Under construction

New design coming soon!

CIC News engine statistics

CIC News for 19-06-2014 contains 85 articles: cybercrime(32),cyber security(22),data breach(13),other(18)

CIC News update contains 83 English and 2 Dutch articles for today.
There are 0 published advisories, 0 are English and 0 are Dutch.
In today's English news articles:
- 31 related to cybercrime
- 22 related to cyber security
- 13 related to data breach and identity theft
- 17 for the category other news

In today's Dutch news articles:
- 1 related to cybercrime
- 0 related to cyber security
- 1 for the category other news

Have fun reading.

English cybercrime related news

Black Hat USA 2014: Embedded & VulnerableLocation: Black Hat - Las Vegas, United States
Date published: 18-06-2014

Black Hat USA 2014: Embedded & Vulnerable They're all around us, just waiting to be hacked. WiFi signals? Well, sure, but today we want to talk about embedded systems, the hackable internals in an ever-growing number of everyday devices. Modern cars are hackable; this we know. Unfortunately, thus f... Read more

Source: www.darkreading.com

Top found tags: cybercrime(2),Karsten Nohl(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A Dyre New Banking TrojanLocation: Dropbox - San Francisco, United States
Date published: 17-06-2014

A Dyre New Banking Trojan Newly discovered RAT sneaks by SSL and steals victims' banking credentials. Creators of a newly discovered Remote Access Trojan (RAT) strain that's targeting customers of a number of major banks could become another fixture in the crime-as-a-service ecosystem. Initially u... Read more

Source: www.darkreading.com

Top found tags: cybercrime(3),malware(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Not To Respond To A DDoS AttackLocation: Cloud, United States
Date published: 17-06-2014

How Not To Respond To A DDoS Attack Common mistakes made by victims of distributed denial-of-service attacks. Distributed denial-of-service (DDoS) attacks just won't go away. Just ask the news and information aggregator service Feedly, which suffered waves of attacks over a three-day period last we... Read more

Source: www.darkreading.com

Top found tags: ISP(2),cybercrime(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker infects Synology storage devices, makes off with $620,000 in DogecoinLocation: Berlin, Germany
Date published: 18-06-2014

A hacker generated digital coins worth more than $620,000 by hijacking a popular type of Internet-connected storage device from Synology, security researchers said. The incident, which was documented in a research report published Tuesday by Dell SecureWorks, is only the latest hack to steal other p... Read more

Source: arstechnica.com

Top found tags: financial sector(2),telecom sector(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Security Breach Threatens Hong Kong\'s Democratic Reform \'Referendum\'Location: Hong Kong, China
Date published: 17-06-2014

One of the people in charge of a Hong Kong voting website has claimed that distributed denial-of-service attacks (DDoS) have crashed the site a few days before it is running a poll on whether citizens want democratic reform in the former British colony.The unofficial referendum is meant to be a litm... Read more

Source: www.ibtimes.co.uk

Top found tags: DoS(2),Hong Kong(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security, data center vendors renew focus on stopping rising DDoS attacksLocation: Corero Network Security - Hudson, United States
Date published: 16-06-2014

Security and data center vendors are increasing their focus on preventing distributed denial of service attacks as those attacks proliferate, observes Jeff Wilson, principal analyst for security at Infonetics Research.Arbor Networks is maintaining its strong position in DDoS mitigation despite facin... Read more

Source: www.fierceitsecurity.com

Top found tags: DoS(2),Juniper Networks(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Home minister reviews implementation of crime tracking network projectLocation: Union, United States
Date published: 17-06-2014

Union minister of home affairs Rajnath Singh today said he will take up the issue of implementation of the `Crimes and Criminal Network Tracking and Systems (CCTNS)' project with state governments that have so far not implemented it.Reviewing centre-state division of responsibilities of the home mi... Read more

Source: www.domain-b.com

Top found tags: government(4),cybercrime(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UNH Beefing Up Cyber Crime SpecialtyLocation: University of New Hampshire School - Concord, United States
Date published: 16-06-2014

Hartford Courant (June 16): UNH Beefing Up Cyber Crime Specialty\"UNH took the first step on winning a certification from the Defense Cyber Crime Center for teaching students how to do forensic investigations of digital records, devices and networks. The school has partnered with the federal offi... Read more

Source: www.newhaven.edu

Top found tags: EN(1),research(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
McAfee and CSIS: stopping cyber crime can positively impact world economiesLocation: Center for Strategic and International Studies - Washington, United States
Date published: 17-06-2014

A new report from the Centre for Strategic and International Studies (CSIS) and sponsored by McAfee, part of Intel Security, shows the significant impact that cybercrime has on economies worldwide. The report, \"Net Losses Estimating the Global Cost of Cybercrime\", concludes that cybercrime cos... Read more

Source: www.itweb.co.za

Top found tags: United States(2),telecom sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bengaluru Techie Held for ExtortionLocation: Bengaluru, India
Date published: 17-06-2014

HYDERABAD: The Cyber Crime police of Cyberabad arrested a 30-year-old manager of a Bengaluru-based IT firm for taking semi-nude pictures of a woman and using them to blackmail her for money. He extorted more than Rs 6 lakh from her.According to police, on May 21, a woman from Gachibowli lodged a com... Read more

Source: www.newindianexpress.com

Top found tags: social media(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker Earns 365,000 Mining Dogecoin With NAS BoxesLocation: London, United Kingdom
Date published: 17-06-2014

An unidentified hacker has made at least $620,496 (365,750) in Dogecoin virtual currency, after infecting thousands of Network Attached Storage (NAS) servers made by Taiwanese manufacturer Synology with Dogecoin-mining malware.According to Dell subsidiary SecureWorks, the attacker was using known ... Read more

Source: www.techweekeurope.co.uk

Top found tags: vulnerability(1),financial sector(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spamvertised June invoice themed emails lead to malwareLocation: New York, United States
Date published: 17-06-2014

Cybercriminals continue spamvertising tens of thousands of malicious emails on their way to socially engineer gullible end users, ultimately increasing their botnets infected population through the systematic and persistent rotation of popular brands.Weve recently intercepted a currently circu... Read more

Source: www.webroot.com

Top found tags: EN(1),spam(1),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
7 Metro East detectives selected to crack down on cybercrimeLocation: Fallon, United States
Date published: 17-06-2014

(KMOV.com) A Metro East detective is taking part in a program to help local police take on cybercrime.OFallon police detective William Barlock is one of 200 detectives who applied to be a part of a Secret Service Task Force, but Barlock is just one of seven Metro East detectives who have been... Read more

Source: www.kmov.com

Top found tags: PoC(1),police(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pat Pilcher: 30 per cent of SMEs vulnerable to cybercrimeLocation: Wellington, New Zealand
Date published: 18-06-2014

Over 80 per cent of businesses in NZ fit into the small businesses category. Employing a handful of people, they're often referred to as the engine powering New Zealand's economy.Small and medium enterprises (SMEs) also remain exposed to cybercrime because many aren't cyber security savvy and oft... Read more

Source: www.nzherald.co.nz

Top found tags: EN(1),cybercrime(2),New Zealand(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Powerful New Banking Malware called Dyreza EmergesLocation: Center for Strategic and International Studies - Washington, United States
Date published: 18-06-2014

Security researchers said they've spotted a new type of banking malware that rivals the capabilities of the infamous Zeus malware.The malware, which is being called \"Dyreza\" or \"Dyre,\" uses a man-in-the-middle attack that lets the hackers intercept unencrypted web traffic while users mistakenly... Read more

Source: www.computerworld.in

Top found tags: trojan(2),cybercrime(4),financial sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK forges close cyber ties with China despite endemic espionageLocation: Beijing, China
Date published: 18-06-2014

As the US continues to take a hard line with China over alleged criminal hacking of American companies, UK cyber investigators have quietly forged relationships with their counterparts in China, the Guardian has learned.Over the past six months, at least two meetings between the UK National Crime Ag... Read more

Source: www.theguardian.com

Top found tags: cyber espionage(2),United Kingdom(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Botnets: a serious threat to the webLocation: New York, United States
Date published: 18-06-2014

Transparency and cooperation are the key to tackling the hackers using infected computers to commit cybercrime.botnet is a collection of computers infected by malware. The infected computers, known as zombies, are under the control of a hacker a so-called bot herder using a command-and-contr... Read more

Source: www.spiked-online.com

Top found tags: website(1),DoS(2),cybercrime(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police Commissioner supports Neighbourhood Watch Week in South YorkshireLocation: York, United States
Date published: 18-06-2014

Police chiefs in South Yorkshire are using Neighbourhood Watch Week to push crime prevention advice around fraud and cyber crime.Neighbourhood Watch groups across the region are urging residents to be aware of scams and to step up their security processes, pointing out that members have been targete... Read more

Source: www.thestar.co.uk

Top found tags: threat(1),government(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android smartphones shipping from factory with malwareLocation: Google HQ - Mountain View, United States
Date published: 18-06-2014

Hardware being shipped with viruses or malware is not a new thing. In the past, there have been flash drives that were accidentally infected at the factory and made it into customers' hands. However, in the new age we live in, where nothing can be trusted, there becomes an increased paranoia in tru... Read more

Source: betanews.com

Top found tags: malware(3),Google Play(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Darkness Still LurksLocation: Microsoft HQ - Redmond, United States
Date published:

Darkness, a.k.a. Optima, is a bot that majors in performing distributed denial-of-service (DDoS) attacks. This botnet is an old one that has been in the Russian cybercrime underground market for a long time. Since 2013, there has been no new update and so most variants are down. According to our bot... Read more

Source:

Top found tags: Microsoft(2),update(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Iranian Cyber Espionage: A Troubling New EscalationLocation: Teheran, Iran
Date published: 16-06-2014

Anyone following the development of Irans cyber capabilities is not surprised that Iran has slowly become a significant power in the cyber arena. Recently, a long term Iranian cyber espionage campaign in the United States was uncovered that made use of social engineering and phishing in ord... Read more

Source: www.rightsidenews.com

Top found tags: United States(2),government(4),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
\'Referendum\' organisers to extend poll after cyberattacks on electronic voting systemLocation: Hong Kong, China
Date published: 18-06-2014

Organisers of Occupy Central say they will extend voting on Fridays referendum on electoral reform from three days to 10 days after its electronic system was targeted by hackers.The system, set up to accept advance registrations, has been hit by more than 10 billion cyberattacks since it wa... Read more

Source: www.scmp.com

Top found tags: social media(2),cybercrime(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Slow internet? Maybe you have one of 120,000 vulnerable broadband routersLocation: Nominum HQ - Redwood City, United States
Date published: 19-06-2014

Is your home internet running slow? Is your monthly internet bill larger than you expected?Perhaps your home broadband router is one of the 120,000 used by Australians that is vulnerable to a new type of scam being leveraged by criminals who use them to launch cyber attacks.The vulnerability, which ... Read more

Source: www.smh.com.au

Top found tags: vulnerability(1),website(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Internet\'s Aswarm In Denial Of Service Attacks And It\'s Getting WorseLocation: Arbor Networks - Burlington, United States
Date published: 18-06-2014

The denial of service attack gets few props for novelty in a field that prizes novelty. In a denial of service (DoS) attack, hackers flood a Web site or application with pointless requests that clog or overwhelm network resources and potentially shut it down. DoS is a cudgel, not a lockpick designed... Read more

Source: www.forbes.com

Top found tags: hackers(1),DoS(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UNH Cyber Forensics Unit Partners with the DC3Location: University of New Hampshire School - Concord, United States
Date published: 17-06-2014

University of New Haven students will join the national effort to combat cybercrime now that the university has become one of just 13 colleges nationwide, and the first in Connecticut, to form a partnership with the Defense Cyber Crime Center (DC3), under an agreement announced recently. The partner... Read more

Source: www.dfinews.com

Top found tags: government(4),United States(4),education(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trinidad And Tobago Media Group Wants Cybercrime Legislation RevisitedLocation: New York, United States
Date published: 18-06-2014

PORT OF SPAIN, Trinidad, CMC The Trinidad and Tobago Publishers and Broadcasters Association (TTPBA) is calling on the coalition peoples Partnership government to redraft and revise legislation aimed at clamping down on computer hacking that opposition legislators have warned could seriously ... Read more

Source: jamaica-gleaner.com

Top found tags: legislation(2),financial sector(6),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MHA wants cyber unit in each districtLocation: New York, United States
Date published: 19-06-2014

The home minister stressed on the need for providing latest and most advanced training to the state police personnel by cyber expertsTaking the fight against cybercrime to a whole new level, home minister Rajnath Singh has directed the ministrys top brass to explore the possibility of setting up ... Read more

Source: www.asianage.com

Top found tags: police(1),training(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nigeria: Ey Raises Alarm Over Cybercrime, Widespread CorruptionLocation: Lagos, Nigeria
Date published: 19-06-2014

Ernst & Young, EY has raised fresh alarm over the increase in cybercrime which continue to affect companies' performance globally, even as bribery and corruption has spread across the countries in various sectors of the economy as 88 per cent of respondents in a survey conducted by EY have emphasiz... Read more

Source: allafrica.com

Top found tags: threat(1),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Woman held for sending lewd SMSs to cop, wifeLocation: New York, United States
Date published: 19-06-2014

AURANGABAD: A 40-year-old woman was arrested on Wednesday under the Information Technology (IT) Act for sending lewd messages to an assistant sub-inspector (ASI), his wife and their son.The cyber crime branch sleuths arrested the accused, who is a widow, and handed her over to MIDC Waluj police stat... Read more

Source: timesofindia.indiatimes.com

Top found tags: SMS(1),cybercrime(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft issues patch for Malware Protection Engine vulnerabilityLocation: Microsoft HQ - Redmond, United States
Date published: 18-06-2014

Microsoft issued an advisory on Tuesday warning users of vulnerability that exists in its Malware Protection Engine, which if left unpatched could allow an attacker to disable its security products through a malformed file sent as an attachment.Along with the advisory, Microsoft has also released an... Read more

Source: www.techienews.co.uk

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Darkness Still LurksLocation: Microsoft HQ - Redmond, United States
Date published:

Darkness, a.k.a. Optima, is a bot that majors in performing distributed denial-of-service (DDoS) attacks. This botnet is an old one that has been in the Russian cybercrime underground market for a long time. Since 2013, there has been no new update and so most variants are down. According to our bot... Read more

Source:

Top found tags: Microsoft(2),update(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Long Live Macro Threats!Location: Microsoft HQ - Redmond, United States
Date published: 17-06-2014

Whenever we refer to macro threats, we are reminded of those malicious macros in the old days which infect Microsoft Office documents. Contrary to popular belief, macro threats havent completely disappeared. Even with many new security features added to Microsoft Office and even with the improve... Read more

Source: blog.fortinet.com

Top found tags: cybercrime(2),cyber security(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malicious Google Play Clone Steals Banking CredentialsLocation: Google HQ - Mountain View, United States
Date published: 18-06-2014

Malicious Google Play Clone Steals Banking Credentials Google, FireEye disrupt sneaky Android malware operation. FireEye and Google have dismantled part of a mobile malware operation that stole online banking credentials from Android users via a malicious and stealthy app posing as Google Play. The ... Read more

Source: www.darkreading.com

Top found tags: cybercrime(3),cyber security(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ending Cybersecurity Labor Shortage Will Take TimeLocation: RAND Corporation HQ - Santa Monica, United States
Date published: 18-06-2014

Ending Cybersecurity Labor Shortage Will Take Time Researchers at RAND say the industry has taken the right steps, but there is still a long way to go. Overwrought CISOs, take heart: You may be short-staffed now, but the best seeds for solving the shortage may have already been planted, and now we j... Read more

Source: www.darkreading.com

Top found tags: telecom sector(2),government(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Security Decisions In A World Without TrueCryptLocation: Microsoft HQ - Redmond, United States
Date published: 18-06-2014

Data Security Decisions In A World Without TrueCrypt The last days of TrueCrypt left many unanswered questions. But one thing is certain: When encryption freeware ends its life abruptly, being a freeloader can get you into a load of trouble. The sudden demise of the encryption freeware TrueCrypt has... Read more

Source: www.darkreading.com

Top found tags: cyber security(4),government(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security Pro File: Spam-Inspired Journey From Physics To SecurityLocation: SANS - Bethesda, United States
Date published: 17-06-2014

Security Pro File: Spam-Inspired Journey From Physics To Security SANS Internet Storm Center director Johannes Ullrich talks threat tracking, spam, physics -- and his pick for the World Cup. Johannes Ullrich was a physicist in the late 1990s when he set up a new cable modem connection for his home L... Read more

Source: www.darkreading.com

Top found tags: social media(2),cyber security(8),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Scope Of SAP Bugs Still Plagues EnterprisesLocation: New York, United States
Date published: 17-06-2014

Scope Of SAP Bugs Still Plagues Enterprises As SAP closes its 3,000th security vulnerability, ERP experts expound on the dangers of these vulns and enterprises' continued head-in-the-sand attitude about them. On the occasion of SAP recently closing its 3,000th vulnerability, experts in the niche fi... Read more

Source: www.darkreading.com

Top found tags: cyber security(2),information security(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime: the scourge of the digital economyLocation: National Crime Agency - London, United Kingdom
Date published: 18-06-2014

'Now is the time for boards to focus on the issue of cybercrime' In the wake of numerous online breaches and cyber-attacks, cybercrime seems rampant. The implications of a cyber attack are both financially and emotionally costly for governments, businesses and consumers alike. Whilst many countrie... Read more

Source: www.information-age.com

Top found tags: financial sector(6),telecom sector(8),cybercrime(13)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Will full encryption sideline Google\'s targeted ads?Location: Google HQ - Mountain View, United States
Date published: 18-06-2014

Mining personal data to deliver targeted ads is the lifeblood of Googles businessand of many other online firms. But what if that data dries up at the source? Google released an early version of a new tool recently that will provide full end-to-end encryption for email. Its a supe... Read more

Source: www.pcworld.com

Top found tags: telecom sector(2),United States(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
British spies are allowed to intercept Google and Facebook traffic, official saysLocation: London, United Kingdom
Date published: 17-06-2014

British spies are allowed to intercept Google and Facebook traffic, official says British spies are authorized to spy on British citizens Internet communications transiting through servers outside the U.K., a civil rights group has discovered. Privacy International uncovered the information as p... Read more

Source: www.pcworld.com

Top found tags: United Kingdom(2),government(3),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AWS console breach leads to demise of service with \proven\ backup planLocation: Microsoft HQ - Redmond, United States
Date published: 18-06-2014

closed after someone gained unauthorized access to its Amazon Web Service account and deleted most of the customer data there. Wednesday's demise of Code Spaces is a cautionary tale, not just for services in the business of storing sensitive data, but also for end users who entrust their most valua... Read more

Source: arstechnica.com

Top found tags: cyber security(2),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker taunts arrested comrade after someone drops dime to FBILocation: Paris, France
Date published: 18-06-2014

Continuing variations on a theme, the FBI has arrested yet another alleged hacktivist based on information provided by a confidential informant. This time, FBI agents from the bureaus Chicago field office nabbed Timothy Justin French, who the Justice Department claims was a member of a g... Read more

Source: arstechnica.com

Top found tags: government(3),social media(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Undergrad breaks Android crypto ransomwareLocation: Google HQ - Mountain View, United States
Date published: 17-06-2014

Further Reading WARNING Your phone is locked! Crypto ransomware makes its debut on Android The rapid evolution of cryptoware that extorts hefty payments continues. Early in June, Ars reported the discovery of Android/Simplocker, whichappeared to be the first cryptographic ransomware Trojan... Read more

Source: arstechnica.com

Top found tags: trojan(2),malware(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
This top turns see-through if you leave personal data exposedLocation: Google HQ - Mountain View, United States
Date published: 17-06-2014

A Brooklyn-based designer has created a 3D-printed sculptural boob tube to spark social commentary on the state of privacy in a data-driven worldby making the top gradually more sheer. X.pose's striking black webbed rubber structure was engineered using a Stratasys printer, molded to the body to... Read more

Source: arstechnica.com

Top found tags: vulnerability(1),cyber security(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The public/private imperative to protect the gridLocation: Department of Homeland Security - Washington, United States
Date published: 16-06-2014

Last week, three high-powered flares erupted from the Sun in a single 24-hour period, emitting electro-magnetic energy particle toward Earth and throughout the Solar System. The flares were categorized as X-class flares, capable of inflicting damage to the electrical grid.Also last week, a power sta... Read more

Source: www.federaltimes.com

Top found tags: cyber security(4),DHS(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Alleged Associate of NullCrew Arrested on Federal Hacking Charge Involving Cyber Attacks on Companies and UniversitiesLocation: Paris, France
Date published: 16-06-2014

CHICAGO--(ENEWSPF)--June 16, 2014. A Tennessee man was arrested and charged with federal computer hacking for allegedly conspiring to launch cyber attacks on two universities and three companies since last summer, federal law enforcement officials announced today. The defendant, TIMOTHY JUSTIN FRENC... Read more

Source: www.enewspf.com

Top found tags: government(4),United States(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MALWARE DETECTED TARGETING U.S., UK MOBILE-BANKING APPSLocation: Kaspersky HQ - Moscow, Russia
Date published: 17-06-2014

A new form of a mobile Trojan virus appears to target online banking, and it potentially could place multiple banks customers at risk. More than 100 million Americans use mobile banking.Kaspersky Lab says is has detected the malicious software, called Svpeng, operating in the U.S. and UK. It comb... Read more

Source: www.pymnts.com

Top found tags: malware(4),telecom sector(6),financial sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Two in five NZ kids harmed by cybercrime - reportLocation: Wellington, New Zealand
Date published: 16-06-2014

Symantec (NASDAQ:SYMC) today announced findings from its Norton Report: Family Edition which revealed two in five (43 percent) New Zealand children have been harmed by cybercrime and/or a negative online situation during 2012-2013. The annual report has been released to coincide with this years C... Read more

Source: nz.news.yahoo.com

Top found tags: information security(2),New Zealand(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pittsburgh cybersquad leads way in fighting cybercrimeLocation: Pittsburgh, United States
Date published: 16-06-2014

Picture hundreds of thousands of computers, secretly enslaved to a distant puppet master who orders them to snatch funds, up to seven figures, from their owners bank accounts. Where does the world turn for help?In the past month, a coalition involving the Pittsburgh office of the FBI, a Carnegie ... Read more

Source: www.post-gazette.com

Top found tags: malware(4),government(5),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HACKER SCARCITY LEAVES US ILL-PREPARED TO COMBAT SECURITY THREATLocation: RAND Corporation HQ - Santa Monica, United States
Date published: 18-06-2014

A study by nonprofit research organisation, RAND Corporation has found that there is a nationwide shortage of skilled cyber-security professionals to protect organisations from cyber crime, posing risk to US national and homeland security.The report claims that the shortage of skilled cyber security... Read more

Source: www.cbronline.com

Top found tags: government(5),cybercrime(6),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The great cyber heistLocation: Nelson, United States
Date published: 19-06-2014

An intricate cyber crime attack that went undetected for days and culminated over a weekend enabled a criminal syndicate to siphon off millions of rands from a Road Traffic Management Corporation bank account.Allegedly using hi-tech computer software to steal the money - which includes millions of r... Read more

Source: www.timeslive.co.za

Top found tags: financial sector(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
High School Students Attend Boot Camp to Fight Cyber CrimeLocation: San Diego, United States
Date published: 18-06-2014

Some of San Diegos most computer-savvy high school students are learning how to hack a network in order to prepare themselves for a career in cyber security.Two dozen students from three local high schools are spending this week at Cyber Boot Camp in the San Diego offices of ESET, an internationa... Read more

Source: timesofsandiego.com

Top found tags: cybercrime(2),education(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Educating the end user and eliminating the biggest security riskLocation: Londen, United Kingdom
Date published: 19-06-2014

'The most effective way the CIO can deliver practical and memorable education is to make it real' When weighing up the biggest security hazards to an organisation, it may come as a surprise to discover that the end user within the organisation is often the first to compromise security. Through no ... Read more

Source: www.information-age.com

Top found tags: United Kingdom(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

2014 FIFA World Cup: Top Four Online ScamsLocation: Brasilia-Federal District, Brazil
Date published: 18-06-2014

The games have began and we arent just talking about football. Unsolicited emails: Beware of spam emails that say youre the lucky winner of a lottery for two free tickets to the World Cup, or promises to give you free access to Websites that let you watch the matches live. By clicking on tho... Read more

Source: blog.fortinet.com

Top found tags: cyber security(4),financial sector(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Problem With Cyber InsuranceLocation: Wall Street, New York City, New York, United States
Date published: 17-06-2014

The Problem With Cyber Insurance Insurers have yet to develop an evidence-based method to assess a company's cyber risk profile. This has resulted in high premiums, low coverage, and broad exclusions. Cyber insurance is one of the fastest growing segments in the insurance industry. With the tremend... Read more

Source: www.darkreading.com

Top found tags: data breach(2),data theft(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AT&T sends letter to victims of phone unlocking data breachLocation: AT&T HQ - Dallas, United States
Date published: 18-06-2014

AT&T has begun mailing out letters to customers affected by a data breach that allowed employees of a service provider to access customer account information, including customers dates of birth and Social Security numbers. The data was exposed in April through a system used to obtain unl... Read more

Source: arstechnica.com

Top found tags: government(2),United States(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Six Data Breach Lessons from the TrenchesLocation: Experian HQ - Dublin,Ireland
Date published: 16-06-2014

As the era of Big Data continues to march forward, so does the number of data breaches. Organizations seem to become more vulnerable every day with breaches rising at an alarming rate. In fact, studies, such as \"Quantifying the Data Breach Epidemic\" from IBM, indicate that companies are attacked a... Read more

Source: www.itbusinessedge.com

Top found tags: data breach(2),Ponemon Institute(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IT Security Stories to Watch: AT&T Data Breach, World Cup Web AttacksLocation: AT&T HQ - Dallas, United States
Date published: 16-06-2014

AT&T (T) was a hacking victim, the 2014 FIFA World Cup's website and related websites were hit with DDoS attacks last week, and HP (HPQ) introduced new data protection solutions. Those were three of the big security headlines managed service providers (MSPs) should be looking at this week.Controlli... Read more

Source: mspmentor.net

Top found tags: government(3),cybercrime(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Insurance Adds to Data Breach CostsLocation: New York Times - New York, United States
Date published: 16-06-2014

The average cost of a data breach can be between $1 million and $3 million dollars, according to NetDiligence, a cyber risk management firm, reported by Phys.org. This number ought to trouble small businesses because it could easily bring a company to bankruptcy.There are many areas of risk that a c... Read more

Source: www.idt911blog.com

Top found tags: United States(2),cybercrime(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AT&T confirms data breach as hackers hunted for codes to unlock phonesLocation: AT&T HQ - Dallas, United States
Date published: 16-06-2014

AT&T Mobility (NYSE: T) confirmed that three employees of one of its vendors, which it did not name, accessed an unknown number of customers' personal information, including Social Security numbers and call records, between April 9 and April 21. The hackers were not after credit card information or... Read more

Source: www.fiercewireless.com

Top found tags: data breach(2),financial sector(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The AT&T Data Breach May Affect Your Banking So Watch Out!Location: AT&T HQ - Dallas, United States
Date published: 16-06-2014

It seems that hackers and cyber bullies are getting a lot of nerve these days, so they go after larger and larger companies. If you remember the news in May, we alerted everybody to change their eBay passwords, as over 140 million user accounts have been hacked.Also in May we reported that Spotify g... Read more

Source: www.gadgetgestures.com

Top found tags: data breach(2),financial sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
One in 10 Americans has been affected by a large health data breachLocation: New York, United States
Date published: 17-06-2014

More than 1,000 medical record breaches involving 500 or more people have been reported to HHS since federal reporting requirements took effect nearly five years ago.HIPAA: How the law has evolvedand what's in store HHS has been tracking data breaches since September 2009, when the HIPAA breach ... Read more

Source: www.advisory.com

Top found tags: health sector(2),medical sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime Thrives Amid Lack of National Data Security Standards for RetailersLocation: Center for Strategic and International Studies - Washington, United States
Date published: 17-06-2014

Six months ago, the nation first learned of what is one of the largest breaches of consumer data in American history when news broke of a massive data breach at Target stores during the holiday shopping season. In the time since, the absence of action to create national data security standards for r... Read more

Source: www.huffingtonpost.com

Top found tags: telecom sector(4),cybercrime(5),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Patient data breach at San Diego hospitalLocation: San Diego, United States
Date published: 18-06-2014

SAN DIEGO -- Southern California's Rady Children's Hospital says the private health data of more than 20,000 young patients was mistakenly shared with a handful of job applicants.U-T San Diego reported Tuesday (http://bit.ly/1lUL6qx) that in one breach this month a Rady employee emailed a spreadsh... Read more

Source: www.miamiherald.com

Top found tags: financial sector(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Govt refuses to support data breach notification billLocation: Coal, United States
Date published: 19-06-2014

Says legislation needs more work.The Coalition Government has refused to back a reinvigorated bill that would force companies to notify customers of a data breach, saying while it agrees with the concept in principle, the proposed legislation needs more work.In March this year Labor Senator Lisa Sin... Read more

Source: www.itnews.com.au

Top found tags: cyber security(2),data breach(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Tokenization System Could Put An End To Identity TheftLocation: New York, United States
Date published: 18-05-2014

MIAMI (CBSMiami) With so much talk of databreaching, hacking, and identity theft many people are concerned about their personal information.Massive breaches of consumer information, after all, have been reported what seems more often lately.I was pretty frustrated when I found out that my inf... Read more

Source: miami.cbslocal.com

Top found tags: identity theft(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Europe\'s top court to review personal data exchange between EU and USLocation: Facebook - Menlo Park, United States
Date published: 18-06-2014

The Irish High Court has referred to a 14-year-old agreement governing the exchange of personal data between the European Union and the U.S. to the EUs top court. The referral, on Wednesday, came in a case over whether the Irish Data Protection Commissioner was right to refuse to investigate Fac... Read more

Source: www.pcworld.com

Top found tags: social media(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nokia paid millions in ransom to stop release of signing key in 2007Location: Helsinki, Finland
Date published: 18-06-2014

Finnish law enforcement is currently investigating a blackmail case involving Nokia and an unknown person, according to local media. On Tuesday, MTV News in Finland reported for the first time that in 2007, Nokia paid millions of euros to someone who had acquired the Symbian encryption signing key... Read more

Source: arstechnica.com

Top found tags: report(1),smartphone(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
For Internet Explorer 11 users, no update now means no security fixesLocation: Microsoft HQ - Redmond, United States
Date published: 17-06-2014

When Microsoft released the Windows 8.1 Update, IT feathers were ruffled by Microsoft's decision to make it a compulsory update: without it, Windows 8.1 systems would no longer receive security fixes. As spotted by Computerworld's Gregg Keizer, Microsoft is applying the same rules, at least in par... Read more

Source: arstechnica.com

Top found tags: Microsoft(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Flying Blind in Critical InfrastructureLocation: Iron, United States
Date published: 17-06-2014

The root problem with SCADA security is that control systems have been built on the concept that devices can be trusted.Since everything else about SCADA is based on the concept that devices can never be trusted (Sure, the temperature in the boiler should stay at such-and-such, but I would like t... Read more

Source: ics-isac.org

Top found tags: ICS (1),SCADA (1),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CYBER INSURANCE FOR CRITICAL INFRASTRUCTURE: DOES FLO EVEN KNOW?Location: Department of Homeland Security - Washington, United States
Date published: 17-06-2014

You cant turn a television on today without seeing one of the nations most beloved insurance icons Flo from Progressive insurance. We enjoy her whimsical plays on how to get the best price for an insurance policy, but I wonder at what point will these commercials hype cyber?On June... Read more

Source: www.tripwire.com

Top found tags: DHS(4),government(4),United States(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pair faces over 70 fraud related chargesLocation: Ontario, Canada
Date published: 17-06-2014

Two Calgarians are accused of being involved in a cheque and credit card fraud operation that allegedly bilked almost $200,000 from Canadian financial institutions.The Economics Crimes Unit was contacted in December 2012 by an investigator from a financial institution who gave them information on tw... Read more

Source: calgary.ctvnews.ca

Top found tags: police(1),credit card(2),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
French Side Hit By ATM SkimmingLocation: Paris, France
Date published: 16-06-2014

MARIGOT, Saint Martin -- Many users of Automated Teller Machines (ATM) on the French side during the past week have unwittingly become victims of fraudulent withdrawals from their accounts, leading the Gendarmerie to open an investigation and issue an advisory warning.Unconfirmed reports suggest aro... Read more

Source: news.caribseek.com

Top found tags: report(1),skimming(1),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Thai cyber police step up royal slur patrolsLocation: Bangkok, Thailand
Date published: 16-06-2014

Thailands military is bolstering its self-designated role as protector of the monarchy with increased cyber patrols to root out critics of the king following last months coup. The junta has clamped down on any opposition to its overthrow of an elected government, with a crackdown on perc... Read more

Source: www.dailytimes.com.pk

Top found tags: United Kingdom(2),United Arab Emirates(3),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Geohot Towelroot Exploit Roots Galaxy S5 Devices On AT&T And VerizonLocation: Galax, United States
Date published: 16-06-2014

The Towelroot Android rooting software has been released for the Samsung (OTCMKTS:SSNLF) Galaxy S5 for AT&T (NYSE:T) and Verizon Wireless by George Hotz, also known as Geohot, a developer known for his role in creating jailbreak software for Apple Inc. (NASDAQ:AAPL) iOS devices.On Sunday, Hotz unvei... Read more

Source: www.ibtimes.com

Top found tags: website(1),financial sector(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile malware started with Cabir a decade ago: KasperskyLocation: Kaspersky HQ - Moscow, Russia
Date published: 16-06-2014

Security vendor traces back the malware of today to the discovery of a mobile phone worm from 2004Kaspersky Labs collection of mobile malware now contains more than 340,000 of unique malware samples, with more than 99 per cent targeting Android.According to the security vendor, the state of today... Read more

Source: www.arnnet.com.au

Top found tags: antivirus(2),Kaspersky Lab(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
After US and Japan, India most affected by online banking malware: reportLocation: Trend Micro - Cupertino, United States
Date published: 17-06-2014

New Delhi: The use of Internet has improved the overall banking services in India, but, it has also led to a heightened activity by cyber criminals making the country the third most affected globally by online malwares, a report by cyber security firm Trend Micro said. According to Trend Micros J... Read more

Source: tech.firstpost.com

Top found tags: trend(1),financial sector(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police tell UK public they have only hours to combat GameOver Zeus malwareLocation: National Crime Agency - London, United Kingdom
Date published: 16-06-2014

Two weeks ago, the National Crime Agency had a scary message for computer users up and down the United Kingdom.That was Monday 2 June. At the time of writing its late in the evening on Monday 16 June.By my reckoning, therefore, the two week opportunity for [the] UK to reduce [the] threat from ... Read more

Source: grahamcluley.com

Top found tags: Zeus(1),financial sector(2),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
F-Secure: Malware-riddled Windows XP needs to \'hurry up and die\'Location: Microsoft HQ - Redmond, United States
Date published: 18-06-2014

HELSINKI: F-SECURE CAN'T QUITE BELIEVE that Microsoft's 2001 operating system (OS) Windows XP is still in circulation and being used regularly by millions of consumers and businesses, due to its insufficient level of security.Speaking at a roundtable event at the F-Secure labs in Helsinki, Finland... Read more

Source: www.theinquirer.net

Top found tags: government(2),Microsoft(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CCTV released after skimming device found on ATMLocation: London, United Kingdom
Date published: 18-06-2014

CCTV images of two men police want to speak to about a skimming device have been released.The device was discovered on an ATM at Sawtry Post Office in Green End Road at about 8pm on May 1.The device was spotted by a member of the public who reported it to the shopkeeper. It is not thought anyone use... Read more

Source: www.aboutmyarea.co.uk

Top found tags: report(1),skimming(1),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tech firms vulnerable to spying and industrial espionageLocation: Dublin, Ireland
Date published: 19-06-2014

Last month it was reported that British intelligence agency MI5 had, in a series of high-level meetings, painted a worrying picture for leading British corporations in which their IT workers may become targets for foreign powers seeking sensitive data.The idea of an IT department infiltrated with do... Read more

Source: www.irishtimes.com

Top found tags: Trend Micro(2),United Kingdom(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FG, stakeholders seek co-ordinated approach on cyber securityLocation: Lagos, Nigeria
Date published: 19-06-2014

As fraud and insecurity increasingly become more IT based globally, government and other industry stakeholders came together in Lagos yesterday to fashion out a workable blue print to protect Nigeria from cyber security vulnerability.To the organisers, which included the Office of the National Secur... Read more

Source: businessdayonline.com

Top found tags: United States(2),government(3),Nigeria(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spyware Found On Chinese-Made SmartphoneLocation: G Data Software - Bochum, Germany
Date published: 19-06-2014

Spyware Found On Chinese-Made Smartphone Unknown manufacturer ships smartphones loaded with app that could allow a hacker to steal personal data or spy on the user, German researcher says. A smartphone called the Star N9500 comes pre-loaded with spyware that could enable an attacker to steal persona... Read more

Source: www.darkreading.com

Top found tags: China(2),Germany(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Trojan duikt op door stelen browserLocation: Amsterdam, The Netherlands
Date published: 18-06-2014

Security experts vonden een nieuwe trojan, die is ontstaan door SSL-beveiliging te ontduiken. Met het Trojaanse paard worden gegevens van internetbankieren buitgemaakt.DyreDeze schadelijke software wordt Dyreza of Dyre genoemd en wordt geopend via linkjes in mails. Deze mails lijken op facturen en w... Read more

Source: www.marqit.nl

Top found tags: cybercrime(3),financial sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

Smartphone vol spyware te koop op AmazonLocation: G Data Software - Bochum, Germany
Date published: 17-06-2014

De Star N9500 lijkt een koopje. De Chinese smartphone kost amper 160 dollar als je hem bestelt op Amazon. Helaas zit hij tjokvol spyware.Enkele Duitse klanten van IT-beveiligingsbedrijf G Data ontdekten dat hun nieuwe smartphone zich vreemd gedroeg. Hij bleek soms vanzelf nieuwe apps te installeren.... Read more

Source: www.standaard.be

Top found tags: spyware(1),financial sector(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

No advisories for today, maybe tomorrow!


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish