Under construction

New design coming soon!

CIC News engine statistics

CIC News for 31-03-2014 contains 36 articles: cybercrime(17),cyber security(10),data breach(7),other(2)

CIC News update contains 33 English and 3 Dutch articles for today.
In today's English news articles:
- 15 related to cybercrime
- 9 related to cyber security
- 7 related to data breach and identity theft
- 2 for the category other news

In today's Dutch news articles:
- 2 related to cybercrime
- 1 related to cyber security
- 0 for the category other news

Have fun reading.

English cybercrime related news

What is a Denial-of-Service Attack?Location: New York, United States
Date published: 30-03-2014

You may have heard news reports about popular websites such as CNN, Amazon and Yahoo! being taken down by a DoS attack, but have you ever wondered what DoS means?This common tech term stands for denial-of-service, where an attacker attempts to prevent legitimate users from accessi... Read more

Source: www.huffingtonpost.com

Top found tags: social media(2),telecom sector(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anonymous Attacks Albuquerque PoliceLocation: Albuquerque, United States
Date published: 30-03-2014

Anonymous has followed through with a threat to disable the Albuquerque Police Department (APD) website in retaliation for the fatal shooting of mentally ill man James Boyd earlier this month. An APD spokesperson said there was unusual activity on their website and an officer confirmed it was... Read more

Source: www.ibtimes.com

Top found tags: Anonymous(2),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Online Black Market a Huge EconomyLocation: RAND Corporation HQ - Santa Monica, United States
Date published: 31-03-2014

A study by the RAND Corporation has revealed that the online black market has evolved into a highly complex structure with robust infrastructure and social organisation. These markets, according to the study sponsored by Juniper Networks, are comparable to a growing multi-billion dollar economy... Read more

Source: www.newindianexpress.com

Top found tags: exploit kit(4),financial sector(4),cybercrime(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware Targets Mobile Devices in Futile Search for Crypto-CurrenciesLocation: San Francisco
Date published: 30-03-2014

Cyber-criminals are toying with using mobile devices to mine for crypto-currencies, such as bitcoin, but the platform is too underpowered for effective prospecting. A hacked-together program has infected a few hundred Android devices and turned them into low-power platforms for mining crypto-curren... Read more

Source: www.eweek.com

Top found tags: mobile device(2),cybercrime(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware In A MouseLocation: German
Date published: 30-03-2014

Keyloggers, in both hardware and software forms, have been around for a long, long time. More devious keyloggers are smart enough to type commands into a computer and install Trojans, back doors, and other really nasty stuff. What about mice, though? Surely theres no way the humble USB mou... Read more

Source: hackaday.com

Top found tags: malware(1),USB (1),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police bust lottery racket; seven heldLocation: Saudi Arabia
Date published: 30-03-2014

Being operated by Saudi Arabia by a Pakistan-based gang, their Indian counterparts used to dupe people by saying that they have won a huge amount, but have to deposit some money towards various clearances The Cyber Crime Police, Hyderabad, on Sunday busted a lottery racket operated by a Pakistan-ba... Read more

Source: www.thehindu.com

Top found tags: Pakistan(2),Saudi Arabia(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lobby develops anti-cyber crime refresher courseLocation: Kenya
Date published: 31-03-2014

An ICT sector lobby group has developed a refresher course on cyber crime for technology managers and system administrators in public and private firms as attacks increase.The ICT Association of Kenya said trends, particularly in the financial services sector, show crime has shifted from physical s... Read more

Source: www.the-star.co.ke

Top found tags: telecom sector(4),cybercrime(5),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government launches Computer Emergency Response Team to fight cyber crime threatLocation: New York, United States
Date published: 31-03-2014

The government has finally unveiled its UK Computer Emergency Response Team (CERT-UK) as part of its strategy in the fight against cyber crime.The unit, which had been expected to launch earlier this month, is intended to develop the UK's cyber defences against threats ranging from hackers and cybe... Read more

Source: www.computing.co.uk

Top found tags: CERT(3),cybercrime(6),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Insights on the Cybercrime Market NewsLocation: U.S.
Date published: 31-03-2014

BANGALORE: The cybercrime black market is growing by leaps and bounds and has developed into a multibillion dollar industry in spite of the recent takedowns, reveals a study conducted by RAND Corporation. The study provides such other insights into dark world of cybercrime black market. Emerging Tr... Read more

Source: www.siliconindia.com

Top found tags: United States(2),cybercrime(6),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Compromised Social Media Accounts More Valuable Than Stolen Credit Card DetailsLocation: New York, United States
Date published: 31-03-2014

Hacked Social Media Accounts are now more valuable in the internet black market than stolen Credit Card details, revealed a new report.Commissioned by Juniper Networks and compiled by National Security Research Division (RAND), the report titled Markets for Cybercrime Tools and Stolen Data ha... Read more

Source: www.inquisitr.com

Top found tags: cybercrime(4),financial sector(4),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is there a cyber war between Ukraine and Russia?Location: Ukraine
Date published: 31-03-2014

Alarming headlines have recently started to appear in the media (see, for example, the CNNs Cyberwar hits Ukraine). This, however, is sensationalism. What has actually happened so far is limited disruption of mobile communications through Distributed Denial of Service (DDoS) attacks. In ad... Read more

Source: blog.oup.com

Top found tags: United Kingdom(2),government(3),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mass malware on mobile devices: Why haven't we seen it yet?Location: Google HQ - Mountain View, United States
Date published: 31-03-2014

This post is probably going to get my mobile phone hacked, but conflicting news reports have got me wondering whether mobile devices are really as vulnerable as some vendors and doomsayers would suggest.It would be crazy to say that all mobile devices are perfectly secure. Given that Angela Merkel,... Read more

Source: www.networkworld.com

Top found tags: Germany(4),United States(4),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Panic! No malware required!Location: New York, United States
Date published: 31-03-2014

The landscape has shifted. Security is no longer something your organization can have complete control over. In this video, John Strand will demonstrate how most large corporations can be compromised in moments, even without phishing.He will then discuss how many attackers are moving aw... Read more

Source: www.net-security.org

Top found tags: cybercrime(1),EN(1),phishing(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Location: Facebook - Menlo Park, United States
Date published: 31-03-2014

Johannesburg - A lot of malicious attachments in Februarys spam came in emails allegedly sent by women who wanted to make new friends in the run-up to Valentine's Day. Some attackers went even further by trying to hook recipients with the promise of explicit photos in archives attached to messag... Read more

Source: www.iol.co.za

Top found tags: Nigeria(3),malware(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Maps' spam problem presents genuine security issuesLocation: Google HQ - Mountain View, United States
Date published: 31-03-2014

Bryan Seely, a Microsoft Engineer demonstrated an attack against Google Maps through which he was able to set up fake Secret Service offices in the company's geo-database, complete with fake phone numbers that rang a switch under his control and then were forwarded to real Secret Service offices, a... Read more

Source: boingboing.net

Top found tags: report(1),spam(1),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Nigerias war against cyber crime yielding resultLocation: Nigeria
Date published: 31-03-2014

The Federal Government though the Nigerian Communications Commission (NCC) has said that though cybercrime and security of information on the cyberspace has become enormous challenge in key economic sector of the economy, the Federal Government fight against the scourge has begun to bear fruit.Acco... Read more

Source: www.mydailynewswatchng.com

Top found tags: Nigeria(4),cyber security(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PCs running on XP vulnerable to virusesLocation: Microsoft HQ - Redmond, United States
Date published: 30-03-2014

Thats when Microsoft plans to stop issuing security updates for the aging, but still-popular XP version of its flagship Windows operating system, which by some estimates is still running on nearly one in three personal computers in homes and offices around the world, along with some bank ATMs an... Read more

Source: www.omantribune.com

Top found tags: government(2),Microsoft(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NTT Innovation Cyber Security Study Finds Major GapsLocation: NTT Innovation Institute - Palo Alto, United States
Date published: 30-03-2014

Network malware detection and purpose-built solutions are absolutely essential for enterprise cybersecurity as endpoint antivirus solutions are failing to catch a surprising amount of malware, according to a newly published Global Threat Intelligence Report (GTIR) from NTT Innovation Institute (NTT... Read more

Source: www.convergedigest.com

Top found tags: vulnerability(2),cybercrime(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Here are some options to confront the Windows XP apocalypseLocation: Microsoft HQ - Redmond, United States
Date published: 31-03-2014

Are you ready for the XP Apocalypse on April 8?Thats when Microsoft Corp. plans to stop issuing security updates for the aging, but still-popular XP version of its flagship Windows operating system, which by some estimates is still running on nearly one in three personal computers in homes... Read more

Source: www.buffalonews.com

Top found tags: government(2),Microsoft(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spyware increasingly a part of domestic violenceLocation: New York, United States
Date published: 30-03-2014

Australian Simon Gittany murdered his girlfriend, Lisa Harnum, after an abusive relationship that involved his surveillance of her electronic communications using off-the-shelf spyware marketed for purposes ranging from keeping your kids safe to spotting dishonest employees. As Rachel Olding writes... Read more

Source: boingboing.net

Top found tags: United States(2),government(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybersecurity: Time to think like a fox to fend off the hedgehogsLocation: Allianz - Munich, Germany
Date published: 30-03-2014

A report into cybercrime and stolen data has highlighted the risks for online companies saying that the ability to stage cyber-attacks will likely outpace the ability to defend against them.The Markets for Cybercrime Tools and Stolen Data report says attackers can be hedgehogs (they only n... Read more

Source: www.startupsmart.com.au

Top found tags: vulnerability(3),cyber security(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime on the increase in AfricaLocation: Microsoft HQ - Redmond, United States
Date published: 31-03-2014

KAMPALA, Uganda - Enterprises worldwide are expected to spend nearly $500 billion in 2014 to deal with issues caused by malware deliberately loaded onto pirated software that is purchased at times unknowingly.They will also spend $127 billion dealing with security issues, of which $8 billion accrue... Read more

Source: www.busiweek.com

Top found tags: government(3),cyber security(6),cybercrime(11)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China's CERT blames US for a THIRD of all attacks on Middle Kingdom PCsLocation: China
Date published: 31-03-2014

Chinas Computer Emergency Response Team (CNCERT) has claimed in a new report that backdoor attacks on systems jumped by over 50 per cent over the past year, and once again fingered the US as the main culprit in 2013.The CERT announced the findings of its latest annual report on its website. /... Read more

Source: www.theregister.co.uk

Top found tags: trojan(2),government(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Censors TorrentFreak For Security ReasonsLocation: Microsoft HQ - Redmond, United States
Date published: 30-03-2014

Tech giant Microsoft is blocking access to TorrentFreak on its internal network. According to the notice employees see, our news site is censored because it violates the company's security policy. Another fine example of overblocking. Here at TorrentFreak we frequently cover website blo... Read more

Source: torrentfreak.com

Top found tags: website(1),cyber security(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Fighting cyber crimeLocation: New York, United States
Date published: 31-03-2014

Hyderabad: Sandeep Mudalkar is not a cop but he fights crime in the city, across the state and sometimes beyond it. He has even helped the BSF in Gujarat.The 28-year-old Malkajgiri-resident is an ethical hacker and helps the citys cyber cell department in solving cases related to email hacking, ... Read more

Source: www.deccanchronicle.com

Top found tags: social media(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach instances impacting more banking institutionsLocation: NSS Labs - Austin, United States
Date published: 30-03-2014

As data breach fallout becomes more significant, banks are finding it increasingly difficult to protect themselves and their clients from the mistakes made by retailers. This has been the case in a growing number of enterprise thefts of debit and credit cards, as well as personal consumer informati... Read more

Source: www.hexiscyber.com

Top found tags: credit card(2),data breach(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Major Texas liquor store chain reports data breachLocation: Texas
Date published: 30-03-2014

HOUSTON (AP) One of the biggest Texas liquor store chains reported a security breach that exposed personal information of customers at some of its smaller stores. The Houston-based Specs chain said in a Friday statement that the breach exposed data from Oct. 31, 2012, through March 20.... Read more

Source: kdhnews.com

Top found tags: hacked(1),report(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trustwave denies responsibility in Target data breachLocation: Trustwave - Chicago, United States
Date published: 31-03-2014

Credit card security firm and Target US partner Trustwave deniedprocessing cardholder data for the retailer or handling Target's data security, as alleged in a lawsuit targeting the pair.In a letter to customers and business partners, Trustwave CEO Robert McCullen said the company's connection to T... Read more

Source: www.itnews.com.au

Top found tags: data breach(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What do Malware and Mosquitoes Have in Common? Opinion ABC Technology and Games (Australian Broadcasting Corporation)Location: Verizon HQ - New York, United States
Date published: 31-03-2014

Malware seems to be everywhere and it's incredibly challenging to combat. It can take many forms and is increasingly resistant to traditional approaches to detect and stop. Instead of relying on a single attack vector, malware will use whatever unprotected path exists to reach its target and accomp... Read more

Source: www.abc.net.au

Top found tags: cybercrime(5),telecom sector(8),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hard drive shredding event aims to protect Hatters from identity theftLocation: New York, United States
Date published: 31-03-2014

Hatters, with help from the Electronic Recycling Association and the Medicine Hat Police Service, ensured their personal information would not fall into the wrong hands.The police held a free hard drive shredding event, with the ERA bringing their hard drive shredder to Co-op on 13th Avenue, Saturd... Read more

Source: medicinehatnews.com

Top found tags: police(1),identity theft(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Palomar Health notifies 5,000 patients of health data breachLocation: Palomar Health - Escondido, United States
Date published: 31-03-2014

Following a burglary of a laptop and two flash drives back in late February, Palomar Health of California announced that about 5,000 patients data was exposed in the breach. According to U-T San Diego, the devices had been stolen from an employees SUV and while the laptop was encrypted, the f... Read more

Source: healthitsecurity.com

Top found tags: data breach(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Warning for cash machine usersLocation: Down, United Kingdom
Date published: 30-03-2014

A device to steal people's bank details has been discovered on a cash machine in a seaside town in County Down. The skimming device was discovered in Newcastle on Saturday. Detectives have advised people to be vigilant when withdrawing money and to alert the bank and police if they notice anything ... Read more

Source: www.bbc.com

Top found tags: police(1),skimming(1),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
More bad news for Android; but is it quite as bad as made out?Location: Google HQ - Mountain View, United States
Date published: 31-03-2014

Hardly a week goes by without yet another press release hitting the desk of your technology journalist, or research flag being raised amongst the IT Security profession, that claims Android is insecure. What Android actually is, just like Windows on the desktop in fact, is a big and attractive targ... Read more

Source: www.daniweb.com

Top found tags: telecom sector(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Secretary Dinky lauds Cebu for drive vs cybercrimes; will help fund shelter for victimsLocation: United States Capitol - Washington D.C., United States
Date published: 30-03-2014

Cebu has nothing to be ashamed of, said Social Welfare Secretary Corazon Dinky Soliman yesterday.After several well-publicized raids against cyberpornography in Cebu since 2011, Soliman said Cebus campaign against the Internet-based menace is worth emulating.The presence of cyberporn... Read more

Source: cebudailynews.inquirer.net

Top found tags: child pornography(4),government(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybersecurity zwak punt bij nucleaire veiligheidLocation: Amsterdam, The Netherlands
Date published: 31-03-2014

Cybersecurity-expert Trustforce beweert dat de op de nucleaire top uitgesproken intentie om informatiebeveiliging in de nucleaire arena op een hoger plan te krijgen een goede eerste stap is. De voorgestelde oplossingen laten echter belangrijke details oningevuld en dit kan leiden tot schijnveilighe... Read more

Source: www.beveiligingswereld.nl

Top found tags: medical sector(2),United Kingdom(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Torrentracker Demonoid terug van weggeweestLocation: Amsterdam, The Netherlands
Date published: 31-03-2014

Bijna twee jaar geleden ging de populaire torrenttracker Demonoid offline. Nu is hij weer terug. In augustus 2012 sloot torrenttracker Demonoid zijn deuren. Hoewel Demonoid destijds n van de grootste torrentwebsites van het moment was, zorgden een hack- en DDoS-aanval en inval van de politie in... Read more

Source: www.bright.nl

Top found tags: cyber security(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

No articles for today, maybe tomorrow!


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish