Under construction

New design coming soon!

CIC News engine statistics

CIC News for 25-03-2014 contains 39 articles: cybercrime(19),cyber security(6),data breach(8),other(6)

CIC News update contains 34 English and 5 Dutch articles for today.
In today's English news articles:
- 15 related to cybercrime
- 6 related to cyber security
- 8 related to data breach and identity theft
- 5 for the category other news

In today's Dutch news articles:
- 4 related to cybercrime
- 0 related to cyber security
- 1 for the category other news

Have fun reading.

English cybercrime related news

Business Crime Reduction Centre issued April fool alert over cybercrimeLocation: London, United Kingdom
Date published: 25-03-2014

Fraudsters are using high-pressure techniques to con businesses into paying excessive fees for domain names.Kirklees businesses have been urged to make sure they dont end up as April fools.The Business Crime Reduction Centre is hosting a free Masterclass Dont be... Read more

Source: www.examiner.co.uk

Top found tags: scam(1),cybercrime(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime part of sophisticated online economy: studyLocation: Juniper Networks - Sunnyvale, United States
Date published: 25-03-2014

Washington The dark world of cybercrime has evolved from one of rogue individuals to a functioning market-based economy with its ups and downs, code of conduct and "innovation."A study by Rand Corp. and commissioned by the security firm Juniper Networks found a well-organized, multibillion-doll... Read more

Source: www.google.com

Top found tags: financial sector(2),Juniper Networks(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trend Micro says that Cybercriminals Exploit Mass Killing in China to Distribute MalwareLocation: Trend Micro - Cupertino, United States
Date published: 25-03-2014

Security experts of security firm Trend Micro reveal that cybercriminals are leveraging the recent incident in which many people were stabbed to death at a railway station in Kunming, China to distribute a piece of malware to infect computers.The incident happened in the beginning of Ma... Read more

Source: www.spamfighter.com

Top found tags: trojan(2),malware(3),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ATM malware, controlled by a text message, spews cashLocation: Symantec HQ - Mountain View, United States
Date published: 24-03-2014

A group of enterprising cybercriminals have figured out how to get cash from a certain type of ATMby text message.The latest development was spotted by security vendor Symantec, which has periodically written about a type of malicious software it calls Ploutus that first appeared in Mexico... Read more

Source: www.pcworld.com

Top found tags: mobile device(2),cybercrime(3),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Basecamp Held Hostage by HackersLocation: 37Signals - Chicago, United States
Date published: 24-03-2014

It looks like hackers have hit Basecamp with a distributed denial-of-service (DDoS) attack and are demanding that the company pay a ransom.Attacks like this flood a website with traffic so that legitimate users can't access it.This is not a new tactic. Hackers have been holding companie... Read more

Source: www.nbcnews.com

Top found tags: hackers(1),website(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
This Map Tracks Cyberattacks Around the World in Real TimeLocation: Kaspersky HQ - Moscow, Russia
Date published: 25-03-2014

This rather captivating map shows cyberattacks occurring around the globe in real timewell, at least when theyre detected by security software.Built by Russian security company Kaspersky Lab, the map shows different malware attacks zooming across the world in multicolours as theyre picked ... Read more

Source: motherboard.vice.com

Top found tags: United Kingdom(2),cybercrime(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kenya: Nation Could Lose Billions to Cyber CrimeLocation: Kenya
Date published: 25-03-2014

Nairobi KENYA'S business is set to lose a whopping US$1,63 billion (about Sh141.68 billion) unless the government acts now on increased cyber threats, an expert has confirmed.Kenya Copyright Board Director, Marisella Ouma, said the most worrying trends amid these crimes were fears of business l... Read more

Source: allafrica.com

Top found tags: trend(1),government(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apps can exploit new Android bugs to hang devices, erase dataLocation: Google HQ - Mountain View, United States
Date published: 25-03-2014

Some reports have emerged claiming that cybercriminals could exploit Android-based smartphones and tablets using bugs that cause devices to become unresponsive or unusable.Ars Technica reports that bugs in the Android operating system can allow malicious third-party apps to send vulnerable smartpho... Read more

Source: gadgets.ndtv.com

Top found tags: Google(4),Google Play(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Phantom lonely women online were lures to victims of malware in FebruaryLocation: China
Date published: 25-03-2014

Lust and loneliness turned out to be the biggest chinks in our digital armor for the month of February. According to a recent research report done by security firm Kaspersky Lab, February was a jackpot for spammers worldwide thanks to Valentines day. India came 6th in the rankings of highest spa... Read more

Source: www.zdnet.com

Top found tags: malware(3),Kaspersky Lab(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Market for Malware and Cyber Weapons is ThrivingLocation: New York, United States
Date published: 25-03-2014

The world of computer hackers who sell stolen credit card numbers, spyware, and cyber weapons is often likened to an "underground," a word that implies the existence of a place cut off from most Internet users and existing in a corner of the Web that most people never see. But a new report conclude... Read more

Source: complex.foreignpolicy.com

Top found tags: Juniper Networks(2),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime trends point to greater sophistication, stealthier malware, more encryptionLocation: New York, United States
Date published: 25-03-2014

CSO A sobering think-tank report on the evolution of cybercrime and the supporting marketplaces on the dark side of the Internet depicts a criminal complex growing more sophisticated in software tools and its ability to hide from law enforcement.Over the last decade, what starte... Read more

Source: www.csoonline.com

Top found tags: financial sector(2),exploit kit(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
WordPress tops for blogging and malware distributionLocation: WordPress - San Francisco, United States
Date published: 25-03-2014

Internet security research and services company Netcraft has determined that sites running the WordPress blogging softwareare a major source of both phishing attacks and malware distribution.Interestingly, none of the phishing sites were hosted on WordPress.com, a a large blog-hosting s... Read more

Source: www.zdnet.com

Top found tags: phishing(1),research(1),WordPress(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber black markets get upper handLocation: Juniper Networks - Sunnyvale, United States
Date published: 25-03-2014

Cyber attackers now outgun defenders according to a new report out today looking at the multi-billion-dollar cyber criminal black economy and its infrastructure. The way to defend against such an organised opponent is to hit their economic viability, increase the effort and expense of e... Read more

Source: www.scmagazineuk.com

Top found tags: exploit kit(4),cybercrime(9),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Europol Arrests eBay Fraudsters Who Sent Bricks And Fruit, Not MacsLocation: eBay - San Jose, United States
Date published: 25-03-2014

Europol and its partners have claimed success in taking down a crew of criminals who were selling fake electronic items over eBay and as well as Polish online platforms.Hundreds of victims, including some in the UK, ordered what they thought were Apple Macs and other well-known machines, but receiv... Read more

Source: www.techweekeurope.co.uk

Top found tags: cybercrime(3),government(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Warning issued about medical computer-based scamLocation: London, United Kingdom
Date published: 25-03-2014

People are being warned of a new computer-based scam, which falsely tells people that they have blood cancer.The warning has been issued by the Metropolitan Police Cyber Crime Unit after the hoax email purporting to be from the National Institute for Health and Care Excellence (NICE) was sent out.T... Read more

Source: www.avonandsomerset.police.uk

Top found tags: health sector(2),medical sector(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Microsoft Is About To Leave One-Third Of All Computers Vulnerable To HackingLocation: Microsoft HQ - Redmond, United States
Date published: 24-03-2014

Hundreds of millions of computers running everything from ATMs to the power grid will be vulnerable to hacking next month when Microsoft stops supporting its old Windows XP operating system.Hackers have been holding onto flaws in Windows XP and waiting to exploit them until after the software giant... Read more

Source: www.huffingtonpost.com

Top found tags: government(3), malware(3), cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hootsuite Recovers from Denial of Service AttackLocation: Hootsuite - Vancouver, Canada
Date published: 24-03-2014

Social media management system Hootsuite recovered rapidly from a denial of service (DoS) attack late last week, bouncing back after being offline for a few hours Thursday morning.During that time, starting around 9:45 a.m. EST., users of the site were unable to use the service after a malicious ac... Read more

Source: threatpost.com

Top found tags: cyber security(2),cybercrime(3),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Panda Warns Over Growing Malware Variant ThreatLocation: PandaLabs - Madrid, Spain
Date published: 25-03-2014

In 2013, cyber-criminals armed with malware toolkits created more than 82,000 variants of malicious software every day, infecting almost 32 percent of computers worldwide with unwanted code, according a report published by antivirus firm Panda Security.Yet, the massive number of malware variants ... Read more

Source: www.techweekeurope.co.uk

Top found tags: social media(4),cybercrime(5),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hefty fines coming for child pornLocation: United States Capitol - Washington D.C., United States
Date published: 25-03-2014

Million-dollar fines and jail terms of up to 15 years are some of the severe penalties being proposed by Government in new legislation to deal with specific cyber crimes including child pornography.This as two new pieces of legislationthe Cybercrime Bill 2014 and the T&T Cyber Security Agenc... Read more

Source: guardian.co.tt

Top found tags: pornography(3),child pornography(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spyware app turns the privacy tables on Google Glass wearersLocation: Google HQ - Mountain View, United States
Date published: 25-03-2014

Critics of Google Glass usually remark on how the device allows its owner to take photos and videos of other people without their knowledge or consent, which has contributed to some backlash, including bans on Glass in some establishments and an alleged assaulton a Glass user.But a spyware app deve... Read more

Source: nakedsecurity.sophos.com

Top found tags: Google(2),Google Glass(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ransomware that demands Bitcoins is distributed by malware that steals bitcoinsLocation: Trend Micro - Cupertino, United States
Date published: 25-03-2014

A new variant of a malicious program called BitCrypt that encrypts files and asks victims for bitcoin payments is being distributed by a computer Trojan that first pilfers bitcoin wallets.BitCrypt is part of a growing category of malicious programs known collectively as ransomware that attempt to e... Read more

Source: www.pcworld.com

Top found tags: trojan(2),cybercrime(3),malware(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Cloud Infographic: Cybercrime Costs Around The WorldLocation: New York, United States
Date published: 24-03-2014

Cyber threats, like identity theft, malware and data breaches, are constantly increasing in number and growing in sophistication. The New Face of Cybercrime infographic illustrates various methods to prevent and protect against the cyber threats expected in 2014 and explores the costs incurred by c... Read more

Source: cloudtweaks.com

Top found tags: data breach(2), identity theft(2), cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stanford Hospital, Contractor to Pay $4.1 Million for 2010 Data BreachLocation: San Jose
Date published: 24-03-2014

The breach exposed 20,000 emergency room patients' medical information. The San Jose Mercury News reports that Stanford Hospital & Clinics and former contractor Multi-Specialty Collection Services (MSCS) will likely pay $4.1 million to settle a class action lawsuit over a 2010 data brea... Read more

Source: www.esecurityplanet.com

Top found tags: data breach(2), health sector(2), medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Scams, rip offs, identity theft and other things to watch out forLocation: London
Date published: 25-03-2014

There are all kinds of schemes out there trying to part you from your money.Grandparent scams, travel and credit card debt offers, power of attorney abuse and other rip offs and frauds are among the activities people are being warned about by police during Fraud Awareness Month.These are some of th... Read more

Source: www.newsoptimist.ca

Top found tags: government(3),financial sector(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
California Department Of Motor Vehicles Suffers Credit Card Data BreachLocation: California
Date published: 23-03-2014

It does not matter where you are right now, but basically all companies should always do their utmost best to make sure that they do not end up as a victim of a credit card data breach. I suppose one can chalk up the California Department of Motor Vehicles as the latest victim in an ever growing li... Read more

Source: www.ubergizmo.com

Top found tags: credit card(2),data breach(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ventures AfricaLocation: Microsoft HQ - Redmond, United States
Date published: 25-03-2014

VENTURES AFRICA A new joint study conducted by International Data Corporation (IDC) and the National University of Singapore (NUS) has identified African markets as responsible for 10 percent of global cybercrime activities.The menace, which according to the report costs global enterprises over... Read more

Source: www.ventures-africa.com

Top found tags: data breach(2),Nigeria(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Governments to Lose $50bn to Piracy-related Malware in 2014Location: Singapore
Date published: 24-03-2014

Governments could lose more than $50 billion in 2014 thanks to costs associated with malware in pirated software, according to a study by the National University of Singapore (NUS) and research firm IDC. Of this, $127 billion is expected to be spent on dealing with miscellaneous security issues, wh... Read more

Source: www.infosecurity-magazine.com

Top found tags: government(2),trojan(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Breach Notification Bill goes to the HouseLocation: New Mexico
Date published: 25-03-2014

H.B. 224, a newly introduced data breach notification bill for New Mexico, would mandate that organizations notify breached individuals within 10 days of breach discovery (unencrypted credit card data); and within 10 business days notifying the state attorney general if more than 50 NM residents ar... Read more

Source: www.huffingtonpost.com

Top found tags: credit card(2),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Privacy watchdog slams government for student-loan data breachLocation: Ottawa, Canada
Date published: 25-03-2014

OTTAWA The federal privacy watchdog says the government could have prevented the loss of personal information on almost 600,000 Canadians had it simply reminded its employees of privacy guidelines.The report released Tuesday from the privacy commissioners office into the loss of a hard drive... Read more

Source: www.edmontonjournal.com

Top found tags: government(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Microsoft Advisory Warns of Word Zero-Day AttacksLocation: Microsoft HQ - Redmond, United States
Date published: 24-03-2014

Targeted attacks have been spotted against a zero-day vulnerability in Microsoft Word 2010, leading Microsoft to issue a special security advisory and produce a Fix-it solution for users until a patch is ready.Microsoft also said that its Enhanced Mitigation Experience Toolkit (EMET) is a temporary... Read more

Source: threatpost.com

Top found tags: Windows(1), Microsoft(2), 0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UH-OH. MALWARE ALERTDon't click on this email imageLocation: Monroe, United States
Date published: 24-03-2014

(MONROE, WA) -- Have you received an email recently like the one shown in the image at right (click to enlarge) purporting to be from the cross platform Instant Message application WhatsApp?As you can see it tells you that you have "a new voicemail" awaiting your listening enjoyment tha... Read more

Source: www.skyvalleychronicle.com

Top found tags: WhatsApp(1),mobile device(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft: 0Day Exploit Targeting Word, OutlookLocation: Microsoft HQ - Redmond, United States
Date published: 24-03-2014

Microsoft warned today that attackers are exploiting a previously unknown security hole in Microsoft Wordthat can be used to foist malicious code if users open a specially crafted text file, or merely preview the message in Microsoft Outlook.In a notice published today, Microsoft advised:Microso... Read more

Source: krebsonsecurity.com

Top found tags: Microsoft(2),Microsoft Outlook(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Foreign Cyber Cheaters Lure Kashmir YouthLocation: London
Date published: 25-03-2014

SRINAGAR Seeing them as a chance to escape turmoil and police wrath, a growing number of Kashmiri Muslim youth have been falling victims to foreign cyber cheaters who dupe them of thousands of rupees on pretext of depositing millions of dollars in their accounts.Hundreds of youth have been d... Read more

Source: www.onislam.net

Top found tags: Anonymous(2),e-mail(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EXCLUSIVE: Government backs tougher sentences on cyber-bullies and text pervertsLocation: Twitter - San Francisco, United States
Date published: 25-03-2014

The Government today backed tougher laws that could see cyber stalkers and text perverts locked up for two years.Justice Secretary Chris Grayling said the new rules will target offenders who make victims lives a misery by abusing or sexually harassing them online or on mobiles.MP Angie Bray prop... Read more

Source: www.standard.co.uk

Top found tags: website(1),cyber bullying(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

25 virusscanners voor Windows 7 getestLocation: Microsoft HQ - Redmond, United States
Date published: 24-03-2014

Het Duitse testorgaan AV-Test.org heeft 25 virusscanners en Internet Security Suites voor consumenten op Windows 7 getest. Daarbij werd er naar 'real world' scenario's zoals bescherming, gebruik en prestaties gekeken en fungeerde Microsoft Security Essentials als basislijn. De beveiligingspakketten... Read more

Source: www.security.nl

Top found tags: antivirus(3), Kaspersky Lab(4), 0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
XP-malware laat criminelen geldautomaat via sms leeghalenLocation: Microsoft HQ - Redmond, United States
Date published: 24-03-2014

Malware die geldautomaten met een Windows XP-installatie infecteert maakt het mogelijk voor criminelen om de automaat via het versturen van een enkel sms-bericht leeg te halen. Het gaat om de Ploutus-malware die vorig jaar oktober voor het eerst in Mexico werd ontdekt, maar nu in meer landen actief... Read more

Source: www.security.nl

Top found tags: medical sector(2),telecom sector(8),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware-besmettingen via nieuw lek in Microsoft WordLocation: Microsoft HQ - Redmond, United States
Date published: 25-03-2014

Microsoft waarschuwt gebruikers van Word 2003 en hoger voor een zeroday-gat. Het bedrijf heeft een fix beschikbaar gesteld. Een exploit voor een verse zeroday bedreigt gebruikers van Microsoft Word 2003, 2007, 2010, 2013, 2013RT, Word Viewer, Office voor Mac, Office Web Apps 2010 en Web... Read more

Source: computertotaal.nl

Top found tags: health sector(2),medical sector(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Het Nederlandse cyberlegerLocation: Russen
Date published: 25-03-2014

Nederland ontwikkelt offensieve cyberwapens, maar de spelregels om onnodig humanitair leed te voorkomen ontbreken. Ook zijn er zorgen over de nauwe samenwerking tussen cybersoldaten en de spionnen van de MIVD. Wie drukt er straks op de rode knop? Opeens waren ze er op de Krim: honderden mannen in c... Read more

Source: www.vn.nl

Top found tags: cybercrime(3),The Netherlands(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

Cyber Security: een gedeelde verantwoordelijkheidLocation: Den Haag
Date published: 25-03-2014

Verslag van de CIONET-bijeenkomst Van Cyber Security naar Cyber Resilience. Bedrijven en overheden liggen onder vuur omdat ze te veel gebruikersdata naar zich toe zouden trekken. Maar in cyberspace zijn zijzelf ook niet onschendbaar. Ze moeten zich wapenen tegen online bedreigingen, juist ook om de... Read more

Source: forum.kpn.com

Top found tags: NL(1),cyber resilience(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish