Under construction

New design coming soon!

CIC News engine statistics

CIC News for 23-06-2014 contains 73 articles: cybercrime(19),cyber security(30),data breach(5),other(19)

CIC News update contains 49 English and 24 Dutch articles for today.
There are 2 published advisories, 0 are English and 2 are Dutch.
In today's English news articles:
- 10 related to cybercrime
- 24 related to cyber security
- 5 related to data breach and identity theft
- 10 for the category other news

In today's Dutch news articles:
- 9 related to cybercrime
- 6 related to cyber security
- 9 for the category other news

Have fun reading.

English cybercrime related news

\'Most sophisticated DDoS\' ever strikes Hong Kong democracy pollLocation: Hong Kong, China
Date published: 23-06-2014

2013 Cyber Risk Report One of the largest and most sophisticated distributed denial of service (DDOS) attacks has hit a controversial online democracy poll canvassing opinion on future Hong Kong elections. Over the weekend some 680,000 people cast votes in the unofficial poll that offered residents ... Read more

Source: go.theregister.com

Top found tags: DoS(2),Hong Kong(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Syrian Electronic Army targets Reuters againbut ad network provided the leakLocation: New York City, New York, United States
Date published: 23-06-2014

Further Reading Journalists increasingly under fire from hackers, Google researchers show 21 out of 25 top news organizations hit by state-sponsored attacks. The Syrian Electronic Army has made old hat of hacking major US media outlets throughout the past year, and Reuters was no exception. Howeve... Read more

Source: arstechnica.com

Top found tags: website(1),cybercrime(4),Syrian Electronic Army(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Guide to protecting your site against phishing scamsLocation: New York, United States
Date published: 23-06-2014

Phishing scams are a serious problem around the world. The number of attacks - and their level of sophistication - has skyrocketed in recent years. If you have a website and do business online, you are probably at risk. Fortunately, there is an effective way to protect your customers, your company a... Read more

Source: net-security.org

Top found tags: scam(1),SSL (1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers steal trade secrets from major US hedge firmLocation: New York, United States
Date published: 23-06-2014

2013 Cyber Risk Report Criminals have successfully attacked a hedge fund, delaying trades and stealing profitable secrets in a rare direct raid on the financial services sector, according to BAE Systems Applied Intelligence. The clever hack cost the unnamed US-based hedge fund millions of dollars ov... Read more

Source: go.theregister.com

Top found tags: phishing(2),trojan(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Syrian Electronic Army uses Taboola ads to hack Reuters websiteLocation: Damascus, Damascus Governorate, Syria
Date published: 23-06-2014

theSulleymander. Syrian Electronic Army uses Taboola ads to hack Reuters website Reuters has, once again, been hacked by the Syrian Electronic Army (SEA). The news agency was reportedly compromised by the pro-Bashar al-Assad hacking collective over the weekend. Reuters hack Users complained that whe... Read more

Source: itproportal.com

Top found tags: government(2),social media(2),Syrian Electronic Army(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
WiFi WarKitteh and DDoS Dog to stalk DEF CON 22Location: Las Vegas, Nevada, United States
Date published: 23-06-2014

2013 Cyber Risk Report A security boffin has created a 'WarKitteh' capable of sniffing WiFi packets. Tenacity evil genius researcher Gene Bransfield (@gbransfield) combined a series of garden-variety technologies to evolve the humble house cat into a walking, purring WiFi war machine capable of pa... Read more

Source: go.theregister.com

Top found tags: DoS(2),cybercrime(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spammers increasingly targeting MontrealLocation: Ottawa, Ontario, Canada
Date published: 23-06-2014

AdaptiveMobile released data that shows a marked increase in SMS spam across Canada in the past six months. The higher volume of SMS spam comes on the eve of the July 1st compliance deadline for Canada s Anti-Spam Legislation (CASL). Where you live in Canada determines the type of SMS spam you are m... Read more

Source: net-security.org

Top found tags: government(2),legislation(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Quarter of all UK attacks target web services and applicationsLocation: Stockholm, Sweden
Date published: 23-06-2014

A comprehensive analysis of security alerts in 2013 reveals that a quarter of all attacks in the UK were application specific attacks or targeted at web applications. This is according to a country-by-country breakdown of threat data from NTT Com Security. The local data shows that most web applicat... Read more

Source: net-security.org

Top found tags: The Netherlands(2),United Kingdom(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ZBOT-UPATRE Far From Game Over, Uses Random HeadersLocation: Trend Micro - Cupertino, United States
Date published: 23-06-2014

TROJ_UPATRE, the most common malware threatdistributed via spam, is known for downloading encrypted Gameover ZeuS onto affected systems. This ZeuS variant, in turn, is known for its use of peer-to-peer connections to its command-and-contol (C&C) servers. This behavior has been known about since ... Read more

Source: trendmicro.com

Top found tags: Trend Micro(2),malware(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Heartbleed-based BYOD hack pwns insurance giant Aviva\'s iPhonesLocation: Iron, United States
Date published: 23-06-2014

2013 Cyber Risk Report Mobile device management systems at insurance giant Aviva UK were last month hit by an attack based on the Heartbleed exploit that allowed hackers to royally screw with workers' iPhones. The insurance giant has played down the breach but El Reg's mole on the inside claims Av... Read more

Source: go.theregister.com

Top found tags: Apple(3),mobile device(6),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Cisco open-sources experimental cipherLocation: Cisco HQ - San Jose, United States
Date published: 22-06-2014

2013 Cyber Risk Report Cisco is offering up an experimental cipher which, among other things, could help preserve the anonymity of data in cloud environments. In putting what it calls FNR (Flexible Naor and Reingold) into the hands of the public, The Borg says its work is currently experimen... Read more

Source: go.theregister.com

Top found tags: privacy(1),report(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
\Free\ Wi-Fi from Xfinity and AT&T also frees you to be hackedLocation: AT&T HQ - Dallas, United States
Date published: 23-06-2014

Xfinity If you've traveled and tried to get on the Internet, you've probably seen some pretty suspicious looking Wi-Fi networks with names like "Free Wi-Fi" and "Totally Free Internet." Those are likely access points you'd best avoid. But there's a much bigger threat to your security than somebo... Read more

Source: arstechnica.com

Top found tags: smartphone(2),cyber security(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Improving transaction security for financial institutionsLocation: New York, United States
Date published: 23-06-2014

Mobile technology is changing the way we conduct financial transactions. With more and more consumers relying on mobile technology to perform everyday activities, the mobile channel now represents nearly two out of three (65%) of all transactions for financial institutions. Data from the ThreatMetri... Read more

Source: net-security.org

Top found tags: cyber security(4),financial sector(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lois Lerner\'s lost letters, Wikileaks leak, and nullifying NullCrew [Government IT Week]Location: U.S. Internal Revenue Service HQ - Washington, United States
Date published: 23-06-2014

ZDNet's DIY-IT, every week I'll bring you a selection of the best government-related articles posted by our intrepid reporters and analysts. Here are some of the most interesting from the last week. Top stories this week $18 million to recover lost emails? The Congressional inquiry into lost IRS e... Read more

Source: www.zdnet.com

Top found tags: social media(2),telecom sector(2),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Heartbleed: Over 300,000 servers still exposedLocation: Graham, United States
Date published: 23-06-2014

Two months after the Heartbleed bug was discovered, at least 300,000 servers remain vulnerable to the exploit. Heartbleed, discovered by a Google engineer, caused widespread panic and a furious round of server patching by companies worldwide. The security kink impacts OpenSSL and, if exploited, can ... Read more

Source: www.zdnet.com

Top found tags: website(1),cyber security(2),OpenSSL(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco releases source code for experimental block cipherLocation: Cisco HQ - San Jose, United States
Date published: 23-06-2014

A team of Cisco software engineers has created a new encryption scheme, and has released it to the public along with the caveat that this new block cypher is not ready for production, i.e. is still in the experimental phase. It's been dubbed FNR (shortened for "Flexible Naor and Reingold"), and is ... Read more

Source: net-security.org

Top found tags: credit card(2),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Traffic lights, fridges and how they\'ve all got it in for usLocation: IOActive - Seattle, United States
Date published: 23-06-2014

2013 Cyber Risk Report No doubt many of The Regs readers are tired of the term the Internet of Things. It is both a nebulous term and a vague idea. What it attempts to encapsulate is the masses of networks of automated machines that didnt traditionally have connectivity, working to m... Read more

Source: go.theregister.com

Top found tags: antivirus(4),Kaspersky Lab(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Digital defenders: from security geek to c-suite superheroLocation: Target HQ - Minneapolis, United States
Date published: 23-06-2014

As technology and security has taken centre stage, the role of the CSO has become more integral to the c-suite The staggering pace of evolution in technology has really pulled the rug from under the enterprise world, leaving old corporate structures that have served businesses so well until now up i... Read more

Source: www.information-age.com

Top found tags: United Kingdom(2),cyber security(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How spies and the secret service are joining the cybercrime fightLocation: GCHQ - Cheltenham, United Kingdom
Date published: 23-06-2014

'GCHQ announced that the spy agency will begin sharing intelligence on emerging threats' Cyber terrorism is now firmly on the agenda for the secret services with even James Bond and Jason Bourne getting in on the act. But whereas the NSA has been caught gathering covert intelligence online, with i... Read more

Source: www.information-age.com

Top found tags: financial sector(4),United Kingdom(6),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
People invested $1.2 million in an app that had no securityLocation: Silicon Valley, United States
Date published: 23-06-2014

Proving that no one learned from Snapchat's security and privacy spectacle, people invested $1.2 million in an app that had essentially no security. Despite the news it was hacked only days after its media fanfare, Yo still isn't coming clean. Last week free Android and iOS app "Yo" was top in Goo... Read more

Source: www.zdnet.com

Top found tags: cyber security(4),Google Play(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco Releases Open Source FNR CipherLocation: Cisco HQ - San Jose, United States
Date published: 23-06-2014

Cisco has released a new open-source block cipher called FNR that is designed for encrypting small chunks of data, such as MAC addresses or IP addresses. The cipher is still in the experimental stage, but Cisco has released the source code and a demo application. The company suggests that the new ci... Read more

Source: threatpost.com

Top found tags: EN(1),privacy(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft to Preview Interflow Information Sharing PlatformLocation: Bryan, United States
Date published: 23-06-2014

Much like the Year of PKI that has never come to be, information sharing has been one of securitys more infamous non-starters. While successful in heavily siloed environments such as financial services, enterprises industry-wide are hesitant to share threat and security data for fear of losing a... Read more

Source: threatpost.com

Top found tags: vulnerability(1),cyber security(2),information sharing(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Skills development for information security professionalsLocation: Scotland, United Kingdom
Date published: 23-06-2014

In this interview, John Colley, MD for (ISC)2 EMEA, talks about the challenges of his job, discusses critical information security areas, and tackles the future of certification. What's been your greatest challenge since becoming MD for (ISC)2 EMEA? How have your previous positions prepared you for... Read more

Source: net-security.org

Top found tags: financial sector(2),information security(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Andreessen Horowitz Places $90 Million Bet on Cybersecurity Firm TaniumLocation: Silicon Valley, United States
Date published: 23-06-2014

Systems and security management company Tanium announced on Sunday that it has secured a massive $90 million in funding from Silicon Valley VC firm Andreessen Horowitz. Tanium offers a platform that collects and processes billions of metrics across endpoints in real-time, which lets enterprises quic... Read more

Source: securityweek.com

Top found tags: financial sector(2),security management(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Unveils New Threat Information Exchange PlatformLocation: Microsoft HQ - Redmond, United States
Date published: 23-06-2014

Microsoft has launched a limited preview of a new security and threat information exchange platform that enables users to set up their own independent threat sharing communities to exchange information such as suspected malicious URLs or IP addresses and analysis of malware. Called Interflow... Read more

Source: securityweek.com

Top found tags: research(1),threat(1),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Code Spaces Destroyed by Cyber AttackLocation: Thomas, United States
Date published: 23-06-2014

The code hosting service Code Spaces was recently forced to shut down permanently after suffering a multi-stage attack on its servers. On June 17, 2014, Code Spaces was hit by a DDoS attack -- but as the company soon found, that was just the beginning. The unidentified attacker had also gained acces... Read more

Source: www.esecurityplanet.com

Top found tags: cyber security(2),telecom sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ad-server used in Reuters hack by SEALocation: Damascus, Damascus Governorate, Syria
Date published: 23-06-2014

Syrian Electronic Army defaces Reuters website via attack on US-based advertising server. Ad-server used in Reuters hack by SEA Ad-server used in Reuters hack by SEA The pro-Assad Syrian Electroniic Army' continues to make its presence felt, hacking the Reuters website on Sunday, via its ad-serv... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(2),cybercrime(4),Syrian Electronic Army(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Protecting data - the changing role of the CSOLocation: Dropbox - San Francisco, United States
Date published: 23-06-2014

Protecting data - the changing role of the CSO Protecting data - the changing role of the CSO In recent years I've noticed a definite shift in roles in the enterprise workplace. Nowhere is this more evident than in the role of the Chief Security Officer, or CSO. Traditionally, the position of the C... Read more

Source: www.scmagazineuk.com

Top found tags: mobile device(2),cyber security(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
300,000 servers still vulnerable to Heartbleed bugLocation: Graham, United States
Date published: 23-06-2014

Two-and-a-half months on from the discovery of the Heartbleed bug affecting OpenSSL security, and one security researcher claims that the flaw still affects 300,000 servers. 300,000 servers still vulnerable to Heartbleed bug 300,000 servers still vulnerable to Heartbleed bug Writing on a blog post o... Read more

Source: www.scmagazineuk.com

Top found tags: website(1),OpenSSL(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Thousands of SMBs guilty of ignoring Heartbleed security warningsLocation: Graham, United States
Date published: 23-06-2014

Thousands of SMBs guilty of ignoring Heartbleed security warnings. Over 300,000 servers are still vulnerable to the Heartbleed bug, despite severe warnings being made by security researcher Robert David Graham over a month ago. Over the weekend, Graham found that at least 309,197 servers are still v... Read more

Source: itproportal.com

Top found tags: research(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Welsh government moving sites to .cymru and .walesLocation: Jones, United States
Date published: 23-06-2014

Welsh government moving sites to .cymru and .wales. Wales will change its government sites over to .cymru and .wales domain suffixes from 2015 to take advantage of its launch this September. Related: .uk registrants required to publish details in privacy blow The Welsh government sites will be s... Read more

Source: itproportal.com

Top found tags: cyber security(2),United Kingdom(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
British Gas Twitter account hijacked by mystery phishermenLocation: Twitter - San Francisco, United States
Date published: 23-06-2014

2013 Cyber Risk Report An official British Gas Twitter account was hacked over the weekend as part of a phishing scam designed to harvest Twitter login credentials. The account @BritishGasHelp, which is normally geared towards helping people with boiler breakdowns and other queries, was taken over t... Read more

Source: go.theregister.com

Top found tags: update(2),cybercrime(3),Syrian Electronic Army(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Exposing hidden domain registrations could hurt innocent users more than criminalsLocation: Clay, United States
Date published: 23-06-2014

Exposing hidden domain registrations could hurt innocent users more than criminals Banning the use of privacy and proxy services to hide details of domain name registrants would scarcely inconvenience criminals but would have privacy implications for lawful users of those services, according to a st... Read more

Source: www.pcworld.com

Top found tags: website(1),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dropbox-themed phishing is after multiple login credentialsLocation: Dropbox - San Francisco, United States
Date published: 23-06-2014

Phishing emails purportedly leading users to a file hosted on Dropbox are targeting Yahoo!, Gmail, Hotmail, and Aol email users, warns Malwarebytes' Jovi Umawing. Clicking on the offered link takes users to a spoofed Dropbox page hosted on the compromised website of a company selling alloy wheels a... Read more

Source: net-security.org

Top found tags: phishing(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Week in review: GCHQ intercepts Google, Facebook users' communications, Code Spaces destroyed by extortion hack attackLocation: Google HQ - Mountain View, United States
Date published: 23-06-2014

Here's an overview of some of last week's most interesting news, podcasts, interviews and articles: Five great computer security tips that few people follow Here are five rarely implemented security practices that offer great security benefits, but which few people actually apply in real life. 600... Read more

Source: net-security.org

Top found tags: cybercrime(5),financial sector(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Verizon launches credential cloud serviceLocation: Verizon HQ - New York, United States
Date published: 23-06-2014

The service, launched by Verizon's enterprise unit, is dubbed Smart Credential. The service, available in US, Europe and Asia-Pacific, allows the following: Verizon said it will offer Smart Credential under a software-as-a-service model with subscriptions to better target existing public key infras... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),data breach(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Multiparty authentication and cryptosystems in the IoT part 3Location: McAfee - Santa Clara, United States
Date published: 23-06-2014

Multi-party authentication and data protection Multi-party authentication and data protection can be expressed simply as 2 +N, meaning that more than 2 entities are involved in a shared cryptosystem. Additionally, this multi-party system can be horizontal and cascad... Read more

Source: blogs.mcafee.com

Top found tags: cybercrime(5),health sector(6),medical sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
P.F. Chang\'s Breach Went Undetected For MonthsLocation: Target HQ - Minneapolis, United States
Date published: 23-06-2014

P.F. Chang's Breach Went Undetected For Months Early reports indicate that the compromise involved a large number of restaurant locations and dates as far back as September 2013. On June 13, restaurateur P.F. Changs notified customers via email of a security breach, stating credit and debit car... Read more

Source: www.darkreading.com

Top found tags: credit card(2),data breach(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Key Internet of Things privacy and security issuesLocation: New York, United States
Date published: 23-06-2014

Independently administered throughout 11 countries, a new Fortinet survey gives a global perspective about the Internet of Things, what security and privacy issues are in play, and what home owners are willing to do to enable it. Completed in June 2014, the survey asked 1,801 tech-savvy homeowners q... Read more

Source: net-security.org

Top found tags: ISP(2),South Africa(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

US NSA granted extension to collect bulk phone dataLocation: New York, United States
Date published: 23-06-2014

The U.S. National Security Agency has been allowed to continue to collect phone records in bulk of people in the country, while lawmakers consider new legislation that would block the agency from collecting the data. The governments application for reauthorization of the program for a period of ... Read more

Source: www.pcworld.com

Top found tags: financial sector(6),United States(6),government(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Top500 supercomputer race hits a slow patchLocation: New York, United States
Date published: 23-06-2014

Performance gains slowed on the Top500 list of supercomputing performance in June 2014.Performance gains slowed on the Top500 list of supercomputing performance in June 2014. Top500 The performance of the world's fastest computers has been steadily growing for two decades, but the latest tally of t... Read more

Source: cnet.com.ortal.com

Top found tags: patch(2),United Kingdom(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Intel working on RFID-based \'kill switch\' for laptopsLocation: Intel HQ - Santa Clara, United States
Date published: 23-06-2014

"Kill switches" -- the ability to remotely render a device unusuable to combat theft -- are already making an impact in the smartphone world. Now Intel might be bringing the technology to other mobile devices using its SoCs. Prosecutors seek 'kill switch' to prevent theft and 'Apple picking' Pro... Read more

Source: www.zdnet.com

Top found tags: Windows(1),mobile device(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cloud security firm Skyhigh Networks raises $40 mlnLocation: Boston, United States
Date published: 23-06-2014

BOSTON (Reuters) - Skyhigh Networks, a company that helps businesses secure data that employees access through Internet sites and cloud-computing services, said on Monday it has raised $40 million in financing in a Series C round led by Greylock Partners and Sequoia. That brings the total capital ra... Read more

Source: reuters.com

Top found tags: Google(1),Twitter(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tech News Weekly podcast 23: Microsoft vs China, UK government vs UK citizens and the Nokia Lumia 630Location: Microsoft HQ - Redmond, United States
Date published: 23-06-2014

theSulleymander. Tech News Weekly podcast 23: Microsoft vs China, UK government vs UK citizens and the Nokia Lumia 630 This week's Tech News Weekly episode is a bit of a security-fest. As well as discussing the $2 billion worth of secret Microsoft patents leaked by China and the lifting of restrict... Read more

Source: itproportal.com

Top found tags: government(2),United Kingdom(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
France will have to compensate Atlantia-led group if ecotax scrapped: sourcesLocation: Paris, France
Date published: 23-06-2014

ROME (Reuters) - The French government will have to pay 850 million euros ($1.2 billion) as a compensation to the Ecomouv consortium, led by Italy's Atlantia, if it decides to definitively scrap a road toll know as ecotax, a source close to the matter said. France had awarded to Ecomouv a contract ... Read more

Source: reuters.com

Top found tags: Italy(1),France(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Triumfant Unveils Mac Endpoint Security Monitoring AgentLocation: Microsoft HQ - Redmond, United States
Date published: 23-06-2014

Triumfant, a provider endpoint-focused security monitoring solutions, today announced its support for Mac OS X. Announced at the Gartner Security & Risk Management Summit, the new endpoint security agent provides real-time detection and automatic remediation of malware and other sophisticated attack... Read more

Source: securityweek.com

Top found tags: threat(1),Windows(1),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tech News Weekly podcast 23: Microsoft vs China, UK government vs UK citizens and the Nokia Lumia 630Location: Microsoft HQ - Redmond, United States
Date published: 23-06-2014

theSulleymander. Tech News Weekly podcast 23: Microsoft vs China, UK government vs UK citizens and the Nokia Lumia 630 This week's Tech News Weekly episode is a bit of a security-fest. As well as discussing the $2 billion worth of secret Microsoft patents leaked by China and the lifting of restrict... Read more

Source: itproportal.com

Top found tags: government(2),United Kingdom(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Patchnride: Permanently fix a bike tire flat in 60 secondsLocation: New York, United States
Date published: 23-06-2014

PatchnrideThe Patchnride in action to fix a nail puncture. Video screenshot by Amanda Kooser/CNET There are these things where I live called goatheads. They're spreading plants with pretty little flowers and spiky seeds that were no doubt invented by Satan in his spare time. Those seeds stick right... Read more

Source: cnet.com.ortal.com

Top found tags: EN(1),patch(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google forks OpenSSL: BoringSSL will be used in company productsLocation: Google HQ - Mountain View, United States
Date published: 23-06-2014

Google has announced another OpenSSL fork. Dubbed BoringSSL, it will, in time, replace the OpenSSL library in various Google's projects. "We have used a number of patches on top of OpenSSL for many years. Some of them have been accepted into the main OpenSSL repository, but many of them don t mesh ... Read more

Source: net-security.org

Top found tags: SSL (1),Google(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Advertenties op Reuters sturen bezoekers naar SEA-siteLocation: New York Times - New York, United States
Date published: 23-06-2014

Advertenties op de website van nieuwsdienst Reuters zijn gisteren door het Syrian Electronic Army (SEA) gekaapt geweest en zorgden ervoor dat bezoekers die artikelen over Syri wilden lezen naar een website van het SEA werden doorgestuurd. Het is niet de eerst keer dat SEA nieuwsdiensten aanvalt. E... Read more

Source: www.security.nl

Top found tags: social media(2),cybercrime(3),Syrian Electronic Army(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Van Dijk, directeur Cyber Security: Er is veel werk te verzettenLocation: Amsterdam, The Netherlands
Date published: 20-06-2014

Sinds 1 juni is Wilma van Dijk de nieuwe directeur Cyber Security bij de Nationaal Cordinator Terrorismebestrijding en Veiligheid (NCTV). Voor haar is beveiliging een tweede natuur, maar de cyber-focus is spannend en uitdagend. Wat haar betreft gaat haar focus uit naar opleiden, coalities vo... Read more

Source: ictmagazine.nl

Top found tags: research(1),government(4),The Netherlands(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nederland en Duitsland houden gezamenlijk cyber security oefeningLocation: Amsterdam, The Netherlands
Date published: 19-06-2014

Het Nationaal Cyber Security Centrum (NCSC) en CERT-Bund (onderdeel van het Bundesamt fur Sicherheit in der Informationstechnik, BSI)) hebben begin deze week een gezamenlijk cyber security oefening gehouden. Door de oefening willen de organisaties elkaars werkwijze beter leren kennen.De organisaties... Read more

Source: infosecuritymagazine.nl

Top found tags: NCSC(2),The Netherlands(4),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware onderscheidt mens van computer via muisklikLocation: Hee, Terschelling, Friesland, The Netherlands
Date published: 23-06-2014

Bij het infecteren van computers met malware gebruiken cybercriminelen een eenvoudige tactiek om mensen van computers te onderscheiden, zodat hun aanvallen lastiger door geautomatiseerde systemen worden opgemerkt. Voordat de aanval namelijk plaatsvindt moeten gebruikers zelf op een knop klikken. Bij... Read more

Source: www.security.nl

Top found tags: website(1),Internet Explorer(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Installeer een VPN op je router voor meer privacy"Location: Amsterdam, The Netherlands
Date published: 23-06-2014

Een Virtual Private Network (VPN) biedt gebruikers bescherming op open wifi-netwerken en het eigen netwerk door al het verkeer via een versleutelde tunnel naar een andere computer te laten lopen, maar het installeren van een VPN op alle verschillende apparaten vereist het nodige werk en is niet alti... Read more

Source: www.security.nl

Top found tags: wireless(1),cybercrime(2),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Interview met Brenno de Winter (video)Location: Google HQ - Mountain View, United States
Date published: 23-06-2014

Onderzoeksjournalist Brenno de Winter maakt zich grote zorgen over het gebrek aan kennis bij de overheid over de informatiemaatschappij. Het is opvallend dat De Winter zijn pijlen op de overheid richt, terwijl in de ogen van veel anderen het gevaar van een groot bedrijf als Google komt. Google slaat... Read more

Source: www.beveiligingnieuws.nl

Top found tags: cybercrime(2),cyber security(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ziggo daagt uit tot hacken WifiSpotsLocation: Ziggo B.V. - Utrecht, The Netherlands
Date published: 23-06-2014

Ziggo daagt hackers, studenten en IT'ers uit om de nieuwe WifiSpots te kraken. Het telecombedrijf organiseert volgende week maandag een zogeheten hacketon. Deelnemers krijgen de opdracht in te breken in het wifi-netwerk dat gebruik maakt van de thuismodems van klanten. Met de actie hoopt Ziggo even... Read more

Source: www.automatiseringgids.nl

Top found tags: government(2),The Netherlands(2),wireless(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
7 tips voor een veiliger cloud-accountLocation: New York, United States
Date published: 23-06-2014

De Amerikaanse service provider Code Spaces zag zich eerder deze maand gedwongen zijn bedrijf op te heffen nadat zijn gegevens, die gehost werden in Amazon Web Services cloud, gegijzeld en vervolgens vernietigd werden door hackers. Wie net als Code Spaces gebruik maakt van een IaaS-cloud doet er... Read more

Source: www.automatiseringgids.nl

Top found tags: health sector(2),medical sector(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Canadese ambtenaren klikken massaal tijdens phishingtestLocation: Toronto, Canada
Date published: 23-06-2014

Tijdens een test van het Canadese Ministerie van Justitie om te kijken hoe snel het personeel voor een phishingaanval valt, blijkt dat 1850 ambtenaren op een link in de gebruikte phishingmail klikten. In totaal werd de e-mail naar 5.000 ambtenaren gestuurd, waarvan 37% de meegestuurde link ook opend... Read more

Source: www.security.nl

Top found tags: medical sector(2),cyber security(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Tor wil statistieken over gebruikers gaan verzamelenLocation: Luna, United States
Date published: 23-06-2014

De makers van de Tor-anonimiseringssoftware willen statistieken over gebruikers gaan verzamelen, maar wel op een manier waarbij de privacy niet in het gevaar komt. En dat is een lastige opgave, aldus "Lunar" van het Tor Project. Met de gegevens willen de ontwikkelaars de bruikbaarheid van Tor verbet... Read more

Source: www.security.nl

Top found tags: research(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rijkswaterstaat monitort kentekens voor filebestrijdingLocation: Amsterdam, The Netherlands
Date published: 23-06-2014

Rijkswaterstaat heeft de kentekens van automobilisten op de Galecopperbrug (A12) gemonitord om mensen die straks de spits mijden te belonen, maar volgens de PvdA is dit een inbreuk op de privacy. Vanaf de zomervakantie dit jaar en ook nog volgend jaar wordt er onderhoud aan de brug verricht. Door de... Read more

Source: www.security.nl

Top found tags: PvdA(1),cyber security(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Opstelten: gezichtsherkenning drones rechtmatigLocation: Ministry of Security and Justice - Den Haag, The Netherlands
Date published: 23-06-2014

Drones die door de overheid worden ingezet en zijn uitgerust met camera's waarmee personen kunnen worden herkend, zijn rechtmatig indien wordt voldaan aan de voorwaarden die aan dat overheidsoptreden zijn verbonden, zo laat minister Opstelten van Veiligheid en Justitie aan de Tweede Kamer weten. Op... Read more

Source: www.security.nl

Top found tags: cyber security(2),The Netherlands(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft onthult platform tegen cyberdreigingenLocation: Microsoft HQ - Redmond, United States
Date published: 23-06-2014

Microsoft heeft vandaag een uitwisselingsplatform onthuld waar beveiligingsonderzoekers en security-analisten informatie over cyberdreigingen kunnen delen. Het platform heet Interflow en biedt een geautomatiseerde, voor machines leesbare feed van dreigingen en beveiligingsinformatie. Deze gegevens k... Read more

Source: www.security.nl

Top found tags: NL(1),research(1),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Minister gaat gebruik persoonsgegevens politie moderniserenLocation: Den Haag, The Netherlands
Date published: 23-06-2014

De manier waarop politie en justitie omgaan met persoonsgegevens van burgers wordt gemoderniseerd, zo heeft minister Opstelten van Veiligheid en Justitie vandaag in een brief aan de Tweede Kamer weten. Door de verdergaande digitalisering is volgens de minister nieuwe regelgeving nodig. Zo kan beter ... Read more

Source: www.security.nl

Top found tags: financial sector(2),The Netherlands(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google\s BoringSSL Latest OpenSSL Fork to SurfaceLocation: Google HQ - Mountain View, United States
Date published: 23-06-2014

In the year-plus since surveillance, privacy and Snowden became part of the daily security conversation, technologies that safeguard online communication and commerce have become Job 1 for experts anxious to plug gaping flaws and shore up other usability deficiencies. OpenSSL is probably at the top ... Read more

Source: threatpost.com

Top found tags: government(2),OpenSSL(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Google takes OpenSSL and turns it into BoringSSLLocation: Google HQ - Mountain View, United States
Date published: 23-06-2014

In the past, Google had taken OpenSSL and rebased its custom patches with each OpenSSL release, from now on though, its patches will be integrated into the base of BoringSSL, with OpenSSL updates ported over to the Google project. "We have used a number of patches on top of OpenSSL for many years. S... Read more

Source: www.zdnet.com

Top found tags: patch(1),Google(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaanse krijgt 38 maanden cel wegens creditcardfraudeLocation: Smith, United States
Date published: 23-06-2014

Een 30-jarige Amerikaans vrouw is in de Verenigde Staten veroordeeld tot een gevangenisstraf van 38 maanden wegens creditcardfraude. Daarnaast moet ze ook een schadevergoeding van zo'n 144.000 dollar betalen. Rameesha Smith kocht tussen september 2010 en oktober 2012 gestolen creditcarddata. De cre... Read more

Source: www.security.nl

Top found tags: government(1),NL(1),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cryptolocker-ransomware maakt encryptieblunderLocation: Amsterdam, The Netherlands
Date published: 23-06-2014

Een variant van de Cryptolocker-ransomware laat gebruikers geloven dat hun bestanden met RSA-encryptie versleuteld zijn, maar dat blijkt helemaal niet het geval te zijn. Sterker nog, de malware bevat ook de sleutel om de bestanden te ontsleutelen, zo ontdekte beveiligingsonderzoeker 'Fakebit'. De ... Read more

Source: www.security.nl

Top found tags: CryptoLocker(2),RSA(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russische overheid gaat eigen ARM-processors gebruiken voor pc\'s en serversLocation: New York, United States
Date published: 23-06-2014

De Russische overheid stapt af van Intel- en AMD-processors ten gunste van een in Rusland gemaakte processor op basis van de ARM-architectuur. Waarom Rusland de overstap maakt, is onbekend. De eerste processor verschijnt in 2015. De betreffende processor heet Baikal en is een octacore op basis van C... Read more

Source: tweakers.net

Top found tags: smartphone(1),government(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google onthult eigen beveiliginsgprotocol webLocation: Google HQ - Mountain View, United States
Date published: 23-06-2014

Google heeft een eigen variant ontwikkeld van het SSL-protocol. Het protocol is een essentieel onderdeel van de beveiligde internetverbindingen voor bijvoorbeeld de communicatie met de bank of over een VPN. Meer over SSL Google voert versneld zwaardere encryptie door Heartbleed nog altijd groot prob... Read more

Source: www.automatiseringgids.nl

Top found tags: website(1),financial sector(2),OpenSSL(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gebruikers veroorzaken zelf onveiligheid in cloudLocation: Cloud, United States
Date published: 23-06-2014

Werknemers, maar ook consumenten, zorgen voor grote beveiligingsrisico's door de manier waarop zij diensten in de cloud gebruiken. Aan het beveiligen van computers en in mindere mate tablets en smartphones besteden mensen veel aandacht. Bij bedrijven staat het dichttimmeren van het netwerk al jaren... Read more

Source: www.automatiseringgids.nl

Top found tags: smartphone(1),vulnerability(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amnesty lanceert paniekknop-app voor activistenLocation: Amsterdam, The Netherlands
Date published: 23-06-2014

Amnesty International heeft een speciale app gelanceerd waarmee activisten die het risico lopen om te worden ontvoerd, gemarteld of aangevallen alarm kunnen slaan. De Panic Button-app fungeert als een stil alarm en kan in noodgevallen worden geactiveerd. Vervolgens zullen mede-activisten worden gewa... Read more

Source: www.security.nl

Top found tags: education(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
XS4ALL weer gedagvaard door Brein wegens Pirate BayLocation: XS4ALL - Amsterdam, The Netherlands
Date published: 23-06-2014

XS4ALL is weer gedagvaard door stichting Brein wegens het niet blokkeren van torrentsite de Pirate Bay, zo laat de provider op de eigen website weten. Al sinds juni 2010 is XS4ALL verwikkeld in een rechtszaak over het blokkeren van de website van de populaire torrentsite. Brein wil dat XS4ALL de web... Read more

Source: www.security.nl

Top found tags: NL(1),research(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA gaat door met oogsten van telecomdataLocation: National Security Agency - Fort Meade, United States
Date published: 23-06-2014

De NSA mag voorlopig doorgaan met het verzamelen van bulkdata vanuit telecomverbindingen. Omdat er nog geen nieuwe wetgeving is, is de geheime dienst 90 extra dagen gegund om van alle Amerikanen de data te verzamelen. De NSA moet binnenkort inbinden, tenminste als het gaat om het verzamelen van data... Read more

Source: webwereld.nl

Top found tags: The Netherlands(2),United States(4),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

kwetsbaarheid in Linux kernel verholpenLocation: Amsterdam, The Netherlands
Date published: 23-06-2014

Samenvatting: Er is een update uitgebracht voor de Linux Kernel die de kwetsbaarheid verhelpt. Gevolgen: Een lokale kwaadwillende gebruiker kan mogelijk systeemrechten verkrijgen. Beschrijving: - CVE-2014-4014 Door een kwetsbaarheid in de linux inode_capable functie is het mogelijk dat een kwaadwill... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Wordpress ontdektLocation: WordPress - San Francisco, United States
Date published: 23-06-2014

Samenvatting: WordPress is kwetsbaar voor een Cross-site request forgery aanval. WordPress heeft nog geen updates beschikbaar gesteld om de kwetsbaarheid te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken voor plaatsen van comments op een kwetsbare WordPress website. Beschrijv... Read more

Source: www.ncsc.nl

Top found tags: WordPress(1),The Netherlands(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish