Under construction

New design coming soon!

CIC News engine statistics

CIC News for 15-07-2014 contains 103 articles: cybercrime(27),cyber security(43),data breach(7),other(26)

CIC News update contains 82 English and 21 Dutch articles for today.
There are 3 published advisories, 0 are English and 3 are Dutch.
In today's English news articles:
- 18 related to cybercrime
- 42 related to cyber security
- 7 related to data breach and identity theft
- 15 for the category other news

In today's Dutch news articles:
- 9 related to cybercrime
- 1 related to cyber security
- 11 for the category other news

Have fun reading.

English cybercrime related news

Chinese aerospace exec arrested in connection with Boeing hackLocation: Beijing, China
Date published: 14-07-2014

milbul. Chinese aerospace exec arrested in connection with Boeing hack Chinese aerospace executive Su Bin is being held in custody in Canada on suspicion of hacking into the private data of global organizations holding military and defense contracts. It is believed Bin targeted companies holding inf... Read more

Source: itproportal.com

Top found tags: threat(1),United States(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Five Year Old Phishing Campaign UnveiledLocation: Google HQ - Mountain View, United States
Date published: 14-07-2014

Details have been disclosed on a five-year-old phishing campaign where in attackers have pilfered victims login credentials from Google, Yahoo, Facebook, Dropbox and Skype. Dubbed NightHunter by researchers at the security firm Cyphort, the campaign is ongoing but has previouslytargeted log-ins... Read more

Source: threatpost.com

Top found tags: e-mail(2),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese man charged with hack of Boeing, Lockheed Martin aircraft dataLocation: Martin, United States
Date published: 14-07-2014

Experts say the settlement serves as a small win for plaintiffs, and a bigger one for plaintiffs. Stephen Su is accused of accessing U.S. firms' systems, including defense contractors Boeing and Lockheed Martin. A Chinese man, who operated an aviation tech firm with Canadian operations, has been cha... Read more

Source: www.scmagazine.com

Top found tags: China(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cryptolocker neutralized, says Justice DepartmentLocation: New York, United States
Date published: 14-07-2014

A status report filed by the Justice Department on Friday indicates that the Cryptolocker threat has been neutralized. Cryptolocker, ransomware that extorted more than $27 million from its victims in nine months of existence, can no longer communicate with the infrastructure used to control the malw... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),trojan(2),malware(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man pleads guilty to bank fraud, 48-hour global operation netted $14 millionLocation: Chase, United States
Date published: 14-07-2014

Syrian hacktivists target Sky News' Google Play website, Twitter help account Qendrim Dobruna hacked into JPMorgan Chase as part of a scheme that impacted the American Red Cross. A 27-year-old man arrested in Germany and extradited to the United States in 2012 pleaded guilty to bank fraud on... Read more

Source: www.scmagazine.com

Top found tags: Department of Justice(3),United States(4),financial sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Will GCHQ furtle this El Reg readers' poll? Team Snowden suggests: YesLocation: GCHQ - Cheltenham, United Kingdom
Date published: 14-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Poll UK eavesdropping nerve center GCHQ has developed tools to manipulate online polls, ramp up page views for articles, and obtain private photos on Facebook. That's according to Glenn Greenwald's latest trawling of documents leaked by Edwa... Read more

Source: go.theregister.com

Top found tags: government(3),telecom sector(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers are nobbling hotel cyber-cafe, er, business centers US Secret ServiceLocation: Microsoft HQ - Redmond, United States
Date published: 14-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines The US Secret Service has quietly warned hotels that malware slingers are increasingly targeting PCs in hotel business centers to harvest sensitive information. In a non-public advisory, obtained by investigative journalist Brian Krebs, law ... Read more

Source: go.theregister.com

Top found tags: Windows(1),credit card(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Soraya: the Worst of Both WorldsLocation: New York, United States
Date published: 14-07-2014

This whitepaper is the first of a series of FortiGuard Technical Analyses that go in-depth into the inner workings of malware. In this paper we take a look at the malware known as Soraya. Soraya is unique in that it combines the form-grabbing techniques seen in the ubiquitous Zeus and the memory-par... Read more

Source: blog.fortinet.com

Top found tags: Zeus(1),malware(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBook: Linux Patch ManagementLocation: New York, United States
Date published: 15-07-2014

Linux Patch Management offers Linux professionals start-to-finish solutions, strategies, and examples for every environment, from single computers to enterprise-class networks. Michael Jang presents patching solutions for Red Hat, Fedora, SUSE, Debian, and other distributions. He systematically cove... Read more

Source: net-security.org

Top found tags: Fedora(1),Linux(1),patch(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GCHQ's dark arts: Leaked documents reveal online manipulation, Facebook, YouTube snoopingLocation: Microsoft HQ - Redmond, United States
Date published: 15-07-2014

GCHQ has developed a toolkit of software programs used to manipulate online traffic, infiltrate user computers and spread select messages across social media sites including Facebook and YouTube. The UK spy agency's dark arts were revealed in documents first published by The Intercept, and each piec... Read more

Source: www.zdnet.com

Top found tags: telecom sector(2),social media(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Havex, Meet OPC ServerLocation: F-Secure - Helsinki, Finland
Date published: 15-07-2014

Following a post by F-Secure this June, bringing to light a variant of the Havex malware family targetting ICS/SCADA systems, there has been much speculation regarding the motives behind this malware campaign. That makes it only the second known malware family directly targeting SCADA equipment, aft... Read more

Source: blog.fortinet.com

Top found tags: cybercrime(2),trojan(2),critical infrastructure(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google on Quest to Hire Elite Zero-Day HackersLocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

Google has long had a team of dedicated security researchers looking for security weaknesses in its own products and occasionally other popular software used widely across the Internet, but the company has announced a new initiative in an effort to make the Internet more secure for all. On Tuesday G... Read more

Source: securityweek.com

Top found tags: research(1),vulnerability(1),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A10 Networks Adds DDoS Protection to Product Line, Launches SPE ApplianceLocation: Corero Network Security - Hudson, United States
Date published: 15-07-2014

A10 Networks Thunder SPE Appliance Photo Application networking solutions provider A10 Networks has added distributed denial-of-service (DDoS) protection to its Thunder CGN (Carrier Grade Networking) products, and has introduced a new product family that leverages the company's Security and Policy E... Read more

Source: securityweek.com

Top found tags: DoS(2),telecom sector(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pitty Tiger APT exploits older version Office flawsLocation: Microsoft HQ - Redmond, United States
Date published: 15-07-2014

The Pitty Tiger APT has been targeting telcos, defence companies and at least one government in a cyber-espionage campaign that relies on spear phishing and malware prying on vulnerabilities in Microsoft Office. Pitty Tiger APT exploits older version Office flaws Pitty Tiger APT exploits older versi... Read more

Source: www.scmagazineuk.com

Top found tags: phishing(3),cybercrime(9),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SSL Black List Aims to Publicize Certificates Associated With MalwareLocation: Bern, Switzerland
Date published: 15-07-2014

Malware and botnet operators are always adapting their tactics, trying to stay a step or two ahead of defensive technologies and techniques. One of the methods many attackers have adopted is using SSL to communicate with the infected machines they control, and a researcher has started a new initiati... Read more

Source: threatpost.com

Top found tags: trojan(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A Look At Repackaged Apps and its Effects in the Mobile Threat LandscapeLocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

Repackaged applications, which are a category of fake applications, play a crucial role in the proliferation of mobile malware. Like fake apps, repackaged apps use social engineering tactics, displaying similar user interface (UI), icon, package names and app labels as the legitimate/official versio... Read more

Source: trendmicro.com

Top found tags: trojan(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Most Toxic Superhero 2014Location: McAfee - Santa Clara, United States
Date published: 15-07-2014

Its a bird! Its a plane! Its Superman! Yes, this superhero might be the epitome of courage, justice, and strength, but he might also be the biggest threat to you online. Weve entered a new age of superheroes. No longer are they just pictures in a comic book. They are now accessible on co... Read more

Source: blogs.mcafee.com

Top found tags: social media(2),telecom sector(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

The Surprisingly Simple Google Maps Attack That Shut Down a BusinessLocation: Google HQ - Mountain View, United States
Date published: 14-07-2014

Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need to do to pull out a mapa digital map. WIRED has an excellent profile on a type of cyber attack that takes advantage of a services social aspects in an effort to divert, damage... Read more

Source: blogs.mcafee.com

Top found tags: social engineering(2),cybercrime(5),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CISOs still grappling with security awareness trainingLocation: Londen, United Kingdom
Date published: 14-07-2014

A study of some of the UK's top chief information security officers (CISOs) has revealed that just 21 percent are conducting security awareness training on a regular basis. CISOs still grappling with security awareness training CISOs still grappling with security awareness training In the ClubCISO R... Read more

Source: www.scmagazineuk.com

Top found tags: information security(2),cyber security(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pay-as-You-Go Security With AWSLocation: Fortinet - Sunnyvale, United States
Date published: 14-07-2014

Just a few short months ago, Fortinet had a major milestone for public cloud computing with the release of our flagship FortiGate security solution on Amazon Web Services environments. Security and privacy continue to be a top issues, if not the #1 concern, for enterprises looking to move servers an... Read more

Source: blog.fortinet.com

Top found tags: trend(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Severe password manager attacks steal digital keys and data en masseLocation: New York, United States
Date published: 14-07-2014

manager to ease the password fatigue that comes from choosing and securing dozens of hard-to-guess passcodes that are unique to each site or service. A research paper scheduled to be presented at a security conference next month underscores the hidden dangers ofselectingthe wrong products. The r... Read more

Source: arstechnica.com

Top found tags: website(2),vulnerability(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to Reduce Use-After-Free Memory RiskLocation: Microsoft HQ - Redmond, United States
Date published: 14-07-2014

Look at any recent security update from Microsoft, Google or Mozilla and you will find use-after-free memory errors. These vulnerabilities enable attackers to take advantage of allocated memory after it has already been used. Attackers can potentially leverage that memory space to execute arbitrary ... Read more

Source: www.esecurityplanet.com

Top found tags: update(2),vulnerability(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fraudsters market new malware Kronos on undergroundLocation: Trusteer - Boston, United States
Date published: 14-07-2014

Researchers have identified a new "watering hole" APT attack. Trusteer warns that the financial malware was first advertised last week on a major underground forum. New malware called Kronos could soon make an appearance on victims' machines now that the threat is being advertised on the black... Read more

Source: www.scmagazine.com

Top found tags: trojan(2),cybercrime(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google external experts to tour Europe, explain right to be forgottenLocation: Google HQ - Mountain View, United States
Date published: 14-07-2014

Google and its band of external advisors will launch a tour of Europe this fall to discuss the right to be forgotten ruling by the Court of Justice of the European Union (CJEU) and what Google is doing to comply. In May, Europe's high court ruled that Google must allow search engine users to delete ... Read more

Source: www.scmagazine.com

Top found tags: privacy(1),cyber security(2),EU(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beware of infected hotel PCs stealing guests passwords, feds warnLocation: Microsoft HQ - Redmond, United States
Date published: 15-07-2014

malware that steals passwords and other sensitive data from guests using PCs in business centers, according to a published report. The non-public advisory was issued on last Thursday, KrebsOnSecurity reporter Brian Krebs reported Monday. Krebs said the notice warned that authorities recently arreste... Read more

Source: arstechnica.com

Top found tags: OS X(2),telecom sector(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CNET attacked by Russian hacker groupLocation: Bank of America HQ - Charlotte, United States
Date published: 15-07-2014

Seth Rosenblatt/CNET A Russian hacker group that has attacked some of the biggest news and business sites in the world claims it penetrated CNET's website over the weekend and stole a database of registered reader data. A representative from the group calling itself W0rm told CNET News in a Twitter ... Read more

Source: cnet.com.ortal.com

Top found tags: social media(2),United States(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overarching technology strategy needed: Murray financial inquiryLocation: Murray, United States
Date published: 15-07-2014

impact technology has had on the financial system, which has presented both opportunities and risks. The Murray Inquiry was established by Treasurer Joe Hockey, and it is expected to layout a "blueprint" for the financial system over the next decade. It is the first review since the Wallis Report in... Read more

Source: www.zdnet.com

Top found tags: financial sector(2),government(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amazon-hosted malware triples in 6 monthsLocation: GoDaddy HQ - Scottsdale, United States
Date published: 15-07-2014

Solutionary analyzed the threat landscape and identified the top 10 global ISPs and hosting providers that hosted malware out of more than 21,000 ISPs. Amazon remained the top malware-hosting ISP and saw an increase of approximately 250 percent, while Q4 13 s second-most afflicted ISP, GoDaddy, fell... Read more

Source: net-security.org

Top found tags: United Kingdom(2),exploit kit(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Flaw in Google's Dropcam sees it turned into SPYCAMLocation: Ward, United States
Date published: 15-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Hackers could inject fake video into popular home surveillance kit Dropcam and use the system to attack networks, researchers Patrick Wardle and Colby Moore say. The wide-ranging attacks were tempered by the need for attackers to have physic... Read more

Source: go.theregister.com

Top found tags: OpenSSL(2),OS X(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden emails withheld due to US govt concerns about 'invasion of personal privacy'Location: National Security Agency - Fort Meade, United States
Date published: 15-07-2014

contractor, Edward Snowden, during his time with the agency, "could cause an unwarranted invasion of persdonal private", according to a report on The Desk website. A letter dated 1 July by chief FOIA officer, Pamela Phillips, responding to a FOIA request by Matthew Keys of The Desk, said that: "Reco... Read more

Source: www.zdnet.com

Top found tags: privacy(2),United States(2),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
96% of organizations hit by a security incident in the past yearLocation: New York, United States
Date published: 15-07-2014

A new ForeScout report revealed that more than 96 percent of organizations experienced a significant IT security incident in the past year. The majority of IT organizations are aware that some of their security measures are immature or ineffective, but only 33 percent have high confidence that their... Read more

Source: net-security.org

Top found tags: United Kingdom(4),cyber security(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CIOs should make digital business tech an IT responsibilityLocation: Gartner - Stamford, United States
Date published: 15-07-2014

CIOs need to decide how they will position their IT organization in relation to emerging digital business technologies, such as the Internet of Things, 3D printing, wearable technology and robotics, according to Gartner. The IT organization is used to owning and supporting "back office" and infrastr... Read more

Source: net-security.org

Top found tags: mobile device(2),telecom sector(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NIST releases report on cryptography expertiseLocation: National Institute of Standards - Gaithersburg, United States
Date published: 15-07-2014

NIST's primary external advisory board released a report calling for the agency to increase its staff of cryptography experts and implement more explicit processes for ensuring openness and transparency to strengthen its cryptography efforts. In the fall of 2013, former NIST Director Patrick D. Gall... Read more

Source: net-security.org

Top found tags: security management(2),United States(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
96% suffer significant IT security incidentLocation: Scott, United States
Date published: 15-07-2014

More than 96 percent of organisations experienced a significant IT security incident in the past year. 96% suffer significant IT security incident 96% suffer significant IT security incident Forescout has published a report entitled: The state of IT cyber defence maturity' on the growing need for cy... Read more

Source: www.scmagazineuk.com

Top found tags: security management(2),security measures(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Are iPhones a security threat? Apple rejects Chinese claimsLocation: Apple HQ - Cupertino, United States
Date published: 15-07-2014

Are iPhones a security threat? Apple rejects Chinese claims. In a carefully and respectfully worded post on Apples Chinese website the company denied claims made on Chinese television that iPhones were a concern to national security. The post stated that Apple appreciates the television sta... Read more

Source: itproportal.com

Top found tags: United States(2),government(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Your money or your website!" Russian hacker group ransoms CNET for BitcoinsLocation: Bank of America HQ - Charlotte, United States
Date published: 15-07-2014

AlysiaJudge. "Your money or your website!" Russian hacker group ransoms CNET for Bitcoins Technology news website CNET has fallen prey to an attack by the Russian hacker group w0rm who attempted to ransom the personal data of more than one million users. The cybercriminals managed to steal usernames... Read more

Source: itproportal.com

Top found tags: social media(2),cybercrime(5),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Father of Zeus' banking trojan appears at very reasonable priceLocation: Trusteer - Boston, United States
Date published: 15-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines A banking trojan dubbed the father of the infamous Zeus malware is being flogged on cybercrime marketplaces for a pricey $7000, says fraud specialist Etay Maor. The Kronos malware was sold on a cybercrime forum, pitched particularly to Zeus ... Read more

Source: go.theregister.com

Top found tags: telecom sector(4),cybercrime(6),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meet Project Zero, Googles Secret Team of Bug-Hunting HackersLocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

George Hotz. Hacking wunderkind George Hotzs latest gig: An intern on Googles elite hacking team. [gallery-ca] Tribune Review, Andrew Russell/AP When 17-year-old George Hotz became the worlds first hacker to crack AT&Ts lock on the iPhone in 2007, the companies officially ignored him whi... Read more

Source: wired.com

Top found tags: telecom sector(4),United States(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CNET attacked by Russian hackers, user database stolenLocation: Bank of America HQ - Charlotte, United States
Date published: 15-07-2014

Russian hacker group W0rm has apparently managed to breach servers belonging to media website CNET, and make off with databases containing usernames, emails, and encrypted passwords of more than a million registered users. The breach was confirmed by CBS Interactive (CNET's owner) spokeswoman, who s... Read more

Source: net-security.org

Top found tags: cyber security(2),social media(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security Updates for Java 7 Will Work on Windows XP: OracleLocation: Microsoft HQ - Redmond, United States
Date published: 15-07-2014

Oracle has clarified that future security patches for Java 7 will still work on Windows XP, but pointed out that it can no longer provide "complete guarantees" for the software because the operating systems is no longer supported by Microsoft. Microsoft officially stopped providing technical support... Read more

Source: securityweek.com

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fortinet Introduces New Subscription Model for Virtual WAFs for AWSLocation: Fortinet - Sunnyvale, United States
Date published: 15-07-2014

Network security solutions provider Fortinet announced on Monday that it has introduced a new on-demand, pay-as-you-go offering for its FortiWeb-VM Web Application Firewalls (WAFs) for Amazon Web Services (AWS). FortiWeb-VM for AWS, which is designed to help organizations secure their Web applicatio... Read more

Source: securityweek.com

Top found tags: XSS(1),cybercrime(2),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security undermined by companies investing in the wrong areasLocation: New York, United States
Date published: 15-07-2014

Just 33% of companies surveyed has high confidence that their organisations will improve their less mature security controls More than 96% of organisations experienced a significant IT security incident in the past year, according to a new report from network security solutions provider ForeScout Te... Read more

Source: www.information-age.com

Top found tags: United Kingdom(4),cyber security(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Smart' technology could make utilities more vulnerable to hackersLocation: Department of Energy - Washington, United States
Date published: 15-07-2014

FRANKFURT (Reuters) - Last November, Felix Lindner came very close to shutting down the power supply of Ettlingen, a town of almost 40,000 people in the south of Germany. "We could have switched off everything: power, water, gas," Lindner, head of Berlin-based Recurity Labs, an IT security company, ... Read more

Source: reuters.com

Top found tags: government(5),cybercrime(6),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Kronos Banking Malware Advertised On Russian ForumsLocation: Trusteer - Boston, United States
Date published: 15-07-2014

Criminals are advertising a new banking Trojan on Russian forums, one going for a hefty price and being marketed as a methodof evading detection and analysis. To date, however, security researchers have yet to obtain a sample of Kronos, which is available on a few forums for pre-order at a cost of... Read more

Source: threatpost.com

Top found tags: trojan(2),cybercrime(6),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Project Zero May Prove a Big Win for SecurityLocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

Billions of peoplenot to mention a decent portion of the worlds economiesdepend upon the Internet in a way that is both amazing and terrifying. We rely on the network in a way that perhaps we have never relied on anything in the course of human history. The Internet is a wonderful resource,... Read more

Source: threatpost.com

Top found tags: Google(2),telecom sector(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PittyTiger APT group sells its services to companiesLocation: Beijing, China
Date published: 15-07-2014

APT attackers thought to be operating from China often seem financed by the government, but there are other groups that work for the highest bidder, which is usually a private sector company looking for information that will squash their competition. One such group is Pitty Tiger, so named by securi... Read more

Source: net-security.org

Top found tags: telecom sector(4),cybercrime(5),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CNET loses data on 1 million security prosLocation: Bank of America HQ - Charlotte, United States
Date published: 15-07-2014

Security and IT tech website lost data on 1 million users to Russian hackers CNET loses data on 1 million security pros CNET loses data on 1 million security pros CISOs will be alarmed to hear that the CNET technology news website which is aimed at security and other IT professionals - has been ... Read more

Source: www.scmagazineuk.com

Top found tags: social media(2),United Kingdom(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
British data cops: We need greater powers and more moneyLocation: Graham, United States
Date published: 15-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines The UK's data privacy watchdog is lobbying for greater powers and funding after reporting a bumper workload. The latest annual report from the Information Commissioners Office (ICO) (PDF) reveals that the bureau responded to a record numb... Read more

Source: go.theregister.com

Top found tags: cyber security(2),government(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Set to Change Malware, Phishing Warnings Following StudyLocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

In the not too distant future, Google will change the way it displays malware and phishing warnings in its Chrome browser. Instead of a white warning on a red background, the entire page will be red, with a prominent X featured at the top of the display. Both the malware warning and the phishing war... Read more

Source: threatpost.com

Top found tags: Google(2),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google goes to war against zero-daysLocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

Google has announced the launch of Project Zero, a dedicated internal team that will concentrate on finding zero-day vulnerabilities in Google's and third-party software so that they can be patched before malicious actors have a chance of misusing them. "You should be able to use the web without fea... Read more

Source: net-security.org

Top found tags: vulnerability(2),telecom sector(4),0-day(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
1 in 6 Say Their Organization Had At Least 5 Significant Security Incidents in Past Year: SurveyLocation: Scott, United States
Date published: 15-07-2014

A new report from ForeScout Technologies described a challenging world for IT security - one where one in six IT pros say their organization has had five or more significant security incidents in the past year. The research, titled the '2014 Cyber Defense Maturity Report', was conducted by IDG Conne... Read more

Source: securityweek.com

Top found tags: United States(2),cyber security(6),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Continuous Incident ResponseLocation: McAfee - Santa Clara, United States
Date published: 15-07-2014

At last weeks Gartner Risk and Security Management Summit, Anton Chuvakin mentioned that 1-3% of systems are compromised today. He called it a low intensity fire, not a conflagration. This seemed like a great analogy for our challenge with incident response. As a security industryindeed,... Read more

Source: blogs.mcafee.com

Top found tags: cyber security(2),government(2),security management(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian hackers compromise CNET serversLocation: Bank of America HQ - Charlotte, United States
Date published: 15-07-2014

Popular technology news and review site CNET was hacked this weekend in an attack that might have compromised the account information of more than one million users. A Russian group named W0rm accessed the site's servers through its Symfony PHP framework, a programming tool that helps developers cre... Read more

Source: www.scmagazine.com

Top found tags: website(1),cyber security(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
96% of IT companies hit by serious security incident in 2013Location: Berlin, Germany
Date published: 15-07-2014

96% of IT companies hit by serious security incident in 2013. Just a third of IT companies are confident that security solutions will get to a level high enough to provide effective protection for their organisation in the future. Related: Cybersecurity scourge causes 70% of critical infrastructure ... Read more

Source: itproportal.com

Top found tags: mobile device(2),security management(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Almost 70 Percent of Critical Infrastructure Companies Breached in Last 12 Months: SurveyLocation: New York, United States
Date published: 14-07-2014

New research from Unisys and the Ponemon Institute underscores that many critical infrastructure companies remain challenged when it comes to security. According to the survey, nearly 70 percent of the 599 respondents have reported at least one security breach that led to the loss of confidential in... Read more

Source: securityweek.com

Top found tags: telecom sector(4),critical infrastructure(6),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hotel business center computers see uptick in keylogger malwareLocation: New York, United States
Date published: 14-07-2014

Criminals are infecting hotel business center computers with keylogger malware, according to a non-public advisory issued by the U.S. Secret Service on Thursday, and obtained and posted about on Monday by technology journalist Brian Krebs. In a string of recent data breaches investigated by the Secr... Read more

Source: www.scmagazine.com

Top found tags: vulnerability(1),data breach(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Active Directory flaw impacts 95% of Fortune 1000 companiesLocation: New York, United States
Date published: 15-07-2014

[lock-broke]Aorato identified a new threatening flaw within Active Directory that enables attackers to change a victim's password, despite current security and identity theft protection measures. With 95% of Fortune 1000 companies deploying Active Directory, the potential for this particular vulnera... Read more

Source: net-security.org

Top found tags: vulnerability(1),cyber security(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Breaches exposed 22.8 million personal records of New YorkersLocation: New York City, New York, United States
Date published: 15-07-2014

Attorney General Eric T. Schneiderman issued a new report examining the growing number, complexity, and costs of data breaches in the New York State. The report reveals that the number of reported data security breaches in New York more than tripled between 2006 and 2013. In that same period, 22.8 m... Read more

Source: net-security.org

Top found tags: financial sector(4),social media(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LastPass Acknowledges Two Security FlawsLocation: Warren, United States
Date published: 15-07-2014

LastPass recently patched a pair of security flaws in its password management solution. UC Berkeley security researcher Zhiwei Li contacted LastPass in August of 2013 to alert the company to two vulnerabilities related to LastPass bookmarklets and One Time Passwords (OTPs). One issue could be exploi... Read more

Source: www.esecurityplanet.com

Top found tags: Internet Explorer(2),vulnerability(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICO wants more power as privacy complaints hit record levelsLocation: Graham, United States
Date published: 15-07-2014

The UK's data privacy watchdog, the Information Commissioner's Office (ICO), has called on the government to give it more power, better funding and the ability to imprison people as it battles against a record number of data protection complaints. ICO wants more power as privacy complaints hit recor... Read more

Source: www.scmagazineuk.com

Top found tags: legislation(2),United Kingdom(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Active Directory Vulnerability Puts Enterprise Services at RiskLocation: Microsoft HQ - Redmond, United States
Date published: 15-07-2014

A vulnerability in Microsoft's Active Directory service can be exploited by an attacker to change a targeted user's password, Active Directory protection solutions provider Aorato reported. Active Directorys Single Sign On (SSO) authentication uses the NTLM and Kerberos protocols. NTLM generates ... Read more

Source: securityweek.com

Top found tags: cyber security(2),identity theft(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Apple denies storing information on Chinese customersLocation: Apple HQ - Cupertino, United States
Date published: 14-07-2014

Apple is denying allegations that its iPhone location finding service can be used to identify individual phone owners' activity. A Chinese state-owned television broadcaster reported earlier this month that the phones were collecting data that could compromise country secrets, according to Bloomberg... Read more

Source: www.scmagazine.com

Top found tags: government(2),mobile device(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Emergency UK government snooping bill catches UK ISPs off guardLocation: GCHQ - Cheltenham, United Kingdom
Date published: 14-07-2014

Emergency UK government snooping bill catches UK ISPs off guard. UK ISPs have been caught with their trousers down by the new emergency Data Retention and Investigation Powers [DRIP] bill that forces them to hand over even more data to the government. Related: David Cameron: GCHQ snooping k... Read more

Source: itproportal.com

Top found tags: telecom sector(4),United Kingdom(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple blocks outdated Flash plug-ins to ward off Rosetta Flash attacksLocation: Apple HQ - Cupertino, United States
Date published: 14-07-2014

Vulnerabilities have prompted Apple to block outdated versions of Adobe Flash in Safari that can be exploited by the so-called Rosetta Flash tool, according to a security notice released by the company. Adobe recently released Flash Player version 14.0.0.145 to fix the CVE-2014-4671 security vulnera... Read more

Source: www.scmagazine.com

Top found tags: EN(1),exploit (1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Secret App Raises $25 Million, Shifts FocusLocation: Facebook - Menlo Park, United States
Date published: 15-07-2014

WASHINGTON - The fast-growing anonymous mobile app Secret said Monday it had raised $25 million in venture capital and would expand as a social network connecting Facebook friends. A new feature announced by Secret -- which up to now was an anonymous messaging board -- allows users to log in with Fa... Read more

Source: securityweek.com

Top found tags: Anonymous(2),social media(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NIST told to grow a pair and kick NSA to the curb by its oversight boardLocation: National Institute of Standards - Gaithersburg, United States
Date published: 14-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines The US National Institute of Standards and Technology (NIST) has been urged to hire more crypto experts so it can confidently tell the NSA to take a hike. A report (PDF) from NIST's Visiting Committee on Advanced Technology (VCAT) which ... Read more

Source: go.theregister.com

Top found tags: Department of Commerce(3),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CIOs must grasp emerging digital business technologies or face being marginalisedLocation: Gartner - Stamford, United States
Date published: 15-07-2014

pose according to the latest research from the analysts Gartner. For harassed CIOs the problem is simple to explain but difficult to deal with - there is just too much new technology for them to come to terms with. So Gartner has identified six core technology areas that CIOs and IT managers have to... Read more

Source: www.zdnet.com

Top found tags: EN(1),report(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google starts zero-day research groupLocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

According to Chris Evans, "Researcher Herder" at Google, the objective of Project Zero is to reduce the number of people harmed by zero-day attacks. Must-Read: Security proves it Google already has a bug bounty program for its own products. The point of Project Zero is to fund vulnerability research... Read more

Source: www.zdnet.com

Top found tags: research(1),vulnerability(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rackspace ramps up managed cloud services as IaaS competition starts to biteLocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

Rackspace entertains possible takeover suitors Rackspace entertains possible takeover suitors In the face of blistering price competition from Amazon, Microsoft and Google for commodity infrastructure as a service, web-hosting firm Rackspace is tightening its focus on managed cloud services. The San... Read more

Source: www.zdnet.com

Top found tags: ISP(1),Microsoft(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Set phasers to channel-surf with insanely detailed 'Star Trek' remote controlLocation: Scott, United States
Date published: 15-07-2014

Turn it up Scotty: with the "Star Trek: The Original Series" Phaser Universal Remote Control you're in the Captain's seat every time you watch TV. The phaser remote is built by the Wand Company, the people behind the "Harry Potter" wand and "Doctor Who" Sonic Screwdriver remotes that change channels... Read more

Source: cnet.com.ortal.com

Top found tags: gaming(1),ISP(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Former Symantec Chief Enrique Salem Joins Bain Capital VenturesLocation: Salem, United States
Date published: 15-07-2014

Venture capital firm Bain Capital Ventures (BCV), announced on Tuesday that Enrique Salem has joined the firm as a Managing Director based in its Palo Alto office. Salem, who was previously CEO and President of Symantec before being pushed out by the companys board of directors in July 2012, will... Read more

Source: securityweek.com

Top found tags: EN(1),Rapid7(1),Symantec(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK and European SMBs shun cloud backup due to security worriesLocation: Pacific, United States
Date published: 15-07-2014

UK and European SMBs shun cloud backup due to security worries. Small and medium sized businesses [SMBs] in the UK and Western Europe are trailing US companies when it comes to backing up data to the cloud as security worries dog the uptake of cloud computing. Related: Whitepaper: Why cloud backup? ... Read more

Source: itproportal.com

Top found tags: survey(1),Germany(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security Vulnerability Found in Popular WPtouch WordPress PluginLocation: WordPress - San Francisco, United States
Date published: 15-07-2014

A recently discovered vulnerability in WPtouch, a popular plugin that's used to create simple themes for the mobile visitors of WordPress websites, can be leveraged by an attacker to upload PHP files to impacted servers, Sucuri reported on Monday. According to the security firm, an attacker can take... Read more

Source: securityweek.com

Top found tags: website(1),WordPress(1),backdoor(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Teen Hashtags: What Every Parent Ought to KnowLocation: Instagram - Menlo Park, United States
Date published: 15-07-2014

hashtags, teens, suicide, thinspro, anorexia, cyberbullyingHashtags have become a normal part of everyday vernacular thanks to social media. By simply putting a pound (#) sign in front of a word like #OverIt or acronym, such as #tbt (throw back Thursday) social network users especially on Twitter, I... Read more

Source: blogs.mcafee.com

Top found tags: Twitter(1),cyber bullying(2),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Survey: 77 percent of IT staffers have incorrectly reported the cause of a security incidentLocation: New York, United States
Date published: 15-07-2014

Access control has many dimensions Nearly 50 percent of respondents still use manual processes to discover network and application performance issues. When relaying information to executive teams, 77 percent of IT staffers admitted that they incorrectly reported the root cause of a network or securi... Read more

Source: www.scmagazine.com

Top found tags: report(1),survey(1),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NIST drafts report on cloud computing challenges, requests commentsLocation: National Institute of Standards - Gaithersburg, United States
Date published: 15-07-2014

The National Institute of Standards and Technology (NIST) has released a draft report, NIST Cloud Computing Forensic Science Challenges, that summarized 65 cloud computing challenges that forensic investigators face. The report divides the challenges into nine categories, including architecture, dat... Read more

Source: www.scmagazine.com

Top found tags: government(2),NIST(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Nog 200.000 IP-adressen onderdeel Mevade-botnetLocation: Facebook - Menlo Park, United States
Date published: 15-07-2014

Nog altijd 200.000 IP-adressen zijn onderdeel van het Mevade-botnet, dat vorig jaar voor een explosieve groei van het aantal gebruikers van het Tor-anonimiseringsnetwerk zorgde. Mevade, ook bekend als Sefnit, gebruikt besmette computers voor het plegen van clickfraude en het delven van Bitcoins. Vor... Read more

Source: www.security.nl

Top found tags: research(1),financial sector(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lek in Google Dropcam laat aanvallers meekijkenLocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

Onderzoekers hebben lekken in de Dropcam van Google ontdekt waardoor aanvallers live kunnen meekijken, beelden kunnen injecteren of gebruikers in de ruimte via de microfoon kunnen afluisteren. Dropcam is een camera waarmee gebruikers hun woning en leefomgeving op afstand kunnen monitoren. De cameraf... Read more

Source: www.security.nl

Top found tags: OpenSSL(2),vulnerability(2),conference(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hoe aan te melden voor de hervatte beveiligingsmail van MicrosoftLocation: Microsoft HQ - Redmond, United States
Date published: 15-07-2014

Microsoft heeft z'n besluit om te stoppen met het verzenden van mails met beveiligingsadviezen, teruggedraaid. Maar wie zich wil aanmelden om de mails ontvangen, moet wel goed kunnen zoeken. Eind vorige maand stopte Microsoft onverwacht met de e-mailverzending van vooraankondigingen van zijn maandel... Read more

Source: www.automatiseringgids.nl

Top found tags: spam(1),website(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Team van Google-hackers gaat internet veiliger makenLocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

Google heeft een speciaal team van getalenteerde beveiligingsonderzoekers en hackers opgericht dat zich alleen gaat bezighouden met het veiliger maken van internet en beschermen van gebruikers. Project Zero, zoals het team heet, moet aanvallen op internetgebruikers via onbekende beveiligingslekken v... Read more

Source: www.security.nl

Top found tags: patch(2),update(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoek: veel Nederlanders onveilig op internetLocation: Amsterdam, The Netherlands
Date published: 15-07-2014

Veel Nederlander vertonen onveilig internetgedrag, waardoor ze het risico lopen om met malware besmet te raken. Zo opent ruim een derde soms e-mails van een afzender die ze niet kennen en geeft 29 procent wel eens persoonlijke gegevens of wachtwoorden aan een onbekende of een bedrijf. Verder klikt 3... Read more

Source: www.security.nl

Top found tags: cyber security(2),financial sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoeker maakt blacklist tegen SSL-malwareLocation: Amsterdam, The Netherlands
Date published: 15-07-2014

Een Zwitserse beveiligingsonderzoeker heeft een blacklist gemaakt van SSL-certificaten die door malware worden gebruikt om versleuteld te communiceren. Niet alleen internetbedrijven en eindgebruikers gebruiken steeds vaker SSL voor het opzetten van een beveiligde verbinding, ook malware doet dit. "C... Read more

Source: www.security.nl

Top found tags: research(1),SSL (1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Windows-netwerken kwetsbaar door lek in Active DirectoryLocation: Amsterdam, The Netherlands
Date published: 15-07-2014

Een kritieke ontwerpfout maakt Active Directory kwetsbaar voor een pass-the-hash-aanvalk. Het probleem is een kernfeature van het systeem en niet zo maar op te lossen. Via de aanval kunnen hackers de inloggegevens van een gebruiker wijzigen en vervolgens toegang krijgen tot bijvoorbeeld de webapplic... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Microsoft(1),NL(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackersgroep steelt database met informatie miljoen Cnet-gebruikersLocation: Bank of America HQ - Charlotte, United States
Date published: 15-07-2014

De Amerikaanse nieuwssite Cnet is slachtoffer geworden van een Russische hackersgroep. De hackers hebben de database met gebruikersinformatie weten te stelen maar zeggen geen kwade bedoelingen te hebben. Ze willen vooral aandacht genereren voor de veiligheid van websites. Via een beveiligingslek in ... Read more

Source: tweakers.net

Top found tags: social media(2),United States(4),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kritieke infrastructuren slecht beveiligd tegen cyberaanvallenLocation: Unisys - Blue Bell, United States
Date published: 15-07-2014

Texas. International Power plc Tweederde van de organisaties die kritieke infrastructuren beheren, was in de afgelopen 12 maanden het slachtoffer van een cyberaanval en verloor daarbij gegevens. Terwijl beheerders van kritieke infrastructuren een steeds populairder doelwit worden voor cybercrimine... Read more

Source: www.automatiseringgids.nl

Top found tags: Ponemon Institute(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

EA ontkent dat het gebruikers via Origin bespioneertLocation: Berlin, Germany
Date published: 15-07-2014

Speluitgever en ontwikkelaar Electronic Arts (EA) ontkent dat het gebruikers via het Origin distributieplatform bespioneert, zoals dit weekend op Reddit werd beweerd. Origin is een platform dat wordt gebruikt voor het aanbieden en downloaden van spellen, vergelijkbaar met Steam van Valve. Via Origin... Read more

Source: www.security.nl

Top found tags: privacy(1),Windows(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

'Britse geheime dienst kan Facebook-posts massaal verbergen'Location: London,United Kingdom
Date published: 14-07-2014

De Britse geheime dienst Government Communications Headquarters (GCHQ) beschikt over middelen om onder meer Facebook-posts op grote schaal te verbergen voor gebruikers. Dat zou blijken uit documenten gelekt door NSA-klokkenluider Edward Snowden, die in handen zijn van journalist Glenn Greenwald. Het... Read more

Source: www.nutech.nl

Top found tags: update(2),government(4),United Kingdom(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overheid trekt kwart DigiD-koppelingen inLocation: Den Haag, The Netherlands
Date published: 14-07-2014

Jaarlijks laten instanties die DigiD implementeren een audit uitvoeren om te zien of ze voldoen aan de veiligheidsvoorschriften. Logius beoordeelt deze rapportages en verlengt de koppeling van DigiD of trekt deze juist in. Van de 800 aansluitingen, zijn er nu 200 ingetrokken.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),report(1),The Netherlands(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Java 7-patches werken toch op Windows XPLocation: Oracle - Redwood City, United States
Date published: 15-07-2014

Oracle heeft berichten tegengesproken dat de patches voor Java niet meer zouden werken op het door Microsoft afgeschreven Windows XP Meer over Java-patches Oracle slaat mega-gat in beveiliging Windows XP Oracle dicht 115 lekken De Java-patches worden op de normale manier gepusht naar Windows-machine... Read more

Source: www.automatiseringgids.nl

Top found tags: patch(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beveiligingsbedrijf claimt lek in Active DirectoryLocation: Microsoft HQ - Redmond, United States
Date published: 15-07-2014

Een Isralisch bedrijf claimt een kwetsbaarheid in Microsofts Active Directory te hebben ontdekt waardoor een aanvaller het wachtwoord van een gebruiker kan wijzigen zonder dat dit in de logs verschijnt, maar Microsoft stelt dat het om een bekende beperking van de gebruikte authenticatieprotocollen... Read more

Source: www.security.nl

Top found tags: Microsoft(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lek in Google Dropcam laat aanvallers meekijkenLocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

Onderzoekers hebben lekken in de Dropcam van Google ontdekt waardoor aanvallers live kunnen meekijken, beelden kunnen injecteren of gebruikers in de ruimte via de microfoon kunnen afluisteren. Onderzoekers haalden de camera uit elkaar en reverse engineerden de hardware en ontdekten zo verschillende ... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),vulnerability(1),wireless(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Duitsland overweegt typemachines tegen cyberspionageLocation: Berlin, Germany
Date published: 15-07-2014

De Duitsers overwegen ouderwetse typemachine in te zetten om het de Amerikaanse geheime dienst NSA onmogelijk te maken bepaalde informatie in handen te krijgen en cyberspionage tegen te gaan. Een speciale commissie is in het leven geroepen nadat bleek dat de Amerikaanse geheime dienst op grote schaa... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Germany(2),government(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CBS: einde Windows XP helpt omzet computerwinkelsLocation: Centraal Bureau voor de Statistiek - Den Haag, The Netherlands
Date published: 15-07-2014

De omzet van computerwinkels is in de eerste vier maanden van dit jaar fors gestegen, wat samenvalt met het stoppen van de ondersteuning van Windows XP, zo laat het Centraal Bureau voor de Statistiek (CBS) weten. In april lag de omzet zelfs 47 procent hoger dan een jaar eerder. Mede hierdoor noteerd... Read more

Source: www.security.nl

Top found tags: trend(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nalatig personeel grootste dreiging kritieke infrastructuurLocation: Amsterdam, The Netherlands
Date published: 15-07-2014

Nalatige werknemers zijn de voornaamste oorzaak van verstoringen en beveiligingsincidenten in de kritieke infrastructuur, zo blijkt uit onderzoek van het Ponemon Institute onder 599 beveiligingsexperts werkzaam bij nutsbedrijven, de verwerkingsindustrie en olie-, gas- en energiemaatschappijen. 67% v... Read more

Source: www.security.nl

Top found tags: NL(1),research(1),Ponemon Institute(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Journalisten kunnen nog steeds veilig TrueCrypt gebruiken"Location: Amsterdam, The Netherlands
Date published: 15-07-2014

Journalisten kunnen nog steeds veilig TrueCrypt gebruiken, ondanks een melding op de website van het populaire encryptieprogramma dat de ontwikkelaars de software niet meer ondersteunen. Dat stelt het Committee to Project Journalists (CPJ), een non-profitorganisatie die zich voor de persvrijheid inz... Read more

Source: www.security.nl

Top found tags: NL(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google wil internet 'veiliger maken' met nieuw onderzoeksteamLocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

Google gaat een team beveiligingsonderzoekers aan het werk zetten om het internet veiliger te maken. Daarbij wordt ook software van andere bedrijven onder de loep te nemen. Het project moet het aantal 'zero day'-beveiligingsproblemen doen afnemen. googleHet technologiebedrijf heeft het onderzoekspro... Read more

Source: tweakers.net

Top found tags: NL(1),research(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Seagate introduceert nieuwe nas-systemenLocation: New York, United States
Date published: 15-07-2014

Seagate heeft zijn op de zakelijke markt gerichte nas-serie vernieuwd. Naast een tweetal basismodellen met twee en vier drivebays brengt de fabrikant ook drie Nas Pro-modellen op de markt die over meer processorkracht en werkgeheugen beschikken. De twee Nas-basismodellen zijn voorzien van een dualco... Read more

Source: tweakers.net

Top found tags: NL(1),report(1),USB (1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheden verholpen in Citrix NetScalerLocation: Door, United States
Date published: 15-07-2014

Samenvatting: Citrix heeft een update uitgebracht voor Citrix NetScaler Application Delivery Controller en de Citrix NetScaler Gateway die de kwetsbaarheden verhelpen. Gevolgen: Door de kwetsbaarheden te misbruiken kan een kwaadwillende een Cross-Site Scripting (XSS) aanval uitvoeren. Hierdoor is he... Read more

Source: www.ncsc.nl

Top found tags: XSS(1),update(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in Adobe Flash PlayerLocation: Adobe HQ - San Jose, United States
Date published: 15-07-2014

Samenvatting: Adobe heeft meerdere kwetsbaarheden verholpen in Flash Player. Gevolgen: Een aanvaller kan deze kwetsbaarheden misbruiken voor het uitvoeren van een Cross-Site Scripting (XSS) aanval of een Cross-Site Request Forgery (CSRF) aanval. Een dergelijke aanval kan leiden tot de uitvoer van wi... Read more

Source: www.ncsc.nl

Top found tags: OS X(2),telecom sector(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden in Apache Tomcat verholpenLocation: Door, United States
Date published: 15-07-2014

Samenvatting: Apache heeft meerdere kwetsbaarheden in Apache Tomcat verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden misbruiken voor het omzeilen van een beveiligingmaatregel, het uitvoeren van een Denial-of-Service of het verkrijgen van gevoelige informatie. Beschrijving: - CVE-2014-007... Read more

Source: www.ncsc.nl

Top found tags: patch(1),vulnerability(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish