Under construction

New design coming soon!

CIC News engine statistics

CIC News for 17-06-2014 contains 81 articles: cybercrime(21),cyber security(24),data breach(13),other(23)

CIC News update contains 62 English and 19 Dutch articles for today.
There are 4 published advisories, 0 are English and 4 are Dutch.
In today's English news articles:
- 12 related to cybercrime
- 24 related to cyber security
- 13 related to data breach and identity theft
- 13 for the category other news

In today's Dutch news articles:
- 9 related to cybercrime
- 0 related to cyber security
- 10 for the category other news

Have fun reading.

English cybercrime related news

Ten Years Later, Cabir Worm\s Place in History is UniqueLocation: Apple HQ - Cupertino, United States
Date published: 16-06-2014

It\s difficult to remember nowand seems quaint even if you can recall itbut there was a time in the not-so-distant past when industry analysts and security experts were worried about the coming mobile malware apocalypse. Self-replicating malware would soon be flooding our phones, deleting o... Read more

Source: threatpost.com

Top found tags: cybercrime(3),Kaspersky Lab(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Seeking solutions to robocalls, FTC hosts contests at DefCon 22Location: Federal Trade Commission - Washington, United States
Date published: 16-06-2014

The Federal Trade Commission (FTC) hopes DefCon 22 attendees are up to the challenge of helping eliminate phone spam also known as robocalls. The \Zapping Rachel\ contest will involve three standalone contests, which are scheduled to be hosted throughout the upcoming August convention, acc... Read more

Source: www.scmagazine.com

Top found tags: government(3),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Technology sites "riskier" than illegal sites in 2013, according to Symantec dataLocation: New York, United States
Date published: 16-06-2014

The iskiest\ pages to visit in 2013 were technology websites, according to data from users of Norton Web Safe, which monitors billions of traffic requests and millions of software downloads per day. Relying heavily on malware and fake anti-virus delivery, technology websites made up 9.9 perc... Read more

Source: www.scmagazine.com

Top found tags: Symantec(1),website(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bitcoin security platform BitGo raises $12M in fundingLocation: New York, United States
Date published: 17-06-2014

Silicon Valley security firm BitGo is working with new ways to beef up Bitcoin safety to protect the digital currency from cyberthieves and hackers. And, investors appear to be showing their confidence in the company. BitGo announced Monday that it received $12 million in Series A financing. "We are... Read more

Source: cnet.com.ortal.com

Top found tags: hackers(1),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK\'s cyber security strategy enters collaborative phaseLocation: GCHQ - Cheltenham, United Kingdom
Date published: 17-06-2014

Cabinet Office Minister Francis Maude looks back at two years of the National Cyber Security Programme and says that public-private collaboration is key to protecting British businesses from cyber attacks. UK\'s cyber security strategy enters collaborative phase UK\'s cyber security strategy enters ... Read more

Source: www.scmagazineuk.com

Top found tags: cybercrime(4),United Kingdom(4),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DEF CON contest to help track down illegal robocallsLocation: Federal Trade Commission - Washington, United States
Date published: 17-06-2014

The Federal Trade Commission is looking to expand the technological arsenal that can be used in the battle against illegal phone spammers by challenging DEF CON 22 attendees to build the ultimate honeypot to lure in and identify perpetrators of illegal robocalls. A robocall honeypot is an informatio... Read more

Source: net-security.org

Top found tags: telecom sector(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Student promises Java key to unlock Simplocker ransomwareLocation: Oracle - Redwood City, United States
Date published: 17-06-2014

2013 Cyber Risk Report A university student claims he is set to release a Java application to decrypt the first ransomware to hit Android devices. The Simplelocker ransomware was revealed 7 June by malware analysts at Eset targeting devices in Eastern Europe. It encrypted via AES large swathes of fi... Read more

Source: go.theregister.com

Top found tags: cybercrime(4),malware(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Another RAT crawls out of the malware drainLocation: Center for Strategic and International Studies - Washington, United States
Date published: 17-06-2014

2013 Cyber Risk Report Yet another banking trojan has appeared, using browser hooking to steal data from Internet Explorer, Chrome and Firefox users. Dyreza, or Dyre, is pitched the usual way, via a phishing e-mail (a lesson that\'s never learned well enough for the approach to fail), and the e-mail... Read more

Source: go.theregister.com

Top found tags: cybercrime(3),malware(3),financial sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hostile state-sponsored hackers breached government networkLocation: GCHQ - Cheltenham, United Kingdom
Date published: 17-06-2014

other critical national infrastructure. Image: Ministry of Defence Hackers under the control of a foreign government managed to gain access to the UK government\'s secure network, it has been revealed. The hackers, described as a "state-sponsored hostile group" gained access to a system administrato... Read more

Source: www.zdnet.com

Top found tags: cybercrime(3),government(3),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Asprox Malware Borrowing Stealth from APT CampaignsLocation: Microsoft HQ - Redmond, United States
Date published: 17-06-2014

Cybercriminals and advanced attackers are freely borrowing from one another\s repertoires to great success. The latest example involves spammers firing off up to a half-million email messages during limited campaign segments without triggering any detection alarms. Security company FireEye said t... Read more

Source: threatpost.com

Top found tags: government(2),United States(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SMBs still use Windows XP and face security risksLocation: Microsoft HQ - Redmond, United States
Date published: 17-06-2014

[microsoft-]Almost one in five small and medium businesses worldwide are currently exposed to major security risks as they are still using Windows XP after Microsoft ended support for the operating system, according to Bitdefender. The research, conducted in countries including the UK, Germany, Spai... Read more

Source: net-security.org

Top found tags: United Kingdom(2),vulnerability(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
There's a new banking Trojan in townLocation: Bank of America HQ - Charlotte, United States
Date published: 17-06-2014

A new piece of banking malware is being delivered via tax- and invoice-themed phishing campaigns, Danish security company CSIS is warning. [mail-skull] Dubbed "Dyreza," the malware targets users of a number of major online banking services in the US and the UK: Bank of America, Natwest, Citibank, RB... Read more

Source: net-security.org

Top found tags: trojan(2),cybercrime(4),financial sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Solving the Cyber Kill Chain Paradox: Going from Reactive to ProactiveLocation: Martin, United States
Date published: 17-06-2014

In 2011, Lockheed Martin analysts introduced a seven step intelligence-driven process generally used by bad actors, and called it the English cyber security related news

World Cup 2014: Experts warn of security threatsLocation: Bee, United States
Date published: 16-06-2014

The lack of specific legislation and regulations for information security in Brazil coupled with its general vulnerability online - the country ranks eighth in the global league of cyberattacks, according to Symantec - could mean a higher risk to individuals online, according to consulting Alvarez &... Read more

Source: www.zdnet.com

Top found tags: cyber security(4),cybercrime(5),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LinkedIn Faces Lawsuit Over Privacy ViolationLocation: LinkedIn HQ - Mountain View, United States
Date published: 16-06-2014

LinkedIn Faces Lawsuit Over Privacy Violation US federal judge orders LinkedIn to face a lawsuit that claims the social network sent emails to users\' contacts without their consent. Facebook Privacy: 10 Settings To Check Facebook Privacy: 10 Settings To Check A federal district judge has ordered Li... Read more

Source: www.informationweek.com

Top found tags: spam(1),cyber security(2),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Domino\'s Pizza Refuses Extortion Demand After Customer Data StolenLocation: Brussel, Belgium
Date published: 16-06-2014

Attackers have tried to serve Domino\'s Pizza a slice of extortion, but the pizza company is not buying. The restaurant chain said it has no plans to give in to extortion demands after a threat to release stolen customer data surfaced on Twitter. Last week, the Twitter account for the \'Rex Mundi\' ... Read more

Source: securityweek.com

Top found tags: social media(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Domino\'s extortion breach highlights rise in ransom-based attacksLocation: Brussel, Belgium
Date published: 16-06-2014

Domino\'s extortion breach highlights rise in ransom-based attacks A hacker group says it will release stolen customer data if Domino\'s does not pay more than $40,000. A hacker group known as Rex Mundi threatened to release a list of information on more than 650,000 Domino\'s customers in France an... Read more

Source: www.scmagazine.com

Top found tags: social media(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK government only connects with geeks\ and techies\ on innovationLocation: New York, United States
Date published: 16-06-2014

UK government only connects with geeks\ and techies\ on innovation. UK citizens are worried that a lack of investment in innovation by the government will result in a loss of business to other countries as well as the failure to adequately prepare the youth of today for what the future h... Read more

Source: itproportal.com

Top found tags: cyber security(2),government(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internet of Things to cause security shortage, trolls outwit Twitter, hackers hit Domino\'s and most Brits fear phones are tappedLocation: Twitter - San Francisco, United States
Date published: 16-06-2014

Internet of Things to cause security shortage, trolls outwit Twitter, hackers. hit Domino\'s and most Brits fear phones are tapped Internet of Things growth will cause a global shortage of some one million information security workers over the next five years as companies struggle to get to grips wi... Read more

Source: itproportal.com

Top found tags: United Kingdom(2),cyber security(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pinterest Users Start Posting Weight-Loss Spam After Being HackedLocation: Pinterest HQ - San Francisco, United States
Date published: 16-06-2014

Some users of Pinterest, a popular \'visual discovery tool\' or bookmarking and content sharing website, have been targeted by hackers, with weight-loss spam pouring out of several Pinterest accounts over the weekend onto social networks such as Twitter. Pinterest has confirmed \'some instances of s... Read more

Source: gadgets.ndtv.com

Top found tags: cyber security(2),social media(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kaspersky Lab Detects Mobile Trojan Svpeng: Financial Malware with Ransomware Capabilities now Targeting U.S. UsersLocation: Kaspersky HQ - Moscow, Russia
Date published: 16-06-2014

LONDON, Jun 16, 2014 (PR Newswire Europe via COMTEX) -- LONDON, June 16, 2014 /PRNewswire/ --Although the GameOver Zeus botnet and CryptoLocker ransomware have been disrupted, it is still too early for a victory celebration. First, the two week deadline expires on June 17th, leaving just one week le... Read more

Source: www.marketwatch.com

Top found tags: malware(4),telecom sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New RAT Bypasses SSL Protection, Targets Bank CredentialsLocation: Dropbox - San Francisco, United States
Date published: 17-06-2014

Researchers at PhishMe have spotted a new strain of malware being used in an attack campaign that swipes bank credentials and circumvents SSL. The malware is known as Dyre. According to Phishme, the attackers using the malware are the same ones linked to an attack campaign seen using Dropbox links e... Read more

Source: securityweek.com

Top found tags: website(1),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Human error" contributes to nearly all cyber incidents, study findsLocation: IBM HQ - Armonk, United States
Date published: 16-06-2014

Top browsers exploited in first day of Pwn2Own A new IBM report reveals that organizations experienced more than 91 million "security events" last year. Even though organizations may have all of the bells and whistles needed in their data security arsenal, it\'s the human element that continues to f... Read more

Source: www.scmagazine.com

Top found tags: cyber security(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firing range for infosec testing opens in CanberraLocation: Sydney, Australia
Date published: 17-06-2014

After six months\' of preparation, the University of New South Wales has opened a cyber-security research centre in Canberra it says is designed to bring together academia, government, defence and business expertise. Sensibly, instead of having students with [S:black-hat tendencies:S] an interest in... Read more

Source: go.theregister.com

Top found tags: education(3),cyber security(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers demand 30,000 from Domino\'s not to leak 600,000 customer detailsLocation: Twitter - San Francisco, United States
Date published: 17-06-2014

including customers\' favourite toppings. The group of hackers who use the Twitter account @RexMundi_Anon posted details of the breach online on late last week. "Earlier this week, we hacked our way into the servers of Domino\'s Pizza France and Belgium, who happen to share the same vulnerable datab... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),social media(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK government only connects with geeks\ and techies\ on innovationLocation: New York, United States
Date published: 16-06-2014

UK government only connects with geeks\ and techies\ on innovation. UK citizens are worried that a lack of investment in innovation by the government will result in a loss of business to other countries as well as the failure to adequately prepare the youth of today for what the future h... Read more

Source: itproportal.com

Top found tags: cyber security(2),government(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internet of Things to cause security shortage, trolls outwit Twitter, hackers hit Domino\'s and most Brits fear phones are tappedLocation: Twitter - San Francisco, United States
Date published: 16-06-2014

Internet of Things to cause security shortage, trolls outwit Twitter, hackers. hit Domino\'s and most Brits fear phones are tapped Internet of Things growth will cause a global shortage of some one million information security workers over the next five years as companies struggle to get to grips wi... Read more

Source: itproportal.com

Top found tags: United Kingdom(2),cyber security(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internet of Things growth accelerates info-security worker shortage to 1mLocation: Cisco HQ - San Jose, United States
Date published: 16-06-2014

Internet of Things growth accelerates info-security worker shortage to 1m. Internet of Things growth will cause a global shortage of some one million information security workers over the next five years as companies struggle to get to grips with the current area of boom in the technology industry. ... Read more

Source: itproportal.com

Top found tags: information security(2),United Kingdom(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Domino\s Pizza held hostage by hackers: Customers\' eating habits at stakeLocation: Brussel, Belgium
Date published: 16-06-2014

Domino\s Pizza held hostage by hackers: Customers\' eating habits at stake. Hacking group Rex Mundi has stolen the details of some 650,000 Domino\'s Pizza customers in France and Belgium, and threatened to publish that data in full unless the company coughs up a cool 30,000 (24,000). On Frid... Read more

Source: itproportal.com

Top found tags: social media(2),update(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook turns user tracking \'bug\' into data mining \'feature\' for advertisersLocation: Facebook - Menlo Park, United States
Date published: 17-06-2014

Facebook announced changes to its privacy and advertising policies on its company blog last Thursday, extending Facebook\'s ability to track users outside of Facebook -- undoing previous assurances it "does not track users across the web." The press reports initially sounded like good news, announci... Read more

Source: www.zdnet.com

Top found tags: telecom sector(4),United States(4),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to Anonymize Everything You Do OnlineLocation: Lee, United States
Date published: 17-06-2014

anon [gallery-ca] Hlib Shabashnyi/Getty One year after the first revelations of Edward Snowden, cryptography has shifted from an obscure branch of computer science to an almost mainstream notion: It\s possible, user privacy groups and a growing industry of crypto-focused companies tell us, to enc... Read more

Source: wired.com

Top found tags: Bruce Schneier(4),mobile device(6),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Java program to reverse Android ransomware damageLocation: Google HQ - Mountain View, United States
Date published: 17-06-2014

University of Sussex student Simon Bell has reverse-engineered the Android Simplocker (Simplelocker) ransomware, and has created a Java program that can be converted into an Android app to decrypt the files encrypted by the malware. Simplocker was first spotted and analyzed by ESET researchers earli... Read more

Source: net-security.org

Top found tags: CryptoLocker(2),cyber security(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trend Micro Launches Security Solution for VMware vCloud Hybrid ServiceLocation: Trend Micro - Cupertino, United States
Date published: 17-06-2014

Trend Micro has launched a new solution designed for VMware\'s vCloud Hybrid Service that enables customers to move their on-premise or private cloud deployment to the public cloud with added layers of protection. According Trend Micro, its Deep Security solution features a comprehensive platform fo... Read more

Source: securityweek.com

Top found tags: cyber security(2),Trend Micro(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Amps up Azure\'s Security FeaturesLocation: Microsoft HQ - Redmond, United States
Date published: 17-06-2014

At Microsoft\'s annual TechEd conference in Houston last month, the software giant revealed a number of new initiatives on the security front. In particular, the theme of mobile-first cloud-first (or vice versa depending on who\'s talking) was highlighted from the first keynote and throughout the we... Read more

Source: www.esecurityplanet.com

Top found tags: Microsoft(3),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Workplace Wearables and the Loss of PrivacyLocation: Google HQ - Mountain View, United States
Date published: 17-06-2014

We e all had those late afternoon hunger pangs when it\s time to start fantasizing about going home and making dinner. Imagine if the watch you were wearing could actually find out what ingredients you had in stock, rather than leave the contents of your refrigerator up to memory or fate. Wea... Read more

Source: blogs.mcafee.com

Top found tags: Google Glass(2),mobile device(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bridging the Tech Gap: A Snapchat Primer for ParentsLocation: New York, United States
Date published: 17-06-2014

Screen Shot 2014-06-11 at 5.37.28 PMI will admit there are certain things I e given up trying to change as the parent of a teen. Like trying to get between my kids and their phones the instant they need to text a friend, Google something, or download an app. I e given up buying them watches ... Read more

Source: blogs.mcafee.com

Top found tags: Google(2),Google Play(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government policy reveals UK snooping on Facebook, Google usersLocation: Facebook - Menlo Park, United States
Date published: 17-06-2014

A once-secret government policy has been published and provides eye-opening detail on the UK\'s legal reasoning behind spying on residents using Facebook, Google and other web services. Government policy reveals UK snooping on Facebook, Google users Government policy reveals UK snooping on Facebook,... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(4),United States(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Evernote\'s forum site hacked; Note Service untouchedLocation: Wayne, United States
Date published: 16-06-2014

recommending they change their passwords if those credentials were reused on other sites. The company said the hackers stole profile data, password hashes, email addresses and birth dates. It did not say how many users were directly affected. The company, however, stressed that an entirely separate ... Read more

Source: www.zdnet.com

Top found tags: data breach(2),e-mail(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
No Exit: How to Keep Data from Escaping via POS SystemsLocation: McAfee - Santa Clara, United States
Date published: 16-06-2014

Retailers all over the world lose sleep over data breachesand CSOs and IT security managers work hard to make sure that cyber thieves stay out of their endpoints and networks. They are layering on more anti-malware solutions, tighter defenses at email and web gateways, stronger next-generation fi... Read more

Source: blogs.mcafee.com

Top found tags: data breach(2),financial sector(2),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Jailbroken devices are a threat to the enterpriseLocation: ABI Research - New York, United States
Date published: 16-06-2014

First step, identify jailbroken devices on your network, says Vince Arneja, then alter data processing and execution modes to protect your data. Jailbroken devices are a threat to the enterprise Jailbroken devices are a threat to the enterprise Personal and enterprise computing landscapes are changi... Read more

Source: www.scmagazineuk.com

Top found tags: mobile device(2),Ponemon Institute(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Class-action filed against payroll company Paytime over massive data breachLocation: Pennsylvania, United States
Date published: 16-06-2014

A class-action complaint has been filed by Kraemer, Manes & Associates LLC and Carlson Lynch LTD against Paytime, a Pennsylvania-based payroll company that experienced a massive data breach in April. \Paytime failed to safeguard and prevent vulnerabilities from being taken advantage of in its com... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),United States(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The new data breach etiquette you\'d better knowLocation: Wall Street, New York City, New York, United States
Date published: 16-06-2014

In a sobering commentary on the times, a new data breach etiquette has emerged--the expected steps you will take when you become the victim of a significant breach. Notice the use of the word \"when\" here, not \"if.\"\"Breaches and data theft have become the new normal, to the point where a data br... Read more

Source: www.fiercecio.com

Top found tags: report(1),data breach(2),data theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NHS patient information in data breach by Diagnostic HealthLocation: Stafford, United States
Date published: 16-06-2014

As many as 10,000 NHS patients may have been affected by a series of data protection breaches by a private firm.A leaked report from the Information Commissioner\'s Office (ICO) revealed patient data was stored unencrypted by Birmingham company Diagnostic Health.The company, which carries out ultras... Read more

Source: www.bbc.com

Top found tags: United Kingdom(2),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Domino\'s Pizza Held to Ransom Following \'Severe\' Customer Data BreachLocation: Brussel, Belgium
Date published: 16-06-2014

Hackers who claim to have broken into the online databases of Domino\'s Pizza customers have issued an ultimatum to the take-away company, demanding payment of 30,000 (23,900) or face the embarrassment of seeing personal details from over 600,000 customers posted online.On Friday, a group of ha... Read more

Source: www.ibtimes.co.uk

Top found tags: France(2),social media(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Philippines begins cybercrime lawLocation: Manila, Metro Manila, Philippines
Date published: 16-06-2014

MANILA - A woman has been indicted for computer fraud in the first such case under the Philippines\' controversial cybercrime law, justice department records showed Sunday. Karla Martinez Ignacio could face up to six years in jail if found guilty of transferring thousands of dollars to her bank acco... Read more

Source: www.bangkokpost.com

Top found tags: child pornography(4),social media(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Being a CISO at a higher education institutionLocation: Broward, United States
Date published: 17-06-2014

In this interview, Matt Santill, CISO of Broward College, talks about the requirements and peculiarities of his job, the technologies the college uses to make its network safe, and offers advice for CISOs working in other educational institutions. Describe what it means to be the CISO at Broward Col... Read more

Source: net-security.org

Top found tags: education(3),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AT&T Warns Customers of Data BreachLocation: AT&T HQ - Dallas, United States
Date published: 17-06-2014

AT&T has notified some of its mobile customers that employees of one of its contractors accessed some customer information, including birth dates and Social Security numbers, in an effort to generate codes that could be used to unlock devices. The company did not specify how many customers were affe... Read more

Source: threatpost.com

Top found tags: cyber security(2),data breach(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ATT Customer Info Exposed by Third Party Data BreachLocation: AT&T HQ - Dallas, United States
Date published: 17-06-2014

AT&T recently began notifying an undisclosed number of its mobile customers that their personal information had been inappropriately accessed by three employees of an unnamed third-party vendor. In the notification letter [PDF] to those affected, AT&T explained, "We recently determined that employee... Read more

Source: www.esecurityplanet.com

Top found tags: health sector(2),medical sector(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
\'Shameful\' data breach may affect 10,000 NHS patientsLocation: National Health Service - London, United Kingdom
Date published: 17-06-2014

The personal data of up to 10,000 NHS patients may have been compromised in a data breach that one leading industry expert has described as showing a "truly shameful level of negligence and disregard for personal data". \'Shameful\' data breach may affect 10,000 NHS patients \'Shameful\' data breach... Read more

Source: www.scmagazineuk.com

Top found tags: medical sector(4),United Kingdom(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Blurring the lines between business and homeLocation: Boyd, United States
Date published: 17-06-2014

What are the risks posed by apps and hardware that cross the business/home divide? Dr Guy Bunker asks what policies and security approaches are required? Blurring the lines between business and home Blurring the lines between business and home Company data needs to remain available to authorised use... Read more

Source: www.scmagazineuk.com

Top found tags: social media(2),cyber security(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Bitcoin Security Startup Raises $12 MillionLocation: Silicon Valley, United States
Date published: 16-06-2014

Hacking to Mine Bitcoin BitGo, a company that offers a Bitcoin security platform and Bitcoin wallet, today announced that it has raised $12 million in Series A financing led by Silicon Valley venture capital firm Redpoint Ventures. BitGo has developed a \2-of-3 key\ multi-signature Bitcoin wal... Read more

Source: securityweek.com

Top found tags: threat(1),Juniper Networks(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Businesses behind "cramming" scheme surrender over $10M in assetsLocation: Federal Trade Commission - Washington, United States
Date published: 16-06-2014

Feds: $45M drained from bank accounts in international cyber heist The defendants were allegedly behind unauthorized charges to consumers cell phone bills. The alleged operators of a mobile
Former Microsoft employee draws three-month prison term for leaking codeLocation: Microsoft HQ - Redmond, United States
Date published: 16-06-2014

A U.S. district court judge has sentenced a former Microsoft employee to three months in prison for stealing company trade secrets. Alex Kibkalo, a Russian national and seven-year employee of the tech giant, plead guilty to one count of stealing trade secrets. Kibkalo stole the information and relea... Read more

Source: www.scmagazine.com

Top found tags: report(1),Russia(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Energy Sector in Top Five for Malware VulnerabilityLocation: Cisco HQ - San Jose, United States
Date published: 16-06-2014

Internet of Everything Creating Unprecedented Technological Benefits for Energy, Oil, and Gas Sector, But Also High Risk for Cybersecurity Threats;Cisco Announces Industry-Leading Advanced Malware Protection and Data Center Solutions, Expanding Security Across Web, Email, and CloudKSA - 16 June 2014... Read more

Source: www.zawya.com

Top found tags: report(1),threat(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NCA warns \'thousands\' still at risk from Gameover Zeus and Cryptolocker malwareLocation: National Crime Agency - London, United Kingdom
Date published: 16-06-2014

THOUSANDS OF COMPUTER SYSTEMS are still at risk from the Gameover Zeus (Gozeus) and Cryptolocker malware variants, the UK National Crime Agency (NCA) has warned, despite having told users to lock down their systems two weeks ago.On 2 June, the NCA announced that an international operation had tempor... Read more

Source: www.theinquirer.net

Top found tags: United Kingdom(2),malware(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Smartification of the Home, Part 1Location: Verizon HQ - New York, United States
Date published: 17-06-2014

Over the past few years, there has been proliferation of intelligent connected devices introduced into homes across the globe. These devices can range from the familiar-such as tablets, smart phones, and smart TVs to the less familiar, such as utilitymeters, locks, smoke and carbon monoxid... Read more

Source: trendmicro.com

Top found tags: Verizon(1),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Could you maintain security in event of IT failure?Location: Dublin, Ireland
Date published: 17-06-2014

A study investigating the priorities for the UK and Ireland s top banks and insurance companies has revealed low confidence in the ability to remain secure in the event of an IT collapse, according to Fujitsu. Only a third (35%) of the 176 organizations surveyed said they were very confident that se... Read more

Source: net-security.org

Top found tags: financial sector(2),United Kingdom(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Civil service plan reveals changes to Government Digital ServiceLocation: New York, United States
Date published: 17-06-2014

Civil service plan reveals changes to Government Digital Service. The updated Civil Service Plan for 2014/15, published last week by the Civil Service, has revealed changes to the Crown Commercial Service (CCS) and the Government Digital Service (GDS). The Plan claims it aims to introduce management... Read more

Source: itproportal.com

Top found tags: EN(1),report(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker nets over $600k by compromising NAS systems to mine DogecoinLocation: Berlin, Germany
Date published: 17-06-2014

A single threat actor is responsible for the compromise of a considerable number of Synology NAS systems that were set to mine Dogecoing in secret and have netted him over $620,000, researchers from Dell SecureWorks reported. "As early as February 8th of this year, computer users began to notice the... Read more

Source: net-security.org

Top found tags: threat(1),vulnerability(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Employees take too many risks with Wi-Fi securityLocation: Cisco HQ - San Jose, United States
Date published: 17-06-2014

UK employees are potentially putting their companies at risk of cyber-attack when using mobile devices for work purposes while on holiday or on a short break, new research has found. Cisco found that 77% of UK workers surveyed usually take their work devices with them on holiday, with 72% choosing t... Read more

Source: net-security.org

Top found tags: mobile device(2),telecom sector(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A new defense against kernel-mode exploitsLocation: Microsoft HQ - Redmond, United States
Date published: 17-06-2014

[rahul-rafa]Over the past many years, there ve been a plethora of security solutions available for Windows-based endpoints, but most of them are helpless against malicious code targeting the kernel - even when we employ layered security and stack them one upon the other. The time has come to change ... Read more

Source: net-security.org

Top found tags: cyber defense(2),vulnerability(2),Hack In The Box(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TIBCO\'s LogLogic 5.5 Taps Machine Data for Improved IntelligenceLocation: Brown, United States
Date published: 17-06-2014

TIBCO Software, a provider of infrastructure software solutions, has released the latest version of its log management solution, which now offers increased operational control, insight, and assurance capabilities derived from machine data. Now in version 5.5, the latest iteration of TIBCO\'s log man... Read more

Source: securityweek.com

Top found tags: EN(1),Intel(1),ISP(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Girls Who Code kicks off summer immersion programLocation: New York City, New York, United States
Date published: 17-06-2014

A nonprofit focused on equipping young women for opportunities in tech-related fields has launched its 2014 Summer Immersion Program. Started by the organization, Girls Who Code, the program expects to reach 380 high- school girls in classes throughout New York, Boston, Miami, Seattle and the San Fr... Read more

Source: www.scmagazine.com

Top found tags: Intel(1),Twitter(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Civil service plan reveals changes to Government Digital ServiceLocation: New York, United States
Date published: 17-06-2014

Civil service plan reveals changes to Government Digital Service. The updated Civil Service Plan for 2014/15, published last week by the Civil Service, has revealed changes to the Crown Commercial Service (CCS) and the Government Digital Service (GDS). The Plan claims it aims to introduce management... Read more

Source: itproportal.com

Top found tags: EN(1),report(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Spyware op nieuwe toestellen Chinese smartphonesLocation: G Data Software - Bochum, Germany
Date published: 16-06-2014

Het goedkope Android-toestel N9500 van de Chinese fabrikant Star bevat uit de doos spyware. Het spionageprogramma zit verstopt in de apparaatsoftware voor nieuwe toestellen en is daardoor niet te verwijderen, meldt anti-virusbedrijf G Data. De N9500 is een kloon van Samsungs populaire Galaxy S4 en w... Read more

Source: www.reformatorischeomroep.nl

Top found tags: Google(3),Google Play(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese goedkope smartphone wordt inclusief malware geleverd aan klantenLocation: Beijing, China
Date published: 16-06-2014

Wie een nieuwe smartphone koopt verwacht dat dit apparaat in ieder geval zonder kwaadaardige software uit de verpakking komt. Niets blijkt echter minder waar. De goedkope Chinese Android-smartphone N9500 van het bedrijf Star blijkt in de fabriek al te worden voorzien van malware.Het probleem is ontd... Read more

Source: infosecuritymagazine.nl

Top found tags: financial sector(2),cybercrime(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebookaccounts kapen is in: hoe krijg je hem terug?Location: Facebook - Menlo Park, United States
Date published: 16-06-2014

De cyberonderwereld blijft nieuwe manieren vinden om geld te verdienen. De meest recente trend: Facebookpagina\'s kapen, om langs die weg spam te kunnen versturen, informatie te verzamelen voor gerichte aanvallen en zelfs losgeld te vragen. Wij lijsten voor u nog eens op wat je kan doen om zo\'n sce... Read more

Source: www.demorgen.be

Top found tags: Kaspersky Lab(4),social media(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trojaans paard omzeilt SSL via browserkapingLocation: Amsterdam, The Netherlands
Date published: 17-06-2014

Onderzoekers hebben een nieuw Trojaans paard ontdekt dat de SSL-beveiliging van websites omzeilt en is ontwikkeld om gegevens voor internetbankieren te stelen. De malware, Dyreza of Dyre genaamd, verspreidt zich via kwaadaardige links in e-mails. De e-mails doen zich onder andere voor als een factuu... Read more

Source: www.security.nl

Top found tags: United Kingdom(2),financial sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Politie en OM gaan samen bad hosting aanpakkenLocation: Den Haag, The Netherlands
Date published: 17-06-2014

De politie en het Openbaar Ministerie zijn een project gestart genaamd Nederland Schoon om samen met andere partijen \'bad hosters\' in Nederland aan te pakken van wie de servers worden gebruikt voor het hosten cybercrime. Dat lieten Marijn Schuurbiers van het Team High Tech Crime en Lodewijk van Zw... Read more

Source: www.security.nl

Top found tags: The Netherlands(4),cybercrime(5),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Advertenties kunstsite DeviantArt verspreiden adwareLocation: Amsterdam, The Netherlands
Date published: 17-06-2014

Advertenties op de zeer populaire kunstsite DeviantArt proberen gebruikers met adware te infecteren, zo ontdekten onderzoekers. De advertenties sturen gebruikers automatisch door naar websites die waarschuwen dat er updates of upgrades beschikbaar zijn, bijvoorbeeld voor de mediaspeler of Windows. I... Read more

Source: www.security.nl

Top found tags: website(1),Windows(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM: menselijke fouten bij 95% IT-incidentenLocation: IBM HQ - Armonk, United States
Date published: 17-06-2014

Bij bijna alle beveiligingsincidenten die plaatsvinden spelen fouten door menselijk handelen een belangrijke rol, zo beweert IBM aan de hand van onderzoek onder meer dan duizend klanten. Veel voorkomende missers zijn configuratiefouten, slecht patchmanagement en standaard wachtwoorden. Ook eenvoudig... Read more

Source: www.security.nl

Top found tags: NL(1),patch(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware voor mobiele telefoons bestaat 10 jaarLocation: Kaspersky HQ - Moscow, Russia
Date published: 17-06-2014

Het is 10 jaar geleden dat de eerste malware voor mobiele telefoons verscheen. Het ging om de Cabir-worm die door het Russische anti-virusbedrijf Kaspersky Lab werd ontdekt. Cabir gebruikte Bluetooth-verbindingen om Nokia-smartphones met het Symbian-besturingssysteem te infecteren. In een terugblik ... Read more

Source: www.security.nl

Top found tags: antivirus(3),Kaspersky Lab(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
VS gaat samen met hackers robocalls bestrijdenLocation: Federal Trade Commission - Washington, United States
Date published: 17-06-2014

De Federal Trade Commission (FTC) van de Amerikaanse overheid zal samen met hackers een oplossing ontwikkelen om zogeheten robocalls te bestrijden. Robocalls zijn computers die automatisch allerlei telefoonnummers bellen en een vooraf opgenomen boodschap afspelen. In veel gevallen gaat het om illega... Read more

Source: www.security.nl

Top found tags: conference(3),government(5),United States(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

Commissie eist metadata van NSA over belastingschandaalLocation: National Security Agency - Fort Meade, United States
Date published: 16-06-2014

Een topfunctionaris van de Amerikaanse belastingdienst wordt aan de tand gevoeld over haar rol in een politiek beladen schandaal, maar een computercrash verdoezelde het gezochte bewijsmateriaal. De onderzoekscommissie vraagt nu de NSA om hulp. Een parlementaire onderzoekscommissie in de VS wil de ve... Read more

Source: webwereld.nl

Top found tags: The Netherlands(2),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaanse politicus vraagt NSA metadata oud-bestuurder te overhandigenLocation: Internal Revenue Service - Washington, United States
Date published: 16-06-2014

Een Amerikaans congreslid heeft een verzoek ingediend bij de NSA om metadata te overhandigen van een oud-bestuurslid van de federale belastingdienst, de Internal Revenue Service. Dit doet hij om eventuele strafbare feiten bij de dienst boven tafel te krijgen. NSACongreslid Steve Stockman diende het ... Read more

Source: tweakers.net

Top found tags: The Netherlands(2),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pentagon werkt aan concurrent van Tor-netwerkLocation: DARPA - Arlington, United States
Date published: 17-06-2014

De onderzoekspoot van het Pentagon werkt aan allerlei anonimiseringstools om onder andere het Tor-netwerk aan te vullen en te vervangen. Het programma van het Defense Advanced Research Projects Agency (DARPA) naar meer anonimiteit op het internet begon vier jaar gelden, zo meldt The Verge. Het DARPA... Read more

Source: www.security.nl

Top found tags: research(2),government(4),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Student kraakt Android-ransomware met Java-programmaLocation: Oracle - Redwood City, United States
Date published: 17-06-2014

Een student aan de Universiteit van Sussex heeft een Java-programma ontwikkeld waarmee slachtoffers van de Simplocker-ransomware hun versleutelde bestanden kunnen terugkrijgen. Simplocker versleutelt foto\'s, filmpjes en documenten op de SD-geheugenkaart van Android-toestellen met AES-encryptie. Om ... Read more

Source: www.security.nl

Top found tags: NL(1),ransomware(1),update (1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Profielgegevens Evernote-forum gestolen bij inbraakLocation: Amsterdam, The Netherlands
Date published: 17-06-2014

Aanvallers zijn erin geslaagd om op het forum van het notitieprogramma Evernote in te breken en daar de profielgegevens van gebruikers te stelen. Het gaat om e-mailadressen en, indien ingevuld, geboortedata. Volgens Evernote zijn er waarschijnlijk geen privberichten van gebruikers buitgemaakt. Het... Read more

Source: www.security.nl

Top found tags: e-mail(1),NL(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry introduceert chat met extra beveiligingLocation: BlackBerry - Ontario, Canada
Date published: 17-06-2014

BlackBerry heeft een beveiligde versie van chat-app BBM uitgebracht voor bedrijven. BBM Protected moet gegevens beschermen doordat elk bericht zijn eigen versleuteling heeft. Chatten gebeurt vanuit de reguliere app. Met een eigen sleutel kunnen gebruikers een beveiligde verbinding opzetten.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry introduceert BBM-dienst met extra beveiligingLocation: BlackBerry - Ontario, Canada
Date published: 17-06-2014

BlackBerry heeft een beveiligde versie van chat-app BBM uitgebracht voor bedrijven. BBM Protected moet gegevens beschermen doordat elk bericht zijn eigen versleuteling heeft. Chatten gebeurt vanuit de reguliere app. BBM Protected is alleen verkrijgbaar voor BlackBerry-gebruikers met BES, BlackBerry ... Read more

Source: tweakers.net

Top found tags: NL(1),SMS(1),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Nokia betaalde miljoenen om encryptiesleutel te beschermen"Location: Den Haag, The Netherlands
Date published: 17-06-2014

De Finse telefoonfabrikant Nokia zou miljoenen euro\'s aan een afperser hebben betaald om de encryptiesleutel van Symbian-telefoons te beschermen, zo laat het Finse MTV News weten. De zaak speelde eind 2007 en is nog steeds niet opgelost, zegt politiecommissaris Tero Haapala. Verdere details wilde H... Read more

Source: www.security.nl

Top found tags: government(1),NL(1),police(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Politie arresteert verdachten wegens online verkoop medicijnenLocation: Den Haag, The Netherlands
Date published: 17-06-2014

De politie heeft in een onderzoek naar de illegale handel in medicijnen afgelopen maandag twee verdachten aangehouden die illegaal medicijnen via internet te koop aanboden. Het ging om sterke slaapmiddelen en tranquillizers, medicijnen die alleen met een vergunning verkocht mogen worden. Volgens de ... Read more

Source: www.security.nl

Top found tags: NL(1),police(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vermeende TrueCrypt-ontwikkelaar ziet fork niet zittenLocation: Green, United States
Date published: 17-06-2014

Een vermeende ontwikkelaar van het encryptieprogramma TrueCrypt vindt het geen goed idee als er een fork wordt gemaakt. Een fork is een afsplitsing gebaseerd op de originele code van de software. Het idee van een fork is afkomstig van cryptografieprofessor Matthew Green. Green is betrokken bij de au... Read more

Source: www.security.nl

Top found tags: website(1),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid verholpen in de Linux KernelLocation: Ubuntu - London, United Kingdom
Date published: 17-06-2014

Samenvatting: Er is een update uitgebracht voor de Linux Kernel die de kwetsbaarheid verhelpt. Gevolgen: Een lokale kwaadwillende gebruiker kan mogelijk toegang krijgen tot gevoeldige informatie of een Denial-of-Service veroorzaken. Beschrijving: Door een kwetsbaarheid in de linux futex subsystem is... Read more

Source: www.ncsc.nl

Top found tags: update (1),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in PHP verholpenLocation: Hewlett-Packard - Palo Alto, United States
Date published: 17-06-2014

Samenvatting: Er zijn updates uitgebracht om een kwetsbaarheid in PHP te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken voor het veroorzaken van een Denial-of-Service (DoS) en mogelijk op afstand willekeurige code uitvoeren. Beschrijving: Kwetsbaarheid in de DNS TXT-record pa... Read more

Source: www.ncsc.nl

Top found tags: NL(1),PHP(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden in Asterisk verholpenLocation: Amsterdam, The Netherlands
Date published: 17-06-2014

Samenvatting: Digium heeft nieuwe versies van Asterisk uitgebracht waarin verschillende kwetsbaarheden worden verholpen. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende een Denial-of-Service veroorzaken en verhoogde gebruikersrechten verkrijgen. Beschrijving: - CVE-2014-4045, ... Read more

Source: www.ncsc.nl

Top found tags: update (1),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CentOS verhelpt meerdere kwetsbaarheden in XenLocation: Amsterdam, The Netherlands
Date published: 17-06-2014

Samenvatting: CentOS heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen in Xen. Gevolgen: Een lokale kwaadwillende gebruiker kan mogelijk een Denial-of-Service veroorzaken van de Xen host. Beschrijving: - CVE-2014-2599 Een kwetsbaarheid in de HVMOP_set_mem_access HVM control operati... Read more

Source: www.ncsc.nl

Top found tags: DoS(1),NL(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish