Under construction

New design coming soon!

CIC News engine statistics

CIC News for 25-06-2014 contains 115 articles: cybercrime(28),cyber security(50),data breach(10),other(27)

CIC News update contains 93 English and 22 Dutch articles for today.
There are 5 published advisories, 0 are English and 5 are Dutch.
In today's English news articles:
- 20 related to cybercrime
- 45 related to cyber security
- 10 related to data breach and identity theft
- 18 for the category other news

In today's Dutch news articles:
- 8 related to cybercrime
- 5 related to cyber security
- 9 for the category other news

Have fun reading.

English cybercrime related news

Capabilities of lawful interception mobile malware revealedLocation: Kaspersky HQ - Moscow, Russia
Date published: 24-06-2014

Researchers from Russian AV company Kaspersky Labs and the Citizen Lab of the University of Toronto have released details about the mobile surveillance tools provided by Hacking Team to governments, intelligence and law enforcement agencies around the world. The Milan-based company says that they ar'... Read more

Source: net-security.org

Top found tags: government(3),Kaspersky Lab(4),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile Malware Leveraging Trusted App and Service Vulnerabilities: McAfeeLocation: McAfee - Santa Clara, United States
Date published: 24-06-2014

Cybercriminals are increasingly abusing flaws in trusted mobile apps and services in an effort to distribute malware, McAfee Labs revealed in a threat report published on Tuesday. McAfee's report provides three examples of malicious applications exploiting features and vulnerabilities in legitimate'... Read more

Source: securityweek.com

Top found tags: vulnerability(2),cybercrime(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AskMen Compromised to Distribute Financial Malware: ReportLocation: New York, United States
Date published: 24-06-2014

The popular online magazine AskMen has been compromised and abused to distribute a piece of malware, Websense reported on Monday. According to Websense, the attackers injected malicious code into several AskMen pages, including the main site, askmen.com, and some subdomains such as au.askmen.com. Th'... Read more

Source: securityweek.com

Top found tags: United States(2),exploit kit(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSFOCUS Research Finds Decrease in NTP Servers Vulnerable to Abuse in DDoS AttacksLocation: NSFOCUS HQ - Beijing, China
Date published: 24-06-2014

Researchers at NSFOCUS say they observed a significant decrease in May of Network Time Protocol (NTP) servers susceptible to being used in distributed denial-of-service (DDoS) attacks. Back in December, NSFOCUS began continuously tracking the number of NTP servers exploited in amplification attacks.'... Read more

Source: securityweek.com

Top found tags: vulnerability(1),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers Out Spy Tools That Let Governments Hack Your SmartphoneLocation: Kaspersky HQ - Moscow, Russia
Date published: 24-06-2014

Sergey Golovanov and Morgan Marquis-Boire Present Research Morgan Marquis-Boire and Sergey Golovanov Present Research on HackingTeam\s Remote Control System \Galileo\ in London on June 24 Researchers from Kaspersky Lab and Citizen Lab have uncovered new details on advanced surveillance tool'... Read more

Source: securityweek.com

Top found tags: mobile device(4),0-day(1),telecom sector(20)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cross-Platform Mobile Threats: A Multi-Pronged AttackLocation: Cross, United States
Date published: 24-06-2014

Cross-platform threats can be dangerous, both at home and in the office. Thesecan jump\ from one platform to another, or target all of them at the same time potentially infecting a user\s entire network, or even a company\s network if left unchecked. The risk to critical data and s'... Read more

Source: trendmicro.com

Top found tags: trojan(2),telecom sector(6),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NYPD, FBI, MTA create joint cyber crime task forceLocation: New York City, New York, United States
Date published: 24-06-2014

The FBI, the NYPD and the Metropolitan Transportation Authority (MTA) have teamed to create a Financial Cyber Crimes Task Force that will operate out of the FBI\'s New York field office. According to a press release put out by the FBI, the three agencies signed a memorandum of understanding to estab'... Read more

Source: www.scmagazine.com

Top found tags: government(1),threat(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Caphaw trojan being served up to visitors of AskMen.com, according to WebsenseLocation: Oracle - Redwood City, United States
Date published: 24-06-2014

Study indicates that SQL injection continues to be a pervasive threat Multiple pages across AskMen.com have been compromised to serve up a nasty trojan known as Caphaw. A highly popular website that attracts more than 10 million visitors each month AskMen.com is now redirecting users to a na'... Read more

Source: www.scmagazine.com

Top found tags: malware(3),exploit kit(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Battling The Bot NationLocation: White, United States
Date published: 24-06-2014

Battling The Bot Nation Online fraudsters and cyber criminals -- and even corporate competitors -- rely heavily on bots, and an emerging startup aims to quickly spot bots in action. There are massive distributed denial-of-service (DDoS) attacks that saturate a targeted website or network with unwant'... Read more

Source: www.darkreading.com

Top found tags: DoS(2),financial sector(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Got a botnet? Thinking of using it to mine Bitcoin? Don\'t botherLocation: McAfee - Santa Clara, United States
Date published: 24-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines Despite an increase in popularity over recent months amongst botnet operators, malware-powered Bitcoin mining brings little to no financial return, say experts. Security giant McAfee contends in its quarterly threat report (PDF) that commerc'... Read more

Source: go.theregister.com

Top found tags: telecom sector(2),threat(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sysadmins rejoice! Patch rampage killing off nasty DDoS attack vectorLocation: NSFOCUS HQ - Beijing, China
Date published: 25-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines Sysadmins rejoice! NSFOCUS researchers say hundreds of thousands of Network Time Protocol (NTP) servers have been patched, reducing the threat from some devastating and cheap distributed denial of service (DDoS) attacks. The patching rampage'... Read more

Source: go.theregister.com

Top found tags: website(1),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Luuuk Trojan snatches 500,000 from European bank in one weekLocation: Kaspersky HQ - Moscow, Russia
Date published: 25-06-2014

A European bank lost 500,000 in the course of only seven days due to a new financial fraud campaign. Security experts at Kaspersky Lab\s Global Research and Analysis Team discovered evidence of the cybercrime campaign and found that 190 clients in two countries belonging to a single European b'... Read more

Source: www.zdnet.com

Top found tags: telecom sector(4),malware(5),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Banking fraud campaign steals 500k euros in a weekLocation: Kaspersky HQ - Moscow, Russia
Date published: 25-06-2014

The experts at Kaspersky Lab have discovered evidence of a targeted attack against the clients of a large European bank. According to the logs found in the server used by the attackers, apparently in the space of just one week cybercriminals stole more than half a million euros from accounts in the '... Read more

Source: net-security.org

Top found tags: financial sector(4),Kaspersky Lab(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Drastic decline in vulnerable NTP servers due to Heartbleed?Location: NSFOCUS HQ - Beijing, China
Date published: 25-06-2014

In light of the escalation of DDoS attacks used as a means of extorting money from online businesses, the news that there has been a significant decrease in vulnerable Network Time Protocol (NTP) servers that can be used in NTP amplification DDoS attacks is more than welcome. The revelation comes fr'... Read more

Source: net-security.org

Top found tags: SANS(1),threat(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nation state behind malware attacks on European ICS systems?Location: F-Secure - Helsinki, Finland
Date published: 25-06-2014

Researchers at F-Secure have found that cyber-criminals are using the Havex malware family to compromise equipment made by industrial control system manufacturers in Germany, Belgium and Switzerland. Nation state behind malware attacks on European ICS systems? Nation state behind malware attacks on '... Read more

Source: www.scmagazineuk.com

Top found tags: malware(4),critical infrastructure(6),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers Uncover Crucial Security Flaw in Google PlayLocation: Google HQ - Mountain View, United States
Date published: 25-06-2014

Columbia University engineering professor Jason Nieh and PhD candidate Nicolas Viennot recently discovered a major security issue with the Google Play Android app store -- in several thousands cases, developers store secret keys in their software. "Google Play has more than one million apps and over'... Read more

Source: www.esecurityplanet.com

Top found tags: social media(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
iPhone, Android open to remote control malwareLocation: Apple HQ - Cupertino, United States
Date published: 25-06-2014

Italian hacking team seem to have forgotten about a Blackberry version of the spyware. iPhone, Android open to remote control malware iPhone, Android open to remote control malware Analysis by researchers with Kaspersky Lab has revealed that a new generation of RCS - Remote Control Software - malwar'... Read more

Source: www.scmagazineuk.com

Top found tags: Kaspersky Lab(4),mobile device(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber thieves tap over 500,000 from European bankLocation: Kaspersky HQ - Moscow, Russia
Date published: 25-06-2014

Cyber thieves were able to drain over 500,000 from more than 190 customers at a European bank in one week, researchers at security firm Kaspersky Lab have discovered. The researchers did not reveal the bank involved, but said the logs of a command and control (C&C) server for the malware used by '... Read more

Source: www.computerweekly.com

Top found tags: malware(3),financial sector(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
VMware Patches Apache Struts Flaws in vCOPSLocation: VMware - Palo Alto, United States
Date published: 25-06-2014

VMware has patched several serious security vulnerabilities in its vCenter Operations Center Management suite, one of which could lead to remote code execution on vulnerable machines. All of the vulnerabilities that the company patched lie in the Apache Struts Java application framework, and the mos'... Read more

Source: threatpost.com

Top found tags: cybercrime(2),DoS(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Get Safe Online publishes online safety hints, tips and videosLocation: Proofpoint - Sunnyvale, United States
Date published: 25-06-2014

Experts say the government should get involved with tackling the challenge of social engineering scams Get Safe Online publishes online safety hints, tips and videos Get Safe Online publishes online safety hints, tips and videos Research just published claims to show that more than 21 million has '... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(2),cybercrime(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Microsoft unveils security information exchange platformLocation: Microsoft HQ - Redmond, United States
Date published: 24-06-2014

"Interflow will allow cyber security researchers to delve deeper than before, widening the aperture of our available datasets", says Context IS analyst Mark Graham. Microsoft unveils security information exchange platform Microsoft unveils security information exchange platform Microsoft has announc'... Read more

Source: www.scmagazineuk.com

Top found tags: telecom sector(4),cybercrime(5),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Glass launch raises questions on wearable securityLocation: Google HQ - Mountain View, United States
Date published: 24-06-2014

Google Glass is now available in the UK for 1,000, but will the data-gathering wearable computing device face roadblocks because of poor privacy and security? Google Glass launch raises questions on wearable security Google Glass launch raises questions on wearable security Google Glass is the fir'... Read more

Source: www.scmagazineuk.com

Top found tags: Google(3),cyber security(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Knight Foundation awards $3.4 million to 19 projects to bolster internetLocation: New York City, New York, United States
Date published: 24-06-2014

The Knight Foundation, a group aimed at supporting quality journalism, awarded $3.4 million to various projects designed to strength the internet for free expression and innovation. Through its Knight News Challenge, the foundation awarded 19 projects from $35,000 to $500,000, accord'... Read more

Source: www.scmagazine.com

Top found tags: EN(1),privacy(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tech savvy homeowners expect connected homes, worry about privacy, breachesLocation: New York, United States
Date published: 24-06-2014

More than half, or 56 percent, of the 1800 tech savvy homeowners that Fortinet surveyed for its Internet of Things: Connected Home study believe the seamless connection of appliances and electronics to the internet, is xtremely likely to become a reality within the next five years. '... Read more

Source: www.scmagazine.com

Top found tags: survey(1),cyber security(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat USA 2014: Pockets, ExploitedLocation: Black Hat - Las Vegas, United States
Date published: 24-06-2014

Black Hat USA 2014: Pockets, Exploited Back when smartphones and mobile apps were new and novel, people showed off the latest tricks their devices could perform, leading to the cliche "There's an app for that." Today's trio of Black Hat Briefing trio highlights explore the latest mobile-device att'... Read more

Source: www.darkreading.com

Top found tags: PoC(2),Black Hat(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Governments Use 'Legal' Mobile Malware To Spy On CitizensLocation: Kaspersky HQ - Moscow, Russia
Date published: 24-06-2014

Governments Use 'Legal' Mobile Malware To Spy On Citizens New research shows how C&C infrastructure and mobile Trojans are packaged by one firm offering worldwide governments the means to spy on everyday criminals and political targets. The barriers to entry for government entities large and small'... Read more

Source: www.darkreading.com

Top found tags: government(3),Kaspersky Lab(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Five questions to answer before paying for a VPNLocation: New York, United States
Date published: 24-06-2014

If you work on a computer or mobile device away from home, you probably use Wi-Fi hotspots in hotels, cafs, restaurants, airports, or on campus. The problem is, there is no way to know exactly how secure those networks are. The best ways to stay safe on a public Wi-Fi network is to use a Virtual P'... Read more

Source: www.pcworld.com

Top found tags: United States(2),financial sector(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Disconnect's new browser plugin translates complex privacy policies into simple iconsLocation: Mozilla - Mountain View, United States
Date published: 23-06-2014

Disconnect's new browser plugin translates complex privacy policies into simple icons Have you ever tried to read a websites privacy policy only to give up after slogging through paragraphs and paragraphs of dense, lawyerly language? Privacy-focused companies Disconnect and TRUSTe have released'... Read more

Source: www.pcworld.com

Top found tags: telecom sector(2),social media(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attackers poison legitimate apps to infect sensitive industrial control systemsLocation: F-Secure - Helsinki, Finland
Date published: 24-06-2014

Corporate spies have found an effective way to plant their malware on the networks of energy companies and other industrial heavyweightsby hacking the websites of software companies and waiting for the targets to install trojanized versions of legitimate apps. That's what operators of the Havex '... Read more

Source: arstechnica.com

Top found tags: malware(3),critical infrastructure(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Startup Spotlight: FortyCloud\'s Multi-layered Cloud SecurityLocation: Cloud, United States
Date published: 24-06-2014

[annAll-26] Is Tel Aviv giving Silicon Valley a run for its money as a development ground for tech startups? It would appear so. In the past year, IBM purchased Israeli security specialist Trusteer and Google snagged navigational software provider Waze. As venture capitalist Andrew Yoav wrote on Re/'... Read more

Source: www.esecurityplanet.com

Top found tags: education(2),ISP(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Asprox botnet campaign shifts tactics, evades detectionLocation: New York, United States
Date published: 24-06-2014

Fraudsters have targeted gaming platform Steam by using man-in-the-browser style attacks. FireEye researchers are tracking spikes in malicious emails attributed to an ongoing Asprox campaign. Threat actors behind a new malicious email campaign that marshals the Asprox botnet, tweak their malware att'... Read more

Source: www.scmagazine.com

Top found tags: airport sector(2),cyber security(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EXPOSED: Massive mobile malware network used by cops globallyLocation: Kaspersky HQ - Moscow, Russia
Date published: 24-06-2014

A probe by Citizen Lab at the University of Toronto and computer security firm Kaspersky Lab has uncovered a massive network of mobile malware for all phone types that is sold by an Italian firm to police forces around the world. The malware, dubbed Remote Control System (RCS), was produced by a com'... Read more

Source: go.theregister.com

Top found tags: Kaspersky Lab(4),government(5),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facial recognition proposal lacks privacy protections, advocate saysLocation: Hamilton, Ontario, Canada
Date published: 24-06-2014

A facial recognition trade group\s proposals for privacy standards are an xtreme\ departure from U.S. expectations on how personal data should be handled, a privacy advocate said Tuesday. A set of recommendations from the International Biometrics and Identification Association suggest tha'... Read more

Source: www.pcworld.com

Top found tags: cyber security(2),financial sector(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft\'s general counsel calls on Congress to do more to protect users\' private dataLocation: Smith, United States
Date published: 24-06-2014

Microsoft\'s general counsel calls on Congress to do more to protect users\' private data Congress needs to do more to protect private data of U.S. citizens from government surveillance and the misuse of technology by companies, a top Microsoft executive said Tuesday. Congress has taken small steps '... Read more

Source: www.pcworld.com

Top found tags: telecom sector(6),United States(6),government(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Buzzfeed tracks your quiz answersand the results may surprise youLocation: London, United Kingdom
Date published: 24-06-2014

blurbs, and a zillion pop-culture quizzes, but what can the site do once it tells you which 30 Rockcharacter you are? According to a British e-commerce specialist, the answer is quite a bit, as Buzzfeed users are coughing up a lot more personal information than they may realize. In another reminde'... Read more

Source: arstechnica.com

Top found tags: privacy(1),cyber security(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New UK cybersecurity training scheme prepares for hackersLocation: York, United States
Date published: 25-06-2014

With hackers attacking almost every government body, institution and business, organisations have to do more than hide behind technology -- they have to invest in people too, from the server room to the boardroom. That\'s the message from cybX, a new cybersecurity training scheme in North Yorkshire.'... Read more

Source: cnet.com.ortal.com

Top found tags: cyber security(4),United Kingdom(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HackingTeam tool makes use of mobile malware targeting all major platformsLocation: Kaspersky HQ - Moscow, Russia
Date published: 24-06-2014

Researchers with the University of Cambridge revealed just how effective PIN Skimmers can be. Until now, researchers had not been able to identify how the firm\'s surveillance products utilized mobile malware. Researchers have uncovered troubling details about a mobile surveillance service provided '... Read more

Source: www.scmagazine.com

Top found tags: government(3),Kaspersky Lab(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How governments devise custom \implants\ to bug smartphonesLocation: Google HQ - Mountain View, United States
Date published: 25-06-2014

On Twitter, it was billed as Qatif Today, a legitimate Android app that provides news and information in Arabic with a focus on the Qatif governorate of Saudi Arabia. But in fact, the shortened link came with a hidden extraan advanced trojan wealthy nation states use to spy on criminal suspects a'... Read more

Source: arstechnica.com

Top found tags: government(3),social media(6),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Agencies fall short of Australian Government security goals: ANAOLocation: Sydney, Australia
Date published: 25-06-2014

top four security strategies made mandatory by the Australian Government last year. ANAO said its conclusion applied not only at the time the audit was conducted in October 2013, but would still be correct looking forward to 30 June 2014, even after each agency had endeavoured to meet its obligation'... Read more

Source: www.zdnet.com

Top found tags: DHS(2),information security(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SHOCK HORROR: Oz\'s biggest govt agencies to miss infosec deadlineLocation: Sydney, Australia
Date published: 25-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines Australia\'s largest government agencies will miss a July deadline to implement even basic information security controls. The Australian National Audit Office\'s (ANAO\'s) annual report says that the country\'s biggest government agencies wo'... Read more

Source: go.theregister.com

Top found tags: update(2),cybercrime(3),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
(IN)SECURE Magazine issue 42 releasedLocation: Amsterdam, The Netherlands
Date published: 25-06-2014

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 42 has been released today. Table of contents: Six infosec tips I learned from Game of Thrones Dissecting the newly-discovered desire for control and privacy Incid'... Read more

Source: net-security.org

Top found tags: information security(2),cyber security(4),Hack In The Box(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Top 10 technologies for information security in 2014Location: Gartner - Stamford, United States
Date published: 25-06-2014

Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2014. Enterprises are dedicating increasing resources to security and risk. Nevertheless, attacks are increasing in frequency and sophistication. Advanced targeted attacks and se'... Read more

Source: net-security.org

Top found tags: telecom sector(2),vulnerability(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Phishing scam hacks British Gas Twitter accountLocation: Twitter - San Francisco, United States
Date published: 24-06-2014

Some peculiar tweets from the British Gas Help\'s Twitter account were popping up on Monday. Though rather innocuous sounding, the tell tale comments like "I\'m laughing so much right now at this," and "haha this tweet by you is cool," were a sharp indication that the account had been compromised. L'... Read more

Source: www.scmagazineuk.com

Top found tags: cybercrime(2),cyber security(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Own goal as World Cup WiFi passwords spilled in newspaper picLocation: Brasilia-Federal District, Brazil
Date published: 25-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines The WiFi SSID and password for the football World Cup security centre have been exposed after a photograph of the nation\'s federal police brass inadvertently captured the creds written on a white board. The photograph appeared in local news'... Read more

Source: go.theregister.com

Top found tags: police(1),wireless(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile Ransomware : Status QuoLocation: Google HQ - Mountain View, United States
Date published: 25-06-2014

Ransomware is a type of malware that restricts usage of the device it infects, demanding a ransom from the end-user in order to regain control over the device. Now, the malware could actually damage/encrypt the system and the files on it or it could take the easier way out by merely giving a semblan'... Read more

Source: blog.fortinet.com

Top found tags: Google Play(4),mobile device(4),telecom sector(18)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gartner\s top 10 security technologies for 2014Location: Gartner - Stamford, United States
Date published: 25-06-2014

\'Attacks are increasing in frequency and sophistication\' Gartner yesterday highlighted the top ten technologies for information security and their implications for security organisations in 2014. Analysts presented their findings during the Gartner Security & Risk Management Summit, taking place t'... Read more

Source: www.information-age.com

Top found tags: social media(2),telecom sector(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hospital Networks Are Leaking Data, Leaving Critical Devices VulnerableLocation: Lea, United States
Date published: 25-06-2014

hospital-hack [gallery-ca] Getty Two researchers examining the security of hospital networks have found many of them leak valuable information to the internet, leaving critical systems and equipment vulnerable to hacking. The data, which in some cases enumerates every computer and device on a hospit'... Read more

Source: wired.com

Top found tags: vulnerability(2),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Luuuk Fraud Campaign Steals 500K From Bank in One WeekLocation: Kaspersky HQ - Moscow, Russia
Date published: 25-06-2014

A fraud campaign siphoned more than half a million dollars from a European bank over the course of a week earlier this year, researchers with Kaspersky Lab announced this week. The campaign, dubbed Luuuk, extracted 500,000 (roughly $679,700 USD) from 190 victims, mostly in Italy and Turkey, fro'... Read more

Source: threatpost.com

Top found tags: financial sector(4),Kaspersky Lab(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Atypical cloned banking app pops up on Google PlayLocation: Google HQ - Mountain View, United States
Date published: 25-06-2014

An unusual instance of a cloned banking app has been spotted on Google Play by Lookout researchers: the app steals only the users\' ID, and leaves alone the password. The creators of the app have taken the legitimate app of the Israel-based Bank Mizrahi-Tefahot, and have put a "wrapper" around it, w'... Read more

Source: net-security.org

Top found tags: Google(3),Google Play(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Keeping the cyber bandits at bay with Big DataLocation: New York, United States
Date published: 25-06-2014

Big Data security analytics could trump SIEM solutions in the battle to keep out cyber attackers. Keeping the cyber bandits at bay with Big Data Keeping the cyber bandits at bay with Big Data Cyber-crime today is big business. Companies now own massive amounts of data, from customer contact details,'... Read more

Source: www.scmagazineuk.com

Top found tags: cyber espionage(2),cyber security(4),cybercrime(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
27 Data-Slurping Facts BuzzFeed Doesn\'t Want You To Know!Location: Google HQ - Mountain View, United States
Date published: 25-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines When Buzzfeed first began to offer the world a constant free stream of inane listicles, cat pics and funny fail GIFs, it seemed too good to be true. Yet it turns out that the world\'s biggest content aggregator isn\'t just shiny and happy '... Read more

Source: go.theregister.com

Top found tags: Anonymous(2),cyber security(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PayPal Two-Factor Authentication BrokenLocation: PayPal HQ - San Jose, United States
Date published: 25-06-2014

PayPal Two-Factor Authentication Broken Researchers discover a way to bypass the extra layer of security for mobile PayPal app accounts. PayPal has temporarily disabled two-factor authentication for its mobile apps while it works on a patch for a newly discovered flaw that bypasses the security feat'... Read more

Source: www.darkreading.com

Top found tags: patch(2),responsible disclosure(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nexgate Password Lockbox reduces risky social media fails for IT adminsLocation: Facebook - Menlo Park, United States
Date published: 25-06-2014

Nexgate Password Lockbox reduces risky social media fails for IT adminsImage: Nexgate It is so easy to bring malware into an organisation from your social activities. Malware is easily propagated by clicking Facebook links and links in tweets. The more popular a brand becomes, the likelihood of mali'... Read more

Source: www.zdnet.com

Top found tags: mobile device(2),telecom sector(2),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. will allow EU citizens to sue over data privacyLocation: New York, United States
Date published: 25-06-2014

ATHENS (Reuters) - The United States will enact legislation giving European Union citizens the right to sue in the United States if they think their private data was released or misused, the U.S attorney general said on Wednesday. Allegations of vast U.S. spying programs have complicated EU-U.S. tie'... Read more

Source: reuters.com

Top found tags: legislation(2),government(4),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Flaw Lets Attackers Bypass PayPal Two-Factor AuthenticationLocation: PayPal HQ - San Jose, United States
Date published: 25-06-2014

There\s a vulnerability in the way that PayPal handles certain requests from mobile clients that can allow an attacker to bypass the two-factor authentication mechanism for the service and transfer money from a victim\s account to any recipient he chooses. The flaw lies in the way that the Pay'... Read more

Source: threatpost.com

Top found tags: research(1),vulnerability(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PlugX RAT With \Time Bomb\ Abuses Dropbox for Command-and-Control SettingsLocation: Dropbox - San Francisco, United States
Date published: 25-06-2014

Monitoring network traffic is one of the meansfor IT administrators to determine if there is an ongoing targeted attack in the network. Remote access tools or RATs, commonly seen in targeted attack campaigns, are employed to establish command-and-control (C&C) communications. Although the netw'... Read more

Source: trendmicro.com

Top found tags: update(2),cyber security(4),malware(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Get ready for the \'Snooper\'s Charter II\'Location: National Crime Agency - London, United Kingdom
Date published: 25-06-2014

UK Home Secretary and NCA director general explain the need for state digital surveillance. Get ready for the \'Snooper\'s Charter II\' Get ready for the \'Snooper\'s Charter II\' An interesting war of words developed yesterday between Keith Bristow, the National Crime Agency\'s director general and'... Read more

Source: www.scmagazineuk.com

Top found tags: United States(2),United Kingdom(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cryptome pulled OFFLINE due to malware infection: Founder cries foulLocation: Young, United States
Date published: 25-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines Whistle-blowing site Cryptome has been left temporarily unavailable after its service provider NetSol stopped routing traffic towards the site following the discovery of a suspect and probably malicious PHP file. Cryptome\'s John Young criti'... Read more

Source: go.theregister.com

Top found tags: update(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cops Can Search Cell Phones Without a Warrant, Supreme Court RulesLocation: California, United States
Date published: 25-06-2014

After years of legal debate, the Supreme Court has told the cops to keep their hands off Americans\ cell phonesat least until they get a search warrant. The court released a landmark decision Wednesday morning in the case of Riley vs. California, forbidding warrantless police searches of the c'... Read more

Source: wired.com

Top found tags: United States(4),government(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cloned Android Banking App Hides Phishing SchemeLocation: Google HQ - Mountain View, United States
Date published: 25-06-2014

Cloned mobile applications, such as the legions of Flappy Bird knock-offs that surfaced once the popular game was removed from Google Play and the Apple App Store, are an increasingly popular malware vehicle for attackers. The risks range from loading programs that dial premium numbers at the user\'... Read more

Source: threatpost.com

Top found tags: cybercrime(6),financial sector(8),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US looks to allow EU citizens to sue over data privacyLocation: Brussels,Belgium
Date published: 25-06-2014

The Obama administration is calling for legislation that would give European citizens the right to sue in the US if any of their private data was disclosed. Announced Wednesday by US Attorney General Eric Holder, the proposal would guarantee that those in Europe could seek legal recourse through the'... Read more

Source: cnet.com.ortal.com

Top found tags: legislation(2),United States(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
\'Luuuk\' Cybercrime Operation Steals 500,000 From BankLocation: Kaspersky HQ - Moscow, Russia
Date published: 25-06-2014

A gang of cybercriminals pulled off a 500,000 euro bank heist over the course of a week, according to researchers at Kaspersky Lab. The caper targeted customers of a specific bank in Europe using a man-in-the-browser attack. On January 20, Kaspersky Lab identified a suspicious server with log files '... Read more

Source: securityweek.com

Top found tags: financial sector(4),Kaspersky Lab(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cupid Media violated Australia\'s privacy act, investigation findsLocation: Cupid Media - Southport, Australia
Date published: 25-06-2014

The Australian Privacy Commissioner concluded its investigation of Cupid Media and found that the company breached the country\'s Privacy Act 1988 by failing to secure users\' personal information. The government ruling comes after the dating website group announced that 254,000 of its users\' names'... Read more

Source: www.scmagazine.com

Top found tags: website(1),government(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Surprise iOS 7.1 jailbreak for most iPhones and iPads uses year-old flawLocation: Apple HQ - Cupertino, United States
Date published: 25-06-2014

Developers in China have published what appears to be a reliable and malware-free jailbreak for most iPhones and iPads running the latest version of Apple\'s iOS. The release underscores how hard it is to keep such jailbreak exploits out of the public domain, since the code vulnerability that makes '... Read more

Source: arstechnica.com

Top found tags: Apple(3),mobile device(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Agency heads hash out critical infrastructure protection rolesLocation: National Security Agency - Fort Meade, United States
Date published: 24-06-2014

BALTIMORE Top cybersecurity leaders in government are now hashing out how various cybersecurity-related agencies will handle the mission to protect critical infrastructure from cyber attacks.Adm. Mike Rogers, the director of the National Security Agency and commander of the U.S. Cyber Command, s'... Read more

Source: www.federaltimes.com

Top found tags: cyber security(4),United States(6),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

McAfee joins City Council and Local Police Department at STOP IT! (Identity Theft) SymposiumLocation: McAfee - Santa Clara, United States
Date published: 25-06-2014

Peter Andrada, McAfee, and Councilman Johnny Khamis Peter Andrada, McAfee, and Councilman Johnny Khamis Saturday, June 21st, was an exciting day! I am so glad to have been a part of the San Jose City Council and the San Jose Police Department\s (SJPD) first ever STOP IT! (I.D. Theft) Symposium, a'... Read more

Source: blogs.mcafee.com

Top found tags: cybercrime(5),financial sector(6),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trojan Turns Computers Into Bitcoin Mining MachinesLocation: McAfee - Santa Clara, United States
Date published: 24-06-2014

It has long been known that Bitcointhe crypto-currency offering users almost completely anonymous transactions onlineis the favored currency for the underworld. It is so popular, in fact, that hackers are going out of their way to turn mundane objects connected to the Internetobjects like t'... Read more

Source: blogs.mcafee.com

Top found tags: social media(4),malware(5),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Montana loses data on MORE PEOPLE THAN LIVE IN MONTANALocation: Montana, United States
Date published: 25-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines The state of Montana is warning citizens and offering free credit monitoring and identity protection service after a data breach exposed information on 1.3 million people. The state Department of Public Health and Human Services (DPHHS) is p'... Read more

Source: go.theregister.com

Top found tags: report(1),data breach(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
OkCupid data breach remedied following Privacy Act violationLocation: Sydney, Australia
Date published: 25-06-2014

Commissioner to have breached the Privacy Act. The Commissioner launched its investigation at the end of last year into Cupid\'s data breach following media allegations that accounts and personal information including full names, date of birth, email addresses, and passwords of approximately 254,000'... Read more

Source: www.zdnet.com

Top found tags: cybercrime(3),financial sector(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Passwords in plaintext? NOT OK, CupidLocation: Cupid Media - Southport, Australia
Date published: 25-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines ncrypt passwords\: that\'s the message coming from Australia\'s privacy commissioner, at the conclusion of his investigation of the huge data breach of the Cupid Media dating operation in 2013. Among the 42 million customers whose da'... Read more

Source: go.theregister.com

Top found tags: data breach(2),financial sector(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Are CISOs too confident?Location: New York, United States
Date published: 25-06-2014

CISOs and IT managers may be too confident in their capabilities to ensure their organizations security and defenses against a data breach, according to Courion. A majority (63%) of IT security managers believe it is \'easy\' to govern staff access rights and privileges, despite the fact that 42% ad'... Read more

Source: net-security.org

Top found tags: threat(1),data breach(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Symantec addresses global workforce gap in cybersecurityLocation: Symantec HQ - Mountain View, United States
Date published: 25-06-2014

Symantec launched a first-of-its-kind program, the Symantec Cyber Career Connection (SC3), to address the global workforce gap in cybersecurity and provide new career opportunities for young adults who may not be college-bound. The program was announced as a Commitment to Action today at the Clinton'... Read more

Source: net-security.org

Top found tags: cyber security(4),United States(4),education(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackonomics: Cybercrime\'s cost to businessLocation: New York, United States
Date published: 25-06-2014

They say "crime pays" -- but we can be certain the paychecks for cybercrime come right out of the pockets of every business with a digital footprint. In March, Juniper Networks and RAND Corporation released Hackonomics: A First-of-Its-Kind Economic Analysis of the Cyber Black Markets; its conclusion'... Read more

Source: www.zdnet.com

Top found tags: telecom sector(4),United States(4),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
1.3M personal records exposed in Montana data breachLocation: Montana, United States
Date published: 25-06-2014

1.3 million people will be notified that hackers gained entry to a State of Montana\'s Department of Public Health and Human Services (DPHHS) computer server, state officials announced on Tuesday, but added that there is no indication that the information on the server has been accessed and compromi'... Read more

Source: net-security.org

Top found tags: legislation(1),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Majority of desk-based employees see no security risk in sharing work loginsLocation: Palo Alto, United States
Date published: 25-06-2014

\'Insider threat does not have to be a total unknown\' The majority of desk-based workers in the UK do not believe that sharing their work-related logins represents a security risk to their employer, new research has shown. The findings, revealed in a new report from security software provider IS De'... Read more

Source: www.information-age.com

Top found tags: social media(2),United Kingdom(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Blind mobile hacker receives two-year jail sentenceLocation: Lusaka, Zambia
Date published: 24-06-2014

A blind man has been sentenced to two years in prison after a court found him guilty of hacking into the mobile accounts of prominent African politicians and businessmen and stealing airtime. Jairos Tembo, the Zambian mobile hacker who was charged with unauthorized access to data and stealing a'... Read more

Source: www.scmagazine.com

Top found tags: EN(1),hacking(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data accessible on all Giant Eagle staffers due to employee portal issueLocation: Eagle, United States
Date published: 24-06-2014

All employees with Pennsylvania-based supermarket chain Giant Eagle are being notified that, due to an issue, their personal information including Social Security numbers could have been accessed by anyone properly logged into the MyHRConnection Team Member portal. How many victims? Undisclo'... Read more

Source: www.scmagazine.com

Top found tags: fraud(1),report(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Montana DPHHS notifies 1.3 million clients and staffers of nearly year-long breachLocation: Montana, United States
Date published: 24-06-2014

The Montana Department of Public Health and Human Services (DPHHS) is notifying about 1.3 million clients and employees that unauthorized access was gained to a server that stored their personal data, according to a Tuesday AP report. DPHHS observed suspicious activity on May 15 and confirmed on May'... Read more

Source: www.scmagazine.com

Top found tags: EN(1),report(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Massachusetts man pleads guilty to computer hacking, payment card theftLocation: Massachusetts, United States
Date published: 24-06-2014

Cameron Lacroix, a 25-year-old Massachusetts man, pleaded guilty on Monday to hacking into the computer networks of law enforcement agencies and an educational institution, as well as to stealing financial account information, including payment card data. Lacroix, who operated under aliases such as '... Read more

Source: www.scmagazine.com

Top found tags: legislation(1),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SHOCKER: CIA CIO CAN confirm that AWS cloud safe for big governmentLocation: IBM HQ - Armonk, United States
Date published: 25-06-2014

In an eyebrow raising presentation the chief information officer for the US\'s foreign spying wing, the CIA, has praised the cloud computing capabilities of Amazon Web Services and said the agency wants to expand its use of the company\'s tech. CIA CIO Doug Wolfe spoke at an event in Washington on T'... Read more

Source: go.theregister.com

Top found tags: GAO(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Companies are afraid of the cloudLocation: F-Secure - Helsinki, Finland
Date published: 25-06-2014

Although using cloud solutions can boost company efficiency, not every business has made the jump to cloud services. In a recent F-Secure survey of companies with up to 500 employees, concern about data security emerged as a key reason why. 45% of companies who don t use a cloud solution cite lack o'... Read more

Source: net-security.org

Top found tags: survey(1),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBook: Top 3 Big Data security mythsLocation: New York, United States
Date published: 25-06-2014

Data volumes are growing rapidly with no end in sight. Big Data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. How are they protecting that data? This eBook addresses three myths of Big Data security.'... Read more

Source: net-security.org

Top found tags: EN(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Will national roaming solve all of our mobile signal problems? The government certainly thinks soLocation: Will, United States
Date published: 23-06-2014

theSulleymander. Will national roaming solve all of our mobile signal problems? The government certainly thinks so The UK government is considering introducing a "national roaming" scheme to the UK, in order to improve rural mobile coverage. If given the go-ahead, it would allow consumers to switch '... Read more

Source: itproportal.com

Top found tags: United Kingdom(2),government(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crowdsourcing Finding its Security Sweet SpotLocation: Ellis, United States
Date published: 25-06-2014

Pulling in security help on a project has traditionally meant either hiring more full-time help, or bringing in an outside consultant. Enterprises and vendors alike, however, are starting to really go outside the perimeter these days and are taking advantage of crowdsourcing. Given the paranoia in t'... Read more

Source: threatpost.com

Top found tags: backdoor(2),vulnerability(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bugcrowd Launches New Security Testing ProgramLocation: Ellis, United States
Date published: 25-06-2014

Crowdsourced security testing company Bugcrowd launched a new program on Wednesday designed for organizations looking to run customized bug bounties. According to Bugcrowd, the Flex Bounty enables organizations to work within their own budget and timeframe for low-risk and low-cost programs powered '... Read more

Source: securityweek.com

Top found tags: website(1),XSS(1),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICO scolds British police for poor data handlingLocation: McIntosh, United States
Date published: 25-06-2014

A new report from the UK\'s Information Commissioner\'s Office (ICO) reveals how few police forces are adhering to the full requirements of the 1998 Data Protection Act. Met Police Met Police In a new report published late on Tuesday, the UK watchdog details how the year-long audit ran from April 20'... Read more

Source: www.scmagazineuk.com

Top found tags: survey(1),training(1),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cloud Security: Think Todays Reality, Not Yesterdays PolicyLocation: Cloud, United States
Date published: 25-06-2014

Cloud Security: Think Today s Reality, Not Yesterday s Policy SaaS, BYOD, and mobility are inseparable, yet time and time again companies attempt to compartmentalize the three when they make a move to the cloud. That\'s a big mistake. When an enterprise sanctions or whitelists a SaaS application, pr'... Read more

Source: www.darkreading.com

Top found tags: BYOD(1),EN(1),MBR(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PayPal Two-Factor Authentication BypassedLocation: PayPal HQ - San Jose, United States
Date published: 25-06-2014

Security researchers have found a way to bypass the two-factor authentication (2FA) mechanism used by PayPal to enhance the security of customers\' accounts. The vulnerability was first discovered by Dan Saltman from EverydayCarry who reported it to PayPal through the company\'s bug bounty program o'... Read more

Source: securityweek.com

Top found tags: research(1),vulnerability(1),ISP(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
22 Vulnerabilities Found in Oracle Database Java VM ImplementationLocation: Oracle - Redwood City, United States
Date published: 25-06-2014

Security researchers have uncovered a total of 22 vulnerabilities affecting the custom Java Virtual Machine (JVM) implementation used in Oracle Database. The issues affecting Oracle JVM (Aurora VM) were reported to Oracle last week by Poland-based security research company Security Explorations, whi'... Read more

Source: securityweek.com

Top found tags: vulnerability(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Laptop stolen from Calif. hospital stored data on more than 500 patientsLocation: New York, United States
Date published: 25-06-2014

More than 500 patients of California-based Riverside County Regional Medical Center (RCRMC) have been notified that their personal information was on a laptop that was reported missing from a hospital procedure room. How many victims? 563. What type of personal information? Names, dates of birth, me'... Read more

Source: www.scmagazine.com

Top found tags: website(1),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Calif. assembly committee OKs bill to cut resources to NSALocation: National Security Agency - Fort Meade, United States
Date published: 25-06-2014

The California Assembly Public Safety Committee approved a bill Tuesday that would turn off all forms of support including water and electricity to any federal agency engaged in the \illegal and unconstitutional collection of electronic or metadata\ without expressed consent or a warra'... Read more

Source: www.scmagazine.com

Top found tags: NSA (1),research(1),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacking Team Tools Allow Governments To Take Full Control of Your SmartphoneLocation: Gamma International - Troisdorf, Germany
Date published: 24-06-2014

Newly published research about Hacking Team\'s spying tools show the full extent of the control governments can wield against targets\' smartphones. The research shows that governments using the \"lawful intercept\" tool, known as Remote Control Systems (RCS), can infect iPhones even if they have no'... Read more

Source: www.ibtimes.co.uk

Top found tags: social media(2),government(3),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gigaom Research Reveals Organizations are Unprepared for Security Incidents Involving Mobile Malware and Data LeakageLocation: AccessData - Lundon, United States
Date published: 24-06-2014

Huge growth of mobile devices, data and BYOD initiatives create demand for integrated mobile security, visibility and incident readinessPR NewswireLINDON, Utah, June 24, 2014LINDON, Utah, June 24, 2014 /PRNewswire/ -- AccessData, the leader in incident resolution solutions, and Gigaom Research, toda'... Read more

Source: www.digitaljournal.com

Top found tags: threat(1),mobile device(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Luuuk-malware steelt mogelijk 500.000 euro in week tijdLocation: Kaspersky HQ - Moscow, Russia
Date published: 25-06-2014

Een malware-exemplaar dat begin dit jaar werd ontdekt heeft mogelijk in n week tijd 500.000 euro gestolen van zo\'n 190 bankklanten in Itali en Turkije. De Luuuk-malware, zoals die door Kaspersky Lab wordt genoemd, voert een man-in-the-browser-aanval op klanten van n specifieke bank uit. D'... Read more

Source: www.security.nl

Top found tags: financial sector(2),trojan(2),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers knijpen server volksgezondheidsinstituut leegLocation: Montana, United States
Date published: 25-06-2014

Door het hacken van een server van het volksgezondheidsinstituut in de Amerikaanse staat Montana liggen honderdduizenden zorgdossiers en bankrekeningen op straat. Het draait om een DPHHS computerserver (Departement of Public Health and Human Services) waarop persoonlijke informatie van meer dan een '... Read more

Source: webwereld.nl

Top found tags: NL(1),financial sector(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers plunderden 190 bankrekeningenLocation: Kaspersky HQ - Moscow, Russia
Date published: 25-06-2014

Hackers hebben eerder dit jaar in een week tijd zo\'n half miljoen euro buitgemaakt door het plunderen van bankrekeningen in Europa. Zeus leverde 9 man miljoenen op Nu in \'Zberp\': gemeenste van Zeus en Carberp Groot succes in bestrijding Cryptolocker-malware Kaspersky vindt nieuwe ransomware \'Zeu'... Read more

Source: www.automatiseringgids.nl

Top found tags: trojan(2),financial sector(4),malware(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers verwachten toename van 64-bit rootkitsLocation: Amsterdam, The Netherlands
Date published: 25-06-2014

Dankzij de opkomst van 64-bit systemen is de afgelopen jaren het aantal rootkits afgenomen, maar cybercriminelen zouden inmiddels nieuwe manieren hebben ontdekt om 64-bit beveiligingsmaatregelen te omzeilen en onderzoekers voorspellen dan ook een toename van het aantal 64-bit rootkits. De voorspelli'... Read more

Source: www.security.nl

Top found tags: threat(1),cybercrime(2),trend(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australir opgepakt wegens inbraak League of LegendsLocation: Lea, United States
Date published: 25-06-2014

De Australische politie heeft een man gearresteerd wegens het inbreken op de database van het populaire online spel League of Legends en de verkoop van IP-adressen van spelers. Volgens de politie van Queensland zou de man vorig jaar juli toegang tot het netwerk van League of Legends hebben gekregen.'... Read more

Source: www.security.nl

Top found tags: police(1),Twitter(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Wereldkaart toont cyberaanvallen in real-timeLocation: Amsterdam, The Netherlands
Date published: 25-06-2014

Een Amerikaans beveiligingsbedrijf heeft een wereldkaart ontwikkeld die volgens de makers in real-time cyberaanvallen weergeeft. De kaart laat zien hoe laat de aanvallen plaatsvinden, waar ze vandaan komen en wie het doelwit is. Ook worden IP-adressen en aangevallen poorten en diensten getoond. De d'... Read more

Source: www.security.nl

Top found tags: cyber attack(2),cybercrime(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kijk mee! Live hack-aanvallen op honeypotLocation: Amsterdam, The Netherlands
Date published: 25-06-2014

Live meekijken hoe hackers een bewust kwetsbaar gemaakt netwerk aanvallen? De Noorse securityfirma Norse heeft een prachtige wereldwijde kaart gemaakt waarop je die aanvallen mooi kan zien. De Verenigde Staten en China zijn duidelijk de meest aanvallende landen ter wereld, als we de live hackingmap '... Read more

Source: webwereld.nl

Top found tags: hacking(1),honeypot(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Haagse politie waarschuwt voor nepmedewerkers MicrosoftLocation: Den Haag, The Netherlands
Date published: 25-06-2014

De Haagse politie waarschuwt mensen om alert te zijn op oplichters die zich voordoen als medewerker van Microsoft. De afgelopen maand werden er in de regio meerdere personen slachtoffer van deze telefonische babbeltruc. Na de gesprekken bleek er geld van de bankrekening te zijn afgeschreven. Volgens'... Read more

Source: www.security.nl

Top found tags: police(1),cybercrime(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Politie VS mag telefoons niet zonder bevel doorzoekenLocation: Den Haag, The Netherlands
Date published: 25-06-2014

De Amerikaanse politie mag telefoons van verdachten niet zonder gerechtelijk bevel doorzoeken, zo heeft het hooggerechtshof bepaald, wat als een overwinning voor het recht op privacy wordt gezien. Volgens het hof zijn telefoons niet te vergelijken met portemonnees, briefkoffers en voertuigen. Die mo'... Read more

Source: www.security.nl

Top found tags: government(2),telecom sector(2),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firefox- en Chrome-uitbreiding toont privacygedrag websitesLocation: Mozilla - Mountain View, United States
Date published: 25-06-2014

Er is een nieuwe browseruitbreiding voor Google Chrome en Mozilla Firefox verschenen die op zeer eenvoudige wijze laat zien hoe websites met de privacy van hun bezoekers omgaan. De uitbreiding heet Privacy Icons en is ontwikkeld door Disconnect en TRUSTe en gebaseerd op iconen van Mozilla. Zodra de '... Read more

Source: www.security.nl

Top found tags: cyber security(2),Google(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Glass kan pincodes op 3 meter afstand lezenLocation: Google HQ - Mountain View, United States
Date published: 25-06-2014

Onderzoekers hebben aangetoond dat het met Google Glass mogelijk is om pincodes te achterhalen die mensen op een afstand van 3 meter op hun iPad invoeren. De bril maakt eerst een filmpje van de gebruiker die zijn pincode invoert, om vervolgens automatisch de pincode te bepalen. In 83% van de gevalle'... Read more

Source: www.security.nl

Top found tags: Black Hat(4),mobile device(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overheid stopt met Digid-kaartLocation: Den Haag, The Netherlands
Date published: 25-06-2014

De overheid stopt met de ontwikkeling van de DigiD-kaart. Volgens minister Plasterk kan de voorgenomen deadline van 2015 niet worden gehaald omdat wet- en regelgeving niet op tijd aangepast kunnen worden Dat meldt Plasterk in een brief aan de Tweede Kamer. De DigiD-kaart was bedoeld als het nieuwe i'... Read more

Source: www.automatiseringgids.nl

Top found tags: politics(2),government(5),The Netherlands(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nederlanders mogen naar rechter VS om privacyLocation: New York, United States
Date published: 25-06-2014

Europeanen mogen voortaan rechtszaken voeren in de Verenigde Staten als ze denken dat er bewust slordig wordt omgegaan met hun persoonsgegevens, of als er wordt geweigerd foute informatie te corrigeren. De Europese Unie en de Verenigde Staten hebben "een eerste stap" gezet naar het harmoniseren van '... Read more

Source: webwereld.nl

Top found tags: The Netherlands(2),government(3),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Google Develops OpenSSL Fork 'BoringSSL'Location: Google HQ - Mountain View, United States
Date published: 24-06-2014

Google is developing its own version of OpenSSL, tentatively dubbed BoringSSL. For years, Google has been building patches on OpenSSL for use in its products. But as Android, Chrome and other Google technologies have begun to need some subset of these patches, "things have grown very complex," blogg'... Read more

Source: securityweek.com

Top found tags: Google(2),OpenSSL(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gezichtsherkenning getest als alternatief voor wachtwoordenLocation: Amsterdam, The Netherlands
Date published: 25-06-2014

Onderzoekers hebben een nieuw alternatief voor wachtwoorden bedacht, waarbij de psychologie van gezichtsherkenning wordt ingezet. In plaats van een wachtwoord of pincode te gebruiken moeten mensen bij het nieuw bedachte Facelock-systeem een foto selecteren van iemand die ze kennen. Mensen blijken na'... Read more

Source: www.security.nl

Top found tags: NL(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Honderdduizenden zorgdossiers en rekeningen op straatLocation: Amsterdam, The Netherlands
Date published: 25-06-2014

Door het hacken van een server van het volksgezondheidsinstituut in de Amerikaanse staat Montana liggen honderdduizenden zorgdossiers, bankrekeningen en sofinummers op straat. Alle 1,3 miljoen slachtoffers zijn op de hoogte bracht.'... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),financial sector(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple patcht domme SSL-foutLocation: Apple HQ - Cupertino, United States
Date published: 25-06-2014

De besturingssystemen iOS en OSX blijken internetcommunicatie niet altijd goed te hebben beveiligd. Apple heeft inmiddels een patch voor iOS uitgebracht waarin het probleem met de SSL-code is ondervangen. Dat je moet oppassen met het gebruik van wifi in openbare gelegenheden weten de meeste gebruike'... Read more

Source: www.automatiseringgids.nl

Top found tags: Apple(3),mobile device(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vietnamees steelt 310.000 euro via Android-malwareLocation: Hanoi, Vietnam
Date published: 25-06-2014

De Vietnamese autoriteiten hebben een 29-jarige man gearresteerd die 310.000 euro wist te stelen door het infecteren van zo\'n 800.000 Android-toestellen met sms-malware. De man beheerde een website waarop honderden pornografische apps met foto\'s en video\'s werden aangeboden. Zodra de apps waren g'... Read more

Source: www.security.nl

Top found tags: website(1),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Plasterk stopt ontwikkeling van DigiD-kaartLocation: Den Haag, The Netherlands
Date published: 25-06-2014

Er komt toch geen DigiD-kaart om zaken met de overheid te doen, zo heeft minister Plasterk van Binnenlandse Zaken in een brief aan de Tweede Kamer laten weten. Eind vorig jaar had de minister nog aangekondigd dat het Kabinet de ontwikkeling van een DigiD-kaart zou onderzoeken. De DigiD-kaart had '... Read more

Source: www.security.nl

Top found tags: The Netherlands(6),government(7),Ministry of the Interior and Kingdom Relations(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaanse radioloog bekeek 97.000 patintendossiersLocation: New York, United States
Date published: 25-06-2014

Een Amerikaanse radioloog heeft zonder toestemming de dossiers van 97.000 patinten bekeken, zo laat het medisch centrum weten waar de radioloog voor werkte. Het gaat om namen, adresgegevens, geboortedata, social security nummers, verzekeringsinformatie en behandel- en procedurecodes. De radioloog '... Read more

Source: www.security.nl

Top found tags: insurance(1),NL(1),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BSA: veiligheid primaire reden om illegale software te mijdenLocation: Amsterdam, The Netherlands
Date published: 25-06-2014

Het risico op malware is de voornaamste reden dat computergebruikers illegale software mijden, zo stelt The Software Alliance, beter bekend als BSA, aan de hand van eigen onderzoek onder bijna 22.000 consumenten en zakelijke pc-gebruikers en meer dan 2.000 IT-managers. Op de vraag waarom ze geen ill'... Read more

Source: www.security.nl

Top found tags: NL(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tweefactor-authenticatie PayPal biedt schijnveiligheidLocation: PayPal HQ - San Jose, United States
Date published: 25-06-2014

Het beveiliging eisende PayPal blijkt zijn gebruikers een zwakke tweefactor-authenticatie te leveren. Schijnveiligheid, waarschuwen security-experts. De tweefactor-authenticatie van PayPal blijkt brak. Beveiligingsonderzoekers van Duo Security hebben een mogelijkheid tot het omzeilen van de extra be'... Read more

Source: webwereld.nl

Top found tags: mobile device(2),smartphone(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid in Cisco IOS verholpenLocation: Cisco HQ - San Jose, United States
Date published: 25-06-2014

Samenvatting: Cisco heeft updates uitgebracht om een Denial-of-Service kwetsbaarheid te verhelpen in Cisco IOS. Gevolgen: Een geautoriseerde kwaadwillende kan op afstand een Denial-of-Service (DoS) veroorzaken. Beschrijving: Cisco heeft een kwetsbaarheid in de verwerking van malafide IPsec-pakketten'... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in WiresharkLocation: Amsterdam, The Netherlands
Date published: 25-06-2014

Samenvatting: Er is een kwetsbaarheid verholpen in Wireshark. Een kwaadwillende kan deze kwetsbaarheid misbruiken om een Denial-of-Service te veroorzaken. Gevolgen: De kwetsbaarheid kan misbruikt worden voor het uitvoeren van een Denial-of-Service. Beschrijving: - CVE-2014-2282 Er bestaat een kwetsb'... Read more

Source: www.ncsc.nl

Top found tags: NL(1),vulnerability(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden in phpMyAdmin verholpenLocation: Amsterdam, The Netherlands
Date published: 25-06-2014

Samenvatting: De ontwikkelaars van phpMyAdmin hebben updates uitgebracht om twee self-XSS kwetsbaarheden te verhelpen. Gevolgen: Een kwaadwillende kan door de kwetsbaarheden te misbruiken mogelijk gevoelige informatie verzamelen. Beschrijving: - CVE-2014-4348 XSS-kwetsbaarheid bij het markeren van f'... Read more

Source: www.ncsc.nl

Top found tags: website(1),XSS(1),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Apache Struts verholpenLocation: IBM HQ - Armonk, United States
Date published: 25-06-2014

Samenvatting: Apache en IBM hebben een kwetsbaarheid verholpen in het Apache Struts web framework. Gevolgen: Een kwaadwillende kan de kwetsbaarheid op afstand misbruiken om beveiligingsmaatregelen te omzeilen om zo mogelijke andere aanvallen uit te voeren. Beschrijving: De kwetsbaarheid kan op afsta'... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Red Hat verhelpt meerdere kwetsbaarheden in kernelLocation: National Cyber Security Centre - Den Haag, The Netherlands
Date published: 25-06-2014

Samenvatting: Red Hat heeft een update uitgebracht voor Red Hat 7 om meerdere kwetsbaarheden in de kernel te verhelpen. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende een Denial-of-Service veroorzaken, verhoogde gebruikersrechten verkrijgen of toegang tot gevoelige gegevens v'... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish