Under construction

New design coming soon!

CIC News engine statistics

CIC News for 26-03-2014 contains 46 articles: cybercrime(21),cyber security(13),data breach(7),other(5)

CIC News update contains 43 English and 3 Dutch articles for today.
In today's English news articles:
- 18 related to cybercrime
- 13 related to cyber security
- 7 related to data breach and identity theft
- 5 for the category other news

In today's Dutch news articles:
- 3 related to cybercrime
- 0 related to cyber security
- 0 for the category other news

Have fun reading.

English cybercrime related news

Philadelphia FBI director: Cybercrimes a growing threatLocation: Hank
Date published: 25-03-2014

Cybercrime is a growing threat to the nation's security, the head of the FBI's Philadelphia office said during a visit to Bucks County on Tuesday. "While terrorism will always be a major problem, cyber will be the next thing," Edward J. Hanko told members of the Central Bucks Chamber of Commerce. "... Read more

Source: www.theintell.com

Top found tags: cybercrime(2),education(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Malware Activated By Text Message Makes ATMs Start Spitting CashLocation: Symantec HQ - Mountain View, United States
Date published: 25-03-2014

Lets not pretend that the sight of an ATM spewing cash out of its mouth like it hit the oil can just a little too hard last night isnt something weve all dreamed of, though knowing full well that wed never steal in real life. But its far from a dream for cybercriminals who have figur... Read more

Source: consumerist.com

Top found tags: cybercrime(5),financial sector(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senators Want Ukraine to Arrest Target Hackers in Exchange for AidLocation: Ukraine
Date published: 25-03-2014

Bilateral legislation poised for debate this week would make Ukrainian economic support contingent upon a clampdown on cybercrime in the eastern European nation. Bill sponsors Sens. Mark Warner, D-Va., and Mark Kirk, R-Ill., led the first congressional hearing on the Target payment card breach, whi... Read more

Source: www.nextgov.com

Top found tags: cybercrime(3),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Information Is Power: Facebook Develops ThreatData To Compile Data On Web ThreatsLocation: Facebook - Menlo Park, United States
Date published: 25-03-2014

Part of being able to combat malware, phishing, and other online threats is gathering and consolidating as much data on those threats as possible, and Facebook took a major step forward on that front with its development of ThreatData.Facebook described ThreatData as a framework for importing in... Read more

Source: allfacebook.com

Top found tags: trojan(2),cybercrime(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Growing Black Market for Cyber Attack ToolsLocation: New York, United States
Date published: 25-03-2014

March 25 (Bloomberg) - Rand Corp. Information Systems Analyst Lillian Ablon discusses the underworld of cybercrime. She speaks with Emily Chang and Cory Johnson on Bloomberg Televisions Bloomberg West. (Source: Bloomberg)... Read more

Source: sg.news.yahoo.com

Top found tags: EN(1),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Tool to Crack Down on Cyber CrimeLocation: Homeland Security Investigations - Washington, United States
Date published: 25-03-2014

There's a new tool helping to crack down on cyber crime.Today, U.S. Immigration and Customs Enforcement, or ICE, launched Project iGuardian.It's a national cyber safety campaign to help protect kids from online sexual predators.The campaign is being spearheaded a... Read more

Source: www.news4sanantonio.com

Top found tags: website(1),cybercrime(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police probe cyber crime casesLocation: New York, United States
Date published: 26-03-2014

Update: 11:30AM THE Fiji Police Forces Cyber Crime Unit continues to receive reports on the abuse of social network sites and mobile phones. Cases currently being investigated by the police includethe setting up of fake accounts on Facebook,sending abusive texts to even annoying people by making dr... Read more

Source: www.fijitimes.com

Top found tags: social media(2),cybercrime(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security vendors are racing toward a new antimalware technology modelLocation: New York, United States
Date published: 25-03-2014

While the calendar still indicates that we are in Q1 2014, the security industry continues as a nexus of M&A activity. The year started with FireEye grabbing Mandiant, and proceeded to Bit9's merger with Carbon Black, and yesterday's announcement that Palo Alto's intent to acquire Cyvera.These ... Read more

Source: www.networkworld.com

Top found tags: antivirus(2),cybercrime(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Banking trojan infections double in AustraliaLocation: Microsoft HQ - Redmond, United States
Date published: 26-03-2014

Takes over PC and then attempts to infect victim's mobile device. Infections in Australia from the Hesperbottrojan have doubled over the past two weeks, according to security firm ESET. The trojan lures online banking customers with phishing emails that appear to have been sent from a trustworth... Read more

Source: www.itnews.com.au

Top found tags: cybercrime(3),malware(3),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Milwaukee gets new FBI leaderLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 25-03-2014

MILWAUKEE -Wisconsin has a new top crime fighter. Robert Shields is now in charge of the FBI's Milwaukee division.Shields has the skills of a cyber cop. He's good at using computers to find digital crooks and he has an idea that could help local law enforcement. "Cyber is definitely a growing conce... Read more

Source: www.620wtmj.com

Top found tags: government(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime black and gray markets are flourishing, warns RANDLocation: RAND Corporation HQ - Santa Monica, United States
Date published: 25-03-2014

Expanding black and gray markets for computer hacking tools, services and spoils of cybercrime, such as stolen credit card numbers, are expanding, creating an increasing threat to businesses, governments and individuals, according to a new RAND study sponsored by Juniper NetworksThese markets are r... Read more

Source: www.fierceitsecurity.com

Top found tags: telecom sector(2),cybercrime(8),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The cyber-crime economy could be bigger than Apple, Google and Facebook combinedLocation: New York, United States
Date published: 26-03-2014

The cyber-crime market began in the late 80's, predominantly out of Eastern Europe initially, but has now evolved into something mature an organised, structured market that's probably more profitable than the drug trade.This is simply because you can access thousands of people at once, and ther... Read more

Source: www.itproportal.com

Top found tags: report(1),social media(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The FBI wants to buy some malwareLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 25-03-2014

Federal detectives want to buy viruses and other types of malicious software for assistance in cracking criminal cases, according to a combined synopsis/solicitation for malware published this week on the governments contracting database.The specific organization in need is the FBI Investi... Read more

Source: www.ieyenews.com

Top found tags: malware(3),cybercrime(7),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDoS attacks soar as cybercriminals hit BasecampLocation: Prolexic - Hollywood, United States
Date published: 26-03-2014

Distributed-denial-of-service attacks are being bigger and more common, with Prolexic saying that these attacks are exceeding 100 Gbps on a regular basis. A new report claims there were almost 278 DDoS attacks taking place every hour against major companies around the world. /... Read more

Source: www.scmagazineuk.com

Top found tags: DoS(2),financial sector(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Threat response and Research team finds nearly 28 attacks occur every hourLocation: NSFOCUS HQ - Beijing, China
Date published: 26-03-2014

SANTA CLARA, USA: NSFOCUS Information Technology Co., Ltd. (NSFOCUS), provider of solutions and services for distributed denial-of-service (DDoS) detection and mitigation, today released its DDoS Threat Report 2013, which details attack trends and methodologies over the past year.The report expands... Read more

Source: www.ciol.com

Top found tags: financial sector(2),United States(2),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
30 million Fresh Malware Variants Created in 2013Location: Sweden
Date published: 26-03-2014

Malware isnot a new name in computer security world, but the year of 2013 broke therecord of malware creation. Almost 32% computers across the world foundinfected with malware. If we briefly glance at the situation of emergingmalware in 2013, there were seen 82,000 different malware strains accordi... Read more

Source: www.hacksurfer.com

Top found tags: Sweden(1),trojan(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Europol arrests cyber fraudsters targeting UK with bogus eBay Apple Mac auctionsLocation: eBay - San Jose, United States
Date published: 26-03-2014

Europol has arrested two people believed to be the masterminds of a cyber scam responsible for defrauding tens of thousands of euros from hundreds of victims by running fake auctions on eBay offering Apple Mac laptops.The criminals' fraud campaign targeted at least 15 countries including the UK, Fr... Read more

Source: www.v3.co.uk

Top found tags: Germany(2),United Kingdom(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Specialist: 3 out of top 10 world hackers are RomanianLocation: Romania
Date published: 26-03-2014

Three out of the top 10 users of a well known cyber crime forum are Romanians, and the country has at least three active botnets created by Romanians, said Gabriel Mazilu, deputy director of the National Cyberint center within the Romanian Intelligence Service SRI.He said three Romanian hackers are... Read more

Source: www.romania-insider.com

Top found tags: financial sector(2),United Kingdom(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

APT attacks use news of doomed flight MH370Location: Microsoft HQ - Redmond, United States
Date published: 25-03-2014

A series of advanced cyber attacks have used the lure of news about the disappearance of Malaysia Airlines flight MH370 to infiltrate nation-state and other targets, according to FireEye. In a 24 March blog post, FireEye researchers Ned Moran and Alex Lanstein tracked at least six such ... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(2),malware(3),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
More Breaches Identified; Vulnerability Detection Limited; Shared ResponsibilityLocation: SANS - Bethesda, United States
Date published: 25-03-2014

SANS today announced results of its 2014 Survey on control system security), sponsored by Qualys, Raytheon, Sourcefire, and Tenable Network Security, in which 268 IT professionals answered questions about their overall risk awareness, trends in threats and breaches, and effective means to mitigate ... Read more

Source: www.marketwatch.com

Top found tags: vulnerability(2),cyber security(4),critical infrastructure(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
WPA2 wireless security crackedLocation: Macedonia
Date published: 25-03-2014

There are various ways to protect a wireless network. Some are generally considered to be more secure than others. Some, such as WEP (Wired Equivalent Privacy), were broken several years ago and are not recommended as a way to keep intruders away from private networks. Now, a new study published in... Read more

Source: sciencespot.co.uk

Top found tags: vulnerability(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Focus cyber risk on critical infrastructure: Remote substations are vulnerableLocation: Wall Street
Date published: 25-03-2014

Doug DePeppeis a cyberlawattorney who I have worked with professionally for several years. He has very good experience working on critical infrastructure issues. When he asked to offer a guest blog using "Lohrmannon GovSpace" to cover this importanttopic, I quickly agreed. When you read his words, ... Read more

Source: blogs.csoonline.com

Top found tags: cyber security(4),government(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
20% of all malware ever created appeared in 2013Location: PandaLabs - Madrid, Spain
Date published: 25-03-2014

Putting in place effective information security has become a massive challenge. Despite anti-virus, firewalls and end-point security, the bad guys are clearly winning. Thats in part, because an avalanche of malware or malicious code is trying to overrun networks and computing devices. ... Read more

Source: www.saudigazette.com.sa

Top found tags: malware(3),cyber security(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Changing the cost of cybercrimeLocation: New York, United States
Date published: 25-03-2014

Oganisations need to cooperate and share threat intelligence in order to increase the cost of cyber attacks for hackers suggests Russ Spitler, VP product management, AlienVault I have been thinking a lot about the economics of cybercrime and how our defensive measures have impacted the ... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(2),information security(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SCADA risk awareness, threats and breachesLocation: SANS - Bethesda, United States
Date published: 26-03-2014

SANS announced results of its 2014 Survey on control system security, in which 268 IT professionals answered questions about their overall risk awareness, trends in threats and breaches, and effective means to mitigate vulnerabilities with regard to SCADA/ICS."Attacks on control systems... Read more

Source: www.net-security.org

Top found tags: vulnerability(1),critical infrastructure(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. and EU announce closer cyber issue tiesLocation: U.S.
Date published: 26-03-2014

European Union leaders and President Obama today announced a new effort to formalize and broaden cooperation on cyber issues.Obama is attending a summit in Brussels on the subject of EU-U.S. relations as part of a four nation trip mostly within Europe, but which will also include Saudi Arabia. So f... Read more

Source: www.fiercegovernmentit.com

Top found tags: cyber security(4),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
West African countries look to adopt, coordinate cyberlawsLocation: Ghana
Date published: 26-03-2014

More work is needed by West African countries to adopt and coordinate laws related to cybersecurity, according to officials who met at recent events hosted by UNCTAD, the U.N. Conference on Trade and Development. .In the region, only Cote d'Ivoire, The Gambia, Ghana and Senegal have pas... Read more

Source: www.pcadvisor.co.uk

Top found tags: government(2),legislation(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FACT SHEET: U.S.-EU Cyber CooperationLocation: U.S.
Date published: 26-03-2014

The United States and the European Union work in close coordination on cyber-related issues both bilaterally and in multilateral fora. This cooperation is founded on our shared values, our interest in an open and interoperable Internet, and our commitment to multistakeholder Internet governance, In... Read more

Source: www.officialwire.com

Top found tags: cybercrime(3),cyber security(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook unveils ThreatData security tool, already helped tackle feature phone botnetLocation: Facebook - Menlo Park, United States
Date published: 26-03-2014

Facebook unveiled a new automated ThreatData security service, claiming the advanced malware-detection and mitigation service has already helped take down a criminal campaign.Facebook unveiled the ThreatData service in a blog post. ThreatData is a central intelligence tool designed to automatically... Read more

Source: www.v3.co.uk

Top found tags: trojan(2),cybercrime(5),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple Mac Threats on the Rise; ESET Releases New Cyber Security Solutions for Popular Apple OSLocation: Microsoft HQ - Redmond, United States
Date published:
Dubai: With the growing popularity of Apple's Mac computers in the Middle East, cyber criminals are increasingly targeting the operating system. Just last month, ESET warned users of Mal-specific malware being spread disguised as cracked versions popular applications including Angry Birds and BBEdit. To protect Mac users against phishing attacks and social media based exploits, the global security leader today released its new and ... Read more

Source: www.timesofoman.com

Top found tags: financial sector(4),cybercrime(6),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Can a New Anti-Malware Solution Protect Windows XP Users?Location: Microsoft HQ - Redmond, United States
Date published: 24-03-2014

Malwarebytes said its Anti-Malware Premium tool to protect Windows XP users brings together five technologies in a 16MB download. Part of the secret sauce in Malwarebytes' anti-malware solution is a heuristics engine that works to detect and kill malicious software based on behavior rather than slo... Read more

Source: www.toptechnews.com

Top found tags: cyber security(2),malware(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Target missed many warning signs leading to breach: U.S. Senate reportLocation: Target HQ - Minneapolis, United States
Date published: 25-03-2014

(Reuters) - Target Corp missed multiple opportunities to thwart the hackers responsible for the unprecedented holiday shopping season data breach, U.S. Senate staffers charged in a committee report released on Tuesday.There was no indication the No. 3 U.S. retailer responded to warnings that malwar... Read more

Source: www.reuters.com

Top found tags: malware(2),cybercrime(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target CFO heads back to Capitol Hill with new information about data breachLocation: Target HQ - Minneapolis, United States
Date published: 25-03-2014

WASHINGTON Targets chief financial officer will testify Wednesday on Capitol Hill for the first time since the company admitted it learned of suspicious activity in its computer system a month before one of the biggest data breaches in U.S. history. CFO John Mulligan will testify at a Senate... Read more

Source: www.startribune.com

Top found tags: data breach(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Identity-theft ring leader gets 22 years in prisonLocation: U.S.
Date published: 25-03-2014

The alleged leader of an identity fraud ring was sentenced to 22 years in prison Tuesday after being convicted of wire fraud and identity theft, U.S. Attorney Barbara L. McQuade announced.A jury in August 2012 convicted Gerald Bass, 45, of Detroit of conspiracy to commit wire fraud, access device f... Read more

Source: www.detroitnews.com

Top found tags: financial sector(2),identity theft(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackonomics: Stolen Twitter accounts more valuable than credit cardsLocation: Twitter - San Francisco, United States
Date published: 26-03-2014

Stolen Twitter accounts now fetch more than credit cards on the cybercrime black market, according to a new report released by the RAND Corporation. The report is the first in a series commissioned by Juniper Networks."Markets for Cybercrime Tools and Stolen Data: Hacker's Bazaar" explains that a T... Read more

Source: www.zdnet.com

Top found tags: financial sector(2),Juniper Networks(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK HealthCare Notifies More Than 1,000 Patients of Data BreachLocation: UK HealthCare - Lexington, United States
Date published: 26-03-2014

Lexington, Ky.-based UK HealthCare is notifying 1,079 patients their personal health information has been compromised. Talyst, a UK HealthCare vendor that provides pharmacy billing management services, reported a password protected laptop was stolen Feb. 4. The laptop contained UK HealthCare patien... Read more

Source: www.beckershospitalreview.com

Top found tags: health sector(2), medical sector(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber security top concern of bank directors nationwide following Target data breach, Bank Director's 2014 Risk Practices survey saysLocation: Target HQ - Minneapolis, United States
Date published: 26-03-2014

The number-one risk concern of the boards of banks across the country is cyber security, according to the 2014 Risk Practices survey by Bank Director magazine.It was cited by 51 percent of respondents and followed the data breach at giant retailer Target in late 2013. Last week, PNC Financial Servi... Read more

Source: www.bizjournals.com

Top found tags: credit card(2),data breach(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach at UPC PolskaLocation: Warsaw, Poland
Date published: 26-03-2014

Personal details of UPC Polska subscribers have been made offered for sale online by hackers. In a statement, the Polish operator says its security experts have now blocked access to the information and are monitoring the situation. It adds that access to the details would have been obtained throug... Read more

Source: www.broadbandtvnews.com

Top found tags: password(1),cyber security(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Avoiding Malware with your Android PhoneLocation: Google HQ - Mountain View, United States
Date published: 25-03-2014

Avoiding Malware with your Android Phone The Android supports 97 percent of mobile malware across the world,but Android phones can easily stay safe if users don't use third-party apps. The platform earned 87 percent of the global smartphone market and saw mobile malware threats grow to more than 80... Read more

Source: thefootballexaminer.com

Top found tags: Google(3),Google Play(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Barracuda analytics expose the anatomy of a malware attackLocation: Microsoft HQ - Redmond, United States
Date published: 26-03-2014

The accumulation of large quantities of security-related data facilitated the creation of a user-friendly front end that is providing unprecedented visibility into the behaviour of malware in Australia and around the world, a Barracuda Networks security researcher has explained.Barracuda this week ... Read more

Source: www.cso.com.au

Top found tags: threat(1),website(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ATM and debit card skimming rampant in AtlantaLocation: Atlanta
Date published: 26-03-2014

Atlanta's Secret Service, which deals with ATM and debit skimming, shows us the high tech devices that have been seized and demonstrates how you can protect yourself.... Read more

Source: www.11alive.com

Top found tags: EN(1),skimming(1),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Arrests made in international ATM skimmingLocation: Chicago
Date published: 26-03-2014

FBI agents arrested 13 individuals in the Chicago area in connection with an international skimming and money laundering scheme, federal prosecutors said today.Authorities said offenders fraudulently obtained ATM and debit cards and their personal identification numbers in Europe and then withdrew ... Read more

Source: www.chicagotribune.com

Top found tags: government(1),skimming(1),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bulgarians Busted for Credit Card Fraud in USALocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 26-03-2014

Sixteen Bulgarians have been arrested during a special FBI operation in the United States for money laundering and credit card fraud worth millions of dollars.Around 30 people were arrested in Chicago and its suburbs as a part of a special operation to crack down on an organized crime group, the Bu... Read more

Source: www.novinite.com

Top found tags: government(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Android-bug: Toestel onbruikbaar, DDoS-aanval op Google PlayLocation: Google HQ - Mountain View, United States
Date published: 25-03-2014

Een beveiligingsexpert heeft een kwetsbaarheid in Android ontdekt waarmee apparaten van gebruikers volledig onbruikbaar kunnen worden gemaakt. Door een grote hoeveelheid tekens in een bepaald element van een app in te voeren, kunnen apparaten in een oneindig proces van herstarts terechtkomen. Het i... Read more

Source: www.techzine.nl

Top found tags: Google(2),Google Play(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pinautomaat spuugt geld na malicieus sms'jeLocation: Amsterdam, The Netherlands
Date published: 25-03-2014

Een nieuwe variant van pinautomaat-malware Ploutus laat cybercriminelen geld pinnen met het sturen van een sms. Daarvoor is wel een behoorlijk geraffineerde aanvalsmethode noodzakelijk. Deze is ontdekt door securitybedrijf Symantec, dat de zogenaamde Ploutus-malware al langer op de korrel heeft. Pl... Read more

Source: webwereld.nl

Top found tags: cybercrime(2),telecom sector(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese politie arresteert 1500 sms-spammersLocation: Beijing, China
Date published: 26-03-2014

De Chinese autoriteiten hebben gisteren meer dan 1500 mensen gearresteerd wegens het versturen van sms-spam. De spammers maken gebruik van valse basisstations om de berichten naar mobiele telefoons te versturen. Een groot probleem in China, waar 81% van de internetgebruikers via zijn mobiel online ... Read more

Source: www.security.nl

Top found tags: Trend Micro(2),cybercrime(3),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

No articles for today, maybe tomorrow!


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish