Under construction

New design coming soon!

CIC News engine statistics

CIC News for 30-03-2014 contains 46 articles: cybercrime(18),cyber security(7),data breach(14),other(7)

CIC News update contains 42 English and 4 Dutch articles for today.
In today's English news articles:
- 15 related to cybercrime
- 7 related to cyber security
- 14 related to data breach and identity theft
- 6 for the category other news

In today's Dutch news articles:
- 3 related to cybercrime
- 0 related to cyber security
- 1 for the category other news

Have fun reading.

English cybercrime related news

City braces for Anonymous cyberattackLocation: Twitter - San Francisco, United States
Date published: 29-03-2014

The city of Albuquerque is bracing for a potential cyberattack by an Internet hacktivist group that has targeted the police department in response to the March 16 fatal police shooting of James M. Boyd in the Sandia foothills.A city spokeswoman said this morning that officials expect the brun... Read more

Source: www.abqjournal.com

Top found tags: social media(4),telecom sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attackers upping the ways they use DDoS attacksLocation: Oracle - Redwood City, United States
Date published: 28-03-2014

Distributed denial of service (DDoS) attacks are getting more complex, with attackers becoming wise to the ways of DDoS threat prevention. Thats according to a new report from Incapsula Inc., a U.S.-based security solutions provider. In a report collecting samples of more than 154 million unique... Read more

Source: www.itbusiness.ca

Top found tags: DoS(2),United States(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDoS Attack Volume Skyrockets in Q1Location: Microsoft HQ - Redmond, United States
Date published: 28-03-2014

2013 saw a rapid increase in network distributed denial of service (DDoS) attack volumes, which was facilitated by the adoption of attack methods like network time protocol (NTP) ampli?cation and large SYN ?oods. According to first-quarter statistics, that trend is set to continue, with additional ... Read more

Source: www.infosecurity-magazine.com

Top found tags: DoS(2),trojan(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Unbelievable! Yahoo-Yahoo turns diabolic!Location: Abuja, Nigeria
Date published: 29-03-2014

The war against Cyber crime otherwise known as yahoo yahoo, by security agents in Nigeria may take a long time to be won, if the confession of a 25-year-old alleged internet fraudster is anything to go by. The suspect who simply gave his name as Chidi, disclosed that what people used to know as yah... Read more

Source: www.codewit.com

Top found tags: United Kingdom(2),Nigeria(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man held for creating, using fake email ID to tarnish colleague's imageLocation: New York, United States
Date published: 29-03-2014

COIMBATORE: The city police have arrested an agriculture department official on charges of creating a fake email account in the name of a retired official from the department and sending multiple emails to various senior officials to tarnish the image of one of his colleagues by making false money ... Read more

Source: timesofindia.indiatimes.com

Top found tags: police(1),TOR(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Location: Fort Myers, United States
Date published: 28-03-2014

The Florida Department of Law Enforcement Fort Myers Regional Operations Center Cyber High-Tech Crime Task Force arrested Jesus Salas, 29, of North Fort Myers, "for 10 counts of sexual performance by a child," according to a release issued by FDLE Friday. FDLE agents served a search warrant at Sala... Read more

Source: www.cape-coral-daily-breeze.com

Top found tags: cybercrime(3),pornography(3),child pornography(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cutwail operators aim DDoS at Zeus competitorsLocation: New York, United States
Date published: 28-03-2014

Analysts detected operators of one botnet targeting another malware control hub via distributed denial-of-service (DDoS) attacks. According to researchers at RSA, the battle of the botmasters took place when Cutwail "botmasters" inundated the infrastructure of another botnet using at least 30... Read more

Source: www.scmagazine.com

Top found tags: malware(4),cybercrime(7),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Everything you need to know about StuxnetLocation: Iran
Date published: 28-03-2014

Stuxnet is a major computer virus, first discovered in June 2010, which was designed to attack Siemens Step7 software running on a Windows operating system.The worm was at first identified by security firm VirusBlokAda in mid-June 2010, and was originally called 'Rootkit.Tmphider'.However, Symantec... Read more

Source: www.cbronline.com

Top found tags: antivirus(3),cybercrime(3),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pinterest hack causes pins to be replaced with spam photos of buttsLocation: Pinterest HQ - San Francisco, United States
Date published: 29-03-2014

Reports of the hack began appearing across Twitter last nightUsers were complaining pins on their feeds had been replaced by spam Images ranged from photos of bottoms to women in their underwearMany were captioned with weight loss spam or were promoting giveawaysHackers access boards using maliciou... Read more

Source: www.dailymail.co.uk

Top found tags: Twitter(1),cybercrime(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malwares journey from hobby to profit-driven attacksLocation: New York, United States
Date published: 29-03-2014

The history of malware is a fascinating topic that provides insights into the current landscape. As one of the authors of theAvien Malware Defense Guide, I contributed to the book's chapter on history and will be leveraging and expanding on some of that content here to give context to where we are ... Read more

Source: betanews.com

Top found tags: trojan(2),malware(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
80% of top US news organizations victims of govt.-sponsored malware attacksLocation: New York Times - New York, United States
Date published: 29-03-2014

Latest research by Google has reportedly revealed that 80 percent of top news organizations in the US have been target of government sponsored malware attacks.As Google has been tracking state-sponsored malware for nearly two years, it was found that 21 out of the top 25 top organizations were targ... Read more

Source: www.business-standard.com

Top found tags: social media(2),government(3),Syrian Electronic Army(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Forget Stealing Credit Cards, Now Hackers Just Straight-Up Blackmail YouLocation: 37Signals - Chicago, United States
Date published: 28-03-2014

While hackers tried to get rich by stealing millions of credit cards from Target, other cybercriminals have quietly tried another method to make a quick buck: Asking companies to pay them to go away.In recent weeks, two companies have publicly described their experiences with what has become a popu... Read more

Source: www.huffingtonpost.com

Top found tags: credit card(2),cybercrime(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Blue Coat Cybersecurity Trends for 2014 - Trend 3 - Wearable MalwareLocation: Google HQ - Mountain View, United States
Date published: 28-03-2014

There will always be malware for popular platforms - taking advantage of the most popular platforms brings benefits to those who seek to gain at the expense of others. Weve seen this in the past - the popularity of Microsofts Windows platform (as compared to the Mac OS or Linux) has meant tha... Read more

Source: www.bluecoat.com

Top found tags: Microsoft(2),trojan(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Organised crime: FIA arrest credit card fraud suspectLocation: Lahore
Date published: 30-03-2014

LAHORE:The National Response Centre for Cyber Crime (NR3C) of the Federal Investigation Agency (FIA) has arrested a man suspected of credit card fraud.An NR3C team arrested Mehboob Sadaqat from Allama Iqbal Town on Thursday, Punjab FIA Director Usman Anwar told The Express Tribune.He said the raidi... Read more

Source: tribune.com.pk

Top found tags: credit card(2),cybercrime(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ex-IAEO chief reveals details about Stuxnet malwareLocation: Iran
Date published: 29-03-2014

Nasim Senior Iranian nuclear scientist Fereydoon Abbasi, who was appointedas chief of the Iranian Atomic Energy Organization in 2010 bythen-president Mahmoud Ahmadinejad, has revealed new details aboutWests wicked plots on Irans peaceful nuclear progress in aninterview with Khorasan Daily.... Read more

Source: theiranproject.com

Top found tags: Israel(1),report(1),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Pinterest Hit With Weight Loss Spam ... and Butt PicsLocation: Pinterest HQ - San Francisco, United States
Date published: 28-03-2014

Most Pinterest users are no stranger to an occasional flood of friends' diet solutions or workout regimens. But this week's overdose of images showing off post-diet, swimsuit-ready bodies and plumped-up derrieres was actually the work of a hacker.The offending images appear to have been removed fro... Read more

Source: www.pcmag.com

Top found tags: spam(1),security measures(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MediaPost Publications Google's $8.5 Million Data Leakage Settlement Clears First HurdleLocation: Google HQ - Mountain View, United States
Date published: 28-03-2014

A federal judge has tentatively approved Google's controversial $8.5 million settlement of a class-action lawsuit alleging that the company violated its privacy policy bytransmitting users' search queries -- which sometimes include their names -- to publishers. On balance, the factors favoring a... Read more

Source: www.mediapost.com

Top found tags: cyber security(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Cash In On ATMsLocation: Mexico
Date published: 28-03-2014

Malware uses text messages and other techniques to infect ATMs and ultimately allow criminals to steal cash.A text message is sent, and cash starts spitting out of an ATM infected with malware.That is one of the capabilities of a sophisticated variant of malware known as Ploutus that has been linke... Read more

Source: www.darkreading.com

Top found tags: cybercrime(3),financial sector(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Markets for Hackers Are Increasingly Sophisticated, Specialized and MaturingLocation: RAND Corporation HQ - Santa Monica, United States
Date published: 29-03-2014

Black and gray markets for computer hacking tools, services and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments and individuals, according to a new RAND Corporation study.One dramatic example is the December 2013 breach of r... Read more

Source: www.theepochtimes.com

Top found tags: exploit kit(4),cybercrime(9),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
European Cybercrime Centre at Europol warns about Windows XP security risksLocation: Microsoft HQ - Redmond, United States
Date published: 28-03-2014

The European Cybercrime Centre (EC3) at Europol warns about security risks related to the end of Windows XP support. After 8 April 2014, Windows will stop supporting its Windows XP operating system. This means that from that day forward, security vulnerabilities will not be fixed, leaving computers... Read more

Source: www.europol.europa.eu

Top found tags: telecom sector(4),The Netherlands(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Patch Management Failures Facilitate CybercrimeLocation: Rapid7 HQ - Boston, United States
Date published: 28-03-2014

Failures in patch management of vulnerable systems have been a key enabler of cybercrime, according to the conclusions reached in Solutionary's annual Global Threat Intelligence Report, saying it sees botnet attacks as the biggest single threat. Failures in patch management of vulnerabl... Read more

Source: www.computerworld.in

Top found tags: cyber security(2),exploit kit(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Europol's European Cybercrime Centre warns of security risks as Windows XP support endsLocation: Microsoft HQ - Redmond, United States
Date published: 29-03-2014

The European Cybercrime Centre (EC3) at Europol has warned of security risks related to the end of Windows XP support.After April 8 2014, Windows will stop supporting its Windows XP operating system. This means that from that day forward, security vulnerabilities will not be fixed, leaving computer... Read more

Source: sofiaglobe.com

Top found tags: telecom sector(4),The Netherlands(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Another arrest made in card skimming caseLocation: New Jersey
Date published: 28-03-2014

BETHLEHEM -- Another arrest has been made in the credit card skimming case involving a Bethlehem restaurant.Police say Saihing Chan, 20, had a key role in the skimming operation at the Golden Town Buffet on Route 9W. They say he was the primary user of the counterfeit credit cards creat... Read more

Source: www.cbs6albany.com

Top found tags: credit card(2),identity theft(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A Cybersecurity Framework for the Nations Critical Infrastructure: How CableLabs is HelpingLocation: National Institute of Standards - Gaithersburg, United States
Date published: 28-03-2014

Over the past year there has been a significant increase in the number and frequency of cyber-attacks on major retailers, social media sites, and financial institutions. From identity theft and credit card fraud to denial of service, these cyber criminals are starting to disrupt our lives in small ... Read more

Source: www.cablelabs.com

Top found tags: financial sector(6),government(8),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What Businesses Frequently Forget to Protect In a Data BreachLocation: New York, United States
Date published: 29-03-2014

Smart business people know that they must secure their systems to withstand the most determined and persistent physical, as well as cyber, attacks. They must minimize their risk of exposure by deploying the most sophisticated security and anti-malware software, using outside firms to frequently pen... Read more

Source: abcnews.go.com

Top found tags: cyber defense(2),data breach(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australian Data Breach Notification Bill Re-IntroducedLocation: Sydney, Australia
Date published: 28-03-2014

On March 20, 2014, Australias Privacy Amendment (Privacy Alerts) Bill 2014 was re-introduced in the Senate for a first read. The bill, which was subject to a second reading debate on March 27, 2014, originally was introduced on May 29, 2013, but it lapsed on November 12, 2013 at the end of the s... Read more

Source: www.huntonprivacyblog.com

Top found tags: report(1),cyber security(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ID thefts remain top consumer complaints for 2013Location: Federal Trade Commission - Washington, United States
Date published: 29-03-2014

Identity theft complaints once again are the topconsumer complaints for 2013, as published in the Consumer Sentinel Network Data Book 2013.Overall lastyear,consumers lost more than $1.6 billion to fraud, the Federal Trade Commission said earlier this year.Data comes from the Consumer Sentinel... Read more

Source: www.nwitimes.com

Top found tags: government(3),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
86% of customers shun brands following a data breachLocation: European Parliament - Brussel, Belgium
Date published: 28-03-2014

The majority of people would not do business with a company that had failed to protect its customers card data, a new study has revealed.In the survey, conducted by OnePoll and commissioned by Semafone, 86.55% of the 2,000 respondents stated that they were not at all likely or not very ... Read more

Source: www.information-age.com

Top found tags: EU(2),European Parliament(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach keeps colleges onalertLocation: Green Bay, United States
Date published: 28-03-2014

GREEN BAY- Area colleges are on high alert.Thats after a computer virus put students information at risk at UW-Parkside.Information security officers at UW-Green Bay say this type of attack could happen anywhere.UW-Parkside employees discovered malware, a type of virus, on an admissions serve... Read more

Source: fox11online.com

Top found tags: information security(2),cyber security(4),education(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
S&P downgrades Target for data breachLocation: Target HQ - Minneapolis, United States
Date published: 29-03-2014

Standard & Poor's downgraded Target's corporate debt rating by one notch Friday due to last year's data breach and continued losses in its Canadian division. The breach compromised credit card numbers and personal information of tens of millions of customers during the 2013 holiday ... Read more

Source: www.kspr.com

Top found tags: credit card(2),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spec's Data Breach Compromises Customer InformationLocation: New York, United States
Date published: 28-03-2014

(HOUSTON) Specs Wines, Spirits and Fine Foods announced a criminal attack on its computer network Friday.The Houston-based Specs computer network breach impacted customer and employee data.The Latest News Headlines, Traffic and Weather: The data breach impacts 34 smaller neighborhood stor... Read more

Source: news92fm.com

Top found tags: credit card(2),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Woman charged with identity theftLocation: New York, United States
Date published: 28-03-2014

LOUISVILLE, KY (WAVE) A Louisville woman is facing charges for using the name of another woman to get service from LG&E.An arrest warrant says Hazel L. Cherry, 31, used the victim's name and identifying information for several years. According to the warrant the victim was not aware her ide... Read more

Source: www.wave3.com

Top found tags: EN(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware in 34 Specs stores, payment data compromised for 550KLocation: Spec's HQ - Houston, United States
Date published: 28-03-2014

About 550,000 customers, as well as employees, of Texas-based Spec's may have had personal information including payment card data compromised in a malware attack that impacted 34 locations and dates back to Oct. 31, 2012.How many victims? About 550,000. What type of personal information? P... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),identity theft(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Media Release: EC Council Academy CSCU: The Next Line of Defence in Cyber SecurityLocation: Sydney, Australia
Date published: 28-03-2014

A small fact, at the time of this media release 14 538 malware infected IP addressed have been identified today in Australian circulation according to the Australian Internet Security Initiative (AISI). A simple statistic, but one that shows the prevalence of security risks organisations are facing... Read more

Source: www.cmo.com.au

Top found tags: cybercrime(3),malware(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stolen Twitter accounts more valuable to scammers that credit card info reportLocation: Juniper Networks - Sunnyvale, United States
Date published: 29-03-2014

Your twitter account password can become a tasty morsel for cyber thieves. Hackers can make more money out of stolen twitter credentials than from stolen credit card info on the black market, a new report says. The report called Markets for Cybercrime Tools and Stolen Data, released by ... Read more

Source: rt.com

Top found tags: Juniper Networks(2),cybercrime(3),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Poughkeepsie Woman Arrested on Felony Identity Theft ChargesLocation: Poughkeepsie, United States
Date published: 30-03-2014

POUGHKEEPSIE, N.Y. The state police Bureau of Criminal Investigation has arrested a Poughkeepsie woman on felony identity theft charges.Police said they arrested Santia Reyes, 24, on Thursday after a lengthy investigation that began in December 2013.Investigators alleged that Reyes assumed the ... Read more

Source: hudsonvalleyreporter.com

Top found tags: police(1),identity theft(2),The Netherlands(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Technology helping to lower the rate of debit skimmingLocation: VANCOUVER
Date published: 29-03-2014

VANCOUVER (NEWS1130) Chip technology is helping to make Interac safer than ever.Losses from debit skimming are down right across the country.Last year, the company only lost around $30 million, which is way down from its all-time high of $142 million of losses in 2009.However, only $7 million w... Read more

Source: www.news1130.com

Top found tags: fraud(1),skimming(1),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Suspect wanted for credit card fraud at local Wal-MartLocation: Paducah, United States
Date published: 28-03-2014

PADUCAH- Paducah police are asking for your help in identifying a man who may be involved in or have knowledge of the fraudulent use of a credit card at a local Wal-Mart.A Corydon, Kentucky woman told the Paducah Police Department that someone had used her bank card numbers to purchase ... Read more

Source: www.wpsdlocal6.com

Top found tags: credit card(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Feds indict 17 involved in international ATM skimming spreeLocation: Chicago
Date published: 28-03-2014

Seventeen individuals were indicted in U.S. District Court in Chicago for their involvement in an international ATM skimming scheme that made them hundreds of thousands of dollars. The ruse, which took place from May 2011 to September 2012, involved ATM and debit card numbers including the PIN ... Read more

Source: www.scmagazine.com

Top found tags: government(3),financial sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber-bullying legislation needs changes, say judgesLocation: New Zealand
Date published: 29-03-2014

Judges have raised the prospect of District Courts being clogged with trivial online spats, under new cyber-bullying laws.The New Zealand Herald reports they're asking for legislation to include a mechanism to prevent cases with no merit reaching court.Chief District Court judge Jan-Marie Doogue sa... Read more

Source: www.newstalkzb.co.nz

Top found tags: government(2),legislation(2),New Zealand(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Two Android Apps Are Secretly Mining Dogecoin And Litecoin Without Telling People - Business insiderLocation: New Delhi, India
Date published: 27-03-2014

Two Android apps called Songs and Prized secretly mine Litecoin and Dogecoin without informing users according to a new security report by researchers at Trend Micro. Songs has been downloaded one million to five million times while Prized has been installed 10,000 to 50,000 times writes Ars Techni... Read more

Source: www.businessinsider.in

Top found tags: financial sector(2),Trend Micro(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police: Credit Card Fraud on the Rise in West TennesseeLocation: Tennessee
Date published: 29-03-2014

DOWNTOWN JACKSON -- Jackson police say credit card fraud is becoming more common in West Tennessee. Police also say they are not sure how these criminals are able to get card numbers.On March 13, someone used another woman's credit card information at Panera Bread on Vann Dr... Read more

Source: www.wbbjtv.com

Top found tags: credit card(2),financial sector(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Java-lekken zeer populair bij cybercriminelen in 2013Location: Oracle - Redwood City, United States
Date published: 28-03-2014

Java-lekken waren vorig jaar zeer populair bij cybercriminelen, zo blijkt uit een overzicht van de exploits waarmee geprobeerd werd om internetgebruikers met malware te infecteren. Exploits maken misbruik van beveiligingslekken en worden onder andere via exploitkits gebruikt.De NTT Group analyseerd... Read more

Source: www.security.nl

Top found tags: vulnerability(1),cybercrime(2),Internet Explorer(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Power Worm infecteert Word- en Excel-bestandenLocation: Trend Micro - Cupertino, United States
Date published: 29-03-2014

Onderzoekers hebben een nieuwe malware-familie ontdekt die zich in Word- en Excel-bestanden verstopt en Tor en Windows Powershell gebruikt voor het uitvoeren van aanvallen op computers. Daarbij gebruikt de malware nieuwe technieken, waardoor systeembeheerders een infectie mogelijk niet opmerken.Dat... Read more

Source: www.security.nl

Top found tags: cybercrime(2),Microsoft(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meer aandacht voor cyber securityLocation: National Cyber Security Centre - Den Haag, The Netherlands
Date published: 27-03-2014

Voorzitter, in de derde editie van het Cyber Security Beeld Nederland wijst de minister op burgers, bedrijven en overheden die regelmatig het slachtoffer zijn van botnets en ransomware.De scope van het Nationaal Cyber Security Centrum (NCSC) focust zich alleen op de vitale sectoren van Nederl... Read more

Source: louisbontes.nl

Top found tags: government(6),Ministry of the Interior and Kingdom Relations(7),critical infrastructure(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

Wilma van Dijk benoemd tot directeur Cyber Security bij de NCTVLocation: Office of the National Coordinator for Security and Counterterrorism - Den Haag, The Netherlands
Date published: 28-03-2014

Wilma van Dijk wordt met ingang van 1 juni 2014 benoemd tot directeur Cyber Security bij de Nationaal Cordinator Terrorismebestrijding en Veiligheid (NCTV).Mevrouw Van Dijk (1966) is thans sinds 2012 directeur Bewaken, Beveiligen,Burgerluchtvaart bij de NCTV. In de periode 2012-2014 was zij bij d... Read more

Source: www.ncsc.nl

Top found tags: health sector(2),medical sector(2),The Netherlands(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish