Under construction

New design coming soon!

CIC News engine statistics

CIC News for 03-07-2014 contains 143 articles: cybercrime(40),cyber security(54),data breach(7),other(42)

CIC News update contains 115 English and 28 Dutch articles for today.
There are 7 published advisories, 0 are English and 7 are Dutch.
In today's English news articles:
- 32 related to cybercrime
- 46 related to cyber security
- 7 related to data breach and identity theft
- 30 for the category other news

In today's Dutch news articles:
- 8 related to cybercrime
- 8 related to cyber security
- 12 for the category other news

Have fun reading.

English cybercrime related news

Rig Exploit Kit Used in Recent Website CompromiseLocation: Oracle - Redwood City, United States
Date published: 02-07-2014

Last week, it was reported that popular Web portal AskMen.com was compromised to redirect users to a malicious website that hosted the Nuclear Exploit Kit. Symantec has found during investigations that users were also redirected to the Rig Exploit Kit during this attack. The site has since removed t... Read more

Source: www.symantec.com

Top found tags: website(1),Internet Explorer(2),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime Scheme Aims at Payments in BrazilLocation: Brasilia-Federal District, Brazil
Date published: 02-07-2014

SAN FRANCISCO Security researchers have uncovered what they believe is a significant cybercrime operation in Brazil that took aim at $3.75 billion in transactions by Brazilians.It is unclear what percentage of the $3.75 billion worth of compromised transactions was actually stolen. But if even h... Read more

Source: www.nytimes.com

Top found tags: financial sector(2),RSA(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Epic hacker projects compete for a trip to spaceLocation: New York, United States
Date published: 02-07-2014

its maker a trip to space? Hackaday.io True hardware hackers and makers in the open-source movement create for the joy of creation itself, but they probably wouldn't turn down a free trip to space as a reward for their ingenuity, either. That's the basic idea behind the Hackaday Prize, which is offe... Read more

Source: cnet.com.ortal.com

Top found tags: hackers(1),Linux(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Private crypto key stashed in Cisco VoIP manager allows network hijackingLocation: Cisco HQ - San Jose, United States
Date published: 02-07-2014

attackers to control software that large organizations use to manage voice over IP (VoIP) calls and messaging over their networks. The default secure shell (SSH) key made it possible for hackers to gain highly privileged administrative access to the Cisco Unified Communications Domain Manager, the n... Read more

Source: arstechnica.com

Top found tags: backdoor(2),vulnerability(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers turn anti-piracy music industry site into Pirate Bay ProxyLocation: Buenos Aires, Argentina
Date published: 02-07-2014

Hackers turn anti-piracy music industry site into Pirate Bay Proxy. Argentina's equivalent of the Recording Industry Association has found itself the target of hackers, who changed its website into a Pirate Bay proxy. The hacked site displayed torrents instead of its usual offering of industry lobby... Read more

Source: itproportal.com

Top found tags: Russia(1),Ukraine(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Order restored to universe as Microsoft surrenders confiscated No-IP domainsLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

Microsoft has surrendered the 23 domain names it confiscated from dynamic domain hosting service No-IP.com, a move that begins the process of restoring millions of connections that went dark as a result of the highly controversial legal action. At the time this post was being prepared, No-IP had rec... Read more

Source: arstechnica.com

Top found tags: report(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Live open source security lab coming to Cyber Security EXPOLocation: New York, United States
Date published: 03-07-2014

Cyber Security EXPO, part of IP EXPO Europe, is calling for contributors to the Cyber Hack, a live open source security lab arriving at the show this October. The Hack area allows for true industry collaboration, giving you the opportunity to demonstrate hacks in real time and explain to audiences h... Read more

Source: net-security.org

Top found tags: research(1),threat(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Secluded HijackRAT: Monster mobile malware multitool from HELLLocation: Google HQ - Mountain View, United States
Date published: 03-07-2014

Cybercrooks have brewed upa malicious Android app that bundles a raft of banking fraud tricks into a single strain of mobile malware. The Secluded HijackRAT is banking trojan that packs together new and previously unseen tricks, according to net security firm FireEye. The mobile nasty combines pri... Read more

Source: go.theregister.com

Top found tags: Google Play(4),financial sector(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brazilian baddies bank Boleto billionsLocation: Brasilia-Federal District, Brazil
Date published: 03-07-2014

Brazilian bad guys appear to have made an astonishing $US3.75 billion by scraping a tonne of tiny transactions from a popular payment system used by locals, RSA researcher Eli Marcus says. The carders operating a single fraud ring may have netted enough over the last two years to foot 80 percent of ... Read more

Source: go.theregister.com Middle East Cyber Security Market Worth $9.56 Billion by 2019 | he report \" Middle East Cyber Security Market by Technologies (IAM, DLP, UTM, IDS/IPS, Firewall, Risk & Compliance Management, Antivirus, SVM/SIEM, Disaster Recovery, DDOS Mitigation, Encryption, Web Filtering) & by Services - Market Forecasts and Analysis (2014-2019) \" by MarketsandMarkets, segments the Middle East market into various sub-segments with in-depth analysis and forecasting of market size. It also identifies the drivers and restraints for this market with insights into trends, opportunities, and challenges. MarketsandMarkets has segmented the Middle East Cyber Security market by sub markets, by technologies; by types of services: support and maintenance, by types of verticals: BFSI, government and utilities, healthcare, retail, manufacturing, telecom and IT, and education; by countries in this region.Browse 84 market data tables and 12 figures spread through 290 Pages and in-depth TOC on \" Middle East Cyber Security Market - Market Forecasts and Analysis (2014-2019)\"http://www.marketsandmarkets.com/Market-Reports/middle-east-cyber-security-market-121119697.htmlEarly buyers will receive 10% customization on this report. The Middle East region is dominated by large industries such as oil and gas and BFSI. Rapid economic development by these large industries in this region has caused it to become a target for hackers and cyber attackers. Cyber attacks to these large industries such as oil and gas sector has caused massive loss of data and damage to the internal network of these organizations.Cyber security involves the collective use of variety of technologies such as antivirus, intrusion prevention systems, data encryption, firewalls and DDoS mitigation to prevent advanced persistent cyber security threats. Such technologies also ensure business continuity in the event of an attack by effectively isolating systems to prevent the spread of a virus. The modern business organization relies heavily on the internet to reduce geographical barriers and improve business productivity and cyber security ensures security to an organization\'s internal framework from external attacks.Cyber security is becoming an increasingly competitive market with a diverse mix of small and large vendors. The larger vendors in this region are focusing on growth through strategic mergers and acquisitions of smaller vendors. Other growth strategy for large vendors includes expanding their distributor\'s network base.Inquiry before buying @ http://www.marketsandmarkets.com/Enquiry_Before_Buying.asp?id=121119697Major enterprises in this region include energy, utilities, oil and gas which are the major revenue generating industries. These industries are highly dependent on Networks and industrial Control systems. Since from past few years these systems and networks are exposed to internet, making them more vulnerable to cyber attacks. These vulnerabilities are enforcing these industries to adopt latest technological solutions, thereby increasing the growth of cyber security in this region.MarketsandMarkets expects that the Middle East Cyber Security Market is estimated to be $5.17 billion in 2014 and is expected to grow to $9.56 billion in 2019. This represents an estimated Compound Annual Growth Rate (CAGR) of 13.07%% from 2014 to 2019. In the current scenario, Saudi Arabia is expected to be the largest market on the basis of spending and adoption for cyber security solutions and services. | http://www.marketwatch.com/story/middle-east-cyber-security-market-worth-956-billion-by-2019-2014-07-02 | 02-07-2014 | www.marketwatch.com

Top found tags: financial sector(2),RSA(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HACKTIVIST GROUP 'ANONYMOUS' PLANS CYBER WARFARE AGAINST COUNTRIES THAT SUPPORT ISISLocation: Riyad, Saudi Arabia
Date published: 01-07-2014

Hacktivist group Anonymous is said to be planning a series of cyber attacks against countries it accuses of arming and abetting the Islamic State of Iraq and al-Sham (ISIS) militant jihadist group.According to Forbes, the Anonymous campaign will be called Operation NO2ISIS. The hackers will attempt ... Read more

Source: www.breitbart.com

Top found tags: government(2),Saudi Arabia(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICS-CERT sounds alarm on critical infrastructure attacksLocation: Department of Homeland Security - Washington, United States
Date published: 02-07-2014

A shadowy, persistent group of cyberattackers prompted the Department of Homeland Security to issue a series of warnings to electrical infrastructure providers to watch for targeted network compromises.In warnings posted on its website from June 27 to July 1, DHS' Industrial Control Systems Cyber Em... Read more

Source: fcw.com

Top found tags: government(4),telecom sector(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DHS RAISES ALARMS OVER MALWARE TARGETING POWER OPERATIONSLocation: Department of Homeland Security - Washington, United States
Date published: 01-07-2014

The Department of Homeland Security is emphasizing the threat of a hacker operation that already has attacked U.S. and European energy companies and can disrupt power. The group behind the campaign is affiliated with Russia, according to security researchers. On Tuesday, DHS reposted and updated for... Read more

Source: www.nextgov.com

Top found tags: malware(4),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DHS Raises Alarms over Malware Targeting Power OperationsLocation: Department of Homeland Security - Washington, United States
Date published: 02-07-2014

The Homeland Security Department is sounding alarms about a hacker attack against U.S. and European energy companies that could disrupt power.The group behind the campaign is affiliated with Russia, according to security researchers.On Tuesday, DHS officials reposted and updated -- for the third tim... Read more

Source: www.nti.org

Top found tags: DHS(3),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Analysis of a New Banking Trojan Spammed by CutwailLocation: New York, United States
Date published: 02-07-2014

The Cutwail spambot has a long history of sending spam with attached malicious files such as Zbot, Blackhole Exploit Kit and Cryptolocker. Another trick in Cutwails portfolio is to use links pointing to popular file hosting services. Over the past weeks, we have observed spam that claims to be an... Read more

Source: blog.spiderlabs.com

Top found tags: cybercrime(3),exploit kit(4),malware(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrimes shoot up by over 50% across IndiaLocation: New Delhi, India
Date published: 02-07-2014

NEW DELHI: Cybercrimes registered under the IT Act shot up by over 50% across the country between 2012 and 2013, shows the latest data released by the National Crime Records Bureau (NCRB). The maximum offenders came from the 18-30 age group. Among states, the highest incidents of cybercrime took pla... Read more

Source: timesofindia.indiatimes.com

Top found tags: government(2),cybercrime(3),India(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Millions hit by Microsoft cybercrime actionLocation: Microsoft HQ - Redmond, United States
Date published: 01-07-2014

Traffic to millions of servers has been disrupted as Microsoft seeks to shut down persistent cybercriminals.Backed by a court order, the software giant seized control of web domains it said were being used to infect Windows PCs with malware.Microsoft stopped traffic reaching the malicious domains bu... Read more

Source: www.bbc.com

Top found tags: malware(2),Microsoft(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RSA: Brazil's 'Boleto Malware' stole nearly $4 billion in two yearsLocation: RSA HQ - Bedford, United States
Date published: 03-07-2014

RSA researchers released details Wednesday of a botnet crime ring that has reaped an estimated US$3.75 billion through man-in-the-browser attacks that seamlessly intercept payment of Boletos -- Brazil's version of a money order. The Boleto, or Boleto Bancrio, is the second most common form of paym... Read more

Source: www.zdnet.com

Top found tags: government(3),financial sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oh SNAP! Old-school '80s Unix hack to smack OSX, iOS, Red Hat?Location: Apple HQ - Cupertino, United States
Date published: 03-07-2014

Unix-based systems, as used worldwide by sysadmins and cloud providers alike, could be hijacked by hackers abusing a hard-coded vuln that allows them to inject arbitrary commands into shell scripts executed by high-privilege users. A class of vulnerabilities involving so-called wildcards allows a us... Read more

Source: go.theregister.com

Top found tags: OS X(2),responsible disclosure(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA man says agency can track you through POWER LINESLocation: National Security Agency - Fort Meade, United States
Date published: 03-07-2014

Forensics and industry experts have cast doubt on an alleged National Security Agency capability to locate whistle blowers appearing in televised interviews based on how the captured background hum of electrical devices affects energy grids. Divining information from electrified wires is a known tec... Read more

Source: go.theregister.com

Top found tags: United States(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Symantec exposes hackers targeting power gridsLocation: Symantec HQ - Mountain View, United States
Date published: 02-07-2014

More than 1,000 energy companies in Europe and North America have been compromised by an Eastern European hacking collective, according to security company Symantec. Since 2013, the group known as Dragonfly has been targeting organisations that use industrial control systems (ICS) to manage electric... Read more

Source: www.computerweekly.com

Top found tags: critical infrastructure(4),cybercrime(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft under fire over disruptive anti-crime operationLocation: Microsoft HQ - Redmond, United States
Date published: 02-07-2014

Microsoft has come under fire after an operation aimed at taking down a criminal botnet disrupted traffic to millions of legitimate servers. As part of its ongoing campaign against cyber criminals, Microsoft used a federal court order to seize control of web domains it said were being used to infect... Read more

Source: www.computerweekly.com

Top found tags: Microsoft(2),telecom sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brazilian Payment Fraud Campaign Steals BillionsLocation: RSA HQ - Bedford, United States
Date published: 03-07-2014

Hackers are targeting Brazils Boleto payment system, the second most popular payment method in the country, and have conducted hundreds of thousands of fraudulent transactions valued at close to $4 billion. Formally known as Boleto Bancario, Boletos are financial documents issued by banks that ca... Read more

Source: threatpost.com

Top found tags: RSA(2),telecom sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is your smartphone really switched off?Location: Check Point - Tel Aviv, Israel
Date published: 03-07-2014

"Anyone with an understanding of embedded systems could develop the technology to hibernate, rather than switch off, the handset" - Rob Bamforth, Quocirca Is your smartphone really switched off? Is your smartphone really switched off? Ever since Apple's iPhone kick-started the smartphone revolution ... Read more

Source: www.scmagazineuk.com

Top found tags: government(3),mobile device(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft to update Windows, Internet Explorer next weekLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

8, two of them rated critical. Three Windows updates rated important, all for privilege elevation bugs, will also be released. There will also be one update for the "Microsoft Service Bus for Windows Server" rated moderate for a denial of service vulnerability. As is usually the case, Microsoft will... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MP says National Security Strategy must take cyber threat seriouslyLocation: Londen, United Kingdom
Date published: 03-07-2014

Dame Margaret Beckett has criticised the government's National Security Strategy and says that the next version must do more to protect businesses from cyber threats. MP says National Security Strategy must take cyber threat seriously MP says National Security Strategy must take cyber threat serious... Read more

Source: www.scmagazineuk.com

Top found tags: government(2),social media(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
After DNS customer backlash, Microsoft returns seized domains to No-IPLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

Microsoft's plan to take legal action against popular dynamic DNS provider No-IP ran into a major hitch. On Monday, the tech giant announced that it had seized 23 domains registered through No-IP.com, as the service was allegedly being abused by cyber criminals setting up subdomains linked with the ... Read more

Source: www.scmagazine.com

Top found tags: cyber espionage(4),Kaspersky Lab(4),malware(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sneaky Android RAT disables required anti-virus apps to steal banking infoLocation: Google HQ - Mountain View, United States
Date published: 03-07-2014

Researchers find Android security issue in app permissions protocol HijackRAT disables required anti-virus apps in order to manipulate bank apps without detection. Researchers with FireEye have identified HijackRAT, a crafty remote access trojan (RAT) for mobile devices running the Android operating... Read more

Source: www.scmagazine.com

Top found tags: cybercrime(5),financial sector(6),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Another firm sheds light on espionage group hitting energy sectorLocation: F-Secure - Helsinki, Finland
Date published: 03-07-2014

Symantec has released its own analysis of a cyber espionage group targeting industrial organizations in Europe and North America. This week, the security firm confirmed with SCMagazine.com that the attack group, dubbed Dragonfly, was the same perpetrator discussed at length by F-Secure earlier... Read more

Source: www.scmagazine.com

Top found tags: trojan(2),United States(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spear phishers abuse Word programming feature to infect targetsLocation: Williams, United States
Date published: 03-07-2014

Agents with a state online health insurance exchange in Minnesota may have had data compromised. Hackers abused Microsoft's Visual Basic for Applications (VBA) to rig email attachments, Cisco reveals. An attack group with a penchant for high-profit businesses, including those in the banking, oil and... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),phishing(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Infamous Pony Loader Malware Updated to Steal BitcoinsLocation: Damballa - Atlanta, United States
Date published: 02-07-2014

Security firm Damballa recently identified the Pony Loader 2.0 malware and says that a new strain of malware is being sold in the under-ground criminal market which aims to embezzle Bitcoin wallets of victims.The security firm expects that a surge in thefts will take place with the discovery of this... Read more

Source: www.spamfighter.com

Top found tags: trojan(2),update(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why cyber-insurance will be the next big thingLocation: Center for Strategic and International Studies - Washington, United States
Date published: 01-07-2014

Earlier this year, New York City-based staffing agency Clarity bought cyber-insurance for the first time. This spring it added more coverage.\"We were actually hearing about it from our clients,\" said Elizabeth Wade, Clarity's operations manager. \"They were asking us about it and in order to preve... Read more

Source: www.cnbc.com

Top found tags: cybercrime(2),cyber security(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rising Use of Encryption Foiled the Cops a Record 9 Times in 2013Location: New York, United States
Date published: 02-07-2014

The spread of usable encryption tools hasnt exactly made law enforcement wiretaps obsolete. But in a handful of cases over the past yearand more than ever beforeit did shut down cops attempts to eavesdrop on criminal suspects, the latest sign of a slow but steady increase in encryption... Read more

Source: wired.com

Top found tags: telecom sector(4),United States(6),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FireEye Uncovers Android Remote Access MalwareLocation: Google HQ - Mountain View, United States
Date published: 02-07-2014

A new remote access tool has emerged for the Android platform, combining three of the most popular utilities performed by malware on Googles mobile operating system: data leakage, banking credential theft, and of course remote access. The malware presents itself as a Google Service Fra... Read more

Source: threatpost.com

Top found tags: Hong Kong(2),cybercrime(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminals May Have Stolen Billions in Brazilian 'Boletos'Location: RSA HQ - Bedford, United States
Date published: 02-07-2014

RSA Research has identified a malware-based fraud ring targeting Brazil's popular Boleto payment method that may have pilfered billions of dollars from unsuspecting victims. Researchers with RSA, the security division of EMC, said they have discovered a Boleto malware (Bolware) ring that compromised... Read more

Source: securityweek.com

Top found tags: government(2),RSA(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. to Push China on Hacking at High-Level TalksLocation: Beijing, China
Date published: 02-07-2014

WASHINGTON - Washington will push Beijing to crack down on cyber-spying and halt the theft of corporate data when the two powers meet next week for high-level talks, a US diplomat told AFP Wednesday. Concerns about widespread Internet hacking as well as regional maritime tensions will be among a sle... Read more

Source: securityweek.com

Top found tags: government(2),cyber security(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Operation Dragonfly Imperils Industrial ProtocolLocation: Bern, Switzerland
Date published: 02-07-2014

Recent headlines (here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, reportedly destroying a fifth of Irans nuclear... Read more

Source: blogs.mcafee.com

Top found tags: exploit kit(4),cybercrime(5),malware(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: DDoS attacks down, gov't increasingly a targetLocation: Akamai - Boston, United States
Date published: 02-07-2014

Online gambling site hit by five-vector DDoS attack peaking at 100Gbps In its quarterly "State of the Internet" report Akamai observed 283 DDoS attacks in the first quarter of 2014. Distributed denial-of-service (DDoS) attack traffic declined in the first quarter of 2014 and China held on to the top... Read more

Source: www.scmagazine.com

Top found tags: government(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
9 Windows hacks you'll wish you knew earlierLocation: Microsoft HQ - Redmond, United States
Date published: 02-07-2014

PaulMCCooper. 9 Windows hacks you'll wish you knew earlier Windows is incredibly versatile if you know how to use it. We've put together 9 of our favourite shortcuts, tips and tricks to make you Windows experience as smooth and easy as possible. 1. Shake window to minimise This is one of my personal... Read more

Source: itproportal.com

Top found tags: Windows(1),cyber security(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IT departments have a shaky grasp of the most effective security measuresLocation: Sydney, Australia
Date published: 02-07-2014

IT departments have a shaky grasp of the most effective security measures. Research carried out by security firm Avecto (which specialises in Windows privilege management) has found that IT departments are making mistakes when it comes to their perception of the most important elements of an IT secu... Read more

Source: itproportal.com

Top found tags: Ponemon Institute(2),security measures(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government and OU deliver cyber security courseLocation: Park, United States
Date published: 02-07-2014

Government and OU deliver cyber security course. The UK government and the Open University (OU) have partnered to deliver an online cyber security course. Natalie Black, the deputy director of cyber defence at the Cabinet Office, introduced the education programme at the opening tour of Bletchley Pa... Read more

Source: itproportal.com

Top found tags: government(2),United Kingdom(2),education(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft beefs up security in OneDrive and OutlookLocation: Microsoft HQ - Redmond, United States
Date published: 02-07-2014

Microsoft beefs up security in OneDrive and Outlook. Microsoft is increasing the levels of security in some of their major products, reinforcing legal protections and increasing transparency. In a blog post, Microsoft's Matt Thomlinson, vice president, Trustworthy Computing Security, outlined a numb... Read more

Source: itproportal.com

Top found tags: Deutsche Telekom(2),government(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HOLD THE FRONT PAGE: US govt backs mass spying by US govtLocation: Amen, Aa en Hunze, Drenthe, The Netherlands
Date published: 03-07-2014

The US government's Privacy and Civil Liberty Oversight Board (PCLOB) has dealt a blow to opponents of the NSA's surveillance programs in a new report that reaffirms the controversial Section 702 program. The PCLOB said in its official review of the program that 702 represented a "considerable value... Read more

Source: go.theregister.com

Top found tags: Department of Justice(3),government(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Goldman wants Google to delete client-leak e-mailLocation: Google HQ - Mountain View, United States
Date published: 03-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines A Goldman Sachs contractor's inadvertent leak of client data through Gmail has brought the banking giant to a New York court to try and force The Chocolate Factory on a search-and-destroy mission - and Google seems to agree with the bank. Re... Read more

Source: go.theregister.com

Top found tags: cyber security(2),e-mail(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ancient vulnerabilities are geddon in the way of securityLocation: Sydney, Australia
Date published: 03-07-2014

broken behaviour in this industry that we need to go and shift." And he's got numbers to back up his claim. Lyne has been warbiking. That's exactly the same thing as wardriving, that is, driving around a city to map out its open and poorly secured wireless networks, but with more lycra. His results ... Read more

Source: www.zdnet.com

Top found tags: vulnerability(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK's GCHQ Faces Court Action Over 'Illegal' SurveillanceLocation: GCHQ - Cheltenham, United Kingdom
Date published: 03-07-2014

LONDON - Britain's electronic eavesdropping center GCHQ faces legal action from seven internet service providers who accuse it of illegally accessing "potentially millions of people's private communications," campaigners said Wednesday. The claim threatens fresh embarrassment for the British authori... Read more

Source: securityweek.com

Top found tags: government(3),telecom sector(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA Surveillance Led to 100 Arrests: Review ReportLocation: National Security Agency - Fort Meade, United States
Date published: 03-07-2014

WASHINGTON - The US National Security Agency's electronic snooping led to "well over 100 arrests" and helped smash numerous terrorist plots, a privacy review panel said Wednesday. The figures in a 196-page report by the Privacy and Civil Liberties Oversight Board (PCLOB) offer new details on the NSA... Read more

Source: securityweek.com

Top found tags: privacy(2),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
KIVARS With Venom: Targeted Attacks Upgrade with 64-bit SupportLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

In announcing the release of the 64-bit versionfor Chromelast month, Google mentioned thatone of the primary drivers of the move was that majority of Windows users are now using 64-bit operating systems. The adoption rate for 64-bit for Windows has been a tad slower than what Microsoft had ini... Read more

Source: trendmicro.com

Top found tags: Microsoft(2),telecom sector(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware Alert Malware using Dropbox to access C&C settingsLocation: Dropbox - San Francisco, United States
Date published: 02-07-2014

A recent targeted attack against a government agency in Taiwan proved once again that the use of RATs (remote access tools) such as PlugX, PoisonIvy, Gh0st and Hupigon is still common among threat actors. In targeted attacks RATs are used to establish command-and-control (C&C) communications.It has ... Read more

Source: www.cyberoam.com

Top found tags: cybercrime(2),government(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sneaky malware lurks on your computer until you log into your bankLocation: Trend Micro - Cupertino, United States
Date published: 02-07-2014

Banks worldwide have seen about 400 cases of a new malware that silently lurks on browsers until it sees that users are visiting banking websites, and then kicks into high gear to steal information, according to a Tokyo-based antivirus company.The new strain starts with an old tactic: Spam. Messages... Read more

Source: www.marketwatch.com

Top found tags: Trend Micro(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft launches operation against cybercrime rings from Kuwait, AlgeriaLocation: Microsoft HQ - Redmond, United States
Date published: 02-07-2014

BOSTON Microsoft has launched what it hopes will be the most successful private effort to date to crack down on cybercrime by moving to disrupt communications channels between hackers and infected personal computers.The operation, which began on Monday under an order issued by a federal court in... Read more

Source: www.todayonline.com

Top found tags: United States(2),social media(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RSA uncovers scope of cybercrime aimed at payments in BrazilLocation: Brasilia-Federal District, Brazil
Date published: 02-07-2014

SAN FRANCISCO Security researchers have uncovered what they believe is a significant cybercrime operation in Brazil that took aim at billions of dollars in transactions by Brazilians. It is unclear what percentage of the $3.75 billion worth of compromised transactions was actually stolen. But if... Read more

Source: www.telegram.com

Top found tags: United States(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The building blocks of a successful authentication infrastructureLocation: New York, United States
Date published: 03-07-2014

In this interview, Josh Alexander, CEO of Toopher, discusses how an increasingly mobile workforce shapes the way an organization deals with authentication issues, provides advice to a CISO with the task of upgrading an outdated authentication infrastructure, and much more. How does an increasingly m... Read more

Source: net-security.org

Top found tags: cyber security(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Conficker: Still spamming after all these yearsLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

Conficker (which they call DOWNAD, one of a few names for this threat) is still the most common form of malware found in enterprises and small businesses. Conficker was quite a big deal back in late 2008 and early 2009. When Microsoft released MS08-067 ("Vulnerability in Server Service Could Allow R... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),Trend Micro(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Send an email by accident? Sue Google to delete the evidenceLocation: Google HQ - Mountain View, United States
Date published: 03-07-2014

A fat-fingered mistake by a Goldman Sachs contractor has led to the investment banking firm facing off against Google in court to try to get an email containing confidential data deleted from a stranger's account. The saga began last week, when a Goldman contractor began testing changes made within ... Read more

Source: www.zdnet.com

Top found tags: report(1),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Ultra-Simple App That Lets Anyone Encrypt AnythingLocation: Green, United States
Date published: 03-07-2014

Original illustration: Getty Original illustration: Getty Encryption is hard. When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldnt figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video.... Read more

Source: wired.com

Top found tags: telecom sector(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spammers are always thinking up new tricksLocation: Kaspersky HQ - Moscow, Russia
Date published: 03-07-2014

The percentage of spam in email traffic in May averaged 69.8 per cent - 1.3 percentage points less than the previous month. May saw numerous mass mailings for schools and colleges offering distance learning; other spam mailings were more straightforward, simply inviting users to buy a qualification.... Read more

Source: net-security.org

Top found tags: cyber security(4),Kaspersky Lab(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The building blocks of a successful authentication infrastructureLocation: New York, United States
Date published: 03-07-2014

In this interview, Josh Alexander, CEO of Toopher, discusses how an increasingly mobile workforce shapes the way an organization deals with authentication issues, provides advice to a CISO with the task of upgrading an outdated authentication infrastructure, and much more. How does an increasingly m... Read more

Source: net-security.org

Top found tags: cyber security(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Enhanced KIVARS Malware Now Attacks 64-bit SystemsLocation: Trend Micro - Cupertino, United States
Date published: 03-07-2014

64-Bit KIVARS Malware More and more pieces of malware have become capable of targeting users running 64-bit versions of operating systems. One of them is KIVARS, a piece of malware whose 64-bit version was recently analyzed by researchers from Trend Micro. According to the security firm, the Trojan ... Read more

Source: securityweek.com

Top found tags: trojan(2),cybercrime(3),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spam down in May says KasperskyLocation: Kaspersky HQ - Moscow, Russia
Date published: 03-07-2014

The proportion of spam in email traffic fell 1.3 percent from April to May says Kaspersky. The proportion of spam in email traffic fell 1.3 percent from April to May, and is now averaging 69.8 percent, according to the Kaspersky May report on spam. While spam as a proportion of email was lower for t... Read more

Source: www.scmagazineuk.com

Top found tags: antivirus(3),Kaspersky Lab(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
90% of authentication is 'unnecessary'Location: Cambridge University - Cambridge, United Kingdom
Date published: 03-07-2014

A leading cyber security professor and researcher has urged companies to not make users the enemy, and says that a start would be removing layers of 'unnecessary' authentication. 90% of authentication is 'unnecessary' 90% of authentication is 'unnecessary' Professor Angela Sasse, director of the res... Read more

Source: www.scmagazineuk.com

Top found tags: The Netherlands(2),Bruce Schneier(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Privacy board backs NSA's foreign spyingLocation: National Security Agency - Fort Meade, United States
Date published: 03-07-2014

milbul. Privacy board backs NSA's foreign spying A US privacy board has given support to the National Security Agency's foreign spying operations, declaring that they are both legal and effective in combating the threat of terrorism. The Privacy and Civil Liberties Oversight Board (PCLOB) published ... Read more

Source: itproportal.com

Top found tags: NSA(2),United States(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AVG: We need laws to stop biz from tracking our kidsLocation: National Security Agency - Fort Meade, United States
Date published: 03-07-2014

The antivirus giant AVG will today call for legislative action to prevent data-grabbers from spying on children. Yuval Ben-Itzhak, the antivirus firm's chief technical officer, will speak at the Child Internet Safety Summit to call for limits on data-gathering on children's devices. AVG is well know... Read more

Source: go.theregister.com

Top found tags: telecom sector(4),United States(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IoT will become the Army of Things in fight against cybercrimeLocation: Gartner - Stamford, United States
Date published: 03-07-2014

'Under the control of malicious insiders or hacktivists, thieves or terrorists, the IoT could quickly become the Internet of Listeners or the Army of Things' With the rise of the Internet of Things (IoT), the world is becoming connected in ways we could not have previously imagined. Cisco projects t... Read more

Source: www.information-age.com

Top found tags: cyber security(2),ISP(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Physical location of data will become irrelevant by 2020, says GartnerLocation: Gartner - Stamford, United States
Date published: 03-07-2014

The physical location of corporate data will become irrelevant by 2020, replaced by a combination of other criteria, according to a Gartner report. Gartner said the location of where companies store data will become increasingly irrelevant in the post-Prism era, and will be determined by a com... Read more

Source: www.computerweekly.com

Top found tags: government(2),information security(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'CosmicDuke' Malware Emerges as Update to MiniDuke Espionage TrojanLocation: F-Secure - Helsinki, Finland
Date published: 03-07-2014

Even in the world of malware, the one constant is change. According to researchers at Kaspersky Lab and F-Secure, the MiniDuke malware spotted last year targeting governments throughout Europe has been updated. The newest version, nicknamed 'CosmicDuke' by F-Secure, shares code with an even older pi... Read more

Source: securityweek.com

Top found tags: government(3),malware(3),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CISO Perspective: Becoming a Business EnablerLocation: New York, United States
Date published: 03-07-2014

Visibility is Key in Mobile Security: Without it We Cannot Know Where Data is Going, or How its Being Stored... A few years ago while preparing for a talk, I read a statistic about the expected explosive growth of mobile. At the time I did not believe the numbers, but looking back over the last s... Read more

Source: securityweek.com

Top found tags: cyber security(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dragonfly Cyber Attacks Breach Western Energy CompaniesLocation: New York, United States
Date published: 03-07-2014

Symantec security researchers are warning that a group known as Dragonfly or Energetic Bear has compromised several energy grid operators, electricity generation firms, petroleum pipeline operators and industrial equipment providers in the U.S., Spain, France, Italy, Germany, Turkey and Poland. Drag... Read more

Source: www.esecurityplanet.com

Top found tags: critical infrastructure(4),exploit kit(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CosmicDuke malware may hit European governmentsLocation: F-Secure - Helsinki, Finland
Date published: 03-07-2014

A complex variant of the MiniDuke malware - first seen almost 18 months ago and which targets NATO and other European government IT systems - has been spotted. CosmicDuke malware may hit European governments CosmicDuke malware may hit European governments The new code, dubbed an APT (Advanced Persis... Read more

Source: www.scmagazineuk.com

Top found tags: government(3),cyber security(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why traditional antivirus is facing increasing criticismLocation: Google HQ - Mountain View, United States
Date published: 03-07-2014

Traditional antivirus (AV) products have been taking a beating in the media recently, but why? The reason is simple; they cannot and do not protect you from new malware. Why traditional antivirus is facing increasing criticism Why traditional antivirus is facing increasing criticism There are only ... Read more

Source: www.scmagazineuk.com

Top found tags: cybercrime(2),cyber security(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
You CAN'T bust into our login app's password vault, insists RoboformLocation: Google HQ - Mountain View, United States
Date published: 03-07-2014

Password management company RoboForm has tweaked how the mobile version of its password manager works in response to criticism by a security expert. Yet the firm rejects further criticisms that its technology might easily be circumvented. IT security contractor Paul Moore discovered a pair of what h... Read more

Source: go.theregister.com

Top found tags: Google Play(2),mobile device(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Miniduke APT Campaign Returns with New Targets, Hacking ToolsLocation: Kiev, Ukraine
Date published: 03-07-2014

The Miniduke advanced persistent threat (APT) campaign uncovered by researchers at Kaspersky Lab and CrySys Lab in February 2013 is back after a year-long hiatus in which attacks abated almost entirely. While the initial Miniduke operations primarily targeted government organizations in Europe, this... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),cybercrime(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Estimated $3.75bn stolen by Brazil fraud ringLocation: Brasilia-Federal District, Brazil
Date published: 03-07-2014

An estimated $3.75 billion have been netted by a single fraud ring that took advantage of a popular Brazilian payment method - the Boleto - by wielding a frequently upgraded piece of malware that silently intercepted and rerouted payments to the crooks' bank accounts. "Boleto Bancrio, or simply Bo... Read more

Source: net-security.org

Top found tags: RSA(2),social media(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EFF sues NSA in bid for records related to Heartbleed disclosureLocation: National Security Agency - Fort Meade, United States
Date published: 03-07-2014

The Electronic Frontier Foundation (EFF) has filed a lawsuit against the National Security Agency (NSA), accusing the agency of knowing about and exploiting the Heartbleed bug for many years before it was revealed to businesses and the public. The Office of the Director of National Intelligence has ... Read more

Source: www.scmagazine.com

Top found tags: United States(4),government(5),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oversight board supports NSA internet spyingLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

The Privacy and Civil Liberties Oversight Board (PCLOB), which has criticized NSA's collection of call records in its surveillance program, has said that spying on email, Skype and other communications is fine, a discrepancy that has stunned critics. In a 191-page report, the independent oversight g... Read more

Source: www.scmagazine.com

Top found tags: cyber security(2),government(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Butler warns students, staff, alums of data breachLocation: Butler, United States
Date published: 30-06-2014

INDIANAPOLIS - ?? Butler University officials are warning more than 160,000 students, faculty, staff and alumni that hackers may have accessed their personal information.The Indianapolis school learned about the data breach when California officials contacted them last month to inform them that they... Read more

Source: www.fortwayne.com

Top found tags: data breach(2),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Miami Data Breach Victims Want Tighter Regulations, Study SaysLocation: Miami, United States
Date published: 01-07-2014

Miami accounts for twice the number of identity theft complaints as the state per capita average and Florida has the highest rate of any state in the country, said Wifredo Ferrer, South Floridas top federal prosecutor.As data breaches at Target and Neiman Marcus draw international attention, ... Read more

Source: www.govtech.com

Top found tags: identity theft(2),legislation(3),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Over 163,000 Affected by Butler University Data BreachLocation: Butler, United States
Date published: 01-07-2014

More and more, schools and universities have become hotbeds for cyber theft and data breaches. Considering the sheer amount of personal records held within college databases - names, addresses, phone numbers, Social Security Numbers (SSN), email addresses and student loan information - it's no wonde... Read more

Source: www.identityguard.com

Top found tags: identity theft(2),telecom sector(4),education(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BBC finds ambulance service data breachLocation: London, United Kingdom
Date published: 01-07-2014

The South Central Ambulance Service received a Freedom of Information (FOI) request from BBC Radio Berkshire, which revealed how data was leaked on the religion, sexuality, age and insurance details of close to 3,000 members of staff.The BBC said that the breach which occurred in October last ye... Read more

Source: www.acumin.co.uk

Top found tags: cyber security(2),data breach(2),security measures(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Identity Theft is on the RiseLocation: New York, United States
Date published: 02-07-2014

According to the Identity Theft Resource Center, there have been close to 400 data breaches just in 2014. Cybercrime is starting to look routine at this point, but it doesn't make it any less painful for the victims.Identity theft happens whenever someone else uses your name to do anything from open... Read more

Source: www.wdtv.com

Top found tags: financial sector(2),identity theft(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Open Internet Threats Loom: StudyLocation: National Security Agency - Fort Meade, United States
Date published: 03-07-2014

WASHINGTON - The future of an open Internet faces threats from government crackdowns, and "balkanization" resulting from growing concerns over broad electronic surveillance, a survey of experts showed Thursday. The Pew Research Center said a majority of experts and others in the opt-in survey were g... Read more

Source: securityweek.com

Top found tags: NSA(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Remote Access Hack Compromises POS VendorLocation: Potter, United States
Date published: 03-07-2014

A popular point of sale vendor may have suffered a data breach earlier this year that could affect customers of a handful of Pacific Northwest restaurants. Vancouver, Wash.-based Information Systems & Supplies, a supplier of POS systems to restaurants such as Dairy Queen, Buffalo Wild Wings and Taco... Read more

Source: threatpost.com

Top found tags: cyber security(2),data breach(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

OpenSSL speeds up development to avoid being slow-moving and insularLocation: Microsoft HQ - Redmond, United States
Date published: 02-07-2014

The makers of OpenSSL unveiled a new development roadmap this week, saying theopen source project needs to change because it"is increasingly perceived as slow-moving and insular." The inner workings of the poorly funded OpenSSL project came under scrutiny after the discovery of Heartbleed, a sec... Read more

Source: arstechnica.com Malware aims at US, Europe energy sector: researchers | WASHINGTON: Cyberattackers, probably state sponsored, have been targeting energy operations in the United States and Europe since 2011 and were capable of causing significant damage, security researchers said Monday. The US security firm Symantec said it identified malware targeting industrial control systems which could sabotage electric grids, power generators and pipelines. \"The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organisations for spying purposes,\" Symantec said in a blog post. \"If they had used the sabotage capabilities open to them, (they) could have caused damage or disruption to energy supplies in affected countries,\" it added. The researchers said this malware is similar to Stuxnet, a virus believed to have been developed by the United States or Israel to contain threats from Iran. \"Dragonfly bears the hallmarks of a state-sponsored operation, displaying a high degree of technical capability,\" Symantec said. \"Its current main motive appears to be cyberespionage, with potential for sabotage a definite secondary capability.\" Symantec said the Dragonfly, also known as Energetic Bear, appeared to be an operation based in Eastern Europe based on the hours of activity of those involved. It said one of the tools was a Trojan that appeared to have originated in Russia. Officials in the US and elsewhere in recent months have expressed growing concerns about cyberattacks which could cripple critical infrastructure systems such as power grids, dams or transportation systems. The Dragonfly group has used several infection tactics including spam e-mail with malicious attachments, and browser tools which can install malware. Once installed on a victim\'s computer, the malware gathers system information and can extract data from the computer\'s address book and other directories. \"The Dragonfly group is technically adept and able to think strategically,\" Symantec said. \"Given the size of some of its targets, the group found a \'soft underbelly\' by compromising their suppliers, which are invariably smaller, less protected companies.\" | http://www.thestar.com.my/Tech/Tech-News/2014/07/01/Malware-aims-at-US-Europe-energy-sector-researchers/ | 01-07-2014 | www.thestar.com.my

Top found tags: report(1),OpenSSL(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
OpenSSL Project establishes roadmap for future OpenSSL securityLocation: New York, United States
Date published: 02-07-2014

The OpenSSL Project, gatekeepers for the widely used open source encryption software, has been widely criticized in the wake of the Heartbleed vulnerability, but the organization has responded by establishing a roadmap to address some of its longstanding issues and improve communication with its com... Read more

Source: searchsecurity.techtarget.com

Top found tags: vulnerability(1),website(1),OpenSSL(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Running Cisco Unified Comms? Four words you don't want to hear: 'Backdoor SSH root key'Location: Cisco HQ - San Jose, United States
Date published: 02-07-2014

Cisco has warned Unified Communications installations can be remotely hijacked thanks to a hardwired SSH login key. In an advisory, the networking giant said unauthenticated attackers can log into its Unified Communications Domain Manager (Unified CDM) software as a root-level user by exploiting a d... Read more

Source: go.theregister.com

Top found tags: threat(1),vulnerability(1),backdoor(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US government unleashes secret weapon against ISIS: Internet trollingLocation: Twitter - San Francisco, United States
Date published: 02-07-2014

PaulMCCooper. US government unleashes secret weapon against ISIS: Internet trolling The US Department of State (DoS) has begun a campaign of shock and awe against ISIS, the jihadi group currently making startling territorial gains in Northern and Western Iraq. However this time it's not bombs and ta... Read more

Source: itproportal.com

Top found tags: government(2),Saudi Arabia(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBook: Advanced Malware ExposedLocation: New York, United States
Date published: 03-07-2014

Advanced Malware Exposed is a must read for anyone who wants to understand and protect against advanced, persistent threats who are using this new generation of highly sophisticated advanced malware. This eBook providing a broad overview on the major aspects of advanced malware, its underpinnings, i... Read more

Source: net-security.org

Top found tags: EN(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BAE retracts hedge fund hack allegationLocation: Ottawa, Ontario, Canada
Date published: 03-07-2014

BAE Systems Applied Intelligence has retracted allegations of a nasty attack on a hedge fund it floated on Canadian television a couple of weeks ago. The firm today told Bloomberg was just a scenario that it used for illustrative purposes. BAE has promised not to scare us all with hypothetical... Read more

Source: go.theregister.com

Top found tags: Intel(1),Linux(1),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FTC Accuses T-Mobile of Skimming Hundreds of Millions From 'Bogus Charges'Location: Federal Trade Commission - Washington, United States
Date published: 02-07-2014

T-Mobile is making waves again in the telecommunications industry, but unlike previous \"Un-carrier\" shakeups, this one's going to anger some consumers. Federal regulators filed a lawsuit against T-Mobile Tuesday in Seattle, alleging that the nation's fourth-largest carrier burdened customers with ... Read more

Source: www.latinpost.com

Top found tags: government(3),United States(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dragonfly is the latest advance in weaponised malwareLocation: New York, United States
Date published: 02-07-2014

The discovery of the Dragonfly attack pulls back the veil ever so slightly on some of the tradecraft used in modern espionage. If the researchers' conclusions prove even only partially correct, it confirms the adoption of tactics and techniques by nation states or their proxy groups in the use of we... Read more

Source: www.itproportal.com

Top found tags: energy(1),hacking(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian malware targeting U.S. power grid?Location: New York, United States
Date published: 01-07-2014

Jul. 01, 2014 - 5:26 - Risk Control Strategies CEO Paul Viollis, Ph.D., Political Prospect Editor Kayleigh McEnany, Independent Womens Forums Hadley Heath Manning and Accent Asset Managements Scott Martin on the risks to the U.S. energy infrastructure from a Russian malware.... Read more

Source: video.foxbusiness.com

Top found tags: EN(1),Russia(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Top Cybersecurity Tips: Trust but VerifyLocation: New York, United States
Date published: 02-07-2014

The key is in the old saying, \"trust but verify\". Trust your workers, but verify what they are doing on your systems. Trust your security, but verify through penetration testing. Trust your people's training in online security (something ALL employees in every business should be trained in), but v... Read more

Source: www.hacksurfer.com

Top found tags: e-mail(1),EN(1),training(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brazil looking defensively strong at FIFA World Cup with US security robots in placeLocation: Brasilia-Federal District, Brazil
Date published: 03-07-2014

Brazil looking defensively strong at FIFA World Cup with US security robots in. place US-developed bomb-disposal robots are currently present across 12 World Cup stadiums in Brazil to assist security operations during the tournament. The Massachusetts-based robotics company behind the defensive auto... Read more

Source: itproportal.com

Top found tags: Japan(1),police(1),training(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Welsh government: digital delivery plan progressing wellLocation: New York, United States
Date published: 03-07-2014

Welsh government: digital delivery plan progressing well. The Welsh government has published an audit of its 2011 Digital Inclusion Delivery Plan, claiming developments are on track. The Plan set out ambitious targets to ensure as many people as possible in Wales could benefit from being onlin... Read more

Source: itproportal.com

Top found tags: United Kingdom(2),government(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft supports open source software framework for IoTLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

The AllSeen Alliance, the broadest Internet of Everything open-source project, announced that Microsoft has joined the group s multi-company effort as a Premier Member to make it easier for a broad range of everyday devices, objects and services to interoperate seamlessly and intelligently. With the... Read more

Source: net-security.org

Top found tags: Windows(1),Microsoft(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
No-IP reclaims control of domains seized by MicrosoftLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

The end of No-IP customers' troubles seems near, as Microsoft has relinquished control of the 23 domain names it seized control of on Monday with the blessing of a Nevada federal court. Dan Durrer, owner and CEO of Vitalwerks, the company that runs the No-IP dynamic DNS service, has let users know t... Read more

Source: net-security.org

Top found tags: DNS(1),EN(1),Microsoft(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brazil looking defensively strong at FIFA World Cup with US security robots in placeLocation: Brasilia-Federal District, Brazil
Date published: 03-07-2014

Brazil looking defensively strong at FIFA World Cup with US security robots in. place US-developed bomb-disposal robots are currently present across 12 World Cup stadiums in Brazil to assist security operations during the tournament. The Massachusetts-based robotics company behind the defensive auto... Read more

Source: itproportal.com

Top found tags: Japan(1),police(1),training(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Welsh government: digital delivery plan progressing wellLocation: New York, United States
Date published: 03-07-2014

Welsh government: digital delivery plan progressing well. The Welsh government has published an audit of its 2011 Digital Inclusion Delivery Plan, claiming developments are on track. The Plan set out ambitious targets to ensure as many people as possible in Wales could benefit from being onlin... Read more

Source: itproportal.com

Top found tags: United Kingdom(2),government(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EU court orders more transparency over US-EU terrorist finance tracking programLocation: New York, United States
Date published: 03-07-2014

The European Unions top court has ordered EU institutions to lift the veil on negotiations over sending EU citizens banking data to U.S. authorities in an effort to identify and combat terrorism. The U.S. set up the Terrorist Finance Tracking Program following the terrorist attacks of Sept. 11... Read more

Source: www.pcworld.com

Top found tags: EU(4),government(5),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why we're all Facebook's lab ratsLocation: Facebook - Menlo Park, United States
Date published: 03-07-2014

It's long been said that if you're getting something for free online, then you're not the customer, you're the product. It's a reference to the one-sided bargain for personal information that powers so many social businesses - the way that "infomopolies" as I call them exploit the knowledge they acc... Read more

Source: www.zdnet.com

Top found tags: research(1),social media(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco Patches Hardcoded SSH Key Vulnerability in UCMLocation: Cisco HQ - San Jose, United States
Date published: 03-07-2014

The Cisco Unified Communications Domain Manager containsa default private SSH key that could allow an attacker to run arbitrary code on vulnerable installations. The bug is about as serious as they come,giving remote, unauthenticated attackers access to affected machines with the rights of a roo... Read more

Source: threatpost.com

Top found tags: United States(2),vulnerability(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IEEE Launches Anti-Malware Support ServiceLocation: New York, United States
Date published: 03-07-2014

The IEEE launched has launched a new service designed to help the security industry respond more efficiently to the modern malware threat landscape. Announced this week, the new IEEE Anti-Malware Support Service (AMSS), is an initiative of the IEEE Standards Association's (IEEE-SA) Industry Connecti... Read more

Source: securityweek.com

Top found tags: antivirus(2),United States(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft steps up encryption in OutlookLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

Microsoft is now using Transport Layer Security (TLS) encryption for both outbound and inbound email on Outlook.com. In addition to the TLS, Microsoft has enabled Perfect Forward Secrecy (PFS) encryption support for sending and receiving mail between email providers and in its OneDrive service, acco... Read more

Source: www.scmagazine.com

Top found tags: ISP(1),Microsoft(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HotelHippo offline after security pro finds flawsLocation: New York, United States
Date published: 03-07-2014

The HotelHippo hotel booking site has been taken offline after a customer who is a security expert said the site's IT systems were riddled with security flaws, according to his blog post. While trying to book accommodations Steve Helme found that he could access information about others who had prev... Read more

Source: www.scmagazine.com

Top found tags: vulnerability(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google tells UK media which of their stories it is hiding from search resultsLocation: Google HQ - Mountain View, United States
Date published: 03-07-2014

Google has informed several U.K. media which of their news articles it is hiding in search results shown to European Union users as a consequence of a recent EU court ruling that gives people the right to be forgotten by search engines under certain circumstances. The Guardian, the BBC and the... Read more

Source: www.pcworld.com

Top found tags: EU(2),financial sector(2),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Java support over for Windows XPLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

Windows XP. In a FAQ on the Java site the company states that Microsoft's end of support for Windows XP is the reason for Oracle's decision to end support. Users may still run Java 7 at their own risk. Java 8, the next major version, will not be available for Windows XP. In a press release, Morten K... Read more

Source: www.zdnet.com

Top found tags: Windows(1),Microsoft(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Default SSH Private Key Exposes Cisco's VoIP Manager to Remote AttackLocation: Cisco HQ - San Jose, United States
Date published: 03-07-2014

Multiple Vulnerabilities Found in Cisco's VoIP Manager Cisco's enterprise call and session management platform Cisco Unified Communications Domain Manager (Unified CDM) is plagued by three vulnerabilities, the company announced on Wednesday. The first vulnerability (CVE-2014-2198), could be exploite... Read more

Source: securityweek.com

Top found tags: vulnerability(2),United States(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security Vulnerabilities Fixed With Release of Python 2.7.8Location: CGI HQ - Montreal, Canada
Date published: 03-07-2014

Regression and security fixes are included in the latest version of the Python programing language released by the Python Software Foundation on July 1. The developers announced that the OpenSSL version bundled with the Windows installer has been updated to version 1.0.1h, which addresses the recent... Read more

Source: securityweek.com

Top found tags: report(1),vulnerability(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google blocks access to email to prevent 'needless and massive' Goldman Sachs breachLocation: Sac, United States
Date published: 03-07-2014

American multinational investment banking firm Goldman Sachs Group, Inc. said on Wednesday that Google has complied with a request to block access to an email containing confidential client data, which was mistakenly sent by a contractor to a stranger's Gmail account, according to Reuters. The infor... Read more

Source: www.scmagazine.com

Top found tags: Google(1),report(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Inbraak bij leverancier geldautomaten via LogMeIn-accountLocation: Amsterdam, The Netherlands
Date published: 03-07-2014

Een Canadese leverancier van geldautomaten heeft restaurants die klant zijn gewaarschuwd dat creditcardgegevens van hun klanten mogelijk zijn gestolen nadat er bij de leverancier werd ingebroken. Het gaat om de point-of-sale-leverancier Information Systems & Supplies (ISS) uit Vancouver. Het bedrijf... Read more

Source: www.security.nl

Top found tags: NL(1),phishing(1),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beruchte internetworm nog steeds actief door XP-gebruikLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

De beruchte Confickerworm die al sinds eind 2008 rondgaat is nog altijd n van de meest actieve malware waarmee zowel kleine als grote bedrijven mee te maken hebben, omdat ze nog altijd Windows XP gebruiken, zo stelt het Japanse anti-virusbedrijf Trend Micro. Conficker verspreidt zich via een lek... Read more

Source: www.security.nl

Top found tags: trend(2),Trend Micro(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco verminkte beveiliging eigen VOIP managerLocation: Cisco HQ - San Jose, United States
Date published: 03-07-2014

Cisco heeft een beveiligingsupdate uitgebracht voor een lek in de Unified Communications Domain Manager dat hackers in staat stelt zich beheerdersrechten op het systeem toe te kennen. Het lek is ontstaan door dat in de software een standaard SSH-private key is verwerkt die niet is versleuteld, zegt ... Read more

Source: www.automatiseringgids.nl

Top found tags: website(1),patch(3),update(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Inbraak bij leverancier geldautomaten via LogMeIn-accountLocation: Amsterdam, The Netherlands
Date published: 03-07-2014

Een Canadese leverancier van geldautomaten heeft restaurants die klant zijn gewaarschuwd dat creditcardgegevens van hun klanten mogelijk zijn gestolen nadat er bij de leverancier werd ingebroken. Het gaat om de point-of-sale-leverancier Information Systems & Supplies (ISS) uit Vancouver. Het bedrijf... Read more

Source: www.security.nl

Top found tags: NL(1),phishing(1),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beruchte internetworm nog steeds actief door XP-gebruikLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

De beruchte Confickerworm die al sinds eind 2008 rondgaat is nog altijd n van de meest actieve malware waarmee zowel kleine als grote bedrijven mee te maken hebben, omdat ze nog altijd Windows XP gebruiken, zo stelt het Japanse anti-virusbedrijf Trend Micro. Conficker verspreidt zich via een lek... Read more

Source: www.security.nl

Top found tags: trend(2),Trend Micro(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco verminkte beveiliging eigen VOIP managerLocation: Cisco HQ - San Jose, United States
Date published: 03-07-2014

Cisco heeft een beveiligingsupdate uitgebracht voor een lek in de Unified Communications Domain Manager dat hackers in staat stelt zich beheerdersrechten op het systeem toe te kennen. Het lek is ontstaan door dat in de software een standaard SSH-private key is verwerkt die niet is versleuteld, zegt ... Read more

Source: www.automatiseringgids.nl

Top found tags: website(1),patch(3),update(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beveiligingsbedrijf BAE verzint cyberaanval op handelsplatformLocation: Amsterdam, The Netherlands
Date published: 03-07-2014

Het Amerikaanse beveiligingsbedrijf BAE Systems dat onlangs in het nieuws kwam over een cyberaanval op een handelsplatform van een hedge fund blijkt deze aanval te hebben verzonnen. Volgens de IT-beveiliger zouden aanvallers via malware het platform van het bedrijf hebben gesaboteerd. Daardoor konde... Read more

Source: www.security.nl

Top found tags: phishing(2),cybercrime(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
De vijf grootste mythen in cybersecurity ontzenuwdLocation: Amsterdam, The Netherlands
Date published: 03-07-2014

Over cybersecurity gaan allerlei mythen rond die nog steeds regelmatig door beleidsmakers worden aangehaald. Reden voor Wired om de vijf grootste mythen te ontzenuwen. De eerste mythe die Wired op de korrel neemt is dat cybersecurity de grootste uitdaging is waar we mee te maken hebben. Ook in ander... Read more

Source: www.security.nl

Top found tags: The Netherlands(2),cybercrime(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Bank eist dat Google verkeerd gestuurde e-mail verwijdertLocation: Google HQ - Mountain View, United States
Date published: 03-07-2014

De Amerikaanse bank Goldman Sachs heeft Google aangeklaagd omdat het een verkeerd gestuurde e-mail niet wil verwijderen. Een externe partij had vanwege nieuwe wettelijke richtlijnen de interne processen van de bank getest en vervolgens een rapport opgesteld. Dat rapport werd door een fout niet naar ... Read more

Source: www.security.nl

Top found tags: cyber security(2),financial sector(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA-surveillance zou voor 100 arrestaties hebben gezorgdLocation: National Security Agency - Fort Meade, United States
Date published: 03-07-2014

De fel bekritiseerde surveillance door de NSA zou voor meer dan 100 terrorisme-gerelateerde arrestaties hebben gezorgd en tal van terrorismeplannen hebben gedwarsboomd. Dat staat in een 196-pagina's tellend rapport van het Privacy and Civil Liberties Oversight Board (PCLOB). Het PCLOB is een onafhan... Read more

Source: www.security.nl

Top found tags: privacy(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bank eist dat Google verkeerd gestuurde e-mail verwijdertLocation: Google HQ - Mountain View, United States
Date published: 03-07-2014

De Amerikaanse bank Goldman Sachs heeft Google aangeklaagd omdat het een verkeerd gestuurde e-mail niet wil verwijderen. Een externe partij had vanwege nieuwe wettelijke richtlijnen de interne processen van de bank getest en vervolgens een rapport opgesteld. Dat rapport werd door een fout niet naar ... Read more

Source: www.security.nl

Top found tags: cyber security(2),financial sector(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA bestempelt Tor-gebruikers massaal als 'extremist'Location: National Security Agency - Fort Meade, United States
Date published: 03-07-2014

Gebruikers van het anonieme netwerk Tor worden door de NSA massaal bestempeld als 'extremist'. Gegevens van de mensen die de website van Tor bezoeken worden opgeslagen in een database. Dat melden de Duitse radiozenders NDR en WDR op basis van een deel van de broncode van het NSA-spionageprogramma XK... Read more

Source: www.nutech.nl

Top found tags: United States(2),government(3),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EFF: iedereen op internet moet Tor gebruikenLocation: Google HQ - Mountain View, United States
Date published: 03-07-2014

Iedereen op internet zou Tor moeten gebruiken om zijn anonimiteit te beschermen, ook de mensen die zeggen dat ze niets te verbergen hebben. Daarvoor pleit de Amerikaanse burgerrechtenbeweging EFF. Tor is anonimiseringssoftware waarmee internetgebruikers hun IP-adres kunnen verbergen. Daarnaast versl... Read more

Source: www.security.nl

Top found tags: social media(2),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anoniem internetmeldpunt is helemaal niet anoniemLocation: Radboud Universiteit - Nijmegen, The Netherlands
Date published: 03-07-2014

De anonimiteit van melders van misdaden via een internetmeldpunt is niet te garanderen. Technisch moeilijk uitvoerbaar, organisatorisch een uitdaging en er zijn mogelijke schadelijke neveneffecten. Dat staat in een onderzoek door Privacy & Identity lab in samenwerking met de Radboud Universiteit.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: privacy(1),research(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GCHQ sued by ISPs over state-sponsored hackingLocation: GCHQ - Cheltenham, United Kingdom
Date published: 03-07-2014

ISPs and Privacy International seek legal clarification on how far GCHQ can go with its state-sponsored surveillance activities. GCHQ sued by ISPs over state-sponsored hacking GCHQ sued by ISPs over state-sponsored hacking The post-Snowden argument over whether governments should be pro-actively eav... Read more

Source: www.scmagazineuk.com

Top found tags: social media(2),government(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA: Lezers van Linux-site extremistischLocation: National Security Agency - Fort Meade, United States
Date published: 03-07-2014

De NSA ziet Tor-gebruikers als verdacht, want privacybewust gedrag is in de ogen van de dienst maar raar. Ook bezoekers van een Linux-magazine hebben volgens de organisatie blijkbaar niets goeds in de zin. Bezoekers van Linuxjournal.com opgelet, want de NSA ziet dat forum als extremistisch. Dat blij... Read more

Source: webwereld.nl

Top found tags: Jacob Appelbaum(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

MailPoet-plug-in maakt WordPress kwetsbaarLocation: WordPress - San Francisco, United States
Date published: 03-07-2014

WordPress-websites die de plug-in Mailpoet gebruiken zijn kwetsbaar voor aanvallen. Volgens een securitybedrijf kan een aanvaller de kwetsbaarheid gebruiken om, zonder enige privileges of accounts, in te breken en misbruiken. Ongeveer 1,7 miljoen sites lopen risico, maar versie 2.6.7 lost het proble... Read more

Source: www.beveiligingnieuws.nl

Top found tags: vulnerability(1),website(1),WordPress(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
VGZ lekte declaratiegegevens 27.000 verzekerdenLocation: Amsterdam, The Netherlands
Date published: 03-07-2014

Zorgverzekeraar VGZ heeft tijdens het testen van software de declaratiegegevens van ongeveer 27.000 verzekerden jarenlang online toegankelijk gemaakt. Volgens het bedrijf betrof het een menselijke fout, waarbij een medewerker gegevens van verzekerden op een privserver zette.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overheid maakt verstrekken laptops en smartphones aan personeel makkelijkerLocation: New York, United States
Date published: 03-07-2014

Het kabinet presenteert donderdag plannen om de fiscale regels voor het verstrekken van smartphones, tablets en laptops aan personeel te versoepelen. Of werknemers de apparaten ook priv gebruiken wordt minder van belang om in aanmerking voor belastingvoordeel te komen. Staatssecretaris Wiebes van ... Read more

Source: tweakers.net

Top found tags: smartphone(1),The Netherlands(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Schippers wil zorg verbeteren door inzet e-healthLocation: Amsterdam, The Netherlands
Date published: 03-07-2014

Minister Edith Schippers en staatssecretaris Martin van Rijn van Volksgezondheid willen de zorg door het inzetten van e-health verbeteren. De bewindslieden zien veel nieuwe technologien waar mensen veel baat bij zouden kunnen hebben, maar merken dat een brede toepassing nog vaak achterblijft. Daar... Read more

Source: www.security.nl

Top found tags: medical sector(2),The Netherlands(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
No-IP.com moest zwijgen over in beslag genomen domeinenLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

Het bedrijf waar Microsoft 22 domeinen van in beslag nam waardoor miljoenen websites offline gingen moest hier eigenlijk over zwijgen en mocht gebruikers niet waarschuwen. Dat laat de directeur van DDNS-aanbieder No-IP.com weten, een bedrijf dat gratis Dynamische DNS (DDNS)-diensten aanbiedt. Via de... Read more

Source: www.security.nl

Top found tags: Twitter(1),website(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaan aangeklaagd wegens inbraak bij ZendeskLocation: Twitter - San Francisco, United States
Date published: 03-07-2014

Een 25-jarige Amerikaan is in de Verenigde Staten aangeklaagd wegens het inbreken op het netwerk van Zendesk, waar hij vervolgens gegevens van Twitter, Pinterest en Tumblr zou hebben gestolen. Zendesk is een aanbieder van online helpdesksoftware waarmee bedrijven met hun klanten kunnen communiceren.... Read more

Source: www.security.nl

Top found tags: vulnerability(1),website(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware manipuleert Braziliaanse BoletoLocation: Brasilia-Federal District, Brazil
Date published: 03-07-2014

Een zeer populaire betaalmethode in Brazili, de Boleto, is al enkele jaren het doelwit van malware, zo hebben onderzoekers ontdekt. De Boleto Bancrio, of gewoon Boleto, lijkt op een acceptgiro. Winkels kunnen een Boleto uitgeven, waarmee de klant vervolgens van alles kan betalen. Van hypotheek e... Read more

Source: www.security.nl

Top found tags: Windows(1),financial sector(2),RSA(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Tor-gebruikers door NSA aangemerkt als extremisten"Location: National Security Agency - Fort Meade, United States
Date published: 03-07-2014

Wie op het internet naar anonimiseringssoftware zoals Tor en Tails zoekt wordt door de NSA als extremist aangemerkt, zo stellen de Duitse ARD en WDR. De televisiezenders baseren zich op een deel van de broncode van het NSA-surveillanceprogramma XKeyscore, dat vorig jaar werd onthuld. Dit programma z... Read more

Source: www.security.nl

Top found tags: United Kingdom(2),United States(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Schippers wil zorg verbeteren door inzet e-healthLocation: Amsterdam, The Netherlands
Date published: 03-07-2014

Minister Edith Schippers en staatssecretaris Martin van Rijn van Volksgezondheid willen de zorg door het inzetten van e-health verbeteren. De bewindslieden zien veel nieuwe technologien waar mensen veel baat bij zouden kunnen hebben, maar merken dat een brede toepassing nog vaak achterblijft. Daar... Read more

Source: www.security.nl

Top found tags: medical sector(2),The Netherlands(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
No-IP.com moest zwijgen over in beslag genomen domeinenLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

Het bedrijf waar Microsoft 22 domeinen van in beslag nam waardoor miljoenen websites offline gingen moest hier eigenlijk over zwijgen en mocht gebruikers niet waarschuwen. Dat laat de directeur van DDNS-aanbieder No-IP.com weten, een bedrijf dat gratis Dynamische DNS (DDNS)-diensten aanbiedt. Via de... Read more

Source: www.security.nl

Top found tags: Twitter(1),website(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chrome-extensie maakt versleutelen bestanden kinderspelLocation: Google HQ - Mountain View, United States
Date published: 03-07-2014

De maker van de versleutelde chat-app Cryptocat heeft nu een extensie voor Google Chrome ontwikkeld waarmee het kinderspel wordt om bestanden te versleutelen. De door Nadim Kobeissi ontwikkelde extensie heet miniLock en wordt over twee weken tijdens de HOPE hackerconferentie onthuld. Via de extensie... Read more

Source: www.security.nl

Top found tags: conference(2),Google(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'NSA richt zich op internetters die op Tails of Tor zoeken'Location: National Security Agency - Fort Meade, United States
Date published: 03-07-2014

Uit de vermoedelijke plug-in-broncode voor een analysesysteem dat de NSA gebruikt om internetdata te vergaren, zou op te maken zijn dat de spionagedienst zich specifiek richt op gebruikers van en genteresseerden in anonimiseringssoftware als Tor en Tails. Het zou gaan om een plug-in die verband ho... Read more

Source: tweakers.net

Top found tags: e-mail(2),government(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Diverse kwetsbaarheden in dbus verholpenLocation: Amsterdam, The Netherlands
Date published: 03-07-2014

Samenvatting: Een drietal kwetsbaarheden in de dbus messaging daemon geven een kwaadwillende de mogelijkheid een Denial of Service uit te voeren op (delen van) de message bus. Gevolgen: Een aanvaller kan gebruikers de toegang tot een service die gebruik maakt van de dbus daemon ontzeggen of services... Read more

Source: www.ncsc.nl

Top found tags: Linux(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden in IBM Websphere Portal verholpenLocation: IBM HQ - Armonk, United States
Date published: 03-07-2014

Samenvatting: IBM heeft updates uitgebracht om een drietal kwetsbaarheden in Websphere Portal te verhelpen. Gevolgen: Een kwaadwillende kan gevoelige informatie bemachtigen of een Denial-of-Service veroorzaken. Beschrijving: - CVE-2014-0878 Door een kwetsbaarheid in de IBMSecureRandom implementatie ... Read more

Source: www.ncsc.nl

Top found tags: Java(1),NL(1),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden in Apache Tomcat verholpenLocation: Door, United States
Date published: 03-07-2014

Samenvatting: Apache heeft meerdere kwetsbaarheden in Apache Tomcat verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden misbruiken voor het omzeilen van een beveiligingmaatregel, het uitvoeren van een Denial-of-Service of het verkrijgen van gevoelige informatie. Beschrijving: - CVE-2014-007... Read more

Source: www.ncsc.nl

Top found tags: NL(1),vulnerability(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in LibreOfficeLocation: Ubuntu - London, United Kingdom
Date published: 03-07-2014

Samenvatting: LibreOffice heeft updates beschikbaar gesteld die de kwetsbaarheid verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken door malafide LibreOffice bestanden te versturen. Bij het openen wordt mogelijk Macro code uitgevoerd onder gebruikersrechten. Beschrijving: - CVE-2... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in Ruby-on-Rails: Active RecordLocation: Amsterdam, The Netherlands
Date published: 03-07-2014

Samenvatting: Updates voor Ruby-on-Rails: Active Record verhelpen twee kwetsbaarheden. Gevolgen: Een kwaadwillende kan de kwetsbaarheden misbruiken voor het uitvoeren van een SQL-injection aanval en zo mogelijk gevoelige gegevens verkrijgen. Beschrijving: Twee SQL-injectie kwetsbaarheden in de Postg... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ruby(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in PuppetLocation: Amsterdam, The Netherlands
Date published: 03-07-2014

Samenvatting: Nieuwe versies van Puppet lossen een drietal kwetsbaarheden op. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om Nodes zichtbaar of onzichtbaar te maken, willekeurige code uit te voeren onder de rechten van een gebruiker of ingetrokken certificaten toch laten go... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ruby(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in Apache TomcatLocation: IBM HQ - Armonk, United States
Date published: 03-07-2014

Samenvatting: Apache heeft updates uitgegeven om een kwetsbaarheid in Apache Tomcat te verhelpen. Een aanvaller kan de kwetsbaarheid misbruiken om een Denial-of-Service te veroorzaken. Inmiddels is een exploit publiek beschikbaar. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken ... Read more

Source: www.ncsc.nl

Top found tags: NL(1),patch(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish