Under construction

New design coming soon!

CIC News engine statistics

CIC News for 10-07-2014 contains 134 articles: cybercrime(47),cyber security(45),data breach(8),other(34)

CIC News update contains 108 English and 26 Dutch articles for today.
There are 8 published advisories, 0 are English and 8 are Dutch.
In today's English news articles:
- 31 related to cybercrime
- 44 related to cyber security
- 8 related to data breach and identity theft
- 25 for the category other news

In today's Dutch news articles:
- 16 related to cybercrime
- 1 related to cyber security
- 9 for the category other news

Have fun reading.

English cybercrime related news

30,000 fake copyright notices emailed with trojan horseLocation: Berlin, Germany
Date published: 08-07-2014

Getting a copyright notice from a law firm can be scary. Getting a fake one that contains a trojan horse and could potentially steal your data is terrifying and its been happening in Germany.According to TorrentFreak approximately 30,000 fake emails citing copyright violations regarding tracks fr... Read more

Source: thenextweb.com

Top found tags: report(1),Germany(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware in business: Who's to blame?Location: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

A week doesn't go by without us hearing about a security breach. The recent Heartbleed hacks that affected Australian websites and eBay's security breach are just two examples that made the headlines. Yet, attacks happen every minute - we just don't hear about them all.Breaches are happening too fre... Read more

Source: www.abc.net.au

Top found tags: Windows(1),vulnerability(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google's Android security chief: Don't bother with anti-virus. Is he serious?Location: Google HQ - Mountain View, United States
Date published: 09-07-2014

Just before the recent Google I/O developer conference, Google's chief security engineer for Android, Adrian Ludwig, told journalists that most users shouldn't bother with anti-virus.Ludwig said \"99%\" of Android users wouldn't benefit from a mobile anti-virus and declared that the risk from Androi... Read more

Source: nakedsecurity.sophos.com

Top found tags: report(1),threat(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police crack Sydney taxi skimming ringLocation: Sydney, Australia
Date published: 09-07-2014

Four men have been charged over a highly-sophisticated credit card skimming ring that targeted taxi passengers in Sydney.Detectives from a fraud and cybercrime squad dismantled the group last week when they arrested four men at a motel in Chullora in Sydney's west, where they seized 800 blank credit... Read more

Source: www.dailymail.co.uk

Top found tags: cybercrime(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Four arrested over alleged credit card skimming syndicate targeting taxi customersLocation: Sussex, United States
Date published: 09-07-2014

POLICE have arrested four men after dismantling an alleged credit card skimming syndicate targeting taxi customers across Sydney.The four men, including one taxi driver, were arrested last week at a Chullora motel, where police allegedly found 800 blank fraudulent credit cards, a card encoder and a ... Read more

Source: www.news.com.au

Top found tags: cybercrime(2),financial sector(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Political' DDoS Attacks Skyrocket in RussiaLocation: Kiev, Ukraine
Date published: 09-07-2014

Commercial hackers in Russia are giving way to politically motivated cyber criminals targeting ideological enemies, a new study said Wednesday.The most powerful DDoS attacks on Russian websites in the first six months of 2014 were triggered by the political crisis in Ukraine, digital security compan... Read more

Source: www.themoscowtimes.com

Top found tags: website(1),DoS(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
USG Aurora Data DumpLocation: Aurora, United States
Date published: 07-07-2014

Thanks Dan for the tip.First a reading tip to save you time. Most of the 840 pages are weekly reports from the DHS Control System Security Program (CSSP). There is a ton of repetition as each weeks report carries forward all of the previous weeks items. So go straight to page 750 and you will ... Read more

Source: www.digitalbond.com

Top found tags: vulnerability(2),DHS(3),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police 'must step up e-crime fight'Location: Home Affairs Select Committee - London, United Kingdom
Date published: 08-07-2014

Police forces need to do more to tackle the threat of cyber crime, Labour said today.Shadow Home Office minister Baroness Smith of Basildon said it was estimated that half of the country had been targeted by online scams\"Recorded online fraud is up by 30% but that is just the tip of the iceberg bec... Read more

Source: uk.news.yahoo.com

Top found tags: United Kingdom(2),Home Affairs Select Committee(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why cybercriminals are hiring translatorsLocation: Amsterdam, The Netherlands
Date published: 09-07-2014

Cybercrime is drawing in trained translators to help would-be attackers craft targeted attacks around the world, experts have said.Speaking at a security event taking place today in Amsterdam, Raj Samani, EMEA CTO of McAfee, said cybercriminals often target people in a different country in order to ... Read more

Source: www.pcpro.co.uk

Top found tags: scam(1),spam(1),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Flash vulnerability lets hackers steal data from Macs and PCsLocation: Adobe HQ - San Jose, United States
Date published: 09-07-2014

Adobe has issued a critical Flash update for Windows PCs and Mac computers after a security flaw has been discovered that lets hackers prey on users of sites such as Twitter, Tumblr, eBay and Instagram.The update, which brings Flash to version 14.0.0.145, was published after security blogger Michele... Read more

Source: www.siliconrepublic.com

Top found tags: Windows(1),social media(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mob-Busting Tools Emerge as Weapon Against CybercrimeLocation: Seattle, Washington, United States
Date published: 09-07-2014

To combat white-collar crime, federal prosecutors are increasingly relying on the same law-enforcement tactics used to bust organized criminals such as drug dealers and gangsters.The Wall Street Journal earlier this week wrote about a sweeping FBI sting operation mounted against penny stock co... Read more

Source: stream.wsj.com

Top found tags: government(2),United States(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Buffer Overflow Vulnerabilities in Yokogawa ICS Gear PatchedLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Vulnerabilities in production control system software used in manufacturing, energy and other critical industries worldwide have been patched by the vendor, an advisory from the Industrial Control System Cyber Emergency Response Team said. Yokogawa Electric Corp., of Japan patched critical buffer ov... Read more

Source: threatpost.com

Top found tags: government(2),vulnerability(2),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Former NSA chief pitches consulting work for $1 million per monthLocation: Alexander, United States
Date published: 09-07-2014

The National Security Agency's (NSA) former chief hasn't retired just yet. After leaving the agency in March, Keith Alexander is now pitching his cyber consultant services to the country's biggest financial institutions. It'll cost them, though. Alexander is reportedly asking for up to $1 million pe... Read more

Source: www.scmagazine.com

Top found tags: Gen. Keith Alexander(3),government(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook disrupts cryptocurrency-mining botnet LecpetexLocation: Facebook - Menlo Park, United States
Date published: 09-07-2014

Facebook disrupts cryptocurrency-mining botnet Lecpetex Lecpetex attackers may have infected up to 250,000 computers, Facebook revealed. Facebook has teamed with law enforcement to disrupt malicious operations linked to "Lecpetex," a cryptocurrency-mining botnet composed of up to 250,000 infected co... Read more

Source: www.scmagazine.com

Top found tags: United States(2),social media(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Evolving History of Havex Module DownloaderLocation: New York, United States
Date published: 09-07-2014

During the investigation of Havex Trojan, I was able to find more Havex module downloader variants. Currently, there are around 68 versions. In this blog, Ill give a brief evolving history of Havex module downloader. Following is the list of different versions in different time period, starts fro... Read more

Source: blog.fortinet.com

Top found tags: website(1),trojan(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft abandons No-IP malware caseLocation: Microsoft HQ - Redmond, United States
Date published: 10-07-2014

by taking over 21 high-level domains, but it ended with a whimper as Microsoft dropped its case against the dynamic Domain Name System (DNS) Internet provider No-IP. No-IP-Logo Microsoft had convinced the US District Court in Nevada in June 2014 that Vitalwerks Internet Solutions, under the tradenam... Read more

Source: www.zdnet.com

Top found tags: update(2),cybercrime(3),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FireEye patches OS, torpedos Exploit-DB disclosureLocation: Bourbon, United States
Date published: 10-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines FireEye has patched a series of publicly-disclosed flaws in its operating system (FEOS) that facilitated man-in-the-middle attacks and command injection. The vulnerabilities released over June affected versions NX, EX, AX, FX, and CM of the ... Read more

Source: go.theregister.com

Top found tags: vulnerability(1),website(1),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese hackers infiltrate US government networkLocation: Beijing, China
Date published: 10-07-2014

Chinese hackers accessed US government systems earlier this year in order to target the files of federal employees who have applied for top-level security clearances. According to the New York Times, senior American officials said hackers gained access to the system in March before the infiltration ... Read more

Source: www.zdnet.com

Top found tags: cybercrime(3),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Global rise in Android banking and payment malwareLocation: Google HQ - Mountain View, United States
Date published: 10-07-2014

Mobile banking and mobile payment malware malicious software that can extort money from users by hijacking personal information and spoofing bank sites or apps to trick victims into sharing personal data rose in the month of June. [android-in] The number of infected mobile devices worldwide, as well... Read more

Source: net-security.org

Top found tags: United States(2),telecom sector(4),malware(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crusty API opened Facebook accounts to hijackingLocation: Facebook - Menlo Park, United States
Date published: 10-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines A leftover API that Facebook forgot to kill has left accounts open to spammers and scammers, says security Stephen Sclafani. The flaw means an attacker could view other users' messages and post status updates. Sclafani found that a then mis-... Read more

Source: go.theregister.com

Top found tags: patch(2),social media(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Philippines Arrests 44 From China, Taiwan in Internet FraudLocation: Taipei, Taiwan
Date published: 10-07-2014

MANILA - Forty-two Taiwanese and two Chinese suspects have been arrested in the Philippines over a sophisticated Internet scam targeting compatriots back home, police said Thursday. The suspects -- who posed as police officers, prosecutors, judges and anti-money laundering officials -- cheated peopl... Read more

Source: securityweek.com

Top found tags: cybercrime(2),financial sector(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Drops Cybercrime Case Against No-IPLocation: Microsoft HQ - Redmond, United States
Date published: 10-07-2014

Microsoft and Vitalwerks Internet Solutions, the parent firm of Dynamic DNS provider No-IP, have reached a settlement in the recent malware disruption case , the companies announced on Wednesday. Microsoft's decision to drop the case comes after reviewing evidence provided by No-IP that demonstrated... Read more

Source: securityweek.com

Top found tags: malware(4),telecom sector(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
International Authorities Take Down Shylock Banking MalwareLocation: Europol HQ - Den Haag, The Netherlands
Date published: 10-07-2014

Like most profitable criminal enterprises, the Shylock banking malware thrived because it was supported by a nimble infrastructure that allowed it to stay one step ahead of network and security monitoring capabilities, and the authorities. That race ended this week. Europol announced today that it, ... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),malware(5),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Settles With No-IP Over Malware TakedownLocation: Microsoft HQ - Redmond, United States
Date published: 10-07-2014

Its been a weird couple of weeks for Microsoft. On June 30 the company announced its latest malware takedown operation, which included a civil law suit againstVitalwerks, a small Nevada hosting provider, and the seizure of nearly two dozen domains the company owned. Now,10 days later, Microso... Read more

Source: threatpost.com

Top found tags: training(1),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Disrupt Tunisia Voter RegistrationLocation: New York, United States
Date published: 10-07-2014

TUNIS - Hackers briefly disrupted the online voter registration process for Tunisia's parliamentary and presidential polls later this year, the electoral commission said on Thursday. The commission announced on its Facebook page that registration on the Internet or by SMS was temporarily suspended f... Read more

Source: securityweek.com

Top found tags: SMS(1),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2014 ICS Cyber Security Conference Call for Papers Now OpenLocation: Georgia, United States
Date published: 10-07-2014

Longest Running ICS Cyber Security Conference Opens Call for Papers for 2014 Event in Atlanta, Georgia SecurityWeek today announced the official Call for Papers for the 2014 Industrial Control Systems (ICS) Cyber Security Conference, to be held October 20 23, 2014 at the Georgia Tech Hotel and C... Read more

Source: securityweek.com

Top found tags: ICS(2),vulnerability(2),critical infrastructure(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NCA partners with FBI, Europol to disrupt Shylock TrojanLocation: National Crime Agency - London, United Kingdom
Date published: 10-07-2014

The UK's National Crime Agency has been working with the FBI and Europol to disrupt the infrastructure behind Shylock Trojan, malware which siphons money from European bank accounts. NCA partners with FBI, Europol to disrupt Shylock Trojan NCA partners with FBI, Europol to disrupt Shylock Trojan The... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(4),financial sector(8),cybercrime(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malwarebytes raises more than 17 million in VC fundingLocation: Highland, United States
Date published: 10-07-2014

San Francisco-based endpoint security company Malwarebytes announced today that it has received $30 million (approximately 17.53 million) in Series A funding from Highland Capital Partners. The funding will be used to accelerate the global expansion of its security technologies, which are used to ... Read more

Source: www.scmagazineuk.com

Top found tags: threat(1),cybercrime(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Greek cops detain Facebook botnet hackers that mined virtual currency on 250,000 PCsLocation: Facebook - Menlo Park, United States
Date published: 09-07-2014

Greek cops detain Facebook botnet hackers that mined virtual currency on. 250,000 PCs Greek police have arrested two people in connection with a botnet that hacked computers to mine a virtual currency similar to Bitcoin and affected over 250,000 machines worldwide. Related: A closer look at Litecoin... Read more

Source: itproportal.com

Top found tags: government(3),financial sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kaspersky Lab Details 'Versatile' DDoS Trojan for Linux SystemsLocation: Kaspersky HQ - Moscow, Russia
Date published: 10-07-2014

Researchers at Kaspersky Lab have published a detailed analysis of a "versatile" Linux DDoS Trojan available online. In a blog post, Kaspersky Lab's Mikhail Kuzin explained that the firm came across an article published in February on a Russian IT website titled 'Studying the BillGates Linux Botnet'... Read more

Source: securityweek.com

Top found tags: update(2),Kaspersky Lab(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Facebook kills 'Lecpetex' botnet that turned 250k PCs into Litecoin-mining zombiesLocation: Facebook - Menlo Park, United States
Date published: 09-07-2014

Facebook said police in Greece made two arrests last week in connection with a little-known spamming botnet called Lecpetex, which used hacked computers to mine the Litecoin virtual currency.As many as 50,000 Facebook accounts were affected, and as many as 250,000 computers worldwide, primaril... Read more

Source: www.pcworld.com

Top found tags: United States(2),update(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rise in malware capable of stealing moneyLocation: Kaspersky HQ - Moscow, Russia
Date published: 07-07-2014

Users in Brazil, Russia and Italy were most frequently attacked by financial malware, according to Kaspersky Labs latest monthly report on online threats in the banking sector.In the reporting period from April 19 to May 19, 2014, Kaspersky Lab solutions blocked 126 600 attempts on computers to l... Read more

Source: www.iol.co.za

Top found tags: Kaspersky Lab(4),cybercrime(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malaysian cybersecurity office warns against World Cup malwareLocation: Trend Micro - Cupertino, United States
Date published: 08-07-2014

KUALA LUMPUR, JULY 8: A Malaysian cybersecurity official on Tuesday warned the public about malicious software, or malware, that has proliferated during the Brazil World Cup, aimed at stealing data from unsuspecting users.The fake apps contain SMS stealers as well as remote control capabilities t... Read more

Source: www.thehindubusinessline.com

Top found tags: Trend Micro(2),cyber security(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Android malware outsmarts antivirus vendorsLocation: Google HQ - Mountain View, United States
Date published: 09-07-2014

Fake app beats 94% of AV tools.The majority of antivirus products failed to detect a piece of malware targeting Android devices, network security company FireEye has reported.The Android app \"google play stoy\" managed to avoid detection by 48 out of 51 antivirus vendors, according to research rele... Read more

Source: www.crn.com.au

Top found tags: Google Play(2),cyber security(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Five countries unite over cybercrimeLocation: Wellington, New Zealand
Date published: 08-07-2014

Cybercrime will be discussed by Attorneys General from Australia, Canada, New Zealand, UK and the USA.The Attorneys General from 5 countries are meeting in London this week to strengthen the international fight against cybercrime.The Attorney General Dominic Grieve QC MP, is hosting the annual meeti... Read more

Source: www.gov.uk

Top found tags: social media(2),United Kingdom(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Azerbaijani Centre of Electronic Safety joins international organizationLocation: Anti-Phishing Working Group - San Francisco, United States
Date published: 09-07-2014

The Azerbaijani Centre of Electronic Safety under the Ministry of Communications and Information Technologies has become member of the Anti-Phishing Working Group (APWG).The membership will create opportunities for successful continuation of Azerbaijani electronic safety policy on the international ... Read more

Source: news.az

Top found tags: cybercrime(3),government(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Jamshedpur Police launches cyber crime awareness campaignLocation: New York, United States
Date published: 09-07-2014

JAMSHEDPUR: The police jointly with Tata Motors today launched a month-long awareness campaign against cyber crime in the steel city from where at least 15 cyber related crimes were being reported every month.Over 100 schools students and several social organizations participated in the awareness ra... Read more

Source: timesofindia.indiatimes.com

Top found tags: cyber security(2),financial sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: Malware Poisons One-Third of World's ComputersLocation: Anti-Phishing Working Group - San Francisco, United States
Date published: 09-07-2014

The primary motivation behind creating so many new malware strains is to avoid detection by antivirus programs, which use signatures to identify malicious software. \"In the old days, they might be able to infect 1,000 users with a Trojan,\" said PandaLabs Technical Director Luis Corrons. \"It was e... Read more

Source: www.technewsworld.com

Top found tags: trojan(2),malware(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senate Intelligence Committee approves cyber security billLocation: National Security Agency - Fort Meade, United States
Date published: 09-07-2014

Senator Dianne Feinstein, D-Calif., revealed that the draft bill was in the works. The Cybersecurity Information Sharing Act of 2014 encourages threat information sharing between government and the private sector. With the blessing of powerful financial industry proponents and under criticism fr... Read more

Source: www.scmagazine.com

Top found tags: United States(2),government(5),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attackers brute-force POS systems utilizing RDP in global botnet operationLocation: Brussels,Belgium
Date published: 09-07-2014

Cutwail botnet After successfully brute-forcing the POS devices, attackers install RAM-scraping malware to steal data. As part of a global botnet operation dating back to May, attackers are infecting thousands of computers around the world with malware and are using the compromised machines to ident... Read more

Source: www.scmagazine.com

Top found tags: cyber security(2),United States(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Next Generation threat protection is more important, and more attainable than you thinkLocation: Fortinet - Sunnyvale, United States
Date published: 09-07-2014

If youre a small to mid-size Enterprise, you have seen the headlines about increasingly advanced, and targeted, attacks but you may not be sure how to protect your network and data. Or you might be thinking youre too small to attract targeted attacks. Or even if you may be a target you think y... Read more

Source: blog.fortinet.com

Top found tags: Fortinet(1),threat(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Groups call for details on NSA surveillance of Muslim AmericansLocation: New York, United States
Date published: 09-07-2014

More than 40 privacy, civil rights and religious groups have called on President Barack Obamas administration to provide a full public accounting of long-time email surveillance of prominent Muslims living in the U.S., following a news report detailing the spying by the U.S. National Securi... Read more

Source: www.pcworld.com

Top found tags: telecom sector(4),United States(6),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Your favorite mobile apps leave a trail of cookie crumbsLocation: Instagram - Menlo Park, United States
Date published: 09-07-2014

Sean Gallagher Most people know the privacy risk of Web cookiesthe bits of data that Web browsers store and return to websites to help them keep track ofyourcredentials, whereyou arein an application, and other information. Advertisers, social mediaservices,and search engine providers... Read more

Source: arstechnica.com

Top found tags: mobile device(4),social media(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese hackers pursue key data on U.S. workers: NYTLocation: Beijing, China
Date published: 10-07-2014

(Reuters) - Chinese hackers broke into the computer networks of the United States government agency that keeps the personal information of all federal employees in March, the New York Times reported, citing senior U.S. officials. The hackers appeared to be targeting files on tens of thousands of emp... Read more

Source: reuters.com

Top found tags: government(2),cyber security(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crypto certificates impersonating Google and Yahoo pose threat to Windows usersLocation: Microsoft HQ - Redmond, United States
Date published: 10-07-2014

People using Internet Explorer and possibly other Windows applications could be at risk of attacks that abuse counterfeit encryption certificates recently discovered masquerading as legitimate credentials for Google, Yahoo and possibly an unlimited number of other Internet properties. A blog post pu... Read more

Source: arstechnica.com

Top found tags: update(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senate Panel Passes Controversial Cybersecurity BillLocation: National Security Agency - Fort Meade, United States
Date published: 10-07-2014

Senate Committee Approves Cybersecurity Information Sharing Act, But Privacy Groups Raise Concerns Over Government Access to Personal Data on U.S Citizens A Senate committee approved a controversial bill that aims to help companies and government share information about cyber-attacks and other threa... Read more

Source: securityweek.com

Top found tags: United States(2),government(10),cyber security(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brute-force bot busts shonky PoS passwordsLocation: New York, United States
Date published: 10-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines A botnet has compromised 60 point of sale (PoS) terminals by brute-force password attacks against poorly-secured connections, FireEye researchers say. The trio including Nart Villeneuve, Joshua Homan and Kyle Wilhoit found 51 of the 60 poppe... Read more

Source: go.theregister.com

Top found tags: research(1),cyber security(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The emergence of the Digital Risk OfficerLocation: Gartner - Stamford, United States
Date published: 10-07-2014

More than half of CEOs will have a senior "digital" leader role in their staff by the end of 2015, according to the 2014 CEO and Senior Executive Survey by Gartner. Gartner said that by 2017, one-third of large enterprises engaging in digital business models and activities will also have a digital r... Read more

Source: net-security.org

Top found tags: information security(2),security management(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malwarebytes raises $30M in Series A Funding, secures 60m usersLocation: Malwarebytes - San Jose, United States
Date published: 10-07-2014

Malwarebytes has secured $30 million in Series A funding from Highland Capital Partners, allowing the security firm to expand globally. The antivirus provider says the funding will be used to accelerate the global expansion of Malwarebytes technology in both the consumer and enterprise sphere. One o... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),cybercrime(5),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Emergency phone and internet data surveillance bill to be rushed through ParliamentLocation: Brussels,Belgium
Date published: 10-07-2014

Learning from past mistakes is clearly not considered a virtue in some quarters of government: the prime minister today announced emergency surveillance legislation that will force a continutation of blanket retention of UK citizens' communications data. According to the BBC, the legislation will fo... Read more

Source: www.zdnet.com

Top found tags: United Kingdom(4),government(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Britain moves to keep email, phone data for securityLocation: London, United Kingdom
Date published: 10-07-2014

LONDON (Reuters) - Britain said on Thursday it would rush through emergency legislation to force telecoms companies to retain customers' data for a year, saying the move was vital to protect national security following a decision by Europe's top court. Communication companies had been required to re... Read more

Source: reuters.com

Top found tags: United States(4),telecom sector(6),government(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK government to increase surveillanceLocation: Cameron, United States
Date published: 10-07-2014

The British government looks set to pass the Data Retention and Investigations Powers Bill - a law which will allow police and security services to access people's phone and internet records from telcos and ISPs. UK law could propose life sentences for cyber crimes UK law could propose life sentence... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(6),telecom sector(8),government(11)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security fears grow as a third of IT staff send sensitive data without encryptionLocation: New York, United States
Date published: 10-07-2014

Security fears grow as a third of IT staff send sensitive data without. encryption More than a third of IT professionals send sensitive information outside of their organisation without any form of encryption, according to a new survey. A questionnaire of 200 industry professionals at this year's In... Read more

Source: itproportal.com

Top found tags: privacy(1),survey(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Emergency data-slurp law: Overseas tech firms were worried over 'legal uncertainty'Location: Brussels,Belgium
Date published: 10-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines The UK government secured the backing of the country's main political parties today to rush an emergency Data Retention and Investigation Powers Bill through Parliament just seven days before MPs break for summer recess. It comes after commu... Read more

Source: go.theregister.com

Top found tags: telecom sector(6),United Kingdom(6),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Silent Circle takes on Skype, Viber with encrypted VoIP clientLocation: Microsoft HQ - Redmond, United States
Date published: 10-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Silent Circle has launched a global encrypted calling service that will go up against over-the-top services Skype and Viber. Its main selling point, however, is that it will feature a way to communicate privately. It's more bad news for mobi... Read more

Source: go.theregister.com

Top found tags: mobile device(2),social media(2),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Attack Shipping and Logistics Firms Using Malware-Laden Handheld ScannersLocation: Beijing, China
Date published: 10-07-2014

Hackers Infect Handscanner With Malware China-based threat actors are using sophisticated malware installed on handheld scanners to target shipping and logistics organizations from all over the world. The attack, dubbed "Zombie Zero," has been analyzed by cybersecurity solutions provider TrapX, a co... Read more

Source: securityweek.com

Top found tags: cybercrime(2),government(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Silent Circle Expands Encrypted Calling Service to 79 CountriesLocation: Microsoft HQ - Redmond, United States
Date published: 10-07-2014

Private communications solutions provider Silent Circle now allows customers to make encrypted voice calls in a total of 79 countries, the company announced on Thursday. Silent Circle customers who enroll in international Out-Circle Calling (OCC) plans will receive a 10-digit number, which they can ... Read more

Source: securityweek.com

Top found tags: government(2),Microsoft(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Britain to Pass Emergency Data Surveillance LawsLocation: London, United Kingdom
Date published: 10-07-2014

LONDON - Britain is rushing through emergency laws to ensure the police and security services can keep accessing people's Internet and mobile phone data, Prime Minister David Cameron announced Thursday. Cameron said the move, being debated by parliament next week, was vital to protect Britain's secu... Read more

Source: securityweek.com

Top found tags: telecom sector(8),United Kingdom(8),government(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CryptoLocker Infrastructure Used for Other Threats: BitdefenderLocation: New York, United States
Date published: 10-07-2014

The notorious file-encrypting CryptoLocker ransomware has not been active since the latest takedown operation last month, but its delivery network is still up and running, Bitdefender said in a report published on Wednesday. The security firm has kept a close eye on CryptoLocker over the past nine m... Read more

Source: securityweek.com

Top found tags: telecom sector(4),malware(6),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK government criticised for opposing 'right to be forgotten'Location: Google HQ - Mountain View, United States
Date published: 10-07-2014

The British government has been criticised by the president of a leading UK data protection professional body for trying to water down the 'right to be forgotten' privacy protection now being instigated by Google. UK government criticised for opposing 'right to be forgotten' UK government criticised... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(2),United Kingdom(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security fears grow as a third of IT staff send sensitive data without encryptionLocation: New York, United States
Date published: 10-07-2014

Security fears grow as a third of IT staff send sensitive data without. encryption More than a third of IT professionals send sensitive information outside of their organisation without any form of encryption, according to a new survey. A questionnaire of 200 industry professionals at this year's In... Read more

Source: itproportal.com

Top found tags: privacy(1),survey(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Version Of NgrBot Wipes Hard DrivesLocation: New York, United States
Date published: 10-07-2014

NgrBot is a modified IrcBot. It has the capability to join different Internet Relay Chat (IRC) channels to perform various attacks according to the IRC-based commands from the command-and-control (C&C) server. Recently, our botnet monitoring system captured an NgrBot variant with hardcoded version 1... Read more

Source: blog.fortinet.com

Top found tags: cyber security(2),United States(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Symantec in talks with Chinese government after software ban reportLocation: Beijing, China
Date published: 10-07-2014

BOSTON (Reuters) - U.S. security software maker Symantec Corp said it is holding discussions with authorities in Beijing after a state-controlled Chinese newspaper reported that the Ministry of Public Security had banned use of one of its products. The China Daily reported last week that the ministr... Read more

Source: reuters.com

Top found tags: government(4),telecom sector(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man Sues Feds After They Target Him for Photographing Rainbow ArtLocation: Asia
Date published: 10-07-2014

rainbow-art-inline1 [gallery-ca] Wikimedia When 86-year-old photographer James Prigoff paused to photograph a natural gas storage tank in Boston 10 years ago, he was simply doing what countless of tourists have done before. The colorful tank, painted with a rainbow-like design, is a popular photo op... Read more

Source: wired.com

Top found tags: FBI(2),United States(8),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brute-Forcing Botnet Sniffs Out Lax POS SystemsLocation: Target HQ - Minneapolis, United States
Date published: 10-07-2014

Overa two-week time span earlier this year, a botnet composed of thousands of computers actively sought out and broke into exposed point of sale (POS) systems that used poor or default passwords. The botnet, dug up and dubbed BrutPOS by security firm FireEye, leveraged more than 5,000 machines and... Read more

Source: threatpost.com

Top found tags: Microsoft(2),United Kingdom(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GAO Hammers Lack of Shipping Port Cybersecurity MeasuresLocation: Europol HQ - Den Haag, The Netherlands
Date published: 10-07-2014

The U.S. Department of Homeland Security, Coast Guard and Federal Emergency Management Agency (FEMA) have been taken to the woodshed in a General Accounting Office (GAO) report on maritime cybersecurity. The GAO said the response to mandates to improve computer security efforts to protect the networ... Read more

Source: threatpost.com

Top found tags: government(5),cyber security(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Shylock Malware Infrastructure Targeted by International AuthoritiesLocation: Europol HQ - Den Haag, The Netherlands
Date published: 10-07-2014

Law enforcement agencies and cybersecurity firms have teamed up in an operation aimed at Shylock, a widely distributed piece of malware used by cybercriminals to steal banking credentials. The United Kingdom's National Crime Agency (NCA), the Government Communications Headquarters (GCHQ), the German... Read more

Source: securityweek.com

Top found tags: United Kingdom(4),government(5),cybercrime(11)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
From Brick to Brilliance: It's Time for the Next Generation FirewallLocation: Rich, United States
Date published: 10-07-2014

In our modern, consumer-driven world, its extremely rare to come across someone without a mobile phone. What started as a luxury item that enabled phone calls from outside the home has become mandatory for not only voice, but other daily functions and operations like calendars, reminders, music, ... Read more

Source: securityweek.com

Top found tags: cyber security(2),social media(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Poor admin passwords allow global botnet attackLocation: Check Point - Tel Aviv, Israel
Date published: 10-07-2014

BrutPos or @-Brt attacks have infiltrated POS systems with botnets largely thanks to weak admin passwords. Poor passwords used by IT professionals - who should know better - are being blamed for the success of a global botnet campaign that has infected thousands of computers and compromised hundreds... Read more

Source: www.scmagazineuk.com

Top found tags: Microsoft(2),United Kingdom(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Transitioning to IPv6? Here's how to beat the security risksLocation: Tufin Technologies - Chatham, United States
Date published: 10-07-2014

PaulMCCooper. Transitioning to IPv6? Here's how to beat the security risks Look at the "to-do" list for many network architects and there's every chance that "transition to IPv6" has been on there a while. Many have been put off by the undoubted security challenges and have decided to postpone and c... Read more

Source: itproportal.com

Top found tags: cyber security(2),ISP(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

UK Cracks Down on Fraudulent 'Government' WebsitesLocation: Boyd, United States
Date published: 08-07-2014

Thousands have been scammed out of sterling for bogus government services.UK law enforcement officials have arrested five people believed to have been scamming legions of consumers by setting up copycat websites that masquerade as legitimate government destinations.The alleged scams run the gamut fr... Read more

Source: www.infosecurity-magazine.com

Top found tags: government(3),financial sector(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Hazards Of Probing The Internet's Dark SideLocation: Experian HQ - Dublin,Ireland
Date published: 08-07-2014

Late last year, hackers breached Target's data security and stole information from millions of credit cards. Brian Krebs, who writes about cybercrime and computer security for his blog, Krebs on Security, broke the story. A few days later, he broke the story of a credit card breach at Neiman Marcus.... Read more

Source: www.npr.org

Top found tags: identity theft(2),United States(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach hits 10,000 in Park Hill School DistrictLocation: Park, United States
Date published: 08-07-2014

KANSAS CITY, Mo. - Park Hill School District is sending out letters to more than 10,000 current and former employees and students this week about a data breach at the district which put sensitive information online earlier this year.The breach came to the school district's attention early April, whe... Read more

Source: www.kmbz.com

Top found tags: Google(1),government(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nearly 70% of critical infrastructure providers suffered a breachLocation: Unisys - Blue Bell, United States
Date published: 10-07-2014

New research from Unisys finds alarming gaps in the security of the world's critical infrastructure. Nearly 70 percent of companies surveyed that are responsible for the world's power, water and other critical functions have reported at least one security breach that led to the loss of confidential ... Read more

Source: net-security.org

Top found tags: telecom sector(4),critical infrastructure(6),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese hackers target US government workers -- reportLocation: Department of Homeland Security - Washington, United States
Date published: 10-07-2014

Chinese hackers worked their way into US government servers in March in an attempt to steal information on thousands of federal employees with top-secret clearance, The New York Times reported Wednesday, citing officials within the US government. The hackers were able to access some databases contai... Read more

Source: cnet.com.ortal.com

Top found tags: update(2),United States(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Consumers don't trust any industry with their personal dataLocation: New York, United States
Date published: 10-07-2014

U.S. consumers have little faith that companies are able to keep their person data safe. The sentiment crosses nearly all industries with consumers saying that the lack of trust will likely affect purchase habits, according to Radius Global Market Research. "Ongoing security breaches have pushed the... Read more

Source: net-security.org

Top found tags: identity theft(2),social media(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Laptop Thefts Expose Personal, Medical, Financial DataLocation: San Antonio, United States
Date published: 10-07-2014

Another week, another data breach resulting from the theft of an unencrypted laptop: in the past few weeks, a brokerage firm, a health district, a retirement community, a hospital and an oil change franchisee have all begun notifying hundreds of people that their personal information may have been e... Read more

Source: www.esecurityplanet.com

Top found tags: medical sector(2),telecom sector(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US "kidnapped" hacker, claims Russian Foreign MinistryLocation: Department of Homeland Security - Washington, United States
Date published: 09-07-2014

US "kidnapped" hacker, claims Russian Foreign Ministry. With Russian and US relations already strained, the recent arrest of hacker Roman Velerevich Seleznev has caused further diplomatic difficulties. The 30-year-old Russian national was arrested by the US Department of Homeland Security while in a... Read more

Source: itproportal.com

Top found tags: identity theft(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Weaponized exploit can steal sensitive user data on eBay, Tumblr, et al.Location: eBay - San Jose, United States
Date published: 08-07-2014

Update: Almost four hours after this article went live, a Tumblr spokeswoman e-mailed Ars to say the site has been patched against the Rosetta Flash attack. Later, a cofounder of Olark said that service had been patched, too.A serious attack involving a widely used Web communication format is exposi... Read more

Source: arstechnica.com

Top found tags: patch(2),social media(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Credit card fraud: Prompt FIR helps recover lossLocation: New York, United States
Date published: 09-07-2014

LUCKNOW: Hundreds of debit/credit card users in the city are being targeted by internet fraudsters every month while only a handful of lucky ones have got their lost money back. Apart from support of law enforcement agencies, financial institutions and private merchants involved in pocketing the mon... Read more

Source: timesofindia.indiatimes.com

Top found tags: credit card(2),government(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lancope to present webinar on SCADA securityLocation: Cross, United States
Date published: 09-07-2014

Lancope Inc., innovator in network visibility and security intelligence, will deliver a complimentary webinar on techniques for improving SCADA system security on Tuesday, 15 July at 10:00 a.m. US Eastern Daylight Time / 3:00 p.m. UK British Summer Time.Lancopes Director of Security Research, Tom... Read more

Source: www.energyglobal.com

Top found tags: United Kingdom(2),vulnerability(2),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Judge Shoots Down Bitcoin Isnt Money Argument in Silk Road TrialLocation: Ross, United States
Date published: 09-07-2014

Ross Ulbricht. Ross Ulbricht. [gallery-ca] Courtesy of the Ulbricht Family The government and legal community may still be arguing over whether bitcoin can be defined as money. But the judge presiding over the landmark Silk Road drug case has declared that its at least close enough to get y... Read more

Source: wired.com

Top found tags: malware(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android Exploited to Make and End Phone Calls, Send USSD CodesLocation: Google HQ - Mountain View, United States
Date published: 09-07-2014

A pair of vulnerabilities in all but the newest KitKat iteration of Googles Android operating system could let a malicious or rogue application exceed its permission level in order to make phone calls, hang up phone calls, or send USSD or MMI codes. Marco Lux and Pedro Umbelino of Curesec claim t... Read more

Source: threatpost.com

Top found tags: threat(1),vulnerability(1),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google fights off attacks via fraudulent certsLocation: Google HQ - Mountain View, United States
Date published: 09-07-2014

On Tuesday, Google announced that it had stepped in to quell a threat impacting Windows users fraudulent digital certificates in India linked to several Google domains. Last Wednesday the tech giant became aware of the certs, which had been misissued, or deemed trusted, by a certificate au... Read more

Source: www.scmagazine.com

Top found tags: Internet Explorer(2),Microsoft(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researcher identifies XSS bug impacting Kaspersky websiteLocation: Kaspersky HQ - Moscow, Russia
Date published: 09-07-2014

A cross-site scripting (XSS) vulnerability has been discovered on the website for security software provider Kaspersky, according to a post on xssposed.org by E1337, the handle of the security researcher who identified the vulnerability and reported it on Tuesday. The XSS bug puts Kaspersky.com user... Read more

Source: www.scmagazine.com

Top found tags: Kaspersky Lab(2),website(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
In year's first half, Verizon hit with 150,000 gov't data requestsLocation: Verizon HQ - New York, United States
Date published: 09-07-2014

On Tuesday, Verizon published its second transparency report revealing government demands for customer data and it appears the service provider is on track to receive requests in the ballpark of last year's count. According to the telecom giant, U.S. law enforcement made 148,903 demands for cust... Read more

Source: www.scmagazine.com

Top found tags: Verizon(1),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Victim of Tor-hidden revenge smut site sues Tor Project developersLocation: Shelby, United States
Date published: 10-07-2014

The Tor Project has found itself on the receiving end of a lawsuit claiming the software's developers aided the operators of a revenge porn site. An attorney at the Electronic Frontier Foundation (EFF) told The Register the allegations against the Tor team are baseless. Shelby Conklin alleges that t... Read more

Source: go.theregister.com

Top found tags: government(2),legislation(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China trawls top-secret US personnel lists reportLocation: Beijing, China
Date published: 10-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines An attack suspected to have originated in China breached security at the US Office of Personnel Management, according to The New York Times. The paper's report suggests the attackers attempted to access personnel records describing governmen... Read more

Source: go.theregister.com

Top found tags: Linux(1),report(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whitepaper: 10 network security tools you should useLocation: New York, United States
Date published: 10-07-2014

Whether you are operating a home system, overseeing a small startup, or performing security governance for an enterprise, everyone can benefit from paying attention to security. This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of ... Read more

Source: net-security.org

Top found tags: EN(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe, Microsoft, Tumblr react against the Rosetta Flash attackLocation: Adobe HQ - San Jose, United States
Date published: 09-07-2014

In response to the recent internet communication attack using malicious commands embedded into Adobe Flash files, Adobe released a Flash security update in tandem with a full technical analysis of the threat that includes a proof-of-concept exploit code. The attack code, dubbed Rosetta Flash, ... Read more

Source: www.scmagazineuk.com

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK government forks out 42 million to fund digital entrepreneursLocation: London, United Kingdom
Date published: 10-07-2014

UK government forks out 42 million to fund digital entrepreneurs. The government has announced 42m of new funding to help digital start-ups grow their businesses. Small businesses in these areas will be invited to partake in 88 new competitions, which the government says will help find and fund ... Read more

Source: itproportal.com

Top found tags: medical sector(2),United Kingdom(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What are all those other Microsoft updates?Location: Microsoft HQ - Redmond, United States
Date published: 10-07-2014

twice a month, and mostly for the current versions of Windows. Microsoft has long posted notice of their non-security updates in this Knowledge Base article (KB894199). Starting this month, Microsoft has added the security updates, and now it is a complete list of updates sent out through Windows Se... Read more

Source: www.zdnet.com

Top found tags: patch(2),update(2),Microsoft(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware attacks businesses as they sleep and cloud remains a threat, researchers sayLocation: Cloud, United States
Date published: 10-07-2014

Hundreds of cloud services are being used within the enterprise, but cloud remains a serious security risk as corporations send vast amounts of data to high-risk services every quarter. Cloud security software firm Skyhigh Networks has released its latest quarterly Cloud Adoption and Risk Report (.P... Read more

Source: www.zdnet.com

Top found tags: health sector(2),medical sector(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
VMware partners with Box for mobile collaboration securityLocation: VMware - Palo Alto, United States
Date published: 10-07-2014

partnership that will bring security capabilities from VMware AirWatch to Box storage users. The key goal of the partnership is to offer enterprise users a more secure level of collaboration across mobile devices. The companies plan to manage and secure third-party applications by using the configur... Read more

Source: www.zdnet.com

Top found tags: framework(1),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Constrains India CCA Root Cert in Wake of Bad Google and Yahoo Certificates AppearingLocation: Google HQ - Mountain View, United States
Date published: 10-07-2014

The Indian Controller of Certifying Authorities said that the certificate-issuance process for the National Informatics Centre of India, which issued several fraudulent certificates recently, which were blocked by Google, has been compromised and Google has decided to constrain India CCAs root ce... Read more

Source: threatpost.com

Top found tags: Google(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK government forks out 42 million to fund digital entrepreneursLocation: London, United Kingdom
Date published: 10-07-2014

UK government forks out 42 million to fund digital entrepreneurs. The government has announced 42m of new funding to help digital start-ups grow their businesses. Small businesses in these areas will be invited to partake in 88 new competitions, which the government says will help find and fund ... Read more

Source: itproportal.com

Top found tags: medical sector(2),United Kingdom(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Flash: The most INSECURE program on a UK user's PCLocation: Secunia - Copenhagen, Denmark
Date published: 10-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Adobe Flash Player was the most insecure program installed on UK computer users PCs throughout the second quarter of 2014, according to stats from vulnerability management firm Secunia. Nearly seven in 10 (69 per cent) UK PC users were found... Read more

Source: go.theregister.com

Top found tags: patch(2),United Kingdom(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
G-Cloud why its not working for local governmentLocation: Cloud, United States
Date published: 10-07-2014

The benefits of G-Cloud are yet to filter down to local government level The government has spoken at length over the past few years about the momentum supposedly building behind its G-Cloud platform. As recently as April, G-Cloud and digital commercial programme director, Tony Singleton claimed tha... Read more

Source: www.information-age.com

Top found tags: research(1),government(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft warns of fake Google and Yahoo domainsLocation: Microsoft HQ - Redmond, United States
Date published: 10-07-2014

release of false domains by the certificate authority of the National Informatics Centre (NIC), an agency of the government of India. We first wrote of these events yesterday following Google's response to them. For reasons still unexplained, the NIC's CA issued a number of domains that belonged to ... Read more

Source: www.zdnet.com

Top found tags: government(2),Microsoft(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Thousands notified of six-month payment card breach at The Houstonian HotelLocation: Houston, United States
Date published: 10-07-2014

It is unclear how many transactions have been impacted, but The Houstonian Hotel, Club & Spa in Texas has already notified more than 10,000 customers that their payment card data was exposed in a roughly six-month-long attack on the hotel's payment processing systems. How many victims? More than 10,... Read more

Source: www.scmagazine.com

Top found tags: report(1),malware(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese government unblocks Google in time for Tiannanmen anniversaryLocation: Google HQ - Mountain View, United States
Date published: 10-07-2014

AlysiaJudge. Chinese government unblocks Google in time for Tiannanmen anniversary On the 25th anniversary of the Tiannaman Square massacre, the Chinese government has made the decision to unblock Google for millions of Internet users across China. In the month running up to the momentous date Chine... Read more

Source: itproportal.com

Top found tags: government(2),Hong Kong(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Gevaarlijke omleiding op videosite DailymotionLocation: Orange HQ - Paris, France
Date published: 08-07-2014

De populaire videowebsite Dailymotion is enkele dagen geleden gehackt. Dat weet beveiligingsspecialist Symantec. Surfers die de website probeerden te bezoeken werden omgeleid naar een andere website, waar de Sweet Orange Exploit Kit hen zat op te wachten. Die Exploit Kit is, zoals de naam al wel doe... Read more

Source: www.zdnet.be

Top found tags: trojan(2),cybercrime(3),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
VISIE: GOOGLE PLAY IS NUMMER 1 IN GEBRUIKERS N MALWARELocation: Google HQ - Mountain View, United States
Date published: 09-07-2014

Android is een succesnummer voor Google en succes trekt aan. Niet alleen gewone gebruikers maar ook malafide mensen. De recent ontdekte gebrekkige winkelbeveiliging van Google Play bevestigt de al lang lopende trend: mobiele malware is big business.Malware voor mobiele platformen zoals Android... Read more

Source: www.executive-people.nl

Top found tags: Kaspersky Lab(2),telecom sector(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
VS verstrekt rapport over verkeerde Aurora-aanvalLocation: Aurora, United States
Date published: 10-07-2014

Het Amerikaanse Ministerie van Homeland Security heeft per ongeluk een rapport over een gesimuleerde aanval op een dieselgenerator vrijgegeven, terwijl het eigenlijk een rapport over een aanval op Google had moeten vrijgeven. De site MuckRock had bij het ministerie een Wob-verzoek over de aanval ing... Read more

Source: www.security.nl

Top found tags: Internet Explorer(2),government(4),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Botnet kaapt kassasystemen via zwakke RDP-wachtwoordenLocation: Amsterdam, The Netherlands
Date published: 10-07-2014

Onderzoekers hebben een botnet van duizenden computers ontdekt dat kassasystemen van winkels via zwakke RDP-wachtwoorden probeert te kapen. Het Remote Desktop Protocol (RDP) maakt het mogelijk om op afstand op computers in te loggen en ze te beheren. De computers van het botnet scannen naar systemen... Read more

Source: www.security.nl

Top found tags: password(1),cyber security(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft laat rechtszaak tegen No-IP.com vallenLocation: Microsoft HQ - Redmond, United States
Date published: 10-07-2014

Microsoft heeft besloten om de rechtszaak tegen Vitalwerks, het moederbedrijf van DDNS-aanbieder No-IP.com, te laten vallen. Ook erkent de softwaregigant dat het bij een recente operatie tegen twee malware-families die de diensten van No-IP.com gebruikten, het bedrijf niet om hulp heeft gevraagd. Vo... Read more

Source: www.security.nl

Top found tags: NL(1),website(1),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinezen hacken Amerikaans overheidsnetwerkLocation: New York, United States
Date published: 10-07-2014

Chinese hackers hebben zich in maart toegang verschaft tot de computernetwerken van de Amerikaanse overheid. De New York Times meldt donderdag dat de Chinezen daardoor van duizenden medewerkers persoonlijke informatie hebben kunnen inzien, zoals buitenlandse contactpersonen, arbeidsverleden en drugs... Read more

Source: www.automatiseringgids.nl

Top found tags: China(2),government(3),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google vereenvoudigt uploaden van malware op LinuxLocation: Google HQ - Mountain View, United States
Date published: 10-07-2014

Gebruikers van een Linux-systeem kunnen verdachte bestanden die mogelijk malware bevatten dankzij een tool van Google nu eenvoudiger door zo'n 50 verschillende virusscanners laten controleren. Het gaat om de uploadtool van VirusTotal, een website waarmee verdachte bestanden kunnen worden gescand. De... Read more

Source: www.security.nl

Top found tags: Windows(1),cybercrime(2),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overtuigende phishingaanval op Apple-gebruikersLocation: Apple HQ - Cupertino, United States
Date published: 10-07-2014

Dagelijks worden er duizenden phishingmails verstuurd, die in veel gevallen duidelijk herkenbaar zijn, maar soms komen ook beveiligingsonderzoekers nog pogingen tegen die opvallen. Zo ontdekte Joel Esler van Cisco recent een phishingmail die probeert om het Apple ID van ontvangers te ontfutselen. He... Read more

Source: www.security.nl

Top found tags: NL(1),phishing(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Europol en FBI halen Shylock-botnet uit de luchtLocation: Europol HQ - Den Haag, The Netherlands
Date published: 10-07-2014

Europol en de FBI hebben samen met verschillende beveiligingsbedrijven en nationale politiekorpsen het Shylock-botnet uit de lucht gehaald. Shylock is een Trojaans paard dat gegevens voor internetbankieren steelt waarmee criminelen vervolgens geld van bankrekeningen kunnen stelen. Wereldwijd zouden ... Read more

Source: www.security.nl

Top found tags: Kaspersky Lab(4),United Kingdom(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Usenet-provider NewsgroupDirect kampt met hackLocation: New York, United States
Date published: 10-07-2014

De Amerikaanse usenet-provider NewsgroupDirect meldt dat hackers hebben ingebroken op zijn servers. Daarbij zijn naast persoonlijke gegevens ook creditcardgegevens buit zijn gemaakt. Enkele tweakers zeggen slachtoffer te zijn van de hack. In een blogposting meldt NewsgroupDirect dat de hackers vermo... Read more

Source: tweakers.net

Top found tags: research(1),vulnerability(1),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CISO: El nuevo estudio sobre el costo global de la ciberdelincuencia del CSIS y McAfee, y las implicaciones para su empresaLocation: Center for Strategic and International Studies - Washington, United States
Date published: 10-07-2014

Le gustara ofrecer a sus directivos una imagen cuantificada del riesgo de la ciberdelincuencia? Un nuevo estudio realizado por McAfee y el CSIS (Center for Strategic and International Studies) pone lmites y aplica una detallada metodologa a un tema muy propenso a la exageracin. En un profu... Read more

Source: blogs.mcafee.com

Top found tags: research(1),airport(2),airport sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Cybercrime en digitale spionage blijven grootste dreiging"Location: Ministry of Security and Justice - Den Haag, The Netherlands
Date published: 10-07-2014

Cybercrime en digitale spionage door staten blijven de grootste dreiging op het gebied van cyber security voor Nederland, zo staat in het vierde Cybersecuritybeeld Nederland (CSBN) dat vandaag door minister Opstelten van Veiligheid en Justitie naar de Tweede Kamer werd gestuurd. Volgens het CSBN nee... Read more

Source: www.security.nl

Top found tags: cyber security(6),The Netherlands(8),government(11)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IRC-malware overschrijft harde schijf met nullenLocation: Amsterdam, The Netherlands
Date published: 10-07-2014

Een nieuwe versie van een bekende malware-familie die Internet Relay Chat (IRC) gebruikt om besmette computers aan te sturen is van een nieuwe functie voorzien waardoor het de partitie van harde schijven met nullen overschijft. Het gaat om de NgrBot, ook bekend als DorkBot. De NgrBot bestaat al een ... Read more

Source: www.security.nl

Top found tags: website(1),Windows(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nederland blijft cybercrime krachtig aanpakkenLocation: Ministry of Security and Justice - Den Haag, The Netherlands
Date published: 10-07-2014

Nederland blijft cybercrime krachtig aanpakken en wil de digitale weerbaarheid verder verhogen. Dat blijkt uit Cybersecuritybeeld Nederland (CSBN), dat vandaag door minister Opstelten naar de Tweede Kamer is gestuurd. Volgens Opstelten blijft het noodzakelijk om de komende jaren te investeren in cyb... Read more

Source: www.nutech.nl

Top found tags: cyber security(4),government(7),The Netherlands(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese hackers stelen gegevens Amerikaans overheidspersoneelLocation: Beijing, China
Date published: 10-07-2014

Chinese hackers hebben toegang verkregen tot een Amerikaanse overheidsinstantie die personeelsgegevens beheert. De hackers zouden uit zijn geweest op aanvragen van tienduizenden overheidsmedewerkers voor een top secret-clearance. De aanvallers zouden toegang hebben verkregen tot databases die door h... Read more

Source: tweakers.net

Top found tags: China(2),government(5),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Europol brengt bank trojan een slag toeLocation: Europol HQ - Den Haag, The Netherlands
Date published: 10-07-2014

Europol heeft in samenwerking met de FBI, verschillende politiekorpsen en een aantal beveiligingsbedrijven de servers en domeinen platgelegd die de basis vormen voor computers die genfecteerd zijn met de Shylock Trojan. Wereldwijd zouden er meer dan 30.000 Windows-systemen zijn besmet met de troja... Read more

Source: www.beveiligingnieuws.nl

Top found tags: The Netherlands(2),trojan(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Treinreiziger ervaart OV-chipkaart als privacyschendingLocation: Amsterdam, The Netherlands
Date published: 10-07-2014

Veel treinreizigers ervaren het verplicht in- en uitchecken met de OV-chipkaart als een aantasting van hun privacy, zo meldt de Consumentenbond aan de hand van honderden klachten die het ontving. Sinds gisteren is het voor treinreizigers verplicht om de OV-chipkaart te gebruiken. Doordat er met de O... Read more

Source: www.security.nl

Top found tags: privacy(1),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Silk Road-oprichter krijgt rechtszaak niet van tafelLocation: Amsterdam, The Netherlands
Date published: 10-07-2014

De vermeende oprichter van de online zwarte markt Silk Road is er niet in geslaagd om zijn vervolging van tafel te krijgen. Rechter Katherine Forrest blijkt in haar beslissing weinig onder de indruk van de argumenten van Ross Ulbricht, zo meldt Ars Technica. Volgens de Amerikaanse overheid is op Sil... Read more

Source: www.nutech.nl

Top found tags: NL(1),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Wereldwijde pc-verkoop stabiliseert zichLocation: Microsoft HQ - Redmond, United States
Date published: 10-07-2014

Na twee jaar van grote wereldwijde dalingen van het aantal verkochte pc's heeft de verkoop zich in het tweede kwartaal van dit jaar eindelijk weten te stabiliseren, wat mede dankzij Windows XP en het vervangen van verouderde machines komt. Dat melden onderzoeksbureaus Gartner en IDC. Ten opzichte va... Read more

Source: www.security.nl

Top found tags: Windows(1),social media(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google: omvang valse SSL-certificaten onbekendLocation: Google HQ - Mountain View, United States
Date published: 10-07-2014

Onderzoek door een Indiase overheidsinstantie naar valse SSL-certificaten die voor onder andere Google-domeinen waren uitgegeven heeft geen duidelijk beeld opgeleverd, waardoor de omvang van het incident onbekend is. Eerder deze week sloeg Google alarm over de valse SSL-certificaten. Met de valse SS... Read more

Source: www.security.nl

Top found tags: government(2),Microsoft(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overheidsdatabases van Amerikaanse ambtenaren gekraaktLocation: New York Times - New York, United States
Date published: 10-07-2014

Aanvallers zijn er in maart in geslaagd om toegang tot de databases van de Amerikaanse overheid te krijgen waar de persoonlijke informatie van alle federale ambtenaren is opgeslagen, zo laten Amerikaanse functionarissen tegenover de New York Times weten. De aanvallers hadden het mogelijk voorzien op... Read more

Source: www.security.nl

Top found tags: website(1),United States(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Britse noodwet geeft geheime diensten toegang tot telecomdataLocation: Cameron, United States
Date published: 10-07-2014

De Britse premier David Cameron wil een noodwet invoeren waardoor telecombedrijven gegevens over telefoongesprekken, sms-berichten en e-mails voor een periode van 12 maanden moeten bewaren, zodat inlichtingendiensten als GCHQ, MI5 en MI6 er toegang toe kunnen krijgen. Volgens Cameron is de wetgeving... Read more

Source: www.security.nl

Top found tags: telecom sector(2),government(10),United Kingdom(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinees ministerie verbiedt Symantec softwareLocation: Symantec HQ - Mountain View, United States
Date published: 10-07-2014

Een Chinees ministerie heeft het gebruik van Symantec software aan banden gelegd, waarbij n van de producten is verboden en van Chinese overheidscomputers moet worden verwijderd. Het gaat om de Data Leakage Prevention (DLP) oplossing die kwetsbaarheden zou bevatten waardoor informatie kan lekken... Read more

Source: www.security.nl

Top found tags: vulnerability(1),China(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RIPE NCC haalt server offline na beveiligingsincidentLocation: Amsterdam, The Netherlands
Date published: 10-07-2014

Het RIPE Network Coordination Centre (NCC), een organisatie die verantwoordelijk is voor de uitgifte van IP-adressen aan internetproviders, heeft n van de servers vanwege een beveiligingsincident offline gehaald. Dat laat de organisatie via de eigen mailinglist weten. Het RIPE NCC is een Regiona... Read more

Source: www.security.nl

Top found tags: ISP(1),NL(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Foto's tonen opvolger Lumia 520 met virtuele navigatietoetsenLocation: New York, United States
Date published: 10-07-2014

Op Chinese sociale media zijn foto's verschenen van wat lijkt op de nog onaangekondigde Nokia Lumia 530. Op de foto's is te zien dat de opvolger van de 520 gebruikmaakt van virtuele navigatietoetsen en niet over een frontcamera beschikt. Volgens geruchten zal de Lumia 530 beschikken over een iets gr... Read more

Source: tweakers.net

Top found tags: smartphone(1),social media(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Maldives Deny Foreign Hand in Arrest of Alleged Russian HackerLocation: Interpol - Lyon, France
Date published: 10-07-2014

MALE, Maldives - The Maldives has said it acted alone to expel a Russian national suspected by the US of being one of the world's most prolific traffickers of stolen credit cards. President Abdulla Yameen denied a claim by Moscow that the United States had abducted Roman Seleznev from the Maldives a... Read more

Source: securityweek.com

Top found tags: United States(2),financial sector(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Meerdere kwetsbaarheden verholpen in Adobe Flash PlayerLocation: Adobe HQ - San Jose, United States
Date published: 10-07-2014

Samenvatting: Adobe heeft meerdere kwetsbaarheden verholpen in Flash Player. Gevolgen: Een aanvaller kan deze kwetsbaarheden misbruiken voor het uitvoeren van een Cross-Site Scripting (XSS) aanval of een Cross-Site Request Forgery (CSRF) aanval. Een dergelijke aanval kan leiden tot de uitvoer van wi... Read more

Source: www.ncsc.nl

Top found tags: OS X(2),telecom sector(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in PHPLocation: Hewlett-Packard - Palo Alto, United States
Date published: 10-07-2014

Samenvatting: Debian heeft updates uitgebracht voor PHP5 die de kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan op afstand toegang verkrijgen tot gevoelige gegevens en kan mogelijk willekeurige code uitvoeren met de rechten van het PHP proces. Beschrijving: - CVE-2014-4721 Door een type co... Read more

Source: www.ncsc.nl

Top found tags: PHP(1),The Netherlands(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden in PHP verholpenLocation: Hewlett-Packard - Palo Alto, United States
Date published: 10-07-2014

Samenvatting: Er zijn updates uitgebracht om kwetsbaarheden in PHP 5.5 te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om willekeurige code uit te voeren onder de rechten van een gebruiker, het verkrijgen van gevoelige informatie of om een Denial-of-Service te vero... Read more

Source: www.ncsc.nl

Top found tags: PHP(1),The Netherlands(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybersecuritybeeld Nederland: meer aandacht voor ICT-duurzaamheidLocation: Ministry of Security and Justice - Den Haag, The Netherlands
Date published: 10-07-2014

Cybercrime en digitale spionage blijven de grootste dreiging op het gebied van cyber security. De potentile impact van cyberaanvallen en verstoringen neemt door snelle digitalisering alleen maar toe. Een andere in het oog springende bevinding is het gebrek aan zogenaamde ICT Duurzaamheid. Een voor... Read more

Source: www.ncsc.nl

Top found tags: critical infrastructure(8),The Netherlands(10),government(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden gevonden in de LZO en LZ4 algoritmesLocation: Door, United States
Date published: 10-07-2014

Samenvatting: Er zijn een aantal kwetsbaarheid gevonden in de Oberhumer LZO en LZ4 algoritmes. Verschillende fabrikanten hebben updates uitgebracht die deze kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken van de applicatie die gebruikmaakt van de LZO en LZ... Read more

Source: www.ncsc.nl

Top found tags: update (1),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in kdelibs verholpenLocation: Amsterdam, The Netherlands
Date published: 10-07-2014

Samenvatting: Er is een update uitgebracht om een kwetsbaarheid in kdelibs te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om gevoelige informatie te verkrijgen. Beschrijving: - CVE-2014-3494 De kioslave die wordt gebruikt voor onder andere kmail genereert geen waa... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
OpenSUSE verhelpt meerdere kwetsbaarheden in kernelLocation: Amsterdam, The Netherlands
Date published: 10-07-2014

Samenvatting: OpenSUSE heeft meerdere kwetsbaarheden verholpen in de Linux kernel. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende verhoogde gebruikersrechten krijgen en een Denial-of-Service veroorzaken. Beschrijving: - CVE-2013-7339, CVE-2014-3122: Deze kwetsbaarheden staan ... Read more

Source: www.ncsc.nl

Top found tags: NL(1),The Netherlands(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FreeBSD heeft kwetsbaarheid in iconv verholpenLocation: Amsterdam, The Netherlands
Date published: 10-07-2014

Samenvatting: FreeBSD heeft een kwetsbaarheid in iconv verholpen. Gevolgen: Een kwaadwillende kan door het misbruiken van de kwetsbaarheid een crash veroorzaken van een applicatie die de iconv library gebruikt. Beschrijving: De iconv library wordt gebruikt om karakterset conversies uit te voeren. Do... Read more

Source: www.ncsc.nl

Top found tags: DoS(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish