Under construction

New design coming soon!

CIC News engine statistics

CIC News for 11-06-2014 contains 78 articles: cybercrime(19),cyber security(26),data breach(5),other(28)

CIC News update contains 54 English and 24 Dutch articles for today.
There are 19 published advisories, 0 are English and 19 are Dutch.
In today's English news articles:
- 11 related to cybercrime
- 22 related to cyber security
- 5 related to data breach and identity theft
- 16 for the category other news

In today's Dutch news articles:
- 8 related to cybercrime
- 4 related to cyber security
- 12 for the category other news

Have fun reading.

English cybercrime related news

June 2014 Patch Tuesday brings huge IE update, IE8 vulnerability fixLocation: Microsoft HQ - Redmond, United States
Date published: 10-06-2014

Microsoft today addressed 66 total vulnerabilities across seven bulletins 59 in Internet Explorer alone in a mammoth June 2014 Patch Tuesday release, including a fix for an Internet Explorer 8 vulnerability that the company was made aware of more than seven months ago. Originally uncovered i... Read more

Source: searchsecurity.techtarget.com

Top found tags: telecom sector(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Patch Tuesday brings major IE overhaul, 66 bugs fixed in totalLocation: Microsoft HQ - Redmond, United States
Date published: 10-06-2014

Microsoft warns of attacks leveraging Word zero-day, releases temp fix The highest priority bulletin remediated 59 remote code execution (RCE) bugs affecting IE 6 through IE 11. This month, Microsoft addressed 66 vulnerabilities in its software with seven patches, including a major cumulative fix fo... Read more

Source: www.scmagazine.com

Top found tags: vulnerability(2),website(3),0-day(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android Trojan has affected 2,000, spawned 30 versionsLocation: Google HQ - Mountain View, United States
Date published: 10-06-2014

Ransomware for Android devices that emerged for sale in a malware authors\' forum for $5,000 in mid-May has already caused more than 2,000 infections in 13 countries and spawned 30 modifications, according to Kaspersky Labs expert Roman Unuchek. Modifications of the Trojan-Ransom.AndroidOS.Pletor.a,... Read more

Source: www.scmagazine.com

Top found tags: telecom sector(2),trojan(2),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report details China-based cyber spying on U.S. aerospace sectorLocation: New York, United States
Date published: 10-06-2014

Report details China-based cyber spying on U.S. aerospace sector The espionage group likely worked on behalf of the Chinese People\'s Liberation Army (PLA), CrowdStrike found. A security firm has detailed the exploits of a China-based cyber espionage group, which has targeted U.S. and European satel... Read more

Source: www.scmagazine.com

Top found tags: trojan(2),United States(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Expensive new trojan, Pandemiya, based on 25K original lines of C codeLocation: Microsoft HQ - Redmond, United States
Date published: 10-06-2014

Expensive new trojan, Pandemiya, based on 25K original lines of C code Pandemiya, a new and original trojan, is being sold for as much as $2,000 in underground forums. Pandemiya, a new trojan being sold on underground forums for as much as $2,000, separates itself from other similar malware such... Read more

Source: www.scmagazine.com

Top found tags: social media(2),trojan(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
June 2014 Patch Tuesday Resolves Critical Flaws in Internet Explorer, Microsoft OfficeLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Patch-Tuesday_grayTwo out of seven bulletins in today\s Microsoft Patch Tuesday are tagged as critical while the rest are marked as important. The critical bulletins addressed a number of vulnerabilities found existing in Microsoft Office and Internet Explorer, which when exploited could allow re... Read more

Source: trendmicro.com

Top found tags: vulnerability(2),website(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Evernote struck down by DDoS attack for several hoursLocation: Arbor Networks - Burlington, United States
Date published: 11-06-2014

denial-of-service attack. The company took to Twitter on Tuesday afternoon to explain why some of its users couldn\'t access their notes. At about 2:40pm PST the company reported, "Evernote service is currently unavailable. We are working to resolve the issue. Updates to follow. Thanks for your pati... Read more

Source: www.zdnet.com

Top found tags: update(2),DoS(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA Playset invites hackers to \'play along with the NSA\'Location: National Security Agency - Fort Meade, United States
Date published: 11-06-2014

Inspired by the NSA\'s ANT Catalog of spyware and surveillance tools, The NSA Playset project invites hackers to reproduce easy, at-home versions of the NSA\'s spy-tools arsenal and NSA-style silly names are required. The NSA\'s ANT Catalog was among documents leaked by Edward Snowden. It reveal... Read more

Source: www.zdnet.com

Top found tags: United States(2),Hack In The Box(4),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDoS Attacks Take Down Feedly, EvernoteLocation: Arbor Networks - Burlington, United States
Date published: 11-06-2014

News aggregator Feedly remains offline Wednesday as it battles a distributed denial of service attack that\s kept the service down for several hours. In a blog entry this morning, the company acknowledged that an attacker istrying to extort an unnamed sum of money from Feedly to stop the attack... Read more

Source: threatpost.com

Top found tags: DoS(2),social media(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.K. Considers Life Sentences for HackersLocation: New York, United States
Date published: 11-06-2014

The U.K.\'s Serious Crime Bill, recently proposed in the Queen\'s speech, provides for life sentences for hackers who launch "cyber attacks which result in loss of life, serious illness or injury or serious damage to national security, or a significant risk thereof" (h/t Sophos). The bill would also... Read more

Source: www.esecurityplanet.com

Top found tags: United Kingdom(2),cybercrime(3),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Evernote hit by first major DDoS attackLocation: Armstrong, United States
Date published: 11-06-2014

Companies that have been DDoS attacked in the past are more likely to be attacked in the future - Mark Teolis, DOSarrest Evernote hit by first major DDoS attack Evernote hit by first major DDoS attack The Evernote cloud-based productivity service has been hit by a DDoS attack, causing problems when ... Read more

Source: www.scmagazineuk.com

Top found tags: financial sector(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Target taps former GM exec to lead information securityLocation: Target HQ - Minneapolis, United States
Date published: Target hackers hit air-conditioning firm first as a way in

announced Tuesday the appointment of a new chief information security officer. maiorino2Brad Maiorino Former GM and GE executive Brad Maiorino was named senior vice president, chief information security officer. He\'ll be responsible for leading Target\'s global information security and IT risk orga... Read more

Source: Target\'s data breach: It gets worse The discount retailer was hit with a massive data breach last year that resulted in lost profits and a tarnished reputation. Target\'s chief executive and chairman Gregg Steinhafel stepped down last month after the company\'s board of directors decided it was "the right time for new leadership." He was replaced with chief financial officer John Mulligan as interim chief executive and president. Target claims that in the months following the 2013 data breach, the company took steps to beef up its information security systems and processes, such as enhancing monitoring, segmentation, logging, and security of accounts and installation of application whitelisting on POS systems. Maiorino will report to Target CIO Bob DeRodes, who credited the new hire as being one of the nation\'s top leaders in information security and risk. "I am looking forward to joining the Target team and helping them continue the progress they have made to be a retail leader in information security and protection," said Maiorino, in prepared remarks. "I am confident that the combination of a strong team and the leadership commitment will enable us to achieve that objective." |http://www.zdnet.com/target-taps-former-gm-exec-to-lead-information-security-7000030386/#ftag|10-06-2014|www.zdnet.com

Top found tags: EN(1),cyber security(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM overtakes Trend Micro as No. 3 security software makerLocation: Trend Micro - Cupertino, United States
Date published: 10-06-2014

BOSTON (Reuters) - IBM overtook Japan\'s Trend Micro Inc to become the world\'s No. 3 provider of security software last year, after acquiring cybersecurity firm Trusteer, according to market share data released on Tuesday by Gartner. Symantec Corp and Intel Corp\'s McAfee retained their slots as th... Read more

Source: reuters.com

Top found tags: Trend Micro(2),antivirus(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Alleged Oleg Pliss iPhone Hackers Arrested in RussiaLocation: Apple HQ - Cupertino, United States
Date published: 10-06-2014

The hackers behind last month\s iPhone ransomware campaign in which many users were asked to pay $100 to unlock their devices may be behind bars now. A press release on the Russian Interior Ministry\s website yesterday claims two men were recently arrested for the locking of Apple... Read more

Source: threatpost.com

Top found tags: Apple(3),mobile device(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russians nab two hackers in iPhone ransomware caperLocation: Apple HQ - Cupertino, United States
Date published: 10-06-2014

A teenager and a young adult in Moscow have confessed to orchestrating a ransomware attack that used the \Find My iPhone\ feature to compromise iPhone and iPad devices in Australia and other countries. According to a report in the South China Morning Post, Russian authorities said police raide... Read more

Source: www.scmagazine.com

Top found tags: Apple(3),mobile device(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target taps former GM exec to lead information securityLocation: Target HQ - Minneapolis, United States
Date published: Target hackers hit air-conditioning firm first as a way in

announced Tuesday the appointment of a new chief information security officer. maiorino2Brad Maiorino Former GM and GE executive Brad Maiorino was named senior vice president, chief information security officer. He\'ll be responsible for leading Target\'s global information security and IT risk orga... Read more

Source: Target\'s data breach: It gets worse The discount retailer was hit with a massive data breach last year that resulted in lost profits and a tarnished reputation. Target\'s chief executive and chairman Gregg Steinhafel stepped down last month after the company\'s board of directors decided it was "the right time for new leadership." He was replaced with chief financial officer John Mulligan as interim chief executive and president. Target claims that in the months following the 2013 data breach, the company took steps to beef up its information security systems and processes, such as enhancing monitoring, segmentation, logging, and security of accounts and installation of application whitelisting on POS systems. Maiorino will report to Target CIO Bob DeRodes, who credited the new hire as being one of the nation\'s top leaders in information security and risk. "I am looking forward to joining the Target team and helping them continue the progress they have made to be a retail leader in information security and protection," said Maiorino, in prepared remarks. "I am confident that the combination of a strong team and the leadership commitment will enable us to achieve that objective." |http://www.zdnet.com/target-taps-former-gm-exec-to-lead-information-security-7000030386/#ftag|10-06-2014|www.zdnet.com

Top found tags: EN(1),cyber security(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target taps former GM exec to lead information securityLocation: Target HQ - Minneapolis, United States
Date published: Target hackers hit air-conditioning firm first as a way in

announced Tuesday the appointment of a new chief information security officer. maiorino2Brad Maiorino Former GM and GE executive Brad Maiorino was named senior vice president, chief information security officer. He\'ll be responsible for leading Target\'s global information security and IT risk orga... Read more

Source: Target\'s data breach: It gets worse The discount retailer was hit with a massive data breach last year that resulted in lost profits and a tarnished reputation. Target\'s chief executive and chairman Gregg Steinhafel stepped down last month after the company\'s board of directors decided it was "the right time for new leadership." He was replaced with chief financial officer John Mulligan as interim chief executive and president. Target claims that in the months following the 2013 data breach, the company took steps to beef up its information security systems and processes, such as enhancing monitoring, segmentation, logging, and security of accounts and installation of application whitelisting on POS systems. Maiorino will report to Target CIO Bob DeRodes, who credited the new hire as being one of the nation\'s top leaders in information security and risk. "I am looking forward to joining the Target team and helping them continue the progress they have made to be a retail leader in information security and protection," said Maiorino, in prepared remarks. "I am confident that the combination of a strong team and the leadership commitment will enable us to achieve that objective." |http://www.zdnet.com/target-taps-former-gm-exec-to-lead-information-security-7000030386/#ftag|10-06-2014|www.zdnet.com

Top found tags: EN(1),cyber security(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft delivers seven advisoriesLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Patch Tuesday, June 2014 delivers seven advisories, of them, two critical, five important one of which is the seldom seen tampering type. The remarkable item in this month\'s advisories is MS14-035, the Internet Explorer patch affecting all supported versions. That in itself is not unique, we see on... Read more

Source: net-security.org

Top found tags: Internet Explorer(2),Microsoft(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
1Password 4 for Android releasedLocation: Google HQ - Mountain View, United States
Date published: 11-06-2014

AgileBits has released 1Password 4 for Android, a pixel-to-bit reinvention of its industry-commanding password manager and secure wallet for Android phones and tablets. [1password-] As a secure wallet, 1Password for Android securely stores website Logins, Identities for filling forms, Credit Cards f... Read more

Source: net-security.org

Top found tags: smartphone(2),mobile device(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security at higher education institutionsLocation: New York, United States
Date published: 11-06-2014

SANS announces results of its inaugural survey of security in institutions of higher education, in which nearly 300 higher education IT professionals answered questions about the challenges of making their environments secure while maintaining the openness needed by faculty, staff, students and bene... Read more

Source: net-security.org

Top found tags: security management(2),cyber security(4),education(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft fights US effort to \'break down the doors\' of its Irish datacentreLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Microsoft is resisting demands from the US government for it to cough up email hosted in its Irish datacentre in a case that could have dramatic implications for US cloud providers. With suspicion of US tech companies already running high over the US government spying revealed last year by whistlebl... Read more

Source: www.zdnet.com

Top found tags: telecom sector(2),United States(2),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target taps former GM exec to lead information securityLocation: Target HQ - Minneapolis, United States
Date published: Target hackers hit air-conditioning firm first as a way in

announced Tuesday the appointment of a new chief information security officer. maiorino2Brad Maiorino Former GM and GE executive Brad Maiorino was named senior vice president, chief information security officer. He\'ll be responsible for leading Target\'s global information security and IT risk orga... Read more

Source: Target\'s data breach: It gets worse The discount retailer was hit with a massive data breach last year that resulted in lost profits and a tarnished reputation. Target\'s chief executive and chairman Gregg Steinhafel stepped down last month after the company\'s board of directors decided it was "the right time for new leadership." He was replaced with chief financial officer John Mulligan as interim chief executive and president. Target claims that in the months following the 2013 data breach, the company took steps to beef up its information security systems and processes, such as enhancing monitoring, segmentation, logging, and security of accounts and installation of application whitelisting on POS systems. Maiorino will report to Target CIO Bob DeRodes, who credited the new hire as being one of the nation\'s top leaders in information security and risk. "I am looking forward to joining the Target team and helping them continue the progress they have made to be a retail leader in information security and protection," said Maiorino, in prepared remarks. "I am confident that the combination of a strong team and the leadership commitment will enable us to achieve that objective." |http://www.zdnet.com/target-taps-former-gm-exec-to-lead-information-security-7000030386/#ftag|10-06-2014|www.zdnet.com

Top found tags: EN(1),cyber security(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How apps and extensions affect your browsingLocation: Google HQ - Mountain View, United States
Date published: 11-06-2014

Google has announced the newest version of the Chrome Apps & Extensions Developer Tool, which helps developers debug apps and extensions, and power users to see which extensions ask for broad permissions that allow them to access sensitive data such as browser cookies or history. [caedt-smal] "Once ... Read more

Source: net-security.org

Top found tags: cyber security(2),Google(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
iOS 8 will randomize devices' MAC address to increase privacyLocation: Apple HQ - Cupertino, United States
Date published: 11-06-2014

The next major release of Apple\'s iOS mobile operating system will include an important change: when local wireless networks scan for devices in range, devices running iOS 8 will provide random, locally administrated MAC addresses. Why is that important, you ask? Well, so far each device has only o... Read more

Source: net-security.org

Top found tags: Apple(2),cyber security(2),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google End-to-End: The encryption silver bullet?Location: Google HQ - Mountain View, United States
Date published: 11-06-2014

The world seems to be turning its attention to the notion of data encryption, and Google is the latest to jump on the bandwagon. On June 3rd, Google announced that it would be offering a Chrome extension called End-to-End that provides end-to-end encryption of email. Comcast immediately followed wit... Read more

Source: net-security.org

Top found tags: mobile device(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is your data already out there?Location: Smith, United States
Date published: 11-06-2014

CIOs cannot underestimate the creativity of online organized criminals to quietly penetrate their IT systems through a growing area of vulnerability: employees and vendors, according to 360 Advanced. David James Smith, an information technology security consultant at 360 Advanced said: "It has been ... Read more

Source: net-security.org

Top found tags: cybercrime(3),telecom sector(6),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Framework Helps UK Banks Test for Cyber-WeaknessesLocation: London,United Kingdom
Date published: 11-06-2014

New Framework Helps UK Financial Institutions Improve Resilience to Cyberattacks A new cybersecurity framework has been launched to help financial institutions in the United Kingdom test their systems for vulnerabilities and strengthen their resilience to cyberattacks, the Bank of England announced ... Read more

Source: securityweek.com

Top found tags: United Kingdom(4),cyber security(6),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Clandestine Fox" Attackers Target Energy Firms via Social Media: FireEyeLocation: Scott, United States
Date published: 11-06-2014

An advanced persistent threat (APT) group whose activities have been monitored by FireEye has started using social networks to trick the employees of targeted organizations into installing malware, the company said Tuesday. The activities of the actors involved in what FireEye calls \Operation Cl... Read more

Source: securityweek.com

Top found tags: cybercrime(4),social media(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mailroom Employee Exposes 3,675 Highmark Members\' DataLocation: Becker, United States
Date published: 11-06-2014

The Pittsburgh Tribune-Review reports that health insurer Highmark recently began notifying 3,675 of its Medicare Advantage members that their personal and medical information may have been disclosed to others by mistake (h/t Becker\'s Hospital CIO). An error by a mailroom employee apparently led to... Read more

Source: www.esecurityplanet.com

Top found tags: privacy(1),report(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Windows Security Feature Abused, Blocks Security SoftwareLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Engineer) We recently discussed the latest attacks affecting users in Japan that were the works of the BKDR_VAWTRAK malware. This malware family combines backdoor and infostealer behaviors and had just added the banking credentials theft to its repertoire. It was also mentioned that this malware tri... Read more

Source: trendmicro.com

Top found tags: Trend Micro(2),Kaspersky Lab(4),antivirus(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile guidance on encryption/VPN from CESGLocation: Google HQ - Mountain View, United States
Date published: 11-06-2014

The CESG, the security offshoot of GCHQ, has published in-depth guidance for users of laptop, tablet and smartphone operating systems, offering specifics on how to deploy and use the operating systems on a mobile platform. Mobile guidance on encryption/VPN from CESG Mobile guidance on encryption/VPN... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(6),mobile device(6),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to benefit from a cyber playbookLocation: Anti-Phishing Working Group - San Francisco, United States
Date published: 11-06-2014

How to benefit from a cyber playbook How to benefit from a cyber playbook Cyber attacks are prolific. We may be stating the obvious, but when the profuse number of attacks are coupled with the fact that they get more sophisticated every day, then the outcome is a security analyst\'s nightmare. Altho... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(2),cybercrime(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft opposes US access to Dublin dataLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Microsoft - with the backing of Verizon and the Electronic Frontier Foundation (EFF) - has filed to challenge federal prosecutors\' `right\' to demand access to its data stored in an Irish data centre. Microsoft opposes US access to Dublin data Microsoft opposes US access to Dublin data The legal ch... Read more

Source: www.scmagazineuk.com

Top found tags: privacy(2),United Kingdom(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Continuous monitoring key to retail cyber security, says PonemonLocation: Target HQ - Minneapolis, United States
Date published: 10-06-2014

Retailers should look to continuous monitoring to tackle cyber attacks, according to a Ponemon Institute survey of almost 600 IT security professionals in the US. More than half of the respondents also believed that SQL injection was a key component of the recent spate of high-profile cyber attacks ... Read more

Source: www.computerweekly.com

Top found tags: vulnerability(2),cybercrime(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target Hires Former GM, GE Security Chief Brad Maiorino as New CISOLocation: Target HQ - Minneapolis, United States
Date published: 10-06-2014

Target Corp. announced on Tuesday that it has hired Brad Maiorino as senior vice president and chief information security officer (CISO). Maiorino will join the retailer on June 16 and will be responsible for the company\'s information security and technology risk strategy and report to CIO Bob DeRo... Read more

Source: securityweek.com

Top found tags: information security(2),information sharing(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Enough with the cyber \'wake-up calls\'Location: Hong Kong, China
Date published: 11-06-2014

Alert" in April, one that was regurgitated again for journalists to swallow a second time. No, that happens all the time. It was because we should, said the alert, "Consider these survey results a wake-up call." Now the report itself isn\'t bad, as far as such things go. Prepared by the Ponemon Inst... Read more

Source: www.zdnet.com

Top found tags: OpenSSL(2),Ponemon Institute(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security Analytics Startup Exabeam Raises $10 MillionLocation: Howard, United States
Date published: 11-06-2014

Security analytics startup Exabeam announced on Tuesday that it has secured $10 million in a series A funding round led by Norwest Venture Partners, with participation from Aspect Ventures and angel investor Shlomo Kramer. The funding will be used to continue the development of Exabeam\s solution... Read more

Source: securityweek.com

Top found tags: threat(1),data breach(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Leader of Identity Theft Ring Gets 10 Years in PrisonLocation: Brown, United States
Date published: 11-06-2014

Jennifer Robinson, 36, of West Palm Beach, Fla., was recently sentenced to 121 months in prison, to be followed by three years of supervised release, for her involvement in an extensive identity theft scheme. Robinson had previously pled guilty to one count of conspiracy to commit wire fraud, 12 cou... Read more

Source: www.esecurityplanet.com

Top found tags: health sector(2),identity theft(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Microsoft Patches Dozens of Security Vulnerabilities in Patch Tuesday UpdateLocation: Microsoft HQ - Redmond, United States
Date published: 10-06-2014

Microsoft patched several dozen vulnerabilities as part of this month\'s Patch Tuesday, including critical security issues affecting Internet Explorer. The fixes are spread across seven security bulletins. However, the bulk of them are aimed at IE. "The remarkable item in this month\'s advisories is... Read more

Source: securityweek.com

Top found tags: telecom sector(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe release addresses six bugs, Flash Player a high priorityLocation: Microsoft HQ - Redmond, United States
Date published: 10-06-2014

Adobe released patches for six vulnerabilities on Tuesday, but Flash Player on Windows and Macintosh is receiving the most attention because attackers can exploit the bugs to execute code without the user being aware. The updates address CVE-2014-0531, CVE-2014-0532 and CVE-2014-0533, which involve ... Read more

Source: www.scmagazine.com

Top found tags: patch(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ATO taskforce to rule on bitcoin taxation this yearLocation: Sydney, Australia
Date published: 11-06-2014

The ATO has set up a taskforce to investigate bitcoin and other cryptocurrencies and how best to prevent tax avoidance in Australia through the use of such curriencies. Documents obtained under Freedom of Information law by the ABC show that the agency has been keeping a close eye on cryptocurrencie... Read more

Source: www.zdnet.com

Top found tags: report(1),Anonymous(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
World Cup 2014 fans are not the only ones with their eye on the ballLocation: Brasilia-Federal District, Brazil
Date published: 11-06-2014

The World Cup 2014 championship has begun and like most major sports events, employees are browsing websites to check the latest scores, watch streaming live games and chat with their peers about the latest updates. Sports-related websites receive a lot of traffic during large events like these crea... Read more

Source: net-security.org

Top found tags: website(1),ISP(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whitepaper: How Big Data fights back against APTs and malwareLocation: New York, United States
Date published: 11-06-2014

This whitepaper is essential reading for CEOs, CTOs, Network Security Professionals, and everyone else who needs to know why Big Data = Big Protection in today s threat landscape. APTs and malware threats are getting harder to spot, as adversaries step up their attacks, and aim to go undetected for ... Read more

Source: net-security.org

Top found tags: EN(1),threat(1),ISP(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Driven to DistractionLocation: Facebook - Menlo Park, United States
Date published: 11-06-2014

Teaching our kids how to stay safe online is one of the highest priorities for parents in this digital age. But what about staying safe WHILE online? Do we need to add this to our parenting checklist? Absolutely. Teaching our kids how to make good decisions about where and when to use technology... Read more

Source: blogs.mcafee.com

Top found tags: website(1),social media(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A brilliant, secure SSD that Apple should have designedLocation: Apple HQ - Cupertino, United States
Date published: 11-06-2014

SoSecure has launched a Kickstarter campaign for a built-from-scratch, highly-secure smartphone controlled solid-state drive (SSD). It\'s got a host of features that should have Seagate, WD, and Toshiba ashamed that they didn\'t think of first: FIPS 140-2 level 3. disconnected from your computer bac... Read more

Source: www.zdnet.com

Top found tags: EN(1),smartphone(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Bitcoin App That Could Create a Black Market for Leaked DataLocation: Lea, United States
Date published: 11-06-2014

Whistleblowers like Chelsea Manning and Edward Snowden exposed classified information because they believed their leaks were in the public interest. The next secret-spiller might be motivated instead by something less magnanimous: money. Two free-information-focused developers have released a piece ... Read more

Source: wired.com

Top found tags: United States(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mozilla Patches Seven Flaws in Firefox 30Location: Mozilla - Mountain View, United States
Date published: 11-06-2014

Mozilla has fixed seven security vulnerabilities in Firefox 30, including five critical flaws that could enable remote code execution. Firefox 30 is a relatively minor release of the popular browser, with the most notable change being the addition of a sidebar button that allows users to quickly acc... Read more

Source: threatpost.com

Top found tags: social media(2),telecom sector(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Payment card breach at US restaurant chain P.F. Chang'sLocation: New Jersey, United States
Date published: 11-06-2014

Asian-themed US restaurant chain P.F. Chang\'s China Bistro has apparently suffered a breach that resulted in the theft of customers\' payment card data. The extent of the breach and, indeed, the breach itself is yet to be officially confirmed by the company, but according to bank sources interviewe... Read more

Source: net-security.org

Top found tags: telecom sector(2),update(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile apps will have a significant impact on information infrastructureLocation: Gartner - Stamford, United States
Date published: 11-06-2014

With digital business blurring the line between the physical and the digital worlds, consumer-centric mobile apps are playing an important role, according to Gartner. Gartner predicts that, by 2015, most mobile apps will sync, collect and analyze deep data about users and their social graphs, but mo... Read more

Source: net-security.org

Top found tags: hacktivism(1),research(1),Anonymous(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Wanted: Cyber Security TalentLocation: New York, United States
Date published: 11-06-2014

Wanted: Cyber Security Talent _ _ _ _ _ _ _ _ What s stopping government agencies from attracting the cyber security talent they need? ( ) Agencies can\'t pay them enough _ ( ) Those with the right talents are not interested in government work _ ( ) Those with unconventional backgrounds get screened... Read more

Source: www.informationweek.com

Top found tags: EN(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chrome, Firefox Updates Address Security VulnerabilitiesLocation: Mozilla - Mountain View, United States
Date published: 11-06-2014

Mozilla has released Firefox 30 which fixes a total of seven vulnerabilities affecting the Web browser. Google has also updated its Chrome Web Browser to address four security holes. According to an advisory published by Mozilla on Tuesday, five of the seven vulnerabilities fixed in Firefox 30 are c... Read more

Source: securityweek.com

Top found tags: social media(2),telecom sector(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe Issues Security Updates for Flash Player, AIRLocation: Adobe HQ - San Jose, United States
Date published: 11-06-2014

Adobe has updated its Adobe Flash Player for Windows, Mac OS X and Linux to address a total of six vulnerabilities that could be exploited to take control of impacted systems. Adobe Flash Player for Windows and Adobe Flash Player for Mac OS X have been updated to version 14.0.0.125, and Adobe is adv... Read more

Source: securityweek.com

Top found tags: Trend Micro(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. Forces Korea HackedLocation: Seoul, South Korea
Date published: 11-06-2014

Stars and Stripes reports that the personal information of more than 16,000 South Korean employees, former employees and job applicants may have been stolen from U.S. Forces Korea\'s human resources recruiting system (h/t Computerworld). On May 28, 2014, USFK learned of the possible breach of a Civi... Read more

Source: www.esecurityplanet.com

Top found tags: South Korea(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Celebrating our partners\ successLocation: London,United Kingdom
Date published: 11-06-2014

Another year, another very successful Summit. Last month we greeted partners at our annual Channel Partner Summit in Marbella, Spain. This annual event is a chance for us to gather and discuss how our partners and McAfee are growing better together and to hear more on McAfee\s vision of security ... Read more

Source: blogs.mcafee.com

Top found tags: Turkey(1),Germany(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Cybercrime kost Nederland 8,8 miljard euro per jaarLocation: Amsterdam, The Netherlands
Date published: 10-06-2014

Cybercrime kost de Nederlandse economie jaarlijks zo\'n 8,8 miljard euro, ofwel ongeveer 1,5 procent van het bruto nationaal product. In een rapport van McAfee zou de wereldwijde kosten van cybercrime jaarlijks zeker 325 miljard euro bedragen. Dat is tussen de 0,5 en 0,8 procent van de wereldeconomi... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),report(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Deze maand meeste patches voor IELocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

In de aanstaande patchronde van Microsoft worden maar liefst 59 correcties uitgestuurd voor Internet Explorer (IE). Dat is een record want nog nooit kreeg n product zoveel patches tegelijk. Meer over deze IE-lekken Gebruik van Internet Explorer zonder extra maatregelen af te raden Microsoft heef... Read more

Source: www.automatiseringgids.nl

Top found tags: Windows(1),Internet Explorer(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google schuift URL-loze adresbalk Chrome op lange baanLocation: Google HQ - Mountain View, United States
Date published: 11-06-2014

Het ziet er niet naar uit dat Google op korte termijn een URL-loze adresbalk in Chrome zal introduceren. Begin mei werd bekend dat de zoekgigant met een URL-loze adresbalk experimenteerde, waarbij alleen de domeinnaam werd weergegeven. De maatregel zou mogelijk tegen phishing kunnen helpen. Hoewel e... Read more

Source: www.security.nl

Top found tags: website(1),Google(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Hackers zijn immuunsysteem van het internet"Location: Jack, United States
Date published: 11-06-2014

Hackers zijn het immuunsysteem van het internet en zorgen ervoor dat we ons moeten blijven ontwikkelen en verbeteren. Dat liet beveiligingsexpert Keren Elazari onlangs tijdens een Ted Conference weten. "We zijn vaak bang en gefascineerd door de macht die hackers tegenwoordig hebben", stelt Elazari. ... Read more

Source: www.security.nl

Top found tags: vulnerability(1),government(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mogelijk weer creditcarddiefstal bij Amerikaanse ketenLocation: New York, United States
Date published: 11-06-2014

Mogelijk is er weer een grote Amerikaanse keten het doelwit van een aanval geworden waarbij er credit- en debitcardgegevens zijn buitgemaakt. Het gaat om restaurantketen P.F. Chang\'s, dat meer dan 200 vestigingen in de Verenigde Staten, Canada, Mexico, Argentini, Chili en het Midden-Oosten heeft.... Read more

Source: www.security.nl

Top found tags: research(1),cybercrime(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft scant Windows op schadelijke rootkitLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Microsoft heeft de in Windows ingebouwde virusverwijdertool van een update voorzien zodat die een schadelijke rootkit kan detecteren en verwijderen. Het gaat om de Necurs-rootkit die door veel malware wordt gebruikt om zich op computers te verbergen en te beschermen. Necurs probeert andere beveiligi... Read more

Source: www.security.nl

Top found tags: cyber security(2),Microsoft(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
30 virusscanners voor Android getestLocation: G Data Software - Bochum, Germany
Date published: 11-06-2014

Makers van beveiligingssoftware hebben inmiddels ook het Android-platform ontdekt, alleen door het grote aanbod kan het lastig voor consumenten zijn om te kiezen. Reden voor het Duitse testorgaan AV-Test om 30 mobiele virusscanners voor smartphones en tablets met Android. Daarbij werd er naar \'real... Read more

Source: www.security.nl

Top found tags: Trend Micro(2),antivirus(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Canadees wetsvoorstel hackbevoegdheid politie oogst kritiekLocation: Den Haag, The Netherlands
Date published: 11-06-2014

De Canadese privacywaakhond heeft kritiek op een wetsvoorstel van de conservatieve regering dat cyberpesten tegen zou moeten gaan. In het voorstel krijgen de politie en douane vergaande bevoegdheden, waaronder het hacken van telefoons en computers. Met de nieuwe bevoegdheden zouden opsporingsinstant... Read more

Source: tweakers.net

Top found tags: cybercrime(3),telecom sector(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Google-tool toont privacygevolgen Chrome-extensiesLocation: Google HQ - Mountain View, United States
Date published: 11-06-2014

Gebruikers van Google Chrome die willen weten wat genstalleerde browser-extensies allemaal uitspoken kunnen hier dankzij een tool van Google nu meer inzicht in krijgen. Volgens Google zorgen extensies voor een betere gebruikerservaring, maar kunnen ze ook om allerlei permissies vragen. Permissies ... Read more

Source: www.security.nl

Top found tags: cyber security(2),Google(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Comsec breidt activiteiten in Nederland uitLocation: Trend Micro - Cupertino, United States
Date published: 11-06-2014

Comsec Cyber & Information Security Group maakt bekend de komende jaren haar activiteiten flink uit te breiden en groei te realiseren in Nederland. Het Isralische bedrijf levert volledige dienstverlening op het gebied van cyber- en informatiebeveiliging. Log ComsecHet bedrijf heet Henk van der Hei... Read more

Source: www.beveiligingnieuws.nl

Top found tags: cyber security(2),information security(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft weigert overheid VS in Europa opgeslagen mail te gevenLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Microsoft heeft de Amerikaanse overheid geweigerd mailverkeer van een klant te overhandigen, omdat de mail in Europa is opgeslagen. Microsoft zegt klanten te hebben verloren, omdat die bang zijn dat de Amerikaanse overheid toegang krijgt tot hun data. De Amerikaanse overheid meent de gegevens te kun... Read more

Source: tweakers.net

Top found tags: cyber security(2),government(3),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Digitale wachtwoordkluis 1Password nu ook voor AndroidLocation: Google HQ - Mountain View, United States
Date published: 11-06-2014

De populaire wachtwoordkluis 1Password is na lange tijd nu ook voor het Android-platform beschikbaar. Via het programma kunnen gebruikers eenvoudig hun wachtwoorden, creditcardgegevens en andere persoonlijke informatie voor allerlei websites en diensten opslaan. Daarnaast kan het programma ook wacht... Read more

Source: www.security.nl

Top found tags: password(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Gecontroleerd archief van TrueCrypt 7.1a onlineLocation: Amsterdam, The Netherlands
Date published: 11-06-2014

Een groep experts die een initiatief is gestart om vrije opensourcesoftware te ondersteunen heeft een gecontroleerd archief van de populaire encryptiesoftware TrueCrypt online gezet. De website van TrueCrypt liet onlangs nog weten dat de ondersteuning van het programma was gestaakt. Daarnaast zou he... Read more

Source: www.security.nl

Top found tags: Windows(1),backdoor(2),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
VS waarschuwt voor standaard wachtwoord verkeersbordenLocation: Amsterdam, The Netherlands
Date published: 11-06-2014

Een afdeling van het Amerikaanse Ministerie van Homeland Security heeft een waarschuwing voor digitale verkeersborden afgegeven, die dankzij een standaard wachtwoord zijn aan te passen. Het probleem is aanwezig in de Daktronics Vanguard highway dynamic message sign (DMS) software. Deze software word... Read more

Source: www.security.nl

Top found tags: critical infrastructure(2),government(5),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firefox 30 verhelpt 10 lekken, updates voor Tor en TailsLocation: Mozilla - Mountain View, United States
Date published: 11-06-2014

Mozilla heeft nieuwe Firefox-versies gelanceerd die in totaal 10 lekken verhelpen. Updates die ook gevolgen voor gebruikers van Tor Browser en het anonieme besturingssysteem Tails hebben. Acht van de tien lekken die in Firefox 30 zijn gepatcht zijn als \'kritiek\' bestempelt. Dit houdt in dat een aa... Read more

Source: www.security.nl

Top found tags: update (1),patch(3),update(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Belangrijke update voor Adobe Flash Player verschenenLocation: Adobe HQ - San Jose, United States
Date published: 11-06-2014

Naast Microsoft en Google heeft ook Adobe tijdens de tweede dinsdag van juni een belangrijke updates uitgebracht. Het gaat om nieuwe versies van Flash Player die zes lekken verhelpen. Via n van de kwetsbaarheden zou een aanvaller in het ergste geval de computer volledig kunnen overnemen. Alleen ... Read more

Source: www.security.nl

Top found tags: social media(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google dicht lek van 10.000 dollar in Chrome OSLocation: Google HQ - Mountain View, United States
Date published: 11-06-2014

Er is een nieuwe versie van Chome OS verschenen waarin Google een lek ter waarde van 10.000 dollar heeft gepatcht. De kwetsbaarheid, die door de bekende beveiligingsonderzoeker Pinkie Pie was ontdekt, maakte het mogelijk om willekeurige code binnen de sandbox uit te voeren. De sandbox beperkt daarme... Read more

Source: www.security.nl

Top found tags: update(2),government(3),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft patcht 66 lekken in Windows, IE en OfficeLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Tijdens de patchdinsdag van juni heeft Microsoft zeven updates uitgebracht, die in totaal 66 lekken in Windows, Internet Explorer en Office verhelpen. 59 van de kwetsbaarheden bevinden zich in Internet Explorer en zorgen ervoor dat een aanvaller willekeurige code op de computer kan uitvoeren. In het... Read more

Source: www.security.nl

Top found tags: patch(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Geen update van 8.1, dan ook geen patchesLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Microsoft is er duidelijk over: gebruikers die hun Windows 8.1 niet hebben voorzien van de update, kunnen fluiten naar de maandelijkse patches. Meer over verplichte update Bel voor laatste ronde: upgrade nu Windows 8.1 Microsoft schuift update-verplichting weer op Microsoft bindt in met verplichting... Read more

Source: www.automatiseringgids.nl

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Opera gaat stilletjes wachtwoorden andere browser importerenLocation: Opera Software - Oslo, Norway
Date published: https://www.security.nl/posting/391341/Opera+gaat+stilletjes+wachtwoorden+andere+browser+importeren?channel

Om ervoor te zorgen dat nieuwe gebruikers van de Noorse browser Opera gemakkelijker de overstap kunnen maken, zijn de ontwikkelaars van plan om straks stilletjes wachtwoorden, bookmarks, cookies en de surfgeschiedenis van de huidige browser op de computer te importeren. Zodra Opera voor het eerst wo... Read more

Source: 11-06-2014|www.security.nl

Top found tags: Microsoft(1),NL(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overheid vraagt MKB om oplossing tegen dronesLocation: Office of the National Coordinator for Security and Counterterrorism - Den Haag, The Netherlands
Date published: 11-06-2014

De Nationaal Cordinator Terrorismebestrijding en Veiligheid (NCTV) is een programma gestart waarbij het Midden- en Kleinbedrijf wordt gevraagd om oplossingen te ontwikkelen die het mogelijk maken om drones over te nemen of de locatie van de bestuurder te achterhalen. Zowel de NCTV als de Koninklij... Read more

Source: www.security.nl

Top found tags: NL(1),research(1),The Netherlands(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Politie arresteert kledingdief dankzij gps-laarsLocation: Den Haag, The Netherlands
Date published: 11-06-2014

De politie heeft een 39-jarige Roemeen dankzij het gebruik van een heuse \'gps-laars\' op verdenking dan kledingdiefstal weten aan te houden. Een kledingsinzamelaar in Bernisse had de laars met een gps-module in een zak met kleding geplaatst, die vervolgens in een kledingcontainer werd gedeponeerd. ... Read more

Source: www.security.nl

Top found tags: NL(1),police(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
\'Hacker perst Feedly af met DDoS-aanval\'Location: Amsterdam, The Netherlands
Date published: 11-06-2014

De RSS-dienst Feedly is woensdagochtend moeilijk te bereiken vanwege een DDoS-aanval. Op zijn blog stelt Feedly dat de verantwoordelijke hacker geld wil ontvangen om zijn aanval te stoppen. "We hebben geweigerd op te geven en werken met onze netwerkproviders om de aanval zo goed als mogelijk af te w... Read more

Source: www.nutech.nl

Top found tags: ISP(1),NL(1),RSS(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overheid pakt look-a-likes DigiD aanLocation: Den Haag, The Netherlands
Date published: 11-06-2014

De overheid heeft twee sites die zich aan verdwaalde bezoekers als DigiD voordoen, opgedragen hun URL af te sluiten. Een derde look-a-like van Digid.nl is nog onverminderd actief. Een van de gewraakte sites is Digi-D.nl die sinds 2003 toebehorend aan een gelijknamige reclamebedrijf in Waalwijk. Hoew... Read more

Source: www.automatiseringgids.nl

Top found tags: NL(1),The Netherlands(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Mozilla heeft updates uitgebracht voor Firefox en ThunderbirdLocation: Mozilla - Mountain View, United States
Date published: 11-06-2014

Samenvatting: Mozilla heeft updates uitgebracht voor Firefox en Thunderbird die de kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken van de client applicatie en mogelijk willekeurige code uitvoeren met de rechten van de gebruiker. Beschrijving: Door diverese... Read more

Source: www.ncsc.nl

Top found tags: Firefox(1),NL(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in Google ChromeLocation: Google HQ - Mountain View, United States
Date published: 11-06-2014

Samenvatting: Google heeft een update uitgebracht voor Google Chrome die de kwetsbaarheden verhelpt. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken van de Google Chrome browser en mogelijk kan de kwaadwillende code uitvoeren met de rechten van de gebruiker. Beschrijving: Door dive... Read more

Source: www.ncsc.nl

Top found tags: Google(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in Adobe Flash PlayerLocation: Adobe HQ - San Jose, United States
Date published: 11-06-2014

Samenvatting: Adobe heeft meerdere kwetsbaarheden verholpen in Flash Player. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende willekeurige code uitvoeren en beveiligingsmaatregelen omzeilen. Beschrijving: - CVE-2014-0531, CVE-2014-0532, CVE-2014-0533 Kwetsbaarheden die door een... Read more

Source: www.ncsc.nl

Top found tags: OS X(2),telecom sector(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in GnuTLSLocation: Ubuntu - London, United Kingdom
Date published: 11-06-2014

Samenvatting: De makers van GnuTLS hebben updates uitgebracht om een kwetsbaarheid te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid op afstand misbruiken om willekeurige code uit te voeren en om een Denial-of-Service te veroorzaken. Beschrijving: Een kwetsbaarheid in de verificatie van... Read more

Source: www.ncsc.nl

Top found tags: SSL(1),Ubuntu(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco verhelpt kwetsbaarheid in Cisco Unified Communications ManagerLocation: Cisco HQ - San Jose, United States
Date published: 11-06-2014

Samenvatting: Cisco heeft een update uitgebracht voor Cisco Unified Communications Manager die de kwetsbaarheid verhelpt. Gevolgen: Een geauthenticeerde kwaadwillende kan mogelijk op afstand willekeurige bestanden downloaden en verwijderen. Beschrijving: Door een kwetsbaarheid in het Real-Time Monit... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid gevonden in Microsoft Internet Explorer 8Location: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Samenvatting: Het Zero Day Initiative heeft een tot nu toe onbekende kwetsbaarheid in Microsoft Internet Explorer 8 bekend gemaakt. Misbruik van de kwetsbaarheid kan leiden tot de uitvoer van willekeurige code met de rechten van de ingelogde gebruiker. Gevolgen: Een kwaadwillende kan de kwetsbaarhei... Read more

Source: www.ncsc.nl

Top found tags: website(1),Internet Explorer(2),The Netherlands(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-030: kwetsbaarheid in Microsoft RDP verholpenLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Samenvatting: Er bevindt zich een kwetsbaarheid in de RDP-implementatie in Windows 7, 8, 8.1 en Server 2012 die kan leiden tot het lekken en/of aanpassen van informatie in RDP-sessies. Microsoft heeft updates uitgebracht om de kwetsbaarheid te verhelpen. Gevolgen: Misbruik van de kwetsbaarheid stelt... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-033: Kwetsbaarheid verholpen in Microsoft XML Core ServicesLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Samenvatting: Microsoft heeft updates uitgebracht om een kwetsbaarheid te verhelpen in Microsoft XML Core Services. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om gevoelige informatie te bemachtigen. Beschrijving: Een probleem in de manier waarop Microsoft Windows omgaat met... Read more

Source: www.ncsc.nl

Top found tags: Microsoft(2),The Netherlands(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-036: Kwetsbaarheden verholpen in Microsoft Graphics ComponentLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Samenvatting: Microsoft heeft updates beschikbaar gesteld waarmee een tweetal kwetsbaarheden in de GDI+ component van Microsoft Windows, Microsoft Office en Microsoft Lync verholpen worden. Gevolgen: Een kwaadwillende kan de kwetsbaarheden misbruiken voor het uitvoeren van willekeurige code met rech... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-035: Grote hoeveelheid kwetsbaarheden in Internet Explorer verholpenLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Samenvatting: Microsoft heeft een groot aantal kwetsbaarheden in Internet Explorer verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om willekeurige code uit te voeren onder de rechten van een gebruiker, verhoogde rechten te verkrijgen, verkeer in TLS verbindingen te o... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-031: Microsoft verhelpt Denial of Service kwetsbaarheid in TCP/IP stackLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Samenvatting: Microsoft heeft een kwetsbaarheid verholpen in de TCP/IP stack die een aanvaller de mogelijkheid geeft een Denial of Service te veroorzaken. Gevolgen: Een lokale aanvaller kan door het misbruiken van deze kwetsbaarheid een crash veroorzaken op het kwetsbare systeem. Beschrijving: - CVE... Read more

Source: www.ncsc.nl

Top found tags: Microsoft(2),The Netherlands(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-034: Microsoft verhelpt kwetsbaarheid in Microsoft WordLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Samenvatting: Microsoft heeft een kwetsbaarheid verholpen in Microsoft Word die een aanvaller willekeurige code kan laten uitvoeren. Gevolgen: Een aanvaller heeft de mogelijkheid om willekeurige code uit te voeren op een computersysteem van een slachtoffer. Uitbuiting van de kwetsbaarheid kan plaats... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),The Netherlands(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-032: Microsoft Lync kwetsbaarheid verholpenLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Samenvatting: Microsoft heeft updates uitgebracht om een kwetsbaarheid in Microsoft Lync te verhelpen. Gevolgen: Een aanvaller kan mogelijk scripts uitvoeren in de gebruiker zijn webbrowser om informatie te achterhalen van openstaande sessies. Beschrijving: CVE-2014-1823 Door een gebruiker te laten ... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),The Netherlands(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mozilla heeft updates uitgebracht voor Firefox en ThunderbirdLocation: Ubuntu - London, United Kingdom
Date published: 11-06-2014

Samenvatting: Mozilla heeft updates uitgebracht voor Firefox en Thunderbird die de kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken van de client applicatie en mogelijk willekeurige code uitvoeren met de rechten van de gebruiker. Beschrijving: Door diverese... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Red Hat verhelpt kwetsbaarheden in qemu-kvmLocation: Amsterdam, The Netherlands
Date published: 11-06-2014

Samenvatting: Red Hat heeft updates uitgebracht voor QEMU die de kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken van het QEMU process of mogelijk willekeurige code uitvoeren met de rechten van het QEMU proces. Beschrijving: Door meerdere invoervalidatie, b... Read more

Source: www.ncsc.nl

Top found tags: DoS(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in Linux KernelLocation: Ubuntu - London, United Kingdom
Date published: 11-06-2014

Samenvatting: Er zijn updates uitgebracht die de kwetsbaarheden in de Linux Kernel verhelpen. Gevolgen: Een kwaadwillende met lokale toegang kan een Denial-of-Service veroorzaken of mogelijk code uitvoeren met beheerdersrechten. Ook is het mogelijk voor een kwaadwillende om de netwerkconfiguratie te... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in Adobe Flash PlayerLocation: Adobe HQ - San Jose, United States
Date published: 11-06-2014

Samenvatting: Adobe heeft meerdere kwetsbaarheden verholpen in Flash Player. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende willekeurige code uitvoeren en beveiligingsmaatregelen omzeilen. Beschrijving: - CVE-2014-0531, CVE-2014-0532, CVE-2014-0533 Kwetsbaarheden die door een... Read more

Source: www.ncsc.nl

Top found tags: OS X(2),telecom sector(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in de Linux KernelLocation: Ubuntu - London, United Kingdom
Date published: 11-06-2014

Samenvatting: Er is een update uitgebracht voor de Linux Kernel die de kwetsbaarheid verhelpt. Gevolgen: Een lokale kwaadwillende gebruiker kan mogelijk toegang krijgen tot gevoeldige informatie of een Denial-of-Service veroorzaken. Beschrijving: Door een kwetsbaarheid in de linux futex subsystem is... Read more

Source: www.ncsc.nl

Top found tags: update (1),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in IBM productenLocation: IBM HQ - Armonk, United States
Date published: 11-06-2014

Samenvatting: IBM heeft fixes uitgebracht om een aantal kwetsbaarheden in Tivoli Workload Scheduler en IBM DB2 te verhelpen. Gevolgen: Misbruik van de kwetsbaarheden kan leiden tot een Denial-of-Service aanval en toegang tot gevoelige gegevens. Beschrijving: - CVE-2013-6747 Als een certificaatketen ... Read more

Source: www.ncsc.nl

Top found tags: NL(1),SSL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish