Under construction

New design coming soon!

CIC News engine statistics

CIC News for 06-05-2014 contains 66 articles: cybercrime(33),cyber security(9),data breach(11),other(13)

CIC News update contains 57 English and 9 Dutch articles for today.
In today's English news articles:
- 26 related to cybercrime
- 9 related to cyber security
- 11 related to data breach and identity theft
- 11 for the category other news

In today's Dutch news articles:
- 7 related to cybercrime
- 0 related to cyber security
- 2 for the category other news

Have fun reading.

English cybercrime related news

Report: DDoS Attacks Increasingly Used as a SmokescreenLocation: Neustar - Sterling, United States
Date published: 05-05-2014

Distributed Denial of Service attacks (bombarding a server with requests) are becoming more frequent and one reason why is that they are being used to distract IT staff in order to insert malware without being detected as quickly, according to Neustar Inc. Neustar, a Lockheed Martin spinoff that op... Read more

Source: www.fedweek.com

Top found tags: survey(1),DoS(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Arbor reports unprecedented spike in DDoS attack size driven by NTP misuseLocation: Arbor Networks - Burlington, United States
Date published: 06-05-2014

The data shows an unprecedented spike in volumetric attacks, driven by the proliferation of NTP reflection/amplification attacks News ... Read more

Source: www.ciol.com

Top found tags: Google(2),Project Shield(2),United Arab Emirates(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spear Phishing Emails: A Psychological Tactic of Threat ActorsLocation: New York, United States
Date published: 05-05-2014

By exploiting network security vulnerabilities, todays generation of threat actors are able to install advanced polymorphic malware to steal data and damage reputations. But their manipulation efforts arent limited to codes and machines they extend to people, too.Thats the insight shar... Read more

Source: www.seculert.com

Top found tags: vulnerability(1),phishing(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stolen certificates used to deliver trojans in spear phishing campaignLocation: McAfee - Santa Clara, United States
Date published: 05-05-2014

Researchers with McAfee Labs have identified a string of spear phishing attacks, against nongovernmental organizations and activists mostly in China, in which stolen digital certificates are being used to deliver remote access trojans.The campaign dates as far back as July 2013, according to a Frid... Read more

Source: www.scmagazine.com

Top found tags: phishing(2),trojan(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
You could lose cash at hacked ATMsLocation: Cape Town, West-Kaap, South Africa
Date published: 05-05-2014

Cape Town - Most South Africans happily insert their bank cards into ATMs and withdraw cash, but this ordinary activity may carry an unseen risk. According to research from a security company, it may be possible to have malware installed in ATMs that may compromise the cash machines. The vulnerabil... Read more

Source: www.news24.com

Top found tags: Africa(3),financial sector(4),South Africa(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Court Directs Union Ministry to Block 'Savukku', Proxy SitesLocation: New York, United States
Date published: 06-05-2014

The Madras High Court has directed the Union Ministry of Communications and Technology to block display of the offending materials released by Savukku, a Tamil website, through the use of any URL from anywhere in the globe.Justice CT Selvam gave the direction while passing further orders on a... Read more

Source: www.newindianexpress.com

Top found tags: website(1),cybercrime(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ex-NSA Raise $2.5 Million For Cybersecurity StartupLocation: National Security Agency - Fort Meade, United States
Date published: 05-05-2014

Area 1 Intelligence, a threat intelligence startup founded by former NSA employees has raised $2.5 million in funding. The company claims it is the first to deliver a security solution that eliminates targeted social engineering attacks by focusing on behavioral patterns of delivery systems. Social... Read more

Source: civsourceonline.com

Top found tags: cyber espionage(2),government(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sinister spam from "Agent Feather"Location: New York, United States
Date published: 06-05-2014

This sinister spam comes with a malicious payload.. From: Agent Feather [afgeathe32322323@gmail.com] Reply-To: afgeathe32323323@gmail.com Date: 6 May 2014 02:12 Subject: Do something before it's too late! My Friend, Someone close to you wants you to spend at least the next five years of your life b... Read more

Source: blog.dynamoo.com

Top found tags: threat(1),cybercrime(3),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber scams targeting studentsLocation: New York, United States
Date published: 05-05-2014

A number of cyber scams are targeting colleges, students and university employees across the country, according to the Internet Crime Complaint Center.The Internet Crime Complaint Center is a task force created by the Federal Bureau of Investigation the FBI and the National White Collar Cri... Read more

Source: www.poughkeepsiejournal.com

Top found tags: United States(2),education(3),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
One in 10 Australians will have their identity misusedLocation: Sydney, Australia
Date published: 06-05-2014

ALMOST one in every 10 Australians experienced some type of misuse of their personal information in the past 12 months. A survey of 5000 Australians by the Australian Institute of Criminology also found up to one in five experiences such crime "at some point in their lives". The report on identity ... Read more

Source: www.coffscoastadvocate.com.au

Top found tags: report(1),survey(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bitcoin crime surgesLocation: Kaspersky HQ - Moscow, Russia
Date published: 05-05-2014

A recent Kaspersky Lab study has revealed that financial malware targeting Bitcoin increased 2,5 times in 2013 and accounted for 8,3-million incidents. According to the Financial cyber threats in 2013 study carried out by Kaspersky Lab, financial malware targeting Bitcoin became extremely pop... Read more

Source: www.gadget.co.za

Top found tags: financial sector(4),Kaspersky Lab(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The evolution of Rovnix: new Virtual File System (VFS) - Microsoft Malware Protection CenterLocation: Microsoft HQ - Redmond, United States
Date published: 05-05-2014

Last July, we published a blog about Rovnixs private TCP/IP stack.We recently discovered another evolution in Rovnix a variant that introduces a new Virtual File System (VFS).With our latest signature update we detect this Rovnix dropper as TrojanDropper:Win32/Rovnix.L and the infected VBR (... Read more

Source: blogs.technet.com

Top found tags: trojan(2),update(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Integral Ad Science Releases Q1 2014 Media Quality ReportLocation: New York City, New York, United States
Date published: 05-05-2014

NEW YORK, NY(Marketwired - May 5, 2014) - Integral Ad Science, the leading global provider of actionable advertising intelligence for buyers and sellers of digital media, today released its Q1 2014 Media Quality Report, updating the industry on important metrics that affect the performance of every... Read more

Source: www.broadwayworld.com

Top found tags: update (1),ISP(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber-Terrorists could use ar drone websites good flying botnet controllerLocation: Apple HQ - Cupertino, United States
Date published: 05-05-2014

You almost certainly remember the AR.Drone - some of the quadricopter simply by Bird which is protected merely iPhone, iPad quite possibly ipod touch, the fact that given increased point casino to a iPhone. Sven Dietrich, excellent admin professor around machine medicine and thus two connected his ... Read more

Source: sunliartificial.seesaa.net

Top found tags: smartphone(2),mobile device(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dungeon Fighter Online Chinese Gamers Sentenced to Two Years for Stealing Virtual ItemsLocation: Beijing, China
Date published: 05-05-2014

According to a recent report, two gamers from China Wang and Cai have been sentenced to two years in prison in addition to some hefty fines for the acts of cybercrime.Despite of the all the cyber enforcement laws and cybercrime police, many a countries have failed to check piracy and acts o... Read more

Source: segmentnext.com

Top found tags: China(2),cybercrime(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Inside the global sextortion ring busted in the PhilippinesLocation: Hong Kong, China
Date published: 05-05-2014

On Friday, Philippine authorities, with the aid of cybercrime investigators from Interpol, arrested at least 87 people in connection with perhaps one of the world's largest "sextortion" rings. The suspects, picked up in seven locations and belonging to at least three syndicates, had allegedly been ... Read more

Source: www.washingtonpost.com

Top found tags: United States(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Europol voices concern about BitcoinLocation: Europol HQ - Den Haag, The Netherlands
Date published: 05-05-2014

As Bitcoin has emerged as an international item of concern for financial regulators and governments, it has also increasingly become a target for cybercrime. The virtual currency has become a focal point of interest and worry for various countries financial bodies as regulators try to figure out... Read more

Source: blogs.blouinnews.com

Top found tags: government(4),Kaspersky Lab(4),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime boss opens up on post-Snowden policingLocation: National Security Agency - Fort Meade, United States
Date published: 06-05-2014

AFP investigations 'pointless' without metadata. The revelations of international government spying programs by Edward Snowden have permanently changed the nature of policing and thrown up a range of new challenges and obstacles, according to Australian Federal Police high-tech crime boss Tim Morri... Read more

Source: www.itnews.com.au

Top found tags: cybercrime(3),government(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cryptolocker Malware Called Ransomware Has Apparently Spread To AndroidLocation: Google HQ - Mountain View, United States
Date published: 05-05-2014

A new potential threat to Android users is apparently starting to make the rounds on Android devices. Its a malware called ransomware(distributed by a malware group called Reveton Team and is apparently being sold to people who wish to use it), and has been found making its way to people through... Read more

Source: www.androidheadlines.com

Top found tags: government(2),malware(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Court Directs Union Ministry to Block 'Savukku', Proxy SitesLocation: New York, United States
Date published: 06-05-2014

The Madras High Court has directed the Union Ministry of Communications and Technology to block display of the offending materials released by Savukku, a Tamil website, through the use of any URL from anywhere in the globe.Justice CT Selvam gave the direction while passing further orders on a... Read more

Source: www.newindianexpress.com

Top found tags: website(1),cybercrime(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Over one third of German web users victims of cybercrimeLocation: Berlin, Germany
Date published: 06-05-2014

Over one third (38%) of all internet users in Germany have been victims of computer and internet crime in the last 12 months, according to a survey by Aris for ICT industry group Bitkom. This is equal to around 21 million Germany. One quarter (24%) of internet users said their computer had been inf... Read more

Source: www.telecompaper.com

Top found tags: cybercrime(2),Germany(2),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cops get serious about cybercrime, and not before timeLocation: New York, United States
Date published: 06-05-2014

The world's police forces are, it seems, starting to appreciate the scale and significance of the cybercrime problem.The director of the FBI, James Comey, told journalists last week that cyber threats were a major priority for his agency.He admitted that there is a serious s... Read more

Source: nakedsecurity.sophos.com

Top found tags: threat(1),government(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sneak Attack! 5 Hidden Ways Viruses Infect Your ComputerLocation: New York, United States
Date published: 06-05-2014

Malware could be lurking in your computer and you might not even know it. Viruses, spyware, ransomware and other malware attacks have become so sophisticated that they could be wreaking havoc on your systems without showing any signs that is, until it's too late. Attackers stealthily plant ... Read more

Source: www.businessnewsdaily.com

Top found tags: threat(1),malware(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat USA 2014: Understanding MalwareLocation: Black Hat - Las Vegas, United States
Date published: 06-05-2014

Understanding and combating malware is at the heart of much of today's infosec work, and today's trio of Black Hat USA 2014 Training highlights approach the topic from a couple of different angles.Trojans, backdoors, viruses, and rootkits are the elemental ingredients of most computer security inci... Read more

Source: www.darkreading.com

Top found tags: trojan(2),cybercrime(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AppRiver Releases Q1 Global Security ReportLocation: AppRiver - Gulf Breeze, United States
Date published: 06-05-2014

AppRiver, LLC, a leading provider of emailmessaging and web security solutions, today released its Q1Global Security Report, a detailed analysis of web and email-bornethreats and malware trends traced between January and March 2014.During the first quarter of 2014, AppRiver screened more than 14 bi... Read more

Source: www.broadwayworld.com

Top found tags: United States(2),government(3),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DIY cybercrime-friendly (legitimate) APK injecting/decompiling app spotted in the wildLocation: Google HQ - Mountain View, United States
Date published: 06-05-2014

With millions of Android users continuing to acquire new apps through Google Play, cybercriminals continue looking for efficient and profitable ways to infiltrate Androids marketplaceusinga variety of TTPs (tactics, techniques and procedures). Largely relying on the ubiquitous for the cybercrime... Read more

Source: www.webroot.com

Top found tags: Google Play(2),cybercrime(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Vietnam lucrative new market for money-stealing SMS Trojan: reportLocation: Kaspersky HQ - Moscow, Russia
Date published: 05-05-2014

If you have unexpectedly run up large mobile phone bills or had your prepaid phone balance mysteriously deducted, check the latest apps you have recently installed on your smartphones. They may have been infected with a new Trojan that steals money from smartphone users by secretly sending premium ... Read more

Source: tuoitrenews.vn

Top found tags: cybercrime(3),Kaspersky Lab(4),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cryptolocker ransomware now able to infect Android devices as wellLocation: Google HQ - Mountain View, United States
Date published: 05-05-2014

Malware encrypting files on Windows and demanding a payment to unlock the files is now also spreading on Android devices. Security researcher Kafeine noticed how a malware group called Reveton Team is offering the malware for sale and also found the malware in the wild.In an advert the ... Read more

Source: www.myce.com

Top found tags: cybercrime(3),malware(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Infecting DVRs with Bitcoin-mining malware even easier than you suspectedLocation: New York, United States
Date published: 05-05-2014

It took just one day for a low-end, Internet-connected digital video recorder to become infected with malware that surreptitiously mined Bitcoins on behalf of the quick-moving attackers.The feat, documented in a blog post published Monday by researchers at the security-training outfit Sans Institut... Read more

Source: arstechnica.com

Top found tags: vulnerability(1),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Symantec develops new business strategy, says AV is deadLocation: Symantec HQ - Mountain View, United States
Date published: 05-05-2014

Symantec says that AntiVirus is dead, citing it as one of the reasons they're shifting focus and mapping out a new plan of attack when it comes to dealing with threats.Symantec says that Anti-Virus is dead, citing it as one of the reasons they're shifting focus and mapping out a new pla... Read more

Source: www.csoonline.com

Top found tags: cybercrime(2),information security(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lock down cybersecurity or face another Heartbleed or worseLocation: Sydney, Australia
Date published: 05-05-2014

The recently released Commission of Audit report recommends that the Australian government needs to become digital by default.The continued shift to digital service delivery is intended to reduce costs, improve quality of service and provide greater transparency. But it will also open up new ... Read more

Source: theconversation.com

Top found tags: health sector(6),medical sector(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
KnowBe4 Warns: Third Ransomware Strain Called CryptorBit AttacksLocation: KnowBe4 - Clearwater, United States
Date published: 06-05-2014

Tampa Bay, FL (PRWEB) May 06, 2014 Security Awareness Training expert KnowBe4 issued a warning of a third criminal ransomware gang ramping up their attacks. The malware is called CryptorBit, (also known as HowDecrypt), and follows a very similar attack process as CryptoLocker and CryptoDefense, but... Read more

Source: www.digitaljournal.com

Top found tags: social engineering(2),malware(3),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Advanced Persistent Threats Not So Advanced After AllLocation: Microsoft HQ - Redmond, United States
Date published: 06-05-2014

The phrase "Advanced Persistent Threat" brings to my mind a particular image, a cadre of devoted hackers, tirelessly digging for new zero-day attacks, closely monitoring the victim network, and silently stealing data or performing secret sabotage. After all, the infamous Stuxnet worm needed multipl... Read more

Source: securitywatch.pcmag.com

Top found tags: phishing(2),cybercrime(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IC3 warns of cyber scams targeting universities, employees and studentsLocation: Internet Crime Compliance Center - Washington D.C., United States
Date published: 06-05-2014

The Internet Crime Complaint Center (IC3) is aware of multiple scams targeting universities, university employees, and students across the nation. The scams range from Internet fraud to intrusions. The following are common scenarios: Spear phishing e-mails are being sent to university employees ... Read more

Source: www.wilsoncountynews.com

Top found tags: financial sector(2),phishing(2),education(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Updated Cybersecurity Papers on Supply Chain Security and Critical Infrastructure ProtectionLocation: Microsoft HQ - Redmond, United States
Date published: 06-05-2014

Today were releasing updated versions of two popular white papers on software supply chain security and critical infrastructure protection. These papers draw on our policies and practices that involve regular assessments of the security challenges facing our customers and our operations, as well... Read more

Source: blogs.technet.com

Top found tags: health sector(2),medical sector(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Target CEO out as data breach fallout goes onLocation: Target HQ - Minneapolis, United States
Date published: 05-05-2014

With Target still working to pick itself back up after a reputation-damaging security breach that's hurt sales and its sagging stock price, CEO Gregg Steinhafel said Monday that he's resigning after a 35-year career with the discount retailer.Now, the opportunity to replace him gives what was once ... Read more

Source: www.usatoday.com

Top found tags: trend(1),data breach(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Investigations into stolen identities, fraud often pose challengesLocation: Wisconsin, United States
Date published: 05-05-2014

RACINE COUNTY When a man was brought before a Racine County Circuit Court commissioner last week for a charge of felony personal identity theft, he had allegedly been living in Racine for at least 15 years under someone elses identity.Although the alleged victim, a 51-year-old California man... Read more

Source: journaltimes.com

Top found tags: government(2),identity theft(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target CEO Gregg Steinhafel stepping down after massive data breachLocation: Target HQ - Minneapolis, United States
Date published: 05-05-2014

NEW YORK - Target's massive data breach has now cost the company's CEO his job.Target announced Monday that Chairman, President and CEO Gregg Steinhafel is out nearly five months after the retailer disclosed the breach, which has hurt its reputation among customers and has derailed its business.The... Read more

Source: www.thedenverchannel.com

Top found tags: information security(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Breach Freaked Out Target Too, Right Into a $100M Change in Credit CardsLocation: Target HQ - Minneapolis, United States
Date published: 05-05-2014

NEW YORK (LowCards.com) To improve the security of its debit and credit cards, Target will begin issuing chip-and-PIN cards in early 2015.The company said last week that it will replace its entire REDcard portfolio, including all Target-branded debit and credit cards, with cards that contain a ... Read more

Source: www.mainstreet.com

Top found tags: financial sector(2),United Kingdom(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Defending Against Identity Theft In The MilitaryLocation: Federal Trade Commission - Washington, United States
Date published: 05-05-2014

Our military troops are twice as likely to be victims of identity theft as the general population. The reason is in the structure of military culture.People in the military knowingly agree to put their lives in danger when they enlist, but theres something else theyre putting on the line that... Read more

Source: www.darkreading.com

Top found tags: medical sector(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM Boosts Its Security Presence as Data Breach Costs RiseLocation: IBM HQ - Armonk, United States
Date published: 05-05-2014

Computing and technology services giant IBM has boosted its presence in the booming computer and information security business today, with a new set of services aimed at fending off attacks and analyzing breaches after theyve occurred.IBM today launched its Threat Protection System and a service... Read more

Source: recode.net

Top found tags: information security(2),Ponemon Institute(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How a security expert handles identity-theft protectionLocation: Department of Homeland Security - Washington, United States
Date published: 05-05-2014

(Reuters) - You won't find security expert Michael Chertoff doing silly everyday things like using public WiFi, logging in with the same password on every site he uses, clicking on dubious links or falling for a phishing scam.Chertoff, former secretary of the U.S. Department of Homeland Security an... Read more

Source: www.reuters.com

Top found tags: Department of Justice(3),government(3),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Jackson woman claimed identity theft to avoid nearly $10,000 in gambling debt, cops sayLocation: New Jersey, United States
Date published: 05-05-2014

JACKSON A township woman tried to pass off nearly $10,000 in gambling debt as the result of identity theft, police said.Diana Zolla, 31, told investigators that someone used her maiden name to create an online gaming account, racking up a $9,565 loss, police said.After reviewing banking, online... Read more

Source: www.app.com

Top found tags: government(2),identity theft(2),police(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Targets CEO just became cyber-crimes biggest corporate casualtyLocation: Target HQ - Minneapolis, United States
Date published: 05-05-2014

Target CEO Gregg Steinhafel did everything right. + When the retail chainsuffered a massive security breach that compromised the dataof tens of millions of customers at the height of last years US holiday shopping season, Steinhafeldisclosed more information than he was legally required to, offe... Read more

Source: qz.com

Top found tags: data breach(2),identity theft(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Medical center probes possible data breachLocation: New York, United States
Date published: 05-05-2014

An employee of UMass Memorial Medical Center (UMMMC) may have accessed and misused information on up to four patients, but officials with the Worcester facilities said they're not aware of any misuse of medical data. In a statement released Monday afternoon, UMass Memorial officials said the now-fo... Read more

Source: www.wbjournal.com

Top found tags: medical sector(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target CEO Is Cybercrimes Latest VictimLocation: Target HQ - Minneapolis, United States
Date published: 06-05-2014

On Monday, the CEO of Target became cybercrimes biggest corporate casualty. Gregg Steinhafel, a 35-year veteran of Target and chief executive since 2008, stepped down and resigned from the board of directors roughly five months after the company disclosed a massive data breach affecting tens of ... Read more

Source: www.slate.com

Top found tags: cyber security(4),cybercrime(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Warning over unintentional file leakLocation: Dropbox - San Francisco, United States
Date published: 06-05-2014

People using file storage services, such as Dropbox and Box, are being warned that they are at risk of inadvertently leaking their own files. Intralinks - which is a competitor - said it found sensitive files, such as mortgage records. The problem centred on the use of the services' sharing functio... Read more

Source: www.bbc.com

Top found tags: research(1),vulnerability(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is your Dropbox leaking your sensitive, personal information?Location: Google HQ - Mountain View, United States
Date published: 06-05-2014

If you are using file-sharing systems like Dropbox and Box without proper care and attention, there is a risk that you could be unwittingly leaking your most private, personal information to others. And the risk isnt theoretical. Its happening right now exposing tax returns, financial rec... Read more

Source: grahamcluley.com

Top found tags: Google(1),report(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police Looking for Credit Card Fraud SuspectsLocation: New York, United States
Date published: 06-05-2014

CHESTERFIELD, VA (WWBT) - Chesterfield Police hope someone can help them identify the women shown in these pictures. Police say they stole credit cards from gym parking lots, then went on a shopping spree racking up thousands in credit card charges. In the pictures, the women are smiling, just havi... Read more

Source: www.nbc12.com

Top found tags: credit card(2),financial sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Two detained for credit card fraudLocation: New York, United States
Date published: 05-05-2014

National police in Velez-Malaga have detained two men, 38 and 28, for the falsification of documents and fraud.The two men were falsifying documents with which they then obtained credit cards which they used in local shops.A local business owner got in touch with the police to warn them about what ... Read more

Source: www.euroweeklynews.com

Top found tags: scam(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers share details about recent IE 0-day exploit and its deliveryLocation: Microsoft HQ - Redmond, United States
Date published: 05-05-2014

Given that Microsoft has closed the Internet Explorer 0-day vulnerability that was exploited to compromise US-based defense and financial firms, the Sourcefire vulnerability research team has decided to share some more details about the exploit. "The first thing to notice is that even though CVE 20... Read more

Source: www.net-security.org

Top found tags: patch(2),update(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Review: FireEye fights off multi-stage malwareLocation:
Date published: 05-05-2014

You can't see some malware until it's too late. Sophisticated attacks arrive in pieces, each seemingly benign. Once these advanced attacks reassemble, the target is already compromised.You can't see some malware until it's too late. Sophisticated attacks arrive in pieces, each seemingly... Read more

Source: news.idg.no

Top found tags: IDS (1),legislation(1),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ex-Trend Micro veteran Amit Nath appointed as F-Secure country manager India & SAARCLocation: F-Secure - Helsinki, Finland
Date published: 06-05-2014

Security solutions company F-Secure has appointed Amit Nath as country manager, India and SAARC.Nath will be responsible for the companys India relations, strategy and growth for channels mid market and enterprise business.Amit has over 17 years of IT industry experience across different vertica... Read more

Source: infotechlead.com

Top found tags: trend(1),antivirus(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Into malware? Time to play in the Cuckoo SandboxLocation: New York, United States
Date published: 06-05-2014

Have a taste for tearing apart malware? Then you have probable played with Cuckoo Sandbox. If not, it is really time to take a poke at it. Have a taste for tearing apart malware? Then you have probable played with Cuckoo Sandbox. If not, it is really time to take a poke at it. This is a... Read more

Source: www.csoonline.com

Top found tags: EN(1),report(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kenyan banks join African race to end ATM card fraudLocation: Cape Town, West-Kaap, South Africa
Date published: 05-05-2014

NAIROBI, KENYA: Fraud and Nigeria are often mentioned in the same breath.Tired of the increasing debit and credit card fraud, the Central Bank Governor of Nigeria in 2009 decreed that all Nigerian banks replace their customers Automated Teller Machine (ATM) cards from an archaic and easily hacke... Read more

Source: www.standardmedia.co.ke

Top found tags: South Africa(2),Nigeria(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware Exposes Boomerang Tags Customers' Payment Card DataLocation: New York, United States
Date published: 06-05-2014

Pet tag manufacturer Boomerang Tags recently began notifying an undisclosed number of customers that their personal information may have been exposed when malware was installed on the server used to host the company's Web site.The company believes the malware compromised the payment card data (incl... Read more

Source: www.esecurityplanet.com

Top found tags: EN(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Siri Exploit Lets Anyone Skip the Lockscreen to Text or Call ContactsLocation: Apple HQ - Cupertino, United States
Date published: 06-05-2014

The iPhone lockscreen has never been completely secure. Past exploits allowed random people to access your photos or to make calls with a few choreographed swipes. The latest, however, can grant access to your full contact list through Siri and let a stranger call, text, or email anyone they want f... Read more

Source: gizmodo.com

Top found tags: smartphone(2),mobile device(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Top tien grootste security-blundersLocation: Cupid Media - Southport, Australia
Date published: 05-05-2014

Inbreken is door de digitale revolutie kinderlijk eenvoudig geworden. Wat kan een hacker met het verzamelen van persoonsgegevens? Identiteitsdiefstal, creditcards aanvragen, gegevens verkopen, spam versturen en ga zo maar door. Consumenten zijn vaak (ongemerkt) slachtoffer. Tien procent van de Nede... Read more

Source: www.managementsite.nl

Top found tags: The Netherlands(2),social media(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target-topman stapt op na grootschalige datadiefstalLocation: Brussel, Belgium
Date published: 06-05-2014

Gregg Steinhafel, de topman van de Amerikaanse distributieketen Target, verlaat na 35 jaar het bedrijf. De 59-jarige zakenman kondigde gisteren aan dat hij opstapt als voorzitter en als CEO van het bedrijf, zo liet de raad van bestuur weten. Het vertrek is het gevolg van een van de grootste datainb... Read more

Source: www.demorgen.be

Top found tags: data theft(2),financial sector(2),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target-topman stapt op om grootschalige datadiefstalLocation: Amsterdam, The Netherlands
Date published: 06-05-2014

Gregg Steinhafel, de topman van de Amerikaanse winkelketen Target, verlaat na 35 jaar het bedrijf. De 59-jarige zakenman kondigde gisteren aan dat hij opstapt als voorzitter en als CEO van het bedrijf, zo liet de raad van bestuur weten.Het vertrek is het gevolg van een massale datainbra... Read more

Source: www.trouw.nl

Top found tags: data theft(2),financial sector(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Reveton-ransomware besmet nu ook Android-toestellenLocation: Google HQ - Mountain View, United States
Date published: 05-05-2014

De Reveton-ransomware, die allereerst op Windows-systemen was gericht, heeft de overstap gemaakt naar het Android-besturingssysteem. De malware vergrendelt een smartphone en toont een bericht dat afkomstig zou zijn van de politie.De Reveton-malware zou, net als de gelijknamige malware op Windows, a... Read more

Source: tweakers.net

Top found tags: social engineering(2),United States(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Computertip: beveiliging van tabletsLocation: Amsterdam, The Netherlands
Date published: 06-05-2014

De enorme populariteit van tablets heeft een vervelende bijkomstigheid met zich meegebracht. Het maakt ze erg interessant voor makers van virussen en andere schadelijke software. Daarom is het belangrijk uw tablet veilig te houden. cloud/ Desktop/ Downloads/ heartleech/ mail/ Mail/ Maildir/ Network... Read more

Source: www.plusonline.nl

Top found tags: cybercrime(3),financial sector(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware steelt 33.000 euro van Australische makelaarLocation: Facebook - Menlo Park, United States
Date published: 06-05-2014

Cybercriminelen hebben via malware zo'n 33.000 euro van een Australische makelaar weten te stelen, zo heeft het bedrijf bekendgemaakt. Waarschijnlijk was een e-mail met een kwaadaardige link de oorzaak waardoor de criminelen een computer van de makelaar wisten te infecteren.Nadat er toegang tot de ... Read more

Source: www.security.nl

Top found tags: online banking(2),social media(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Bijna alle malware verdwijnt binnen een uur'Location: New York, United States
Date published: 06-05-2014

MILPITAS - Het Amerikaanse beveiligingsbedrijf FireEye heeft zich gemengd in de discussie over virusscanners. Uit onderzoek van het concern blijkt dat 82 procent van de malware binnen een uur weer verdwijnt. 70 procent werd slechts een keer aangetroffen. Daardoor wordt het voor virusscanners haast ... Read more

Source: www.bd.nl

Top found tags: Symantec(1),cybercrime(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

Dropbox lost kwetsbaarheid bij gedeelde bestanden opLocation: Dropbox - San Francisco, United States
Date published: 06-05-2014

Dropbox heeft een probleem opgelost dat onbekenden mogelijk toegang kon geven tot gedeelde bestanden. Dat laat het bedrijf weten op zijn blog.De kwetsbaarheid deed zich voor bij bestanden die via een link werden gedeeld met anderen. Als zulke bestanden een link naar een webpagina bevatten, kon de p... Read more

Source: www.nutech.nl

Top found tags: NL(1),vulnerability(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Thaise politie arresteert Nederlander wegens skimmingLocation: Den Haag, The Netherlands
Date published: 05-05-2014

De Thaise politie heeft in de provincie Phuket vijf mensen aangehouden wegens skimming, waaronder een Nederlander. Volgens de politie maakten de vijf buitenlanders deel uit van een internationale skimmingbende. De verdachten hadden gefabriceerde pinpassen en skimmingapparatuur bij zich.De mannen zo... Read more

Source: www.security.nl

Top found tags: skimming(1),Thailand(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish