Under construction

New design coming soon!

CIC News engine statistics

CIC News for 26-06-2014 contains 125 articles: cybercrime(43),cyber security(27),data breach(16),other(39)

CIC News update contains 99 English and 26 Dutch articles for today.
There are 7 published advisories, 1 are English and 6 are Dutch.
In today's English news articles:
- 37 related to cybercrime
- 24 related to cyber security
- 16 related to data breach and identity theft
- 22 for the category other news

In today's Dutch news articles:
- 6 related to cybercrime
- 3 related to cyber security
- 17 for the category other news

Have fun reading.

English cybercrime related news

New Havex malware variants target industrial control system and SCADA usersLocation: F-Secure - Helsinki, Finland
Date published: 24-06-2014

A malware threat previously used in attacks against energy sector companies is now being aimed at organizations that use or develop industrial applications and machines.During the spring, attackers began distributing new versions of a remote access Trojan (RAT) program called Havex by hacking into t'... Read more

Source: www.pcworld.com

Top found tags: trojan(2),cybercrime(3),critical infrastructure(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware worms way into more apps: studyLocation: McAfee - Santa Clara, United States
Date published: 25-06-2014

Malicious software is increasingly making its way into mobile phones through \"cloned\" versions of popular apps, and software weaknesses in legitimate ones, security researchers say.McAfee Labs said in its quarterly threat assessment that weaknesses in app security is becoming a growing problem for'... Read more

Source: www.sbs.com.au

Top found tags: update(2),cybercrime(5),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware worms its way into more appsLocation: McAfee - Santa Clara, United States
Date published: 24-06-2014

WASHINGTON - Malicious software is increasingly making its way into mobile phones through \"cloned\" versions of popular apps, and software weaknesses in legitimate ones, security researchers said Tuesday.McAfee Labs said in its quarterly threat assessment that weaknesses in app security is becoming'... Read more

Source: www.newvision.co.ug

Top found tags: trojan(2),cybercrime(5),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Battling Financial Cybercrime in N.Y.Location: New York City, New York, United States
Date published: 24-06-2014

Joining the FBI and New York City police as a member of the newly formed financial cybercrimes task force is the Metropolitan Transportation Authority. A regional transit company battling financial cybercrime? Makes sense when you look at its computer network.The MTA, which provides commuter rail, s'... Read more

Source: www.bankinfosecurity.com

Top found tags: cybercrime(2),financial sector(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Law Criminalizes Child Pornography in Japan: Part 2Location: Tokio, Japan
Date published: 23-06-2014

In our last post, we detailed the new legislation passed in Japan, making the possession of child pornography illegal. The most recent in a series of gradual changes noted by cybercrime defense attorneys, the law illustrates a gradual and welcome transformation to a culture that has been historicall'... Read more

Source: www.cybercrimelawyerblog.com

Top found tags: pornography(3),child pornography(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DSC Webinar Series: Identifying Cybercrime using Big Data Analytics 6.24.2014Location: New York, United States
Date published: 24-06-2014

In todays webinar we will discuss how Big Data Analytics solution can make all the difference in protecting your network from both known and emerging threats and how a Hadoop-based analytics platform can provide an affordably scalable solution that provides your organization the most complete vie'... Read more

Source: vimeo.com

Top found tags: EN(1),threat(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kingaroy man charged over $110,000 Bitcoin hackingLocation: Kingaroy, Australia
Date published: 25-06-2014

A 21-YEAR-OLD Kingaroy man has been charged with a tainted property offence over a substantial amount of Bitcoin he had obtained as a result of computer hacking offences he allegedly committed earlier this year.The man was charged on March 19 for hacking and fraud offences he committed against the U'... Read more

Source: www.dailymercury.com.au

Top found tags: Anonymous(2),cybercrime(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Northern Ireland gangs tap in to cyber crimeLocation: Dublin, Ireland
Date published: 25-06-2014

Criminal gangs across Northern Ireland are increasingly turning to their keyboards and rural areas to make millions of pounds.The gangs, many of which are strongly linked to republican and loyalist paramilitaries, have switched their attention to lower-risk but highly lucrative crimes, according to '... Read more

Source: www.belfasttelegraph.co.uk

Top found tags: financial sector(2),government(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Check your accounts! Cyber thieves steal over 400,000 from top Euro bankLocation: Kaspersky HQ - Moscow, Russia
Date published: 25-06-2014

Online criminals have stolen over 400,000 from a top European bank.And its thought that more than 190 customers may have had money taken from their accounts.Cash was snatched over the course of a week using a Trojan programme to intercept data.The attack was discovered by the Kaspersky Lab, who'... Read more

Source: www.dailystar.co.uk

Top found tags: United Kingdom(2),cybercrime(3),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Luxembourg fights back against cyber crimeLocation: Luxembourg
Date published: 25-06-2014

Customers of the six main banks in the Grand Duchy will be issued with a security Token. If you havent received yours yet, you soon will or you can go direct to participating banks and request one according to guichet.lu.Faced with increasing cyber-crime, and in response to the European Central B'... Read more

Source: blogs.angloinfo.com

Top found tags: website(1),financial sector(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Evernote, Feedly, and 5 Lessons From Recent DDoS AttacksLocation: Incapsula HQ - Redwood Shores, United States
Date published: 24-06-2014

Distributed Denial of Service (DDoS) attacks are nowhere near as sexy as annoyances like the infamous Heartbleed bug wreaking havoc on the internet community. However, they represent what is arguably the biggest threat to any business operating online. By recruiting an army of enslaved zombie '... Read more

Source: www.storagecraft.com

Top found tags: trojan(2),malware(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hong Kong Democracy Website Crippled by DDoS AttackLocation: Hong Kong, China
Date published: 24-06-2014

Hackers have used distributed denial of service attacks (DDoS) for political purposes before. Anonymous, protesting the Albuquerque Police Departments use of force against two men, recently crashed the police departments website and subsequently claimed responsibility for the attack with a You'... Read more

Source: www.sys-con.com

Top found tags: Hong Kong(2),government(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Canadas new anti-spam law is horribly drafted, says MacMillans MurphyLocation: Ottawa, Ontario, Canada
Date published: 23-06-2014

Canadas new anti-spam law is one of the most horribly named pieces of legislation and could become a nightmare for legitimate businesses, says one expert.MacMillan Chief Marketing Partner and former Chief of Staff to the Prime Minister, Tim Murphy, was on BNNs Business Day Friday t'... Read more

Source: www.cantechletter.com

Top found tags: spam(1),legislation(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Four arrested over credit card fraudLocation: New York, United States
Date published: 25-06-2014

THE PHILIPPINE National Police (PNP) Anti-Cybercrime Group (ACG) busted four individuals after the alleged repeated instances of using counterfeit credit cards to avail of services from an online hotel booking business.Arrested were Jose Antonio Mendoza Macaraeg, Joenelle Ambal dela Cruz, Gillian Cl'... Read more

Source: www.bworldonline.com

Top found tags: cybercrime(2),financial sector(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Banks, payment services and social networks most targeted by phishing kitsLocation: Jackson, United States
Date published: 25-06-2014

Financial institutions, ePayment and money transfer services, and social networks are the top three targets of phishing kits, respectively, according to PhishLabs. Email services is also a big target, according to a Wednesday post by Don Jackson, director of threat intelligence with PhishLabs. Other'... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),social media(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PayPal addresses two-factor authentication bypassLocation: PayPal HQ - San Jose, United States
Date published: 25-06-2014

PayPal phishing websites spike in 2014, easy vector for attackers Two-factor authentication can be bypassed on some of PayPal\'s mobile applications. Due to a vulnerability existing in some of PayPal\'s mobile applications, all someone needs to access an account with two-factor authentication enable'... Read more

Source: www.scmagazine.com

Top found tags: airport sector(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Invasive Selfmite SMS worm uncoveredLocation: Google HQ - Mountain View, United States
Date published: 26-06-2014

AdaptiveMobile has discovered a previously unknown piece of mobile malware dubbed Selfmite. It spreads via SMS and fools users into installing a worm app which propagates by automatically sending a text message to contacts in the infected phone s address book. The worm then requests users to install'... Read more

Source: net-security.org

Top found tags: malware(2),cybercrime(4),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Half a meellion euros stolen in week-long bank smash \'n\' grabLocation: Kaspersky HQ - Moscow, Russia
Date published: 26-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines Attackers have pulled off a lucrative lightning raid on a single beleaguered bank stealing half a million euros in a week, Kaspersky researchers say. The crims stole between 17,000 and 39,000 from each of 190 Italian and Turkish bank a'... Read more

Source: go.theregister.com

Top found tags: trojan(2),malware(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
59% of businesses experienced data loss from malware on unlicensed software: surveyLocation: New York, United States
Date published: 26-06-2014

Half of 2,000 IT managers surveyed by BSA said they would not use unlicensed software because of malware risksAlmost 60 per cent of IT businesses experienced a data loss following a malware attack on unlicensed software in 2013, according to a global survey by BSA The Software Alliance.The BSA surve'... Read more

Source: www.computerworld.com.au

Top found tags: hackers(1),survey(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MacAfee labs report sees mobile malware target trust in early 2014Location: McAfee - Santa Clara, United States
Date published: 25-06-2014

McAfee Labs today released the McAfee Labs Threats Report: June 2014, revealing mobile malware tactics that abuse the popularity, features and vulnerabilities of legitimate apps and services, including malware-infested clones masquerading as the popular mobile game Flappy Birds.The report highlights'... Read more

Source: www.itweb.co.za

Top found tags: WhatsApp(1),trojan(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber espionage campaign based on Havex RAT hit ICS/SCADA systemsLocation: F-Secure - Helsinki, Finland
Date published: 25-06-2014

Security Experts at F-Secure discovered a cyber espionage campaign based in the Havex malware targeting ICS/SCADA systems and vendors.Security Experts at F-Secure have conducted an investigation on the Havex Malware family in the past months, lets remember that the malicious agent has been used i'... Read more

Source: securityaffairs.co

Top found tags: malware(2),trojan(2),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber-crime cases jump 1033% in a year, Kolkata youths at riskLocation: Kolkata, India
Date published: 26-06-2014

KOLKATA: The death of the young 17-year-old student due to cyber bullying might be an extreme case but cyber crimes are on the rise in this city that a recent TCS study has claimed is addicted to Facebook an high of 85% of teens have an account there. And if you thought the state tops the charts'... Read more

Source: timesofindia.indiatimes.com

Top found tags: social media(2),cybercrime(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Crime Gone Too Far: You Need To Read Why Four Yahoo Boys Were Arrested In Ogun StateLocation: Lagos, Nigeria
Date published: 25-06-2014

Four suspected Internet fraudsters, popularly called Yahoo boys, have been ordered to be remanded in prison by Justice Olanrewaju Mabekoje of the Ogun State High Court, Isabo, Abeokuta, western Nigeria.PM NEWS reports that all the accused persons were asked to cool their heels in prison for al'... Read more

Source: www.informationng.com

Top found tags: report(1),cybercrime(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fraud and cyber profiles to put forces fully in the pictureLocation: London, United Kingdom
Date published: 25-06-2014

Fraud and cyber profiles to put forces fully in the pictureFor the first time police forces across England and Wales have been sent individual annual fraud and cyber profiles that shine a light on some of the major crime threats in their local areas.Drawing on a full-set of Action Fraud data, also a'... Read more

Source: www.cityoflondon.police.uk

Top found tags: social media(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US ambassador: \'We must stop Chinese cyber crime\'Location: Beijing, China
Date published: 25-06-2014

The United States ambassador to China has warned that cyber crime originating from the Communist-ruled country represents a real threat and that if necessary, the White House will act in order to stop computer hackers from stealing trade secrets.Max Baucus, who was appointed to the role of US ambass'... Read more

Source: www.computing.co.uk

Top found tags: government(2),United States(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime acquires a new angleLocation: New York, United States
Date published: 25-06-2014

Offenders here seem to have picked up the modus operandi usually followed in Delhi, says police officialCyber crime is on the rise in Visakhapatnam. The city has gained the dubious distinction of being rated as the second city after Bangalore in the country, in cyber crime.So far, the crime has been'... Read more

Source: www.thehindu.com

Top found tags: financial sector(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What's next: Advanced Evasion TechniquesLocation: New York, United States
Date published: 26-06-2014

Advanced evasion techniques, or AETs, are delivery mechanisms used to disguise advanced persistent threats (APTs) and permit them to slip through network security undetected. [mcafee-aet] AETs work by splitting up malicious payloads into smaller pieces, disguising them, and delivering them simultane'... Read more

Source: net-security.org

Top found tags: APT(2),cybercrime(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attackers fling Stuxnet-style RATs at critical control software in EUROPELocation: F-Secure - Helsinki, Finland
Date published: 26-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines Security researchers have uncovered a series of Trojan-based attacks which have infiltrated several targets by infecting industrial control system software from the makers of SCADA and ICS systems. The majority of the victims are located in '... Read more

Source: go.theregister.com

Top found tags: malware(4),critical infrastructure(6),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Europol en ENISA sluiten akkoord over bestrijding cybercrimeLocation: Europol HQ - Den Haag, The Netherlands
Date published: 26-06-2014

Europol en het Europees agentschap voor netwerk- en informatiebeveiliging (ENISA) hebben een samenwerkingsovereenkomst gesloten over de bestrijding van cybercrime, waarbij er nauwer zal worden samengewerkt en informatie worden uitgewisseld. Door de nauwere samenwerking tussen Europol, het Europese C'... Read more

Source: www.security.nl

Top found tags: Europe(2),government(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Enterprises catch relative lull in Q1, DDoS attacksLocation: Akamai - Boston, United States
Date published: 26-06-2014

according to Akamai\'s State of the Internet report. Great Debate Optimizing data center security: Overhaul or incremental changes? Optimizing data center security: Overhaul or incremental changes? The security takeaway from the report is that trends have been volatile. Enterprise attacks were down '... Read more

Source: www.zdnet.com

Top found tags: Akamai(2),cybercrime(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security takes centre stage with Dell\'s latest all-in-ones and virtual desktopsLocation: Dell HQ - Round Rock, United States
Date published: 26-06-2014

industry trend towards (to borrow a phrase) a devices-and-services model in pursuit of continued profit, as margins on mainstream hardware shrink to wafer-thin levels. Hardware doesn\'t come much more mainstream than the business desktop PC, and to differentiate its offerings from the competition De'... Read more

Source: www.zdnet.com

Top found tags: phishing(2),cybercrime(3),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gameover Trojan rises from the deadLocation: Berlin, Germany
Date published: 26-06-2014

Despite the takedown of the Gameover Zeus by various law enforcement agencies last month, security researchers say that cyber-criminals are using new strain of the Trojan, with the Citadel botnet, to steal banking credentials. Gameover Trojan rises from the dead Gameover Trojan rises from the dead S'... Read more

Source: www.scmagazineuk.com

Top found tags: malware(4),cybercrime(6),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oil & Natural Gas Industry Forms ISACLocation: Sac, United States
Date published: 26-06-2014

Oil & Natural Gas Industry Forms ISAC New ONG-ISAC joins existing Information Sharing and Analysis Centers for electricity, water, and other critical infrastructure sectors. Yet another vertical industry is banding together with an attack and threat intelligence-sharing mechanism: The oil and gas in'... Read more

Source: www.darkreading.com

Top found tags: information sharing(2),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Alexander: Cyber Security Pros Face Uphill BattleLocation: Alexander, United States
Date published: 26-06-2014

Alexander: Cyber Security Pros Face Uphill Battle Former NSA chief says rapid growth of data, malware will challenge security teams in coming years. WASHINGTON -- Gartner Security & Risk Management Summit 2014 -- Former National Security Agency Director Keith Alexander says security professionals ha'... Read more

Source: www.darkreading.com

Top found tags: Gen. Keith Alexander(3),United States(4),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Europol en ENISA sluiten akkoord over bestrijding cybercrimeLocation: Europol HQ - Den Haag, The Netherlands
Date published: 26-06-2014

Europol en het Europees agentschap voor netwerk- en informatiebeveiliging (ENISA) hebben een samenwerkingsovereenkomst gesloten over de bestrijding van cybercrime, waarbij er nauwer zal worden samengewerkt en informatie worden uitgewisseld.'... Read more

Source: www.beveiligingnieuws.nl

Top found tags: ENISA(2),Europe(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
German government cancels Verizon contract in wake of U.S. spying rowLocation: Berlin, Germany
Date published: 26-06-2014

BERLIN (Reuters) - The German government has cancelled a contract with U.S. telecoms firm Verizon Communications inc as part of an overhaul of its internal communications, prompted by revelations last year of U.S. government spying. Reports based on disclosures by former U.S. intelligence contractor'... Read more

Source: reuters.com

Top found tags: government(6),United States(8),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
As Stuxnet Anniversary Approaches, New SCADA Attack Is DiscoveredLocation: F-Secure - Helsinki, Finland
Date published: 26-06-2014

As Stuxnet Anniversary Approaches, New SCADA Attack Is Discovered F-Secure has unearthed a new attack against industrial control systems that goes after European targets, using rare infection vectors. Nearly four years since Stuxnet broke onto the scene, F-Secure has discovered another series of att'... Read more

Source: www.darkreading.com

Top found tags: ICS(3),exploit kit(4),critical infrastructure(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Avoiding Heartbleed: 3 Tips for Preventing CybercrimeLocation: New York, United States
Date published: 25-06-2014

Today were talking about the thing that everyone fears, but few of us are prepared forcyber crime. Hot on the trail of the Heartbleed bug thats been affecting websites across the Internet, weve got a few tips to keep you protected.Passwordscreate strong ones and keep em safe! Steer'... Read more

Source: www.manta.com

Top found tags: website(1),cyber security(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime on the rise in KenyaLocation: Nairobi, Kenya
Date published: 24-06-2014

Increased internet penetration and technological advancements in Kenya have been driving innovation and business growth, but the same innovations are also exposing the public to cybersecurity threats, according to a recent report.Kenya is losing about 2 billion shillings ($22.8 million) annually due'... Read more

Source: sabahionline.com

Top found tags: cyber security(4),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security Expert: Industry Is Failing Miserably At Fixing Underlying DangersLocation: Boston, United States
Date published: 24-06-2014

The security industry is adding layers of defensive technologies to protect systems rather than addressing the most substantial, underlying problems that sustain a sprawling cybercrime syndicate, according to an industry luminary who painted a bleak picture of the future of information security at a'... Read more

Source: www.crn.com

Top found tags: cybercrime(2),cyber security(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NCC tasks govt agencies on cybercrime menaceLocation: New York, United States
Date published: 24-06-2014

TO stem the growing menace of cybercrime in Nigeria, the Nigerian Communications Commission (NCC) is seeking a multi-stakeholder approach to combat it. Speaking in Lagos, weekend, at the National Cybersecurity Forum 2014, the Executive Vice Chairman of NCC, Dr. Eugene Juwah said the global economic '... Read more

Source: www.ngrguardiannews.com

Top found tags: cyber security(4),Nigeria(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Enterprises fix NTP amplification, but many DDoS techniques remainLocation: NSFOCUS HQ - Beijing, China
Date published: 25-06-2014

Many organizations have secured NTP servers against amplified DDoS attacks, findings of a new report suggest, though thousands of vulnerable servers still exist and new data suggests other similar vulnerabilities may soon surface. In a report released this week, Beijing-based distributed denial-of-s'... Read more

Source: searchsecurity.techtarget.com

Top found tags: OpenSSL(2),vulnerability(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
\'Havex\' malware strikes industrial sector via watering hole attacksLocation: F-Secure - Helsinki, Finland
Date published: 25-06-2014

\'Havex\' malware strikes industrial sector via watering hole attacks Hackers used watering hole attacks, compromising the websites of software vendors, to lay their trap. \Havex,\ malware previously targeting organizations in the energy sector, has recently been used to carry out industrial e'... Read more

Source: www.scmagazine.com

Top found tags: critical infrastructure(4),exploit kit(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malicious app BankMirage makes quick appearance in Google PlayLocation: Google HQ - Mountain View, United States
Date published: 25-06-2014

Malicious app BankMirage makes quick appearance in Google Play Researchers at Lookout found the malware, which masqueraded as a legitimate banking app for customers of an Israeli bank. It appears that saboteurs, who slipped a malicious app into the Google Play store, were testing their malware out o'... Read more

Source: www.scmagazine.com

Top found tags: Google(2),Google Play(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Luuuk Stole Half-Million Euros in One WeekLocation: Kaspersky HQ - Moscow, Russia
Date published: 25-06-2014

Luuuk Stole Half-Million Euros in One Week A man-in-the-browser and a big team of money mules quickly, systematically robbed 190 account holders at a European bank. Kaspersky Lab researchers have discovered a financial fraud campaign, dubbed Luuuk, that used man-in-the-browser attacks to steal more '... Read more

Source: www.darkreading.com

Top found tags: malware(3),financial sector(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. Supreme Court\'s milestone ruling protects cellphone privacyLocation: New York, United States
Date published: 26-06-2014

WASHINGTON (Reuters) - The U.S. Supreme Court on Wednesday ruled that police officers usually need a warrant before they can search the cellphone of an arrested suspect, a major decision in favor of privacy rights at a time of increasing concern over government encroachment in digital communications'... Read more

Source: reuters.com

Top found tags: United States(6),telecom sector(8),government(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PayPal two-factor authentication vulnerability revealedLocation: PayPal HQ - San Jose, United States
Date published: 26-06-2014

unauthorised payments from a user\'s account. According to the Michigan-based two-factor authentication security startup\'s research team, Duo Labs, the vulnerability lies in the authentication flow for the PayPal API web service, which is an API used by PayPal\'s official mobile applications, as we'... Read more

Source: www.zdnet.com

Top found tags: vulnerability(1),cyber security(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PayPal 2FA mobe flaw chills \'warm and fuzzy\' security feelingLocation: PayPal HQ - San Jose, United States
Date published: 26-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines Duo Labs video PayPal\'s second factor authentication (2FA) protection can be mitigated through mobile device interfaces that allow fraudsters to steal funds with a victim\'s username and password, Duo Security researchers say. The bypass, c'... Read more

Source: go.theregister.com

Top found tags: cyber security(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cops must get a warrant before looking through cellphone contentLocation: New York, United States
Date published: 26-06-2014

[secworld-s]The nine judges of the US Supreme Court have unanimously ruled that law enforcement officers can\'t search the contents of an arrested individual\'s cell phone(s) without a search warrant. The matter was decided on following two appeals made by two individuals who were ultimately convict'... Read more

Source: net-security.org

Top found tags: Supreme Court(2),government(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Have cops or feds secretly hijacked your iPhone or Android with \'legal\' spyware?Location: Apple HQ - Cupertino, United States
Date published: 25-06-2014

After capturing secret remote control implants in the wild the Italian Hacking Teams Trojans that target and infect smartphones for maximum surveillance Kaspersky Lab and Citizen Lab gave detailed reports on the legal spyware. While the mobile implants are also available for B'... Read more

Source: blogs.computerworld.com

Top found tags: Kaspersky Lab(4),cybercrime(6),telecom sector(18)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM, Lenovo server deal potentially scuppered over securityLocation: IBM HQ - Armonk, United States
Date published: 26-06-2014

Lenovo\'s plan to buy IBM\'s x86 server business is facing delays over national security concerns. The Wall Street Journal reports that US security officials and members of the Committee on Foreign Investment in the United States (CFIUS) are worried that clasping hands on the sale could result in a '... Read more

Source: www.zdnet.com

Top found tags: cybercrime(3),cyber security(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why the Supreme Court May Finally Protect Your Privacy in the CloudLocation: Riley, United States
Date published: 26-06-2014

Supreme Court in Bloom [gallery-ca]Flickr/Tim Sackton When the Supreme Court ruled yesterday in the case of Riley v. California, it definitively told the government to keep its warrantless fingers off your cell phone. But as the full impact of that opinion has rippled through the privacy community, '... Read more

Source: wired.com

Top found tags: United States(2),government(7),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Massachusetts Supreme Court Rules Defendant Must Decrypt DataLocation: Massachusetts, United States
Date published: 26-06-2014

Encryption software has been enjoying a prolonged day in the sun for about the last year. Thanks to the revelations of Edward Snowden about the NSA\s seemingly limitless capabilities, security experts have been pounding the drum about the importance of encrypting not just data in transit, but inf'... Read more

Source: threatpost.com

Top found tags: cyber security(4),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft still hasn\'t fixed US$100,000 bounty bugLocation: Microsoft HQ - Redmond, United States
Date published: 26-06-2014

Some eight months after discovery and paying a bug bounty of US100,000, Microsoft Windows remains vulnerable to the weakness found by James Forshaw. Microsoft still hasn\'t fixed US$100,000 bounty bug Microsoft still hasn\'t fixed US$100,000 bounty bug Microsoft has still not fixed a major Windows p'... Read more

Source: www.scmagazineuk.com

Top found tags: Microsoft(2),United Kingdom(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The cloud industry needs to get over its insecurity complex\Location: Gartner - Stamford, United States
Date published: 26-06-2014

Today\'s cloud providers need to start being ruthless about security Speak to anyone in IT and they\ll have an opinion on how cloud computing relates to IT security. However, don expect to reach any kind of consensus from your conversations responses will range dramatically from the well'... Read more

Source: www.information-age.com

Top found tags: United Kingdom(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Running WordPress? Got webshot enabled? Turn it off or you e toastLocation: WordPress - San Francisco, United States
Date published: 26-06-2014

execute malicious code, security researchers have warned. The vulnerability, which was disclosed Tuesday on the Full Disclosure mailing list, affects WordPress sites that have TimThumb installed with the webshot option enabled. Fortunately, it is disabled by default, and sites that are hosted on Wor'... Read more

Source: arstechnica.com

Top found tags: vulnerability(1),WordPress(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Patched Code Execution Bug Affects Most Android UsersLocation: Google HQ - Mountain View, United States
Date published: 26-06-2014

A serious code-execution vulnerability in Android 4.3 and earlier was patched in KitKat, the latest version of the operating system. Researchers at IBM this weekdisclosedthe nature of the vulnerability, which was privately disclosed to the Android Security Team in September and patched last Nove'... Read more

Source: threatpost.com

Top found tags: cyber security(2),vulnerability(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Larry Page: Don\'t fret over privacy, love GoogleLocation: Page, United States
Date published: 26-06-2014

Chris Matyszczyk/CNET One often gets the impression that, in Googleworld, technology comes first and people come, well, a little later. There\'s the feeling that the company will do something because it can, not because it truly benefits sentient beings. However, Google CEO Larry Page firmly believe'... Read more

Source: cnet.com.ortal.com

Top found tags: social media(2),Supreme Court(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A look at Interflow, Microsoft's threat information exchange platformLocation: Microsoft HQ - Redmond, United States
Date published: 26-06-2014

In the last few years, there has been one constant call from almost all participants in the information security community: the call for cooperation. But that is easier said then done - you need to make collaboration mutually beneficial and, above all, easy. [microsoft-] Microsoft recently announced'... Read more

Source: net-security.org

Top found tags: information security(2),telecom sector(4),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Luuuk crime gang likely hit by Gameover takedownLocation: Kaspersky HQ - Moscow, Russia
Date published: 26-06-2014

Online bank thieves who stole 400,000 earlier this year are believed to have been hot by police action against the Gameover Trojan gang. Luuuk crime gang likely hit by Gameover takedown Luuuk crime gang likely hit by Gameover takedown Thieves who stole more than 500,000 (400,000) from 190 cus'... Read more

Source: www.scmagazineuk.com

Top found tags: government(5),malware(5),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ENISA and Europol jointly fight cybercrimeLocation: Europol HQ - Den Haag, The Netherlands
Date published: 26-06-2014

ENISA and Europol have signed a strategic cooperation agreement to fight cyber-crime together, marking the latest example that international cyber-crime policing cooperation is improving. ENISA\'s Udo Helmbrecht and Europol\'s Rob Wainwright ENISA\'s Udo Helmbrecht and Europol\'s Rob Wainwright In a'... Read more

Source: www.scmagazineuk.com

Top found tags: Europe(3),government(6),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

State of Montana sends out 1.3 million data breach notificationsLocation: Montana, United States
Date published: 24-06-2014

Notification letters from the State of Montana started to be sent out this week outlining that they had suffered a data breach which affects 1.3 million people.Notification letters from the State of Montana started to be sent out this week outlining the data breach they had suffered which affects 1.'... Read more

Source: www.csoonline.com

Top found tags: report(1),data breach(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cupid Media data breach shown no love by Privacy CommissionerLocation: Cupid Media - Southport, Australia
Date published: 25-06-2014

A cyber attack against dating website operator Cupid Media, which led to the details of 254,000 Australian users being stolen, could have been prevented if the company had password encryption measures, found Australian Privacy Commissioner Timothy Pilgrim.According to Pilgrim, the cyber criminals go'... Read more

Source: www.computerworld.com.au

Top found tags: cybercrime(2),data breach(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
VCs Pour Money Into Security Software Startups as Huge Hacks Pile UpLocation: New York, United States
Date published: 25-06-2014

[ap_datapro] [gallery-il] Bob Hambly Last year was the worst ever for data breaches, so it\s little surprise that VCs poured $829 million into security software in 2013. They want to protect financial, defense, and pharma industry data from hackers so that secret business operations stay secret. '... Read more

Source: wired.com

Top found tags: cyber security(2),data breach(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Montana Health Department HackedLocation: Montana, United States
Date published: 25-06-2014

Montana Health Department Hacked State of Montana notifies 1.3 million patients of breach to Department of Public Health and Human Services server. 10 Ways To Fight Digital Theft & Fraud 10 Ways To Fight Digital Theft & Fraud Hackers breached a server in the State of Montana\'s Department of Public '... Read more

Source: www.informationweek.com

Top found tags: health sector(4),medical sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Montana Notifying 1.3 Million After State Health Agency Server HackedLocation: Montana, United States
Date published: 25-06-2014

Officials in Montana are notifying 1.3 million people impacted by a data breach affecting the state\'s Department of Public Health and Human Services (DPHHS). The state is notifying individuals affected by the breach, which occurred when hackers compromised a DPHHS server. So far, the state said it '... Read more

Source: securityweek.com

Top found tags: health sector(2),identity theft(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fla. passes sweeping data breach notification billLocation: White House - Washington D.C., United States
Date published: 25-06-2014

Florida has repealed its security breach law, and in its stead, passed sweeping legislation seen as possibly the broadest in the country. The set of bills signed by Gov. Rick Scott, impose tougher breach notification requirements on businesses, among other things, narrowing the breach notification p'... Read more

Source: www.scmagazine.com

Top found tags: data breach(2),government(3),legislation(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cupid Media data breach remedied following Privacy Act violationLocation: Sydney, Australia
Date published: 25-06-2014

the Privacy Act. The Commissioner launched its investigation at the end of last year into Cupid\'s data breach following media allegations that accounts and personal information including full names, date of birth, email addresses, and passwords of approximately 254,000 Australian Cupid users were s'... Read more

Source: www.zdnet.com

Top found tags: cybercrime(3),financial sector(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breaches in 2013 exposed 14% of all debit cardsLocation: Target HQ - Minneapolis, United States
Date published: 26-06-2014

Financial institutions weathered the Target data breach and are looking for solutions to enhance security, with many issuers now planning to implement EMV debit, according to PULSE. Debit program performance continues to improve, as active cardholders increase their usage of debit. Key findings incl'... Read more

Source: net-security.org

Top found tags: data breach(2),United States(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Don\'t Fall Prey to Medical Identity TheftLocation: New York, United States
Date published: 25-06-2014

By now, most people know about the perils of identity theft, where someone steals your personal or financial account information and makes fraudulent charges or opens bogus accounts in your name. ID theft can take a serious toll on your credit and take months or years to fix, even if you spot it qui'... Read more

Source: www.huffingtonpost.com

Top found tags: health sector(4),medical sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Insider vs. Outsider Threats: Can We Protect Against Both?Location: Verizon HQ - New York, United States
Date published: 26-06-2014

Media reports affirm that malicious insiders are real. But unintentional or negligent actions can introduce significant risks to sensitive information too. Some employees simply forget security best practices or shortcut them for convenience reasons, while others just make mistakes. Some may not hav'... Read more

Source: securityweek.com

Top found tags: mobile device(2),telecom sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Million plus affected by data breach in MontanaLocation: Montana, United States
Date published: 25-06-2014

This week, the US state of Montana is notifying more than a million people of a massive data breach that took place nearly a year ago, but was only recently discovered. Montana officials are warning that the anonymous hackers gained access to a server containing the state\'s Department of Public Hea'... Read more

Source: www.scmagazineuk.com

Top found tags: Anonymous(2),data breach(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Keeping your datacenter secure means staying ahead of the threatsLocation: New York, United States
Date published: 26-06-2014

Optimizing data center security: Overhaul or incremental changes? Optimizing data center security: Overhaul or incremental changes? In this week\s Great Debate; Optimizing datacenter security: Overhaul or incremental changes? I took the position that incremental was the most appropriate way to go'... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),data breach(2),security management(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IT Managers Are Overconfident About Insider BreachesLocation: AT&T HQ - Dallas, United States
Date published: 26-06-2014

According to the results of a recent survey of 100 senior IT security managers in the U.K., 63 percent of respondents think it\'s "easy" to govern staff access rights and privileges, even though 42 percent admit they don\'t have, or are unsure of, the ability to monitor and prevent breaches caused b'... Read more

Source: www.esecurityplanet.com

Top found tags: medical sector(2),United Kingdom(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Average chump in \'bank\' phone scam is STUNG for 10,000 - studyLocation: New York, United States
Date published: 26-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines UK consumers have lost more than 21m to "social engineering" scams where fraudsters impersonated bank employees and tech support since the beginning of the year, according to GetSafeOnline. A range of tactics including phishing emails, fra'... Read more

Source: go.theregister.com

Top found tags: United Arab Emirates(3),financial sector(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why A Secured Network Is Like The Human BodyLocation: Day, United States
Date published: 26-06-2014

Why A Secured Network Is Like The Human Body It\'s time to throw away the analogies about building fortresses and perimeter defenses and start to approach InfoSec with the same standard of care we use for public health. The networked enterprise is often compared to a fortress: Guard your perimeter, '... Read more

Source: www.darkreading.com

Top found tags: data breach(2),telecom sector(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: Organizations recognize security risks, slow to take actionLocation: Target HQ - Minneapolis, United States
Date published: 26-06-2014

Report: Organizations recognize security risks, slow to take action A recent study has found a significant gap between perceived risk and the actual safeguarding of sensitive data. Businesses continue to struggle to prioritize safeguarding confidential data despite with 72 percent having suffered a '... Read more

Source: www.scmagazine.com

Top found tags: security measures(2),telecom sector(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

TimThumb WebShot Code Execution Exploit (0-day)Location: New York, United States
Date published: 25-06-2014

If you are still using Timthumb after the serious vulnerability that was found on it last year, you have one more reason to be concerned.A new 0-day was just disclosed on TimThumbs Webshot feature that allows for certain commands to be executed on the vulnerable website remotely (no authent'... Read more

Source: blog.sucuri.net

Top found tags: vulnerability(1),website(1),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MAN CHARGED IN STATEWIDE CREDIT CARD FRAUD SCHEME, ADDITIONAL SUSPECTS POSSIBLELocation: Stewart, United States
Date published: 25-06-2014

OTTAWA COUNTY, MI An Illinois man has been arraigned on multiple charges that stem from an alleged statewide credit card fraud scheme.Raymond Stewart, 59, of Park Forest, Ill., was arraigned Tuesday, June 24, on counts of maintaining a criminal enterprise, possession of a fraudulent financial tr'... Read more

Source: michigan.icito.com

Top found tags: credit card(2),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diebold Acquires Secure Payment Company CrypteraLocation: New York, United States
Date published: 25-06-2014

ATM maker Diebold announced on Wednesday that it has entered an agreement to acquire Cryptera, a secure payment solutions provider based in Copenhagen, Denmark. According to Diebold, the acquisition of Cryptera, which supplies PIN pads for ATM and self-service device manufacturers, will help the com'... Read more

Source: securityweek.com

Top found tags: EN(1),ISP(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
College student faces computer fraud charges, hacked peers\' accountsLocation: Tampa Bay, United States
Date published: 25-06-2014

A Pasco-Hernando State College student has been arrested and charged with 11 felony computer fraud charges after hacking into his peers\' accounts. Allen Lockser, a 21-year-old criminal justice technology student, hacked into 20 students\' accounts via the site where they typically submit assignment'... Read more

Source: www.scmagazine.com

Top found tags: hacked(1),hacking(1),education(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM, Lenovo server deal in limbo over security worries: WSJLocation: IBM HQ - Armonk, United States
Date published: 26-06-2014

(Reuters) - International Business Machines Corp\'s proposed $2.3 billion sale of its low-end server business to China\'s Lenovo Group is in limbo as the U.S. government investigates national security issues, The Wall Street Journal reported, citing people familiar with the matter. U.S. security off'... Read more

Source: reuters.com

Top found tags: China(2),government(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft launches Interflow, a new collaborative security platformLocation: Microsoft HQ - Redmond, United States
Date published: 24-06-2014

Microsoft launches Interflow, a new collaborative security platform. Microsoft has launched a new security and threat information exchange platform called Interflow that should enable quicker communication between online security providers. The software giant said in a press release this week, "Inte'... Read more

Source: itproportal.com

Top found tags: Microsoft(1),threat(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google pries open YOUR mailbox to developer partnersLocation: Google HQ - Mountain View, United States
Date published: 26-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines Google\'s announced a grand plan for e-mail that involves letting World+Dog write apps to access your inbox, just so long as you\'ve given them permission to do so. Hailed by some as eplacing IMAP\ (good luck with that, Google, if it'... Read more

Source: go.theregister.com

Top found tags: Linux(1),NSA (1),e-mail(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Business risk: Tales from the TrueCryptLocation: New York, United States
Date published: 26-06-2014

The recent incidents with the Heartbleed OpenSSL vulnerability, along with the strange turn of events involving TrueCrypt shine a light on a big issue for security practitioners. Both of these situations rattled our confidence in specific technologies, but the implications are much broader. In hinds'... Read more

Source: net-security.org

Top found tags: Anonymous(2),OpenSSL(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBook: The CIO playguide for secure BYODLocation: New York, United States
Date published: 26-06-2014

Mobile devices and the ability to work everywhere present a huge opportunity but also pose a challenge for IT in securing corporate data. This eBook provides essential insights for planning and deploying BYOD processes and tools to mitigate security risks and assure proper compliance.'... Read more

Source: net-security.org

Top found tags: EN(1),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Patch looks like Microsoft FAIL, quacks like a Microsoft FAILLocation: Microsoft HQ - Redmond, United States
Date published: 26-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines An out of band patch, from none other than Microsoft, sounds like a familiar cause of a couple of panicked late nights. Rest easy today, dear readers, for even though that combination has arrived this time there\'s little need for alarm. The'... Read more

Source: go.theregister.com

Top found tags: patch(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Credit card fraud suspect caught, police wonder how big operation isLocation: Will, United States
Date published: 25-06-2014

ROANOKE COUNTY, Va. -Roanoke County Police and The Secret Service are investigating substantial credit card fraud in the area. One man has already been charged and we\'re still waiting to hear about his alleged partner in crime.According to court documents, it was routine maintenance at the apartmen'... Read more

Source: www.wdbj7.com

Top found tags: police(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ALERT: Skimming devices found at Pinellas gas stationsLocation: Tampa Bay, United States
Date published: 25-06-2014

ST. PETERSBURG, FL (WFLA) -Authorities are warning people in Tampa Bay to be on the lookout for credit card skimmers at local gas stations after skimmers were found in Pinellas County this week.St. Petersburg Police say they received a report Tuesday about a credit card skimming device at self serve'... Read more

Source: www.wfla.com

Top found tags: skimming(1),credit card(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man posed as teenage girl on Facebook to sexually exploit boysLocation: Dublin, Ireland
Date published: 25-06-2014

A young man posed as a teenage girl on Facebook in order to sexually exploit boys, a court has heard.The man, who was 19 at the time, convinced three boys aged between 13 and 14 to send him sexually explicit pictures of themselves and to masturbate via an online video link.He later told garda he d'... Read more

Source: www.irishtimes.com

Top found tags: exploit (1),Facebook(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PayPal addresses two-factor authentication bypassLocation: PayPal HQ - San Jose, United States
Date published: 26-06-2014

PayPal addresses two-factor authentication bypass PayPal addresses two-factor authentication bypass Due to a vulnerability existing in some of PayPal\'s mobile applications, all someone needs to access an account with two-factor authentication enabled is a set of legitimate primary credentials, acco'... Read more

Source: www.scmagazineuk.com

Top found tags: airport sector(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critical Android code-execution flaw affects all but the latest versionLocation: Google HQ - Mountain View, United States
Date published: 26-06-2014

IBM researchers have discovered a critical security vulnerability in Android 4.3 (Jelly Bean) and below which could allow attackers to exfiltrate sensitive information - credentials, private keys - from vulnerable devices. The vulnerability is found in Android\'s secure storage service KeyStore, and'... Read more

Source: net-security.org

Top found tags: patch(1),research(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IT firms earn more from government contracts than any other industry: HP bags almost 2bnLocation: Hewlett-Packard - Palo Alto, United States
Date published: 26-06-2014

IT firms earn more from government contracts than any other industry: HP bags. almost 2bn A report on public spending has found IT companies earned more from government contracts in 2012 and 2013 than any other industry. Think tank the Institute for Government and startup business Spend Network lo'... Read more

Source: itproportal.com

Top found tags: threat(1),financial sector(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google starts removing \'right to be forgotten\' search resultsLocation: Google HQ - Mountain View, United States
Date published: 26-06-2014

Google has begun removing search results in compliance with a European court ruling that search engine providers must respond to requests to delete links to outdated information about a person. As of Thursday, when a user searches for a name via one of Google\s European domains they may see a war'... Read more

Source: www.pcworld.com

Top found tags: EU(2),ISP(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google stops ignoring enterprise, adds EMM to AndroidLocation: Google HQ - Mountain View, United States
Date published: 26-06-2014

administrator, especially one with security responsibilities, you\'ve had to be worried about letting Android onto your network. If you\'ve done so, you\'ve probably limited it to Exchange ActiveSync access. Must See Gallery 12 ways to improve Android battery life 12 ways to improve Android battery '... Read more

Source: www.zdnet.com

Top found tags: Samsung(1),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snarky Lawmaker Reminds Former NSA Chief That Selling State Secrets Is IllegalLocation: Alexander, United States
Date published: 26-06-2014

Keith Alexander, former director of the NSA, during his retirement ceremony March 28. Keith Alexander, former director of the NSA, during his retirement ceremony March 28. [gallery-ca] Brendan Smialowski/Getty Images Cybersecurity firms and snake-oil salesmen promising protection from online threats'... Read more

Source: wired.com

Top found tags: U.S. Cyber Command(3),government(8),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PayPal 2FA flow partially mitigated, accounts are safeLocation: PayPal HQ - San Jose, United States
Date published: 26-06-2014

[paypal-ico]In the wake of the revelation of a flaw that allows attackers to bypass PayPal\'s two-factor authentication feature, the e-payment giant has made it temporarily impossible for users who enabled it to log into their PayPal account via the PayPal mobile app and on certain other mobile apps'... Read more

Source: net-security.org

Top found tags: vulnerability(1),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM Discloses Details of Critical Android Flaw Patched by GoogleLocation: Google HQ - Mountain View, United States
Date published: 26-06-2014

IBM researchers uncovered a critical vulnerability affecting everyone not running the most up-to-date version of Google Android. The vulnerability is patched in the latest version of Android (version 4.4, also known as KitKat), but affects versions 4.3 and earlier. According to IBM, the issue is con'... Read more

Source: securityweek.com

Top found tags: vulnerability(1),disclosure(2),responsible disclosure(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Employees on holiday a security riskLocation: New York, United States
Date published: 26-06-2014

Employees on holiday a security risk Employees on holiday a security risk Sourcefire\'s recent research on the habits of workers on holiday reveals that the rampant use of unsecured WiFi networks for work related purposes could potentially compromise the data of their companies. The study, coined \'... Read more

Source: www.scmagazineuk.com

Top found tags: survey(1),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

ICS Focused MalwareLocation: IBM HQ - Armonk, United States
Date published: 25-06-2014

(Reuters) - International Business Machines Corp\'s proposed $2.3 billion sale of its low-end server business to China\'s Lenovo Group is in limbo as the U.S. government investigates national security issues, The Wall Street Journal reported, citing people familiar with the matter. U.S. security off'... Read more

Source: ics-cert.us-cert.gov

Top found tags: China(2),government(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Malware stal een half miljoen euro in een week tijdLocation: Kaspersky HQ - Moscow, Russia
Date published: 26-06-2014

Malware Luuuk stal in januari van dit jaar in een week tijd ruim een half miljoen euro van Italiaanse en Turkse bankrekeningen, om vervolgens te verdwijnen. De malware werd in januari door beveiligingsbedrijf Kaspersky ontdekt. De trojan Luuuk werkte op een zogenoemde man-in-the-browser-manier. Daar'... Read more

Source: www.nutech.nl

Top found tags: financial sector(2),Kaspersky Lab(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Steam-gebruikers doelwit van phishing en typosquattingLocation: Amsterdam, The Netherlands
Date published: 26-06-2014

Het online speldistributieplatform Steam, dat meer dan 75 miljoen gebruikers heeft, is een geliefd doelwit van cybercriminelen en recent zijn er weer nieuwe aanvallen ontdekt. Aanvallen tegen Steam vinden al jaren plaats, maar worden steeds verder verfijnd om ook de twee factor-authenticatie te omze'... Read more

Source: www.security.nl

Top found tags: NL(1),phishing(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Politie mag hardwarematige keylogger gebruiken"Location: Den Haag, The Netherlands
Date published: 26-06-2014

Het gebruik van keyloggers door justitie is niet per se verboden, zo mag de politie een hardwarematige keylogger op de computer van een verdachte plaatsen. Dat meldt Jan-Jaap Oerlemans, jurist, promovendus bij de Universiteit Leiden en onderzoeker bij het Delftse beveiligingsbedrijf Fox-IT. Oerleman'... Read more

Source: www.security.nl

Top found tags: social media(2),The Netherlands(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Politie waarschuwt om foto rijbewijs niet online te zettenLocation: Den Haag, The Netherlands
Date published: 26-06-2014

De politie waarschuwt mensen om geen foto\'s van hun rijbewijs of identiteitskaart op internet te plaatsen, aangezien dit identiteitsfraude in de hand werkt. De laatste tijd ziet de politie steeds vaker dat mensen een foto van een net gehaald rijbewijs of identiteitskaart op Facebook of Twitter zett'... Read more

Source: www.security.nl

Top found tags: Twitter(1),identity theft(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Digitale veiligheid van levensbelang voor de financile sectorLocation: New York, United States
Date published: 26-06-2014

Klanten van banken en verzekeraars willen hun zaken veilig kunnen regelen. De financile sector werkt er dan ook hard aan om de veiligheid via online kanalen te waarborgen. Security services die nu al rekening houden met de toekomst zijn onmisbaar in deze steeds complexere materie.En enkele oplos'... Read more

Source: forum.kpn.com

Top found tags: cybercrime(4),cyber security(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
14% VAN DE NEDERLANDSE ONDERNEMINGEN RAAKT GEVOELIGE DATA KWIJT NA EEN EXTERNE DREIGINGLocation: Kaspersky HQ - Moscow, Russia
Date published: 26-06-2014

Uit wereldwijd onderzoek onder bijna 4.000 IT-managers in 27 landen, uitgevoerd door Kaspersky Lab, blijkt dat het aantal bedrijven dat te maken krijgt met externe cyberdreigingen ieder jaar stijgt. Maar liefst 94% van de respondenten uit het onderzoek liet weten de laatste twaalf maanden geconfront'... Read more

Source: www.executive-people.nl

Top found tags: cyber espionage(2),cybercrime(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

VS: privacy Europeanen wordt beter beschermdLocation: New York, United States
Date published: 26-06-2014

De Amerikaanse privacywet gaat ook gelden voor inwoners van de Europese Unie. Dat belooft de Amerikaanse minister van justitie. Het is de eerste keer dat de Amerikaanse privacywetgeving geldt voor anderen dan inwoners van de VS. De Amerikaanse minister van justitie, Eric Holder, belooft volgens The '... Read more

Source: tweakers.net

Top found tags: cyber security(2),government(2),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
VS zegt zelfde privacyrechten voor Europeanen te willenLocation: Brussels,Belgium
Date published: 26-06-2014

De Amerikaanse autoriteiten hebben gezegd dat ze wetgeving willen introduceren waardoor Europeanen dezelfde privacyrechten als Amerikaanse burgers krijgen als hun gegevens voor justitieel onderzoek naar de Verenigde Staten worden gestuurd. De VS en EU zouden al sinds maart 2011 over de privacybesche'... Read more

Source: www.security.nl

Top found tags: cyber security(2),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
VS zegt EU-burgers recht op privacy toeLocation: New York, United States
Date published: 26-06-2014

De regering Obama heeft toegezegd wetten door te voeren die de Europese burgers tot op zekere hoogte zullen vrijwaren van afluisteren en meelezen door Amerikaanse inlichtingendiensten. De voorgestelde regeling zou volgens een bericht The Guardian op een aantal punten overeenkomen met de garanties di'... Read more

Source: www.automatiseringgids.nl

Top found tags: United Kingdom(4),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Overheidsdiensten plaatsen spyware op mobieltjesLocation: Den Haag, The Netherlands
Date published: 25-06-2014

Op smartphones in tientallen landen is software gevonden waarmee politie en veiligheidsdiensten gesprekken afluisteren, emails en smsjes meelezen en zelfs de camera kunnen bedienen. Ook adressenboeken en de geschiedenis van telefoons kunnen worden uitgelezen.Dat hebben beveiligingsbedrijven Kaspersk'... Read more

Source: www.bnr.nl

Top found tags: Kaspersky Lab(2),government(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Platform Industrial Cyber SecurityLocation: Amsterdam, The Netherlands
Date published: 25-06-2014

Steeds meer technische industrile installaties worden op afstand aangestuurd. We kennen ze allemaal, maar staan er niet altijd bij stil. Denk bijvoorbeeld aan de vele bruggen die op afstand worden geopend. De brugwachters van weleer zijn verleden tijd. De internettechniek heeft voor een groot deel'... Read more

Source: infosecuritymagazine.nl

Top found tags: police(1),vulnerability(1),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
OM gebruikte keylogger in zaak internetstalkerLocation: Openbaar Ministerie - Den Haag, The Netherlands
Date published: 25-06-2014

In een zaak waarbij een Canadees meisje zelfmoord pleegde nadat een onbekende haar had gechanteerd met seksfoto\'s heeft het Openbaar Ministerie (OM) een keylogger gebruikt. Dat meldt Nieuwsuur vanavond aan de hand van het strafdossier dat het actualiteitenprogramma kon inzien. Volgens Justitie heef'... Read more

Source: www.security.nl

Top found tags: webcam(1),social media(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android richt zich op zakelijk gebruik en beveiligingLocation: Google HQ - Mountain View, United States
Date published: 26-06-2014

Android moet geschikter worden voor zakelijk gebruik en de opslag van gevoelige informatie wordt veiliger. Google kondigde tijdens het jaarlijkse I/O ontwikkelaarsconferentie het nieuwe Android 5.0 aan. De nieuwe diensten komen samen onder de naam Android Work. Sundar Pichai op Google IO Google gebr'... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Google(2),Google Play(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overheid stopt ontwikkeling van DigiD-kaartLocation: Den Haag, The Netherlands
Date published: 26-06-2014

Er komt toch geen DigiD-kaart om zaken met de overheid te doen, zo heeft minister Plasterk van Binnenlandse Zaken in een brief aan de Tweede Kamer laten weten. Eind vorig jaar had de minister nog aangekondigd dat het Kabinet de ontwikkeling van een DigiD-kaart zou onderzoeken.'... Read more

Source: www.beveiligingnieuws.nl

Top found tags: government(6),The Netherlands(6),Ministry of the Interior and Kingdom Relations(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Openbaar Ministerie plaatste malware op pc verdachteLocation: Openbaar Ministerie - Den Haag, The Netherlands
Date published: 26-06-2014

Het Nederlandse Openbaar Ministerie heeft onder meer een keylogger gebruikt om bewijs te verzamelen in de zaak van iemand die werd verdacht van het chanteren van jonge meisjes en jongens. De malware registreerde onder meer de toetsaanslagen die op de pc werden gedaan, en daarnaast werd om de paar mi'... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crowdsourcingplatform voor penetratietesten gelanceerdLocation: Amsterdam, The Netherlands
Date published: 26-06-2014

Bedrijven die hun webapplicaties, websites en software op beveiligingslekken willen laten testen kunnen nu ook de \'wisdom of the crowd\' inzetten. Flex, zoals het initiatief heet, is afkomstig van Bugcrowd, een marktplaats voor beveiligingsonderzoekers. Via Flex kunnen bedrijven bijvoorbeeld een ap'... Read more

Source: www.security.nl

Top found tags: research(1),vulnerability(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Samsung-beveiliging deels aan Android toegevoegdLocation: Knox, United States
Date published: 26-06-2014

Delen van de beveiligingstechnologie KNOX van Samsung worden toegevoegd aan de nieuwste versie van het Android-besturingssysteem. De nieuwste Android-versie, die gisteren tijdens de Google I/O ontwikkelaarsconferentie werd getoond, bevat een aantal functies om bedrijfsgegevens beveiligen. KNOX besch'... Read more

Source: www.security.nl

Top found tags: NL(1),Samsung(1),conference(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nederlanders installeren malware op onbewaakte Google GlassLocation: Google HQ - Mountain View, United States
Date published: 26-06-2014

Nederlandse onderzoekers van het Nijmeegse ICT-bedrijf Masc en accountancykantoor Deloitte hebben aangetoond dat het mogelijk is om op een onbewaakte Google Glass, net zoals bij de meeste andere apparatuur waarvan de eigenaar niet in de buurt is, malware te installeren. Via de malware is het vervolg'... Read more

Source: www.security.nl

Top found tags: research(1),Google(2),Google Glass(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google begint met verwijderen zoekresultaten EU-burgersLocation: Google HQ - Mountain View, United States
Date published: 26-06-2014

Google is begonnen met het verwijderen van zoekresultaten die wijzen naar de namen van Europese burgers die hier bezwaar tegen maakten. In mei bepaalde het Hof van Justitie van de Europese Unie dat EU-burgers het recht hebben om vergeten te worden. Dit houdt in dat Google zoekresultaten moet verwijd'... Read more

Source: www.security.nl

Top found tags: EU(1),Google(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
1,3 miljoen Amerikanen ingelicht na inbraak op overheidsserverLocation: Amsterdam, The Netherlands
Date published: 26-06-2014

De Amerikaanse staat Montana heeft 1,3 miljoen mensen ingelicht dat er een inbraak op een overheidsserver heeft plaatsgevonden waar ook hun persoonlijke informatie op stond, hoewel die niet door de aanvaller zou zijn benaderd. De server was van het Ministerie van Volksgezondheid. Op 15 mei werd er v'... Read more

Source: www.security.nl

Top found tags: research(1),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Student VS kraakt accounts 20 studenten door te radenLocation: Amsterdam, The Netherlands
Date published: 26-06-2014

In de Verenigde Staten is een 21-jarige student technologie en strafrecht gearresteerd na het inbreken op de accounts van 20 andere studenten. Allen Lockser wist door wachtwoorden te raden toegang tot de accounts te krijgen, waarmee studenten op een leermanagementwebsite van de school kunnen inlogge'... Read more

Source: www.security.nl

Top found tags: research(1),website(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nieuwe sms-worm voor Android-smartphones ontdektLocation: Google HQ - Mountain View, United States
Date published: 26-06-2014

Onderzoekers hebben een nieuwe worm voor Android-smartphones ontdekt die zich via sms-berichten verspreidt. De worm stuurt naar gebruikers een sms met daarin de naam van de ontvanger en een via goo.gl afgekorte link. Deze link wijst naar een APK-bestand, wat in werkelijkheid de Selfmite-worm is. Als'... Read more

Source: www.security.nl

Top found tags: smartphone(1),SMS(1),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Verdachte zaak-Todd versleutelde deel bestandenLocation: Todd, United States
Date published: 26-06-2014

De verdachte in de zaak Amanda Todd, tegen wie het Openbaar Minister een keylogger gebruikte, heeft een deel van zijn bestanden versleuteld en wil niet met het ontsleutelen meewerken. De 36-jarige Aydin C. wordt verdacht van aanranding en afpersing van tientallen jonge meisjes via de webcam. Hij zou'... Read more

Source: www.security.nl

Top found tags: webcam(1),government(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ziekenhuisnetwerken kwetsbaar door SMB-configuratiesLocation: New York, United States
Date published: 26-06-2014

De netwerken van ziekenhuizen staan open voor aanvallers doordat systeembeheerders het SMB-protocol verkeerd hebben geconfigureerd. SMB staat voor Server Message Block en maakt het mogelijk voor beheerders om systemen te identificeren die op een intern netwerk zijn aangesloten. Met SMB krijgt elk sy'... Read more

Source: www.security.nl

Top found tags: Windows(1),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Aanvallen op poort 5000 UPnP explosief gestegenLocation: Akamai - Boston, United States
Date published: 26-06-2014

Het aantal aanvallen op poort 5000 Universal Plug & Play (UPnP) is het eerste kwartaal van dit jaar explosief gestegen. Daarnaast verdrievoudigde het aantal aanvallen op poort 23 Telnet, zo blijkt uit het State of the Internet Report van internetgigant Akamai. Tijdens het laatste kwartaal van vorig '... Read more

Source: www.security.nl

Top found tags: trend(1),Akamai(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ngi-NGN doet aanbeveling over falende overheidsprojectenLocation: Voorst, Voorst, Gelderland, The Netherlands
Date published: 26-06-2014

Ngi-NGN wil een onafhankelijke aanbeveling doen naar de overheid over hoe het falen ICT-projecten in de toekomst voorkomen kan worden. Er staat hiertoe een openbaar document op Github. Meer over de Kamercommissie ICT: Kamer begint hoorzitting over falende ICT-projecten Tweede serie hoorzittingen van'... Read more

Source: www.automatiseringgids.nl

Top found tags: social media(2),The Netherlands(4),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid in dovecot verholpenLocation: Amsterdam, The Netherlands
Date published: 26-06-2014

Samenvatting: Er zijn updates voor Dovecot beschikbaar gemaakt om een Denial-of-Service kwetsbaarheid te verhelpen. Gevolgen: Een kwaadwillende kan op afstand een Denial-of-Service veroorzaken op een IMAP/POP3 server. Beschrijving: Er is een kwetsbaarheid ontdekt in de SSL/TLS handshake fase waarbij'... Read more

Source: www.ncsc.nl

Top found tags: DoS(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FreeBSD verhelpt meerdere kwetsbaarheden in file en libmagickLocation: National Cyber Security Centre - Den Haag, The Netherlands
Date published: 26-06-2014

Samenvatting: FreeBSD heeft updates uitgebracht voor file en libmagick om meerdere kwetsbaarheden te verhelpen. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende op afstand een Denial-of-Service veroorzaken. Beschrijving: - CVE-2012-1571: Door een malafide Composite Document Fil'... Read more

Source: www.ncsc.nl

Top found tags: NL(1),The Netherlands(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in PHP verholpenLocation: Hewlett-Packard - Palo Alto, United States
Date published: 26-06-2014

Samenvatting: Er zijn updates uitgebracht om een kwetsbaarheid in PHP te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken voor het veroorzaken van een Denial-of-Service (DoS) en mogelijk op afstand willekeurige code uitvoeren. Beschrijving: Kwetsbaarheid in de DNS TXT-record pa'... Read more

Source: www.ncsc.nl

Top found tags: PHP(1),Ubuntu(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in SambaLocation: Amsterdam, The Netherlands
Date published: 26-06-2014

Samenvatting: Er is een update uitgebracht voor Samba die de kwetsbaarheid verhelpt. Gevolgen: Een kwaadwillende kan toegang krijgen tot gevoelige informatie en kan mogelijk een Denial-of-Service veroorzaken van de Netbios name service daemon en van de smbd file server daemon. Beschrijving: Door een'... Read more

Source: www.ncsc.nl

Top found tags: update (1),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Xen verholpenLocation: Amsterdam, The Netherlands
Date published: 26-06-2014

Samenvatting: Er zijn updates beschikbaar gesteld om de kwetsbaarheden te verhelpen in Xen. Gevolgen: Een lokale kwaadwillende gebruiker kan mogelijk een Denial-of-Service veroorzaken van de Xen host. Beschrijving: - CVE-2014-2599 Een kwetsbaarheid in de HVMOP_set_mem_access HVM control operations o'... Read more

Source: www.ncsc.nl

Top found tags: Fedora(1),NL(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Apache Struts verholpenLocation: IBM HQ - Armonk, United States
Date published: 26-06-2014

Samenvatting: Apache en IBM hebben een kwetsbaarheid verholpen in het Apache Struts web framework. Gevolgen: Een kwaadwillende kan de kwetsbaarheid op afstand misbruiken om beveiligingsmaatregelen te omzeilen om zo mogelijke andere aanvallen uit te voeren. Beschrijving: De kwetsbaarheid kan op afsta'... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish