Under construction

New design coming soon!

CIC News engine statistics

CIC News for 11-07-2014 contains 106 articles: cybercrime(40),cyber security(31),data breach(5),other(30)

CIC News update contains 79 English and 27 Dutch articles for today.
There are 5 published advisories, 0 are English and 5 are Dutch.
In today's English news articles:
- 31 related to cybercrime
- 27 related to cyber security
- 5 related to data breach and identity theft
- 16 for the category other news

In today's Dutch news articles:
- 9 related to cybercrime
- 4 related to cyber security
- 14 for the category other news

Have fun reading.

English cybercrime related news

Microsoft says cybercrime bust frees 4.7 mln infected PCsLocation: Microsoft HQ - Redmond, United States
Date published: 10-07-2014

BOSTON (Reuters) - Microsoft Corp said it has freed at least 4.7 million infected personal computers from control of cyber crooks in its most successful digital crime-busting operation, which interrupted service at an Internet-services firm last week. The world's largest software maker has also iden... Read more

Source: reuters.com

Top found tags: government(2),malware(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Boleto Malware Hits Brazil Payment SystemLocation: Trusteer - Boston, United States
Date published: 10-07-2014

The Boleto Bancrio is a Brazilian payment system that is intended to make it easier for consumers to make payments. Apparently it's also making it easy for hackers to steal money. Last week RSA reported that it had uncovered a Boleto malware ring that was siphoning off funds from the payment syste... Read more

Source: www.esecurityplanet.com

Top found tags: RSA(2),telecom sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Two new Boleto malware families discoveredLocation: Trusteer - Boston, United States
Date published: 10-07-2014

The operation that likely led to the infection of Target's POS systems is known as KAPTOXA. Trusteer, an IBM company, revealed details on the bolware variants, which employ new tactics to manipulate web pages used for Boletos transactions. Researchers recently shed light on the potential multi-billi... Read more

Source: www.scmagazine.com

Top found tags: Internet Explorer(2),RSA(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Resurgence of VBA macro malware poses new threatLocation: Sophos HQ - Oxfordshire, United Kingdom
Date published: 10-07-2014

Visual Basic Applications malware is making a resurgence as malware developers evolve it, Gabo Szappanos, a researcher with Sophos Labs, said revealing details of a white paper published in Virus Bulletin on Tuesday. Noting that macro viruses had become nearly extinct over the past five years, due i... Read more

Source: www.scmagazine.com

Top found tags: social engineering(2),trojan(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police, security firms abate Shylock malware threatLocation: Dell HQ - Round Rock, United States
Date published: 10-07-2014

Police, security firms abate Shylock malware threat In 2013, the banking trojan was deemed one of the most active banking trojans by Dell SecureWorks. International law enforcement and a number of organizations in the private sector have made a concerted effort to stop the spread the Shylock banking... Read more

Source: www.scmagazine.com

Top found tags: Microsoft(3),Kaspersky Lab(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gmail iOS app vulnerable to MitM attack, emails and credentials at riskLocation: Apple HQ - Cupertino, United States
Date published: 10-07-2014

Gmail iOS app vulnerable to MitM attacks, emails and credentials at risk Lacoon reported the problem on Feb. 24 and Google said it would fix it, but the issue still exists. The Gmail app for iOS does not perform certificate pinning this means an attacker can view plaintext emails and steal crede... Read more

Source: www.scmagazine.com

Top found tags: research(1),SSL (1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese hackers seek security clearance data on federal workersLocation: Department of Homeland Security - Washington, United States
Date published: 10-07-2014

Chinese hackers gained access in March to Office of Personnel Management (OPM) databases containing personal information on federal workers in what appears to be an effort to tap the files of those who applied for top-secret security clearances, according to the New York Times. The newspaper quoted ... Read more

Source: www.scmagazine.com

Top found tags: DHS(2),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dodgy Google, Yahoo! SSL certs nuked in Windows finallyLocation: Microsoft HQ - Redmond, United States
Date published: 10-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines One week after Google spotted that an Indian SSL certificate authority was dishing out certs for impersonating Google and Yahoo! websites, Microsoft has taken action to block them from being used on its software. The certificates, issued by ... Read more

Source: go.theregister.com

Top found tags: patch(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Emergency Windows update revokes dozens of bogus Google, Yahoo SSL certificatesLocation: Microsoft HQ - Redmond, United States
Date published: 10-07-2014

to prevent attacks that abuse recently issued digital certificates impersonating Google and Yahoo. Company officials warned undiscovered fraudulent credentials for other domains may still be in the wild. Further Reading Crypto certificates impersonating Google and Yahoo pose threat to Windows users ... Read more

Source: arstechnica.com

Top found tags: patch(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Romanian man sentenced to 45 months for role in phishing schemeLocation: Bucharest, Romania
Date published: 10-07-2014

A Romanian man, Iulian Schiopu, was sentenced on Tuesday to 45 months in prison for his role in a massive phishing scheme involving several individuals. The phishers stored collected information in shared email accounts, which contained extensive payment card data, as well as names, addresses, telep... Read more

Source: www.scmagazine.com

Top found tags: United States(2),telecom sector(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sydney coppers clobber cabbie carder crimsLocation: Sydney, Australia
Date published: 11-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Sydney police have swooped on a fraud ring that implanted skimmers into taxis to clone customers' credit cards. Police on July 1 arrested four men involved in the ring including a 29 year-old taxi driver at Chullora, nabbed a fifth chap late... Read more

Source: go.theregister.com

Top found tags: credit card(2),cybercrime(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CryptoLocker is temporarily disabled, users still at riskLocation: New York, United States
Date published: 11-07-2014

Bitdefender warns that while CyptoLocker is currently disabled, it could come back to life at any moment. As such, users need to take precautions to protect against this threat. The Trojan often comes bundled with spam messages, but the most effective vector is a secondary delivery mechanism that in... Read more

Source: net-security.org

Top found tags: trojan(2),malware(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Securing the virtual environmentLocation: New York, United States
Date published: 11-07-2014

So you have you a shiny new virtual environment up and running. You may have virtualised all your servers, so that your business-critical databases, CRM systems, ERP applications and email all reside in a virtual environment. It has been a long project, but now it is complete and you are experiencin... Read more

Source: net-security.org

Top found tags: malware(1),trojan(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Exploit emerges for LZO algo holeLocation: Bailey, United States
Date published: 11-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Security Mouse security researcher Don A Bailey has showcased an exploit of the Lempel-Ziv-Oberhumer (LZ0) compression algorithm running in the Mplayer2 media player and says it could leave some Linuxes vulnerable to attack. The LZO data com... Read more

Source: go.theregister.com

Top found tags: Linux(1),research(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police, security firms team up and take down Shylock malwareLocation: National Crime Agency - London, United Kingdom
Date published: 11-07-2014

International law enforcement and security experts have disrupted the activities of the financial Trojan Shylock, according to the UK National Crime Agency (NCA). Announced on Thursday, the global takedown was led by the NCA alongside the FBI, Europol, Dell SecureWorks, GCHQ, Kaspersky Lab and other... Read more

Source: www.zdnet.com

Top found tags: Kaspersky Lab(4),United Kingdom(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tinba Banker Trojan Source Code LeakedLocation: Center for Strategic and International Studies - Washington, United States
Date published: 11-07-2014

The source code for Tinba, known as the smallest banker Trojan in circulation, has been posted on an underground forum. Researchers say that the files turned out to be the source code for version one of Tinba, which was identified in 2012,and is the original, privately sold version of the crimewar... Read more

Source: threatpost.com

Top found tags: malware(3),cybercrime(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police, security firms team up and take down Shylock malwareLocation: National Crime Agency - London, United Kingdom
Date published: 11-07-2014

International law enforcement and security experts have disrupted the activities of the financial Trojan Shylock, according to the UK National Crime Agency (NCA). Announced on Thursday, the global takedown was led by the NCA alongside the FBI, Europol, Dell SecureWorks, GCHQ, Kaspersky Lab and other... Read more

Source: www.zdnet.com

Top found tags: Kaspersky Lab(4),United Kingdom(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tinba Banker Trojan Source Code LeakedLocation: Center for Strategic and International Studies - Washington, United States
Date published: 11-07-2014

The source code for Tinba, known as the smallest banker Trojan in circulation, has been posted on an underground forum. Researchers say that the files turned out to be the source code for version one of Tinba, which was identified in 2012,and is the original, privately sold version of the crimewar... Read more

Source: threatpost.com

Top found tags: malware(3),cybercrime(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Trojan Used in Attempt to Resurrect Gameover Zeus BotnetLocation: NatWest - London, United Kingdom
Date published: 11-07-2014

Cybercriminals have developed a new Trojan largely based on Gameover Zeus in an effort to revive the botnet that was recently disrupted by international authorities. Gameover Zeus, the most active banking Trojan in 2013, caused losses of more than $100 million after infecting between 500,000 and 1 m... Read more

Source: securityweek.com

Top found tags: malware(4),financial sector(8),cybercrime(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian Accused of Hacking 'May Die in US Prison': FatherLocation: Washington, United States
Date published: 11-07-2014

MOSCOW - The father of a Russian man detained by the US on hacking charges warned Friday his son would die without medical help, raising the stakes in the latest spat between Moscow and Washington. Russia has accused US authorities of abducting Roman Seleznev in the Maldives and secretly transportin... Read more

Source: securityweek.com

Top found tags: malware(2),financial sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Revokes Fake Yahoo, Google Certificates Issued After India NIC HackLocation: Google HQ - Mountain View, United States
Date published: 11-07-2014

Microsoft has updated its Certificate Trust List (CTL) to revoke rogue certificates issued following a breach of India's National Informatics Center (NIC). The NIC is a government agency that holds intermediate Certificate Authority (CA) certificates trusted by the Indian Controller of Certifying Au... Read more

Source: securityweek.com

Top found tags: mobile device(2),update(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Game on for Gameover?Location: NatWest - London, United Kingdom
Date published: 11-07-2014

NatWest customers targeted by Gameover Zeus Trojan variant. Game on for Gameover? Game on for Gameover? US security firm Malcovery has detected new malware targeting customers of NatWest and other banks that it believes is a mutation of the Gameover Zeus Trojan showing that cyber criminals are s... Read more

Source: www.scmagazineuk.com

Top found tags: government(3),malware(6),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Miscreants leak banking baddie's secret sourceLocation: Center for Strategic and International Studies - Washington, United States
Date published: 11-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Miscreants have released the source code for the Tinba banking Trojan in a move that may spawn the development of copycats. The secret source behind early versions of the small (some versions weigh in at just 20KB) but pernicious banking Tro... Read more

Source: go.theregister.com

Top found tags: cybercrime(3),malware(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI and pals grab banking Trojan zombielord's joystickLocation: National Crime Agency - London, United Kingdom
Date published: 11-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Law enforcement and the security business have teamed up to disrupt the operation of the Shylock banking Trojan. The UK's National Crime Agency joined forces with Europol and the FBI to take down and seize the command and control servers key... Read more

Source: go.theregister.com

Top found tags: government(4),Kaspersky Lab(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Possible New Version of GameOver Zeus Malware EmergesLocation: Europol HQ - Den Haag, The Netherlands
Date published: 11-07-2014

Its only been a little more than a month since the FBI and Europol took down the GameOver Zeus botnet, taking control of its command-and-control infrastructure and effectively cutting off the malwares head. But researchers say that there are some indications that a new strain of the malware ma... Read more

Source: threatpost.com

Top found tags: cybercrime(4),malware(4),financial sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Digital First Aid Kit A Guide For Activists, First-RespondersLocation: Beijing, China
Date published: 11-07-2014

A coalition of worldwide non-governmental organizations has compiled a guide for individuals at risk for cyberattacks as well as for anyone charged with helping activists, human rights organizations and journalists identify and respond to threats. The Digital First Aid Kit is available on Github and... Read more

Source: threatpost.com

Top found tags: social media(2),telecom sector(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Source Code for Tinba Banking Trojan SurfacesLocation: Center for Strategic and International Studies - Washington, United States
Date published: 11-07-2014

The source code for a version of the Tinba malware was published last week on a private underground forum, Denmark-based CSIS Security Group reported on Thursday. According to the security firm, the source code is roughly 2 Mb in size and its distributed along with complete documentation for the Tro... Read more

Source: securityweek.com

Top found tags: trojan(2),malware(5),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NightHunter campaign dates back to 2009, targets credentials and other dataLocation: Hunt, United States
Date published: 11-07-2014

Asprox botnet campaign shifts tactics, evades detection Phishing emails are being used to deliver unique keylogger malware in the NightHunter campaign. Attackers have been using all sorts of modified and customized keylogger malware to infect systems and steal data including credentials as p... Read more

Source: www.scmagazine.com

Top found tags: telecom sector(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tinba malware source code leaked in forumLocation: Center for Strategic and International Studies - Washington, United States
Date published: 11-07-2014

A post in an underground forum has leaked the source code for the Tinba malware program aimed at online banking, according to a blog post penned by Peter Kruse, CTO of Denmark-based CSIS Security Group. Noting that CSIS was the first to break the news of the smallest Trojan banker ever discovered... Read more

Source: www.scmagazine.com

Top found tags: Turkey(1),financial sector(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Google Gmail App for iOS Doesn't Perform Certificating Pinning: ResearchersLocation: Google HQ - Mountain View, United States
Date published: 10-07-2014

Researchers at Lacoon Mobile Security have uncovered an issue in Google's Gmail application for iOS they contend could help an attacker performing a man-in-the-middle attack. According to Lacoon, an analysis of the application revealed it does not perform certificate pinning. As a result, an attacke... Read more

Source: securityweek.com

Top found tags: SSL (1),threat(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brazilians in the Russian UndergroundLocation: Brasilia-Federal District, Brazil
Date published: 10-07-2014

Monitoring the cybercriminal underground sometimes leads us down someinteresting paths. We recently encountered a cybercriminal posting in a Russian underground forum which led to the discovery of more than 136,000 stolen credit card credentials. Help in all the wrong places The trail started with... Read more

Source: trendmicro.com

Top found tags: cybercrime(6),telecom sector(6),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Gmail App for iOS Doesn't Perform Certificate Pinning: ResearchersLocation: Google HQ - Mountain View, United States
Date published: 10-07-2014

Researchers at Lacoon Mobile Security have uncovered an issue in Google's Gmail application for iOS they contend could help an attacker performing a man-in-the-middle attack. According to Lacoon, an analysis of the application revealed it does not perform certificate pinning. As a result, an attacke... Read more

Source: securityweek.com

Top found tags: SSL (1),threat(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybersecurity scourge causes 70% of critical infrastructure firms to lose confidential dataLocation: Gartner - Stamford, United States
Date published: 10-07-2014

Cybersecurity scourge causes 70% of critical infrastructure firms to lose. confidential data Almost three quarters of companies responsible for global critical infrastructure have been the subject of a security breach over the past 12 months with confidential information lost and more attacks expect... Read more

Source: itproportal.com

Top found tags: Ponemon Institute(2),telecom sector(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Infected Chinese inventory scanners ships off logistics intelLocation: Beijing, China
Date published: 11-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines A Chinese manufacturer has been accused of implanting malware that steals supply chain intelligence in its hand-held scanner firmware. Security firm TrapX says infected scanners have been sold to eight unnamed firms including a large robotic... Read more

Source: go.theregister.com

Top found tags: report(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple's iPhone branded a 'national security concern'Location: Beijing, China
Date published: 11-07-2014

Apple's iPhone has been labelled a "national security concern" by Chinese state broadcasters as relations between the country and US over cybersecurity worsen. The influential state-sponsored China Central Television broadcast declared the iPhone a "national security concern" as part of its national... Read more

Source: www.zdnet.com

Top found tags: cyber security(4),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Silent Circle takes on Skype, mobile telcos with encrypted landline callingLocation: Microsoft HQ - Redmond, United States
Date published: 11-07-2014

has announced a global encrypted voice calling service on the heels of launching the 'surveillance-proof' Blackphone. The company aims to disrupt traditional communication services, whether it be tech firms, telcos or handset makers. The launch of the new service, the Global Encrypted Calling Plan, ... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),Microsoft(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Businesses are deprioritizing information securityLocation: New York, United States
Date published: 11-07-2014

Businesses are deprioritizing information security and decreasing their investment in the destruction of confidential information, according to Shred-it. According to the study, 86% of c-suite executives are aware of the legal requirements supporting the protection of confidential data, however one ... Read more

Source: net-security.org

Top found tags: information security(2),government(3),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Exploring the BYOD security dynamicLocation: Webroot - Broomfield, United States
Date published: 11-07-2014

Webroot examined the use and security of personal mobile devices in the work environment from both the employee and employer perspectives. The initial survey, conducted in late 2013, explored the prevalence of employee-owned devices, how they are being secured, and employee concerns regarding compan... Read more

Source: net-security.org

Top found tags: mobile device(2),cyber security(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: 95 per cent of employees voice BYOD security concernsLocation: Webroot - Broomfield, United States
Date published: 11-07-2014

Report: 95 per cent of employees voice BYOD security concerns. Allowing employees to use their own devices is an increasingly popular trend, but BYOD opens up security threats that can leave company data vulnerable. A new survey commissioned by security specialists Webroot looks at the reality of mo... Read more

Source: itproportal.com

Top found tags: cyber security(2),mobile device(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to Teach Humans to Remember Really Complex PasswordsLocation: New York, United States
Date published: 11-07-2014

letters_light [gallery-il] WIRED If passwords are considered the bane of the data security industry, its partly because humans are awful at choosing them: By some counts, we still pick password a facepalm-inducing one in 20 times. But a study from two researchers at Microsoft and Princeton ... Read more

Source: wired.com

Top found tags: training(1),website(1),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook manipulation controversy offers ethics and privacy lessonsLocation: Facebook - Menlo Park, United States
Date published: 10-07-2014

The recent revelation that Facebook Inc. conducted a psychological study on its users has unleashed a wrath of fury across the Internet, leaving users and companies alike wondering if the social network's actions violated its own privacy policies and ethics rules. But the question being asked in the... Read more

Source: searchsecurity.techtarget.com

Top found tags: Bruce Schneier(4),social media(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to Teach Humans to Remember Really Complex PasswordsLocation: New York, United States
Date published: 11-07-2014

letters_light [gallery-il] WIRED If passwords are considered the bane of the data security industry, its partly because humans are awful at choosing them: By some counts, we still pick password a facepalm-inducing one in 20 times. But a study from two researchers at Microsoft and Princeton ... Read more

Source: wired.com

Top found tags: training(1),website(1),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China calls Apple's iPhone a national security threatLocation: Beijing, China
Date published: 11-07-2014

Apple's iPhone is under fire in China where state-run media claim it's a national security threat. Chinese broadcaster CCTV on Friday reported the iPhone's Frequent Locations feature poses a potential national security threat. A researcher interviewed by CCTV said, if accessed, data collected by the... Read more

Source: cnet.com.ortal.com

Top found tags: telecom sector(2),United States(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Soft Underbelly of Enterprise Cybersecurity: Small Business ReadinessLocation: The Washington Post - Washington, D.C., United States
Date published: 11-07-2014

For the better part of the last two years, Ive been on a bit of a personal campaign. Ive talked to more than 50 individual business owners - a set of folks that represents pretty much the entire spectrum of what Id call the everyday life industries - about cybersecurity and the risks ... Read more

Source: securityweek.com

Top found tags: telecom sector(4),cybercrime(6),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attackers Use Keyloggers, Email to Steal Data in "NightHunter" AttacksLocation: Google HQ - Mountain View, United States
Date published: 11-07-2014

Researchers have been monitoring the activities of a cybercriminal group that has been harvesting login credentials from the computers of various organizations across the world. According to security firm Cyphort, which has dubbed the campaign "NightHunter" because of the stealthy methods used to ex... Read more

Source: securityweek.com

Top found tags: financial sector(4),social media(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China accused of global zero-day attack on shipping firmsLocation: Beijing, China
Date published: 11-07-2014

A suspected Chinese government cyber-attack called 'Zombie Zero' has been targeting shipping, logistics and manufacturing companies worldwide, according to US security research firm TrapX. China accused of global zero-day attack on shipping firms China accused of global zero-day attack on shipping f... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(4),government(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICYMI: British spies, security researchers & finding value from BYODLocation: London, United Kingdom
Date published: 11-07-2014

This week's In Case You Missed column looks at Britain's new surveillance laws, the sacking of a security researcher and questions on BYOD management. ICYMI: British spies, security researchers & finding value from BYOD ICYMI: British spies, security researchers & finding value from BYOD UK's new su... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(8),government(9),telecom sector(20)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Do I Create a Firewall Policy? (Part 2)Location: Apple HQ - Cupertino, United States
Date published: 11-07-2014

Its time for part two of our look at firewalls, as we continue our series on layered security. The first part can be found here. firewall Firewall Policies: How to Build a Better Policy As networks become more advanced, so do the demands placed upon your firewall. As such, it is equally important... Read more

Source: blog.fortinet.com

Top found tags: iCloud(1),vulnerability(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Avoiding security breaches during reorganisationLocation: Palo Alto, United States
Date published: 11-07-2014

Huge reorganisations are often a real headache for security When companies reorganise or are brought closer together through merger or acquisition, the primary focus will nearly always be on the financial and legal aspects of the process, and questions over security are usually low down on everyone... Read more

Source: www.information-age.com

Top found tags: cyber security(4),United Kingdom(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google to tour Europe to discuss right-to-be-forgotten rulingLocation: Google HQ - Mountain View, United States
Date published: 11-07-2014

Google is going to tour Europe with a band of external advisers this fall to discuss a landmark ruling by Europes top court that gave people the right to have personal information excluded from search engine listings in Europe. Under this so-called right-to-be-forgotten, search engines such as Go... Read more

Source: www.pcworld.com

Top found tags: cyber security(2),EU(2),website(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Successful Heartbleed response still raises important questionsLocation: Howell, United States
Date published: 11-07-2014

Heartbleed, the vulnerability in the open source OpenSSL encryption library, left organizations across the globe scrambling to apply patches in April. Security experts warned the flaw may expose enterprises' most sensitive of data, including keys used for X.509 certificates, user credentials and onl... Read more

Source: searchsecurity.techtarget.com

Top found tags: United States(2),vulnerability(2),education(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amazon hit with FTC suit over in-app purchasesLocation: Federal Trade Commission - Washington, United States
Date published: 11-07-2014

Following similar actions taken against Apple and Google, the Federal Trade Commission (FTC) filed a lawsuit against Amazon.com for not taking the appropriate steps to make it more difficult for children to make purchases through its app store without the consent of their parents. The agency had pro... Read more

Source: www.scmagazine.com

Top found tags: telecom sector(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Penn State College of Medicine breach risks alumni Social Security numbersLocation: New York, United States
Date published: 11-07-2014

More than 1,000 Penn State College of Medicine alumni's Social Security numbers might have been compromised after malware was found on a university computer. How many victims? Up to 1,176 alumni. What type of personal information? Social Security numbers. What happened? A computer in the Penn State ... Read more

Source: www.scmagazine.com

Top found tags: privacy(1),cyber security(2),education(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Another 'NSA-proof' webmail biz popped by JavaScript injection bugLocation: Oracle - Redwood City, United States
Date published: 11-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines German startup Tutanota has admitted its webmail service was vulnerable to a cross-site scripting bug despite boasting it offered an "NSA-proof email service." The flaw, which would have allowed attackers to inject malicious JavaScript into ... Read more

Source: go.theregister.com

Top found tags: vulnerability(2),website(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

No Likely Data Breach From Reported Chinese Hacking: USLocation: Beijing, China
Date published: 10-07-2014

WASHINGTON - The personal data of thousands of US government workers was not compromised in a recently reported cyber attack, officials said Thursday amid fresh allegations that Chinese hackers accessed computers housing employee information. The Office of Personnel Management and the Department of ... Read more

Source: securityweek.com

Top found tags: cyber security(4),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Unisys finds alarming gaps in critical infrastructure securityLocation: Unisys - Blue Bell, United States
Date published: 11-07-2014

infrastructure industries, such as oil, gas, and energy. Unisys and the Ponemon Institute surveyed almost 600 security executives at utility, oil and gas, energy, and manufacturing companies in 13 countries from April to May this year, and found that 64 percent of respondents anticipated one or more... Read more

Source: www.zdnet.com

Top found tags: Ponemon Institute(2),telecom sector(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
67 Percent of Critical Infrastructure Providers Were Breached Last YearLocation: Department of Homeland Security - Washington, United States
Date published: 11-07-2014

A recent survey of 599 security executives at utility, oil and gas, energy and manufacturing companies in 13 countries has found that 67 percent have experienced at least one security breach in the past 12 months that led to the loss of confidential information or the disruption of operations. The s... Read more

Source: www.esecurityplanet.com

Top found tags: cybercrime(3),telecom sector(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
From Kickoff to Hats OffLocation: McAfee - Santa Clara, United States
Date published: 11-07-2014

In the first half of this year, McAfee Partners participated in the early certification promotion and our 2014 Partner Virtual Sales Kickoff (VSKO). For that, we say hats off to everyone who completed the requirements and committed to being better connected with McAfee in 2014 and beyond. In January... Read more

Source: blogs.mcafee.com

Top found tags: United States(2),social media(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Microsoft to implement 'right to be forgotten' formLocation: Google HQ - Mountain View, United States
Date published: 10-07-2014

Microsoft is following Google's lead on Europe's recent right to be forgotten policy. Late last month Google began providing users the option to request that search results about themselves be deleted, and now, Microsoft will be extending the same to its Bing users, according to The New York T... Read more

Source: www.scmagazine.com

Top found tags: EN(1),Google(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kaspersky quickly addresses XSS flaw impacting company websiteLocation: Kaspersky HQ - Moscow, Russia
Date published: 10-07-2014

A cross-site scripting (XSS) vulnerability impacting a Kaspersky website was addressed by the security software company two days after a researcher, known as E1337, identified the issue and posted about it on xssposed.org. Kaspersky was made aware of the vulnerability on Wednesday and an in-house se... Read more

Source: www.scmagazine.com

Top found tags: vulnerability(2),website(2),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
German government orders local CIA station chief to pack his bagsLocation: Berlin, Germany
Date published: 10-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines The German government has ordered the local station chief of the CIA to leave the country immediately after a second German government official was arrested in an investigation into US surveillance on its erstwhile ally. "The representat... Read more

Source: go.theregister.com

Top found tags: telecom sector(4),United States(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gmail app on iOS vulnerable to snooping, thanks to 'certificate pinning' flawLocation: Google HQ - Mountain View, United States
Date published: 11-07-2014

Google has left out a key security measure in its Gmail app for iOS, leaving users exposed to attackers standing between their encrypted communications and Google's servers. According to mobile security firm Lacoon, Google is aware of a security gap in its Gmail app on iOS, one which it has already ... Read more

Source: www.zdnet.com

Top found tags: United States(2),update(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Empowered Millennials expect BYODLocation: New York, United States
Date published: 11-07-2014

New data finds that Millennials the new generation of workers born between the early 1980s and the early 2000s are highly dedicated to their jobs and often times work well beyond normal business hours. Yet they remain fiercely independent in their work habits craving greater freedom and flexibility ... Read more

Source: net-security.org

Top found tags: survey(1),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Checklist: Should I use Linux?Location: New York, United States
Date published: 11-07-2014

For those who aren t sure how to evaluate the efficacy of Linux for themselves, we have created a simple guide that can walk you through the criteria you need to look at. Since you want an operating system to work for you without any issues, it s safe to assume that any major issues that you find al... Read more

Source: net-security.org

Top found tags: EN(1),Linux(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Using spreadsheets to manage risk is risky businessLocation: Keith, United States
Date published: 10-07-2014

Spreadsheets should be banned from the risk management process as they are no longer up to the job says Keith Ricketts. Using spreadsheets to manage risk is risky business Using spreadsheets to manage risk is risky business Spreadsheets are universally loved. Why, because they give everyone their ow... Read more

Source: www.scmagazineuk.com

Top found tags: update (1),USB (1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GDS launches crackdown on fake government websitesLocation: Bureau, United States
Date published: 11-07-2014

GDS launches crackdown on fake government websites. The Government Digital Service (GDS) has introduced its Thunderclap campaign, a clampdown on fake government websites. According to GDS, using standard search engines to search for Whitehall services can often lead to unofficial websites that charg... Read more

Source: itproportal.com

Top found tags: website(1),government(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple iPhone a danger to China national security: state mediaLocation: New York, United States
Date published: 11-07-2014

BEIJING (Reuters) - Chinese state media on Friday branded Apple Inc's (AAPL.O) iPhone a threat to national security because of the smartphone's ability to track and time-stamp user locations. A report by broadcaster CCTV criticized the iPhone's "Frequent Locations" function for allowing users to be ... Read more

Source: reuters.com

Top found tags: government(4),United States(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple iPhone a danger to China national security: state mediaLocation: New York, United States
Date published: 11-07-2014

BEIJING (Reuters) - Chinese state media on Friday branded Apple Inc's (AAPL.O) iPhone a threat to national security because of the smartphone's ability to track and time-stamp user locations. A report by broadcaster CCTV criticized the iPhone's "Frequent Locations" function for allowing users to be ... Read more

Source: reuters.com

Top found tags: government(4),United States(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lack of Certificate Pinning Exposes Encrypted iOS Gmail App CommunicationLocation: Google HQ - Mountain View, United States
Date published: 11-07-2014

Googles Gmail application for iOS fails to perform a task called certificate pinning, which could expose the users of affected devices to man-in-the-middle attacks capable of monitoring encrypted email communications. Certificate pinning is a process designed to prevent attacks enabled by spoofin... Read more

Source: threatpost.com

Top found tags: Apple(3),mobile device(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amazon asks US government for permission to test 50mph dronesLocation: New York, United States
Date published: 11-07-2014

PaulMCCooper. Amazon asks US government for permission to test 50mph drones Amazon has sent an official request to the American Federal Aviation Authority (FAA) to be allowed to test its new drone fleet in its own testing grounds. Currently, Amazon's experiments in its nascent drone technology have ... Read more

Source: itproportal.com

Top found tags: update (1),government(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Do your execs take mobile security seriously?Location: New York, United States
Date published: 11-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Reader Poll One of the findings emerging from our latest poll is that many of you are highlighting a lack of exec awareness and air cover when it comes to mobile security. This in turn appears to translate to a lack of funding to put the sys... Read more

Source: go.theregister.com

Top found tags: EN(1),Linux(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple Updates OSX Blacklist Following Flash VulnerabilityLocation: Apple HQ - Cupertino, United States
Date published: 11-07-2014

Apple acknowledged on Thursday that it has updated its OSX plugin blacklist to reflect a critical vulnerability in Adobe Flash made public earlier this week. Going forward in Safari, Apple will block any versions of the mechanism prior to 14.0.0.145 and 13.0.0.231, on older systems. An advisory on A... Read more

Source: threatpost.com

Top found tags: patch(1),website(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Study: Security not prioritized in critical infrastructure, though most admit compromiseLocation: Unisys - Blue Bell, United States
Date published: 11-07-2014

A draft of the voluntary framework was released by NIST. Nearly 70 percent of critical infrastructure orgs said their company experienced a security compromise in the last year. In a study, most IT execs at critical infrastructure companies revealed that their organization was compromised in the las... Read more

Source: www.scmagazine.com

Top found tags: ICS(2),Ponemon Institute(2),critical infrastructure(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Cybercriminelen proberen GameOver-botnet te laten herrijzenLocation: Amsterdam, The Netherlands
Date published: 11-07-2014

Begin juni vond er een gecordineerde operatie van Europol, de FBI en Microsoft plaats, waarbij het GameOver Zeus-botnet uit de lucht werd gehaald. Tot verbazing van onderzoekers vochten de beheerders van het botntet niet terug, maar nu zijn er toch pogingen ontdekt om het botnet te laten herrijzen... Read more

Source: www.security.nl

Top found tags: trojan(2),financial sector(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Broncode kleinste digitale bankrover op internet gelektLocation: Center for Strategic and International Studies - Washington, United States
Date published: 11-07-2014

Op internet is de broncode van de Tinba Trojan verschenen, ook wel de kleinste digitale bankrover genoemd. Tinba is een banking Trojan en ontwikkeld om gegevens voor internetbankieren te stelen. Het doet dit door zich in de browser te verstoppen en netwerkverkeer en inloggegevens te onderscheppen. D... Read more

Source: www.security.nl

Top found tags: cybercrime(3),malware(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft noodupdate voor valse SSL-certificatenLocation: Microsoft HQ - Redmond, United States
Date published: 11-07-2014

Microsoft heeft een noodupdate uitgebracht om gebruikers van Windows tegen valse SSL-certificaten te beschermen die door een Indiaas bedrijf waren uitgegeven. Via de valse certificaten is het mogelijk om de inhoud van websites te spoofen en phishing- en man-in-the-middle-aanvallen uit te voeren. Het... Read more

Source: www.security.nl

Top found tags: Windows(1),Microsoft(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Windows trekt met noodupdate 45 SSL-certificaten inLocation: Microsoft HQ - Redmond, United States
Date published: 11-07-2014

Microsoft heeft via Windows Update 45 SSL-certificaten ingetrokken. Het gaat om de vervalste certificaten van Google- en Yahoo-subdomeinen die Google onlangs ontdekte. Een CA uit India lijkt een tweede Diginotar te zijn geworden, omdat hackers zich toegang verschaften tot de servers van de autoritei... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Windows(1),Microsoft(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google verbetert uploadtool voor Mac-malwareLocation: Google HQ - Mountain View, United States
Date published: 11-07-2014

Google heeft een nieuwe versie van de VirusTotal uploadtool voor Mac OS X uitgebracht die allerlei verbeteringen bevat. Via de tool kunnen gebruikers eenvoudig verdachte bestanden door een groot aantal virusscanners laten controleren. Op deze manier hoopt Google meer inzicht in Mac-malware te krijge... Read more

Source: www.security.nl

Top found tags: Windows(1),cybercrime(2),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft bevrijdt 4,7 miljoen computers uit botnetsLocation: Microsoft HQ - Redmond, United States
Date published: 11-07-2014

Bij de recente operatie tegen twee zeer actieve malware-families die de domeinen van DDNS-aanbieder No-IP.com gebruikten heeft Microsoft 4,7 miljoen computers uit botnets weten te bevrijden. Dat laat de softwaregigant tegenover persbureau Reuters weten. De operatie van Microsoft was tegen de Bladabi... Read more

Source: www.security.nl

Top found tags: NL(1),Pakistan(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malediven ontkennen ontvoering Russische cybercrimineelLocation: New York, United States
Date published: 11-07-2014

De president van de Malediven ontkent dat de Amerikaanse Secret Service een vermeende Russische cybercrimineel op de eilandengroep heeft ontvoerd. Eerder deze week meldde het Amerikaanse Ministerie van Homeland Security de arrestatie van Roman Selznyov. Selznyov wordt verdacht van het inbreken op de... Read more

Source: www.security.nl

Top found tags: United States(6),Ministry of the Interior and Kingdom Relations(7),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google verbetert uploadtool voor Mac-malwareLocation: Google HQ - Mountain View, United States
Date published: 11-07-2014

Google heeft een nieuwe versie van de VirusTotal uploadtool voor Mac OS X uitgebracht die allerlei verbeteringen bevat. Via de tool kunnen gebruikers eenvoudig verdachte bestanden door een groot aantal virusscanners laten controleren. Op deze manier hoopt Google meer inzicht in Mac-malware te krijge... Read more

Source: www.security.nl

Top found tags: Windows(1),cybercrime(2),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft bevrijdt 4,7 miljoen computers uit botnetsLocation: Microsoft HQ - Redmond, United States
Date published: 11-07-2014

Bij de recente operatie tegen twee zeer actieve malware-families die de domeinen van DDNS-aanbieder No-IP.com gebruikten heeft Microsoft 4,7 miljoen computers uit botnets weten te bevrijden. Dat laat de softwaregigant tegenover persbureau Reuters weten. De operatie van Microsoft was tegen de Bladabi... Read more

Source: www.security.nl

Top found tags: NL(1),Pakistan(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

'Google-commissie gaat in Europese landen discussiren over privacy'Location: Google HQ - Mountain View, United States
Date published: 11-07-2014

Google gaat in zes Europese landen met een commissie en experts discussiren over hoe zoekmachines moeten omgaan met het 'recht om vergeten te worden'. Het Europese Hof oordeelde in mei dat burgers zoekmachines kunnen verzoeken om bepaalde informatie te verwijderen. Google heeft de stap nog niet aa... Read more

Source: tweakers.net

Top found tags: cyber security(2),Germany(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers vinden beveiligingslekken in wachtwoordmanagersLocation: New York, United States
Date published: 11-07-2014

Onderzoekers van de Berkeley-universiteit hebben kwetsbaarheden in meerdere wachtwoordmanagers gevonden, waaronder het populaire Lastpass. In het geval van Lastpass was de bookmarklet kwetsbaar; malafide websites konden alle wachtwoorden ontsleutelen. WachtwoordDe onderzoekers hebben hun bevindingen... Read more

Source: tweakers.net

Top found tags: vulnerability(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Silent Circle rolt versleuteld bellen uit naar 79 landenLocation: Microsoft HQ - Redmond, United States
Date published: 11-07-2014

Het Amerikaanse beveiligingsbedrijf Silent Circle heeft een belbundel uitgerold waardoor mensen in 79 landen versleuteld kunnen bellen. Het "Global Encrypted Calling Plan", zoals het abonnement wordt genoemd, is vooral bedoeld om de telecommarkt op te schudden. De prijzen liggen volgens Silent Circl... Read more

Source: www.security.nl

Top found tags: cyber security(2),United States(4),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Silent Circle rolt versleuteld bellen uit naar 79 landenLocation: Microsoft HQ - Redmond, United States
Date published: 11-07-2014

Het Amerikaanse beveiligingsbedrijf Silent Circle heeft een belbundel uitgerold waardoor mensen in 79 landen versleuteld kunnen bellen. Het "Global Encrypted Calling Plan", zoals het abonnement wordt genoemd, is vooral bedoeld om de telecommarkt op te schudden. De prijzen liggen volgens Silent Circl... Read more

Source: www.security.nl

Top found tags: cyber security(2),United States(4),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Germany Kicks Out Top US Intelligence Officer in Spy RowLocation: Berlin, Germany
Date published: 10-07-2014

BERLIN - Germany on Thursday expelled the CIA station chief in Berlin in an escalating row over alleged spying by the US that has opened the worst diplomatic rift in years between the Western allies. The expulsion comes after two suspected US spy cases were uncovered in less than a week in Germany, ... Read more

Source: securityweek.com

Top found tags: United States(6),telecom sector(8),government(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overheidsdatabases van Amerikaanse ambtenaren gekraaktLocation: New York, United States
Date published: 10-07-2014

Aanvallers zijn er in geslaagd om toegang tot de databases van de Amerikaanse overheid te krijgen waar de persoonlijke informatie van alle federale ambtenaren is opgeslagen. De aanvallers hadden het mogelijk voorzien op de bestanden van tienduizenden ambtenaren die top-secret security clearances had... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Steam laat aanvallers rechten op Windows verhogenLocation: Microsoft HQ - Redmond, United States
Date published: 11-07-2014

Het online speldistributieplatform Steam, dat meer dan 75 miljoen gebruikers heeft, maakt het mogelijk voor aanvallers om hun rechten op Windows te verhogen. Dat ontdekte beveiligingsonderzoeker Luigi Auriemma. Het gaat volgens de onderzoeker niet om een beveiligingslek, maar een ontwerpprobleem. Op... Read more

Source: www.security.nl

Top found tags: report(1),research(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware in Chinese scanners steelt bedrijfsdataLocation: Beijing, China
Date published: 11-07-2014

Een Isralisch beveiligingsbedrijf heeft naar eigen zeggen malware in de inventarisscanners ontdekt die door een Chinees bedrijf aan de scheepvaart en logistieke sector worden verkocht. De scanners worden gebruikt voor het inventariseren van goederen die verscheept of getransporteerd moeten worden.... Read more

Source: www.security.nl

Top found tags: research(1),website(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
10.000 dollar uitgeloofd voor hacken van Tesla-autoLocation: Amsterdam, The Netherlands
Date published: 11-07-2014

Tijdens een hackerconferentie die binnenkort in Beijing plaatsvindt kunnen deelnemers 10.000 dollar verdienen door een elektrische Tesla-auto te hacken. De "Tesla Hacking competitie" wordt tijdens de SyScan 360 conferentie georganiseerd, die over vijf dagen begint. De organisatie heeft bewust voor d... Read more

Source: www.security.nl

Top found tags: NL(1),research(1),conference(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vrouw laat rechtszaak tegen Tor wegens wraakporno vallenLocation: Amsterdam, The Netherlands
Date published: 11-07-2014

Een Amerikaanse vrouw heeft besloten om het Tor Project toch niet aan te klagen wegens een website die wraakporno toont. Het gaat om de website Pinkmeth.com, die alleen via het Tor-netwerk toegankelijk is. De site zou zonder toestemming naaktfoto's van Shelby Conklin hebben geplaatst. De vrouw klaag... Read more

Source: www.security.nl

Top found tags: website(1),social media(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple blokkeert onveilige Flash Player op Mac OS XLocation: Apple HQ - Cupertino, United States
Date published: 11-07-2014

Vanwege beveiligingsproblemen met oudere versies van Adobe Flash Player heeft Apple besloten om onveilige versies van de plug-in op Mac OS X te blokkeren. Safari beschikt over een mechanisme om browserplug-ins uit te schakelen. Apple kan op deze manier gebruikers tegen aanvallen beschermen. Deze wee... Read more

Source: www.security.nl

Top found tags: OS X(2),patch(2),update(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Samsung ontkent met beveiligingsplatform Knox te stoppenLocation: Knox, United States
Date published: 11-07-2014

Het gerucht dat Samsung met zijn mobiele beveiliginsplatform Knox zou stoppen is niet waar, laat de Koreaanse elektronicagrootmacht weten. Volgens Samsung groeit het aantal klanten en ook zou het platform onderscheidend genoeg zijn. Samsung stelt een deel van de Knox-technologie voor de beveiliging ... Read more

Source: tweakers.net

Top found tags: NL(1),Samsung(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Grondwet gaat ook communicatie via e-mail beschermenLocation: Amsterdam, The Netherlands
Date published: 11-07-2014

De Grondwet zal worden aangepast zodat alle vormen van communicatie grondwettelijk worden beschermd, zoals e-mail, telefoonverkeer via internet en besloten communicatie via sociale media. Het brief-, telefoon- en telegraafgeheim maakt daardoor ruimte voor het brief- en telecommunicatiegeheim. Dit st... Read more

Source: www.security.nl

Top found tags: The Netherlands(2),Ministry of the Interior and Kingdom Relations(7),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gmail-app iOS mist maatregel tegen MitM-aanvallenLocation: Google HQ - Mountain View, United States
Date published: 11-07-2014

Een maatregel die gebruikers van de Gmail-app op Android tegen Man-in-the-Middle (MitM)-aanvallen moet beschermen is niet aanwezig in de iOS-versie, zo hebben onderzoekers ontdekt. Het gaat om een maatregel die 'certificaat pinning' wordt genoemd en valse SSL-certificaten kan herkennen. SSL-certific... Read more

Source: www.security.nl

Top found tags: social engineering(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
10.000 dollar uitgeloofd voor hacken van Tesla-autoLocation: Amsterdam, The Netherlands
Date published: 11-07-2014

Tijdens een hackerconferentie die binnenkort in Beijing plaatsvindt kunnen deelnemers 10.000 dollar verdienen door een elektrische Tesla-auto te hacken. De "Tesla Hacking competitie" wordt tijdens de SyScan 360 conferentie georganiseerd, die over vijf dagen begint. De organisatie heeft bewust voor d... Read more

Source: www.security.nl

Top found tags: NL(1),research(1),conference(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vrouw laat rechtszaak tegen Tor wegens wraakporno vallenLocation: Amsterdam, The Netherlands
Date published: 11-07-2014

Een Amerikaanse vrouw heeft besloten om het Tor Project toch niet aan te klagen wegens een website die wraakporno toont. Het gaat om de website Pinkmeth.com, die alleen via het Tor-netwerk toegankelijk is. De site zou zonder toestemming naaktfoto's van Shelby Conklin hebben geplaatst. De vrouw klaag... Read more

Source: www.security.nl

Top found tags: website(1),social media(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple blokkeert onveilige Flash Player op Mac OS XLocation: Apple HQ - Cupertino, United States
Date published: 11-07-2014

Vanwege beveiligingsproblemen met oudere versies van Adobe Flash Player heeft Apple besloten om onveilige versies van de plug-in op Mac OS X te blokkeren. Safari beschikt over een mechanisme om browserplug-ins uit te schakelen. Apple kan op deze manier gebruikers tegen aanvallen beschermen. Deze wee... Read more

Source: www.security.nl

Top found tags: OS X(2),patch(2),update(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Samsung ontkent met beveiligingsplatform Knox te stoppenLocation: Knox, United States
Date published: 11-07-2014

Het gerucht dat Samsung met zijn mobiele beveiliginsplatform Knox zou stoppen is niet waar, laat de Koreaanse elektronicagrootmacht weten. Volgens Samsung groeit het aantal klanten en ook zou het platform onderscheidend genoeg zijn. Samsung stelt een deel van de Knox-technologie voor de beveiliging ... Read more

Source: tweakers.net

Top found tags: NL(1),Samsung(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Noodpatch van Microsoft trekt valse certificaten inLocation: Microsoft HQ - Redmond, United States
Date published: 11-07-2014

Samenvatting: Microsoft heeft een noodpatch beschikbaar gesteld om een aantal SSL-certificaten in te trekken. Een kwaadwillende die deze certificaten in handen heeft kan een Man-in-the-Middle aanval opzetten. Gevolgen: Indien een kwaadwillende de certificaten in handen heeft, kan deze een Man-in-the... Read more

Source: www.ncsc.nl

Top found tags: NL(1),patch(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Linux Kernel verholpenLocation: Ubuntu - London, United Kingdom
Date published: 11-07-2014

Samenvatting: Er is een kwetsbaarheid verholpen in de Linux Kernel. Gevolgen: Door deze kwetsbaarheid te misbruiken kan een kwaadwillende een Denial-of-Service veroorzaken en mogelijk verhoogde gebruikersrechten verkrijgen. Beschrijving: Er is een kwetsbaarheid verholpen in de Linux Kernel in de ptr... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in Cisco Adaptive Security Appliance (ASA)Location: Cisco HQ - San Jose, United States
Date published: 11-07-2014

Samenvatting: Cisco heeft een kwetsbaarheid in Cisco Adaptive Security Appliance (ASA) Software verholpen. Gevolgen: Door deze kwetsbaarheid te misbruiken kan een kwaadwillende een Denial-of-Service veroorzaken. Beschrijving: Een niet ondersteunde software configuratie met overlappende traffic match... Read more

Source: www.ncsc.nl

Top found tags: NL(1),vulnerability(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid ontdekt in Cisco Unified Communications Manager RTMTLocation: Cisco HQ - San Jose, United States
Date published: 11-07-2014

Samenvatting: Cisco heeft aangegeven dat er een kwetsbaarheid is ontdekt in de Real-Time Monitoring Tool (RTMT) van de Cisco Unified Communications Manager RTMT. Gevolgen: Een kwaadwillende kan door het misbruiken van deze kwetsbaarheid bestanden inzien van willekeurige locaties op het bestandssyste... Read more

Source: www.ncsc.nl

Top found tags: NL(1),vulnerability(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden ontdekt in Cisco Unified Communications Manager DNALocation: Cisco HQ - San Jose, United States
Date published: 11-07-2014

Samenvatting: Het Cisco PSIRT heeft aangegeven dat er diverse kwetsbaarheden zijn ontdekt in de Cisco Unified Communications Manager DNA. Gevolgen: Een aanvaller kan door het misbruiken van deze kwetsbaarheid zich verhoogde rechten verschaffen op het kwetsbare systeem. Een aanvaller kan de kwetsbaar... Read more

Source: www.ncsc.nl

Top found tags: XSS(1),website(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish