Under construction

New design coming soon!

CIC News engine statistics

CIC News for 08-07-2014 contains 119 articles: cybercrime(43),cyber security(30),data breach(12),other(34)

CIC News update contains 94 English and 25 Dutch articles for today.
There are 5 published advisories, 0 are English and 5 are Dutch.
In today's English news articles:
- 33 related to cybercrime
- 27 related to cyber security
- 12 related to data breach and identity theft
- 22 for the category other news

In today's Dutch news articles:
- 10 related to cybercrime
- 3 related to cyber security
- 12 for the category other news

Have fun reading.

English cybercrime related news

Motives Behind Havex ICS Malware Campaign Remain a MysteryLocation: Bond, United States
Date published: 07-07-2014

Since Stuxnet there have been fewconfirmed reports of malware targeting particular industrial control system software. But now we have a campaign using the Havex remote access Trojan that has three European energy sector vendors in its crosshairsor does it? The outbreak, reported by security ve... Read more

Source: threatpost.com

Top found tags: ICS(3),cybercrime(4),critical infrastructure(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Biohackers crowdfund milk-protein vegan cheese, minus the cowsLocation: Real, United States
Date published: 07-07-2014

sage derby cheeseThis sage Derby cheese may someday be replaced with a vegan alternative.Jon Sulivan Cheese is one of the harder foods to replicate in vegan form, as it's a challenge to match traditional cheeses when it comes to taste, texture, and melting ability. While many vegan cheeses use soy m... Read more

Source: cnet.com.ortal.com

Top found tags: research(1),SMS(1),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
When Adware Go Bad: The Installbrain and Sefnit ConnectionLocation: Kiev, Ukraine
Date published: 07-07-2014

sefnit_mevade1 Figure 1. Motto taken from the InstallBrain website (http:// www.installbrain.com) on July 3 2014 Monetize On Non-buyers is the bold motto of InstallBrainadware that turns out to have been developed by an Israeli company called iBario Ltd. This motto clearly summarizes the... Read more

Source: trendmicro.com

Top found tags: Trend Micro(2),trojan(2),Ukraine(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Advanced attack group Deep Panda uses PowerShell to breach think tanksLocation: Microsoft HQ - Redmond, United States
Date published: 07-07-2014

Advanced attack group Deep Panda uses PowerShell to breach think tanks Advanced attack group Deep Panda uses PowerShell to target sensitive data about politcal affairs in Iraq. An advanced nation-state attack group in China is spying on new victims, and making use of Windows PowerShell to infiltrate... Read more

Source: www.scmagazine.com

Top found tags: United States(2),malware(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft plans six Patch Tuesday fixes, RCE bugs in 'critical' batchLocation: Microsoft HQ - Redmond, United States
Date published: 07-07-2014

Microsoft warns of attacks leveraging Word zero-day, releases temp fix Remote code execution (RCE) flaws in Windows and IE will receive top priority this month. Ahead of Tuesday's monthly security update, Microsoft has previewed six patches, which will address vulnerabilities in its Windows, Interne... Read more

Source: www.scmagazine.com

Top found tags: update(2),vulnerability(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese hackers turned focus to U.S. experts on Iraq: security firmLocation: New York, United States
Date published: 08-07-2014

SAN FRANCISCO (Reuters) - A sophisticated group of hackers believed to be associated with the Chinese government, who for years targeted U.S experts on Asian geopolitical matters, suddenly began breaching computers of experts on Iraq as the rebellion there escalated, a security firm said on Monday. ... Read more

Source: reuters.com

Top found tags: China(2),government(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CryptoWall Ransomware Built With RC4 BricksLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

Last month many Internet users were suddenly forced to trade in Bitcoins. This was not for general purposesthey were paying to get their data back. Their systems had been hijacked by ransomware. Ransomware is a type of malware that infects a machine, locks data files or the entire system, and dem... Read more

Source: blogs.mcafee.com

Top found tags: Windows(1),financial sector(2),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IEEE expands malware initiativesLocation: Trend Micro - Cupertino, United States
Date published: 08-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Standards body the IEEE has launched two new anti-malware initiatives designed to help software and security vendors spot malware that's been inserted into other software, and improve the performance of malware detection by cutting down on f... Read more

Source: go.theregister.com

Top found tags: Trend Micro(2),United States(2),antivirus(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dispelling the myths behind DDoS attacksLocation: New York, United States
Date published: 08-07-2014

Distributed Denial of Service (DDoS) attacks are quickly becoming the preferred method for cyber attackers to wreak havoc on the internet. With a recent spate of attention grabbing headlines focused on the hacker's favorite tool, this article busts some myths about DDoS attacks. Myth 1: DDoS attacks... Read more

Source: net-security.org

Top found tags: ISP(2),telecom sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
iboss launches 7.0 security platform, updates network protection for the enterpriseLocation: Martin, United States
Date published: 08-07-2014

iboss Network Security has updated its Web security platform to give organizations better protection against malware, advanced threats and cybercrime. The Web security firm's 7.0 platform caters for businesses who require network protection against malware, as well as provides advanced infection det... Read more

Source: www.zdnet.com

Top found tags: EN(1),threat(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese hackers target US national security think tanksLocation: Beijing, China
Date published: 08-07-2014

The Chinese cyberattack group Deep Panda has compromised national security think tanks using sophisticated techniques designed to steal confidential data concerning US foreign policy, according to security researchers at CrowdStrike. The CrowdStrike team say that "several" national security-based th... Read more

Source: www.zdnet.com

Top found tags: financial sector(4),telecom sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GFI MailEssentials gets new AV engine and anti-spam capabilitiesLocation: Kaspersky HQ - Moscow, Russia
Date published: 08-07-2014

GFI Software released GFI MailEssentials 2014 R2, adding major enhancements to the company s email security solution. With more than 70 per cent of worldwide email traffic consisting of spam, the need for robust email security solutions is paramount for organizations of all sizes. GFI MailEssentials... Read more

Source: net-security.org

Top found tags: Kaspersky Lab(2),antivirus(3),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Type of Mini-Skimmer Found in EuropeLocation: Europol HQ - Den Haag, The Netherlands
Date published: 08-07-2014

ATM skimming is still a problem in Europe, a not-for-profit organization that specializes in ATM security said in a report published on Friday. The report from the European ATM Security Team (EAST) is based on information provided by the representatives of 22 countries at the 33rd EAST meeting held ... Read more

Source: securityweek.com

Top found tags: cybercrime(2),United States(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attack on Dailymotion redirected visitors to exploitsLocation: Orange HQ - Paris, France
Date published: 07-07-2014

Attackers injected malicious code into Dailymotion.com, a popular video sharing website, and redirected visitors to Web-based exploits that installed malware.The rogue code consisted of an iframe that appeared on Dailymotion on June 28, researchers from security vendor Symantec said Thursday in a bl... Read more

Source: www.networkworld.com

Top found tags: trojan(2),United States(2),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Motives Behind Havex ICS Malware Campaign Remain a MysteryLocation: Bond, United States
Date published: 07-07-2014

Since Stuxnet there have been few confirmed reports of malware targeting particular industrial control system software. But now we have a campaign using the Havex remote access Trojan that has three European energy sector vendors in its crosshairsor does it?The outbreak, reported by security vend... Read more

Source: threatpost.com

Top found tags: ICS(3),cybercrime(4),critical infrastructure(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Second arrest in response to DDoS attack on SpamhausLocation: National Crime Agency - London, United Kingdom
Date published: 07-07-2014

The Spamhaus Project again offers congratulations and thanks to the law enforcement community in the matter of the massive Distributed Denial of Service (DDoS) attack perpetrated against our systems in March 2013 by a Russian-based anti-Spamhaus group calling themselves 'Stophaus', consisting of sev... Read more

Source: www.spamhaus.org

Top found tags: The Netherlands(2),United States(2),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Double Whammy: It's Boom Time for Cyber Crime; Loss Pegged at $4 BillionLocation: New Delhi, India
Date published: 08-07-2014

HYDERABAD: Cyber crime in India grew by 120 per cent in 2013 over the previous year and a Delhi High Court report had pegged cyber crime loss in India at $4 billion, IT and panchayat raj minister KT Rama Rao has said. Speaking after inaugurating Ernst & Young LLPs (EY) cyber forensics and e-disco... Read more

Source: www.newindianexpress.com

Top found tags: computer forensics(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Weary of takedowns, Microsoft looks for partners in crime fightingLocation: Microsoft HQ - Redmond, United States
Date published: 07-07-2014

July 07, 2014, 8:53 PM When it comes to fighting cyber crime, few companies can claim to have done as much as Redmond, Washington-based Microsoft.Indeed, the company spent the last five years as the Internet's Dirty Harry: using its size, muscle and wealth to single handedly take down botnets an... Read more

Source: www.itworld.com

Top found tags: trojan(2),cybercrime(5),malware(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China Hackers Compromise Iraq Experts at National Security Think TanksLocation: Beijing, China
Date published: 08-07-2014

Computers at a number of unnamed national security think tanks were compromised by hackers linked to China trying to glean intelligence on U.S. policy in Iraq as civil unrest escalates in the Middle East country. The attacks mark a shift in tactics by this particular group, which generally keeps tab... Read more

Source: threatpost.com

Top found tags: United States(2),cybercrime(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China cyberspies hit US national security think tanksLocation: Beijing, China
Date published: 08-07-2014

The Chinese cyberattack group Deep Panda has compromised national security think tanks using sophisticated techniques designed to steal confidential data concerning US foreign policy, according to security researchers at CrowdStrike. The CrowdStrike team said that "several" national security-based t... Read more

Source: cnet.com.ortal.com

Top found tags: financial sector(4),telecom sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Webcast: Detecting and Preventing Advanced Persistent ThreatsLocation: Palo Alto, United States
Date published: 08-07-2014

Expose the Underground: Detecting and Preventing Advanced Persistent Threats - July 9, 2014 at 1:00PM ET. Presented by: Palo Alto Networks Please join Palo Alto Networks and SecurityWeek on Wednesday, July 9th at 1:00 PM ET for an informative webcast on how your organization can better detect and pr... Read more

Source: securityweek.com

Top found tags: threat(1),RSA(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spamhaus Asks Authorities to Charge Other DDoS Attack SuspectsLocation: National Crime Agency - London, United Kingdom
Date published: 08-07-2014

Spamhaus has thanked the law enforcement community for bringing to justice some of the individuals suspected of being responsible for the massive distributed denial-of-service (DDoS) attack launched against the organization's systems in March 2013, but wants other alleged conspirators to also be cha... Read more

Source: securityweek.com

Top found tags: United States(2),The Netherlands(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
McAfee Named a Leader in Gartner Magic Quadrant for Security Information and Event ManagementLocation: Gartner - Stamford, United States
Date published: 08-07-2014

In June, Gartner, Inc. published its annualMagic Quadrant for Security Information and Event Management (SIEM), which evaluates vendors who offer SIEM products on both the ability to execute and completeness of vision. And this year, McAfee holds a spot in the leaders quadrant. As the threat la... Read more

Source: blogs.mcafee.com

Top found tags: vulnerability(1),website(1),critical infrastructure(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile Apps: The Next Frontier for HackersLocation: McAfee - Santa Clara, United States
Date published: 08-07-2014

By the end of 2014, there will be more than two billion smartphones and tablets in use across the world. Thats two billion more opportunities for hackers to get a hold of valuable user data. As mobile devices have progressed, so has cybercrime, especially when it comes to taking advantage of apps... Read more

Source: blogs.mcafee.com

Top found tags: mobile device(2),cybercrime(5),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spamhaus seeks arrests of non-EU DDoS attackersLocation: Amsterdam, The Netherlands
Date published: 08-07-2014

Anti-spam organisation Spamhaus welcomes two arrests in the UK and Spain, and now seeks others outside the EU, which commentators believe is unlikely to happen. Spamhaus seeks arrests of non-EU DDoS attackers Spamhaus seeks arrests of non-EU DDoS attackers Spamhaus, the veteran anti-spam organisatio... Read more

Source: www.scmagazineuk.com

Top found tags: The Netherlands(2),United Kingdom(2),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
All Microsoft-seized domains back with No-IPLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

Just over a week after Microsoft seized more than 20 domains from No-IP, the ISP now says that all of the domain names are back in its possession. All Microsoft-seized domains back with No-IP All Microsoft-seized domains back with No-IP As reported late last month, Microsoft was accused of acting ... Read more

Source: www.scmagazineuk.com

Top found tags: government(2),legislation(2),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Panic like it's 1999: MS Office macro viruses are BACKLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Macro viruses involving infected Word and Excel files were a plague in the late 1990s. Yet, like grunge music, the genre fell into decline as techniques and technologies moved on. More recently macro viruses have staged something of a reviva... Read more

Source: go.theregister.com

Top found tags: cybercrime(2),Microsoft(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook fights botnet as malware authors talk trashLocation: Facebook - Menlo Park, United States
Date published: 08-07-2014

trying to thwart malware. The company's account highlighted how Facebook spotted Lecpetex, which was later named by the Microsoft Malware Protection Center. With help from the Greek police Facebook aimed to stop infections that would lead to social spam. Lecpetex was built to be resilient and adapt ... Read more

Source: www.zdnet.com

Top found tags: social engineering(2),social media(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft fixes 29 Windows vulnerabilitiesLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

vulnerabilities. Update at 2:20 pm ET: This story is updated below to clarify the exploitability of MS14-042. update fixes 24 vulnerabilities, all of them memory corruption vulnerabilities, in every supported version of Internet Explorer. Ironically, the only IE version for which there are no critic... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
1990s Macro viruses back with a vengeanceLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

Reports are coming in that cyber-criminals are deploying an attack methodology that was last successful in the late 1990s. 1990s Macro viruses back with a vengeance 1990s Macro viruses back with a vengeance Known as macro infections, the malware uses the Visual Basic programming language to tap into... Read more

Source: www.scmagazineuk.com

Top found tags: trojan(2),United Kingdom(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Phishing scheme targets biting World Cup player's sympathizersLocation: Kaspersky HQ - Moscow, Russia
Date published: 08-07-2014

A new phishing scheme is targeting World Cup fans who want to support Luis Alberto Surez, an Uruguayan forward who bit an Italian defender during a recent match. The phishing page looks like and links back to FIFA's website and asks visitors to fill out a petition in defense of the Uruguayan playe... Read more

Source: www.scmagazine.com

Top found tags: Kaspersky Lab(4),social media(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China's 'Deep Panda' crew targets Middle East policy wonks - reportLocation: Beijing, China
Date published: 08-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines A group of China-based cyber spies have begun targeting national security think tanks, initially targeting analysts focusing on the Asia-Pacific region before switching their focus to Iraq. Infosec threat intelligence firm CrowdStrike warns ... Read more

Source: go.theregister.com

Top found tags: phishing(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

NSA spying on possible Tor and Tails usersLocation: National Security Agency - Fort Meade, United States
Date published: 07-07-2014

Anyone searching online for a Tor software download or to install the Tails operating systems could be on the National Security Agency's (NSA) surveillance radar. A German public broadcaster's report claims that the NSA, through its XKeyscore program, is automatically capturing people's information ... Read more

Source: www.scmagazine.com

Top found tags: NSA(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crypto weakness in smart LED lightbulbs exposes Wi-Fi passwordsLocation: Microsoft HQ - Redmond, United States
Date published: 07-07-2014

In the latest cautionary tale involving the so-called Internet of things, white-hat hackers have devised an attack against network-connected lightbulbs that exposes Wi-Fi passwords to anyone in proximity to one of the LED devices. The attack works against LIFX smart lightbulbs, which can be turned o... Read more

Source: arstechnica.com

Top found tags: trend(1),cyber security(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security checks at Australian airports to remain unchangedLocation: New York, United States
Date published: 08-07-2014

daily flights to the US. The Transportation Security Administration (TSA) announced on Monday that it will be enhancing security screenings of electronic devices at "certain airports overseas". As part of its new procedures, during security screening for flights to the US, passengers may be asked to... Read more

Source: www.zdnet.com

Top found tags: United States(2),airport sector(4),airport(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Insecure AVG search tool shoved down users' throats says CERT USLocation: Will, United States
Date published: 08-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines The US Computer Emergency Response Team (CERT) has warned users about software download sites' practice of including unasked-for downloads, after one such program - AVG's Secure Search toolbar - was found to be insecure. Known as "bloatware"... Read more

Source: go.theregister.com

Top found tags: Internet Explorer(2),website(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Warbiking' highlights the need for better wireless securityLocation: Sydney, Australia
Date published: 08-07-2014

Don't let the lycra fool you: James Lyne isn't your traditional cyclist. Unlike the majority of MAMILs (middle aged men in lycra) on Sydney's roads, he's not cycling to and from work, or for medically-advised health reasons. He's actually the global head of security research for Sophos, and this bik... Read more

Source: cnet.com.ortal.com

Top found tags: financial sector(2),security measures(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cloud security threats, tips and best practicesLocation: Cloud, United States
Date published: 08-07-2014

In this interview, Gray Hall, CEO at Alert Logic, illustrates today's top cloud security threats, tackles privacy and surveillance issues, and offers security best practices organizations should implement when moving to the cloud. Do you think cloud security concerns are generally overblown? Many pe... Read more

Source: net-security.org

Top found tags: cyber security(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hide your crypto like a real spyLocation: Berlin, Germany
Date published: 08-07-2014

bad ways to do it. A current news event reminds of one of my favorites. It's part of the story of a German employee of the country's foreign intelligence service (BND) being arrested for spying for the United States. According to the German magazine Der Spiegel, the employee had a special encryption... Read more

Source: www.zdnet.com

Top found tags: United States(2),Bruce Schneier(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Ex-Google Hacker Taking on the Worlds Spy AgenciesLocation: Google HQ - Mountain View, United States
Date published: 08-07-2014

20140620-MORGAN-MARQUIS-BOIRE-041edit [gallery-ca] Ariel Zambelich/WIRED During his last six years working as an elite security researcher for Google, the hacker known as Morgan Mayhem spent his nights and weekends hunting down the malware used to spy on vulnerable targets like human rights activist... Read more

Source: wired.com

Top found tags: United Arab Emirates(3),government(4),cyber security(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Track record: how Facebook is normalising the privacy trade-offLocation: Facebook - Menlo Park, United States
Date published: 08-07-2014

Companies like Facebook are diminishing privacy for consumers by promising them a richer experience Facebooks announcement that it will now tap its users entire web-browsing histories, not just their Facebook activities, for targeting advertising is bound to provoke some repercussions by some ... Read more

Source: www.information-age.com Browser-Focused Banking Attacks Evolve | Security firm RSA recently issued a warning over a fraud ring that targets the Boleto, which is one of Brazil\'s most popular payment methods.According to RSA, the gang\'s \"Bolware\" malware compromised about 496,000 Boletos transactions over a two-year period, which were worth as much as $3.75 billion. When users logged into a site to send Boletos to a designated Boleto ID number - often to pay their mortgage, utility bills, taxes or doctor - the malware would route their payments instead to an attacker-controlled Boleto ID.The attacks are notable not just for the amount of money fraudsters may have stolen - which many information security experts don\'t believe was anything close to $4 billion - but also because they used a man-in-the-browser attack technique that has continued to dog banks, payment systems and their users for years, despite concerted efforts to combat such fraud.Fraudsters Play VictimsOf course, in the old days of online crime, says Dan Kaminsky, the chief scientist at anti-malware firm White Ops, attackers simply used malware to harvest banking credentials from infected PCs, then employed those credentials to drain accounts at their leisure. But banks became wise to those types of attacks, and started using security tools such as device and IP fingerprinting, to tell, for example, if a Boston-based customer was logging into their account using a computer in Latvia that had never been seen before.As a result, attackers began not just stealing credentials, but also using the victim\'s computer to commit related fraud. \"The attackers basically said, \'we were in there once when we stole the password; we could just stay in there and access the bank account from the user\'s own computer,\'\" Kaminsky says. \"Thus was formed the man-in-the-browser attacks that everyone has been dealing with for almost a decade now. And it\'s extremely difficult to manage, because it\'s the user\'s computer, and the user was literally sometimes just there.\"Web Injection DisguisesMan-in-the-browser attacks rely on Web injections, which is a fancy way of saying that attackers can be actively transferring a victim\'s money out of an account, while \"injecting\" an interface that makes everything appear normal to the customer, while they\'re using the site. Indeed, criminals will sometimes even leave these Web injections in place after they\'re done attacking, so that \"as you review your statement, it omits these fraudulent transactions from your view,\" says TK Keanini, CTO at Lancope. The more time that passes, the harder it becomes to freeze and recover stolen funds, identify the attackers or shut down their operations. | http://www.bankinfosecurity.com/browser-focused-banking-attacks-evolve-a-7026 | 07-07-2014 | www.bankinfosecurity.com

Top found tags: privacy(1),cyber security(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The year in San Diego cybercrime (so far)Location: San Diego, United States
Date published: 07-07-2014

African witchcraft, a scary clown and board shorts that arent really board shorts: crimes on the Internet are weirdWhen I first heard that next January, CBS will start airing CSI: Cyber, the latest spin on its long-running, scientifically questionable forensic crime drama, I thought to myself: Wh... Read more

Source: www.sdcitybeat.com

Top found tags: child pornography(4),government(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Geography of Cyber WarfareLocation: Vodafone HQ - Maastricht, The Netherlands
Date published: 08-07-2014

More than 40% of the worlds populace now have internet connections, with the number of users slated to reach three billion by the end of this year. If youre reading this, youre one of them.Over the past year, many of us users have become aware of the extent of cyber snooping and the lack of... Read more

Source: forbesindia.com

Top found tags: United States(2),government(3),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Phishers Use Luis Suarez Bite as BaitLocation: Bogota, Colombia
Date published: 08-07-2014

The World Cup is the most popular sporting event on the planet, and not just among sports fans; attackers and scammers of all stripes love it as well, as it presents a unique opportunity to separate victims from their money. Phishing and malware scams tied to the World Cup in Brazil have been runnin... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),cybercrime(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DPAPI vulnerability allows intruders to decrypt personal dataLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

Passcape Software has discovered a DPAPI vulnerability that could potentially lead to unauthorized decryption of personal data and passwords of interactive domain users. The vulnerability is present in all Windows Server operating systems. DPAPI, first introduced in Windows 2000, is a technology to ... Read more

Source: net-security.org

Top found tags: vulnerability(1),Windows(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ATM Makers Form Association to Combat ATM-based CrimeLocation: New York, United States
Date published: 08-07-2014

Two of the world's largest ATM makers have formed a new organization and initiated an industry-wide effort to combat ATM-based crime. Formed by Diebold and Wincor Nixdorf AG, the ATM Security Association has hopes to improve ATM security and establish industry-wide security measures. According to th... Read more

Source: securityweek.com

Top found tags: cyber security(2),security measures(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Intersection of Cloud And Internet of Things And What It Means For SecurityLocation: Cloud, United States
Date published: 08-07-2014

Securing The Internet of Things Using Cloud Last month, Salesforce.com and Philips announced their plan to build an open cloud-based healthcare platform. In the initial application, this platform will allow healthcare software developers, producers of medical services, insurance companies, and... Read more

Source: securityweek.com

Top found tags: health sector(4),medical sector(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NETGEAR Switches Exposed to Attacks From Hardcoded CredentialsLocation: New York, United States
Date published: 08-07-2014

A remote attacker could log into certain NETGEAR switches and execute arbitrary code because of hardcoded credentials installed within the firmware used on the devices, CERT/CC reported last week. The vulnerability affects NETGEAR GS108PE ProSAFE Plus Switches, which are usually used by small busine... Read more

Source: securityweek.com

Top found tags: cyber security(2),government(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Physical Location of Data Will Be Irrelevant By 2020Location: Berlin, Germany
Date published: 08-07-2014

According to a recent Gartner report entitled "The Snowden Effect: Data Location Matters," the physical location of data is becoming increasingly irrelevant, and will be replaced by a combination of legal location, political location and logical location in most organizations by 2020. Gartner resear... Read more

Source: www.esecurityplanet.com

Top found tags: government(3),cyber security(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Understanding The Ever-Changing Security LandscapeLocation: McAfee - Santa Clara, United States
Date published: 08-07-2014

Since starting my career at McAfee in 2002, I have seen so many changes within the company and the security industry at large. New technologies have transformed the relationship between enterprises, their employees, and their critical systemsfor better or for worse. And in my role overseeing McAf... Read more

Source: blogs.mcafee.com

Top found tags: cybercrime(3),telecom sector(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Computing student jailed after failing to hand over crypto keysLocation: Wilson, United States
Date published: 08-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines +Comment A computer science student accused of hacking offences has been jailed for six months for failing to hand over his encryption passwords, which he had been urged to do in "the interests of national security". Christopher Wilson, 22, ... Read more

Source: go.theregister.com

Top found tags: update(2),cybercrime(4),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Finds, Blocks Unauthorized CertificatesLocation: Google HQ - Mountain View, United States
Date published: 08-07-2014

Google said today that it has blocked unauthorized digital certificates for a number of its domains issued by the National Informatics Centre of India. The phony certificates could allow an attacker to spy on a connection thought to be secure. NIC, Google said, holds intermediate CA certs trusted by... Read more

Source: threatpost.com

Top found tags: OS X(2),RSA(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Verizon Transparency Report Shows Large Government Appetite for Location, Content DataLocation: Verizon HQ - New York, United States
Date published: 08-07-2014

Verizonsaid in a new transparency report that though the number of some kinds of orders droppedincluding wiretap orders and warrantsothers rose, including general orders and pen register and trap and trace orders, and the company received nearly 150,000 total orders in the first half of 2014... Read more

Source: threatpost.com

Top found tags: government(4),United States(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Issues New Advice on Defending Against Pass-the-Hash AttacksLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

Microsoft on Tuesday released new guidance to help customers defend against credential theft stemming from Pass-the-Hash (PtH) attacks. In a new white paper called Mitigating Pass-the-Hash and Other Credential Theft, version 2, Microsoft encourages IT professionals to assume breach to highligh... Read more

Source: securityweek.com

Top found tags: Microsoft(2),telecom sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adware Company Linked to Development and Distribution of Mevade MalwareLocation: Trend Micro - Cupertino, United States
Date published: 08-07-2014

An Israeli company with ties to Ukraine is believed to be involved in the creation of a piece of malware, which it has distributed with the aid of adware, Trend Micro said in a new research paper published Monday. The firm in question is iBario Ltd., which is responsible for creating InstallBrain, a... Read more

Source: securityweek.com

Top found tags: financial sector(2),Trend Micro(2),Ukraine(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese Hackers Targeting Middle East Policy Experts: CrowdStrikeLocation: Beijing, China
Date published: 08-07-2014

A sophisticated group of hackers has changed both targets and tactics, according to a new report from security firm CrowdStrike. Crowdstrike has been tracking the group, known as 'Deep Panda', for the past few years. In the past, the hackers - which the firm has linked to the Chinese government - fo... Read more

Source: securityweek.com

Top found tags: United States(2),cybercrime(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fighting Advanced Persistent Threats with EmulationLocation: WatchGuard - Seattle, United States
Date published: 08-07-2014

Its no secret that threats are growing in persistence, increasing in stealth and evading the latest malware technologies. Simply put, advances in persistent threats are now able to break through the gauntlet of firewalls, intrusion prevention systems, anti-virus applications and anomaly detection... Read more

Source: www.esecurityplanet.com

Top found tags: phishing(2),financial sector(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

U.S. arrests Russian in hacking of retail systemsLocation: New York, United States
Date published: 07-07-2014

WASHINGTON (Reuters) - U.S. authorities have arrested a Russian man accused of hacking into American retailers' computer systems to steal credit card data from 2009 to 2011, officials said on Monday. The Secret Service arrested Roman Valerevich Seleznev, 30, on Saturday, according to the Department ... Read more

Source: reuters.com

Top found tags: identity theft(2),financial sector(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NCL calls on gov't, business to better protect consumer dataLocation: Los Angeles, United States
Date published: 07-07-2014

Name.com, Facebook and Verizon are among the companies backing the newly-formed group. Noting that consumers are being asked to provide more information than ever before and are less protected, the NCL has proposed reforms. A consumer group is pushing business and government to adopt comprehensive r... Read more

Source: www.scmagazine.com

Top found tags: legislation(3),telecom sector(4),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber-Senate's cyber-security cyber-law cyber-scares cyber-rights cyber-fightersLocation: United States Capitol - Washington D.C., United States
Date published: 08-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines On Tuesday the US Senate will meet in a closed-door session to mark up the forthcoming Cybersecurity Information Sharing Act of 2014 (CISA) and the proposed new rules on data sharing between big biz and government have privacy groups ser... Read more

Source: go.theregister.com

Top found tags: legislation(3),government(8),cyber security(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ATM skimmers up ante as U.S. drags tail on chip, PIN technologyLocation: Target HQ - Minneapolis, United States
Date published: 08-07-2014

As noted by Brian Krebs, the European ATM Security Team (EAST) has outlined a series of mini fraud devices including a few made to fit cash machines by NCR. hand atmCredit: EAST Some of the ATM skimmers even include hidden cameras to record your PIN input---simply covering your PIN entry with your o... Read more

Source: www.zdnet.com

Top found tags: cyber security(4),financial sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Secret Service arrests Russian point-of-sale hackerLocation: New York, United States
Date published: 08-07-2014

The US Secret Service has arrested a Russian hacker accused of accessing point-of-sale systems and stealing credit card information. Roman Valerevich Seleznev, of Moscow, was arrested Saturday, according to the US Department of Justice. The 30-year-old is accused of hacking into point-of-sale system... Read more

Source: www.zdnet.com

Top found tags: United States(2),Department of Justice(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A third of security professionals unaware of data breach penaltiesLocation: Palo Alto, United States
Date published: 08-07-2014

30% believed the fine to be significantly lower A considerable percentage of security professionals in the UK are currently unaware of the significant monetary penalty notices that can be issued by the Information Commissioners Office (ICO) following a serious breach of the Data Protection Act, a... Read more

Source: www.information-age.com

Top found tags: United Kingdom(4),health sector(6),medical sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Payment Card Data Isn't The Only Lucrative Loot In A Data BreachLocation: Ransom, United States
Date published: 07-07-2014

Hackers love payment card information. After all, its lucrative and easily sold on the black market. However, as we continue to see during our post-breach forensics investigations, payment card information is not the only popular loot. Criminals are diversifying, targeting any kind of information... Read more

Source: www.forbes.com

Top found tags: malware(3),cybercrime(5),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Voice America to Host Steptoe & Johnson LLP Privacy & Cybersecurity TeamLocation: Department of Homeland Security - Washington, United States
Date published: 07-07-2014

Phoenix, AZ -- (SBWIRE) -- 07/07/2014 -- Voice America Talk Radio Network, Internet broadcasting pioneer, producing and syndicating online audio and video, today announced that Steptoe & Johnson LLPs Privacy and Cybersecurity team will join Peter Weitz, host of In Black and Weitz on the Voice Ame... Read more

Source: www.digitaljournal.com

Top found tags: cyber security(6),United States(6),government(11)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Floridas New Data Breach Law Effective July 1, 2014Location: Florida, United States
Date published: 07-07-2014

Floridas new data breach law, The Florida Information Protection Act of 2014 (FIPA) applies to any entity that has personal information about Floridians. The holder of this personal information is referred to as a covered entity. The new law also applies to third party agents, w... Read more

Source: blalockwalters.com

Top found tags: report(1),data breach(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Risks of selling used smartphonesLocation: New York, United States
Date published: 08-07-2014

AVAST Software easily retrieved personal data from used smartphones sold online, despite consumers deleting their data. From the used devices, researchers was able to recover more than 40,000 personal photos, emails, text messages, and in some cases the identities of the sellers. The amount of perso... Read more

Source: net-security.org

Top found tags: mobile device(2),United States(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hotel Hippo closes for good after data breachLocation: Scott, United States
Date published: 08-07-2014

UK-based travel booking website Hotel Hippo appears to have closed just one week after an independent security consultant found that the firm had weak security and privacy controls. Hotel Hippo closes for good after data breach Hotel Hippo closes for good after data breach Visitors to hotelhippo.com... Read more

Source: www.scmagazineuk.com

Top found tags: information security(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Moscow accuses US of kidnapping MP's son on hacking chargesLocation: Moscow, Russia
Date published: 08-07-2014

After arresting a Russian national on charges of hacking and fraud, Moscow has accused Washington of abducting the son of a Russian MP. According to the AFP news agency, Russian lawmaker Valery Seleznev admitted to being the father of the alleged hacker and stolen data trafficker, and expressed fear... Read more

Source: www.zdnet.com

Top found tags: Department of Justice(3),government(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Massachusetts man charged in Twitter hackLocation: Twitter - San Francisco, United States
Date published: 07-07-2014

A Massachusetts man is facing charges related to the hacking of Zendesk, a San Francisco-based company that provides helpdesk services to organizations, including Twitter. On Wednesday federal prosecutors charged 25-year-old Cameron Lacroix with hacking the company in February 2013 and disabling a s... Read more

Source: www.scmagazine.com

Top found tags: Twitter(1),social media(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vid shows how to easily hack 'anti-spy' webmail (sorry, ProtonMail)Location: Oracle - Redwood City, United States
Date published: 07-07-2014

Video A security researcher has demonstrated a classic JavaScript-injection attack against ProtonMail the webmail system developed by boffins and CERN to withstand surveillance by the world's intelligence agencies. German security expert Thomas Roth published a video over the weekend showing how... Read more

Source: go.theregister.com

Top found tags: vulnerability(1),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Says Will Work with Germany to Resolve New Spy RowLocation: Berlin, Germany
Date published: 08-07-2014

WASHINGTON - The United States pledged Monday to cool a new spy row with Germany after Chancellor Angela Merkel warned reports of involving an alleged German double agent and the CIA could mark a fresh breach of trust between allies. Revelations that a 31-year-old German intelligence operative was s... Read more

Source: securityweek.com

Top found tags: United States(6),telecom sector(8),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Doctor Who season eight scripts leak onlineLocation: New York, United States
Date published: 08-07-2014

Scripts for the first five episodes of the yet-to-be-screened and highly-anticipated series eight of Doctor Who have been leaked online. The leak is said to have come from BBC Worldwide's new Miami office, which was arranging translation of the new series for non-English speaking markets. The script... Read more

Source: go.theregister.com

Top found tags: EN(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile banking users to exceed 1.75 billion by 2019Location: Bank of America HQ - Charlotte, United States
Date published: 08-07-2014

Over 1.75 billion mobile phone users will have used their devices for banking purposes by the end of 2019, compared to 800 million this year, according to Juniper Research. Mobile banking technology is currently available in most regions of the world, driven by exceptional consumer demand, especiall... Read more

Source: net-security.org

Top found tags: United Kingdom(2),financial sector(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BYOD Policy GuidebookLocation: New York, United States
Date published: 08-07-2014

This policy guidebook was created to help guide you through the questions to ask and provide some best practices to consider when establishing your own BYOD policies. Your employees want to use their own mobile devices for work. This represents a tremendous opportunity for you to extend the benefits... Read more

Source: net-security.org

Top found tags: MBR(1),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Moscow Accuses Washington of 'Abducting Russia National'Location: Moscow, Russia
Date published: 08-07-2014

MOSCOW - Moscow on Tuesday accused Washington of abducting a Russian national after a man suspected of being one of the world's most prolific traffickers of stolen credit card details was arrested in the Maldives. The US Justice Department said on Monday that Roman Seleznev had been detained at the ... Read more

Source: securityweek.com

Top found tags: malware(2),financial sector(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DHS OPENS FUNDING OPPORTUNITY ON CRITICAL INFRASTRUCTURE AND RESILIENCE CENTER PROJECTLocation: Department of Homeland Security - Washington, United States
Date published: 07-07-2014

The Department of Homeland Security has released a new funding guarantee for applicants to help develop a new critical infrastructure and resilience center of excellence.DHS office of university programs within the science and technology directorate announced a funding opportunity Sunday for priv... Read more

Source: www.executivegov.com

Top found tags: government(3),DHS(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to protect yourself vs ATM skimmingLocation: Manila, Metro Manila, Philippines
Date published: 08-07-2014

MANILA, Philippines More and more automated machine teller (ATM) card users are being victimized by fraud through skimming, or the act of cloning an ATM or credit card.Financial adviser Salve Duplito said ATM users should be more vigilant in making ATM withdrawals to prevent fraudsters from dupl... Read more

Source: www.abs-cbnnews.com

Top found tags: credit card(2),United States(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Good Technology launches Mobile Workflow BuilderLocation: New York, United States
Date published: 08-07-2014

Mobile security provider Good Technology has released the Mobile Workflow Builder, a tool that combines mobile enterprise apps for use within business processes. According to the company, the tool allows organizations to leverage Good-secured mobile apps to augment existing mobile investments. It fe... Read more

Source: www.zdnet.com

Top found tags: smartphone(1),United States(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Moscow Accuses Washington of 'Abducting Russian MP's Son'Location: Washington, United States
Date published: 08-07-2014

MOSCOW - Moscow on Tuesday accused Washington of abducting the son of a Russian lawmaker who was arrested in the Maldives on suspicion of being one of the world's most prolific traffickers of stolen credit card details. A Russian legislator, who admitted to being the suspect's father, expressed fear... Read more

Source: securityweek.com

Top found tags: United States(2),financial sector(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Suits and Spooks from the US, EU, Russia, The Netherlands to Talk 0-day RegulationLocation: Londen, United Kingdom
Date published: 08-07-2014

Suits and Spooks London is happening on Friday September 12th, with speakers from BAE Systems, EUROPOL, CERT-EU, Kaspersky Lab, CrySyS Lab, Goldman Sachs, PwC and other organizations. Suits and Spooks If you have an opinion about the relative value of attribution, the wisdom of active defense, the r... Read more

Source: securityweek.com

Top found tags: The Netherlands(2),Kaspersky Lab(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Clean for the phone, but not clean in the codeLocation: Google HQ - Mountain View, United States
Date published: 08-07-2014

Yet another discovery from our SherlockDroid/Alligator, while we were scanning an alternative marketplace for Android : Android/Odpa.A!tr.spy This sample consists of a smartphone cleaner, giving the end-user the opportunity to clean up obsolete or unused data from the device. In theory, this l... Read more

Source: blog.fortinet.com

Top found tags: Java(1),smartphone(1),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. government made 150,000 requests for Verizon data in six monthsLocation: Verizon HQ - New York, United States
Date published: 08-07-2014

The U.S. government issued around 150,000 customer data requests from Verizon during the first half of 2014, the company said. In its latest transparency report published Tuesday, the company complied with the vast majority most of which were subpoenas for subscriber information on a single phon... Read more

Source: www.zdnet.com

Top found tags: United States(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe issues security fix for Flash PlayerLocation: Adobe HQ - San Jose, United States
Date published: 08-07-2014

Flash.Player The new version for Mac and Windows users is 14.0.0.145. The new Linux version is 11.2.202.394. Users can manually update through the link nearby. Users of Google Chrome and Microsoft Internet Explorer on Windows 8 will receive automatic updates to the Flash Player embedded in their bro... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Verizon: U.S. government made 150,000 customer info requests in 2014Location: Verizon HQ - New York, United States
Date published: 08-07-2014

WASHINGTON (Reuters) - The U.S. government issued about 150,000 requests for customer information from Verizon Communications in the first half of 2014, most of them subpoenas, the country's largest wireless carrier reported on Tuesday. The report is the second summary of government requests Verizon... Read more

Source: reuters.com

Top found tags: government(2),United States(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe Patches Flash Vulnerability Exploited by Rosetta Flash ToolLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

Naturally, since we are mapping a wider charset to a more restrictive one, this is not a real compression, but an inflation, Spagnuolo said. We are effectively using Huffman as a Rosetta stone. Spagnuolo said he will present the vulnerability and tool at Hack in the Box Malaysia in Octob... Read more

Source: threatpost.com

Top found tags: patch(1),vulnerability(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
This One Threat Could Level Your Best Parenting PlanLocation: New York, United States
Date published: 08-07-2014

shutterstock_186441221 Congratulations, parent. You are doing great. Youve managed to bob and weave with every new app, gadget, and social network that sprouted up this year. You monitored phones, scrutinized online friends and followers, and helped your child navigate a few online storms. You ar... Read more

Source: blogs.mcafee.com

Top found tags: airport(2),airport sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile flaw hits most Android devicesLocation: Google HQ - Mountain View, United States
Date published: 08-07-2014

Researchers at Curesec have found a vulnerability that is potentially affecting 60 percent of Android devices connected to Google Play. Mobile flaw hits most Android devices Mobile flaw hits most Android devices Researchers at Curesec have found a vulnerability that is potentially affecting 60 perce... Read more

Source: www.scmagazineuk.com

Top found tags: Trend Micro(2),antivirus(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HotelHippo shuts down permanently after security flaws discoveredLocation: Scott, United States
Date published: 08-07-2014

After a security consultant turned customer found and reported a number of potentially serious security vulnerabilities on its travel booking site, HotelHippo has shuttered the site for good. HotelStayUK, the site's parent, issued a statement referring to the online booking agency as a small very... Read more

Source: www.scmagazine.com

Top found tags: legislation(1),report(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
St. Vincent Breast Center mails 63K letters to wrong peopleLocation: Indiana, United States
Date published: 08-07-2014

A clerical error resulted in Indianapolis-based St. Vincent Breast Center mailing more than 63,000 letters containing personal information to the wrong people. How many victims? 63,325 letters were sent to the wrong patients. What type of personal information? Names, addresses and a reference to a s... Read more

Source: www.scmagazine.com

Top found tags: India(1),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

'Chinese hackers richten zich op Midden-Oosten-experts'Location: Beijing, China
Date published: 08-07-2014

Chinese hackers hebben het gemunt op Midden-Oosten-experts die werken bij Amerikaanse denktanks. Beveiligingsbedrijf Crowdstrike meldt dat een groep Chinese staatshackers met de codenaam Deep Panda zich recentelijk heeft gericht op mensen die kennis hebben over Irak. Crowdstrike zegt dat de cyberspi... Read more

Source: www.nutech.nl

Top found tags: NL(1),China(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Secret Service pakt Rus op wegens inbreken op kassasystemenLocation: New York, United States
Date published: 08-07-2014

De Amerikaanse Secret Service heeft zaterdag een Russische man opgepakt op verdenking van het inbreken op de kassasystemen van Amerikaanse winkelketens. De inbraken op de 'point of sale systems' zouden tussen oktober 2009 en februari 2011 hebben plaatsgevonden. Daarbij zou Roman Valerevich Seleznev ... Read more

Source: www.security.nl

Top found tags: cybercrime(2),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Geheime dienst VS pakt Russische cybercrimineel opLocation: Amsterdam, The Netherlands
Date published: 08-07-2014

De Amerikaanse Secret Service heeft een Russische man opgepakt die ervan wordt verdacht dat hij kassasystemen van winkels heeft gehackt. Hij zou tussen oktober 2009 en februari 2011 zijn slag hebben geslagen, stelt het ministerie van Binnenlandse Veiligheid in een verklaring. Het is onduidelijk waar... Read more

Source: www.nutech.nl

Top found tags: financial sector(2),government(2),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oracle slaat mega-gat in beveiliging Windows XPLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

Het was al niet verstandig om door te gaan met Windows XP, nu Microsoft die Windows-variant niet meer in onderhoud heeft. Maar Oracles jongste aanpassing in zijn releasebeleid van Java maakt de risico's voor de volhouders nog een stuk groter. Zonder daar verder ruchtbaarheid aan te geven, blijkt Win... Read more

Source: www.automatiseringgids.nl

Top found tags: Windows(1),Microsoft(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Politiespeurhond VS kan verborgen harde schijven vindenLocation: Den Haag, The Netherlands
Date published: 08-07-2014

De Amerikaanse politie heeft een nieuw middel in de strijd tegen kinderpornografie, namelijk speurhonden die verborgen harde schijven, USB-sticks en andere apparatuur met data kunnen vinden. Inmiddels beschikken twee Amerikaanse politiekorpsen over een speciaal getrainde speurhond. Het is bekend dat... Read more

Source: www.security.nl

Top found tags: The Netherlands(2),government(3),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Petitie voor Suarez blijkt phishingaanval te zijnLocation: Facebook - Menlo Park, United States
Date published: 08-07-2014

Een petitie voor de Uruguayaanse voetballer Luis Suarez, die onder andere via Facebook wordt verspreidt, blijkt in werkelijkheid een phishingaanval te zijn. De link naar de zogenaamde petitie komt uit op een nagemaakte FIFA-website, waar gebruikers om allerlei persoonlijke gegevens wordt gevraagd. H... Read more

Source: www.security.nl

Top found tags: telecom sector(2),cybercrime(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
USB-geheugenstaafje verwijdert hardnekkige malwareLocation: Microsoft HQ - Redmond, United States
Date published: 07-07-2014

De FixMeStick is een USB-geheugenstaafje dat virussen, malware, spyware, trojans en rootkits detecteert en verwijdert zonder Windows op te starten. We hebben de Pro-versie van de Fixme Stick getest om te zien of dit klopt.We hebben het bij familieleden en vrienden al vaak meegemaakt dat een Windows-... Read more

Source: datanews.knack.be

Top found tags: trojan(2),antivirus(3),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
De gevaren van de cloudLocation: Akamai - Boston, United States
Date published: 07-07-2014

Cloud computing - het stockeren en manipuleren van data op externe servers - heeft de wind in de zeilen. Volgens Wikipedia verdubbelen cloud vendors elk jaar hun omzet. Maar met het toenemende succes, groeit bij IT-verantwoordelijken ook de ongerustheid inzake veiligheid. Het is duidelijk dat de tra... Read more

Source: datanews.knack.be

Top found tags: health sector(2),medical sector(2),The Netherlands(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Opstelten: kabinet neemt dreiging botnets serieusLocation: Ministry of Security and Justice - Den Haag, The Netherlands
Date published: 08-07-2014

De dreiging die uitgaat van botnets neemt het kabinet serieus, waarbij de overheid op verschillende vlakken actief is, zo heeft minister Opstelten van Veiligheid en Justitie laten weten. De minister reageerde via deze brief op vragen die tijdens het algemeen overleg Cybersecurity van 27 maart werden... Read more

Source: www.security.nl

Top found tags: Ministry of Economic Affairs(4),cybercrime(5),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
40.000 foto's op 20 tweedehands smartphones gevondenLocation: Google HQ - Mountain View, United States
Date published: 08-07-2014

Onderzoekers hebben op 20 tweedehands Android-smartphones een gigantische hoeveelheid persoonlijke gegevens gevonden, waarvan de verkopers dachten dat het weg was. Anti-virusbedrijf Avast kocht de gebruikte toestellen via veilingsite eBay. In veel gevallen hadden gebruikers hun gegevens verwijderd. ... Read more

Source: www.security.nl

Top found tags: SMS(1),cybercrime(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Overheid wil burger via campagne securitybewuster makenLocation: Amsterdam, The Netherlands
Date published: 08-07-2014

Later dit jaar zal de overheid voor de tweede keer de Alert Online-campagne starten om burgers en bedrijven bewuster te maken van veilig online gedrag. Vorige week vond er een netwerkbijeenkomst van het initiatief plaats, waarbij de partners van Alert Online 2014 werden gepresenteerd. Inmiddels hebb... Read more

Source: www.security.nl

Top found tags: cyber security(2),The Netherlands(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CBP: NPO plaatst zonder toestemming trackingcookiesLocation: Amsterdam, The Netherlands
Date published: 08-07-2014

De Nederlandse Publieke Omroep (NPO) plaatst zonder toestemming van bezoekers trackingcookies, waarmee het de privacywetgeving schendt, zo blijkt uit een nog ongepubliceerd rapport van het College Bescherming Persoonsgegevens (CBP), dat in handen van het NRC Handelsblad kwam. Bij het bezoeken van de... Read more

Source: www.security.nl

Top found tags: report(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CBP: publieke omroep overtreedt privacywet met tracking cookies - updateLocation: New York, United States
Date published: 08-07-2014

De publieke omroep plaatst tracking cookies zodra internetters de sites van de NPO bezoeken, zonder dat daarvoor de vereiste toestemming wordt gevraagd, heeft het College Bescherming Persoonsgegevens volgens NRC geconstateerd. De NPO zou cookies, waaronder tracking-varianten, via in totaal achttien ... Read more

Source: tweakers.net

Top found tags: website(1),cyber security(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Gendarmes grab French Bitcoin exchange in 200k stingLocation: Paris, France
Date published: 08-07-2014

The operators of an illegal French Bitcoin exchange have been collared by the gendarmes and their Bitcoin holdings confiscated. A sketchy story out of Reuters says that the raid netted 200,000 worth of the crypto-currency, but doesn't outline what specific laws the exchange is accused of breaking... Read more

Source: go.theregister.com

Top found tags: France(2),government(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"CIA betrokken bij Duitse spionagerel"Location: Berlin, Germany
Date published: 08-07-2014

De Amerikaanse Central Intelligence Agency (CIA) was betrokken bij een spionageoperatie tegen Duitsland dat uiteindelijk tot het rekruteren van een Duits geheim agent leidde. Dat meldt persbureau Reuters aan de hand van twee Amerikaanse functionarissen die met de zaak bekend zijn. Vorige week werd e... Read more

Source: www.security.nl

Top found tags: Germany(2),government(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android-bug laat apps betaalde nummers bellenLocation: Google HQ - Mountain View, United States
Date published: 08-07-2014

Een bug in Android maakt het mogelijk voor apps om zonder toestemming bijvoorbeeld betaalde telefoonnummers te bellen. Ook kunnen apps door de bug telefoongesprekken verbreken en verschillende soorten codes versturen waardoor de telefoon bepaalde acties uitvoert. De kwetsbaarheid werd door beveiligi... Read more

Source: www.security.nl

Top found tags: report(1),research(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ChristenUnie wil ook extra apparaatcontroles binnen EuropaLocation: Dalen, Coevorden, Drenthe, The Netherlands
Date published: 08-07-2014

Als het aan de ChristenUnie ligt worden er naast de extra apparaatcontroles op vluchten naar de Verenigde Staten ook extra controles op vluchten binnen en naar Europa uitgevoerd. Daarvoor pleit Peter van Dalen, Europarlementarir voor de ChristenUnie, op BNR. Vanaf vandaag moeten reizigers naar de ... Read more

Source: www.security.nl

Top found tags: European Commission(2),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Zwitserse TrueCrypt omgedoopt tot CipherShedLocation: Amsterdam, The Netherlands
Date published: 08-07-2014

De Zwitsers die aan een doorstart van het populaire encryptieprogramma TrueCrypt werken hebben vanwege juridische redenen een andere naam voor het project gekozen, namelijk ChipherShed. Daarnaast is het project, dat eind mei werd aangekondigd, ook van een logo voorzien. De voormalige top van de Zwit... Read more

Source: www.security.nl

Top found tags: NL(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoeker verslaat Cryptowall-ransomware met recoverytoolLocation: Amsterdam, The Netherlands
Date published: 08-07-2014

Een beveiligingsonderzoeker is erin geslaagd om bestanden die door de Cryptowall-ransomware versleuteld zijn dankzij een recoverytool toch te redden. Cryptowall is een vorm van ransomware die bestanden op besmette computers met een sterke vorm van encryptie versleutelt. Gebruikers moeten vervolgens ... Read more

Source: www.security.nl

Top found tags: ransomware(1),research(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaanse geheime dienst arresteert criminele hacker van kassasystemenLocation: New York Times - New York, United States
Date published: 08-07-2014

De Amerikaanse geheime dienst heeft een Rus opgepakt die verantwoordelijk zou zijn voor het kraken van kassasystemen in de VS in de periode oktober 2009 en februari 2011. Hij wist daarbij op grote schaal creditcardgegevens buit te maken en te verhandelen. De verdachte, Roman Valerevich Seleznev gehe... Read more

Source: tweakers.net

Top found tags: hacking(1),NL(1),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bitcoin krijgt 'slimmere' transactiekostenLocation: Door, United States
Date published: 08-07-2014

Door wijzigingen in de Bitcoin Core-code moet de virtuele valuta beter overweg kunnen met transactiekosten. Zo zijn de regels voor het berekenen van de transactieskosten dynamisch gemaakt in plaats van hard coded. De wijzigingen in de Bitcoin Core-code, die de stap maakt naar versie 0.10, staan in e... Read more

Source: tweakers.net

Top found tags: Bitcoin(1),NL(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spionage van NSA in Duitsland blijkt CIA-trucLocation: Berlin, Germany
Date published: 08-07-2014

De medewerker van de Duitse geheime dienst die allerlei gevoelige informatie heeft ontvreemd, blijkt niet voor de NSA te werken maar voor de CIA. Dat melden diverse kranten in de VS. De National Security Agency (NSA) is daarmee misschien even uit de wind, maar het wordt wel duidelijk dat de VS een h... Read more

Source: www.automatiseringgids.nl

Top found tags: NSA(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beveiligers bouwen 'veilig' chatkanaalLocation: Rich, United States
Date published: 08-07-2014

Vier IT-beveiligingsspecialisten hebben een project onthuld waarin zij een instant messaging (microblog) systeem ontwikkelen waarvan zelfs de metadata niet voor nieuwsgierige ogen beschikbaar zijn. De communicatie van het project, genaamd Invisible.im, verloopt volledig via een versleuteld kanaal. E... Read more

Source: www.automatiseringgids.nl

Top found tags: NL(1),TOR(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Duitse dubbelspion verborg crypto-programma in weer-appLocation: Berlin, Germany
Date published: 08-07-2014

De Duits geheim agent die vorige week in Duitsland werd aangehouden wegens spionage voor de Verenigde Staten gebruikte een onschuldig lijkende applicatie om zijn activiteiten te verbergen. Op de computer van de man werd een weer-applicatie aangetroffen die over een geheime functie beschikte. Zodra h... Read more

Source: www.security.nl

Top found tags: United States(2),government(3),Ministry of the Interior and Kingdom Relations(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Diverse kwetsbaarheden in dbus verholpenLocation: Amsterdam, The Netherlands
Date published: 08-07-2014

Samenvatting: Een drietal kwetsbaarheden in de dbus messaging daemon geven een kwaadwillende de mogelijkheid een Denial of Service uit te voeren op (delen van) de message bus. Gevolgen: Een aanvaller kan gebruikers de toegang tot een service die gebruik maakt van de dbus daemon ontzeggen of services... Read more

Source: www.ncsc.nl

Top found tags: Linux(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Buffer overflow in VLC Media Player verholpenLocation: Amsterdam, The Netherlands
Date published: 08-07-2014

Samenvatting: Er bevinden zich kwetsbaarheden in VLC Media Player die misbruikt kunnen worden voor het uitvoeren van willekeurige code. De makers van VLC Media Player hebben versie 2.0.9 uitgebracht om deze kwetsbaarheden te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbr... Read more

Source: www.ncsc.nl

Top found tags: Debian(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Cacti verholpenLocation: Cross, United States
Date published: 08-07-2014

Samenvatting: Er zijn updates beschikbaar gemaakt om meerdere kwetsbaarheden in Cacti te verhelpen. Gevolgen: Een kwaadwillende kan op afstand: -SQL injection aanvallen uitvoeren; -Willekeurige code uitvoeren; -Cross-Site Scripting aanvallen uitvoeren. Beschrijving: ams.csv articles.txt beveiligings... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden in Apache Tomcat verholpenLocation: Door, United States
Date published: 08-07-2014

Samenvatting: Apache heeft meerdere kwetsbaarheden in Apache Tomcat verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden misbruiken voor het omzeilen van een beveiligingmaatregel, het uitvoeren van een Denial-of-Service of het verkrijgen van gevoelige informatie. Beschrijving: - CVE-2014-007... Read more

Source: www.ncsc.nl

Top found tags: patch(1),vulnerability(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Linux Kernel verholpenLocation: Ubuntu - London, United Kingdom
Date published: 08-07-2014

Samenvatting: Er is een kwetsbaarheid verholpen in de Linux Kernel. Gevolgen: Door deze kwetsbaarheid te misbruiken kan een kwaadwillende een Denial-of-Service veroorzaken en mogelijk verhoogde gebruikersrechten verkrijgen. Beschrijving: Er is een kwetsbaarheid verholpen in de Linux Kernel in de ptr... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish