Under construction

New design coming soon!

CIC News engine statistics

CIC News for 01-04-2014 contains 54 articles: cybercrime(26),cyber security(13),data breach(11),other(4)

CIC News update contains 51 English and 3 Dutch articles for today.
In today's English news articles:
- 25 related to cybercrime
- 13 related to cyber security
- 11 related to data breach and identity theft
- 2 for the category other news

In today's Dutch news articles:
- 1 related to cybercrime
- 0 related to cyber security
- 2 for the category other news

Have fun reading.

English cybercrime related news

Mobile Threat Monday: Google Lays Down the Law to DevelopersLocation: Google HQ - Mountain View, United States
Date published: 31-03-2014

Sure, Android malware is a problem, but you're much more likely to encounter a misbehaving legitimate app than an actual Android Trojan. Some apps request permissions that aren't reasonable, like a flashlight app requiring access to your contacts list. Others don't make clear that certain features ... Read more

Source: securitywatch.pcmag.com

Top found tags: trojan(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CryptoDefense rakes in 34K in bitcoin ransomLocation: Microsoft HQ - Redmond, United States
Date published: 31-03-2014

Cyber criminals have raked in more than $34,000 in the month since CryptoDefense Trojan, a variant of CryptoLocker, first appeared in February 2014 even though a poor implementation of cryptography has left hostages with an escape route, according to Symantec.Symantec has blocked more than 11... Read more

Source: www.scmagazine.com

Top found tags: RSA(2),trojan(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Warning over new Word, Excel malwareLocation: Trend Micro - Cupertino, United States
Date published: 01-04-2014

System administrators are being warned about a new malware family that infects Microsoft Word and Excel files that could "creep under the radar". The Crigent/Power Worm' virus uses several new techniques to conceal itself including working solely through the Windows PowerShell scripting tool... Read more

Source: www.crn.com.au

Top found tags: Microsoft(2),Trend Micro(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hack attack: China blames US for increased cyber attacksLocation: China
Date published: 01-04-2014

Cyber attacks in China have risen 60% since 2012, and the government naturally blames the US. Last year 15,000 host computers were hijacked by Trojan horse malware, while 61,000 websites were compromised due to backdoor breaches from overseas, the statement said. We're not entirely sure how this is... Read more

Source: shanghaiist.com

Top found tags: United States(2),cybercrime(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Middle Eastern hackers use remote access Trojan to infect 24,000 machines worldwideLocation: Symantec HQ - Mountain View, United States
Date published: 01-04-2014

Security firm Symantec has uncovered 487 groups actively using njRAT malware, claiming the malicious users have managed to infect 24,000 machines worldwide.Symantec threat lab researchers reported the campaigns in a blog post, confirming the hackers are using the njRAT malware for a variety of purp... Read more

Source: www.v3.co.uk

Top found tags: trojan(2),malware(3),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Good Porn, Better Malware?Location: Malwarebytes - San Jose, United States
Date published: 01-04-2014

There are a lot of risks in browsing pornographic sites, and we're not just talking about potentially embarrassing web history. Porn sites, like all other webpages, are targeted by hackers and infiltrated with malware. Malwarebytes reported that the latest one to get hit this month was Beeg.com.Cau... Read more

Source: securitywatch.pcmag.com

Top found tags: website(2),cybercrime(3),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Incident Response Now Shaping Security OperationsLocation: New York, United States
Date published: 28-03-2014

How an organization reacts to hackers infiltrating its network is becoming the key to damage control for data -- and the corporate image.First in an occasional series on a new sense of urgency for incident response after a cyber attackThe backdoor malware discovered on a server at a US manufacturin... Read more

Source: www.darkreading.com

Top found tags: malware(2),trojan(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
West African countries helped to harmonize cyber laws at UNCTAD workshop in Ghana Tab ControlLocation: Ghana
Date published: 01-04-2014

The mobile phone revolution and the increased capacity of submarine fibre-optic cables connecting Africa to cyberspace, as well as increasing cybercrime threats, have made it even more urgent for African governments to prepare effective legal frameworks for activities conducted online.Twenty-one pa... Read more

Source: unctad.org

Top found tags: legislation(2),government(7),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Energy providers prime for cybercrime, says risk management groupLocation: London, United Kingdom
Date published: 31-03-2014

Industrial control methods used by power and energy suppliers are such an easy target for cyber criminals, that it is more likely than not we will see hackers cause a major upset. That was the verdict from a study by Marsh Risk Management entitled 'Advanced Cyber Attacks on Global Energy Facilities... Read more

Source: www.acumin.co.uk

Top found tags: vulnerability(1),ISP(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The zombies bite Avoiding a botnetLocation: New York, United States
Date published: 01-04-2014

Unlike, the ghastly creatures of film, botnet zombies may look and act like normal, uncompromised machines. The two key challenges are preventing a machine from being compromised in the first place, and detecting and thwarting botnets or their components if they get past defenses.The majority of... Read more

Source: www.scmagazine.com

Top found tags: EN(1),ISP(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Email Marketer Declines To Pay Its DDoS Attacker 1.8 Bitcoin Bribe To Prevent Repeat Attack SeriouslyLocation: New York, United States
Date published: 01-04-2014

In about twohours if threats are carried out, email marketing service Mad Mimi(CrunchBase) will be hit with another denial-of-service attack (DDoS)similar to what it endured yesterday, which made its service unavailable for a period of time. The attacker then demanded1.8 bitcoin as ransom to preven... Read more

Source: techcrunch.com

Top found tags: DoS(2),financial sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2014 DDoS trends - botnet activity is up by 240 percentLocation: New York, United States
Date published: 01-04-2014

USA: We are releasing a DDoS Threat Landscape report, which provides several important, and often surprising, facts about DDoS activity in 2013 and the beginning of 2014.When we started working on this report back in January, our goal was to provide a recap of 2013 DDoS trends. However, the offende... Read more

Source: www.ciol.com

Top found tags: threat(1),trend(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Blizzard Under DDoS Attack, Service Disrupted (PC)Location: Blizzard - Irvine, United States
Date published: 01-04-2014

Blizzard has confirmed that it is suffering a series of DDoS attacks, with its European online services suffering as a result. In a support notice, the company said: "Diablo, World of Warcraft, StarCraft and Hearthstone players may be impacted by high latency and disconnections during their gaming ... Read more

Source: spong.com

Top found tags: EN(1),cybercrime(2),gaming(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime a real fear for Yorkshire and Humberside businessesLocation: London, United Kingdom
Date published: 01-04-2014

More than a quarter of small and medium-sized businesses in Yorkshire and Humberside have suffered an online security breach in the last 12 months, reveals a recent survey. 64% of local SME owners polled in the Close Brothers Business Barometer, a quarterly poll of SME owners and senior management ... Read more

Source: www.bridlingtonfreepress.co.uk

Top found tags: survey(1),vulnerability(1),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Black Markets Give Broad Access to Sophisticated Malware ToolsLocation: New York, United States
Date published: 31-03-2014

The tools and services needed to compromise networks and steal data have become a major market, and an increasingly sophisticated one, two studies find. Online black markets for cyber-crime tools and stolen data have become more sophisticated, allowing even the least technical would-be cyber-crimin... Read more

Source: www.eweek.com

Top found tags: financial sector(2),exploit kit(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why set up cybercrime unit to track social media when crime is a national threat, asks DAPLocation: New York, United States
Date published: 01-03-2014

DAP has criticised the setting up of a police cybercrime unit, saying that the countrys law enforcers should be focusing on fighting crime which is a national threat as opposed to monitoring the online activities of social media users. Commenting on the Police Cyber Investigation Response ... Read more

Source: www.themalaysianinsider.com

Top found tags: United Kingdom(2),government(5),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New cybercrime law on the wayLocation: Bahrain
Date published: 31-03-2014

HACKERS could face up to 10 years behind bars as Bahrain plans to introduce a new cybercrime law.The information technology bill will also carry fines of up to BD300,000, which has already been approved by parliament and was discussed by the Shura Council yesterday.It is the first law of its type t... Read more

Source: www.gulf-daily-news.com

Top found tags: government(3),cybercrime(5),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
London Police Call on Advertising and Brand Sectors to Help Tackle Cyber CrimeLocation: London
Date published: 31-03-2014

LONDON - The Police Intellectual Property Crime Unit (PIPCU) based in the City of London Police has today called upon advertisers and brand holders to continue to support its work to tackle Intellectual Property crime following the launch of its Infringing Website List (IWL). The IWL, according to ... Read more

Source: www.ag-ip-news.com

Top found tags: cybercrime(2),United Kingdom(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
$9.84 credit card fraudLocation: Malta
Date published: 31-03-2014

A new rash of credit and debit card scams involving bogus sub-$15 charges and attributed to a company called BLS Weblearn is part of a prolific international scheme designed to fleece unwary consumers. This post delves deeper into the history and identity of the credit card processing network... Read more

Source: krebsonsecurity.com

Top found tags: credit card(2),United Kingdom(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attacker Holds Email Service Mad Mimi for Bitcoin RansomLocation: New York, United States
Date published: 01-04-2014

Email marketing service Mad Mimi was hit with a denial of service attack this past weekend. Soon after the attack, the email provider received an email from someone asking or rather holding Mad Mimi ransom for 1.8 bitcoins in order to stop launching attacks on them. According to Mark Nsd, the email... Read more

Source: coinreport.net

Top found tags: DoS(2),financial sector(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Internet Scam That Hijacks Your Hard DriveLocation: RSA HQ - Bedford, United States
Date published: 01-04-2014

Viruses used to be so simple.Youd go online with your dial-up modem, take 25 minutes to naively download an appealing-sounding .exe file, and suddenly a sheep would walk across the screen or an embarrassing e-mail would be sent to your entire address book. Some would even wish you a Happy New Ye... Read more

Source: www.thefiscaltimes.com

Top found tags: RSA(2),cybercrime(3),malware(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
State cyber crime cell deactivates 84 Facebook accountsLocation: Facebook - Menlo Park, United States
Date published: 01-04-2014

Nearly 99 complaints of misusing a social networking website, Facebook (FB), were received by the state cyber crime cell in the past one year, of which 84 accounts were deactivated by the cell. It was stated by the crime investigation department (CID) inspector general Satwant Atwal Trivedi in a st... Read more

Source: www.hindustantimes.com

Top found tags: financial sector(2),social media(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security in microcontroller is hot area of focus in 2014Location: BSI - Bonn, Germany
Date published: 01-04-2014

Security features in microcontroller chips remains hot trend in 2014. Crocus Technology has licensed the ARM SecurCore SC000 processor for use in its secure microcontroller chips which are powered by Crocus' Magnetic Logic Unit (MLU) architecture. ARM SecurCore SC000 processor is for applications s... Read more

Source: www.eeherald.com

Top found tags: energy(2),smart meter(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Porn Spammers Target Kids, Monitor SaysLocation: SALT LAKE CITY
Date published: 31-03-2014

SALT LAKE CITY (CN) - A safe email service for children claims a British company spammed thousands of kids with links to porn sites, crashing its servers, spiking bandwidth and stifling profits. ZooBuh sued Alcuda Ltd., in Federal Court. ZooBuh, a "bona fide Internet access service" launched in 200... Read more

Source: www.courthousenews.com

Top found tags: spam(1),website(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese Authorities Detain 1,530 People Allegedly Involved in SMS Spam OperationsLocation: China
Date published: 28-03-2014

Authorities in China have detained a total of 1,530 individuals suspected of being involved in mobile spamming operations. The action against SMS spammers started in February. As part of the crackdown on spammers, 3,540 cases have been identified. Authorities have seized 2,600 devices used for spam... Read more

Source: news.softpedia.com

Top found tags: Trend Micro(2),cybercrime(5),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Mistake in ransomware program leaves decryption key accessibleLocation: Symantec HQ - Mountain View, United States
Date published: 01-04-2014

A malicious software program that encrypts a person's files until a ransom is paid has a crucial error: it leaves the decryption key on the victim's computer. A malicious software program that encrypts a person's files until a ransom is paid has a crucial error: it leaves the decr... Read more

Source: news.idg.no

Top found tags: Microsoft(2),RSA(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware targets DVRs and Synology NAS to mine bitcoinLocation: New York, United States
Date published: 01-04-2014

Malware that aims at infecting computers and turning them into bitcoin miners isnt something new. However, a new piece of malware has surfaced that aims to turn hardware you might not think of getting infected into bitcoin mining drones. A new report has found a malware that infects DVRs. One of... Read more

Source: www.slashgear.com

Top found tags: research(1),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internet Explorer leads the way in guarding against social engineering attacksLocation: NSS Labs - Austin, United States
Date published: 01-04-2014

Deceiving the user into downloading and installing malicious software is one of the most common ways of attacking endpoint systems.A good web browser can be an effective aid in blocking these social engineering attempts and the latest research from NSS Labs looks at the leading contenders plus thre... Read more

Source: betanews.com

Top found tags: malware(2),social engineering(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trojan family's Dendroid virus poses threat to Indian Android phonesLocation: Google HQ - Mountain View, United States
Date published: 29-03-2014

Indian cyber security sleuths have alerted users of Android smartphone about the malicious activities of a tricky virus called 'Dendroid' whose infection could "completely compromise" their personal phone device.The virus of the deadly 'Trojan' family, once activated, could change the command and c... Read more

Source: businesstoday.intoday.in

Top found tags: malware(3),cybercrime(5),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beware the surveillance reform Trojan horse: what's not in the new NSA laws?Location: National Security Agency - Fort Meade, United States
Date published: 29-03-2014

Here's what the privacy geeks are worried about after a whirlwind week that the spies might get more out of these bills than Snowden or the people he tried to protect.This week was undoubtedly a turning point in the NSA debate. Edward Snowden said it himself on Monday, as some of th... Read more

Source: www.theguardian.com

Top found tags: United States(2),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TEDx Birmingham: Call the police on cybercrimeLocation: Birmingham
Date published: 01-04-2014

Cybercrime is a crime, but the police are rarely called because of the difficulty in prosecution. A TEDx Birmingham presentation focused on this topic. At TEDx Birmingham 2014, one of the presenters asked the audience, "Why is it called cybercrime, but we don't call the police?" An inte... Read more

Source: www.techrepublic.com

Top found tags: cyber security(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China's unsupported XP machines hold the potential to become a massive botnet armyLocation: China
Date published: 31-03-2014

Network World - Unsupported Windows XP machines in China could pose a threat to the Internet in general if bot-herders round up significant numbers of them to use as launch pads for malicious exploits, according to a top white-hat hacker.James Forshaw, a vulnerability researcher for Con... Read more

Source: www.networkworld.com

Top found tags: Microsoft(2),United States(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Africa: Cyber Crime On the Increase in Africa (Page 1 of 2)Location: New York, United States
Date published: 31-03-2014

Kampala Enterprises worldwide are expected to spend nearly $500 billion in 2014 to deal with issues caused by malware deliberately loaded onto pirated software that is purchased at times unknowingly.They will also spend $127 billion dealing with security issues, of which $8 billion accrues from... Read more

Source: allafrica.com

Top found tags: financial sector(2),cyber security(4),cybercrime(11)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Three Discrepancies that Weaken DDoS Mitigation StrategiesLocation: Nexusguard - San Jose, United States
Date published: 31-03-2014

Nexusguard held two seminars at the annual Info Security, highlighting the rising threats of cyber crimes and the possibility of complying with multiple International security standards through a single, unified framework. The leading Internet security provider also showcased its enterprise solutio... Read more

Source: www.digitaljournal.com

Top found tags: United States(2),telecom sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDoS Attacks Rise by 240% in 2014, Says Security WatchdogLocation: London, United Kingdom
Date published: 01-04-2014

According to a new report distributed denial of service (DDoS) attacks are growing in size and frequency as cybercriminals evolve their attack methods to avoid improved security measures.The reportfrom security firm Incapsula looks at the two most common type of DDoS attack, network attacks which u... Read more

Source: www.ibtimes.co.uk

Top found tags: cyber security(4),cybercrime(7),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nearly 7% of ANZ PCs face XP-related security exposure: Trend MicroLocation: Trend Micro - Cupertino, United States
Date published: 01-04-2014

Companies in Australia and New Zealand are well ahead of world pace in moving away from Windows XP which is widely expected to become a security nightmare once Microsoft discontinues updates for the platform next Monday but hundreds of thousands of regional PCs are still running the operati... Read more

Source: www.cso.com.au

Top found tags: New Zealand(2),Trend Micro(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DHS grant to fund Nevada cybersecurity effortsLocation: Department of Homeland Security - Washington, United States
Date published: 31-03-2014

U.S. taxpayer dollars are being spent to beef up state cybersecurity efforts, despite the lack of a dedicated Department of Homeland Security cybersecurity grant program to help state and local operators comply with a new set of security expectations.Companies responsible for maintainin... Read more

Source: watchdog.org

Top found tags: cyber security(6),government(7),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CERT-UK Goes Live as a Key Part of Britain's Cyber-defenseLocation: London
Date published: 01-04-2014

Its been in the works for months, but the UK's Computer Emergency Response Team (CERT-UK) has officially opened its doors for business, promising to provide an authoritative voice to those agencies and organizations that are helping the UK to become more resilient and to prosper in the intern... Read more

Source: www.infosecurity-magazine.com

Top found tags: financial sector(6),government(6),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Now EU asks Windows XP users to shift to a new OS before April 8 deadlineLocation: Microsoft HQ - Redmond, United States
Date published: 31-03-2014

As the Windows XP end of support deadline is draws closer, the European Union has issued a warning to all those users still running the 13 year-old operating system to shift to a newer platform before April 8 if they want their system to be safe and secure.The European Cybercrime Centre (EC3) at Eu... Read more

Source: www.techienews.co.uk

Top found tags: Microsoft(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Don't Be a CyberVictimLocation: Target HQ - Minneapolis, United States
Date published: 31-03-2014

Edward Snowden and the NSA leaks may have grabbed most of last years cyber security headlines, but in personal finance terms, we should have been far more concerned about data breaches at retailers like Target and Neiman-Marcus. Cybercrime breaks into three principal categories: malware, phishi... Read more

Source: thealternativepress.com

Top found tags: cybercrime(5),cyber security(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime spike alertLocation: South Africa
Date published: 01-04-2014

With a new study by MasterCard revealing more South Africans are now shopping online, experts have warned of the vulnerability of the countrys cyber space.According to the 2013 Norton Report South Africa is ranked number three behind Russia and China in the worst affected countries i... Read more

Source: www.thenewage.co.za

Top found tags: cybercrime(4),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Small Business Data Breach: Mitigating the DamageLocation: Target HQ - Minneapolis, United States
Date published: 01-04-2014

While data breaches at giant retailers like Target and TJ Maxx grab the spotlight, it's just as realistic a scenario for small businesses and the attacks at that level can prove far more devastating. Experts say small business owners who don't make protecting customers' personal information a t... Read more

Source: www.businessnewsdaily.com

Top found tags: credit card(2),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
E-Investigations Releases the Top 5 Action Items To Protect Against an Internal Data BreachLocation: Microsoft HQ - Redmond, United States
Date published: 01-04-2014

Houston, Texas (PRWEB) April 01, 2014 As The Guardian reported on June 10, 2013, the individual responsible for one of the most significant data breaches in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA. Mr. Snowden has proven how important it is to ha... Read more

Source: www.digitaljournal.com

Top found tags: mobile device(2),United States(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Local Specs stores not on list of data breachLocation: Houston
Date published: 31-03-2014

Local Specs liquor store customers can breath a sigh of relief. Information provided by the company showed that its Killeen and Temple locations were not among the stores involved in an online attack that compromised some customers personal information. According to a statement on the Houston... Read more

Source: kdhnews.com

Top found tags: data breach(2),financial sector(2),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mandatory data breach notification back in the SenateLocation: Sydney, Australia
Date published: 01-04-2014

Mandatory data breach notification laws are back on the agenda despite a change of government and the recent introduction of the biggest changes to privacy law in 25 years.Just a year ago, data breach notification laws, which require businesses to notify customers of data breaches, were all set to ... Read more

Source: www.arnnet.com.au

Top found tags: data breach(2),legislation(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
On Restoring Trust After a Data BreachLocation: New York, United States
Date published: 30-03-2014

When we hear about data breaches in the news, the focus is most often on what happened leading up to the event. such as how the breach may have occurred, what sensitive data the attackers may have compromised, and who all may be impacted by the breach.However, there are a myriad of issues an organi... Read more

Source: www.tripwire.com

Top found tags: EN(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Medical Identity Theft: The Fraud That Can Kill YouLocation: New York, United States
Date published: 31-03-2014

When it comes to medical identity theft, more than your money is in danger: This type of fraud could cost you your life. Receiving the wrong blood type, being misdiagnosed, or getting a prescription in error because a fraudster's medical history is commingled in your chart are just a few of the dis... Read more

Source: www.dailyfinance.com

Top found tags: ISP(2),medical sector(2),Ponemon Institute(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Palomar Health Data Breach Affects 5,000 PatientsLocation: Palomar Health - Escondido, United States
Date published: 31-03-2014

Escondido, Calif.-based Palomar Health is notifying 5,000 patients their personal and health information has been compromised. The affected patients' information was contained on a laptop and two flash drives, all of which were stolen from a Palomar Health employee's vehicle in February. The laptop... Read more

Source: www.beckershospitalreview.com

Top found tags: data breach(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HIMSS Security Survey: Preparing to handle the worst data breachLocation: New York, United States
Date published: 31-03-2014

In todays data heavy landscape, data breaches are an unfortunate reality for organizations across all industries. When looking specifically at the healthcare industry we find that just last year, nearly one in five healthcare provider organizations reported having experienced a security breach, ... Read more

Source: medcitynews.com

Top found tags: telecom sector(2),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Credit card fraud tops financial crime charts at Jinshan courtLocation: Beijing, China
Date published: 01-04-2014

Most of the financial crime cases handled by the Jinshan District People's Court last year involved credit card fraud, it said yesterday.Of the 41 cases to reach the court, 38 were linked to credit card offenses, it said. The remainder involved currency counterfeiting, illegal fundraising and forgi... Read more

Source: www.ecns.cn

Top found tags: scam(1),credit card(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2 NY men face credit card fraud charges in NJLocation: New Jersey
Date published: 31-03-2014

CAMDEN, N.J. Federal prosecutors in New Jersey say two New York men face credit card fraud conspiracy charges after they were arrested at an Atlantic City casino.Forty-six-year-old Tracey Coleman of Rosedale and 23-year-old Wanell Wallace of Fresh Meadow allegedly tried to fraudulently charge m... Read more

Source: online.wsj.com

Top found tags: fraud(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Ondersteuning voor Windows XP met Malwarebytes Anti-Malware PremiumLocation: Microsoft HQ - Redmond, United States
Date published: 01-03-2014

Die-hards die nog steeds gebruik willen maken van het verouderde Windows XP hebben een extra mogelijkheid om dit veilig te blijven doen. Microsoft stopt op 8 april met de ondersteuning van het systeem, maar de Premium-versie van het programma Malwarebytes Anti-Malware biedt langere bescherming tege... Read more

Source: nieuws.nl.softonic.com

Top found tags: medical sector(2),Microsoft(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

Experts: "Windows XP na 8 april doelwit van alle vormen van malware"Location: Microsoft HQ - Redmond, United States
Date published: 01-04-2014

Beveiligingsexperts zijn het met elkaar en met Microsoft eens; Het is niet veilig om nog langer op Windows XP te blijven hangen, tenzij je Microsoft betaalt voor extra updates. Na het verlopen van de ondersteuning zullen kwaadwillenden op alle mogelijke manieren de aanval openen op Windows XP-gebru... Read more

Source: www.techzine.nl

Top found tags: health sector(2),medical sector(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Europese DDoS-aanval benvloedt ook Blizzard-serversLocation: Blizzard - Irvine, United States
Date published: 01-04-2014

DDoS-aanvallen hebben al een tijdje het nieuws meer gehaald, maar nu is het weer zover. Toch worden gameservers niet gericht aangevallen deze keer, maar hebben ze er wel last van. Blizzard laat immers weten dat Europese spelers, van eender welke game die men aanbiedt, of het nu Diablo, World of War... Read more

Source: ps4.4gamers.be

Top found tags: NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish