Under construction

New design coming soon!

CIC News engine statistics

CIC News for 27-06-2014 contains 131 articles: cybercrime(43),cyber security(38),data breach(12),other(38)

CIC News update contains 102 English and 29 Dutch articles for today.
There are 5 published advisories, 0 are English and 5 are Dutch.
In today's English news articles:
- 27 related to cybercrime
- 37 related to cyber security
- 12 related to data breach and identity theft
- 26 for the category other news

In today's Dutch news articles:
- 16 related to cybercrime
- 1 related to cyber security
- 12 for the category other news

Have fun reading.

English cybercrime related news

Is BYOD Security Really Concerned with Safety or Is It All About Control?Location: Apple HQ - Cupertino, United States
Date published: 25-06-2014

If you are a regular follower of this blog, youve probably noticed that I havent been writing much in the past few months. I have simply been too busy, traveling and speaking at some really great security conferences.The most recent and the most informative (for me at least) was the Internatio'... Read more

Source: www.tofinosecurity.com

Top found tags: mobile device(6),telecom sector(6),The Netherlands(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Italy\'s \'Hacking Team\' spy Trojan targeting Android and iOS devices, researchers discoverLocation: Google HQ - Mountain View, United States
Date published: 25-06-2014

Italy\'s infamous and dubious hackers-for-hire Hacking Team (or HackingTeam) have set up a worldwide command and control network comprising several hundred servers and expanded into Android and iOS surveillance, a study by Kaspersky Lab and the University of Toronto\'s Citizen Lab has revealed.The c'... Read more

Source: www.pcworld.in

Top found tags: government(3),Kaspersky Lab(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China cyber crime cooperation stalls after U.S. hacking chargesLocation: New York, United States
Date published: 26-06-2014

WASHINGTON (Reuters) - Fledging cooperation between the United States and China on fighting cyber crime has ground to a halt since the recent U.S. indictment of Chinese military officials on hacking charges, a senior U.S. security official said on Thursday. At the same time, there has been no declin... Read more

Source: reuters.com

Top found tags: child pornography(4),cybercrime(7),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AskMen.com changes original statement, says readers were exposed to malwareLocation: New York, United States
Date published: 26-06-2014

When Websense posted on Monday about how AskMen.com a website that attracts more than 10 million visitors each month was redirecting users to Caphaw malware, an AskMen.com spokesperson told SCMagazine.com a day later that it was not the case. On Thursday, AskMen.com changed its stance, expla... Read more

Source: www.scmagazine.com

Top found tags: cybercrime(2),vulnerability(2),website(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RCE vulnerability in TimThumb's WebShot feature puts WordPress users at riskLocation: WordPress - San Francisco, United States
Date published: 26-06-2014

The website for the Federal Election Commission was adversely impacted for weeks. An attacker could inject malware and take down websites that have TimThumb's WebShot feature enabled. A zero-day remote code execution (RCE) vulnerability has been discovered in the WebShot feature of TimThumb, a... Read more

Source: www.scmagazine.com

Top found tags: website(1),WordPress(1),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Decades-Old Vulnerability Threatens 'Internet Of Things'Location: Bailey, United States
Date published: 26-06-2014

Decades-Old Vulnerability Threatens 'Internet Of Things' A newly discovered bug in the pervasive LZO algorithm has generated a wave of patching of open-source tools such as the Linux kernel this week. A 20-year-old bug has been discovered in a version of a popular compression algorithm used in the L... Read more

Source: www.darkreading.com

Top found tags: update(2),vulnerability(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers use Dropbox to spread malwareLocation: Trend Micro - Cupertino, United States
Date published: 26-06-2014

Cape Town - Cyber criminals are migrating their strategy to include cloud-based services to launch attacks on computers, new research has revealed.In a post by security firm Trend Micro, the firm found that hackers had been manipulating online storage utility Dropbox to download command and control ... Read more

Source: www.fin24.com

Top found tags: South Africa(2),Trend Micro(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Germany dumps Verizon for Deutsche Telekom over NSA spyingLocation: Berlin, Germany
Date published: 26-06-2014

The German government has said it will cancel its contract with US telecoms provider Verizon, citing spying fears. "The pressures on networks as well as the risks from highly-developed viruses or Trojans are rising," the country's Interior Ministry told Reuters on Thursday. "Furthermore, the ties re... Read more

Source: go.theregister.com

Top found tags: Germany(5),government(8),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australia's average connection speed up 39 percent YoY: AkamaiLocation: Akamai - Boston, United States
Date published: 27-06-2014

Quarter 2014 State of the Internet Report, but has finally crawled over the 6Mbps barrier. The country's average connection speeds during Q1 2014 was 6.0 megabits pers second (Mbps), representing a 2.6 percent increase quarter-over-quarter. On a year-on-year basis, the average connection speeds in A... Read more

Source: www.zdnet.com

Top found tags: cybercrime(2),New Zealand(2),South Korea(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
White Ops Secures $7 Million to Expand Bot-detection TechnologyLocation: White, United States
Date published: 27-06-2014

Internet fraud detection firm White Ops announced this week that it it has secured $7 million in funding from Paladin Capital and Grotech Ventures. New York City-based White Ops offers a solution to combat online advertising fraud by isolating and eliminating bot-infected traffic. Using thousands of... Read more

Source: securityweek.com

Top found tags: fraud(1),website(1),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Send Bitcoin or we'll hate-spam you on Yelp, say crimsLocation: Bureau, United States
Date published: 27-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines Businesses are being served printed 'Notice of Extortion' letters demanding Bitcoins to avoid 'severe and irreparable' damage to their reputation. A handful of US Pizza restaurants have reported the scam to local newspapers, and to Reddit. T... Read more

Source: go.theregister.com

Top found tags: financial sector(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The unlocked backdoor to healthcare dataLocation: Williams, United States
Date published: 27-06-2014

The majority of healthcare vendors lack minimum security, which is illuminated by the fact that more than 58% scoring in the D grade range for their culture of security. A new CORL Technologies report also highlights that healthcare organizations are failing to hold vendors accountable for meeting m... Read more

Source: net-security.org

Top found tags: medical sector(2),phishing(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whitepaper: APTs detection, protection and preventionLocation: New York, United States
Date published: 27-06-2014

Many papers on the topic of Advanced Persistent Threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have b... Read more

Source: net-security.org

Top found tags: backdoor(2),social engineering(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Curiosity rover brought Earth BUG to MarsLocation: Bailey, United States
Date published: 27-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines A 20 year old bug has been discovered in an algorithm so pervasive it's used in the Mars Curiosity rover, cars, aircraft, Android phones and a string of popular open source wares. The bug can be found in the Lempel-Ziv-Oberhumer (LZO) data c... Read more

Source: go.theregister.com

Top found tags: research(1),vulnerability(1),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Winning the War on Cybercrime: The Four Keys to Holistic Fraud PreventionLocation: New York, United States
Date published: 27-06-2014

Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals' co... Read more

Source: www.healthcareinfosecurity.com

Top found tags: phishing(2),financial sector(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China cyber crime cooperation stalls after U.S. hacking chargesLocation: New York, United States
Date published: 26-06-2014

By Alina Selyukh and Doina ChiacuRelated StoriesU.S. Ambassador Baucus says China hacking threatens national security ReutersUS seeks resumption of cyber talks with China Associated PressUS: China's behavior offshore hurts its standing Associated PressPrivate U.S. report accuses another Chinese mili... Read more

Source: news.yahoo.com

Top found tags: child pornography(4),cybercrime(7),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A DDoS Emerges That Busies A Cipher with CPU IntensityLocation: Hong Kong, China
Date published: 26-06-2014

On June 13, the Hong Kong Universitys Public Opinion Programme voting site went live and suffered the largest DDoS attack ever in Hong Kong. The voting website aims to provide a referendum on constitutional reforms. CloudFlares CEO and co-founder Matthew Prince, reported the traffic going beyo... Read more

Source: thenewstack.io

Top found tags: website(1),cybercrime(2),Hong Kong(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
State of the Internet: What Security Pros Need To KnowLocation: Akamai - Boston, United States
Date published: 26-06-2014

Distributed Denial of Service (DDoS) attack traffic is one storyline in the Akamai State of the Internet Report. The good news is the number of DDoS attacks reported to Akamai in the first quarter declined to 283, from 346 in the last quarter of 2013. That is a 20 percent decrease quarter-over-quart... Read more

Source: www.sci-tech-today.com

Top found tags: DoS(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How does a rogue ad network function?Location: New York, United States
Date published: 27-06-2014

It's a well known fact that a considerable chunk of Internet traffic is bogus, made by infected computers that visit sites and click on adverts chosen by malicious actors. Malwarebytes' researchers have recently analyzed the workings of one ad network that has obviously been set up to earn its handl... Read more

Source: net-security.org

Top found tags: website(1),exploit kit(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Germany cancels Verizon's government contract due to spying fearsLocation: Berlin, Germany
Date published: 27-06-2014

Verizon will no longer provide internet services to a number of German government departments, as their contract has been cancelled as part of a restructuration of the federal government's interdepartmental communication network. Current government communication networks are mainly based on two netw... Read more

Source: net-security.org

Top found tags: Germany(3),government(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Yet another WordPress vuln: Image furtler plugin lets BADNESS inLocation: WordPress - San Francisco, United States
Date published: 27-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines Self-hosted installations of WordPress are at risk of attack following the disclosure of a vulnerability in a widely used plugin for the blogging software-cum-website CMS. The vulnerable TimThumb plugin is used by many blogs to easily resize... Read more

Source: go.theregister.com

Top found tags: WordPress(1),cybercrime(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Zero-Day Patched in TimThumb WordPress ScriptLocation: WordPress - San Francisco, United States
Date published: 27-06-2014

A patch for a zero-day vulnerability in TimThumb has been released by its developer who is none too pleased about this weeks disclosure on a popular security mailing list. Unfortunately nobody told me about this before the exploit was announced in fact I found out about the bug throughwp... Read more

Source: threatpost.com

Top found tags: WordPress(1),financial sector(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RIG Exploit Kit Used in Flash-Based Malvertising CampaignLocation: Malwarebytes - San Jose, United States
Date published: 27-06-2014

Flash-based ads are being used by an advertising network to lure the visitors of various websites to a landing page that has been set up to distribute malware, Internet security firm Malwarebytes said on Thursday. According to the company, the malicious advertising (malvertising) campaign relies on ... Read more

Source: securityweek.com

Top found tags: telecom sector(4),malware(5),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Caritas Manila: 'We're not the ones sending you spam text messages'Location: Manila, Metro Manila, Philippines
Date published: 27-06-2014

The Catholic Church's social arm Caritas Manila on Friday clarified it is not affiliated in any way with Caritas Health Shield, a company recently hit for sending spam or unsolicited text messages. In a notice, Caritas Manila said it is not connected to Caritas Health Shield, one of two companies or... Read more

Source: www.gmanetwork.com

Top found tags: Twitter(1),website(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Oil and Natural Gas ISAC LaunchesLocation: Sac, United States
Date published: 27-06-2014

Energy utilities certainly have not been spared by hackers who for years have targeted vulnerabilities in process control systems and networks with alarming success. In a move to close the gap and keep that corner of the U.S. critical infrastructure secure, a new information sharing group popped ... Read more

Source: threatpost.com

Top found tags: United States(2),process control system(3),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Longstanding Security Vulnerability Found in LZO Compression AlgorithmLocation: Ford, United States
Date published: 27-06-2014

A serious security hole that has been plaguing the Lempel-Ziv-Oberhumer (LZO) algorithm for the past 20 years has been finally patched. The LZO algorithm was created in 1994 by Markus Oberhumer, whose core open source implementation has been rewritten by numerous companies. LZO has been used for com... Read more

Source: securityweek.com

Top found tags: DoS(3),cybercrime(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Banking Malware Uses Network Sniffing for Data TheftLocation: Berlin, Germany
Date published: 27-06-2014

With online banking becoming routine for most users, it comes as no surprise that we are seeing more banking malware enter the threat landscape. In fact, 2013 saw almost a million new banking malware variantsdouble the volume of the previous year. The rise of banking malware continued into this y... Read more

Source: trendmicro.com

Top found tags: Germany(2),Trend Micro(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

ENISA, Europol strengthen cooperation against cybercrimeLocation: Europol HQ - Den Haag, The Netherlands
Date published: 26-06-2014

EU cyber security agency ENISA and Europol have signed a strategic cooperation agreement in the fight against cybercrime. The aim of the agreement is to enhance cooperation between Europol, its European Cybercrime Centre (EC3), and ENISA in order to help EU member states and institutions preventing '... Read more

Source: www.telecompaper.com

Top found tags: Europe(2),government(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Billions Lost to Cybercrime in IcelandLocation: Reykjavik, Iceland
Date published: 26-06-2014

Cybercrime in Iceland is resulting in annual losses in the ISK billions according to the Ministry of the Interior, ruv.is reports. A number of hacking cases have been covered in the media, usually because the hackers had announced their actions, but it is expected that many more cases go unreported.'... Read more

Source: icelandreview.com

Top found tags: cyber security(2),cybercrime(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Jersey teen charged after altering students' grades and attendance recordsLocation: New Jersey, United States
Date published: 26-06-2014

A 16-year-old New Jersey teen is being charged with unlawfully accessing his school district's computer system and using it to change students' grades and attendance records. Orange Public School district staff and authorities believe the student accessed the computer system through a teacher's logi... Read more

Source: www.scmagazine.com

Top found tags: legislation(1),password(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Supreme Court's landmark ruling bars warrantless search of cell phonesLocation: San Diego, United States
Date published: 26-06-2014

Supreme Court's landmark ruling bars warrantless search of cell phones Justices came to the decision on the Riley v. California case, which stems from the 2009 arrest of a San Diego man. In a landmark ruling, the Supreme Court has decided that police may no longer search the contents of suspects' ce... Read more

Source: www.scmagazine.com

Top found tags: Supreme Court(2),government(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trade group previews apps to give mobile users choice on adsLocation: Microsoft HQ - Redmond, United States
Date published: 26-06-2014

The Digital Advertising Alliance, a consortium of advertising trade groups, will roll out two new apps later this year aimed at giving mobile device users a choice of what ads they see. Later this year, the DAA will release a mobile app, available on Android and iOS devices, that will allow mobile d... Read more

Source: www.pcworld.com

Top found tags: mobile device(2),telecom sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybersecurity workforce shortage begins with educationLocation: New York, United States
Date published: 26-05-2014

Its no secret that the nation suffers from a critical shortage of skilled cybersecurity professionals. From the Defense Department to the Fortune 500, the demand for educated and experienced cybersecurity pros has never been greater.But the demand and the shortfall may be larger than anybody ever... Read more

Source: fedscoop.com

Top found tags: cyber security(4),education(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Germany ends Verizon contractLocation: Verizon HQ - New York, United States
Date published: 27-06-2014

By AAP and Chris Duckett June 26, 2014 -- 22:58 GMT (23:58 BST) The German government is cancelling a contract with Verizon over fears the company could be letting US intelligence agencies eavesdrop on official communications. The Interior Ministry says it will let its current contract for internet ... Read more

Source: www.zdnet.com

Top found tags: United Kingdom(4),United States(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dropbox Abused in Targeted Attacks Using PlugX RAT With "Time Bomb"Location: Trend Micro - Cupertino, United States
Date published: 27-06-2014

When analyzing a targeted attack against a government agency in Taiwan, security researchers from Trend Micro said they came across a variant of the PlugX remote access tool (RAT) that abuses the popular file hosting service Dropbox. According to the security firm, the RAT downloads its command and ... Read more

Source: securityweek.com

Top found tags: malware(2),Trend Micro(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pony Loader 2.0 Malware Source Code for SaleLocation: Damballa - Atlanta, United States
Date published: 27-06-2014

The source code for version 2.0 of the information-stealing Trojan called Pony Loader, also known as Fareit, has been put up for sale by malware authors, Damballa announced on Tuesday. Ever since the source code for Pony 1.9 was leaked online, malware developers have been improving the Trojan's capa... Read more

Source: securityweek.com

Top found tags: trojan(2),financial sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New concerns about cybersecurity workforce shortage in critical infrastructure sectorsLocation: New York, United States
Date published: 26-06-2014

Its no secret that the nation suffers from a critical shortage of skilled cybersecurity professionals. From the Defense Department to the Fortune 500, the demand for educated and experienced cybersecurity pros has never been greater.But the demand and the shortfall may be larger than anybody ever... Read more

Source: fedscoop.com

Top found tags: cyber security(4),education(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
United States, China finding it difficult to openly discuss cybercrimeLocation: Beijing, China
Date published: 27-06-2014

The United States and China are reportedly trying to increase discussions related to cybercrime, but leaders in Washington and Beijing are continuing to find it difficult. It seems the U.S. government charging five Chinese Army officers with cyberespionage led to the timeout, as both sides try to wo... Read more

Source: www.tweaktown.com

Top found tags: cybercrime(4),cyber security(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
This is what cybercrime looks likeLocation: New York, United States
Date published: 26-06-2014

That 123456 password simply doesn't cut it. Personal and business accounts are constantly under attack. That's what cyber security firms--and SmartPlanet--keeps saying, at least. And yet, folks continue to use the same bad, hackable passwords to protect their accounts.U.S. computer security company ... Read more

Source: www.smartplanet.com

Top found tags: cyber security(2),United States(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MONRE claims malware damage minimalLocation: Microsoft HQ - Redmond, United States
Date published: 27-06-2014

VietNamNet Bridge The Ministry of Natural Resources and the Environment (MONRE) has denied assertions that its database on the East Sea was stolen by hackers.Security experts two days ago discovered an intentional cyber attack against MONRE, warning that top confidential documents may have been ... Read more

Source: english.vietnamnet.vn

Top found tags: cyber security(2),security measures(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why security awareness mattersLocation: Brasilia-Federal District, Brazil
Date published: 27-06-2014

In this interview, Paulo Pagliusi, CEO at MPSafe Cybersecurity Awareness, talks about the value of security awareness and how it influences the overall security posture of an organization. Why does security awareness matter? It matters because cyber security threats have being pointed out as one of ... Read more

Source: net-security.org

Top found tags: cyber defense(2),government(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android SMS worm punts dodgy downloads... from your MATESLocation: Google HQ - Mountain View, United States
Date published: 27-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines Internet ne'er-do-wells have put together a strain of Android malware that spreads like a email worm rather than acting like a conventional trojan. Selfmite spreads by automatically sending a text message to contacts in the infected phone... Read more

Source: go.theregister.com ClearDDoS - New DDoS Protection Datacenter in San Jose Comes into Service | PRWEB.COM Newswire(PRWEB) June 27, 2014Major DDoS Protection company ClearDDoS today launches its new Protection Datacenter in San Jose. DDoS (Distributed Denial of Service) attacks on computers are becoming more widespread and today are running at the rate of 28 every hour.Motives for such attacks can vary, but are not always carried out with financial gain in mind; they may be from someone who has a grievance against a business, or might be from a competitor. While originally targeting major corporations such as banks and credit card companies, such attacks have increased in number so that now even relatively small businesses need to protect themselves.ClearDDoS\' new Datacenter is launched in response to increasing demand for its global traffic cleaning abilities. Staff at ClearDDoS have an average ten years experience in dealing with DDoS attacks and the new mitigation center in San Jose can protect a client\'s website or infrastructure against most types of attack, whether flood attacks or application attacks.Flood attacks include such things as TCP, UDP and ICMP attacks, together with DNS and SNMP amplification. Application attacks include smurf, spoofing, botnets and SSL exhaustion. ClearDDoS can deal with all such attacks and more.ClearDDoS systems incorporate powerful tools such as VPN tunnels, which rapidly clean the clients traffic of malicious threats before passing the clean traffic on to them.ClearDDoS offers different levels of protection. Their Chief Technical Officer says, \"We very much understand that different clients have varying requirements on the level of protection that they need for their server security, so we provide different levels of dedicated server defense in order to accommodate each individual client. Every client can get the protection he needs within his budget.\"The new Datacenter in San Jose is being opened in response to ever increasing demand for ClearDDoS services, and gives considerably enhanced capacity for protection against DDoS attacks. The ClearDDoS JSC Datacenter has a 30G firewall, but only sells protected server with 10Gbps DDoS Protection, very high quality network and unmetered traffic. Technical support is available 24/7/365.Client satisfaction is at the heart of ClearDDoS philosophy and has been for the fifteen years that it has been providing this type of security. Attention to detail and the flexibility to accommodate the varying demands of different clients are the reasons that ClearDDoS has become one of the leading businesses in the field.The company has its headquarters in Kowloon, Hong Kong, and has bases in Vancouver, Canada, and in Los Angeles, in addition to the new facility in San Jose. ClearDDoS guarantees 99.9% uptime capability and its services are fully scalable and customizable. Service provision is extremely fast: a new client can be fully protected within fifteen minutes. Hosting is available on a cloud server, or on a dedicated server according to the individual client\'s requirements. | http://www.digitaljournal.com/pr/2019548 | 27-06-2014 | www.digitaljournal.com

Top found tags: malware(3),cybercrime(5),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facelock: Familiar faces could replace password recognitionLocation: National Security Agency - Fort Meade, United States
Date published: 27-06-2014

- and it's hard to hack. In a paper published on PeerJ, British researchers Rob Jenkins, Jane L. McLachlan and Karen Renaud tested a knowledge-based authentication method that tests what you know, not what you remember. Based on our powerful recognition capabilities, the method tests whether we find... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ex-NSA chief under scrutiny over speculated secrets leakLocation: Alexander, United States
Date published: 27-06-2014

Former head of the NSA General Keith Alexander is under scrutiny following revelations that in negotiations with the financial industry, his security company has asked for consultancy fees ranging from $1 million to $600,000. Last year, former NSA contractor Edward Snowden leaked confidential docume... Read more

Source: www.zdnet.com

Top found tags: financial sector(6),United States(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA fallout prompted change in Singapore startup's cloud strategyLocation: National Security Agency - Fort Meade, United States
Date published: 27-06-2014

about widespread cyberspying activities. User concerns about data privacy ensued, prompting the Singapore startup to rethink and rebuild the way it deployed its services over the cloud, according to Unified Inbox CEO and Founder Toby Ruckert. US arrogance puts further doubt on cloud data sovereignty... Read more

Source: www.zdnet.com

Top found tags: telecom sector(2),United States(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
German Official: U.S. Spying Biggest Strain in Relations Since Iraq WarLocation: Berlin, Germany
Date published: 27-06-2014

spy-getty [gallery-il] Getty As U.S. and German officials meet this week to discuss privacy and security in the cyber realm, a German official is calling recent revelations of NSA spying on his country the biggest strain in bilateral relations with the U.S. since the controversy surrounding th... Read more

Source: wired.com

Top found tags: United States(4),government(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
In technology, new opportunity brings new riskLocation: Gartner - Stamford, United States
Date published: 26-06-2014

At this week's Security & Risk Management Summit, hosted by Gartner Inc in the United States, analysts presented their top technology picks for information security, especially within organisations. Neil MacDonald, vice president and Gartner Fellow, spoke of the need for companies to prepare for ... Read more

Source: www.scmagazineuk.com

Top found tags: information security(2),United States(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat USA 2014: Breaking Stuff Is FunLocation: Black Hat - Las Vegas, United States
Date published: 27-06-2014

Black Hat USA 2014: Breaking Stuff Is Fun Black Hat events cover the entire spectrum of information security topics, but it's hard to deny that our programming on good, old-fashioned vulnerabilities is among the most immediately exciting. It is, after all, fun to break things (and if they're importa... Read more

Source: www.darkreading.com

Top found tags: financial sector(4),cyber security(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Austrian court axes data retention law following EU high court rulingLocation: Brussels,Belgium
Date published: 27-06-2014

A court in Austria has ruled that the countrys data retention law is unconstitutional as it violates fundamental European privacy rights. The decision by the Constitutional Court of Austria comes in the wake of a recent ruling of the EUs top court that found EUlaws requiring communications p... Read more

Source: www.pcworld.com

Top found tags: cyber security(2),ISP(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
User security training program success relies on psychologyLocation: Gartner - Stamford, United States
Date published: 27-06-2014

ONOX HILL, Md. -- Add psychology to the long list of topics CISOs must know in order to secure their organizations. According to one Gartner Inc. analyst, unless security leaders know the right techniques to get inside users' heads, they'll never be able to eliminate bad security behaviors. Speaking... Read more

Source: searchsecurity.techtarget.com

Top found tags: training(1),cyber security(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PayPal 2FA Bypass Shows Difficulty of Getting Authentication RightLocation: PayPal HQ - San Jose, United States
Date published: 27-06-2014

Oftentimes, looking at a given security vulnerability or mistake by a vendor, its easy to wonder how on earth the bug got through in the first place or the company didnt catch the problem earlier. That definitely could have been the case with the recently disclosed bypass of PayPals two-fac... Read more

Source: threatpost.com

Top found tags: mobile device(2),telecom sector(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fake Android Apps Target South Korean Bank CustomersLocation: Seoul, South Korea
Date published: 27-06-2014

South Korean Bank Customers Targeted with Android Malware Security researchers at mobile software company Cheetah Mobile have identified a piece of Android malware that's designed to steal the personal and financial details of South Korean online banking customers. According to the company, the malw... Read more

Source: securityweek.com

Top found tags: South Korea(2),financial sector(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ENISA and Europol Join Forces in Fight Against CybercrimeLocation: Europol HQ - Den Haag, The Netherlands
Date published: 27-06-2014

Europol and the European Union Agency for Network and Information Security (ENISA), Europes cyber security agency, signed an agreement on Thursday to enhance cooperation in the fight against cybercrime. The goal of the agreement is to help European Union member states combat and prevent cybercrim... Read more

Source: securityweek.com

Top found tags: cybercrime(3),Europe(3),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lite Zeus - A New Zeus VariantLocation: New York, United States
Date published: 26-06-2014

Introduction The Zeus malware, a.k.a. Zbot, is a bot that is capable of stealing private and sensitive information including personal passwords and banking information from infected hosts. Its command-and-control (C&C) server can also control the action of its remote bots by sending various command ... Read more

Source: blog.fortinet.com

Top found tags: cybercrime(2),cyber security(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
3 Mobile Security Tips For SMBsLocation: New York, United States
Date published: 27-06-2014

3 Mobile Security Tips For SMBs Everyone in an organization has to work together to combat intrusions and data loss, but this is especially true for small businesses. Mobile technologies have introduced a completely new world of risks to organizations that use them. While many larger enterprises hav... Read more

Source: www.darkreading.com Car Wash Warns Of Data Breach | Splash Car Wash, a company that has locations in Connecticut, is warning customers of a data breach that compromised credit card information, according to a letter from the company.The company said the breach occured from the end of February until mid-May and has affected 1,400 costumers at six locations in Connecticut: Fairfield, Shelton, Bridgeport, West Haven and two in Greenwich.The company is suggesting customers check their credit cards for fraudulent charges and contact their credit card companies should they find anything. | http://www.courant.com/news/connecticut/hc-car-wash-brief-0627-20140626,0,912802.story | 26-06-2014 | www.courant.com

Top found tags: mobile device(2),cyber security(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Saudi Arabia: Malicious Spyware App IdentifiedLocation: Riyad, Saudi Arabia
Date published: 27-06-2014

(Washington, DC) Saudi Arabias government should clarify whether it is infecting and monitoring mobile phones with surveillance malware, Human Rights Watch said today. Saudi officials should also say whether and how they intend to protect the rights of those targeted to privacy and free expre... Read more

Source: www.hrw.org

Top found tags: Saudi Arabia(2),social media(4),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
One year after NSA revelations, DNI releases transparency reportLocation: National Security Agency - Fort Meade, United States
Date published: 27-06-2014

Just over one year since the revelations about the National Security Agency rocked the international community, the Director of National Intelligence is making moves to demonstrate more transparency about the department's activities. The DNI published a list of statistics on Friday covering orders i... Read more

Source: www.zdnet.com

Top found tags: NSA(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI Issued More Than 19k National Security Letters in 2013Location: Federal Bureau of Investigation - Washington D.C., United States
Date published: 27-06-2014

The United States federal government issued more than 19,000 National Security Lettersperhaps its most powerful tool for domestic intelligence collectionin 2013, and those NSLs contained more than 38,000 individual requests for information. The new data was released by the Office of the Direct... Read more

Source: threatpost.com

Top found tags: telecom sector(4),United States(6),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Podcast: Zach Lanier on PayPal Two-Factor Authentication BypassLocation: PayPal HQ - San Jose, United States
Date published: 27-06-2014

Security Conversations Podcast Zach Lanier, senior security researcher at Duo Security, talks to Ryan Naraine about a gaping hole in the way two-factor authentication is implemented in the PayPal mobile app (iOS and Android). Because of this bypass, an attacker with a PayPal users username and pa... Read more

Source: securityweek.com

Top found tags: research(1),RSS(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Enterprises Need More Than MDM to Address Mobile Security Risks: AnalysisLocation: AccessData - Lundon, United States
Date published: 27-06-2014

When it comes to bring-your-own-device (BYOD) and mobile security, organizations are often shortsighted, focusing only on protecting corporate data stored on mobile devices. This narrow view prevents information technology and security professionals from responding to incidents effectively. Enterpri... Read more

Source: securityweek.com

Top found tags: information security(2),mobile device(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Portcullis shuts down Sophos antivirus bugLocation: Sophos HQ - Oxfordshire, United Kingdom
Date published: 27-06-2014

UK-based security services firm Portcullis has discovered a flaw in Sophos Antivirus that could allow attackers to inject malicious code and disable the software. Portcullis shuts down Sophos antivirus bug Portcullis shuts down Sophos antivirus bug Portcullis penetration tester Pablo Catalina reveal... Read more

Source: www.scmagazineuk.com

Top found tags: cybercrime(3),vulnerability(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Identity theft suspect busted in undercover operationLocation: Lee, United States
Date published: 26-06-2014

VALDOSTA, GA -- Deputies with the Lowndes County Sheriff\'s Office and the United States Secret Service arrested a man Wednesday afternoon for identity theft after an undercover operation.38-year-old Jai Lee had been communicating with agents and agreed to sell the identification of victims accordin'... Read more

Source: www.mysouthwestga.com

Top found tags: EN(1),identity theft(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Jackson County man arrested on identity theft chargesLocation: Jackson, United States
Date published: 26-06-2014

A Jackson County man faces multiple fraud charges after racking up a bill on his dead grandmother's credit card, police say.Ryan Kevin Mull, 23, Crothersville, was arrested Wednesday and booked into the Jackson County Jail in Brownstown on 17 counts of identity theft, a Class D felony; 17 counts of ... Read more

Source: www.therepublic.com

Top found tags: credit card(2),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Study: 14 Percent of Debit Cards Exposed by Breaches in 2013Location: New York, United States
Date published: 27-06-2014

A new study estimates that 14 percent of all debit cards in the U.S. were exposed in data breaches in 2013, up from only five percent in 2012. The upsurge is chronicled in the 2014 Debit Issuer Study. The report is now in its ninth edition, and was commissioned by PULSE, a debit/ATM network serving ... Read more

Source: securityweek.com

Top found tags: data breach(2),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Just Made Unlocking Your Phone Easier. But is that Good or Bad?Location: McAfee - Santa Clara, United States
Date published: 27-06-2014

Its the last week in June and the sun is shining and the birds are chirping and the dogs are barking in the field. That is, of course, unless you live in San Francisco where the fog is rolling in like a cold, damp quilted blanket. In a concerted effort to dodge the seasonal gloom, the best and br... Read more

Source: blogs.mcafee.com

Top found tags: social media(4),cybercrime(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Learn More About McAfees Next Generation Firewall Secret WeaponLocation: McAfee - Santa Clara, United States
Date published: 27-06-2014

We live in a dynamically changing threat environment, and Advanced Evasion Techniques (AETs) expose a fundamental design flaw in network security devices, despite vendors promising 100% protection. Creating highly targeted and sophisticated cyber attacks is resource-intensive for cybercriminal... Read more

Source: blogs.mcafee.com

Top found tags: identity theft(2),social media(2),cybercrime(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
11 easy ways to avoid identity theft while travelingLocation: Experian HQ - Dublin,Ireland
Date published: 26-06-2014

The last thing you want to deal with while you're on vacation is a lost or stolen credit card, drivers license, or smart phone. Luckily there are precautions you can take to minimize your risk of theft, or, if it does happen, that it will lead to identity theft.Eighty-five percent of cases termed \"... Read more

Source: www.consumerreports.org

Top found tags: United States(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ProMedica data breach investigation findings to be released todayLocation: University of Pittsburgh Medical Center - Pittsburgh, United States
Date published: 27-06-2014

The results of a four-week criminal investigation into a data breach at ProMedica Bay Park Hospital in Oregon will be revealed today.Oregon Police and ProMedica Health System officials plan to hold a joint news conference at 10:30 a.m. today to announce if criminal charges will be filed against the ... Read more

Source: www.toledoblade.com

Top found tags: identity theft(2),medical sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Verizon loses German contract over spying fearsLocation: Verizon HQ - New York, United States
Date published: 27-06-2014

The German Government has cancelled a contract with US telecoms provider Verizon over fears it is obliged to hand over customer data to the US Government. Verizon loses German contract over spying fears Verizon loses German contract over spying fears The move demonstrates the reality behind the risk... Read more

Source: www.scmagazineuk.com

Top found tags: Germany(3),telecom sector(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Salina Family Healthcare Center email gaffe impacts about 10K patientsLocation: New York, United States
Date published: 27-06-2014

Nearly 10,000 patients of Kansas-based Salina Family Healthcare Center (SFHC) are being notified that their personal information was inadvertently left in a database submitted to the National Commission for Quality Assurance (NCQA). How many victims? 9,640, according to Identity Theft Resource Cente... Read more

Source: www.scmagazine.com

Top found tags: identity theft(2),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China Bistro Accused of Giant Data BreachLocation: Beijing, China
Date published: 27-06-2014

CHICAGO (CN) - Lax security at P.F. Chang's China Bistro allowed hackers to steal up to 7 million customers' credit and debit card numbers, and the restaurant waited nine months to tell customers about the security breach, a class action claims in Federal Court. Lead plaintiff John Lewert sued P.F... Read more

Source: www.courthousenews.com

Top found tags: financial sector(2),security measures(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Montana Latest Healthcare Data Breach Hits 1.3 MillionLocation: Montana, United States
Date published: 27-06-2014

The Montana health department has notified 1.3 million people that that their personal information may have been compromised after hackers broke into one of its servers.Information that may have been stolen in the hack, reported June 24, includes Social Security Numbers, bank account information, na... Read more

Source: www.cruxialcio.com

Top found tags: financial sector(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICYMI: 'Shoddy' PayPal, Google Glass & hacking BYODLocation: PayPal HQ - San Jose, United States
Date published: 27-06-2014

The latest In Case You Missed Column focuses on PayPal's two-factor authentication, the launch of Google Glass and new banking attacks. ICYMI: 'Shoddy' PayPal, Google Glass & hacking BYOD ICYMI: 'Shoddy' PayPal, Google Glass & hacking BYOD Shoddy' PayPal criticised for 2FA Ecommerce giant eBay di... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(2),cyber security(4),The Netherlands(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Malware detection erratic as 2014 brings new threats: eThreatz testingLocation: Oracle - Redwood City, United States
Date published: 26-06-2014

Malware authors continued to outpace malware-detecting companies in the first half of 2014, according to eThreatz Automated Malware testing that showed some malware scanning tools were missing up to 83 per cent of the threats with which they were presented.Nearly all of the eight popular security pl'... Read more

Source: www.cso.com.au

Top found tags: Kaspersky Lab(2),Trend Micro(2),antivirus(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police warn after ATM \'skimming\' device found in EvantonLocation: London, United Kingdom
Date published: 26-06-2014

POLICE are warning the public to be vigilant after a cash point skimming device was found being used in Evanton.Teams of organised criminals have in the past targeted ATM users by stealing their bank card details and PIN numbers with sophisticated card-skimming devices and cameras.Any suspicious dev'... Read more

Source: www.north-star-news.co.uk

Top found tags: report(1),skimming(1),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Social Media Helps Us GrieveLocation: Facebook - Menlo Park, United States
Date published: 26-06-2014

The loss of a beloved family member can be so hard. The pain and heartache feels relentless. In years gone past, families were often able to physically rally around each other and provide the support so needed. However in our crazy modern age where global citizenship, time poverty and a more f... Read more

Source: blogs.mcafee.com

Top found tags: report(1),website(1),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat organizers announce Dan Geer as keynoteLocation: Black Hat - Las Vegas, United States
Date published: 26-06-2014

On Thursday, Black Hat organizers announced that Dan Geer, the CISO at In-Q-Tel, would keynote the 2014 hacking conference in Las Vegas. Geer, lauded as one of the security industry's foremost pioneers, has contributed groundbreaking work on the economics of security and in the risk management... Read more

Source: www.scmagazine.com

Top found tags: conference(2),United States(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New initiative offers threat collaboration for oil, gas industryLocation: Sac, United States
Date published: 26-06-2014

A new initiative encouraging information sharing among the oil and gas industries has been launched Thursday in an effort to curb threats aimed at critical infrastructure sectors. The Oil and Natural Gas Information Sharing and Analysis Center (ONG-ISAC) will give its members the opportunity to exch... Read more

Source: www.scmagazine.com

Top found tags: vulnerability(1),Anonymous(2),information sharing(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
5 million Android users have malware problemsLocation: Google HQ - Mountain View, United States
Date published: 26-06-2014

Despite Android Chief Sundar Pichai hitting back at Apple's claims the platform is insecure, it has emerged 5 million Android users have malware issues. At Cupertino's WWDC event, Apple CEO Tim Cook criticized Android's security and described the platforms safety as a \"toxic hell stew\". Like us yo... Read more

Source: www.mobileburn.com

Top found tags: EN(1),Google(1),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is ex-NSA spyboss Gen Alexander selling state secrets for $1m a month, asks congressmanLocation: Alexander, United States
Date published: 26-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines Representative Alan Grayson (D-FL) has asked for a formal investigation into the activities of General Keith Alexander now that the former head of the NSA has started his own very expensive security consultancy. Last week it was reported tha... Read more

Source: go.theregister.com

Top found tags: Bruce Schneier(4),government(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bluebox Adds New Features to Mobile Security PlatformLocation: New York, United States
Date published: 27-06-2014

Mobile data security startup Bluebox Security unveiled the latest release of its flagship security platform this week, which now gives customers the ability to fortify mobile applications with self-defense capabilities, along with other new security features. In its Summer 2014 release, Bluebox adde... Read more

Source: securityweek.com

Top found tags: threat(1),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook tries to recover bulk user data seized by New York law enforcementLocation: Facebook - Menlo Park, United States
Date published: 27-06-2014

Facebook user data in bulk was sought last year by the New York County District Attorneys office and a court directed it to produce virtually all records and communications for 381 accounts, the company disclosed Thursday. The social networking giant is now asking the court for the return or dest... Read more

Source: www.pcworld.com

Top found tags: Supreme Court(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How old are today's networks?Location: New York, United States
Date published: 27-06-2014

The percentage of aging and obsolete devices in today s corporate networks around the globe is at its highest in six years, signaling that the global financial crisis of recent years may still have a lingering effect today, according to Dimension Data. More than 51% of all devices assessed are now a... Read more

Source: net-security.org

Top found tags: EN(1),report(1),trend(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Credit card fraud: Banks have to prove customer acted fraudulently, says RBILocation: New York, United States
Date published: 27-06-2014

MUMBAI: Customers will no longer have to spend hours convincing bankers that their credit or debit card was misused. A directive issued by an arm of the banking regulator puts the responsibility on banks to prove that the consumer has acted fraudulently. In the past, the onus on proving innocence wa... Read more

Source: economictimes.indiatimes.com

Top found tags: ISP(1),credit card(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Two-Step Authentication Exploit Targets PayPal AccountsLocation: PayPal HQ - San Jose, United States
Date published: 27-06-2014

Researchers at the two-factor authentication security provider Duo Labs have announced that they have discovered a bug in the iOS and Android versions of the PayPal app, which would enable anyone with knowledge of the new backdoor method full access to a persons account information and personal d... Read more

Source: vpncreative.net

Top found tags: research(1),backdoor(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Exploiting wildcards on LinuxLocation: New York, United States
Date published: 27-06-2014

DefenseCode released an advisory in which researcher Leon Juranic details security issues related to using wildcards in Unix commands. The topic has been talked about in the past on the Full Disclosure mailing list, where some people saw this more as a feature than as a bug. There are clearly a numb... Read more

Source: net-security.org

Top found tags: ISP(1),Linux(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Businesses hate Box and Dropbox: Careless senior staff most likely to create security problemsLocation: Dropbox - San Francisco, United States
Date published: 27-06-2014

theSulleymander. Businesses hate Box and Dropbox: Careless senior staff most likely to create security problems It's official. Businesses hate Box and Dropbox. A new survey carried out by Harris Interactive has revealed that the majority of enterprises believe that the cloud storage providers are ma... Read more

Source: itproportal.com

Top found tags: survey(1),threat(1),trend(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IT firms earn more from government contracts than any other industry: HP bags almost 2bnLocation: Hewlett-Packard - Palo Alto, United States
Date published: 26-06-2014

IT firms earn more from government contracts than any other industry: HP bags. almost 2bn A report on public spending has found IT companies earned more from government contracts in 2012 and 2013 than any other industry. Think tank the Institute for Government and startup business Spend Network lo... Read more

Source: itproportal.com

Top found tags: threat(1),financial sector(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Businesses officially hate Box and Dropbox: Senior staff most likely to create security problemsLocation: Dropbox - San Francisco, United States
Date published: 27-06-2014

theSulleymander. Businesses officially hate Box and Dropbox: Senior staff most likely to create security problems It's official. Businesses hate Box and Dropbox. A new survey carried out by Harris Interactive has revealed that the majority of enterprises believe that the cloud storage providers are ... Read more

Source: itproportal.com

Top found tags: survey(1),threat(1),trend(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government investment drives UK lead in the Internet of ThingsLocation: IBM HQ - Armonk, United States
Date published: 27-06-2014

'HyperCat offers a common approach to describing the information held on data hubs' A consortium of more than 40 UK-based technology companies funded by the UKs innovation agency, Technology Strategy Board, has delivered on the first phase of its initiative to accelerate the widespread move to th... Read more

Source: www.information-age.com

Top found tags: MBR(1),education(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google begins complying with European takedown requestsLocation: Google HQ - Mountain View, United States
Date published: 27-06-2014

Google has begun removing search results in response to takedown requests from European citizens. In May, the European Court of Justice (ECJ) upheld the right to be forgotten by ordering Google to remove search links to a 15-year-old newspaper article about a Spanish mans bankruptcy. The court ru... Read more

Source: www.computerweekly.com

Top found tags: financial sector(2),Microsoft(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Protestors Launch A 135-Foot Blimp Over the NSAs Utah Data CenterLocation: National Security Agency - Fort Meade, United States
Date published: 27-06-2014

The view some Utahns were perplexed by on this morning's commute. The view some Utahns were perplexed by on this mornings commute. Plenty of nightmare surveillance theories surround the million-square-foot NSA facility opened last year in Bluffdale, Utah. Any locals driving by the massive complex... Read more

Source: wired.com

Top found tags: social media(2),government(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Begins 'Unprecedented' Auction of Silk Road BitcoinsLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 27-06-2014

WASHINGTON - The bitcoin world kicked into high gear Friday as the US government began auctioning some of the virtual currency seized in an FBI investigation of dark Web bazaar Silk Road. The US Marshals Service auction was taking place until 2200 GMT for 29,000 bitcoins -- about $17 million at curr... Read more

Source: securityweek.com

Top found tags: telecom sector(2),government(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
End of government support could spell doom for electric vehiclesLocation: Green, United States
Date published: 27-06-2014

End of government support could spell doom for electric vehicles. The end of UK government subsidies may mean that running an electric car is more expensive than running a petrol one. Support from the Department for Transport, which covered installation and maintenance of chargers, ended in April, m... Read more

Source: itproportal.com

Top found tags: ISP(1),government(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Three quarters of UK workforce takes security risks when on the beachLocation: Cisco HQ - San Jose, United States
Date published: 26-06-2014

Three quarters of UK workforce takes security risks when on the beach. Scores of UK workers are taking significant security risks whilst on holiday by connecting to the Internet using work devices on Wi-Fi networks that are often unsecured. Beach to Breach research carried out by Ciscos Sou... Read more

Source: itproportal.com

Top found tags: research(1),survey(1),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SolarWorld calls for WTO action over hackingLocation: Beijing, China
Date published: 27-06-2014

Pro-tariff solar manufacturer SolarWorld says China should be the subject of a case at the WTO for violating international trade secret agreements. The U.S. subsidiary of the German manufacturer was allegedly hacked by members of the Chinese military in 2012.The U.S. subsidiary of German solar manuf... Read more

Source: www.pv-magazine.com

Top found tags: website(1),China(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft to suspend certain email security notificationsLocation: Microsoft HQ - Redmond, United States
Date published: 27-06-2014

The announcement, received (ironically) on the Microsoft Security Notifications email list, attributes the decision to "...changing governmental policies concerning the issuance of automated electronic messaging..." Microsoft recommends that IT professionals sign up for notifications using one of th... Read more

Source: www.zdnet.com

Top found tags: update (1),government(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
20-Year Old Vulnerability Patched in LZO Compression AlgorithmLocation: Bailey, United States
Date published: 27-06-2014

A 20-year old vulnerability in the Lempel-Ziv-Oberhumer (LZO) compression algorithm used in some Android phones, the Linux kernel, and even Mars Rovers was finally patched this week. Code stemming from the algorithms library function has existed in the wild for two decades, but was recycl... Read more

Source: threatpost.com

Top found tags: research(1),vulnerability(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Human Rights Watch Says Saudi Govt Targeting Dissidents with MalwareLocation: Riyad, Saudi Arabia
Date published: 27-06-2014

DUBAI - Human Rights Watch on Friday demanded a clarification from Saudi Arabia over allegations from security researchers that the kingdom is infecting and monitoring dissidents' mobile phones with surveillance malware. The New York-based rights watchdog said surveillance software allegedly made by... Read more

Source: securityweek.com

Top found tags: government(3),United Arab Emirates(3),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Zijn Macs altijd virusvrij?Location: Microsoft HQ - Redmond, United States
Date published: 25-06-2014

Samenvatting:Als je een Macgebruiker bent, heb je vast al wel eens horen zeggen dat Macs virusvrij zijn - en dat je dus ook niet hoeft te investeren in antivirussoftware. Maar is dat ook zo?Het antwoord op die vraag is niet zo eenduidig. Macs hebben inderdaad een sterke reputatie als het aankomt op '... Read more

Source: www.zdnet.be

Top found tags: health sector(2),medical sector(2),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trojan steelt half miljoen van bank, binnen een weekLocation: Kaspersky HQ - Moscow, Russia
Date published: 25-06-2014

Samenvatting:Beveiligingsexpert Kaspersky heeft een gerichte aanval tegen een Europese bank aan het licht gebracht, waarbij in een week tijd 500.000 euro werd gestolen.Beveiligingsexpert Kaspersky heeft een gerichte cyberaanval aan het licht gebracht tegen klanten van een grote Europese bank. De dad'... Read more

Source: www.zdnet.be

Top found tags: trojan(2),cybercrime(6),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Telefonische phishing kost Britse banken 26 miljoen euroLocation: London,United Kingdom
Date published: 27-06-2014

Grote Britse banken hebben in de eerste vijf maanden van dit jaar 26 miljoen euro schade geleden door telefonische phishingaanvallen op bankklanten. In totaal zou het om meer dan 2.000 slachtoffers gaan die gemiddeld 13.000 euro per persoon verloren. De klanten worden thuis opgebeld door criminelen ... Read more

Source: www.security.nl

Top found tags: government(2),social engineering(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Inbreuken door virussen en malware in de lift, IT moet eindgebruiker meer betrekken bij oplossingLocation: Kaspersky HQ - Moscow, Russia
Date published: 26-06-2014

Met het gemak waarmee malware gekocht en verspreid kan worden is het niet te verbazen dat het aantal organisaties dat te maken heeft gehad met externe inbreuken op hun systemen wereldwijd groeit. Er is een trend zichtbaar naar gerichte inzet van virussen en malware, waardoor criminelen specifieke be... Read more

Source: www.it-executive.nl

Top found tags: United States(2),Kaspersky Lab(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RSA ONTDEKT PANDEMMIYA TROJANLocation: RSA HQ - Bedford, United States
Date published: 27-06-2014

RSA, de security-divisie van EMC, brengt maandelijks een Fraud Report uit met bevindingen uit cyberspace van de maand daarvoor. De meest opmerkelijke bevindingen van de afgelopen maand:RSA heeft een nieuwe Trojan geanalyseerd die in de cyber-onderwereld bekend staat als 'Pandemiya''. Dit is een zeer... Read more

Source: www.dutchitchannel.nl

Top found tags: telecom sector(2),trojan(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Duitse overheid verbreekt contract Verizon wegens NSALocation: Berlin, Germany
Date published: 27-06-2014

De Duitse overheid heeft een contract met de Amerikaanse telecomaanbieder Verizon opgezegd wegens spionage door de NSA, zo heeft het Duitse Ministerie van Binnenlandse Zaken laten weten. Uit documenten van Edward Snowden zou blijken dat de NSA ook actief is in Duitsland. Zo werd bekend dat onder and... Read more

Source: www.security.nl

Top found tags: Ministry of the Interior and Kingdom Relations(7),telecom sector(8),government(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoeker ontdekt 20-jaar oude bug in Mars RoverLocation: Bailey, United States
Date published: 27-06-2014

Een onderzoeker heeft in een populair compressiealgoritme een 20-jaar oude bug ontdekt, die ook in de Mars Curiosity Rover aanwezig blijkt te zijn. Via de bug is het in de meeste gevallen mogelijk om een Denial of Service te veroorzaken, hoewel in sommige gevallen ook het uitvoeren van code mogelijk... Read more

Source: www.security.nl

Top found tags: research(1),update (1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Polite waarschuwt om ID-kaart niet op internet te zettenLocation: Den Haag, The Netherlands
Date published: 27-06-2014

De politie waarschuwt om geen foto's van je rijbewijs of identiteitskaart op internet te plaatsen. Met dit soort foto s kunnen anderen makkelijk aan de haal gaan, waardoor je in problemen kan komen. De politie ziet de laatste tijd steeds vaker dat mensen hun rijbewijs of identiteitskaart op internet... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),police(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SOGETI PUBLICEERT HET BOEK STAYING AHEAD IN THE CYBER SECURITY GAMELocation: Amsterdam, The Netherlands
Date published: 27-06-2014

In samenwerking met IBM lanceert Sogeti het boek met de titel Staying Ahead in the Cyber Security Game. In dit boek worden hedendaagse uitdagingen op het gebied van cybersecurity beschreven. Het boek geeft een concreet advies aan organisaties en burgers over hoe zij de risicos op cybercrime... Read more

Source: www.dutchitchannel.nl

Top found tags: cybercrime(2),cyber security(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spammer kaapt Twitteraccount ING BelgiLocation: Twitter - San Francisco, United States
Date published: 27-06-2014

Een spammer is erin geslaagd om het Twitteraccount van ING Belgi tijdelijk te kapen. Via het account werden vervolgens spamberichten met advertenties voor dieetproducten naar de bijna 1.000 volgers gestuurd. Na te zijn ingelicht werden de berichten door de bank verwijderd. "Hadden blijkbaar proble... Read more

Source: www.security.nl

Top found tags: Twitter(1),social media(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaan dankzij gezichtsherkenning na 41 jaar gepaktLocation: Iowa, United States
Date published: 27-06-2014

Een Amerikaan die al 41-jaar voortvluchtig was is dankzij het gebruik van gezichtsherkenningssoftware aangehouden. Het gaat om de 69-jarige Ronald Dwaine Carnes, die wegens een gewapende overval een celstraf van 20 jaar moest uitzitten, maar in 1973 uit de gevangenis wist te ontsnappen. Carnes leefd... Read more

Source: www.security.nl

Top found tags: NL(1),research(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China staakt cybersamenwerking met VS na beschuldigingLocation: New York, United States
Date published: 27-06-2014

China heeft onderhandelingen met de Verenigde Staten over cybersecurity gestaakt nadat vijf Chinese militairen door de VS van cyberspionage werden beschuldigd. Volgens de aanklacht zouden de militairen bij verschillende Amerikaanse bedrijven hebben ingebroken om handelsgeheimen te stelen. Na de aank... Read more

Source: www.security.nl

Top found tags: cybercrime(3),cyber security(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whizzkid hackt zichzelf Blendle binnenLocation: Amsterdam, The Netherlands
Date published: 27-06-2014

Softwareontwikkelaar en parttime hacker Koen Rouwhorst gaat aan de slag bij Blendle. Hij vond gaten in de dienst die niemand anders vond. De 25-jarige computerwetenschapper studeert momenteel af aan de Universiteit van Twente. Maar in zijn vrije tijd hackt Koen Rouwhorst als sinds zijn veertiende me... Read more

Source: webwereld.nl

Top found tags: RSS(1),online banking(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Botnet gebruikt Dropbox voor configureren besmette computerLocation: Dropbox - San Francisco, United States
Date published: 27-06-2014

Onderzoekers hebben voor het eerst bij een gerichte aanval malware ontdekt die Dropbox gebruikt voor het downloaden van configuratiegegevens. De malware werd tegen een Taiwanese overheidsorganisatie ingezet. Eenmaal actief op een computer downloadde het een bestand via Dropbox. Het bestand bevatte d... Read more

Source: www.security.nl

Top found tags: government(2),Trend Micro(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Voormalige NSA-baas vraagt 1 miljoen per maand voor adviesLocation: Alexander, United States
Date published: 27-06-2014

Voormalig hoofd van de Amerikaanse inlichtingendienst NSA, Keith Alexander, probeert de diensten van zijn recent opgerichte bedrijf voor een bedrag van 1 miljoen dollar per maand aan banken aan te bieden, wat inmiddels tot vragen van een Amerikaans congreslid heeft geleid. Alexander vertrok in maart... Read more

Source: www.security.nl

Top found tags: cyber security(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackersblad 2600 Magazine verkeert in moeilijkhedenLocation: New York, United States
Date published: 27-06-2014

Het hackersblad 2600 Magazine verkeert naar eigen zeggen in zwaar weer door toedoen van de uitgever. Het voormalige Source Interlink zou de opbrengsten van verkochte tijdschriften niet willen uitbetalen aan 2600 Magazine. Dat zeggen de makers van het hackersblad op hun website. 2600 Magazine zou nog... Read more

Source: tweakers.net

Top found tags: ISP(1),NL(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Datingsite ontloopt boete wegens onversleutelde wachtwoordenLocation: Cupid Media - Southport, Australia
Date published: 27-06-2014

Een bedrijf dat allerlei datingsites aanbiedt hoeft geen boete te betalen omdat vorig jaar een database met 42 miljoen onversleutelde wachtwoorden en andere persoonlijke gegevens van gebruikers werd gestolen. De Australische Information Commission had een onderzoek naar het incident ingesteld. De ge... Read more

Source: www.security.nl

Top found tags: patch(2),update(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Zuid-Koreaanse overheid gaat van Windows naar opensource overstappenLocation: Microsoft HQ - Redmond, United States
Date published: 27-06-2014

De overheid van Zuid-Korea stapt af van Windows zodra de ondersteuning voor Windows 7 in 2020 stopt, zo heeft de regering van het land bekendgemaakt. De overheid zal de overstap naar opensourcesoftware maken. Volgend jaar start een pilotproject voor de ontwikkeling van een opensource-OS, dat uigevoe... Read more

Source: tweakers.net

Top found tags: Windows(1),government(2),South Korea(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ergernis over NSA kost Verizon Duits overheidscontractLocation: Verizon HQ - New York, United States
Date published: 27-06-2014

De Amerikaanse IT-industrie maakte zich al zorgen over de gevolgen van het bekend worden van de afluisterpraktijken van de NSA. Nu is er ook een prominent slachtoffer: Verizon. De Duitse regering heeft namelijk besloten om het contract met Verizon voor het verzorgen van delen van haar communicatie-i... Read more

Source: www.automatiseringgids.nl

Top found tags: United States(6),Ministry of the Interior and Kingdom Relations(7),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Geheime defensiedocumenten uit auto gestolenLocation: Amsterdam, The Netherlands
Date published: 27-06-2014

Geheime documenten van defensie zijn vorig jaar uit de auto van een medewerker gestolen, zo laat De Telegraaf vandaag weten. De diefstal, waarvoor de medewerker van tevoren al gewaarschuwd zou zijn, vond vorig jaar december plaats, maar Defensie heeft de kwestie al die tijd verzwegen. De gevoelige d... Read more

Source: www.security.nl

Top found tags: NL(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kritiek lek in Android 4.3 en ouder onthuldLocation: Google HQ - Mountain View, United States
Date published: 27-06-2014

Onderzoekers van IBM hebben een ernstig beveiligingslek in Android 4.3 en ouder onthuld, waardoor een aanvaller zijn eigen code op het toestel kan uitvoeren. Het probleem werd vorig jaar september aan Google gerapporteerd en in november in versie 4.4 (KitKat) van het mobiele besturingssysteem gepatc... Read more

Source: www.security.nl

Top found tags: report(1),research(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Duitsland dumpt Verizon vanwege NSA-relatieLocation: Verizon HQ - New York, United States
Date published: 27-06-2014

Berlijn schrapt een contract met Verizon, die het netwerk tussen Duitse ministeries beheert. Het concern is te close met de NSA. Duitsland maakt een vuist tegen de wijdverbreide digitale spionage van de Amerikanen. De federale overheid zet per direct Verizon Communications als netwerkprovider aan de... Read more

Source: webwereld.nl

Top found tags: Germany(5),government(7),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Zuid-Koreaanse overheid zal van Windows naar opensource overstappenLocation: Microsoft HQ - Redmond, United States
Date published: 27-06-2014

De overheid van Zuid-Korea stapt af van Windows zodra de ondersteuning voor Windows 7 in 2020 stopt, zo heeft de regering van het land bekendgemaakt. De overheid zal de overstap naar opensourcesoftware maken. Volgend jaar start een pilotproject voor de ontwikkeling van een opensource-OS, dat uitgevo... Read more

Source: tweakers.net

Top found tags: Windows(1),government(2),South Korea(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaanse rechtbank geeft verdachte decryptiebevelLocation: Den Haag, The Netherlands
Date published: 27-06-2014

Een Amerikaans hooggerechtshof heeft bepaald dat een verdachte zijn versleutelde computers moet ontsleuten zodat de politie die kan onderzoeken. Daarmee is de uitspraak van een lagere rechtbank verworpen, die oordeelde dat Leon Gelfgatt niet gedwongen kan worden om zijn pc's te ontsleutelen. Dit zou... Read more

Source: www.security.nl

Top found tags: financial sector(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Student die Blendle hackte krijgt baan als beloningLocation: Amsterdam, The Netherlands
Date published: 27-06-2014

Een student computerwetenschappen aan de Universiteit Twente die voor de tweede keer het artikelenplatform Blendle wist te hacken is met een baan beloond. De eerste keer ontving de 25-jarige Koen Rouwhorst voor zijn melding een taart, zo meldt Blendle-oprichter Marten Blankesteijn via Twitter. Via B... Read more

Source: www.security.nl

Top found tags: social media(2),vulnerability(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Teeven moet bewaarplicht terugdraaien"Location: Brussel, Belgium
Date published: 27-06-2014

Nu ook een Oostenrijkse rechter de bewaarplicht ongrondwettig heeft verklaard moet staatssecretaris Teeven doen wat andere Europese landen ook doen: direct stoppen met de handhaving en de bewaarplicht terugdraaien. Daarvoor pleit burgerrechtenbeweging Bits of Freedom. De reactie volgt op een uitspra... Read more

Source: www.security.nl

Top found tags: legislation(1),NL(1),Germany(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
OM eist 15 jaar tegen ambtenaar wegens spionageLocation: Berlin, Germany
Date published: 27-06-2014

Het Openbaar Ministerie heeft in hoger beroep 15 jaar cel geist tegen een 62-jarige man uit Den Haag wegens spionage. Volgens het OM leverde de man staatsgeheimen aan een echtpaar dat vanuit Duitsland voor de Russische staat spioneerde. De verdachte was werkzaam als medewerker visumzaken bij het M... Read more

Source: www.security.nl

Top found tags: Openbaar Ministerie(2),The Netherlands(4),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers gebruiken gezicht in plaats van woord als wachtwoordLocation: Amsterdam, The Netherlands
Date published: 27-06-2014

Britse onderzoekers hebben een systeem bedacht waarbij mensen voor het beveiligen van accounts niet een wachtwoord, maar een specifiek gezicht moeten onthouden. Onderzoekers Rob Jenkins, Jane L. McLachlan en Karen Renaud weten dat gezichten zeker op de langere termijn makkelijker te onthouden zijn d... Read more

Source: www.nutech.nl

Top found tags: NL(1),research(1),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA geeft inzicht in activiteiten met transparantierapportLocation: National Security Agency - Fort Meade, United States
Date published: 27-06-2014

De NSA heeft zijn eerste transparantierapport vrijgegeven waarmee het inzicht wil geven in zijn activiteiten. Uit de cijfers blijkt dat de inlichtingendienst in 2013 bijna 2000 verzoeken heeft ingediend bij de geheime rechtbank FISA. Verder heeft de NSA tienduizenden 'targets'. Het transparantierapp... Read more

Source: tweakers.net

Top found tags: financial sector(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid verholpen in de Linux KernelLocation: Ubuntu - London, United Kingdom
Date published: 27-06-2014

Samenvatting: Er is een update uitgebracht voor de Linux Kernel die de kwetsbaarheid verhelpt. Gevolgen: Een lokale kwaadwillende gebruiker kan mogelijk toegang krijgen tot gevoeldige informatie of een Denial-of-Service veroorzaken. Beschrijving: Door een kwetsbaarheid in de linux futex subsystem is... Read more

Source: www.ncsc.nl

Top found tags: update (1),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-009: Kwetsbaarheden in Microsoft .NET framework verholpenLocation: Microsoft HQ - Redmond, United States
Date published: 27-06-2014

Samenvatting: Microsoft heeft updates uitgebracht om kwetsbaarheden in Microsoft .NET Framework te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden misbruiken om mogelijk verhoogde gebruikersrechten te verkrijgen, het uitvoeren van willekeurige code of het veroorzaken van een Denial-of-S... Read more

Source: www.ncsc.nl

Top found tags: Microsoft(1),NL(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in SambaLocation: Ubuntu - London, United Kingdom
Date published: 27-06-2014

Samenvatting: Er is een update uitgebracht voor Samba die de kwetsbaarheid verhelpt. Gevolgen: Een kwaadwillende kan toegang krijgen tot gevoelige informatie en kan mogelijk een Denial-of-Service veroorzaken van de Netbios name service daemon en van de smbd file server daemon. Beschrijving: Door een... Read more

Source: www.ncsc.nl

Top found tags: update (1),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Red Hat verhelpt meerdere kwetsbaarheden in kernelLocation: National Cyber Security Centre - Den Haag, The Netherlands
Date published: 27-06-2014

Samenvatting: Red Hat heeft een update uitgebracht voor Red Hat 7 om meerdere kwetsbaarheden in de kernel te verhelpen. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende een Denial-of-Service veroorzaken, verhoogde gebruikersrechten verkrijgen of toegang tot gevoelige gegevens v... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Android ontdektLocation: Google HQ - Mountain View, United States
Date published: 27-06-2014

Samenvatting: Er is een kwetsbaarheid ontdekt in de keystore van Google Android. Door dit te misbruiken kan een kwaadwillende code uitvoeren onder systeemrechten. Gevolgen: Door deze kwetsbaarheid te misbruiken kan een kwaadwillende code uitvoeren onder systeemrechten en hiermee toegang verkrijgen t... Read more

Source: www.ncsc.nl

Top found tags: NL(1),vulnerability(1),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish