CIC News update contains 29 English and 6 Dutch articles for today.
In today's English news articles: 22 related to cybercrime, 0 related to cyber security and 7 for the category other news.
In today's Dutch news articles: 2 related to cybercrime, 0 related to cyber security and 4 for the category other news.
Have fun reading.
English cybercrime related news
'Perfect' ransomware is the scariest threat to your PC (EN) | www.pcworld.com
| 09-03-2014 | Nothing spurs malware development like success, and thatâs likely to be the case in the coming months with ransomware.Ransomware has been around for around a decade, but it wasnât until last fall, with the introduction of CryptoLocker, that the malevolent potential of the bad app ...
Case filed against cyber crime SI for sexually assaulting, duping spouse (EN) | timesofindia.indiatimes.com
| 10-03-2014 | LUCKNOW: A sub-inspector in his early 30s posted at cyber crime cell at Hazratganj has been accused of raping and duping his spouse. The policeman's wife approached the women's police station on Sunday to lodge a complaint against sub-inspector Paramhans Gupta. Gupta allegedly, assaul...
Is the USA the Worldâs only Cyber-Super Power ? How Long Until other Countries Catch Up? (EN) | www.adi-news.com
| 09-03-2014 | The United States has certainly shown its ability to utilize cyber weaponry to an effective degree. The employment of the Stuxnet virus by the United States and Israel reveals the sophistication of the weaponry; however, the volatile nature of the virus also reveals how unpredictable ...
Growing menace (EN) | www.myrepublica.com
| 10-03-2014 | Cyber crime is broadly known as the computer crime or âinformation technology crimeâ or âhigh-tech crimeâ. Any cybercrime must have one of two elements, i.e. illegal action involving computer systems either as an instrument or a target of a crime. This means computer systems m...
Web malware favoured 5-to-1 over email attacks, FireEye reports (EN) | www.cso.com.au
| 10-03-2014 | Authors of insidious and targeted advanced persistent threats (APTs) all but ignored Australia during 2013, an analysis of the year's security events by security firm FireEye has found.The company's FireEye Advanced Threat Report 2013 analysed some 39,504 unique cyber security inciden...
Cyber criminals entrenched in `Dark Web`: Researchers (EN) | zeenews.india.com
| 10-03-2014 | Washington: Cyber criminals are settling into a comfortable place in the "Dark Web" where they test, refine and distribute malware for online thievery.That's the conclusion of researchers at McAfee, the US Internet security specialist, who noted that a huge data breach tha...
Australia faces lawsuits over asylum seeker data breach (EN) | www.itnews.com.au
| 10-03-2014 | Immigration Minister still holds power in protection decision. The Australian Government is facing a series of court battles after accidentally disclosing the personal details of almost 10,000 asylum seekers last month.The Department of Immigration and Border Protection (DIPB) admitte...
McAfee Labs Q4 Report Reveals Techniques Used in High-Profile Data Breaches (EN) | online.wsj.com
| 10-03-2014 | Underground Market Supports Point-of-Sale Cybercrime from Coding to Monetization; Digitally Signed Malware Triples in 2013 through Content Distribution Networks SANTA CLARA, Calif.--(BUSINESS WIRE)--March 10, 2014-- McAfee Labs today released the McAfee Labs Threats Report: Fourth Qua...
CIOs in hot seat since Target data breach (EN) | seattletimes.com
| 09-03-2014 | After the retailerâs shocking data breach, companies and organizations are boosting data-security budgets and chief information officers face increased pressure to prevent cyberattacks. NEW YORK â" The departure of Targetâs chief information officer in the wake of the...
Webcam-spionageapp ook al ontdekt in Google Play-winkel (EN) | www.automatiseringgids.nl
| 10-03-2014 | In de appwinkel voor Android is de eerste malware ontdekt, die is gemaakt met de toolkit Dendroid. Dendroid biedt malwareontwikkelaars veel mogelijkheden om zogeheten Remote Access Trojans (RAT's) te creÃ«ren. De eerste app met deze spyware-functionaliteit werd als Parental Control aa...
Business Lessons from the DDoS Attacks on Social Networking Site Meetup (EN) | www.securitybistro.com
| 10-03-2014 | In early March, the social networking site Meetup was hit by a series of DDoS attacks. The attacks did some damage, not the least of which was knocking the site offline for hours at a time over a period of several days. However, I have to say that it appears that the Meetup management...
Massive Twitter Botnet (EN) | cryptome.org
| 10-03-2014 | The NSA and GCHQ know where to find me already. I can't presently prove who's behind this, but strongly suspect one of those two, particularly the latter. The appendix contains some 35,000 fake twitter handles, belonging to the same botnet. And what they've tweeted. Should Twitter's p...
CryptoLocker potent threat to PCs around the world (EN) | timesofindia.indiatimes.com
| 10-03-2014 | WASHINGTON: CryptoLocker, a ransomware, has reportedly emerged as a potent threat to PCs around the world. The malicious software was successful in raking in around 5 million dollars in the last four months of 2013, an amount that previously took ransomware purveyors an entire year to...
What Happens When Hackers Hijack Your Website and Demand a $300 Ransom? (EN) | www.slate.com
| 10-03-2014 | Last weekend, the event coordination site Meetup was down. If you've ever seen the part in The Social Network where fictionalized Mark Zuckerberg says, "We don't crash ever! If the servers are down for even a day, our entire reputation is irreversibly destroyed," you know how dramatic...
82% of DDoS protection has no effect (EN) | www.itproportal.com
| 10-03-2014 | As much as 82 per cent of solutions billed as protecting against or mitigating the effects of distributed denial of service (DDoS) attacks actually offer little to no protection, according to a new study.NCC Group's DDoS Testing exercises took some of the world's leading DDoS mitigati...
The Increasing Business Risk of Cloud Cyberattacks (EN) | www.ecommercetimes.com
| 10-03-2014 | As more and more companies migrate to the cloud as a means to reduce their IT costs, they are creating new malware-based and cybercrime risks to their businesses. Unless the U.S. government's NIST Framework really works, it is possible that the cybercrime problems threatening data int...
Cybersecurity Efforts Accelerate (EN) | americannewsreport.com
| 10-03-2014 | The Obama administrationâs new voluntary Cybersecurity Framework for critical infrastructure providers is getting good marks as a necessary first step in protecting the country from cyber attacks.There are 16 critical infrastructure sectors (hereâs a list of them). Obviously they ...
Security roundup: Trojan promises naked videos of Facebook friends (EN) | www.pcr-online.biz
| 10-03-2014 | This weekâs security news reveals the latest scam to hit Facebook, new Google Play malware, and more.Bitdefender Labs has discovered that the UK is the second most affected country in a new Facebook scam that tricks users into installing a Trojan by promising the provide access to n...
50,000 Statista users affected by data breach (EN) | www.net-security.org
| 10-03-2014 | Customers of the biggest online statistics portal Statista are being notified that the company's systems have been breached and the hackers likely made away with its user database.The first indication of a possible breach came when email addresses that have been used by th...
Cybercrime industry refines its techniques to steal data (EN) | betanews.com
| 10-03-2014 | Last year saw a number of credit card data breaches that made the headlines. A new report says that this shows how well the "deep web" of cybercrime is serving its customers.McAfee Labs Threats Report for the fourth quarter of 2013 says that not only did Point of Sale (PoS) attacks li...
Stuxnet â" the Million Dollar Weapon that Fits on a Thumb Drive (EN) | www.adi-news.com
| 10-03-2014 | Stuxnet may go down in history as one of the most infamous weapons of the 21st century. Certainly, it will go down in the annals of espionage and warfare as one a weapon that changed the course of history. Although this malicious computer program can fit on a thumb drive, it still has...
Midsize Insider: Big Data Analytics: Fighting Cyber Crime (EN) | midsizeinsider.com
| 10-03-2014 | Big data analytics may be the key to fighting the growing threat of cyber crime, at least according to the 18 government IT leaders surveyed for MeriTalk's recent "Balancing the Big Data Cyber Equation" survey. A new look at how advanced analytics can help improve network security is ...
English cybercrime related news
No articles for today, maybe tomorrow!
Other English news
Malware Disguised as Night Vision Camera App Empties Your Wallet (EN) | petapixel.com
| 09-03-2014 | With 98% of mobile malware being directed towards the Android operating system, itâs no surprise that the Google Play Store contains more than a few insidious applications that intend to do you harm.The most recent of these to make headlines is an app uncovered by AVAST, which hides...
S. Korea unveils comprehensive plan to prevent personal data leakage (EN) | www.shanghaidaily.com
| 10-03-2014 | SEOUL, March 10 (Xinhua) -- South Korea on Monday unveiled a set of measures to prevent personal information from being leaked out of financial companies after the worst-ever data leakage incident at three credit card firms.Collecting and utilizing personal information by financial in...
Uroburos malware switch flipped in the Ukraine (EN) | www.techradar.com
| 10-03-2014 | Security experts from BAE have released a report claiming that the mysterious Uroburos malware which was recently found by German experts has been switched on in the Ukraine.Uroburos rootkit burrows deep into a Windows operating systems, steals files and transmits them back to its mas...
Does it really matter to Windows XP owners if Microsoft pulls the plug? (EN) | blogs.computerworld.com
| 10-03-2014 | Microsoft is doing its best to warn the owners of nearly 500 million XP-based PCs that as of early April, they're on their own: No security patches, no support. It sounds scary -- but do XP owners really care? Computing without security patches is clearly not a good thing, and soon th...
Mobile Malware Still At Risk (EN) | www.droidreport.com
| 10-03-2014 | Mobile Malware May Still Be At Risk. According to Juniper Research, more than 80% of total enterprise and consumer owned smartphone device bases are unprotected through 2013. This finding was even as consumers remained aware of mobile security. The adoption rate was due high cost of s...
Iowa DHS data breach dates back 2008, more than 2,000 impacted (EN) | www.scmagazine.com
| 10-03-2014 | Information on more than 2,000 individuals â" including Social Security numbers â" leaked outside a secure network because, since 2008, two employees with the Iowa Department of Human Services (DHS) used personal online accounts and storage devices to maintain the data, which goes a...
Researcher Eric Filiol Withdraws CanSecWest Presentation (EN) | threatpost.com
| 10-03-2014 | A presenter at this weekâs CanSecWest security conference has withdrawn his scheduled talk for fear the information could be used to attack critical infrastructure worldwide.Eric Filiol, scientific director of the Operational Cryptology and Virology lab. CTO/CSO of the ESIEA in Fran...
Dutch cybercrime related news
OekraÃ¯ne doelwit verfijnde cyberaanvallen (NL) | frontpage.fok.nl
| 09-03-2014 | OekraÃ¯ne is in 2013 zeker 22 keer het doelwit geweest van geraffineerde cyberaanvallen. Dat staat in een rapport van het Britse defensiebedrijf BAE Systems. In ieder een deel van de aanvallen vielen samen met de onrust in OekraÃ¯ne en de Russische inmenging in het land.Volgens het ra...
McAfee Labs Q4 2013-rapport onthult methodes die gebruikt zijn voor bekende datadiefstallen (NL) | www.emerce.nl
| 10-03-2014 | McAfee presenteert het nieuwe McAfee Labs Threats Report Fourth Quarter 2013, dat laat zien welke rol de âdark webâ malwareindustrie eind 2013 heeft gespeeld bij aanvallen op de kassasystemen (Point-of-Sale â" POS â" systemen) in winkels en de daarop volgende datadiefstal. Het r...
Other Dutch news
Onderzoekers ontwikkelen nieuwe en betere Anomaly Detector (NL) | www.marqit.nl
| 10-03-2014 | Er is een nieuwe manier gevonden om malware te detecteren op Android devices: PREC. PREC staat voor Practical Root Explot Containment en is ontwikkeld door onderzoekers van de North Carolina State University. Volgensde onderzoekers werkt de tool beter dan andere, vergelijkbare tools.P...
Nog 1 miljoen XP-gebruikers in Nederland (NL) | webwereld.nl
| 10-03-2014 | Nieuws - Er zijn in Nederland nog ruim 1 miljoen gebruikers van Windows XP. Over minder dan een maand stopt Microsoft de ondersteuning. Het aantal XP-gebruikers in Nederland neemt wel sterk af. Volgens Microsoft Nederland gaat het om meer dan 225.000 gebruikers in het eers...
50 computers Indiase Defensie besmet met spyware (NL) | www.security.nl
| 10-03-2014 | Op zo'n 50 computers van het Indiase Ministerie van Defensie is spyware aangetroffen waarmee mogelijk vertrouwelijke gegevens en bestanden zijn gestolen. Het incident zou vorig jaar december zijn opgemerkt. Vanwege de infecties is er nu aan overheidsdiensten een waarschuwing afgegeven...
Miljoen Nederlanders gebruiken nog Windows XP (NL) | www.security.nl
| 10-03-2014 | Er zijn nog Ã©Ã©n miljoen Nederlanders die Windows XP gebruiken, zo blijkt uit cijfers van Microsoft. Het afgelopen kwartaal daalde het aantal gebruikers van het 12-jaar oude besturingssysteem met 225.000. Een jaar geleden waren er in Nederland nog 2,7 miljoen mensen die Windows XP dr...
This e-mail is automatically generated by the CIC News Engine.
Stay hungry, stay foolish