Under construction

New design coming soon!

CIC News engine statistics

CIC News for 14-07-2014 contains 76 articles: cybercrime(15),cyber security(25),data breach(5),other(31)

CIC News update contains 60 English and 16 Dutch articles for today.
There are 4 published advisories, 0 are English and 4 are Dutch.
In today's English news articles:
- 11 related to cybercrime
- 24 related to cyber security
- 5 related to data breach and identity theft
- 20 for the category other news

In today's Dutch news articles:
- 4 related to cybercrime
- 1 related to cyber security
- 11 for the category other news

Have fun reading.

English cybercrime related news

Being Secure In The Most Connected World Cup EverLocation: Brasilia-Federal District, Brazil
Date published: 14-07-2014

Sporting events are getting more and more connected, and the just-concluded World Cup is no exception. Braziliantelecom provider Oi made sure that no expense was spared in connecting the World Cup , andeven claimed that this years event is in fact the most connected in the history of th... Read more

Source: trendmicro.com

Top found tags: Germany(2),cybercrime(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Global action targeting Shylock malwareLocation: National Crime Agency - London, United Kingdom
Date published: 14-07-2014

On 8 and 9 July 2014, an alliance of law enforcement and industry undertook measures against the Internet domains and servers that form the core of an advanced cybercriminal infrastructure attacking online banking systems around the globe using the Shylock Trojan. Law enforcement agencies took actio... Read more

Source: net-security.org

Top found tags: United Kingdom(4),government(6),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DoJ provides update on Gameover Zeus and Cryptolocker disruptionLocation: Pennsylvania, United States
Date published: 14-07-2014

The Justice Department filed a status report with the United States District Court for the Western District of Pennsylvania updating the court on the progress in disrupting the Gameover Zeus botnet and the malicious software known as Cryptolocker. The disruption began in late May, when the Justice D... Read more

Source: net-security.org

Top found tags: United States(2),update(2),malware(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
XSS marks the spot: PayPal portal peril pluggedLocation: PayPal HQ - San Jose, United States
Date published: 14-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines PayPal has plugged a potentially nasty flaw on its internal portal. The vulnerability, discovered by security analyst Benjamin Kunz Mejri of Vulnerability Laboratory, involved security shortcomings in PayPal's backend systems. More specifica... Read more

Source: go.theregister.com

Top found tags: XSS(1),United States(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Secret Service warns of keyloggers on public hotel computersLocation: New York, United States
Date published: 14-07-2014

The US Secret Service has warned users of hotel business centers that public PCs may be targeted by hackers, with the intent on stealing personal and business information. An advisory posted by the service, in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC... Read more

Source: www.zdnet.com

Top found tags: Windows(1),credit card(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google testing new phishing and malware warningsLocation: Google HQ - Mountain View, United States
Date published: 14-07-2014

A Google engineer and a member of the Google Chrome security team has shared on Twitter a new look that is being tested for the phishing and malware warnings seen by Chrome users: [new-phish-] [new-malw-1] The new alerts have been incorporated in the Canary and Developer channels, and if all goes we... Read more

Source: net-security.org

Top found tags: Google(2),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NCA, FBI, Europol Take Down Shylock Banking MalwareLocation: National Crime Agency - London, United Kingdom
Date published: 14-07-2014

On July 8 and 9, 2014, the U.K.'s National Crime Agency (NCA) worked with Europol, the FBI, BAE Systems Applied Intelligence, Dell SecureWorks, Kaspersky Lab and the U.K.'s Government Communications Headquarters (GCHQ) to seize command and control servers and domains used by the Shylock banking Troj... Read more

Source: www.esecurityplanet.com

Top found tags: Kaspersky Lab(4),United Kingdom(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
British PM promises 800 million cyber defence fundLocation: Cameron, United States
Date published: 14-07-2014

British Prime Minister David Cameron today announced a 800 million investment in improving the country's cyber intelligence, reconnaissance and defence capabilities. British PM promises 800 million cyber defence fund British PM promises 800 million cyber defence fund Cameron announced the fund... Read more

Source: www.scmagazineuk.com

Top found tags: cyber warfare(2),government(6),United Kingdom(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gameover ZeuS botnet pulls dripping stake from heart, staggers back from the UNDEADLocation: Sophos HQ - Oxfordshire, United Kingdom
Date published: 14-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines The Gameover ZeuS malware is back from the dead just six weeks after a takedown operations that aimed to put a stake through the heart of the botnet, which is linked to the even more infamous CryptoLocker ransomware. International law enforc... Read more

Source: go.theregister.com

Top found tags: cybercrime(2),malware(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
First aid kit for people who face digital threatsLocation: New York, United States
Date published: 14-07-2014

A group of NGOs that includes the EFF, Global Voices, and Internews, has launched the Digital First Aid Kit, an open source self-assessment tool for people who face digital threats. The Digital Defenders Partnership was established in 2012 to provide emergency support for Internet users trying to ex... Read more

Source: net-security.org

Top found tags: EN(1),threat(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

The future of computing is a battle for your personal informationLocation: Google HQ - Mountain View, United States
Date published: 14-07-2014

commoditised. It should come as no surprise though, it follows a well-worn playbook of increasing performance for less cost that has been the defining characteristic of the industry since its conception. With margins continuing to disappear from both hardware and software sales, the next goldmine fo... Read more

Source: www.zdnet.com

Top found tags: Microsoft(3),mobile device(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US charges Chinese executive with hacking military dataLocation: Beijing, China
Date published: 14-07-2014

The US Department of Justice has charged a Chinese businessman with hacking the computer systems of Boeing and other US defense contractors, amid growing tensions over computer espionage. Su Bin, a Chinese national and the owner of a Chinese aviation technology company, conspired with two individual... Read more

Source: cnet.com.ortal.com

Top found tags: Department of Justice(3),government(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple Denies Chinese Report of Location Tracking Security RiskLocation: Apple HQ - Cupertino, United States
Date published: 14-07-2014

NEW YORK - US technology giant Apple is fighting Chinese claims that the iPhone threatens national security through its ability to track and time-stamp a user's location. The frequent locations function, which can be switched on or off by users, is available on iOS 7, the operating system used by th... Read more

Source: securityweek.com

Top found tags: smartphone(3),mobile device(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Popular password protection programs p0wnableLocation: University of California - San Diego, United States
Date published: 14-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Researchers have detailed a series of quickly patched vulnerabilities in five popular password managers that could allow attackers to steal user credentials. "Critical" vulnerabilities were discovered and reported in LastPass, RoboForm, My1L... Read more

Source: go.theregister.com

Top found tags: financial sector(2),website(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple refutes China report on iPhone threat to national securityLocation: Apple HQ - Cupertino, United States
Date published: 14-07-2014

The U.S. smartphone maker said posted on its Chinese website that location-based data collected by iPhone is encrypted and stored locally on the device, so it is not available to Apple or any third party. The company issued the statement in response to a report aired Friday by China's leading state-... Read more

Source: www.zdnet.com

Top found tags: smartphone(2),United States(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Week in review: Google catches India with fake certificates, and the risks of selling used smartphonesLocation: Gartner - Stamford, United States
Date published: 14-07-2014

Here's an overview of some of last week's most interesting news, interviews, reviews and articles: Exploring the mobile security landscape In this interview, Adam Ely, COO of Bluebox, discusses the most significant mobile security challenges for enterprise security professionals, illustrates how BYO... Read more

Source: net-security.org

Top found tags: cyber security(6),telecom sector(6),cybercrime(11)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IoT privacy tech working group announcedLocation: Summit, United States
Date published: 14-07-2014

TRUSTe formed a multi-stakeholder IoT Privacy Tech Working Group to identify the technical standards and best practices necessary to help enhance consumer privacy in the Internet of Things (IoT). The goal of this Working Group is to evaluate the current technical standards and specifications impacte... Read more

Source: net-security.org

Top found tags: privacy(1),cyber security(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple denies that iPhone location services are a threat to Chinese national securityLocation: Apple HQ - Cupertino, United States
Date published: 14-07-2014

Apple denies that iPhone location services are a threat to Chinese national. security Apple has, in no uncertain terms, refuted Chinese claims that the location tracking features on board its smartphone should be considered a threat to the country's national security. This controversy blew up over t... Read more

Source: itproportal.com

Top found tags: mobile device(2),smartphone(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Backup Your Mobile Device, Save Your MoneyLocation: Google HQ - Mountain View, United States
Date published: 14-07-2014

The year of 2013 was named as The Menace Year mainly because of the rampant CryptoLocker, a nefarious ransomware that encrypts user files and demands for a ransom to be paid in order to decrypt these files. And before CryptoLocker were the unfashionable scareware programs such as FakeAV, which used ... Read more

Source: blog.fortinet.com

Top found tags: malware(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why Gartner's top security tech is a clear game changerLocation: Gartner - Stamford, United States
Date published: 14-07-2014

Gartner has identified cloud access security brokers as the top security technology of 2014 In his presentation '2014 Top 10 Technologies for Information Security' at the Gartner Security and Risk Management Summit, Neil MacDonald (Vice President, distinguished analyst and Gartner fellow emeritus) g... Read more

Source: www.information-age.com

Top found tags: government(3),United Kingdom(4),cyber security(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK spy agency GCHQ tribunal on surveillance claims beginsLocation: GCHQ - Cheltenham, United Kingdom
Date published: 14-07-2014

Following the NSA scandal, it's unsurprising the UK's intelligence service is also in the firing line, and a tribunal is set to begin to hear arguments by civil liberty groups that the GCHQ has overstepped the mark on surveillance. As reported by The Guardian, the legal challenge set against the GCH... Read more

Source: www.zdnet.com

Top found tags: United Kingdom(4),United States(4),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kronos: New Financial Malware Sold on Russian Underground ForumLocation: Trusteer - Boston, United States
Date published: 14-07-2014

Malware developers have recently started advertising a new banking Trojan on a Russian cybercrime forum, researchers from Trusteer reported on Friday. The malware, dubbed "Kronos," costs $7,000, but its creators are giving potential customers the opportunity to conduct one-week tests for the price o... Read more

Source: securityweek.com

Top found tags: telecom sector(6),financial sector(8),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Info sharing key to cyber defence, says financial services firmLocation: New York, United States
Date published: 14-07-2014

Threat information sharing is key to the success of combating cyber attacks, says financial market clearing and settlement services firm Depository Trust and Clearing Corporation (DTCC). This is one of three main challenges facing financial services and other organisations, said Mark Clancy, managin... Read more

Source: www.computerweekly.com

Top found tags: United Kingdom(2),cybercrime(5),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
From the Cold War to the Code War: UK boosts spending on cyber warfareLocation: Cameron, United States
Date published: 14-07-2014

Legrand / Shutterstock.com The UK is upping its spending on cyber defence as a report warns that the country's increasing reliance on a connected infrastructure could create new opportunities for criminals and terrorists. Prime minister David Cameron said that 800m will be spent on intelligence an... Read more

Source: www.zdnet.com

Top found tags: cyber security(4),government(4),United Kingdom(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LastPass Fixes a Pair of Security FlawsLocation: New York, United States
Date published: 14-07-2014

LastPass, the popular password manager for most of the top Web browsers, has fixed a couple of vulnerabilities that could have allowed an attacker to target users and generate his own one-time passwords for the victims account. Thecompany said that its security team hasnt seen any active att... Read more

Source: threatpost.com

Top found tags: research(1),vulnerability(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critical vulnerabilities in web-based password managers foundLocation: University of California - San Diego, United States
Date published: 14-07-2014

A group of researchers from University of California, Berkeley, have analyzed five popular web-based password managers and have discovered - and then responsibly reported - vulnerabilities that could allow attackers to learn a user s credentials for arbitrary websites. "We find vulnerabilities in di... Read more

Source: net-security.org

Top found tags: cyber security(2),website(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Putin Condemns 'Hypocrisy' of Western Cyber-EspionageLocation: Berlin, Germany
Date published: 14-07-2014

MOSCOW - Russian President Vladimir Putin on Friday condemned the "hypocrisy" of Western countries who use cyber-espionage to eavesdrop on leaders, and called for an international campaign to combat the problem. He spoke after Germany on Thursday expelled the CIA station chief in Berlin over alleged... Read more

Source: securityweek.com

Top found tags: government(5),United States(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LastPass Notifies Users of OTP, Bookmarklet VulnerabilitiesLocation: University of California - San Diego, United States
Date published: 14-07-2014

Password Manager Vulnerabilities The developers of the popular password manager LastPass informed users on Friday of security vulnerabilities reported to the company last year. The flaws, affecting bookmarklets and one-time passwords (OTP), were identified in August 2013 by University of California,... Read more

Source: securityweek.com

Top found tags: website(1),cyber security(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Event Horizon: Examining Enterprise Security Blind SpotsLocation: New York, United States
Date published: 14-07-2014

Examining Gaps in Network Security In Physics, the event horizon of a black hole is the point at which the black holes gravitational pull becomes so great that nothing can escape not even light. In other words, the black holes event horizon is essentially a point of no return that, o... Read more

Source: securityweek.com

Top found tags: website(1),cyber security(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacking techniques are advanced, but are your security measures?Location: McAfee - Santa Clara, United States
Date published: 14-07-2014

A recent survey by McAfee uncovered that half of IT decision makers in the UK are not taking precautions against AETs High profile hacking incidents such as the recent cyber attacks on eBay and shoe retailer Office have encouraged a number of businesses to take the threat of cybercrime seriously of ... Read more

Source: www.information-age.com

Top found tags: vulnerability(2),cyber security(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oracle to Patch 113 Security Vulnerabilities in Critical UpdateLocation: Oracle - Redwood City, United States
Date published: 14-07-2014

Oracle plans to issue a massive security update Tuesday that addresses 113 vulnerabilities. Twenty of the security fixes are aimed at Oracle Java SE. All of these bugs can be exploited remotely without authentication. According to Oracle, the Java SE components fixed in the update affect Java SE and... Read more

Source: securityweek.com

Top found tags: patch(2),United States(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Proposed data breach fines a drop in the oceanLocation: Wellington, New Zealand
Date published: 14-07-2014

imprecise and dont go far enough. Trend Micros senior security architect Peter Benson says data breach disclosure laws are long overdue and will bring New Zealand into line with whats happening elsewhere. bensonPeter Benson We are following the world rather than leading, he says, noti... Read more

Source: www.zdnet.com

Top found tags: New Zealand(2),Trend Micro(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US charges Chinese businessman with hacking military dataLocation: Beijing, China
Date published: 14-07-2014

A Chinese executive has been arrested and charged on the grounds of stealing military data. The US Department of Justice (DoJ) has arrested and charged a Chinese national for working with hackers in China to infiltrate US company networks and steal valuable data concerning military technology. The C... Read more

Source: www.zdnet.com

Top found tags: United States(2),Department of Justice(3),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Endpoint security myths and why they persistLocation: Microsoft HQ - Redmond, United States
Date published: 14-07-2014

In this interview, Roman Foeckl, CEO of CoSoSys, illustrates the most prominent endpoint security myths and explains why they persist. Furthermore, he talks about the hurdles with protecting endpoint clients in the enterprise and offers advice on what organizations can do in order to stay ahead of t... Read more

Source: net-security.org

Top found tags: trojan(2),cybercrime(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FTC sues Amazon, China bickers with Apple, and MS looks into right-to-be-forgotten [Government IT Week]Location: Sydney, Australia
Date published: 14-07-2014

spending too much time in the sun, and having way too much fun! But we're back in full form, this week celebrating our independence from all things World Cup. Congrats to the winners! ZDNet's worldwide team provides global 24/7 technology news and analysis. In addition to my own coverage analysis he... Read more

Source: www.zdnet.com

Top found tags: cyber security(6),government(7),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The need for resilienceLocation: Norman, United States
Date published: 14-07-2014

The ability to detect and respond when your security is breached are of paramount importance in ensuring organisational resilience says Alan Calder. The need for resilience The need for resilience In the early 13^th Century, the besieged Chteau Gaillard fell to King Philip of France when a soldier... Read more

Source: www.scmagazineuk.com

Top found tags: information security(2),vulnerability(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

New Doctor Who episode leaks online as proper trailer debutsLocation: Miami, United States
Date published: 13-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines The mess at BBC Worldwide's Miami office that saw scripts for the new series of Doctor Who leak online has worsened, with a whole episode now doing the rounds of torrent sites. Radio Times reports that a rough black and white edit of t... Read more

Source: go.theregister.com

Top found tags: EN(1),Linux(1),report(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Portable LibreSSL appears as project inches towards prime timeLocation: New York, United States
Date published: 14-07-2014

The release of LibreSSL's 2.0.x series is the first to officially support running on operating systems other than OpenBSD, with "various versions" of Linux, Solaris, Mac OS X, and FreeBSD now supported. "This is intended as an initial release to allow the community to start using and providing feedb... Read more

Source: www.zdnet.com

Top found tags: patch(2),update(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apache patch: Cisco catches up with ANCIENT Struts2 vulnLocation: Cisco HQ - San Jose, United States
Date published: 14-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Cisco has issued a patch for a four-year-old Apache Struts2 vulnerability. The original issue, CVE-2010-1870, was originally reported in July 2010. The vulnerability arises out of how Apache Struts2 handles commands passed to the Object-Grap... Read more

Source: go.theregister.com

Top found tags: patch(1),report(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
We SO DO support Java on XP, maybe even JDK 8, says OracleLocation: Microsoft HQ - Redmond, United States
Date published: 14-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Oracle has issued a statement saying that it absolutely does support Java on Windows XP and may even decide to support JDK 8 on the orphan OS. Oracle's post on the issue says "We expect all versions of Java that were supported prior to the M... Read more

Source: go.theregister.com

Top found tags: patch(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Raspberry Pi B+ adds connectivity and power featuresLocation: New York, United States
Date published: 14-07-2014

Launched today, the new Raspberry Pi B+ board, which marks the first significant change to the credit card-sized computer, is available immediately. Priced at $35, the new board offers more sensors and accessories than ever before, enabling users to build bigger and better projects. Advanced power m... Read more

Source: net-security.org

Top found tags: credit card(2),financial sector(2),Raspberry Pi(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kit: Essentials of virtualizationLocation: IBM HQ - Armonk, United States
Date published: 14-07-2014

The Essentials of Virtualization, brings together the latest in information, coverage of important developments, and expert commentary to help with your virtualization related decisions. The following kit contents will help you get the most out of your virtualization research: Propel Your Partne... Read more

Source: net-security.org

Top found tags: EN(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI: We found US MILITARY AIRCRAFT INTEL during raid on alleged Chinese hackerLocation: Beijing, China
Date published: 14-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines A Chinese entrepreneur has been arrested for attempting to steal information on the United States' Lockheed F-22 and F-35 aircraft and Boeing's C-17 cargo plane. Su Bin along with two uncharged Chinese co-conspirators is alleged to h... Read more

Source: go.theregister.com

Top found tags: airport sector(2),China(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Large Oracle update to fix over 100 vulnerabilitiesLocation: Oracle - Redwood City, United States
Date published: 14-07-2014

Must See Gallery 12 ways to improve Android battery life 12 ways to improve Android battery life Among the major products patched are Oracle Database Server, Oracle Fusion Middleware (29 vulnerabilities), Oracle Hyperion (seven vulnerabilities), Oracle E-Business Suite (five vulnerabilities), Oracle... Read more

Source: www.zdnet.com

Top found tags: Windows(1),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Keyloggers found at hotel business centers, US Secret Service warnsLocation: Cyber Crime Investigation Cell - Mumbai, India
Date published: 14-07-2014

In the wake of the arrest of a group of people suspected of having compromised computers in hotel business centers in Texas, the US Secret Service and the DHS s National Cybersecurity and Communications Integration Center (NCCIC) have sent out an advisory to hospitality industry firms urging them to... Read more

Source: net-security.org

Top found tags: credit card(2),DHS(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Heuristic Scanning and Sandbox Protection: Best of Both WorldsLocation: Trend Micro - Cupertino, United States
Date published: 14-07-2014

We have been dealing with targeted attacks and know that there is no single technology that can practicably defend an organizations network against these high-impact campaigns. This is sad, true, but it does mean there are ways to harness security technologies like sandboxing and heuristic scanni... Read more

Source: trendmicro.com

Top found tags: vulnerability(1),Trend Micro(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government appoints Dr Ros Altmann as Business Champion for Older WorkersLocation: Webb, United States
Date published: 14-07-2014

Government appoints Dr Ros Altmann as Business Champion for Older Workers. Dr Ros Altmann CBE, the economist, pensions and investment expert, has just been appointed as the government's new Business Champion for Older Workers. Altman, the former Director General of Saga, will be given the task of pu... Read more

Source: itproportal.com

Top found tags: EN(1),United Kingdom(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oracle elaborates on end of Windows XP support for JavaLocation: Microsoft HQ - Redmond, United States
Date published: 14-07-2014

Windows XP systems. Windows XP: The end The blog is in response to our article and those of others referring to a low-key announcement by Oracle of the end of support for Java on Windows XP. Stahl first dismisses any claims that "Java no longer works on Windows XP" or "Oracle will stop Java updates ... Read more

Source: www.zdnet.com

Top found tags: report(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
First Version of LibreSSL DebutsLocation: New York, United States
Date published: 14-07-2014

After months of code cleanup and rewriting, the OpenBSD Foundation this weekend sent LibreSSL out the door. The slimmed down OpenSSL fork works on a number of platforms beyond OpenBSD, including several Linux flavors, Solaris, Mac OS X and Free BSD. I firmly believe that LibreSSL is in a better s... Read more

Source: threatpost.com

Top found tags: vulnerability(1),OpenSSL(2),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
About 20K impacted in South Carolina college laptop theftLocation: South Carolina, United States
Date published: 14-07-2014

Orangeburg-Calhoun Technical College in South Carolina is notifying roughly 20,000 current and former students and faculty that their personal information including Social Security numbers was on a laptop that was stolen from a staffer's office. How many victims? About 20,000. What type of p... Read more

Source: www.scmagazine.com

Top found tags: EN(1),website(1),education(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Here's the only safe way to use public PCsLocation: Microsoft HQ - Redmond, United States
Date published: 14-07-2014

computer is not available for some reason. Unfortunately, these computers are often cesspools of criminal spyware, as the Secret Service just warned. The warning and an article about it by Brian Krebs provide some good explanation of the problem, but I believe they don't go far enough in telling you... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),malware(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Outside Panel Finds Over-Reliance on NSA Advice Led to Dual EC ProblemsLocation: National Institute of Standards - Gaithersburg, United States
Date published: 14-07-2014

A group of outside experts found that the process that led to the inclusion of the weakenedDual EC_DRBG random number generator in a NIST standard was flawed and there were several failures along the way that led to its approval. The committee alsorecommended that the National Institute of Stand... Read more

Source: threatpost.com

Top found tags: telecom sector(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oracle Clarifies XP Support Ahead of Quarterly PatchesLocation: Oracle - Redwood City, United States
Date published: 14-07-2014

Never one to skimp on patches, Oracle is expected to release 113 of them tomorrow as part of its quarterly Critical Patch Update. The company also clarified that Java 7 versions will continue to work on the end-of-life Microsoft Windows XP platform and Oracle security updates for Java on XP machines... Read more

Source: threatpost.com

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security Startups: Meet With Execs from Microsoft, BAE, Cognizant, Huawei USA, and the Intelligence CommunityLocation: Microsoft HQ - Redmond, United States
Date published: 14-07-2014

Security Startup Speed Lunch DC We have room for six more cyber security startups to join Washington, D.C. speed lunch, however registrations will close by end-of-day July 15, 2015. If you're a cyber security startup, chances are good that you may have a product or service of interest to the U.S. go... Read more

Source: securityweek.com

Top found tags: telecom sector(4),government(5),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Introduction to Smart MetersLocation: Helsinki, Finland
Date published: 14-07-2014

While wearable personal technology may be the most public face of the Internet of Everything, the most widespread use of it may be in smart meters. What is a smart meter, exactly?Its a meter for utilities (electricity, gas, or water) that records the consumption of the utility in question... Read more

Source: trendmicro.com

Top found tags: The Netherlands(2),United Kingdom(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Plasterk: burger speelt belangrijke rol bij aanpak ID-fraudeLocation: Ministry of the Interior and Kingdom Relations - Den Haag, The Netherlands
Date published: 14-07-2014

Naast overheid en bedrijfsleven spelen ook burgers een belangrijk rol bij de aanpak van identiteitsfraude, zo stelt minister Plasterk van Binnenlandse Zaken, die tevens twee nieuwe in ontwikkeling zijnde online toepassingen heeft aangekondigd om ID-fraude tegen te gaan. Plasterk stuurde een brief na... Read more

Source: www.security.nl

Top found tags: government(6),Ministry of the Interior and Kingdom Relations(7),The Netherlands(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Criminelen adverteren Kronos-malware voor internetbankierenLocation: Amsterdam, The Netherlands
Date published: 14-07-2014

Op een forum voor cybercriminelen hebben onderzoekers een advertentie van de Kronos-malware ontdekt, die zich specifiek richt op het aanvallen van internetbankieren. Het is echter onbekend of de malware ook daadwerkelijk bestaat, aangezien alle informatie van n advertentie afkomstig is. Volgens ... Read more

Source: www.security.nl

Top found tags: trojan(2),cybercrime(5),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Nederlandse bedrijven moeten cyberrisicoprofiel opstellen"Location: Amsterdam, The Netherlands
Date published: 14-07-2014

Onlangs presenteerde het Nationaal Cyber Security Centrum de vierde editie van het Cyber Security Beeld Nederland, waaruit blijkt dat digitale spionage en cybercrime de grote cyberdreigingen zijn. Er wordt organisaties in het rapport niet verteld wat ze moeten doen om zich hier tegen te beschermen. ... Read more

Source: www.security.nl

Top found tags: report(1),cybercrime(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Groot-Brittanni gaat in cyberoorlog en surveillance investerenLocation: London,United Kingdom
Date published: 14-07-2014

De Britse overheid zal de komende jaren 1,1 miljard pond in de strijdkrachten investeren, waarbij het ook geld voor cyberoorlog en surveillance opzij zet. Dat schrijft de Britse premier David Cameron in een artikel in de Britse krant The Telegraph. Volgens Cameron is het dreigingslandschap de afgelo... Read more

Source: www.security.nl

Top found tags: cybercrime(2),government(3),United Kingdom(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Chrome-gebruikers negeren malware-waarschuwing browserLocation: Google HQ - Mountain View, United States
Date published: 14-07-2014

Gebruikers van Google Chrome blijken regelmatig de waarschuwing van de browser te negeren die verschijnt als een website malware bevat. Daarbij is de kans dat gebruikers toch doorklikken om de site te bezoeken, ook al weten ze dat die malware bevat, twee keer zo groot is als het een bekende site is.... Read more

Source: www.security.nl

Top found tags: cyber security(2),Google(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Campagne steelt al vijf jaar wachtwoorden via keyloggersLocation: Amsterdam, The Netherlands
Date published: 14-07-2014

Al zeker vijf is er een aanvalscampagne genaamd NightHunter actief waarbij verschillende soorten keyloggers worden ingezet om wachtwoorden voor onder andere Google, Yahoo, Facebook, Dropbox, Amazon, LinkedIn en Skype te stelen, zo meldt een Amerikaans beveiligingsbedrijf. Energiebedrijven, onderwijs... Read more

Source: www.security.nl

Top found tags: social engineering(2),telecom sector(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google worstelt met verwijderen zoekresultatenLocation: Google HQ - Mountain View, United States
Date published: 14-07-2014

Google worstelt met het verwijderen van zoekresultaten van EU-burgers, waar het sinds een uitspraak van het Europees Hof aan moet voldoen. In mei oordeelde het Hof dat Google links naar personen moet verwijderen die "ongepast, irrelevant, niet langer relevant of buitensporig" zijn. De zoekgigant pub... Read more

Source: www.security.nl

Top found tags: EU(1),Google(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Secret Service waarschuwt voor keylogger op hotelcomputersLocation: Amsterdam, The Netherlands
Date published: 14-07-2014

De Amerikaanse Secret Service heeft een waarschuwing afgegeven voor keyloggers die op hotelcomputers zijn aangetroffen en vertrouwelijke data kunnen stelen. Onlangs arresteerde de Secret Service verschillende verdachten die computers bij hotels met deze vorm van malware hadden besmet. De verdachten ... Read more

Source: www.security.nl

Top found tags: online banking(2),financial sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Reizigers in hotels bestolen door keyloggersLocation: Amsterdam, The Netherlands
Date published: 14-07-2014

Publieke wifi zonder VPN is onverstandig, maar zomaar een publieke computer gebruiken voor meer dan alleen surfen is echt vragen om problemen. Dat blijkt eens te meer uit verschillende incidenten waarbij hotel-pc's door criminelen waren voorzien van malware, zoals keyloggers. Hierdoor kregen ze bank... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),wireless(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overheid wil NL-Alert in september volgend jaar laten werken via 4gLocation: New York, United States
Date published: 14-07-2014

Het mobiele alarmsysteem NL-Alert moet vanaf september volgend jaar werken op 4g. Tot nu toe werkt het systeem alleen op 2g en 3g. Bovendien moet het systeem in minstens 95 procent van de gevallen werken en binnen drie minuten een bericht doorgeven. NL-AlertDe deadline van september 2015 is nog niet... Read more

Source: tweakers.net

Top found tags: SMS(1),government(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Opstelten reageert op Kamervragen over iTunes-lekLocation: Ministry of Security and Justice - Den Haag, The Netherlands
Date published: 14-07-2014

Minister Opstelten van Veiligheid en Justitie heeft eindelijk gereageerd op Kamervragen over een beveiligingslek in iTunes waardoor het mogelijk zou zijn om wachtwoorden van gebruikers te stelen. Het probleem werd in mei openbaar gemaakt en ontstaat doordat iTunes de servercertificaten niet controle... Read more

Source: www.security.nl

Top found tags: backdoor(2),vulnerability(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Duitsland overweegt typemachine tegen spionageLocation: Berlin, Germany
Date published: 14-07-2014

De Duitse commissie die de spionagepraktijken van de Amerikaanse geheime dienst NSA onderzoekt heeft laten weten dat ook het gebruik van ouderwetse typemachines om spionage tegen te gaan niet wordt uitgesloten. Dat liet commissievoorzitter Patrick Sensburg vanochtend op de ARD weten. Sensburg reagee... Read more

Source: www.security.nl

Top found tags: government(4),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Inbraak op verschillende servers CNET.comLocation: Amsterdam, The Netherlands
Date published: 14-07-2014

Een aanvaller is er dit weekend in geslaagd om toegang tot verschillende servers van CNET.com te krijgen, n van de grootste technologiesites op internet. De aanvaller plaatste een afbeelding op Twitter waaruit bleek dat hij toegang tot de servers had, wat ook later door een woordvoerder werd bev... Read more

Source: www.security.nl

Top found tags: NL(1),Twitter(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oracle gaat 113 lekken patchen, waarvan 20 in JavaLocation: Oracle - Redwood City, United States
Date published: 14-07-2014

Oracle zal morgen tijdens de geplande patchdinsdag van 15 juli tal van beveiligingsupdates uitbrengen, die bij elkaar 113 lekken in honderden producten verhelpen. 20 van de kwetsbaarheden bevinden zich in Java en kunnen een aanvaller volledige controle over de computer geven, zo heeft het bedrijf la... Read more

Source: www.security.nl

Top found tags: update(1),vulnerability(1),patch(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oracle blijft Java op Windows XP tot april 2015 patchenLocation: Oracle - Redwood City, United States
Date published: 14-07-2014

Oracle zal gebruikers van Java 7 op Windows XP zeker tot april 2015 van beveiligingsupdates blijven voorzien, zo heeft het bedrijf naar aanleiding van berichten op internet laten weten. Sinds Microsoft de ondersteuning van XP staakte, wordt ook Java niet meer officieel door Oracle op XP ondersteund.... Read more

Source: www.security.nl

Top found tags: Windows(1),Microsoft(2),patch(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Canada waarschuwt patinten na inbraak op medicatiesysteemLocation: Amsterdam, The Netherlands
Date published: 14-07-2014

Het Ministerie van Gezondheid van de Canadese provincie British Columbia heeft 1600 patinten gewaarschuwd dat hun gegevens zijn opgevraagd door een aanvaller die wist in te breken op een centraal medicatiesysteem. Het ging om PharmaNet, dat de recepten van alle apotheken in de provincie bijhoudt. ... Read more

Source: www.security.nl

Top found tags: Canada(1),NL(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid verholpen in Cisco Adaptive Security Appliance (ASA)Location: Cisco HQ - San Jose, United States
Date published: 14-07-2014

Samenvatting: Cisco heeft een kwetsbaarheid in Cisco Adaptive Security Appliance (ASA) Software verholpen. Gevolgen: Door deze kwetsbaarheid te misbruiken kan een kwaadwillende een Denial-of-Service veroorzaken. Beschrijving: In de functie voor het opvragen van de lijst van beschikbare shares van ee... Read more

Source: www.ncsc.nl

Top found tags: NL(1),vulnerability(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in libxml verholpenLocation: Ubuntu - London, United Kingdom
Date published: 14-07-2014

Samenvatting: De makers van libxml hebben updates uitgebracht om een Denial-of-Service kwetsbaarheid te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: Een kwaadwillende kan op afstand de kwetsbaarheid misbruiken door een ... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in PolarSSL verholpenLocation: Amsterdam, The Netherlands
Date published: 14-07-2014

Samenvatting: Er is een kwetsbaarheid in PolarSSL verholpen die een aanvaller kan misbruiken om een Denial of Service-aanval uit te voeren. Gevolgen: Een aanvaller kan de kwetsbaarheden misbruiken om een Denial of Service-aanval uit te voeren. Beschrijving: Er is een kwetsbaarheid in PolarSSL ontdek... Read more

Source: www.ncsc.nl

Top found tags: NL(1),report(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in PHPLocation: Hewlett-Packard - Palo Alto, United States
Date published: 14-07-2014

Samenvatting: De makers van PHP hebben updates uitgebracht voor PHP5 die de kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan op afstand toegang verkrijgen tot gevoelige gegevens en kan mogelijk willekeurige code uitvoeren met de rechten van het PHP proces. Beschrijving: - CVE-2014-0207, CVE... Read more

Source: www.ncsc.nl

Top found tags: Ubuntu(1),The Netherlands(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish