Under construction

New design coming soon!

CIC News engine statistics

CIC News for 13-05-2014 contains 36 articles: cybercrime(12),cyber security(9),data breach(7),other(8)

CIC News update contains 33 English and 3 Dutch articles for today.
In today's English news articles:
- 10 related to cybercrime
- 9 related to cyber security
- 7 related to data breach and identity theft
- 7 for the category other news

In today's Dutch news articles:
- 2 related to cybercrime
- 0 related to cyber security
- 1 for the category other news

Have fun reading.

English cybercrime related news

Hijacked antiDDoS servers used to carry out massive DDoS attackLocation: Incapsula HQ - Redwood Shores, United States
Date published: 12-05-2014

A massive distributed denial-of-service (DDoS) was carried out earlier this month using very servers designed to prevent the classic type of attack.In early May, website security company Incapsula was able to help fend off a powerful DDoS attack that was launched using high-capacity servers hijacke... Read more

Source: www.scmagazine.com

Top found tags: website(1),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TechEd: Microsoft boosts Azure cloud defences to deter data thieves and cyber saboteursLocation: Microsoft HQ - Redmond, United States
Date published: 12-05-2014

HOUSTON: Microsoft has announced a wealth of security enhancements for its Azure cloud platform, including new in-built anti-malware and Site Recovery services.The services were announced at the opening keynote of Microsoft's TechEd 2014 conference. The anti-malware solution is available in preview... Read more

Source: www.v3.co.uk

Top found tags: vulnerability(2),cybercrime(3),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Avast: Users frequently hitting websites loaded with ransomwareLocation: Ottawa, Ontario, Canada
Date published: 13-05-2014

Fresh statistics from the maker of a widely used free security product show the extent to which users are encountering file-encrypting malware known as ransomware.On Monday, Prague-based Avast said that over the past six weeks, users of its security products landed on websites hosting ransomware mo... Read more

Source: www.techworld.com.au

Top found tags: financial sector(2),Microsoft(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Recent Word Zero-Day Used In Attacks Against Taiwan GovernmentLocation: Trend Micro - Cupertino, United States
Date published: 12-05-2014

Recently patched memory corruption bug in Microsoft Word abused in new targeted attacks tied to an older campaign.A new wave of targeted attacks against Taiwanese government have been spotted abusing Microsoft's just-patched Word zero-day memory corruption flaw (CVE-2014-1761). Microsoft publicly r... Read more

Source: www.darkreading.com

Top found tags: malware(4),cybercrime(9),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kaspersky Lab reports on cyber threats in AfricaLocation: Cape Town, West-Kaap, South Africa
Date published: 13-05-2014

As well as reporting on global IT threats, Kaspersky Lab also presents statistics for Africa in the first quarter of 2014, based on data from Kaspersky Security Network. Algeria leads in terms of local and web threats, well ahead of Egypt in second place. South Africa followed by Kenya saw a signif... Read more

Source: www.biztechafrica.com

Top found tags: vulnerability(2),cybercrime(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'CSI: Cyber' will take crime fighting to the 'dark net'Location: New York, United States
Date published: 12-05-2014

Have you ever experienced the dark web? The scary, mysterious part of the internet where criminals reign anonymously and money moves around without a trace. "That's where our new CSIs are going to be looking for criminals," says Jerry Bruckheimer, executiveproducer of CSI and summer blockbusters li... Read more

Source: www.theverge.com

Top found tags: hacktivism(1),Anonymous(2),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gov't committed to pursue Cyber Security strategyLocation: Accra, Greater Accra, Ghana
Date published: 13-05-2014

The Founder of the e-Crime Bureau, Ghana, Mr. Albert Antwi-Boasiako, has confirmed the governments commitment to introduce a comprehensive National Cyber Security Strategy to arrest cybercrime in the country. In an interview with the Daily Graphic, Mr. Antwi-Boasiako said the strateg... Read more

Source: www.ghanaweb.com

Top found tags: telecom sector(2),government(3),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TrendLabs 1Q 2014 Security Roundup: Cybercrime Hits the UnexpectedLocation: Seoul, South Korea
Date published: 13-05-2014

In what could be the largest breach in retail history, attackers stole the credit and/or debit card information of roughly 40 million customers. In sum, the personal information of 70 million of the retailers customers landed in the attackers hands after they successfully breached its decades... Read more

Source: about-threats.trendmicro.com

Top found tags: South Korea(2),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
S4xJapan: Call For PresentationsLocation: Tokio, Japan
Date published: 13-05-2014

Digital Bond is bringing S4 to Tokyo this October, and we are looking for excellent sessions for the two-day event. The event will be held in English and Japanese with simultaneous translation as appropriate. We welcome your session proposals in English or Japanese as well.OTDay (Tuesday, Oct 14)SC... Read more

Source: www.digitalbond.com

Top found tags: energy(2),smart grid(2),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TrendLabs 1Q 2014 Security Roundup: Cybercrime Hits the UnexpectedLocation: Seoul, South Korea
Date published: 13-05-2014

In what could be the largest breach in retail history, attackers stole the credit and/or debit card information of roughly 40 million customers. In sum, the personal information of 70 million of the retailers customers landed in the attackers hands after they successfully breached its decades... Read more

Source: about-threats.trendmicro.com

Top found tags: South Korea(2),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

NZs Web Drive selects Arbor for protection against DDoS attacksLocation: Arbor Networks - Burlington, United States
Date published: 13-05-2014

New Zealand web hosting and domain names provider Web Drive has selected Arbor Networks cloud DDoS solution to protect its own and customer networks from Distributed Denial of Service attacks. Under the deal, Web Drive has selected Arbor Cloud for multi-layered DDoS protection from the full spec... Read more

Source: www.itwire.com

Top found tags: DoS(2),New Zealand(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gmail Trick: Cut Spam with an Email AliasLocation: New York, United States
Date published: 13-05-2014

If youre anything like me, your Gmail inbox is clogged with countless promotional emails, sales fliers, app reminders and all sorts of other clutter that makes it hard to find the important stuff. Sure, Gmail does a decent job by filtering a lot of this spam for us and giving us a real unsubscri... Read more

Source: www.techlicious.com

Top found tags: spam(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile Threat Monday: PC Porn Ransomware Comes to AndroidLocation: Google HQ - Mountain View, United States
Date published: 12-05-2014

According to Bitdefender, a ransomware app has made the jump from PC to Android. Posing as punishment for viewing porn, this malicious app locks away thehomescreen unless victims fork over some cash.PC users are already familiar with ransomwarea kind of malware that threatens victims until they ... Read more

Source: securitywatch.pcmag.com

Top found tags: malware(4),cybercrime(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Shield your PC from keyloggers with Zemana AntiLogger FreeLocation: New York, United States
Date published: 14-05-2014

Keyloggers are a real malware menace, recording everything you type -- user names, passwords, credit card numbers and more -- for misuse later.Your antivirus software will intercept most keyloggers before they can be installed, of course. Well, hopefully. But if youd like another layer of protec... Read more

Source: betanews.com

Top found tags: cybercrime(2),financial sector(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft shares 2 cybersecurity papers to protect infrastructure and supply chainLocation: Microsoft HQ - Redmond, United States
Date published: 12-05-2014

And they say crime doesn't pay...did you know cybercrime kingpins recruit new employees with incentives like a Ferrari and glamorous female assistants? This might be a good time to review if your company has the best safeguards in place.On the Microsoft Security blog, Kevin Sullivan, Principal Secu... Read more

Source: www.networkworld.com

Top found tags: threat(1),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Crime is Growth Industry in IsraelLocation: Tel Aviv, Israel
Date published: 12-05-2014

In the first quarter of 2014, there were approximately 400,000 malicious code attacks launched against Israel, which was ranked 49th on the list of most dangerous countries for cyber attacks, according to a new cyber-security report by Kaspersky Labs.We dont view it as a major threat despite ... Read more

Source: www.hstoday.us

Top found tags: United States(4),cybercrime(8),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybersecurity business cyberwarfare critical infrastructureLocation: United States Capitol - Washington D.C., United States
Date published: 13-05-2014

A recent simulation, with 350 participants from congressional staffs, the cybersecurity sector, and the U.S. military, examined whether or not Congress was capable of passing a comprehensive cybersecurity legislation to protect the countrys critical infrastructure from debilitating cyberattacks.... Read more

Source: www.homelandsecuritynewswire.com

Top found tags: cyber security(4),United States(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Recommendations for Adding Cybersecurity Intelligence to the Smart GridLocation: ICS-CERT - Alexandria, United States
Date published: 12-05-2014

Over the last few years, there has been an increased effort to modernize the U.S. electric grid. Building a "Smart Grid" has been central in the effort to help utilities better manage their resources, minimize power outages and reduce energy consumption. However, adding more electronic devices and ... Read more

Source: www.circleid.com

Top found tags: cyber security(4),cybercrime(5),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The War on Credit Card FraudLocation: New York, United States
Date published: 12-05-2014

Credit cards have always been known as something of a blessing and a curse, with theft and fraudulent spending often being peoples biggest concern. Particularly given how many transactions now take place in an online environment, recent scandals like the Heartbleed bug which allowed cyber at... Read more

Source: www.nationofchange.org

Top found tags: cybercrime(2),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Data Breach Costs Study: Response, Containment IncreaseLocation: Berlin, Germany
Date published: 12-05-2014

The total average cost of responding, containing and reporting a data breach increased significantly, rising 15 percent to $3.5 million in 2013, according to an annual report that has been tracking expenses for nearly a decade.The Ponemon Institute's Cost of Data Breach Study analyzed data breaches... Read more

Source: www.crn.com

Top found tags: information security(2),Ponemon Institute(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Court Tosses Much of Giant Data Breach LawsuitLocation: San Antonio, United States
Date published: 12-05-2014

A federal district judge has dismissed much of a class action lawsuit filed against the Department of Defense, its TRICARE health insurance program and vendor Science Applications International Corp. following a massive data breach in 2011 that affected 4.7 million individuals including military me... Read more

Source: www.healthdatamanagement.com

Top found tags: United States(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bitly embraces twofactor authentication after data breachLocation: Bitly HQ - New York City, United States
Date published: 12-05-2014

Following criticism over the lack of details provided on last week's data breach, URL shortening service Bitly has finally revealed how hackers were able to compromise user accounts. In a blog post published late on Friday, company CTO Rob Platzer ran through how hackers compromised acc... Read more

Source: www.scmagazineuk.com

Top found tags: cybercrime(3),cyber security(4),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Casino data breach impacts local bankLocation: Iowa, United States
Date published: 12-05-2014

The data breach that impacted the St. Jo Frontier Casino last week continued to cause problems for at least one St. Joseph banking institutions Monday. Representatives from Commerce Bank confirmed Monday afternoon that bank cards and possibly some credit cards were closed after suspicious activi... Read more

Source: www.newspressnow.com

Top found tags: cyber security(2),data breach(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australia statistics bureau in damage control after data breachLocation: Sydney, Australia
Date published: 13-05-2014

May 13 (Reuters) - The Australian Bureau ofStatistics (ABS) said it was engaging an external reviewer toensure it is best placed to maintain data security, just daysafter a staff member was arrested for disclosingmarket-sensitive embargoed information."The review will assess what was leaked and the... Read more

Source: www.reuters.com

Top found tags: survey(1),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bulgarian identity theft victim struggles to persuade authorities he is aliveLocation: Sofia, Bulgaria
Date published: 13-05-2014

A Bulgarian man has been trapped in a bureaucratic hell after falling victim to identity theft which led not only to him being married but also declared dead. Ivan Kantardzhiev was married by alleged fraudsters using fake documents in summer 2013, and the issue of a fake death certifica... Read more

Source: sofiaglobe.com

Top found tags: legislation(1),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Online poker players need to protect themselves from cybercriminalsLocation: New Jersey, United States
Date published: 12-05-2014

If youve spent any time in online poker rooms, youve likely heard about a couple of high-profile attacks targeting players.With cybercrime on the rise, it is only a matter of time before hackers attempt to use malicious software to target poker players, said Brian Corlisse of PokerSites... Read more

Source: www.dailyrecord.com

Top found tags: cyber security(4),financial sector(6),cybercrime(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

U-2s flight plan was like malware to FAA computer systemLocation: Los Angeles, United States
Date published: 12-05-2014

Last weeks failure of a Federal Aviation Administration computer system handling air traffic in the southwestern US was caused by an error that filled the available memory to the system, Reuters reports. Security experts who evaluated the system told Reuters that the flaw could have been used by... Read more

Source: arstechnica.com

Top found tags: report(1),airport(2),airport sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Glenn Greenwald: how the NSA tampers with US-made internet routersLocation: Beijing, China
Date published: 12-05-2014

The NSA has been covertly implanting interception tools in US servers heading overseas even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to HideFor ... Read more

Source: www.theguardian.com

Top found tags: United States(2),government(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Understanding NATOs New Critical Infrastructure Protection-CIP Politics: Common Efforts And SolidarityLocation: NATO - Brussel, Belgium
Date published: 12-05-2014

Energy security is not a call to arms. But when it comes to understanding the security implications of global resource developments, NATO must be ahead of the curve. NATO Secretary General Anders Fogh Rasmussen Introduction Traditional national security policy objectives of modern states depe... Read more

Source: www.hazar.org

Top found tags: Ukraine(1),information sharing(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A perfect introduction into SCADALocation: New York, United States
Date published: 10-05-2014

Have you ever wondered what SCADA is? What it stands for, what it does and why it is being used? Then you need to watch the following video on SCADA.The video which has been released by Eclipse gives you an direct introduction into Supervisory Control and Data Acquisition. Do not wait, ... Read more

Source: cyberwarzone.com

Top found tags: EN(1),SCADA (1),critical infrastructure(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Logan Township crimelog: $6,400 stolen in credit card fraud, police sayLocation: New York, United States
Date published: 12-05-2014

LOGAN TWP. A 45-year-old Milford, Pa. man on May 8 was charged with defiant trespass, harassment and stalking following a reported disturbance at a local Holiday Inn. The man was committed to the Salem County Correctional Facility in default of $7,500 bail. Police on May 8 investigated the t... Read more

Source: www.nj.com

Top found tags: report(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Credit or Debit: Which Offers Better Protection?Location: New York, United States
Date published: 12-05-2014

Where North Texans pump gas is just as critical as what method they use to pay when it comes to protecting their money and bank accounts from crooks. Experts say skimming at gas stations is one of the fastest-growing financial crimes in the country. Gas station skimming happens when would-be thieve... Read more

Source: www.nbcdfw.com

Top found tags: skimming(1),credit card(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mandiri withdraws cards over skimming indicationLocation: Jakarta, DKI Jakarta, Indonesia
Date published: 13-05-2014

State-owned lender Bank Mandiri (BMRI) has begun to withdraw and replace its customers debit cards over indications of skimming, an executive has said.According to Mandiri senior executive vice president for transaction banking Rico Usthavia Frans, the bank started receiving reports ... Read more

Source: www.thejakartapost.com

Top found tags: SMS(1),telecom sector(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Organisaties zijn onvoldoende beschermd tegen malwareLocation: Check Point - Tel Aviv, Israel
Date published: 12-05-2014

Bijna alle organisaties hebben genfecteerde systemen. Bovendien komt er steeds meer malware bij, omdat mensen binnen 58 procent van de organisaties elke twee uur malware downloaden. Dit is gebleken uit het 2014 Security Report van Check Point.Malware infectieMalware is het afgelopen jaar enorm to... Read more

Source: www.marqit.nl

Top found tags: research(1),website(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI wil hackwet via omweg binnensmokkelenLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 12-05-2014

De FBI wil internetcriminaliteit aanpakken door jurisdictie-regels versoepelen. Het verkleinen van bureaucratische rompslomp klinkt goed, maar de reikwijdte van een dwangbevel wordt zo groot dat de FBI zijn eigen malware over een groot aantal systemen kan verspreiden. Jurisdictie-vraagstukken zijn ... Read more

Source: webwereld.nl

Top found tags: police(1),government(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

Microsoft SIR: Windows Vista en 7 vatbaarder voor malware dan XPLocation: Microsoft HQ - Redmond, United States
Date published: 12-05-2014

Uit Microsoft's halfjaarlijkse Security Intelligence Report is op te maken dat systemen met Windows Vista en Windows 7 vaker worden genfecteerd met malware dan het oudere Windows XP. Windows Vista spant met een besmettingspercentage van 3,24 procent de kroon. Van de Windows XP-systemen die nog in... Read more

Source: www.techzine.nl

Top found tags: vulnerability(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish