Under construction

New design coming soon!

CIC News engine statistics

CIC News for 08-05-2014 contains 82 articles: cybercrime(47),cyber security(6),data breach(10),other(19)

CIC News update contains 79 English and 3 Dutch articles for today.
In today's English news articles:
- 44 related to cybercrime
- 6 related to cyber security
- 10 related to data breach and identity theft
- 19 for the category other news

In today's Dutch news articles:
- 3 related to cybercrime
- 0 related to cyber security
- 0 for the category other news

Have fun reading.

English cybercrime related news

Social engineering on rise as vulnerabilities decline: MicrosoftLocation: Microsoft HQ - Redmond, United States
Date published: 08-05-2014

Social engineering threats like Trojan Horse malware are on the increase as exploitable vulnerabilities in software decline, according to Microsoft's latest security report [PDF].In the last six months of 2013, infection telemetry data sent by Microsoft antimalware products showed that consumers ar... Read more

Source: www.itnews.com.au

Top found tags: trojan(2),malware(3),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers steal 50k from Australian real estate agencyLocation: Sydney, Australia
Date published: 06-05-2014

Cyber criminals have stolen $50,000 from an Australian real estate agency after one of its employees was duped by social engineering. Fraud investigators informed Hutchinson Real Estate in Broome, Australia that the attackers likely made their way into the company's network after an employee clicke... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),social engineering(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: Phishing scams increasingly using mobile apps to bait victimsLocation: Kaspersky HQ - Moscow, Russia
Date published: 07-05-2014

When it comes down to it, spam and phishing scams rely primarily on exploiting trust. If the attacker can find a way to make the message appear to be from a known source, the odds that a user will take the bait are much higher. This has led to malware infections that access your contacts and send o... Read more

Source: www.pcworld.com

Top found tags: cybercrime(2),Kaspersky Lab(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Create Awareness on Cyber Laws'Location: New York, United States
Date published: 08-05-2014

Governor K Rosaiah on Wednesday warned that cyber crime was emerging as a serious threat globally, with about 42 million cyber crimes reported in India every year.Releasing the National Cyber Crime Reference Hand Book, brought out by the National Cyber Safety and Security Standards and the Ministry... Read more

Source: www.newindianexpress.com

Top found tags: report(1),threat(1),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internet crime now a priority for policeLocation: London, United Kingdom
Date published: 08-05-2014

A YORKSHIRE police commissioner says the growing problem of cyber crime is one of his new top priorities in the coming year. Mark Burns-Williamson says he will launch a review into the impact of crime carried out using computers or the internet in West Yorkshire.He also pledged to improve road safe... Read more

Source: www.yorkshirepost.co.uk

Top found tags: police(1),government(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Armstrongs Cyber Crime Program honoredLocation: New York, United States
Date published: 07-05-2014

Armstrong Atlantic State Universitys online Cyber Crime graduate certificate was recently honored as one of the nations best programs by Forensics Colleges.Armstrong is featured as one of the 7 Top Cybercrime & E-Discovery Certificate Programs on a list of outstanding universities o... Read more

Source: savannahnow.com

Top found tags: legislation(1),education(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Heartbleed bug: A modern horror storyLocation: London, United Kingdom
Date published: 07-05-2014

John Tates assessment of the latest risks to technology posed by cyber-crime is not for the faint-hearted. Last month I was a speaker at an event on social media and cybertechnology, run by the Institute of Risk Managements charity special interest group. This was good timing as April turned ... Read more

Source: www.civilsociety.co.uk

Top found tags: OpenSSL(2),cybercrime(4),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Case Study: Analyzing the Origins of a DDoS AttackLocation: New York, United States
Date published: 07-05-2014

Recently a client was experiencing a massive layer 7 DDOS attack, generating tens of thousands of random HTTP requests per second to the server. The architecture of the website included a cluster of three web servers responsible for handling all incoming traffic, which did little to alleviate the p... Read more

Source: blog.sucuri.net

Top found tags: EN(1),website(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fivefold Pay Surge Since 2006 Reveals Romania Tech BoomLocation: Bucharest, Romania
Date published: 07-05-2014

George Mihaiu has boosted his salary fivefold since 2006 and hes still getting two job offers a day. Mihaiu, 31, rode a wave of software investment streaming into Romania to increase his after-tax pay to about 2,000 euros ($2,790) a month, five times the countrys average. In the past 10 years... Read more

Source: www.businessweek.com

Top found tags: EU(2),Romania(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Thai govt websites infested with malwareLocation: New York, United States
Date published: 07-05-2014

Nearly 100 Thai government websites were hacked and used to send malware in April, according to an online security expert. More than 500 distinct attacks were launched from these websites, representing about 85% of all government-hosted malware in the world, Paul Mutton posted on the website of Net... Read more

Source: www.bangkokpost.com

Top found tags: Thailand(2),United Kingdom(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Location: Oracle - Redwood City, United States
Date published:One reason for the explosive growth in attacks on Java and Flash was the growing prevalence of exploit kits, collections of exploits that are sold on the black market. These make it possible for many more people to orchestrate attacks without having to find vulnerabilities themselves or write the tools to exploit them.

One reason for the explosive growth in attacks on Java and Flash was the growing prevalence of exploit kits, collections of exploits that are sold on the black market. These make it possible for many more people to orchestrate attacks without having to find vulnerabilities themselves or write the to... Read more

Source: That isn't to say the OS itself isn't a target. In fact, according to Microsoft, the number of core OS vulnerabilities has gone up steadily year by year. Not all involve Windows, though, as Microsoft describes this as an industry-wide trend.

Top found tags: malware(1),vulnerability(1),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(50325603-9ff1-4c3c-a563-f0b134b0adfe)/Location:
Date published: blog.sucuri.net

... Read more

Source: http://blog.sucuri.net/2014/05/map-of-a-ddos-attack.html

Top found tags: DoS (1),EN(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(5037669e-641a-4aa4-a677-ce48e3586ec3)/Location: New York, United States
Date published: www.ccjs.umd.edu

... Read more

Source: http://www.ccjs.umd.edu/content/forensicweekcom-webcast-cybercrime-unraveling-human-component

Top found tags: EN(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(503e1802-0ae9-447a-93cb-d6c39840eaac)/Location: New York, United States
Date published: www.intercooleronline.com

... Read more

Source: http://www.intercooleronline.com/2014/05/07/threatmetrix-to-host-cybercrime-prevention-summit-2014-building-trust-on-the-internet/

Top found tags: EN(1),threat(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Location: Oracle - Redwood City, United States
Date published:One reason for the explosive growth in attacks on Java and Flash was the growing prevalence of exploit kits, collections of exploits that are sold on the black market. These make it possible for many more people to orchestrate attacks without having to find vulnerabilities themselves or write the tools to exploit them.

One reason for the explosive growth in attacks on Java and Flash was the growing prevalence of exploit kits, collections of exploits that are sold on the black market. These make it possible for many more people to orchestrate attacks without having to find vulnerabilities themselves or write the to... Read more

Source: That isn't to say the OS itself isn't a target. In fact, according to Microsoft, the number of core OS vulnerabilities has gone up steadily year by year. Not all involve Windows, though, as Microsoft describes this as an industry-wide trend.

Top found tags: malware(1),vulnerability(1),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(50325603-9ff1-4c3c-a563-f0b134b0adfe)/Location:
Date published: blog.sucuri.net

... Read more

Source: http://blog.sucuri.net/2014/05/map-of-a-ddos-attack.html

Top found tags: DoS (1),EN(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(5037669e-641a-4aa4-a677-ce48e3586ec3)/Location: New York, United States
Date published: www.ccjs.umd.edu

... Read more

Source: http://www.ccjs.umd.edu/content/forensicweekcom-webcast-cybercrime-unraveling-human-component

Top found tags: EN(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(503e1802-0ae9-447a-93cb-d6c39840eaac)/Location: New York, United States
Date published: www.intercooleronline.com

... Read more

Source: http://www.intercooleronline.com/2014/05/07/threatmetrix-to-host-cybercrime-prevention-summit-2014-building-trust-on-the-internet/

Top found tags: EN(1),threat(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Location: Oracle - Redwood City, United States
Date published:One reason for the explosive growth in attacks on Java and Flash was the growing prevalence of exploit kits, collections of exploits that are sold on the black market. These make it possible for many more people to orchestrate attacks without having to find vulnerabilities themselves or write the tools to exploit them.

One reason for the explosive growth in attacks on Java and Flash was the growing prevalence of exploit kits, collections of exploits that are sold on the black market. These make it possible for many more people to orchestrate attacks without having to find vulnerabilities themselves or write the to... Read more

Source: That isn't to say the OS itself isn't a target. In fact, according to Microsoft, the number of core OS vulnerabilities has gone up steadily year by year. Not all involve Windows, though, as Microsoft describes this as an industry-wide trend.

Top found tags: malware(1),vulnerability(1),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(50325603-9ff1-4c3c-a563-f0b134b0adfe)/Location:
Date published: blog.sucuri.net

... Read more

Source: http://blog.sucuri.net/2014/05/map-of-a-ddos-attack.html

Top found tags: DoS (1),EN(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(5037669e-641a-4aa4-a677-ce48e3586ec3)/Location: New York, United States
Date published: www.ccjs.umd.edu

... Read more

Source: http://www.ccjs.umd.edu/content/forensicweekcom-webcast-cybercrime-unraveling-human-component

Top found tags: EN(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(503e1802-0ae9-447a-93cb-d6c39840eaac)/Location: New York, United States
Date published: www.intercooleronline.com

... Read more

Source: http://www.intercooleronline.com/2014/05/07/threatmetrix-to-host-cybercrime-prevention-summit-2014-building-trust-on-the-internet/

Top found tags: EN(1),threat(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Location: Oracle - Redwood City, United States
Date published:One reason for the explosive growth in attacks on Java and Flash was the growing prevalence of exploit kits, collections of exploits that are sold on the black market. These make it possible for many more people to orchestrate attacks without having to find vulnerabilities themselves or write the tools to exploit them.

One reason for the explosive growth in attacks on Java and Flash was the growing prevalence of exploit kits, collections of exploits that are sold on the black market. These make it possible for many more people to orchestrate attacks without having to find vulnerabilities themselves or write the to... Read more

Source: That isn't to say the OS itself isn't a target. In fact, according to Microsoft, the number of core OS vulnerabilities has gone up steadily year by year. Not all involve Windows, though, as Microsoft describes this as an industry-wide trend.

Top found tags: malware(1),vulnerability(1),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(50325603-9ff1-4c3c-a563-f0b134b0adfe)/Location:
Date published: blog.sucuri.net

... Read more

Source: http://blog.sucuri.net/2014/05/map-of-a-ddos-attack.html

Top found tags: DoS (1),EN(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(5037669e-641a-4aa4-a677-ce48e3586ec3)/Location: New York, United States
Date published: www.ccjs.umd.edu

... Read more

Source: http://www.ccjs.umd.edu/content/forensicweekcom-webcast-cybercrime-unraveling-human-component

Top found tags: EN(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(503e1802-0ae9-447a-93cb-d6c39840eaac)/Location: New York, United States
Date published: www.intercooleronline.com

... Read more

Source: http://www.intercooleronline.com/2014/05/07/threatmetrix-to-host-cybercrime-prevention-summit-2014-building-trust-on-the-internet/

Top found tags: EN(1),threat(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Location: Oracle - Redwood City, United States
Date published:One reason for the explosive growth in attacks on Java and Flash was the growing prevalence of exploit kits, collections of exploits that are sold on the black market. These make it possible for many more people to orchestrate attacks without having to find vulnerabilities themselves or write the tools to exploit them.

One reason for the explosive growth in attacks on Java and Flash was the growing prevalence of exploit kits, collections of exploits that are sold on the black market. These make it possible for many more people to orchestrate attacks without having to find vulnerabilities themselves or write the to... Read more

Source: That isn't to say the OS itself isn't a target. In fact, according to Microsoft, the number of core OS vulnerabilities has gone up steadily year by year. Not all involve Windows, though, as Microsoft describes this as an industry-wide trend.

Top found tags: malware(1),vulnerability(1),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(50325603-9ff1-4c3c-a563-f0b134b0adfe)/Location:
Date published: blog.sucuri.net

... Read more

Source: http://blog.sucuri.net/2014/05/map-of-a-ddos-attack.html

Top found tags: DoS (1),EN(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(5037669e-641a-4aa4-a677-ce48e3586ec3)/Location: New York, United States
Date published: www.ccjs.umd.edu

... Read more

Source: http://www.ccjs.umd.edu/content/forensicweekcom-webcast-cybercrime-unraveling-human-component

Top found tags: EN(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(503e1802-0ae9-447a-93cb-d6c39840eaac)/Location: New York, United States
Date published: www.intercooleronline.com

... Read more

Source: http://www.intercooleronline.com/2014/05/07/threatmetrix-to-host-cybercrime-prevention-summit-2014-building-trust-on-the-internet/

Top found tags: EN(1),threat(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Location: Oracle - Redwood City, United States
Date published:One reason for the explosive growth in attacks on Java and Flash was the growing prevalence of exploit kits, collections of exploits that are sold on the black market. These make it possible for many more people to orchestrate attacks without having to find vulnerabilities themselves or write the tools to exploit them.

One reason for the explosive growth in attacks on Java and Flash was the growing prevalence of exploit kits, collections of exploits that are sold on the black market. These make it possible for many more people to orchestrate attacks without having to find vulnerabilities themselves or write the to... Read more

Source: That isn't to say the OS itself isn't a target. In fact, according to Microsoft, the number of core OS vulnerabilities has gone up steadily year by year. Not all involve Windows, though, as Microsoft describes this as an industry-wide trend.

Top found tags: malware(1),vulnerability(1),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(50325603-9ff1-4c3c-a563-f0b134b0adfe)/Location:
Date published: blog.sucuri.net

... Read more

Source: http://blog.sucuri.net/2014/05/map-of-a-ddos-attack.html

Top found tags: DoS (1),EN(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(5037669e-641a-4aa4-a677-ce48e3586ec3)/Location: New York, United States
Date published: www.ccjs.umd.edu

... Read more

Source: http://www.ccjs.umd.edu/content/forensicweekcom-webcast-cybercrime-unraveling-human-component

Top found tags: EN(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(503e1802-0ae9-447a-93cb-d6c39840eaac)/Location: New York, United States
Date published: www.intercooleronline.com

... Read more

Source: http://www.intercooleronline.com/2014/05/07/threatmetrix-to-host-cybercrime-prevention-summit-2014-building-trust-on-the-internet/

Top found tags: EN(1),threat(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Former NSA Head Talks Huawei, Stuxnet and ArnoldLocation: New York Times - New York, United States
Date published: 08-05-2014

Less than six weeks away from his post as head of the National Security Agency, Gen. Keith Alexander is cutting loose.In a four-star general, spy chief sort of way.During an extensiveextensive interview with the Australian Financial Review, Alexander offered relatively blunt comments on classified ... Read more

Source: blogs.wsj.com

Top found tags: Gen. Keith Alexander(3),United States(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware at all time HighLocation: PandaLabs - Madrid, Spain
Date published: 08-05-2014

Malware is everywhere and isnt about to disappear. The latest PandaLabs report says that last year alone, of all the malware that ever existed, cyber crooks created and distributed 20 percent of that. Malware comes in the form of Trojans, worms, viruses, adware/spyware and miscellaneous, with Tr... Read more

Source: www.huffingtonpost.com

Top found tags: trojan(2),malware(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Android malware can take control of your phone, accuse you of watching illegal porn and try to extort moneyLocation: Google HQ - Mountain View, United States
Date published: 08-05-2014

New Delhi: If a report is to be believed, researches have detected a new piece of malware that is infecting Android devices. It attacks a device and remotely disables it until users pay a hefty sum of money.Android-Trojan.Koler.A malware, with the help of your phone's geolocation technology, discov... Read more

Source: ibnlive.in.com

Top found tags: trojan(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fake Instagram 'Image Viewers' Are Latest Malware FadLocation: Instagram - Menlo Park, United States
Date published: 08-05-2014

Do you use Instagram on your mobile device? Do you use a separate, third-party application to transfer your Instagram photos to your desktop PC? Well, you might want to look twice at that application, because bundling malware or potentially unwanted programs into Instagram-related software is all t... Read more

Source: www.tomsguide.com

Top found tags: social media(2),telecom sector(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Deceptive Downloads Often Bundle Malware, RansomwareLocation: Microsoft HQ - Redmond, United States
Date published: 07-05-2014

While criminals increasingly used deceptive downloads bundled with malware and ransomware, Microsoft says it has put up a tougher fight against cyber-crime. Cyber-criminals are increasingly using "deceptive tactics" to circumvent the protections that Microsoft has built into its software over the p... Read more

Source: www.eweek.com

Top found tags: Windows(1),Microsoft(2),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2 students booked for blackmailing girlLocation: New York, United States
Date published: 08-05-2014

A case has been registered against two students of a private school here for allegedly blackmailing a minor school girl and extorting money from her. Police said today that the school boy and his friend were booked under relevant sections of Prevention of Cyber Crime Act and Information Technology ... Read more

Source: www.business-standard.com

Top found tags: police(1),threat(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Japan and EU Shake Hands on Cyber Security AgreementLocation: Tokio, Japan
Date published: 08-05-2014

Leaders met in Brussels this week, agreeing to a formal cyber dialogue and to share knowledge going forward Senior European Union officials including Council president Herman Van Rompuy met their Japanese counterparts for high level talks in Brussels this week aimed at fostering greater co-operatio... Read more

Source: www.infosecurity-magazine.com

Top found tags: Europe(2),government(5),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime Campaign Centres on Devon Toiletries CompanyLocation: London, United Kingdom
Date published: 08-05-2014

A new wave of targeted email attacks aimed at small and medium-sized businesses has been uncovered, purportedly stemming from a Devon-based cosmetics company.The attacks were discovered by security firm Malwarebytes, who say that those targeted were being infected with the notorious ZeuS banking Tr... Read more

Source: www.ibtimes.co.uk

Top found tags: financial sector(4),telecom sector(4),malware(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Location: Oracle - Redwood City, United States
Date published:One reason for the explosive growth in attacks on Java and Flash was the growing prevalence of exploit kits, collections of exploits that are sold on the black market. These make it possible for many more people to orchestrate attacks without having to find vulnerabilities themselves or write the tools to exploit them.

One reason for the explosive growth in attacks on Java and Flash was the growing prevalence of exploit kits, collections of exploits that are sold on the black market. These make it possible for many more people to orchestrate attacks without having to find vulnerabilities themselves or write the to... Read more

Source: That isn't to say the OS itself isn't a target. In fact, according to Microsoft, the number of core OS vulnerabilities has gone up steadily year by year. Not all involve Windows, though, as Microsoft describes this as an industry-wide trend.

Top found tags: malware(1),vulnerability(1),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(50325603-9ff1-4c3c-a563-f0b134b0adfe)/Location:
Date published: blog.sucuri.net

... Read more

Source: http://blog.sucuri.net/2014/05/map-of-a-ddos-attack.html

Top found tags: DoS (1),EN(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Heartbleed: What it told us about US stockpiling of potential cyber-weaponsLocation: White House - Washington D.C., United States
Date published: 05-05-2014

Heartbleed, the recently divulged cyber-vulnerability that exposed websites to a gaping hole in computer security across half the Internet, exposed something else: a shift in US policy over when to keep such vulnerabilities secret to be exploited by government spies only and when to disclos... Read more

Source: news.yahoo.com

Top found tags: cyber security(6),government(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report on Cyber Threat Calls for Quick Passage of 2012 Bill, ArticlesLocation: Lagos, Nigeria
Date published: 08-05-2014

A report on Nigeria 2014 cyber threat, which was sponsored by the British High Commission in a bid to facilitate trade, cooperation and mutual security in the UK and Nigeria, has been launched in Nigeria. The research project known as 2014 Nigerian Cyber Threat Barometer, is aimed at battling the i... Read more

Source: www.thisdaylive.com

Top found tags: Nigeria(3),cyber security(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data sovereignty laws hamper international crime investigations: AFPLocation: New York, United States
Date published: 08-05-2014

International cyber crime police work is being hampered by data sovereignty laws, according to Australian Federal Polices national manager of high tech crime operations, Tim Morris.Speaking at CeBIT in Sydney this week, assistant commissioner Morris said the old idea of where soil is attached to... Read more

Source: www.computerworld.com.au

Top found tags: United States(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
You can't overstate the threat malware poses to businessesLocation: New Delhi, India
Date published: 08-05-2014

The information security industry has been accused in the past, usually with little supporting evidence, of overstating the risks to businesses. The charge has been that it's all been done just to increase sales. Whenever this discussion emerges, comparisons with the Y2K bug inevitably ... Read more

Source: www.independent.ie

Top found tags: social engineering(2),cyber security(4),malware(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data sovereignty laws hamper international crime investigations: AFPLocation: New York, United States
Date published: 08-05-2014

The old idea of where soil is attached to a server is not going to serve us well into the future, says AFP assistant commissioner.International cyber crime police work is being hampered by data sovereignty laws, according to Australian Federal Polices national manager of high t... Read more

Source: www.computerworld.com.au

Top found tags: United States(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senate Appropriations Subcommittee on Homeland Security HearingLocation: Department of Homeland Security - Washington, United States
Date published: 08-05-2014

CenturyLink appreciates the leadership role the Department of Homeland Security plays in facilitating the cybersecurity of the nation's critical infrastructure, with the oversight and guidance of this Committee. CenturyLink was founded nearly 85 years ago as a small rural telephone company with jus... Read more

Source: insurancenewsnet.com

Top found tags: telecom sector(4),government(7),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Still no arrests in 2010 Capitol Hill credit card fraud wave as multi-state investigation continuesLocation: Seattle, Washington, United States
Date published: 07-05-2014

Federal agents say they are still searching for suspects in a wave of credit card fraud that swept across Capitol Hill in 2010, an attack that likely affected hundreds of people and dozens of businesses, and involved untold thousands of dollars in fraud and helped bring about the end of a longt... Read more

Source: www.capitolhillseattle.com

Top found tags: data breach(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach results in $4.8 million HIPAA settlementsLocation: New York City, New York, United States
Date published: 07-05-2014

Two health care organizations have agreed to settle charges that they potentially violated the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules by failing to secure thousands of patients electronic protected health information (ePHI) held on their ne... Read more

Source: www.einnews.com

Top found tags: medical sector(2),United States(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cost of Data Breaches Up 15Location: Brasilia-Federal District, Brazil
Date published: 07-05-2014

The Ponemon Institute released its 9th annual Cost of Data Breach Study: Global Study, sponsored by IBM. According to the study of 314 companies spanning 10 countries, the average total cost of a data breach increased 15% in the last year to $3.5 million. The study also found that the cost incurred... Read more

Source: mobileenterprise.edgl.com

Top found tags: United Kingdom(4),United States(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police backtrack on Target suspect claimsLocation: Target HQ - Minneapolis, United States
Date published: 08-05-2014

A Texas police department backtracked on claims it made earlier that it had arrested a man believed to be linked to the massive Target data breach, issuing a statement that said "it is not believed he was responsible" for the information heist.The Georgetown, Texas police department initially said ... Read more

Source: www.usatoday.com

Top found tags: data breach(2),government(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Orange warns of Phishing attacks after data breachLocation: Orange HQ - Paris, France
Date published: 07-05-2014

Orange, Europe's fourth largest telecom, has confirmed reports that personal information for 1.3 million customers have been compromised. The breach is the second one in three months, but notification was delayed so that the company could assess the true scale of the problem. Featured Resource Pres... Read more

Source: www.csoonline.com

Top found tags: Germany(2),social media(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Company Data Breach Now Costs $3.5M on Average: Ponemon StudyLocation: Berlin, Germany
Date published: 07-05-2014

The average cost of a corporate data breach increased 15 percent in the last year to $3.5 million, according to a study.The study by the Ponemon Institute out of Michigan also found that the cost incurred for each lost or stolen record containing sensitive and confidential information increased mor... Read more

Source: www.insurancejournal.com

Top found tags: Ponemon Institute(2),United Kingdom(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Finland to criminalise identity theftLocation: Helsinki, Finland
Date published: 08-05-2014

A fine would be a befitting punishment, the Ministry of Justice views.THE USE of the identity of another person, so-called identity theft, is set to be criminalised in Finland, with a task force at the Ministry of Justice proposing that the offence be made punishable by the penalty of fine. The Cri... Read more

Source: www.helsinkitimes.fi

Top found tags: fraud(1),identity theft(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Three patterns cover 75 percent of all bank cyberattacks in past 10 years, study showsLocation: Verizon HQ - New York, United States
Date published: 08-05-2014

Three main forms of cyberattack plagued the financial services industry over the past decade: Web application attacks, denial of service attacks and payment card skimming, according to a recently release report. Out of those three types, payment card skimming continues to present a most troubling c... Read more

Source: www.fiercefinanceit.com

Top found tags: data breach(2),cybercrime(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Medicentres data breach spurs changes to privacy lawsLocation: Ottawa, Canada
Date published: 08-05-2014

The theft of a laptop containing the private health information of 620,000 Alberta Medicentres patients last year has prompted the Alberta government to propose changesto its privacy legislation.Amendments to the Health Information Actwill ensure that people affectedby breaches of their private hea... Read more

Source: www.cbc.ca

Top found tags: legislation(2),medical sector(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New era of 'mega breaches' signals bigger payouts and shifting behaviour for cybercriminalsLocation: Cape Town, West-Kaap, South Africa
Date published: 08-05-2014

Symantec report reveals the number of mega data breaches went from one in 2012 to eight in 2013; 552 million identities exposed in 2013. After lurking in the shadows for the first 10 months of 2013, cybercriminals unleashed the most damaging series of cyberattacks in history. Symantec's... Read more

Source: www.itweb.co.za

Top found tags: medical sector(2),South Africa(2),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

NATO experts advise Ukraine on nuclear plant safetyLocation: Kiev, Ukraine
Date published: 07-05-2014

NATO civilian experts had visited Ukraine last month to assess critical infrastructure such as nuclear plants, pumping stations for gas pipelines and hydro-electric plants. World Bulletin/News DeskNATO experts have visited Ukraine to advise authorities there on improving the safety of nuclear power... Read more

Source: www.worldbulletin.net

Top found tags: Ukraine(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police ID Suspect in ATM Skimming ScamLocation: Bank of America HQ - Charlotte, United States
Date published: 07-05-2014

Police say 22-year-old Lance Lindaberry of Medford, NJ was caught on surveillance video on April 26, installing a skimming device on an ATM inside the Bank of America on W. Rt. 70 in Marlton, New Jersey.Investigators say Lindaberry first attached a small electronic device over the card ... Read more

Source: www.nbcphiladelphia.com

Top found tags: social media(2),telecom sector(4),financial sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pentagon Police Hit By 'Catastrophic' Network OutageLocation: The Pentagon - Washington, United States
Date published: 07-05-2014

CORRECTION: This article was updated to eliminate a reference to computers used in the Office of the Secretary of Defense (they do not run on the Pentagon Life Safety System Network) and note that the Pentagon Force Protection Agency reports to the director of administration and management (DA&... Read more

Source: www.defenseone.com

Top found tags: EN(1),report(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SATCOM terminals ripe for malware exploitationLocation: IOActive - Seattle, United States
Date published: 07-05-2014

An IOActive researcher has found SATCOM terminals ripe for exploitation. Learn which ones, what's being done to rectify the situation, and what you can do in the meantime.Satellite communications have become a necessity. Military, aeronautical, maritime, and ground-based organizations a... Read more

Source: www.techrepublic.com

Top found tags: government(2),telecom sector(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Blocks Demonoid for Spreading Malicious SoftwareLocation: Google HQ - Mountain View, United States
Date published: 08-05-2014

In one of the harshest moves a search engine can take against a site, during the past few hours Google flagged torrent site Demonoid as likely to harm users' computers. After arriving at the conclusion that malicious third-party ads had caused the problem, Demonoid responded by disabling every sing... Read more

Source: torrentfreak.com

Top found tags: EN(1),Google(1),Ukraine(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Flash and Java still as vulnerable as ever, says MicrosoftLocation: Oracle - Redwood City, United States
Date published: 08-05-2014

Microsoft's latest Security Intelligence Report for the second half of 2013 sees Java and Flash as the top attack vectors, with Java being nearly the default... Read more

Source: Java and Flash are still gigantic targets for attackers, and Java has become the biggest security problem for Windows users, according to Microsoft's most recent Security Intelligence Report. Volume 16 covers trends in worldwide IT security across the second half of 2013.

Top found tags: Java(1),Microsoft(1),report(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(503aeb44-b623-4b04-ad8f-0cb4f774a3ae)/Location:
Date published: www.independent.ie

...
The more relevant, and pressing, threats to businesses are more likely to be based on malicious software (malware) or data loss.

Despite increased attempts over the years to raise the level of IT security awareness, there is still a relatively low level of awareness in Ireland about such threats. This is evidenced by the number of SMEs that are falling victim to new variants of malware solely focused on extorting cash.

One that has been written about many times in the last months, but unfortunately is still extremely prevalent, is the malware known as CryptoLocker.

This malware (or ransomware as it is more commonly known) relies on 'social engineering'. It gets a victim to carry out a particular task such as clicking on a link or opening an attachment in an email. This can then result in the user's machine becoming infected with this malware.

The result of this infection is that cryptographic components of the Windows operating system are used to encrypt a range of files on the computer hard disk.

There is then a complex series of transactions initiated on the computer that connects it to the internet and generates a unique 'public-private key pair' for that computer and encrypts the files with that public key.

The only way to decrypt these files is with the private key that the malware author is storing on his own server. At this point, you're in big trouble. The malware presents a screen to the victim outlining what has happened and what must be done to decrypt the files. Most disconcertingly, a countdown clock to complete destruction of the encrypted files begins." target=_blank>Read more


Source:
The more relevant, and pressing, threats to businesses are more likely to be based on malicious software (malware) or data loss.

Despite increased attempts over the years to raise the level of IT security awareness, there is still a relatively low level of awareness in Ireland about such threats. This is evidenced by the number of SMEs that are falling victim to new variants of malware solely focused on extorting cash.

One that has been written about many times in the last months, but unfortunately is still extremely prevalent, is the malware known as CryptoLocker.

This malware (or ransomware as it is more commonly known) relies on 'social engineering'. It gets a victim to carry out a particular task such as clicking on a link or opening an attachment in an email. This can then result in the user's machine becoming infected with this malware.

The result of this infection is that cryptographic components of the Windows operating system are used to encrypt a range of files on the computer hard disk.

There is then a complex series of transactions initiated on the computer that connects it to the internet and generates a unique 'public-private key pair' for that computer and encrypts the files with that public key.

The only way to decrypt these files is with the private key that the malware author is storing on his own server. At this point, you're in big trouble. The malware presents a screen to the victim outlining what has happened and what must be done to decrypt the files. Most disconcertingly, a countdown clock to complete destruction of the encrypted files begins." target=_blank>http://www.independent.ie/business/technology/you-cant-overstate-the-threat-malware-poses-to-businesses-30253990.html


Top found tags: EN(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Flash and Java still as vulnerable as ever, says MicrosoftLocation: Oracle - Redwood City, United States
Date published: 08-05-2014

Microsoft's latest Security Intelligence Report for the second half of 2013 sees Java and Flash as the top attack vectors, with Java being nearly the default... Read more

Source: Java and Flash are still gigantic targets for attackers, and Java has become the biggest security problem for Windows users, according to Microsoft's most recent Security Intelligence Report. Volume 16 covers trends in worldwide IT security across the second half of 2013.

Top found tags: Java(1),Microsoft(1),report(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(503aeb44-b623-4b04-ad8f-0cb4f774a3ae)/Location:
Date published: www.independent.ie

...
The more relevant, and pressing, threats to businesses are more likely to be based on malicious software (malware) or data loss.

Despite increased attempts over the years to raise the level of IT security awareness, there is still a relatively low level of awareness in Ireland about such threats. This is evidenced by the number of SMEs that are falling victim to new variants of malware solely focused on extorting cash.

One that has been written about many times in the last months, but unfortunately is still extremely prevalent, is the malware known as CryptoLocker.

This malware (or ransomware as it is more commonly known) relies on 'social engineering'. It gets a victim to carry out a particular task such as clicking on a link or opening an attachment in an email. This can then result in the user's machine becoming infected with this malware.

The result of this infection is that cryptographic components of the Windows operating system are used to encrypt a range of files on the computer hard disk.

There is then a complex series of transactions initiated on the computer that connects it to the internet and generates a unique 'public-private key pair' for that computer and encrypts the files with that public key.

The only way to decrypt these files is with the private key that the malware author is storing on his own server. At this point, you're in big trouble. The malware presents a screen to the victim outlining what has happened and what must be done to decrypt the files. Most disconcertingly, a countdown clock to complete destruction of the encrypted files begins." target=_blank>Read more


Source:
The more relevant, and pressing, threats to businesses are more likely to be based on malicious software (malware) or data loss.

Despite increased attempts over the years to raise the level of IT security awareness, there is still a relatively low level of awareness in Ireland about such threats. This is evidenced by the number of SMEs that are falling victim to new variants of malware solely focused on extorting cash.

One that has been written about many times in the last months, but unfortunately is still extremely prevalent, is the malware known as CryptoLocker.

This malware (or ransomware as it is more commonly known) relies on 'social engineering'. It gets a victim to carry out a particular task such as clicking on a link or opening an attachment in an email. This can then result in the user's machine becoming infected with this malware.

The result of this infection is that cryptographic components of the Windows operating system are used to encrypt a range of files on the computer hard disk.

There is then a complex series of transactions initiated on the computer that connects it to the internet and generates a unique 'public-private key pair' for that computer and encrypts the files with that public key.

The only way to decrypt these files is with the private key that the malware author is storing on his own server. At this point, you're in big trouble. The malware presents a screen to the victim outlining what has happened and what must be done to decrypt the files. Most disconcertingly, a countdown clock to complete destruction of the encrypted files begins." target=_blank>http://www.independent.ie/business/technology/you-cant-overstate-the-threat-malware-poses-to-businesses-30253990.html


Top found tags: EN(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Flash and Java still as vulnerable as ever, says MicrosoftLocation: Oracle - Redwood City, United States
Date published: 08-05-2014

Microsoft's latest Security Intelligence Report for the second half of 2013 sees Java and Flash as the top attack vectors, with Java being nearly the default... Read more

Source: Java and Flash are still gigantic targets for attackers, and Java has become the biggest security problem for Windows users, according to Microsoft's most recent Security Intelligence Report. Volume 16 covers trends in worldwide IT security across the second half of 2013.

Top found tags: Java(1),Microsoft(1),report(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(503aeb44-b623-4b04-ad8f-0cb4f774a3ae)/Location:
Date published: www.independent.ie

...
The more relevant, and pressing, threats to businesses are more likely to be based on malicious software (malware) or data loss.

Despite increased attempts over the years to raise the level of IT security awareness, there is still a relatively low level of awareness in Ireland about such threats. This is evidenced by the number of SMEs that are falling victim to new variants of malware solely focused on extorting cash.

One that has been written about many times in the last months, but unfortunately is still extremely prevalent, is the malware known as CryptoLocker.

This malware (or ransomware as it is more commonly known) relies on 'social engineering'. It gets a victim to carry out a particular task such as clicking on a link or opening an attachment in an email. This can then result in the user's machine becoming infected with this malware.

The result of this infection is that cryptographic components of the Windows operating system are used to encrypt a range of files on the computer hard disk.

There is then a complex series of transactions initiated on the computer that connects it to the internet and generates a unique 'public-private key pair' for that computer and encrypts the files with that public key.

The only way to decrypt these files is with the private key that the malware author is storing on his own server. At this point, you're in big trouble. The malware presents a screen to the victim outlining what has happened and what must be done to decrypt the files. Most disconcertingly, a countdown clock to complete destruction of the encrypted files begins." target=_blank>Read more


Source:
The more relevant, and pressing, threats to businesses are more likely to be based on malicious software (malware) or data loss.

Despite increased attempts over the years to raise the level of IT security awareness, there is still a relatively low level of awareness in Ireland about such threats. This is evidenced by the number of SMEs that are falling victim to new variants of malware solely focused on extorting cash.

One that has been written about many times in the last months, but unfortunately is still extremely prevalent, is the malware known as CryptoLocker.

This malware (or ransomware as it is more commonly known) relies on 'social engineering'. It gets a victim to carry out a particular task such as clicking on a link or opening an attachment in an email. This can then result in the user's machine becoming infected with this malware.

The result of this infection is that cryptographic components of the Windows operating system are used to encrypt a range of files on the computer hard disk.

There is then a complex series of transactions initiated on the computer that connects it to the internet and generates a unique 'public-private key pair' for that computer and encrypts the files with that public key.

The only way to decrypt these files is with the private key that the malware author is storing on his own server. At this point, you're in big trouble. The malware presents a screen to the victim outlining what has happened and what must be done to decrypt the files. Most disconcertingly, a countdown clock to complete destruction of the encrypted files begins." target=_blank>http://www.independent.ie/business/technology/you-cant-overstate-the-threat-malware-poses-to-businesses-30253990.html


Top found tags: EN(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Flash and Java still as vulnerable as ever, says MicrosoftLocation: Oracle - Redwood City, United States
Date published: 08-05-2014

Microsoft's latest Security Intelligence Report for the second half of 2013 sees Java and Flash as the top attack vectors, with Java being nearly the default... Read more

Source: Java and Flash are still gigantic targets for attackers, and Java has become the biggest security problem for Windows users, according to Microsoft's most recent Security Intelligence Report. Volume 16 covers trends in worldwide IT security across the second half of 2013.

Top found tags: Java(1),Microsoft(1),report(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(503aeb44-b623-4b04-ad8f-0cb4f774a3ae)/Location:
Date published: www.independent.ie

...
The more relevant, and pressing, threats to businesses are more likely to be based on malicious software (malware) or data loss.

Despite increased attempts over the years to raise the level of IT security awareness, there is still a relatively low level of awareness in Ireland about such threats. This is evidenced by the number of SMEs that are falling victim to new variants of malware solely focused on extorting cash.

One that has been written about many times in the last months, but unfortunately is still extremely prevalent, is the malware known as CryptoLocker.

This malware (or ransomware as it is more commonly known) relies on 'social engineering'. It gets a victim to carry out a particular task such as clicking on a link or opening an attachment in an email. This can then result in the user's machine becoming infected with this malware.

The result of this infection is that cryptographic components of the Windows operating system are used to encrypt a range of files on the computer hard disk.

There is then a complex series of transactions initiated on the computer that connects it to the internet and generates a unique 'public-private key pair' for that computer and encrypts the files with that public key.

The only way to decrypt these files is with the private key that the malware author is storing on his own server. At this point, you're in big trouble. The malware presents a screen to the victim outlining what has happened and what must be done to decrypt the files. Most disconcertingly, a countdown clock to complete destruction of the encrypted files begins." target=_blank>Read more


Source:
The more relevant, and pressing, threats to businesses are more likely to be based on malicious software (malware) or data loss.

Despite increased attempts over the years to raise the level of IT security awareness, there is still a relatively low level of awareness in Ireland about such threats. This is evidenced by the number of SMEs that are falling victim to new variants of malware solely focused on extorting cash.

One that has been written about many times in the last months, but unfortunately is still extremely prevalent, is the malware known as CryptoLocker.

This malware (or ransomware as it is more commonly known) relies on 'social engineering'. It gets a victim to carry out a particular task such as clicking on a link or opening an attachment in an email. This can then result in the user's machine becoming infected with this malware.

The result of this infection is that cryptographic components of the Windows operating system are used to encrypt a range of files on the computer hard disk.

There is then a complex series of transactions initiated on the computer that connects it to the internet and generates a unique 'public-private key pair' for that computer and encrypts the files with that public key.

The only way to decrypt these files is with the private key that the malware author is storing on his own server. At this point, you're in big trouble. The malware presents a screen to the victim outlining what has happened and what must be done to decrypt the files. Most disconcertingly, a countdown clock to complete destruction of the encrypted files begins." target=_blank>http://www.independent.ie/business/technology/you-cant-overstate-the-threat-malware-poses-to-businesses-30253990.html


Top found tags: EN(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Flash and Java still as vulnerable as ever, says MicrosoftLocation: Oracle - Redwood City, United States
Date published: 08-05-2014

Microsoft's latest Security Intelligence Report for the second half of 2013 sees Java and Flash as the top attack vectors, with Java being nearly the default... Read more

Source: Java and Flash are still gigantic targets for attackers, and Java has become the biggest security problem for Windows users, according to Microsoft's most recent Security Intelligence Report. Volume 16 covers trends in worldwide IT security across the second half of 2013.

Top found tags: Java(1),Microsoft(1),report(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(503aeb44-b623-4b04-ad8f-0cb4f774a3ae)/Location:
Date published: www.independent.ie

...
The more relevant, and pressing, threats to businesses are more likely to be based on malicious software (malware) or data loss.

Despite increased attempts over the years to raise the level of IT security awareness, there is still a relatively low level of awareness in Ireland about such threats. This is evidenced by the number of SMEs that are falling victim to new variants of malware solely focused on extorting cash.

One that has been written about many times in the last months, but unfortunately is still extremely prevalent, is the malware known as CryptoLocker.

This malware (or ransomware as it is more commonly known) relies on 'social engineering'. It gets a victim to carry out a particular task such as clicking on a link or opening an attachment in an email. This can then result in the user's machine becoming infected with this malware.

The result of this infection is that cryptographic components of the Windows operating system are used to encrypt a range of files on the computer hard disk.

There is then a complex series of transactions initiated on the computer that connects it to the internet and generates a unique 'public-private key pair' for that computer and encrypts the files with that public key.

The only way to decrypt these files is with the private key that the malware author is storing on his own server. At this point, you're in big trouble. The malware presents a screen to the victim outlining what has happened and what must be done to decrypt the files. Most disconcertingly, a countdown clock to complete destruction of the encrypted files begins." target=_blank>Read more


Source:
The more relevant, and pressing, threats to businesses are more likely to be based on malicious software (malware) or data loss.

Despite increased attempts over the years to raise the level of IT security awareness, there is still a relatively low level of awareness in Ireland about such threats. This is evidenced by the number of SMEs that are falling victim to new variants of malware solely focused on extorting cash.

One that has been written about many times in the last months, but unfortunately is still extremely prevalent, is the malware known as CryptoLocker.

This malware (or ransomware as it is more commonly known) relies on 'social engineering'. It gets a victim to carry out a particular task such as clicking on a link or opening an attachment in an email. This can then result in the user's machine becoming infected with this malware.

The result of this infection is that cryptographic components of the Windows operating system are used to encrypt a range of files on the computer hard disk.

There is then a complex series of transactions initiated on the computer that connects it to the internet and generates a unique 'public-private key pair' for that computer and encrypts the files with that public key.

The only way to decrypt these files is with the private key that the malware author is storing on his own server. At this point, you're in big trouble. The malware presents a screen to the victim outlining what has happened and what must be done to decrypt the files. Most disconcertingly, a countdown clock to complete destruction of the encrypted files begins." target=_blank>http://www.independent.ie/business/technology/you-cant-overstate-the-threat-malware-poses-to-businesses-30253990.html


Top found tags: EN(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Flash and Java still as vulnerable as ever, says MicrosoftLocation: Oracle - Redwood City, United States
Date published: 08-05-2014

Microsoft's latest Security Intelligence Report for the second half of 2013 sees Java and Flash as the top attack vectors, with Java being nearly the default... Read more

Source: Java and Flash are still gigantic targets for attackers, and Java has become the biggest security problem for Windows users, according to Microsoft's most recent Security Intelligence Report. Volume 16 covers trends in worldwide IT security across the second half of 2013.

Top found tags: Java(1),Microsoft(1),report(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(503aeb44-b623-4b04-ad8f-0cb4f774a3ae)/Location:
Date published: www.independent.ie

...
The more relevant, and pressing, threats to businesses are more likely to be based on malicious software (malware) or data loss.

Despite increased attempts over the years to raise the level of IT security awareness, there is still a relatively low level of awareness in Ireland about such threats. This is evidenced by the number of SMEs that are falling victim to new variants of malware solely focused on extorting cash.

One that has been written about many times in the last months, but unfortunately is still extremely prevalent, is the malware known as CryptoLocker.

This malware (or ransomware as it is more commonly known) relies on 'social engineering'. It gets a victim to carry out a particular task such as clicking on a link or opening an attachment in an email. This can then result in the user's machine becoming infected with this malware.

The result of this infection is that cryptographic components of the Windows operating system are used to encrypt a range of files on the computer hard disk.

There is then a complex series of transactions initiated on the computer that connects it to the internet and generates a unique 'public-private key pair' for that computer and encrypts the files with that public key.

The only way to decrypt these files is with the private key that the malware author is storing on his own server. At this point, you're in big trouble. The malware presents a screen to the victim outlining what has happened and what must be done to decrypt the files. Most disconcertingly, a countdown clock to complete destruction of the encrypted files begins." target=_blank>Read more


Source:
The more relevant, and pressing, threats to businesses are more likely to be based on malicious software (malware) or data loss.

Despite increased attempts over the years to raise the level of IT security awareness, there is still a relatively low level of awareness in Ireland about such threats. This is evidenced by the number of SMEs that are falling victim to new variants of malware solely focused on extorting cash.

One that has been written about many times in the last months, but unfortunately is still extremely prevalent, is the malware known as CryptoLocker.

This malware (or ransomware as it is more commonly known) relies on 'social engineering'. It gets a victim to carry out a particular task such as clicking on a link or opening an attachment in an email. This can then result in the user's machine becoming infected with this malware.

The result of this infection is that cryptographic components of the Windows operating system are used to encrypt a range of files on the computer hard disk.

There is then a complex series of transactions initiated on the computer that connects it to the internet and generates a unique 'public-private key pair' for that computer and encrypts the files with that public key.

The only way to decrypt these files is with the private key that the malware author is storing on his own server. At this point, you're in big trouble. The malware presents a screen to the victim outlining what has happened and what must be done to decrypt the files. Most disconcertingly, a countdown clock to complete destruction of the encrypted files begins." target=_blank>http://www.independent.ie/business/technology/you-cant-overstate-the-threat-malware-poses-to-businesses-30253990.html


Top found tags: EN(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Flash and Java still as vulnerable as ever, says MicrosoftLocation: Oracle - Redwood City, United States
Date published: 08-05-2014

Microsoft's latest Security Intelligence Report for the second half of 2013 sees Java and Flash as the top attack vectors, with Java being nearly the default... Read more

Source: Java and Flash are still gigantic targets for attackers, and Java has become the biggest security problem for Windows users, according to Microsoft's most recent Security Intelligence Report. Volume 16 covers trends in worldwide IT security across the second half of 2013.

Top found tags: Java(1),Microsoft(1),report(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
/UUID(503aeb44-b623-4b04-ad8f-0cb4f774a3ae)/Location:
Date published: www.independent.ie

...
The more relevant, and pressing, threats to businesses are more likely to be based on malicious software (malware) or data loss.

Despite increased attempts over the years to raise the level of IT security awareness, there is still a relatively low level of awareness in Ireland about such threats. This is evidenced by the number of SMEs that are falling victim to new variants of malware solely focused on extorting cash.

One that has been written about many times in the last months, but unfortunately is still extremely prevalent, is the malware known as CryptoLocker.

This malware (or ransomware as it is more commonly known) relies on 'social engineering'. It gets a victim to carry out a particular task such as clicking on a link or opening an attachment in an email. This can then result in the user's machine becoming infected with this malware.

The result of this infection is that cryptographic components of the Windows operating system are used to encrypt a range of files on the computer hard disk.

There is then a complex series of transactions initiated on the computer that connects it to the internet and generates a unique 'public-private key pair' for that computer and encrypts the files with that public key.

The only way to decrypt these files is with the private key that the malware author is storing on his own server. At this point, you're in big trouble. The malware presents a screen to the victim outlining what has happened and what must be done to decrypt the files. Most disconcertingly, a countdown clock to complete destruction of the encrypted files begins." target=_blank>Read more


Source:
The more relevant, and pressing, threats to businesses are more likely to be based on malicious software (malware) or data loss.

Despite increased attempts over the years to raise the level of IT security awareness, there is still a relatively low level of awareness in Ireland about such threats. This is evidenced by the number of SMEs that are falling victim to new variants of malware solely focused on extorting cash.

One that has been written about many times in the last months, but unfortunately is still extremely prevalent, is the malware known as CryptoLocker.

This malware (or ransomware as it is more commonly known) relies on 'social engineering'. It gets a victim to carry out a particular task such as clicking on a link or opening an attachment in an email. This can then result in the user's machine becoming infected with this malware.

The result of this infection is that cryptographic components of the Windows operating system are used to encrypt a range of files on the computer hard disk.

There is then a complex series of transactions initiated on the computer that connects it to the internet and generates a unique 'public-private key pair' for that computer and encrypts the files with that public key.

The only way to decrypt these files is with the private key that the malware author is storing on his own server. At this point, you're in big trouble. The malware presents a screen to the victim outlining what has happened and what must be done to decrypt the files. Most disconcertingly, a countdown clock to complete destruction of the encrypted files begins." target=_blank>http://www.independent.ie/business/technology/you-cant-overstate-the-threat-malware-poses-to-businesses-30253990.html


Top found tags: EN(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Luc Beirens ruilt FCCU voor DeloitteLocation: Brussel, Belgium
Date published: 07-05-2014

Luc Beirens, de topman van de Federal Computer Crime Unit, verlaat de Federale Politie. Hij gaat aan de slag bij Deloitte. Bij Deloitte begint Beirens in het cyber leadership team. Daar wordt hij verantwoordelijk voor cyber forensics, threat intelligence, brand protection en simulatieoefeningen. Be... Read more

Source: datanews.knack.be

Top found tags: cybercrime(2),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hoeveelheid malware op Nederlandse machines hard gestegenLocation: Microsoft HQ - Redmond, United States
Date published: 08-05-2014

De hoeveelheid malware die Microsoft van Nederlands Windows-machines heeft verwijderd is Q4 2013 enorm gestegen. In Q3 2013 verwijderde Microsoft per 1.000 computers nog van 2,5 computers malware. Dit aantal is in het vierde kwartaal van 2013 opgelopen tot maar liefst 20,3 machines per 1.000 system... Read more

Source: infosecuritymagazine.nl

Top found tags: Windows(1),Microsoft(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft: gebruikers vaker aangevallen dan softwarelekkenLocation: Microsoft HQ - Redmond, United States
Date published: 08-05-2014

Doordat de software van Microsoft steeds veiliger wordt proberen cybercriminelen internetgebruikers steeds vaker via "misleidende tactieken" met malware te infecteren, zo laat Microsoft in de zestiende editie van het Security Intelligence Report weten.Volgens de softwaregigant is het aantal ernstig... Read more

Source: www.security.nl

Top found tags: cybercrime(2),Internet Explorer(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

No articles for today, maybe tomorrow!


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish