Under construction

New design coming soon!

CIC News engine statistics

CIC News for 03-04-2014 contains 92 articles: cybercrime(39),cyber security(23),data breach(18),other(12)


CIC News update contains 87 English and 5 Dutch articles for today.
In today's English news articles:
- 38 related to cybercrime
- 22 related to cyber security
- 18 related to data breach and identity theft
- 9 for the category other news


In today's Dutch news articles:
- 1 related to cybercrime
- 1 related to cyber security
- 3 for the category other news

Have fun reading.

English cybercrime related news

Cyber Criminals Operate On A Budget, TooLocation: New York, United States
Date published: 01-04-2014

New report shines light on how attacks have gotten more advanced but still basically use some of the same old, same old, tools Most cyber attacks today are waged by cost-conscious criminals who mostly repurpose malware and other techniques to get the most bang for their buck, a new study finds.Atta... Read more

Source: www.darkreading.com

Top found tags: threat(1),exploit kit(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Looking Into The Cybercrime UndergroundLocation: New York, United States
Date published: 01-04-2014

A key part of our cybercrime research focuses on the communities that cybercriminals form. These are used in much the same way that communities of other shared interests are to socialize, to get together, and to buy and sell various items of interest.For security researchers, the activiti... Read more

Source: blog.trendmicro.com

Top found tags: trojan(2),exploit kit(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft: Windows Will Cause Business $500bn of Problems in 2014Location: Microsoft HQ - Redmond, United States
Date published: 02-04-2014

Microsoft has been quite quiet on the research front recently - well, actually, it's been quiet on pretty much all fronts recently, as it continues to grapple with its loss of power and influence. But it has broken radio silence with the sponsorship of a new study entitled "The Link between Pirated... Read more

Source: blogs.computerworlduk.com

Top found tags: Microsoft(2),trojan(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
4.7 Million NTP Servers Ready To Boost DRDoS Attack VolumesLocation: New York, United States
Date published: 02-04-2014

The USInternet securty organisation CERT has published a warning of increasing DRDoS(Distributed Reflection and amplification DDoS) attacks using Internet ServiceProviders' NTP (Network Time Protocol) servers (http://www.kb.cert.org/vuls/id/348126).According to their analysis NTP is the second most... Read more

Source: www.computerweekly.com

Top found tags: Linux(1),NTP(1),South Korea(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Millions of home routers expose ISPs to DDoS attacksLocation: New York, United States
Date published: 02-04-2014

DNS software specialist Nominum has revealed that DNS-based DDoS amplification attacks have significantly increased in the recent months, targeting vulnerable home routers worldwide.The research reveals that more than 24 million home routers have open DNS proxies which potentially expose ISPs to DN... Read more

Source: betanews.com

Top found tags: website(1),cybercrime(2),ISP(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber attacks paralyze state math and reading testsLocation: Kansas
Date published: 02-04-2014

In the latest chapter of the technical woes affecting Kansas annual state math and reading tests, cyber attacks are now frustrating attempts by schools to fulfill federal requirements to complete the tests, the Kansas State Department of Education confirmed Tuesday.Attacks by unknown external so... Read more

Source: cjonline.com

Top found tags: e-mail(2),United States(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anonymous DDoS attack dismantles Albuquerque Police websiteLocation: Albuquerque, United States
Date published: 01-04-2014

The hacktivist collective Anonymous organized a distributed denial-of-service (DDoS) attack this weekend thatmade good onthe group's promise to shut down the Albuquerque Police Department's website. In a Pastebin post last week, a member of Anonymous asked Albuquerque citizens to occupy the site... Read more

Source: www.scmagazine.com

Top found tags: DoS(2),cybercrime(3),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Turn Security Camera DVRs Into Worst Bitcoin Miners EverLocation: Microsoft HQ - Redmond, United States
Date published: 01-04-2014

Heres something we havent seen before: security camera recorders hacked and used to mine bitcoin.The issue was first reported by Johannes Ullrich, an instructor at the SANS Technology Institute a computer security training organization. Last Friday, he discovered malicious software infect... Read more

Source: www.wired.com

Top found tags: financial sector(2),malware(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Advanced attacks are the new normal, experts claimLocation: London, United Kingdom
Date published: 02-04-2014

Malware attacks are becoming increasingly sophisticated, with the old scatter-gun approach of generalised mass spam emails being abandoned in favour of more targeted attacks.This is one of the findings of Websenses annual threat report, which this year has focused on what motivates hackers to ca... Read more

Source: www.itpro.co.uk

Top found tags: threat(2),exploit kit(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese Show Off More Mobile Malware SkillsLocation: Beijing, China
Date published: 02-04-2014

China is rife with cyber criminal activity. It wouldnt be too much of a horrendous assumption because its a country full of talented programmers, and many decide to go to the dark side for whatever reason. Probably because its rather easy to get away with digital crimes, even though the Ch... Read more

Source: www.knowyourmobile.com

Top found tags: cybercrime(3),Kaspersky Lab(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whitepaper: Five stages of a web malware attackLocation: New York, United States
Date published: 02-04-2014

Today's web attacks are extremely sophisticated and multi-faceted, motivated by a massive underground economy that trades in compromised computers and user information. This paper shows you how modern web attacks work, broken down into five stages, from entry through execution. The paper explains t... Read more

Source: www.net-security.org

Top found tags: cybercrime(1),EN(1),hackers(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tinder Users Teased By BotsLocation: New York, United States
Date published: 02-04-2014

A growing number of people have reported that women they are matched with on Tinder, a location-based dating and hookup app, are actually bots programmed to advertise Castle Clash, a mobile video game. Tinder uses a smartphones location to find other single people who are members in ... Read more

Source: www.ibtimes.com

Top found tags: spam(1),social media(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mimecast offers Apple Mac users email backup, archiving and spam protectionLocation: Apple HQ - Cupertino, United States
Date published: 02-04-2014

Mimecast has brought its enterprise email management and spam protection services to businesses using Apple Mac computers, unveiling a new Mimecast for Mac app.The native app is available now and will offer enterprise Apple users all the core features of Mimecast's existing Windows and Outlook clou... Read more

Source: www.v3.co.uk

Top found tags: Windows(1),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US help in fighting cybercrime and terrorismLocation: North Carolina
Date published: 02-04-2014

THE US State Department on Wednesday handed over a package of crime-fighting equipment to the police worth 140,000 to help fight cybercrime and terrorism.The equipment was presented to newly-appointed Police Chief Zacharias Chrysostomou at the Special Antiterrorist Squad Unit HQ in Nicosia by th... Read more

Source: cyprus-mail.com

Top found tags: training(1),cybercrime(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anti-cybercrime drive nets 37 foreigners in ParaaqueLocation: Taiwan
Date published: 02-04-2014

Thirty-seven foreigners have been arrested in Paraaque City for their alleged involvement in cybercrime activities, the Philippine National Police (PNP) said.Those arrested were 35 Taiwanese and two Chinese, the PNP said in a statement Wednesday.A separate statement from t... Read more

Source: www.gmanetwork.com

Top found tags: China(2),cybercrime(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why set up cybercrime unit to track social media when crime is a national threat, asks DAPLocation: New York, United States
Date published: 01-04-2014

DAP has criticised the setting up of a police cybercrime unit, saying that the countrys law enforcers should be focusing on fighting crime which is a national threat as opposed to monitoring the online activities of social media users. Commenting on the Police Cyber Investigation Response ... Read more

Source: news.malaysia.msn.com

Top found tags: United Kingdom(2),government(5),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime on the Rise LocallyLocation: New York, United States
Date published: 01-04-2014

STEPHENSON COUNTY (WIFR) As the number of cybercrime cases continues to grow, the job of bringing those criminals to justice will only get harder for law enforcement. A Stateline department is already experiencing this as a reality. The Stephenson County Sheriffs Department says that althoug... Read more

Source: www.wifr.com

Top found tags: government(1),legislation(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trio of SFU students among top research storytellersLocation: Calgary
Date published: 01-04-2014

Student research projects on cybercrime, the evolution of morning sickness, and voting behavior are among 25 top research story winners of the Social Sciences and Humanities Research Council (SSHRC) Research for a Better Life: Storytellers Challenge. SSHRClaunched the secondannualchallenge la... Read more

Source: www.sfu.ca

Top found tags: website(1),cybercrime(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Free tool calculates the damage of a cyber attackLocation: Hamilton
Date published: 01-04-2014

The Economist Intelligence Unit has launched an online tool that is designed to tally the bill from cyberattacks. Incidents of cybercrime are reported in the media almost every day, yet reliable estimates of their financial impact on companies are few and far between. CyberTab, sponsored by Booz Al... Read more

Source: www.net-security.org

Top found tags: report(1),research(1),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Windows XP to feature on nearly all met police PCs past support termination dateLocation: Microsoft HQ - Redmond, United States
Date published: 02-04-2014

Within days, Microsoft will end support for its Windows XP operating system. This will significantly increase security risks for London's Metropolitan Police as nearly all of its desktop PCs and laptops run on the 13-year-old system, Computer Business Review (CBR) reports.In response to a Freedom o... Read more

Source: www.misco.co.uk

Top found tags: Windows(1),cybercrime(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whitepaper: Five stages of a web malware attackLocation: New York, United States
Date published: 02-04-2014

Today's web attacks are extremely sophisticated and multi-faceted, motivated by a massive underground economy that trades in compromised computers and user information. This paper shows you how modern web attacks work, broken down into five stages, from entry through execution. The paper explains t... Read more

Source: www.net-security.org

Top found tags: cybercrime(1),EN(1),hackers(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
37 cyber-crime ring members nabbedLocation: Paraaque City, Philippines
Date published: 03-04-2014

Police and immigration agents have arrested 37 foreign nationals believed to be members of a cybercrime syndicate in Paranaque City. Lawyer Jose Licas of the Bureau of Immigrations intelligence division said the foreigners mostly from Taiwan and China were brought to Camp Crame in Quezon City fo... Read more

Source: www.tempo.com.ph

Top found tags: Taiwan(1),government(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anti-media cybercrime spree continues: Al Arabiya hacked by NullCrewLocation: Al Arabiya - Dubai, United Arab Emirates
Date published: 03-04-2014

Summary: After hacking and humiliating Comcast in February, NullCrew is back with HorsemenLulz in a successful hack on the mail servers of the second biggest media company in the Arab world, Al Arabiya. Today two strong hacker crews teamed up and hacked into Al Arabiya servers and publi... Read more

Source: www.zdnet.com

Top found tags: vulnerability(1),NullCrew FTS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Two held for duping youth with job offers in IT majorLocation: Pune
Date published: 03-04-2014

HYDERABAD: Cyber Crime sleuths have arrested two persons who had duped unemployed youth to the tune of Rs 3 lakh by promising jobs in Tech Mahindra. Police have arrested V Radha Krishna, 33, from Addagutta, and P Millu Singh, 33, from Karkhana. Posing as human resources (HR) team membe... Read more

Source: timesofindia.indiatimes.com

Top found tags: cybercrime(2),financial sector(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Most Common Forms of DDoS AttacksLocation: New York, United States
Date published: 03-04-2014

Although its honestly one of my least favorite sayings as an animal lover, there are indeed many ways to skin a cat. There are also many ways to take down a website or network of sites with Distributed Denial of Service (DDoS) attacks. The goal is always the same to overload the target with ... Read more

Source: www.blacklotus.net

Top found tags: DoS(2),website(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ukraine to Get Its Own Social Network Once the DDoS Attacks StopLocation: Ukraine
Date published: 03-04-2014

Ukraine may soon get its very own social network, Mashable has learned, but its debut is being delayed by ongoing DDoS attacks.The social network, which will live at WeUA.info (slogan: "We live for Ukraine), was scheduled to go live Monday night, but has not been able to launch due to a sustained a... Read more

Source: mashable.com

Top found tags: social media(2),Ukraine(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Denial-of-Service Attacks Continue to Grow in Sophistication, CapacityLocation: Incapsula HQ - Redwood Shores, United States
Date published: 03-04-2014

Large-packet and reflection attacks ratchet up the bandwidth of denial-of-service in the first three months of 2014, according to a report from Web security firm Incapsula. Massive distributed denial-of-service attacks using infrastructure servers to amplify floods of data have garnered much attent... Read more

Source: www.eweek.com

Top found tags: threat(1),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
24 Million Home Routers and ISPs Open to DNS DDoS Amplification AttacksLocation: London, United Kingdom
Date published: 02-04-2014

A new report from Nominum, which provides ISPs with DNS based analytics and monetization solutions, has claimed that 24 million home broadband routers, including many in the UK,could be exposing ISPs and their users to becoming unwitting participants in massive Internet DNS-based Distributed Denial... Read more

Source: www.ispreview.co.uk

Top found tags: trojan(2),United Kingdom(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ATM Skimming Back In Boca RatonLocation: Boca Raton, United States
Date published: 02-04-2014

BOCA RATON, FL (BocaNewsNow.com) It has happened again. Police are investigating the skimming of ATM cards used at Publix presto machine in east Boca. Direct from Boca PD:Boca Raton Police Services Department detectives are investigating multiple thefts from ATMs via skimming... Read more

Source: bocanewsnow.com

Top found tags: skimming(1),telecom sector(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Billions spent on cyber security and much of it 'wasted'Location: Hewlett-Packard - Palo Alto, United States
Date published: 03-04-2014

The global IT security budget runs into tens of billions of dollars but much of it is not being used effectively, say security experts.ABI Research estimated that cyber security spending for critical infrastructure the segments of defence, energy, financial, healthcare, ICT, public security, tr... Read more

Source: www.smh.com.au

Top found tags: health sector(2),medical sector(2),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
24,000 computers worldwide infected by Middle Eastern malwareLocation: New York, United States
Date published: 02-04-2014

Experts have discovered a remote access tool (RAT) that has infected 24,000 computers worldwide, and has been used by up to 487 criminal groups.Dubbed njRAT, the malware shares similar functions as other RATs, but its most unique attribute stems from its regional usage, according to a blog post by ... Read more

Source: www.scmagazine.com

Top found tags: cybercrime(2),government(2),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brierfield Mill cyber-crime base to create thousands of jobsLocation: Lancashire
Date published: 03-04-2014

A proposal for a cyber-crime fighting hub is being made as a part of Brierfield Mill's 25m vision, which would create 2,250 jobs in the process. Joe Cooney, leader for Pendle Council, has confirmed that discussions are taking place to form the North-East Lancashire Cyber Security Business Park, a... Read more

Source: www.acumin.co.uk

Top found tags: EN(1),training(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Advanced attacks are the new normal, experts claimLocation: London, United Kingdom
Date published: 02-04-2014

Malware techniques are becoming ever more sophisticated, according to Websense Malware attacks are becoming increasingly sophisticated, with the old scatter-gun approach of generalised mass spam emails being abandoned in favour of more targeted attacks.This is one of the findings of Websenses an... Read more

Source: www.itpro.co.uk

Top found tags: threat(2),exploit kit(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Immigration raids cybercrime denLocation: Beijing, China
Date published: 03-04-2014

Immigration agents and police arrested 37 foreigners allegedly belonging to a cybercrime syndicate at a rented apartment in Paraaque City.Immigration intelligence chief Jose Carlitos Licas said 35 of the suspects Taiwan citizens while the two were from mainland China.They are now detained at Camp... Read more

Source: manilastandardtoday.com

Top found tags: Taiwan(1),China(2),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nearly a Third of PCs Poised to Become Cybercrime TargetsLocation: Microsoft HQ - Redmond, United States
Date published: 03-04-2014

As Microsoft readies the eulogy for Windows XP, data from security firm Trend Micro shows that nearly a third of PCs still run on the operating system leaving a wide swath of the PC user base susceptible to cybercriminal exploits. The official funeral for Windows XP support comes early next wee... Read more

Source: www.infosecurity-magazine.com

Top found tags: vulnerability(2),cybercrime(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EU regulators warn banks to protect IT budgets in face of growing cyber threatLocation: New York, United States
Date published: 03-04-2014

Banks must ensure that IT budgets are protected to defend against a growing cyber threat, European Union has warned.According to a report from the Joint Committee of the European Supervisory Authorities, released on Wednesday, financial institutions experienced an increase in cyber incidents during... Read more

Source: www.computerworlduk.com

Top found tags: threat(1),EU(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyberespionage, Not Cyber Terror, is the Major Threat, Former NSA Director SaysLocation: U.S.
Date published: 03-04-2014

CHANTILLY, VAThe list of threats on the Internet is long and getting longer each day. Cybercrime, nation-state attackers, cyber espionage and hacktivists all threaten the security and stability of the network and its users in one way or another. But the one threat that some experts have warned a... Read more

Source: threatpost.com

Top found tags: financial sector(2),United States(2),cyber espionage(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kansas adds defensive barrier after cyberattack shuts down student testingLocation: Kansas, United States
Date published: 02-04-2014

A mysterious cyberattack on Kansas online student testing system has forced the state to shut down its exams until Thursday. The state on Wednesday put an extra barrier around the testing systems server that seems to have curtailed the assault, said Marianne Perie, co-director of ... Read more

Source: www.kansascity.com

Top found tags: report(1),education(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news


Middle East, North Africa Witness Increase in Indigenous Cyber AttacksLocation: Saudi Arabia
Date published: 02-04-2014

Symantech has reported a growth of indigenous groups of attacks using a malware known as njRAT which is similar in capability to many other remote tools in regions that are Arab speaking mainly the Middle East and North Africa.The popularity of the malware in countries such as including Saudi Arabi... Read more

Source: allafrica.com

Top found tags: malware(2),Saudi Arabia(2),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spyware becomes a tool for stalking, domestic abuseLocation: National Security Agency - Fort Meade, United States
Date published: 02-04-2014

Given recent stories about online spying, you might immediately think of either criminal hackers breaking into personal data at a retailer like Target (TGT) or the National Security Agency monitoring communications. But a story out of Australia is a good reminder of how so-called spyware has become... Read more

Source: www.cbsnews.com

Top found tags: cyber security(4),United States(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security Industry Must Drive Up Attacker Costs, Says Palo Alto Networks CEOLocation: Palo Alto
Date published: 01-04-2014

The security industry needs to make it increasingly difficult for cybercriminals to carry out attacks by making technology that isn't too complex, and require the resources of large IT teams, said Palo Alto Networks president and CEO Mark D. McLaughlin.Speaking Tuesday to some 2,000 network securit... Read more

Source: www.crn.com

Top found tags: Windows(1),cyber security(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Online Black Markets Broaden Access To Cutting-Edge Malware ToolsLocation: Target HQ - Minneapolis, United States
Date published: 01-04-2014

Online black markets for cyber-crime tools and stolen data have become more sophisticated, allowing even the least technical would-be cyber-criminals to gain access to complex software and sell their illicit gains, according to two reports on the underground economy.In a report published on 25 Marc... Read more

Source: www.techweekeurope.co.uk

Top found tags: exploit kit(4),cybercrime(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
19 New Cybercrime Infographics: March 2014Location: New York, United States
Date published: 02-04-2014

Every month HackSurfer shares the various cybercrime and cybersecurity infographics we come across. Did we miss yours? Email us at jeff@hacksurfer.com and we'll include it next month.... Read more

Source: www.hacksurfer.com

Top found tags: infographic(1),cybercrime(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
5 facts for data security and cybercrime in 2014Location: New York, United States
Date published: 01-04-2014

1. Fragmentation of the internet:2014 is likely to become the year when colors of the internet will become fully bloomed. The governments will be running new networks to protect their communications and national infrastructure from any sort of foreign attack. This will increase the security and rel... Read more

Source: www.techgig.com

Top found tags: cybercrime(2),cyber security(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
International Cyber Crimes Conference Kicks Off TomorromLocation: New York, United States
Date published: 01-04-2014

Under the patronage of Lt. General HH Sheikh Saif bin Zayed Al Nahyan, Deputy Prime Minister and Minister of Interior, the 5th International Cyber Crimes Conference starts tomorrow, Wednesday. The event is organized by the Ministry of Interior and Institute of Training and Judicial Studies, in coop... Read more

Source: www.abudhabicityguide.com

Top found tags: cybercrime(5),cyber security(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Cybersecurity Threat in Latin AmericaLocation: Brazil
Date published: 01-04-2014

Until last year, most Latin Americans felt that cybersecurity issues did not necessarily impact them. That all changed thanks to former NSA contractor Edward Snowden and revelations that the NSA monitored the communications of former Mexican president Felipe Caldern, current president Enrique Pe... Read more

Source: www.latinbusinesschronicle.com

Top found tags: cyber security(10),telecom sector(10),cybercrime(13)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HP opens new Sydney security ops centreLocation: Hewlett-Packard - Palo Alto, United States
Date published: 03-04-2014

Global technology giant HP yesterday announced it had created a new dedicated Security Operations Centre (SOC) in Sydney that will support the companys managed security services platform and deal with customers located around the globe.In a statement, HP said that IT security attacks were curren... Read more

Source: delimiter.com.au

Top found tags: security management(2),cybercrime(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FFIEC Addresses Fraud, DDoSLocation: Federal Financial Institutions Examination Council - Washington D.C., United States
Date published: 02-04-2014

The Federal Financial Institutions Examination Council on April 2 issued notices spelling out its expectations for steps banking institutions should take to mitigate risks posed by ATM cash-out schemes and the continued distributed-denial-of-service attacks on public-facing websites."Cyber-attacks ... Read more

Source: www.bankinfosecurity.com

Top found tags: cybercrime(5),cyber security(6),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A Wake-up Call on Government Security?Location: Microsoft HQ - Redmond, United States
Date published: 02-04-2014

Co-authored by Dr. Stephen Bryen, Chairman, Ziklag SystemsRachel King and Danny Yardon of the Wall Street Journal have done some excellent reporting about Microsoft's termination of security support for Windows XP. What the authors have found is that a large number of computers used by the U.S. gov... Read more

Source: www.huffingtonpost.com

Top found tags: government(4),cybercrime(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internet of Things is the new Windows XPmalwares favorite targetLocation: Microsoft HQ - Redmond, United States
Date published: 02-04-2014

The past few days have revealed new data that suggests the recent upsurge in malware targeting routersas Ars has chronicled here, here, and hereis not only continuing, but it's spreading to digital video recorders (DVRs).Exhibit A came Monday from researchers at security training ... Read more

Source: arstechnica.com

Top found tags: trojan(2),cyber security(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Armoured malware the latest threat to defencesLocation: New York, United States
Date published: 03-04-2014

Get ready for the invasion of armies of armoured malware. No, thats not the promotional line for a new science fiction film its the warning coming from the people at the front line of monitoring the latest malevolent threats aimed at your digital information. Chris Elisan, chief malware s... Read more

Source: www.irishtimes.com

Top found tags: cyber security(2),social media(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Media Release: New Privacy Alert Bill has made Internet Transactions a Vulnerable Point for Cyber Criminals.Location: Australian Communications and Media Authority - Pyrmont, Australia
Date published: 03-04-2014

EC Council Academy has a range of training programs specifically designed to prevent these malware programs from entering your systems. They range from beginner classes like the Certified Secure Computer User (CSCU) course to your more intermediate and advanced courses, like the Certified Ethical H... Read more

Source: www.cmo.com.au

Top found tags: cybercrime(3),government(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sality malware, growing old, takes on a new trickLocation: Google HQ - Mountain View, United States
Date published: 02-04-2014

A botnet that was slowly shrinking has taken on a new trick: brute-forcing routers set to easy-to-guess credentials.The malware behind the botnet, called Sality, has been around since 2003, in part due to its use of digitally-signed communications and an efficient software design, wrote Benjamin Va... Read more

Source: www.pcworld.com

Top found tags: social media(2),telecom sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android Botnet Targets Middle East BanksLocation: Google HQ - Mountain View, United States
Date published: 02-04-2014

I recently encountered a botnet targeting Android smartphone users who bank at financial institutions in the Middle East. The crude yet remarkably effective mobile bot that powers this whole operation comes disguised as one of several online banking apps, has infected more than 2,700 phones, and ha... Read more

Source: krebsonsecurity.com

Top found tags: United States(2),financial sector(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybersecurity business cyberwarfare critical infrastructureLocation: National Institute of Standards - Gaithersburg, United States
Date published: 03-04-2014

Many businesses and organizations, when applying cost-benefit analysis and a risk-management analysis to measure cyber risk, are relying on the assumption that the likelihood of a future attack depends heavily on how many attacks have occurred in the past. Since there has yet to be a full-scale att... Read more

Source: www.homelandsecuritynewswire.com

Top found tags: United States(4),government(5),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The top security worry keeping businesses awake at night? Insider threatsLocation: Vormetric HQ - San Jose, United States
Date published: 03-04-2014

Today's modern business has to worry about stiff competition, rising energy prices, innovation, and how to poach talent to keep a corporation thriving as well as the persistent threat of cybercrime. However, new research suggests that within European organizations, one worry tops the rest: the ... Read more

Source: www.zdnet.com

Top found tags: security measures(2),United Kingdom(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New DDoS Warning Issued Banking Industry BewareLocation: Federal Financial Institutions Examination Council - Washington D.C., United States
Date published: 03-04-2014

The Federal Financial Institutions Examination Council (FFIEC), today released advisory statements warning Financial Institutions of risks associated with cyber-attacks on ATMs, credit card authorization systems and the continued DDoS attacks against public-facing websites.It is encouraging to s... Read more

Source: www.securitybistro.com

Top found tags: ISP(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware: the top five myths uncoveredLocation: Microsoft HQ - Redmond, United States
Date published: 03-04-2014

With computer security issues hitting the headlines almost daily, were all very familiar with terms such as malware, virus and security risk. Unfortunately, although most PC users make an effort to install some form of security software, many peoples preconceptions about mal... Read more

Source: bdaily.co.uk

Top found tags: cyber security(2),financial sector(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian trojan spotted attacking Middle Eastern banksLocation: Google HQ - Mountain View, United States
Date published: 03-04-2014

Security researcher Brian Krebs has spotted a Russian-controlled botnet being used to target banks in the Middle East. The campaign follows on from the use of the `Sandroid' malware - which is designed to look like a banking two-factor authentication (2FA) app - against banks and financ... Read more

Source: www.scmagazineuk.com

Top found tags: cybercrime(4),telecom sector(12),financial sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news


Trafficking stolen identitiesLocation: New York
Date published: 01-04-2014

Identity theft is the fastest growing crime in the country. It impacts more than 15 million people each year. None of us is safe. Identity thieves grow more sophisticated by the day. Their methods are constantly changing -- and the victims are individuals, retailers, and even the government. One of... Read more

Source: www.abc3340.com

Top found tags: cybercrime(3),government(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stopped ID Theft Tax Fraud Reaches $2.8 MillionLocation: Indiana
Date published: 02-04-2014

(INDIANAPOLIS) - More than $2.8 million in identity theft attempts through fraudulent tax returns has been stopped by the Indiana Department of Revenue during the past two months of processing more than 2 million returns. The attempted identity theft fraud was identified by the department's increas... Read more

Source: www.wbiw.com

Top found tags: website(1),identity theft(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers nab 158,000 Boxee customer passwords in massive data breachLocation: London, United Kingdom
Date published: 02-04-2014

Anyone with an account on Boxee's customer forums should immediately change their password after hackers made away with details of 158,000 people.Analysis of data leaked from the attack shows that is only affects Boxee's forums and not accounts from its Boxee Box TV streaming service.According to R... Read more

Source: www.expertreviews.co.uk

Top found tags: website(1),cyber security(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
It's Cyber Warfare - How Financial Institutions Can Implement Identity-Based Security to Win the War Against Online AttacksLocation: New York, United States
Date published: 02-04-2014

With every new data breach revealed or costly identity-theft case reported, consumer confidence in the security of online banking erodes. This loss of confidence in online services can have a direct impact on the ability of financial institutions to reduce costs and increase efficiency through the ... Read more

Source: www.bankinfosecurity.com

Top found tags: cybercrime(3),cyber security(4),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
First Aid for Medical Identity TheftLocation: New York, United States
Date published: 01-04-2014

Consumers must be on the lookout for signs of an information breach. But if medical identity theft occurs, there are immediate actions consumers and their HIM counterparts should take. The California Department of Justice released a set of five signs your medical information has been breached. This... Read more

Source: journal.ahima.org

Top found tags: government(1),identity theft(2),Department of Justice(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IRS warns of identity theft scamsLocation: Internal Revenue Service - Washington, United States
Date published: 01-04-2014

Identity theft remains a top priority for the Internal Revenue Service this year. Identity theft is among the fastest growing crimes nationwide, and refund fraud caused by identity theft is one of the biggest challenges facing the IRS. This year, the IRS continues to take new steps and strong actio... Read more

Source: www.petoskeynews.com

Top found tags: cybercrime(3),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sally Beauty Data Breach Larger than Originally ThoughtLocation: Sally Beauty - Denton, United States
Date published: 01-04-2014

The Sally Beauty data breach is likely larger than the 25,000 records the cosmetic supply company originally thought had been compromised. It has issued a statement noting that the unauthorized intrusion into its network it detected on March 5 may have affected a larger number of additional records... Read more

Source: www.infosecurity-magazine.com

Top found tags: Verizon(1),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How much is cyber crime really worth?Location: New York Times - New York, United States
Date published: 02-04-2014

The best answer to the question of how much cyber crooks make and how much damage they cause unfortunately seems to be that it is really hard to estimate.There are many types of cyber crime, but one of the most high profile is identity theft. The UN Office on Drugs and Crime estimates identity thef... Read more

Source: metronews.ca

Top found tags: research(1),identity theft(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Client Data Confidentiality in the Age of Cybercrime - The Current Cybersecurity EnvironmentLocation: U.S.
Date published: 01-04-2014

Cybercrime has taken the front pages by storm. Recent revelations include the theft of huge volumes of credit card information from household-name retail businesses[1], the emergence of cybercrime as a potential WMD perpetrated by foreign agencies devoted to industrial and military espionage[... Read more

Source: www.mainjustice.com

Top found tags: security measures(2),United States(2),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ThinkUKnow training program combats cyber-crimeLocation: New York, United States
Date published: 03-04-2014

A new partnership to help educate parents, teachers and carers about the risks young people face online has been announced in Western Australia by Minister for Justice Michael Keenan and Western Australia Police Minister Liza HarThe ThinkUKnow training program, developed by the Australian Federal P... Read more

Source: www.newsmaker.com.au

Top found tags: United Kingdom(2),government(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Months-long identity theft investigation leads to Highland Lakes man's arrestLocation: Vernon Township, United States
Date published: 03-04-2014

VERNON A Highland Lakes man was arrested for six counts of identity theft and six counts of forgery, police said.Louis Rom, 47, was arrested on Friday, March 28, following several months of investigation by the Vernon Detective Bureau.Rom was also found to have two outstanding warrants from Dov... Read more

Source: www.njherald.com

Top found tags: police(1),report(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LewisGale Regional Health System dealing with data breachLocation: LewisGale Medical Center - Salem, United States
Date published: 02-04-2014

SALEM, Va. - Patients treated at HCA hospitals may soon have another trauma to deal with. Here, that includes LewisGale hospitals.WDBJ7 learned Wednesday that patient information from the hospital's billing department may have been compromised. The Secret Service tells WDBJ7 this is a m... Read more

Source: www.wdbj7.com

Top found tags: identity theft(2),medical sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
North Fulton Chamber hosts data breach symposiumLocation: North Fulton Chamber - Alpharetta, United States
Date published: 02-04-2014

ALPHARETTA, Ga. The Greater North Fulton Chamber of Commerce hosted a breakfast symposium March 20 with the experts entitled, "Will Your Company Survive a Data Breach?"Held at the Alpharetta Marriott, the panel discussion was moderated by Ralph Pasquariello, CLCS, Snellings Walters ... Read more

Source: www.northfulton.com

Top found tags: data breach(2),NFC(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime estimated to cost Irish businesses 630m a yearLocation: Thorn
Date published: 03-04-2014

Cybercrime is costing businesses in Ireland about 630m annually, a new report by advisory firm Grant Thornton suggests. Data breaches and the porous nature of the modern technology-led business have been highlighted in recent years. The report's findings suggest there has been little, if any, ch... Read more

Source: www.siliconrepublic.com

Top found tags: data breach(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Banking cyber crime on the riseLocation: Federal Financial Institutions Examination Council - Washington D.C., United States
Date published: 03-04-2014

A group of top U.S. regulators on Wednesday warned about the threat of rising cyber-attacks on bank websites and cash machines, urging the industry to put proper measures in place to guard against fraud.The Federal Financial Institutions Examination Council (FFIEC) said it had seen a rise of so-cal... Read more

Source: businesstech.co.za

Top found tags: cyber security(4),cybercrime(7),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Smart Cards Are Not the Solution to Identity Theft; The Resolution is Verifiable Identity Authentication says SaaS Software, Inc. (SSi)Location: U.S.
Date published: 03-04-2014

Dallas, Texas (PRWEB) April 03, 2014 SaaS Software, Inc. (SSi), announces The Identity Authentication System as the only verifiable solution to the global epidemic of identity theft. This introduction challenges the credit card industry's current priority on pursuing smart card technology, which de... Read more

Source: www.digitaljournal.com

Top found tags: social engineering(2),financial sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ovum research reveals growing risk of data breach from insider threatsLocation: Vormetric HQ - San Jose, United States
Date published: 03-04-2014

Enterprise data security specialists Vormetrictoday announced the findings of its European Insider Threat survey, conducted in 2014 with industry analyst firm Ovum.The research, which surveyed more than 500 IT decision-makers at mid and large size organisations in the UK, France and Germany, ... Read more

Source: www.information-age.com

Top found tags: Germany(2),United Kingdom(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news


Strange malware from 2013 propagated via fake Ukraine-related documentsLocation: Ukraine
Date published: 01-04-2014

Over a year ago, security firm Kaspersky published its findings on a new strain of malware it dubbed MiniDuke." Now, new analysis shows that the malware was distributed via a number of fake PDF attachments relating to Ukraine, among other decoys.This is interesting considering the... Read more

Source: arstechnica.com

Top found tags: Ukraine(2),United Kingdom(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware Exposes Rosenthal Wine Shop Customer DataLocation: New York, United States
Date published: 01-04-2014

The Rosenthal Wine Shop of Malibu, Ca., recently began notifying an undisclosed number of customers that their personal information may have been exposed when malware was installed on computer systems used to process the shop's credit card transactions.The data potentially exposed includes the name... Read more

Source: www.esecurityplanet.com

Top found tags: EN(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DVR Infected with Bitcoin Mining MalwareLocation: SANS - Bethesda, United States
Date published: 01-04-2014

Johannes Ullrich of the SANS Institute claims to have found malware infecting digital video recorders (DVR) predominately used to record footage captured by surveillance camera systems.Oddly enough, Ullrich claims that one of the two binaries of malware implicated in this attack scheme appears to b... Read more

Source: threatpost.com

Top found tags: threat(1),vulnerability(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SendGrid Hit by Social Engineering AttackLocation: New York, United States
Date published: 02-04-2014

Cloud hosting provider ChunkHost recently announced that their e-mail delivery service provider, SendGrid, had allowed a manipulative hacker to gain access to ChunkHost's account (h/t iTnews).In a blog post, ChunkHost co-owner Nate Daiger explained that the company had received a chat transcript a ... Read more

Source: www.esecurityplanet.com

Top found tags: ISP(1),e-mail(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware Exposes Rosenthal Wine Shop Customer DataLocation: New York, United States
Date published: 01-04-2014

The Rosenthal Wine Shop of Malibu, Ca., recently began notifying an undisclosed number of customers that their personal information may have been exposed when malware was installed on computer systems used to process the shop's credit card transactions.The data potentially exposed includes the name... Read more

Source: www.esecurityplanet.com

Top found tags: EN(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RIP Windows XP - Banks, finance firms urged to block customers using old OSLocation: Microsoft HQ - Redmond, United States
Date published: 03-04-2014

With Microsoft pulling the plug on Windows XP next week, a security vendor has advised banks and finance institutions to block online transactions with customers using devices running the aged operating system. Trend Micro Threat communications manager Christopher Budd said that with XP no longer g... Read more

Source: www.gmanetwork.com

Top found tags: Microsoft(2),Trend Micro(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Castle Clash Game Developer Claims Its Not Behind The Tinder ExploitLocation: Tinder HQ - Hollywood, United States
Date published: 02-04-2014

A quick follow-up to the problem with the bots invading dating appTinderwhich are pushing people to download a mobile game called Castle Clash using fake profiles and a domain (Tinderverified.com) designed to give the scam an air of legitimacy: the company behind the game in question is... Read more

Source: techcrunch.com

Top found tags: social media(2),United Kingdom(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile Spyware Use In Domestic Violence Ramps UpLocation: Sydney
Date published: 31-03-2014

We recently wrote about the emergence of NSA-like spying platforms for mobile devices. Ostensibly designed and marketed for worried mothers and/or employers to monitor their children and/or employees, reports instead indicate a more nefarious use employed by jealous men and women looking to spy on ... Read more

Source: www.techdirt.com

Top found tags: mobile device(2),government(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

Dutch cybercrime related news

No articles for today, maybe tomorrow!

Dutch cyber security related news

Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news


'24 miljoen thuisrouters open voor DDoS-aanval'Location: Amsterdam, The Netherlands
Date published: 02-04-2014

DNS-amplificatieaanval veruit populairst bij DDoS'ers, met dank aan miljoenen huis-, tuin-, en keukenmodems. DNS-reflectie of amplificatie blijft veruit de meest gebruikte methode van kwaadwillenden om sites en diensten plat te krijgen. Dat komt omdat niet alleen veel DNS-servers fungeren als open ... Read more

Source: webwereld.nl

Top found tags: NL(1),United Kingdom(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google pakt spyware in Play Store aanLocation: Google HQ - Mountain View, United States
Date published: 02-04-2014

Google heeft de regels voor apps in Google Play aangepast in de hoop spyware beter te tackelen. Ook wil het de twijfelachtige tactieken van zogeheten grayware-verkopers aanpakken.Afhankelijk van hoe streng Google de zes nieuwe regels in de Google Play Developer Policies toepast, zullen Androidgebru... Read more

Source: www.zdnet.be

Top found tags: Google(3),Google Play(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish