Under construction

New design coming soon!

CIC News engine statistics

CIC News for 10-06-2014 contains 131 articles: cybercrime(53),cyber security(26),data breach(12),other(40)

CIC News update contains 102 English and 29 Dutch articles for today.
There are 11 published advisories, 0 are English and 11 are Dutch.
In today's English news articles:
- 38 related to cybercrime
- 24 related to cyber security
- 12 related to data breach and identity theft
- 28 for the category other news

In today's Dutch news articles:
- 15 related to cybercrime
- 2 related to cyber security
- 12 for the category other news

Have fun reading.

English cybercrime related news

Red Button\ Attack Could Compromise Some Smart TVsLocation: New York, United States
Date published: 09-06-2014

A vulnerability in an emerging interactive television standard could expose smart TVs to untraceable drive-by hacking attacks that could steal personal information and wreak havoc on televisions and anything connected to them. The feature, HbbTV, Hybrid Broadcast Broadband Television was introduced ... Read more

Source: threatpost.com

Top found tags: telecom sector(2),vulnerability(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RIG Exploit Kit Pushing Cryptowall RansomwareLocation: Cisco HQ - San Jose, United States
Date published: 09-06-2014

With Cryptolocker quite possibly on its way to becoming yesterday\s ransomware news after the successful takedown of part of its distribution infrastructure, alternatives are already available. Cryptowall is the latest to grab some attention and traction on victimized computers. Cisco reported on... Read more

Source: threatpost.com

Top found tags: cybercrime(4),exploit kit(4),malware(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime Cuts Deep in Global Economy: StudyLocation: Center for Strategic and International Studies - Washington, United States
Date published: 09-06-2014

WASHINGTON - Cybercrime has grown into a global industry worth around half a trillion dollars, with no sign of slowing, a research report said Monday. The report by the Center for Strategic and International Studies with security firm McAfee estimated the global economic cost of cyberattacks at $445... Read more

Source: securityweek.com

Top found tags: cybercrime(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft and Chinese security firm Qihoo 360 partner on artificial intelligenceLocation: Microsoft HQ - Redmond, United States
Date published: 10-06-2014

deal with Chinese security vendor Qihoo 360. The two companies on Monday pledged to cooperate in the development of mobile internet and artificial intelligence technologies, China\'s official news bureau Xinhua reported on Tuesday, citing a joint announcement by the Microsoft Asia Internet Engineeri... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
F-Secure releases one-click test for PCs infected by GameOver Zeus botnetLocation: F-Secure - Helsinki, Finland
Date published: 09-06-2014

Last week Microsoft boasted of aiding law enforcement in the take-down of the GameOver botnet, one of the leaders in the theft of banking information. However, Microsoft was not the only tech entity involved, and the death notice may have been a bit premature. One of the others involved was security... Read more

Source: www.techinvestornews.com

Top found tags: zeus(1),Zeus(1),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Europol cybercrime head: International public-private collaboration \'the one true way\' to stop cyber criminalsLocation: National Crime Agency - London, United Kingdom
Date published: 09-06-2014

Collaboration between law enforcement, private web security firms and academic researchers \"is the only way to go\" in the fight against cyber criminals and hackers, Paul Gillen, head of operations for Europol\'s European Cybercrime Centre (EC3), has told Computing.Gillen made the comments at a McA... Read more

Source: www.computing.co.uk

Top found tags: malware(4),government(5),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vital we all guard against cybercrime warns Gloucestershire PoliceLocation: National Crime Agency - London, United Kingdom
Date published: 09-06-2014

Gloucestershire Police are warning people to guard their computers against cyber attack in the wake of a Government alert issued by the UKs National Crime Agency.Following the US charging a man with cybercrime, the Agency is saying people probably have \"two weeks\" before international criminals... Read more

Source: www.stroudnewsandjournal.co.uk

Top found tags: malware(2),social media(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The first mobile encryptor TrojanLocation: Google HQ - Mountain View, United States
Date published: 09-06-2014

In the middle of May a unique encryption Trojan that works on Android went on sale on a virus writers forum. The asking price - $5,000. A few days later on May 18, we saw the appearance of a new mobile encryptor Trojan in the wild that we detect as Trojan-Ransom.AndroidOS.Pletor.a.By June 5, we h... Read more

Source: www.securelist.com

Top found tags: trojan(2),cybercrime(7),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Social Engineering Watch: UPATRE Malware Abuses Dropbox LinksLocation: Dropbox - San Francisco, United States
Date published: 09-06-2014

Threats like UPATRE are continuously evolving as seen in the development of the techniques used so as to bypass security solutions. UPATRE malware are known downloaders of information stealers like ZeuS that typically spread via email attachments. We recently spotted several spam runs that use the p... Read more

Source: blog.trendmicro.com

Top found tags: social engineering(2),telecom sector(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime Costing Business Hundreds of BillionsLocation: Hughes, United States
Date published: 09-06-2014

June 9 (Bloomberg) -- Bloombergs Mean Hughes reports on an investigation that examined the true cost of cybercrime to businesses and governments around the world. She speaks on Bloomberg Televisions In the Loop.... Read more

Source: www.bloomberg.com

Top found tags: report(1),cybercrime(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DHS: Major Progress from Cyber Crime PartnershipLocation: Department of Homeland Security - Washington, United States
Date published: 09-06-2014

DHS has said it is playing a major role in curbing the spread of the Gameover Zeus botnet. A botnet (think \"robot\" + \"Internet\") can be used maliciously to penetrate a computer and then control it remotely, for example to wage a denial of service attack. The Department of Justice is leading the ... Read more

Source: www.fedweek.com

Top found tags: malware(3),cybercrime(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cops conduct meetings with citizens over Facebook postLocation: Facebook - Menlo Park, United States
Date published: 09-06-2014

MUMBAI: To avoid any untoward incident on the controversial posts of two personalities on Facebook, the city police on Monday evening conducted a meeting at Birla Matoshree Hall with the trustees of several mosques, temples, students of various colleges and cyber experts. In the meeting, the police ... Read more

Source: timesofindia.indiatimes.com

Top found tags: social media(2),cybercrime(3),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Global economy taking a cyber hitLocation: Center for Strategic and International Studies - Washington, United States
Date published: 09-06-2014

Cyber crime is costing the global economy an estimated $445 billion a year, according to a report by the Center for Strategic and International Studies.Cyber crime is a tax on innovation and slows the pace of global innovation by reducing the rate of return to innovators and investors, Jim Lew... Read more

Source: www.bizjournals.com

Top found tags: Germany(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man arrested for debit card fraud in CyberabadLocation: New York, United States
Date published: 10-06-2014

Hyderabad: The Cyberabad Cyber Crime police on Monday arrested a person in a debit card fraud case.Police said the man used to follow customers who came to ATM centers to withdraw cash.Standing close to them he used to note down card numbers and PINs.Later, he made several online transactions worth ... Read more

Source: www.deccanchronicle.com

Top found tags: police(1),cybercrime(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Operation Tovar \'inspiring\' cybercrime collaborationLocation: National Crime Agency - London, United Kingdom
Date published: 09-06-2014

Operation Tovar saw the US Department of Justice, the FBI, Europol and the UK\'s NCA work together to takedown the Gameover Zeus and CryptoLocker botnets, a fine example of international cyber-crime policing, according to experts.The FBI-led Operation Tovar resulted in the arrest of alleged perpetra... Read more

Source: www.scmagazineuk.com

Top found tags: government(4),malware(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spy base opens up to reveal cyber war on crimeLocation: GCHQ - Cheltenham, United Kingdom
Date published: 10-06-2014

SLIM and smartly dressed, 50-year-old Simon has the appearance of a typical Civil Servant but he has a most unusual desk job.Visiting his workplace involves security checks and passing through blast-proof doors.For the last 30 months Simon - his surname isnt disclosed and we cannot take his photo... Read more

Source: www.yorkshirepost.co.uk

Top found tags: United Kingdom(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Less than a third of attackers account for 80 percent of comment spamLocation: New York, United States
Date published: 09-06-2014

You don\'t need to spend very much time on popular websites and forums to encounter the curse of comment spam, adverts or links embedded in fields intended for reader interaction.Comment spammers are most often motivated by search engine optimization, using a busy site\'s comment fields and guest bo... Read more

Source: betanews.com

Top found tags: research(1),spam(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDoS attacks: No need to panicLocation: Walsh, United States
Date published: 09-06-2014

As the lines between the professional and social use of technology fade, it is even more important to recognise the significance of distributed denial of service (DDoS) attacks, their probability and the damage they can do.This is according to senior engineer at F5 Networks, Martin Walshaw, who adds... Read more

Source: www.itweb.co.za

Top found tags: DoS(2),financial sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers, cyber-crime and security: no one is safeLocation: New York, United States
Date published: 10-06-2014

With hackers stealing tens of millions of customer details in recent months, firms across the globe are ratcheting up IT security and nervously wondering which of them is next.The reality, cyber security experts say, is that however much they spend, even the largest companies are unlikely to be able... Read more

Source: businesstech.co.za

Top found tags: United Kingdom(4),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cost of keeping your kit secure hits $19.9bn, but growth is slowingLocation: Trend Micro - Cupertino, United States
Date published: 10-06-2014

software vendor by revenue. Worldwide security revenues reached $19.9bn in 2013, marking a 4.9 percent increase on the $19bn the industry earned in 2012, according to new figures released by analyst firm Gartner. Gartner notes growth in security software revenues was lower than expected in 2013, but... Read more

Source: www.zdnet.com

Top found tags: Windows(1),Trend Micro(2),antivirus(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Pandemiya Banking Trojan Written From ScratchLocation: RSA HQ - Bedford, United States
Date published: 10-06-2014

Brand new, written-from-scratch malware is a relatively rare undertaking on the underground. Aside from some private endeavors, source code is available for a number of popular Trojans, including Zeus, Citadel and Carberp, making it easy for attackers to simply grab one off the shelf and get started... Read more

Source: threatpost.com

Top found tags: financial sector(4),cybercrime(6),malware(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crypto-ransomware brings in quite a profitLocation: New Hampshire, United States
Date published: 10-06-2014

Crypto-ransomware is quickly becoming cybercrooks\' favorite tool to extort money from computer users. After the amazing success of CryptoLocker, copycats have begun popping up, targeting both PC and Android users. Some victims, like the police department of Durham, New Hampshire, explicitly and une... Read more

Source: net-security.org

Top found tags: cybercrime(3),exploit kit(4),malware(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How the cloud can be used and misusedLocation: IBM HQ - Armonk, United States
Date published: 10-06-2014

Peter Jopling, CTO and Software Security Executive, IBM UK & Ireland, talks about threats to cloud infrastructure providers, the importance of real-time data analytics, illustrates the way cloud enables cybercriminals to expand the scope and size of their attacks, and more. What are the most signifi... Read more

Source: net-security.org

Top found tags: vulnerability(1),United Kingdom(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
World Cup Brazil 2014: How cybercriminals are looking to scoreLocation: Brasilia-Federal District, Brazil
Date published: 10-06-2014

Starting this week, 32 national teams and thousands of football fans will descend on Brazil for the 2014 FIFA World Cup. Right now the teams are fine-tuning their strategies in order to outwit their opponents - and so are the cybercriminals. Cybercriminals are already using various attack techniques... Read more

Source: net-security.org

Top found tags: financial sector(6),telecom sector(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Zeus Alternative "Pandemiya" Emerges in Cybercrime UndergroundLocation: RSA HQ - Bedford, United States
Date published: 10-06-2014

A new banking Trojan being promoted in underground forums as an alternative to the popular and widely used Zeus Trojan has the potential to become a pervasive threat, experts have said. Called Pandemiya, the new Trojan is similar to Zeus in that it allows cyber-criminals to steal form data, login cr... Read more

Source: securityweek.com

Top found tags: financial sector(4),malware(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Two Detained in Russia Over Ransom Scheme Targeting Apple DevicesLocation: Apple HQ - Cupertino, United States
Date published: 10-06-2014

Two individuals were detained by Russian authorities on suspicion of being involved in a cybercriminal scheme targeting Apple devices, Russia\s Ministry of Internal Affairs revealed on Monday. According to a statement released by authorities, the attackers abused the \Find My iPhone\ featur... Read more

Source: securityweek.com

Top found tags: United States(2),cybercrime(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. SEC official urges broader cyber-attack disclosureLocation: New York, United States
Date published: 10-06-2014

WASHINGTON (Reuters) - Public companies that are victims of cyber attacks should consider disclosing additional information beyond what\'s required to help protect customers whose private data could be at risk, a top U.S. regulator said Tuesday. U.S. Securities and Exchange Commission member Luis Ag... Read more

Source: reuters.com

Top found tags: United States(2),government(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attacks Against Space, Satellite Companies Linked to Second Chinese PLA UnitLocation: Beijing, China
Date published: 10-06-2014

With indictments still fresh against a handful of Chinese nationals accused of hacking American companies and stealing intellectual property, another branch of the People\s Liberation Army and allegedly one of its officers have been outed for cyberespionage against U.S. and European aerospace and... Read more

Source: threatpost.com

Top found tags: United States(2),government(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Global Cost of Cybercrime Exceeds $400 BillionLocation: Center for Strategic and International Studies - Washington, United States
Date published: 10-06-2014

According to a new report from the Center for Strategic and International Studies (CSIS), sponsored by McAfee, cybercrime costs businesses more than $400 billion worldwide, costing approximately 200,000 jobs in the U.S., and 150,000 jobs in the European Union. The report, entitled "Net Losses -- Est... Read more

Source: www.esecurityplanet.com

Top found tags: research(1),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Link between Windows XP Users and Spam VolumeLocation: Microsoft HQ - Redmond, United States
Date published: 09-06-2014

The problem of unsolicited bulk email, commonly referred to as \'spam,\' is one that is well known and partially solved thanks to a myriad of technology solutions. According the the new IBM X-Force second quarter 2014 Threat Intelligence Report, the problem of spam has not gone away, but has actuall... Read more

Source: www.esecurityplanet.com

Top found tags: Windows(1),Microsoft(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker Fined $8,000 for Government Cyber AttackLocation: Singapore
Date published: 09-06-2014

The Straits Times reports that Delson Moo Hiang Kng, 43, was recently fined $8,000 for hacking into the website of the Istana, the offiical residence of the president of Singapore. Moo, who pled guilty to one of three charges of unauthorized access to the website\'s server, is the first person to be... Read more

Source: www.esecurityplanet.com

Top found tags: vulnerability(2),website(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Targeted Attack Methodologies for CybercrimeLocation: London, United Kingdom
Date published: 10-06-2014

knowyourenemies2We recently wrote about the difference between cybercrime and a cyber war, which narrows down to the attack\s intent. With the same intent of gaining information to use against targets, cybercriminals and attackers tend to stress less importance in their choice of ools\, a... Read more

Source: trendmicro.com

Top found tags: United Kingdom(2),United States(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminals Steal News Headlines for KULUOZ Spam CampaignsLocation: Seoul, South Korea
Date published: 10-06-2014

Last April, we reported a KULUOZ spam campaign using the South Korean ferry sinking tragedy, one that came hot at the heels of the actual event itself. KULUOZ, as we tackled during that blog entry, is a malware that is distributed by the Asprox botnet. It can download certain strains of FAKEAV and Z... Read more

Source: trendmicro.com

Top found tags: United Kingdom(2),United States(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Social Engineering Watch: UPATRE Malware Abuses Dropbox LinksLocation: Dropbox - San Francisco, United States
Date published: 10-06-2014

Threats like UPATRE are continuously evolving as seen in the development of the techniques used so as to bypass security solutions. UPATRE malware are known downloaders of information stealers likeZeuS that typically spread via email attachments. We recently spotted several spam runs that use the ... Read more

Source: trendmicro.com

Top found tags: Trend Micro(2),cybercrime(3),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Patches IE8 Zero Day, Critical Word BugLocation: Microsoft HQ - Redmond, United States
Date published: 10-06-2014

As expected, Microsoft delivered a patch today for a zero-day vulnerability in Internet Explorer 8 that was disclosed by HP\s Zero Day Initiative three weeks ago, six months after it was reported to the ZDI. The IE8 patch, MS14-035, is included in a cumulative Internet Explorer rollup that patche... Read more

Source: threatpost.com

Top found tags: vulnerability(2),website(2),0-day(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bank of England helps detect hackersLocation: Dell HQ - Round Rock, United States
Date published: 10-06-2014

Bank of England helps detect hackers Bank of England helps detect hackers The Bank of England and Treasury have responded to criticism that UK banks and financial services companies lack cyber resilience by launching a scheme to help banks pinpoint where they are vulnerable to cyber attacks. The CBE... Read more

Source: www.scmagazineuk.com

Top found tags: information sharing(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Online gambling site hit by five-vector DDoS attack peaking at 100GbpsLocation: Incapsula HQ - Redwood Shores, United States
Date published: 10-06-2014

Online gambling site hit by five-vector DDoS attack peaking at 100Gbps Incapsula fought off a five-vector DDoS attack against an online gambling site on Friday that peaked at 100 Gbps. On Friday, cloud-based security services provider Incapsula fought off a 100 gigabytes per second (Gbps) distribute... Read more

Source: www.scmagazine.com

Top found tags: website(1),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime costs $445 billion globally, GDPs take hitLocation: Center for Strategic and International Studies - Washington, United States
Date published: 10-06-2014

Seven-year-long APT campaign identified, possibly state-sponsored Seven-year-long APT campaign identified, possibly state-sponsored Cyber crime and economic espionage cost the global economy more than $445 billion annually, which a report from the Center for Strategic and International Studies, says... Read more

Source: www.scmagazine.com

Top found tags: government(3),telecom sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Apple iOS 8 Increases PrivacyLocation: Apple HQ - Cupertino, United States
Date published: 09-06-2014

Apple iOS 8 Increases Privacy iPhone users can look forward to broadcasting a bit less information about their devices as they wander the world. Google I/O 2014: 8 Things To Watch Google I/O 2014: 8 Things To Watch Apple\'s iOS 8 will change the way iOS devices communicate with WiFi networks, a shif... Read more

Source: www.informationweek.com

Top found tags: mobile device(4),financial sector(6),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Zeus Malware Control Panel Vulnerable: WebsenseLocation: Hewlett-Packard - Palo Alto, United States
Date published: 10-06-2014

Researchers at Websense revealed details of how to turn the tables on the purveyors of a Zeus Trojan circulating cyberspace by compromising the control panel of the malware\'s command and control server (C&C). As part of their proof-of-concept, Websense set up a command and control server in an inte... Read more

Source: securityweek.com

Top found tags: trojan(2),financial sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese army group hacks US satellite partners: CrowdstrikeLocation: Putte, Woensdrecht, Noord-Brabant, The Netherlands
Date published: 10-06-2014

attacking US and European government partners in the space and satellite industry, according to the company. According to Crowdstrike, the espionage entity, dubbed Putter Panda, has several connections to Comment Panda, the group previously attributed to the the Chinese army\'s secretive Unit 61398 ... Read more

Source: www.zdnet.com

Top found tags: trojan(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Winning the war on web stealth attacksLocation: National Crime Agency - London, United Kingdom
Date published: 10-06-2014

The National Strategic Assessment of Serious and Organised Crime 2014 , published in May by the UK National Crime Agency, listed DDoS as a major concern for business critical systems for the first time. Starting in 2010, when the hacktivist group Anonymous had made DDoS its official protest tool, DD... Read more

Source: net-security.org

Top found tags: United Kingdom(2),vulnerability(2),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ISO 27001: An overview of ISMS implementation processLocation: New York, United States
Date published: 10-06-2014

Although many people consider ISO 27001 as a bureaucratic standard with no real benefits, actually the opposite is true if it is implemented properly, not only will it enhance the marketing position of your organization, but it will also help you organize all information security activities in a cle... Read more

Source: net-security.org

Top found tags: security management(2),telecom sector(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacking: Worse than Maritime Piracy, Not as Bad as CounterfeitingLocation: Center for Strategic and International Studies - Washington, United States
Date published: 09-06-2014

Cybercrime from economic espionage to Target-size heists costs the world between $375 billion and $575 billion a year, according to an analysis by former U.S. officials and economists.The study, conducted by McAfee and the Center for Strategic and International Studies in Washington, offers ... Read more

Source: blogs.wsj.com

Top found tags: cybercrime(4),cyber security(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers target the World CupLocation: Sotsji, Russia
Date published: 09-06-2014

Hackers are planning to attack the FIFA World Cup, according to a report by Infosecurity Magazine. The article cited two hackers. One called Che Commodore spoke with Reuters and explained that the infamous hacker group Anonymous has already begun to look for weaknesses in World Cup-related websites ... Read more

Source: www.wcpo.com

Top found tags: Anonymous(2),cyber security(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AVG dominates Aussie consumer security market: TelsyteLocation: AVG HQ - San Francisco, United States
Date published: 10-06-2014

AVG holds more than a quarter of the local market in PCs and Android devicesAVG is now the dominant PC and mobile security app in the Australian market, according to the latest Telsyte Australian Digital Consumer study.AVG now holds a more than quarter of the local market on PCs (26 per cent) and 25... Read more

Source: www.arnnet.com.au

Top found tags: cyber security(2),mobile device(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Twitter co-founders, CEO\'s personal data leaked on \'darknet\'Location: Twitter - San Francisco, United States
Date published: 10-06-2014

The names, addresses, and Social Security numbers of a handful of staff at Twitter past and present have been leaked on the so-called "hidden" Internet, according to researchers. The key to cleaning up the internet is tackling the darknets, not letting censorship in by the back door The key ... Read more

Source: www.zdnet.com

Top found tags: social media(2),telecom sector(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is Microsoft not patching Windows 7 for problems it patches in Windows 8?Location: Microsoft HQ - Redmond, United States
Date published: 10-06-2014

Windows 7. Fundamentally, this is a dog-bites-man story; new versions of software come with new features, sometimes even security features. Is it unreasonable for Microsoft to leave these changes out of Windows 7? The paper was presented at the TROOPERS14 conference in Germany in March, and the pres... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bank of Montreal ATM hacked with weak passwordLocation: Montral, Canada
Date published: 10-06-2014

Several things stand out about this story, and none of them have to do with hacking prowess. Matthew Hewlett and Caleb Turon of the 9th grade found an operator manual online for an ATM at a local supermarket. On lunch period they went to the ATM to try to put it into operator mode, not expecting it ... Read more

Source: www.zdnet.com

Top found tags: report(1),cyber security(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
After Heartbleed, We e Overreacting to Bugs That Aren a Big DealLocation: Yahoo HQ - Sunnyvale, United States
Date published: 10-06-2014

Here\s something else to blame on last April\s Heartbleed security bug: It smeared the line between security holes that users can do something about, and those we can . Getting that distinction right is going to be crucial as we weather a storm of vulnerabilities and hacks that shows no si... Read more

Source: wired.com

Top found tags: telecom sector(2),United States(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco Patches XSS Flaw in Security AppliancesLocation: Cisco HQ - San Jose, United States
Date published: 10-06-2014

There\s a reflected cross-site scripting vulnerability in a variety of Cisco security appliances that enables a remote, unauthenticated attacker to execute arbitrary code in the context of the user. The vulnerability affects the Cisco Email Security Appliance, the Cisco Web Security Appliance and... Read more

Source: threatpost.com

Top found tags: government(2),security management(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Disruptive Concepts for Public-Private Partnership and Cyber Intelligence FusionLocation: New York, United States
Date published: 10-06-2014

Editor\s Note: The following is a preview for an upcoming panel session at SecurityWeek\s Suits and Spooks Conference taking place in New York City on June 20-21, 2014. Washington is a city split along partisan lines to an almost tragicomic extent. One side will find no fault in any of the adm... Read more

Source: securityweek.com

Top found tags: United States(4),cybercrime(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CryptoLocker takedown unlikely to deter growing ransomwareLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 10-06-2014

The recent move by law enforcement agencies to take down the GameOver Zeus botnet has also dramatically reduced infection rates for the infamous CryptoLocker ransomware. However, experts caution that CryptoLocker\'s demise might only be temporary, and that the threat ransomware poses to enterprises ... Read more

Source: searchsecurity.techtarget.com

Top found tags: malware(5),telecom sector(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Large Internet Explorer update headlines June Patch TuesdayLocation: Microsoft HQ - Redmond, United States
Date published: 10-06-2014

Update for Internet Explorer. That update and another affecting Windows and Office are rated critical. One of those IE vulnerabilities had been publicly disclosed. MS14-035: Cumulative Security Update for Internet Explorer (2969262) Nearly all of the 59 vulnerabilities fixes in this update a... Read more

Source: www.zdnet.com

Top found tags: patch(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rouge Valley Hospital Insider Breach Affects 8,300 PatientsLocation: Ottawa, Ontario, Canada
Date published: 10-06-2014

Canada\'s Rouge Valley Centenary Hospital recently acknowleged that two former hospital employees had leaked as many as 8,300 patients\' personal information to outside companies. Hospital spokesman David Brazeau told the Toronto Star that the patients\' names, addresses and phone numbers were sold ... Read more

Source: www.esecurityplanet.com

Top found tags: health sector(2),medical sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Teens and Screens: What Parents Need to Know About Teenagers\ Mobile HabitsLocation: Instagram - Menlo Park, United States
Date published: 10-06-2014

Summer is officially here and that means the malls, theaters, streets, and parks of America will soon be teaming with hordes of teens, their faces lit by the electric blue hue of smartphones and mobile devices. Yes, there will be tweets, Facebook posts, SnapChats and Instagrams too. Most of this soc... Read more

Source: blogs.mcafee.com

Top found tags: cyber security(4),social media(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dj vu: Is the Latest OpenSSL Bug Another Heartbleed?Location: New York, United States
Date published: 10-06-2014

In the weeks and months following the discovery of Heartbleeda serious bug (or vulnerability) in OpenSSL affecting about 70% of websitesopen source projects (computer programsin which thesource codeis available to the general public to use and modify) have come under heavy scrutiny. Rese... Read more

Source: blogs.mcafee.com

Top found tags: telecom sector(2),vulnerability(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Alarm bells ring for Internet of Things after smart TV hackLocation: Kaspersky HQ - Moscow, Russia
Date published: 10-06-2014

Two researchers from Colombia University in the US have found that millions of internet-connected TVs could be taken over in a man-in the-middle attack. Alarm bells ring for Internet of Things after smart TV hack Alarm bells ring for Internet of Things after smart TV hack Yossef Oren and Angelos Ker... Read more

Source: www.scmagazineuk.com

Top found tags: United States(2),vulnerability(2),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Notorious hacker Guccifer sentenced in RomaniaLocation: Bucharest, Romania
Date published: 09-06-2014

Cyber crime ringleader sentenced to five years in prison Guccifer\'s roster of victims include relatives and friends of former President George H.W. Bush. A hacker, notorious for accessing the personal email accounts of celebrities and high-profile figures, including President George H.W. Bush\'s fa... Read more

Source: www.scmagazine.com

Top found tags: cybercrime(2),cyber security(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bahamas taps Hogan Lovells in NSA cell phone surveillance controversyLocation: National Security Agency - Fort Meade, United States
Date published: 09-06-2014

International law firm Hogan Lovells has been tapped to represent the government of the Bahamas after a May report by The Intercept, based on documents leaked by Edward Snowden, revealed that the NSA had been recording all cell phone conversations made into, out of, and within the island country. A ... Read more

Source: www.scmagazine.com

Top found tags: United States(2),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Majority of comment spam posted by same culprits, firm findsLocation: Major, United States
Date published: 09-06-2014

Majority of comment spam posted by same culprits, firm finds Imperva found that just 17 percent of comment spammers were behind the majority of the spurious messages. A security firm found that the majority of comment spam messages left on sites to carry out fraudulent advertising or spread malw... Read more

Source: www.scmagazine.com

Top found tags: information security(2),security measures(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Two 14-year-old students hack Bank of Montreal ATM during lunch breakLocation: Montral, Canada
Date published: 09-06-2014

On Wednesday, two 14-year-old Canadian students spent their lunch break hacking an ATM and notifying its owner, Bank of Montreal (BMO). Caleb Turon and Matthew Hewlett had previously dug up an old ATM manual on the internet that showed how to access operator mode, according to a Sunday Toronto Sun r... Read more

Source: www.scmagazine.com

Top found tags: report(1),cyber security(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Cybercrime \'As Lucrative As Drugs Trade\'Location: McAfee - Santa Clara, United States
Date published: 09-06-2014

A report from computer security company McAfee finds cybercrime is worth 0.8% of the world economy and costs the UK 6.8bn a year.Cybercrime costs 266bn every year - about as much as the global drugs trade - according to a new report revealed exclusively by Sky News.Computer security company McAf... Read more

Source: news.sky.com

Top found tags: cybercrime(2),data breach(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach at Accretive Health leads to settlement with FTCLocation: Federal Trade Commission - Washington, United States
Date published: 09-06-2014

The Chicago-based company Accretive Health agreed to a settlement with the Federal Trade Commission after a data breach in 2011 left more than 23,000 patients open to identity theft. The settlement doesn\'t include any financial penalties. Instead the company has to add new levels of security to its... Read more

Source: www.federalnewsradio.com

Top found tags: identity theft(2),medical sector(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tax Preparer Gets Five Years for Identity TheftLocation: New York, United States
Date published: 09-06-2014

Louis A. Francois, 44, of Margate, Fla., was recently sentenced to five years in prison, to be followed by two years of supervised release, for his involvement in a stolen identity tax refund (SIRF) scheme.Francois, who had pled guilty to one count of wire fraud and one count of aggravated identity ... Read more

Source: www.esecurityplanet.com

Top found tags: EN(1),fraud(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Call Center Worker Responsible For Connecticut Obamacare Data BreachLocation: Washington D.C., United States
Date published: 09-06-2014

An Obamacare call center worker is responsible for abandoning a backpack filled with the personal information of 400 Obamacare customers on a Hartford street Friday, according to the Connecticut health-care exchange.The backpack was found Friday afternoon on the same street where the Obamacare excha... Read more

Source: dailycaller.com

Top found tags: report(1),data breach(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security software market grew 4.9 percent in 2013Location: Beijing, China
Date published: 10-06-2014

Worldwide security software revenue totaled $19.9 billion in 2013, a 4.9 percent increase from 2012 revenue of $19.0 billion, according to Gartner, Inc. The lower-than-expected growth was due to commoditization of key subsegments and the decline in growth for two of the top five vendors. "The market... Read more

Source: net-security.org

Top found tags: malware(2),Trend Micro(2),antivirus(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target taps former GM exec to lead information securityLocation: Target HQ - Minneapolis, United States
Date published: How hackers stole millions of credit card records from Target

announced Tuesday the appointment of a new chief information security officer. maiorino2Brad Maiorino Former GM and GE executive Brad Maiorino was named senior vice president, chief information security officer. He\'ll be responsible for leading Target\'s global information security and IT risk orga... Read more

Source: Target hackers hit air-conditioning firm first as a way in | Target\'s data breach: It gets worse |http://www.zdnet.com/target-taps-former-gm-exec-to-lead-information-security-7000030386/#ftag|10-06-2014|www.zdnet.com

Top found tags: cyber security(2),data breach(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Zeus Variant Targeting Online Banking Users in CanadaLocation: Trusteer - Boston, United States
Date published: 10-06-2014

A new version of the ZeuS malware has been used since January 2014 to target online banking users in Canada, security researchers from Trusteer reported on Monday. The new variant of the Trojan, dubbed ZeuS.Maple, has actually been designated by the malware authors as version 3.3.6.0. Experts say Ze... Read more

Source: securityweek.com

Top found tags: trojan(2),cybercrime(5),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Database Monitoring Critical to Fighting SQL Injection, Few Do it: SurveyLocation: New York, United States
Date published: 10-06-2014

SQL injection attacks are far from new, and the consequences of being vulnerable to them are hardly unknown. However, a survey of 595 IT security experts indicates that many organizations may not be doing enough to address them. According to a survey by the Ponemon Institute, only 33 percent said th... Read more

Source: securityweek.com

Top found tags: data breach(2),Ponemon Institute(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Placemark Investments Acknowledges Data BreachLocation: Experian HQ - Dublin,Ireland
Date published: 10-06-2014

Placemark Investments recently began notifying an undisclosed number of clients that their personal information may have been exposed when one of its servers was breached. In early April of 2014, Placemark discovered that malware had been planted on one of its servers, causing it to send out large b... Read more

Source: www.esecurityplanet.com

Top found tags: spam(1),data breach(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Keeping Your Kids Safe Online, Is It On Your To-Do\ List?Location: Dawson, United States
Date published: 10-06-2014

Sun safety, road safety, stranger danger we all know that it is essential we teach our kids the key facts but what about internet safety? Do you have it on your list? With four kids, a job, ridiculous amounts of activities, pets and a regularly travelling husband, my to-do list is long and neve... Read more

Source: blogs.mcafee.com

Top found tags: identity theft(2),cybercrime(3),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target taps former GM exec to lead information securityLocation: Target HQ - Minneapolis, United States
Date published: How hackers stole millions of credit card records from Target

announced Tuesday the appointment of a new chief information security officer. maiorino2Brad Maiorino Former GM and GE executive Brad Maiorino was named senior vice president, chief information security officer. He\'ll be responsible for leading Target\'s global information security and IT risk orga... Read more

Source: Target hackers hit air-conditioning firm first as a way in | Target\'s data breach: It gets worse |http://www.zdnet.com/target-taps-former-gm-exec-to-lead-information-security-7000030386/#ftag|10-06-2014|www.zdnet.com

Top found tags: cyber security(2),data breach(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime costs global economy 265 billionLocation: Center for Strategic and International Studies - Washington, United States
Date published: 09-06-2014

New research sponsored by McAfee indicates that the global cost of cybercrime tops 265 billion, but suggests that other hidden costs - such as reputation damage - could be harder to estimate. Cybercrime costs global economy 265 billion Cybercrime costs global economy 265 billion The Net los... Read more

Source: www.scmagazineuk.com

Top found tags: research(2),government(3),cybercrime(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

New iOS 7 lock screen flaw opens up iPhones, iPads in secondsLocation: Apple HQ - Cupertino, United States
Date published: 09-06-2014

Apple users have been left with yet another lock-screen flaw, which can allow anyone with physical access to an iPhone or iPad running the latest iOS 7 software to access the device where the owner previously left off. WWDC 2014: Apple unveils iOS 8 for iPhone, iPad WWDC 2014: Apple unveils iOS 8 fo... Read more

Source: www.zdnet.com

Top found tags: Apple(3),mobile device(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Android \'toxic hellstew\' survival guideLocation: Google HQ - Mountain View, United States
Date published: 09-06-2014

pointed out that rampant fragmentation of versions, combined with the reluctance of hardware makers and the network carriers to push updates out to users, was turning Android into a "toxic hellstew" of vulnerabilities. Fast forward to last week, when Apple CEO Tim Cook took my headline and gave it a... Read more

Source: www.zdnet.com

Top found tags: update(2),vulnerability(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How HP plans to cut admins\' workloads with elastic backup poolLocation: Hewlett-Packard - Palo Alto, United States
Date published: 10-06-2014

HP says new features announced this week for its StoreOnce Backup portfolio of appliances and software will simplify management by putting backup nodes into a pool of shared storage. The new HP StoreOnce Federated Catalyst software is designed to cut the complexity and data protection issues caused ... Read more

Source: www.zdnet.com

Top found tags: EN(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Social inequality in San Francisco spurs verbal brawl among VCsLocation: San Francisco, California, United States
Date published: 10-06-2014

SAN FRANCISCO (Reuters) - Ongoing tensions over how to handle social inequality in San Francisco sparked an a rare outburst among venture capitalists Monday. Facebook Inc executive-turned-venture capitalist Chamath Palihapitiya called for San Francisco Mayor Ed Lee to resign due to a "very stupid ci... Read more

Source: reuters.com

Top found tags: Twitter(1),government(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Judge Orders Hacker Freed in Colombia Presidential RaceLocation: Bogota, Colombia
Date published: 10-06-2014

BOGOTA - A Colombian judge Monday ordered freed an alleged hacker accused of spying on President Juan Manuel Santos\' government and sensitive peace talks, his attorney said. "The judge determined that there was insufficient evidence to keep him detained" Bernardo Alzate, attorney for Andres Sepulve... Read more

Source: securityweek.com

Top found tags: EN(1),hacking(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FireEye Adds IPS Option to Network Threat Prevention PlatformLocation: New York, United States
Date published: 10-06-2014

Cyber threat protection firm FireEye has officially rolled out option to add an integrated intrusion prevention system (IPS) to its Network Threat Prevention Platform. Available this month as an add-on to the FireEye Network Threat Prevention Platform (NX series), the new offering is designed to giv... Read more

Source: securityweek.com

Top found tags: framework(1),threat(1),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Businesses are not ready for PCI DSS 3.0Location: New York, United States
Date published: 10-06-2014

Many U.S. businesses are unprepared for the Payment Card Industry Data Security Standard 3.0, or PCI DSS 3.0, as issued by the Payment Card Industry Security Standards Council, according to NTT Com Security. In a rolling survey to assess the awareness, acceptance and understanding of PCI DSS 3.0, ju... Read more

Source: net-security.org

Top found tags: EN(1),survey(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Free guide: Introduction to LinuxLocation: New York, United States
Date published: 10-06-2014

This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter. For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed... Read more

Source: net-security.org

Top found tags: EN(1),Linux(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police Urge Vigilance After Skimming Device ArrestsLocation: Sierra, United States
Date published: 09-06-2014

Police are urging people who purchased gas at a Valero station in Sierra Madre to monitor their bank statements for unusual activity after they caught two men installing a skimming device at one of the pumps over the weekend.Officers responded to an alarm at the gas station on Baldwin Avenue and Sie... Read more

Source: www.nbcnews.com

Top found tags: skimming(1),credit card(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Duo arrested in Boone for credit card fraudLocation: Boone, United States
Date published: 09-06-2014

BOONE, N.C. -- Two Tennessee residents have been arrested in Boone in connection with credit card fraud.Boone Police were contacted by police in Mountain City, Tennessee, on May 7 regarding a financial card fraud that occurred at multiple locations within Boone. Police arrested 27-year-old Tabitha L... Read more

Source: www.wcnc.com

Top found tags: police(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critical Infrastructure Industries Cyber Security ChallengesLocation: Siemens HQ - Munich, Germany
Date published: 09-06-2014

All critical infrastructure industries such as communications, oil & gas, power and water utilities, transportation, and similar others extensively use industrial control systems, which at one level are applications built on the information technology foundation. Operation of critical infrastructure... Read more

Source: www.linkedin.com

Top found tags: vulnerability(2),government(3),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DHS Report Describes \"Key Threats and Hazards\" to U.S. Critical InfrastructureLocation: Department of Homeland Security - Washington, United States
Date published: 09-06-2014

The U.S. Department of Homeland Security (DHS) recently released a report on the status of U.S. critical infrastructure entitled, \"Sector Risk Snapshots.\" This compendium \"provides a brief overview and risk profile of the 16 critical infrastructure sectors, the Education, Electric, and Oil and Na... Read more

Source: www.hsdl.org

Top found tags: government(3),DHS(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe updates Flash, fixes several vulnerabilitiesLocation: Microsoft HQ - Redmond, United States
Date published: 10-06-2014

The bugs affect versions 13.0.0.214 and earlier for Windows and Macintosh and versions 11.2.202.359 and earlier for Linux. The new version for Windows and Mac is 14.0.0.125. Adobe did not say what else may have changed, given the new major version number. The new Linux version is 11.2.202.378. The a... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Windows 8.1 consumers: It\'s time to move to Update 1Location: Microsoft HQ - Redmond, United States
Date published: 10-06-2014

consumers running Windows 8.1 to install the Windows 8.1 Update if they want to continue to receive patches and fixes from Microsoft. win81update1rumors Microsoft originally imposed a deadline of May 13 on consumer users to move to the Windows 8.1 Update. On May 12, Microsoft announced a deadline ex... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android 4.4 KitKat, BlackBerry and Chrome OS get updated security guidance from CESGLocation: BlackBerry - Ontario, Canada
Date published: 10-06-2014

The UK government\'s IT security body CESG has updated its guidance for BlackBerry OS, Android and Chrome OS devices. The new security guidance covers BlackBerry 10.2.1, Android 4.4 and Chrome OS is designed to help public sector security architects, system administrators and individual public secto... Read more

Source: www.zdnet.com

Top found tags: telecom sector(2),government(3),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RadioShack\'s loss widens as turnaround efforts fail to pay offLocation: New York City, New York, United States
Date published: 10-06-2014

(Reuters) - U.S. electronics retailer RadioShack Corp reported a much bigger-than-expected first-quarter loss as its turnaround efforts failed to bear fruit, raising doubts about the company\'s long-term prospects. Shares of RadioShack, which reported its ninth straight quarterly loss, fell as much ... Read more

Source: reuters.com

Top found tags: report(1),United States(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Windows 8.1 patches won\'t install without April updateLocation: Microsoft HQ - Redmond, United States
Date published: 10-06-2014

Windows 8.1 users who have not yet installed the major update rolled out in April will not be able to install future patches and bug fixes for the OS. That requirement was first revealed when Microsoft launched the so-dubbed Windows 8.1 Update in early April. But a Microsoft spokewoman confirmed to ... Read more

Source: cnet.com.ortal.com

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Retail breaches and the SQL injection threatLocation: New York, United States
Date published: 10-06-2014

Continuous monitoring of database networks is the best approach to avoid breaches such as the high-profile attacks against major U.S. retailers, according to a Ponemon Institute and DB Networks study. More than half (57 percent) of respondents believed that the attacks against the U.S. retailers inv... Read more

Source: net-security.org

Top found tags: vulnerability(1),Ponemon Institute(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Integrating Actionable IntelligenceLocation: New York, United States
Date published: 10-06-2014

As I discussed in my previous column entitled \Understanding The Challenges In Information Sharing\, information sharing is an integral part of a mature security operations program. The combined knowledge of many organizations is greater than the individual knowledge of just one. Information s... Read more

Source: securityweek.com

Top found tags: research(1),government(2),information sharing(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Spies Targeting U.S. Defense, Tech Firms Linked to China\'s PLA: ReportLocation: Putte, Woensdrecht, Noord-Brabant, The Netherlands
Date published: 10-06-2014

A sophisticated cyber espionage group apparently tied to a Chinese military unit has been targeting organizations in the United States government, research, defense and technology sectors, a new report from CrowdStrike has revealed. Dubbed \Putter Panda\ by the security firm, the threat actors... Read more

Source: securityweek.com

Top found tags: cyber espionage(2),government(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Audit Project Releases Verified Repositories of TrueCrypt 7.1aLocation: Microsoft HQ - Redmond, United States
Date published: 10-06-2014

As the uncertainty surrounding the end of TrueCrypt continues, members of the security community are working to preserve a known-good archive of the last version of the open source encryption software released before the developers inserted a warning about potential unfixed bugs in the software and ... Read more

Source: threatpost.com

Top found tags: Anonymous(2),backdoor(2),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker Guccifer JailedLocation: Bucharest, Romania
Date published: 10-06-2014

Reuters reports that a Romanian court recently sentenced hacker Marcel Lazar Lehel, a.k.a. "Guccifer" and "Small Fume," to four years in prison (h/t Softpedia). Lehel, a former taxi driver, was arrested in January of this year. Guccifer\'s high-profile targets included Romanian secret service direct... Read more

Source: www.esecurityplanet.com

Top found tags: website(1),European Parliament(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Walgreens Acknowledges Insider BreachLocation: Experian HQ - Dublin,Ireland
Date published: 09-06-2014

Walgreens recently began notifying an undisclosed number of customers that their personal information may have been stolen by a former pharmacy employee in Atlanta, Ga., between March 3, 2014 and April 14, 2014, and provided to a third party. When the breach was discovered on April 14, 2014, the emp... Read more

Source: www.esecurityplanet.com

Top found tags: government(1),police(1),report(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
5 Surprising Ways to Slash Screen Time & Save SummerLocation: Activision Inc. HQ - Santa Monica, United States
Date published: 10-06-2014

Mom_SuperheroI\m currently in a staring match with summer and just three weeks in, I have yet to blink. I have a decision to make each and every day as a parent. Will I forfeit the hours to my child\s beloved (and preferred) gadgets, or, will I fight to make the minutes, hours, and days of ama... Read more

Source: blogs.mcafee.com

Top found tags: research(1),WordPress(1),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The role of cyber war games in developing advanced cyber defenceLocation: New York, United States
Date published: 09-06-2014

The emerging concept in preparation of advanced cyber defence is cyber war games. The role of cyber war games in developing advanced cyber defence The role of cyber war games in developing advanced cyber defence The reality is that pen-testing provides no guarantees of security, and does not address... Read more

Source: www.scmagazineuk.com

Top found tags: gaming(1),threat(1),training(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Penn State Hershey employee takes data home, puts 1,801 patients at riskLocation: New York, United States
Date published: 10-06-2014

About 1,800 patients of Penn State Hershey Medical Center are being notified that their information had the potential to be compromised because a clinical laboratory technician had been working with the data from home, outside the secured Penn State Hershey system. How many victims? 1,801. What type... Read more

Source: www.scmagazine.com

Top found tags: website(1),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cloudera acquires Gazzang for stronger data securityLocation: Cloud, United States
Date published: 09-06-2014

In a move aimed at bolstering the security of Apache Hadoop, Cloudera, a data management software company, has purchased data security company Gazzang. The acquisition will \immediately deliver enterprise-grade data encryption and key management,\ according to a press release. Additionally, Ga... Read more

Source: www.scmagazine.com

Top found tags: EN(1),EU(1),HIPAA(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Judge reverses order for NSA to preserve dataLocation: National Security Agency - Fort Meade, United States
Date published: 09-06-2014

Federal Judge Jeffrey White Friday reversed part of an order he issued June 5 to prevent the NSA from destroying data collected on parties related to a 2013 lawsuit, according to a Courthouse News Service report. The Electronic Frontier Foundation, who represent the plaintiffs and claim the NSA viol... Read more

Source: www.scmagazine.com

Top found tags: NSA (1),report(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

20 miljard dollar aan beveiligingssoftware omgezet in 2013Location: Trend Micro - Cupertino, United States
Date published: 10-06-2014

Vorig jaar is er voor zo\'n 20 miljard dollar aan beveiligingssoftware omgezet, wat een lager dan verwachte groei is, zo meldt marktvorser Gartner. Ten opzichte van 2012, toen er nog 19 miljard dollar omging, was er in 2013 sprake van een stijging van 4,9%. De tragere groei wordt veroorzaakt doordat... Read more

Source: www.security.nl

Top found tags: cyber security(2),Trend Micro(2),antivirus(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android-ransomware maakt foto van slachtoffersLocation: Kaspersky HQ - Moscow, Russia
Date published: 10-06-2014

Een nieuwe vorm van ransomware die bestanden op Android-toestellen versleutelt maakt nu ook foto\'s van de slachtoffers. Het gaat om de Simplocker-ransomware die onlangs al door anti-virusbedrijf ESET werd ontdekt. Inmiddels zouden er meer dan 30 varianten van de ransomware in omloop zijn. Dat laat ... Read more

Source: www.security.nl

Top found tags: cybercrime(3),Kaspersky Lab(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
\'Chinese staatshackers richten zich op ruimtevaartindustrie\'Location: New York Times - New York, United States
Date published: 10-06-2014

Hackers die werkzaam zijn voor het Chinese leger zouden het hebben gemunt op bedrijven in de ruimtevaart- en sattelietindustrie. Cybersecuritybedrijf Crowdstrike omschrijft in een rapport een vooralsnog onbekende eenheid van het Chinese leger, die achter de aanvallen zit. Dat meldt de New York Times... Read more

Source: www.nutech.nl

Top found tags: report(1),cybercrime(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime kost EU 150.000 banenLocation: Center for Strategic and International Studies - Washington, United States
Date published: 10-06-2014

Computercriminaliteit levert wereldwijd een schade op van ruim 325 miljard euro. In Europa alleen al kunnen hierdoor 150.000 banen verloren gaan en in de VS nog eens 200.000. Dat blijkt uit onderzoek dat het Centre for Strategic and International Studies (CSIS) heeft gedaan in opdracht van beveilige... Read more

Source: www.automatiseringgids.nl

Top found tags: Germany(2),United States(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China ontkent nieuwe aantijgingen over cyberspionageLocation: Beijing, China
Date published: 10-06-2014

China heeft de nieuwste aantijgingen dat het zich schuldig aan cyberspionage maakt ontkend. Een Amerikaans beveiligingsbedrijf publiceerde vandaag een rapport over een groep vermeende Chinese hackers die in opdracht van het Chinese leger spionageaanvallen zouden uitvoeren. "De woorden en stijl van h... Read more

Source: www.security.nl

Top found tags: government(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kaspersky adviseert Tor Browser bij VPN-blokkadeLocation: Kaspersky HQ - Moscow, Russia
Date published: 10-06-2014

Het Russische anti-virusbedrijf Kaspersky Lab adviseert mensen die naar Brazili gaan of in het algemeen wifi-netwerken gebruiken om altijd een Virtual Private Network (VPN) in te stellen, maar als dit niet mogelijk is via Tor Browser te surfen. Een VPN zorgt ervoor dat anderen op het wifi-netwerk ... Read more

Source: www.security.nl

Top found tags: antivirus(2),cybercrime(2),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers ontdekken achilleshiel Zeus-botnetsLocation: Hewlett-Packard - Palo Alto, United States
Date published: 10-06-2014

Een beveiligingslek in de code van een berucht en bij cybercriminelen geliefd botnet maakt het kinderspel om toegang tot het beheerderspaneel te krijgen en zelfs de onderliggende server over te nemen. Het gaat om Zeus, ook wel het "Zwitserse zakmes" voor cybercriminelen genoemd. Zeus is een \'bouwdo... Read more

Source: www.security.nl

Top found tags: online banking(2),cybercrime(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russen aangehouden wegens gijzelen iPhones en iPadsLocation: Moscow, Russia
Date published: 10-06-2014

De Russische autoriteiten hebben twee mannen van 17 en 23 jaar aangehouden wegens het gijzelen van iPhones en iPads. Met name Australische gebruikers van de Apple-toestellen waren het doelwit van de aanvallen, die eind mei plaatsvonden en waarbij hun toestel voor losgeld werd vergrendeld. Gebruikers... Read more

Source: www.security.nl

Top found tags: Apple(3),mobile device(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Avast: ook cybercrimineel gebruikt zwakke wachtwoordenLocation: Amsterdam, The Netherlands
Date published: 10-06-2014

Ook cybercriminelen zouden zwakke wachtwoorden gebruiken, zo stelt anti-virusbedrijf Avast na analyse van een kleine 2.000 wachtwoorden die voor bots, backdoors en shells worden gebruikt. Shells zijn programma\'s waarmee een aanvaller toegang tot een website kan krijgen. Om ervoor te zorgen dat ande... Read more

Source: www.security.nl

Top found tags: website(1),backdoor(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Website fopt malware om besmette computers te waarschuwenLocation: F-Secure - Helsinki, Finland
Date published: 10-06-2014

Het Finse anti-virusbedrijf F-Secure heeft een manier ontdekt waardoor het computers die met de GameOver Zeus-malware genfecteerd zijn kan herkennen zonder dat de eigenaar anti-virussoftware moet installeren. Onlangs vond er een internationale operatie tegen GameOver Zeus-plaats. Daarbij slaagden ... Read more

Source: www.security.nl

Top found tags: online banking(2),cybercrime(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers slordig met wachtwoordenLocation: Amsterdam, The Netherlands
Date published: 10-06-2014

Hackers zijn net mensen en dus net zo makkelijk met hun wachtwoorden. Volgens beveiliger Avast gebruiken hackers vaak wachtwoorden van zes karakters, zonder hoofdletters en vaak met het woord hack erin. Avast heeft een database van 40.000 wachtwoorden aangelegd die zijn gebruikt door hackers en malw... Read more

Source: webwereld.nl

Top found tags: cybercrime(1),hackers(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
\'Miljoenen smart-tv\'s zijn kwetsbaar door aanval op HbbTV-protocol\'Location: Berlin, Germany
Date published: 10-06-2014

Onderzoekers van de Columbia University stellen dat smart-tv-toestellen die geschikt zijn voor het HbbTV-protocol en die digitale tv-signalen via de ether ontvangen, ongemerkt aangevallen kunnen worden door hackers. HbbTV is een protocol dat door veel Europese omroepen, waaronder de Nederlandse NPO,... Read more

Source: tweakers.net

Top found tags: financial sector(2),United States(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese \'hackeenheid\' richtte zich jarenlang op Europese satellietindustrieLocation: Beijing, China
Date published: 10-06-2014

Een beveiligingsbedrijf heeft details onthuld over een Chinese eenheid van staatshackers, die zich al sinds tenminste 2007 met name op de Europese en Amerikaanse satelliet- en ruimtevaartindustrie richt. De groep maakt voor de verspreiding van malware gebruik van e-mailbijlagen. De groep opereert va... Read more

Source: tweakers.net

Top found tags: conference(2),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nieuwe Boeings kwetsbaar voor hackersLocation: New York, United States
Date published: 10-06-2014

Het computernetwerk van de nieuwste Boeing is makkelijker te hacken dan die van eerdere modellen. De vliegtuigfabrikant moet onmiddellijk betere veiligheidsmaatregelen nemen. De FAA, de toezichthouder op de Amerikaanse luchtvaart, heeft Boeing gemaand zo snel mogelijk betere ict-beveiliging toe te p... Read more

Source: webwereld.nl

Top found tags: NL(1),vulnerability(1),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Phishing Sites Intensify World Cup CampaignsLocation: Brasilia-Federal District, Brazil
Date published: 09-06-2014

With the 2014 FIFA World Cup in Brazil about to kick off in less than a week, it should be no surprise that phishing sites have intensifiedtheirown spam campaigns targeting Brazilians as well. Some of these spam runs are fairly basic, as far as these go. This particular one, for example, tries t... Read more

Source: trendmicro.com

Top found tags: e-mail(2),cybercrime(5),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

iOS 8 gebruikt willekeurig MAC-adres bij scannen wifi-netwerkLocation: Apple HQ - Cupertino, United States
Date published: 10-06-2014

De nieuwste versie van Apple iOS zal een aantal aanpassingen bevatten die het lastiger moeten maken om gebruikers te volgen. En van de nieuwe privacymaatregelen van het mobiele besturingssysteem is het gebruik van een willekeurig MAC-adres bij het scannen van wifi-netwerken. De aanpassing werd tij... Read more

Source: www.security.nl

Top found tags: wireless(1),cyber security(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brandbrief naar Kamer over uitwisseling medische gegevensLocation: Brussel, Belgium
Date published: 10-06-2014

Uit angst voor een wetsvoorstel dat generieke toestemming voor het uitwisselen van medische gegevens dreigt te legitimeren, heeft privacyorganisatie PrivacyFirst een brandbrief naar de Tweede Kamer gestuurd. In de brief wordt de Kamer opgeroepen om de specifieke toestemming te handhaven. Morgen deba... Read more

Source: www.security.nl

Top found tags: medical sector(2),government(3),The Netherlands(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Bedrijf VS claimt cyberspionage door Franse concurrentLocation: Paris, France
Date published: 10-06-2014

Een Amerikaans bedrijf claimt dat het failliet is gegaan doordat een Frans conglomeraat de bedrijfsgeheimen en klanten via cyberspionage wist te stelen. De vermeende cyberspionage zou hebben plaatsgevonden toen de COO van Genergy voor de Franse concurrent SourceOne ging werken. Volgens Genergy zoude... Read more

Source: www.security.nl

Top found tags: NL(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
14-jarige jongens \'kraken\' geldautomaat via handleidingLocation: Amsterdam, The Netherlands
Date published: 10-06-2014

Twee Canadese jongens van 14-jaar zijn erin geslaagd om een geldautomaat van de Bank of Montreal te "kraken" via instructies die ze in een online handleiding vonden en een standaardwachtwoord. Matthew Hewlett en Caleb Turon vonden op internet een handleiding om de machine in de beheermode te zetten.... Read more

Source: www.security.nl

Top found tags: NL(1),ATM(2),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Matige groei voor markt beveiligingssoftwareLocation: Gartner - Stamford, United States
Date published: 10-06-2014

De omzet in beveiligingssoftware is vorig jaar met bijna 5 procent gestegen tot 19,9 miljard dollar. De groei valt lager uit dan verwacht door slechtere resultaten in de segmenten endpointbeveiliging en secure email gateway. Dat meldt marktonderzoeker Gartner, die niettemin toch spreekt van een \... Read more

Source: www.automatiseringgids.nl

Top found tags: Trend Micro(2),United States(2),antivirus(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Burgers sturen 40.000 DigiD-codes naar Digi-D.nlLocation: Amsterdam, The Netherlands
Date published: 10-06-2014

Al meer dan 40.000 keer zijn er inlogcodes en andere persoonlijke informatie voor DigiD op Digi-D.nl achtergelaten, de website van een reclamebedrijfje uit Waalwijk. Vanwege de naamsverwarring lanceerde het bedrijf speciaal een website genaamd zuinigopuwdigid.nl om burgers te waarschuwen. Dagelijks ... Read more

Source: www.security.nl

Top found tags: The Netherlands(2),government(3),Ministry of the Interior and Kingdom Relations(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chrome OS stuurt data naar Google voor inschakelen VPNLocation: Google HQ - Mountain View, United States
Date published: 10-06-2014

Een subafdeling van de Britse inlichtingendienst GCHQ heeft in een nieuw advies gewaarschuwd voor het gebruik van Chrome OS. Het besturingssysteem van Google is op Chromebooks aanwezig en wordt door steeds meer organisaties en bedrijven gebruikt. Bij het onderzoek naar Chrome OS 32 heeft de Communic... Read more

Source: www.security.nl

Top found tags: telecom sector(2),government(3),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaans rapport over vermeende Chinese hackergroepLocation: Beijing, China
Date published: 10-06-2014

Het Amerikaanse beveiligingsbedrijf CrowdStrike heeft een rapport gepubliceerd over een vermeende hackergroep die vanuit Sjanghai zou opereren. De groep wordt Putter Panda genoemd en zou het op Amerikaanse defensieleveranciers en de Europese satelliet- en luchtvaartindustrie hebben voorzien. Bij de ... Read more

Source: www.security.nl

Top found tags: China(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
\'AIVD mag Nederlanders niet aftappen zonder toestemming minister\'Location: Ministry of the Interior and Kingdom Relations - Den Haag, The Netherlands
Date published: 10-06-2014

De inlichtingendienst AIVD heeft geen directe toegang tot providers in Nederland. De dienst kan ook niet zomaar Nederlanders afluisteren zonder dat de minister van Binnenlandse Zaken of Defensie daar toestemming voor heeft gegeven, zei minister Ronald Plasterk van Binnenlandse Zaken dinsdag tijdens ... Read more

Source: www.nutech.nl

Top found tags: The Netherlands(6),Ministry of the Interior and Kingdom Relations(7),government(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Auto houdt bestuurder in de gatenLocation: Sydney, Australia
Date published: 10-06-2014

ECG-metingen kunnen realtime uitwijzen of iemand nog wel voldoende helder en geconcentreerd is op zijn taak. Dat principe zou in auto\'s gebruikt kunnen worden om automatische waarschuwingen voor de automobilisten te genereren. Deze suggestie wordt gedaan door Chris Dijksterhuis, die vorige week aan... Read more

Source: www.automatiseringgids.nl

Top found tags: NL(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Omzet beveiligingssoftware ruim 14 miljard in 2013Location: Amsterdam, The Netherlands
Date published: 10-06-2014

Vorig jaar is er voor zo\'n 20 miljard dollar (14,7 miljard euro) aan beveiligingssoftware omgezet, wat een lager dan verwachte groei is, zo meldt Gartner. In 2012 was dit 19 miljard dollar. De tragere groei wordt veroorzaakt doordat de markt voor consumentenbeveiligingssoftware steeds meer een comm... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bedenkingen bij veiligheid Chrome OSLocation: Amsterdam, The Netherlands
Date published: 10-06-2014

De Britse geheime dienst plaatst kanttekeningen bij de veiligheid van Chrome OS, het besturingssysteem van Google dat onder meer op Chromebooks wordt gebruikt. Volgens de GCHQ is de encryptie niet goed genoeg; hetzelfde geldt voor de vpn-client.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Google(2),telecom sector(2),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overheid kan straks ingrijpen bij overname KPNLocation: KPN HQ - Den Haag, The Netherlands
Date published: 10-06-2014

Het kabinet komt met een wetsvoorstel waarmee de overheid een overname van een Nederlands communicatiebedrijf kan blokkeren als daarmee de \'nationale veiligheid in het geding komt\'. In de praktijk heeft alleen KPN met de wet te maken. KPNAls een ander bedrijf straks een groot belang wil in een Ned... Read more

Source: tweakers.net

Top found tags: Ministry of Economic Affairs(4),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AIVD mag Nederlanders niet afluisteren zonder toestemmingLocation: AIVD - Zoetermeer, The Netherlands
Date published: 10-06-2014

De inlichtingendienst AIVD heeft geen toegang tot providers in Nederland. De dienst kan ook niet zomaar Nederlanders afluisteren zonder dat de minister van Binnenlandse Zaken of Defensie daar toestemming voor heeft gegeven, zegt minister Ronald Plasterk. Aanleiding is de bekendmaking van Vodafone ov... Read more

Source: www.beveiligingnieuws.nl

Top found tags: The Netherlands(4),government(6),Ministry of the Interior and Kingdom Relations(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Cisco verhelpt kwetsbaarheid in Cisco Unified Communications ManagerLocation: Cisco HQ - San Jose, United States
Date published: 10-06-2014

Samenvatting: Cisco heeft een update uitgebracht voor Cisco Unified Communications Manager die de kwetsbaarheid verhelpt. Gevolgen: Een geauthenticeerde kwaadwillende kan op afstand mogelijk toegang krijgen tot gevoelige informatie. Beschrijving: Door een kwetsbaarheid in BulkViewFileContentsAction.... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco verhelpt kwetsbaarheid in Cisco Wireless LAN ControllerLocation: Cisco HQ - San Jose, United States
Date published: 10-06-2014

Samenvatting: Cisco heeft een update uitgebracht voor Cisco Wireless LAN Controller die de kwetsbaarheid verhelpt. Gevolgen: Een niet geauthenticeerde kwaadwillende kan mogelijk een Denial-of-Service veroorzaken. Beschrijving: Door een kwetsbaarheid bij het verwerken van Cisco Discovery Protocol (CD... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in QEMU verholpenLocation: Door, United States
Date published: 10-06-2014

Samenvatting: Er zijn meerdere kwetsbaarheden verholpen in QEMU. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende een Denial-of-Service uitvoeren en mogelijk code uitvoeren op het host systeem met rechten van de gebruiker waaronder het QEMU proces draait. Beschrijving: Er bevin... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in GnuTLSLocation: Ubuntu - London, United Kingdom
Date published: 10-06-2014

Samenvatting: De makers van GnuTLS hebben updates uitgebracht om een kwetsbaarheid te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid op afstand misbruiken om willekeurige code uit te voeren en om een Denial-of-Service te veroorzaken. Beschrijving: Een kwetsbaarheid in de verificatie van... Read more

Source: www.ncsc.nl

Top found tags: SSL(1),Ubuntu(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in OpenSSH verholpenLocation: Ubuntu - London, United Kingdom
Date published: 10-06-2014

Samenvatting: De makers van OpenSSH hebben kwetsbaarheden in OpenSSH verholpen. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende beveiligingsmaatregelen omzeilen. Beschrijving: - CVE-2014-2532 Wanneer in het sshd_config bestand de configuratie-optie AcceptEnv gebruikt wordt met... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in dpkgLocation: Ubuntu - London, United Kingdom
Date published: 10-06-2014

Samenvatting: Debian heeft updates uitgebracht die beide kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan toegang krijgen tot gevoelige informatie en kan mogelijk verhoogde gebruikersrechten verkrijgen. Beschrijving: - CVE-2014-3864, CVE-2014-3865 Door een directory traversal kwetsbaarheid ... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in dpkgLocation: Amsterdam, The Netherlands
Date published: 10-06-2014

Samenvatting: Debian heeft updates uitgebracht die beide kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan toegang krijgen tot gevoelige informatie en kan mogelijk verhoogde gebruikersrechten verkrijgen. Beschrijving: - CVE-2014-3864, CVE-2014-3865 Door een directory traversal kwetsbaarheid ... Read more

Source: www.ncsc.nl

Top found tags: Debian(1),NL(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in libav verholpenLocation: Amsterdam, The Netherlands
Date published: 10-06-2014

Samenvatting: Er zijn meerdere kwetsbaarheden ontdekt in libav. Over deze kwetsbaarheden zijn weinig details bekend gemaakt. Gevolgen: Op dit moment zijn er geen details bekent gemaakt over de gevolgen van het uitbuiten van deze kwetsbaarheden. Beschrijving: Er zijn meerdere kwetsbaarheden ontdekt i... Read more

Source: www.ncsc.nl

Top found tags: Debian(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in kfreebsdLocation: Amsterdam, The Netherlands
Date published: 10-06-2014

Samenvatting: Er zijn updates beschikbaar gemaakt voor Debian 6 en 7 die de kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan mogelijk toegang krijgen tot gevoelige informatie of een Denial-of-Service veroorzaken. Beschrijving: - CVE-2014-1453 Een niet geauthenticeerde kwaadwillende kan moge... Read more

Source: www.ncsc.nl

Top found tags: DoS(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in libxml verholpenLocation: Ubuntu - London, United Kingdom
Date published: 10-06-2014

Samenvatting: De makers van libxml hebben updates uitgebracht om een Denial-of-Service kwetsbaarheid te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: Een kwaadwillende kan op afstand de kwetsbaarheid misbruiken door een ... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco verhelpt kwetsbaarheid in Cisco AsyncOSLocation: Cisco HQ - San Jose, United States
Date published: 10-06-2014

Samenvatting: Cisco heeft een update beschikbaar gesteld voor Cisco AsyncOS die de kwetsbaarheid verhelpt. Gevolgen: Een niet geauthenticeerde kwaadwillende kan op afstand mogelijk code uitvoeren met de rechten van de beheerder. Beschrijving: - CVE-2014-3289 Door een Cross-Site-Scripting kwetsbaarhe... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish