Under construction

New design coming soon!

CIC News engine statistics

CIC News for 22-06-2014 contains 117 articles: cybercrime(17),cyber security(46),data breach(10),other(44)

CIC News update contains 81 English and 36 Dutch articles for today.
There are 7 published advisories, 0 are English and 7 are Dutch.
In today's English news articles:
- 13 related to cybercrime
- 39 related to cyber security
- 10 related to data breach and identity theft
- 19 for the category other news

In today's Dutch news articles:
- 4 related to cybercrime
- 7 related to cyber security
- 25 for the category other news

Have fun reading.

English cybercrime related news

Android and Windows Phone to get kill switchLocation: New York City, New York, United States
Date published: 20-06-2014

Google and Microsoft have announced they are to add a security kill-switch to their Android and Windows Phone operating systems. The move is aimed at reducing smartphone theft by building in a feature that can make the device useless if stolen. US authorities, in particular, have been calling for mo... Read more

Source: www.computerweekly.com

Top found tags: United States(6),government(7),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI, NYPD Form Financial Cybercrime Task ForceLocation: New York City, New York, United States
Date published: 20-06-2014

The FBI has formed a new cybercrime task force with the New York Police Department and the Metropolitan Transit Authority whose job will be to go after high-level financial cyber crimes, employing a model of interagency cooperation that the bureau and other federal law enforcement agencies have used... Read more

Source: threatpost.com

Top found tags: United States(2),financial sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bitcoin miner lurking on FacebookLocation: Facebook - Menlo Park, United States
Date published: 19-06-2014

Facebook users, beware: a new viral campaign aimed at saddling you with a Bitcoin mining Trojan has been spotted. "The virus spreads through private Facebook messages, received from one of the victim s trusted Facebook friends," explains Bitdefender's Alexandra Gheorghe. "It reads 'hahaha ' and c... Read more

Source: net-security.org

Top found tags: telecom sector(2),trojan(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LinkedIn Responds to Criticism of its SSL ImplementationLocation: LinkedIn HQ - Mountain View, United States
Date published: 20-06-2014

LinkedIn said that a majority of its users are not affected by the SSL issue reported by security company Zimperium. According to Zimperium, an attacker could launch a man-in-the-middle [MITM] attack leveraging a SSL stripping technique to steal a user's credentials and gain control of a victim's ... Read more

Source: securityweek.com

Top found tags: social media(2),telecom sector(2),The Netherlands(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security Researchers Warn of New Dyre Banking TrojanLocation: Center for Strategic and International Studies - Washington, United States
Date published: 20-06-2014

Researchers at CSIS and PhishMe recently uncovered a new type of banking malware, called Dyre or Dyreza, that's designed to bypass SSL protection and steal banking credentials. On June 13, 2014, PhishMe researchers warned of a new malware strain they called Dyre, being delivered via phishing emails... Read more

Source: www.esecurityplanet.com

Top found tags: trojan(2),cybercrime(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2012 RCE bug is still highly exploited in targeted attacks, Trend Micro findsLocation: Trend Micro - Cupertino, United States
Date published: 20-06-2014

Study indicates that SQL injection continues to be a pervasive threat A 2012 RCE flaw is the most commonly exploited bug related to targeted attacks in the second half of 2013, according to Trend Micro. A remote code execution vulnerability disclosed sometime around April 2012 was named by Trend Mic... Read more

Source: www.scmagazine.com

Top found tags: Hong Kong(2),Trend Micro(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hong Kong polling site suffers massive DDoS attackLocation: Hong Kong, China
Date published: 20-06-2014

An online polling site intended to gauge the support for universal suffrage in Hong Kong was hit by a large distributed denial-of-service (DDoS) attack Tuesday. Created by the University of Hong Kong and Hong Kong Polytechnic University, popvote.hk is intended to measure the support for a grassroots... Read more

Source: www.scmagazine.com

Top found tags: government(2),Hong Kong(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US government leaks bitcoin bidder email list in accidental \'gaff\'Location: Will, United States
Date published: 19-06-2014

US government leaks bitcoin bidder email list in accidental 'gaff'. A list of prospective bidders for a significant haul of US-government seized bitcoins has been leaked by the very administration that is organising the auction. Related: Fake US government bitcoin scam spreading Trojan through Twi... Read more

Source: itproportal.com

Top found tags: trojan(2),government(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
#YO_NO! Messaging app \'Yo\' gets hit by hackersLocation: Georgia Institute of Technology - Atlanta, United States
Date published: 20-06-2014

Just days after the Yo app debuted to much fanfare (and head-scratching), the mono-message social tool has fallen prey to hackers. A group of students from Georgia Tech University claim via TechCrunch to have accessed the application's entire user database, and gained the ability to obtain the phon... Read more

Source: go.theregister.com

Top found tags: Twitter(1),social media(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers reverse-engineer NSA spy kit using off-the-shelf partsLocation: Oss, Oss, Noord-Brabant, The Netherlands
Date published: 19-06-2014

Last year Edward Snowden leaked the NSA's Advanced Network Technology catalog, a listing of the hardware and software tools the agency makes available to agents for spying. Now enterprising security experts are using the catalog to build similar tools using available electronics. The team, led by M... Read more

Source: go.theregister.com

Top found tags: United States(2),government(4),Hack In The Box(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crooks use Synology NAS boxen to mine Dogecoin, yells DellLocation: Dell HQ - Round Rock, United States
Date published: 19-06-2014

Dell says skilled attackers have made a staggering $620,000 in the Dogecoin crypto-currency by exploiting vulnerable Synology network attached storage (NAS) boxes. The clever hackers pulled off the largest heist of its kind by planting mining gear on the NAS boxes to borrow their computational might... Read more

Source: go.theregister.com

Top found tags: SANS(1),vulnerability(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PoW! Academics KO Bitcoin mining mammothsLocation: Miner, United States
Date published: 19-06-2014

Researchers have scuttled Bitcoin mining mammoths such as GHash with a proposed system alteration that would end the money-making collectives and return fairness and stability to the crypto currency. Cornell University academics (@IttalyEyal) Ittay Eyal and Emin Gn Sirer ( @el33th4xor) say their "... Read more

Source: go.theregister.com

Top found tags: website(1),financial sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Darkness Still LurksLocation: Microsoft HQ - Redmond, United States
Date published:

Darkness, a.k.a. Optima, is a bot that majors in performing distributed denial-of-service (DDoS) attacks. This botnet is an old one that has been in the Russian cybercrime underground market for a long time. Since 2013, there has been no new update and so most variants are down. According to our bot... Read more

Source:

Top found tags: Microsoft(2),update(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Amazon EC2 control panel hack submarines hosting providerLocation: Twitter - San Francisco, United States
Date published: 19-06-2014

Updated 1:38 p.m ET: After prominent source-code hosting provider Code Spaces was forced to shutter its operations following an attack against its Amazon Web Services (AWS) control panel that deleted troves of irreplaceable customer data, a second provider has reported similar AWS infrastructure com... Read more

Source: searchsecurity.techtarget.com

Top found tags: social media(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google\'s backward step on Android app privacyLocation: Google HQ - Mountain View, United States
Date published: 20-06-2014

Google, explaining its new "simplified" permissions model for Android applications. "This information can help you make an informed decision more easily on whether you would like to install the app." Except that it doesn't. It's broken. It's more like a dumbing down than a simplification. And it ... Read more

Source: www.zdnet.com

Top found tags: social media(2),update(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft, Google announce progress against smartphone theftLocation: Microsoft HQ - Redmond, United States
Date published: 19-06-2014

Microsoft and Google announced on Thursday new features in their phone operating systems to combat smartphone theft. Smartphone theft, known as "Apple picking" in some cases, has become a significant crime in some parts of the country. Law enforcement and prosecutors have been pressing the industry ... Read more

Source: www.zdnet.com

Top found tags: update(2),United States(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CloudFlare acquires VPN service CryptoSeal, shuts it downLocation: Cloud, United States
Date published: 19-06-2014

Announcing the acquisition, CloudFlare's CEO Matthew Prince said it began shutting down CryptoSeal's VPN service last week and plans to fully retire the service by 30 June. CryptoSeal launched a cloud-based consumer and business VPN product early last year, however the company shuttered the consum... Read more

Source: www.zdnet.com

Top found tags: website(1),cyber security(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Europe\'s highest court to rule on Facebook NSA data-sharing caseLocation: Dublin, Ireland
Date published: 19-06-2014

Ireland's high court has referred a complaint over Facebook's practice of sharing data with US spy agencies to Europe's highest court. The Europe Court of Justice, which earlier this year struck down Europe's data retention directive for trampling on Europeans' privacy rights, will have a new l... Read more

Source: www.zdnet.com

Top found tags: social media(2),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI arrests alleged NullCrew hacktivistLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 19-06-2014

The US Department of Justice has charged a man who allegedly participated in high-profile cyberattacks against corporations, universities and government agencies. In a statement released Wednesday, the DoJ said Timothy French, 20, was arrested in Tennessee last week and is being charged with "federa... Read more

Source: www.zdnet.com

Top found tags: social media(4),government(5),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data privacy ambiguity may hamper Singapore\'s smart nation ambitionLocation: Singapore
Date published: 19-06-2014

and analytics to enable intelligent urban living. However, unanswered questions about the management of such data, which cuts across government agencies and private entities, could prevent Singapore from realizing its smart nation dream. The Singapore government introduced several initiatives this p... Read more

Source: www.zdnet.com

Top found tags: health sector(2),medical sector(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
This Tool Boosts Your Privacy by Opening Your Wi-Fi to StrangersLocation: New York City, New York, United States
Date published: 20-06-2014

wifi [gallery-il] Getty In an age of surveillance anxiety, the notion of leaving your Wi-Fi network open and unprotected seems dangerously naive. But one group of activists says it can help you open up your wireless internet and not only maintain your privacy, but actually increase it in the process... Read more

Source: wired.com

Top found tags: Bruce Schneier(4),cyber security(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
House Votes To Cut Key Pursestrings For NSA SurveillanceLocation: National Security Agency - Fort Meade, United States
Date published: 20-06-2014

ff_nsadatacenter_f [gallery-ca] The NSAs Bluffdale, Utah data center. Credit: Name Withheld; Digital Manipulation: Jesse Lenz The House of Representatives may have only passed a puny attempt to reform the NSAs surveillance activities last month. But on Thursday evening it swung back with a s... Read more

Source: wired.com

Top found tags: United States(2),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
House Amendment Limits Funding for NSA SurveillanceLocation: National Security Agency - Fort Meade, United States
Date published: 20-06-2014

The House of Representatives last night overwhelmingly passed an amendment to the Department of Defense Appropriations Act that would cut funding for two programs that grant intelligence agencies access to the private data and communications of U.S. citizens. The amendment shows that Congress is wil... Read more

Source: threatpost.com

Top found tags: NSA(2),United States(4),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Plaintext Supermicro IPMI Credentials ExposedLocation: San Diego, United States
Date published: 20-06-2014

Much has been written about the insecurity of the IPMI protocol present inside embedded baseboard management controllers (BMCs). Serious vulnerabilities can be exploited to gain remote control over big servers running BMCs, in particular in hosting environments where the controllers help admins with... Read more

Source: threatpost.com

Top found tags: research(1),vulnerability(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Research Project Pays People to Download, Run ExecutablesLocation: Microsoft HQ - Redmond, United States
Date published: 19-06-2014

Its been well documented that people will give up their computer passwords for a piece of chocolate. But what would they be willing to give up for a dollaror even a penny? Plenty as it turns out. Incentivized by a minimal amount of cash, computer users who took part in a study conducted by ex... Read more

Source: threatpost.com

Top found tags: Windows(1),cybercrime(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critical flaw exposes admin passwords of nearly 32,000 serversLocation: New York, United States
Date published: 20-06-2014

Over 30,000 servers with Supermicro baseboard management controllers (BMCs) on their motherboards are offering up administrator passwords to anyone who knowns where to look, warns Zachary Wikholm, a senior security engineer with the Security Incident Response Team of hosting provider CARI.net. This ... Read more

Source: net-security.org

Top found tags: SANS(1),vulnerability(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whitepaper: Planning a career path in cybersecurityLocation: New York, United States
Date published: 20-06-2014

The field of cybersecurity is growing quickly; so quickly that there are positions sitting open waiting to be filled by qualified individuals. As a society, we have all become heavily dependent on computers, network, and data stores. This in turn has exposed us to the risk of loss or compromise of t... Read more

Source: net-security.org

Top found tags: EN(1),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Court decides bank is not to blame for $440k cybertheftLocation: Missouri, United States
Date published: 19-06-2014

In many ways, small businesses are the perfect target for money hungry cyber crooks. Smaller companies are unlikely to have dedicated IT employees, making it less likely they would notice a breach, or that employees with follow security policies (if they are put in place at all). On the other hand, ... Read more

Source: net-security.org

Top found tags: financial sector(2),security measures(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Code hosting Code Spaces destroyed by extortion hack attackLocation: New York, United States
Date published: 19-06-2014

Cloud code hosting service Code Spaces is forced to shut down, as a DDoS attack coupled with an unsuccessful extortion attempt was followed by the attacker deleting most of its code repositories and backups. According to the notice on the service's website, the DDoS attack started on Tuesday. The c... Read more

Source: net-security.org

Top found tags: website(1),cybercrime(2),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The future of cloud computingLocation: Cloud, United States
Date published: 19-06-2014

North Bridge Venture Partners, in conjunction with Gigaom Research and 72 collaborating organizations, today released results for its Future of Cloud Computing survey. This survey analyzed the inhibitors and drivers behind cloud adoption, separating the hype surrounding the cloud from genuine indust... Read more

Source: net-security.org

Top found tags: survey(1),trend(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sir Tim Berners-Lee to open IP EXPO EuropeLocation: Microsoft HQ - Redmond, United States
Date published: 19-06-2014

In his first address to the core IT community of IP EXPO Europe, Sir Tim will outline his 2050 vision for the web and how businesses will use it for competitive advantage. Above all, he ll look at how businesses - and the people who lead them - will shape the next phase of the web s remarkable devel... Read more

Source: net-security.org

Top found tags: Microsoft(1),privacy(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Devices To Target Gluttony, Stupidity, PrivacyLocation: Target HQ - Minneapolis, United States
Date published: 20-06-2014

New Devices To Target Gluttony, Stupidity, Privacy Inspired by the self-serving Amazon Fire, industry leaders in packaged food, gambling, and government services will release a slate of new mobile devices in time for Christmas. Hot on the heels of Amazons buy stuff from Amazon phone, a f... Read more

Source: www.informationweek.com

Top found tags: United States(2),government(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Risk Intelligence: What You Don Know is Most Definitely Hurting YouLocation: Paris, France
Date published: 20-06-2014

Cyber Risk Intellitence Growing up, one of my fathers favorite sayings was luck favors the prepared. I must have heard it a thousand times over the years. It was almost always spoken just after some sad scenario where I had failed to stay alert, informed and aware, thus my ending up at a... Read more

Source: securityweek.com

Top found tags: cybercrime(4),cyber security(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Play Store Update Changes Permissions, And Not For The BetterLocation: Google HQ - Mountain View, United States
Date published: 19-06-2014

One of the reasons that mobile OSes such as iOS and Android are more secure than their desktop counterparts is that they include very robust controls over app permissions. Each app requests from the user and operating system permissions that, in theory, are limited to what they need. As applied, the... Read more

Source: trendmicro.com

Top found tags: Google(4),Google Play(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Multiparty authentication and cryptosystems in the IoT part 2Location: New York, United States
Date published: 19-06-2014

Weak or expensive: the old cryptosystem and techniques dont scale to the IoT There are basically two models for authentication of Internet relationships, one is weak (shared key) and one is expensive (public key), and neither will address the full range of identity and access requirements in the... Read more

Source: blogs.mcafee.com

Top found tags: vulnerability(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Parenting 101: Raising Responsible Digital CitizensLocation: Lea, United States
Date published: 19-06-2014

Yes, yes I know. Being a parent, there are 101 things to be done every day. And you are probably thinking I am asking too much by suggesting you raise digitally aware kids. For this, it means you have to be a digital citizen who knows his/her way in the cyber world and can advise kids on correct beh... Read more

Source: blogs.mcafee.com

Top found tags: security measures(2),social media(4),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Office in the cloud: What are you waiting for?Location: New York, United States
Date published: 21-06-2014

Concerns are largely unfounded, and cloud services are already being used by many companies without them realising says Aidan Simister. Office in the cloud: What are you waiting for? Office in the cloud: What are you waiting for? Despite the fact that it has had such a transformational effect on so ... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(2),ISP(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA warrantless tapping to be reined in?Location: National Security Agency - Fort Meade, United States
Date published: 20-06-2014

"This is what should happen when a democracy gets the opportunity to check itself in the mirror and recalibrate" - Tony Kenyon, A10 Networks. NSA warrantless tapping to be reined in? NSA warrantless tapping to be reined in? Last month was the first anniversary of NSA whistleblower Edward Snowden's ... Read more

Source: www.scmagazineuk.com

Top found tags: telecom sector(4),United States(4),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
\'App shaping\' key to securing the cloud on a budgetLocation: Londen, United Kingdom
Date published: 20-06-2014

One of the hot topics at this week's Identity Management conference in London was how to secure cloud-computing resources on a tight budget. 'App shaping' key to securing the cloud on a budget 'App shaping' key to securing the cloud on a budget Whilst this may seem a misnomer, given the cost ad... Read more

Source: www.scmagazineuk.com

Top found tags: security management(2),financial sector(4),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICYMI: NSA friendships, cloud concerns & Android flawsLocation: Google HQ - Mountain View, United States
Date published: 20-06-2014

This week's In Case You Missed It column looks at NSA friendships, concerns on the cloud and the latest flaw affecting Android users. ICYMI: NSA friendships, cloud concerns & Android flaws ICYMI: NSA friendships, cloud concerns & Android flaws NSA's unlikely friendship with Germany The latest reve... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(4),government(8),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why driverless cars demand new rules of the roadLocation: Trend Micro - Cupertino, United States
Date published: 20-06-2014

There's issues around the big data emitted by driverless cars, security issues related to control of the cars, but it's the 'governance framework' that needs to be put in place first suggests Raimund Genes. Why driverless cars demand new rules of the road Why driverless cars demand new rules of ... Read more

Source: www.scmagazineuk.com

Top found tags: Trend Micro(2),cyber security(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Student discovers antidote to malware, SimplockerLocation: Sussex, United States
Date published: 19-06-2014

Yesterday, Simon Bell, a student at the University of Sussex, publically released the antidote to Simplocker a cryptographic ransomware Trojan targeted at Android devices, that has caused quite a buzz in the tech world, recently. According to Bell, the antidote was incredibly easy to create b... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(2),malware(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Talk stresses IoT concerns as today\'s problemsLocation: Lewis, United States
Date published: 19-06-2014

Talk stresses IoT concerns as today's problems At SC Congress Toronto IoT is seen as today's problem. As the number of devices connected to the internet skyrockets, the industry will be forced to become more judicious about securing and analyzing the influx of data, experts shared at SC Congress T... Read more

Source: www.scmagazine.com

Top found tags: security measures(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Code Spaces shuts down following DDoS extortion, deletion of sensitive dataLocation: New York, United States
Date published: 19-06-2014

Regulators close firm after costly attack Code Spaces shuts down after being hit with a DDoS attack and then having its sensitive data deleted. Code Spaces recently became one of the roughly 60 percent of small businesses that fold within six months of experiencing a cyber attack. It began on Tuesda... Read more

Source: www.scmagazine.com

Top found tags: cyber security(2),DoS(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
House committee says \'inaccurate\' info prompted FTC\'s LabMD complaintLocation: Federal Trade Commission - Washington, United States
Date published: 19-06-2014

A congressional committee has called into question information provided to the FTC in an ongoing data security case. On Tuesday, Darrell Issa, the chairman the House Committee on Oversight and Government Reform, wrote a letter (PDF) to the Federal Trade Commission about the committee's concerns ... Read more

Source: www.scmagazine.com

Top found tags: FTC(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security professionals: End users are the biggest headacheLocation: New York, United States
Date published: 19-06-2014

Security professionals: End users are the biggest headache. Business security specialist Bromium has released the results of a survey of over 300 IT security professionals looking at endpoint threats. It finds that the majority believe end users to be the biggest security headache, that existing sec... Read more

Source: itproportal.com

Top found tags: phishing(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Infosec bods try Big Data in search for better anti-virus mousetrapLocation: Symantec HQ - Mountain View, United States
Date published: 20-06-2014

Infosec house Panda Security is looking to Big Data and application monitoring as a means to achieve better malware detection. The launch of Panda Advanced Protection Service (PAPS) is a response to the widely known shortcomings of signature-based anti-virus detection as well as a means for Panda to... Read more

Source: go.theregister.com

Top found tags: cybercrime(2),information security(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
32,000 motherboards spit passwords in CLEARTEXT!Location: New York, United States
Date published: 20-06-2014

Thousands of Supermicro baseboard management controllers (BMCs) continue to spit administrator passwords in cleartext after a patch described as unsuitable was not applied by admins. Accessing the machines could be dead simple for the tech savvy; vulnerable boxes would pop during a net or Shodan sca... Read more

Source: go.theregister.com

Top found tags: SANS(1),vulnerability(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LinkedIn ignored SIX WARNINGS about account-hijacking bugLocation: LinkedIn HQ - Mountain View, United States
Date published: 20-06-2014

LinkedIn accounts can be hijacked through simple man in the middle (MITM) attacks due to a failure to promptly fix a SSL stripping vulnerability . The flaw described ambitiously as a zero-day vulnerability allowed attackers to gain full control of a user's account after they had logged in via SSL. ... Read more

Source: go.theregister.com

Top found tags: social media(2),telecom sector(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft: NSA security fallout \'getting worse\' ... \'not blowing over\'Location: Microsoft HQ - Redmond, United States
Date published: 19-06-2014

2013 Cyber Risk Report Microsoft's top lawyer says the fallout of the NSA spying scandal is "getting worse," and carries grim implications for US tech companies. In a speech at the GigaOm Structure conference in San Francisco on Thursday, Microsoft general counsel Brad Smith warned attendees that u... Read more

Source: go.theregister.com

Top found tags: Microsoft(2),cyber security(6),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
World still standing? It\'s been two weeks since Cryptolocker, Gameover Zeus takedown by fedsLocation: National Crime Agency - London, United Kingdom
Date published: 19-06-2014

Two weeks have passed since the feds knackered the systems doling out the GameOver ZeuS and CryptoLocker malware to PCs. G-men warned us the world had just a fortnight to clean up compromised Windows machines and defend them from the software nasties before their masters regrouped. That time has pas... Read more

Source: go.theregister.com

Top found tags: malware(4),cybercrime(5),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Columbia U boffins HACK GOOGLE PLAY to check appsLocation: Google HQ - Mountain View, United States
Date published: 19-06-2014

It's the app developer's equivalent of hiding the door keys under the mat: researchers from Columbia University have found Android apps containing the developers' secret keys. That's a more serious issue than the old don't re-use passwords: the thousands of credentials embedded by devel... Read more

Source: go.theregister.com

Top found tags: social media(2),telecom sector(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Are your third-party vendors leaving the door open to hackers?Location: Target HQ - Minneapolis, United States
Date published: 20-06-2014

By now, every security professional in the world should know the story about Fazio Mechanical Services. The Pennsylvania-based company specializes in heating, air conditioning and refrigeration services, and numerous large companies, including Target, trusted Fazio for its HVAC expertise. Fazio s le... Read more

Source: net-security.org

Top found tags: cybercrime(3),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Identity theft consequences and tips to stay secureLocation: Los Angeles, United States
Date published: 19-06-2014

In this interview, Tom Feige, CEO of idRADAR, shares alarming identity theft stories, explains the consequences of getting your identity stolen, offers advice to organizations that want to prevent their employees from becoming victims of identity theft, and more. What is the most astonishing identit... Read more

Source: net-security.org

Top found tags: education(2),identity theft(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
P.F. Chang\'s Data Breach Could Go Back MonthsLocation: Beijing, China
Date published: 19-06-2014

The breach at P.F. Chang's China Bistro may have stretched on longer than some thought. According to reports, the breach may go back as far as September 2013, roughly nine months before it was first discovered. According to Krebs on Security, Visa issued an alert June 17 to a bank notifying them th... Read more

Source: securityweek.com

Top found tags: data breach(2),financial sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Using DDoS to Distract Infosec StaffLocation: Neustar - Sterling, United States
Date published: 19-06-2014

Your organization is more likely to come under a distributed denial of service (DDoS) attack than ever before, according to a new report. But if you end up on the receiving end of a DDoS attack, that may be the least of your worries. That's because hackers are using DDoS attacks as decoys to occupy... Read more

Source: www.esecurityplanet.com

Top found tags: ISP(2),telecom sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Email Breaches Expose Over 37,000 People\'s Data at California CollegesLocation: Experian HQ - Dublin,Ireland
Date published: 19-06-2014

California's College of the Desert and Riverside Community College District (RCCD) both recently acknowledged that employee error had resulted in the potential exposure of personal data by email. On May 30, 2014, an email containing RCCD student records was sent to an incorrect email address by mis... Read more

Source: www.esecurityplanet.com

Top found tags: education(2),security measures(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Buyer Beware: This Smartphone Comes with Malware Pre-LoadedLocation: McAfee - Santa Clara, United States
Date published: 20-06-2014

The Star N9500 is, by all means, an inoffensive clone of a better-designed smartphone. Its body, and many of its features, are seemingly lifted from Samsungs Galaxy S4 smartphone. It uses cheaper, lower-quality parts but supplants these defects with an enticing offer: a $217 price tag, according... Read more

Source: blogs.mcafee.com

Top found tags: cyber security(4),financial sector(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Five Habits For Top Marketers To PracticeLocation: McAfee - Santa Clara, United States
Date published: 19-06-2014

Lately, Ive been seeing quite a few articles online about characteristics of successful people, productive people, energetic people you name it, its out there. While some of these pieces provide sound advice, many times the suggestions that are made are more about personal characteristic... Read more

Source: blogs.mcafee.com

Top found tags: identity theft(2),social media(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rex Mundi: How did Domino\'s incident response line up?Location: Brussel, Belgium
Date published: 19-06-2014

Get your incident response plan in place, and practice it if you want to ensure you're back up and running quickly following a breach says Ted Julian. Rex Mundi: How did Domino's incident response line up? Rex Mundi: How did Domino's incident response line up? The message came in via email, self ... Read more

Source: www.scmagazineuk.com

Top found tags: data breach(2),social media(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Insurers petition, retail group complaint, raise specter of who pays for breachLocation: New York, United States
Date published: 20-06-2014

Report: Data breaches up 62 percent in 2013 Report: Data breaches up 62 percent in 2013 With data breaches on the rise and seemingly no end to the damage that a breach can have on an organization, the issue of who pays has heated up as an insurer petitions a court to find it's not required to defen... Read more

Source: www.scmagazine.com

Top found tags: United States(2),telecom sector(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nearly 8,500 notification letters sent out in Metropolitan Companies breachLocation: New York City, New York, United States
Date published: 20-06-2014

About 8,500 notification letters are being sent out to individuals employed by, or who submitted an application for employment to, New York-based The Metropolitan Companies, Inc. alerting them that an unauthorized third party may have gained access to their personal information, including Social... Read more

Source: www.scmagazine.com

Top found tags: cyber security(2),identity theft(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Researchers find critical Android security problem in Google PlayLocation: Google HQ - Mountain View, United States
Date published: 20-06-2014

Researchers at Columbia University School of Engineering have discovered a critical security problem in Google Play, the official Android app store. They developed a tool called PlayDrone that uses various hacking techniques to circumvent Google security to download Google Play apps and recover thei... Read more

Source: www.computerweekly.com

Top found tags: Google Play(2),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Emails Show Feds Asking Florida Cops to Deceive JudgesLocation: New York, United States
Date published: 20-06-2014

marshals Police in Florida have, at the request of the U.S. Marshals Service, been deliberately deceiving judges and defendants about their use of a controversial surveillance tool to track suspects, according to newly obtained emails. At the request of the Marshals Service, the officers using so-ca... Read more

Source: wired.com

Top found tags: United States(4),government(5),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google, Microsoft to Implement Mobile Kill Switch\Location: San Francisco, California, United States
Date published: 19-06-2014

Google and Microsoft will incorporate remote kill switch features into the default builds of their respective mobile operating systems for the first time. Oddly enough, the announcement comes in a joint press release issued by New York Attorney General, Eric Schneiderman, and San Francisco District ... Read more

Source: threatpost.com

Top found tags: government(3),mobile device(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Possible TrueCrypt Fork in the WorksLocation: Green, United States
Date published: 19-06-2014

Although the developers behind the TrueCrypt encryption software have given up the ghost and decided to no longer maintain the application, interest in the project has never been higher. But, one of the developers says that a nascent effort to fork TrueCrypt is unlikely to succeed. Matthew Green, a ... Read more

Source: threatpost.com

Top found tags: vulnerability(1),backdoor(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TrueCrypt developer says forking the software is impossibleLocation: Green, United States
Date published: 20-06-2014

Even though a number of people have expressed interest in continuing the development of TrueCrypt, the future of these projects is questionable as one of the TrueCrypt developers feels that "forking" the software would not be a good idea. This statement, posted on Pastebin, comes as a reply to a inq... Read more

Source: net-security.org

Top found tags: legislation(1),research(1),Anonymous(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Demand for PaaS on the riseLocation: Berlin, Germany
Date published: 20-06-2014

A new age of Develop Your Own Application (DYOA) to meet ever-changing business requirements is driving demand for rapid application development Platform-as-a-Service (PaaS) technologies. According to a survey of 700 IT decision makers in the US, UK, France, Germany, Benelux, Australia, Brazil and S... Read more

Source: net-security.org

Top found tags: survey(1),trend(1),Germany(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Scan of Google Play apps reveals thousands of secret keysLocation: Google HQ - Mountain View, United States
Date published: 19-06-2014

A team of researchers from Columbia University has downloaded and decompiled over 880,000 applications found on Google Play, and has discovered - among other things - that app developers often embed their secret authentication keys in the apps, which can lead to attackers stealing server resources o... Read more

Source: net-security.org

Top found tags: Google Play(2),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Most European businesses face a tech deficitLocation: Berlin, Germany
Date published: 19-06-2014

A tech deficit currently affects 72% of European businesses and leads to a gap between what businesses need to achieve and what their infrastructure can support. When compared with their European counterparts, UK companies are amongst the most prepared with 64% citing they face a moderate or signifi... Read more

Source: net-security.org

Top found tags: research(1),trend(1),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whitepaper: VoIP vulnerabilitiesLocation: New York, United States
Date published: 19-06-2014

Are you thinking of switching to or investing in a VoIP system for your company? VoIP offers numerous benefits - ease of use and reduced cost being just two - but with increased benefits can come increased risk. This whitepaper will honestly and succinctly assess the vulnerabilities associated with ... Read more

Source: net-security.org

Top found tags: EN(1),threat(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Lawmakers Pass Bill to Curb NSALocation: National Security Agency - Fort Meade, United States
Date published: 21-06-2014

WASHINGTON, June 20, 2014 (AFP) - The US House of Representatives approved late Thursday a bill that would restrict the electronic surveillance powers of the National Security Agency (NSA). The margin was wide, 293 to 123, for the bill attached to the defense budget for 2015, which begins October 1.... Read more

Source: securityweek.com

Top found tags: social media(2),United States(4),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bromium CTO Explains Promise of Secure by DesignLocation: Crosby, United States
Date published: 20-06-2014

Bromium has been working on creating a technology that enables users to be secure by design. The company leverages the open-source Xen hypervisor as the basis for building a microkernel that provides security for an end-user device. In a video interview, Simon Crosby, co-founder and CTO of Bromium, ... Read more

Source: www.esecurityplanet.com

Top found tags: research(1),threat(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Play store update means Android app permissions can be changed without consentLocation: Google HQ - Mountain View, United States
Date published: 20-06-2014

As part of a recent update to the Google Play store, Android users with automatic updates enabled are no longer required to review or accept permissions included in a permissions group already accepted for that app. Not long after, a Reddit user set out to find exactly what that means, and how it co... Read more

Source: www.scmagazine.com

Top found tags: Google(3),Google Play(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft and Google to release smartphones with \'kill switch\'Location: Microsoft HQ - Redmond, United States
Date published: 20-06-2014

Future smartphones released by tech giants Microsoft and Google will include a kill switch feature that would allow users to disable the devices if they're lost or stolen. Upcoming Microsoft devices will include additional security features that will allow for remote data wiping, render the... Read more

Source: www.scmagazine.com

Top found tags: United States(2),government(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
United Security Bank settles with TRC oil firm for $350KLocation: New York, United States
Date published: 20-06-2014

A Fresno, Calif., bank has settled with an oil production firm after fraudulent Ukrainian wire transfers stole more than $200,000 from the oil firm's accounts. United Security Bank and TRC Operation Co. Inc. settled for $350,000 earlier this week, according to The Business Journal. In 2011, 12 unau... Read more

Source: www.scmagazine.com

Top found tags: legislation(1),Ukraine(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government announces 5m fund to boost college broadbandLocation: Hancock, United States
Date published: 19-06-2014

Government announces 5m fund to boost college broadband. The government has revealed a plan to boost technology with the intention of helping further education institutions. Skills and Enterprise Minister Matthew Hancock has announced a 5m fund to upgrade broadband connections in colleges from 2... Read more

Source: itproportal.com

Top found tags: training(1),education(3),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Surprise Android \'KitKat\' update fixes nasty OpenSSL vulnLocation: Google HQ - Mountain View, United States
Date published: 20-06-2014

Android fans who are hoping Google will debut a new version of the OS at its annual I/O conference in San Francsico next week might be in for a disappointment ... because the company is rolling out a new version this week. On Friday, the Chocolate Factory published firmware images of Android 4.4.4 ... Read more

Source: go.theregister.com

Top found tags: vulnerability(1),update(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is storage a security issue? Or is security a storage issue?Location: New York, United States
Date published: 20-06-2014

Live Chat If youre struggling to reconcile the demands of ramping up storage while keeping the data secure, AND ensuring application availability, youre not alone. At least you wont be this afternoon, because well be running a Live Chat at 1400 BST, where we will talk through the tec... Read more

Source: go.theregister.com

Top found tags: EN(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US marshals leak list of possible Bitcoin buyersLocation: Paris, France
Date published: 19-06-2014

The U.S. Marshals Service's auction for the for 29,656.51306529 Bitcoin it seized from online recreational pharmaceuticals purveyor Silk Road has gone off the rails after the Service accidentally spilled a list of interested parties. Coindesk reports that an email sent to those asking for informati... Read more

Source: go.theregister.com

Top found tags: website(1),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CloudFlare slurps CryptoSealLocation: Cloud, United States
Date published: 19-06-2014

CryptoSeal, which got itself out of the consumer VPN business last year to sidestep the fate of Lavabit, have been snapped up by CloudFlare. The Y Combinator-funded operation shuttered its consumer VPN service because it said complying with a government demand for an individual's data could only be... Read more

Source: go.theregister.com

Top found tags: CloudFlare(1),EN(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Android-ransomware verspreidt zich via porno en downloadersLocation: Google HQ - Mountain View, United States
Date published: 19-06-2014

Een vorm van ransomware die bestanden op Android-toestellen versleutelt blijkt zich via internetporno en Trojan-downloaders te verspreiden. Het gaat om de Simplocker-ransomware, die foto's, filmpjes en documenten op de SD-geheugenkaart van Android-toestellen met AES-encryptie versleutelt. Gebruiker... Read more

Source: www.security.nl

Top found tags: malware(2),trojan(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bank bosses finally get the memo on cyber securityLocation: Federal Financial Institutions Examination Council - Washington D.C., United States
Date published: 20-06-2014

Cyber-criminals large and small are targeting banks and other financial institutions for monetary gain, but smart companies are reacting with bigger cyber security budgets, new technologies and innovative schemes to improve security awareness. Bank bosses finally get the memo on cyber security Bank ... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(6),cybercrime(8),financial sector(20)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nederlander voor 7.500 euro opgelicht via Airbnb-scamLocation: Amsterdam, The Netherlands
Date published: 22-06-2014

Een Nederlandse internetondernemer is voor 7.500 euro opgelicht toen hij dacht via Airbnb een grote villa in Ibiza te boeken, maar in werkelijkheid geld naar een oplichter overmaakte. Daarnaast is de man ook nog eens slachtoffer van identiteitsfraude geworden omdat zijn persoonlijke gegevens zijn ge... Read more

Source: www.security.nl

Top found tags: scam(1),cybercrime(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Miljoenendiefstal emissierechten door besmette e-mailbijlageLocation: Den Haag, The Netherlands
Date published: 22-06-2014

Drie criminelen die voor miljoenen euro's aan emissierechten wisten te stelen gebruikten besmette e-mailbijlagen om toegang tot de systemen van hun slachtoffers te krijgen. Dat laat n van hen tegenover persbureau Reuters weten. Het gaat om de Brit Matthew Beddoes, alias 'Black Dragon'. Hij we... Read more

Source: www.security.nl

Top found tags: trojan(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

NSA heeft geen tekort aan security professionalsLocation: National Security Agency - Fort Meade, United States
Date published: 19-06-2014

Volgens een nieuw rapport van een Amerikaans onderzoeksbureau is er met name binnen de Amerikaanse overheid een tekort aan cybersecurity professionals, maar heeft de NSA ondanks alle onthullingen van klokkenluider Edward Snowden geen problemen om openstaande vacatures te vullen. Dat beweert de RAND ... Read more

Source: www.security.nl

Top found tags: cyber security(4),United States(6),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android-apps vormen privacyrisico door lekken sleutelsLocation: Google HQ - Mountain View, United States
Date published: 19-06-2014

Onderzoekers hebben een beveiligingslek in veel Android-apps uit Google Play ontdekt dat privgegevens van gebruikers in gevaar kan brengen. Ze kwamen erachter dat veel ontwikkelaars geheime sleutels opslaan in de code van hun apps. Deze sleutels worden gebruikt om te communiceren met sociale media... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Google Play(2),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nieuwe wet moet privacyschending makkelijker makenLocation: New York, United States
Date published: 20-06-2014

Tweemaal is de privacyschendwet CISPA in de Amerikaanse senaat afgeknald maar opnieuw doen politici een poging. Ditmaal is de P van Protection eruit gehaald en heet een nieuw wetsvoorstel CISA, de Cybersecurity Information Sharing Act. Het wetsvoorstel van twee senatoren, een Republikein en een Demo... Read more

Source: webwereld.nl

Top found tags: legislation(2),United States(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LinkedIn wuift kritiek op SSL-onveiligheid wegLocation: LinkedIn HQ - Mountain View, United States
Date published: 19-06-2014

LinkedIn moet haast maken met de implementatie van volwaardige encryptie. Tot die tijd blijft de dienst kwetsbaar voor profielkapers, waarschuwen beveiligers. Mobiel securitybedrijf Zimperium legt de vinger bij LinkedIn op de zere plek. Het zakelijke sociale netwerk werkt nog altijd aan een volwaard... Read more

Source: webwereld.nl

Top found tags: information security(2),United States(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EFF-tool zet wifi-routers open voor meer anonimiteitLocation: Amsterdam, The Netherlands
Date published: 22-06-2014

Een nieuwe tool van de Amerikaanse burgerrechtenbeweging EFF zet wifi-routers open zodat anderen er gebruik van kunnen maken, wat de anonimiteit voor de router-eigenaar moet vergroten. De tool is een firmware-update voor de router, die een deel van de verbinding voor anderen toegankelijk maakt. De f... Read more

Source: www.security.nl

Top found tags: update(2),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google koopt fabrikant beveiligingscamera\'s DropcamLocation: Google HQ - Mountain View, United States
Date published: 22-06-2014

Google heeft voor een bedrag van 555 miljoen dollar Dropcam overgenomen, een fabrikant van beveiligingscamera's. Dropcam bouwt camera's waarmee opgenomen beelden in de cloud worden opgeslagen. Ook is het mogelijk om de live camerabeelden met anderen te delen. Daarnaast kunnen gebruikers waarschuwi... Read more

Source: www.security.nl

Top found tags: privacy(1),scam(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EFF-tool zet wifi-routers open voor meer anonimiteitLocation: Amsterdam, The Netherlands
Date published: 22-06-2014

Een nieuwe tool van de Amerikaanse burgerrechtenbeweging EFF zet wifi-routers open zodat anderen er gebruik van kunnen maken, wat de anonimiteit van de router-eigenaar moet vergroten. De tool is een firmware-update voor de router, die een deel van de verbinding voor anderen toegankelijk maakt. De fi... Read more

Source: www.security.nl

Top found tags: update(2),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

"Lakse operationele veiligheid nekte scriptkiddies"Location: Federal Bureau of Investigation - Washington D.C., United States
Date published: 19-06-2014

Door lakse operationele veiligheid, zoals het gebruik van eigen IP-adressen en het niet verwijderen van oude nicknames, heeft de FBI twee leden van de NullCrew weten aan te houden, zo laat n van de groepsleden weten. NullCrew was betrokken bij tientallen aanvallen op bedrijven en organisaties. G... Read more

Source: www.security.nl

Top found tags: Skype(1),telecom sector(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Play-kloon steelt bankwachtwoorden en sms\'jesLocation: Google HQ - Mountain View, United States
Date published: 19-06-2014

Een kwaadaardige Android-app die zich voordoet als Google Play blijkt in werkelijkheid bankwachtwoorden, sms-berichten en certificaten met bijbehorende sleutels te stelen. De verzamelde informatie wordt vervolgens naar een Gmai-adres gestuurd, zo meldt beveiligingsbedrijf FireEye. Hoe de malware zic... Read more

Source: www.security.nl

Top found tags: Google(2),Google Play(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Windows-malware veroorzaakt Blue Screen of DeathLocation: Microsoft HQ - Redmond, United States
Date published: 19-06-2014

Microsoft waarschuwt dat een bekende malware-familie op computers met Windows 7 het gevreesde Blue Screen Of Death (BSOD) veroorzaakt, waarschijnlijk omdat de malware alleen op Windows XP is getest. Het gaat om de Rovnix-bootkit, die al sinds 2011 actief is en aanvullende malware op pc's installeer... Read more

Source: www.security.nl

Top found tags: NL(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bedrijf sluit deuren nadat aanvaller alle data verwijdertLocation: Amsterdam, The Netherlands
Date published: 19-06-2014

Een provider die diensten aanbood waarmee organisaties projecten en softwareontwikkeling konden managen heeft de deuren gesloten nadat een aanvaller toegang tot de online infrastructuur kreeg en bijna alle data wist te verwijderen. Dat laat het bedrijf Code Spaces op de eigen website weten. Code Spa... Read more

Source: www.security.nl

Top found tags: NL(1),research(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Wet in VS tegen NSA-backdoorsLocation: National Security Agency - Fort Meade, United States
Date published: 21-06-2014

Het Amerikaanse Huis van Afgevaardigden heeft een wetsvoorstel goedgekeurd waardoor de NSA bijvoorbeeld geen backdoors meer aan netwerkapparatuur mag aanbrengen. Het amendement stelt allerlei beperkingen aan de manieren waarop de NSA toegang tot communicatie kan krijgen, zoals e-mailverkeer, chatges... Read more

Source: www.beveiligingnieuws.nl

Top found tags: backdoor(2),government(3),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ransomware vergrendelt browsers Nederlandse internettersLocation: Ransom, United States
Date published: 21-06-2014

Naast ransomware die allerlei bestanden versleutelt, zijn er ook varianten die de browser van internetgebruikers vergrendelen. Het gaat hier om de Browlock- of Ransomlock-ransomware die meldt dat er een boete moet worden betaald. Via allerlei scripts probeert deze pagina te voorkomen dat gebruikers ... Read more

Source: www.beveiligingnieuws.nl

Top found tags: malware(1),NL(1),ransomware(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
KPN moet 140.000 euro betalen voor wissen back-up klantLocation: KPN HQ - Den Haag, The Netherlands
Date published: 21-06-2014

KPN moet schadevergoeding betalen aan een fysiotherapeute nadat het concern door een blunder alle gehoste bestanden van haar had gewist, tijdens het aanmaken van een nieuw account voor Back-up Online. KPN weigerde aanvankelijk de schade van 140.000 euro te betalen, maar de rechtbank oordeelt anders.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),financial sector(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google start met ontwikkeling van BoringSSLLocation: Google HQ - Mountain View, United States
Date published: 21-06-2014

Google heeft in Android 4.4.4 een kwetsbaarheid in OpenSSL verholpen. Maar de internetgigant is nu ook gestart met de ontwikkeling van een fork van OpenSSL, onder de naam BoringSSL. Google stelt dat het een aangepaste versie nodig heeft van de cryptografische software voor zijn eigen producten, zoal... Read more

Source: www.beveiligingnieuws.nl

Top found tags: vulnerability(1),Google(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft en Google voeren ook smartphone kill switch inLocation: Microsoft HQ - Redmond, United States
Date published: 20-06-2014

Na Apple voeren ook Google en Microsoft een kill switch in voor smartphones. De functionaliteit maakt een smartphone op afstand onklaar. Nieuwe data toont aan dat de anti-diefstalmethode echt werkt. Eerder was er verzet vanuit de telefoonindustrie, maar Google en Microsoft zijn nu ook over de streep... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),smartphone(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tool geeft toegang tot iCloud zonder wachtwoordLocation: Cloud, United States
Date published: 19-06-2014

Een commercile tool voor opsporingsdiensten maakt het mogelijk om toegang tot de iCloud-back-ups van een verdachte te krijgen zonder dat er een wachtwoord is vereist, hoewel er aan een aantal voorwaarden moet worden voldaan.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: iCloud(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft: NSA-schandaal schaadt onze businessLocation: Smith, United States
Date published: 20-06-2014

Het vertrouwen in de Amerikaanse techbedrijven keldert enorm en dat wordt alleen maar erger. Oorzaak: de NSA-onthullingen. Overheden veranderen hun inkoopbeleid ten nadele van Amerikaanse bedrijven en dat kan serieuze gevolgen hebben voor de verkoopcijfers. Volgens de topjurist van Microsoft, Brad S... Read more

Source: webwereld.nl

Top found tags: Microsoft(2),United States(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Parlement VS zet achterdeurtjes NSA op slotLocation: National Security Agency - Fort Meade, United States
Date published: 20-06-2014

Het Huis van Afgevaardigden legt onverwacht met twee wetswijzigingen de NSA aan de ketting. Zal het wat uitmaken? De NSA wordt verboden "om anderen te verzoeken of te bevelen om het ontwerp van hun producten of diensten aan te passen om elektronische surveillance mogelijk te maken", staat in een ame... Read more

Source: webwereld.nl

Top found tags: backdoor(2),government(3),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker delft miljoenen dogecoins op NAS-systemenLocation: Dell HQ - Round Rock, United States
Date published: 19-06-2014

Een Duitse hacker heeft NAS-dozen van Synology gepwnd en gebruikt voor het minen van Dogecoins. Hij is er volgens onderzoekers van Dell in ieder geval al meer dan 620.000 dollar rijker van geworden. Een hacker met de nickname Folio heeft kwetsbare opslagsystemen van Synology besmet met malware en de... Read more

Source: webwereld.nl

Top found tags: research(1),update (1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Thermostatenmaker Nest neemt bedrijf voor beveiligingscamera\'s overLocation: Google HQ - Mountain View, United States
Date published: 21-06-2014

Nest, het bedrijf dat slimme thermostaten maakt en onlangs door Google werd overgenomen, heeft zelf een bedrijf overgenomen. Het gaat om Dropcam, een start-up die beveiligingscamera's maakt en een clouddienst levert om de beelden op te slaan. De overname werd bekendgemaakt door Nest-topman Matt Rog... Read more

Source: tweakers.net

Top found tags: scam(1),smartphone(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaans parlement keert zich tegen NSA-backdoorsLocation: New York, United States
Date published: 20-06-2014

Het Amerikaanse Huis van Afgevaardigden heeft zich gekeerd tegen twee omstreden praktijken van de NSA, door de inlichtingendienst te verbieden zijn defensiebudget ervoor te gebruiken. Het gaat onder meer om het inbouwen van backdoors in hardware en software. NSAHet voorstel, dat met een overgrote me... Read more

Source: tweakers.net

Top found tags: backdoor(2),United States(4),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
\'Beveiligingslekken ontstaan ook automatisch\'Location: USENIX - Washington D.C., United States
Date published: 20-06-2014

Beveiligingslekken ontstaan ook buiten de waarneming van de ontwikkelaar van de software doordat compilers fouten introduceren, werd duidelijk op de USENIX-conferentie. De fouten ontstaan doordat ontwikkelaars in een programmeertaal coderegels schrijven die niet of niet goed worden omgezet in machin... Read more

Source: www.automatiseringgids.nl

Top found tags: research(1),vulnerability(1),conference(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Authorization model for home automationLocation: Apple HQ - Cupertino, United States
Date published: 19-06-2014

Smartphones promise to play an important role in the management and control of Home Automation (HA) solutions. When things and devices have either no or a constrained user interface (UI), the phone s display becomes more and more relevant to managing devices. Additionally, new capabilities for biome... Read more

Source: net-security.org

Top found tags: smartphone(3),mobile device(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bored yet? Now there\'s ANOTHER OpenSSL fork it\'s from GoogleLocation: Google HQ - Mountain View, United States
Date published: 21-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines With developers still struggling to plug vulnerabilities in the open source OpenSSL crypto library, Google has spun off a new fork of the project based on its own, internal work with the code, dubbed BoringSSL. "We have used a number of patc... Read more

Source: go.theregister.com

Top found tags: Google(2),OpenSSL(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google voegt eigen OpenSSL-fork toe aan ChromiumLocation: Google HQ - Mountain View, United States
Date published: 22-06-2014

Google heeft besloten om een eigen versie van OpenSSL aan Chromium toe te voegen, de opensourcebrowser die als basis voor Google Chrome dient, en mogelijk ook voor Android te gebruiken. Dat laat Google-ingenieur Adam Langley op zijn eigen blog weten. OpenSSL is software die wordt gebruikt voor het o... Read more

Source: www.security.nl

Top found tags: patch(1),Google(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft stopt ondersteuning oude Skype-versiesLocation: Microsoft HQ - Redmond, United States
Date published: 22-06-2014

Microsoft zal de komende maanden de ondersteuning van oude Skype-versies stoppen, wat inhoudt dat gebruikers gedwongen naar de meeste recente versie moeten upgraden als ze de populaire VoIP-software willen blijven gebruiken. Dat heeft Microsoft in een blogposting aangekondigd. Het gaat om Skype voor... Read more

Source: www.security.nl

Top found tags: Windows(1),telecom sector(2),Microsoft(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rusland wil Amerikaanse chips door eigen processor vervangenLocation: New York, United States
Date published: 22-06-2014

Het Russische Ministerie van Industrie en Handel is van plan om Amerikaanse chips en processoren van Intel en AMD door een eigen gefabriceerde processor te vervangen, zo laat de Russische krant Kommersant weten. Het gaat om de Baikal microprocessor, die zal worden ontworpen door T-Platforms. Deze pr... Read more

Source: www.security.nl

Top found tags: United Kingdom(2),United States(4),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoeker: nog 300.000 servers kwetsbaar voor HeartbleedLocation: Graham, United States
Date published: 22-06-2014

Twee maanden na de ontdekking van de ernstige Heartbleed-bug in OpenSSL zijn nog altijd 300.000 servers kwetsbaar, wat aangeeft dat systeembeheerders zijn gestopt met het patchen van hun servers, zo stelt beveiligingsonderzoeker Robert Graham aan de hand van eigen onderzoek. De Heartbleed-bug maakt ... Read more

Source: www.security.nl

Top found tags: SSL(1),webserver(1),OpenSSL(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google voegt eigen OpenSSL-fork toe aan ChromiumLocation: Google HQ - Mountain View, United States
Date published: 22-06-2014

Google heeft besloten om een eigen versie van OpenSSL aan Chromium toe te voegen, de opensourcebrowser die als basis voor Google Chrome dient, en mogelijk ook voor Android te gebruiken. Dat laat Google-ingenieur Adam Langley op zijn eigen blog weten. OpenSSL is software die wordt gebruikt voor het o... Read more

Source: www.security.nl

Top found tags: patch(1),Google(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft stopt ondersteuning oude Skype-versiesLocation: Microsoft HQ - Redmond, United States
Date published: 22-06-2014

Microsoft zal de komende maanden de ondersteuning van oude Skype-versies stoppen, wat inhoudt dat gebruikers gedwongen naar de meeste recente versie moeten upgraden als ze de populaire VoIP-software willen blijven gebruiken. Dat heeft Microsoft in een blogposting aangekondigd. Het gaat om Skype voor... Read more

Source: www.security.nl

Top found tags: Windows(1),telecom sector(2),Microsoft(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

IBM lost XSS kwetsbaarheid op in IBM WebSphere PortalLocation: IBM HQ - Armonk, United States
Date published: 20-06-2014

Samenvatting: IBM heeft een aantal Fix Packs uitgebracht waarin een kwetsbaarheid in WebSphere Portal worden opgelost. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om willekeurige javascript-code uit te voeren onder de rechten van een gebruiker en/of http sessies over te neme... Read more

Source: www.ncsc.nl

Top found tags: website(1),XSS(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in sendmailLocation: Amsterdam, The Netherlands
Date published: 20-06-2014

Samenvatting: FreeBSD heeft een update uitgebracht voor alle versies van FreeBSD die de kwetsbaarheid verhelpen. Gevolgen: Door een kwetsbaarheid in sendmail kan een kwaadwillende toegang krijgen tot alle open bestanden van het sendmail hoofdproces. Beschrijving: Een programmeerfout in sendmail voor... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in de Linux kernelLocation: Amsterdam, The Netherlands
Date published: 20-06-2014

Samenvatting: Red Hat heeft updates beschikbaar gesteld om twee kwetsbaarheden in de kernel te verhelpen. Misbruik van de kwetsbaarheden kan leiden tot een Denial-of-Service. Gevolgen: Misbruik van de kwetsbaarheden kan leiden tot een Denial-of-Service. Beschrijving: - CVE-2012-6638 Een onvolkomenhe... Read more

Source: www.ncsc.nl

Top found tags: NL(1),report(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
F5 verhelpt kwetsbaarheid in BIG-IP producten.Location: Amsterdam, The Netherlands
Date published: 20-06-2014

Samenvatting: F5 heeft updates uitgebracht voor meerdere BIG-IP producten die de kwetsbaarheid verhelpen. Gevolgen: Een niet geauthenticeerde kwaadwillende kan mogelijk op afstand een Denial-of-Service veroorzaken. Beschrijving: Door een NULL pointer dereference kwetsbaarheid in de dtls1_retrieve_bu... Read more

Source: www.ncsc.nl

Top found tags: DoS(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
kwetsbaarheid in Linux kernel verholpenLocation: Amsterdam, The Netherlands
Date published: 19-06-2014

Samenvatting: Er is een update uitgebracht voor de Linux Kernel die de kwetsbaarheid verhelpt. Gevolgen: Een lokale kwaadwillende gebruiker kan mogelijk systeemrechten verkrijgen. Beschrijving: - CVE-2014-4014 Door een kwetsbaarheid in de linux inode_capable functie is het mogelijk dat een kwaadwill... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in sendmailLocation: Amsterdam, The Netherlands
Date published: 19-06-2014

Samenvatting: FreeBSD heeft een kwetsbaarheid verholpen voor alle versies van FreeBSD die de kwetsbaarheid verhelpen. Gevolgen: Door een kwetsbaarheid in sendmail kan een kwaadwillende toegang krijgen tot alle open bestanden van het sendmail hoofdproces. Beschrijving: Een programmeerfout in sendmail... Read more

Source: www.ncsc.nl

Top found tags: Fedora(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in WiresharkLocation: Amsterdam, The Netherlands
Date published: 19-06-2014

Samenvatting: Er is een kwetsbaarheid verholpen in Wireshark. Een kwaadwillende kan deze kwetsbaarheid misbruiken om een Denial-of-Service te veroorzaken. Gevolgen: De kwetsbaarheid kan misbruikt worden voor het uitvoeren van een Denial-of-Service. Beschrijving: - CVE-2014-2282 Er bestaat een kwetsb... Read more

Source: www.ncsc.nl

Top found tags: NL(1),vulnerability(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish