Under construction

New design coming soon!

CIC News engine statistics

CIC News for 09-07-2014 contains 110 articles: cybercrime(29),cyber security(31),data breach(13),other(37)

CIC News update contains 91 English and 19 Dutch articles for today.
There are 11 published advisories, 2 are English and 9 are Dutch.
In today's English news articles:
- 22 related to cybercrime
- 31 related to cyber security
- 13 related to data breach and identity theft
- 25 for the category other news

In today's Dutch news articles:
- 7 related to cybercrime
- 0 related to cyber security
- 12 for the category other news

Have fun reading.

English cybercrime related news

July 2014 Patch Tuesday fixes two dozen IE vulnerabilitiesLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

Microsoft today fixed a total of 29 vulnerabilities across six bulletins as part of a relatively light July 2014 Patch Tuesday release, although a cumulative update for Internet Explorer addressed a hefty two dozen vulnerabilities alone. The "critical" Internet Explorer update, MS14-037, is the late... Read more

Source: searchsecurity.techtarget.com

Top found tags: update(2),vulnerability(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Yahoo Fixes Trio of Bugs in Mail, Messenger, FlickrLocation: Yahoo HQ - Sunnyvale, United States
Date published: 08-07-2014

Yahoo recently fixed a trio of remotely exploitable vulnerabilities inits services that could have let attackers inject malicious script and cause session hijacking, phishing, among other nefarious tricks. According to Vulnerability Lab, which disclosed the vulnerabilities this week, they existed ... Read more

Source: threatpost.com

Top found tags: SMS(1),telecom sector(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft July Patch Tuesday Updates Patch 29 IE VulnerabilitiesLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

Microsoft today issued two critical-, three important-, and one moderate-rated security bulletins in the July edition of its monthly Patch Tuesday release. The updates address 29 security vulnerabilities in the companys Windows operating system, Internet Explorer browser, and server software. The... Read more

Source: threatpost.com

Top found tags: patch(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Light Patch Tuesday fixes six issues, two criticalLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

Microsoft has released the patches and it is a relatively light month. Six issues in total, 2 Critical, 3 Important, 1 Moderate. OS administration teams will be busy, application administrators get the month off. One of the critical issues is the MS14-037 IE fix. After the 59 patched in MS14-035 we ... Read more

Source: net-security.org

Top found tags: disclosure(2),Microsoft(2),responsible disclosure(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Releases Critical Patch Tuesday Updates for Internet Explorer, WindowsLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

Microsoft released six security bulletins today for Patch Tuesday, including a critical update for Internet Explorer. Of the six, two are rated 'critical', while three are rated 'important' and one is considered 'moderate.' All totaled, the bulletins address 29 vulnerabilities across Microsoft Windo... Read more

Source: securityweek.com

Top found tags: responsible disclosure(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MiniDuke variant, 'CosmicDuke,' aimed at new targetsLocation: Kaspersky HQ - Moscow, Russia
Date published: 08-07-2014

A variant of espionage malware that plagued government entities and other organizations across the globe has returned with a new toolset and a different set of victims. MiniDuke, customized malware that previously took advantage of a patched Adobe Reader vulnerability, has been discovered by Kaspers... Read more

Source: www.scmagazine.com

Top found tags: backdoor(2),government(2),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft addresses 29 bugs in IE, Windows, with six bulletinsLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

Microsoft preps seven fixes, two critical, for Patch Tuesday release Microsoft preps seven fixes, two critical, for Patch Tuesday release After addressing a slew of remote code execution (RCE) bugs in Internet Explorer last month, Microsoft is back at it again, releasing fixes in an IE-heavy securit... Read more

Source: www.scmagazine.com

Top found tags: patch(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Phishers target Silk Road Bitcoin bidders, more than $62K stolen from Australian firmLocation: Lee, United States
Date published: 08-07-2014

Bitcoins Reserve, an Australia-based cryptocurrency investment firm, was relieved of 100 Bitcoins or more than $62,000 as of Tuesday after co-founder Sam Lee responded to a phishing email targeting bidders interested in the auction of 30,000 Bitcoins confiscated in the Silk Road takedown. Th... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),social engineering(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dear Microsoft Journal, today I got owned: 29 security bugs swattedLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Microsoft has released patches for 29 security vulnerabilities, while Adobe has released an update for its Flash Player software. Redmond's latest Patch Tuesday batch is composed of six bulletins, two of which have been rated as critical upd... Read more

Source: go.theregister.com

Top found tags: telecom sector(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese foreign ministry dismisses Deep Panda hacking claimsLocation: Beijing, China
Date published: 09-07-2014

paramilitary hacking claims by researchers at US security firm, CrowdStrike. "China opposes and severely cracks down on all forms of cyber-hacking," said Hong at a press conference on 8 July. "Some US internet security firms turn a blind eye to the threat posed by the US to other countries through t... Read more

Source: www.zdnet.com

Top found tags: government(2),United States(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Teensy card skimmers found in gullets of ATMsLocation: European Cybercrime Centre - Den Haag, The Netherlands
Date published: 09-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines A series of tiny and sometimes transparent card-skimming devices have been detected in ATMs across Europe, researchers say. Boffins with the European ATM Security Team (EAST) have plucked out and displayed some clever thumb-sized skimmers th... Read more

Source: go.theregister.com

Top found tags: cybercrime(2),United Kingdom(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
64% of companies expect cyber attacksLocation: Carbon, United States
Date published: 09-07-2014

Nearly two-thirds (64%) of UK IT decision-makers said they expect their organization to be the target of a cyber attack within the next 12 months. And nearly one in three (32%) of those surveyed confirm their business was hit by a cyber attack during the past year, according to Bit9 + Carbon Black. ... Read more

Source: net-security.org

Top found tags: cybercrime(2),financial sector(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Evolving Zeus malware used in targeted email attacksLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Zeus variants which use Windows extensions to steal user data have been discovered in malicious email campaigns. Security researchers at Websense Security Labs have identified Zeus strains which implement information-stealing procedures that appear to be an evolution of the coding used in previous Z... Read more

Source: www.zdnet.com

Top found tags: financial sector(4),malware(5),cybercrime(11)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HotelHippo Shuts Down In Response to Vulnerability DisclosureLocation: Scott, United States
Date published: 09-07-2014

After a security researcher uncovered several security flaws in the British hotel booking site HotelHippo.com, website owner HotelStayUK says the site has been permanently shut down (h/t Graham Cluley). "Our investigations showed that just 24 customers were affected by the issues with HotelHippo," t... Read more

Source: www.esecurityplanet.com

Top found tags: vulnerability(2),cybercrime(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
User Education Key in Fighting Mobile MalwareLocation: McAfee - Santa Clara, United States
Date published: 09-07-2014

Hackers employ some pretty sophisticated strategies when it comes to mobile malware. For example, McAfee Labs recently discovered a suspicious Android app on the Google Play app store that automatically downloads, installs and launches other apps without user permission. Such sophistication is not n... Read more

Source: www.esecurityplanet.com

Top found tags: trend(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Internet of Things Needs a Standard. Theres a Consortium for ThatLocation: New York, United States
Date published: 09-07-2014

Lets talk about networks. A network can imply a number of things: it can imply a group of friends, coworkers and teams. It can be used to reference a grouping of schools, businesses and universities. And it can also imply a connection uniting each of these elements with one another. Today, we cal... Read more

Source: blogs.mcafee.com

Top found tags: McAfee(1),Samsung(1),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Deep Panda - three years of attacks to defend China's oil interestsLocation: Beijing, China
Date published: 09-07-2014

Attack vectors demonstrate the sophistication of malware available to cybercriminals globally - Keith Bird, Check Point. Deep Panda - three years of attacks to defend China's oil interests Deep Panda - three years of attacks to defend China's oil interests Crowdstrike, a security research firm co-fo... Read more

Source: www.scmagazineuk.com

Top found tags: financial sector(4),government(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DHS Releases Hundreds of Documents on Wrong Aurora ProjectLocation: Aurora, United States
Date published: 09-07-2014

In response to a Freedom of Information Act request for information about the Operation Aurora attack on Google and other organizations in 2009 the Department of Homeland Security released hundreds of pages of documents related not to that attack campaign, but to the Aurora project run at Idaho Nati... Read more

Source: threatpost.com

Top found tags: cybercrime(4),DHS(4),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
OpenDNS Adds Targeted Attack Protection to Umbrella Security ServiceLocation: Hubbard, United States
Date published: 09-07-2014

OpenDNS has enhanced its cloud-based network security service Umbrella with new capabilities designed to protect organizations against targeted attacks, the company announced on Tuesday. The company says its monitoring systems are capable of detecting malicious traffic from the first stages of a pot... Read more

Source: securityweek.com

Top found tags: report(1),threat(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook Goes to War Against Lecpetex BotnetLocation: Facebook - Menlo Park, United States
Date published: 09-07-2014

Facebook's Threat Infrastructure team helped law enforcement take down a little-known botnet that may have infected as many as 250,000 computers. Known as 'Lecpetex', the botnet was detected by Facebook last year. According to Facebook, the botnet was used to blast out spam that impacted close to 50... Read more

Source: securityweek.com

Top found tags: United States(2),financial sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Greek cops detain Facebook botnet hackers that mined virtual currency on 250,000 PCsLocation: Facebook - Menlo Park, United States
Date published: 09-07-2014

Greek cops detain Facebook botnet hackers that mined virtual currency on. 250,000 PCs Greek police have arrested two people in connection with a botnet that hacked computers to mine a virtual currency similar to Bitcoin and affected over 250,000 machines worldwide. Related: A closer look at Litecoin... Read more

Source: itproportal.com

Top found tags: government(3),financial sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft drops case that severed DNS hosting for millions of No-IP usersLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Microsoft has formally settled legal differences with No-IP, the dynamic domain name host that was kneecapped by a botnet takedown that recently knocked out service to millions of legitimate users. Further Reading [Dramaten_m] Millions of dynamic DNS users suffer after Microsoft seizes No-IP domains... Read more

Source: arstechnica.com International Law Enforcement Critical Infrastructure Symposium | Increased integration between law enforcement and the public and private sectors to secure and protect critical infrastructure is the focus of this joint FBI and INTERPOL symposium.Critical infrastructure refers to the physical and virtual assets, systems and networks, which if incapacitated or destroyed would have a devastating effect on security, the economy and public health and safety. These include energy, ground and air transport, water, stadiums and maritime safety.The four-day event brings together senior government, law enforcement and industry officials in order to discuss common issues and share best practice.With public vigilance an important component of critical infrastructure safety, the symposium also draws attention to INTERPOLs Turn Back Crime campaign which highlights the role the general public can play in making the world safer.The symposium is supported by a number of US government agencies including the US Coast Guard, the Transportation Security Administration, the National Transportation Safety Board, the Federal Aviation Administration and the Nuclear Regulatory Commission. | http://www.interpol.int/News-and-media/Events/2014/International-Law-Enforcement-Critical-Infrastructure-Symposium2/International-Law-Enforcement-Critical-Infrastructure-Symposium | 07-07-2014 | www.interpol.int

Top found tags: update (1),ISP(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Multifactor authentication key to cloud security successLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

The collapse of source code-hosting provider Code Spaces in the wake of an attack on its Amazon Web Services' control panel has sparked industry debate around what the organization should have been doing to protect itself. While the Code Spaces incident was a security failure on several fronts, expe... Read more

Source: searchsecurity.techtarget.com

Top found tags: RSA(2),cybercrime(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DHS Mistakenly Releases 840-pages of Critical Infrastructure Documents Via Mishandled FOIA RequestLocation: Aurora, United States
Date published: 08-07-2014

Aurora Vulnerability DHS Releases Trove of Documents Related to Wrong Aurora in Response to Freedom of Information Act (FOIA) Request The U.S. Department of Homeland Security (DHS) has released hundreds of documents, some of which contain sensitive information and potentially vulnerable critic... Read more

Source: securityweek.com

Top found tags: DHS(4),government(7),United States(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Rolls Out Updates for IE, Microsoft Windows in July Patch TuesdayLocation: Microsoft HQ - Redmond, United States
Date published: 08-07-2014

Patch-Tuesday_grayInternet Explorer and Microsoft Windows are some of the affected applications addressed in this months round of security updates. For their July patch Tuesday,Microsofthas released six security bulletins, two of which are tagged as critical. The three other bulleti... Read more

Source: trendmicro.com

Top found tags: Trend Micro(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
More than $3.75 Billion Reportedly Netted in Boleto Malware BreakoutLocation: Brasilia-Federal District, Brazil
Date published: 08-07-2014

In the 1999 film, Office Space, an average-Joe employee discovers two of his friends are about to be fired as a cost-saving measure at an incredibly monotonous company. As revenge, the group implants a malicious program into the companys accounting system in an ill-fated attempt to steal a minisc... Read more

Source: blogs.mcafee.com

Top found tags: social media(2),cybercrime(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe addresses three vulnerabilities, Flash Player deemed criticalLocation: Adobe HQ - San Jose, United States
Date published: 08-07-2014

Adobe released patches on Tuesday to address three vulnerabilities. Windows and Macintosh users will want to act quickly on the high priority Flash Player update because one of the bugs can be exploited to steal sensitive information, such as credentials. Updating to Flash Player 14.0.0.145 mitigate... Read more

Source: www.scmagazine.com

Top found tags: patch(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senate Intelligence Committee approves cybersecurity sharing billLocation: New York, United States
Date published: 09-07-2014

Plans to end warrantless email searches pass Senate committee Plans to end warrantless email searches pass Senate committee Labeled as the Cybersecurity Information Sharing Act, the legislation was written to encourage and open up more types of information that can be shared between government agenc... Read more

Source: www.zdnet.com

Top found tags: legislation(2),cyber security(6),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senate Intelligence Committee approves cybersecurity billLocation: Department of Homeland Security - Washington, United States
Date published: 09-07-2014

(Reuters) - The U.S. Senate Intelligence Committee approved a bill on Tuesday to encourage companies to exchange information with the government on hacking attempts and cybersecurity threats, officials said. Despite concerns by some that the measure does not do enough to protect privacy, the committ... Read more

Source: reuters.com

Top found tags: cyber security(6),government(8),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Study: AV, anti-malware most used controls for APT defenseLocation: Sac, United States
Date published: 08-07-2014

25,000 servers infected by Operation Windigo to bolster a malware campaign Ninety-six percent of security pros employed AV and anti-malware solutions to protect data from APT attacks, while protections for mobile entry points fell at the bottom of the list. A global poll revealed that AV and a... Read more

Source: www.scmagazine.com

Top found tags: cyber security(4),cybercrime(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senate panel approves data-sharing cybersecurity billLocation: United States Capitol - Washington D.C., United States
Date published: 09-07-2014

The Senate Intelligence Committee voted to approve a cybersecurity bill on Tuesday that proponents say will help stop attacks by reducing legal obstacles to data-sharing between businesses and the government. The text of the Cybersecurity Information Sharing Act, which passed 12-3, has not been rele... Read more

Source: cnet.com.ortal.com

Top found tags: legislation(3),government(5),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Maritime Rows, Cybersecurity Top US-China TalksLocation: Beijing, China
Date published: 09-07-2014

BEIJING - China and the US geared early Wednesday for high-stakes talks on a slew of thorny issues, as American officials warned against rising tensions caused by Beijing's "problematic" claim to swathes of the South China Sea. The maritime disputes, as well as US fears over cybersecurity and Chines... Read more

Source: securityweek.com

Top found tags: South Korea(2),United States(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook scuttles 250k-strong crypto-currency botnetLocation: Facebook - Menlo Park, United States
Date published: 09-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Facebook has taken down a Greek botnet that at its peak compromised 50,000 accounts and infected 250,000 computers to mine crypto-currencies, steal email and banking details and pump out spam. The scuttled Lecpetex botnet spread malware incl... Read more

Source: go.theregister.com

Top found tags: malware(3),financial sector(8),cybercrime(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Latest Snowden Leaks: FBI Targeted Muslim-American LawyersLocation: Green, United States
Date published: 09-07-2014

FRANCE-US-EU-SURVEILLANCE-SNOWDEN [gallery-ca] Frederick Florin/AFP/Getty Images At least five Muslim-Americans, including prominent lawyers, a civil rights leader and academics, were targeted for years-long surveillance by the FBI and the National Security Agency, according to new revelations conta... Read more

Source: wired.com

Top found tags: telecom sector(8),United States(12),government(13)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A Botnet Worth Geeking Out OverLocation: Fortinet - Sunnyvale, United States
Date published: 09-07-2014

You have one new notification! dorkbot question 02 Most people dont think twice about a message from a friend on instant messenger, a link to a funny video from a work colleague, or a USB drive with the latest family album. Most of us also assume the next best cat meme isnt going to offload ou... Read more

Source: blog.fortinet.com Kabinet pakt besmette computernetwerken aan | DEN HAAG - Het Team High Tech Crime van de politie (THTC) heeft vorig jaar 15 grote onderzoeken uitgevoerd naar cybercriminaliteit. In de meeste zaken gebruikten criminelen hierbij zogeheten botnets - besmette computernetwerken - die vaak werden aangestuurd vanuit het buitenland. Om botnets beter te kunnen bestrijden, zet het kabinet nieuwe maatregelen en initiatieven in gang.Dat heeft minister Ivo Opstelten (Veiligheid en Justitie) maandag mede namens zijn collega Henk Kamp van Economische Zaken aan de Tweede Kamer geschreven. Botnets zijn netwerken van genfecteerde computers die, zonder dat de eigenaar dat merkt, ongewenste e-mails kunnen versturen, websites aanvallen of worden gebruikt voor identiteitsdiefstal. Het creren en gebruik van botnets is in Nederland strafbaar.Bij de gezamenlijke aanpak zijn zowel private als publieke organisaties betrokken, die zich hebben verenigd in een werkgroep. Er is onder meer een centrum (Abuse HUB) opgericht waarin informatie wordt verzameld en verwerkt over deze besmettingen, zodat snel kan worden gereageerd. Ook cyberhygine is belangrijk, schrijft Opstelten. Daarom komt in het najaar voor de derde keer een campagne om gebruikers van computers bewuster te maken van de cyberdreiging en hoe ze daar bekwaam op kunnen reageren. Ook nieuwe wetgeving en internationale samenwerking zijn belangrijk om het probleem in te dammen. | http://www.telegraaf.nl/digitaal/22827623/__Maatregelen_tegen_botnets__.html | 07-07-2014 | www.telegraaf.nl

Top found tags: financial sector(2),telecom sector(2),Fortinet(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
1 in 5 enterprises experienced an APT attackLocation: Sac, United States
Date published: 09-07-2014

An ISACA global study shows that one in 5 organizations (21 percent) have experienced an advanced persistent threat (APT) attack, and 66 percent believe it s only a matter of time before their enterprise is hit by an APT. Yet only 15 percent of enterprises believe they are very prepared for an APT a... Read more

Source: net-security.org

Top found tags: telecom sector(2),cybercrime(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
More than a third of security pros sending sensitive data without encryptionLocation: Brussels,Belgium
Date published: 09-07-2014

Statistics show that IT heads are still not taking the importance of encryption seriously Despite headline-making breaches that have called attention to the importance of data encryption, nearly 36% of IT security professionals admit to sending sensitive data outside of their organisations without u... Read more

Source: www.information-age.com CYBERCRIME CHALLENGE LEVERT NEDERLANDSE POLITIE 126 POTENTILE CYBERCRIME RECHERCHEURS OP | De Cybercrime Challenge van de High Tech Crime Unit van de Nederlandse politie is een groot succes. In totaal hebben 7.146 mensen deelgenomen aan de wedstrijd, waarmee zij kans maakte op een baan bij de High Tech Crime Unit. Uiteindelijk zijn 126 mensen uitgenodigd voor een sollicatiegesprek.De Cybercrime Challenge is een wedstrijd die door de High Tech Crime Unit in samenwerking met Tweakers is georganiseerd. Deelnemers kregen een code voorgelegd die zij met minimale aanwijzigingen moesten kraken. Dit bleek een flinke uitdaging te zijn. Van de 7.146 deelnemers wisten 2.842 mensen het antwoord op de eerste vraag te achterhalen. Slechts 627 wisten alle vragen goed te beantwoorden en de volledige Cybercrime Challenge te volbrengen.Van deze 627 mensen zijn de deelnemers met de beste scores uitgenodigd voor een sollicatiegesprek. Daarnaast heeft de High Team Crime Unit naar aanleiding van de Cybercrime Challenge 1.282 sollicatiebrieven ontvangen. In totaal zijn 126 mensen bij de politie op gesprek geweest. Hieruit wordt nog een selectie gemaakt. De High Team Crime Unit is namelijk op zoek naar slechts 37 nieuwe cybercrime rechercheurs. | http://www.executive-people.nl/executive_people/2/12681/cybercrime_challenge_levert_nederlandse_politie_126_potenti__le_cybercrime_rechercheurs_op.html | 08-07-2014 | www.executive-people.nl

Top found tags: cyber security(2),telecom sector(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google catches India with fake certificatesLocation: Google HQ - Mountain View, United States
Date published: 09-07-2014

As the world becomes more dependent, and some might say blindly so, on digital certificates it s only natural that attackers will seek to circumvent this trust. Whether because the Indian government was complicit or a victim of hacking in the issuance of certificates that impersonated Google, the re... Read more

Source: net-security.org

Top found tags: social media(2),cybercrime(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tunisian Hackers Target Governments, Banks in "TheWeekofHorror" Cyber AttacksLocation: University of California - San Diego, United States
Date published: 09-07-2014

Tunisian Hackers Team DDoS Attacks A group operating under the name Tunisian Hackers Team are targeting the websites of government agencies and large organizations with distributed denial of service (DDoS) attacks, according to a public-facing advisory issued by Solutionary. The operation named seve... Read more

Source: securityweek.com

Top found tags: United States(4),cybercrime(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Used phones provide hackers with personal photos, emails and moreLocation: New York, United States
Date published: 09-07-2014

Used phones provide hackers with personal photos, emails and more. Second hand phones contain a vast quantity of personal information that is still accessible, according to a study by security firm, Avast. Avast bought 20 smartphones on eBay that had been "wiped," but were still able to access 40,00... Read more

Source: itproportal.com

Top found tags: cybercrime(3),cyber security(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Don't be a bonehead: Run antivirus on your MacLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

The other day I put together a Q&A for shifting from Windows to the Mac, and under my "must have" utilities I listed an antivirus tool. While many understood the logic of this and agreed with my decision, there were some who saw this as a silly indulgence. super display It's not. In fact, choosing n... Read more

Source: www.zdnet.com

Top found tags: Windows(1),cyber security(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Indian government agency issues fake Google certificatesLocation: Google HQ - Mountain View, United States
Date published: 09-07-2014

proves it Last week Google became aware of fake Google domains issued by the National Informatics Centre (NIC) of India, which holds several intermediate CA certificates trusted by the Indian Controller of Certifying Authorities (India CCA). According to Google security engineer Adam Langley, users ... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),security measures(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook Carries Out Lecpetex Botnet TakedownLocation: Facebook - Menlo Park, United States
Date published: 09-07-2014

Facebook has moved slowly and deliberately into the realm of botnet takedowns by disrupting a relatively small operation in Greece that was using the social platform to spread spam and malware. Two arrests were made in connection with the Lecpetex botnet in Greece on July 3. The alleged botmasters i... Read more

Source: threatpost.com

Top found tags: cyber security(4),financial sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critics slam ISACA's APT reportLocation: Sac, United States
Date published: 09-07-2014

"Fighting off an APT attack using firewalls and anti-virus is akin to shooting at a nuclear warhead with a bow and arrow." Critics slam ISACA's APT report Critics slam ISACA's APT report Research just published claims to show that IT security professionals are relying on their conventional AV and an... Read more

Source: www.scmagazineuk.com

Top found tags: computer forensics(2),cyber security(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Used phones provide hackers with personal photos, emails and moreLocation: New York, United States
Date published: 09-07-2014

Used phones provide hackers with personal photos, emails and more. Second hand phones contain a vast quantity of personal information that is still accessible, according to a study by security firm, Avast. Avast bought 20 smartphones on eBay that had been "wiped," but were still able to access 40,00... Read more

Source: itproportal.com

Top found tags: cybercrime(3),cyber security(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ATTACK of the Windows ZOMBIES on point-of-sale terminalsLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Security watchers have spotted a fresh Windows-based botnet that attempts to hack into point-of-sale systems. Cyber threat intelligence firm IntelCrawler reports that the @-Brt project surfaced in May through underground cybercrime for... Read more

Source: go.theregister.com

Top found tags: financial sector(2),Microsoft(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BrutPOS Botnet Targets POS Systems With Brute-Force AttacksLocation: Kiev, Ukraine
Date published: 09-07-2014

Cybercriminals are using thousands of compromised computers to target point-of-sale (PoS) systems from which they can steal payment card information, FireEye reported on Wednesday. The malware used in these attacks, dubbed BrutPOS by FireEye, was first spotted in February and was later analyzed in M... Read more

Source: securityweek.com

Top found tags: Germany(2),United States(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The New Language In Town Virtual World Lingo- Do You Know It?Location: Oxford, United Kingdom
Date published: 09-07-2014

Over the years, a completely new set of terms, definitions, phrases, abbreviations and descriptions have invaded our vocabulary, thanks to gennext. It has happened slowly but steadily, and most of us are not even aware exactly when we learnt their usage and they became a part of our social media wor... Read more

Source: blogs.mcafee.com

Top found tags: cyber security(2),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Can Twitter spammers steal email addresses?Location: Twitter - San Francisco, United States
Date published: 09-07-2014

Some Twitter users have claimed that cyber-criminals may have been able to spam the email addresses registered with the social networking giant. Can Twitter spammers steal email addresses? Can Twitter spammers steal email addresses? News broke on Wednesday afternoon after Accel data scientist Hilary... Read more

Source: www.scmagazineuk.com

Top found tags: update(2),cybercrime(3),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Light bulb illuminates WiFi weakness: IOT security needs to improveLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Smart light bulb hacked to reveal WiFi password, research project highlights need for development of Internet of Things security. Light bulb illuminates WiFi weakness: IOT security needs to improve Light bulb illuminates WiFi weakness: IOT security needs to improve Researchers with Context Informati... Read more

Source: www.scmagazineuk.com

Top found tags: government(3),cyber security(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Android smartphone reset doesn't wipe your personal info including any nude selfiesLocation: Google HQ - Mountain View, United States
Date published: 08-07-2014

condition. It turns out that they could. ZDNet--Avast_finds- (200 x 257) The security company recovered more than 40,000 photos, 750 emails and texts, 250 names and addresses, the identities of four previous owners, and a completed loan application, among other things. The photos included "more than... Read more

Source: www.zdnet.com

Top found tags: Google Play(2),identity theft(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nude pics, other data, recovered from 'wiped' Android phones purchased on eBayLocation: Google HQ - Mountain View, United States
Date published: 08-07-2014

HackingTeam tool makes use of mobile malware targeting all major platforms Researchers purchased "wiped" Android smartphones on eBay, but were still able to restore the personal data. Restoring Android smartphones to default, or erasing the memory, will not stop attackers from recovering personal in... Read more

Source: www.scmagazine.com

Top found tags: identity theft(2),social media(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian MP fears US Secret Service cuffed his son for Snowden swapLocation: National Security Agency - Fort Meade, United States
Date published: 08-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines The US Secret Service has announced the arrest of a man accused of being "one of the world's most prolific traffickers in stolen financial information," touching off a diplomatic firestorm in the process. Roman Valerevich Seleznev, who goes ... Read more

Source: go.theregister.com

Top found tags: government(3),financial sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US nabs a hacker in the Maldives, but Russia sees it as kidnappingLocation: Kiev, Ukraine
Date published: 08-07-2014

is stirring up diplomatic difficulties. The suspect, 30-year-old Roman Valerevich Seleznev, is the son of a Russian lawmaker.The Russian Foreign Ministry, which says he was arrested in an airport in the Maldives, has condemned the tactics used by the US. Seleznev has now been transported to Guam, ... Read more

Source: arstechnica.com

Top found tags: legislation(3),financial sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian man arrested for POS hacks draws Russia's ireLocation: New York, United States
Date published: 08-07-2014

A nearly two-year FBI investigation led to the arrest of the 27-year-old man. Roman Seleznev, son of a Russian lawmaker, was picked up in Maldives and taken into U.S. custody in Guam, three years after being indicted. Authorities have arrested a 30-year-old Russian man for a bevy of point-of-sale (P... Read more

Source: www.scmagazine.com

Top found tags: United States(2),financial sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
More Choices for Encryption to Protect Your Data-At-RestLocation: McAfee - Santa Clara, United States
Date published: 09-07-2014

A couple of months ago I participated in a Twitter Chat with IT World Canada which was fast, furious and a lot of fun. A few questions came up that I should address in a couple of blogs; (1) what should people look for when selecting an encryption solution, and (2) how do those encryption keys work ... Read more

Source: blogs.mcafee.com

Top found tags: update(2),cybercrime(5),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Five arrested over fake UK government sitesLocation: Microsoft HQ - Redmond, United States
Date published: 07-07-2014

Five arrested over fake UK government sites. Five people have been arrested over the creation of fake government websites. The sites, which are designed to look like official government domains, often ask users for money for services that are actually free. In particular, most of the scams involved ... Read more

Source: itproportal.com

Top found tags: identity theft(2),United Kingdom(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fake Google Digital Certificates Issued by Indian OrganizationLocation: Google HQ - Mountain View, United States
Date published: 09-07-2014

Rogue digital certificates issued in India for several Google domains were identified and blocked last week, Google representatives said Tuesday. According to Google Security Engineer Adam Langley, the unauthorized certificates were issue by India's National Informatics Center (NIC), which holds sev... Read more

Source: securityweek.com

Top found tags: mobile device(2),OS X(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Heartbleed (remediation) has improved open source cybersecurityLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

The future of computing infrastructure, mobile applications, and personal data protection has been altered by Heartbleed says Joram Borenstein. Heartbleed (remediation) has improved open source cybersecurity Heartbleed (remediation) has improved open source cybersecurity Most of us take for granted ... Read more

Source: www.scmagazineuk.com

Top found tags: social media(2),OpenSSL(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US "kidnapped" hacker, claims Russian Foreign MinistryLocation: Department of Homeland Security - Washington, United States
Date published: 09-07-2014

US "kidnapped" hacker, claims Russian Foreign Ministry. With Russian and US relations already strained, the recent arrest of hacker Roman Velerevich Seleznev has caused further diplomatic difficulties. The 30-year-old Russian national was arrested by the US Department of Homeland Security while in a... Read more

Source: itproportal.com

Top found tags: identity theft(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Most UK firms expect to be targeted by cyber-attacks next yearLocation: Brown, United States
Date published: 09-07-2014

Two-thirds of UK companies believe that they will be targeted by a cyber-attack within the next year, leading some industry observers to question whether business defences are up to scratch. Most UK firms expect to be targeted by cyber-attacks next year Most UK firms expect to be targeted by cyber-a... Read more

Source: www.scmagazineuk.com

Top found tags: government(2),United Kingdom(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ex-NSA boss Alexander joins bankers' CYBER WAR COUNCILLocation: Alexander, United States
Date published: 09-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Former NSA head Keith Alexander has been tapped up to advise a new cyber war council for government and financial institutions in the US, according to Bloomberg. The biz news site has seen a proposal from the Securities Industry and Financia... Read more

Source: go.theregister.com

Top found tags: cyber security(6),financial sector(6),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Weaponized exploit can steal user cookies on eBay, Tumblr, other sitesLocation: Google HQ - Mountain View, United States
Date published: 08-07-2014

millions of end users' authentication credentials on sites including eBay, Tumblr, and Instagram, a well-respected security researcher said Tuesday. The exploitwhich stems from the ease of embedding malicious commands into Adobe Flash files before they're executedhas been largely mitigated by ... Read more

Source: arstechnica.com

Top found tags: telecom sector(2),update(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FAKE Google web SSL certificates tip-toe out from Indian authoritiesLocation: Google HQ - Mountain View, United States
Date published: 09-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Google is warning that dodgy SSL certificates have been issued by India's National Informatics Centre (NIC): these certs can be used by servers to masquerade as legit Google websites and eavesdrop on or tamper with users' encrypted communica... Read more

Source: go.theregister.com

Top found tags: Microsoft(2),OS X(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK extends device charge test to all air travellersLocation: London, United Kingdom
Date published: 09-07-2014

By AAP July 9, 2014 -- 06:27 GMT (07:27 BST) All air passengers flying into or out of British airports, and not just those on US-bound flights, must ensure their electronic devices are charged. Advice issued at the weekend concerned passengers flying to the US, but on Tuesday night the British the D... Read more

Source: www.zdnet.com

Top found tags: airport sector(2),United Kingdom(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Global cloud services market to reach $555 billion by 2020Location: Cloud, United States
Date published: 09-07-2014

The global cloud services market is expected to grow at a CAGR of 17.6% from 2014 to 2020, reaching a market size of $555 billion in 2020, according to Allied Market Research. In 2014, the overall cloud services market revenue will reach $209.9 billion, led by public cloud services. The community cl... Read more

Source: net-security.org

Top found tags: government(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Free guide: Introduction to LinuxLocation: New York, United States
Date published: 09-07-2014

This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter. For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed... Read more

Source: net-security.org

Top found tags: EN(1),Linux(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government hopes 90m worth of faster Wi-Fi will make up for dreadful National Rail performanceLocation: New York, United States
Date published: 07-07-2014

theSulleymander. Government hopes 90m worth of faster Wi-Fi will make up for dreadful National Rail performance 90 million is to be pumped into the improvement of Wi-Fi on trains across England and Wales over the next three to four years. The government says that the new services will be up to 1... Read more

Source: itproportal.com

Top found tags: Apple(1),EN(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Boffins slapped by ONE THOUSAND wobbly bits after 'wiped' phone probeLocation: Sophos HQ - Oxfordshire, United Kingdom
Date published: 09-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Security researchers have endured a thousand nude selfies pulled from second-hand phones and fondleslabs in a bid to warn users keen to hock unused devices. The beleaguered security bods saw 750 photos of naked women and 250 images of manhoo... Read more

Source: go.theregister.com

Top found tags: financial sector(4),social media(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Weaponised Flash flaw can pinch just about anything from anywhereLocation: Google HQ - Mountain View, United States
Date published: 09-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Get cracking with the latest Flash upgrade, because the vulnerability it patches is a peach, allowing a cross-site request forgery (CSRF) attack for stealing user credentials. According to the Switzerland-based Google engineer that turned up... Read more

Source: go.theregister.com

Top found tags: patch(2),social media(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google, Twitter, Tumblr fix bug exposing users to data-stealing Flash attackLocation: Google HQ - Mountain View, United States
Date published: 09-07-2014

A new "weaponised exploit" that abuses Adobe Flash has forced Google, Twitter, Tumblr, and others to fix a well-known weakness in widely-used web tools that allow an attacker to extract sensitive data from users' devices. The attack tool, dubbed Rosetta Flash by Google researcher Michele Spagnuolo, ... Read more

Source: www.zdnet.com

Top found tags: social media(2),update(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Big Data security mistakes, tips and tricksLocation: New York, United States
Date published: 09-07-2014

In this interview, Mark Cusack, Chief Architect at RainStor, talks about the main challenges of handling petabyte-scale volumes of data, illustrates the most obvious mistakes that companies make with their Big Data projects and offers advice to organizations about to welcome Big Data into their clou... Read more

Source: net-security.org

Top found tags: HIPAA(1),ISP(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyberbullying Where Did It All Start?Location: Stockholm, Sweden
Date published: 09-07-2014

You would be hard pressed to find a parent who doesnt worry about cyberbullying, and rightly so. Cyberbullying can be absolutely devastating for victims. A quick google provides parents with a list of tragic cases of young adults who have suffered significant psychological trauma or even lo... Read more

Source: blogs.mcafee.com

Top found tags: Sweden(1),TV (1),cyber bullying(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI, Interpol Host Critical Infrastructure SymposiumLocation: Interpol - Lyon, France
Date published: 08-07-2014

FBI Director James Comey was in Miami yesterday, where he spoke at the opening of the four-day International Law Enforcement Critical Infrastructure Symposium. The event, co-hosted by the FBIs Weapons of Mass Destruction (WMD) Directorate and Interpol, has drawn senior law enforcement officials f... Read more

Source: www.fbi.gov

Top found tags: information sharing(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden Has Applied to Extend Russia Stay: LawyerLocation: National Security Agency - Fort Meade, United States
Date published: 09-07-2014

MOSCOW - Fugitive US intelligence contractor Edward Snowden has formally requested to stay in Russia past July 31, when his one-year asylum status expires, his lawyer said on Wednesday. "We have already filed documents to extend his stay in Russia," Anatoly Kucherena told AFP. Kucherena did not say ... Read more

Source: securityweek.com

Top found tags: Russia(1),government(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe Patches Flash Player to Prevent "Rosetta Flash" AttacksLocation: Adobe HQ - San Jose, United States
Date published: 09-07-2014

Adobe released security updates for Flash Player on Tuesday to address a total of three vulnerabilities, including one that affected several high-profile web sites. Adobe Flash Player 14.0.0.145 for Windows and Mac, and Adobe Flash Player 11.2.202.394 for Linux contain fixes for the vulnerabilities ... Read more

Source: securityweek.com

Top found tags: update(2),vulnerability(3),Hack In The Box(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DNI, Justice Department Deny Targeting Americans for Surveillance Based on Religion, PoliticsLocation: New York, United States
Date published: 09-07-2014

The Director of National Intelligence and the Department of Justice have denied a report based on leaked documents from Edward Snowden that United States intelligence and law enforcementagencies conduct surveillance of Americans based on their ethnicity, religious affiliation or political stance... Read more

Source: threatpost.com

Top found tags: Department of Justice(3),United States(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Snooped on Muslim-American Leaders: ReportLocation: National Security Agency - Fort Meade, United States
Date published: 09-07-2014

WASHINGTON - The FBI and National Security Agency monitored the emails of prominent Muslim-American activists, academics and a political candidate, according to a report co-authored by journalist Glenn Greenwald. The report appearing in the online news site The Intercept said the surveillance was au... Read more

Source: securityweek.com

Top found tags: NSA(2),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FireEye Fixes Security Vulnerabilities in FireEye Operating System (FEOS)Location: New York, United States
Date published: 09-07-2014

FireEye Operating System (FEOS) updates that address a series of security vulnerabilities have been released for several products, FireEye announced on Tuesday. The updates fix flaws in FEOS NX, EX, AX, FX and CM. The company advises customers to upgrade their installations to NX 7.1.1.222846, EX 7.... Read more

Source: securityweek.com

Top found tags: website(1),XSS(1),vulnerability(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA and FBI agents are spying on Muslim-American leadersLocation: Department of Homeland Security - Washington, United States
Date published: 09-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines New documents from whistleblower Edward Snowden confirm that the NSA and the FBI spy on Muslim-American leaders, including Republican Party politicians and military veterans. The Intercept reports that the Feds are using tactics and techniqu... Read more

Source: go.theregister.com

Top found tags: FBI(2),government(9),United States(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: Snowden applies for extended asylum in RussiaLocation: National Security Agency - Fort Meade, United States
Date published: 09-07-2014

U.S. National Security Agency whistleblower Edward Snowden has applied for extended asylum in Russia, according to news reports. Snowden, the former NSA contractor who has leaked details of the agencys worldwide surveillance activities, will seek an extension after Russias approval for him to ... Read more

Source: www.pcworld.com

Top found tags: NSA(2),United States(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Germany Probing Second Case of Alleged US SpyingLocation: Berlin, Germany
Date published: 09-07-2014

BERLIN - The second case within days of alleged US spying in Germany on Wednesday threatened to further strain transatlantic ties already frayed by the NSA surveillance scandal. German authorities said police had searched the Berlin-area home and office of a man who, local media reported, is a Germa... Read more

Source: securityweek.com

Top found tags: United States(8),government(11),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PCI council's Bob Russo to retire, new general manager namedLocation: New York, United States
Date published: 09-07-2014

The long-time head of the PCI Security Standards Council, Bob Russo, will step down as General Manager of the organization at the end of 2014 he will be succeeded by Stephen W. Orfei. As the inaugural general manager of the organization, which was created in 2006 by the major payment card provid... Read more

Source: www.scmagazine.com

Top found tags: EN(1),ISP(1),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Former employee posts data online, 10K impacted in Missouri school districtLocation: Park, United States
Date published: 09-07-2014

At Park Hill School District in Missouri, more than 10,000 current and former staffers and students are being notified that their personal information including Social Security numbers was accessed after a former employee made the data accessible from the internet. How many victims? 10,210. ... Read more

Source: www.scmagazine.com

Top found tags: education(1),EN(1),training(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

Yokogawa Centum Buffer Overflow VulnerabilityLocation: Aurora, United States
Date published: 08-07-2014

Aurora Vulnerability DHS Releases Trove of Documents Related to Wrong Aurora in Response to Freedom of Information Act (FOIA) Request The U.S. Department of Homeland Security (DHS) has released hundreds of documents, some of which contain sensitive information and potentially vulnerable critic... Read more

Source: ics-cert.us-cert.gov

Top found tags: DHS(4),government(7),United States(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ABB Relion 650 Series OpenSSL Vulnerability (Update A)Location: Aurora, United States
Date published: 08-07-2014

Aurora Vulnerability DHS Releases Trove of Documents Related to Wrong Aurora in Response to Freedom of Information Act (FOIA) Request The U.S. Department of Homeland Security (DHS) has released hundreds of documents, some of which contain sensitive information and potentially vulnerable critic... Read more

Source: ics-cert.us-cert.gov

Top found tags: DHS(4),government(7),United States(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Microsoft snijdt digitale bankrover de pas afLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Om gebruikers tegen een Trojaans paard te beschermen dat gegevens voor internetbankieren steelt, heeft Microsoft deze maand de in Windows ingebouwde Malicious Software Removal Tool (MSRT) van een update voorzien. De virusverwijdertool is nu in staat om de Caphaw banking Trojan te verwijderen. Caphaw... Read more

Source: www.security.nl

Top found tags: malware(3),Microsoft(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook schakelt omvangrijk Bitcoin-botnet uitLocation: Facebook - Menlo Park, United States
Date published: 09-07-2014

Een botnet dat uit mogelijk 250.000 besmette computers bestond en de genfecteerde machines Bitcoins liet delven, is dankzij de inzet van Facebook uitgeschakeld. Het gaat om het Lecpetex-botnet dat eind vorig jaar verscheen en Facebook, spamberichten en Torrent-sites gebruikte om zichzelf te verspr... Read more

Source: www.security.nl

Top found tags: social media(2),cybercrime(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft dicht 24 lekken in Internet ExplorerLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Tijdens de patchdinsdag van juli heeft Microsoft zes updates uitgebracht die in totaal 29 lekken verhelpen, waarvan 24 in Internet Explorer en 5 in Windows. Van de 24 gepatchte lekken in IE waren er 23 direct aan Microsoft gemeld en n al publiek bekend. Via de kwetsbaarheden in IE kan een aanval... Read more

Source: www.security.nl

Top found tags: patch(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spamhaus hoopt op arrestatie van DDoS-deelnemersLocation: Moscow, Russia
Date published: 09-07-2014

Anti-spamorganisatie Spamhaus die vorig jaar het doelwit van een grootschalige DDoS-aanval werd hoopt dat naast de twee personen die al zijn aangehouden ook vijf andere deelnemers aan de aanval worden opgepakt. Spamhaus is bekend vanwege de Spamhaus Domain Block List (DBL). Deze lijst bestaat uit do... Read more

Source: www.security.nl

Top found tags: Russia(1),spam(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI: computer met wachtwoord mogelijk verdachtLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 09-07-2014

De FBI heeft met de zomervakantie in aantocht verschillende veiligheidstips voor internetgebruik gegeven die uitleggen hoe ouders hun kinderen tegen "online predators" kunnen beschermen, maar ook wat de signalen zijn dat iemand mogelijk kinderpornografisch materiaal verbergt. De veiligheidstips best... Read more

Source: www.security.nl

Top found tags: child pornography(2),telecom sector(2),pornography(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook legt Bitcoin-botnet platLocation: Facebook - Menlo Park, United States
Date published: 09-07-2014

Facebook heeft het Bitcoin-botnet Lecpetex platgelegd. Het botnet maakte gebruik van Facebook, spam en Torrent-sites om zich te verspreiden. Lecpetex gebruikte de besmette systemen om Bitcoins te laten minen. In het botnet zaten zon 250.000 systemen uit Griekenland, Polen, Noorwegen, Inda, Portug... Read more

Source: www.automatiseringgids.nl

Top found tags: social media(2),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rusland noemt arrestatie Russische cybercrimineel ontvoeringLocation: New York, United States
Date published: 09-07-2014

De arrestatie van een vermeende Russische cybercrimineel door de Amerikaanse autoriteiten beschouwt Rusland als ontvoering. Eerder deze week meldde het Amerikaanse Ministerie van Homeland Security de arrestatie van Roman Selznyov, zoon van een Russische politicus. Selznyov wordt verdacht van het inb... Read more

Source: www.security.nl

Top found tags: cybercrime(4),government(4),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

Adobe patcht drie kritieke lekken in Flash PlayerLocation: Adobe HQ - San Jose, United States
Date published: 09-07-2014

Net als Microsoft heeft Adobe tijdens de tweede dinsdag van juli beveiligingsupdates uitgebracht. Het gaat om patches voor verschillende versies van Flash Player op Windows, Mac OS X, Linux, Android en iOS, die in totaal drie kritieke kwetsbaarheden verhelpen. Via de lekken is het mogelijk om de bev... Read more

Source: www.security.nl

Top found tags: OS X(2),patch(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google ontdekt valse SSL-certificaten voor Google-domeinenLocation: Google HQ - Mountain View, United States
Date published: 09-07-2014

Google heeft valse SSL-certificaten ontdekt die voor verschillende Google-domeinen waren uitgegeven en gebruikt hadden kunnen worden om internetgebruikers mee aan te vallen. De valse SSL-certificaten waren recent door een Indiase uitgever van SSL-certificaten uitgegeven en op 2 juli ontdekt. SSL-cer... Read more

Source: www.security.nl

Top found tags: Microsoft(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'NSA bespioneert prominente Amerikaanse moslims'Location: New York, United States
Date published: 09-07-2014

De NSA en FBI hebben de e-mails van prominente Amerikaanse moslims afgeluisterd. Procedures die terrorisme moeten bestrijden zijn ingezet tegen een Republikeinse politicus, academici, advocaten en activisten. Dat meldt The Intercept woensdag. Onder de bespioneerden bevindt zich Faisal Gill, die acti... Read more

Source: www.nutech.nl

Top found tags: The Netherlands(2),government(8),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe brengt patch uit voor kritieke lekken in Flash PlayerLocation: Adobe HQ - San Jose, United States
Date published: 09-07-2014

Adobe heeft een update van de Flash Player uitgebracht om zo een aantal kritieke lekken te dichten. Door een van de kwetsbaarheden is het bijvoorbeeld mogelijk om de browser van een gebruiker over te nemen. Adobe Flash PlayerDe beveiligingsgaten hebben de hoogste kwalificatie gekregen en maken het v... Read more

Source: tweakers.net

Top found tags: telecom sector(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Plasterk: Microsoft 365 binnen overheid beperkt gebruiktLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Binnen de overheid en semi-publieke instellingen wordt Microsoft 365 in een beperkt aantal gevallen gebruikt, zo heeft minister Plasterk van Binnenlandse Zaken laten weten. Plasterk reageerde op vragen van VVD-Kamerleden De Liefde, Moors, Dijkhoff en Litjens over de dataopslag door de overheid. De V... Read more

Source: www.security.nl

Top found tags: The Netherlands(2),government(5),Ministry of the Interior and Kingdom Relations(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor Project aangeklaagd wegens wraakpornoLocation: Texas, United States
Date published: 09-07-2014

Het Tor Project is samen met een website waarop "wraakporno" is te zien door een vrouw in de staat Texas aangeklaagd. Het gaat om de website Pinkmeth.com, die alleen via het Tor-netwerk toegankelijk is. De site zou zonder toestemming naaktfoto's van Shelby Conklin hebben geplaatst. In 2012 klaagde d... Read more

Source: www.security.nl

Top found tags: NL(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Mobiel internetbankieren telt 1,75 miljard gebruikers in 2019'Location: Amsterdam, The Netherlands
Date published: 09-07-2014

Over vijf jaar zullen meer dan 1,75 miljard mensen via hun smartphone of tablet bankieren, ongeveer eenderde van de volwassen wereldbevolking, zo voorspelt marktvorser Juniper in een nieuw onderzoeksrapport. Op dit moment doen 800 miljoen mensen aan mobiel internetbankieren. Met name in opkomende la... Read more

Source: www.security.nl

Top found tags: report(2),financial sector(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft waarschuwt voor einde Windows 7 supportLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Nog zo'n zes maanden en dan stopt Microsoft de mainstream support van Windows 7, alsmede Windows Server 2008 en verschillende andere producten. Daarvoor waarschuwt de softwaregigant. Het einde van de mainstream support houdt in dat er geen nieuwe features meer worden toegevoegd. Wel blijven de produ... Read more

Source: www.security.nl

Top found tags: update(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe patcht 3 kritieke lekkenLocation: Adobe HQ - San Jose, United States
Date published: 09-07-2014

Adobe heeft een update voor Flash Player uitgebracht die 3 kritieke lekken moet dichten. De patches zijn bestemd voor versies van FP voor Windows, Linux, OX X, Android en iOS. De lekken hebben de hoogste kwalificatie kritiek omdat een kwaadwillende hiermee in het ergste geval de besmette syste... Read more

Source: www.automatiseringgids.nl

Top found tags: Windows(1),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft dicht 29 lekken in patchrondeLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Microsoft heeft gisteren in zijn maandelijkse ronde patches uitgebracht voor 29 lekken in Windows en Internet Explorer. Daarvan zijn er twee kritiek. De lekken die de hoogste kwalificatie kritiek hebben gekregen, kunnen misbruikt worden voor Remote Code Execution (RCE). Dat vereist in deze gev... Read more

Source: www.automatiseringgids.nl

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google ontdekt valse certificaten voor eigen subdomeinenLocation: Google HQ - Mountain View, United States
Date published: 09-07-2014

Er blijken diverse valse digitale certificaten uitgegeven door het National Informatics Centre van India, deze zijn afgelopen woensdag ontdekt. De certificaten vertrouwd door de meeste programma's die op Windows draaien. Google zegt geen indicatie te hebben dat er grootschalig misbruik is gemaakt.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Microsoft(1),NL(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft en Adobe brengen patch uit voor kritieke lekkenLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Microsoft en Adobe hebben beide een aantal updates uitgebracht. Voor Flash Player zijn een aantal kritieke lekken gedicht en Microsoft heeft zes updates uitgebracht die in totaal 29 lekken verhelpen, waarvan 24 in Internet Explorer en 5 in Windows. Flash logoDoor een van de kwetsbaarheden in Flash P... Read more

Source: www.beveiligingnieuws.nl

Top found tags: patch(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Diverse kwetsbaarheden in dbus verholpenLocation: Ubuntu - London, United Kingdom
Date published: 09-07-2014

Samenvatting: Een drietal kwetsbaarheden in de dbus messaging daemon geven een kwaadwillende de mogelijkheid een Denial of Service uit te voeren op (delen van) de message bus. Gevolgen: Een aanvaller kan gebruikers de toegang tot een service die gebruik maakt van de dbus daemon ontzeggen of services... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-041: Microsoft verhelpt kwetsbaarheid in DirectShowLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Samenvatting: Microsoft heeft updates beschikbaar gesteld waarmee een kwetsbaarheid wordt verholpen in DirectShow. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken voor het verkrijgen van verhoogde gebruikersrechten. Beschrijving: Door een kwetsbaarheid in DirectShow kan een lokale kwaadw... Read more

Source: www.ncsc.nl

Top found tags: Microsoft(1),NL(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-040: Microsoft verhelpt kwetsbaarheid in WindowsLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Samenvatting: Microsoft heeft updates beschikbaar gesteld waarmee een kwetsbaarheid wordt verholpen in Microsoft Windows. Gevolgen: Een kwaadwillende persoon met een lokaal gebruikersaccount kan door deze kwetsbaarheid te misbruiken gegevens inzien van lokale gebruikersaccounts met hogere privileges... Read more

Source: www.ncsc.nl

Top found tags: Microsoft(2),The Netherlands(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-039: Microsoft verhelpt kwetsbaarheid in WindowsLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Samenvatting: Microsoft heeft updates beschikbaar gesteld waarmee een kwetsbaarheid wordt verholpen in Microsoft Windows. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken uitvoeren van willekeurige code, mogelijk met verhoogde gebruikersrechten. Beschrijving: Door een kwetsbaarheid in On-... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-038: Microsoft verhelpt kwetsbaarheid in WindowsLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Samenvatting: Microsoft heeft updates beschikbaar gesteld waarmee een kwetsbaarheid wordt verholpen in Microsoft Windows. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken voor het op afstand uitvoeren van willekeurige code. Beschrijving: Door een kwetsbaarheid in Windows Journal kan een k... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-037: Microsoft verhelpt meerdere kwetsbaarheden in Internet ExplorerLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Samenvatting: Microsoft heeft een groot aantal kwetsbaarheden in Internet Explorer verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om willekeurige code uit te voeren onder de rechten van een gebruiker, verhoogde rechten te verkrijgen of een beveiligingsmaatregel in S... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FreeBSD heeft meerdere kwetsbaarheden in Kernel verholpenLocation: Kern, United States
Date published: 09-07-2014

Samenvatting: FreeBSD heeft meerdere kwetsbaarheden in Kernel verholpen. Gevolgen: Een kwaadwillende kan door het misbruiken van deze kwetsbaarheden toegang verkrijgen tot gevoelige gegevens. Beschrijving: Het buffer- en padding geheugen van Kernel control messages wordt in sommige gevallen niet goe... Read more

Source: www.ncsc.nl

Top found tags: NL(1),patch(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NTP kwetsbaarheid ontdekt in Cisco IOSLocation: Cisco HQ - San Jose, United States
Date published: 09-07-2014

Samenvatting: Er is een NTP gerelateerde kwetsbaarheid ontdekt in Cisco IOS. Gevolgen: Een kwaadwillende kan door deze kwetsbaarheid te misbruiken beveiligingsmaatregelen omzeilen. Beschrijving: Er is een kwetsbaarheid ontdekt in Cisco IOS waarbij een ongeauthenticeerde kwaadwillende op afstand de g... Read more

Source: www.ncsc.nl

Top found tags: NTP(1),vulnerability(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in Apache TomcatLocation: IBM HQ - Armonk, United States
Date published: 09-07-2014

Samenvatting: Apache heeft updates uitgegeven om een kwetsbaarheid in Apache Tomcat te verhelpen. Een aanvaller kan de kwetsbaarheid misbruiken om een Denial-of-Service te veroorzaken. Inmiddels is een exploit publiek beschikbaar. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken ... Read more

Source: www.ncsc.nl

Top found tags: NL(1),patch(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish