Under construction

New design coming soon!

CIC News engine statistics

CIC News for 07-06-2014 contains 53 articles: cybercrime(24),cyber security(7),data breach(18),other(4)

CIC News update contains 47 English and 6 Dutch articles for today.
In today's English news articles:
- 20 related to cybercrime
- 7 related to cyber security
- 18 related to data breach and identity theft
- 2 for the category other news

In today's Dutch news articles:
- 4 related to cybercrime
- 0 related to cyber security
- 2 for the category other news

Have fun reading.

English cybercrime related news

Cristiano Ronaldo, Lionel Messi and Wayne Rooney emerge as huge malware threats ahead of 2014 FIFA World CupLocation: McAfee - Santa Clara, United States
Date published:05-06-2014

Cristiano Ronaldo has emerged as one of this years most potent cybercrime threats with criminals looking to take advantage of searches bearing his name.A McAfee study found that searches for the preening Portugal stars name are the most likely to return results that redirect users to malicious... Read more

Source:

Top found tags: threat(1),trojan(2),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware attacks VN smartphonesLocation: Bkav Corp. HQ - Mountain View, United States
Date published:06-06-2014

VietNamNet Bridge A malware has infected over 20 per cent of smartphones in Viet Nam, draining mobile accounts of thousands of subscribers, stated BKAV, Viet Nam biggest security firm.The virus called \"SMS Trojans\" has been sending SMS texts to premium-rate numbers, causing losses of VND3.9 bi... Read more

Source: english.vietnamnet.vn

Top found tags: trojan(2),cybercrime(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Porn Spam Gets a Kik Out of YouLocation: Twitter - San Francisco, United States
Date published:05-06-2014

Spammers want to you to use the instant-messenger mobile app Kik, and they\'ll promise you lots of porn to get you to do it. The trend of luring sex-starved smartphone users to Kik first kicked off in the summer of 2013, according to Mountain View, California-based security company Symantec, which h... Read more

Source: www.tomsguide.com

Top found tags: Windows(1),social media(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers exploit Cryptolocker hysteriaLocation: New York, United States
Date published:06-06-2014

Hackers have launched a massive phishing campaign to exploit the fear generated by the Cryptolocker ransomware.A spam email campaign, discovered by BullGuard, has just been detected that offers decryption keys for Cryptolocker. The email says a tool can be downloaded that it claims will unlock... Read more

Source: www.yareah.com

Top found tags: cybercrime(3),financial sector(4),malware(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malcovery Security Issues Special Report on GameOver Zeus MalwareLocation: IBM HQ - Armonk, United States
Date published:06-06-2014

Pittsburgh, PA. (PRWEB) June 05, 2014Malcovery Security announced today that it has issued a special report, The many faces of GameOver Zeus: A Todays Top Threats special topic report, which is free to download at http://info.malcovery.com/special-report-many-faces-of-gameover-zeus. Despite th... Read more

Source: www.busbyway.com

Top found tags: financial sector(4),social media(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RIG Attack Kit May Push Ransomware To Facebook UsersLocation: Facebook - Menlo Park, United States
Date published:06-06-2014

A new attack toolkit called RIG is gaining popularity and is impacting users of Facebook, eBay and other popular websites, according to Cisco Systems.The RIG Exploit Kit spreads dangerous malware by infiltrating advertising networks, embedding malicious links in ads that redirect users to ransomware... Read more

Source: www.crn.com

Top found tags: malware(2),social media(2),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What to avoid in Dropbox-related phishing attackLocation: Dropbox - San Francisco, United States
Date published:06-06-2014

Criminals are using malware stored in Dropbox in phishing campaign aimed at corporate employees, security researcher saysCorporate employees familiar with Dropbox should take extra precautions to avoid becoming a victim of a phishing attack that uses the popular file-sharing service.Cybercriminals h... Read more

Source: www.csoonline.com

Top found tags: financial sector(2),malware(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
KnowBe4 backs its training with a crypto-ransom guaranteeLocation: KnowBe4 - Clearwater, United States
Date published:06-06-2014

Ransomware attacks like CryptoLocker have been plaguing users for a while now. The recent shutdown of the Gameover Zeus botnet has led to a dramatic decline in these types of attacks, but you can expect that cybercriminals will regroup and launch new ones soon enough. But KnowBe4, a company that off... Read more

Source: www.pcworld.com

Top found tags: financial sector(4),malware(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adult webcam spam sends sexters to KikLocation: Symantec HQ - Mountain View, United States
Date published:06-06-2014

Symantec has discovered that most adult webcam spam leads to Kik, an instant messaging service for all smartphones, according to a Thursday blog post on the Symantec website.Symantec began tracking the trend last year, with the first cross advertising for Kik spam surfacing on Twitter in 2013 at the... Read more

Source: www.scmagazine.com

Top found tags: website(1),social media(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Largest DDoS Attacks Zero In on Financial Services CustomersLocation: New York, United States
Date published:06-06-2014

VeriSign sits at a key location within the Internet infrastructure as manager of root zone Domain Name System (DNS) and the dot-com top-level domain. VeriSign also runs a security business with its distributed denial-of-service (DDoS) protection services, giving it further insight into the state of ... Read more

Source: www.eweek.com

Top found tags: trend(1),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Illuminating The Etumbot APT BackdoorLocation: New York, United States
Date published:06-06-2014

he Arbor Security Engineering Response Team (ASERT) has released a research paper concerning the Etumbot malware.Etumbot is a backdoor used in targeted attacks since at least March 2011. Indicators suggest that Etumbot is associated with the Numbered Panda group, also known as IXEHSE, DynCalc, and A... Read more

Source: www.arbornetworks.com

Top found tags: backdoor(2),phishing(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDoS Attacks Growing in Volume and ComplexityLocation: New York, United States
Date published:05-06-2014

Amplification tactics have become the new normal, replacing botnets.It comes as no surprise that the distributed denial-of-service (DDoS) attack landscape continues to evolve in size and complexity, thereby putting companies at a disadvantage. Supporting this, a report from Verisign saw an 83% incre... Read more

Source: www.infosecurity-magazine.com

Top found tags: website(1),DoS(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The roles of Interpol and NEC in fighting cybercrimeLocation: Interpol - Lyon, France
Date published:06-06-2014

On Monday (June 2, 2014), representatives from the International Criminal Police Organisation (Interpol) and IT company NEC spoke on the issue of fighting cybercrime at the Interpol-NEC breakfast seminar held in Singapore.Approximately 30 industry professionals, including those from government and t... Read more

Source: mis-asia.com

Top found tags: training(1),cybercrime(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber experts to assess KenyasLocation: Nairobi, Kenya
Date published:07-04-2014

By Chrispinus Omar NAIROBI, (Xinhua) -- Cyber security experts from the world are due to meet in Nairobi next week for an international conference aimed at assessing the readiness of Kenya to combat cybercrime.The Kenya 2014 Cyber Security Conference will provide an opportunity to review the outcome... Read more

Source: www.coastweek.com

Top found tags: United States(2),government(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A multi-level approach to understanding the impact of cyber crime on the financial sectorLocation: London, United Kingdom
Date published:06-06-2014

This paper puts forward a multi-level model, based on system dynamics methodology, to understand the impact of cyber crime on the financial sector. Consistent with recent findings, our results show that strong dynamic relationships, amongst tangible and intangible factors, affect cyber crime cost an... Read more

Source: eprints.lse.ac.uk

Top found tags: framework(1),report(1),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
For Banks, Better Data Management Means More Effective Fraud and Crime PreventionLocation: Banks, United States
Date published:06-06-2014

Banking is digitizing rapidly, especially in the use of digital and mobile devices to access bank services and make payments, thereby enhancing the convenience and service for the banking customer. These advances, however, have created significant opportunities for the perpetrators of fraud and fina... Read more

Source: www.forbes.com

Top found tags: mobile device(2),telecom sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Univ. of Alabama to launch program to fight cyber crimesLocation: Alabama, United States
Date published:06-06-2014

TUSCALOOSA, AL (WBRC) -The University of Alabama is joining the fight against cyber crime.The school\'s Criminal Justice Department hopes to open a cyber crime lab to assist law enforcement prosecute cyber crimes later this year.Governor Robert Bentley awarded the university a $60,000 grant to get t... Read more

Source: www.myfoxal.com

Top found tags: Department of Justice(3),education(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Days After a Federal Seizure, Another Type of Ransomware Gains GroundLocation: Cisco HQ - San Jose, United States
Date published:06-06-2014

SAN FRANCISCO It has been mere days since federal agents seized control of computer networks used by hackers to infect victims with CryptoLocker, a piece of malware known as ransomware, which encrypts the contents of computing devices so hackers can demand a ransom to decrypt it. Now secur... Read more

Source: breakingdefense.com

Top found tags: United States(2),malware(3),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
We will be paying no ransom, vows town hit by Cryptowall ransom malwareLocation: Cisco HQ - San Jose, United States
Date published:07-06-2014

The town manager of a hamlet in south eastern New Hampshire has defied demands that he pay a ransom to recover police department computer files taken hostage by Cryptowall, a newer piece of malware that encrypts hard drive contents of infected machines until victims pay for them to be decrypted.\"Ma... Read more

Source: arstechnica.com

Top found tags: cybercrime(2),malware(3),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
QUEENS SPEECH 2014 TOUGHER CYBERCRIME LAWS TO BE INTRODUCEDLocation: National Crime Agency - London, United Kingdom
Date published:05-06-2014

In Wednesdays Queens speech, an update to the Computer Misuse Act 1990 (CMA) was proposed as part of the Serious Crime Bill, with much longer sentences outlined for UK hackers.The Bill stated the National Crime Agency would be provided with the tools they need to effectively tackle serious ... Read more

Source: girlgeekcoffees.co.uk

Top found tags: United Kingdom(2),update(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

16 New Cybercrime Infographics from May 2014Location: New York, United States
Date published:06-06-2014

Every month HackSurfer shares the various cybercrime and cybersecurity infographics we come across. Did we miss yours?... Read more

Source: www.hacksurfer.com

Top found tags: infographic(1),cybercrime(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beijing Sets Sights on Third Party Android Stores in Cleanup ActLocation: Google HQ - Mountain View, United States
Date published:06-06-2014

Clampdown on malicious apps could help purge the platform.The Chinese government is set to monitor third party Android app stores for signs of malware and force sites to share information on blacklisted apps, in a move which could go some way towards cleaning up an ecosystem riddled with malicious c... Read more

Source: www.infosecurity-magazine.com

Top found tags: government(2),telecom sector(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Echoes of Heartbleed: A New OpenSSL ExploitLocation: Google HQ - Mountain View, United States
Date published:06-06-2014

LOS ANGELES With adult webmasters still reeling from unexpected vulnerabilities in OpenSSL that were exploitable by Heartbleed, a new threat has emerged, adding to the concerns over Internet safety.Heartbleed targeted the Secure Sockets Layer (SSL) protocol that underpins secure online exc... Read more

Source: newswire.xbiz.com

Top found tags: OpenSSL(2),telecom sector(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDoS attacks. What Are They and How Can They Hurt My Email Campaign?Location: Weber, United States
Date published:06-06-2014

Im sure most of you will be familiar with DDoS (Distributed Denial of Service) attacks and might have even been affected by one, but if not, heres a quick break down. A DDoS attack works by flooding a network / server / router with so much traffic that it cant respond to regular requests, e... Read more

Source: smallbusiness.yahoo.com

Top found tags: trojan(2),financial sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vodafone Prompts Protests as Government Wiretapping RevealedLocation: Vodafone HQ - Maastricht, The Netherlands
Date published:06-06-2014

Vodafone Group Plc (VOD), the second-largest mobile-phone company, stirred an outcry from privacy groups from the U.K. to Italy as it revealed the extent of wire-taps by governments around the world.In its first law-enforcement disclosure report, Vodafone said 29 governments from Albania to the U.K.... Read more

Source: www.bloomberg.com

Top found tags: United States(6),government(10),telecom sector(18)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker passwords not much stronger than the average user\'s, researcher findsLocation: New York, United States
Date published:06-06-2014

Hacker passwords are not all that much stronger than those used by the average user, according to an AVAST researcher.Antonin Ha, a virus lab analyst with AVAST who analyzed nearly 2,000 passwords this week, told SCMagazine.com in a Friday email correspondence that the passwords he studied were ... Read more

Source: www.scmagazine.com

Top found tags: Black Hat(2),cyber security(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vodafone Calls For End To Warrantless WiretapsLocation: Vodafone HQ - Maastricht, The Netherlands
Date published:06-06-2014

One of the worlds largest mobile phone companies has detailed the existence of secret government eves dropping while calling an end to warrantless wiretaps, a practice that at one point would have landed government officials in trouble if not jail.Vodafone blows the whistle in 88 page document ou... Read more

Source: www.valuewalk.com

Top found tags: United States(4),government(5),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Most people have not protected themselves against fraud since Target breach, says reportLocation: Target HQ - Minneapolis, United States
Date published:05-06-2014

Over 260 million people have been victims of data breaches and increased risk of identity theft since the Target revelations, yet nearly 80 percent have done nothing to protect their privacy or to guard their financial accounts from fraud, according to a new quarterly survey released by Denver-based... Read more

Source: www.gsnmagazine.com

Top found tags: government(3),telecom sector(4),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
\'Serious\' data breach reveals SCAS vulnerabilityLocation: Martin, United States
Date published:04-06-2014

BBC Radio Berkshire Freedom of Information request to the South Central Ambulance Service (SCAS) revealed a data breach that included the insurance details, age, sexuality and religion of almost 3,000 staff members.According to the BBC the \'serious\' breach - which took place in October 2013 - is s... Read more

Source: www.scmagazineuk.com

Top found tags: data breach(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBay victim of historic data breachLocation: eBay - San Jose, United States
Date published:05-06-2014

Those who use eBay for any reason have been advised to think about changing their passwords, in the wake of the online retailer admitting that user data has been compromised. The breach is considered to be the second worst ever to have occurred in the US.Online security experts feel that eBay should... Read more

Source: www.acumin.co.uk

Top found tags: website(1),cyber security(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is Data Breach Fatigue Making Us Careless?Location: Unisys - Blue Bell, United States
Date published:06-06-2014

A seemingly endless series of headlines about data breaches has drawn greater attention to all the deficiencies and problems surrounding digital security. Yet, despite all the recent news about Target, Erik Snowden and the Heartbleed bug, there\'s been relatively little concern among consumers, acco... Read more

Source: www.baselinemag.com

Top found tags: United States(2),cybercrime(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
American Express Data Breach Affects 76,000 in CaliforniaLocation: California, United States
Date published:06-06-2014

About 76,000 American Express (AXP) customers in California may be victims of a data breach, the company announced this week. The names and account numbers of 58,522 California residents may have been compromised, and 18,086 additional customers in the state may have other information stolen, not in... Read more

Source: www.dailyfinance.com

Top found tags: credit card(2),data breach(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.K. Ambulance Service Acknowledges Data BreachLocation: New York, United States
Date published:06-06-2014

The South Central Ambulance Service mistakenly published the age, sexuality and religion of each of its 2,826 staff members.BBC News reports that the U.K.\'s South Central Ambulance Service (SCAS) accidentally leaked the age, sexuality and religion of its entire staff of 2,826 employees as of Octobe... Read more

Source: www.esecurityplanet.com

Top found tags: website(1),data breach(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Forces Korea suffers data breachLocation: Seoul, South Korea
Date published:06-06-2014

A database breach has exposed the personal details of 16,000 South Koreans who work for the US Military. The compromise came to light on May 28, 2014 and the alert was sent to the affected parties on June 5, 2014Yesterday brought news that there was a database breach that exposed the personal detail... Read more

Source: www.csoonline.com

Top found tags: EN(1),data breach(2),South Korea(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Providence man pleads guilty to identity theftLocation: Providence, United States
Date published:06-06-2014

PROVIDENCE, R.I. (AP) A Providence man has pleaded guilty to participating in a scheme that collected the personal information of more than 1,200 people and used many of the identities to file fraudulent tax returns totaling more than $1.8 million.The U.S. attorney\'s office said Friday 22-year-... Read more

Source: www.sfgate.com

Top found tags: government(2),identity theft(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Digital Privacy Act should be a lot stronger on data breach reporting: GeistLocation: Ottawa, Ontario, Canada
Date published:06-06-2014

Mandatory data breach rules can be an effective privacy tool, but only work if breaches are disclosed in timely fashion.News this week of a stunning data breach at a Toronto-area hospital involving information on thousands of mothers places the proposed Digital Privacy Act squarely in the spotlight.... Read more

Source: www.thestar.com

Top found tags: identity theft(2),New Zealand(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Breach Roundup: May 2014Location: Ford, United States
Date published:06-06-2014

Third-party vendors played a significant part in a handful of data breaches in May. This is why, experts say, companies must ensure vendors are careful with their data.On a regular basis, eSecurity Planet looks back at data breaches weve covered over the past month, providing an admittedly unscie... Read more

Source: www.esecurityplanet.com

Top found tags: medical sector(2),New Zealand(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hershey Medical Center notifies 1,801 patients of data breachLocation: New York, United States
Date published:06-06-2014

Penn State Hershey Medical Center said it has notified 1,801 patients of a privacy breach, after it was discovered an employee had been working with protected health information from his home computer.Officials at the hospital said in a press release Friday afternoon that results of an extensive int... Read more

Source: lancasteronline.com

Top found tags: health sector(2),medical sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Massive Data Breach Affects Hundreds of Miami-Dade County EmployeesLocation: Miami, United States
Date published:06-06-2014

Miami-Dade County employees\' personal information is being used to file fraudulent unemployment claims.A massive data breach has affected hundreds of Miami-Dade County employees, according to two independent NBC 6 sources.NBC 6 has confirmed county employees\' personal information is being used to ... Read more

Source: www.nbcmiami.com

Top found tags: data breach(2),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICYMI: Praise for Operation Tovar, Vodafone transparency & Open SSL problemsLocation: National Crime Agency - London, United Kingdom
Date published:06-06-2014

The big news in this week\'s In Case You Missed It (ICYMI) column is the FBI-led Operation Tovar, which saw the disruption of the Gameover Zeus and CryptoLocker botnets.Operation Tovar: Big win for cybercrime investigatorsThis week\'s Operation Tovar saw investigators from the FBI, the UK National C... Read more

Source: www.scmagazineuk.com

Top found tags: telecom sector(6),government(9),cybercrime(11)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why Africa Needs A Cybercrime Emergency Response TeamLocation: New York, United States
Date published:07-06-2014

Cyber threat is a big issue in Africa. A lot of cybercrime originates here and threats spread easily because many servers, networks, and computers are not properly protected.A range of online criminal activities is on the rise, including financial fraud, drugs and human trafficking, and terrorism. M... Read more

Source: www.infoboxdaily.com

Top found tags: security measures(2),government(5),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Infographic: Cyber Crime 2013 The Year of the Mega BreachLocation: Ottawa, Canada
Date published:06-06-2014

The year 2013 yielded record breaking data breaches and cyber crime numbers in the business community. Upon reviewing multiple reports generated by industry heavy hitters, like IBM and Symantec, weve created an infographic of some of their key findings.... Read more

Source: blog.terago.ca

Top found tags: Symantec(1),data breach(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime: Vizag next only to BangaloreLocation: Bangalore, Karnataka, India
Date published:06-06-2014

The City of Destiny has earned the dubious distinction of being second city, after Bangalore, in the number of cyber crimes, according to the latest National Crime Records Bureau (NCRB) statistics. Confirming it, Deputy Commissioner of Police (Law and Order) Srinivasulu told The Hindu , It has co... Read more

Source: www.thehindu.com

Top found tags: cybercrime(4),cyber security(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tokenisation may offer antidote to soaring cyber crime epidemicLocation: Chase, United States
Date published:06-06-2014

As the number of cybercrime incidents increases, financial institutions and their corporate customers should take renewed steps to protect their data including using tokenisation and hosted payments pages, according to a new report by Chase Paymantech.Incidents of fraud, typically involving stol... Read more

Source: www.bankingtech.com

Top found tags: United Kingdom(2),cybercrime(5),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime Awareness: Make us safer or just more fatigued?Location: Unisys - Blue Bell, United States
Date published:05-06-2014

It seems as if 2013 was the year cybercrime finally went mainstream. It\'s been a year and a day since NSA surveillance took over the news cycle, and we\'re now half a year removed from the massive Target breach that had the entire nation discussing credit card fraud.2014 seems to be continuing that... Read more

Source: www.hacksurfer.com

Top found tags: United States(2),cybercrime(8),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Is Microsoft Making Windows XP PCs Vulnerable on Purpose?Location: Microsoft HQ - Redmond, United States
Date published:06-06-2014

Microsoft today announced that this month\'s Patch Tuesday cycle will bring a total of seven security updates, one of which is also expected to address a critical flaw in Internet Explorer 8 that was revealed and acknowledged by the company itself in May.Since Windows XP reached end of support on Ap... Read more

Source: news.softpedia.com

Top found tags: Windows(1),Internet Explorer(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Alleged Sydney card skimmer chargedLocation: Sydney, Australia
Date published:07-06-2014

A MAN has been caught allegedly skimming money out of ATMs in Sydney\'s west using stolen card data.Police were contacted after the 27-year-old was seen acting suspiciously in Parramatta on Friday morning, walking from one ATM to another, allegedly making transactions with several cards.Officers lat... Read more

Source: www.ntnews.com.au

Top found tags: EN(1),skimming(1),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Anti-botnet systeem AbuseHUB van startLocation: New York, United States
Date published:06-06-2014

AbuseHUB, het systeem waarmee Nederlandse internetproviders gezamenlijk de strijd met botnets aangaan, wordt vandaag officieel in gebruik genomen. AbuseHUB is een initiatief van Abuse Information Exchange, waarin KPN, RoutIT, SIDN, SOLCON, Surfnet, Tele2, UPC, XS4ALL, ZeelandNet en Ziggo samenwerken... Read more

Source: www.telecompaper.com

Top found tags: NL(1),research(1),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Groot succes in bestrijding Cryptolocker-malwareLocation: Berlin, Germany
Date published:06-06-2014

De distributie van de CryptoLocker-ransomware is een forse slag toegebracht door de uitschakeling van het botnet Gameover Zeus.De actie werd afgelopen vrijdag uitgevoerd en sindsdien zijn er geen nieuwe infecties meer geconstateerd, zegt Keith Jarvis, een beveiligingsexpert van de Counter Threat Uni... Read more

Source: www.automatiseringgids.nl

Top found tags: cyber security(4),United States(4),malware(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kick-off Platform Industrial Cyber Security 17 juniLocation: Amsterdam, The Netherlands
Date published:06-06-2014

De openbare elektriciteitsnetten in ons land worden steeds verder geautomatiseerd tot intelligente smart grids. Net als de gebouwgebonden, infrastructurele en industrile installaties die erop zijn aangesloten. Zo zijn de installaties overzichtelijk en efficint te beheren. Maar dat zou ze t... Read more

Source: infosecuritymagazine.nl

Top found tags: government(2),smart grid(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hoe Social Engineering een risico vormt in informatiebeveiligingLocation: Amsterdam, The Netherlands
Date published:06-06-2014

Social Engineering wordt gebruikt om, ongemerkt, gevoelige informatie te onfutselen. Dat vraagt om durf, bluf, creativiteit, doorzettingsvermogen en een hackermindset.Dat bewezen de ruim 40 deelnemers van de 3e Sogeti Social Engineering Challenge (SSEC) tijdens de hackersconferentie Hack in the Box ... Read more

Source: www.sogeti.nl

Top found tags: NL(1),conference(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

Nieuwe proactieve aanpak van malware onthuldLocation: Amsterdam, The Netherlands
Date published:06-06-2014

Een team wetenschappers van de Virginia Tech Universiteit heeft een nieuwe proactieve manier ontwikkeld om malware te detecteren. Een probleem met de huidige aanpak van malware is dat het voornamelijk reactief is. Detectie vindt pas plaats nadat de malware actief is geworden.Het nieuwe systeem gebru... Read more

Source: www.security.nl

Top found tags: research(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Politie tapt vaker bij XS4ALLLocation: XS4ALL - Amsterdam, The Netherlands
Date published:07-04-2014

De politie zette in 2013 totaal 44.000 telefoon- en internettaps, waarvan 61 bij XS4ALL.De unit interceptie van de politie heeft vorig jaar 40 telefoontaps, 20 internettaps en 1 e-mailtap gezet bij klanten van XS4ALL. 19 keer moest de isp verkeersgegevens (metadata van communicatie) ophoesten.Dat me... Read more

Source: webwereld.nl

Top found tags: telecom sector(2),The Netherlands(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish