Under construction

New design coming soon!

CIC News engine statistics

CIC News for 29-04-2014 contains 54 articles: cybercrime(22),cyber security(11),data breach(13),other(8)

CIC News update contains 49 English and 5 Dutch articles for today.
In today's English news articles:
- 19 related to cybercrime
- 11 related to cyber security
- 13 related to data breach and identity theft
- 6 for the category other news

In today's Dutch news articles:
- 3 related to cybercrime
- 0 related to cyber security
- 2 for the category other news

Have fun reading.

English cybercrime related news

How Hackers Can Use Facebook, Google to Crash Your WebsiteLocation: Facebook - Menlo Park, United States
Date published: 28-04-2014

Watch your website and this time, you have bigger threats than viral videos or suspected porn. Hackers can apparently exploit vulnerabilities in Facebook and Google to perform distributed denial-of-service (DDoS) attacks on target websites and neither Internet giant seems overly concerned, ... Read more

Source: www.cmswire.com

Top found tags: website(2),vulnerability(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft's Race to Block Cyber-CriminalsLocation: Microsoft HQ - Redmond, United States
Date published: 28-04-2014

In the movie The Matrix, the bad guys are constantly morphing and taking on the identity of their opponents in a never-ending battle for supremacy of their multiple worlds.It is Hollywood at its best, combining gongfu-like swashbuckling with sci-fi entertainment.Pure fantasy?I alw... Read more

Source: www.govtech.com

Top found tags: social media(2),financial sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Hackers Can Use Facebook, Google to Crash Your WebsiteLocation: Facebook - Menlo Park, United States
Date published: 28-04-2014

Watch your website and this time, you have bigger threats than viral videos or suspected porn. Hackers can apparently exploit vulnerabilities in Facebook and Google to perform distributed denial-of-service (DDoS) attacks on target websites and neither Internet giant seems overly concerned, ... Read more

Source: www.cmswire.com

Top found tags: website(2),vulnerability(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sudbury child porn trial resumesLocation: Sudbury, Canada
Date published: 29-04-2014

Closing arguments will be given Tuesday in the Superior Court trial of a Naughton man facing child pornography and firearm charges.On Monday, the trial, which had started in mid-December, resumed with Greater Sudbury Cyber Crime Unit member Det. Const. Blair Ramsay finishing his testimony.Defence l... Read more

Source: www.thesudburystar.com

Top found tags: pornography(3),child pornography(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Unprecedented spike in DDoS attacks: Arbor NetworksLocation: Arbor Networks - Burlington, United States
Date published: 29-04-2014

There has been an unprecedented spike in volumetric attacks driven by the proliferation of network time protocol (NTP) reflection and amplification attacks, according to distributed denial-of-service (DDoS) data released by Arbor Networks.NTP is a user datagram protocol (UDP) based protocol used to... Read more

Source: www.arnnet.com.au

Top found tags: DoS(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New iDroid mobile trojan said to impact iOS and Android devicesLocation: Apple HQ - Cupertino, United States
Date published: 28-04-2014

A new piece of mobile malware being offered up on Russian underground forums might be capable of attacking devices running either iOS or Android operating systems.Researchers with Israel-based cyber intelligence company SenseCy recently discovered the trojan named, perhaps appropriately, iDroid... Read more

Source: www.scmagazine.com

Top found tags: telecom sector(2),trojan(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Heart Bleed Bug Test: Hackers Want 2.5 Bitcoins for New 'Exploit'Location: Trend Micro - Cupertino, United States
Date published: 28-04-2014

A group of five hackers claims they worked for two weeks to find an exploit in the new patched version of OpenSSL, which the Heartbleed bug affected.On Pastebin, the hackers wrote that they are offering the code for 2.5 bitcoins, or about $870.We have just found an vulnerability in the patched v... Read more

Source: www.theepochtimes.com

Top found tags: patch(2),Trend Micro(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New zero-day exploit attack sees Internet Explorer in the line of fire. No fix from Microsoft yetLocation: Microsoft HQ - Redmond, United States
Date published: 27-04-2014

A new zero-day vulnerability has been found in all versions of Internet Explorer, and is being actively exploited in targeted attacks according to security firm FireEye.The attack has been dubbed Clandestine Fox by FireEye, who say that every single version of Internet Explorer from versi... Read more

Source: grahamcluley.com

Top found tags: Microsoft(2),telecom sector(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers warn of resurgent Sefnit malwareLocation: London, United Kingdom
Date published: 29-04-2014

A malware infection which drew headlines January has returned and is using new techniques to infect and spread amongst users.Known as Sefnit, the botnet infection was spotted in September of 2013 and triggered alarms earlier this year when researchers warned that millions of systems were likely inf... Read more

Source: www.theregister.co.uk

Top found tags: social media(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oh GREAT: Your factory can Heartbleed outLocation: London, United Kingdom
Date published: 28-04-2014

Tired of Heartbleed horror? Brace yourself for another round, this time with a "hackers can attack factories" flavour after Siemens shipped coagulant patches for some of its key SCADA kit.In a timely reminder of just how pervasive the vulnerability is, the European vendor says users of its eLAN and... Read more

Source: www.theregister.co.uk

Top found tags: SCADA (1),vulnerability(1),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Getting smart about fighting cyber crimeLocation: Boston, United States
Date published: 29-04-2014

The nations largest cyber crime conference for law enforcement now underway in Norwood is focused on how to keep up with criminals use of changing technology, with 600 prosecutors, police and forensic examiners discussing how the constant evolution of digital evidence is changing the ... Read more

Source: bostonherald.com

Top found tags: cybercrime(3),government(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Now, cyber crime cell to be exclusive police stationLocation: New York, United States
Date published: 29-04-2014

PANAJI: With the increased number of cyber crime cases reported in the state, the government has cleared the proposal to declare the cyber crime cell (CCC) as a police station exclusively for investigating cyber crime cases. Of the over 98 cyber crime cases registered across the state,... Read more

Source: timesofindia.indiatimes.com

Top found tags: financial sector(2),government(3),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to beat hackers exploiting the latest IE zero-day bugLocation: Microsoft HQ - Redmond, United States
Date published: 28-04-2014

Companies have several options for defending against a recently discovered zero-day vulnerability in Internet Explorer and experts say businesses should get started immediately.Over the weekend, security vendor FireEye found an exploit aimed at defense and financial services companies using IE9 thr... Read more

Source: www.csoonline.com

Top found tags: United States(2),cybercrime(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Windows kernel exploit can bypass all securityLocation: Microsoft HQ - Redmond, United States
Date published: 29-04-2014

Security firm Bromium Labs has discovered a way to use an old Windows kernel exploit to bypass popular anti-malware and other security software.The method, known as Layer on Layer (LOL) attacks, allow hackers to bypass multiple layers of security in one fell swoop, without anyone being the wiser.Th... Read more

Source: www.techradar.com

Top found tags: vulnerability(2),cybercrime(3),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber criminals embracing cloud for malware distributionLocation: Europol HQ - Den Haag, The Netherlands
Date published: 29-04-2014

Head of Europol's European Cybercrime Centre claims cloud is increasingly being used by the bad guys to carry out attacks Cyber criminals are starting to use the power of the cloud to avoid detection, as unsavoury types latch on to the benefits of using off-premise systems.Whereas discussions about... Read more

Source: www.cloudpro.co.uk

Top found tags: telecom sector(4),cybercrime(5),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDoS Strikers Replacing Old Botnet Methodology with Newer Techniques to Yield Stronger AssaultsLocation: Akamai - Boston, United States
Date published: 29-04-2014

Security Company Akamai Technologies just published its Q1-2014 (January-March 2014) report, highlighting how attackers are becoming less reliant on launching DDoS (distributed denial-of-service) assaults through the conventional method of using botnets and so replacing it with newer tactics for ex... Read more

Source: www.spamfighter.com

Top found tags: South Korea(2),Thailand(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China's Google Equivalent, Sohu, Used For Massive DDoSLocation: Incapsula HQ - Redwood Shores, United States
Date published: 28-04-2014

Sohu.com, Chinas eighth-largest website and currently the 27th most-visited website in the world, was the unwitting originator of a massive distributed denial-of-service (DDoS) attack earlier in the month, which was carried out using traffic hijacking techniques. In all, the application-layer at... Read more

Source: www.infosecurity-magazine.com

Top found tags: website(2),vulnerability(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese Police Nab 250 SpammersLocation: Beijing, China
Date published: 29-04-2014

Chinese police have detained more than 250 people suspected of operating unlicensed telecommunication installations used to send spam to nearby mobile users.The Ministry of Public Security (MPS) said on Tuesday eight manufacturing dens of such devices were destroyed in 16 major cases, with nearly 2... Read more

Source: english.cri.cn

Top found tags: spam(1),United States(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police warn over malware threat from pirate video websitesLocation: London, United Kingdom
Date published: 29-04-2014

Nearly all of the most popular illegal film and TV pirate websites contain malware or credit card scams, according to a study fromprotection intelligence analyst firm Incopro.The research revealed 97 per cent of these illegal sites contained dangerous content.TheUK TV and film industry body, The In... Read more

Source: www.itpro.co.uk

Top found tags: credit card(2),financial sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

AOL traces mystery spam flood to security breach; passwords and more stolenLocation: Wall Street, New York City, New York, United States
Date published: 28-04-2014

AOL is asking users to reset their passwords as it investigates a recent flurry of spam e-mails.According to Reuters, the uptick in AOL spam is related to a security breach that affected roughly 2 percent of users. Hackers made off with e-mail addresses, mailing addresses, encrypted passwords, and ... Read more

Source: www.pcworld.com

Top found tags: spam(1),cybercrime(2),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Drones Exploit Wi-Fi to Threaten SecurityLocation: Black Hat - Las Vegas, United States
Date published: 28-04-2014

If you use wireless networks, the drones are out to get you.That's one of the takeaways from a recent presentation by Glenn Wilkinson, lead security analyst for UK security research firm SensePost. The Black Hat Asia session, entitled "The Machines That Betrayed Their Masters," addressed the proble... Read more

Source: www.enterprisenetworkingplanet.com

Top found tags: United Kingdom(2),Black Hat(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crimes in Dubai nearly double in 2012Location: Dubai, United Arab Emirates
Date published: 28-04-2014

DUBAI // More than 1,400 cybercrime cases were recorded in the emirate last year, almost double that of the previous year. There were 588 cases of electronic crime cases in 2011, 792 cases in 2012, and the number has increased to 1,419 last year, said Col Mohammed Al Razouki, depu... Read more

Source: www.thenational.ae

Top found tags: security measures(2),United Arab Emirates(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft IE under Hack Attack: Zero-Day Exploit Impacts over 25 Percent of BrowsersLocation: Microsoft HQ - Redmond, United States
Date published: 28-04-2014

Unfortunately, when it comes to cyber attacks there is not nook or cranny that those with malicious intent wont explore and then exploit when vulnerabilities are found. Such is the case with the revelation over the weekend that many of the versions of the popular, especially with government agen... Read more

Source: www.techzone360.com

Top found tags: vulnerability(2),government(3),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Minister: New cyber crime methods pose threat to Qatar's securityLocation: Bogota, Colombia
Date published: 28-04-2014

Qatar must secure its cyber space to protect it against an increasing number of complex attacks, the countrys Minister of Communication and Information Technology (ictQatar) has warned.Dr. Hessa Al Jaber raised the issue of cyber security during an address to bankers and senior financial service... Read more

Source: dohanews.co

Top found tags: information security(2),Syrian Electronic Army(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Unlike Android, iPhone users are totally safe from mobile malwareLocation: Apple HQ - Cupertino, United States
Date published: 29-04-2014

For years Apple has had the reputation of being less susceptible to malware than PCs. According to a new report, that also holds true when it comes to iPhones.Research by Finnish security firm F-Secure looked at reports of mobile malware detected in the first quarter of 2014. Of the 277 new threats... Read more

Source: www.cultofmac.com

Top found tags: security measures(2),telecom sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Israel a Mecca for spammers, cyber stats showLocation: Sophos HQ - Oxfordshire, United Kingdom
Date published: 29-04-2014

Israel came in third place in the quarterly Spampionship League rankings, which rates countries according to per capita forwarding of spam e-mails. Israels placement went up four spots from last time. Sophos, a cyber-security company, published the list on April 17.The CAN-SPAM Act o... Read more

Source: www.timesofisrael.com

Top found tags: Anonymous(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Siemens Patches Heartbleed in Popular SCADA SystemLocation: Siemens HQ - Munich, Germany
Date published: 29-04-2014

IDG News Service Siemens released a security update to address the Heartbleed vulnerability in SIMATIC WinCC Open Architecture, a supervisory control and data acquisition (SCADA) system that's used in a large number of industries to operate processes, machines and production flows. Heartbleed i... Read more

Source: www.cio.com

Top found tags: patch(2),update(2),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile & Social: The Tipping Point For CybercrimeLocation: New York, United States
Date published: 29-04-2014

Social media are fantastic. They continue to piece together the fabric of our lives, personally and professionally. Not only can you connect and socialize with friends new and old, but you can also network with colleagues about the latest in your field from around the globe at the speed of thought.... Read more

Source: www.insurancetech.com

Top found tags: telecom sector(2),cybercrime(4),social media(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime costs doubleLocation: New York, United States
Date published: 29-04-2014

In a report released today by the Department for Business, Innovation and Skills and conducted by PricewaterhouseCoopers (PwC), UK businesses have reported that they suffered fewer breaches in 2013 than in 2012. The cost of remediating each breach, however, has soared.In terms of reported breaches,... Read more

Source: www.business-cloud.com

Top found tags: cyber security(2),information security(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'War-like' cybercrime threatens European growthLocation: Europol HQ - Den Haag, The Netherlands
Date published: 29-04-2014

The stark warning from Troels Oerting, head of the European Cybercrime Center and assistant director at law enforcement agency Europol, comes as governments and law enforcement agencies across Europe are already struggling to contain the threat of cybercrime. "What we are looking at is state-sponso... Read more

Source: www.cnbc.com

Top found tags: government(4),cyber security(6),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Man sentenced in Golden Town Buffet identity theft ringLocation: New York, United States
Date published: 28-04-2014

GLENMONT - A man will spend up to seven years in prison for his role in the Golden Town Buffet identity theft ring. Pheng Sathongoth was sentenced Monday morning. Santhongoth admitted to stealing customers credit card numbers, then using the information to buy thousands of dollars in merchandise... Read more

Source: wnyt.com

Top found tags: credit card(2),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Number of Data Breach Incidents Expected to GrowLocation: Iowa State University - Ames, United States
Date published: 28-04-2014

Washington, DC: If it seems as though everywhere you turn theres more news about a huge data breach, you might not be far off. Recently, more information was released about the massive information breach from Michaels craft stores. Meanwhile, students at Iowa State University learned that their ... Read more

Source: www.lawyersandsettlements.com

Top found tags: data breach(2),education(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Assisted living facility worker stole IDs, police sayLocation: New York, United States
Date published: 28-04-2014

A temporary employee at a Hendersonville assisted living facility was charged Thursday with three counts of identity theft after one of the facilitys residents called police.Shamiah Monique Henry, 32, of Nashville confessed to three counts of identity theft at the Hearth of Hendersonville, 419 E... Read more

Source: www.tennessean.com

Top found tags: government(1),police(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ga. couple sentenced in tax fraud, ID theft schemeLocation: Atlanta, Georgia, United States
Date published: 28-04-2014

ATLANTA Federal prosecutors say an Atlanta couple has been sentenced in an identity theft and income tax fraud scheme. Officials said in a statement Monday that 33-year-old Justin Cody and his 25-year-old wife Aeshia Wilmore each pleaded guilty to theft of public funds. Cody has been sentenced ... Read more

Source: www.therepublic.com

Top found tags: EN(1),fraud(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Verizon 2014 Data Breach Investigations Report identifies more focused, effective way to fight cyberthreatsLocation: Verizon HQ - New York, United States
Date published: 28-04-2014

Verizon security researchers, using advanced analytical techniques, have found that 92 percent of all security incidents over a ten-year period can be traced to nine basic attack patterns that vary from industry to industry (Fig. 19). This finding, the highlight of Verizons 2014 Data Breach I... Read more

Source: www.australiansecuritymagazine.com.au

Top found tags: DoS(2),financial sector(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AOL Investigates Data Breach Following Rise In 'Spoofed' EmailLocation: Department of Homeland Security - Washington, United States
Date published: 28-04-2014

AOL has reported that about 2 percent of its users have been affected by a data breach impacting the companys network and systems.The breach allowed hackers to access email addresses, postal addresses, address book contact information as well as encrypted passwords and answers, the company annou... Read more

Source: www.cruxialcio.com

Top found tags: update(2),United States(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
3 reasons why sharing cybercrime info is good for all of usLocation: Neiman Marcus - Dallas, United States
Date published: 28-04-2014

In light of several high-profile retail data breaches that includedTarget, Neiman Marcus and Michaels Craft Stores, the National Retail Federation recently announced plans to launch a joint cybersecurity cooperative.The information-sharing platform was developed in consultation with the Financial S... Read more

Source: www.bizjournals.com

Top found tags: government(3),cybercrime(5),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Security: Why Nigeria Needs Computer Emergency Response TeamLocation: Lagos, Nigeria
Date published: 29-04-2014

Cybercrime is one of the fastest growing areas of crime. More and more criminals are exploiting the speed, convenience and anonymity that modern technologies offer in order to commit a diverse range of criminal activities. These include attacks against computer data and systems, identity theft, the... Read more

Source: leadership.ng

Top found tags: identity theft(2),government(3),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Technology Context From the Verizon Data Breach Investigations Report (DBIR)Location: Department of Homeland Security - Washington, United States
Date published: 28-04-2014

For a decade now the cyber security community has been treated to important strategic context coordinated by Verizon in their Data Breach Investigations Report (DBIR). The information in the report can help drive strategic planning for enterprise technologists and members of the enterprise cyber se... Read more

Source: www.sys-con.com

Top found tags: telecom sector(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police Grapple With CybercrimeLocation: Utah, United States
Date published: 29-04-2014

Analyst Cody Dunn works with SnapTrends location-based social-media monitoring software at the Statewide Information and Analysis Center in Sandy, Utah. The state's cybercrime team and other law-enforcement agencies can use the information to detect threats. Cayce Clifford for The Wall Street Journ... Read more

Source: www.crime-research.org

Top found tags: United States(4),government(6),cybercrime(11)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Boston Medical Center fires vendor after data breachLocation: Boston, United States
Date published: 29-04-2014

Boston Medical Center said it has fired a transcription service after a health care provider reported that the medical records of about 15,000 patients at the hospital were posted without password protection on the vendors website used by physicians. The records contained the names, addresses, a... Read more

Source: www.bostonglobe.com

Top found tags: cyber security(4),health sector(6),medical sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Reported cargo theft incidents down in 2013; cybercrime rises dramatically, report saysLocation: New York, United States
Date published: 29-04-2014

Reports of theft of physical cargo in the United States decreased by 9 percent in 2013, a drop-off that may have been due to a corresponding rise in so-called cybercrime, according to a soon-to-be published report by CargoNet, a leading security group.According to the report, CargoNet recorded 1,09... Read more

Source: www.dcvelocity.com

Top found tags: identity theft(2),information sharing(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
5 takeaways from Verizon's 2014 Data Breach Investigations ReportLocation: Verizon HQ - New York, United States
Date published: 29-04-2014

Verizon's annual Data Breach Investigations Report is one of the most anticipated computer security reports of the year. Based on actual data breaches rather than unreliable surveys, the Data Breach Investigations Report paints a realistic picture of the state of cyber crime. Based on 1,367 data br... Read more

Source: www.infoworld.com

Top found tags: data breach(2),financial sector(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Exploit Tool Targeting Vulnerabilities in McAfee ePolicy Orchestrator ReleasedLocation: McAfee - Santa Clara, United States
Date published: 28-04-2014

A new exploit tool has been released, specifically built to attack McAfees ePolicy Orchestrator (ePO). The exploit targets two vulnerabilities (CVE-2013-0140 and CVE-2013-0141) found in McAfee ePO versions 4.6.5 and earlier. The attacker must be on the local network in order to exploit these vul... Read more

Source: www.tripwire.com

Top found tags: patch(1),vulnerability(1),antivirus(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US CERT and KB 2963983: Don't use drive-by-enabled Internet ExplorerLocation: Microsoft HQ - Redmond, United States
Date published: 28-04-2014

The Department of Homeland Security's US-CERT team has issued an official advisory, warning Windows customers that they should not use any modern version of Internet Explorer, from IE6 to IE11. It's important to note that Microsoft's Security Advisory 2963983 lists the exploit as a problem even wit... Read more

Source: www.infoworld.com

Top found tags: government(4),United States(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Foreigners arrested over credit card fraudLocation: Beijing, China
Date published: 29-04-2014

Hanoi police have arrested four Chinese nationals for forging creditcards to withdraw cash, the Police Department for High-Tech CrimePrevention under the Hanoi Police said on April 28.Thearrest was made on April 22 when the suspects were withdrawing moneythrough a point-of-sale (POS) ma... Read more

Source: en.vietnamplus.vn

Top found tags: website(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sefnit click fraud malware drops Tor for SSH, Facebook researchers sayLocation: Facebook - Menlo Park, United States
Date published: 29-04-2014

Security researchers from Facebook have identified a new variant of the Sefnit click fraud malware program that uses SSH for command and control instead of the Tor anonymity network.The threat, which is also known as Mevade, infected millions of computers last year and caused a sudden spike in Tor ... Read more

Source: www.pcworld.com

Top found tags: threat(1),website(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android Hacking and Security, Part 4: Exploiting Unintended Data Leakage (Side Channel Data Leakage)Location: Google HQ - Mountain View, United States
Date published: 29-04-2014

In the previous articles, we discussed attacks associated with activity components, content providers, broadcast receivers, and ways to secure them. In this article, we will discuss Unintended Data Leakage, which was formerly known as Side Channel Data Leakage.What is Unintended Data Le... Read more

Source: resources.infosecinstitute.com

Top found tags: credit card(2),financial sector(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
10 Ways to Protect Yourself From the Zero-Day IE ExploitLocation: Microsoft HQ - Redmond, United States
Date published: 29-04-2014

It seems with each passing day, there's something else for Web users to worry about. Whether it's the prospect of government spying or plain old security issues, no one is safe from what's out there. That became abundantly clear recently when Microsoft revealed that a zero-day exploit is affecting ... Read more

Source: www.eweek.com

Top found tags: Internet Explorer(2),Microsoft(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Politie ontraadt gebruik Internet ExplorerLocation: Microsoft HQ - Redmond, United States
Date published: 29-04-2014

De Nederlandse politie heeft het gebruik van Internet Explorer dinsdag afgeraden. ''Gebruik het alleen als het niet anders kan, en in uitgebreide beveiligde modus", luidt een waarschuwing op Twitter. Aanleiding is het grote lek in de browser van Microsoft dat dit weekeinde aan het licht kwam. Die g... Read more

Source: www.nutech.nl

Top found tags: social media(2),telecom sector(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
F-Secure: 99 procent nieuwe malware gericht op AndroidLocation: F-Secure - Helsinki, Finland
Date published: 29-04-2014

Ruim 99 procent van alle nieuwe mobiele bedreigingen die security-aanbieder F-Secure in Q1 van 2014 heeft ontdekt, is gericht op het Android-OS. Dat concludeert F-Secure in zijn Mobile Threat Report. In totaal heeft F-Secure 277 nieuwe dreigingen, families en varianten ontdekt, waarvan er 275 geric... Read more

Source: www.telecompaper.com

Top found tags: United States(2),cybercrime(3),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware verruilt Tor-netwerk voor SSHLocation: Amsterdam, The Netherlands
Date published: 29-04-2014

De malware die vorig jaar september voor een explosieve groei van het aantal gebruikers van het Tor-netwerk zorgde heeft het anonimiseringsnetwerk weer verlaten, zo hebben onderzoekers van Facebook vastgesteld. Het gaat om de Sefnit-malware, ook bekend als Mevade.Gebruikten oude versies nog het Tor... Read more

Source: www.security.nl

Top found tags: research(1),financial sector(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

Vandaag wr ernstige zero-day exploit, nu in Flash PlayerLocation: Adobe HQ - San Jose, United States
Date published: 29-04-2014

Adobe's Flash Player bevat een nog niet gedicht gat dat al actief wordt misbruikt. Adobe heeft met spoed een patch beschikbaar gemaakt en raadt gebruikers van Flash op alle platformen aan het reparatiebestand onmiddellijk uit te voeren. Het misbruik van de kwetsbaarheid werd ontdekt door onderzoeke... Read more

Source: www.automatiseringgids.nl

Top found tags: vulnerability(2),Kaspersky Lab(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Internet ExplorerLocation: Microsoft HQ - Redmond, United States
Date published: 29-04-2014

Onlangs werd bekend dat in Microsoft Internet Explorer een kwetsbaarheid zit waar nog geen oplossing voor is. Deze kwetsbaarheid maakt het voor kwaadwillenden mogelijk om onder gebruikersrechten instructies uit te voeren op een aangevallen computer. Voor zover bekend wordt er op dit moment niet op ... Read more

Source: www.ncsc.nl

Top found tags: Microsoft(2),telecom sector(2),The Netherlands(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish