Under construction

New design coming soon!

CIC News engine statistics

CIC News for 18-05-2014 contains 45 articles: cybercrime(13),cyber security(9),data breach(8),other(15)

CIC News update contains 43 English and 2 Dutch articles for today.
In today's English news articles:
- 12 related to cybercrime
- 9 related to cyber security
- 8 related to data breach and identity theft
- 14 for the category other news

In today's Dutch news articles:
- 1 related to cybercrime
- 0 related to cyber security
- 1 for the category other news

Have fun reading.

English cybercrime related news

Hackers Attack Operation Supply Drop Charity DriveLocation: New York, United States
Date published: 16-05-2014

Operation Supply Drop's third annual 8-Bit Salute 24 hour charity game marathon went live this morning at 9 a.m. Eastern time. By 10 a.m. hackers had disabled the military gaming charity's website via DDoS attack. POperation Supply Drop, previously featured on Kotaku, is a charity organization dedi... Read more

Source: kotaku.com

Top found tags: EN(1),gaming(1),website(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDoS mitigation services are essential: Don't be outgunned by cybercriminalsLocation: Sydney, Australia
Date published: 16-05-2014

According to independent research commissioned by CenturyLink Technology Solutions in 2013, Denial-of-Service (DDoS) attacks have grown more frequent with nearly 50 percent of enterprise IT leaders reporting that they have had one or more DDoS attacks in the last three years. The intentions of DDoS... Read more

Source: www.automatedtrader.net

Top found tags: report(1),research(1),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDoS attacks more numerous and harmful in 2013: reportLocation: Neustar - Sterling, United States
Date published: 16-05-2014

Neustars summary for 2013 suggests attacks are becoming more focused, hitting finances, personal data The title says it all: The Danger Deepens. Neustar, a cloud-based information services and data analytics provider, recently released its roundup of distributed denial of service (DDoS) at... Read more

Source: www.itworldcanada.com

Top found tags: financial sector(2),social engineering(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Most malware attacks depend on deception, not software flaws reportLocation: Microsoft HQ - Redmond, United States
Date published: 17-05-2014

The number of computers infected with malware increased significantly in the last quarter of 2013 according to Microsoft Security Intelligence Report (SIR) Volume 16 released on Friday. This is largely because of the deceptive methods that cybercriminals are increasingly applying. The report gather... Read more

Source: www.gmanetwork.com

Top found tags: cybercrime(3),malware(3),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese hackers set malware to trap Vietnamese Internet usersLocation: Hanoi, Vietnam
Date published: 17-05-2014

VietNamNet Bridge Security experts from FPT and CMCInfosec, the most prestigious technology groups, as well as VNCERT (Vietnam Computing Emergency Rescue Team), have warned against Chinese enhanced activities of setting malware and spyware to trap Vietnamese users.The experts have n... Read more

Source: english.vietnamnet.vn

Top found tags: social media(2),update(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Child porn arrest made in West PointLocation: New York, United States
Date published: 17-05-2014

A West Point man has been arrested and charged with possession of child pornography.Marcus Wilburn Knight, 49, of West Point, was arrested Thursday by Mississippi Attorney General's Cyber Crime Unit/Internet Crimes Against Children Task Force. The West Point Police Department assisted in the arrest... Read more

Source: www.cdispatch.com

Top found tags: EN(1),child pornography(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Webcam Cyber Crime Aid Against Blackmail Plus BullyingLocation:
Date published: 17-05-2014

Spy cams are small cameras which transmit video output to a remote receiver. What's unique about them compared to alternative types of cameras is the fact that they are quite little, sometimes even because tiny as a key following they are hidden. A spy cam is useful inside a variety of situations. ... Read more

Source: www.mexicocrece.mx

Top found tags: webcam(1),website(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Govt plans to set up cyber security deptLocation: New York, United States
Date published: 17-05-2014

The government has planned to set up a separate Cyber Security Department to deal with the fast growing cyber crimes that have emerged as a threat to the national security and financial services. The department will have a computer response incident team which will work as a trouble sho... Read more

Source: www.thedailystar.net

Top found tags: website(1),government(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Global law enforcement operation targets hackers behind malwareLocation: New York, United States
Date published: 16-05-2014

(CNN) -- The FBI and police in several countries have launched raids aimed at hackers behind the malicious software Blackshades, which authorities say is used by cyber criminals to remotely hijack computers and carry out crimes like extortion and bank fraud.People familiar with the operation say it... Read more

Source: edition.cnn.com

Top found tags: malware(2),government(3),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
More Mac OS X users coming down with adware infectionsLocation: Microsoft HQ - Redmond, United States
Date published: 18-05-2014

COLUMBIA, S.C. -- The days of computer users claiming virus problems were strictly a PC-only problem are gone.More and more OS X users are falling victimto various adware and spyware infections, though still less so than Microsoft Windows-based computers.Most adware and spyware infections happen wh... Read more

Source: www.wcnc.com

Top found tags: cybercrime(2),Microsoft(2),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers attack online fundraiser supplying games to U.S. troops abroadLocation: New York, United States
Date published: 17-05-2014

Operation Supply Drop, an organization that provides games to U.S. troops serving abroad, says that it came under a distributed denial-of-service (DDoS) attack shortly after starting its third annual 8-Bit Salute event this morning.Yes, 27-minutes after the official 0800 CST start time of the 3r... Read more

Source: www.gamespot.com

Top found tags: EN(1),gaming(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Investigators race to find victims of child pornographyLocation: Homeland Security Investigations - Washington, United States
Date published: 18-05-2014

The mother of five remembers the moment when everything she thought she knew about raising her children exploded into shards of anger, despair and confusion.She was sitting at a conference table with federal computer forensics experts, a victim's advocate, a police detective, and state and federal ... Read more

Source: www.13wmaz.com

Top found tags: United States(2),cybercrime(3),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

U.S. industry too complacent about cyber risks, say expertsLocation: Department of Homeland Security - Washington, United States
Date published: 16-05-2014

(Reuters) - After warning for years that the U.S. electric grid and other critical infrastructure are dangerously vulnerable to hacking, security experts fear it may take a major destructive attack to jolt CEOs out of their complacency.While awareness about cybersecurity has increased in recent yea... Read more

Source: www.reuters.com

Top found tags: cyber security(4),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PLA wary of data leaks and malware from USB drivesPoliticsNewsWantChinaTimes.comLocation: Beijing, China
Date published: 18-05-2014

In the internet era, mobile storage capacity is essential, especially in the form of USB flash drives or other portable storage drives. However, the risk of information leaks has prompted many, including the military, to consider how to monitor usage of such devices, reports the PLA Daily, the offi... Read more

Source: www.wantchinatimes.com

Top found tags: security management(2),security measures(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Senate reviews the security challenge of malvertisingLocation: Yahoo HQ - Sunnyvale, United States
Date published: 16-05-2014

Questions raised over the opacity of ad server bidding processes contributing to malware delivery via adverts. The running security issue with so-called `ad farms' operated by Google and Yahoo resurfaced this week after the US Senate heard testimonies from the two IT companies about the... Read more

Source: www.scmagazineuk.com

Top found tags: United States(2),cybercrime(5),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Email Malware Masquerades as 'Important' UpdateLocation: Paris, France
Date published: 16-05-2014

Are you a Windows user who recently received an email about an "important company update" for your computer? Whatever you do, don't install that update; it's really a Trojan that, once installed, appears to sneakily download more malware onto your computer.These malicious emails use forged headers ... Read more

Source: www.tomsguide.com

Top found tags: cyber security(2),malware(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian Cybersnake - Malware May Be Putins Secret WeaponLocation: Brussel, Belgium
Date published: 16-05-2014

It shouldnt be easy to shut down a European ministry for days, depriving bureaucrats of access to e-mail and the web. Someone, however, has managed to do just that to Belgiums foreign ministry, which had to quarantine its entire computer system last Saturday and only managed to restore the wo... Read more

Source: conservativeread.com

Top found tags: government(3),cyber security(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft warns of sleeker cyber threatsLocation: Microsoft HQ - Redmond, United States
Date published: 17-05-2014

KAMPALA, Uganda - Microsoft Corporation last week released new data warning computer users that cybercriminals have now increasingly resorted to using deceptive tactics to steal peoples personal and financial information for malicious purposes.According to Microsoft, one of the most common decep... Read more

Source: www.busiweek.com

Top found tags: Microsoft(2),malware(3),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Computing professor becomes academic adviser on cybercrimeLocation: European Cybercrime Centre - Den Haag, The Netherlands
Date published: 16-05-2014

A growing threat to the national security of EU countries and the safety and livelihood of its people, cybercrime is one of the greatest challenges for law enforcement agencies. It is estimated that victims of cybercrime lose around 290 billion each year worldwide: more than the global trade in ... Read more

Source: www.surrey.ac.uk

Top found tags: cyber security(2),information security(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Philippines 11th biggest source of spam in Q1reportLocation: Manila, Metro Manila, Philippines
Date published: 17-05-2014

MANILA, Philippines The Philippines jumped by nine places in the list of countries considered as top sources of spam or unsolicited e-mail during the first three months of the year, according to a report by a secure content and threat management solutions developer.The Kaspersky Lab report cond... Read more

Source: technology.inquirer.net

Top found tags: United States(2),Kaspersky Lab(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft warns of sleeker cyber threatsLocation: Microsoft HQ - Redmond, United States
Date published: 17-05-2014

KAMPALA, Uganda - Microsoft Corporation last week released new data warning computer users that cybercriminals have now increasingly resorted to using deceptive tactics to steal peoples personal and financial information for malicious purposes.According to Microsoft, one of the most common decep... Read more

Source: www.busiweek.com

Top found tags: Microsoft(2),malware(3),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Data breach could cost you up to one-third of customersLocation: Damballa - Atlanta, United States
Date published: 16-05-2014

Retailers and healthcare providers have been put on notice: suffer a data breach, and expect to lose up to a third of your customers.That is the dramatic finding of a new study entitled "Avoidable Collateral Damage from Corporate Data Breaches," conducted by Javelin Strategy & Research and spon... Read more

Source: www.fiercecio.com

Top found tags: health sector(6),medical sector(6),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tax season brought increase in ID theftLocation: U.S. Internal Revenue Service HQ - Washington, United States
Date published: 16-05-2014

Identity theft has been on the rise in the Village of Shiloh and the City of OFallon, especially during the recent tax season, according to police officials. Local Law Enforcement across the region has seen a significant increase in the number of fraudulent tax returns being filed using victi... Read more

Source: www.bnd.com

Top found tags: report(1),identity theft(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Who's Sneaking Around Your Business Network Undetected?Location: San Francisco, California, United States
Date published: 16-05-2014

Malware has become the big bad wolf in cybersecurity circles, and businesses around the globe are quickly buying up the latest detection technologies to protect their IT networks. However, the problem is that hackers are creating new forms of malware at a clip of 82,000 per day, making it impossibl... Read more

Source: www.huffingtonpost.com

Top found tags: social engineering(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target, Nike, Gap, And Others Join Forces To Try To Stop The Next Big Data BreachLocation: Neiman Marcus - Dallas, United States
Date published: 17-05-2014

A group of the nations top retailers are banding together with federal law enforcement agencies in hopes of preventing cybercrimes like the one that caused Targets massive data breach earlier this year. Hundreds of big-name stores including Safeway, Walgreens, and Nike teamed up to form the R... Read more

Source: thinkprogress.org

Top found tags: telecom sector(4),cyber security(6),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man gets 20 years for role in cybercrime syndicateLocation: Las Vegas, Nevada, United States
Date published: 16-05-2014

LAS VEGAS (AP) A Phoenix man has been sentenced to 20 years in federal prison for his role in what authorities say is an unprecedented criminal case involving an international cybercrime syndicate with hundreds of thousands of U.S. victims. A federal judge in Las Vegas imposed the sentence Thur... Read more

Source: www.usnews.com

Top found tags: identity theft(2),United States(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach affects LECOM studentsLocation: University of Pittsburgh Medical Center - Pittsburgh, United States
Date published: 17-05-2014

Lake Erie College of Osteopathic Medicine students' names and Social Security numbers were inadvertently posted on the Internet in April and accessed by Google's search engine. The data breach originated from Hubbard-Bert Inc., an Erie business that provides health insurance to LECOM students, said... Read more

Source: www.goerie.com

Top found tags: data breach(2),identity theft(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
In the next big data breach, crowd-sourcing could find the culpritsLocation: 32.7379910,-117.1606350
Date published: 17-05-2014

Following last years theft of credit card data from the retailer Target and this years discovery of the Heartbleed bug, its probably an understatement to say that the credit-card industry has a problem with data breaches.In fact, since 2010, at least 62 million credit card records in... Read more

Source: qz.com

Top found tags: mobile device(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UNO starts probe after data breach is detectedLocation: Nebraska, United States
Date published: 16-05-2014

A server at the University of Nebraska at Omaha that contains student information and Social Security numbers has been breached, university officials said Friday. The unauthorized access of an administrative server at the Campus Security department was discovered last week, UNO spokesman Charley Re... Read more

Source: www.starherald.com

Top found tags: data breach(2),education(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Bloomsdale Woman Faces Charges Of Credit Card FraudLocation: New York, United States
Date published: 17-05-2014

A 32-year-old Bloomsdale woman faces 21 felony charges in a case in which she is accused of having racked up in excess of $20,000 in fraudulent charges on the credit card accounts of a 79-year-old male relative. Shelley Ann Pribble has been charged in Ste. Genevieve County Circuit Court with three ... Read more

Source: www.stegenherald.com

Top found tags: fraud(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Location: Hanover, Germany
Date published: 17-05-2014

WESTERN BUREAU:A Hanover man, who allegedly recruited a 70-year-old American woman to operate as a 'money mule', is among three persons who were nabbed in recent anti-lottery scam operations in western Jamaica.The elderly woman, who is believed to have been a former victim who was apparently convin... Read more

Source: jamaica-gleaner.com

Top found tags: airport(2),airport sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police identify skimming suspect in Evesham Twp.Location: Bank of America HQ - Charlotte, United States
Date published: 16-05-2014

EVESHAMPolice have identified and charged the man responsible for installing a skimming device and camera on the Bank of America ATM on Route 70 on April 26, police said. Bank of America was able to contact all the victims and close their accounts before any money was stolen, police said.<... Read more

Source: www.southjerseylocalnews.com

Top found tags: skimming(1),social media(2),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Operation Supply Drop charity drive hit withLocation: New York, United States
Date published: 17-05-2014

Operation Supply Drop, a charity organization dedicated to offering video game care packages to overseas military troops in active combat or recovering from battle in hospital zones, is in the middle of their annual 8 Bit Salute charity drive this weekend. Unfortunately, the main website that takes... Read more

Source: www.shacknews.com

Top found tags: Facebook(1),website(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Trojan horse' teacher breaks into girl's phoneLocation: London, United Kingdom
Date published: 18-05-2014

A teacher at one of the Birmingham state schools allegedly taken over by Muslim radicals in the so-called Trojan Horse plot has been reported to police after he broke into a female pupils mobile telephone to prove she was having a forbidden relationship with a boy. The girl, who at 1... Read more

Source: www.telegraph.co.uk

Top found tags: report(1),trojan(1),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile Malware, Retail Cyber Security Breaches EscalateLocation: Trend Micro - Cupertino, United States
Date published: 16-05-2014

Trend Micro revealed the online banking malware volume showed a 3 percent increase to 116,000 this quarter from 113,000 in the first quarter of 2013.Online banking malware continued to thrive and grow more sophisticated with the emergence and modification of new malware families, while the numbe... Read more

Source: mspnews.com

Top found tags: Trend Micro(2),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ESET Middle East - ESET Releases New Mobile Security Solution to Combat Growing Threat of Android-Based MalwareLocation: ESET HQ - Bratislava, Slovak Republic
Date published: 15-05-2014

DUBAI, United Arab Emirates, 15 May, 2014: ESET, the global leader in proactive digital protection, today announced availability of the newest version of ESET Mobile Security, which arms Android users with proactive Anti-Theft features to track lost or stolen mobile devices, through an easy-to-us... Read more

Source: www.openpr.com

Top found tags: United Arab Emirates(6),0-day(1),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FIRST HONOR I Philippines most malware-infected country in the region -- MicrosoftLocation: Manila, Metro Manila, Philippines
Date published: 17-05-2014

MANILA, Philippines The country leads the pack in the number of malware infections in the region according to a report by Microsoft Corp.According to the 16th edition of the Microsoft (SIR) Security Intelligence Report, both of the countrys malware encounter and infection rate were well abov... Read more

Source: www.interaksyon.com

Top found tags: vulnerability(1),social engineering(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senate Calls for Tighter Controls to Halt Malvertising EpidemicLocation: New York, United States
Date published: 16-05-2014

John McCain leads the call for online ad industry to stamp out widespread abuses. A US Senate subcommittee has called for new rules to force the online advertising industry to clean up its act and remove the hidden malware hazards that are increasingly impacting netizens.In a report issued on... Read more

Source: www.infosecurity-magazine.com

Top found tags: United States(2),government(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers exploit vulnerability to breach Pennsylvania payroll companyLocation: Pennsylvania, United States
Date published: 16-05-2014

An undisclosed number of individuals may have had personal information including Social Security numbers and payment information compromised after hackers took advantage of a vulnerability in systems belonging to Paytime Inc., a Pennsylvania payroll company.How many victims? Undisclosed, bu... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),United States(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Windows users warned over gadget malware attackLocation: Microsoft HQ - Redmond, United States
Date published: 16-05-2014

Windows users are at risk of having their computers infected, after a malware attack posing as an important company update was spammed out.The emails, which use forged headers to pretend to come from the same domain as your email address (in other words, if you have an email of fred@example.c... Read more

Source: grahamcluley.com

Top found tags: report(1),RSS(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime Law & the Consequences of Bullying, an Article Published Today By NoBullyingLocation: Londen, United Kingdom
Date published: 17-05-2014

London, UK (PRWEB) May 17, 2014 It seems almost impossible that an average teenager could function without online access. There's no denying that being connected online is now an inevitable part of life and that it's impossible for a parent to control 100% of any child's computer activity. NoBullyi... Read more

Source: www.streetinsider.com

Top found tags: United Kingdom(2),cyber bullying(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Wisconsin officials warn of security system scamLocation: Wisconsin, United States
Date published: 17-05-2014

MADISON, Wis. (AP) Wisconsin officials are warning residents about a scam where callers offer to install free home securitysystems.The Wisconsin Department of Agriculture, Trade and Consumer Protection says the robocalls do not appear to be coming from a legitimate alarm company and are likely ... Read more

Source: www.sfgate.com

Top found tags: fraud(1),scam(1),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Locating ICS and SCADA Systems on .EDU Networks with SHODANLocation: University of Michigan - Ann Arbor, United States
Date published: 14-05-2014

I wrestled with a myself for a long time about whether or not to publish this article, but the time has come for education and action regarding exposed SCADA/ICS in the .edu sector.The goal of this post is to encourage security teams at .edus to proactively discover, enumerate, inventory and classi... Read more

Source: www.tripwire.com

Top found tags: report(1),SCADA (1),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Zeventig huiszoekingen bij Belgische hackersLocation: Brussel, Belgium
Date published: 17-05-2014

Het Belgische gerecht heeft de voorbije dagen 70 huiszoekingen uitgevoerd bij Belgen die het virusprogramma 'Blackshades' gebruikten, waarmee ze bijvoorbeeld kunnen inbreken in computers, bestanden kunnen versleutelen of internetgebruikers afpersen. Dat schrijft De Tijd vandaag.De grootschalige act... Read more

Source: www.demorgen.be

Top found tags: cybercrime(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

'Politie valt massaal in bij malware-kopers'Location: Berlin, Germany
Date published: 18-05-2014

Politiekorpsen in verschillende landen zijn binnengevallen bij mensen die Blackshades-malware hebben gekocht, melden verschillende omroepen. In Belgie zou bij zeventig huishoudens een inval zijn gedaan, in Frankrijk bij net zo veel mensen en ook in Duitsland, Australi, Denemarken, Zweden, Itali... Read more

Source: copsincyberspace.wordpress.com

Top found tags: webcam(1),Germany(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish