Under construction

New design coming soon!

CIC News engine statistics

CIC News for 14-05-2014 contains 49 articles: cybercrime(20),cyber security(5),data breach(14),other(10)

CIC News update contains 41 English and 8 Dutch articles for today.
In today's English news articles:
- 15 related to cybercrime
- 5 related to cyber security
- 14 related to data breach and identity theft
- 7 for the category other news

In today's Dutch news articles:
- 5 related to cybercrime
- 0 related to cyber security
- 3 for the category other news

Have fun reading.

English cybercrime related news

Cyber crime - police in West Mercia face nearly 4,000 incidents a yearLocation: Warwick, United Kingdom
Date published: 12-05-2014

POLICE in Worcester are stepping up efforts to tackle cyber crime, including fraud as they declare war on online criminals. Action Fraud, the UKs national fraud and internet crime reporting centre, received 3,898 reports from the West Mercia Police area (which includes Worcestershire and Herefor... Read more

Source: www.bromsgroveadvertiser.co.uk

Top found tags: report(1),spyware(1),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Want 'perfect' security? Then threat data must be sharedLocation: New York, United States
Date published: 13-05-2014

Today we have all kinds of organizations tracking various slices of the threatscape. A concerted effort to pool all that data would form a new bulwark against attack. Here's a surprise for you: We actually have a fairly good understanding of who is attacking us on the Internet and why. Various enti... Read more

Source: www.infoworld.com

Top found tags: Russia(1),spam(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Unintended Consequences of a Japanese/Israeli Defense AgreementLocation: Tokio, Japan
Date published: 13-05-2014

Israeli Prime Minister Benjamin Netanyahu arrived in Japan on Sunday for a five day visit. He met with Japanese Prime Minister Shinzo Abe on Monday, in talks to boost defense and cyberspace cooperation. At a press conference, Netanyahu emphasized their common challenges, specifically the threat fro... Read more

Source: thediplomat.com

Top found tags: cybercrime(2),cyber warfare(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
100 More Filipino Suspects Linked to Sex BlackmailLocation: Interpol - Lyon, France
Date published: 13-05-2014

About 100 more Filipino suspects are linked to online blackmail syndicates that extorted money from victims worldwide after luring them into exposing themselves in front of webcams or engaging in lewd chats, a Philippine police official said Tuesday.Authorities arrested 58 suspects in Manila and th... Read more

Source: abcnews.go.com

Top found tags: government(2),social media(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trend Micro's Q1 Security Roundup Reveals Cybercriminals' Advanced Methods for Executing Attacks on Wide Variety of TargetsLocation: Trend Micro - Cupertino, United States
Date published: 13-05-2014

DALLAS, May 13, 2014 /PRNewswire/ Cybercriminals continuously discover more ways to successfully target new outlets for financial theft as revealed in Trend Micro Incorporated's (TYO: 4704; TSE: 4704) first quarter security roundup for 2014, "Cybercrime Hits the Unexpected." Greed is motivating cyb... Read more

Source: www.broadwayworld.com

Top found tags: United States(2),financial sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile Malware Hits Two Million as Threats MatureLocation: Trend Micro - Cupertino, United States
Date published: 13-05-2014

Trend Micro warns PC-based malware techniques are bleeding over into the mobile world. These include the use of Tor to hide C&C servers and exploitation of vulnerabilities in legitimate apps. The volume of mobile malware and high-risk apps soared to over two million in the first quarter of 2014... Read more

Source: www.infosecurity-magazine.com

Top found tags: Trend Micro(2),vulnerability(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Enormous DNS DDoS attack originates from anti-DDoS service providersLocation: Incapsula HQ - Redwood Shores, United States
Date published: 13-05-2014

Hackers are leveraging anti-DDoS [distributed denial of service] service providers to carry out huge DNS DDoS attacks that are among some of the largest attacks seen for some time.One of the attacks, all of which were spotted by Incapsula, peaked at around 25 million packets per second ... Read more

Source: www.itproportal.com

Top found tags: trend(1),DoS(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
When Security Services Go BadLocation: Incapsula HQ - Redwood Shores, United States
Date published: 13-05-2014

Picture this. A group of high schoolers decide to prank the school by phoning the office and hanging up, over and over. The school's communications come to a halt; nobody can actually get through to the principal. That's a lot like what happens in a Distributed Denial of Service attack. Malefactors... Read more

Source: securitywatch.pcmag.com

Top found tags: DoS(2),United States(2),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Infographic: The Story Of A PhishLocation: New York, United States
Date published: 15-03-2014

Are your employees like Troy, blissfully unaware of the dangers of spear phishing?Spear phishing has gained wide acceptance across the security industry as the majority source of cyber-attacks. How do adversaries develop spear phishing emails? Attackers target specific organizations that offer info... Read more

Source: www.darkreading.com

Top found tags: cybercrime(2),phishing(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firms form cluster to fight cyber threatsLocation: London, United Kingdom
Date published: 14-05-2014

North West firms committed to fighting cyber crime have joined forces to form a cluster to highlight the regions technical expertise and raise security standards. The founding members of the North West Cyber Security Cluster include 11 SMEs with a range of complementary strengths, with support f... Read more

Source: www.lep.co.uk

Top found tags: threat(1),United Kingdom(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Businesses partner for cyber security clusterLocation: New York, United States
Date published: 13-05-2014

A consortium of businesses have joined forces with Lancaster University to form a group to help fight cyber crime.The North West Cyber Security Cluster will enable businesses in the region to use the expertise of a pool of experts with the skills to put in place protective measure to reduce the ris... Read more

Source: www.insidermedia.com

Top found tags: research(1),threat(1),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Journey Into Incident Response: CVE 2013-0074 & 3896 Silverlight Exploit ArtifactsLocation: Microsoft HQ - Redmond, United States
Date published: 13-05-2014

Exploit Artifacts for CVE 2013-0074/3896 (Silverlight) Vulnerabilities Attack Vector Category Exploit Description Two vulnerabilities present in Microsoft Silverlight 5 that in combination enable an attacker to execute arbitary code. CVE 2013-3896 affects Microsoft Silverlight 5 before 5.1.20913.0.... Read more

Source: journeyintoir.blogspot.nl

Top found tags: website(1),vulnerability(2),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Belgian and Dutch law enforcement arrest 12 in voicephishing ringLocation: Brussel, Belgium
Date published: 13-05-2014

A joint investigation between Belgian and Dutch law enforcement authorities, along with help from the European Cybercrime Centre at Europol and Eurojust, has resulted in the arrest of a dozen suspected members of a voice-phishing ring, according to a Tuesday release.In the two-part scheme, the Neth... Read more

Source: www.scmagazine.com

Top found tags: cybercrime(3),The Netherlands(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Iranian Hackers Target US Defense ContractorsLocation: Teheran, Iran
Date published: 13-05-2014

An Iranian hacking group has moved from politically motivated website defacements to a new specialty cyberespionage.The group known as the Ajax Security Team has been outed as the perpetrators of a number of espionage operations against U.S.-based defense contractors in addition to targeting Ir... Read more

Source: threatpost.com

Top found tags: United States(2),cybercrime(3),cyber espionage(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New browser hijacker/click fraud malware threatens Windows usersLocation: Microsoft HQ - Redmond, United States
Date published: 14-05-2014

In its latest Security Intelligence Report, Microsoft has noted that malware designed to make money for the attacker via click fraud, performing Bitcoin mining, and redirecting search results, has been plentiful in the last quarter of 2014. Cyber crooks seem to love that type of malware... Read more

Source: www.net-security.org

Top found tags: Microsoft(2),social engineering(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

REUTERS SUMMIT-Cyber experts warn Iranian hackers becoming more aggressiveLocation: Teheran, Iran
Date published: 13-05-2014

May 13 (Reuters) - Iranian hackers have becomeincreasingly aggressive and sophisticated, moving fromdisrupting and defacing U.S. websites to engaging in cyberespionage, security experts say.According to Silicon Valley-based cybersecurity companyFireEye Inc, a group called the Ajax Security Team has... Read more

Source: www.reuters.com

Top found tags: cyber espionage(4),cyber security(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GCHQ's spy malware operation faces legal challengeLocation: National Security Agency - Fort Meade, United States
Date published: 13-05-2014

Privacy International claims development of programs that remotely hijack computer cameras and microphones is illegal.GCHQ, the government's monitoring agency, acted illegally by developing spy programs that remotely hijack computers' cameras and microphones without the user's consent, ... Read more

Source: www.theguardian.com

Top found tags: telecom sector(4),United States(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
4 IT Security Stories to Watch: Heartbleed Bug, Symantec on AntivirusLocation: Microsoft HQ - Redmond, United States
Date published: 12-05-2014

Can the Heartbleed security bug be stopped? Is antivirus software "dead"? How will Microsoft (MSFT) fully patch the Internet Explorer (IE) security vulnerability? Several questions top this week's IT security stories for managed service providers (MSPs) to watch, which means it should be a busy wee... Read more

Source: mspmentor.net

Top found tags: cybercrime(2),cyber security(2),Internet Explorer(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SNMP could be the future for DDoS attacksLocation: New York, United States
Date published: 13-05-2014

DNS amplification and NTP reflection are two big buzz-terms in the modern world of distributed denial-of-service (DDoS) attacks, but whensuccessful defensive measures force those wells to run dry, a lesser-used reflection attack vector, known as Simple Network Management Protocol (SNMP), could take... Read more

Source: www.scmagazine.com

Top found tags: cyber security(2),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GCHQ's 'NOSEY SMURF' spyware snoops dragged into secretive tribunalLocation: London, United Kingdom
Date published: 14-05-2014

Privacy International has launched a legal bid to stop GCHQ and British intelligence agents from "unlawfully" spying on Brits using malware.Its complaint [PDF] to the UKs Investigatory Powers Tribunal is a formal challenge to snoops' use of malicious software and hacking to surveil people. The c... Read more

Source: www.theregister.co.uk

Top found tags: United Kingdom(6),government(10),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Cybercrime Threat a Growing Concern: PoliceLocation: Jakarta, DKI Jakarta, Indonesia
Date published: 13-05-2014

Jakarta. The chief of the National Police and the head of the Indonesian financial watchdog said cybercrime in Indonesiaremained a significant challenge as Internet use in the countrycontinued to grow.Do not be overconfident, Gen.Sutarman said at a panel discussion in Jakarta on Tuesday. I... Read more

Source: www.thejakartaglobe.com

Top found tags: government(2),cybercrime(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach detection and remediation share spotlight at InfoSecLocation: New York, United States
Date published: 13-05-2014

The volume and variety of cybersecurity attacks alongside the need for organizations to defend against the types of targeted, advanced persistent threats (APTs) that are now seen as commonplace changed the way that security vendors presented their wares at InfoSec 2014.The show had much less of a f... Read more

Source: www.appstechnews.com

Top found tags: cybercrime(4),cyber security(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Data Breach Isn't the Only Reason Target's CEO ResignedLocation: Target HQ - Minneapolis, United States
Date published: 13-05-2014

The departure of Target CEO Gregg Steinhafel last week had many proclaiming that it was because of the massive data breach the retailer suffered late last year. It's important to note, however, that there were other factors at play, such as Target's recent performance as a business. ''It sends a ve... Read more

Source: www.latinpost.com

Top found tags: data breach(2),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The cost of a data breach in 2014: $3.5 million, Ponemon study saysLocation: IBM HQ - Armonk, United States
Date published: 13-05-2014

2013 was an interesting year in security, with some fairly high-profile data breaches making the news In December 2013, news broke that U.S. retail giant Target Corp. had suffered a major breach, losing the personal information of 40 million credit and debit card holders. And in October 2013, Adobe... Read more

Source: www.itworldcanada.com

Top found tags: financial sector(2),Ponemon Institute(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2010 data breach resolved in largest HIPAA settlement ever ($4.8 million)Location: New York City, New York, United States
Date published: 13-05-2014

New YorkPresbyterian Hospital and Columbia University have reached settlement agreements with the Federal Office for Civil Rights that together represent the largest HIPAA settlement ever $4.8 million in total. The agreements resolve charges involving a 2010 data breach that reportedly expos... Read more

Source: www.lexology.com

Top found tags: data breach(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breaches: The best defence is good offenceLocation: Target HQ - Minneapolis, United States
Date published: 13-05-2014

Learning from the mistakes of the Target data breach The Target credit card data breach has generated enormous interest in the issue of Cyber security. A quick Google search for the terms Target Data Breach yields more than 28m hits. The sheer volume of results reflect the impact of the breac... Read more

Source: www.channelpro.co.uk

Top found tags: data breach(2),financial sector(2),ISP(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to combat spear phishing: the cybercriminals weapon of choiceLocation: New York, United States
Date published: 13-05-2014

Over the past few years, people have come to expect standard phishing attacks. Not only are we suspicious of emails from people we dont know, today we even suspect perfectly legitimate emails from the likes of PayPal and Amazon.Besides the advancing knowledge and savviness of consumers, the majo... Read more

Source: www.information-age.com

Top found tags: phishing(3),cybercrime(8),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Two NYU College of Dentistry employees busted last year for stealing and misusing patient credit card informationLocation: New York, United States
Date published: 12-05-2014

Larry Celona and Christina Carrega-Woodby report:A marijuana bust led police to uncover a massive identity theft operation that officials at the prestigious university tried to hush up, law enforcement sources told The Post.Joel Scott and James Giscombe Jr., who work with patients treated at the sc... Read more

Source: www.phiprivacy.net

Top found tags: government(3),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Enterprises Faced with Analyzing 10K Security Events Per DayLocation: Damballa - Atlanta, United States
Date published: 13-05-2014

Think the IT department has a handle over the security landscape within a company? Think again: new research has revealed that devices in a typical companys network are generating a staggering aggregate average of 10,000 security events per day, with the most active generating around 150,000 eve... Read more

Source: www.infosecurity-magazine.com

Top found tags: Damballa(2),data breach(2),Ponemon Institute(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Instagram scam could lead to identity theftLocation: Instagram - Menlo Park, United States
Date published: 13-05-2014

COLUMBIA, SC (WACH) - A fake page has been created in the name of Solomon Jackson, Jr. on Instagram saying it will give a $1,000 scholarship to the first 100k followers of the page.Jackson is a 2009 $259 million lottery winner, but as innocent as the instructions to receive the so called scholarshi... Read more

Source: www.wach.com

Top found tags: financial sector(2),identity theft(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bulk of Data-Breach Suit Against Feds TossedLocation: New York, United States
Date published: 13-05-2014

WASHINGTON (CN) - A data breach may have compromised the personal information and medical records of millions of military members, but most plaintiffs who filed suit don't have a legal leg to stand on, a federal judge ruled.U.S. District Judge James Boasberg threw out all but two plaintiffs i... Read more

Source: www.courthousenews.com

Top found tags: health sector(4),medical sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Next Startup Frontier: Credit Card FraudLocation: New York, United States
Date published: 13-05-2014

Credit card fraud is expensive. The latest figures peg total losses due to identity theft at $24.7 billion--$10 billion more than all other property crimes combined. But for companies marketing new ideas to thwart or even prevent credit card fraud, the market can be very lucrative.For years, credit... Read more

Source: www.fastcompany.com

Top found tags: airport(4),airport sector(4),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Future of Crime: 8 Cyber-Crimes to Expect in Next 20 YearsLocation: National Security Agency - Fort Meade, United States
Date published: 14-05-2014

Forget everything you think you know about crime. In the next 20 years, traditional crime as we know it today will be largely replaced by cyber-crime.In fact, this is already happening. Take bank robberies: According to the American Bankers Association, bank robberies are being steadily repla... Read more

Source: www.foxbusiness.com

Top found tags: United States(4),financial sector(6),cybercrime(13)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Most UK office workers suspicious of the InternetLocation: New York, United States
Date published: 13-05-2014

14% of us have been badly affected by cybercrime, PhishMe study finds. More than half of UK office workers have admitted to not knowing which websites to trust when it comes to using the Internet, a new survey has revealed.A study by security provider PhishMe found that 60% of workers find it diffi... Read more

Source: www.cbronline.com

Top found tags: financial sector(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

97 percent of popular illegal download sites contain malware and scamsLocation: London, United Kingdom
Date published: 13-05-2014

Nearly all of the most popular websites offering illegal downloads of films and television programmes contain malware or credit card scams, according to research.A report by FindAnyFilm.com revealed that 97 percent of the most visited sites contained these bogus features, and thre... Read more

Source: business-technology.co.uk

Top found tags: credit card(2),financial sector(2),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Droid malware cloak outwits Google Bouncer and friendsLocation: Google HQ - Mountain View, United States
Date published: 13-05-2014

Google's Bouncer Android defence tool is one of a dozen malware detection platforms that can be flawlessly skirted by malware employing smarter heuristics, researchers have found.Malware kitted out with virtual machine detection functions and clever heuristics could bypass seemingly any detection p... Read more

Source: www.theregister.co.uk

Top found tags: mobile device(2),Google(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Upland police seeking women in credit card fraud caseLocation: Ontario, Canada
Date published: 13-05-2014

UPLAND -- Police on Tuesday released surveillance photos of several women suspected of using stolen credit cards to make purchases at stores in Montclair, Ontario and Glen Avon.A man reported to Upland police that four of his credit cards had been used fraudulently. He had discovered on April 18 th... Read more

Source: www.dailybulletin.com

Top found tags: credit card(2),financial sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Victor woman charged with installing spywareLocation: Superior Court - Phoenix, United States
Date published: 14-05-2014

A Victor woman pleaded not guilty Tuesday to charges that she broke into her ex-boyfriends King County, Wash., home and attempted to place spyware on his computer.Brenda Kay Jurgens was arraigned on burglary and criminal trespass charges in King County Superior Court.Court records said Jurgens w... Read more

Source: ravallirepublic.com

Top found tags: malware(1),report(1),spyware(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malaysia Skimmers Hit Local ATMs AgainLocation: Jakarta, DKI Jakarta, Indonesia
Date published: 14-05-2014

Jakarta. Police in Indonesia have traced to Malaysia an ATM hacking spree in which scores of customers at Bank Mandiri have had funds siphoned from their accounts, in a scam similar to one targeting BCA customers earlier this year.At present there are around 100 customers we know of who have los... Read more

Source: www.thejakartaglobe.com

Top found tags: skimming(1),telecom sector(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police Seek Help Identifying Credit Card Fraud SuspectsLocation: New York, United States
Date published: 13-05-2014

Police are asking help identifying two women who stole credit card numbers and then made purchases at various retail stores with fake credit cards. The magnetic strip on the cards they use don't work, so they ask the clerks to punch in the numbers manually. The charges go to some poor unsuspecting ... Read more

Source: www.khvhradio.com

Top found tags: credit card(2),financial sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA Spying Activities Supposedly Include Installing Spyware On HardwareLocation: National Security Agency - Fort Meade, United States
Date published: 14-05-2014

Reports have indicated that National Security Agency or NSA spying activities include the planting of backdoors and spyware on servers, routers and similar computer network devices before they are delivered outside the United States.The supposed interception of hardware by the NSA was revealed thro... Read more

Source: empowerednews.net

Top found tags: government(5),United States(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

T-Systems introduceert de cyber incident-simulatieLocation: Amsterdam, The Netherlands
Date published: 13-05-2014

T-Systems introduceert de cyber incident-simulatie. Met deze nieuwe managementtool kunnen bedrijven hun weerbaarheid tegen cyberaanvallen toetsen. Het doel is om directies bewuster te maken van de impact die cybercriminaliteit heeft op de bedrijfsvoering.T-Systems is specialist op het gebied van IT... Read more

Source: www.dutchitchannel.nl

Top found tags: cyber attack(2),cyber security(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hack Buitenlandse Zaken: een blik op de Russische undergroundLocation: Ministry of Foreign Affairs - Den Haag, The Netherlands
Date published: 13-05-2014

De medewerkers van Buitenlandse Zaken kunnen opnieuw online nu het virus Snake van hun computers en het netwerk is gehaald. De malware zou afkomstig zijn uit Rusland, en dat verbaast Rik Ferguson, hoofd security research van Trend Micro, niet.Ferguson verwijst naar de Uroburos-malware, met het beel... Read more

Source: newsmonkey.be

Top found tags: Trend Micro(2),United States(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bedrijven halen gemiddeld iedere 27 minuten een onbekende malware-variant binnenLocation: Check Point - Tel Aviv, Israel
Date published: 13-05-2014

Beveiliging is belangrijk. Hoe belangrijk dit precies is blijkt uit cijfers over de hoeveelheid malware die bedrijven voor hun kiezen krijgen. Binnen de gemiddeld organisatie wordt iedere tien minuten malware gedownload naar een systeem. Iedere 27 minuten gaat het om een onbekende malware-variant, ... Read more

Source: infosecuritymagazine.nl

Top found tags: website(1),cybercrime(2),report(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Geavanceerde Snake-rootkit besmette Belgisch ministerieLocation: Ministry of Foreign Affairs - Den Haag, The Netherlands
Date published: 13-05-2014

Een zeer geavanceerde rootkit genaamd Snake heeft computers van het Belgische Ministerie van Buitenlandse Zaken genfecteerd. Dat laten bronnen aan de Belgische krant De Standaard weten. Vorige week werd bekend dat aanvallers via de malware documenten over de Oekraine hadden gestolen.Nu blijkt dat... Read more

Source: www.security.nl

Top found tags: Windows(1),cybercrime(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'CIA tipte Belgi over Russische hack'Location: Ministry of Foreign Affairs - Den Haag, The Netherlands
Date published: 14-05-2014

De CIA zou de Belgische militaire inlichtingendienst ADIV hebben gewaarschuwd dat systemen van het ministerie van Buitenlandse Zaken door Russen werden gehackt. Dat meldt Vlaamse krant De Standaard op basis van "goedgeplaatste bronnen". Eerder werd gensinueerd dat Belgi de hack zelf... Read more

Source: www.nu.nl

Top found tags: NL(1),Russia(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

'NSA installeert spyware op routers en servers uit VS'Location: National Security Agency - Fort Meade, United States
Date published: 13-05-2014

De Amerikaanse geheime dienst NSA ontvangt en onderschept hardware zoals routers en servers die in de Verenigde Staten worden gemaakt om er spionagesoftware op te installeren. Dat schrijft de Britse krant the Guardian op basis van documenten die Glenn Greenwald in zijn boek over klokken... Read more

Source: www.nu.nl

Top found tags: United Kingdom(2),government(3),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Belgian Cyber Security Guide vertaaldLocation: Brussel, Belgium
Date published: 14-05-2014

Deze handige en toegankelijke cyberveiligheidsgids voor bedrijven kan na de Engelstalige versie nu ook in het Nederlands en Frans worden verkregen.In deze woelige tijden rond informatiebeveiliging kunnen alle bedrijven, en in het bijzonder de kleinere bedrijven, best wat advies gebruike... Read more

Source: datanews.knack.be

Top found tags: Belgium(1),Microsoft(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Apple iCloud schendt Noorse en Europese wet'Location: Brussel, Belgium
Date published: 14-05-2014

Apple verschaft zichzelf het recht de voorwaarden van clouddienst iCloud te allen tijde aan te passen. Dat is in strijd met de Noorse en Europese wet. Gebruikers van iCloud hebben daarom praktisch gezien geen rechten, zegt Noorse consumentenwaakhond Forbrukerrdet."Apple biedt zijn gebruikers aan ... Read more

Source: www.nutech.nl

Top found tags: NL(1),research(1),European Commission(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish