Under construction

New design coming soon!

CIC News engine statistics

CIC News for 23-05-2014 contains 78 articles: cybercrime(32),cyber security(17),data breach(17),other(12)

CIC News update contains 71 English and 7 Dutch articles for today.
In today's English news articles:
- 27 related to cybercrime
- 16 related to cyber security
- 17 related to data breach and identity theft
- 11 for the category other news

In today's Dutch news articles:
- 5 related to cybercrime
- 1 related to cyber security
- 1 for the category other news

Have fun reading.

English cybercrime related news

Bulletproof servers foil botnet/malware takedownsLocation: Check Point - Tel Aviv, Israel
Date published: 22-05-2014

Check Point security innovations manager Tomer Teller says that the last two botnet/malware hosting operations his team worked with - in cooperation with the FBI and other parties - failed due to the use of bullet-proof hosting facilities by the cyber-criminal gangs concerned. "The last... Read more

Source: www.scmagazineuk.com

Top found tags: government(2),telecom sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2nd Eurasian Working Group on Cybercrime for Heads of Units / 2nd Eurasian Working Group on Cybercrime for Heads of UnitsLocation: New Delhi, India
Date published: 22-05-2014

28 - 30 May 2014, Istanbul, Turkey This event brings together the heads of cybercrime units from Europe, Asia and Oceania to discuss the latest cybercrime trends, share best practices in investigations and digital forensics, and discuss ways to enhance capacity building and operational support. It ... Read more

Source: www.interpol.int

Top found tags: trend(1),Turkey(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Release of REMnux Linux Distro for Malware AnalysisLocation: Oracle - Redwood City, United States
Date published: 22-05-2014

Its my pleasure to announce the availability of version 5 of REMnux, a Linux distribution popular among malware analysts. The new release adds lots of exciting free tools for examining malicious software. It also updates many of the utilities that have already been present in the distro.Here is ... Read more

Source: blog.zeltser.com

Top found tags: report(1),website(1),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fake Bitcoin Story on Twitter Leads to MalwareLocation: Wall Street, New York City, New York, United States
Date published: 22-05-2014

It's true that various branches of the United States government are considering, or rumored to be considering, ways to regulate Bitcoin. But nothing is official just yet, so don't believe the latest Twitter scam claiming that the US government is shutting Bitcoin down.The tweets contain links purpo... Read more

Source: www.tomsguide.com

Top found tags: trojan(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nemanja POS malware compromises 1,500 devices, half a million payment cards, worldwideLocation: New York, United States
Date published: 22-05-2014

As many as half a million payment cards used in hotels, grocery stores and other business around the world including in the U.S. have been compromised by Nemanja,' a recently discovered piece of malware that has infected nearly 1,500 point-of-sale (POS) devices.The massive, worldwide Nem... Read more

Source: www.scmagazine.com

Top found tags: cybercrime(2),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
5 Tips to Remove Virus And Malware on Your AndroidLocation: Google HQ - Mountain View, United States
Date published: 22-05-2014

A phone runs smoothly when it is protected against all problematic issues. It is essential to avoid certain apps than may affect the phone software completely.Like any other system, Android also keeps a check on different apps that are available to play safe. But few still gets a chance... Read more

Source: au.ibtimes.com

Top found tags: Google(2),Google Play(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Operation Echo smashes Bulgarian cybercrime gangLocation: Europol HQ - Den Haag, The Netherlands
Date published: 23-05-2014

Complete counterfeit card production kits confiscated - plans to draw cash at magnetic stripe card-using ATMs in Asia thwarted Bulgarian and French judicial plus law enforcement agencies - working in close cooperation with the European Cybercrime Centre (EC3) at Europol and Eurojust in ... Read more

Source: www.scmagazineuk.com

Top found tags: government(3),financial sector(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The sorry state of cybercrimeLocation: New York, United States
Date published: 23-05-2014

Attempts to defeat cybercrime are failingmiserably. But there are some key things that every business should be looking at as they prepare to do battle. What can I say? Attempts to defeat cybercrime are failingmiserably. We recently completed the 2014 U.S. State of Cybercrime surv... Read more

Source: www.csoonline.com

Top found tags: cybercrime(2),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Caribbean leaders to meet on cybercrime and eGovernanceLocation: Caribbean
Date published: 22-05-2014

An upcoming meeting of Caribbean Commonwealth officials with responsibility for ICT will bring the region's eGovernanceand cybercrimeissues squarely into focus.The Caribbean Stakeholders Meeting on the Importance of ICTs and their Impact on Regional Development will take place in Port of Spainfr... Read more

Source: www.guardian.co.tt

Top found tags: Microsoft(1),cybercrime(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cat-hacking Japanese man admits cybercrime guiltLocation: Tokyo, Japan
Date published: 22-05-2014

May 22, 2014, 4:52 AM A hacker has confessed in court to hijacking other people's computers to make murder threats in a bizarre case that saw the source code for a virus stashed in the collar of a cat.Yusuke Katayama, a chubby, bespectacled former IT worker, was accused of sending online messag... Read more

Source: www.itworld.com

Top found tags: financial sector(2),cybercrime(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SA used as springboard for cybercrimeLocation: Cape Town, West-Kaap, South Africa
Date published: 22-05-2014

Johannesburg An international cybercrime syndicate is alleged to have sold their illegally obtained merchandise from South Africa, officials said on Wednesday. The syndicate was exposed this week, with 12 people arrested on South African soil.Twelve people were arrested in Pretoria on Tuesday w... Read more

Source: www.news24.com

Top found tags: financial sector(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime Threats Associated with the 2014 World Soccer Championship and Summer Travel Could Dampen Summer FunLocation: Brasilia-Federal District, Brazil
Date published: 22-05-2014

San Jose, CA (PRWEB) May 22, 2014ThreatMetrix, the fastest-growing provider of context-based security and advanced fraud prevention solutions, today announces several travel and ticketing scams for consumers and businesses to be aware of this summer.According to a recent study by Orbitz.com, near... Read more

Source: insurancenewsnet.com

Top found tags: mobile device(2),telecom sector(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is Your Infrastructure Capable of Handling a Multi-Vector AttackLocation: New York, United States
Date published: 23-05-2014

DDoS attacks continue to grow in size, frequency and complexity, forcing network-dependent companies to implement a plan for protection. However, the results of a recent research project by Forrester and Verisign show that many companies are still not aware of the growing threat posed by DDoS attac... Read more

Source: www.bankinfosecurity.com

Top found tags: threat(1),trend(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDoS attacks: Criminals get stealthierLocation: New York, United States
Date published: 23-05-2014

There is a lot of media hype surrounding volumetric style DDoS attacks recently where the focus has been on large Gb/sec attacks, sometimes up to 400 Gb/sec. In reality, these are very rare and these big and dumb style attacks make one wonder if they are just being used as a distraction to take up ... Read more

Source: www.net-security.org

Top found tags: vulnerability(1),website(1),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hit and Run DDoS Attack: Targeting the Human FactorLocation: New York, United States
Date published: 22-05-2014

Contrary to popular belief, effective cyber crime does not just entail taxing network resources it includes wearing out an organizations human resources as well. Hit and Run DDoS arrives when you least expect it, and causes more damage than just dollars and cents. This article will cov... Read more

Source: creativesocialblog.com

Top found tags: vulnerability(1),website(1),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Akamai: New DDoS Tools Lead To Resurgence of SNMP AttacksLocation: Akamai - Boston, United States
Date published: 22-05-2014

The security firm Akamai issued an advisory to customers on Thursdaywarning that a new software tool for managing distributed denial of service (DDoS) attacks was leading to a resurgence in large-scale attacks that use Simple Network Management Protocol (SNMP) traffic to overwhelm web sites.<... Read more

Source: securityledger.com

Top found tags: Akamai(2),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Trojan in Town: Meet the Zberp TrojanLocation: Trusteer - Boston, United States
Date published: 22-05-2014

Trusteer researchers recently discovered a new Trojan that has been targeting more than 450 financial institutions around the world, mainly in the U.S., U.K. and Australia. The new Trojan, which seems to be a variant of the well-known Zeus Trojan (a.k.a. Zbot), also demonstrates behaviors associate... Read more

Source: securityintelligence.com

Top found tags: United States(2),malware(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fake US government bitcoin scam spreading trojan through TwitterLocation: Wall Street, New York City, New York, United States
Date published: 23-05-2014

Don't be caught out! A new Trojan has been spreading through Twitter, claiming to link to an article about the US Government cracking down on bitcoin.The alert was raised today by security firm Malwarebytes.The tweet, which you may already have seen, reads: "USA Government trying to shut down Bitco... Read more

Source: www.itproportal.com

Top found tags: social media(2),Thailand(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
International Operation Cracks Down on MalwareLocation: New York City, New York, United States
Date published: 23-05-2014

Creators, sellers and users of the Blackshades malware were targeted by judicial and law enforcement authorities during two days of operations taking place in 16 countries worldwide.The operations, which concluded on May 19, were coordinated by Eurojust and supported by Europols European Cybercr... Read more

Source: www.hstoday.us

Top found tags: telecom sector(4),malware(5),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Uptick in drive-by attacks exploiting Microsoft Silverlight detectedLocation: Microsoft HQ - Redmond, United States
Date published: 23-05-2014

Drive-by attacks exploiting Microsoft Silverlight are on the rise, according to a blog post by Levi Gundert, a technical lead in Cisco Systems' threat research group. The lengthy, co-authored post dissected the Angler exploit kit in detail, exploring how it infects a system and "calls" home with ne... Read more

Source: www.fiercecio.com

Top found tags: patch(2),update(2),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Botnets wreak havocLocation: Trend Micro - Cupertino, United States
Date published: 22-05-2014

Botnets have become one of the most dangerous and prevalent forms of cyber criminal attacks and the damage they cause can range from information theft, to malware infection, to fraud.That's according to Gregory Anderson, SA country manager at Trend Micro, who notes that when the news headlines warn... Read more

Source: www.itweb.co.za

Top found tags: trend(1),Trend Micro(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spam Images Rear Their Ugly Heads as Spam Texts Are BlockedLocation: New York, United States
Date published: 23-05-2014

SEOUL, May 23 (Korea Bizwire) A man surnamed Lee mentioned how frustrated he was upon receiving text messages containing either video clips or pictures. If he does not recognize the number from which the message originates, it is very likely that the message contains spam images.As the te... Read more

Source: koreabizwire.com

Top found tags: spam(1),South Korea(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple in Gigantic marketing cock upLocation: Apple HQ - Cupertino, United States
Date published: 23-05-2014

The marketing team at Apple appears to have taken a page from spam which promises men large endowments if they buy their products.The latest advert for the Apple iPhone Phone 5S has a soundtrack from a popular beat combo called the Pixies crooning a number called Gigantic.Obviously, the people at A... Read more

Source: news.techeye.net

Top found tags: Apple(2),mobile device(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICO seizes hundreds of SIM cards used to send millions of spam textsLocation: London, United Kingdom
Date published: 23-05-2014

The Information Commissioners Office (ICO) has seized hundreds of SIM cards from a property in Wolverhampton used to send out millions of spam text messages.The raid, on a residential property, also saw computer equipment and paperwork seized, as the data watchdog continues to clamp down on the ... Read more

Source: www.v3.co.uk

Top found tags: report(1),spam(1),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime swoop 'a milestone'Location: Cape Town, West-Kaap, South Africa
Date published: 23-05-2014

This week's swoop on an international cyber fraud ring is a milestone for local authorities, in that it marks the first major cross-border collaborative operation involving the Hawks, US authorities and Interpol, says national Hawks spokesman captain Paul Ramaloko.This week, 24 suspects were arrest... Read more

Source: www.itweb.co.za

Top found tags: United States(2),cybercrime(3),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bulgarian-French operation busts Bulgarian organised crime networkLocation: Sofia, Bulgaria
Date published: 23-05-2014

Bulgarian and French judicial and law enforcement authorities, working in close cooperation with the European Cybercrime Centre (EC3) at Europol and Eurojust in The Hague, have smashed another significant Bulgarian organised crime network suspected of a variety of crimes including electronic paymen... Read more

Source: sofiaglobe.com

Top found tags: cybercrime(2),financial sector(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Financial Institution Crime Day nearsLocation: New Mexico, United States
Date published: 23-05-2014

New Mexico bankers will have an opportunity to learn about the latest fraud challenges that financial institutions face during a day-long conference on May 29 sponsored by SWACHA.The 10th annual Financial Institution Crime Day will cover issues such as white collar crime, bank robbery trends, fraud... Read more

Source: www.bizjournals.com

Top found tags: cybercrime(3),government(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Assessing Cybersecurity RegulationsLocation: Department of Homeland Security - Washington, United States
Date published: 22-05-2014

Effective regulations are an important tool to protect the security and economic vitality of our nation. The President is committed to simplifying and streamlining regulations while ensuring that the benefits justify the costs. In fact, this Administration has undertaken one of the most significant... Read more

Source: www.whitehouse.gov

Top found tags: DHS(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MWR InfoSecurity, supported by CPNI : How hackers are stealing company secretsLocation: Facebook - Menlo Park, United States
Date published: 22-05-2014

Recent research carried out by global information security firm MWR InfoSecurity, supported by CPNI (Centre for the Protection of National Infrastructure), has revealed current and new techniques being used by cyber criminals to steal sensitive information from companies. The papers also show what ... Read more

Source: www.globalsecuritymag.com

Top found tags: cybercrime(3),cyber security(4),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Exploit Apple iCloud Activation Lock Allowing Restoration Of Stolen iPhonesLocation: Apple HQ - Cupertino, United States
Date published: 22-05-2014

Life just got a little easier for iPhone thieves, though technically that's not the intended purpose of a new tool that helps iDevice owners bypass Apple's iCloud activation lock. Officially -- and we're not sure if that comes with a *wink* *wink* or if the developers are being sincere -- a tool ca... Read more

Source: hothardware.com

Top found tags: mobile device(2),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Belden Debuts Cyber Security ToolkitLocation: New York, United States
Date published: 23-05-2014

With nearly every device getting connected through the Internet of Things and with constant reports of hacking and cybertheft, the idea of a toolkit to tap down the cyber covers is timely. Belden Inc. has produced a cyber security toolkit -- the Tofino Enforcer Software Development Kit (SDK) -- to ... Read more

Source: www.designnews.com

Top found tags: cyber security(2),telecom sector(2),critical infrastructure(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Five ways to prevent attacks on SCADA networksLocation: Microsoft HQ - Redmond, United States
Date published: 23-05-2014

Manufacturing and utility organisations using SCADA and ICS must deploy extra cyber security measures to avoid severe infrastructure attacks.According to Gavin Coulthard, Manager Systems Engineering of Australia/New Zealand, Palo Alto Networks, critical Supervisory Control and Data Acquisitions sys... Read more

Source: www.ferret.com.au

Top found tags: security measures(2),critical infrastructure(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
No New Cybersecurity Regs Coming from FedsLocation: White House - Washington D.C., United States
Date published: 23-05-2014

None of the executive branch agencies that have regulatory authority over critical infrastructure operators - Environmental Protection Agency and departments of Health and Human Services and Homeland Security - will impose new cybersecurity rules on the industries they regulate.White House Cybersec... Read more

Source: www.govinfosecurity.com

Top found tags: government(3),cyber security(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Utilities and Cyber Security and RiskLocation: Department of Homeland Security - Washington, United States
Date published: 23-05-2014

The U.S. utility industry no longer needs to wonder whether its smart grid systems are being hacked. The Department of Homeland Security has confirmed it.Thats according to the latest alert monitor report from DHS Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT, which co... Read more

Source: theenergycollective.com

Top found tags: United States(6),critical infrastructure(8),cyber security(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lewis: Cybercrime is big money for hackersLocation: National Security Agency - Fort Meade, United States
Date published: 23-05-2014

In the early days of the Internet boom, some thought we would enter an era where there would be one integrated world economy with no borders, where we would share similar democratic values, and where governments would be less important and civil society could pick up many governmental tasks. ... Read more

Source: www.kspr.com

Top found tags: government(3),United States(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stockwell Day calls for changes to cybercrime billLocation: Ottawa, Canada
Date published: 22-05-2014

Former public safety minister Stockwell Day says he hopes the Conservative government takes "another look" at its bill to fight cybercrime and curtails some of the powers it would give to police.Speaking as a panellist on CBC News Network's Power &amp; Politics, Day said he's sympathetic to concern... Read more

Source: www.cbc.ca

Top found tags: cybercrime(2),cyber security(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
European Cybercrime Centre: don't use free anti malware productsLocation: Europol HQ - Den Haag, The Netherlands
Date published: 22-05-2014

In an interview with the website Information Age, the head of the European Cybercrime Centre states that business and home should invest in good digital security products and shouldnt use free antivirus/antimalware software. The European Cybercrime Centre is part of Europol, the law enforcement ... Read more

Source: www.myce.com

Top found tags: United States(2),government(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SNMP DDoS Attacks SpikeLocation: Akamai - Boston, United States
Date published: 22-05-2014

Akamai issues threat advisory on attack campaign that uses Team Poison-developed DDoS toolkit.No botnet necessary: Yet another flavor of distributed denial-of-service (DDoS) attacks that doesn't require infecting PCs is on the rise.Akamai's Prolexic Security Engineering and Response Team (PLXsert) ... Read more

Source: www.darkreading.com

Top found tags: cyber security(2),DoS(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android business users targeted by mafia-made malware appLocation: Google HQ - Mountain View, United States
Date published: 23-05-2014

A new malware named iBanking is being used by Russian cybercrime gangs to infiltrate the business and finance sectors.The tool is one of the most expensive pieces of malware sold on underground markets, according to security company Symantec. Its designer even distributes the virus with a Sof... Read more

Source: www.itpro.co.uk

Top found tags: trojan(2),cybercrime(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security Picture Shows Less Spam, Java as Top ExploitLocation: Trustwave - Chicago, United States
Date published: 23-05-2014

One of the largest, most comprehensive annual security reports in any given year is the Trustwave Global Security report, and this year's edition is no exception. Released May 21, the 2014 Trustwave Global Security Report is a 123-page amalgam of information and statistics on the state of the infor... Read more

Source: www.eweek.com

Top found tags: information security(2),United States(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile phone users help watchdog track down text spammersLocation: Information Commissioner's Office - Cheshire, United Kingdom
Date published: 23-05-2014

The Information Commissioner's Office has raided a SIM farm in Wolverhampton, after mobile phone users helped to identify it as the source of thousands of spam text messages Mobile phone users have helped Britain's data privacy watchdog track down a SIM farm responsible for sending out ... Read more

Source: www.telegraph.co.uk

Top found tags: Information Commissioner Office(3),United Kingdom(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacked databases show need for better security: expertsLocation: Londen, United Kingdom
Date published: 22-05-2014

Yet another cyber attack on a corporate database has online security experts calling on companies to improve the way they keep our private information private and possibly replace traditional passwords. EBay revealed Wednesday that a database containing encrypted passwords had been compromised,... Read more

Source: www.thestar.com

Top found tags: cyber security(4),telecom sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How charities can understand and prepare for cyber crime and riskLocation: Zurich, Wnseradiel, Friesland, The Netherlands
Date published: 23-05-2014

Do you know how many emails are sent around the globe every 60 seconds? 168m. That's 2.8m conversations whizzing between us each second over email alone Twitter reports an average of 500m tweets per day, while Facebook has a population nearly 20 times that of the UK.Today's charities operate in... Read more

Source: www.theguardian.com

Top found tags: cyber security(4),cybercrime(6),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Hazleton man arrested on credit card fraud at Louisiana casinoLocation: Louisiana, United States
Date published: 22-05-2014

HAZLE TWP. State police at Hazleton captured a man from Hazleton early Thursday morning on an arrest warrant charging him with credit card fraud at a casino in Louisiana. Felix Alberto Colon, 31, of West 12th Street, was jailed at the Luzerne County Correctional Facility on a fugitive from just... Read more

Source: www.timesleader.com

Top found tags: credit card(2),identity theft(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australia's cybercrime costs USD4.2bn annuallyLocation: Sydney, Australia
Date published: 23-05-2014

Cybercrime in Australia costs an estimated USD4.2bn annually and yet Australian companies are failing to adequately address their cyber risk exposure, said Aon Financial Specialties' managing director in Australia, Jenifer Richards. The average cost per data breach was AUD2.16m (USD1.99m) said Rich... Read more

Source: www.asia-first.com

Top found tags: cybercrime(2),cyber security(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2 men admit roles in $15 million international cybercrime schemeLocation: New York City, New York, United States
Date published: 21-05-2014

TRENTON, N.J. Two members of an alleged international cybercrime, identity theft and credit card fraud conspiracy pleaded guilty Tuesday to their roles in a scheme to use information hacked from customer accounts at more than a dozen banks, brokerage firms, payroll processing companies and gove... Read more

Source: www.ice.gov

Top found tags: government(3),United States(6),financial sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Most companies can't detect data breachesLocation: Trustwave - Chicago, United States
Date published: 22-05-2014

Victim companies take 87 days to detect breaches but just one week to contain them. About 71% of compromised companies could not detect data breach incidents themselves during 2013, despite the number of incidents increasing 54% compared to 2012, according to a report from Trustwave.According to an... Read more

Source: www.cbronline.com

Top found tags: Germany(2),Hong Kong(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers find large global botnet of infected PoS systemsLocation: Wellington, New Zealand
Date published: 23-05-2014

Security researchers uncovered a global cybercriminal operation that infected with malware almost 1,500 point-of-sale (POS) terminals, accounting systems and other retail back-office platforms from businesses in 36 countries.The infected systems were joined together in a botnet that researchers fro... Read more

Source: www.pcworld.com

Top found tags: United Kingdom(2),United States(2),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBay data breach: Now what?Location: eBay - San Jose, United States
Date published: 21-05-2014

The data thieves strike again. This time it's eBay. What does that mean for users? It's password change time again.Even for folks who had come up with clever passwords, it's time to dump them in favor of a new one. And, as annoying as it may be, if you use the same password on eBay as you do on oth... Read more

Source: www.boston.com

Top found tags: cyber security(4),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBay Discloses Major Data BreachLocation: eBay - San Jose, United States
Date published: 21-05-2014

Another internet security threat potentially affects a multitude of users, and this time the target was eBay. According to a press release, eBay, which got famous an auction site and now provides all sorts of other services with nearly 140 million active accounts, is urging users to change their pa... Read more

Source: www.popularmechanics.com

Top found tags: cyber security(2),data breach(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Illinois, Florida join Connecticut in eBay probeLocation: Connecticut, United States
Date published: 22-05-2014

NEW YORK (Reuters) - Illinois and Florida are joining Connecticut to lead a probe of the massive data breach at eBay Inc, according to a spokeswoman for Illinois Attorney General Lisa Madigan. Meanwhile, New York Attorney General Eric Schneiderman is asking for free credit monitoring fo... Read more

Source: www.chicagotribune.com

Top found tags: EN(1),data breach(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
10 accused of $20 million in identity theft fraudLocation: Alabama, United States
Date published: 22-05-2014

Ten people have been indicted in connection with a stolen identity refund ring, accused of illegally receiving $20 million through more than 7,000 in false tax returns over three years ending in December 2013.Among those indicted were Tracy Mitchell who worked at the hospital on Fort Benning where ... Read more

Source: www.ajc.com

Top found tags: United States(2),telecom sector(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Breaches Could Be The New Norm For Online ShoppersLocation: eBay - San Jose, United States
Date published: 22-05-2014

As the Web this week absorbed another reminder of the vulnerability of data -- this time, the theft of some 145 million records from eBay -- experts say that online consumers may have to accept that their personal information isnt safe from hackers. For the time being, it is the new normal,... Read more

Source: www.ibtimes.com

Top found tags: telecom sector(2),financial sector(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MediaPost Publications Ad Groups Push For Data Breach LawLocation: United States Capitol - Washington D.C., United States
Date published: 22-05-2014

A coalition of industry groups says it supports a national law requiring companies to notify consumers about data breaches -- but only when the breach poses a significant risk ofidentity theft or economic harm. An overly inclusive trigger would cause consumers to be burdened with unnecessary ... Read more

Source: www.mediapost.com

Top found tags: legislation(2),government(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
L.A. County finds 3,500 more patients affected by data breachLocation: Los Angeles, United States
Date published: 22-05-2014

Los Angeles County officials said Thursday that an additional 3,497 patients may have had their personal information taken in a theft of medical data from a county contractor's office.Eight computers were taken from the Torrance office ofSutherland Healthcare Solutions, a company that handles medic... Read more

Source: www.latimes.com

Top found tags: medical sector(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Children in foster care vulnerable to identity theftLocation: Michigan, United States
Date published: 22-05-2014

Easier to fix identity theft issues when children are still minors, but they often do not find out until they turn 18. Identity theft is a serious crime. Child identity theft happens when someone uses a minors personal information to commit fraud. A minors identity may be stolen f... Read more

Source: msue.anr.msu.edu

Top found tags: education(2),identity theft(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBay faces investigation over breachLocation: eBay - San Jose, United States
Date published: 23-05-2014

The UK's information commissioner is working with European data authorities with a view to taking action against eBay over its recent data breach. Three US states are also investigating the theft of names, email addresses and other personal data, which affected up to 145 million eBay customers. The... Read more

Source: www.bbc.com

Top found tags: identity theft(2),United Kingdom(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What Enterprises Can Learn From eBay Data BreachLocation: eBay - San Jose, United States
Date published: 22-05-2014

There are steps enterprises can take to avoid data breaches like the one eBay suffered recently. To protect against data breaches, companies could provide active defense against credential-stealing malware on workers' machines, especially when they're using their own devices. And eBay and others sh... Read more

Source: www.data-storage-today.com

Top found tags: cyber security(2),data breach(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Status of Data Breach Notification Laws in the United StatesLocation: Verizon HQ - New York, United States
Date published: 23-05-2014

In 1748, in response to the request of a friend, Benjamin Franklin offered the following hints in his pamphlet, Advice to a Young Tradesman, Written by an Old One: Remember that time is money. Remember that credit is money.In a patchwork landscape of data breach notification laws, these words... Read more

Source: www.propertycasualty360.com

Top found tags: OpenSSL(2),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
European Regulators to Start Inquiry Into eBay Data BreachLocation: eBay - San Jose, United States
Date published: 23-05-2014

LONDON The fallout from the data breach at eBay has reached Europe.Next week, regulators here will begin an investigation into the online market after hackers gained access to the personal data of 145 million customers, said Grard Lommel, president of the Luxembourg data protection authority,... Read more

Source: www.nytimes.com

Top found tags: FBI(2),government(3),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Top 10 Tips for Cyber Resilience - CIOLocation: New York, United States
Date published: 23-05-2014

Presented in the form of the top 10 tips for cyber resilience, this whitepaper provides a simple, easy to digest guide for enterprise on how best to secure your business against cyber risk and threats.... Read more

Source: www.cio.com.au

Top found tags: EN(1),threat(1),cyber resilience(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why you should ditch Adobe ShockwaveLocation: Adobe HQ - San Jose, United States
Date published: 22-05-2014

This author has long advised computer users who haveAdobe'sShockwave Playerinstalled to junk the product, mainly on the basis that few sites actually require the browser plug-in, and because it's yet another plug-in that requires constant updating. But I was positively shocked this week to learn th... Read more

Source: www.smh.com.au

Top found tags: update(2),vulnerability(3),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trustwave: Companies learn of malware attacks faster, but still slowLocation: Trustwave - Chicago, United States
Date published: 22-05-2014

Companies still need great help trying to shorten time of malware infection to discovery and resolution, according to a study from TrustwaveAlthough companies are learning of malware infections and other security breaches faster than previous years, very few companies are able to detect... Read more

Source: www.tweaktown.com

Top found tags: EN(1),trend(1),Trustwave(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
French operation busts bankcard labs in BulgariaLocation: Sofia, Bulgaria
Date published: 22-05-2014

Nancy. Laboratories for the production of fake bankcards have been busted in a special operation carried out in Bulgaria, including raids at the homes of suspected members of an international crime group. The group is said to have started operating in 2011 in France and Germany, AFP reported citing... Read more

Source: www.focus-fen.net

Top found tags: Germany(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Credit card fraud warning after scammers steal cashLocation: London, United Kingdom
Date published: 22-05-2014

Residents in Whitstable and Herne Bay are being warned to be vigilant after several incidents of credit card fraud were discovered.There have been reports scammers have cloned cards and spent people's money without the owner knowing about it.BayPromoTeam events organiser Gerald McCarthy... Read more

Source: www.kentonline.co.uk

Top found tags: credit card(2),financial sector(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DA: Jail time for 2 more involved in 'skimming' scam using LIRR ticket machinesLocation: Long Island, New York, United States
Date published: 22-05-2014

Two Queens men involved in a "skimming" scam using Long Island Rail Road ticket vending machines to steal money from commuters were each sentenced Thursday to 1 year in jail, prosecutors said. Nassau County Court Supervising Judge Christopher Quinn also ordered Dorin Husa, 38, and Niculae Petre, 46... Read more

Source: www.newsday.com

Top found tags: credit card(2),United Kingdom(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man wanted for credit card fraud in Atlantic CityLocation: New York, United States
Date published: 22-05-2014

Authorities in Atlantic City are searching for a suspect who used a lost/stolen credit card. Police say the suspect used the card at the New Farmer's Market on the 2700 block of Atlantic Ave. Anyone with information is urged to contact Atlantic City Police Department at (609) 347-5766 or call Crime... Read more

Source: www.nbc40.net

Top found tags: credit card(2),financial sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police: Banks Lost Over $9,000 To Credit Card Skimming Operation On LongIslandLocation: Hem, Drechterland, Noord-Holland, The Netherlands
Date published: 23-05-2014

GARDEN CITY, N.Y. (CBSNewYork) Two men were charged Thursday with using a skimming device to capture credit numbers and create fraudulent cards resulting in losses of $9,000 to multiple banks.Kenneth Osias, 30, of Brentwood, and Otis Barnes, 23, of Brooklyn, were both charged with grand lar... Read more

Source: newyork.cbslocal.com

Top found tags: The Netherlands(2),government(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police bust Thai-Chinese credit card fraud ringLocation: Beijing, China
Date published: 23-05-2014

Fourteen Thai and Chinese nationals were arrested for allegedly operating a large-scale credit card fraud ring from a central Pattaya apartment house. Officers from the Transitional Crime Coordination Center apprehended Chaisit Bunpeng, 32, at a McDonalds restaurant on Sukhumvit Road May 9 where... Read more

Source: www.pattayamail.com

Top found tags: Thailand(2),financial sector(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bulgaria neutralizes 3 skimming equipment workshopsLocation: Sofia, Bulgaria
Date published: 22-05-2014

SOFIA, May 22 (Xinhua) -- Bulgaria has neutralized three workshops for skimming equipment in the city of Varna and arrested an organized group of 11 suspects in abuse of electronic payment instruments, officials said Thursday.Bulgarian State Agency for National Security (SANS) said in a statement o... Read more

Source: www.shanghaidaily.com

Top found tags: financial sector(2),France(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
11 Bulgarians Arrested for Skimming Credit CardsLocation: Sofia, Bulgaria
Date published: 23-05-2014

11 Bulgarians were arrested by the State Agency for National Security (DANS) for draining credit cards through skimming devices.4 of the 11 Bulgarians who were arrested had European Arrest Warrant (EAW) issued against them, according to a media statement of DANS.The arrests were made as part of an ... Read more

Source: www.novinite.com

Top found tags: France(2),financial sector(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Location: Kaspersky HQ - Moscow, Russia
Date published: 22-05-2014

Datgene wat het zo moeilijk maakt om cybercriminaliteit te bestrijden, is dat bedrijven er vaak pas achter komen dat het heeft plaatsgevonden wanneer het te laat is. Het is vaak heel moeilijk om cyberaanvallen in real-time te detecteren, maar dit is nu een stuk makkelijker gemaakt met een nieuwe we... Read more

Source: www.marqit.nl

Top found tags: trojan(2),Kaspersky Lab(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Nieuws" Facebook gaat apparaten scannen op malwareLocation: Trend Micro - Cupertino, United States
Date published: 22-05-2014

Facebook is een samenwerking aangegaan met malware-bestrijder F-Secure en app-bouwer Trend Micro. Het sociale netwerk geeft vanaf nu een waarschuwing wanneer een gebruiker probeert in te loggen met een apparaat dat met een virus besmet is.Facebook wil gebruikers waarschuwen voor virussen en malware... Read more

Source: www.easybranches.nl

Top found tags: social media(2),Trend Micro(2),antivirus(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Take responsibility for your own security IFGLocation: National Crime Agency - London, United Kingdom
Date published: 23-05-2014

Information sharing, responsibility for security, and the balance between the state and the individual were among topics covered by the International Fraud Group forum. At a panel discussion of the International Fraud Group (IFG) hosted by Mishcon de Reya Solicitors in its Red Lion Squa... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(4),government(5),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
I will focus more on domestic abuse and cyber-cime, police commissioner to say in annual lectureLocation: Hertfordshire, United Kingdom
Date published: 22-05-2014

Anyone who lives, works or runs an organisation in Hertfordshire is invited to attend the Herts Police and Crime Commissioners annual lecture at the University of Hertfordshire in Hatfield. The free two-hour talk starts at 6pm on Monday, June 16, at the venues Weston Auditorium on the de Havi... Read more

Source: www.hemeltoday.co.uk

Top found tags: trend(1),cybercrime(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kabinet voert hogere straffen in voor computercriminaliteitLocation: Brussel, Belgium
Date published: 23-05-2014

Criminelen die computergegevens vernielen, computersystemen ontoegankelijk maken door aan wachtwoorden te sleutelen of computers bestoken met spam zodat de boel vastloopt, kunnen straks een gevangenisstraf van maximaal twee jaar tegemoet zien. Nu is dat nog n jaar. Wanneer ze deze delicten pleg... Read more

Source: www.rijksoverheid.nl

Top found tags: critical infrastructure(4),government(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Aandachtspunten bij het invoeren van BYODLocation: Brussel, Belgium
Date published: 22-05-2014

Samenvatting:BYOD, een hype? Een toverwoord om de tevredenheid van de werknemer op te krikken? Toch schrikken veel CIOs terug voor het invoeren van BYOD. Grootste struikelblok is vaak de veiligheid. Niettemin zijn er ook fiscale, juridische en HR-aandachtspunten. We zetten de aandachtspunten even o... Read more

Source: www.smartbiz.be

Top found tags: cyber security(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Nieuwe exploit-kit bedreigt browsersLocation: Brussel, Belgium
Date published: 22-05-2014

De nieuwe kit met de mooie naam Infinity, is nog niet zo heel bekend. Wel zou vaststaan dat vooral Internet Explorer, Firefox en Opera gevaar lopen als ze niet helemaal up-to-date zijn. Chrome lijkt nog even buiten schot te blijven. Dit wordt gemeld door IntelCrawler. Infinity zou regel... Read more

Source: www.minatica.be

Top found tags: NL(1),Internet Explorer(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish