Under construction

New design coming soon!

CIC News engine statistics

CIC News for 21-03-2014 contains 55 articles: cybercrime(27),cyber security(13),data breach(12),other(3)

CIC News update contains 48 English and 7 Dutch articles for today.
In today's English news articles: 21 related to cybercrime, 12 related to cyber security, 12 related to data breach and identity theft and 3 for the category other news.
In today's Dutch news articles: 6 related to cybercrime, 1 related to cyber security and 0 for the category other news.

Have fun reading.

English cybercrime related news

Everything you need to know about Ransomware (EN) | www.cbronline.com
| 20-03-2014 | Police ransomware is a type of online fraud used by criminals to extort money through the deployment of malicious software, or malware. The malware disables the functionality of victims' computers and displays a message demanding the payment of a ransom to regain access to their machi...
Read more

Australian Banks Targeted By Hesperbot Malware (EN) | www.cso.com.au
| 20-03-2014 | Australian banks and other large enterprises are being targeted by the banking trojan Hesperbot. According to ESET, who first detected Hesperbot in November 2013, this is putting at risk the financial information of millions of customers. Robert Lipovsky, a Malware Researcher with Ese...
Read more

Many still haven’t patched PHP vulnerability, say researchers (EN) | www.itworldcanada.com
| 20-03-2014 | Here’s another reminder of how important it is to update everything under your control.Researchers at a security vendor say a public exploit in the popular PHP scripting language used by many companies for writing Web applications is still being used some 22 months after being disco...
Read more

Demise of Blackhole Created Only a Temporary Vacuum in Exploit Kit Incidents (EN) | www.infosecurity-magazine.com
| 20-03-2014 | SilverSky provides cloud-based security to the finance industry. Its customers include 1,800 banks, credit unions and other financial institutions with assets exceeding $580 billion. Every six months SilverSky produces a financial institution threat report based not merely on the dete...
Read more

Hackers turning to Tor network to hide evolved malware, warns Kaspersky Lab (EN) | www.v3.co.uk
| 20-03-2014 | Criminals plan to release a fresh wave of advanced cyber attack campaigns using the anonymising Tor network, according to Kaspersky Lab.Kaspersky Lab senior security researcher Sergey Lozhkin issued the warning during a webinar attended by V3, citing the recently discovered ChewBacca ...
Read more

Hospital hit by screen-grab Trojan that attempted to steal 5,400 patient records (EN) | www.csoonline.com
| 20-03-2014 | â€" Techworld â€" A US hospital has admitted suffering a mysterious malware attack that grabbed screenshots containing the personal data of 5,400 patients from hospital PCs before hiding them in an encrypted folder for probable transmission to criminals. In a statement, the small Vall...
Read more

Ransomware attacks to target mobile devices, warns RSA (EN) | www.csoonline.com
| 20-03-2014 | â€" Computerworld UK â€" Smartphone users will be targeted by 'ransom' malware attacks as cyber criminals shift focus from PCs to mobile devices, according to security firm RSA. "Ransomware is going to be the next thing we see happen [on mobile] and it will happen pretty soon," said D...
Read more

SunGardASVoice: The Hidden Cost Of Cyber Crime (EN) | www.forbes.com
| 20-03-2014 | How big of a problem is cyber crime? Bigger than you think. Symantec estimated thatcyber attacks in 2013 cost the world $113 billion. And recent attacks againstTargetandSchnuck Marketsare reminders this problem isn’t going away.br /br /But even if you’re aware of the extent of the...
Read more

Block articles against Maria: Police to US site (EN) | indianexpress.com
| 21-03-2014 | The Mumbai police’s Cyber Crime Cell has sent summons to the editorial department of US-based website TwoCircles.net, asking it to block and provide details on two online links of interviews pertaining to allegations against the city’s top cop, Rakesh Maria, by lawyer Mehmood Prac...
Read more

India is still in infancy in the field of cyber crimes: expert (EN) | www.dnaindia.com
| 20-03-2014 | India is still in infancy in the field of cyber crimes and police, prosecutors and lawyers are not well-versed in handling them as well as digital evidence, a Cyber crime expert said here today."Information Technology Act in India is of recent origin and the officials like police, pro...
Read more

Many Kiwis falling to cyber scammers (EN) | tvnz.co.nz
| 21-02-2014 | More than one in 10 Kiwis have been touched by cyber crime, from dodgy online trades to credit card theft, a university study shows.The Victoria University study shows most New Zealanders are engaging online but not without a few unpleasant digital run-ins.Of 467 people surveyed, abou...
Read more

Malware Turns 25K Linux Servers Into Spam Distribution Botnet (EN) | www.eweek.com
| 20-03-2014 | A criminal group used a network of 25,000 compromised servers to steal credentials, redirect web traffic to malicious content and send as many as 35 million spam messages per day. A sophisticated network of 25,000 compromised Linux servers has become the foundation of a massive cyber-...
Read more

Old Vulnerability at the Heart of Escalating PHP Botnet Attacks (EN) | www.infosecurity-magazine.com
| 20-03-2014 | Back in October 2013, a public exploit for the PHP server-side framework was disclosed, using a command injection vulnerability found in May 2012 and categorized as CVE-2012-1823. Now, it appears that cybercriminals are still using it, despite the vulnerability being somewhat dated, b...
Read more

Omane Boamah calls for an end to child pornography (EN) | www.citifmonline.com
| 21-03-2014 | The Minister for Communication, Dr Edward Omane Boamah, called for a concerted effort in the fight against cyber crime, more especially child pornography which is currently gaining root across the world.He noted that putting in place the needed measures to fight cyber-crime would prot...
Read more

Man held for running illegal exchanges (EN) | www.nation.com.pk
| 21-03-2014 | LAHORE - In a joint raid FIA Cyber Crime Circle and PTA Lahore headed by Assistant Director Jamil Ahmad Khan arrested a man allegedly involved in running business of illegal gateway exchanges, said spokesman of FIA. br /He said a gang headed by Rizwan Hamayun Sheikh was involved in il...
Read more

New Calgary police cyber team aids in city’s worst cases (EN) | metronews.ca
| 20-03-2014 | Police have supercharged their efforts to investigate everything from cyber-bullying to murder cases thanks to a new tech-savvy team billed as the first of its kind in Canada.Since its inception in January 2013, the Cybercrime Support Team has targeted cyberstalkers and child pornogra...
Read more

Local Researchers Fighting Cybercrime (EN) | www.wilx.com
| 20-03-2014 | LANSING (WILX)-- Cyber hackers are getting more sophisticated, which means efforts to keep your credit card information protected need to catch up. "The offenders can live anywhere. They're not someone down the street. They're in Russia, Ukraine, or China," said Thomas Holt, asst. pro...
Read more

Anti-cyber porn drive nets seven (EN) | manilastandardtoday.com
| 21-03-2014 | The government on Thursday called on private telecommunication firms to help shut down cyber porn sites even as police arrested seven people, three of them Japanese, who are engaged in the illicit trade.National Telecommunications Commission head Gamaliel Cordoba sought telco’s supp...
Read more

Evolving Malware: Increasingly Sophisticated Tactics, Rapid Increase in Reported Malicious Apps (EN) | www.businesskorea.co.kr
| 21-03-2014 | On March 20, the Korea Internet & Security Agency (KISA) announced the results of its study on mobile malicious apps reported over the past two months. It was found that methods of online criminals have evolved from a micro-payment scam via SMS into the leakage of an authenticatio...
Read more

DDoS Attacks Advancing and Enduring: A SANS Survey (PDF) (EN) | www.corero.com
| 20-03-2014 | Distributed denial of service (DDoS) attacks continue to grow in frequency, sophistication and bandwidth. There are numerous reasons for this. For example, DDoS tactics are increasingly targeting vulnerabilities in specific applications, such DNS servers or even Network Time Protocols...
Read more

Aussie hacks game company for revenge (EN) | www.stuff.co.nz
| 21-03-2014 | A young Queensland man accused of hacking a US-based video game company's computer network allegedly did it so he could sell information to players who wanted to seek out revenge on opponents.Queensland Police allege the 21-year-old sold information from a database he hacked at the ga...
Read more

English cyber security related news

Internet's time servers secured in "worldwide effort" (EN) | www.backup-technology.com
| 20-03-2014 | The BBC is reporting a “worldwide effort” to strengthen “time servers” (computers that keep the time on the internet) as a way of thwarting hack attacks. It reports that there has been an “explosion” in the last few months of the number of attacks targeting these special s...
Read more

Cancer E-mails Deliver Malware (EN) | www.esecurityplanet.com
| 20-03-2014 | AppRiver researchers are warning of a malicious spam campaign that appears to come from the U.K.'s National Institute for Health and Care Excellence (NICE) (h/t The Register)."We have been sent a sample of your blood analysis for further research," the e-mails state. "During the compl...
Read more

Data Security, A New Kind of Safe Haven in Switzerland (EN) | www.moneymorning.com.au
| 21-03-2014 | The Swiss are famous.For watches.For chocolate.For cheese.And for their secretive banking system. Or they used to be anyway. That was until the US bullied it into spilling the beans on thousands of private bank accounts.Now the Swiss have their eyes on a new industry â€" data security...
Read more

Unpatched servers still enabling exploitation of twoyearold PHP vulnerability (EN) | www.scmagazine.com
| 19-03-2014 | A PHP vulnerability originally disclosed in March 2012 â€" and revised in October 2013 after a hacker found an easier way to take advantage of the exploit â€" is still impacting users after all these years, according to researchers with Imperva. The reason why is simple: people are no...
Read more

10 Best Tips on Online Safety, a Guide Released Today by NoBullying (EN) | www.digitaljournal.com
| 20-03-2014 | London, UK (PRWEB) March 20, 2014 From all appearances, the Internet seems harmless with its vast store of information that is accessible by anyone. This fact alone makes the Internet a perfect target for criminals. Criminals with the mindset to steal your money or your identity explo...
Read more

Linux worm Darlloz targets Intel architecture to mine digital currency (EN) | www.zdnet.com
| 20-03-2014 | A Linux worm variant found in the wild targets routers, set-top boxes, and now PCs in order to mine for cryptocurrency.According to research firm Symantec, a new Internet of Things (IoT) worm was discovered last November. Dubbed Linux.Darlloz, the worm targets computers running Intel ...
Read more

Ghana Beefs Up Cyber Defence (EN) | www.ghanaweb.com
| 21-03-2014 | The Ministry of Communications has developed, through stakeholder consultation, the national cyber-security strategy, aimed at building confidence and security in the use of ICTs in line with the requirements of World Summit on the Information Society (WSIS).br /br / This has also bee...
Read more

Cyber alarm as support for Windows XP ends (EN) | timesofindia.indiatimes.com
| 21-03-2014 | AHMEDABAD: The Windows XP operating system (OS) introduced way back in 2001 can almost be considered relic. However, even today one third of the computers across the world run on its credibility - and the supremacy is not limited to the personal computers or organizations, even the so...
Read more

Philippines Cybercrime Law: who does it really protect? (EN) | www.techinasia.com
| 21-03-2014 | It’s been over a month since the Philippines Supreme Court signed the Cybercrime Prevention Act into law. For many people who feel that the law limits free speech in the country, the fight for online freedom of expression rages on. Students, academics, legal professionals, members o...
Read more

DDoS Attacks â€" A Mainstream Occurrence and Disruption to Your Business (EN) | www.securitybistro.com
| 20-03-2014 | Corero recently partnered with John Pescatore, Director of Emerging Security Trends with the SANS Institute in developing a survey program designed to shed more light on organizations’ experiences with DDoS attacks.What we uncovered does not come as a surprise to those well entrench...
Read more

Phone spyware a new domestic abuse (EN) | www.theherald.com.au
| 21-03-2014 | IT is marketed as the perfect solution for worried mothers and vigilant bosses: secret mobile phone spyware that monitors texts, calls, photos, emails and web browsing.br /br /‘‘I can now keep an eye on my babies â€" even when I’m at work!’’ reads a testimonial for one spywa...
Read more

XP Users Mistaking Microsoft Migration Pop-ups for Spyware (EN) | channelnomics.com
| 20-03-2014 | Microsoft Corp.’sXPmigration pop-up campaign has left some resellers fielding calls from panicked customers worried they are being spammed or attacked by cybercriminals.Since March 8, Microsoft has been warningXPusersof the dangers of using the 13-year-old operating system beyond it...
Read more

English data breach and identity theft related news

English data breach and identity theft related news

English data breach and identity theft related news

English data breach and identity theft related news

BYOD: The Most Dangerous Acronym for a Small Business (EN) | www.forbes.com
| 19-03-2014 | There is a line of thinking among many of my small-business colleagues that allowing employees to supply their own computers and phones â€" known as Bring Your Own Device, or BYOD â€" is both convenient and a great way to save money. Whenever I hear that from anyone, the first thing I...
Read more

Cyber Crime On The Rise (EN) | www.wlns.com
| 20-03-2014 | EAST LANSING, MI (WLNS) - Experts in cyber-security met for an international conference at MSU Thursday.They shared ideas and techniques for protecting consumers identities and their bank accounts. As 6 News Reporter Joe Khalil reports, with technology rapidly changing the difficultie...
Read more

Report: California is top crime target in US (EN) | www.washingtonpost.com
| 20-03-2014 | SACRAMENTO, Calif. â€" California is the top target in the U.S. for international criminal enterprises that operate from safe havens in Eastern Europe, Africa and China, according to a report released Thursday. Along with trafficking in drugs, guns and people, criminals are also turni...
Read more

Mandatory data breach notification back on government agenda (EN) | www.computerworld.com.au
| 20-03-2014 | The Privacy Amendment (Privacy Alerts) Bill is back on the government agenda after it had a first reading in the Senate this week. The Bill lapsed in 2013 after a second reading in parliament was delayed during June and the Coalition government was elected into office. If passed by th...
Read more

University of Maryland reports 2nd data breach in 4 weeks (EN) | www.myfoxdc.com
| 20-03-2014 | COLLEGE PARK, Md. (AP) â€" The University of Maryland says someone hacked into its computer network and obtained personal information for the second time in four weeks.Chief Information Officer Ann Wylie revealed the breach Thursday in a letter to administrators and department chairs....
Read more

Cos To Spend $ 500 Bn In 2014 To Deal With Malware, Data Breach News (EN) | www.siliconindia.com
| 19-03-2014 | NEW DELHI: Enterprises worldwide are expected to spend nearly $ 500 billion this year to deal with problems related to malware and data breaches, a study said today. According to the joint study conducted by IDC and the National University of Singapore (NUS), enterprises may have to s...
Read more

Avast Warns of 'Data Breach Crisis' as XP Support Ends (EN) | www.pcmag.com
| 20-03-2014 | We're pretty convinced that if Microsoft hasn't already decided to make an about-face on its decision to officially throw Windows XP into end-of-life status, it's not going to change its mind in the next 18 days.But, as the saying goes, you miss 100 percent of the shots you don't take...
Read more

Malware, data breaches to cost $491 billion in 2014 alone (EN) | www.tweaktown.com
| 21-03-2014 | The growing threat of data theft and sophisticated malware could top $491 billion in 2014 alone, according to a joint study from the National University of Singapore (NUS) and IDC Research Group. br /br /The research is focused specifically on piracy and the potential ramifications bo...
Read more

Malware, data breaches to cost $491 billion in 2014 alone (EN) | www.tweaktown.com
| 21-03-2014 | The growing threat of data theft and sophisticated malware could top $491 billion in 2014 alone, according to a joint study from the National University of Singapore (NUS) and IDC Research Group. br /br /The research is focused specifically on piracy and the potential ramifications bo...
Read more

Malware, data breaches to cost $491 billion in 2014 alone (EN) | www.tweaktown.com
| 21-03-2014 | The growing threat of data theft and sophisticated malware could top $491 billion in 2014 alone, according to a joint study from the National University of Singapore (NUS) and IDC Research Group. br /br /The research is focused specifically on piracy and the potential ramifications bo...
Read more

Malware, data breaches to cost $491 billion in 2014 alone (EN) | www.tweaktown.com
| 21-03-2014 | The growing threat of data theft and sophisticated malware could top $491 billion in 2014 alone, according to a joint study from the National University of Singapore (NUS) and IDC Research Group. br /br /The research is focused specifically on piracy and the potential ramifications bo...
Read more

Malware, data breaches to cost $491 billion in 2014 alone (EN) | www.tweaktown.com
| 21-03-2014 | The growing threat of data theft and sophisticated malware could top $491 billion in 2014 alone, according to a joint study from the National University of Singapore (NUS) and IDC Research Group. br /br /The research is focused specifically on piracy and the potential ramifications bo...
Read more

Other English news

NSA targets sysadmin personal accounts to exploit networks (EN) | www.zdnet.com
| 21-03-2014 | System administrators that are not necessarily the target of NSA surveillance are being targeted by the American spy agency because of their access to networks that the NSA wishes to gain entry into.As reported by The Intercept, the NSA looks to track down the personal email and Faceb...
Read more

Sneaky "pileup" malware can exploit Android upgrades, researchers say (EN) | www.citeworld.com
| 20-03-2014 | If you've read a lot recently about the dangers of granting excessive permissions to mobile apps, you know that apps asking unnecessarily for personal information and control over device functions are best avoided -- or at least managed with tools you can download. But your best pract...
Read more

Police Want To Identify Credit Card Fraud Suspect (EN) | www.newschannel5.com
| 20-03-2014 | GALLATIN, Tenn. â€" Police in Gallatin need help identifying a woman wanted in connection with a credit card fraud scam.Gallatin Police said the woman entered the Walmart on Nashville Pike around 6 p.m. on Thursday, March 13. She bought several items, including seven Green Dot cards t...
Read more

Dutch cybercrime related news

Valse mail: 'Ziggo - Bevestiging WifiSpots'  (NL) | www.opgelicht.nl
| 18-03-2014 | Er is een valse mail van Ziggo in omloop, waarin gevraagd wordt een kopie identiteitsbewijs en bankpas te mailen. Het bericht oogt professioneel, maar is verstuurd door oplichters. br /br /D-kopiebr /De mail gaat over de snelheid van het internet. Door het gebruik van WifiSpots, een d...
Read more

Hoe contentleveranciers bij toeval DDoS-experts werden (NL) | computerworld.nl
| 20-03-2014 | DDoS-aanvallen worden afgeslagen door CDN's als CloudFlare en Akamai. Hun securityrol is zo gegroeid, eigenlijk gaat het om iets anders. Content Delivery Networks als Akamai en CloudFlare worden de laatste jaren vooral genoemd in dezelfde adem als 'DDoS-aanval'. Door de manier waarop ...
Read more

Linux-botnet bestookt Windows-gebruikers met malware (NL) | www.zdnet.be
| 20-03-2014 | Ruim 25.000 webservers die werden besmet door Linux-malware, zijn tijdens de afgelopen twee jaar ingezet om surfende Windows-gebruikers met malware te bestoken.Verschillende Europese beveiligingsonderzoekers raden systeembeheerders aan om hun webservers te controleren op eventuele bes...
Read more

ACM waarschuwt voor virus 'banking trojan' (NL) | www.parool.nl
| 21-03-2014 | Via tientallen grote populaire Nederlandse websites is maandagavond een computervirus verspreid. Het gaat om een zogenoemde 'banking trojan' die ongemerkt financiële gegevens kan stelen. De Autoriteit Consument & Markt (ACM) roept consumenten vandaag op met spoed in actie te kome...
Read more

ACM waarschuwt voor virus 'banking trojan' (NL) | www.volkskrant.nl
| 21-03-2014 | Via tientallen grote populaire Nederlandse websites is maandagavond een computervirus verspreid. Het gaat om een zogenoemde 'banking trojan' die ongemerkt financiële gegevens kan stelen. De Autoriteit Consument & Markt (ACM) roept consumenten vandaag op met spoed in actie te kome...
Read more

Gekaapte populaire pornosite verspreidt malware (NL) | www.security.nl
| 21-03-2014 | Cybercriminelen zijn erin geslaagd om een populaire pornosite te kapen en te gebruiken voor het verspreiden van malware. Het gaat om de website beeg punt com, die dagelijks 5,6 miljoen bezoekers trekt. Daarmee staat het volgens Alexa op de 332ste plek van meeste bezochte sites op inte...
Read more

Dutch cyber security related news

Android-update opent backdoor voor malware (NL) | www.security.nl
| 20-03-2014 | Onderzoekers van Microsoft en een Amerikaanse universiteit hebben zes lekken in Android ontdekt, waardoor het updaten van het mobiele besturingssysteem een backdoor voor malware opent. Het probleem ontstaat bij het updaten van Android naar een nieuwere versie.Een al geïnstalleerde kw...
Read more

Other Dutch news

No articles for today, maybe tomorrow!


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish