Under construction

New design coming soon!

CIC News engine statistics

CIC News for 15-05-2014 contains 46 articles: cybercrime(20),cyber security(7),data breach(9),other(10)

CIC News update contains 42 English and 4 Dutch articles for today.
In today's English news articles:
- 17 related to cybercrime
- 7 related to cyber security
- 9 related to data breach and identity theft
- 9 for the category other news

In today's Dutch news articles:
- 3 related to cybercrime
- 0 related to cyber security
- 1 for the category other news

Have fun reading.

English cybercrime related news

Cybercrime rises 168% in just one yearLocation: Mumbai, India
Date published: 14-05-2014

MUMBAI: A global cybercrime syndicate's bizarre 'employee of the month' competition, in which a Ferrari has been offered for a blueprint of the best online scam, made headlines earlier this week. Closer home, cybercrime has seen an alarming 168% rise in just a year. From 63 in 2012, the number of c... Read more

Source: timesofindia.indiatimes.com

Top found tags: government(2),telecom sector(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Egypt ranks third regionally in number of malware detections in Q1 2014 - Daily News EgyptLocation: Kaspersky HQ - Moscow, Russia
Date published: 14-05-2014

Egypt has landed the third position in the number of malware detections among the Middle East countries during the first quarter (Q1) of 2014, vendor of endpoint protection solutions Kaspersky Lab indicated in a report issued Tuesday.Altogether in the first quarter of 2014 in the Middle East, Ka... Read more

Source: www.dailynewsegypt.com

Top found tags: telecom sector(2),Kaspersky Lab(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TechEd: Microsoft bets on Windows Phone 8.1 security to beat iOS and AndroidLocation: Microsoft HQ - Redmond, United States
Date published: 14-05-2014

HOUSTON: The security around the Apple iOS and Google Android operating systems is not good enough for most businesses' needs, according to Microsoft product manager Chris Hallum.Hallum highlighted Windows Phone's low malware levels as proof of the platform's superiority over Android in an intervie... Read more

Source: www.v3.co.uk

Top found tags: trojan(2),cybercrime(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime unit tackles digital crime at the 'leading edge' of policingLocation: Calgary, Canada
Date published: 14-05-2014

When someone emailed a Calgary fire station last June threatening to shoot more than a thousand people at the Stampede, officials knew who to call.The Calgary Police Services Cybercrime Support Team has been operating since last January, with six tech-savvy officers.Because most people have digi... Read more

Source: www.calgaryherald.com

Top found tags: government(2),social media(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime: a growing concern in CalgaryLocation: Calgary, Canada
Date published: 14-05-2014

The Calgary Police Service is dealing with more online crime then ever before.Last January, it developed the Cybercrime Support Team to assist the Tech Crime Unit in their investigations into internet-based crime.Unlike the Tech Crime Unit; which deals with hardware on computers or data on cell pho... Read more

Source: www.660news.com

Top found tags: EN(1),cybercrime(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI official says cyber crime crackdown coming soonLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 15-05-2014

(Reuters) - The FBI is getting more aggressive in pursuing cyber criminals and hopes to announce searches, indictments and multiple arrests over the next several weeks, the agency's official in charge of combating cyber crime said on Wednesday.There is a philosophy change. If you are going to at... Read more

Source: in.reuters.com

Top found tags: FBI(1),government(1),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government yet to sanction second cyber police stationLocation: New York, United States
Date published: 14-05-2014

MUMBAI: Though cyber crime has grown alarmingly in the city, the state government is yet to grant Mumbai Police's request for a second cyber police station. In June 2013, the police wrote to the government for sanctioning a proposal for a cyber police station in the suburbs along the l... Read more

Source: timesofindia.indiatimes.com

Top found tags: police(2),cybercrime(3),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime is a priority for police chiefLocation: London, United Kingdom
Date published: 14-05-2014

Improving road safety and understanding the growing problem of cyber crime are top priorities for West Yorkshires Police and Crime Commissioner over the next 12 months. Commitments around crime prevention and reducing reoffending and the impact of welfare reform on crime are also in Mark Burns-W... Read more

Source: www.dewsburyreporter.co.uk

Top found tags: police(1),threat(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is enough being done to keep UK critical infrastructure secure?Location: Singapore
Date published: 15-05-2014

Duncan Fisken asks whether critical infrastructure interdependencies are being effectively addressed. A recent US Department of Justice ruling that sharing threat data does not constitute antitrust violations, has opened the door to increased security for utilities in that country. But what about e... Read more

Source: continuitycentral.com

Top found tags: process control system(3),telecom sector(4),critical infrastructure(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why Hackers Take Down Sites (and How to Protect Yourself)Location: New York, United States
Date published: 14-05-2014

Why do the Bad Guys try to take down our websites?In my (admittedly limited) experience with hacking, the main result of a denial of service attack seems to be annoyance on a wide scale. Blameless users simply trying to accomplish a routine task (such as order a product or read a blog) are unable t... Read more

Source: www.business2community.com

Top found tags: website(1),DoS(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anti-DDoS servers used to launch DDoS attackLocation: Ottawa, Ontario, Canada
Date published: 15-05-2014

The attack threw around 25 million packets of data at the victim's server per second Infrastructure designed to protect organisations against DDoS attacks has been subverted and used carry out out the attacks it was trying to stop on an unnamed online gaming company.The attack was launched from ser... Read more

Source: www.itpro.co.uk

Top found tags: threat(1),trend(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Want 'perfect' security? Then threat data must be sharedLocation: New York, United States
Date published: 13-05-2014

Today we have all kinds of organizations tracking various slices of the threatscape. A concerted effort to pool all that data would form a new bulwark against attack.Here's a surprise for you: We actually have a fairly good understanding of who is attacking us on the Internet and why. V... Read more

Source: podcasts.infoworld.com

Top found tags: trend(1),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware Stays One Step Ahead of the POS Good GuysLocation: New York, United States
Date published: 15-05-2014

If it is your job to prevent malware attacks against a point of sale system, it has undoubtedly been a long year. In breach after breach, cyber-criminals get into a corporate server and then stay around. In the case of both the Neiman and Michaels breaches, the attacker had access to the victims... Read more

Source: www.pymnts.com

Top found tags: skimming(1),financial sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminals targeting unlikely sources to carry out high-profile exploitsLocation: Trend Micro - Cupertino, United States
Date published: 15-05-2014

Cybercriminals continuously discover more ways to successfully target new outlets for financial theft, according to Trend Micro. Greed is motivating cybercriminals to take a non-traditional approach in the selection of unlikely targets, such as advanced threats to Point-of-Sale (PoS) terminals and ... Read more

Source: www.net-security.org

Top found tags: United States(2),financial sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android-App Weaknesses Go From Bad To Worse, To Flappy BirdLocation: Google HQ - Mountain View, United States
Date published: 15-05-2014

Malicious apps, dodgy copies of Flappy Bird... Malware. It's just another day inside Google Play It shouldnt really surprise us when Android-based weaknesses are detailed by security researchers. It seems to happen almost every week. Yet its still depressing.The latest problems re... Read more

Source: www.knowyourmobile.com

Top found tags: Trend Micro(2),trojan(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI plans crackdown on cyber crime, arrests coming in weeksLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 15-05-2014

The FBI is getting more aggressive in pursuing cyber criminals and hopes to announce searches, indictments and multiple arrests over the next several weeks, the agency's official in charge of combating cyber crime said on Wednesday. Robert Anderson Jr. told the Reuters Cybersecurity Summit in Washi... Read more

Source: voiceofrussia.com

Top found tags: hacktivism(1),LulzSec(1),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TechEd: Microsoft says Tor cannot stop PRISM snoops and cyber crooksLocation: Microsoft HQ - Redmond, United States
Date published: 15-05-2014

HOUSTON: The Tor network can not protect web users from cyber criminals and state hackers, according to a top Microsoft security expert.Andy Malone, Microsoft most valued professional in enterprise security and founder of the Cyber Crime Security Forum, said that despite the robust nature of the To... Read more

Source: www.v3.co.uk

Top found tags: cybercrime(5),government(8),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

UK court slams weak spyware investigationLocation: Berlin, Germany
Date published: 14-05-2014

A UK firm has been selling software to dictatorships to help them track down opposition activists. Now the rights group Privacy International has scored a legal victory that may - one day - curb the trade.On Monday (12.05.2014), the UK High Court ruled that Her Majesty's Revenue and Cus... Read more

Source: www.dw.de

Top found tags: spyware(2),United Kingdom(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New South Wales' top cybercrime cop talks to Vulture SouthLocation: London, United Kingdom
Date published: 14-05-2014

AUSCERT It seems odd that a veteran hard-nosed, clean-cut cop who cut teeth fighting triads and outlaw bikie gangs across Sydney would apply for a job running the state's cybercrime police division, and even more bizarre that he would get it.But sometime in his younger years before the then champio... Read more

Source: www.theregister.co.uk

Top found tags: police(2),cybercrime(5),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Email Attackers Switch to Blitzkrieg Tactics to Maximize ImpactLocation: New York, United States
Date published: 14-05-2014

Agari TrustIndex reports cyber gangs are increasingly 'weaponizing' their malicious emails with sophisticated threats Cybercriminals are maturing their weaponization of email borne attacks, with sophisticated malware and blitzkrieg attacks designed to steal personal information, extort ... Read more

Source: www.infosecurity-magazine.com

Top found tags: financial sector(4),malware(5),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Uncle DDoSd, Talking TVs and a HugLocation: NCC Group - Manchester, United Kingdom
Date published: 14-05-2014

Information security is one of those areas where a lot is always happening. From breaches to vulnerabilities to scams to anything else thats designed to store, protect or even attack and pilfer our sensitive information, information security encompasses a lot of things. A Three Ring Circus, Thre... Read more

Source: www.sys-con.com

Top found tags: cyber security(4),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New NSA Chief expects attacks attempting to damage, destroy critical infrastructureLocation: National Security Agency - Fort Meade, United States
Date published: 14-05-2014

Were you hoping a new NSA director might help turn the tide in a way that would be good for privacy? If his early comments are any indication, then you'll likely be disappointed. In his first interview since taking over at the NSA and U.S. Cyber Command, Admiral Mike Rogers pledged to be more "cand... Read more

Source: www.networkworld.com

Top found tags: U.S. Cyber Command(3),government(7),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Email Attackers Switch to Blitzkrieg Tactics to Maximize ImpactLocation: New York, United States
Date published: 14-05-2014

Agari TrustIndex reports cyber gangs are increasingly 'weaponizing' their malicious emails with sophisticated threats Cybercriminals are maturing their weaponization of email borne attacks, with sophisticated malware and blitzkrieg attacks designed to steal personal information, extort ... Read more

Source: www.infosecurity-magazine.com

Top found tags: financial sector(4),malware(5),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Windows XP Exploit Protection Tested, Winners RevealedLocation: Microsoft HQ - Redmond, United States
Date published: 15-05-2014

I collect and analyze test results from a half-dozen antivirus test labs all over the world. Most of them run a regular cycle, releasing new results monthly, quarterly, or at other intervals. Security vendors can also commission one-off tests, which seem to invariably show them in a good light. Tha... Read more

Source: securitywatch.pcmag.com

Top found tags: cyber security(2),Kaspersky Lab(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

New center will allow retailers to share information about cybercrimes, potential threats - 5/14/2014 1:49:22 PMLocation: New York City, New York, United States
Date published: 14-05-2014

NEW YORK (AP) Some of the country's largest retailers are banding together in hopes of protecting consumers' personal and financial information from hackers and thieves. The Retail Industry Leaders Association, along with several top retailers ranging from Gap Inc. to Walgreen Co., ... Read more

Source: www.newser.com

Top found tags: threat(1),data breach(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Retail giants and trade group team up to prevent data breachesLocation: Target HQ - Minneapolis, United States
Date published: 14-05-2014

Retail heavyweights such as J.C. Penney Co., Gap Inc., Nike Inc. and Walgreen Co. are joining forces with the Retail Industry Leaders Assn. to try to protect the industry from hackers and other cybercriminals.On Wednesday, the companies and the trade group launched an intelligence-sharing center de... Read more

Source: www.latimes.com

Top found tags: United States(2),cybercrime(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Retailers Launch Cyber Crime Info SharingCenterLocation: Target HQ - Minneapolis, United States
Date published: 14-05-2014

NEW YORK (CBSMiami/AP) Some of the nations largest retailers are teaming up in hopes of preventing cyber-crime.On Wednesday, the Retail Industry Leaders Association, along with several top retailers ranging from Gap Inc. to Walgreen Co., launched an intelligence sharing center focused on pro... Read more

Source: miami.cbslocal.com

Top found tags: information sharing(2),United States(2),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI plans crackdown on cyber crime, with arrests imminentLocation: Center for Strategic and International Studies - Washington, United States
Date published: 15-05-2014

The Federal Bureau of Investigation will aggressively crack down on cyber crime over the next few weeks, with a bureau official advising the public to anticipate indictments, searches, and multiple arrests. Robert Anderson Jr. told the Reuters Cybersecurity Summit in Washington on Wednesday that th... Read more

Source: rt.com

Top found tags: United States(2),government(5),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US slow to adopt tech that prevents credit card fraudLocation: New York, United States
Date published: 15-05-2014

RALEIGH, N.C. - Last year's data breach at Target left between 70 and 110 million customers vulnerable to identify theft. And after similar breaches at Michaels and Neiman Marcus occurred, experts now say that kind of fraud is rising.Credit and debit card fraud is up 70 and 80 percent in the United... Read more

Source: www.wncn.com

Top found tags: update(2),financial sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Manual detection of malware activity is impossibleLocation: Damballa - Atlanta, United States
Date published: 14-05-2014

An average companys network generates about 10,000 security events per day, while the active ones generate around 150,000 events, which could mask a targeted attack. It could be impossible to deal with It threats, with companies' networks generating an avalanche of security events that could be ... Read more

Source: www.cbronline.com

Top found tags: Damballa(2),data breach(2),ISP(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Steps to protect against identity theftLocation: Experian HQ - Dublin,Ireland
Date published: 15-05-2014

About 16.6 million Americans or 7 percent of the population fell victim to identity theft in 2012, according to a December 2013 report from the U.S. Department of Justice. One form of identity theft involves criminals stealing personal information and opening accounts, borrowing... Read more

Source: www.heraldnet.com

Top found tags: Department of Justice(3),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach notification laws meet the rising tide of cybercrimeLocation: Alaska, United States
Date published: 15-05-2014

Given the unrelenting onslaught of cyber attacks peppering the news, it is a good time for inside counsel to brush up on the laws designed to address data breaches. In a prior column, I discussed potential theories of civil liability for data breaches. Here, we take a birds eye view of state law... Read more

Source: www.insidecounsel.com

Top found tags: government(3),cybercrime(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Breach Exposes 3,500 New Zealand Dentists' Personal InformationLocation: Wellington, New Zealand
Date published: 15-05-2014

Names, titles, home addresses, phone numbers, email addresses, user names and passwords were exposed. 3 News reports that the personal information of approximately 3,500 members of the New Zealand Dental Association (NZDA) appears to have been accessible online for more than a year (h/t... Read more

Source: www.esecurityplanet.com

Top found tags: data breach(2),New Zealand(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

NIST Proposes Guidelines For More Secure IT SystemsLocation: National Institute of Standards - Gaithersburg, United States
Date published: 14-05-2014

Recommendations infuse security practices into cradle-to-grave IT and software engineering processes for both private and public-sector IT systems.The National Institute of Standards and Technology has released an initial public draft of security guidelines for developing "more defensib... Read more

Source: www.informationweek.com

Top found tags: government(2),NIST(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Elster Releases Smart Grid Security InfographicLocation: Elst, Rhenen, Utrecht, The Netherlands
Date published: 14-05-2014

RALEIGH, N.C., May 14, 2014 /PRNewswire/ -- Elster Solutions today announced the availability of a new infographic focused on simplifying the key components of advanced metering infrastructure (AMI) security. "AMI is a complex system, and its bidirectional communications and power measu... Read more

Source: www.digitaljournal.com

Top found tags: infographic(1),energy(2),smart grid(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police arrest several in connection with international credit card fraud ringLocation: New York, United States
Date published: 15-05-2014

TUCSON(KGUN9-TV) - The Tucson Financial Crimes Task Force has arrested six people in connection with an international credit card fraud ring.Sgt. Pete Dugan told KGUN9 the investigation began at the beginning of March, with a man using a fraudulent credit card at the Tucson Mall. After questioning ... Read more

Source: www.jrn.com

Top found tags: mobile device(2),telecom sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sift Science Lands $18M Series B From Spark Capital To Stop Credit Card FraudLocation: Abuja, Nigeria
Date published: 14-05-2014

Today Sift Science, a credit card fraud prevention company, has closed an $18 million Series B round of funding led by Spark Capital, with participation from Union Square Ventures, Max Levchin, and First Round Capital.But what exactly is Sift Science?If you own a credit card, you probably understan... Read more

Source: techcrunch.com

Top found tags: credit card(2),financial sector(2),Nigeria(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New York Man Admits To Role In $200 Million Credit Card Fraud ConspiracyLocation: New York City, New York, United States
Date published: 14-05-2014

(Newsroom America) -- A New York man has admitted his role in one of the largest credit card fraud schemes ever charged by the Justice Department.Khawaja Ikram, 41, of Staten Island, New York, pleaded guilty before U.S. District Judge Anne E. Thompson in Trenton federal court to an information char... Read more

Source: www.newsroomamerica.com

Top found tags: medical sector(2),United States(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rowlett Police investigate credit card fraud ringLocation: New York, United States
Date published: 14-05-2014

The Rowlett Police Department is investigating a credit card fraud ring. Members of the ring obtain victims credit card information and use it to make fraudulent cards, the group then uses the credit card information to make large purchases at local retail stores throughout the DFW area. During ... Read more

Source: starlocalmedia.com

Top found tags: police(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Journalist: NSA Planting SpywareLocation: National Security Agency - Fort Meade, United States
Date published: 14-05-2014

A journalist says the NSA is planting backdoor spyware in American-made computer devices before they are shipped overseas.Glenn Greenwald penned "No Place to Hide," In the book, he says the devices planted include routers and other networking hardware.Greenwald is a reporter... Read more

Source: www.local15tv.com

Top found tags: government(2),malware(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sift raises $18 M To Fight Credit Card FraudLocation: Abuja, Nigeria
Date published: 15-05-2014

Sift, a company that prides itself on forgetting the rules to fight data fraud, has just closed an $18 million Series B round of funding led bySpark Capital, with participation from Max Levchin,Union Square Ventures and First Round Capital. Sift helps merchants identify credit card fraud in r... Read more

Source: www.pymnts.com

Top found tags: credit card(2),financial sector(2),Nigeria(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firms experiencing drastic increase in new malicious softwareLocation: New Delhi, India
Date published: 15-05-2014

Washington, May 15 (ANI): Destructive software has been found to be reeling into organizations forcing them to lose their important data.Based on Check Point's 2014 Security Report which is made on an analysis of monitored network traffic from more than 9,000 Threat Prevention gateways across compa... Read more

Source: www.aninews.in

Top found tags: report(1),threat(1),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Cybercrime update: social engineering-techniekenLocation: Amsterdam, The Netherlands
Date published: 15-05-2014

Eerder deze week presenteerden we al de eerste uitkomsten van ons rapport Cybercrime hits the unexpected waarin we terugblikten op de trends wat betreft cybercrime van het eerste kwartaal van dit jaar. Daaruit bleek dat cybercriminelen zich de afgelopen maanden vooral hebben gericht op retail... Read more

Source: blog.trendmicro.nl

Top found tags: trend(2),cybercrime(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meer banken doelwit van Zeus banking TrojanLocation: Center for Strategic and International Studies - Washington, United States
Date published: 15-05-2014

De makers van de beruchte Zeus banking Trojan hebben het aantal banken dat de malware kan aanvallen in het eerste kwartaal van dit jaar enorm uitgebreid. Zeus is een Trojaans paard dat op besmette computers voornamelijk gegevens voor internetbankieren steelt.De malware doet dit onder andere via 'we... Read more

Source: www.security.nl

Top found tags: South Africa(2),trojan(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Klopjacht op gebruikers Blackshades-malwareLocation: Den Haag, The Netherlands
Date published: 15-05-2014

De politie in Frankrijk doet invallen bij verdachte gebruikers van malwareprogramma Blackshades. Zeker 70 huizen zouden al zijn doorzocht. Ook een Nederlander beweert politiebezoek te hebben gekregen. De Franse politie is begonnen met het doorzoeken van huizen en het in beslag nemen van computers v... Read more

Source: webwereld.nl

Top found tags: The Netherlands(2),cybercrime(3),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

'Politie valt massaal in bij malware-kopers'Location: Den Haag, The Netherlands
Date published: 15-05-2014

In verschillende landen valt de politie binnen bij mensen die de Blackshades-malware hebben gekocht. De Franse politie is inmiddels bij 70 huishoudens binnengevallen, zo meldt RTL.fr. Naast Frankrijk doorzoekt de politie volgens het Leak.sx-forum ook huizen in Duitsland, Australi, Den... Read more

Source: www.nu.nl

Top found tags: police(1),research(1),Germany(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish