Under construction

New design coming soon!

CIC News engine statistics

CIC News for 19-05-2014 contains 30 articles: cybercrime(8),cyber security(2),data breach(8),other(12)

CIC News update contains 23 English and 7 Dutch articles for today.
In today's English news articles:
- 5 related to cybercrime
- 2 related to cyber security
- 8 related to data breach and identity theft
- 8 for the category other news

In today's Dutch news articles:
- 3 related to cybercrime
- 0 related to cyber security
- 4 for the category other news

Have fun reading.

English cybercrime related news

Tor Network Isnt Capable Of Foiling The Cyber Crooks And NSA SurveillanceLocation: National Security Agency - Fort Meade, United States
Date published: 18-05-2014

A security expert has made a statement that the Tor Network is capable of protecting the internet users from cyber criminals and other state sponsored hackers.MVP in Enterprise Security and founder of the Cyber Crime Security Forum Andy Malone says that though The Onion Router Network has a robust ... Read more

Source: nationalcybersecurity.com

Top found tags: Anonymous(2),cybercrime(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Charges Multiple Chinese Government Officials With Economic EspionageLocation: New York, United States
Date published: 19-05-2014

Attorney General Eric Holder unveiled economic espionage charges against Chinese military officials for targeting American companies, the first time the U.S. has charged state actors for explicitly acting at the behest of a foreign government in cyber crimesUpdated 11:47 a.m. E.T.... Read more

Source: time.com

Top found tags: government(2),United States(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NCA launches latest Cyber Security Challenge to uncover top cyber talentLocation: National Crime Agency - London, United Kingdom
Date published: 19-05-2014

The UK National Crime Agency (NCA) has launched the opening stage of the fifth Cyber Security Challenge, calling on participants to help mitigate a set of simulated cyber attacks targeting the UK as it seeks to find the next crop of UK cyber talent.The opening stage will see participants attempt to... Read more

Source: www.v3.co.uk

Top found tags: malware(2),United Kingdom(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Darling Malware of MayLocation: Kaspersky HQ - Moscow, Russia
Date published: 19-05-2014

Crypto-currency isused to battling an ever-increasing surge of malware infiltration, but now alight-hearted example has been causing some Microsoft Security Essentials(MSE) users some heartache.While the Norwegian-spawnedcrypto mining virus spreads through the community, now the ghost of viru... Read more

Source: cointelegraph.com

Top found tags: Microsoft(2),telecom sector(2),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Algeria leads Africa in malwareLocation: Cape Town, West-Kaap, South Africa
Date published: 19-05-2014

Kaspersky Labs latest malware report has revealed that South Africa ranks third in Africa and Algeria takes first place. Algeria leads Africa in terms of local and international web threats in the first quarter of 2014, well ahead of Egypt in second place, according to data from Kaspersky Securi... Read more

Source: www.gadget.co.za

Top found tags: vulnerability(2),cybercrime(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Yahoo to YouTube ads spreading viruses rile lawmakersLocation: Yahoo HQ - Sunnyvale, United States
Date published: 19-05-2014

The $US43 billion online-advertising network built by companies like Yahoo! and Google isjeopardising consumer privacy and giving hackers an easy path to infect computers, a US congressional investigation has found.Now, armed with a better understanding of the opaque mechanics of web ads, SenatorCa... Read more

Source: www.smh.com.au

Top found tags: United States(4),cybercrime(5),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How FBI brought down cyber-underworld site Silk RoadLocation: New York City, New York, United States
Date published: 19-05-2014

Criminals who prowl the cyber-underworld's "darknet" thought law enforcement couldn't crack their anonymous trade in illegal drugs, guns and porn. But a series of arrests this month, including the bust of the black market site Silk Road, shows the G-men have infiltrated the Internet's back alley.Read more

Source: www.wcnc.com

Top found tags: cybercrime(3),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Experian Breach Tied to NY-NJ ID Theft RingLocation: New Hampshire, United States
Date published: 19-05-2014

Last year, a top official from big-three credit bureau Experian told Congress that the firm was not aware of any consumers that had been harmed by an incident in which a business unit of Experian sold consumer records directly to an online identity theft service for nearly 10 months. Todays post... Read more

Source: krebsonsecurity.com

Top found tags: identity theft(2),United States(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to avoid a big data security breachLocation: New York, United States
Date published: 19-05-2014

Big data can hold incredible value for people who work but the consequences of a data breach that exposes large amounts of information need to be understood, according to Telstra chief security specialist Scott McIntyre. Speaking at the AusCERT security conference on the Gold Coast, McIntyre ... Read more

Source: www.computerworld.com.au

Top found tags: data breach(2),government(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Failed State of Security" Part II; Cybercrime Victim BlamingLocation: Target HQ - Minneapolis, United States
Date published: 18-05-2014

I am proud to release another research brief that is Part II of my Failed State of Security series in which I discuss and analyze victim blaming in the context of data security. In 2012 I published a research brief titled A Failed State of Security: A Rational Analysis of Deterrence Theory... Read more

Source: globalriskinfo.com

Top found tags: website(1),data breach(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HHS OCR Settles Post-Data Breach Investigation For Record $4.8MLocation: New York City, New York, United States
Date published: 19-05-2014

On May 7, 2014, HHS OCR announced a pair of resolution agreements with New YorkPresbyterian Hospital (NYP) and Columbia University (CU) totaling$4.8 million dollarsthe highest settlement amount todate. These resolution agreements make it clear thatorganizations must be able to propose steps to a... Read more

Source: www.mondaq.com

Top found tags: medical sector(2),security measures(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Boca police searching for couple accused of $5,000 Nordstrom identity theftLocation: Boca Raton, United States
Date published: 19-05-2014

A man and woman are being sought after spending more than $5,000 using a stolen identity, according to Boca Raton police.The man and woman were captured on camera after making several large purchases at the Nordstrom at5820 West Glades Road on April 1.A manager called the victim and said the suspec... Read more

Source: www.sun-sentinel.com

Top found tags: financial sector(2),identity theft(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Poll: Target shoppers mostly stick with chain after data breachLocation: Target HQ - Minneapolis, United States
Date published: 19-05-2014

Many Target Corp. customers are ready to forgive and forget.Following a data breach over the holiday season that affected millions of shoppers, only 7 percent of customers plan to reduce spending at the chain over the next year, according to a Bloomberg National Poll. The survey, conducted May 8-11... Read more

Source: www.detroitnews.com

Top found tags: report(1),survey(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Watering hole attacks join spear phishing on malware threat listLocation: Verizon HQ - New York, United States
Date published: 20-05-2014

Along with spear phishing, a new kind of malware attack is outpacing the big credit card breaches seen last year, this time eliminating the need to con humans.Watering hole attacks, observed in industrial and other espionage cases, don't need to socially engineer computer users and are on the rise ... Read more

Source: www.smh.com.au

Top found tags: Juniper Networks(2),social media(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to beat malware malaise at the point of saleLocation: Target HQ - Minneapolis, United States
Date published: 19-05-2014

Last year Malware-based attacks accounted for roughly a quarter of all successful data breaches, the number one reason was that businesses were neglecting IT security best practices at their retail outlets.At time of writing, for the past three years, the retail and hospitality sectors have been th... Read more

Source: www.itproportal.com

Top found tags: cyber security(2),data breach(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

iOS 7.1.1 Untethered Jailbreak For iPhone TeasedLocation: Apple HQ - Cupertino, United States
Date published: 18-05-2014

The jailbreak community hasnt had much luck ever since Apple patched the exploit evasi0n7 used with iOS 7.1.Back in the days when A4-powered iOS devices were all the rage it was pretty easy to jailbreak them since a bootrom exploit had been discovered. Since then developers have had to make do w... Read more

Source: www.ubergizmo.com

Top found tags: Apple(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to steal $200 millionLocation: New York, United States
Date published: 19-05-2014

I always knew it was possible to fool the American financial system. But I never realized just how easy it was. Last week, in a federal court in Trenton, N.J., Khawaja Ikram became the ninth person to plead guilty for his involvement in a gigantic credit card fraud case that netted more than $200 m... Read more

Source: www.marketwatch.com

Top found tags: credit card(2),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Targeting Foreign Government Officials in Cybercrime InvestigationLocation: New York, United States
Date published: 19-05-2014

(NEW YORK) -- The United States government is set to file charges against government officials in China for allegedly hacking U.S. business interests, marking the first time ever that the U.S. government has formally accused another nation of using the Internet to break into U.S. businesses and gai... Read more

Source: news.wbt.com

Top found tags: China(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Record month for Linux TrojansLocation: Beijing, China
Date published: 19-05-2014

If you think that you are protected from malware if you use Linux, think again, warn researchers from AV manufacturer Dr. Web, who identified and examined a record-high number of Trojans for Linux this month - and the month isn't over yet.According to the researchers, the different vari... Read more

Source: www.net-security.org

Top found tags: Ubuntu(1),website(1),China(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers: Recent Zero-Day Attacks Linked Via Common Exploit PackageLocation: Symantec HQ - Mountain View, United States
Date published: 19-05-2014

Elderwood Platform, a two-year-old package of exploits, has been used to create multiple zero-day threats, Symantec researchers saidThe Elderwood platform, a two-year-old package of exploits that attackers can buy off the shelf, is at the heart of several recent zero-day attacks, researchers said.I... Read more

Source: www.darkreading.com

Top found tags: threat(1),Internet Explorer(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Law enforcement targets users of BlackShades malwareLocation: European Cybercrime Centre - Den Haag, The Netherlands
Date published: 19-05-2014

During two days of operations taking place in more than 10 countries worldwide, coordinated by Eurojust in The Hague and supported by the European Cybercrime Centre (EC3) at Europol, creators, sellers and users of BlackShades malware were targeted by judicial and law enforcement authorities.<... Read more

Source: www.net-security.org

Top found tags: The Netherlands(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The sandbox trap: taking the fight to malwareLocation: Check Point - Tel Aviv, Israel
Date published: 19-05-2014

'Know your enemy as well as you know yourself' is a frequently-quoted maxim in IT security. However, one of the problems facing businesses is that they seem to have new adversaries lining up every day to launch attacks and stealthily siphon confidential data, using an array of malware. All of which... Read more

Source: www.techradar.com

Top found tags: report(1),threat(1),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Advantage agents must exploit 'horrendous' online experience, says EsomLocation: London, United Kingdom
Date published: 19-05-2014

Searching online for anything, including travel, is a horrendous experience, and one which Advantage agents should exploit, according to the consortium's new non-executive chairman Steven Esom. Addressing delegates at the consortium's annual conference in Dubai, Esom said: "Do a Google search and t... Read more

Source: www.travelweekly.co.uk

Top found tags: airport(2),airport sector(2),United Arab Emirates(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Wereldwijde actie politie en justitie tegen hackersLocation: Den Haag, The Netherlands
Date published: 19-05-2014

In 16 landen hebben politie en justitiediensten vorige week doorzoekingen gedaan bij hackers en grote hoeveelheden computers, harde schijven en andere gegevensdragers in beslag genomen. Het gaat om honderden afnemers van het hackers gereedschap Blackshades. In Nederland ging de politie binnen op 34... Read more

Source: www.om.nl

Top found tags: United Kingdom(2),government(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Walen vaker slachtoffer van malware dan VlamingenLocation: Waal, Liesveld, Zuid-Holland, The Netherlands
Date published: 19-05-2014

Samenvatting:Waalse internetgebruikers schatten het risico om getroffen te worden door malware hoger in dan Vlamingen, maar nemen toch minder maatregelen.Internetgebruikers in Walloni worden vaker getroffen door malware dan Vlaamse gebruikers. Dat blijkt uit onderzoek van MediaTest in... Read more

Source: www.zdnet.be

Top found tags: antivirus(3),Kaspersky Lab(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Britse overheid zoekt cybertalent met cyberchallengeLocation: National Crime Agency - London, United Kingdom
Date published: 19-05-2014

De Britse overheid heeft een nieuwe cyberchallenge ontwikkeld waarbij het publiek wordt gevraagd om een verdachte e-mail te onderzoeken en zo een groep cybercriminelen te ontmaskeren. De Cyber Security Challenge is een idee van de National Crime Agency (NCA).Vorig jaar werd er ook al een soortgelij... Read more

Source: www.security.nl

Top found tags: cybercrime(4),financial sector(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

Two Bulgarians nabbed for ATM skimming: Part of an international ring?Location: Sofia, Bulgaria
Date published: 19-05-2014

Philippine authorities are now investigating two Bulgarians for possible links to an international syndicate engaged in automated teller machine (ATM) fraud. The Philippine National police said Monday it is coordinating with the Bureau of Immigration to check the backgrounds of the two suspects, w... Read more

Source: www.gmanetwork.com

Top found tags: police(1),skimming(1),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Grootschalige politieoperatie tegen malwareLocation: Den Haag, Den Haag, Zuid-Holland, The Netherlands
Date published: 19-05-2014

Politiekorpsen in zestien landen hebben samengewerkt bij een operatie gericht tegen de malware BlackShades. In totaal werden in zestien landen huiszoekingen verricht en werden 97 mensen opgepakt op verdenking van het ontwikkelen, verspreiden of gebruiken van de kwaadaardige software.De software ste... Read more

Source: www.reformatorischeomroep.nl

Top found tags: Germany(2),government(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Leeuwarder Courant verspreid malwareLocation: Amsterdam, The Netherlands
Date published: 19-05-2014

De website van de Leeuwarder Courant verspreid momenteel malware via een malafide advertentie van het gebruikte advertentienetwerk laat Mark Loman van SurfRight via Twitter weten. De betreffende malware wordt via een exploit als een drive-by-download aangeboden, en dat betekent concreet dat een der... Read more

Source: www.pcwebplus.nl

Top found tags: website(1),social media(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Congres Industrial Network Security 2014Location: Delft, Delft, Zuid-Holland, The Netherlands
Date published: 19-05-2014

Breda, 19 mei 2014 Over IT beveiliging is in het verleden al heel veel gezegd. Voorkomen van het weglekken van waardevolle bedrijfsinformatie en van diefstal van persoonsgegevens zijn hierbij vaak belangrijke aandachtspunten. Binnen de industrie gelden andere belangen als het op security aankom... Read more

Source: www.emerce.nl

Top found tags: government(2),responsible disclosure(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish