Under construction

New design coming soon!

CIC News engine statistics

CIC News for 12-06-2014 contains 147 articles: cybercrime(51),cyber security(42),data breach(12),other(42)

CIC News update contains 122 English and 25 Dutch articles for today.
There are 6 published advisories, 0 are English and 6 are Dutch.
In today's English news articles:
- 43 related to cybercrime
- 37 related to cyber security
- 12 related to data breach and identity theft
- 30 for the category other news

In today's Dutch news articles:
- 8 related to cybercrime
- 5 related to cyber security
- 12 for the category other news

Have fun reading.

English cybercrime related news

One-click test released for PCs infected by GameOver Zeus botnetLocation: F-Secure - Helsinki, Finland
Date published: 10-06-2014

One-click test released for PCs infected by GameOver Zeus botnet. SecurityNews One-click test released for PCs infected by GameOver Zeus botnet Last week Microsoft boasted of aiding law enforcement in the take-down of the GameOver botnet, one of the leaders in the theft of banking information. Howev... Read more

Source: itproportal.com

Top found tags: Zeus(1),Microsoft(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anonymous threatens Adidas, Budweiser and Coca-Cola with major hacks, as part of wider World Cup protestsLocation: Brasilia-Federal District, Brazil
Date published: 09-06-2014

09 Jun 2014 by Aatif Sulleyman. theSulleymander , 09 Jun 2014News Anonymous threatens Adidas, Budweiser and Coca-Cola with major hacks, as part of wider World Cup protests Hacking collective Anonymous is reportedly planning on taking down a number of major World Cup 2014 sponsors in the coming weeks... Read more

Source: itproportal.com

Top found tags: report(1),threat(1),Anonymous(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AVG discovers yet another OpenSSL security flawLocation: AVG HQ - San Francisco, United States
Date published: 09-06-2014

09 Jun 2014 by Alan Buckingham, 09 Jun 2014News. AVG discovers yet another OpenSSL security flaw OpenSSL, which runs on the servers for many websites, has been having a rough time in recent weeks. We all learned of the near fatal flaw named Heartbleed, which affected quite a number companies and ser... Read more

Source: itproportal.com

Top found tags: Internet Explorer(2),OpenSSL(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
One-click test released for PCs infected by GameOver Zeus botnetLocation: F-Secure - Helsinki, Finland
Date published: 10-06-2014

One-click test released for PCs infected by GameOver Zeus botnet. SecurityNews One-click test released for PCs infected by GameOver Zeus botnet Last week Microsoft boasted of aiding law enforcement in the take-down of the GameOver botnet, one of the leaders in the theft of banking information. Howev... Read more

Source: itproportal.com

Top found tags: Zeus(1),Microsoft(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anonymous threatens Adidas, Budweiser and Coca-Cola with major hacks, as part of wider World Cup protestsLocation: Brasilia-Federal District, Brazil
Date published: 09-06-2014

theSulleymander. Anonymous threatens Adidas, Budweiser and Coca-Cola with major hacks, as part of wider World Cup protests Hacking collective Anonymous is reportedly planning on taking down a number of major World Cup 2014 sponsors in the coming weeks. According to a hacker who claims to have knowle... Read more

Source: itproportal.com

Top found tags: report(1),threat(1),Anonymous(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AVG discovers yet another OpenSSL security flawLocation: AVG HQ - San Francisco, United States
Date published: 09-06-2014

AVG discovers yet another OpenSSL security flaw. OpenSSL, which runs on the servers for many websites, has been having a rough time in recent weeks. We all learned of the near fatal flaw named Heartbleed, which affected quite a number companies and services on the web. Now a new, albeit less severe,... Read more

Source: itproportal.com

Top found tags: Internet Explorer(2),OpenSSL(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TweetDeck HackedPanic (And Rickrolling) EnsuesLocation: Twitter - San Francisco, United States
Date published: 11-06-2014

TweetDeck, the popular application for managing Twitter feeds that is operated by Twitter itself, announced that it was temporarily disabling its service after a number of accounts were affected today by hackers who exploited a vulnerability in the service. TweetDeck attributed the problem to a cros... Read more

Source: wired.com

Top found tags: update(2),website(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TweetDeck Taken Down in Wake of XSS AttacksLocation: Twitter - San Francisco, United States
Date published: 11-06-2014

TweetDeck services have been disabled for the time being as Twitter tries to get a handle on a cross-site scripting vulnerability that caused mountains of consternation on the social networking platform this morning. We\'ve temporarily taken TweetDeck services down to assess today\'s earlier securit... Read more

Source: threatpost.com

Top found tags: update(2),vulnerability(2),website(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Podcast: The New Pandemiya Banking TrojanLocation: RSA HQ - Bedford, United States
Date published: 11-06-2014

Security Conversations Podcast On this edition of the \'Security Conversation\'s podcast, Uri Fleyder of RSA Research Cybercrime Research Lab talks about the discovery of Pandemiya, a new banking Trojan allows cyber-criminals to steal form data, login credentials, and files from Google Chrome, Inter... Read more

Source: securityweek.com

Top found tags: telecom sector(2),trojan(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Feedly, Evernote Hit With DDoS AttacksLocation: Akamai - Boston, United States
Date published: 11-06-2014

RSS aggregator Feedly was hit with a distributed denial-of-service attack and an extortion demand today, both of which it is refusing to bend to. According to the Feedly blog, cybercriminals began attacking the service at 2:04 a.m. PST and offered to stop the attack in exchange for money. The compan... Read more

Source: securityweek.com

Top found tags: Akamai(2),DoS(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Feedly refuses to pay DDoS ransomLocation: San Francisco, California, United States
Date published: 11-06-2014

RSS news aggregator Feedly was offline overnight Tuesday and for most of Wednesday after a distributed denial of service attack (DDoS) which saw hackers demand a ransom for the service to be brought back online. Feedly refuses to pay DDoS ransom Feedly refuses to pay DDoS ransom Following shortly af... Read more

Source: www.scmagazineuk.com

Top found tags: DoS(2),social media(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Zeus variant \'Maple\' targets financial data of Canadian usersLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

A new Zeus variant called \Maple\ improves upon a number of malicious capabilities familiar to fraudsters wielding the trojan. According to Trusteer, an IBM company, criminals have targeted 14 leading financial institutions in Canada with the malware since January. The name \Maple\ is a ... Read more

Source: www.scmagazine.com

Top found tags: malware(2),trojan(2),financial sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attackers attempt DDoS extortion on FeedlyLocation: Hootsuite - Vancouver, Canada
Date published: 11-06-2014

Cyber criminals attempted to extort news aggregator service Feedly on Wednesday, asking for money in order for the attack to end a distributed denial-of-service (DDoS) attack that hit the service. Announced via a company blog post, the company shared that they did not comply with attackers, and that... Read more

Source: www.scmagazine.com

Top found tags: EN(1),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Small businesses running cloud-based POS software hit with unique \'POSCLOUD\' malwareLocation: Cloud, United States
Date published: 11-06-2014

Small businesses running cloud-based POS software hit with unique \'POSCLOUD\' malware Attackers developed \'POSCLOUD\' malware to compromise cloud-based POS systems used by small businesses. Unique malware targeting cloud-based point-of-sale (POS) software has been discovered by researchers with cy... Read more

Source: www.scmagazine.com

Top found tags: exploit kit(4),cybercrime(6),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Imperva Releases Hacker Intelligence Initiative Report: \"The Anatomy of Comment Spam\"Location: Redwood, United States
Date published: 09-06-2014

REDWOOD SHORES, Calif., June 09, 2014 - Imperva Inc. (NYSE: IMPV), pioneering the third pillar of enterprise security with a new layer of protection designed specifically for physical and virtual data centers, today released its June Hacker Intelligence Initiative report, \"The Anatomy of Comment Sp... Read more

Source: online.wsj.com

Top found tags: spam(1),threat(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
One-click test released for PCs infected by GameOver Zeus botnetLocation: F-Secure - Helsinki, Finland
Date published: 10-06-2014

Last week Microsoft boasted of aiding law enforcement in the take-down of the GameOver botnet, one of the leaders in the theft of banking information. However, Microsoft was not the only tech entity involved, and the death notice may have been a bit premature.One of the others involved was security ... Read more

Source: www.itproportal.com

Top found tags: Zeus(1),Microsoft(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
If You\'re Still Using Windows XP Your Company Is at RiskLocation: Microsoft HQ - Redmond, United States
Date published: 10-06-2014

In April 2014, Microsoft withdrew support for its popular 12-year old operating system, Windows XP. At that time, approximately 430-million personal computers were still running XP. According to Microsoft, \"PCs running Windows XP after April 8, 2014, should not be considered to be protected.\"Small... Read more

Source: www.huffingtonpost.ca

Top found tags: update(2),cybercrime(3),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminals exploit World Cup apps, footballers namesLocation: McAfee - Santa Clara, United States
Date published: 11-05-2014

International footballers names and World Cup related mobile apps are being exploited by cybercriminals in the lead up to the tournament due to start tomorrow, according to top internet security firms.In a report by McAfee, the security firm compiled a list of footballers names which when sear... Read more

Source: www.humanipo.com

Top found tags: website(1),cybercrime(7),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Grand jury to review global cybercrime ringLocation: New York City, New York, United States
Date published: 10-06-2014

GULFPORT, Miss. - (AP) -- A Mississippi federal grand jury will decide if a New York man will be prosecuted for his alleged role in an international cybercrime organization with South Mississippi connections.Olutoyin Ogunlade of Brooklyn, New York, is accused of bank fraud and laundering money obtai... Read more

Source: www.newsday.com

Top found tags: cybercrime(3),financial sector(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
4 IT Security Stories to Watch: AVG\'s CCS Injection, Cybercrime StudyLocation: Center for Strategic and International Studies - Washington, United States
Date published: 09-06-2014

A new OpenSSL vulnerability discovered by AVG Technologies (AVG), a Center for Strategic and International Studies (CSIS) report on cybercrime and research about the growth of the endpoint security market are some of the stories for managed service providers (MSPs) to watch this week.Protecting sens... Read more

Source: mspmentor.net

Top found tags: research(2),United States(2),cybercrime(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PwC and banks organisation call for collaboration on cyber crimeLocation: PricewaterhouseCoopers HQ - New York, United States
Date published: 10-06-2014

More than 70% of banking and capital market CEOs identify cyber insecurity as a threat to their growth prospects, a new report has foundThe report, published by PwC and the British Banking Association (BBA), states that 93% of large organisations suffered a security breach last year. Almost 700m w... Read more

Source: economia.icaew.com

Top found tags: United Kingdom(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian Cybercrime Gangs Target Scottish Homes and BusinessesLocation: Center for Strategic and International Studies - Washington, United States
Date published: 11-06-2014

The police and computer security firms Sophos and Kaspersky Labs confirmed that Russian gangs are targeting Scottish home and businesses in a series of cyber attacks.According to a BBC investigation, in a programme called Gangsters.com, Russian gangs are focusing their cyber attacks efforts on Scotl... Read more

Source: www.ibtimes.co.uk

Top found tags: antivirus(4),cybercrime(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
REPORT: CYBER CRIME IN KENYA DISCOURAGES PREPAID CARD USELocation: Nairobi, Kenya
Date published: 11-06-2014

Due to an increase in cyber crime in Kenya, prepaid card holders are becoming more hesitant on using their cards to make purchases. According to data from Central Bank, the number of prepaid card transactions slowed month-on-month from October 2013 to February 2014. Specifically, the number of month... Read more

Source: www.pymnts.com

Top found tags: Anonymous(2),financial sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Understand Memory Pressure ProtectionLocation: Microsoft HQ - Redmond, United States
Date published: 10-06-2014

Q: What is the Windows Memory Pressure Protection (MPP) feature, and how can it help with intermediate connection failure resolution?A: Memory Pressure Protection (MPP) is a Windows feature that was introduced in Windows Server 2003. This feature was designed to help protect against Distributed Deni... Read more

Source: windowsitpro.com

Top found tags: Windows(1),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Feedly and Evernote struck by denial of service cyber-attacksLocation: New York, United States
Date published: 11-06-2014

The news aggregator Feedly says it has come under a \"distributed denial of service\" attack from cyber criminals, which is preventing users from accessing its service.\"The attacker is trying to extort us money to make it stop,\" representatives of the company, which has 15 million users, said in a... Read more

Source: www.bbc.com

Top found tags: ISP(1),threat(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian cyber crime gangs target ScotlandLocation: Scotland, United Kingdom
Date published: 11-06-2014

A BBC investigation has discovered that businesses and individuals in Scotland have been targeted by organised crime gangs in Russia who have carried out a series of cyber-attacks.The gangs have hit companies and individuals across the country. Police are warning that many businesses may suffer irre... Read more

Source: www.bbc.com

Top found tags: Scotland(1),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HP cloud encryption gives IT pros data security controlLocation: Hewlett-Packard - Palo Alto, United States
Date published: 11-06-2014

LAS VEGAS Hoping to better secure corporate data from increasingly sophisticated hackers, HP\'s new capabilities allow IT pros to encrypt data at the point of its creation, whether it resides in the cloud or on-premises. HP Atalla Cloud Encryption protects a range of unstructured data, such as p... Read more

Source: searchcloudcomputing.techtarget.com

Top found tags: mobile device(2),telecom sector(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Feedly falls in DDoS fightLocation: Paris, France
Date published: 12-06-2014

"The attacker is trying to extort us money to make it stop," a post in the Feedly blog said. "We refused to give in and are working with our network providers to mitigate the attack as best as we can." During that time, the attack was successful in making Feedly\'s popular RSS reader services inacce... Read more

Source: www.zdnet.com

Top found tags: website(1),cybercrime(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security Flaw Takes Down Twitter\'s TweetDeckLocation: Twitter - San Francisco, United States
Date published: 11-06-2014

Some experts said the vulnerability could be exploited by hackers, and reports After a period of confusion and complaints about the fix not working, Twitter Independent security analyst n said the issue was "a potentially serious security flaw" and added, "It is easy to imagine how someone could tak... Read more

Source: securityweek.com

Top found tags: DoS(2),social media(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Clandestine Fox attack op uses social engineering to woo new victimsLocation: Scott, United States
Date published: 11-06-2014

Clandestine Fox attack op uses social engineering to woo new victims Clandestine Fox attack op uses social engineering to woo new victims An advanced persisted threat (APT) group, which previously spread malware by exploiting an Internet Explorer zero-day, has now modified its attack method. Back in... Read more

Source: www.scmagazine.com

Top found tags: cybercrime(3),social media(8),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Advanced cyber attacks rely on privileged credential exploitationLocation: New York, United States
Date published: 12-06-2014

While new and sophisticated malware variants were continually developed to exploit systems in 2013, criminals, hacktivists and advanced attacks continue to do the most damage by exploiting privileged accounts. CyberSheath s analysis of 10 of 2013 s most notable cyber attacks found that privileged ac... Read more

Source: net-security.org

Top found tags: cybercrime(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Feedly refuses to give in to blackmail demands, gets hit by DDoS attackLocation: Google HQ - Mountain View, United States
Date published: 11-06-2014

Tis the season for denial-of-service attacks it seems.Not only has Evernote been struck by a DoS attack overnight, but now RSS news aggregator Feedly reports that its cloud-based service is suffering from a distributed denial-of-service attack that could impact users ability to catch up with t... Read more

Source: grahamcluley.com

Top found tags: website(1),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Warning over cyber thefts as 15,000 stolen from teacherLocation: Scotland, United Kingdom
Date published: 11-06-2014

A HEADTEACHER has revealed how she lost thousands of pounds in the space of a few minutes at the hands of cyber criminals, as police warned that the gangs are becoming increasingly sophisticated.Jennie King told a documentary to be shown tonight that 15,000 was plundered from her bank account by c... Read more

Source: www.heraldscotland.com

Top found tags: financial sector(4),telecom sector(8),cybercrime(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Small businesses running cloud-based POS software hit with unique \'POSCLOUD\' malwareLocation: Cloud, United States
Date published: 11-06-2014

Unique malware targeting cloud-based point-of-sale (POS) software has been discovered by researchers with cyber intelligence company IntelCrawler.The malware is referred to as POSCLOUD.Backdoor/Agent, or simply POSCLOUD, and it targets cloud-based POS software typically used by smaller businesses ... Read more

Source: www.scmagazine.com

Top found tags: exploit kit(4),cybercrime(6),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
State AG Warns Against Malicious SoftwareLocation: Warns, Nijefurd, Friesland, The Netherlands
Date published: 11-06-2014

UNDATED (WHTC) -- Michigan attorney General Bill Schuette released a warning earlier this week, cautioning consumers against scam artists and criminals targeting personal electronic devices through malicious software. A-G spokeswoman Joy Yearout says you can find more information by visiting http://... Read more

Source: whtc.com

Top found tags: malware(2),United States(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware uses Windows security feature to block security softwareLocation: Microsoft HQ - Redmond, United States
Date published: 12-06-2014

restrict the privileges of security software, including Trend\'s. SRP is a feature that was introduced in Windows XP and Windows Server 2003 and is generally administered through Group Policy. It is designed to allow administrators to blacklist and whitelist specific executable programs, or to restr... Read more

Source: www.zdnet.com

Top found tags: cybercrime(2),Microsoft(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
World Cup websites struck down by DDoS attacksLocation: Brasilia-Federal District, Brazil
Date published: 12-06-2014

Various websites associated to the World Cup have been struck by a distributed denial of service (DDoS) attack ahead of the tournament\'s opening match on Thursday. The official government World Cup website has been down for more than a day, as well as the websites of some host states. Hacking colle... Read more

Source: www.zdnet.com

Top found tags: hacktivism(2),social media(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fake, malicious World Cup-themed apps targeting Android usersLocation: Trend Micro - Cupertino, United States
Date published: 12-06-2014

The 2014 FIFA World Cup in Brazil start today, and Trend Micro researchers have pointed out yet another thing that fans need to be careful about: fake and malicious versions of World Cup-themed apps. Other researchers have already warned about malvertising attacks on popular websites, fraudulent dom... Read more

Source: net-security.org

Top found tags: mobile device(2),telecom sector(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tool for creating booby-trapped PDFs made publicLocation: New York, United States
Date published: 12-06-2014

Freelance security researcher Claes Spett has made available a tool he dubbed "PDF Exploit Generator," which allows penetration testers - but also malicious attackers - to create a booby-trapped PDF in a matter of minutes. "The tool weaves existing exploits into PDFs, allowing attacks against Adobe ... Read more

Source: net-security.org

Top found tags: malware(1),research(1),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Svpeng Trojan Targets US Mobile UsersLocation: Kaspersky HQ - Moscow, Russia
Date published: 12-06-2014

Malware authors have developed a new version of the Svpeng Android Trojan, which they are currently using to target users in the United States. The existence of Trojan-SMS.AndroidOS.Svpeng.a was first brought to light in July 2013 when Kaspersky Lab published a report on its Russian language blog. A... Read more

Source: securityweek.com

Top found tags: cybercrime(5),telecom sector(10),financial sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Evernote, Feedly Hit by DDoS AttacksLocation: New York, United States
Date published: 12-06-2014

Both Feedly and Evernote were taken down yesterday by distributed denial of service (DDoS) attacks (h/t Threatpost). Feedly stated in a blog post at 2:04am on June 11, 2014, "Criminals are attacking feedly with a distributed denial of service attack (DDoS). The attacker is trying to extort us money ... Read more

Source: www.esecurityplanet.com

Top found tags: Anonymous(2),DoS(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HP Atalla Tackles Encryption in the Post-Snowden EraLocation: Hewlett-Packard - Palo Alto, United States
Date published: 12-06-2014

HP\'s Atalla security business has been building solutions for financial services clients since 1973. A lot has changed in the security landscape over the last 40 years, and some of the biggest changes have occurred just in the last year, with the disclosures from NSA whistleblower Edward Snowden an... Read more

Source: www.esecurityplanet.com

Top found tags: cybercrime(2),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Watch Out For Fake Versions of World Cup 2014 AppsLocation: Brasilia-Federal District, Brazil
Date published: 12-06-2014

The 2014 FIFA World Cup in Brazil is all but underway, and the fervor of such a prestigious and newsworthy event is already setting competing nations\ populations on fire. Unfortunately, cybercriminals are getting into the mood too. Besides recently flooding the internet with phishing scams and t... Read more

Source: trendmicro.com

Top found tags: trojan(2),telecom sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

How to keep on top of BYOD security: 5 major pointers from DellLocation: Dell HQ - Round Rock, United States
Date published: 11-06-2014

How to keep on top of BYOD security: 5 major pointers from Dell. The rise in use of mobile and BYOD technology is great when it comes to giving employees any time, anywhere access to data. But it presents new challenges for IT departments in terms of keeping data safe and secure across enterprise ne... Read more

Source: itproportal.com

Top found tags: mobile device(2),telecom sector(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stephen Fry gets first .uk domain, London startup beats Twitter, businesses ignore security and how to hack a cash machineLocation: Londen, United Kingdom
Date published: 10-06-2014

theSulleymander. Stephen Fry gets first .uk domain, London startup beats Twitter, businesses ignore security and how to hack a cash machine .uk domain names are available for the first time ever, after Nominet announced the launch with the world\'s largest welcome sign unveiled at London\'s Heathrow... Read more

Source: itproportal.com

Top found tags: social media(2),telecom sector(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Teenagers expose ATM weakness in easy hackLocation: Montral, Canada
Date published: 10-06-2014

Teenagers expose ATM weakness in easy hack. Two 14-year-old boys "hacked" into their local bank\'s cash machine by simply reading the device\'s manual. With a touch more innocence than Anonymous\'s World Cup hacking threats, Caleb Turon and Matthew Hewlett from Winnipeg, Canada, twigged that the ATM... Read more

Source: itproportal.com

Top found tags: Anonymous(2),cyber security(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to keep on top of BYOD security: 5 major pointers from DellLocation: Dell HQ - Round Rock, United States
Date published: 11-06-2014

How to keep on top of BYOD security: 5 major pointers from Dell. The rise in use of mobile and BYOD technology is great when it comes to giving employees any time, anywhere access to data. But it presents new challenges for IT departments in terms of keeping data safe and secure across enterprise ne... Read more

Source: itproportal.com

Top found tags: mobile device(2),telecom sector(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stephen Fry gets first .uk domain, London startup beats Twitter, businesses ignore security and how to hack a cash machineLocation: Londen, United Kingdom
Date published: 10-06-2014

theSulleymander. Stephen Fry gets first .uk domain, London startup beats Twitter, businesses ignore security and how to hack a cash machine .uk domain names are available for the first time ever, after Nominet announced the launch with the world\'s largest welcome sign unveiled at London\'s Heathrow... Read more

Source: itproportal.com

Top found tags: social media(2),telecom sector(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Teenagers expose ATM weakness in easy hackLocation: Montral, Canada
Date published: 10-06-2014

Teenagers expose ATM weakness in easy hack. Two 14-year-old boys "hacked" into their local bank\'s cash machine by simply reading the device\'s manual. With a touch more innocence than Anonymous\'s World Cup hacking threats, Caleb Turon and Matthew Hewlett from Winnipeg, Canada, twigged that the ATM... Read more

Source: itproportal.com

Top found tags: Anonymous(2),cyber security(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Evernote hit by DDoS attackLocation: New York, United States
Date published: 11-06-2014

US-based online note-taking and storage firm Evernote has restored services after being hit by a distributed denial of service (DDoS) attack. "We\'re actively working to neutralise a denial of service attack," Evernote tweeted. "You may experience problems accessing your Evernote while we resolve th... Read more

Source: www.computerweekly.com

Top found tags: DoS(2),United Kingdom(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. Appeals Court rules warrantless phone location tracking is illegalLocation: Amen, Aa en Hunze, Drenthe, The Netherlands
Date published: 11-06-2014

A U.S. court has ruled that police and other law enforcement agencies must obtain a search warrant before acquiring location data stored in cellphones and smartphones. NSA collects 5 billion cell location records a day, Snowden leaks say NSA collects 5 billion cell location records a day, Snowden le... Read more

Source: www.zdnet.com

Top found tags: United States(2),government(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SoSecure packs SSD with solid security on the goLocation: New York, United States
Date published: 11-06-2014

SoSecure has developed an 64GB SSD drive that promises to bring a host of mobile security features that automatically encrypt all data and allow access to it from a smartphone. ZDNet\'s Robin Harris sees this as breakthrough technology that will make larger companies angry that they didn\'t come up ... Read more

Source: www.zdnet.com

Top found tags: smartphone(1),cyber security(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target taps former GM exec to lead information securityLocation: Target HQ - Minneapolis, United States
Date published: Target hackers hit air-conditioning firm first as a way in

announced Tuesday the appointment of a new chief information security officer. maiorino2Brad Maiorino Former GM and GE executive Brad Maiorino was named senior vice president, chief information security officer. He\'ll be responsible for leading Target\'s global information security and IT risk orga... Read more

Source: Target\'s data breach: It gets worse The discount retailer was hit with a massive data breach last year that resulted in lost profits and a tarnished reputation. Target\'s chief executive and chairman Gregg Steinhafel stepped down last month after the company\'s board of directors decided it was "the right time for new leadership." He was replaced with chief financial officer John Mulligan as interim chief executive and president. Target claims that in the months following the 2013 data breach, the company took steps to beef up its information security systems and processes, such as enhancing monitoring, segmentation, logging, and security of accounts and installation of application whitelisting on POS systems. Maiorino will report to Target CIO Bob DeRodes, who credited the new hire as being one of the nation\'s top leaders in information security and risk. "I am looking forward to joining the Target team and helping them continue the progress they have made to be a retail leader in information security and protection," said Maiorino, in prepared remarks. "I am confident that the combination of a strong team and the leadership commitment will enable us to achieve that objective." |http://www.zdnet.com/target-taps-former-gm-exec-to-lead-information-security-7000030386/#ftag|10-06-2014|www.zdnet.com

Top found tags: EN(1),cyber security(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gmail Bug Could Have Exposed Every User\s AddressLocation: Google HQ - Mountain View, United States
Date published: 11-06-2014

Until recently, anyone may have been able to assemble a list of every Gmail account in the world. All it would have taken, according to one security researcher\s analysis, was some clever tweaking of a web page\s characters and a lot of patience. Oren Hafif says that he found and helped fix a ... Read more

Source: wired.com

Top found tags: cyber security(2),website(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Token Abuse Exposes Gmail AddressesLocation: Google HQ - Mountain View, United States
Date published: 11-06-2014

Google has patched a vulnerability that exposes an indefinite number of Gmail addresses, a potential gold mine for phishing and advanced attacks. Researcher Oren Hafif of Israel disclosed details on how he was able to abuse a token exposed in a URL in order to reveal every Gmail address. His work ea... Read more

Source: threatpost.com

Top found tags: social media(2),cybercrime(3),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft battles US search warrant requesting customer emails stored abroadLocation: Microsoft HQ - Redmond, United States
Date published: 11-06-2014

Microsoft is battling a search warrant that could have a great impact on the future of US tech companies in the global market. Late last year, a federal magistrate judge in New York has granted prosecutors a search warrant in a drug case that would force Microsoft to hand over to the feds a customer... Read more

Source: net-security.org

Top found tags: cyber security(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tweetdeck users warned on XSS vulnerabilityLocation: Twitter - San Francisco, United States
Date published: 11-06-2014

A new XSS vulnerability in Tweetdeck, the popular social media management platform for Twitter, could allow hackers to execute JavaScript code and even steal user credentials. Tweetdeck users warned on XSS vulnerability Tweetdeck users warned on XSS vulnerability News broke, somewhat ironically, on ... Read more

Source: www.scmagazineuk.com

Top found tags: vulnerability(2),website(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Three Common Principles to Apply for International Critical Infrastructure CybersecurityLocation: New York, United States
Date published: 11-06-2014

Earlier this year, the U.S. National Institute of Standards and Technology (NIST) released its Framework for Improving Critical Infrastructure Cybersecurity in response to an Executive Order issued by President Obama in February 2013. You can read my blog on the release here.The U.S. is not alone in... Read more

Source: blogs.ca.com

Top found tags: cyber security(4),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New cybercrime tests for banksLocation: Londen, United Kingdom
Date published: 10-06-2014

The Bank of England has stepped up its efforts to protect the UK\'s financial institutions from cybercrime with a new testing framework to spot vulnerabilities.The Bank says hacking represents a growing risk for the financial sector.The new tests will combine government intelligence about existing c... Read more

Source: www.bbc.com

Top found tags: cybercrime(3),cyber security(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How much does cybercrime really cost?Location: Center for Strategic and International Studies - Washington, United States
Date published: 10-06-2014

$400 billion a year and counting.The losses associated with attacks on corporate networks and intellectual property theft cost businesses an estimated $400 billion annually, according to a new report, which warns that the global economic impact will continue to increase.Cybercrime also could cost as... Read more

Source: www.crn.com.au

Top found tags: information security(2),social engineering(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Appeals Court rules warrantless phone location tracking is illegalLocation: Amen, Aa en Hunze, Drenthe, The Netherlands
Date published: 11-06-2014

A US court has ruled that police and other law enforcement agencies must obtain a search warrant before acquiring location data stored in cellphones and smartphones. NSA collects 5 billion cell location records a day, Snowden leaks say NSA collects 5 billion cell location records a day, Snowden leak... Read more

Source: www.zdnet.com

Top found tags: Supreme Court(2),government(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target taps former GM exec to lead information securityLocation: Target HQ - Minneapolis, United States
Date published: Target hackers hit air-conditioning firm first as a way in

announced Tuesday the appointment of a new chief information security officer. maiorino2Brad Maiorino Former GM and GE executive Brad Maiorino was named senior vice president, chief information security officer. He\'ll be responsible for leading Target\'s global information security and IT risk orga... Read more

Source: Target\'s data breach: It gets worse The discount retailer was hit with a massive data breach last year that resulted in lost profits and a tarnished reputation. Target\'s chief executive and chairman Gregg Steinhafel stepped down last month after the company\'s board of directors decided it was "the right time for new leadership." He was replaced with chief financial officer John Mulligan as interim chief executive and president. Target claims that in the months following the 2013 data breach, the company took steps to beef up its information security systems and processes, such as enhancing monitoring, segmentation, logging, and security of accounts and installation of application whitelisting on POS systems. Maiorino will report to Target CIO Bob DeRodes, who credited the new hire as being one of the nation\'s top leaders in information security and risk. "I am looking forward to joining the Target team and helping them continue the progress they have made to be a retail leader in information security and protection," said Maiorino, in prepared remarks. "I am confident that the combination of a strong team and the leadership commitment will enable us to achieve that objective." |http://www.zdnet.com/target-taps-former-gm-exec-to-lead-information-security-7000030386/#ftag|10-06-2014|www.zdnet.com

Top found tags: EN(1),cyber security(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cops Can Collect Your Cell Tower Data Without a Warrant, Court RulesLocation: Davis, United States
Date published: 12-06-2014

A federal appeals court has ruled that the warrantless collection of cellphone tower data, which can be used to track the location of a suspect, is unconstitutional without a probable-cause warrant from a court. A three-judge panel of the 11th Circuit Court in Florida ruled that the government\s ... Read more

Source: wired.com

Top found tags: telecom sector(4),United States(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target taps former GM exec to lead information securityLocation: Target HQ - Minneapolis, United States
Date published: Target hackers hit air-conditioning firm first as a way in

announced Tuesday the appointment of a new chief information security officer. maiorino2Brad Maiorino Former GM and GE executive Brad Maiorino was named senior vice president, chief information security officer. He\'ll be responsible for leading Target\'s global information security and IT risk orga... Read more

Source: Target\'s data breach: It gets worse The discount retailer was hit with a massive data breach last year that resulted in lost profits and a tarnished reputation. Target\'s chief executive and chairman Gregg Steinhafel stepped down last month after the company\'s board of directors decided it was "the right time for new leadership." He was replaced with chief financial officer John Mulligan as interim chief executive and president. Target claims that in the months following the 2013 data breach, the company took steps to beef up its information security systems and processes, such as enhancing monitoring, segmentation, logging, and security of accounts and installation of application whitelisting on POS systems. Maiorino will report to Target CIO Bob DeRodes, who credited the new hire as being one of the nation\'s top leaders in information security and risk. "I am looking forward to joining the Target team and helping them continue the progress they have made to be a retail leader in information security and protection," said Maiorino, in prepared remarks. "I am confident that the combination of a strong team and the leadership commitment will enable us to achieve that objective." |http://www.zdnet.com/target-taps-former-gm-exec-to-lead-information-security-7000030386/#ftag|10-06-2014|www.zdnet.com

Top found tags: EN(1),cyber security(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Top 10 most trustworthy online retailersLocation: Twitter - San Francisco, United States
Date published: 12-06-2014

The Online Trust Alliance (OTA) announced today the results of its 2014 Online Trust Audit. Out of nearly 800 top consumer websites evaluated, 30.2 percent made the Honor Roll, distinguishing themselves by safeguarding data via best practices in three categories: domain/brand protection, privacy and... Read more

Source: net-security.org

Top found tags: information security(2),social media(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GFI Cloud gets remote control and screen sharingLocation: Cloud, United States
Date published: 12-06-2014

GFI Software announced the addition of remote control and remote access capabilities as part of a major update to GFI Cloud, the company s IT platform for SMBs. GFI Cloud enables IT administrators to easily manage and secure servers, workstations, laptops and mobile devices from a single, intuitive,... Read more

Source: net-security.org

Top found tags: patch(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russians nab two hackers in iPhone ransomware caperLocation: Apple HQ - Cupertino, United States
Date published: 11-06-2014

A teenager and a young adult in Moscow have confessed to orchestrating a ransomware attack that used the \Find My iPhone\ feature to compromise iPhone and iPad devices in Australia and other countries. According to a report in the South China Morning Post, Russian authorities said police raide... Read more

Source: www.scmagazineuk.com

Top found tags: Apple(3),mobile device(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Notorious hacker Guccifer sentenced in RomaniaLocation: Bucharest, Romania
Date published: 11-06-2014

Notorious hacker Guccifer sentenced in Romania Guccifer\'s roster of victims include relatives and friends of former US President George H W Bush. A hacker, notorious for accessing the personal email accounts of celebrities and high-profile figures, including former US President George HW Bush\'s fa... Read more

Source: www.scmagazineuk.com

Top found tags: report(1),Romania(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime in the Middle East: A Peep Into FutureLocation: Center for Strategic and International Studies - Washington, United States
Date published: 12-06-2014

Cybercrime appears to be the second most common form of economic crime in the Middle East; Read on to find out how the cyber-security services and laws help you brace against cybercrimes.A study by Ciscos Middle East ICT Security Study 2014 noted strong adoption of smart devices in the MENA regio... Read more

Source: www.arabiangazette.com

Top found tags: information security(2),telecom sector(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gameover Zeus and CryptoLocker malware infect 2,000 users in Singapore: SingCertLocation: Singapore
Date published: 11-06-2014

SINGAPORE - SOME 2,000 Microsoft Windows computer users here were found to have been infected by the latest malware Gameover Zeus and CryptoLocker, believed to have emptied millions from bank accounts worldwide.An spokesman from the Infocomm Development Authority told the Straits Times that no gover... Read more

Source: news.asiaone.com

Top found tags: Microsoft(2),security measures(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICT Ministry draws strategies to curb cyber crimeLocation: Nairobi, Kenya
Date published: 12-06-2014

Nairobi - The Ministry of Information and Communications Technology (ICT) has pledged to address cybercrime through the launching of various policies and strategies that will enable the government to address the inherent gaps in information security.Speaking at the launch of the Kenya Cyber Security... Read more

Source: www.news24.co.ke

Top found tags: government(3),telecom sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Majority expects privacy to erode in years aheadLocation: New York, United States
Date published: 12-06-2014

EMC\'s Privacy Index ranked countries by privacy and examined how much consumers are willing to give up for convenience. The report covered 15 countries and 15,000 consumers. emc privacy survey The data is interesting given the Edward Snowden leaks and revelations about government snooping into soci... Read more

Source: www.zdnet.com

Top found tags: social media(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target taps former GM exec to lead information securityLocation: Target HQ - Minneapolis, United States
Date published: Target hackers hit air-conditioning firm first as a way in

announced Tuesday the appointment of a new chief information security officer. maiorino2Brad Maiorino Former GM and GE executive Brad Maiorino was named senior vice president, chief information security officer. He\'ll be responsible for leading Target\'s global information security and IT risk orga... Read more

Source: Target\'s data breach: It gets worse The discount retailer was hit with a massive data breach last year that resulted in lost profits and a tarnished reputation. Target\'s chief executive and chairman Gregg Steinhafel stepped down last month after the company\'s board of directors decided it was "the right time for new leadership." He was replaced with chief financial officer John Mulligan as interim chief executive and president. Target claims that in the months following the 2013 data breach, the company took steps to beef up its information security systems and processes, such as enhancing monitoring, segmentation, logging, and security of accounts and installation of application whitelisting on POS systems. Maiorino will report to Target CIO Bob DeRodes, who credited the new hire as being one of the nation\'s top leaders in information security and risk. "I am looking forward to joining the Target team and helping them continue the progress they have made to be a retail leader in information security and protection," said Maiorino, in prepared remarks. "I am confident that the combination of a strong team and the leadership commitment will enable us to achieve that objective." |http://www.zdnet.com/target-taps-former-gm-exec-to-lead-information-security-7000030386/#ftag|10-06-2014|www.zdnet.com

Top found tags: EN(1),cyber security(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Authentication innovation, identity and credential managementLocation: Rich, United States
Date published: 12-06-2014

In this interview, Richard Parris, CEO of Intercede, talks about how the digital world has shaped our identity, the main catalyst behind authentication innovation as well as key issues you have to deal with when implementing identity and credential management. How has identity evolved in the digital... Read more

Source: net-security.org

Top found tags: threat(1),cyber security(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SourceClear Launches With Mission to \'Redefine Security\' for DevelopersLocation: Microsoft HQ - Redmond, United States
Date published: 12-06-2014

SourceClear Raises $1.5M in Seed Funding from Investors, Including Frank Marshall and Box.com Chief Trust Officer SourceClear, a Seattle, Washington-based startup that is creating a software security platform for developers, announced on Tuesday that it has closed $1.5 million in seed funding that t... Read more

Source: securityweek.com

Top found tags: government(2),information security(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SafeNet Names New CEOLocation: New York, United States
Date published: 12-06-2014

SafeNet Appoints Prakash Panjwani President and Chief Executive Officer Data protection firm SafeNet announced on Wednesday that it has named Prakash Panjwani as the company\s new President and Chief Executive Officer. Panjwani replaces President and CEO, Dave Hansen, who the company said is depa... Read more

Source: securityweek.com

Top found tags: EN(1),cyber security(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco Fixes XSS Vulnerability in AsyncOS Management InterfaceLocation: Cisco HQ - San Jose, United States
Date published: 12-06-2014

Cisco has addressed a cross-site scripting (XSS) vulnerability affecting the Web management interface of Cisco AsyncOS, the operating system used for some of the company\s security appliances. The flaw, CVE-2014-3289, was reported by William Costa on February 17 and it impacts Cisco Email Securit... Read more

Source: securityweek.com

Top found tags: social media(2),update(2),vulnerability(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
10 steps to mitigate a DDoS attack in real-timeLocation: Cape Town, West-Kaap, South Africa
Date published: 12-06-2014

Get your contingency plan in place before you suffer a DDoS attack, says Gary Newe, suggesting that you prioritise revenue generators and work through the plan calmly and systematically. 10 steps to mitigate a DDoS attack in real-time 10 steps to mitigate a DDoS attack in real-time The threat posed ... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(2),financial sector(2),South Africa(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Windows app privileges subvertedLocation: Microsoft HQ - Redmond, United States
Date published: 12-06-2014

Researchers have spotted new attack vectors being used to exfiltrate company online banking credentials. Windows app privileges subverted Windows app privileges subverted A senior threat researcher with Trend Micro\'s Philippines R&D centre has been dissecting the methodology of the VAWTRAK malware ... Read more

Source: www.scmagazineuk.com

Top found tags: financial sector(4),cybercrime(5),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Old tricks appear in new malwareLocation: Kaspersky HQ - Moscow, Russia
Date published: 12-06-2014

Complex malware behind some of the most advanced global cyber-espionage operations relies on technology right out of the history books, according to an investigation by Context Information Security. Researchers at Context Information Security have uncovered classic virus techniques at the heart of a... Read more

Source: www.information-age.com

Top found tags: telecom sector(2),The Mask(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Why multi-layered protection might be the only security you can trustLocation: Morrison, United States
Date published: 09-06-2014

09 Jun 2014 by Jason Hart, 09 Jun 2014Features. Why multi-layered protection might be the only security you can trust Organisations from small and medium enterprises (SMEs) to large enterprises are grappling with unprecedented levels of cyber-attack, all seemingly targeting organisations\' m... Read more

Source: itproportal.com

Top found tags: data breach(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why multi-layered protection might be the only security you can trustLocation: Morrison, United States
Date published: 09-06-2014

Why multi-layered protection might be the only security you can trust. Organisations from small and medium enterprises (SMEs) to large enterprises are grappling with unprecedented levels of cyber-attack, all seemingly targeting organisations\' most valued asset - their corporate data. Last y... Read more

Source: itproportal.com

Top found tags: data breach(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Matherly, Ogner and Morello Named to CRN 2014 Women of the ChannelLocation: McAfee - Santa Clara, United States
Date published: 11-06-2014

The future of security is changing, but we have the momentum and are ready to help you capitalize on the opportunities these changes present. As part of our ongoing commitment to you, we are continuing to invest in marketing, technical enablement, and profitability programs to help you stay ahead of... Read more

Source: blogs.mcafee.com

Top found tags: identity theft(2),social media(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
P.F. Chang\'s customer card data possibly exposedLocation: New York, United States
Date published: 11-06-2014

Global restaurant brand P.F. Chang\'s China Bistro is investigating a possible data breach that could have exposed thousands of diners\' credit and debit card data. A new listing on rescator.so, an underground site known for selling card numbers, is advertising the availability of thousands of newly... Read more

Source: www.scmagazine.com

Top found tags: China(2),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Paytime data breach could affect 233,000 across U.S., company saysLocation: Pennsylvania, United States
Date published: 10-06-2014

The data breach at Paytime has potentially affected 233,000 people in almost every state in the U.S., the company announced today.That\'s a small increase over Paytime\'s previous estimate, in information filed with the North Carolina attorney general\'s office, that 216,000 people nationwide were a... Read more

Source: www.pennlive.com

Top found tags: cyber security(2),data breach(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police seek man wanted for identity theft, use of stolen credit cardLocation: Union, United States
Date published: 10-06-2014

Bakersfield police are seeking a man on suspicion of using a stolen credit card to take money from the victim\'s bank account.The man allegedly used the card three times at the Kern Schools Federal Credit Union branches at 2424 Chester Ave. and 3901 Mt. Vernon Ave., according to a BPD news release. ... Read more

Source: www.bakersfieldcalifornian.com

Top found tags: credit card(2),identity theft(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Another Big Data Breach? PF Changs May Be HitLocation: New York, United States
Date published: 11-06-2014

Morning Money MemoIf you ate a meal recently at P.F. Changs and paid for it with a credit or debit card, your personal data might be compromised. The nationwide chain says its not able to confirm a breach, but has been in communication with law enforcement authorities. According to internet... Read more

Source: abcnews.go.com

Top found tags: malware(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Survey respondents praise, but neglect, continuous monitoringLocation: Target HQ - Minneapolis, United States
Date published: 11-06-2014

Survey respondents praise, but neglect, continuous monitoring Most respondents believe retail breaches are likely the work of crime syndicates. Most IT security professionals surveyed in a recent study agree that the best way to fend off the kind of data breaches that struck Target and Michaels is t... Read more

Source: www.scmagazine.com

Top found tags: data breach(2),Ponemon Institute(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firms will be fined over lax cyber securityLocation: Cape Town, West-Kaap, South Africa
Date published: 12-06-2014

COMPANIES will face potential multimillion-rand fines, civil claims and reputational damage unless they upgrade information technology (IT) security systems ahead of the implementation of new privacy laws.Experts warn that South Africas firms are likely to be fined as they are a long way from bei... Read more

Source: www.bdlive.co.za

Top found tags: South Africa(2),cybercrime(3),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Phoenix police seek female suspect in identity theft, forgery caseLocation: Phoenix, Arizona, United States
Date published: 11-06-2014

PHOENIX -- Phoenix police are asking for the public\'s help to identify a suspect in an identity theft and forgery case.Phoenix police spokesman Officer James Holmes said a vehicle was burglarized while it was parked at Mountainside Fitness in north Peoria on May 31. The victim\'s purse containing h... Read more

Source: www.azfamily.com

Top found tags: identity theft(2),financial sector(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
233K affected by Paytime data breachLocation: Pennsylvania, United States
Date published: 12-06-2014

MECHANICSBURG, Pa. (WHTM) -Paytime, Inc. says 233,000 people across the country could be affected by a data breach in which personal information may have been compromised.The Upper Allen Township payroll company said a majority of those impacted are Pennsylvanians. However, there are others in nearl... Read more

Source: www.abc27.com

Top found tags: report(1),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CSIS, McAfee Employ Economic Modeling to Measure Cost of CybercrimeLocation: Center for Strategic and International Studies - Washington, United States
Date published: 12-06-2014

Earlier this week, I had the privilege of sitting on a panel at the Center for Strategic and International Studies (CSIS) for the global unveiling of a new McAfee-sponsored report titled \Net Losses: Estimating the Global Cost of Cybercrime.\ This report, which builds on the methodology and ... Read more

Source: blogs.mcafee.com

Top found tags: cyber security(4),cybercrime(5),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

UK businesses aren taking mobile device security seriously enoughLocation: Samsung HQ - Seoul, South Korea
Date published: 10-06-2014

UK businesses aren taking mobile device security seriously enough. Given the rising numbers of remote workers, and the BYOD trend, businesses in the UK aren\'t taking the security of mobile devices as seriously as they should, or at least that\'s the headline from the latest piece of research c... Read more

Source: itproportal.com

Top found tags: mobile device(2),United Kingdom(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Local government digital platform discussions beginLocation: Rich, United States
Date published: 10-06-2014

Local government digital platform discussions begin. Experts are set to meet to discuss the possibility of a single digital platform for local government, similar to the GOV.UK website used by Whitehall. The idea was originally suggested by Richard Copley, head of ICT at Rotherham Council but la... Read more

Source: itproportal.com

Top found tags: ISP(1),website(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Local government is overly cautious when it comes to the CloudStoreLocation: Cloud, United States
Date published: 09-06-2014

09 Jun 2014 by Darren Allan, 09 Jun 2014. Local government is overly cautious when it comes to the CloudStore Local government has been very cautious when it comes to adopting services via G-Cloud since the framework was first launched, according to a new piece of research highlighted by Outsourcery... Read more

Source: itproportal.com

Top found tags: framework(1),research(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK businesses aren taking mobile device security seriously enoughLocation: Samsung HQ - Seoul, South Korea
Date published: 10-06-2014

UK businesses aren taking mobile device security seriously enough. Given the rising numbers of remote workers, and the BYOD trend, businesses in the UK aren\'t taking the security of mobile devices as seriously as they should, or at least that\'s the headline from the latest piece of research c... Read more

Source: itproportal.com

Top found tags: mobile device(2),United Kingdom(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Local government digital platform discussions beginLocation: Rich, United States
Date published: 10-06-2014

Local government digital platform discussions begin. Experts are set to meet to discuss the possibility of a single digital platform for local government, similar to the GOV.UK website used by Whitehall. The idea was originally suggested by Richard Copley, head of ICT at Rotherham Council but la... Read more

Source: itproportal.com

Top found tags: ISP(1),website(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Local government is overly cautious when it comes to the CloudStoreLocation: Cloud, United States
Date published: 09-06-2014

Local government is overly cautious when it comes to the CloudStore. Local government has been very cautious when it comes to adopting services via G-Cloud since the framework was first launched, according to a new piece of research highlighted by Outsourcery. The Cabinet Office has revealed that wh... Read more

Source: itproportal.com

Top found tags: framework(1),research(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple needs to get a grip on lockscreen bypass bugsLocation: Apple HQ - Cupertino, United States
Date published: 11-06-2014

With iOS 8 on the horizon Apple is hoping to get us to trust some of our most personal and private data data about our health to the iOS operating system, and yet the programmers at Cupertino can\'t seem to squash lockscreen related bugs that have been plaguing the platform for years. Hands ... Read more

Source: www.zdnet.com

Top found tags: EN(1),threat(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TweetDeck XSS worm goes viralLocation: Twitter - San Francisco, United States
Date published: 11-06-2014

message similar to the one nearby. XSS.Tweetdeck "XSS" stands for cross-site scripting. Someone figured out how to write a tweet which, when read in the TweetDeck client, retweeted itself as code. The result is a worm, the likes of which have become relatively scarce in recent years. I appear to hav... Read more

Source: www.zdnet.com

Top found tags: Windows(1),XSS(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
P.F. Chang\'s Investigates Possible Breach of Customer Credit CardsLocation: North Carolina, United States
Date published: 11-06-2014

P.F. Chang\'s China Bistro is investigating reports of a breach after data from thousands of credit and debit cards were discovered being offered online on a notorious underground forum. The presence of the cards on rescator[dot]so was first reported by security blogger Brian Krebs. It is the same s... Read more

Source: securityweek.com

Top found tags: update(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Yahoo Toolbar triggers XSS in Google, other popular services, researcher findsLocation: Yahoo HQ - Sunnyvale, United States
Date published: 11-06-2014

An independent researcher, who last month discovered a cross-site scripting (XSS) flaw impacting the comments sections of most Yahoo websites, recently uncovered a similar vulnerability this time made possible because of Yahoo Toolbar. The issue was fixed on May 30, but previously, using Yahoo T... Read more

Source: www.scmagazine.com

Top found tags: social media(2),vulnerability(2),website(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
College of the Desert breach impacts 1,900 current and former staffersLocation: New York, United States
Date published: 11-06-2014

About 1,900 current and former employees with California-based College of the Desert had personal information including Social Security numbers exposed in a spreadsheet that a worker attached to an email, without authorization, and sent to about 78 staffers. How many victims? About 1,900, ac... Read more

Source: www.scmagazine.com

Top found tags: e-mail(1),EN(1),report(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New cyber risk guide aimed at corporate directorsLocation: Clinton, United States
Date published: 11-06-2014

After 90 percent of the corporate directors participating in a National Association of Corporate Directors\' (NACD\'s) survey said they wanted to improve their understanding of cyber security, the NACD in conjunction with the Internet Security Alliance (ISA) and American International Group (AIG) ha... Read more

Source: www.scmagazine.com

Top found tags: EN(1),framework(1),survey(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Skimming devices found at multiple Osceola County gas stationsLocation: Osceola, United States
Date published: 10-06-2014

OSCEOLA COUNTY, Fla. Deputies are working to find out how many people\'s personal information may have been stolen by skimming devices that were found at several gas stations in Osceola County.The skimming devices were found inside gas pumps at a 7-Eleven in Kissimmee, and a Shell and Circle K i... Read more

Source: www.wftv.com

Top found tags: skimming(1),credit card(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TweetDeck wasn\'t actually hacked, and everyone was sillyLocation: Twitter - San Francisco, United States
Date published: 12-06-2014

replicated itself and became a comedy of errors and misreporting. Twitter temporarily disabled TweetDeck, which it owns, until the issue was fixed, but much ridiculousness had already been unleashed by one Twitter user , an Austrian teenager calling himself "*andy," who told CNN on Wednesday he ... Read more

Source: www.zdnet.com

Top found tags: social media(2),telecom sector(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stealth Security Startup vArmour Appoints Tim Eades as CEOLocation: Santa Clara, United States
Date published: 12-06-2014

Stealth security company vArmour announced on Wednesday that it has named Tim Eades as chief executive officer (CEO). According to the company, it has spent the past three years working on developing a solution for securing the \data-defined perimeter of enterprises\ through its technology tha... Read more

Source: securityweek.com

Top found tags: T-Mobile(1),RSA(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Twitter Fixes TweetDeck XSS Security VulnerabilityLocation: Twitter - San Francisco, United States
Date published: 12-06-2014

apply an update. An hour after that however, Twitter disabled the application, before re-enabling it an hour later. At the center of the situation was a bug that enabled cross-site scripting attacks, researchers said. "This vulnerability very specifically renders a tweet as code in the browser, allo... Read more

Source: securityweek.com

Top found tags: XSS(1),social media(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Yahoo Toolbar Causes XSS for Major Online Services: ResearcherLocation: Yahoo HQ - Sunnyvale, United States
Date published: 11-06-2014

Yahoo has fixed a bug in Yahoo Toolbar that generated a stored cross-site scripting (XSS) vulnerability in several important online services. The issue, identified by California-based security researcher Behrouz Sadeghipour, affected not only Yahoo services, but also Flickr, Google, YouTube, Twitter... Read more

Source: securityweek.com

Top found tags: telecom sector(2),website(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Life after TrueCryptLocation: Microsoft HQ - Redmond, United States
Date published: 12-06-2014

While speculation continues around the fate of popular disk encryption software TrueCrypt, Sophos conducted a survey of over 100 IT professionals regarding their use of encryption. including TrueCrypt. Key findings: One-third of IT professionals that use cryptography use TrueCrypt in some fashio... Read more

Source: net-security.org

Top found tags: OS X(2),telecom sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whitepaper: Home Wireless Setup 101Location: New York, United States
Date published: 12-06-2014

Learn what you need to know about home wireless network setup, configuration, and security. Setting up a wireless network that is reasonably secured is not complex. This paper explains how to defend against wireless based network compromise by avoiding known WAP firmware flaws, prevent management in... Read more

Source: net-security.org

Top found tags: firmware(1),government(1),legislation(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New skimming device found inside gas pumpsLocation: New York, United States
Date published: 12-06-2014

A different type of skimming device was found inside gas pumps at three different locations throughout St. Cloud and Kissimmee.... Read more

Source: ph.news.yahoo.com

Top found tags: EN(1),skimming(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Israel develops wireless-malware-injection-by-smartmobe toolLocation: Tel Aviv, Israel
Date published: 12-06-2014

It\'s not the next Daniel Suarez plot; Israeli academics have developed software they say can use your mobile phone to detect electrical impulses, and foist malware to computers physically disconnected from any internet facing network.Ben Gurion University professor Yuval Elovici told The Times of I... Read more

Source: www.theregister.co.uk

Top found tags: government(3),United States(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Five Brazil World Cup stadium tech factsLocation: Brasilia-Federal District, Brazil
Date published: 12-06-2014

The Brazilian government acquired 27 robots from US company IRobot for $7.2m which are able to detect bombs and explosives, as well as other risk activities in and around the venues. The equipment, which has been used to detect explosives in Afghanistan and Iraq, will also be deployed in the Olympic... Read more

Source: www.zdnet.com

Top found tags: EN(1),Germany(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden did the tech industry a big favorLocation: National Security Agency - Fort Meade, United States
Date published: 12-06-2014

companies are able to fight back against government pressure to give up their customers\' private data. The Edward Snowden revelations have rocked governments, global businesses, and the technology world. When we look back a decade from now, we expect this to be the biggest story of 2013. Here is ou... Read more

Source: www.zdnet.com

Top found tags: United States(2),telecom sector(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
VMware Patches ESXi Against OpenSSL Flaw, But Many Other Products Still VulnerableLocation: VMware - Palo Alto, United States
Date published: 12-06-2014

While the group of vulnerabilities that the OpenSSL Project patched last week hasn grown into the kind of mess that the Heartbleed flaw did, the vulnerabilities still affect a huge range of products. Vendors are still making their way through the patching process, and VMware has released an adv... Read more

Source: threatpost.com

Top found tags: OpenSSL(2),United States(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The state of GRX securityLocation: KPN HQ - Den Haag, The Netherlands
Date published: 12-06-2014

[hitb-duopo]Late last year, documents from Edward Snowden\'s NSA trove have revealed that Britain\'s GCHQ has mounted a successful attack against Belgacom (the largest telecom in Belgium) and its subsidiary BICS (Belgacom International Carrier Services), a Global Roaming Exchange (GRX) provider. Oth... Read more

Source: net-security.org

Top found tags: government(4),Hack In The Box(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Automatic updating of Android apps becomes riskierLocation: Google HQ - Mountain View, United States
Date published: 12-06-2014

Google has made unwelcome changes to the way new app permissions are disclosed to users: no warnings will be shown if a new permission if is in the same category as an old one that has previously been accepted. The change has been introduced with the recently released new version of the Play store a... Read more

Source: net-security.org

Top found tags: Google(3),Google Play(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
P.F. Chang\'s Suffers Credit Card BreachLocation: Sally Beauty - Denton, United States
Date published: 12-06-2014

Krebs on Security\'s Brian Krebs reports that restaurant chain P.F. Chang\'s is investigating a possible breach of credit and debit card data at its locations nationwide. On June 9, 2014, thousands of new credit and debit cards were offered for sale on the underground store Rescator, which had previ... Read more

Source: www.esecurityplanet.com

Top found tags: credit card(2),update(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TweetDeck Briefly Shuts Down in Response to Security FlawLocation: Twitter - San Francisco, United States
Date published: 12-06-2014

TweetDeck briefly disabled its service yesterday in response to an XSS (cross-site scripting) vulnerability (h/t Computerworld). At 9:30am on July 11, 2014, TweetDeck announced, "A security issue that affected TweetDeck this morning has been fixed. Please log out of TweetDeck and log back in to full... Read more

Source: www.esecurityplanet.com

Top found tags: social media(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Give Your Children The Digital Lock Teach Them To Protect Personal DataLocation: McAfee - Santa Clara, United States
Date published: 12-06-2014

Recently, a Mother was sharing with me how her child started receiving calls and friendship request from complete strangers. The family was worried and puzzled as to how her phone number had become public. Then one day, a caller informed that he had got the number on an online dating service. Invest... Read more

Source: blogs.mcafee.com

Top found tags: financial sector(2),social media(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TrueCrypt: 15 days on and still no real solutionLocation: Microsoft HQ - Redmond, United States
Date published: 12-06-2014

Business users need to start looking for alternative options, say experts, and choose solutions that will continue to be supported. TrueCrypt: 15 days on and still no real solution TrueCrypt: 15 days on and still no real solution The mystery surrounding the demise of TrueCrypt\'s servers - along wit... Read more

Source: www.scmagazineuk.com

Top found tags: Windows(1),ISP(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Spamcampagne maakt misbruik van angst voor CryptolockerLocation: Brussel, Belgium
Date published: 10-06-2014

Samenvatting:Oplichters maken misbruik van de angst voor Cryptolocker, de malware die je pc gijzelt. Dat doen ze met een spamcampagne die zelf malware verspreidt.Beveiligingsspecialist BullGuard waarschuwt voor een spamcampagne die misbruik maakt van de angst voor Cryptolocker, de malware die je pc ... Read more

Source: www.zdnet.be

Top found tags: CryptoLocker(2),cybercrime(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminelen kochten voor 1 miljoen aan tonerLocation: Lagos, Nigeria
Date published: 12-06-2014

Een bende Nigeriaanse cybercriminelen heeft via gehackte accounts van Amerikaanse ambtenaren voor bijna 1 miljoen dollar aan toner gekocht, zo laat de FBI weten. De fraude begon met phishingmails en phishingsites die op legitieme berichten en pagina\'s van Amerikaanse overheidsinstanties leken. Ambt... Read more

Source: www.security.nl

Top found tags: cybercrime(3),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Voorspelde golf van Windows XP-aanvallen blijft uitLocation: Microsoft HQ - Redmond, United States
Date published: 12-06-2014

Gebruikers van Windows XP kregen te horen dat wanneer Microsoft de ondersteuning van het besturingssysteem op 8 april stopte er een golf van aanvallen zou plaatsvinden, maar tot nu toe blijft het stil. Verschillende experts waarschuwden dat cybercriminelen op grote schaal XP-lekken hamsterden. Deze ... Read more

Source: www.security.nl

Top found tags: Windows(1),cybercrime(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker voert DDoS-aanvallen uit op FeedlyLocation: The Hague, The Netherlands
Date published: 11-06-2014

DEN HAAG - Feedly, een veelgebruikte RSS-dienst, is momenteel slecht bereikbaar. Criminelen voeren zogeheten DDoS-aanvallen uit op de site en proberen het team achter Feedly af te persen.\"Ze willen dat we geld overmaken zodat het stopt\", laat Feedly weten in een blogpost. \"We hebben geweigerd aan... Read more

Source: www.bd.nl

Top found tags: ISP(1),NL(1),RSS(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malwarebytes biedt gratis tool tegen Java- en browser-exploitsLocation: Oracle - Redwood City, United States
Date published: 12-06-2014

Beveiligingsbedrijf Malwarebytes heeft vandaag een gratis tool gelanceerd waarmee internetgebruikers exploits voor zowel bekende als onbekende Java- en browserlekken kunnen stoppen. Malwarebytes Anti-Exploit, zoals de tool heet, moet exploits stoppen die misbruik van beveiligingslekken maken. Naast ... Read more

Source: www.security.nl

Top found tags: Windows(2),Microsoft(3),Windows Media Player(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ABN Amro biedt MKB anti-virus voor internetbankierenLocation: ABN Amro HQ - Amsterdam, The Netherlands
Date published: 12-06-2014

ABN Amro heeft vandaag een verzekeringspakket voor het MKB gelanceerd waarbij ondernemers onder andere een virusscanner voor internetbankieren krijgen. Het \'veilig online pakket\' is volgens de bank de eerste in zijn soort en biedt onder andere anti-virussoftware "om cybercrime te voorkomen". In he... Read more

Source: www.security.nl

Top found tags: online banking(2),financial sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers vallen offline computer via mobiel aanLocation: Amsterdam, The Netherlands
Date published: 12-06-2014

Onderzoekers hebben een manier gedemonstreerd waardoor ze computers die niet op het internet zijn aangesloten toch kunnen aanvallen. De aanval maakt gebruik van een mobiele telefoon die van malware is voorzien. Zodra de telefoon in de buurt van de computer komt kan ook die worden aangevallen. De aan... Read more

Source: www.security.nl

Top found tags: phishing(1),research(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cloud-gebaseerde kassasoftware doelwit van aanvallenLocation: Amsterdam, The Netherlands
Date published: 12-06-2014

Software waarmee supermarkten en winkels de informatie van hun fysieke kassa\'s in de cloud kunnen opslaan is het doelwit van gerichte aanvallen, waardoor cybercriminelen op allerlei manieren kunnen frauderen. Daarvoor waarschuwt het Amerikaanse beveiligingsbedrijf IntelCrawler. De cloudsystemen kun... Read more

Source: www.security.nl

Top found tags: phishing(2),United States(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Belastingdienst stopt met misbruik huurdersgegevensLocation: Amsterdam, The Netherlands
Date published: 12-06-2014

De Belastingdienst stopt met het overtreden van de Wet bescherming persoonsgegevens (Wbp) door niet langer van alle huurders in Nederland de inkomensgegevens te gebruiken voor de de uitvoering van de inkomensafhankelijke huurverhoging. Dat laat het College bescherming persoonsgegevens weten. Vorig j... Read more

Source: www.security.nl

Top found tags: privacy(1),research(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft: inhoud e-mail wordt niet voor advertenties gebruiktLocation: Microsoft HQ - Redmond, United States
Date published: 12-06-2014

Microsoft heeft het privacybeleid dat het voor verschillende diensten gebruikt vereenvoudigt en stelt dat het de inhoud van e-mails, chatgesprekken en videogesprekken, alsmede documenten en foto\'s van gebruikers, niet voor gerichte advertenties zal gebruiken. De aanpassing aan het privacybeleid moe... Read more

Source: www.security.nl

Top found tags: website(1),cyber security(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SP: nieuwe variant EPD nog steeds ontoelaatbaarLocation: Amsterdam, The Netherlands
Date published: 12-06-2014

De nieuwe variant van het Elektronisch patintendossier (EPD) is nog steeds ontoelaatbaar, aldus de SP. "De bezwaren die ik in 2011 had tegen het Elektronisch Patintendossier gelden ook voor het Landelijk Schakelpunt, dat gebruik maakt van precies dezelfde infrastructuur", aldus SP-Kamerlid Rensk... Read more

Source: www.security.nl

Top found tags: research(1),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nederlander zou privacy niet voor gemak willen opofferenLocation: Amsterdam, The Netherlands
Date published: 12-06-2014

Nederland zou wereldwijd tot de groep landen behoren waar inwoners het minst bereid zijn om hun privacy voor gemak op te offeren. Dat beweert IT-bedrijf EMC dat 15.000 mensen in 15 landen online liet interviewen. 52% van de ondervraagde Nederlanders zegt dat het de privacy niet voor gemak wil inruil... Read more

Source: www.security.nl

Top found tags: privacy(1),research(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Topje onthult lichaam bij weggeven privacyLocation: Sydney, Australia
Date published: 12-06-2014

Xuedi Chen (1 van 2) Een kunstenaar heeft een 3D-geprint damestopje ontworpen dat steeds meer delen van het lichaam toont wanneer de eigenaresse onbewust of bewust persoonlijke gegevens vrijgeeft via haar smartphone. Het idee achter x.pose is duidelijk te maken hoe wij ons digitaal blootgeven door... Read more

Source: www.automatiseringgids.nl

Top found tags: smartphone(1),cyber security(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Opera gaat stilletjes wachtwoorden andere browser importerenLocation: Opera Software - Oslo, Norway
Date published: https://www.security.nl/posting/391341/Opera+gaat+stilletjes+wachtwoorden+andere+browser+importeren?channel

Om ervoor te zorgen dat nieuwe gebruikers van de Noorse browser Opera gemakkelijker de overstap kunnen maken, zijn de ontwikkelaars van plan om straks stilletjes wachtwoorden, bookmarks, cookies en de surfgeschiedenis van de huidige browser op de computer te importeren. Zodra Opera voor het eerst wo... Read more

Source: 11-06-2014|www.security.nl

Top found tags: Microsoft(1),NL(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Opera gaat stilletjes wachtwoorden andere browser importerenLocation: Opera Software - Oslo, Norway
Date published: https://www.security.nl/posting/391341/Opera+gaat+stilletjes+wachtwoorden+andere+browser+importeren?channel

Om ervoor te zorgen dat nieuwe gebruikers van de Noorse browser Opera gemakkelijker de overstap kunnen maken, zijn de ontwikkelaars van plan om straks stilletjes wachtwoorden, bookmarks, cookies en de surfgeschiedenis van de huidige browser op de computer te importeren. Zodra Opera voor het eerst wo... Read more

Source: 11-06-2014|www.security.nl

Top found tags: Microsoft(1),NL(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Twitter dicht beveiligingslek in TweetDeckLocation: Twitter - San Francisco, United States
Date published: 12-06-2014

Twitter heeft een Cross-site scripting (XSS)-lek in TweetDeck gedicht dat gisterenavond tegen gebruikers van de microbloggingdienst werd ingezet. TweetDeck is de officile Twitter-client en geeft gebruikers meer mogelijkheden om hun account en tweets te beheren dan via alleen de Twitter-pagina word... Read more

Source: www.security.nl

Top found tags: Google(2),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Opera gaat stilletjes wachtwoorden andere browser importerenLocation: Opera Software - Oslo, Norway
Date published: https://www.security.nl/posting/391341/Opera+gaat+stilletjes+wachtwoorden+andere+browser+importeren?channel

Om ervoor te zorgen dat nieuwe gebruikers van de Noorse browser Opera gemakkelijker de overstap kunnen maken, zijn de ontwikkelaars van plan om straks stilletjes wachtwoorden, bookmarks, cookies en de surfgeschiedenis van de huidige browser op de computer te importeren. Zodra Opera voor het eerst wo... Read more

Source: 11-06-2014|www.security.nl

Top found tags: Microsoft(1),NL(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Waarschuwing voor standaard wachtwoord verkeersbordenLocation: Amsterdam, The Netherlands
Date published: 12-06-2014

Een afdeling van het Amerikaanse Ministerie van Homeland Security heeft een waarschuwing voor digitale verkeersborden afgegeven, die dankzij een standaard wachtwoord zijn aan te passen. Verder adviseert het ICS-CERT om de verkeersborden niet voor het gehele internet toegankelijk te maken.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: critical infrastructure(2),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TweetDeck uit voorzorg offline gehaaldLocation: Amsterdam, The Netherlands
Date published: 12-06-2014

De XSS-bug in TweetDeck werd gisteren door verschillende twitteraars bewezen door een retweet die JavaScript-code uitvoerde te laten circuleren. Uit voorzorg haalde eigenaar Twitter later alle versies van de TweetDeck-clients offline.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: website(1),XSS(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AWS blijft \'onveilig\' TrueCrypt gebruikenLocation: Google HQ - Mountain View, United States
Date published: 12-06-2014

Amazon Web Services Simple Storage Service (S3) biedt TrueCrypt nog steeds als enige optie aan om data op een veilige manier op te slaan. De reputatie van TrueCrypt is echter ernstig beschadigd nadat het geheime ontwikkelteam zich eind mei lijkt te hebben afgekeerd van het open source project. Meer ... Read more

Source: www.automatiseringgids.nl

Top found tags: mobile device(2),telecom sector(2),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amazon AWS blijft TrueCrypt voor encryptie gebruikenLocation: Amsterdam, The Netherlands
Date published: 12-06-2014

Internetgigant Amazon blijft voor de Amazon Web Services (AWS) data via het populaire programma TrueCrypt versleutelen, ook al is de ondersteuning volgens de website van TrueCrypt eind mei gestaakt. Amazon AWS gebruikt TrueCrypt voor het uitwisselen van data tussen de Simple Storage Service (S3). Vo... Read more

Source: www.security.nl

Top found tags: encryption(1),NL(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook gaat meer informatie gebruikers verzamelenLocation: Facebook - Menlo Park, United States
Date published: 12-06-2014

Facebook is van plan om meer informatie over gebruikers te verzamelen dat het voor gerichte advertenties wil gaan gebruiken, maar het zal gebruikers wel meer controle geven over de advertenties die ze te zien krijgen. Volgens het sociale netwerk zouden mensen vooral relevante advertenties willen zie... Read more

Source: www.security.nl

Top found tags: website(1),social media(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Plasterk lanceert app om ID-bewijzen te controlerenLocation: Ministry of the Interior and Kingdom Relations - Den Haag, The Netherlands
Date published: 12-06-2014

Minister Plasterk van Binnenlandse Zaken en Koninkrijksrelaties (BZK) heeft vandaag een applicatie gelanceerd waarmee echtheidskenmerken van paspoorten en identiteitsbewijzen zijn te controleren. Op steeds meer plaatsen in Nederland worden ID-bewijzen gebruikt om iemands identiteit vast te stellen. ... Read more

Source: www.security.nl

Top found tags: telecom sector(6),The Netherlands(6),Ministry of the Interior and Kingdom Relations(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google dicht Gmail-lek dat alle adressen had kunnen lekkenLocation: Google HQ - Mountain View, United States
Date published: 12-06-2014

Google heeft een lek in Gmail gedicht waardoor kwaadwillenden alle Gmail-adressen hadden kunnen achterhalen. De Isralische beveiligingsonderzoeker Oren Hafif ontdekte het probleem, dat zich in een onderdeel bevond voor het delen van een e-mailaccount. Via de \'Gmail delegation feature\' is het mog... Read more

Source: www.security.nl

Top found tags: NL(1),patch(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Opera gaat stilletjes wachtwoorden andere browser importerenLocation: Opera Software - Oslo, Norway
Date published: https://www.security.nl/posting/391341/Opera+gaat+stilletjes+wachtwoorden+andere+browser+importeren?channel

Om ervoor te zorgen dat nieuwe gebruikers van de Noorse browser Opera gemakkelijker de overstap kunnen maken, zijn de ontwikkelaars van plan om straks stilletjes wachtwoorden, bookmarks, cookies en de surfgeschiedenis van de huidige browser op de computer te importeren. Zodra Opera voor het eerst wo... Read more

Source: 11-06-2014|www.security.nl

Top found tags: Microsoft(1),NL(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid in Cisco NX-OS aangetroffenLocation: Cisco HQ - San Jose, United States
Date published: 12-06-2014

Samenvatting: Er is een kwetsbaarheid in Cisco NX-OS gevonden waardoor een Denial-of-Service veroorzaakt kan worden. Gevolgen: Door deze kwetsbaarheid te misbruiken kan een kwaadwillende een Denial-of-Service veroorzaken. Beschrijving: Er is een kwetsbaarheid aangetroffen in Hot Standby Router Proto... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mozilla heeft updates uitgebracht voor Firefox en ThunderbirdLocation: Mozilla - Mountain View, United States
Date published: 12-06-2014

Samenvatting: Mozilla heeft updates uitgebracht voor Firefox en Thunderbird die de kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken van de client applicatie en mogelijk willekeurige code uitvoeren met de rechten van de gebruiker. Beschrijving: Door diverese... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Red Hat verhelpt kwetsbaarheden in qemu-kvmLocation: Amsterdam, The Netherlands
Date published: 12-06-2014

Samenvatting: Red Hat heeft updates uitgebracht voor QEMU die de kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken van het QEMU process of mogelijk willekeurige code uitvoeren met de rechten van het QEMU proces. Beschrijving: Door meerdere invoervalidatie, b... Read more

Source: www.ncsc.nl

Top found tags: DoS(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in ISC BIND verholpenLocation: Amsterdam, The Netherlands
Date published: 12-06-2014

Samenvatting: ISC heeft BIND versie 9.10.0-P2 uitgebracht om een Denial-of-Service kwetsbaarheid te verhelpen. Gevolgen: Een kwaadwillende kan de afstand op afstand misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: Door een kwetsbaarheid in libdns, kan een kwaadwillende door een spec... Read more

Source: www.ncsc.nl

Top found tags: DoS(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Junos Pulse S.A.S. en Junos Pulse A.C.S. verholpenLocation: Door, United States
Date published: 12-06-2014

Samenvatting: Juniper heeft een kwetsbaarheid verholpen in IVE OS en UAC. Gevolgen: Door deze kwetsbaarheid te misbruiken kan een kwaadwillende beveiligingsmaatregelen omzeilen. Beschrijving: Juniper heeft een update uitgebracht om een kwetsbaarheid in Junos Pulse Secure Access Service (SSL VPN) en ... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Juniper NetScreen Firewalls verholpenLocation: Door, United States
Date published: 12-06-2014

Samenvatting: Juniper heeft een tweetal kwetsbaarheden in Juniper ScreenOS verholpen. Gevolgen: Door de kwetsbaarheden te misbruiken kan een kwaadwillende een Denial-of-Service veroorzaken. Beschrijving: - CVE-2014-3813: Middels malafide DNS requests kan een ongeauthenticeerde kwaadwillende op afsta... Read more

Source: www.ncsc.nl

Top found tags: NL(1),vulnerability(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish