Under construction

New design coming soon!

CIC News engine statistics

CIC News for 24-06-2014 contains 201 articles: cybercrime(85),cyber security(52),data breach(26),other(38)

CIC News update contains 168 English and 33 Dutch articles for today.
There are 5 published advisories, 0 are English and 5 are Dutch.
In today's English news articles:
- 67 related to cybercrime
- 49 related to cyber security
- 26 related to data breach and identity theft
- 26 for the category other news

In today's Dutch news articles:
- 18 related to cybercrime
- 3 related to cyber security
- 12 for the category other news

Have fun reading.

English cybercrime related news

Zorenium bot not likely to infect iOS, or perform other advertised abilitiesLocation: Apple HQ - Cupertino, United States
Date published: 23-06-2014

Contrary to previous reports, there is no proof to support that Zorenium bot can run on iOS 5 to iOS 7, on Debian platforms, and on the latest Android tablets, according to a Tuesday Symantec Security Response post, which adds Zorenium also likely has no P2P communications, ability to steal banking ... Read more

Source: www.scmagazine.com

Top found tags: telecom sector(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DNS Pioneer Founds New Security StartupLocation: New York, United States
Date published: 23-06-2014

DNS Pioneer Founds New Security Startup Paul Vixie launches Farsight Security, aimed at catching domain abuse early in the lifecycle. Farsight Security today came out of stealth mode with a service that spots potentially malicious new domain names as a way to fight spam and cybercrime activity. At t... Read more

Source: www.darkreading.com

Top found tags: spam(1),threat(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
College: cybercrime is a top priorityLocation: Derbyshire, United Kingdom
Date published: 18-06-2014

The College of Policing has responded to the recent HMIC report detailing the gaps in UK forces preparation for large-scale cyber-attack.The report which was published last week suggested that only three forces (Derbyshire, Lincolnshire and West Mids) had made comprehensive plans in... Read more

Source: www.policingtoday.co.uk

Top found tags: threat(1),United Kingdom(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CDSA Security Webinar: An Inside Look at the Microsoft Cybercrime CenterLocation: Microsoft HQ - Redmond, United States
Date published: 19-06-2014

Each year, cybercrime takes a personal and financial toll on millions of consumers and causes enormous damage to businesses, governments and economies across the world. To address this growing problem, Microsoft has created a center of excellence for advancing the global fight against cybercrime. Th... Read more

Source: vimeo.com

Top found tags: Microsoft(1),cybercrime(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI, NYPD and Transit Authority Form Task Force to Combat CybercrimeLocation: New York City, New York, United States
Date published: 19-06-2014

The FBIs New York office said Thursday its teaming up with the New York Police Department and the regions transit authority to form a new cybercrime task force to target cyber-related criminal activity in the area.The FBI, the NYPD and the Metropolitan Transportation Authority signed a m... Read more

Source: blogs.wsj.com

Top found tags: legislation(1),government(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Law Criminalizes Child Pornography in Japan: Part 1Location: Tokio, Japan
Date published: 18-06-2014

On June 4, the House of Representatives in Tokyo passed much-awaited legislation making the possession of child pornography illegal. It may come as a shock to many readers that it took so long for the country to pass such a law, though cybercrime defense attorneys have been in the know on this fact ... Read more

Source: www.cybercrimelawyerblog.com

Top found tags: pornography(3),child pornography(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Threatpost News Wrap, June 23, 2014Location: Microsoft HQ - Redmond, United States
Date published: 23-06-2014

Dennis Fisher and Mike Mimoso discuss the latest security news, including the possible fork of TrueCrypt, Microsofts new information sharing platform, the FBIs cybercrime task force and the US teams crushing tie with Portugal. http://threatpost.com/files/2014/06/digital_underground_156.m... Read more

Source: threatpost.com

Top found tags: threat(1),cybercrime(2),information sharing(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A Glance Into the Neutrino BotnetLocation: Microsoft HQ - Redmond, United States
Date published: 23-06-2014

Lately, we have seen a number of communications through our automated framework from the Neutrino botnet. While analyzing this botnet, we found that it has a number of anti-debugging, anti-virtual machine, and sandbox-detection techniques that we have seen before. The botnet looks to be at an early ... Read more

Source: blogs.mcafee.com

Top found tags: Windows(1),Microsoft(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security firm discusses cyber attack on large hedge fundLocation: New York, United States
Date published: 23-06-2014

A large hedge fund was the victim of a complex cyber attack in late 2013 that ended up costing the organization millions of dollars. In an interview with CNBC, Paul Henninger, global product director at security firm BAE Systems Applied Intelligence, gave insight on the incident, which had not been ... Read more

Source: www.scmagazine.com

Top found tags: Intel(1),Anonymous(2),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Stop running this script?' notification redirects to Angler Exploit KitLocation: ESET HQ - Bratislava, Slovak Republic
Date published: 23-06-2014

While doing some research last week on exploit kit traffic, researchers with ESET identified a compromised website serving up one of those familiar notifications that asks if users want to abort a script causing their browser to run slowly. The notification is actually an injected HTML form that onl... Read more

Source: www.scmagazine.com

Top found tags: malware(2),trojan(2),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FWD.us hosts 'growthathon' to hack immigration reformLocation: Silicon Valley, United States
Date published: 24-06-2014

whos of Silicon Valley. Screenshot/Jennifer Van Grove/CNET FWD.us is channeling its powers to come up with tech innovation that spurs Congress to take action on immigration reform. The political action group, which is backed by dozens of big name techies, has worked with Hackers/Founders to put toge... Read more

Source: cnet.com.ortal.com

Top found tags: social media(4),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Comcast Xfinity evil twin steals subcriptionsLocation: New York, United States
Date published: 24-06-2014

A senior security researcher at the National Renewable Energy Laboratory has demonstrated how to steal Comcast Xfinity subscriptions by masquerading as a wireless access point. Greg Foss (@Heinzarelli) published code that could be deployed on a Wifi Pineapple to replicate one of Comcast's million c... Read more

Source: go.theregister.com

Top found tags: vulnerability(1),social media(2),wireless(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
JackPOS - Another Credit Card StealerLocation: Jack, United States
Date published: 24-06-2014

In a previous blog post on Dexter, we briefly mentioned a new strain of point-of sale (PoS) malware that has compromised over 4,500 credit cards in the United States and Canada. This new strain of malware, dubbed JackPOS, was detected early this year and between then and the time of writing, has had... Read more

Source: blog.fortinet.com

Top found tags: United States(2),update(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminals exploit trusted app and service vulnerabilitiesLocation: McAfee - Santa Clara, United States
Date published: 24-06-2014

The manipulation of legitimate mobile apps and services played a key role in the expansion of mobile malware at the beginning of 2014. McAfee Labs found that 79 percent of sampled clones of the Flappy Birds game contained malware. Through these clones, perpetrators were able to make phone calls with... Read more

Source: net-security.org

Top found tags: trojan(2),cybercrime(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Too many servers still vulnerable to Heartbleed exploitLocation: Graham, United States
Date published: 24-06-2014

Too many servers still vulnerable to Heartbleed exploit. Since it was brought to our attention three months ago, Heartbleed made countless headlines due to the severe dangers it poses. The vulnerability, which affects systems using the OpenSSL library, allows hackers to penetrate affected servers wi... Read more

Source: itproportal.com

Top found tags: vulnerability(1),OpenSSL(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Impact of Windows XP End of life on Critical InfrastructureLocation: Microsoft HQ - Redmond, United States
Date published: 23-06-2014

Which is the impact of the Windows XP End of Life on the critical infrastructure? Which are the risks and the mitigation strategies that could be adopted?This week I had the pleasure and the honor to participate as a speaker for a seminar at Rome Security Summit 2014, the theme of the event was I... Read more

Source: securityaffairs.co

Top found tags: government(2),Microsoft(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GameOver Zeus malware vitimizes 234.000 worldwideLocation: New York, United States
Date published: http://www.ciol.com/ciol/news/216356/gameover-zeus-malware-vitimizes-234000-worldwide

While the U.S. leads multi-national action against GameOver Zeus botnet and Cryptolocker ransomware, it still pays off to stay alert and look after your own securityNews... Read more

Source: 19-06-2014 | www.ciol.com

Top found tags: financial sector(2),United States(2),malware(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A peek inside a commercially available Android-based botnet for hireLocation: Google HQ - Mountain View, United States
Date published: 23-06-2014

Relying on the systematic release of DIY (do-it-yourself) mobile malware generating tools, commercial availability of mobile malware releases intersecting with the efficient exploitation of legitimate Web sites through fraudulent underground traffic exchanges, as well as the utilization of cybercrim... Read more

Source: www.webroot.com

Top found tags: EN(1),fraud(1),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lincolnshire cyber crime unit deals with 17 cases in two monthsLocation: Lincoln, United States
Date published: 19-06-2014

The new cyber crime unit set by Lincolnshire Police two months ago has already investigated 17 incidents.The force only began recording the new classification of cyber-crime at the beginning of April.Since, the unit investigated 17 incidents of crimes committed using a computer: 10 classified as vio... Read more

Source: thelincolnite.co.uk

Top found tags: telecom sector(2),government(3),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Home Min plans to establish cyber crime unit in every districtLocation: New Delhi, India
Date published: 19-06-2014

To tackle the growing number of cyber crimes, union home minister Rajnath Singh has asked the ministry to look into the possibility of setting up specialized cyber crime units in each of the countrys 671 districts. According to a report in The Asian Age, the issue was discussed at length during a... Read more

Source: egovreach.in

Top found tags: report(1),training(1),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SAs digital Bonnie and Clyde arrestedLocation: Hollywood, Los Angeles, United States
Date published: 19-06-2014

In a tale one would expect more from Hollywood than from the local 7PM news; a group of people have been arrested for a rather elaborate cyber crime carried out against the Road Traffic Management Corporation (RTMC) that resulted in the theft of over R8.7 million.A report from Times Live details how... Read more

Source: www.htxt.co.za

Top found tags: financial sector(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gameover Zeus: Two Weeks On and Nothing Has ChangedLocation: National Crime Agency - London, United Kingdom
Date published: 19-06-2014

It was two weeks ago that the Gameover Zeus botnet was disrupted by the UK's National Crime Agency, the FBI and Europol, but in that time little has changed say cyber security experts and the public won't change the way they use the internet.In the warning issued by the NCA two weeks ago, it said ... Read more

Source: www.ibtimes.co.uk

Top found tags: malware(3),cybercrime(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Suckers for romance still falling victim to fraudLocation: Queens, United States
Date published: 20-06-2014

THE Fraud and Cyber Crime Group have issued a community warning as many continue to fall victim to romance fraud.Detective Superintendent Brian Hay said romance fraud continued to be criminal scourge across Queensland and Australian communities. "For the first five months of this year Queenslanders... Read more

Source: www.sunshinecoastdaily.com.au

Top found tags: Nigeria(1),cybercrime(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
7 days, 10 plaints on cyber helplineLocation: Facebook - Menlo Park, United States
Date published: 20-06-2014

Seven days after a helpline was started to address complaints of objectionable content online, the cyber crime cell has received a total of 10 complaints till Thursday, out of which eight of the posts or pages have been blocked. The mechanism was introduced in order to prevent a law and order ... Read more

Source: www.asianage.com

Top found tags: India(2),cybercrime(3),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GCHQ promotes collaborative actionLocation: National Crime Agency - London, United Kingdom
Date published: 19-06-2014

The IA14 Conference in London on Monday concluded with GCHQ director, Sir Iain Lobban, giving an insight into how GCHQ sees its role protecting and supporting UK citizens, industry and the economy.Edited highlights from Sir Iain Lobban's presentation:The purpose of this event - IA14: Cyber Secur... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(4),government(5),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man arrested for possession of child pornLocation: Lincoln, United States
Date published: 20-06-2014

A Lincoln County man is being held on a charge of possession of child porn.Scott Gill, 25, of Brookhaven, was arrested Thursday by investigators with the Attorney Generals Cyber Crime Unit, according to press release from the AGs office.Gill was arrested after an investigation into the traffic... Read more

Source: www.hattiesburgamerican.com

Top found tags: EN(1),child pornography(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Isle of Man: UK Issues National Strategic Assessment Of Serious And Organised Crime 2014Location: National Crime Agency - London, United Kingdom
Date published: 20-06-2014

The National Crime Agency (the "NCA") has issued its 'National Strategic Assessment of Serious and Organised Crime 2014' (the "Assessment"). This is a 'must read' for Money Laundering Reporting Officers and their deputies, who need to:-demonstrate an understanding of trends for the purposes ... Read more

Source: www.mondaq.com

Top found tags: United Kingdom(2),update(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Saucier man sentenced to 12 years for child porn chargeLocation: Harrison, United States
Date published: 21-06-2014

SAUCIER, MS (WLOX) -A Saucier man who admitted having child pornography will spend the next 12 years in prison.Michael Ishee, 48, was sentenced Friday to 20 years in prison, 12 must be served in the custody of the Department of Corrections. Ishee must also register as a sex offender, pay a $10,000 f... Read more

Source: www.wlox.com

Top found tags: pornography(3),child pornography(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Glasgow to host major cyber crime conferenceLocation: Scotland, United Kingdom
Date published: 21-06-2014

Strathclyde University has organised the two-day International Conference on Cyber crime, Computer Security and Digital Forensics.More than 70 delegates from the UK, Sri Lanka, Australia, New Zealand, Canada and the US are expected to discuss the increasing threat posed by criminal activity online, ... Read more

Source: www.eveningtimes.co.uk

Top found tags: financial sector(2),New Zealand(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Job scam: Two Nigerians among five held for duping nurseLocation: Abuja, Nigeria
Date published: 22-06-2014

A fraudulent on-line job racket offering nurses jobs in the UK has been busted by the cyber crime police in Bangalore with the arrest of five persons including two Nigerians. The accused had cheated a nurse to the tune of Rs 11 lakh by promising her a job at the Ealing Hospital in the United Kingdom... Read more

Source: indianexpress.com

Top found tags: Nigeria(3),telecom sector(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Stop cyber-crime army' to be set up in Kerala schoolsLocation: New York, United States
Date published: 23-06-2014

The higher education department in Kerala Monday launched a cyber safety awareness campaign as part of which a "Stop Cyber-Crime Army" will be formed in all schools in the state, officials said.State-owned IT venture Infopark is playing host to the cyber safety awareness campaign."Infopark will a... Read more

Source: www.business-standard.com

Top found tags: education(2),financial sector(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
INTERNET OF THINGS NEEDS NEW SECURITY MODELLocation: DARPA - Arlington, United States
Date published: 23-06-2014

DARPA is currently developing an 'unhackable' operating system for embedded systems.Internet of Things require a new security model instead of normal model for PCs and smartphones, in order to take off, says top US defence official.Speaking at Gigaom's Structure conference in San Francisco, US De... Read more

Source: www.cbronline.com

Top found tags: government(2),United States(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NCC To Launch .trust As Internet Community To Tackle Cyber CrimeLocation: NCC Group - Manchester, United Kingdom
Date published: 20-06-2014

LONDON (Alliance News) - NCC Group PLC Friday said it will launch a new secure internet community aimed at tackling cyber crime within its domain services division, its new unit which it expects to generate GBP1.0 million in revenue in the current financial year and GBP5.0 million in the next year.N... Read more

Source: www.lse.co.uk

Top found tags: report(1),critical infrastructure(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GameOver Zeus malware vitimizes 234.000 worldwideLocation: New York, United States
Date published: http://www.ciol.com/ciol/news/216356/gameover-zeus-malware-vitimizes-234000-worldwide

While the U.S. leads multi-national action against GameOver Zeus botnet and Cryptolocker ransomware, it still pays off to stay alert and look after your own securityNews... Read more

Source: 19-06-2014 | www.ciol.com

Top found tags: financial sector(2),United States(2),malware(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft patches DoS bug in anti-malware engineLocation: Microsoft HQ - Redmond, United States
Date published: 18-06-2014

MICROSOFT HAS PATCHED a vulnerability in its anti-malware engine, over seven months after it was reported.The Redmond firm released an advisory today that talks of a "specially crafted file" that could cause a denial of service. The file would prevent the users anti-malware software from working u... Read more

Source: www.theinquirer.net

Top found tags: vulnerability(2),cybercrime(5),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ebay pulls N9500 Chinese spyware phone from auction websiteLocation: Beijing, China
Date published: 19-06-2014

EBAY IS REMOVING auctions of a Chinese smartphone that looks like a legitimate model but is actually an information snarfing cybersnipe.The phone and its "extensive" spyware presence was first noted by a German security firm called Gdata. Gdata said that the pre-installed malware looks like an app... Read more

Source: www.theinquirer.net

Top found tags: Google(3),Google Play(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HACKERS BREACHED A MAJOR HEDGE FUND TO STEAL INFORMATION ON TRADELocation: New York, United States
Date published: 20-06-2014

In 2013, the servers of a large and powerful hedge fund became the target of hackers. The culprits installed malware, bringing the firm's high speed trading to a halt, and redirecting trade information to the hackers' machines. While BAE Systems Applied Intelligence declined to provide CNBC the na... Read more

Source: www.nextgov.com

Top found tags: financial sector(2),government(2),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A new Bitcoin Mining trojan spread via FacebookLocation: Facebook - Menlo Park, United States
Date published: 21-06-2014

Hundreds of Facebook users from Portugal, Belgium, India, Romania, Serbia and other countries got infected with a new Bitcoin mining Trojan.Social media represents a privileged target for cybercrime, the last threat that is menacing Facebook users is a new malicious campaign which spread a Trojan wi... Read more

Source: securityaffairs.co

Top found tags: trojan(2),social media(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Exploit insecure malware code to retaliate against hackers: WebsenseLocation: New York, United States
Date published: 23-06-2014

Security firms should consider exploiting coding mistakes in malware to take the security fight straight back to the hackers, a Websense security analyst has suggested in a discussion blog that outlines steps to take over the command and control (C&C) servers related to the Zeus banking Trojan.A hig... Read more

Source: www.cso.com.au

Top found tags: trojan(2),cybercrime(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
False stoned virus detections in Bitcoin files are widespreadLocation: Stone, United States
Date published: 24-06-2014

submitted samples to VirusTotal and received positive detections from several, including many respectable vendors like Symantec, Sophos and Trend Micro. stoned-bitcoin The programs are detecting the Stoned virus, an ancient boot sector virus created in 1987. A user report to Microsoft for the proble... Read more

Source: www.zdnet.com

Top found tags: financial sector(2),Trend Micro(2),antivirus(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AskMen website compromised, code injections leading to Caphaw infectionsLocation: New York, United States
Date published: 23-06-2014

Researchers at Websense have discovered malware being served by AskMen.com, a popular portal dedicated to men. As an Alexa top 1000 website, the AskMen sees some 11.6 million visitors a month, offering the attackers a large pool of potential victims.Websense discovered the compromise on Monday, and ... Read more

Source: www.csoonline.com

Top found tags: financial sector(2),malware(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile Malware Is On The Rise, McAfee Report RevealsLocation: McAfee - Santa Clara, United States
Date published: 24-06-2014

When it comes to security, mobile threats are on the rise, according to the June 2014 McAfee Labs Threat Report released today. New mobile malware has increased for five straight quarters, with a total mobile malware growth of 167 percent in the past year alone. Total mobile malware has increased st... Read more

Source: www.forbes.com

Top found tags: mobile device(2),social engineering(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Top website Askmen hacked and used to serve a banking trojanLocation: Oracle - Redwood City, United States
Date published: 24-06-2014

Askmen.com, one of the most popular websites on the Internet (Top 1000 Alexa), is compromised to sever the banking trojan Caphaw.Security experts at Websense have discovered that cyber criminals have compromised the popular website AskMen.com and they used it to serve malware.The attackers deployed ... Read more

Source: securityaffairs.co

Top found tags: malware(3),exploit kit(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CloudFlare: Hong Kong democracy movement hit by massive DDoS attackLocation: Hong Kong, China
Date published: 23-06-2014

A democracy movement in Hong Kong is trying to move that part of China away from the strict political system controlled by the Chinese government to a direct-voting system. Occupy Central, the organization in charge of the movement, is being battered with large DDoS attacks that CloudFlare CEO Matth... Read more

Source: www.technologytell.com

Top found tags: cybercrime(2),government(2),Hong Kong(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The visualization of the DDoS attack that brought down Facebook is frighteningLocation: Facebook - Menlo Park, United States
Date published: 21-06-2014

Last week Facebook did something that shocked a lot of people. It went down for 30 minutes. Facebook prides itself on its uptime and stability.We now know that Facebook was under DDoS attack from China and thats what knocked it out for 30 minutes. The worlds biggest website isnt easy to bri... Read more

Source: slothed.com

Top found tags: website(1),cybercrime(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Keith Alexander to Earn $600,000 a Month for Preventing DDos AttacksLocation: Alexander, United States
Date published: 20-06-2014

When Politico reported that Keith Alexander was shacking up with shadow regulator Promontory Financial Group to profit off his cyber fear-mongering, I knew hed be raking in the bucks.Bloomberg provides more details on how much: his asking price starts at $1M a month, from which he negotiates down... Read more

Source: www.emptywheel.net

Top found tags: cybercrime(4),government(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tally of Cyber Extortion Attacks on Tech Companies GrowsLocation: New York, United States
Date published: 19-06-2014

Tech start-ups continue to get hit by extortion attempts from cybercriminals who aim to shut down their systems until companies pay their ransom.For several months, the Federal Bureau of Investigation has been investigating a wave of so-called denial-of-service, or DDoS attacks, against web start-up... Read more

Source: bits.blogs.nytimes.com

Top found tags: financial sector(2),United States(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Move, Realtor.com hit by denial of service attackLocation: New York, United States
Date published: 19-06-2014

Online real estate company Move (MOVE) released a statement that it is experiencing a distributed denial of service attack.As a result, the sites are having massive amounts of traffic to its website, making realtor.com and Top Producer Systems and Moves other Internet services inaccessible.Move o... Read more

Source: www.housingwire.com

Top found tags: government(1),legislation(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Law to tame online porn, hate speech in offingLocation: Nairobi, Kenya
Date published: 19-06-2014

Kenya: Online child pornography and hate speech will attract stringent punishment including six-year jail terms if a proposed Bill to tackle cyber crime is enacted into law. Under the Cybercrimes and Computer Crimes Bill, 2014, persons convicted of the use of threatening, abusive or insulting words ... Read more

Source: www.standardmedia.co.ke

Top found tags: pornography(3),child pornography(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime and penalties in NepalLocation: New Delhi, India
Date published: 24-06-2014

Internet is a new dimension that is developing in Nepal and the Nepal policeis also acting towards it. AS the power of internet increases the crimes also increase with it. Our country has many sector working with this problem. Central Investigation Bureau (CIB) is Nepal Polices division that is a... Read more

Source: www.deltadigit.info.np

Top found tags: threat(1),telecom sector(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Glasgow hosts cybercrime conferenceLocation: Scotland, United Kingdom
Date published: 22-06-2014

Glasgow is hosting a two-day international conference on cybercrime and computer security.More than 70 delegates from the UK, Sri Lanka, Australia, New Zealand, Canada and the US will discuss the online threats such as hacking and grooming.Police Scotland, Royal Bank of Scotland and NCC group are am... Read more

Source: www.bbc.com

Top found tags: financial sector(2),New Zealand(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Are Americas Banks Prepared for Cyber Warfare?Location: New York, United States
Date published: 23-06-2014

Financial Services Roundtable CEO Tim Pawlenty on how lawmakers could help companies and individuals protect themselves from cybercrime.... Read more

Source: www.boston.com

Top found tags: financial sector(2),government(2),legislation(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Weak legal framework encouraging cybercrimeLocation: Lagos, Nigeria
Date published: 24-06-2014

The paucity of requisite legal framework needed to prosecute offenders is turning Nigeria, Africas largest economy by GDP, into a preferred destination for cybercriminals who now use the country as a base from which to target developed economies, industry insiders have said.Many cybercriminals... Read more

Source: businessdayonline.com

Top found tags: government(2),Nigeria(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HSI meets with European experts on the criminal exploitation of virtual currenciesLocation: Homeland Security Investigations - Washington, United States
Date published: 23-06-2014

More than 70 law enforcement officials from 21 countries gathered at Europol's headquarters in The Hague June 16 and 17 to coordinate investigations into the criminal exploitation of virtual currencies like Bitcoin. The meeting was co-organized by the European Cybercrime Centre (EC3) and U.S. Immig... Read more

Source: www.gsnmagazine.com

Top found tags: Liberty Reserve(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dealing With Comment Spam AttacksLocation: New York, United States
Date published: 20-06-2014

Quickly identifying the source of a comment spam attack and blocking comments from the source can limit the attack's effectiveness and minimize its impact.A relatively small number of sources are responsible for the bulk of comment spam traffic, according to a new report from Imperva, a provider of... Read more

Source: www.baselinemag.com

Top found tags: research(1),spam(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Yo hacked: Popular messaging app can spam users with custom messages, spoof other usersLocation: New York, United States
Date published: 20-06-2014

Someone figured out how to hack Yo, the ridiculously popular messaging app that lets users send the word "Yo" to contacts.What did the hackers take advantage of? Pretty much everything the app has to offer: They can spam users with custom messages and even spoof other users.Or they could. The app... Read more

Source: www.wptv.com

Top found tags: cybercrime(2),vulnerability(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
iMessage spam in latest Chinese govt regulationsLocation: Apple HQ - Cupertino, United States
Date published: 21-06-2014

The Ministry of Industry and Information Technology has included iMessage spam in its latest regulatory plan relating to the management of text message communication as a growing number of Apple users are being spammed on iMessage.The ministry has requested telecommunications operators to monitor an... Read more

Source: www.wantchinatimes.com

Top found tags: China(2),mobile device(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Canadian Anti-Spam Legislation Requirements Become Effective in Less Than Two WeeksLocation: Ottawa, Ontario, Canada
Date published: 23-06-2014

Canadas new anti-spam law (commonly known as CASL) was passed in December 2010, and certain provisions will become effective 1 July 2014 including new consent requirements for e-mails and certain other electronic messages.As of 1 July 2014, an organization must have consent to send commercial... Read more

Source: www.hldataprotection.com

Top found tags: e-mail(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Green in warning on cybercrimeLocation: National Crime Agency - London, United Kingdom
Date published: 24-06-2014

Police are not fully equipped to deal with the rising threat of cybercrime, a justice minister has said.Addressing a conference on modernising justice, Damian Green warned "policing of cyberspace" would be just as demanding as protecting the streets.But the policing, criminal justice and victims m... Read more

Source: uk.news.yahoo.com

Top found tags: threat(1),government(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dramatic Drop in Vulnerable NTP Servers Used in DDoS AttacksLocation: Arbor Networks - Burlington, United States
Date published: 24-06-2014

While patching of webservers vulnerable to the Heartbleed OpenSSL bug may have stalled, the same cannot be said about repairs to NTP servers that could be leveraged in devastating amplification attacks. A spate of distributed denial-of-service attacks (DDoS) tore through companies in January and Feb'... Read more

Source: threatpost.com

Top found tags: DoS(2),OpenSSL(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AskMen Site Compromised by Nuclear Pack Exploit KitLocation: New York, United States
Date published: 24-06-2014

Exploit Kit and social media manager, insisted the site, which is owned by the publishing conglomerate Ziff Davis, never received any emails from Websense. Testa added that AskMen's developers have not been able to detect any malware on the its site either. The site claims to be the No. 1 men'... Read more

Source: threatpost.com

Top found tags: social media(2),United States(2),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers Go Inside HackingTeam Mobile Malware, Command InfrastructureLocation: Kaspersky HQ - Moscow, Russia
Date published: 24-06-2014

governments and law enforcement for the purpose of surveillance, has a global command and control infrastructure and for the first time, security experts have insight into how its mobile malware components work. Collaborating teams of researchers from Kaspersky Lab and Citizen Lab at the Munk School'... Read more

Source: threatpost.com

Top found tags: United States(4),0-day(1),telecom sector(22)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Havex malware targets ICS/SCADA systemsLocation: F-Secure - Helsinki, Finland
Date published: 24-06-2014

F-Secure researchers have, for a while now, been monitoring the spreading of the Havex malware family and have been trying to determine who are the attackers that wield it. Initially spotted in 2013, the group's attacks were directed towards the energy sector, but now they have turned their attenti'... Read more

Source: net-security.org

Top found tags: exploit kit(4),malware(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attackers Using Havex RAT Against Industrial Control SystemsLocation: F-Secure - Helsinki, Finland
Date published: 24-06-2014

The Havex remote access Trojan (RAT) is being used in cyber espionage operations aimed at industrial control systems, according to recent reports. In its 2013 Global Threat Report, cyber security firm CrowdStrike said that a Russian group dubbed "Energetic Bear" was using Havex malware to conduct in'... Read more

Source: securityweek.com

Top found tags: critical infrastructure(4),exploit kit(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Yo Hacked, Hires HackerLocation: Georgia Institute of Technology - Atlanta, United States
Date published: 24-06-2014

The ultra-simple "zero character communication" app Yo, which only allows users to send the word "Yo" to each other, was hacked last week by three Georgia Tech students -- and the company has responded by hiring one of them. As one of the unidentified students explained to TechCrunch at the time, "W'... Read more

Source: www.esecurityplanet.com

Top found tags: vulnerability(1),cybercrime(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Watch Out For Malicious Mobile App DoppelgangersLocation: McAfee - Santa Clara, United States
Date published: 24-06-2014

As we usher in yet another worldwide sporting event this month with the World Cup, it's inevitable that scammers will piggyback on the myriad of opportunities at their fingertips to swipe, nab, and phish for spectators personal data. We e seen it happen a million times before and trending'... Read more

Source: blogs.mcafee.com

Top found tags: Google Play(4),cybercrime(7),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Study: Cloned mobile apps on the riseLocation: McAfee - Santa Clara, United States
Date published: 24-06-2014

New research adds fuel to the idea that mobile apps are riddled with malware that abuses the popularity, features and vulnerabilities of legitimate apps and services. Study: Cloned mobile apps on the rise Study: Cloned mobile apps on the rise The key problem, according to this month's McAfee\'s Thr'... Read more

Source: www.scmagazineuk.com

Top found tags: vulnerability(3),cybercrime(4),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Dataguise Launches Solution for Big Data GovernanceLocation: IBM HQ - Armonk, United States
Date published: 23-06-2014

Information security firm Dataguise has released new solution that enables organizations to easily declare policies, discover sensitive data, view and track entitlements, and audit access to sensitive data across transactional databases, data warehouses, file shares, Apache Hadoop, and other Big Dat... Read more

Source: securityweek.com

Top found tags: report(1),information security(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Massive phishing campaign targets hundreds of online dating websitesLocation: Hewlett-Packard - Palo Alto, United States
Date published: 23-06-2014

Heartbleed bug could be a scapegoat for older breaches Attackers use compromised online dating accounts to develop relationships before requesting money, sometimes via extortion. Online daters beware: credentials for dating websites including Match.com, Christian Mingle, PlentyOfFish, eHarmony, ... Read more

Source: www.scmagazine.com

Top found tags: cyber security(2),financial sector(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Employee accesses nearly 100K patient files in NRAD Medical Associates breachLocation: New York City, New York, United States
Date published: 23-06-2014

As many as 97,000 current and former patients of New York-based NRAD Medical Associates had personal information including Social Security numbers compromised by a former employee radiologist who accessed and acquired the data without authorization. How many victims? As many as 97,000. What ... Read more

Source: www.scmagazine.com

Top found tags: health sector(2),medical sector(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security and The Connected HomeLocation: New York, United States
Date published: 23-06-2014

The battle for the Internet of Things has just begun. According to industry research firm IDC, the IoT market is expected to hit $7.1 trillion by 2020, said John Maddison, vice president of marketing at Fortinet. The ultimate winners of the IoT connected home will come down to those vend... Read more

Source: blog.fortinet.com

Top found tags: research(1),survey(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
6 Recent Real-Life Cyber Extortion ScamsLocation: Cloud, United States
Date published: 23-06-2014

6 Recent Real-Life Cyber Extortion Scams Companies have paid millions, shuttered their doors, and suffered downtime as malicious hackers ramp up blackmail efforts. June has been quite the month for news of cyber extortion, ransomware, and hacking hostage taking. As cyber crooks look to new and ingen... Read more

Source: www.darkreading.com

Top found tags: government(3),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Poorly anonymized logs reveal NYC cab drivers detailed whereaboutsLocation: New York City, New York, United States
Date published: 23-06-2014

In the latest gaffe to demonstrate the privacy perils of anonymized data, New York City officials have inadvertently revealed the detailed comings and goings of individual taxi drivers over more than 173 million trips. City officials released the data in response to a public records request and spec... Read more

Source: arstechnica.com

Top found tags: Anonymous(2),cyber espionage(2),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tough law on cybercrime targets all KenyansLocation: Nairobi, Kenya
Date published: 18-06-2014

Kenya still relies on Central Depositories Act and the Penal Code, among other frameworks, that are not clear with regard to arresting and prosecuting cyber-crime suspects. Previously, Kenyans courts were limited in trying offences committed outside the country. Those found guilty will either be fin... Read more

Source: newskenya.co.ke

Top found tags: password(1),cyber security(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI and NYPD team up to create federal cybercrime task forceLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 19-06-2014

The New York Police Department is teaming up with federal authorities to create a new anti-terrorism task force, but it isnt Al-Qaeda theyre after. A new division announced on Thursday will instead aim to take down computer hackers.Creation of the newly formed Cyber Task Force was confirmed th... Read more

Source: rt.com

Top found tags: cyber security(4),cybercrime(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
5 Free Tools for Compliance ManagementLocation: National Institute of Standards - Gaithersburg, United States
Date published: 23-06-2014

Many organizations must comply with regulations such as HIPAA, and the numbers are growing, fueled by constantly evolving legislation that creates new rules, requirements and auditing procedures. Compliance requirements are often seen as an unnecessary burden that was legislated into existence to pr... Read more

Source: www.esecurityplanet.com

Top found tags: United States(2),government(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Taboola hack allows SEA to redirect Reuters site visitorsLocation: Damascus, Damascus Governorate, Syria
Date published: 23-06-2014

Ad network Taboola, whose widget was hosted on Reuters.com, has revealed that it was compromised by the Syrian Electronic Army. Over the weekend, reports about Reuters site visitors being redirected to a hacker-operated web page began to surface. And by Monday, Taboola confirmed via a company blog p... Read more

Source: www.scmagazine.com

Top found tags: cyber security(2),cybercrime(3),Syrian Electronic Army(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Carwash POS systems hacked, card data stolen, usedLocation: South Carolina, United States
Date published: 23-06-2014

What started out as a local investigation of a man using stolen credit cards in Everett, Wash., turned into a multistate investigation, including the U.S. Secret Service, that uncovered a string of hacks at carwashes nationwide and could be linked to source code stolen from Symantec in 2012, accordi... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Thousands of SMBs guilty of ignoring Heartbleed security warningsLocation: Graham, United States
Date published: 23-06-2014

Thousands of SMBs guilty of ignoring Heartbleed security warnings. Over 300,000 servers are still vulnerable to the Heartbleed bug, despite severe warnings being made by security researcher Robert David Graham over a month ago. Over the weekend, Graham found that at least 309,197 servers are still v... Read more

Source: itproportal.com

Top found tags: research(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Welsh government moving sites to .cymru and .walesLocation: Jones, United States
Date published: 23-06-2014

Welsh government moving sites to .cymru and .wales. Wales will change its government sites over to .cymru and .wales domain suffixes from 2015 to take advantage of its launch this September. Related: .uk registrants required to publish details in privacy blow The Welsh government sites will be s... Read more

Source: itproportal.com

Top found tags: cyber security(2),United Kingdom(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Unveils New Intelligence-Sharing PlatformLocation: Microsoft HQ - Redmond, United States
Date published: 23-06-2014

Microsoft Unveils New Intelligence-Sharing Platform Azure cloud-based system for incident responders and Microsoft Active Protections Program (MAPP) partners automate swapping of threat and attack intel. Microsoft joined the intelligence-sharing platform party today with a preview of its own offerin... Read more

Source: www.darkreading.com

Top found tags: United States(4),telecom sector(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IE users get new protection against potent form of malware attackLocation: Mozilla - Mountain View, United States
Date published: 24-06-2014

Microsoft developers have fortified Internet Explorer with new protections designed to prevent a type of attack commonly used to surreptitiously install malware on end-user computers. The "isolated heap for DOM objects" made its debut with last week's Patch Tuesday. Just as airbags lower the chance... Read more

Source: arstechnica.com

Top found tags: Internet Explorer(2),Microsoft(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers to attack routers at DEF CONLocation: Las Vegas, Nevada, United States
Date published: 24-06-2014

A competition is scheduled for hackers and computer scientists from around the world to better protect consumers against widespread security vulnerabilities in wireless routers. [soho-wifi-] A series of studies in 2013 discovered a security epidemic affecting SOHO Wi-Fi routers, wherein vulnerabilit... Read more

Source: net-security.org

Top found tags: cyber security(2),vulnerability(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft brings own security info exchange to the worldLocation: Microsoft HQ - Redmond, United States
Date published: 24-06-2014

Microsoft has announced a a security and threat information exchange platform for analysts and researchers working in cybersecurity. Dubbed Interflow, Redmond says the new service is a distributed system where users decide what communities to form, what data feeds to bring to the... Read more

Source: go.theregister.com

Top found tags: research(1),threat(1),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco okayed for UK government commsLocation: Cisco HQ - San Jose, United States
Date published: 24-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines Cisco has had a bunch of products certified as by the GCHQ's information security arm, the Communications-Electronics Security Group (CESG). The certification covers IPsec security gateway products in Cisco's ASA v9.1 family hardware m... Read more

Source: go.theregister.com

Top found tags: information security(2),government(3),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers Find and Decode the Spy Tools Governments Use to Hijack PhonesLocation: Kaspersky HQ - Moscow, Russia
Date published: 24-06-2014

whistleblower-inline [gallery-ca] Les and Dave Jacobs/Getty Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement and intelligence agencies use the tool to surreptitiously record and steal dat... Read more

Source: wired.com

Top found tags: United States(4),government(5),telecom sector(20)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SEA hacks Reuters website widget DESPITE 2FA securityLocation: Damascus, Damascus Governorate, Syria
Date published: 24-06-2014

Hacktivists with the Syrian Electronic Army have hit news agency Reuters again. Surfers intending to catch up with the latest news were briefly redirected to a page run by the Syrian Electronic Army. The page (screenshot via HotforSecurity here) berated Western media reports about the conflict in Sy... Read more

Source: go.theregister.com

Top found tags: social media(2),cybercrime(3),Syrian Electronic Army(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Indianapolis plans citywide cyber-defense shieldLocation: Indiana, United States
Date published: 11-06-2014

INDIANAPOLIS - Public safety officials are constantly working to protect the citys critical infrastructure, and now that effort will be made to include the citys business community.Last year, the 911 center received nearly 1.4 million calls for help. The facility is backed up by at least four ... Read more

Source: www.theindychannel.com

Top found tags: cyber security(4),United States(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US could run short on talent to fight cyber-war, study saysLocation: Department of Homeland Security - Washington, United States
Date published: 19-06-2014

The demand for cyber-security experts in the high-paying private sector is creating stiff competition for the best and the brightest and leaving key government positions unfilled.Job postings for cyber-security experts are going unfilled in the federal government, a shortfall threatening to undermin... Read more

Source: www.csmonitor.com

Top found tags: DHS(4),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why hedge funds are under attack by cyber-criminalsLocation: London, United Kingdom
Date published: 21-06-2014

US hedge funds have been under stealthy attacks from cyber-criminals intent on intercepting trading strategies in order to profit from front-running and other illicit maneuvers.For about two years, US hedge funds have been under stealthy attacks from cyber-criminals intent on intercepting trading st... Read more

Source: www.csmonitor.com

Top found tags: trend(1),cyber security(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Phone call fraudsters still rife, says police cyber groupLocation: Microsoft HQ - Redmond, United States
Date published: 23-06-2014

POLICE have issued a warning about phone scams targeting computer owners.The Queensland Police Service Fraud and Cyber Crime Group said callers pretending to be from respected companies such as Telstra or Microsoft were contacting intended victims and telling them there was a problem with their comp... Read more

Source: www.sunshinecoastdaily.com.au

Top found tags: malware(2),financial sector(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Banks Lose N159bn To Cyber CrimeLocation: Lagos, Nigeria
Date published: 23-06-2014

Nigerian banks lost a total of N159 billion to electronic fraud between 2000 and the first quarter of 2013, Nigerian Inter-Bank Settlements Systems (NIBSS Plc) has said. The organisation, however, added that the successful switch from magnetic stripe for automated teller machine (ATM) cards in 2009 ... Read more

Source: leadership.ng

Top found tags: financial sector(2),cyber security(4),Nigeria(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK cyber speechesLocation: National Crime Agency - London, United Kingdom
Date published: 23-06-2014

Tackling cyber crime is a top priority, the Home Office minister Karen Bradley told the recent IA14 conference on information assurance, run by GCHQ.She ended her speech by saying: We are committed in our Serious and Organised Crime Strategy to ensure that the UK is one of the most secure places ... Read more

Source: www.professionalsecurity.co.uk

Top found tags: government(3),cyber security(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kenya: Why Terrorists Could Be Planning Cyber AttacksLocation: Nairobi, Kenya
Date published: 23-06-2014

INTERVIEWKenya is firmly on the path to full digitization with a robust ICT sector that is ever growing. The current government has ambitious ICT-related plans that include a free laptop project for Standard-One-students in public Primary schools across the country, and an ICT-driven economy expecte... Read more

Source: allafrica.com

Top found tags: information security(2),New Zealand(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MOBILE SECURITY THREATS ARE AN EQUAL PROBLEM FOR ANDROID AND IOSLocation: Google HQ - Mountain View, United States
Date published: 20-06-2014

NEW REPORT FINDS IOS MOBILE DEVICES ARE JUST AS SUSCEPTIBLE TO ATTACKS AS ANDROID GADGETS.As far as malware is concerned, Apple has done a good job at keeping it out of its App Store and, although it is not as much of a target for malware as is the case for Android devices, according to a report fro... Read more

Source: www.mobilecommercepress.com

Top found tags: mobile device(2),security management(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Over 300,000 servers remain vulnerable to Heartbleed after initial wave of patchesLocation: Graham, United States
Date published: 22-06-2014

Two months ago, security experts and web users panicked when a Google engineer discovered a major bug known as Heartbleed that put over a million web servers at risk. The bug doesn't make the news much anymore, but that doesn't mean the problem's solved. Security researcher Robert David G... Read more

Source: www.theverge.com

Top found tags: research(1),cyber security(2),OpenSSL(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybersecurity Skills Shortage Poses Threat in SingaporeLocation: Singapore
Date published: 22-06-2014

Singapores ability to fight a rising threat from hackers is hindered by a skills shortage and lack of awareness among companies, according to the computer security firm that runs a state-supported training center.We do see a lack of capability and capacity in skilled professionals, and that... Read more

Source: www.businessweek.com

Top found tags: website(1),government(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Glass Snoopers Can Steal Your Passcode With a GlanceLocation: Google HQ - Mountain View, United States
Date published: 24-06-2014

GoogleGlassVSiPad-edit The UMass researchers testing PIN-spying with Google Glass. [gallery-ca] Cyber Forensics Laboratory at University of Massachusetts Lowell The odds are you cant make out the PIN of that guy with the sun glaring obliquely off his iPads screen across the coffee shop. But ... Read more

Source: wired.com

Top found tags: mobile device(4),United States(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Canada Justice Lawyers Fell for Phishing EmailsLocation: Ottawa, Ontario, Canada
Date published: 24-06-2014

OTTAWA - Lawyers at Canada's justice department were fooled into providing confidential information by responding to phishing emails far more than average Internet users, according to security test results released Monday. According to Canadian government figures, 156 million phishing emails are se... Read more

Source: securityweek.com

Top found tags: cyber security(2),financial sector(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Content Widget Maker Taboola Is Hacked On ReutersLocation: Damascus, Damascus Governorate, Syria
Date published: 24-06-2014

Content Widget Maker Taboola Is Hacked On Reuters Syrian Electronic Army targets widget used by many publishers to surface content that the reader might like. Taboola, a widget used by many electronic publishers to help readers find additional content, was hacked by the Syrian Electronic Army (SEA) ... Read more

Source: www.darkreading.com

Top found tags: cyber security(2),cybercrime(3),Syrian Electronic Army(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Even encrypted Web traffic can reveal highly sensitive informationLocation: Bank of America HQ - Charlotte, United States
Date published: 24-06-2014

Analyzing encrypted Web traffic can potentially reveal highly sensitive information such as medical conditions and sexual orientation, according to a research paper that forecasts how privacy on the Internet may erode. In a paper titled I Know Why You Went to the Clinic, researchers show tha... Read more

Source: www.pcworld.com

Top found tags: cyber security(2),website(2),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police warn residents to be on their guard against cybercrimeLocation: Darlington, United States
Date published: 20-06-2014

POLICE in Darlington are warning residents to be cyber-aware and on the look-out for suspicious activity online.As part of Neighbourhood Watch Week, the Darlington Neighbourhood Police Team has released a video advising residents how to be on their guard against cyber-criminals.Posted on their Faceb... Read more

Source: www.thenorthernecho.co.uk

Top found tags: social media(2),cyber security(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nigerian banks lost $246m to cybercrime in 2013 - CBNLocation: Lagos, Nigeria
Date published: 20-06-2014

The Central Bank of Nigeria (CBN) has announced that last year alone banks in Nigeria lost about US$246 million to cybercrime.Taiwo Longe, the CBNs chief information security officer, said this while speaking at the National Cyber Security Forum (NCSF 2014) organised by the Office of the National... Read more

Source: www.humanipo.com

Top found tags: cyber security(4),Nigeria(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
California company sues bank over cybercrime, wins $350,000 settlementLocation: California, United States
Date published: 20-06-2014

A California oil company that lost thousands after being attacked by hackers has won $350,000 in a legal settlement after suing its bank.TRC Operating Co. Inc, an oil production company from Taft, California, sued the Fresno-based United Security Bank, claiming that the bank has failed to adequately... Read more

Source: www.welivesecurity.com

Top found tags: cyber security(2),cybercrime(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Jeddah Police open digital lab to combat cybercrimeLocation: Jeddah, Saudi Arabia
Date published: 22-06-2014

The Jeddah Police have opened up an exclusive digital laboratory as part of a comprehensive plan to combat cybercrimes, which have gained precedence in the Kingdom as an increasing number of people use the new media and social networking sites to communicate their ideas and opinions.Maj. Gen. Abdull... Read more

Source: www.arabnews.com

Top found tags: government(2),information security(2),Saudi Arabia(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How spies and the secret service are joining the cybercrime fightLocation: GCHQ - Cheltenham, United Kingdom
Date published: 23-06-2014

Cyber terrorism is now firmly on the agenda for the secret services with even James Bond and Jason Bourne getting in on the act. But whereas the NSA has been caught gathering covert intelligence online, with its hand firmly stuck in the cookie jar, MI5 and MI6 have taken a different tack, seeking to... Read more

Source: www.information-age.com

Top found tags: financial sector(4),United Kingdom(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kerala to Form 'Stop Cyber Crime Army' in State SchoolsLocation: New York, United States
Date published: 23-06-2014

The higher education department in Kerala Monday launched a cyber-safety awareness campaign as part of which a "Stop Cyber Crime Army" will be formed in all schools in the state, officials said.State-owned IT venture Infopark is playing host to the cyber-safety awareness campaign."Infopark will a... Read more

Source: gadgets.ndtv.com

Top found tags: financial sector(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Extending Cybersecurity in RomaniaLocation: Bucharest, Romania
Date published: 23-06-2014

Companies Deep-Secure and Sweetwater s.r.l. signed a contract earlier this month that will extend cybersecurity measures in the Romanian market. The move should help address common cybercrime issues prevalent in former Eastern Bloc nations.According to a U.S. State Department report on 2013 crime in... Read more

Source: www.afcea.org

Top found tags: United States(4),cyber security(8),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Canada Anti-Spam Legislation effective July 1, 2014Location: Ottawa, Ontario, Canada
Date published: 18-06-2014

Will Your Marketing Campaign Be the Target of a Class Action Lawsuit or Regulatory Investigation for Failing to Comply with Canadas Anti-Spam Legislation?What is Canadas Anti-Spam Legislation (CASL)?CASL[1] was passed into law on December 15, 2010, and is widely regarded as the strictest... Read more

Source: www.lexology.com

Top found tags: social media(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
British Airways Customers Warned Of Email ScamLocation: London, United Kingdom
Date published: 19-06-2014

Customers of British Airways have been advised to be on the alert for e-mails purporting to come from the airline, containing the claim that their ticket has not been activated, Hoax Slayer reports.The e-mail is not genuine and the scammers are relying on people who have booked a flight and are ther... Read more

Source: www.mailcleaner.net

Top found tags: malware(2),airport(3),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Parkview to pay $800,000 records fineLocation: Park, United States
Date published: 23-06-2014

Parkview Health System Inc. has agreed to pay an $800,000 fine to the U.S. Department of Health and Human Services' Office for Civil Rights to settle potential HIPAA violations related to medical records.The agency Monday said it opened an investigation after receiving a complaint from a retiring p... Read more

Source: www.journalgazette.net

Top found tags: United States(2),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Briefing Paper: The Threat of Cyber-Crime to the UKLocation: National Crime Agency - London, United Kingdom
Date published: 24-06-2014

Cyber threats to the UK remain a Tier-One national security risk, and the Cyber Security Strategy identifies criminal use of cyberspace as one of the three principal threats to UK cyber-security alongside state and terrorist use.Download the briefing paper here (PDF)As the number of internet users a... Read more

Source: www.rusi.org

Top found tags: United Kingdom(2),cybercrime(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brit bank Barclays rolls out voice recog for telephone bankingLocation: New York, United States
Date published: 24-06-2014

UK high street bank Barclays is introducing voice recognition for users of its telephone banking service. The roll-out of the technology is designed to provide a more secure alternative to pass-codes and the answers to secrets questions as a means to authenticate consumers accessing telephone bankin'... Read more

Source: go.theregister.com

Top found tags: financial sector(2),United Kingdom(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Daddy, what will you do in the new security wars?Location: Woodward, United States
Date published: 24-06-2014

A senior figure at the anti-virus giant McAfee once told this writer the security industry was a mess. There were too many vendors trying to do too many things. But what the industry mirrors is the threat landscape it is trying to calm down. Just look at what's happened in the past six months. Tw'... Read more

Source: go.theregister.com

Top found tags: telecom sector(6),cybercrime(7),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crowdsourcing & Cyber Security: Who Do You Trust?Location: Silicon Valley, United States
Date published: 24-06-2014

Crowdsourcing & Cyber Security: Who Do You Trust? A collective security defense can definitely tip the balance in favor of the good guys. But challenges remain. As the interconnectedness of our society in cyberspace has grown exponentially, virtually every aspect of industry has become dependent on '... Read more

Source: www.darkreading.com

Top found tags: trojan(2),vulnerability(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
On prevention vs. detection, Gartner says to rebalance purchasingLocation: Gartner - Stamford, United States
Date published: 24-06-2014

ONOX HILL, Md. -- According to a 20-year Gartner analyst, enterprises have long over-spent on threat prevention and under-spent on detection and response, but that doesn\'t mean legacy prevention-centric security technologies are going away anytime soon. During a session Monday on the evolving parad'... Read more

Source: searchsecurity.techtarget.com

Top found tags: United States(2),antivirus(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Consumers Ready for Internet of Things, But Fear Data Privacy and Security Implications: SurveyLocation: New York, United States
Date published: 23-06-2014

Security vendor Fortinet released a survey that shows homeowners want to embrace the Internet of Things (IoT), but are worried about privacy and security. In a survey of 1,801 homeowners, Fortinet found that 61 percent of U.S. respondents believe the connected house - a home where appliances and hom... Read more

Source: securityweek.com

Top found tags: government(2),South Africa(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What is Wardriving?Location: Ward, United States
Date published: 23-06-2014

Wireless networks have certainly brought a lot of convenience to our lives, allowing us to work and surf from almost anywherehome, cafes, airports and hotels around the globe. But unfortunately, wireless connectivity has also brought convenience to hackers because it gives them the opportunity to... Read more

Source: blogs.mcafee.com

Top found tags: mobile device(2),cyber security(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsofts MacNaughton Offers Look at Cybercrime CenterLocation: Microsoft HQ - Redmond, United States
Date published: 19-06-2014

Cybercriminals have become much more aggressive and much more sophisticated and the only way to combat them to is to be just as aggressive and sophisticated, Bonnie MacNaughton, assistant general counsel at Microsoft. On June 18 she shared a quick overview of Microsofts Cybercrime Center, w... Read more

Source: mesalliance.org

Top found tags: identity theft(2),government(3),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gartner highlights IoT security, security vs. compliance conflictLocation: Gartner - Stamford, United States
Date published: 23-06-2014

ONOX HILL, Md. The time is now for enterprises to plan for the rapid innovation in digital business caused largely by an avalanche of non-traditional Internet-connected devices and advanced threats. The Internet of Things is up there near the top of our security risks, but for us it's still goi... Read more

Source: searchsecurity.techtarget.com

Top found tags: information security(2),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Card fraud impacts 1 in 4 consumers worldwideLocation: New York, United States
Date published: 24-06-2014

A global fraud study of more than 6,100 consumers across 20 countries revealed that one in four consumers is a victim of card fraud in the last five years. The study, conducted by ACI Worldwide and Aite Group, also highlighted that 23 percent of consumers changed financial institutions due to dissat... Read more

Source: net-security.org

Top found tags: identity theft(2),United States(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Thursday Threat Report: Chinese phones crammed with malware, the Sage email scam, and the Dominos Pizza breachLocation: Brussel, Belgium
Date published: 19-06-2014

Welcome to ITProPortal's Thursday Threat Report, where we round up the three greatest security threats facing Internet users, smooth-running enterprise, and occasionally even the survival of the world as we know it. Hold onto your hats - things are about to get scary.Chinese whispersHow can you inf... Read more

Source: www.itproportal.com

Top found tags: social media(2),malware(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. Senate Paying Attention to Malware Matters: Tighter Regulations May Be ComingLocation: Federal Trade Commission - Washington, United States
Date published: 20-06-2014

The government is sitting up and taking notice of what it calls a growing threat to online safety and security: malware attacks. And if the industry isn't more careful, it may be forced to abide by stricter rules and oversight governing online advertisements that could come down the pike.The U.S. S... Read more

Source: www.econtentmag.com

Top found tags: cyber security(4),United States(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Who is ultimately responsible for data security in the cloud?Location: New York, United States
Date published: 24-06-2014

A recent report following Infosecurity Europe 2014 suggested that 43 per cent of organisations had no enterprise visibility or control into whether employees were putting sensitive data into the cloud. Furthermore, a new survey has shown that almost half of firms say they already, or plan to, run th... Read more

Source: net-security.org

Top found tags: threat(1),training(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDoS + Breach = End of BusinessLocation: Arbor Networks - Burlington, United States
Date published: 23-06-2014

A distributed-denial-of-service attack and subsequent data breach that led to the shuttering of source code hosting firm Code Spaces offers an eye-opening reminder: Beware of DDoS attacks used as a diversionary tactic to draw attention away from devastating hacking."With a DDoS attack, it's all ha... Read more

Source: www.bankinfosecurity.com

Top found tags: data breach(2),DoS(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Wallingford police charge four New York men with credit card fraudLocation: New York City, New York, United States
Date published: 19-06-2014

WALLINGFORD Four New York men were arrested on credit card theft and other charges Wednesday morning.Police detectives saw a car illegally parked in a handicapped space next to the entrance of Walgreens Pharmacy on South Colony Road Wednesday morning. Four men in the car made repeated trips betw... Read more

Source: www.myrecordjournal.com

Top found tags: financial sector(2),government(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is 266bn just the tip of the cybercrime iceberg?Location: Brussels,Belgium
Date published: 19-06-2014

Last week, security vendor McAfee released a piece of research that revealed that cybercrime costs the global economy 266bn each year. While this is a very big number to pin on the annual economic impact of cybercrime, is there a possibility we will look back two years from now and realise that it... Read more

Source: www.computing.co.uk

Top found tags: phishing(2),United Kingdom(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to Protect Your Business from Cyberthreats During the World Cup BY WILL YAKOWICZ @WILLYAKOWICZLocation: Will, United States
Date published: 20-06-2014

Cybercrime campaigns increase during events like the international soccer tournament. Make sure you're aware of the risks when your employees are streaming matches at their desks.Take a walk around your office today and you'll probably find at least a few employees watching a match from the 2014 F... Read more

Source: www.inc.com

Top found tags: threat(1),data breach(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NY lawmakers OK bill to curb child identity theftLocation: New York City, New York, United States
Date published: 18-06-2014

ALBANY, N.Y. (AP) Lawmakers in New York state have passed a proposal designed to help parents prevent their children from becoming the victims of identity theft.The measure passed both the state Senate and Assembly on Tuesday. It now heads to Gov. Andrew Cuomo for his signature.The bill would re... Read more

Source: poststar.com

Top found tags: government(2),identity theft(2),legislation(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Closing the book on the 2011 Sony Playstation data breach?Location: Target HQ - Minneapolis, United States
Date published: 19-06-2014

Following the data breach at TJ Maxx in 2007, I still remember the Sony data breach of 2011 as a landmark occurrence in the world of security and cyber threats. At the time of the initial incident, in which hackers stole as many as 77 million accounts, it was speculated that the intrusion originated... Read more

Source: www.csoonline.com

Top found tags: threat(1),data breach(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Patient data breach at San Diego hospitalLocation: San Diego, United States
Date published: 18-06-2014

SAN DIEGO (AP) - Southern California's Rady Children's Hospital says the private health data of more than 20,000 young patients was mistakenly shared with a handful of job applicants.U-T San Diego reported Tuesday (http://bit.ly/1lUL6qx) that in one breach this month a Rady employee emailed a spre... Read more

Source: www.kusi.com

Top found tags: financial sector(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AT&T Mobile Warns About Data BreachLocation: AT&T HQ - Dallas, United States
Date published: 20-06-2014

Contractor employees were able to lift personal information on wireless customersAT&T is warning mobile customers of a data breach that leaked birth dates and Social Security numbers.Employees of one of the telcos contractors, since terminated, were responsible for the breach, AT&T said in a lett... Read more

Source: www.infosecurity-magazine.com

Top found tags: cyber security(2),data breach(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Seven indicted in Minnesota identity theft ringLocation: Minnesota, United States
Date published: 20-06-2014

A federal grand jury on Thursday indicted seven Minnesota residents on fraud charges stemming from an alleged identity theft ring that aimed to steal more than $1.27 million between 2002 and 2013.The 23-count indictment alleges Christopher Lindsey orchestrated the conspiracy, employing six others wh... Read more

Source: www.twincities.com

Top found tags: identity theft(2),United States(2),Department of Justice(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AT&T Confirms Data BreachLocation: AT&T HQ - Dallas, United States
Date published: 21-06-2014

New York, NY: In a year filled with data breaches and data breach lawsuits, even one more data breach story can seem like too much. With each new store, restaurant or communications company that announces a breach, customers wonder if their personal information is ever truly safe. Data breach lawsui... Read more

Source: www.lawyersandsettlements.com

Top found tags: report(1),data breach(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
4 Ways to Protect Your Teen From Identity TheftLocation: Instagram - Menlo Park, United States
Date published: 22-06-2014

Teens may not get why tweeting their address to a friend a bad idea. Parents, that's where you come in.We all know identity theft is a big national problem. But did you know identity theft is more common among kids, teenagers and college students than any other age group?Since this age bracket tend... Read more

Source: money.usnews.com

Top found tags: financial sector(4),social media(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Medical device company Medtronic compromised by data breachLocation: New York, United States
Date published: 23-06-2014

Medical company Medtronic said it was breached by cyberattacks in separate incidents last year, with some patient records compromised. A number of medical records in the diabetes business unit was taken, but the company didn't disclose how many patients were affected, or what information was at ris... Read more

Source: www.tweaktown.com

Top found tags: cyber security(4),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
7 ways to prevent campus identity theftLocation: Federal Trade Commission - Washington, United States
Date published: 23-06-2014

New York-based business analyst John Reiley shares 7 tips for preventing student identity theftAs college students head back to college or prepare for their first semester as a college student, their primary concerns revolve around financial aid, buying books, making it to class, finding a job, and ... Read more

Source: www.ecampusnews.com

Top found tags: identity theft(2),education(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Metropolitan Companies Inc suffer data breachLocation: New York, United States
Date published: 23-06-2014

Another day, another breach. This morning while sipping on my coffee I read about a security breach that the Metropolitan Companies Inc. suffered recently. The MetropolitanCompanies is a conglomerate of companies that provide services ranging from temporary worker placement to interpreter and transl... Read more

Source: www.csoonline.com

Top found tags: data breach(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Four steps for protecting against a data breachLocation: New York, United States
Date published: 23-06-2014

Data breach protection and prevention requires a thoughtful, realistic, and proactive approach to security across your organization.Everything from your vulnerability to your risk tolerance must be assessed. Below are four steps to protecting your company from a data breach. Applying this step by st... Read more

Source: www.computerdealernews.com

Top found tags: threat(1),vulnerability(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach risks thousands of NHS patients' informationLocation: National Health Service - London, United Kingdom
Date published: 24-06-2014

A data protection breach at private healthcare firm Diagnostic Health may have left up to 10,000 NHS patients information at risk.The BBC reports that a leaked report from the Information Commissioners Office (ICO) revealed the company had been storing unencrypted patient data and breaches dat... Read more

Source: www.itproportal.com

Top found tags: United Kingdom(2),health sector(6),medical sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Two plead guilty to Albany Med identity theft chargesLocation: Albany, United States
Date published: 23-06-2014

ALBANY, N.Y. Two people, who were accused of stealing identities of multiple patients at a local hospital and opening fraudulent credit card accounts, have pleaded guilty to their charges.According to District Attorney P. David Soares, Emmett Woods, 25, and Suzette Guzman-Moore, 45, pleaded guil... Read more

Source: www.fox23news.com

Top found tags: health sector(2),identity theft(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
83% don't know where their sensitive data is locatedLocation: Will, United States
Date published: 24-06-2014

With the transition to the cloud, the ability to track and secure the data at all points of its lifecycle is critical - Will Semple, Alert Logic 83% don't know where their sensitive data is located 83% don't know where their sensitive data is located After surveying more than 1,500 global IT and I'... Read more

Source: www.scmagazineuk.com

Top found tags: RSA(2),United Kingdom(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

House votes to block funding for NSA snoopingLocation: National Security Agency - Fort Meade, United States
Date published: 23-06-2014

Through a House vote, legislators aimed to block the National Security Agency ( NSA) from funds it uses to further its warrantless search of communications data. On Thursday, lawmakers passed an amendment to a 2015 defense appropriations bill. According to a blog post by the Electronic Frontier Foun... Read more

Source: www.scmagazine.com

Top found tags: United States(2),government(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
OpenSSL Heartbleed Patch Progress Slowing Two Months LaterLocation: Graham, United States
Date published: 23-06-2014

Its been more than two months since news broke of the Heartbleed vulnerability in OpenSSL one of the Internets most widely deployed cryptographic libraries. In the days and weeks that followed the emergence of the bug, which affected an unknown but arguably vast swath of the Web, vendors wer... Read more

Source: threatpost.com

Top found tags: research(1),vulnerability(1),OpenSSL(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Heartbleed Vulnerability Persists as Patching LagsLocation: Ford, United States
Date published: 23-06-2014

The Heartbleed vulnerability is still leaking the security out of the Internet. A scan of the Internet by Errata Security turned about 300,000 servers still vulnerable to the flaw. The number is half as many as the firm discovered when it did a similar scan in April, but is evidence nonetheless that... Read more

Source: securityweek.com

Top found tags: OpenSSL(2),vulnerability(2),Bruce Schneier(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android update addresses critical OpenSSL vulnerabilityLocation: Google HQ - Mountain View, United States
Date published: 23-06-2014

Shortly after releasing version 4.4.3, Android has pushed out a new version of its KitKat operating system (4.4.4) for Nexus users, which includes a security fix for a critical OpenSSL vulnerability. According to a Google+ post by Sasha Prueter, an Android program manager at Google, the update addre... Read more

Source: www.scmagazine.com

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whitepaper: A Guide to Recovery Options in WindowsLocation: Microsoft HQ - Redmond, United States
Date published: 24-06-2014

Learn about the powerful additions to the arsenal of recovery tools found in Windows 8. Refresh and reset are powerful additions to the arsenal of recovery tools found in Windows 8. Resetting reverts a machine back to a base image of the initial installation; refreshing a machine is a little less dr... Read more

Source: net-security.org

Top found tags: EN(1),Microsoft(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber defender for smart meters fundedLocation: New York, United States
Date published: 23-06-2014

A cyber defence firm has bagged a multi-million pound investment to counter security challenges faced by the smart energy sector.Smart meters which send energy data between the user and suppliers are set to boom ahead of a planned roll-out to 53 million homes and businesses around the UK by 20... Read more

Source: www.energylivenews.com

Top found tags: smart meter(2),United Kingdom(2),energy(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Synology NAS malware mines $620,000 in DogeCoin for assailant 0Location: Berlin, Germany
Date published: 19-06-2014

Security researchers find September vulnerability attack to GermanyAccording to Dell's security researchers, a single piece of software, surrepitiously installed on some Synology network attached storage devices, has mined $620,000 of virtual currency Dogecoin. A combination of a vulnerability disc... Read more

Source: www.electronista.com

Top found tags: Germany(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Video: Automating Your Cyber Defenses Including Malware RemovalLocation: New York, United States
Date published: 21-06-2014

The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your enterprise. It highlights ten requirements CTOs, CIOs, CISOs and CFOs should articulate as critical to success in aut... Read more

Source: www.sys-con.com

Top found tags: research(1),threat(1),cyber defense(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
18 percent of Govt and Defense sector attacked globally, says KasperskyLocation: Kaspersky HQ - Moscow, Russia
Date published: http://www.ciol.com/ciol/features/216481/percent-govt-defense-sector-attacked-globally-kaspersky

94 percent of companies reportedly encountered at least one externally-sourced data security incident within the past 12 monthsFeatures... Read more

Source: 23-06-2014 | www.ciol.com

Top found tags: EN(1),report(1),Kaspersky Lab(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Jihadists Fight Iraq Battle Online and on GroundLocation: Twitter - San Francisco, United States
Date published: 24-06-2014

BAGHDAD - A powerful jihadist group pushing toward Baghdad is waging a parallel war online, flooding social media with updates and riding the football World Cup frenzy to spread its message with corporate-like sophistication. As militants, led by jihadists from the Islamic State of Iraq and the Leva... Read more

Source: securityweek.com

Top found tags: Twitter(1),government(3),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
10 Signs You May Be Addicted to Your Tech (Yes You, Parents)Location: Facebook - Menlo Park, United States
Date published: 24-06-2014

AddictedToTech Disclaimer: If you are in blissful denial that your tech use is out of control at any level, then this article will make you uncomfortable. It may even make you mad. You may want to skip this post and go play Candy Crush instead. Professionals say the first step to dealing with, and o... Read more

Source: blogs.mcafee.com

Top found tags: mobile device(2),social media(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft launches Interflow, a new collaborative security platformLocation: Microsoft HQ - Redmond, United States
Date published: 24-06-2014

Microsoft launches Interflow, a new collaborative security platform. Microsoft has launched a new security and threat information exchange platform called Interflow that should enable quicker communication between online security providers. The software giant said in a press release this week, "Inte... Read more

Source: itproportal.com

Top found tags: Microsoft(1),threat(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
F1 racing ace Michael Schumacher's medical records were pinchedLocation: Geneva, United States
Date published: 24-06-2014

Michael Schumacher's stolen "medical records" are being offered for sale. The management team of the retired motor racing legend has confirmed the theft of files and warned that either the purchase or publication of the documents would provoke both a criminal complaint and a lawsuit. Schumach... Read more

Source: go.theregister.com

Top found tags: social media(2),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Illinois man accused of credit card fraud in Ottawa CountyLocation: Illinois, United States
Date published: 23-06-2014

GRAND HAVEN TOWNSHIP, Mich. (WZZM) -- An Illinois man accused using cloned credit cards to buy prepaid credit cards faces multiple charges in Ottawa County.The suspect allegedly carried out that fraud Saturday afternoon at the Wesco Station at 14750 Mercury Drive. Because of previous crimes at Wesco... Read more

Source: grandhaven.wzzm13.com

Top found tags: legislation(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Credit Card Fraud Up 11%Location: Neiman Marcus - Dallas, United States
Date published: 18-06-2014

With last years Target, Neiman Marcus and Michaels, credit card breach, online security is becoming increasingly more important. Hopefully if banks and credit cards make the 8 Billion dollar investment, we too will have microchips embedded in our credit cards. That said, as we are becoming a cash... Read more

Source: www.theopticalvisionsite.com

Top found tags: credit card(2),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Jewelry Store Owner Pleads Guilty To $200 Million Credit Card Fraud ConspiracyLocation: New Jersey, United States
Date published: 19-06-2014

(Newsroom America) -- A New Jersey jewelry store owner who used his business to further one of the largest credit card fraud schemes ever charged by the Justice Department has admitted his role in the scheme.He is the 17th conspirator to do so.Vinod Dadlani, 51, of Lyndhurst, New Jersey, pleaded gui... Read more

Source: www.newsroomamerica.com

Top found tags: health sector(2),medical sector(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Jewelry Store Owner Admits to Credit Card FraudLocation: New Jersey, United States
Date published: 19-06-2014

A New Jersey jewelry store owner pleaded guilty on June 18 to his role in an international credit card fraud ring responsible for more than $200 million in losses to businesses and financial institutions. Vinod Dadlani, 51, of Lyndhurst, New Jersey, who owned Tanishq Jewels on Newark Avenue in Jerse... Read more

Source: newsindiatimes.com

Top found tags: Department of Justice(3),United Arab Emirates(3),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meridian police seek tips in credit card fraud caseLocation: Target HQ - Minneapolis, United States
Date published: 23-06-2014

MERIDIAN TWP. Police are looking for a woman they say used a stolen credit card to buy $4,800 worth of merchandise at the Target store in Meridian Township.The suspect is described as a black woman about 30 to 40 years old who was last seen wearing a zebra-print outfit and white hat, township po... Read more

Source: www.lansingstatejournal.com

Top found tags: police(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Card skimming warning on city centre cash machinesLocation: Hanover, Germany
Date published: 22-06-2014

POLICE have warned people who used two city centre cash machines on Saturday to check their accounts.Card skimming devices were found on machines at RS McColl in Frederick Street and Thomas Cook in Hanover Street.Anyone who used these machines should contact their bank and check for unusual transact... Read more

Source: www.edinburghnews.scotsman.com

Top found tags: skimming(1),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Card skimming devices were made from phonesLocation: Hanover, Germany
Date published: 24-06-2014

FRAUDSTERS used card skimming devices made from mobile phones to target hundreds of bank customers withdrawing money from two of the citys busiest cash machines.The devices were attached to the autotellers at the RS McColl store in Frederick Street and the Thomas Cook in Hanover Street.Poli... Read more

Source: www.edinburghnews.scotsman.com

Top found tags: skimming(1),financial sector(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile security and incident readinessLocation: AccessData - Lundon, United States
Date published: 24-06-2014

AccessData and Gigaom Research released a report on the growing complexities of mobile security and the limitations of "preventive, policy-driven" solutions that are not designed to detect and respond to mobile security incidents that bypass defenses. "In speaking with the various organizations, we '... Read more

Source: net-security.org

Top found tags: threat(1),mobile device(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden defends mega spy blab: 'Public affairs have to be known by the public'Location: National Security Agency - Fort Meade, United States
Date published: 24-06-2014

Master spy blabbermouth Edward Snowden defended his NSA whistleblowing actions to the Council of Europe today. He told the human rights' parliamentary assembly in Strasbourg, via video link from Moscow, that he had a "personal duty to country, government and family" to reveal details about snooping'... Read more

Source: go.theregister.com

Top found tags: United Kingdom(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Despite Target, Retailers Still Weak On Third-Party SecurityLocation: Target HQ - Minneapolis, United States
Date published: 24-06-2014

Despite Target, Retailers Still Weak On Third-Party Security A new survey from TripWire shows mixed results about retailers' security practices. The big Target breach last year was actually the second stage of an attack that began by breaching the retail giant's third-party HVAC subcontractor (alt'... Read more

Source: www.darkreading.com

Top found tags: research(1),survey(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Former NSA director advocates for thin client cloud security modelLocation: Alexander, United States
Date published: 24-06-2014

ONOX HILL, Md. More than a year after Edward Snowden leaked confidential information about the breadth of the National Security Agency\'s domestic intelligence-gathering, the former head of the NSA staunchly defended the agency\'s actions while advocating for enterprises to adopt the computing p'... Read more

Source: searchsecurity.techtarget.com

Top found tags: U.S. Cyber Command(3),United States(6),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
News of the World editor found guilty on phone hacking chargeLocation: Brooks, United States
Date published: 24-06-2014

Andy Coulson, former editor of the now-defunct News of the World in the UK, has been found guilty of hacking charges, a jury revealed on Tuesday. Coulson, who served as editor of News of the World before leaving the post to serve as communications director for British prime minister David Cameron, w'... Read more

Source: cnet.com.ortal.com

Top found tags: report(1),United Kingdom(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Improperly anonymized taxi logs reveal drivers' identity, movementsLocation: New York City, New York, United States
Date published: 24-06-2014

Software developer Vijay Pandurangan has demonstrated that sometimes data anonymizing efforts made by governments and businesses are worryingly inadequate, as he managed to easily deanonymize data detailing 173 million individual trips made by New York City taxi drivers. The data was provided to Chr'... Read more

Source: net-security.org

Top found tags: EN(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Comprovado: laboratrio ESG valida os pontos fortes do Next Generation Firewall da McAfeeLocation: McAfee - Santa Clara, United States
Date published: 23-06-2014

Alguns podem dizer que sou parcial. No verdade. Eu realmente acredito que a McAfee tem o firewall de prxima gerao (NGFW Next Generation Firewall) de melhor desempenho do mercado. Naturalmente, voc j ouviu tudo isso antes. Todos dizem o mesmo. Toda soluo oferece a melhor qualid... Read more

Source: blogs.mcafee.com

Top found tags: McAfee(1),NL(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Reafirmando nuestras competencias: ESG confirma los puntos fuertes de McAfee NGFWLocation: McAfee - Santa Clara, United States
Date published: 23-06-2014

Algunos pueden pensar que mi opinin no es imparcial, pero no es as. Realmente pienso que McAfee, tiene el firewall de prxima generacin (NGFW) con mejor rendimiento del mercado. Seguramente ya lo ha escuchado antes. Todos lo dicen: su solucin ofrece la mejor calidad, la mxima escalabilida... Read more

Source: blogs.mcafee.com

Top found tags: McAfee(1),NL(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AskMen.com verspreidt malware via Java- en Adobe-lekkenLocation: Oracle - Redwood City, United States
Date published: 24-06-2014

Aanvallers zijn erin geslaagd om toegang tot het online mannenmagazine AksMen.com te krijgen en daar kwaadaardige code te plaatsen die bezoekers via lekken in Java en Adobe probeert te infecteren. De website van AskMen zou elke maand meer dan 10 miljoen bezoekers krijgen. Op verschillende delen van ... Read more

Source: www.security.nl

Top found tags: online banking(2),trojan(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
64-jarige Oostenrijker helpt met oprollen phishingbendeLocation: Den Haag, The Netherlands
Date published: 24-06-2014

Een 64-jarige Oostenrijkse man heeft geholpen met het oprollen van een phishingbende die tienduizenden euro's van zijn bankrekeningen had gestolen. De man was in een phishingmail getrapt en had zijn gegevens op een phishingsite achtergelaten, zo laat de Oostenrijkse politie weten. De criminelen kon... Read more

Source: www.security.nl

Top found tags: phishing(1),police(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Software ICS-leveranciers voorzien van malwareLocation: F-Secure - Helsinki, Finland
Date published: 24-06-2014

Een bende cybercriminelen die het voorzien heeft op bedrijven in verschillende industrile sectoren voorziet software voor industrile controlesystemen (ICS) op de websites van leveranciers van malware. Zodra bedrijven deze getrojaniseerde software installeren raken ze besmet. SCADA (supervisory c... Read more

Source: www.security.nl

Top found tags: malware(2),trojan(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ziggo wil beveiliging WifiSpots verbeterenLocation: Ziggo B.V. - Utrecht, The Netherlands
Date published: 24-06-2014

Ziggo gaat het WiFi-netwerk dat klanten met hun thuismodem kunnen opzetten door middel van hackers testen. Tijdens een hackatron aanstaande maandag mogen de hackers de WiFi-hotspots onder vuur nemen en proberen gaten te ontdekken in de beveiliging. Ziggo wifi logoZiggo telt inmiddels 1,2 miljoen Zig... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),The Netherlands(2),wireless(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminelen misbruiken populariteit van Flappy BirdLocation: McAfee - Santa Clara, United States
Date published: 24-06-2014

Bijna tachtig procent van de onderzochte klonen van mobiele Flappy Bird games bevatten malware. Met behulp van deze klonen waren indringers in staat om zonder toestemming te telefoneren, apps te installeren, de lijst met contacten te kopiren, de locatie bij te houden of onbeperkt toegang kregen to... Read more

Source: www.beveiligingnieuws.nl

Top found tags: trend(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bijna alle bedrijven slachtoffer cybercrimeLocation: Kaspersky HQ - Moscow, Russia
Date published: 24-06-2014

Vrijwel alle bedrijven hebben op zijn minst n aanval van buitenaf te verduren gehad in de afgelopen maanden. Daarbij raakte 11 procent gevoelige data kwijt. Dat blijkt uit onderzoek van beveiliger Kaspersky Lab onder 4000 IT-managers in 27 landen. Wereldwijd werd 94 procent van de bedrijven aang... Read more

Source: www.automatiseringgids.nl

Top found tags: cyber espionage(2),Kaspersky Lab(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Internet of Things is onveilig'Location: DARPA - Arlington, United States
Date published: 24-06-2014

"Voordat het Internet of Things er komt, zullen we eerst een volledig nieuw beveiligingssysteem moeten ontwerpen, anders gooien we onze eigen glazen in", aldus Dan Kaufman. Hij is directeur van het Information Innovation Office van DARPA. Het US Defense Advanced Research Projects Agency (DARPA) houd... Read more

Source: www.automatiseringgids.nl

Top found tags: government(2),research(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mail gemeente Groningen misgebruikt voor spamLocation: Groningen, Groningen, Groningen, The Netherlands
Date published: 20-06-2014

Het was een opmerkelijke mail gisteren in de mailbox van het Ouderenjournaal. De mail s vermeldde de gemeente Groningen als de afzender, maar was verstuurd via de Ivoorkust. Een reden temeer om de mail niet te openen. En terecht niet bleek achteraf.De gemeente Groningen is namelijk niet de afzender ... Read more

Source: www.ouderenjournaal.nl

Top found tags: spam(1),local authority(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SPAM-WETGEVING ONJUIST GEMPLEMENTEERD?Location: College van Beroep voor het bedrijfsleven - Den Haag, The Netherlands
Date published: 18-06-2014

Onjuiste implementatie SPAM richtlijn? In een uitspraak van het College van Beroep voor het bedrijfsleven (CBb) lijkt het CBb in n zin te overwegen dat Nederland de anti-spam richtlijn onjuist heeft gemplementeerd in artikel 11.7 Telecommunicatiewet (Tw). Als gevolg van deze overwe... Read more

Source: www.solv.nl

Top found tags: spam(1),website(1),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebookaccounts kapen is in: hoe krijg je hem terug?Location: Facebook - Menlo Park, United States
Date published: 16-06-2014

De cyberonderwereld blijft nieuwe manieren vinden om geld te verdienen. De meest recente trend: Facebookpagina's kapen, om langs die weg spam te kunnen versturen, informatie te verzamelen voor gerichte aanvallen en zelfs losgeld te vragen. Wij lijsten voor u nog eens op wat je kan doen om zo'n sce... Read more

Source: www.demorgen.be

Top found tags: Kaspersky Lab(4),social media(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LinkedIn niet schuldig aan hackenLocation: LinkedIn HQ - Mountain View, United States
Date published: 14-06-2014

MOUNTAIN VIEW - LinkedIn heeft geen e-mailaccounts en contactlijsten gehackt. Een Amerikaanse rechter oordeelde dat het bedrijf geen privacyrechten van klanten heeft geschonden.LinkedIn werd in september 2013 door een groep gebruikers aangeklaagd voor hacken. Het bedrijf zou spam-achtige e-mails met... Read more

Source: www.gelderlander.nl

Top found tags: cyber security(2),social media(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobiele malware: het begon allemaal met CabirLocation: Kaspersky HQ - Moscow, Russia
Date published: 19-06-2014

Tien jaar geleden werd het allereerste virus ontworpen om mobiele telefoons aan te vallen: Cabir. In tegenstelling tot de meeste moderne malware werd Cabir niet uitgerust met een breed scala aan kwaadaardige functies. In plaats daarvan maakte het geschiedenis door slechts te bewijzen dat het i... Read more

Source: ictmagazine.nl

Top found tags: cybercrime(2),cyber security(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stateful Application Control maakt malwaredetectie overbodigLocation: Gregory, United States
Date published: 19-06-2014

Malware is bad, zo bad zelfs dat alle traditionele middelen om malware te bestrijden praktisch nutteloos zijn gebleken. Maar nog niet alle hoop is verloren, zo stelt Peter H. Gregory, een gevierd security-expert en auteur van het boek Stopping Zero-Day Exploits for Dummies. Volgens... Read more

Source: infosecuritymagazine.nl

Top found tags: trojan(2),cybercrime(10),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Panda vindt antivirus opnieuw uitLocation: Brussel, Belgium
Date published: 19-06-2014

Samenvatting:Panda heeft de ambitie om met zijn nieuwe antivirusdienst voor bedrijven de "malware gap" te dichten met behulp van big data en de cloud.Het Spaanse antivirusbedrijf Panda heeft de ambitie om de malware gap te dichten met zijn nieuwe Panda Advanced Protection Services (PAPS) voo... Read more

Source: www.zdnet.be

Top found tags: NL(1),cybercrime(2),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gerichte malware-aanval op Nederlandse bankklantenLocation: Arbor Networks - Burlington, United States
Date published: 24-06-2014

Sinds vorig jaar vindt er een gerichte malware-aanval tegen Nederlandse en Duitse bankklanten plaats, waarbij verschillende Nederlandse banken het doelwit zijn. Dat meldt beveiligingsbedrijf Arbor Networks. De aanvallen worden uitgevoerd via de Citadel-malware en GameOver Zeus Trojan. Dit zijn twee ... Read more

Source: www.security.nl

Top found tags: trojan(2),malware(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyberattack on Hong Kong Vote Was Among Largest Ever, Security Chief SaysLocation: Hong Kong, China
Date published: 21-06-2014

The online voting platform for the unofficial referendum now underway on Hong Kongs political future has been subjected to one of the most severe cyberattacks of its kind ever seen, according to the head of the Internet security company tasked with protecting it.Matthew Prince, chief executive an... Read more

Source: sinosphere.blogs.nytimes.com

Top found tags: government(2),Hong Kong(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Nieuwe add-on maakt privacy-beleid van websites begrijpelijkLocation: Twitter - San Francisco, United States
Date published: 24-06-2014

Websites presenteren hun privacybeleid doorgaans in ondoorgrondelijke teksten die je maar liever meteen wegklikt via de 'akkoord'-knop. Met de nieuwe Privacy Icons-add-on kun je in n oogopslag zien of je daar verstandig aan deed. Privacy Icons is een initiatief van Disconnect en TRUSTe. Die di... Read more

Source: www.automatiseringgids.nl

Top found tags: Internet Explorer(2),telecom sector(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IRS scandal: Ludicrous claims about missing government emails? Been there, done thatLocation: White House - Washington D.C., United States
Date published: 24-06-2014

investigation? Check. scandal? Check. professionals? Check. seem impossibly inflated? Check. incomprehensibly unprofessional as it seems -- or if a pretense of cluelessness being used to divert questions of disclosure? Check. Sound familiar? Which administration am I talking about? Is it the Obama a... Read more

Source: www.zdnet.com

Top found tags: United States(2),government(4),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Journalisten moeten echte IT'ers over security spreken"Location: Graham, United States
Date published: 24-06-2014

Als het gaat om IT-onderwerpen zoals cybersecurity kloppen journalisten te vaak aan bij mensen die geen kennis van zaken hebben en die er alleen op uit zijn om hun eigen agenda te helpen, zo stelt beveiligingsexpert Robert Graham. Hij wijst naar een recent artikel van zakenblad Forbes. Daarin worden'... Read more

Source: www.security.nl

Top found tags: privacy(1),research(1),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Microsoft waarschuwt ontwikkelaars voor adware-deadlineLocation: Microsoft HQ - Redmond, United States
Date published: 24-06-2014

Softwareontwikkelaars hebben nog tot 1 juli de tijd om Microsoft te laten weten waarom hun software niet als adware bestempeld zou moeten worden, want dan gaan de nieuwe regels in, zo waarschuwt de softwaregigant. Begin april kondigde Microsoft nieuwe richtlijnen voor adware aan. Programma's die ad... Read more

Source: www.security.nl

Top found tags: Microsoft(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IE11 gaat altijd om opslaan wachtwoorden vragenLocation: Microsoft HQ - Redmond, United States
Date published: 24-06-2014

Microsoft heeft een aanpassing aan Internet Explorer 11 doorgevoerd waardoor de browser voortaan altijd zal vragen om wachtwoorden voor websites op te slaan, ook al staat de autocomplete-functie uitgeschakeld. Volgens Microsoft is een goede wachtwoordmanager zeer belangrijk voor gebruikers. Het is n... Read more

Source: www.security.nl

Top found tags: NL(1),website(1),Internet Explorer(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft lanceert update voor Windows UpdateLocation: Microsoft HQ - Redmond, United States
Date published: 24-06-2014

Om de veiligheid van Windowsgebruikers verder te vergroten heeft Microsoft een update voor Windows Update en Microsoft Update uitgebracht. De update moet onder andere de infrastructuur die de Windows Update en Microsoft Update Clients gebruiken verder versterken, zo meldt het Windows Update Team. Da... Read more

Source: www.security.nl

Top found tags: Windows(1),Microsoft(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spyware sponsort high-end Android-smartphoneLocation: Google HQ - Mountain View, United States
Date published: 23-06-2014

Samenvatting:We zijn allemaal gewend aan crapware op onze Windows-pc's. Nu beginnen criminelen ook Androidtoestellen te voorzien van spyware in de firmware.Als je op internet een aanbieding tegenkomt die te mooi is om waar te zijn, dan is dat meestal ook zo. Of klinkt een smartphone met een 5 inchs... Read more

Source: www.zdnet.be

Top found tags: Google(3),Google Play(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers ontdekken overheidsspyware voor telefoonsLocation: Den Haag, The Netherlands
Date published: 24-06-2014

Onderzoekers hebben surveillancetools ontdekt waarmee overheidsinstanties smartphones kunnen overnemen en bespioneren. De spyware is ontwikkeld door het Italiaanse bedrijf Hacking Team en werd door onderzoekers van het Russische Kaspersky Lab en Canadese Citizen Lab los van elkaar ontdekt. De spywar... Read more

Source: www.security.nl

Top found tags: Kaspersky Lab(4),government(8),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Politiedetective: creditcardfraude levert meer op dan overvalLocation: Den Haag, The Netherlands
Date published: 24-06-2014

Amerikaanse straatbendes zouden zich steeds vaker met creditcardfraude bezighouden, wat volgens politie aantoont dat deze criminelen slimmer in plaats van harder werken. Dat laat politiedetective Michael Lavey tegenover IT-journalist Brian Krebs weten. Het is zeer eenvoudig om gestolen creditcardgeg... Read more

Source: www.security.nl

Top found tags: financial sector(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Geanonimiseerde New Yorkse taxi-data eenvoudig ontmaskerdLocation: New York City, New York, United States
Date published: 24-06-2014

Het anonimiseren van gegevens houdt niet in dat de inhoud nooit meer achterhaald kan worden, zeker als er zwakke anonimiseringstechnieken worden gebruikt, zo heeft een beveiligingsonderzoeker aangetoond. Onderzoeker Vijay Pandurangan ontving een bestand met 20GB aan ritjes van New Yorkse taxi's. He... Read more

Source: www.security.nl

Top found tags: NL(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ransomware ontregelt Amerikaans politiebureauLocation: Den Haag, The Netherlands
Date published: 24-06-2014

Weer is er een politiebureau in de Verenigde Staten door ransomware getroffen, waardoor belangrijke bestanden niet meer konden worden benaderd omdat ook de back-ups niet bleken te werken. Het nieuwste slachtoffer in een reeks van ransomware-infecties is het Collinsville Police Department. Een agent ... Read more

Source: www.security.nl

Top found tags: ransomware(1),government(2),The Netherlands(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware infecteert computer pas na meerdere muisklikkenLocation: Amsterdam, The Netherlands
Date published: 24-06-2014

Om ervoor te zorgen dat malware op echte computersystemen pas actief wordt, en niet op de virtuele systemen van beveiligingsbedrijven en onderzoekers, passen malwaremakers steeds vaker verschillende technieken toe. Zo wordt er bijvoorbeeld naar het gebruik van de muis gekeken. Het Amerikaanse beveil'... Read more

Source: www.security.nl

Top found tags: NL(1),research(1),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaanse tiener aangeklaagd na aanpassen schoolcijfersLocation: New York, United States
Date published: 24-06-2014

Een 16-jarige Amerikaanse tiener is aangeklaagd wegens het aanpassen van presentielijsten en schoolcijfers van tientallen medestudenten, zo hebben de autoriteiten laten weten. De school stelde onlangs een onderzoek in nadat het de ongeautoriseerde toegang tot het schoolsysteem had ontdekt. Vanwege d'... Read more

Source: www.security.nl

Top found tags: NL(1),research(1),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beveiligingslek veroorzaakt backdoor in backdoorLocation: Amsterdam, The Netherlands
Date published: 24-06-2014

Een beveiligingslek in een populaire backdoor die aanvallers gebruiken om toegang tot webservers te krijgen zorgt ervoor dat ook anderen toegang tot de server kunnen krijgen. Het probleem bevindt zich in de C99 Shell, een programma dat aanvallers op een webserver plaatsen. Dit kan bijvoorbeeld worde'... Read more

Source: www.security.nl

Top found tags: webserver(1),website(1),backdoor(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware infecteert computer pas na aantal muisklikkenLocation: Amsterdam, The Netherlands
Date published: 24-06-2014

Om ervoor te zorgen dat malware op echte computersystemen pas actief wordt, en niet op de virtuele systemen van beveiligingsbedrijven en onderzoekers, passen malwaremakers steeds vaker verschillende technieken toe. Zo wordt er bijvoorbeeld naar het gebruik van de muis gekeken.'... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid verholpen in SambaLocation: Amsterdam, The Netherlands
Date published: 24-06-2014

Samenvatting: Er is een update uitgebracht voor Samba die de kwetsbaarheid verhelpt. Gevolgen: Een kwaadwillende kan toegang krijgen tot gevoelige informatie en kan mogelijk een Denial-of-Service veroorzaken van de Netbios name service daemon en van de smbd file server daemon. Beschrijving: Door een... Read more

Source: www.ncsc.nl

Top found tags: update (1),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in PHPLocation: Hewlett-Packard - Palo Alto, United States
Date published: 24-06-2014

Samenvatting: Er zijn updates uitgebracht om kwetsbaarheden in PHP 5.4 te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden misbruiken om verhoogde gebruikersrechten te verkrijgen, willekeurige code uit te voeren of om een Denial-of-Service te veroorzaken. Beschrijving: CVE-2014-0185 Door... Read more

Source: www.ncsc.nl

Top found tags: PHP(1),Ubuntu(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in PHP verholpenLocation: Hewlett-Packard - Palo Alto, United States
Date published: 24-06-2014

Samenvatting: Er zijn updates uitgebracht om een kwetsbaarheid in PHP te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken voor het veroorzaken van een Denial-of-Service (DoS) en mogelijk op afstand willekeurige code uitvoeren. Beschrijving: Kwetsbaarheid in de DNS TXT-record pa... Read more

Source: www.ncsc.nl

Top found tags: PHP(1),Ubuntu(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in LibreOfficeLocation: Ubuntu - London, United Kingdom
Date published: 24-06-2014

Samenvatting: LibreOffice heeft updates beschikbaar gesteld die de kwetsbaarheid verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken door malafide LibreOffice bestanden te versturen. Bij het openen wordt mogelijk Macro code uitgevoerd onder gebruikersrechten. Beschrijving: - CVE-2... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid ontdekt in Supermicro onboard IPMI controllerLocation: Amsterdam, The Netherlands
Date published: 24-06-2014

Samenvatting: Een kwaadwillende kan via de Intelligent Platform Management Interface (IPMI) van Supermicro moederborden wachtwoorden verkrijgen. Gevolgen: Het verkrijgen van wachtwoorden via de onboard IPMI controller op Supermicro moederborden. Beschrijving: Op internet is een methode beschreven di'... Read more

Source: www.ncsc.nl

Top found tags: update (1),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish