Under construction

New design coming soon!

CIC News engine statistics

CIC News for 30-06-2014 contains 66 articles: cybercrime(26),cyber security(14),data breach(3),other(23)

CIC News update contains 36 English and 30 Dutch articles for today.
There are 8 published advisories, 0 are English and 8 are Dutch.
In today's English news articles:
- 16 related to cybercrime
- 8 related to cyber security
- 3 related to data breach and identity theft
- 9 for the category other news

In today's Dutch news articles:
- 10 related to cybercrime
- 6 related to cyber security
- 14 for the category other news

Have fun reading.

English cybercrime related news

Microsoft to shutter security email feed on July 1Location: Microsoft HQ - Redmond, United States
Date published: 29-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines Microsoft will suspend a 12 year-old email mailing list that offers news of security updates, in a decision possibly tied to tougher Canadian anti-spam laws. As of July 1st 2014, sysadmins and infosec bods will get their news from a Redmond ... Read more

Source: go.theregister.com

Top found tags: patch(2),update(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
State of the Internet: Trends impacting online businessLocation: Seoul, South Korea
Date published: 30-06-2014

Akamai Technologies provides insight into key global statistics such as connection speeds, overall attack traffic, network connectivity/availability issues, and traffic patterns across leading Web properties and digital media providers. The report also includes insight into NTP reflection and WordPr... Read more

Source: net-security.org

Top found tags: Hong Kong(2),South Korea(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers targeting e-commerce sites for ransom: ReportLocation: New Delhi, India
Date published: 30-06-2014

BANGALORE: India's fledgling e-commerce industry has become the target of large scale Internet attacks, which are constantly trying to bring down these websites. According to a recent report by Akamai, e-commerce industry in India has become the second largest target for distributed denial of servic... Read more

Source: economictimes.indiatimes.com

Top found tags: Akamai(2),DoS(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gathering and using threat intelligenceLocation: Check Point - Tel Aviv, Israel
Date published: 30-06-2014

In this interview, Tomer Teller, Security Innovation Manager at Check Point, talks about the role of threat intelligence in the modern security architecture, discusses how it can help identify sophisticated malware attacks, and illustrates the essential building blocks of a robust threat intelligenc... Read more

Source: net-security.org

Top found tags: threat(1),Hong Kong(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Banking malware sniffs out data sent over HTTPSLocation: Berlin, Germany
Date published: 30-06-2014

Careful online banking users can sometimes spot that something is amiss when malware installed on their computer pops up phishing pages or adds fields to legitimate banking forms. But the Emotet banking malware doesn't bother with that, and sniffs out data sent over secured connections instead. Acco... Read more

Source: net-security.org

Top found tags: cybercrime(2),financial sector(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Emotet" Banking Malware Steals Data Via Network SniffingLocation: Trend Micro - Cupertino, United States
Date published: 30-06-2014

A new banking malware spotted by Trend Micro intercepts and logs outgoing traffic in an effort to harvest sensitive information from victims. Dubbed Emotet by the security company, the Trojan doesn't use phishing or form field insertion like other financial malware. Instead, it relies on netwo... Read more

Source: securityweek.com

Top found tags: Trend Micro(2),trojan(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android Users Targeted With New SMS WormLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

A new SMS worm dubbed "Selfmite" has been infecting Android devices in a pay-per-install scheme that abuses advertising services, AdaptiveMobile announced last week. According to the mobile security company, Selfmite is designed to spread via SMS messages that lure recipients to an application calle... Read more

Source: securityweek.com

Top found tags: malware(2),cybercrime(3),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
London teen charged over Spamhaus mega-DDoS attacksLocation: Londen, United Kingdom
Date published: 30-06-2014

An unnamed London teenager has been charged with a series of criminal offences following a series of denial-of-service attacks against internet exchanges and the Spamhaus anti-spam service last year. The 17-year-old male from London was charged on Friday and faces computer misuse, fraud and money-la... Read more

Source: go.theregister.com

Top found tags: government(2),DoS(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco uncovers targeted spearphishing threatLocation: Cisco HQ - San Jose, United States
Date published: 30-06-2014

discovered a spearphishing and exploit attempt that targeted the Visual Basic Scripting for Applications feature in Microsoft Word. Investigation into the malware allowed Cisco to identify a group of attacks by the same threat actor, with Cisco ultimately exposing the threat actor's network. Accordi... Read more

Source: www.zdnet.com

Top found tags: threat(1),backdoor(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco uncovers targeted spearphishing threatLocation: Cisco HQ - San Jose, United States
Date published: 30-06-2014

discovered a spearphishing and exploit attempt that targeted the Visual Basic Scripting for Applications feature in Microsoft Word. Investigation into the malware allowed Cisco to identify a group of attacks by the same threat actor, with Cisco ultimately exposing the threat actor's network. Accordi... Read more

Source: www.zdnet.com

Top found tags: threat(1),backdoor(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nearly half of companies hit with DDoS attacks in the last yearLocation: New York, United States
Date published: 30-06-2014

According to a BT survey, four out of ten organisations (41 percent) globally suffered a DDoS attack over the past year, with more than three quarters of those (78 percent) targeted twice or more. A DDoS attack attempts to overload a company system such as a web server by sending so many com... Read more

Source: www.zdnet.com

Top found tags: financial sector(2),United Kingdom(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NATO updates cyber defence policy as digital attacks become a standard part of conflictLocation: NATO - Brussel, Belgium
Date published: 30-06-2014

can be treated as the equivalent of an attack with conventional weapons. The organisation's new cyber defence policy clarifies that a digital attack on a member state is covered by Article 5, the collective defence clause. That states that an attack against one member of NATO "shall be considered an... Read more

Source: www.zdnet.com

Top found tags: update(2),cyber warfare(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft to End Email Security NotificationsLocation: Microsoft HQ - Redmond, United States
Date published: 30-06-2014

Microsoft has notified customers that it will no longer be sending email notifications regarding upcoming security bulletins, or updates to current advisories. The move has baffled many in the security community, who have come to expect the monthly emails, which provide information on what applicati... Read more

Source: threatpost.com

Top found tags: website(1),social media(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Sydney Opal card travel history can be accessed by policeLocation: Person, United States
Date published: 30-06-2014

criminal investigations, the New South Wales Department of Transport has confirmed. The Opal smart card ticketing system began rolling out on Sydney transport last year, with the service expected to be available across all trains, ferries and buses later this year. Last week, NSW Transport Minister ... Read more

Source: www.zdnet.com

Top found tags: legislation(2),telecom sector(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Week in review: Lawful interception mobile malware, top infosec tech in 2014, and the new issue of (IN)SECURE MagazineLocation: Microsoft HQ - Redmond, United States
Date published: 30-06-2014

Here's an overview of some of last week's most interesting news, articles and interviews: (IN)SECURE Magazine issue 42 released (IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Skills development for information security professio... Read more

Source: net-security.org

Top found tags: cyber security(8),0-day(1),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australian companies hit by increasing number of cyber attacksLocation: Arbor Networks - Burlington, United States
Date published: 30-06-2014

Cyber criminals are wreaking havoc with the IT systems of Australian enterprises, with six in 10 companies admitting they have suffered multiple system crashes lasting up to six hours, as the result of distributed denial-of-service attacks in the past year.DDoS attacks use networks of compromised co... Read more

Source: www.smh.com.au

Top found tags: financial sector(2),New Zealand(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fiona Stanley Hospital IT Project to miss deadline: AuditLocation: Stanley, United States
Date published: 30-06-2014

this year, according to a report released by the Western Australian Auditor General, Colin Murphy. The Information Systems Audit report (PDF) indicated the IAM project which was intended to provide authorised users with access anywhere, anytime to the IT systems, and authorised admittance to hos... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),government(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Surveillance-proof Blackphone begins shippingLocation: National Security Agency - Fort Meade, United States
Date published: 30-06-2014

Blackphone, a consumer-grade smartphone designed to keep conversations private, has now begun shipping to customers. Revealed at the start of the year, Blackphone emerged from a joint venture between Silent Circle and Geeksphone, SGP Technologies. After confidential documents released by former US N... Read more

Source: www.zdnet.com

Top found tags: United States(4),government(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
5 essential mobile security tipsLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

It doesn't matter if you're using iOS, Android, Windows Phone or BlackBerry, these tips apply to every mobile device that connects to the Internet. "How susceptible a device is to malware depends on its operating system and how users interact with their device. There are far less threats targeting i... Read more

Source: net-security.org

Top found tags: malware(2),mobile device(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Application delivery controllers tighten the security perimeterLocation: Juniper Networks - Sunnyvale, United States
Date published: 30-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines The application and data landscape today is in something of a state of flux. Of course, information technology is always in a state of flux but this is a new kind of dynamism. The current network IT stack is a heady concoction of old apps on... Read more

Source: go.theregister.com

Top found tags: mobile device(2),update(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brute force RDP attacks depend on your mistakesLocation: Kaspersky HQ - Moscow, Russia
Date published: 30-06-2014

RDP stands for Remote Desktop Protocol and is the protocol for Windows Remote Desktop and Terminal Server. It is sometimes used for remote user access to servers, but very commonly used for remote administrator access. RDP "remotes" the Windows UI, allowing a remote user with an RDP client to log in... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),Kaspersky Lab(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Do the Privacy Commissioner's teeth have any bite?Location: New York, United States
Date published: 30-06-2014

reading. Privacy Commissioner Timothy Pilgrim has of course judged Cupid's information security practices under the provisions of the Privacy Act in force at the time and found them wanting but it indicates how he might judge organisations under the new laws that came into force on 12 March ... Read more

Source: www.zdnet.com

Top found tags: information security(2),financial sector(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dropbox used as command and control for Taiwan time bombLocation: Dropbox - San Francisco, United States
Date published: 30-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines A remote access trojan (RAT) is using Dropbox for command and control in a targeted attack against the Taiwanese Government, malware analyst Maersk Menrige says. The upgraded PlugX RAT is the first targeted attack to use Dropbox to update co... Read more

Source: go.theregister.com

Top found tags: update(2),malware(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICS Malware Found on Vendors Update InstallersLocation: ICS-CERT - Alexandria, United States
Date published: 30-06-2014

Malware targeting industrial control systems has infected the update installers belonging to three known industrial control vendors, according to an advisory from the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). The Havex remote access Trojan (RAT) is targeting vendors via ph... Read more

Source: threatpost.com

Top found tags: malware(4),critical infrastructure(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Cocoon Data signs deal for $57m reverse takeoverLocation: Mineral, United States
Date published: 30-06-2014

entering a AU$57 million binding agreement to merge with mining company, Prime Minerals. Prime Minerals told its shareholders in a statement (PDF) late last week that it had entered into the bid implementation agreement (BIA) for the merger, which will effectively see Cocoon Data Holdings list its C... Read more

Source: www.zdnet.com

Top found tags: Australia(2),backdoor(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Japanese government plans to remove SIM locks for phonesLocation: Tokio, Japan
Date published: 30-06-2014

and Communications is housed at the Central Government Building in Tokyo.Wiiii/ Wikipedia Commons The Japanese Internal Affairs and Communications Ministry has plans to remove the SIM locks for mobile phones that are currently in place which prevent customers from using another SIM card on their dev... Read more

Source: cnet.com.ortal.com

Top found tags: report(1),government(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBook: Tips for IT to drive business innovationLocation: Gartner - Stamford, United States
Date published: 30-06-2014

You would think that the IT industry with all of its engineering and brain power would be at the forefront of efficiency and automation. However, according to Gartner this is not the case and most of the department's budget is used simply in Keeping the Lights On (KTLO). To learn how to transform yo... Read more

Source: net-security.org

Top found tags: EN(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Zero-proof crypto scheme can divine truths from nothingLocation: Microsoft HQ - Redmond, United States
Date published: 30-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines Princeton University scientists have applied a cryptographic proof to verify if nuclear weapons have been disarmed, in a move that could reduce global nuke stockpiles and even help verify electronic voting. The cryptographic scheme is a form... Read more

Source: go.theregister.com Text Messaging Malware a Threat to Android Devices | A new and rare malware was recently discovered to become a threat to users of Android devices. According to AdaptiveMobile, a security vendor, the new SMS worm is able to propagate itself to target other Android users through special links embedded within text messages.Dubbed as Selmite, the malware can automatically send text messages to Android users 20 contacts from the devices address books. The program can instantly install itself on the affected device.Logically, most malware for Android can be considered as Trojan apps. But normally, those do not come with self-propagation mechanisms to be distributed through non-official app downloading stores. In general, SMS worms in Androd are also rare.In fact, Selfmite comes as just the second of such threats to be discovered in the last two months. This suggests that the number of those malware might further increase in the foreseeable future.Identifying infectionHow can you identify if your device has already been affected by the SMS worm? Selfmite sends a text message that contains the name of the targeted contacts. The message format goes: Dear (name of the contact), Look at the Self-time. From there, a shortened URL is provided.That rogue link redirects to an Android application package (APK) file dubbed as TheSelfTimerV1.apk. It is hosted on a somehow remote server. Once a mobile user agrees to download APK, the app list would start to contain The Self-Timer.Additionally, Selfmite also attempts to convince affected users to download and then install another file called mobogenie_122141003.apk using a local browser. You might realize that Mobogenie is a legal app that enables users to synchronize Android devices with users PCs. They can then download apps through an alternative app store.Current reachSo far, the Mobogenie Market app has already been downloaded for more than 5 million times through Google Play. It is also promoted through several referral schemes, which usually offer incentives for the spread and distribution of the malware in fraudulent manners. | http://www.morningnewsusa.com/text-messaging-malware-a-threat-to-android-devices-2310730.html | 29-06-2014 | www.morningnewsusa.com

Top found tags: Linux(1),Microsoft(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The impact of IoT on IT infrastructureLocation: Gartner - Stamford, United States
Date published: 30-06-2014

Enterprises say they are prepared for the Internet of Things (IoT) and see it as a potential opportunity. However, as it stands today, there may not be enough network capacity to handle the demand that will accompany an anticipated explosion in the number of connected devices. [world-spin] That s ac... Read more

Source: net-security.org

Top found tags: United Kingdom(2),United States(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Norway Internet voting experiment failsLocation: New York, United States
Date published: 30-06-2014

lack of increase in turnout amid concern that the program could damage confidence in the electoral process. A study performed by the Ministry of the test programs run in their 2011 and 2013 elections shows many conflicting results but, at bottom, the benefits were too slight and the problems too gre... Read more

Source: www.zdnet.com

Top found tags: United Kingdom(2),government(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Drive update fixes data-leaking flawLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

Google has fixed a security issue that made some of the files stored on Google Drive and shared with friends or colleagues via a direct link potentially reachable by unauthorized third parties, and calls users to remove previously shared documents. The issue, according to Kevin Stadmeyer, Technical ... Read more

Source: net-security.org

Top found tags: website(1),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google to shut down social networking service Orkut in SeptemberLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

SAN FRANCISCO (Reuters) - Google Inc will shut down its early social-networking service, Orkut, which was launched ten years ago but has failed to put Google ahead in what has become one of the Web's most popular businesses. Google said it will shut down Orkut, which is widely used in Brazil and Ind... Read more

Source: reuters.com

Top found tags: India(1),website(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PHP Fixes OpenSSL Flaws in New ReleasesLocation: Hewlett-Packard - Palo Alto, United States
Date published: 30-06-2014

The PHP Group has released new versions of the popular scripting language that fix a number of bugs, including two in OpenSSL. The flawsfixed in OpenSSL dont rise to the level of the major bugs such as Heartbleed that have popped up in the last few months. But PHP 5.5.14 and 5.4.30 both contain... Read more

Source: threatpost.com

Top found tags: Windows(1),OpenSSL(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Malware steelt bankwachtwoord door verkeer te sniffenLocation: Trend Micro - Cupertino, United States
Date published: 30-06-2014

Onderzoekers hebben een Trojaans paard ontdekt dat het netwerkverkeer 'snift' om inloggegevens voor internetbankieren te stelen. De Emotet-malware verspreidt zich via e-mail en lijkt zich vooral op Duitse internetgebruikers en banken te richten, hoewel ook andere banken kunnen worden aangevallen. Ee... Read more

Source: www.security.nl

Top found tags: online banking(2),Trend Micro(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Directeur hostingbedrijf voor cybercriminelen krijgt 6 jaarLocation: Amsterdam, The Netherlands
Date published: 30-06-2014

De directeur van een hostingbedrijf dat jarenlang allerlei activiteiten voor cybercriminelen verrichtte is in Estland veroordeeld tot een gevangenisstraf van 6 jaar en 4 maanden. Vladimir Tsastsin was de man achter criminele ondernemingen zoals EstHost, EstDomain en Rove Digital. Zo registreerde Est... Read more

Source: www.security.nl

Top found tags: NL(1),research(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beveiligingsteam FIFA World Cup laat wachtwoord uitlekkenLocation: Brasilia-Federal District, Brazil
Date published: 30-06-2014

Een Braziliaanse website publiceerde vorige week onbedoeld open en bloot het wachtwoord van het wifi-netwerk van het Centre for Police Coperation in Brasilia, dat toegang heeft tot veel beveiligingssystemen die voor het WK worden ingezet. Het is zo'n fout waar je bedacht op had horen te zijn, als be... Read more

Source: www.automatiseringgids.nl

Top found tags: website(1),wireless(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft stopt met vooraankondigingen beveiligingsbulletinsLocation: Microsoft HQ - Redmond, United States
Date published: 30-06-2014

Microsoft stopt met onmiddellijke ingang met het rondmailen van vooraankondigingen van zijn maandelijkse patchronde. De reden voor deze stap is niet geheel helder. In een mail aan de personen die gebruik maakten van deze dienst, spreekt Microsoft van wijzigingen van de overheidsbepalingen ten aanzie... Read more

Source: www.automatiseringgids.nl

Top found tags: website(1),social media(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Russische criminelen grootste cyberdreiging voor Europa"Location: Wall Street, New York City, New York, United States
Date published: 30-06-2014

Russische cybercriminelen vormen de grootste cyberdreiging voor Europa, zo stelt Lee Miles, adjunct-hoofd van de Britse National Cyber Crime Unit en voorzitter van de European Cybercrime Task Force. Volgens Miles zijn de meeste dreigingen waar zijn eenheid tegen strijdt uit Rusland afkomstig. "Cyber... Read more

Source: www.security.nl

Top found tags: NL(1),United Kingdom(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kaspersky ziet toename van brute force-aanvallen op RDPLocation: Kaspersky HQ - Moscow, Russia
Date published: 30-06-2014

Elke dag worden duizenden systemen het doelwit van een brute force-aanval op het Remote Desktop Protocol (RDP) en het aantal is groeiende, zo beweert het Russische anti-virusbedrijf Kaspersky Lab. Sinds kort monitort het bedrijf ook het aantal RDP-aanvallen op gebruikers van de eigen software. Via R... Read more

Source: www.security.nl

Top found tags: antivirus(2),cybercrime(3),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Britse tiener aangeklaagd wegens DDoS-aanval op SpamhausLocation: London,United Kingdom
Date published: 30-06-2014

Een 17-jarige Britse jongen die vorig jaar april werd opgepakt wegens een grote DDoS-aanval op de internationale anti-spamorganisatie Spamhaus is nu ook aangeklaagd. Volgens de Britse National Cyber Crime was de jongen verantwoordelijk voor meerdere grote DDoS-aanvallen. Door de aanvallen raakten ve... Read more

Source: www.security.nl

Top found tags: financial sector(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kaspersky ziet toename van brute force-aanvallen op RDPLocation: Kaspersky HQ - Moscow, Russia
Date published: 30-06-2014

Elke dag worden duizenden systemen het doelwit van een brute force-aanval op het Remote Desktop Protocol (RDP) en het aantal is groeiende, zo beweert het Russische anti-virusbedrijf Kaspersky Lab. Sinds kort monitort het bedrijf ook het aantal RDP-aanvallen op gebruikers van de eigen software. Via R... Read more

Source: www.security.nl

Top found tags: antivirus(2),cybercrime(3),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Britse tiener aangeklaagd wegens DDoS-aanval op SpamhausLocation: London,United Kingdom
Date published: 30-06-2014

Een 17-jarige Britse jongen die vorig jaar april werd opgepakt wegens een grote DDoS-aanval op de internationale anti-spamorganisatie Spamhaus is nu ook aangeklaagd. Volgens de Britse National Cyber Crime was de jongen verantwoordelijk voor meerdere grote DDoS-aanvallen. Door de aanvallen raakten ve... Read more

Source: www.security.nl

Top found tags: financial sector(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime-unit VK: Russische hackers vormen grootste gevaar voor EuropaLocation: London,United Kingdom
Date published: 30-06-2014

Het plaatsvervangend hoofd van de Britse National Cyber Crime Unit heeft tijdens de Cyber Security Summit in Londen afgelopen week laten weten dat aanvallen van hackers die de grootste dreiging met zich meebrengen vooral afkomstig zijn uit Rusland. Volgens het hoofd van de digitale-beveiligingseenhe... Read more

Source: tweakers.net

Top found tags: government(2),United Kingdom(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Exclusive: A review of the Blackphone, the Android for the paranoidLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

Sean Gallagher Further Reading Ars tests Internet surveillanceby spying on an NPR reporter A week spent playing NSA reveals just how much data we leak online. Based on some recent experience, I'm of the opinion that smartphones are about as private as a gas station bathroom. They're full of leaks... Read more

Source: arstechnica.com

Top found tags: Google(3),mobile device(4),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Googlebaas: dataminen zorggegevens kan levens reddenLocation: Page, United States
Date published: 30-06-2014

Het dataminen van zorggegevens kan volgend jaar 100.000 levens redden, maar wordt vanwege zorgen over de privacy nog altijd niet gedaan, zo zegt Larry Page, n van de oprichters van Google. Volgens Page wordt er vaak negatief over zaken gesproken voordat mensen de daadwerkelijke producten en voor... Read more

Source: www.security.nl

Top found tags: privacy(1),cyber security(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Eerste Blackphone review: prima privacy, matige prestatiesLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

De Blackphone, die binnenkort ook door KPN zal worden aangeboden, is de eerste smartphone die zich geheel op de privacy van gebruikers richt. De smartphone is inmiddels naar de eerste klanten verstuurd, maar IT-website Ars Technica ontving eerder al een testexemplaar en keek of de telefoon aan de ho... Read more

Source: www.security.nl

Top found tags: smartphone(2),United States(4),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Eerste Blackphone review: prima privacy, matige prestatiesLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

De Blackphone, die binnenkort ook door KPN zal worden aangeboden, is de eerste smartphone die zich geheel op de privacy van gebruikers richt. De smartphone is inmiddels naar de eerste klanten verstuurd, maar IT-website Ars Technica ontving eerder al een testexemplaar en keek of de telefoon aan de ho... Read more

Source: www.security.nl

Top found tags: smartphone(2),United States(4),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Blackphone: traag, onhandig maar wel superveiligLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

Maakt de Blackphone zijn beloften op gebied van privacy en beveiliging waar? Techsite Ars Technica kreeg het toestel exclusief in handen en schreef maandag een goedkeurende recensie over de op Android gebaseerde smartphone. Toen leverancier Silent Circle in februari de ultraveilige, maar zeer kostba... Read more

Source: webwereld.nl

Top found tags: Google(2),Google Play(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Nederlandse bedrijven zeer actief op sociale mediaLocation: Centraal Bureau voor de Statistiek - Den Haag, The Netherlands
Date published: 30-06-2014

Nederlandse bedrijven maken in toenemende mate gebruik van sociale media, zoals Twitter, Facebook en LinkedIn, zo laat het Centraal Bureau voor de Statistiek ( CBS) vandaag weten. Sociale netwerken zijn onder bedrijven de populairste vorm van sociale media. Vorig jaar had 46 procent een account bij ... Read more

Source: www.security.nl

Top found tags: Twitter(1),website(1),social media(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook betreurt ophef over geheim experimentLocation: Facebook - Menlo Park, United States
Date published: 30-06-2014

Facebook betreurt de ophef die dit weekend ontstond over een geheim psychologisch onderzoek dat de sociale netwerksite onder 689.000 gebruikers uitvoerde. Gedurende een week in januari 2012 werden de nieuwsfeeds van deze gebruikers door Facebook aangepast. Positieve en negatieve berichten van vriend... Read more

Source: www.security.nl

Top found tags: research(1),report(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gekraakte telefooncentrale kost ondernemer NZ 17.000 euroLocation: Ray, United States
Date published: 30-06-2014

Een Nieuw-Zeelandse ondernemer moet waarschijnlijk 17.000 euro betalen nadat criminelen via een standaard wachtwoord toegang tot zijn bedrijfstelefooncentrale kregen en er vervolgens internationale telefoongesprekken via lieten lopen, wat voor een torenhoge rekening zorgde. Volgens ondernemer Alan R... Read more

Source: www.security.nl

Top found tags: ISP(1),NL(1),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NCTV monitort online activiteiten Nederlandse jihadistenLocation: Office of the National Coordinator for Security and Counterterrorism - Den Haag, The Netherlands
Date published: 30-06-2014

De online activiteiten van Nederlandse jihadisten worden nauwgezet gemonitord, zo laat de Nationaal Cordinator Terrorismebestrijding en Veiligheid (NCTV) weten. Vandaag stuurde minister Opstelten het Dreigingsbeeld Terrorisme Nederland en de brief over de aanpak van jihadisme naar de Tweede Kamer.... Read more

Source: www.security.nl

Top found tags: website(1),government(4),The Netherlands(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Uitbreiding preventief fouilleren morgen van krachtLocation: Den Haag, The Netherlands
Date published: 30-06-2014

Een nieuwe wet van minister Opstelten van Veiligheid en Justitie die het preventief fouilleren uitbreidt, wordt morgen, dinsdag 1 juli, van kracht. Burgemeesters kunnen dan voor maximaal twaalf uur een gebied aanwijzen waar de politie op bevel van de officier van justitie preventief op wapens mag fo... Read more

Source: www.security.nl

Top found tags: police(1),local authority(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Website anoniem besturingssysteem Tails gedefacedLocation: Amsterdam, The Netherlands
Date published: 30-06-2014

De website van het anonieme besturingssysteem Tails is gisteren korte tijd gedefaced geweest. Een naar eigen zeggen 17-jarige aanvaller wist toegang tot de website te krijgen en plaatste daar een boodschap dat hij zichzelf als een belangrijk iemand kon laten inloggen en wat dingen veranderde. Inmidd... Read more

Source: www.security.nl

Top found tags: Debian(1),NL(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AIVD krijgt 25 miljoen euro extra van kabinetLocation: AIVD - Zoetermeer, The Netherlands
Date published: 30-06-2014

Het kabinet trekt 25 miljoen euro extra uit voor de AIVD in verband met allerlei toegenomen dreigingen. Het gaat dan om jihadisten en terugkeerders uit oorlogsgebieden, maar ook de onrust bij de buitengrens van Europa, zoals Oekrane, en de toegenomen cyberdreiging. Dat schrijft minister Plasterk (... Read more

Source: www.security.nl

Top found tags: Ministry of the Interior and Kingdom Relations(7),government(9),The Netherlands(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
OV-chipkaart vanaf 9 juli voor alle treinreizigers verplichtLocation: Amsterdam, The Netherlands
Date published: 30-06-2014

Vanaf 9 juli kunnen treinreizigers niet meer met een papieren kaartje reizen, aangezien de OV-chipkaart dan verplicht wordt. Dat houdt in dat alle reizigers voor hun reis moeten inchecken en aan het einde van de reis moeten uitchecken. Dat melden de NS en Trans Link Systems, het bedrijf achter de ch... Read more

Source: www.security.nl

Top found tags: NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Drive dicht referer-lekLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

Google heeft een kwetsbaarheid in Google Drive verholpen waardoor de locatie van gedeelde bestanden door derden achterhaald kon worden. Het betrof een referer-lek dat recent ook bij Dropbox werd ontdekt. De kwetsbaarheid ontstond als iemand op Google Drive een document met een HTTPS-link deelde.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Google(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AIVD krijgt 25 miljoen euro extra van kabinetLocation: AIVD - Zoetermeer, The Netherlands
Date published: 30-06-2014

Het kabinet trekt 25 miljoen euro extra uit voor de AIVD in verband met allerlei toegenomen dreigingen. Het gaat dan om jihadisten en terugkeerders uit oorlogsgebieden, maar ook de onrust bij de buitengrens van Europa, zoals Oekrane, en de toegenomen cyberdreiging. Dat schrijft minister Plasterk (... Read more

Source: www.security.nl

Top found tags: Ministry of the Interior and Kingdom Relations(7),government(9),The Netherlands(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
OV-chipkaart vanaf 9 juli voor alle treinreizigers verplichtLocation: Amsterdam, The Netherlands
Date published: 30-06-2014

Vanaf 9 juli kunnen treinreizigers niet meer met een papieren kaartje reizen, aangezien de OV-chipkaart dan verplicht wordt. Dat houdt in dat alle reizigers voor hun reis moeten inchecken en aan het einde van de reis moeten uitchecken. Dat melden de NS en Trans Link Systems, het bedrijf achter de ch... Read more

Source: www.security.nl

Top found tags: NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Drive dicht referer-lekLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

Google heeft een kwetsbaarheid in Google Drive verholpen waardoor de locatie van gedeelde bestanden door derden achterhaald kon worden. Het betrof een referer-lek dat recent ook bij Dropbox werd ontdekt. De kwetsbaarheid ontstond als iemand op Google Drive een document met een HTTPS-link deelde.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Google(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'NSA kan met bgp- en dns-manipulatie via buitenland legaal Amerikanen aftappen'Location: New York, United States
Date published: 30-06-2014

Onderzoekers aan de Universiteit van Amsterdam en Boston waarschuwen voor de mogelijkheid dat Amerikaanse inlichtingendiensten als de NSA via manipulatie van het bgp-protocol en dns-servers Amerikaans dataverkeer zo kunnen omleiden dat zij dit legaal kunnen aftappen. Volgens de Amerikaanse grondwet ... Read more

Source: tweakers.net

Top found tags: The Netherlands(2),United States(6),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ziggo beveiligt wifi-hotspots met certificaten en verhoogt snelheid - updateLocation: Ziggo B.V. - Utrecht, The Netherlands
Date published: 30-06-2014

Ziggo gaat zijn wifi-hotspots, waarvoor het de modems van klanten gebruikt, beveiligen met certificaten. Dat heeft Ziggo-ceo Ren Obermann woensdagmiddag bekendgemaakt. Bovendien is de limiet van 3Mbit/s per hotspotverbinding verdwenen. ZiggoMet het toevoegen van certificaten lost Ziggo een beveili... Read more

Source: tweakers.net

Top found tags: ISP(2),update(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Meerdere kwetsbaarheden in Linux kernel verholpenLocation: National Cyber Security Centre - Den Haag, The Netherlands
Date published: 30-06-2014

Samenvatting: Red Hat heeft een update uitgebracht voor Red Hat 7 om meerdere kwetsbaarheden in de kernel te verhelpen. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende een Denial-of-Service veroorzaken, verhoogde gebruikersrechten verkrijgen of toegang tot gevoelige gegevens v... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Linux kernel verholpenLocation: Door, United States
Date published: 30-06-2014

Samenvatting: Red Hat heeft een update uitgebracht voor Red Hat 7 om meerdere kwetsbaarheden in de kernel te verhelpen. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende een Denial-of-Service veroorzaken, verhoogde gebruikersrechten verkrijgen of toegang tot gevoelige gegevens v... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Cacti verholpenLocation: Cross, United States
Date published: 30-06-2014

Samenvatting: Er zijn updates beschikbaar gemaakt om meerdere kwetsbaarheden in Cacti te verhelpen. Gevolgen: Een kwaadwillende kan op afstand: -SQL injection aanvallen uitvoeren; -Willekeurige code uitvoeren; -Cross-Site Scripting aanvallen uitvoeren. Beschrijving: ams.csv articles.txt beveiligings... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid gevonden in de LZO en LZ4 algoritmesLocation: Amsterdam, The Netherlands
Date published: 30-06-2014

Samenvatting: Er is een kwetsbaarheid gevonden in de Oberhumer LZO en LZ4 algoritmes. Op dit moment zijn er nog geen updates uitgebracht die de kwetsbaarheid verhelpen. Zodra deze beschikbaar komen zal dat kenbaar gemaakt worden via een update van deze advisory. Gevolgen: Een kwaadwillende kan een D... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ubuntu heeft meerdere kwetsbaarheden verholpen in de Linux KernelLocation: Ubuntu - London, United Kingdom
Date published: 30-06-2014

Samenvatting: Ubuntu heeft een update uitgebracht voor Ubuntu 12.04 die verschillende kwetsbaarheden verhelpt in de Linux Kernel. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken, toegang krijgen tot gevoelige informatie, verhoogde gebruikersrechten verkrijgen en willekeurige code u... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in PHP verholpenLocation: Hewlett-Packard - Palo Alto, United States
Date published: 30-06-2014

Samenvatting: Er zijn updates uitgebracht om een kwetsbaarheid in PHP te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken voor het veroorzaken van een Denial-of-Service (DoS) en mogelijk op afstand willekeurige code uitvoeren. Beschrijving: Kwetsbaarheid in de DNS TXT-record pa... Read more

Source: www.ncsc.nl

Top found tags: PHP(1),Ubuntu(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden in libpng verholpenLocation: Amsterdam, The Netherlands
Date published: 30-06-2014

Samenvatting: Er zijn updates uitgekomen voor libpng om Denial-of-Service kwetsbaarheden te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: - CVE-2013-6954, CVE-2014-0333 Beide kwetsbaarheden kunnen leiden tot een Denial-... Read more

Source: www.ncsc.nl

Top found tags: Fedora(1),NL(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Python verholpenLocation: Door, United States
Date published: 30-06-2014

Samenvatting: Er is een kwetsbaarheid verholpen in de JSON module van Python. Gevolgen: Door deze kwetsbaarheid te misbruiken kan een kwaadwillende toegang verkrijgen tot gevoelige gegevens. Beschrijving: Er is een kwetsbaarheid verholpen in de ingebouwde JSON module van Python, veroorzaakt door het... Read more

Source: www.ncsc.nl

Top found tags: Fedora(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish