Under construction

New design coming soon!

CIC News engine statistics

CIC News for 04-07-2014 contains 95 articles: cybercrime(24),cyber security(35),data breach(5),other(31)

CIC News update contains 73 English and 22 Dutch articles for today.
There are 5 published advisories, 0 are English and 5 are Dutch.
In today's English news articles:
- 15 related to cybercrime
- 31 related to cyber security
- 5 related to data breach and identity theft
- 22 for the category other news

In today's Dutch news articles:
- 9 related to cybercrime
- 4 related to cyber security
- 9 for the category other news

Have fun reading.

English cybercrime related news

Israel Army's Twitter account hacked, posts 'incorrect' tweetsLocation: Tel Aviv, Israel
Date published: 04-07-2014

Tensions between Israelis and Palestinians are increasingly escalating as the two sides intensify their ground battle around the Gaza Strip. It appears their conflict has now also been brought online as the Israel Defense Forces Twitter account was hacked on Thursday. The official IDF spokesperson a... Read more

Source: cnet.com.ortal.com

Top found tags: update(2),social media(6),Syrian Electronic Army(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacked Israel Defence Force Twitter account spruiks nuke leak fearsLocation: Damascus, Damascus Governorate, Syria
Date published: 04-07-2014

Hacker outfit the Syrian Electronic Army (SEA) hours ago cracked Israel's Defence Force (IDF) Twitter account where it posted a fake warning of a possible nuclear leak due to rocket strikes. The group posted under the IDF (@IDFSpokesperson) account of a "possible which triggered a brief panic among ... Read more

Source: go.theregister.com

Top found tags: social media(2),cybercrime(3),Syrian Electronic Army(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft to address six issues on TuesdayLocation: Microsoft HQ - Redmond, United States
Date published: 04-07-2014

Microsoft has dropped their July 2014 advance security notification and it looks like a relatively light month of patching. Six issues in total, 2 Critical, 3 Important, 1 Moderate. OS administration teams will be busy, application administrators get the month off. One of the critical issues is an I... Read more

Source: net-security.org

Top found tags: Rapid7(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBook: APT Protection for DummiesLocation: New York, United States
Date published: 04-07-2014

This eBook explains how Advanced Persistent Threat (APT) protection solutions work, and how they can help your organization get the upper hand against adversaries. Well-funded adversaries have a wealth of tools and techniques available to obtain your information, and increase their wealth at your ex... Read more

Source: net-security.org

Top found tags: threat(1),APT(2),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft readies 6 security updates for July Patch TuesdayLocation: Microsoft HQ - Redmond, United States
Date published: 04-07-2014

AlysiaJudge. Microsoft readies 6 security updates for July Patch Tuesday Get ready for a barrage of bulletins in this month's round of Microsoft Patch Tuesday updates. Redmond is issuing six new bulletins to bolster Windows computer systems' security. The July updates, which will be available on 8 J... Read more

Source: itproportal.com

Top found tags: Internet Explorer(2),Microsoft(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brazilian hackers steal up to $3.75bn in what could be the biggest electronic theft in historyLocation: Brasilia-Federal District, Brazil
Date published: 04-07-2014

Brazilian hackers steal up to $3.75bn in what could be the biggest electronic. theft in history One of Brazil's most popular payment methods may have been compromised for over two years according to a US security firm. The heist, which affects Boleto Bancario payments, could have resulted in the the... Read more

Source: itproportal.com

Top found tags: financial sector(2),RSA(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
It's the next war: Protecting the nation's critical infrastructure from cyber attackLocation: Perry, United States
Date published: 03-07-2014

In the age of cyber warfare, security takes on new meaning. You may worry about your email or credit cards getting hacked. But government computer security experts warn of a different, and potentially much more dangerous risk a cyber attack on the nations critical infrastructure. That means p... Read more

Source: www.wptv.com

Top found tags: cyber warfare(2),financial sector(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HP: 'Learn from cyber criminals'Location: Hewlett-Packard - Palo Alto, United States
Date published: 03-07-2014

The IT community needs to learn from cyber criminals, according to a senior HP technologist.HP enterprise security services chief technologist Andrzej Kawalec (pictured above) thinks cyber criminals \"have a competitive advantage\" over the security community because they are more innovative, faster... Read more

Source: www.itwire.com

Top found tags: threat(1),vulnerability(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IoT will become the Army of Things in fight against cybercrimeLocation: New York, United States
Date published: 03-07-2014

With countless new endpoints set to enter the network through the fruition of the Internet of Things, many businesses will turn to public key infrastructure With the rise of the Internet of Things (IoT), the world is becoming connected in ways we could not have previously imagined.Cisco projects tha... Read more

Source: www.information-age.com

Top found tags: threat(1),cybercrime(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
INTERPOL-Europol Cybercrime Conference 2014Location: Brussel, Belgium
Date published: 03-07-2014

Singapore, 1-3 October 2014The 2nd INTERPOL-Europol Cybercrime Conference will be hosted by the INTERPOL Global Complex for Innovation in Singapore.Under the theme \"Cybercrime Investigations: The Full Cycle\", this three-day event will bring together representatives from law enforcement, private se... Read more

Source: www.europol.europa.eu

Top found tags: Singapore(1),cybercrime(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime ring uncovered in BrazilLocation: Brasilia-Federal District, Brazil
Date published: 03-07-2014

SAO PAULO (AP) A massive cybercrime ring in Brazil may have stolen billions of dollars from a widely used online payment system, a technology security company said.The RSA Security division of EMC Corp. said in a research report released on Wednesday that a \"malware-based fraud ring\" had infil... Read more

Source: www.dailymail.co.uk

Top found tags: United States(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police were warned during hacker attackLocation: Den Haag, The Netherlands
Date published: 04-07-2014

Denmark's most devastating hacker attack could have been prevented from escalating if the national police Rigspolitiet and the IT company CSC had reacted to a critical report by Deloitte in June 2012, Politiken reports.By the time Deloitte had warned authorities that their systems were sensitive to ... Read more

Source: cphpost.dk

Top found tags: government(2),police(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Syrian Hacktivists Target Israel Defense ForcesLocation: Damascus, Damascus Governorate, Syria
Date published: 04-07-2014

Pro-Syrian hacktivists of the Syrian Electronic Army have hijacked the official blog and Twitter account of the Israel Defense Forces (IDF), the military forces of Israel. The hackers first targeted the IDF in late June, when they managed to breach and deface its official blog, idfblog.com. The Syri... Read more

Source: securityweek.com

Top found tags: cybercrime(3),social media(4),Syrian Electronic Army(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Privacy board backs NSA's foreign spyingLocation: National Security Agency - Fort Meade, United States
Date published: 03-07-2014

milbul. Privacy board backs NSA's foreign spying A US privacy board has given support to the National Security Agency's foreign spying operations, declaring that they are both legal and effective in combating the threat of terrorism. The Privacy and Civil Liberties Oversight Board (PCLOB) published ... Read more

Source: itproportal.com

Top found tags: NSA(2),United States(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Visited the Tor, Tails or a Linux mag website? You're on the NSA's 'EXTREMIST' listLocation: Berlin, Germany
Date published: 03-07-2014

A detailed analysis of the NSA's XKeyscore snooping software has shown the extent of the paranoid agency's targeting of Tor users, Linux Journal readers and and anyone else interested in online privacy. This sample source code, so we're told, for XKeyscore has been deconstructed by members of the To... Read more

Source: go.theregister.com

Top found tags: Bruce Schneier(4),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Future Apple gumble could lock fanbois out of their own devicesLocation: Apple HQ - Cupertino, United States
Date published: 03-07-2014

Apple has filed a patent for a new location-sensitive security system which could leave fanbois' fumbling to get into their iDevices if they travel to unusual locations. The patent application describes "location-sensitive security levels and setting profiles based on detected location". It's basica... Read more

Source: go.theregister.com

Top found tags: cyber security(2),mobile device(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The NSA Is Targeting Users of Privacy Services, Leaked Code ShowsLocation: National Security Agency - Fort Meade, United States
Date published: 03-07-2014

NSA headquarters in Fort Meade, Maryland. NSA headquarters in Fort Meade, Maryland. [gallery-ca] NSA If you use Tor or any of a number of other privacy services online or even visit their web sites to read about the services, theres a good chance your IP address has been collected and stored by t... Read more

Source: wired.com

Top found tags: United Kingdom(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Your Android phone is a SNITCH: Wi-Fi bug makes you easy to trackLocation: Google HQ - Mountain View, United States
Date published: 03-07-2014

Your mobile device could be compromising your privacy by broadcasting your location history over the air, even when it is in sleep mode, according to new research by the Electronic Frontier Foundation. Of particular concern are newer Android gadgets, specifically those running Android 3.1 "Honeycomb... Read more

Source: go.theregister.com

Top found tags: OS X(2),mobile device(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Feds unmask mystery hacker who hamburgled Burger King Twitter accountLocation: Twitter - San Francisco, United States
Date published: 03-07-2014

Federal prosecutors have charged a previously convicted hacker with illegally accessing millions of records sent by Twitter users requesting technical support. The allegations shed new light into the hijacking of Burger King's Twitter account 17 months ago, a case many assumed had gone cold. Further... Read more

Source: arstechnica.com

Top found tags: social media(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA targets Linux Journal as 'extremist forum': ReportLocation: National Security Agency - Fort Meade, United States
Date published: 04-07-2014

its users have been flagged as "extremists" under the agency's XKeyscore program, according to leaked source code. The source code, which was published this week by German public broadcaster, ARD, also identified at least two German Tor Directory Authority servers one in Berlin, the other in Nur... Read more

Source: www.zdnet.com

Top found tags: telecom sector(2),United States(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Connecting cloud storage services and cloud-based data loss preventionLocation: Berlin, Germany
Date published: 04-07-2014

CoSoSys released a new version of My Endpoint Protector, a cloud-based Data Loss Prevention (DLP) and Mobile Device Management (MDM) solution for both Macs and PCs. The new features provide corporate IT departments with increased data loss and data theft prevention services to keep pace with the gro... Read more

Source: net-security.org

Top found tags: United Kingdom(2),United States(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MiniDuke hackers now targeting drug dealers as well as government agenciesLocation: F-Secure - Helsinki, Finland
Date published: 04-07-2014

MiniDuke hackers now targeting drug dealers as well as government agencies. You may recall the name MiniDuke, a strain of malware which was released at the start of last year, and was used to attack government entities and think-tanks in a number of nations. Well, somewhat confusingly the "old-schoo... Read more

Source: itproportal.com

Top found tags: antivirus(3),government(3),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
So which miscreants wrote the CosmicDuke info-slurping nasty?Location: F-Secure - Helsinki, Finland
Date published: 04-07-2014

Security researchers have uncovered a link between a Trojan and a recently discovered cyber-espionage tool which suggests cyber-spies behind recent attacks on Western governments cut their teeth writing conventional Trojans. CosmicDuke combines elements from the Cosmu Trojan and a backdoor known as ... Read more

Source: go.theregister.com

Top found tags: cybercrime(3),government(3),cyber espionage(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Austrian Tor exit relay operator guilty of ferrying child pornLocation: Weber, United States
Date published: 04-07-2014

An Austrian man has been found guilty after child sex abuse material transited his Tor exit relay. IT administrator William Weber was charged in November last year after state police raided his home confiscating 20 computers, gaming consoles and devices after one of his seven global Tor exit relays ... Read more

Source: go.theregister.com

Top found tags: pornography(3),child pornography(4),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Zero day vulnerabilities equities process under scrutiny in the USLocation: National Security Agency - Fort Meade, United States
Date published: 03-07-2014

Early this week, the Electronic Frontier Foundation, a public advocacy group in the United States, filed a Freedom of Information Act lawsuit against the US National Security Agency and the Office of the Director of National Intelligence, aiming for a ruling that would release documents describing t... Read more

Source: www.scmagazineuk.com

Top found tags: United States(4),government(5),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Major Android privacy flaw leaks location data even when Wi-Fi is offLocation: Google HQ - Mountain View, United States
Date published: 04-07-2014

Major Android privacy flaw leaks location data even when Wi-Fi is off. Google Android smartphones and tablets have a major privacy flaw that broadcasts private location data over Wi-Fi even when the connectivity is switched off and it will take some time for Google to fix the error. Related: 10 apps... Read more

Source: itproportal.com

Top found tags: mobile device(2),smartphone(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Journal that published Facebook emoto-furtling study: Your average boffin gets CONSENTLocation: Facebook - Menlo Park, United States
Date published: 04-07-2014

Facebook's ethical standards do not meet those of most researchers who conduct studies on human subjects, the journal which published the "secret", emotion-manipulative research on nearly 700,000 of its users has said. The journal of the Proceedings of the National Academy of Sciences (PDF), has now... Read more

Source: go.theregister.com Florida woman sentenced for $650K worth of credit card fraud | TAMPA, Fla. A Tampa woman is heading to prison after being found guilty of taking part in a credit card ring led by her boyfriend.On Tuesday, a judge sentenced 25-year-old Danay Crespo-Rodriguez to seven years in federal prison.Authorities say Crespo-Rodriguez and her boyfriend put key loggers on credit card terminals at some stores in Tampa\'s International Plaza.The Tampa Bay Times reports authorities recovered some 4,000 stolen credit card numbers and estimate the loss at more than $650,000.She pleaded guilty in October and was released on bail. Officials said she absconded the next month and was recaptured after being arrested on shoplifting and assault charges at a Tampa store.Officials said others involved in the ring have pleaded guilty or were convicted. One remains a fugitive. | http://www.wesh.com/news/florida-woman-sentenced-for-650k-worth-of-credit-card-fraud/26765666#!8hUlk | 02-07-2014 | www.wesh.com

Top found tags: cyber security(2),social media(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kaspersky, Microsoft In Mix To Help Guide Cybersecurity Federal Procurement ChangesLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

Kaspersky Lab's new federal subsidiary is among Microsoft other vendors, industry groups and service providers offering guidance on proposed federal guidelines governing the acquisition of cybersecurity software and services for critical infrastructure protection.The organizations responded to the G... Read more

Source: www.crn.com

Top found tags: government(2),cyber security(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
THE EVOLUTION OF MALWARE PART THREE: 1993-1999Location: Lea, United States
Date published: 03-07-2014

In my previous article, I explained what happened to the evolution of malware when microcomputers started to become a major presence in small offices and households. That coincided with the exploding popularity of Microsofts MS-DOS and Windows 3.1. The file systems they were based on, FAT16 and l... Read more

Source: www.tripwire.com

Top found tags: Internet Explorer(2),Microsoft(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is India prepared to combat cyber attacks?Location: New York Times - New York, United States
Date published: 03-07-2014

The year 2013 was the year of cyber security breaches. Some of the biggest names in the industry were bitten by the cyber bug including Adobe, New York Times, Facebook, LinkedIn, Twitter, and Federal Reserve Bank among others. A recent study reveals the fact that nearly 110 million customer accounts... Read more

Source: www.dqindia.com

Top found tags: information security(2),cybercrime(6),social media(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NCA, GCHQ partner on cyber security skills programmeLocation: National Crime Agency - London, United Kingdom
Date published: 04-07-2014

The National Crime Agency, GCHQ and InfoSec Skills Ltd are embarking on a new scheme to help close the national 'skills gap' in information security. Together they have produced an ISM Skills Draft which opened to the UK public yesterday. It will train Britain's top information security talent and o... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(2),information security(2),United Kingdom(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber security not a UK boardroom priorityLocation: Davis, United States
Date published: 04-07-2014

New research from consulting firm KPMG claims that cyber security and data protection are only ranked third as priorities in UK boardrooms, following people skills and plant/machinery spending. Cyber security not a UK boardroom priority Cyber security not a UK boardroom priority The annual `Business... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(2),cybercrime(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Germans reveal new NSA XKeyScore internet monitoringLocation: Berlin, Germany
Date published: 04-07-2014

The German software revelation may have come from a second NSA leak/source other than Edward Snowden, says cryptography expert Bruce Schneier. Germans reveal new NSA XKeyScore internet monitoring Germans reveal new NSA XKeyScore internet monitoring All software developers like to refine their code, ... Read more

Source: www.scmagazineuk.com

Top found tags: United States(2),Bruce Schneier(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The top 8 ways that privileged accounts are exploitedLocation: National Security Agency - Fort Meade, United States
Date published: 04-07-2014

Failure to properly monitor and update privileged access is a key vulnerability and Chris Stoneff highlights the leading weaknesses. The top 8 ways that privileged accounts are exploited The top 8 ways that privileged accounts are exploited In the year since his first revelations, the name of Edward... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bletchley Park cyber security centre opensLocation: Park, United States
Date published: 04-07-2014

Bletchley Park, the forerunner to GCHQ and synonymous with the Enigma code breakers of WWII, opened its international cyber-security exhibition earlier this week. Bletchley Park cyber security centre opens Bletchley Park cyber security centre opens The Secrecy and Security Keeping Safe Online... Read more

Source: www.scmagazineuk.com

Top found tags: information security(2),United Kingdom(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ever downloaded or searched for privacy software? Then the NSA is tracking you as an "extremist"Location: National Security Agency - Fort Meade, United States
Date published: 04-07-2014

PaulMCCooper. Ever downloaded or searched for privacy software? Then the NSA is tracking you as an "extremist" The American National Security Agency (NSA) has been tracking anyone who has downloaded or even searched for privacy software such as Tor or the Linux-based operating system Tails, and labe... Read more

Source: itproportal.com

Top found tags: privacy(2),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA successfully targets anyone with a passing interest in TorLocation: National Security Agency - Fort Meade, United States
Date published: 04-07-2014

NSA successfully targets anyone with a passing interest in Tor. The US National Security Agency has successfully infiltrated two servers related to the dark web and gathered the IP addresses of anyone that searched for Tor. Related: Tor creating deep web instant messaging service ARD, the Germ... Read more

Source: itproportal.com

Top found tags: United States(4),government(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Barclays receives Cyber Essentials certification for digital bankingLocation: New York, United States
Date published: 04-07-2014

Barclays bank has announced that it has received the UK government's Cyber Essentials certification for its digital banking services, including MyBarclays, BMB and Pingit. Barclays receives Cyber Essentials certification for digital banking Barclays receives Cyber Essentials certification for digita... Read more

Source: www.scmagazineuk.com

Top found tags: financial sector(2),government(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
InfoSec Skills launches cyber security skills programmeLocation: National Crime Agency - London, United Kingdom
Date published: 04-07-2014

The National Crime Agency, GCHQ and InfoSec Skills Ltd are embarking on a new scheme to help close the national 'skills gap' in information security. Together they have produced an ISM Skills Draft which opened to the UK public yesterday. It will train Britain's top information security talent and o... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(2),information security(2),United Kingdom(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICYMI: Microsoft takedown, policing cybercrime & eyes on Tor and TailsLocation: Microsoft HQ - Redmond, United States
Date published: 04-07-2014

This week's In Case You Missed It (ICYMI) looks at Microsoft's action against cybercriminals, the cyber security skills gap and NSA spying on Tor users. ICYMI: Microsoft takedown, policing cybercrime & eyes on Tor and Tails ICYMI: Microsoft takedown, policing cybercrime & eyes on Tor and Tails Micro... Read more

Source: www.scmagazineuk.com

Top found tags: telecom sector(6),government(8),cybercrime(11)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Microsoft Knocks Botnet, and Four Million Legitimate Users, OfflineLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

On June 30, Microsoft executed a federal court order allowing the company to commandeer domains owned by No-IP.com. The move was an attempt by Microsoft to knock some botnetsnetworks of computers automatically communicating with one another to accomplish a malicious goaloff of the Internet. Mi... Read more

Source: blogs.mcafee.com

Top found tags: social media(4),telecom sector(6),cybercrime(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kentucky Strengthens Data Breach Reporting RequirementsLocation: Kent, United States
Date published: 03-07-2014

The Target data breach in 2013 spurred Kentucky lawmakers to put notification policies in place so that citizens receive timely notice when credit card and other sensitive data is stolen.Data breaches in Kentucky are now governed by two laws that outline how affected parties will be notified if thei... Read more

Source: www.govtech.com

Top found tags: financial sector(2),legislation(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Breaches of Your Personal Data Are Up 20%Location: New York, United States
Date published: 03-07-2014

10.9 million personal records have already been exposed this year.The number of data breaches that have put individuals at risk of identity theft have jumped more than 19 percent so far this year, according to the cybercrime research group Identity Theft Resource Center.The group says data from more... Read more

Source: time.com

Top found tags: identity theft(2),medical sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach stories: Top 10Location: Beijing, China
Date published: 04-07-2014

Security breaches happen all the time but it's the biggest ones that hit the headlines and send ripples through the IT community. Security consultancy TSC Advantage has looked at the top ten breaches from the last five years and what effect they've had.Top of the list is the Adobe hack of 2013, made... Read more

Source: www.itproportal.com

Top found tags: password(1),cyber security(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Most IT Pros Don't Know Where All Corporate Data ResidesLocation: New York, United States
Date published: 04-07-2014

Two recent surveys have found that while the vast majority of IT professionals feel an overwhelming sense of personal responsibility to protect corporate data, very few of them know with any confidence where that data resides. A survey of more than 1,500 IT and IT security professionals, conducted b... Read more

Source: www.esecurityplanet.com

Top found tags: mobile device(2),Ponemon Institute(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

The HP cloud security offeringLocation: Hewlett-Packard - Palo Alto, United States
Date published: 03-07-2014

The HP cloud security offering. With data being one of the most valuable assets to businesses, when it comes to cloud deployments, companies have to get their security just right. Lost, stolen or inaccessible data in the cloud can lead to lost sales, skewed operations, and potentially large fines le... Read more

Source: itproportal.com

Top found tags: Symantec(1),Verizon(1),antivirus(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brazil looking defensively strong at FIFA World Cup with US security robots in placeLocation: Brasilia-Federal District, Brazil
Date published: 03-07-2014

Brazil looking defensively strong at FIFA World Cup with US security robots in. place US-developed bomb-disposal robots are currently present across 12 World Cup stadiums in Brazil to assist security operations during the tournament. The Massachusetts-based robotics company behind the defensive auto... Read more

Source: itproportal.com

Top found tags: Japan(1),police(1),training(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Welsh government: digital delivery plan progressing wellLocation: New York, United States
Date published: 03-07-2014

Welsh government: digital delivery plan progressing well. The Welsh government has published an audit of its 2011 Digital Inclusion Delivery Plan, claiming developments are on track. The Plan set out ambitious targets to ensure as many people as possible in Wales could benefit from being onlin... Read more

Source: itproportal.com

Top found tags: United Kingdom(2),government(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The NSA thinks Linux Journal is an extremist forum?Location: National Security Agency - Fort Meade, United States
Date published: 03-07-2014

Further Reading Report: Rare leaked NSA source code reveals Tor servers targeted NSA says it only gathers such data for "valid foreign intelligence purposes." The National Security Agencys attempts to keep track of people outside the US who use encryption and anonymization software from the Tor P... Read more

Source: arstechnica.com

Top found tags: Jacob Appelbaum(2),NSA(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
T-Mobile CEO reiterates innocence, slams FTC for 'sensationalizing'Location: Federal Trade Commission - Washington, United States
Date published: 03-07-2014

CNET John Legere, T-Mobile's chief executive, again called out the Federal Trade Commission on Thursday, claiming the agency was "sensationalizing" its claims against the cell phone carrier. The FTC filed a complaint Tuesday against the company, alleging T-Mobile has made hundreds of millions of dol... Read more

Source: cnet.com.ortal.com

Top found tags: government(2),United States(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Plans Critical Internet Explorer, Windows Updates for Patch TuesdayLocation: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

Microsoft announced plans today to release six security bulletins as part of this month's Patch Tuesday. Of the six, two are rated 'critical', while three are rated 'important' and one is considered 'moderate.' The updates are for Microsoft Windows, and Microsoft Server Software and Internet Explore... Read more

Source: securityweek.com

Top found tags: Internet Explorer(2),Microsoft(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The HP cloud security offeringLocation: Hewlett-Packard - Palo Alto, United States
Date published: 03-07-2014

The HP cloud security offering. With data being one of the most valuable assets to businesses, when it comes to cloud deployments, companies have to get their security just right. Lost, stolen or inaccessible data in the cloud can lead to lost sales, skewed operations, and potentially large fines le... Read more

Source: itproportal.com

Top found tags: Symantec(1),Verizon(1),antivirus(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Windows users: You get a patch! And you get a patch! And you get a patch! Everybody gets...Location: Microsoft HQ - Redmond, United States
Date published: 03-07-2014

Microsoft has issued its usual warning to admins ahead of this month's Patch Tuesday and servers are getting some serious fixes. Redmond will be pinging out six parcels of patches; two critical batches, three important and one rated moderate the latter covering the service bus for Windows Se... Read more

Source: go.theregister.com

Top found tags: Windows(1),Internet Explorer(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple patent looks to smarten up the iPhone's security lockLocation: Apple HQ - Cupertino, United States
Date published: 04-07-2014

application shows how the smart lock system could detect home devices. US Patent and Trademark Office Smartphone locking is often seen as a necessary but sometimes annoying tool. Punching in a pincode or even using the newer fingerprint scanners can be a pain when just tooling around at home or sitt... Read more

Source: cnet.com.ortal.com

Top found tags: smartphone(2),mobile device(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Big Java security fixes on the way but not so fast, Windows XP usersLocation: Oracle - Redwood City, United States
Date published: 04-07-2014

As if running Windows XP after Microsoft withdrew support wasn't risky enough, XP users who have Java installed may soon have even more to worry about. Oracle is due to issue its next Critical Patch Update the massive, quarterly fix-it fests that deliver security updates across the company's ent... Read more

Source: go.theregister.com

Top found tags: vulnerability(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PANDA chomps through Spotify's DRMLocation: Georgia Institute of Technology - Atlanta, United States
Date published: 04-07-2014

Music can be ripped from Spotify using a tool that cracks digital rights management copyright protection, a Georgia Tech University researcher says. Code dubbed Platform for Architecture-Neutral Dynamic Analysis - aka PANDA - posted to GitHub does the job, says researcher Brendan Doln-Gavitt. "[The ... Read more

Source: go.theregister.com

Top found tags: Google(1),research(1),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What do we want? CAT VIDEOS! How do we get them? TOR!Location: National Security Agency - Fort Meade, United States
Date published: 04-07-2014

The Onion Router project has fired back at the National Security Agency, after it emerged that those who use the network and read Linux magazines are considered worthy of surveillance. Tor's blogged riposte points out that Just learning that somebody visited the Tor or Tails website doesn... Read more

Source: go.theregister.com

Top found tags: government(2),NSA(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crypto thwarts TINY MINORITY of Feds' snooping effortsLocation: London, United Kingdom
Date published: 04-07-2014

US government court-sanctioned wiretaps were sometimes defeated by encryption, according to official figures on law enforcement eavesdropping released this week. State police were unable to circumvent the encryption used by criminal suspects in nine cases last year, while plain text was recovered in... Read more

Source: go.theregister.com

Top found tags: United States(2),government(7),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police bust members of international credit card fraud ringLocation: Jakarta, DKI Jakarta, Indonesia
Date published: 04-07-2014

Three suspected members of an international crime syndicate have been arrested in Greater Jakarta over a series of ATM-card skimming attacks in the country totaling Rp 3.9 billion (US$32,6551).A police investigation found that two Sri Lankan natives, identified as Vinoth and Siva, and Sivas Indon... Read more

Source: www.thejakartapost.com

Top found tags: skimming(1),credit card(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
31 Austrian bank accounts wiped out by Vietnamese piratesLocation: Hanoi, Vietnam
Date published: 04-07-2014

Horn - The latest in ATM fraud has arisen in Horn, Lower Austria, as criminals operating from Vietnam use ATM skimming to wipe out the accounts of 31 bank users, including their overdrafts. They took more than 100,000 euros ($136,000) in cash.Apparently the group involved are specialists in ATM frau... Read more

Source: www.digitaljournal.com

Top found tags: skimming(1),Vietnam(1),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Threatpost News Wrap, July 4, 2014Location: Microsoft HQ - Redmond, United States
Date published: 04-07-2014

Dennis Fisher and Mike Mimoso discuss the Microsoft malware takedown, its legal and security implications and the revelation of a massive financial fraud campaign in Brazil. http://threatpost.com/files/2014/07/digital_underground_157.mp3 Download:digital_underground_157.mp3... Read more

Source: threatpost.com

Top found tags: fraud(1),Microsoft(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
German Agent Suspected of Spying for US: ReportsLocation: Berlin, Germany
Date published: 04-07-2014

BERLIN - An employee of Germany's foreign intelligence service is suspected of spying for Washington on a parliamentary panel probing US surveillance, media reports said Friday. The federal prosecutor general confirmed that a 31-year-old German was arrested Wednesday on suspicion of acting for a for... Read more

Source: securityweek.com

Top found tags: Germany(4),government(7),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Spy-proof' IM launched: Aims to offer anonymity to whistleblowersLocation: New York Times - New York, United States
Date published: 04-07-2014

Security experts have teamed up to created a stealthy internet messenger client designed especially for whistleblowers. The invisible.im project promises an instant messenger that leaves no trace. The team behind the project include Metasploit Founder HD Moore and noted infosec and opsec exper... Read more

Source: go.theregister.com

Top found tags: Windows(1),Anonymous(2),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian Lawmakers Pass New Bill Restricting Internet Data StorageLocation: Twitter - San Francisco, United States
Date published: 04-07-2014

MOSCOW - Russia's parliament passed a bill on Friday requiring Internet companies to store Russians' personal data inside the country in an apparent move to pressure sites such as Facebook and Twitter into handing over user data. Introducing the bill to parliament this week, MP Vadim Dengin said "mo... Read more

Source: securityweek.com

Top found tags: United States(2),government(3),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Beheerder Tox-exitnode veroordeeld wegens kinderpornoLocation: Weber, United States
Date published: 04-07-2014

Een Oostenrijkse systeembeheerder die een Tor-exitnode beheerde waarmee kinderporno werd verspreid is door een Oostenrijkse rechter veroordeeld tot een voorwaardelijke gevangenisstraf van drie jaar. Daarnaast zal William Weber waarschijnlijk 30.000 euro aan proceskosten moeten betalen. Dat laat hij ... Read more

Source: www.security.nl

Top found tags: cyber security(2),financial sector(2),pornography(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gehackte Belgische routerfabrikant verspreidde Havex-malwareLocation: Brussel, Belgium
Date published: 04-07-2014

De aanvallers achter de Havex-malware, die via de officile websites van verschillende industrile softwareleveranciers werd verspreid en het op Europese energiebedrijven had voorzien, gebruikten onder andere de website van de Belgische routerfabrikant eWON voor hun aanval. Dat laat het bedrijf ze... Read more

Source: www.security.nl

Top found tags: update(2),Germany(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Twitteraccount Isralische leger tijdelijk gekaaptLocation: Twitter - San Francisco, United States
Date published: 04-07-2014

Aanvallers zijn erin geslaagd om tijdelijk het officile Twitteraccount van het Isralische leger over te nemen en valse berichten te verspreiden. De aanval werd opgeist door het Syrian Electronic Army (SEA) dat in het verleden ook de Twitteraccounts van allerlei mediaorganisaties wist te kapen.... Read more

Source: www.security.nl

Top found tags: social media(2),cybercrime(3),Syrian Electronic Army(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft dicht dinsdag kritieke lekken in IE en WindowsLocation: Microsoft HQ - Redmond, United States
Date published: 04-07-2014

Microsoft zal aanstaande dinsdag zes beveiligingsupdates uitbrengen voor kritieke lekken in Windows en Internet Explorer. Van de zes updates die uitkomen zijn er twee als kritiek geclassificeerd. Dat houdt in dat een aanvaller zonder al teveel interactie van de gebruiker de computer kan overnemen. H... Read more

Source: www.security.nl

Top found tags: Microsoft(2),patch(2),update(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Politie krijgt 1282 sollicitatiebrieven na Cybercrime ChallengeLocation: Den Haag, The Netherlands
Date published: 04-07-2014

De Cybercrime Challenge die de politie in april lanceerde om nieuw personeel te werven heeft 1282 sollicitatiebrieven opgeleverd. Operation High Impact, zoals de challenge werd genoemd, was ontwikkeld in samenwerking met rechercheurs van het Team High Tech Crime. Deelnemers aan de challenge moeten e... Read more

Source: www.security.nl

Top found tags: Twitter(1),cybercrime(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Opmerkelijke spionagesoftware in Nederland aangetroffenLocation: Kaspersky HQ - Moscow, Russia
Date published: 04-07-2014

Opmerkelijke spionagesoftware, die vorig jaar voor het eerst werd ontdekt en zich onder andere op de Belgische overheid richtte, is ook in Nederland actief geweest of nog steeds actief. Het gaat om de MiniDuke-backdoor, die door het anti-virusbedrijf Kaspersky Lab als zeer opmerkelijk wordt omschrev... Read more

Source: www.security.nl

Top found tags: government(4),Kaspersky Lab(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Populaire videosite Dailymotion verspreidde malwareLocation: Amsterdam, The Netherlands
Date published: 04-07-2014

Op 28 juni is de populaire videosite Dailymotion gebruikt voor het verspreiden van malware, zo laat anti-virusbedrijf Symantec weten. Op de website werd een iframe geplaatst dat een exploitkit van een andere website laadde. Deze exploitkit maakte gebruik van bekende lekken in IE, Flash Player en Jav... Read more

Source: www.security.nl

Top found tags: Symantec(1),website(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beheerder Tor-exitnode veroordeeld wegens kinderpornoLocation: Weber, United States
Date published: 04-07-2014

Een Oostenrijkse systeembeheerder die een Tor-exitnode beheerde waarmee kinderporno werd verspreid is door een Oostenrijkse rechter veroordeeld tot een voorwaardelijke gevangenisstraf van drie jaar. Daarnaast zal William Weber waarschijnlijk 30.000 euro aan proceskosten moeten betalen. Dat laat hij ... Read more

Source: www.security.nl

Top found tags: cyber security(2),financial sector(2),pornography(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stormloop op baan cybercrime-rechercheurLocation: Team High Tech Crime - Driebergen, The Netherlands
Date published: 04-07-2014

Voor een baan als cybercrime-rechercheur bestaat veel belangstelling. Dat blijkt uit cijfers van het Team High Tech Crime (THTC) en de website Tweakers. Zij hadden samen de Cybercrime-Challenge georganiseerd. Wie hieraan meedeed maakte kans op een baan als cybercrime-rechercheur. Meer dan 7000 kandi... Read more

Source: www.automatiseringgids.nl

Top found tags: police(1),website(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

NSA likely targets anybody who's 'Tor-curious'Location: National Security Agency - Fort Meade, United States
Date published: 04-07-2014

Use of common Web privacy tools or even mere curiosity about them could get you added to a National Security Agency watch list, according to a new report. The NSA surveillance program called X-Keyscore, first revealed last summer in documents leaked by Edward Snowden, has been found to contain selec... Read more

Source: cnet.com.ortal.com

Top found tags: telecom sector(4),United States(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Opstelten: FTP-software moet gebruiker waarschuwenLocation: Ministry of Security and Justice - Den Haag, The Netherlands
Date published: 04-07-2014

Aanbieders van software voor FTP-servers moeten gebruikers waarschuwen voor de potentile gevaren die met het gebruik samenhangen, zo vindt minister Opstelten van Veiligheid en Justitie. Opstelten reageert op Kamervragen van VVD-Kamerleden Van Oosten en Dijkhoff over onbeveiligde FTP-servers. Tijde... Read more

Source: www.security.nl

Top found tags: Cyber Security Raad(3),government(4),critical infrastructure(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Privacywaakhond dient klacht in over Facebook-experimentLocation: Facebook - Menlo Park, United States
Date published: 04-07-2014

Het Amerikaanse Electronic Privacy Information Center (EPIC) heeft een formele klacht bij de Federal Trade Commission (FTC) ingediend over een geheim psychologisch experiment dat de sociale netwerksite begin 2012 onder 689.000 gebruikers uitvoerde. Gedurende een week in januari 2012 werden de nieuws... Read more

Source: www.security.nl

Top found tags: social media(2),government(3),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google blokkeert verkeerd verzonden e-mail voor bankLocation: Google HQ - Mountain View, United States
Date published: 04-07-2014

Google heeft gehoor gegeven aan de oproep van de Amerikaanse bank Goldman Sachs om een verkeerd verstuurde e-mail met gevoelige informatie te blokkeren. Een externe partij die door de bank was ingeschakeld had een auditrapport per ongeluk naar het verkeerde e-mailadres gestuurd. In plaats van het ad... Read more

Source: www.security.nl

Top found tags: cyber security(2),financial sector(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Experts bouwen chatprogramma dat geen sporen achterlaatLocation: Amsterdam, The Netherlands
Date published: 04-07-2014

Een groep van beveiligingsexperts is begonnen met de ontwikkeling van een chatprogramma dat geen sporen moet achterlaten, waardoor mensen volledig anoniem met elkaar kunnen chatten en bestanden uitwisselen. De software heet toepasselijk Invisible.im en richt zich op journalisten en klokkenluiders. V... Read more

Source: www.security.nl

Top found tags: research(1),Windows(1),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyberinlichtingendienst AVID en MIVD van startLocation: MIVD - Frederik Kazerne, Den Haag, The Netherlands
Date published: 04-07-2014

De gezamenlijke cyberinlichtingendienst van de Algemene Inlichtingen- en Veiligheidsdienst (AIVD) en Militaire Inlichtingen- en Veiligheidsdienst (MIVD) die eind 2012 werd aangekondigd is nu officieel van start gegaan, zo laat de AIVD weten. De Joint Sigint Cyber Unit (JSCU) richt zich op het besche... Read more

Source: www.security.nl

Top found tags: MIVD(2),The Netherlands(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oracle blijft Java 7 op Windows XP van patches voorzienLocation: Oracle - Redwood City, United States
Date published: 04-07-2014

Oracle blijft gebruikers van Java 7 op Windows XP gewoon van updates voorzien, zo heeft het bedrijf laten weten. Het was al langer bekend dat Oracle op de eigen website meldde dat Windows XP niet meer werd ondersteund, aangezien ook Microsoft de ondersteuning van XP heeft stopgezet. "Gebruikers kunn... Read more

Source: www.security.nl

Top found tags: Microsoft(2),patch(3),update(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaanse politie komt 41 keer encryptie tegen bij aftappenLocation: Den Haag, The Netherlands
Date published: 04-07-2014

De Amerikaanse politie liep vorig jaar bij het aftappen van verdachten 41 keer tegen encryptie aan, een stijging ten opzichte van 2012, toen encryptie nog 15 keer werd aangetroffen. Dat laat het Administrative Office van de Amerikaanse rechtbanken in het Wiretap Report van 2013 weten. Het rapport om... Read more

Source: www.security.nl

Top found tags: government(2),report(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vast wachtwoord opent Netgear switch voor aanvallersLocation: Amsterdam, The Netherlands
Date published: 04-07-2014

Onderzoekers hebben in de Netgear GS108PE Prosafe Plus Switch een niet te wijzigen wachtwoord ontdekt waardoor een aanvaller zijn eigen code op het apparaat kan uitvoeren. De switch, die ook in Nederland wordt verkocht, beschikt over een "hard- coded" wachtwoord. Met dit vaste wachtwoord is het moge... Read more

Source: www.security.nl

Top found tags: government(1),NL(1),webserver(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oud-topman NSA noemt inlichtingendienst 'totalitair'Location: Berlin, Germany
Date published: 04-07-2014

William Binney, voormalig technisch directeur van de NSA, noemt de Amerikaanse inlichtingendienst een 'totalitaire' organisatie. Dat deed hij tijdens een getuigenis tegenover de Bondsdag, het Duitse parlement, aldus Deutsche Welle. Binney beschuldigde de NSA van een "totalitaire mentaliteit" die de ... Read more

Source: www.nutech.nl

Top found tags: research(1),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Locatiegegevens Android-gebruikers te achterhalen via WiFiLocation: Google HQ - Mountain View, United States
Date published: 04-07-2014

Uit het onderzoek van de EFF blijkt dat een functie in Android ervoor zorgt dat gegevens over gebruikte WiFi-netwerken te achterhalen zijn. Deze functie verzendt constant de namen van netwerken waarmee een smartphone of tablet in het verleden is verbonden. In potentie zijn daardoor ook gegevens over... Read more

Source: www.beveiligingnieuws.nl

Top found tags: research(1),smartphone(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Duits geheim agent opgepakt wegens spioneren voor VSLocation: Berlin, Germany
Date published: 04-07-2014

Een medewerker van de Duitse geheime dienst Bundesnachrichtendienst (BND) is in Duitsland aangehouden op verdenking van het spioneren voor de Verenigde Staten. De man zou informatie over een parlementair comit hebben verzameld dat de beschuldigingen van spionage door de NSA onderzoekt. Volgens het... Read more

Source: www.security.nl

Top found tags: research(1),Germany(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
KPN en Fon starten uitrol landelijk wifi-netwerkLocation: KPN HQ - Den Haag, The Netherlands
Date published: 04-07-2014

KPN is samen met wifi-aanbieder Fon de uitrol van een landelijk wifi-netwerk gestart, zo laat de provider weten. Klanten die een deel van hun eigen wifi-verbinding met andere gebruikers delen kunnen straks gratis internetten op alle Fon hotspots wereldwijd. Er zijn nu ongeveer 13 miljoen van deze ho... Read more

Source: www.security.nl

Top found tags: wireless(1),update(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheden verholpen in PHPLocation: Hewlett-Packard - Palo Alto, United States
Date published: 04-07-2014

Samenvatting: Er zijn updates uitgebracht om kwetsbaarheden in PHP 5.4 te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden misbruiken om verhoogde gebruikersrechten te verkrijgen, willekeurige code uit te voeren of om een Denial-of-Service te veroorzaken. Beschrijving: CVE-2014-0185 Door... Read more

Source: www.ncsc.nl

Top found tags: PHP(1),Ubuntu(1),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Geheugenlek verholpen in XenLocation: Amsterdam, The Netherlands
Date published: 04-07-2014

Samenvatting: Er bevindt zich een kwetsbaarheid in Xen die gebruikers op gastsystemen in staat stelt om delen van het geheugen van de hypervisor in te zien. Xen heeft updates uitgebracht om deze kwetsbaarheid te verhelpen. Gevolgen: Misbruik van de kwetsbaarheid stelt kwaadwillenden in staat om in b... Read more

Source: www.ncsc.nl

Top found tags: NL(1),patch(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
XSS kwetsbaarheid in apt-cachar-ng voor Fedora 20Location: Amsterdam, The Netherlands
Date published: 04-07-2014

Samenvatting: In apt-cacher-ng voor Fedora 20 is een XSS kwetsbaarheid gevonden. Fedora heeft updates uitgebracht om deze kwetsbaarheid te verhelpen. Gevolgen: Een aanvaller kan de kwetsbaarheid misbruiken voor het uitvoeren van een Cross-Site Scripting (XSS) aanval. Een dergelijke aanval kan leiden... Read more

Source: www.ncsc.nl

Top found tags: website(1),XSS(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden in Apache Tomcat verholpenLocation: Door, United States
Date published: 04-07-2014

Samenvatting: Apache heeft meerdere kwetsbaarheden in Apache Tomcat verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden misbruiken voor het omzeilen van een beveiligingmaatregel, het uitvoeren van een Denial-of-Service of het verkrijgen van gevoelige informatie. Beschrijving: - CVE-2014-007... Read more

Source: www.ncsc.nl

Top found tags: NL(1),vulnerability(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden in dbus verholpenLocation: Amsterdam, The Netherlands
Date published: 04-07-2014

Samenvatting: Een drietal kwetsbaarheden in de dbus messaging daemon geven een kwaadwillende de mogelijkheid een Denial of Service uit te voeren op (delen van) de message bus. Gevolgen: Een aanvaller kan gebruikers de toegang tot een service die gebruik maakt van de dbus daemon ontzeggen of services... Read more

Source: www.ncsc.nl

Top found tags: Linux(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish