Under construction

New design coming soon!

CIC News engine statistics

CIC News for 01-07-2014 contains 147 articles: cybercrime(40),cyber security(55),data breach(15),other(37)

CIC News update contains 120 English and 27 Dutch articles for today.
There are 6 published advisories, 0 are English and 6 are Dutch.
In today's English news articles:
- 33 related to cybercrime
- 52 related to cyber security
- 15 related to data breach and identity theft
- 20 for the category other news

In today's Dutch news articles:
- 7 related to cybercrime
- 3 related to cyber security
- 17 for the category other news

Have fun reading.

English cybercrime related news

Malware Aims at US, Europe Energy Sector: ResearchersLocation: Symantec HQ - Mountain View, United States
Date published: 30-06-2014

WASHINGTON - Cyberattackers, probably state sponsored, have been targeting energy operations in the United States and Europe since 2011 and were capable of causing significant damage, security researchers said Monday. The US security firm Symantec said it identified malware targeting industrial cont... Read more

Source: securityweek.com

Top found tags: trojan(2),United States(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Insurers want to protect critical infrastructure from cyber attackLocation: Londen, United Kingdom
Date published: 30-06-2014

A leading insurance underwriter told British politicians and security experts in London today that insurers must be involved in the fight against cyber warfare. Insurers want to protect critical infrastructure from cyber attack Insurers want to protect critical infrastructure from cyber attack Speak... Read more

Source: www.scmagazineuk.com

Top found tags: government(2),United Kingdom(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Remaining Snowden docs will be released to avert 'unspecified US war' CryptomeLocation: National Security Agency - Fort Meade, United States
Date published: 30-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines All the remaining Snowden documents will be released next month, according to whistle-blowing site Cryptome, which said in a tweet that the release of the info by unnamed third parties would be necessary to head off an unnamed "war"... Read more

Source: go.theregister.com

Top found tags: ISP(1),Linux(1),USB (1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Targeted Paerls Campaign Includes Old-School Word Macro AttackLocation: Dropbox - San Francisco, United States
Date published: 30-06-2014

A targeted malware campaign has been uncovered that combines an old-school Microsoft Word Macro malware attack with a decidedly new school approach of redirecting victims to exploits stored on Dropbox. The String of Paerls attacks, which Ciscos VRT team reported today, targets industries such as ... Read more

Source: threatpost.com

Top found tags: cybercrime(3),malware(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NCA charges 17-year-old London man for role in massive Spamhaus DDoS attackLocation: National Crime Agency - London, United Kingdom
Date published: 30-06-2014

A 17-year-old male from London was charged on Friday with computer misuse, fraud and money laundering offenses, according to a statement released by the National Crime Agency (NCA). The NCA made the decision not to identify the teenager because he is a minor, but he was apprehended last year for his... Read more

Source: www.scmagazine.com

Top found tags: DoS(2),The Netherlands(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft to resume email security notificationsLocation: Microsoft HQ - Redmond, United States
Date published: 30-06-2014

and events. After further consideration, they will continue issuing the emails. The announcement last Friday blamed "...changing governmental policies concerning the issuance of automated electronic messaging..." for the decision. It was clear that the government policy at issue was a new Canadian a... Read more

Source: www.zdnet.com

Top found tags: RSS(1),spam(1),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Lite Zeus' has fewer tricks, but updated encryptionLocation: Fortinet - Sunnyvale, United States
Date published: 30-06-2014

Study indicates that SQL injection continues to be a pervasive threat The new Zeus variant employs AES-128 encryption as opposed to the older RC4 cipher used by other Zeus iterations. Researchers have discovered a new Zeus variant that packs fewer malicious tricks, but uses not-to-be-overlooked encr... Read more

Source: www.scmagazine.com

Top found tags: update(2),Fortinet(3),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft's anti-malware crusade knackers 'FOUR MILLION' No-IP usersLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Microsoft has won a court order that gives it control over 23 domains owned by dynamic DNS (DDNS) provider Vitalwerks Internet Solutions after claiming they were being used by malware developed in the Middle East and Africa. Vitalwerks o... Read more

Source: go.theregister.com

Top found tags: research(1),training(1),ISP(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Millions of dynamic DNS users suffer after Microsoft seizes No-IP domainsLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Millions of legitimate servers that rely on dynamic domain name services from No-IP.com suffered outages on Monday after Microsoft seized 22 domain names it said were being abused in malware-related crimes against Windows users. Microsoft enforced a federal court order making the company the domain ... Read more

Source: arstechnica.com

Top found tags: Microsoft(2),malware(3),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker raid on energy companies for secrets raises sabotage fearsLocation: Symantec HQ - Mountain View, United States
Date published: 01-07-2014

companies using a sophisticated three-pronged campaign of hacking potentially allowing them to disrupt energy supplies across the region. The wide-ranging attacks were organised by a group working out of eastern Europe likely state-sponsored seem to have focused on espionage, however the... Read more

Source: www.zdnet.com

Top found tags: cybercrime(4),cyber espionage(4),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Number and diversity of phishing targets continues to increaseLocation: Anti-Phishing Working Group - San Francisco, United States
Date published: 01-07-2014

The number of phishing sites in the first quarter of 2014 leaped 10.7 percent over the previous quarter, the Anti-Phishing Working Group reports. 2013 was one of the heaviest years for phishing on record, and Q1 2014 perpetuated that trend posting the second-highest number of phishing attacks ever r... Read more

Source: net-security.org

Top found tags: United States(2),cybercrime(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Darkens 4MM Sites in Malware FightLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Millions of Web sites were shuttered Monday morning after Microsoft executed a legal sneak attack against a malware network thought to be responsible for more than 7.4 million infections of Windows PCs worldwide.In its latest bid to harness the power of the U.S. legal system to combat malicious soft... Read more

Source: krebsonsecurity.com

Top found tags: trojan(2),United States(2),malware(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
If Brian Krebs is this hated he must be doing some goodLocation: New York, United States
Date published: 30-06-2014

Journalists are supposed to report cybercrime. Now one of them is regularly on the receiving end.Security journalists are normally pretty much ignored by cyber-criminals but campaigning security blogger Brian Krebs seems to have got under the skin of one Ukrainian cybercrook who hatched a plot to di... Read more

Source: blogs.techworld.com

Top found tags: social media(2),cybercrime(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Caught out: FIA busts online fraud networkLocation: New York, United States
Date published: 01-07-2014

LAHORE: The FIA has rounded up eight members of an international network on charges of online financial fraud through its National Response Centre for Cyber Crime, The Express Tribune has learnt.This is the first such arrest carried out by the FIA, said Dr Usman Anwar, director of the FIA in P... Read more

Source: tribune.com.pk

Top found tags: credit card(2),cybercrime(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crimes up by 51 per cent in India, Maharashtra, AP, Karnataka top listLocation: Maharashtra, India
Date published: 01-07-2014

New Delhi: Andhra Pradesh (undivided), Karnataka and Maharashtra have occupied the top 3 positions when it comes to cyber crimes registered under the new IT Act in India. Interestingly, these three states together contribute more than 70 per cent to India's revenue from IT and IT related industries.... Read more

Source: ibnlive.in.com

Top found tags: report(1),cybercrime(3),India(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Western energy companies hit by state-sponsored hackersLocation: Symantec HQ - Mountain View, United States
Date published: 01-07-2014

Symantec researchers have confirmed the findings of their colleagues at F-Secure, who have been monitoring the spreading of the Havex malware family, and have put them in a larger context, tying them to the activities of a hacking group they dubbed Dragonfly. Also dubbed "Energetic Bear," the group ... Read more

Source: net-security.org

Top found tags: trojan(2),cybercrime(3),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lawful Dynamic DNS Users Affected in Microsoft's Latest Botnet TakedownLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Microsoft Takes Action Against Alleged Malware Creators, Distributors Through Seizure of No-IP.Com Domains The latest operation conducted by Microsoft's Digital Crimes Unit has targeted two individuals and one company suspected of being responsible for creating, controlling and facilitating the dist... Read more

Source: securityweek.com

Top found tags: webcam(1),malware(2),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Backs Down on Decision to Stop Sending Email Security NotificationsLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Microsoft announced last week that it would stop sending security notifications via email, but the company has since changed its mind and has promised to resume the process. Last Friday, Microsoft informed users of its intention to suspend the use of email notifications starting with July 1 for secu... Read more

Source: securityweek.com

Top found tags: website(1),legislation(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Millions are hit by MS' No-IP takedownLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Microsoft accused of acting "excessively" - US court order used to take down servers exploited by threat actors also hits servers being used by millions of innocent internet users. Millions are hit by MS' No-IP takedown Millions are hit by MS' No-IP takedown Microsoft has been accused of acting e... Read more

Source: www.scmagazineuk.com

Top found tags: trojan(2),malware(3),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dropbox used as malware hub to attack government agenciesLocation: Dropbox - San Francisco, United States
Date published: 01-07-2014

Dropbox used as malware hub to attack government agencies. Dropbox is being used as a hub for a remote access Trojan (RAT) that infiltrates company networks without detection. Back in May, it was revealed that the malware had been used to attack a Taiwanese government agency. The virus, which is kno... Read more

Source: itproportal.com

Top found tags: malware(2),trojan(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Iraq civil war: You can fight with an AK-47 ... or a HOME-COOKED TrojanLocation: Damascus, Damascus Governorate, Syria
Date published: 01-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Iraq's bloody civil war has spilled over onto the internet, notes a researcher that has spotted a large increase in cyber-espionage tools and other forms of malware. Members of the Islamic State of Iraq and al-Sham (ISIS) group have made ext... Read more

Source: go.theregister.com

Top found tags: malware(3),cyber espionage(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple releases security fixes for iOS, OS X, Safari and Apple TVLocation: Apple HQ - Cupertino, United States
Date published: 01-07-2014

vulnerabilities are addressed in the products. As is common with Apple, some of the vulnerabilities are quite old. iOS 7.1.2 fixes 44 vulnerabilities in the previous version. These include two lock screen bugs and two which could allow bypass of Find My iPhone and Activation Lock, the new anti-theft... Read more

Source: www.zdnet.com

Top found tags: OS X(2),Apple(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Latest Microsoft Malware Takedown Causes Waves in Security CommunityLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Microsofts latest takedown of a malware operation, announced Monday and involving the infrastructureof several malware families, has, like many of the companys actions, elicitedstrong opinions on both sides of the issue from security researchers, activists and others with a stake in the ga... Read more

Source: threatpost.com

Top found tags: government(2),Kaspersky Lab(2),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Geodo infostealer gets help from wormLocation: Berlin, Germany
Date published: 01-07-2014

The distribution potential of the infamous Cridex infostealer (also known as Feodo or Bugat) just went up a notch, as a new version of the malware works in conjunction with a worm that sends out emails with a link to download a zip file containing the trojan. Initially distributed via removable driv... Read more

Source: net-security.org

Top found tags: Germany(2),trojan(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hidden cyber crime gang spottedLocation: Cisco HQ - San Jose, United States
Date published: 01-07-2014

Cisco researchers uncover a cyber criminal group that have been hiding since at least 2007, distributing malware almost entirely undetectable by anti-virus systems. Hidden cyber crime gang spotted Hidden cyber crime gang spotted Cisco researchers have finally uncovered a cyber criminal group that ha... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(2),financial sector(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDoS teen chargedLocation: National Crime Agency - London, United Kingdom
Date published: 01-07-2014

A 17-year-old male from London charged with computer misuse, fraud and money laundering offences, according to a statement released by the National Crime Agency (NCA) had been bailed to attend Camberwell Green Youth Court on 30 June. The NCA made the decision not to identify the teenager because he ... Read more

Source: www.scmagazineuk.com

Top found tags: DoS(2),The Netherlands(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian hackers target US, Euro energy firms: Where's the story?Location: New York, United States
Date published: 01-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines You may be wondering where our coverage is on the "Dragonfly" malware that has been used by unknown Russia-based hackers to target European and US-based energy companies. This is big in the news just now, following a recent announcement by s... Read more

Source: go.theregister.com

Top found tags: Russia(1),Symantec(1),antivirus(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Expands TLS, Forward Secrecy SupportLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Microsoft is no exception when it comes to large technology providers committing to encrypting the services its users depend on. Today, the company announced an update on the progress it has made in engineering those changes, including the news that Outlook.com, its web-based email service, supports... Read more

Source: threatpost.com

Top found tags: social media(2),update(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cridex Variant Geodo Part Trojan, Part Email WormLocation: Berlin, Germany
Date published: 01-07-2014

A knockoff of the Cridex banking Trojan has surfaced with an appetite for more than online banking credentials. Seculert has called this one Geodoa take on another of Cridexs many aliases Feodoand has confirmed that the malware comes with an efficient self-replicating feature borne of stole... Read more

Source: threatpost.com

Top found tags: United States(2),malware(3),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tool from Chinese hackers lets you modify newest version of iOSLocation: Apple HQ - Cupertino, United States
Date published: 01-07-2014

A new, untethered jailbreak cooked up by Chinese hackers apparently works on the latest version of Apple's iOS, namely 7.1.2. Unveiled last week, Pangu was engineered to perform an untethered jailbreak on any device running iOS version 7.1.1, including the latest iPhone 5S and iPad Air. Unlike a tet... Read more

Source: cnet.com.ortal.com

Top found tags: Apple(3),mobile device(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Payment Services, Financial Industry Top List of Phishing TargetsLocation: Anti-Phishing Working Group - San Francisco, United States
Date published: 01-07-2014

What do financial institutions, ePayment services, social networking sites and email services have in common? The answer is they make up the majority of the types of brands targeted by phishing kits. According to an analysis of nearly 9,000 phishing kits by PhishLabs, those four categories account f... Read more

Source: securityweek.com

Top found tags: website(2),financial sector(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Europol 15 todayLocation: Europol HQ - Den Haag, The Netherlands
Date published: 01-07-2014

Europol, the EU's law enforcement agency whose stated mission is making Europe safe,' celebrates its 15^th anniversary today. In a press announcement, EU Home Affairs Commissioner Cecilia Malmstrm notes that Europol is playing a key role' as its work has led to children being saved from e... Read more

Source: www.scmagazineuk.com

Top found tags: legislation(1),cybercrime(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

How to build trust between business and ITLocation: New York, United States
Date published: 30-06-2014

One of the biggest challenges we face with securing our networks and systems is that many businesses view cyber security as an IT problem and not a business problem. However, when you consider how dependent businesses are on IT and, more importantly, on the information on those systems, it s obvious... Read more

Source: net-security.org

Top found tags: website(1),cyber security(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDoS attacks are becoming more effectiveLocation: Cape Town, West-Kaap, South Africa
Date published: 30-06-2014

Disruptive cyber-attacks are becoming more effective at breaching security defenses, causing major disruption and sometimes bringing down organizations for whole working days, according to a new global study from BT. [ddos-cloud] The research reveals that 41 percent of organizations globally were hi... Read more

Source: net-security.org

Top found tags: security measures(2),South Africa(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Drive Privacy Flaw PatchedLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

A Google Drive issue that in certain cases exposed the original URLs of shared documents has been fixed by Google, the company announced on Friday. According to Google Technical Program Manager Kevin Stadmeyer, the security issues was reported to the company via its Vulnerability Reward Program, and... Read more

Source: securityweek.com

Top found tags: cyber security(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Energy Companies in Europe, US Hit by Sophisticated Attack CampaignLocation: Symantec HQ - Mountain View, United States
Date published: 30-06-2014

Researchers at Symantec released a report today going inside an ongoing attack campaign targeting the energy sector. According to Symantec, the attackers have compromised a number of different organizations during the past few years for the purposes of spying - and possibly, sabotage. Also known as ... Read more

Source: securityweek.com

Top found tags: exploit kit(4),United States(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What is an Advanced Persistent Threat?Location: McAfee - Santa Clara, United States
Date published: 30-06-2014

If youve ever seen a movie where the bad guys are using ongoing, invasive hacking to spy on their enemy, you have some familiarity with an advanced persistent threat (APT). This term usually refers to an attack carried out by a group that targets a specific entity using malware and other so... Read more

Source: blogs.mcafee.com

Top found tags: telecom sector(4),cyber security(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CryptoLocker returns after Operation TovarLocation: National Crime Agency - London, United Kingdom
Date published: 30-06-2014

CryptoLocker is back and more popular than ever, less than one month on from the Operation Tovar campaign. CryptoLocker returns after Operation Tovar CryptoLocker returns after Operation Tovar Back at the start of June, the National Crime Agency put out an advisory that UK computer users were at ris... Read more

Source: www.scmagazineuk.com

Top found tags: government(5),malware(5),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Native versus HTML5 security - is there a third way?Location: Google HQ - Mountain View, United States
Date published: 30-06-2014

"We need a mobile app" is a common phrase ushered in business, but the options for doing this aren't confined to native and web-based HTML5. Native versus HTML5 security - is there a third way? Native versus HTML5 security - is there a third way? Those five words seem to reach a decision, but in fac... Read more

Source: www.scmagazineuk.com

Top found tags: mobile device(2),social media(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Blackphone begins shipping globallyLocation: New York, United States
Date published: 30-06-2014

Blackphone, the first privacy-driven mobile device, has begun shipping. For $629, global customers will receive the phone, which operates on a custom Android operating system called PrivatOS, according to the company's website. Pre-ordered phones are being shipped now. However, additional orders are... Read more

Source: www.scmagazine.com

Top found tags: cyber security(2),mobile device(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Active malware operation let attackers sabotage US energy industryLocation: Symantec HQ - Mountain View, United States
Date published: 30-06-2014

Researchers have uncovered a malware campaign that gave attackers the ability to sabotage the operations of energy grid owners, electricity generation firms, petroleum pipelines, and industrial equipment providers. Further Reading Attackers poison legitimate apps to infect sensitive industrial contr... Read more

Source: arstechnica.com Top U.K. Cyber Cop: Russian Hackers Are Our Biggest Threat | The biggest cyber security threat facing the U.K. and Europe is from Russian hackers, a top British cyber official has said.Speaking at a cyber-security conference last week in London, Lee Miles, Deputy Head of the U.K. National Cyber Crime Unit, emphasized that most of the significant cyber security threats his office works on emanate from Russia.Cybercrime is anonymous, sophisticated, and international. And Russian. I have some excellent Russian speakers working for me. Russian cybercrime is a big area for us, he said.Mr. Miles, who also chairs the European Cybercrime Task Force, was speaking at The Cyber Security Summit hosted by Westminster Briefing, a political consultancy group.Its not just in the U.K. Last year, Wal-Mart directors received frequent rundowns from outside consultants on cyberthreats, including gangs of Russian-speaking hackers who target payment-card data, a person familiar with the meetings said.Mr. Miles said that the days when hackers would infiltrate government and corporate websites to plant a flag for kudos were over. Its all about the money now, he said.Sally Scutt, Deputy Chief Executive of the British Banker Association, said at the same conference that foreign governments were looking for ways to defraud banks and hold them to ransom. She wouldnt elaborate.She said that most of the banks her association represents, some 180 of them, have been on the receiving end of cyber-attacks. She added that banks have been investing heavily in cyber defense, and that some 70% of Bank CEOs identify cyber security as major problem.Peter Wilson, Director of Awareness and Behavior Change at the U.K.s Home Office, said cybercrime costs the U.K. economy roughly 1.27 ($2.16) billion per year.He said there were 300,560 fraud and cybercrime reports last year.Stephanie Daman, the CEO of Cyber Security Challenge UK, a group that runs national awareness campaigns and competitions for cyber careers, estimated said the U.K. market for cyber security was worth 2.8 billion pounds in 2013.Rhys Bowen, Deputy Director for Cyber Security and Information Assurance in the Cabinet Office, said a number of top London pension funds have now changed their due diligence to include cyber security. | http://blogs.wsj.com/digits/2014/06/30/top-u-k-cyber-cop-russian-hackers-are-our-biggest-threat/ | 30-06-2014 | blogs.wsj.com

Top found tags: cybercrime(3),malware(3),critical infrastructure(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
86% of Android devices vulnerable to a new Crypto key exploitLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

Researchers have discovered a Crypto key vulnerability that could affect 86% of Android devices. The exploit allows hackers access to the users banking information, lock screen PIN and virtual private network.Crypto keys are used as identifiers for apps that require authentication between the user a... Read more

Source: www.digit.in

Top found tags: RSA(2),smartphone(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gartner: Nascent SDN security controls pose sizable riskLocation: Young, United States
Date published: 30-06-2014

ONOX HILL, Md. -- Software-defined networking may prove to be as inevitable as it is transformative, according to a Gartner analyst, but lacking security controls and shaky management features today make SDN a sizable risk to enterprise network security. During a session last week at the Gartner Inc... Read more

Source: searchsecurity.techtarget.com

Top found tags: DoS(2),security management(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft says disrupts cybercrime rings with roots in Kuwait, AlgeriaLocation: Microsoft HQ - Redmond, United States
Date published: 30-06-2014

BOSTON (Reuters) - Microsoft Corp (MSFT.O) launched what it hopes will be the most successful private effort to date to crack down on cyber crime by moving to disrupt communications channels between hackers and infected PCs. The operation, which began on Monday under an order issued by a federal cou... Read more

Source: reuters.com

Top found tags: malware(3),social media(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Endpoint Security: Evolving With The Threats They MitigateLocation: Trend Micro - Cupertino, United States
Date published: 30-06-2014

Evolution is a continuousprocess, and nothing can exemplify the processbetter in our industry than the threats we defend against. From simple pranks and nuisances, theyve become thieves of information, violators of privacy, destroyers of reputations and even saboteurs of businesses, all for t... Read more

Source: trendmicro.com

Top found tags: government(2),Trend Micro(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Supreme Court gives merit to Street View privacy concernsLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

The Supreme Court Monday refused to hear Google's challenge to an ongoing suit accusing it of illegally collecting Wi-Fi data via its Street View mapping service and cleared the way for the class action suit to move forward. An admission in June 2010 that it mistakenly siphoned users' Wi-Fi co... Read more

Source: www.scmagazine.com

Top found tags: Supreme Court(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senate committee passes FISMA reform billLocation: Department of Homeland Security - Washington, United States
Date published: 30-06-2014

Diluted Freedom Act passes House to privacy advocates' dismay Diluted Freedom Act passes House to privacy advocates' dismay Legislation aimed at modernizing the 12-year-old Federal Information Security Management Act (FISMA) has passed a vote by the Senate Homeland Security and Governmental Affairs ... Read more

Source: www.scmagazine.com

Top found tags: United States(6),cyber security(8),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Using Android 4.3? Don't let malware snatch your private login keysLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines If you're one of the 10.3 per cent of Android users running version 4.3, aka Jelly Bean, your login keys are at risk of theft thanks to a vulnerability in the operating system's KeyStore software. KeyStore, as the name suggests, stores a... Read more

Source: go.theregister.com

Top found tags: vulnerability(1),cyber security(2),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senators question US surveillance transparency reportLocation: New York, United States
Date published: 30-06-2014

A recent report from the U.S. intelligence director that provides the number of surveillance targets in 2013 is not specific enough to provide the transparency the nations residents need, two senators said Monday. The transparency report, issued Thursday by the U.S. Office of Director of National... Read more

Source: www.pcworld.com

Top found tags: government(3),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bitcoin sorta legal in CA, NSA transparency report, and Internet voting fails in Norway [Government IT Week]Location: National Security Agency - Fort Meade, United States
Date published: 01-07-2014

ZDNet's DIY-IT, every week I'll bring you a selection of the best government-related articles posted by our intrepid reporters and analysts. Here are some of the most interesting from the last week. Top stories this week Americans as 'vulnerable' to NSA surveillance as foreigners, despite Fourth Ame... Read more

Source: www.zdnet.com

Top found tags: Gen. Keith Alexander(3),telecom sector(4),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
We're all just lab rats in Facebook's laboratoryLocation: Facebook - Menlo Park, United States
Date published: 01-07-2014

always twisting our settings to find just the right combination of ads and real posts. That's old news. What we didn't know is that Facebook manipulated over half a million randomly selected users by changing the number of positive and negative posts they saw to see how it would effect their emotion... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),social media(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
First Units of Ultra-Private Blackphone Start ShippingLocation: New York, United States
Date published: 01-07-2014

SGP Technologies SA, the Switzerland-based joint venture of Silent Circle and Geeksphone, announced on Monday that Blackphone handsets are now available and that units are on the way to the first group of customers who have placed pre-orders. SGP Technologies formally launched Blackphone earlier thi... Read more

Source: securityweek.com

Top found tags: cyber security(2),mobile device(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EMOTET banking malware captures data sent over secured HTTPS connectionsLocation: Trend Micro - Cupertino, United States
Date published: 30-06-2014

A clever phishing email is circulating Brazil and will more than likely hit the U.S. EMOTET banking malware uses network sniffing to capture data sent over secured HTTPS connections. Spam emails making the rounds in Germany are delivering banking malware identified as EMOTET, a financial threat that... Read more

Source: www.scmagazine.com

Top found tags: United States(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Only five countries escape NSA surveillance: ReportLocation: National Security Agency - Fort Meade, United States
Date published: 01-07-2014

By AAP and ZDNet Staff July 1, 2014 -- 05:42 GMT (06:42 BST) The US National Security Agency has been authorised to intercept information "concerning" all but four countries worldwide, according to top-secret documents. "The United States has long had broad no-spying arrangements with those four cou... Read more

Source: www.zdnet.com

Top found tags: government(5),United States(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Silent Circle ships Blackphone, caters for the security-consciousLocation: Jones, United States
Date published: 01-07-2014

Silent Circle ships Blackphone, caters for the security-conscious. New $629 (368) hyper-secure Blackphones were shipped today to people who pre-ordered the Android-based smartphones with beefed up security features. The Blackphone was developed through a joint venture of Silent Circle and Geekspho... Read more

Source: itproportal.com

Top found tags: cyber security(2),government(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Redmond reinstates infosec mailing listLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Microsoft has resurrected its Lazarus security mailing list, following apparent confusion over Canada's Anti-Spam Law (CASL) that came into effect on July 1st. Redmond reversed an announcement Friday that it would shutter the Advanced Notifi... Read more

Source: go.theregister.com

Top found tags: legislation(2),government(4),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
THREAT OF THE MONTH: DeperimeterisationLocation: Park, United States
Date published: 01-07-2014

Threat of the Month Deperimeterisation What is it? Increased end-user device mobility decreases the usefulness of network-edge security devices and increases the potential for device infection. How does it work? The average user now has two or more devices that contain corporate information and thes... Read more

Source: www.scmagazineuk.com

Top found tags: training(1),United Kingdom(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Women in IT security: Carpe DiemLocation: Nelson, United States
Date published: 01-07-2014

Babara Nelson Barbara Nelson The debate about women in security isn't new, but despite vowing to address the situation we're not seeing an appreciable rise in the number of women entering the industry. To get to the root of the problem, we have to engage kids in school. My love of maths led to great... Read more

Source: www.scmagazineuk.com

Top found tags: information security(2),United Kingdom(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Silent Circle ships Blackphone, caters for the security-consciousLocation: Jones, United States
Date published: 01-07-2014

Silent Circle ships Blackphone, caters for the security-conscious. New $629 (368) hyper-secure Blackphones were shipped today to people who pre-ordered the Android-based smartphones with beefed up security features. The Blackphone was developed through a joint venture of Silent Circle and Geekspho... Read more

Source: itproportal.com DDoS attacks a growing concern for UK, BT study shows | Distributed denial of service (DDoS) attacks are a growing concern for UK organisations, according to a global study on disruptive cyber attacks commissioned by BT.More than half of UK organisations polled said their systems had been taken down for more than six hours in the past year, according to the survey carried out by Vanson Bourne in May 2014.The research reveals that 41% of organisations globally were hit by DDoS attacks in the past year, with more than three-quarters of those reporting two or more attacks.More than a third of UK organisations see DDoS attacks as a key concern, compared with 58% of organisations globally.The BT study examined the attitudes to and preparedness for DDoS attacks of IT managers from organisations in 11 countries and regions around the world.It revealed that despite the growing concern over the attacks, only about half of UK organisations have a response plan in place.And less than one in 10 UK decision-makers believe strongly they have sufficient resources in place to counteract an attack.DDoS attacks can cause major disruption for organisations by making websites unavailable, overwhelming datacentres or making networks unusable. | http://www.computerweekly.com/news/2240223581/DDoS-attacks-a-growing-concern-for-UK-BT-study-shows | 30-06-2014 | www.computerweekly.com

Top found tags: cyber security(2),government(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DHS Sharing Classified Threat Information With Service ProvidersLocation: National Institute of Standards - Gaithersburg, United States
Date published: 30-06-2014

The U.S. Department of Homeland Security is sharing classified information with managed services providers in a bid to strengthen the security of private sector owners of critical infrastructure.Currently AT&T and CenturyLink are approved service providers under the agency's Enhanced Cybersecurity S... Read more

Source: www.crn.com

Top found tags: cyber security(6),United States(8),government(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Says Disrupts Cybercrime Rings With Roots in Kuwait, AlgeriaLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Boston: Microsoft Corp launched what it hopes will be the most successful private effort to date to crack down on cyber crime by moving to disrupt communications channels between hackers and infected PCs.The operation, which began on Monday under an order issued by a federal court in Nevada, targete... Read more

Source: www.ndtv.com

Top found tags: malware(3),social media(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Top U.K. Cyber Cop: Russian Hackers Are Our Biggest ThreatLocation: London, United Kingdom
Date published: 30-06-2014

The biggest cyber security threat facing the U.K. and Europe is from Russian hackers, a top British cyber official has said.Speaking at a cyber-security conference last week in London, Lee Miles, Deputy Head of the U.K. National Cyber Crime Unit, emphasized that most of the significant cyber securit... Read more

Source: blogs.wsj.com

Top found tags: United Kingdom(2),cyber security(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Cyber Crime Enriches CriminalsLocation: Interpol - Lyon, France
Date published: 30-06-2014

\"Crime doesn't pay\" goes an old adage. But, it appears cyber criminals never heard that one and if they ever did, they totally scoff at it. According to Interpol, \"cyber-crime is the fastest growing area of crime.\" The Internet attracts criminals like bees to honey thanks to its speed, convenien... Read more

Source: www.ictafrica.info

Top found tags: trojan(2),financial sector(4),cybercrime(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ports at risk to cyber-crimeLocation: New York, United States
Date published: 30-06-2014

As the use of cyber technology spreads worldwide, ports and terminals are at greater risk to economic and commercial damage, says TT Club.The insurance and risk management services provider says while advanced IT systems provide greater opportunities for transport operators and cargo handling facili... Read more

Source: www.portstrategy.com

Top found tags: threat(1),cyber security(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PayPal freezes out ProtonMail, asks if startup has 'government permission' to encrypt emailLocation: PayPal HQ - San Jose, United States
Date published: 01-07-2014

PayPal has frozen the account of security startup ProtonMail, and has questioned whether the firm is legal and has "government approval" to encrypt emailed communication. ProtonMail is a Swiss-based email service that offers full end-to-end encryption for emails. Developed by MIT, Harvard and CE... Read more

Source: www.zdnet.com

Top found tags: government(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft disrupts malware networks and APT operationsLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Microsoft's Digital Crimes Unit struck again, and was allowed to seize 22 free domain names in an effort to strike a fatal blow to malware delivery networks run by a Kuwaiti and an Algerian national. "In a civil case filed on June 19, Microsoft named two foreign nationals, Mohamed Benabdellah and Na... Read more

Source: net-security.org

Top found tags: Kaspersky Lab(4),malware(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminals Use Macro-based Attack to Target Money-Rich IndustriesLocation: Cisco HQ - San Jose, United States
Date published: 01-07-2014

Researchers from Cisco Systems have been monitoring the activities of a threat actor whose operations are aimed at high profile, money-rich industries such as oil, jewelry, banking and television. According to Cisco, the attacks launched by the group start with a spear phishing email that appears to... Read more

Source: securityweek.com

Top found tags: financial sector(2),phishing(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft beefs up security, privacy of online servicesLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Microsoft's Vice President of Trustworthy Computing Security. Both Outlook.com and OneDrive have enabled Perfect Forward Secrecy (PFS), an encryption technique by which parties use a different encryption key for every connection, making it more difficult for attackers to decrypt connections. Better ... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),Germany(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IEEE launches Anti-Malware Support ServiceLocation: New York, United States
Date published: 01-07-2014

IEEE announced the launch of IEEE Anti-Malware Support Service (AMSS). A new service from IEEE Standards Association's (IEEE-SA) Industry Connections Security Group (ICSG), AMSS is designed to increase the availability of and access to stronger cryptographic and metadata cybersecurity tools and reso... Read more

Source: net-security.org

Top found tags: cybercrime(2),cyber security(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Playing a Part in Iraq's Civil WarLocation: Damascus, Damascus Governorate, Syria
Date published: 01-07-2014

Iraq's civil war now has a cyber-component, with researchers encountering increased cyber-espionage tools and custom malware. Recent reports have focused on the Islamic State of Iraq and al-Sham (ISIS) group's expansion in northern Iraq and the members' extensive use of social media to spread propag... Read more

Source: securityweek.com

Top found tags: telecom sector(2),cybercrime(4),cyber espionage(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple Fixes Vulnerabilities in Safari, iOS, OS X Maverick, Apple TVLocation: Apple HQ - Cupertino, United States
Date published: 01-07-2014

Updates containing fixes for security vulnerabilities were made available by Apple on Monday for iOS, Safari, OS X Mavericks and Apple TV. iPhone and iPad users can update their device's operating systems to iOS 7.1.2, which in addition to some bug fixes also addresses 44 security holes. As part of ... Read more

Source: securityweek.com

Top found tags: Apple(4),mobile device(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
World Cup Security Team Accidentally Reveals Wi-Fi PasswordLocation: Brasilia-Federal District, Brazil
Date published: 01-07-2014

When the Brazilian newspaper Correio Braziliense recently published a photo of at the FIFA World Cup security center run by Israeli security solutions provider Risco, they also published the network name and password for the center's Wi-Fi network (h/t The Hacker News). The photo shows Luiz Cravo Do... Read more

Source: www.esecurityplanet.com

Top found tags: cyber security(2),financial sector(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Volusion Used McAfee SIEM to Meet New Security NeedsLocation: McAfee - Santa Clara, United States
Date published: 01-07-2014

As a leader in e-commerce solutions, Volusion not only has to manage its own endpoints, but also those of its 40,000 customers worldwide. Online shopping is now a major aspect of global retail sales culture, and criminals are naturally following the money. While network security should be a crucial ... Read more

Source: blogs.mcafee.com

Top found tags: information security(2),security management(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Following Controversy, PayPal Unfreezes Secure E-mail Startups AccountLocation: PayPal HQ - San Jose, United States
Date published: 01-07-2014

PayPal unfroze the account of Swiss secure email upstart ProtonMail late this morning, freeing at least $300,000 the service raised, that for a day,hadseemingly been left in limbo. account had been restricted pending further review. PayPal went on to lift those restrictions Tuesday around ... Read more

Source: threatpost.com

Top found tags: government(3),financial sector(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple Patches Security Vulnerabilities in Mavericks, iOS, SafariLocation: Apple HQ - Cupertino, United States
Date published: 01-07-2014

Apple has issued a slew of security updates addressing a wide swath of vulnerabilities in its Safari Web browser, Mavericks desktop operating system, iOS mobile platform and content streaming AppleTV product. Apple doesnt rate the severity of the vulnerabilities it fixes nor does it advise on whi... Read more

Source: threatpost.com

Top found tags: vulnerability(2),website(2),Apple(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Secret Documents Say NSA Had Broad Scope, Scant Oversight: ReportLocation: National Security Agency - Fort Meade, United States
Date published: 01-07-2014

WASHINGTON - The US National Security Agency has been authorized to intercept information "concerning" all but four countries worldwide, top-secret documents say, according to The Washington Post. "The United States has long had broad no-spying arrangements with those four countries - Britain, Canad... Read more

Source: securityweek.com

Top found tags: United States(6),government(7),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Ramps Up Protection for Outlook EmailLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

SAN FRANCISCO - Microsoft on Tuesday said it is scrambling Outlook email messages in transit to thwart spying by governments or others. Toughened encryption at Outlook and Microsoft OneDrive online "cloud" data storage service came less than a month after the technology titan got low marks in a Goog... Read more

Source: securityweek.com

Top found tags: telecom sector(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AlienVault Updates Threat Intelligence Sharing PlatformLocation: AlienVault - San Manteo, United States
Date published: 01-07-2014

Unified security management solutions provider AlienVault has updated its Open Threat Exchange (OTX), the company's open, crowdsourced threat intelligence sharing system. The latest version of the platform includes a new free service that gives IT security teams better visibility into their networks... Read more

Source: securityweek.com

Top found tags: threat(1),cyber security(2),security management(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Identity and Access Management's Role in Secure Cloud CollaborationLocation: Douglas, United States
Date published: 01-07-2014

[Cloud5] Healthcare and life sciences organizations are some of the biggest users of Big Data today. The industry is already beginning to enter the exabyte age. Chris Gladwin, CEO of storage solutions company Cleversafe, announced in April that Cleversafe had acquired exabyte customers. The industry... Read more

Source: www.esecurityplanet.com

Top found tags: government(2),social media(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Wearable technology - don't let security be the trade-off for mobility and convenienceLocation: Google HQ - Mountain View, United States
Date published: 01-07-2014

Wearable technology is already appearing in the workplace, so get your policies in place now says Sean Newman. Wearable technology - don't let security be the trade-off for mobility and convenience Wearable technology - don't let security be the trade-off for mobility and convenience Wearable techno... Read more

Source: www.scmagazineuk.com

Top found tags: Google(2),Google Glass(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

163k individuals affected in Butler Uni data breachLocation: Butler, United States
Date published: 30-06-2014

Personal and financial information of some 163,000 students, alumni, faculty, staff, and past applicants of Indianapolis-based Butler University have been stolen following a hack of the university's computer network. According to the breach notification letter sent to (potentially) affected individu... Read more

Source: net-security.org

Top found tags: financial sector(2),identity theft(2),education(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers access data on more than 160K Butler University students and staffersLocation: Butler, United States
Date published: 30-06-2014

Around 163,000 Butler University students, alumni, faculty, staff and prospective students are being notified that their personal information including Social Security numbers and bank account information may have been compromised in a hacking incident dating back to 2013. How many victims? ... Read more

Source: www.scmagazine.com

Top found tags: data breach(2),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Butler University data breach affects 163K with school tiesLocation: Butler, United States
Date published: 30-06-2014

Identity thieves may have stolen the information of approximately 163,000 students, faculty, staff, alumni and applicants of Butler University, a school spokesman said.Police contacted Butler officials on May 18 to alert them to an investigation of possible identity theft, according to documents pro... Read more

Source: www.indystar.com

Top found tags: data breach(2),education(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Movers and makers: July - AugustLocation: Target HQ - Minneapolis, United States
Date published: 01-07-2014

Michael Rotert Mover and maker: Michael Rotert Following a decade at McAfee, Ottavio Camponeschi is now heading up Damballa in Rome, Italy as vice president of European sales. Big Brother Watch is recruiting a new director after Nick Pickles left the organisation. Emma Carr is currently the acti... Read more

Source: www.scmagazineuk.com

Top found tags: data breach(2),financial sector(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
News briefs: July - AugustLocation: National Crime Agency - London, United Kingdom
Date published: 01-07-2014

Serious Crime Bill The Serious Crime Bill makes significant changes to the Computer Misuse Act The Queen's Speech in the Houses of Parliament proposed a total of 11 new laws, including a Serious Crime Bill' which will make significant changes to the 1990 Computer Misuse Act. The Serious C... Read more

Source: www.scmagazineuk.com

Top found tags: government(6),cybercrime(7),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Working with third-parties: Make security a priorityLocation: Seoul, South Korea
Date published: 01-07-2014

Thom Langford Thom Langford High-profile data breaches at Target and at three commercial banks in South Korea were attributed to poor security at third-parties, highlighting the risk from outsiders within the company network. Contractors often help organisations to drive cost and productivity gains,... Read more

Source: www.scmagazineuk.com

Top found tags: information security(2),South Korea(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Wireless security risks and defensesLocation: New York Times - New York, United States
Date published: 01-07-2014

In this interview, Kent Lawson, CEO of Private WiFi, talks about the key threats exposed by wireless access, offers protection advice and illustrates the trends that will shape wireless security in the future. What are the key threats exposed by wireless access? What should users be worried about? M... Read more

Source: net-security.org

Top found tags: United States(2),cybercrime(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Retired military sergeant charged with credit card fraudLocation: San Diego, United States
Date published: 30-06-2014

SAN DIEGO A retired Air Force senior master sergeant was charged day with stealing credit cards from fellow service members at numerous San Diego-area military installations, often while they worked out, then using the stolen cards to make unauthorized purchases and get thousands of dollars in c... Read more

Source: fox5sandiego.com

Top found tags: identity theft(2),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Breach BulletinLocation: Iron, United States
Date published: 30-06-2014

Security breaches happen so frequently these days that it is often hard to keep track of who was hacked and what data was at stake. This bulletin is a collection of some of the breaches that came to light in the past weekfrom state websites to foreign banking apps.NRAD Medical Associates Breach ... Read more

Source: www.forbes.com

Top found tags: financial sector(4),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Breach Suit Verdicts Impact Third-PartyLocation: New York, United States
Date published: 30-06-2014

Two recent class action lawsuits herald a shift in how courts view data breach events and the harm they cause. The rulings make it easier for plaintiffs to pursue data breach or class action lawsuits and to recover damages for identity theft and fraud even when theyve experienced no actual mo... Read more

Source: www.claimsjournal.com

Top found tags: identity theft(2),legislation(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Two Brooklyn men face identity theft charges in Park RidgeLocation: Park, United States
Date published: 30-06-2014

PARK RIDGE Two Brooklyn men are accused of identity theft after they allegedly tried to exchange several hundred dollars worth of gift cards for new ones in a borough supermarket Sunday, authorities said.Jeffrey D. Laroche, 30, and Stanley S. Diogene, 22, are charged with various identity theft ... Read more

Source: www.northjersey.com

Top found tags: government(2),identity theft(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Don't score a security own goalLocation: Brasilia-Federal District, Brazil
Date published: 01-07-2014

The truth remains that individuals are the weakest link in the battle against cyber criminals A certain major sporting event is underway this month with the eyes of the world glued to their televisions, smartphones, tablets and laptops looking for the latest news coming out of Brazil and the fate of... Read more

Source: www.information-age.com

Top found tags: data breach(2),cybercrime(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
65 Amazing Quotes To Inspire and Recharge Your ParentingLocation: McAfee - Santa Clara, United States
Date published: 01-07-2014

shutterstock_56156032 copy Todays blog post is going to take a little detour off the main road. Were going to pause from gulping down information and slaying cyber dragons and simply refuel our parenting tanks. So often the best wisdom comes from lands farbeyondour well-traveled parenting ... Read more

Source: blogs.mcafee.com

Top found tags: telecom sector(4),United States(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sooner or Later You'll Get Hacked and Hire a CISOLocation: Target HQ - Minneapolis, United States
Date published: 01-07-2014

I always thought the marketing campaign for AAA was genius; sooner or later youll breakdown and join AAA. A few wise individuals will hand over the cash when they proactively decide to curb their risk, and the rest will find themselves trying to sign up while stranded on the side of the highway. ... Read more

Source: securityweek.com

Top found tags: data breach(2),information security(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Throw Out The Default Rule SetLocation: New York, United States
Date published: 30-06-2014

Many Security Operations Centers (SOCs) find themselves inundated with and overwhelmed by large volumes of false positives, non-actionable alerts, and noise. People often ask me how they can address this situation to improve and strengthen their signal-to-noise ratio. A full answer to this question ... Read more

Source: securityweek.com

Top found tags: EN(1),report(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK transparency report: U.S. spy program targeted 89,000 foreignersLocation: New York, United States
Date published: 30-06-2014

The U.S. targeted 89,000 foreigners or groups in its surveillance efforts in 2013, according to a transparency report released Friday by the Office of the Director of Intelligence in the UK. Incredibly, the government got approval to spy on the targets from a single Section 702 order obtained throug... Read more

Source: www.scmagazine.com

Top found tags: report(1),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security Threat Landscape: June 2014Location: Boston, United States
Date published: 30-06-2014

This month on the security threat landscape, our very own Derek Manky made a visit to Network World in Boston to discuss in-person, with Keith Shaw, the FIRST conference and all the latest trends in the threat landscape. embed(//www.youtube.com/v/uABXtbrGaP8?hl=en_US&version=3&rel=0)... Read more

Source: blog.fortinet.com

Top found tags: EN(1),threat(1),trend(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Supreme Court declines to hear Google's request in Street View lawsuitLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

The U.S. Supreme Court declined to throw out a class-action lawsuit against Google for sniffing Wi-Fi networks with its Street View cars. The Supreme Court on Monday denied Googles request to hear the Street View case after a U.S. appeals court in September refused to throw out the class-action l... Read more

Source: www.pcworld.com

Top found tags: Supreme Court(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Patches Shared Links Vulnerability in DriveLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

Google hasfixed a vulnerability in its Drive cloud storage service that could have exposed certain information about shared links under a particular set of circumstances. Users will need to delete and re-upload relevant files shared on Google Drive in the past in order to limit exposure. The vulne... Read more

Source: threatpost.com

Top found tags: website(1),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researcher Discusses Hacking the Wireless World With Software-Defined RadioLocation: Black Hat - Las Vegas, United States
Date published: 30-06-2014

Sitting in a restaurant waiting to have your name called for a table can require a level of patience a hungry stomach doesn't allow. But what if it were possible to set off the notification pager the restaurant gave you and skip the line? Abusing that pager system is just one example of what securit... Read more

Source: securityweek.com

Top found tags: airport sector(2),conference(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google patches buffer overflow flaw in Android KeyStore serviceLocation: Google HQ - Mountain View, United States
Date published: 30-06-2014

A serious buffer overflow vulnerability in Android's KeyStore storage service, responsible for maintaining cryptographic keys, has been patched. Last week, IBM's security team publicly disclosed details of the bug (CVE-2014-3100), which it alerted Android's security team to last September. As of Nov... Read more

Source: www.scmagazine.com

Top found tags: SMS(1),vulnerability(1),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA chief downplays damage caused by Snowden leaksLocation: Rogers, United States
Date published: 01-07-2014

Admiral Michael S. Rogers. US Navy The US government has been on cleanup duty ever since Edward Snowden leaked a trove of National Security Agency documents last year. However, the agency's new chief, Vice Admiral Michael S. Rogers, said Sunday that the damage caused by the leaks is controllable, ac... Read more

Source: cnet.com.ortal.com

Top found tags: United States(4),government(7),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple ships security fixes for iOS, OS X, Safari ... basically EVERYTHINGLocation: Apple HQ - Cupertino, United States
Date published: 30-06-2014

Adaptable System Recovery (ASR) for Linux virtual machines Apple on Monday shipped new versions of its operating systems, its web browser, and Apple TV firmware with each update a minor release aimed at fixing bugs and closing security vulnerabilities. The latest release of OS X Mavericks, versi... Read more

Source: go.theregister.com

Top found tags: patch(2),United States(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google launches 'cookie choices' site to let Europeans know how they're being trackedLocation: Google HQ - Mountain View, United States
Date published: 01-07-2014

Google launches 'cookie choices' site to let Europeans know how they're being tracked Google has launched a new site, CookieChoices.org, to help visitors of European sites learn more about the digital breadcrumbs they leave behind through cookies. The site includes code that publishers can use to in... Read more

Source: www.pcworld.com

Top found tags: Google(2),telecom sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anti-snoop Android 'Blackphone' sees the light of dayLocation: Google HQ - Mountain View, United States
Date published: 01-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines The Blackphone, a super-secure Android handset promised to arrive in late June has just made its deadline, with the announcement that the first batch started to ship on the last day of the month. The handset is the brainchild of Spanis... Read more

Source: go.theregister.com

Top found tags: Anonymous(2),The Netherlands(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Establishing Your Own Metrics: What to DoLocation: New York, United States
Date published: 01-07-2014

There are two ways to start establishing metrics. One is what I think of as the bottom up approach and the other being top down. For best results you might want to try a bit of both, but depending on your organization and your existing processes it might be easier to go with one or the o... Read more

Source: securityweek.com

Top found tags: patch(1),vulnerability(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MIT and CERN's secure webmail plan stumped by PayPal freezeLocation: PayPal HQ - San Jose, United States
Date published: 01-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines The Proton Mail project, which offers end-to-end encrypted webmail from the user's browser, has had a stick thrust into its operational spokes courtesy of PayPal. The MIT-and-CERN-inspired project, based on Switzerland, had decided against V... Read more

Source: go.theregister.com

Top found tags: RSA(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft sues to take down another malware gangLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

international malware conspiracy. The suit targets two named individuals, a US company and 500 John/Jane Does. The company is Vitalwerks Internet Solutions, LLC, doing business as No-IP.com. No-IP is a dynamic DNS service, normally designed to allow users with dynamic IP addresses to use DNS to poin... Read more

Source: www.zdnet.com

Top found tags: Microsoft(1),njRAT(1),report(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Isolated Heap for Internet Explorer Helps Mitigate UAF ExploitsLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

In the recent Microsoft security bulletinfor Internet Explorer, we found an interesting improvement for mitigating UAF (User After Free) vulnerability exploits. The improvement, which we will name asisolated heap, is designed to prepare an isolated heap for many objects which often suffe... Read more

Source: trendmicro.com

Top found tags: vulnerability(2),telecom sector(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GCSE Computing teachers cry victory as board decides NOT to bin tech teens' workLocation: Cambridge, United Kingdom
Date published: 01-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Frustrated GCSE Computing teachers who battled against OCR's shambolic handling of cheating claims say they are relieved to see the awarding body has finally reached a "common sense" decision on the matter. The exam board, which is part of C... Read more

Source: go.theregister.com

Top found tags: education(2),social media(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New NSA boss plays down impact of Snowden leaksLocation: National Security Agency - Fort Meade, United States
Date published: 01-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Incoming NSA chief Admiral Michael Rogers has played down the impact of the Snowden revelations on the spy agency's work. Former NSA director, General Keith Alexander, described the Snowden leaks as one of the worst breaches in intelligence ... Read more

Source: go.theregister.com

Top found tags: Gen. Keith Alexander(3),government(4),United Kingdom(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA Searched Section 702 Content Data for U.S. Identifiers 198 Times in 2013Location: New York, United States
Date published: 01-07-2014

The U.S. intelligence community historically has been loathe to release virtually any information about the way that its agencies operates, to the point that the existence of some of those agencies themselves was secret for decades. But in the wake of the Snowden leaks, more and more information is ... Read more

Source: threatpost.com

Top found tags: government(4),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook SDK flaw allows unauthorized access to Facebook accountsLocation: Facebook - Menlo Park, United States
Date published: 01-07-2014

MetaIntell has uncovered a significant security vulnerability in the Facebook SDK (V3.15.0) for both iOS and Android. Dubbed Social Login Session Hijacking, when exploited this vulnerability allows an attacker access to a user s Facebook account using a session hijacking method that leverages the Fa... Read more

Source: net-security.org

Top found tags: threat(1),vulnerability(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Toename van brute force-aanvallen op RDPLocation: Kaspersky HQ - Moscow, Russia
Date published: 30-06-2014

Elke dag worden duizenden systemen het doelwit van een brute force-aanval op het Remote Desktop Protocol (RDP) en het aantal is groeiende, zegt anti-virusbedrijf Kaspersky Lab. Via RDP is het mogelijk om op afstand op een computer in te loggen, bijvoorbeeld voor beheer.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: antivirus(2),cybercrime(2),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Hackers hadden toegang tot scada-systemen energiebedrijven'Location: Symantec HQ - Mountain View, United States
Date published: 01-07-2014

Hackers hebben volgens Symantec op grootschalige wijze toegang gehad tot de systemen van diverse Europese en Amerikaanse energiebedrijven. Vooralsnog was spionage het doel, maar het beveiligingsbedrijf zegt dat de hackers ook behoorlijke schade aan hadden kunnen richten. De hackers zouden opereren o... Read more

Source: tweakers.net

Top found tags: Internet Explorer(2),trojan(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Symantec: hackers proberen energievoorziening te saboterenLocation: Symantec HQ - Mountain View, United States
Date published: 01-07-2014

Een groep hackers doet actieve pogingen om te infiltreren in de computersystemen van energiebedrijven, waarschuwt Symantec. De campagne loopt al enige tijd, maar lijkt de afgelopen maanden gentensiveerd te zijn. Symantec identificeert de groep als de de Dragonfly-groep, en ook als Energetic Bear. ... Read more

Source: www.automatiseringgids.nl

Top found tags: trojan(2),malware(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft ontregelt botnets die 7,5 miljoen pc's infecteerdenLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Microsoft heeft een operatie uitgevoerd tegen twee malware-families die bij elkaar zeker 7,5 miljoen computers infecteerden. Het gaat om de Jenxcus en Bladabindi-malware, die voornamelijk via social engineering werden verspreid. Zo gebruikte de malware e-mails, links op sociale media en torrents. Oo... Read more

Source: www.security.nl

Top found tags: social media(2),update(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Havex-malware laat systemen energiebedrijven crashenLocation: Helsinki, Finland
Date published: 01-07-2014

De Havex-malware waarvoor vorige week werd gewaarschuwd en die in de downloads van drie industrile softwareleveranciers zat verstopt, laat de systemen van energiebedrijven crashen. Dat meldt het Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) van de Amerikaanse overheid. Havex ... Read more

Source: www.security.nl

Top found tags: critical infrastructure(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaanse militair krijgt medaille voor programmerenLocation: New York, United States
Date published: 01-07-2014

Een Amerikaanse militair heeft in 2005 een medaille voor zijn programmeerkunsten gekregen, zo laat de soldaat negen jaar later op zijn eigen blog weten. Vivin Paliath was als onderdeel van de Amerikaanse Nationale Garde in Irak gestationeerd en daar verantwoordelijk voor de logistiek en bevoorrading... Read more

Source: www.security.nl

Top found tags: NL(1),report(1),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Microsoft dwarsboomt cyberspionnen met actie tegen No-IP"Location: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

De actie van Microsoft tegen het bedrijf No-IP, waardoor miljoenen websites offline gingen, heeft ook de activiteiten van cyberspionnen gedwarsboomd. Door het optreden wilde Microsoft twee zeer actieve malware-families ontregelen, maar heeft nu ook een aantal spionageoperaties in de wielen gereden. ... Read more

Source: www.security.nl

Top found tags: malware(2),Kaspersky Lab(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Blackphone: traag, onhandig maar wel superveilig (update)Location: KPN HQ - Den Haag, The Netherlands
Date published: 30-06-2014

Maakt de Blackphone zijn beloften op gebied van privacy en beveiliging waar? Techsite Ars Technica kreeg het toestel exclusief in handen en schreef maandag een goedkeurende recensie over de op Android gebaseerde smartphone. Toen leverancier Silent Circle in februari de ultraveilige, maar zeer kostba... Read more

Source: webwereld.nl

Top found tags: Google(2),Google Play(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nieuwe campagne voor ICT'ers bij RijksoverheidLocation: Person, United States
Date published: 01-07-2014

De Rijksoverheid is een nieuwe wervingscampagne gestart voor ICT-professionals. De campagne is afkomstig van het Rotterdamse bureau de PersoneelZaak, onderdeel van BVH Identity Driven Advertising, en heet Het Nederland van nu zoekt nu ICTers. De campagne past in de bredere campagne Werke... Read more

Source: www.automatiseringgids.nl

Top found tags: website(1),cyber security(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CBP wijst gemeenten op privacywetgevingLocation: Amsterdam, The Netherlands
Date published: 01-07-2014

Het College bescherming persoonsgegevens (CBP) heeft in een brief minister Plasterk van Binnenlandse Zaken en Koninkrijksrelaties gewaarschuwd dat gemeenten, nu zij voor meer taken in het sociaal domein verantwoordelijk worden, de bescherming van persoonsgegevens niet uit het oog mogen verliezen. Bi... Read more

Source: www.security.nl

Top found tags: The Netherlands(2),government(4),Ministry of the Interior and Kingdom Relations(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

File Sharing Apps Pose a Significant Data Breach ThreatLocation: New York, United States
Date published: 30-06-2014

According to the results of a recent survey [PDF] of 308 senior IT professionals in the U.S., 46 percent of respondents believe data is leaking from their companies due to the use of unmanaged file sharing products like Box and Dropbox, and fully 84 percent said the use of such "freemium" file shari... Read more

Source: www.esecurityplanet.com

Top found tags: health sector(2),medical sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'NSA mag vrijwel iedereen bespioneren'Location: National Security Agency - Fort Meade, United States
Date published: 30-06-2014

De Amerikaanse inlichtingendienst NSA heeft een veel groter mandaat om informatie over buitenlandse regeringen en internationale instellingen te verzamelen dan tot nu toe bekend was. Dat blijkt uit een lijst die klokkenluider Edward Snowden heeft gelekt en die The Washington Post in handen heeft. Da... Read more

Source: www.nutech.nl

Top found tags: financial sector(2),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'NSA mag vrijwel iedereen bespioneren'Location: National Security Agency - Fort Meade, United States
Date published: 01-07-2014

De Amerikaanse inlichtingendienst NSA heeft een veel groter mandaat om informatie over buitenlandse regeringen en internationale instellingen te verzamelen dan tot nu toe bekend was. Dat blijkt uit een lijst die klokkenluider Edward Snowden heeft gelekt en die The Washington Post in handen heeft. Da... Read more

Source: www.automatiseringgids.nl

Top found tags: financial sector(2),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PayPal bevriest account versleutelde e-maildienst ProtonMailLocation: PayPal HQ - San Jose, United States
Date published: 01-07-2014

PayPal heeft het account bevroren van een nieuwe gratis e-maildienst waarmee mensen versleuteld kunnen e-mailen. De dienst heet ProtonMail en is ontwikkeld met behulp van wetenschappers van Harvard, het Massachusetts Institute of Technology en het Europese onderzoekslaboratorium CERN. De ontwikkelaa... Read more

Source: www.security.nl

Top found tags: e-mail(1),NL(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Miljoenen websites offline door Microsoft-actieLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Een actie die Microsoft tegen twee malware-families uitvoerde heeft ervoor gezorgd dat 4 miljoen legitieme websites offline zijn. Dat beweert No-IP.com, het bedrijf dat doelwit van Microsofts actie was. Microsoft voerde recent een operatie tegen de Jenxcus en Bladabindi-malware uit. Wereldwijd zou d... Read more

Source: www.security.nl

Top found tags: Microsoft(1),NL(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple patcht 75 lekken in iOS, Mac OS X en SafariLocation: Apple HQ - Cupertino, United States
Date published: 01-07-2014

Apple heeft updates voor iOS, Mac OS X en Safari uitgebracht die in totaal 75 beveiligingslekken verhelpen. Via de kwetsbaarheden zou een aanvaller in het ergste geval willekeurige code kunnen uitvoeren. De meeste problemen, 44 bij elkaar opgeteld, werden in iOS 7.1.2 gepatcht. Naast de lekken die e... Read more

Source: www.security.nl

Top found tags: Apple(4),mobile device(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firefox-gebruikers kiezen voor Google ChromeLocation: Mozilla - Mountain View, United States
Date published: 01-07-2014

Het marktaandeel van Mozilla Firefox verkeert nog altijd in zwaar weer, waar de browser in juni het laagste punt in meer dan een jaar tijd bereikte. Firefox-gebruikers lijken vooral op Google Chrome over te stappen, dat vorige maand juist een sterke groei beleefde en op het hoogste punt in een jaar ... Read more

Source: www.security.nl

Top found tags: Google(2),Internet Explorer(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft blijft waarschuwingen toch via e-mail versturenLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Microsoft zal waarschuwingen voor nieuwe beveiligingslekken en aankondigingen van beschikbare updates toch via e-mail blijven versturen. Vorige week verstuurde de softwaregigant nog een e-mail waarin het stelde dat het vanwege nieuwe wetgeving met sommige e-mailwaarschuwingen zou stoppen. Gebruikers... Read more

Source: www.security.nl

Top found tags: NL(1),patch(1),RSS(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Windows XP-gebruikers blijven massaal zittenLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Ook in juni blijkt dat gebruikers van Windows XP massaal zijn blijven zitten, zo beweert marktvorser Net Applications. Ten opzichte van mei bleef het marktaandeel onveranderd op 25,3% staan. Sinds 8 april wordt Windows XP niet meer ondersteund, maar het marktaandeel daalde sinds april met slechts 1%... Read more

Source: www.security.nl

Top found tags: NL(1),research(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware steelt bankwachtwoord door verkeer te sniffenLocation: Berlin, Germany
Date published: 01-07-2014

Onderzoekers hebben een Trojaans paard ontdekt dat het netwerkverkeer snift om inloggegevens voor internetbankieren te stelen. De Emotet-malware verspreidt zich via e-mail en lijkt zich vooral op Duitse internetgebruikers en banken te richten, hoewel ook andere banken kunnen worden aangevallen.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),online banking(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google versimpelt cookiemelding met CookieChoices.orgLocation: Google HQ - Mountain View, United States
Date published: 01-07-2014

Wegens Europese wetgeving die verplicht dat websites toestemming vragen voor het plaatsen van cookies heeft Google een website gelanceerd die websites hiermee helpt. CookieChoices.org biedt webmasters verschillende tools voor het tonen van cookiemeldingen op websites en in apps. Via de code die Goog... Read more

Source: www.security.nl

Top found tags: legislation(1),NL(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Maanden aan gevoelige documenten honkbalclub VS gelektLocation: Houston, United States
Date published: 01-07-2014

De Amerikaanse honkbalclub Houston Astros is het slachtoffer van een inbraak geworden, waarbij een interne database met 10 maanden aan zeer vertrouwelijke gegevens werd gestolen en op internet geplaatst. Het ging om informatie over de aankoop en verkoop van spelers. Naast interne gesprekken bestonde... Read more

Source: www.security.nl

Top found tags: NL(1),website(1),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft laat overheden broncode op backdoors controlerenLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Vandaag is op de Microsoft Campus in Redmond het eerste Microsoft transparantiecentrum geopend, waar overheden de mogelijkheid hebben om de broncode van de belangrijkste Microsoftproducten op de aanwezigheid van backdoors te controleren. Het centrum in Redmond is pas de eerste, aangezien Microsoft v... Read more

Source: www.security.nl

Top found tags: NL(1),backdoor(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beveiliging Outlook.com verder aangescherptLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Om gegevens van gebruikers beter tegen onrechtmatige surveillance door inlichtingendiensten te beschermen heeft Microsoft verschillende maatregelen genomen die de beveiliging van Outlook.com en OneDrive aanscherpen. De maatregelen volgen op onthullingen van klokkenluider Edward Snowden. "We zitten m... Read more

Source: www.security.nl

Top found tags: SSL(1),United States(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Weer cyberverzekering voor bedrijven gelanceerdLocation: ABN Amro HQ - Amsterdam, The Netherlands
Date published: 01-07-2014

Na de cyberverzekering van ABN Amro komt nu ook verzekeringsmakelaar Aon met een cyberpolis. De polis biedt dekking specifiek voor cyberrisico's en is voor organisaties met een omzet tot 50 miljoen euro bedoeld. Volgens Aon zouden bedrijven ten onrechte denken dat ze tegen cyberrisico's zijn verzeke... Read more

Source: www.security.nl

Top found tags: insurance(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PayPal bevriest tegoeden beveiligde maildienst ProtonMailLocation: PayPal HQ - San Jose, United States
Date published: 01-07-2014

PayPal heeft de tegoeden die op het account van de beveiligde maildienst ProtonMail staan bevroren. De Amerikaanse betaaldienst zou twijfelen of ProtonMail legaal is en of het wel over de bevoegdheid beschikt om mails te versleutelen. encryptDe ontwikkelaars zijn naar eigen zeggen geschokt dat ze ni... Read more

Source: tweakers.net

Top found tags: NL(1),RSA (1),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft schroeft beveiliging Outlook.com en OneDrive opLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Microsoft heeft de ondersteuning voor encryptie in Outlook.com en OneDrive verbeterd. E-mails worden nu versleuteld uitgewisseld met andere mailservers en er is in beide diensten nu ondersteuning voor perfect forward secrecy. MicrosoftOnlangs bleek nog uit statistieken van Google dat 69 procent van ... Read more

Source: tweakers.net

Top found tags: website(1),backdoor(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheden gevonden in de LZO en LZ4 algoritmesLocation: Door, United States
Date published: 01-07-2014

Samenvatting: Er zijn een aantal kwetsbaarheid gevonden in de Oberhumer LZO en LZ4 algoritmes. Verschillende fabrikanten hebben updates uitgebracht die deze kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken van de applicatie die gebruikmaakt van de LZO en LZ... Read more

Source: www.ncsc.nl

Top found tags: update (1),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
OpenSUSE verhelpt meerdere kwetsbaarheden in kernelLocation: Amsterdam, The Netherlands
Date published: 01-07-2014

Samenvatting: OpenSUSE heeft meerdere kwetsbaarheden verholpen in de Linux kernel. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende verhoogde gebruikersrechten krijgen en een Denial-of-Service veroorzaken. Beschrijving: - CVE-2013-7339, CVE-2014-3122: Deze kwetsbaarheden staan ... Read more

Source: www.ncsc.nl

Top found tags: NL(1),The Netherlands(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in IBM AIX verholpenLocation: IBM HQ - Armonk, United States
Date published: 01-07-2014

Samenvatting: IBM heeft updates uitgebracht om een kwetsbaarheid in AIX te verhelpen. De kwetsbaarheid kan leiden tot het verhogen van de gebruiksrechten. Gevolgen: Een kwaadwillende gebruiker kan verhoogde rechten verkrijgen. Beschrijving: CVE-2014-3074: Een kwetsbaarheid in de runtime linker stelt... Read more

Source: www.ncsc.nl

Top found tags: NL(1),patch(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in Mac OS XLocation: Apple HQ - Cupertino, United States
Date published: 01-07-2014

Samenvatting: Apple heeft updates uitgebracht voor Mac OS X Mavericks 10.9.3 om een verscheidenheid aan kwetsbaarheden te verhelpen. Gevolgen: Misbruik van de kwetsbaarheden zou kunnen leiden tot: - Het veroorzaken van een Denial-of-Service; - Het op afstand uitvoeren van willekeurige code, al dan n... Read more

Source: www.ncsc.nl

Top found tags: OS X(2),patch(2),update(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in Apple SafariLocation: Door, United States
Date published: 01-07-2014

Samenvatting: Apple heeft meerdere kwetsbaarheden verholpen in Safari voor OS X. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende op afstand een Denial-of-Service veroorzaken, toegang verkrijgen tot gevoelige gegevens, een domeinnaam in de adresbalk spoofen en op afstand code u... Read more

Source: www.ncsc.nl

Top found tags: Apple(2),OS X(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple verhelpt meerdere kwetsbaarheden in iOSLocation: Door, United States
Date published: 01-07-2014

Samenvatting: Apple heeft versie 7.1.2 van iOS uitgebracht waarin meerdere kwetsbaarheden worden verholpen. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende een Denial-of-Service veroorzaken, beveiligingsmaatregelen omzeilen, toegang verkrijgen tot gevoelige gegevens en code ui... Read more

Source: www.ncsc.nl

Top found tags: mobile device(2),telecom sector(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish