and Snowden controversy dominating news headlines andsparking a serious privacy debate, findingsfrom a new AppRiver,LLC survey show that IT security professionals considerexternal threats from cybercriminals to be the more concerning issuefacing the security of organiz...
Read more

`Cyber crime complexity making traditional probe ineffective` (EN) | zeenews.india.com
| 05-03-2014 | New Delhi: The complex structure of cyber crime which thrives on mostly private infrastructure spread globally is making "archaic" investigation techniques ineffective, CBI Director Ranjit Sinha said Wednesday. "Cyber crime causes serious damage to victims and bring huge l...
Read more

Defense budget routes at least $5B to cyber (EN) | www.federaltimes.com
| 05-03-2014 | The new Defense Department budget, released as part of the comprehensive federal budget on March 4, includes reductions in numerous programs and activities as part of ongoing efficiencies measures and funding cuts. But as DoD officials recently hinted would happen, certain line items ...
Read more


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish