Under construction

New design coming soon!

CIC News engine statistics

CIC News for 16-07-2014 contains 85 articles: cybercrime(26),cyber security(26),data breach(6),other(27)

CIC News update contains 69 English and 16 Dutch articles for today.
There are 12 published advisories, 0 are English and 12 are Dutch.
In today's English news articles:
- 18 related to cybercrime
- 25 related to cyber security
- 6 related to data breach and identity theft
- 20 for the category other news

In today's Dutch news articles:
- 8 related to cybercrime
- 1 related to cyber security
- 7 for the category other news

Have fun reading.

English cybercrime related news

If you have a security hole, if no one else can help ... maybe you need the Google ZERO teamLocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines +Comment Google will expand its computer security research efforts by forming a well-staffed full-time team called Project Zero. The web ad broker wants to hire the best of the best who can find Heartbleed -grade vulnerabilities, or worse bu... Read more

Source: go.theregister.com

Top found tags: research(1),vulnerability(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Only a few days old, OpenSSL fork LibreSSL is declared unsafe for LinuxLocation: National Security Agency - Fort Meade, United States
Date published: 15-07-2014

The first release of OpenSSL alternative LibreSSL is out, and already a researcher says he has found a "catastrophic failure" in the version for Linux. Further Reading OpenSSL code beyond repair, claims creator of LibreSSL fork OpenBSD developers "removed half of the OpenSSL source tree in a w... Read more

Source: arstechnica.com

Top found tags: OpenSSL(2),telecom sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Targeted Attacks on French Company Exploit Multiple Word VulnerabilitiesLocation: Paris, France
Date published: 15-07-2014

Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often than random phishing attempts. Exploits that use patched vulnerabilities delivered via spear phishing email are one of the most successful combinations used by attackers to infi... Read more

Source: blogs.mcafee.com

Top found tags: phishing(2),vulnerability(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Teen posed as Anonymous, arrested for major DDoS attacks in NorwayLocation: Norg, Noordenveld, Drenthe, The Netherlands
Date published: 15-07-2014

An unnamed 17-year-old man from Norway was arrested and charged early last week with launching distributed denial-of-service (DDoS) attacks against several banks and other companies in the country, according to reports by newsinenglish.no. Danske Bank, DNB, NetCom, Nordea, Norges Bank, Norwegian, SA... Read more

Source: www.scmagazine.com

Top found tags: DoS(2),financial sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Project Zero hopes to find zero-day vulnerabilities before the NSALocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

"You should be able to use the Web without fear that a criminal or state-sponsored actor is exploiting software bugs to infect your computer, steal secrets, or monitor your communications," writes Google security researcher Chris Evans. To help make that a reality, Google has put together a new team... Read more

Source: arstechnica.com

Top found tags: mobile device(2),telecom sector(8),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google unveils elite hacker squadLocation: Google HQ - Mountain View, United States
Date published: 16-07-2014

By AAP July 16, 2014 -- 01:05 GMT (02:05 BST) Google has unveiled an elite squad of hackers tasked with scouring the internet for security holes and defending the public against cyberattacks. Unveiled on Wednesday as "Project Zero", the team will hunt for bugs in the world's most popular software, s... Read more

Source: www.zdnet.com

Top found tags: cybercrime(3),government(3),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researcher launches SSL BlacklistLocation: Bern, Switzerland
Date published: 16-07-2014

Roman Hussy, the Swiss security activist behind Abuse.ch, has started another project: the SSL Blacklist (SSLBL). Known for the trackers that keep tabs on command and control (C&C) servers for the Zeus, SpyEye, Palevo and Geodo malware families, as well as the domain- and a IP-blocklists he provides... Read more

Source: net-security.org

Top found tags: Zeus(1),cybercrime(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Most dangerous superheroes to search for onlineLocation: McAfee - Santa Clara, United States
Date published: 16-07-2014

Though he has spent years fighting for good in comic books and on the big screen, Superman has emerged as one of the web s biggest villains as he comes top in McAfee s Most Toxic Superman study. The study analyzed which superhero searches led to the most risky websites, revealing that Thor, Wonder W... Read more

Source: net-security.org

Top found tags: threat(1),website(1),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
100+ DDoS events over 100GB/sec reported this yearLocation: Arbor Networks - Burlington, United States
Date published: 16-07-2014

Arbor Networks released global DDoS attack data derived from its ATLAS threat monitoring infrastructure. The data shows an unparalleled number of volumetric attacks in the first half of 2014 with over 100 attacks larger than 100GB/sec reported. [ddos-arbor] Key findings: events over 100GB/sec report... Read more

Source: net-security.org

Top found tags: report(1),threat(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hungry, Hungry Botnets: A look at TorpigLocation: University of California - San Diego, United States
Date published: 16-07-2014

pig silo 01 Every 60 seconds 47,000 applications are downloaded off the internet! Evidently, most of us dont think twice about downloading a song, widget, app, image or even malware. Downloading is so second nature to us that a popular phishing scheme thrives on our carefree downloading reflex. S... Read more

Source: blog.fortinet.com

Top found tags: Fortinet(2),trojan(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Large-Scale DDoS Attacks Continue to SpikeLocation: Arbor Networks - Burlington, United States
Date published: 16-07-2014

Although the average size of a given DDoS attack is going down, the number of attacks at the upper end of the scale is increasing, with researchers at Arbor Networks reporting more than 100 attacks of 100 Gbps in the first half of this year. In order for a DDoS attack to be effective, bad guys used ... Read more

Source: threatpost.com

Top found tags: cybercrime(2),South Korea(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Storm of Large DDoS Attacks Landed in First Half of 2014Location: Arbor Networks - Burlington, United States
Date published: 16-07-2014

The first half of the year has been a busy one when it comes to battling distributed denial-of-service attacks. According to Arbor Networks, the first six months of 2014 saw the most volumetric DDoS attacks ever, with more than 100 events of more than 100 GB/sec reported. In addition, there have bee... Read more

Source: securityweek.com

Top found tags: DoS(2),telecom sector(2),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oracle Patches 113 Vulnerabilities, Including 20 in JavaLocation: Oracle - Redwood City, United States
Date published: 16-07-2014

Oracle has addressed a total of 113 security vulnerabilities across its product base with the release of its Critical Patch Update (CPU) for July 2014. The CPU includes fixes for 20 flaws affecting Java SE, all of which can be remotely exploited without authentication. The vulnerabilities impact Jav... Read more

Source: securityweek.com

Top found tags: United States(2),vulnerability(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trusteer Warns of New Kronos Banking TrojanLocation: Trusteer - Boston, United States
Date published: 16-07-2014

Security researchers at IBM subsidiary Trusteer recently came across new financial malware named Kronos, which is being offered for sale on a Russian underground forum for $7,000. The malware's name has an obvious (and cocky) meaning -- in Greek mythology, Kronos was Zeus' father. Kronos includes fu... Read more

Source: www.esecurityplanet.com

Top found tags: trojan(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crooks fling banking Trojan at Japanese smut site fansLocation: Oracle - Redwood City, United States
Date published: 16-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Cybercrooks are targeting Japanese smut site aficionados with a new banking Trojan run. The Aibatook malware is targeting customers of Japanese banks who are also visitors on some of the country's most popular pornographic websites. Security... Read more

Source: go.theregister.com

Top found tags: vulnerability(2),exploit kit(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Artist sends the world's most secure mixtape to the NSALocation: National Security Agency - Fort Meade, United States
Date published: 15-07-2014

milbul. Artist sends the world's most secure mixtape to the NSA David Huerta, an artist and software engineer has sent an encrypted mixtape to the NSA which he says they will never be able to crack. Huerta made the tape as a response to the NSA's publishing of Edward Snowden's documents online and a... Read more

Source: itproportal.com

Top found tags: government(2),social media(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pass the hash? Severity of Active Directory security flaw questionedLocation: Microsoft HQ - Redmond, United States
Date published: 15-07-2014

A vendor has publically disclosed an Active Directory security flaw that puts a twist on typical "pass the hash" attacks, potentially leaving the numerous enterprises that rely on Microsoft's market-dominating directory service vulnerable. However, Microsoft and others have questioned the validity a... Read more

Source: searchsecurity.techtarget.com

Top found tags: Windows(1),cyber security(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oracle fixes many vulnerabilities in dozens of productsLocation: Oracle - Redwood City, United States
Date published: 15-07-2014

100 versions of its products. Read more Among the major products patched are Oracle Database Server (five vulnerabilities), Oracle Fusion Middleware (29), Oracle Hyperion (seven), Oracle E-Business Suite (five), Oracle PeopleSoft (five), Oracle Siebel CRM (six), Oracle MySQL Executive (ten), Oracle ... Read more

Source: www.zdnet.com

Top found tags: United States(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oracle releases 113 bug fixes in Critical Patch UpdateLocation: Oracle - Redwood City, United States
Date published: 15-07-2014

Feedly fixes Android JavaScript code injection flaw, deems it "harmless" The most critical flaws were in Java and Oracle Database Server. In its quarterly security update, Oracle has released 113 patches for vulnerabilities across hundreds of its products. On Tuesday, the company published an adviso... Read more

Source: www.scmagazine.com

Top found tags: United States(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Active Directory flaw opens enterprise services to unauthorized accessLocation: Microsoft HQ - Redmond, United States
Date published: 15-07-2014

Active Directory flaw opens enterprise services to unauthorized access Microsoft claims the issue is a "well known" design limitation in Active Directory's authentication protocol. A security firm has discovered a flaw in Microsoft's Active Directory (AD) software that could allow an attacker to cha... Read more

Source: www.scmagazine.com

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GCHQs Chinese menu of tools spreads disinformation across InternetLocation: GCHQ - Cheltenham, United Kingdom
Date published: 15-07-2014

Intercept. The page, taken from the documents obtained by former NSA contractor Edward Snowden, lists dozens of tools used by GCHQ to target individuals and their computing devices, spread disinformation posing as others, and shape opinion and information available online. The page had been ma... Read more

Source: arstechnica.com

Top found tags: government(3),social media(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA recruits college students for cyber-operations programLocation: National Security Agency - Fort Meade, United States
Date published: 16-07-2014

The National Security Agency is looking to grow its ranks with highly-trained college students. The government agency announced Tuesday that it has chosen five new schools to host its specialized Centers of Academic Excellence in Cyber Operations Program. Those handpicked schools include New York Un... Read more

Source: cnet.com.ortal.com

Top found tags: NSA(2),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Smart' technology could make utilities more vulnerable to hackersLocation: Department of Energy - Washington, United States
Date published: 16-07-2014

FRANKFURT (Reuters) - Last November, Felix Lindner came very close to shutting down the power supply of Ettlingen, a town of almost 40,000 people in the south of Germany. "We could have switched off everything: power, water, gas," Lindner, head of Berlin-based Recurity Labs, an IT security company, ... Read more

Source: reuters.com

Top found tags: government(5),cybercrime(6),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft: You NEED bad passwords and should re-use them a lotLocation: Microsoft HQ - Redmond, United States
Date published: 16-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Microsoft has rammed a research rod into the security spokes of the internet by advocating for password reuse in a paper that thoroughly derails the credentials best practise wagon. Password reuse has become a pariah in internet security cir... Read more

Source: go.theregister.com

Top found tags: website(1),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amazon triples malware hosting in six monthsLocation: New York, United States
Date published: 15-07-2014

Yesterday, the release of a Security Engineering Research Team (SERT) Quarterly Threat Intelligence Report for Q2, 2014 by Solutionary, identified the top 10 global Internet Service Providers (ISPs) and hosting providers that hosted malware. Amazon retained the number one position as malware-hosting... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(2),information security(2),ISP(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CNET loses data on 1 million usersLocation: Bank of America HQ - Charlotte, United States
Date published: 15-07-2014

IT technology website lost data on one million users to Russian hackers. CNET loses data on 1 million users CNET loses data on 1 million users CISOs will be alarmed to hear that the CNET technology news website which is aimed at security and other IT professionals - has been hacked by a Russian ... Read more

Source: www.scmagazineuk.com

Top found tags: social media(2),United Kingdom(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Redmond may buy security company it says is wrong about AD flawLocation: Microsoft HQ - Redmond, United States
Date published: 16-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Microsoft is reportedly in talks to buy Israeli security firm Aorato for $200 million after this week pouring cold water on its claim to have discovered a critical flaw in Active Directory. Aorato was founded by former Israeli Defense Force ... Read more

Source: go.theregister.com

Top found tags: Windows(1),cyber security(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Six Clicks: Free antivirus and anti-malware scanners for WindowsLocation: Microsoft HQ - Redmond, United States
Date published: 16-07-2014

Introduction Is your system riddled with viruses? Antivirus program out of date? Need a decent but free security program for a loved one who doesn't see the point in paying for protection? No one wants malware on their PCs, so antivirus and antimalware scanners are a must, but a quality scan... Read more

Source: www.zdnet.com

Top found tags: Windows(1),cybercrime(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rickroll Innocent Televisions With This Google Chromecast HackLocation: Google HQ - Mountain View, United States
Date published: 16-07-2014

The Rickmote Controller. The Rickmote Controller. [gallery-ca] Dan Petro/Bishop Fox Just when you thought the rickrolling meme might finally be dead, a Google bug has unwittingly allowed the R&B croonings of Rick Astley to migrate from your computer screen to your television. At the Hackers on Plane... Read more

Source: wired.com

Top found tags: Raspberry Pi(2),Google(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Blackphone, BlackBerry throw punches over smartphone securityLocation: BlackBerry - Ontario, Canada
Date published: 16-07-2014

An article published 14 July on the Blackberry blog by enterprise content strategy marketing manager Joe McGarvey said the Blackphone was only "purportedly secure" and "inadequate for business." McGarvey writes: BlackBerry welcomes the attention the Blackphone brings to secure communications and dig... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),government(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why all the excitement about DRIP? I've looked into it, and we're all fineLocation: GCHQ - Cheltenham, United Kingdom
Date published: 16-07-2014

all your service providers store data on all of your communications the location, time, duration for 12 months. The DRIP bill is emergency legislation, brought in as a response to a decision by the European Court of Justice that the European data retention directive of 2009 should be overtur... Read more

Source: www.zdnet.com

Top found tags: telecom sector(4),government(6),United Kingdom(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Selectively re-using bad passwords is not a bad idea, researchers sayLocation: Microsoft HQ - Redmond, United States
Date published: 16-07-2014

For all the repeated advice to use different, complex password for each online account, users are still opting for easy-to-guess, short ones and use them repeatedly across many websites and online services. Unfortunately, it seems that security professionals must make peace with the situation, or fi... Read more

Source: net-security.org

Top found tags: research(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SSL Certificates Associated with Malware Exposed with SSL BlacklistLocation: Bern, Switzerland
Date published: 16-07-2014

Swiss security website Abuse.ch announced the creation of a blacklist containing SSL certificates that are known to be associated with malware and botnet activities such as command and control (C&C) traffic. The SSL Blacklist, or SSLBL, relies on IP addresses and SHA1 fingerprints associated with ce... Read more

Source: securityweek.com

Top found tags: information security(2),United States(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Texas Tech University HSC Unifies Security and Compliance with McAfee SIEM SolutionsLocation: McAfee - Santa Clara, United States
Date published: 16-07-2014

Texas Tech University Health Sciences Center (TTUHSC) is a leader in education and research. With seven schools across six campuses, research facilities, and health care clinics, the universitys IT security team has the lofty task of protecting electronic medical records and health information in... Read more

Source: blogs.mcafee.com

Top found tags: medical sector(2),security management(2),education(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security vulnerabilities found on password managersLocation: University of California - San Diego, United States
Date published: 16-07-2014

The wide spectrum of discovered vulnerabilities makes a single solution unlikely - UC Berkley report Security vulnerabilities found on password managers Security vulnerabilities found on password managers The inability of software to generate truly random strings of characters - and software develop... Read more

Source: www.scmagazineuk.com

Top found tags: information security(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Regulatory compliance and risk includes third-partiesLocation: New York, United States
Date published: 16-07-2014

Third Party IT services suppliers must reassess governance, risk management and compliance responsibilities. Regulatory compliance and risk includes third-parties Regulatory compliance and risk includes third-parties The interesting thing about the breach reported by Vancouver-based Information Syst... Read more

Source: www.scmagazineuk.com

Top found tags: financial sector(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Comodo Internet Security Pro 2014 reviewLocation: Comodo Group HQ - Clifton, United States
Date published: 16-07-2014

Company. Comodo Price $40 (23) for 3 devices, 1 year Website comodo.com Good Points Automatic sandboxing Complete secure browser 24/7 online support Nicely priced Bad Points A few false positives No bells or whistles such as backup Comodo Internet Security Pro 2014 review S... Read more

Source: itproportal.com

Top found tags: cybercrime(3),cyber security(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Big investors see cybersecurity as opportunityLocation: New York, United States
Date published: 16-07-2014

NEW YORK (Reuters) - Cyberattacks on U.S. businesses could be an opportunity for investors as companies spend money to upgrade their infrastructures, big-name money managers said on Wednesday at a conference geared to sharing potential blockbuster ideas. Even U.S. Treasury Jacob Lew, speaking at the... Read more

Source: reuters.com

Top found tags: cybercrime(2),cyber security(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers Say Password Re-Use Isnt All BadLocation: University of California - San Diego, United States
Date published: 16-07-2014

Forget whatyouve been told about password re-use and weak credentials. If were to believe collaborating researchers from Microsoft and Carelton University, neither is such a bad idea. Flying in the face of conventional pleading from experts that password is a bad password, new research... Read more

Source: threatpost.com

Top found tags: cyber security(2),financial sector(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Device security must be at the heart of Internet of Things developmentLocation: Gartner - Stamford, United States
Date published: 15-07-2014

'It is critical that businesses integrate security early in the evolution of the process' The Internet of Things refers to the expanding network of interconnected, internet-enabled devices. Driven by miniaturisation, the affordability of components such as cheap Bluetooth sensors, and the growing ub... Read more

Source: www.information-age.com

Top found tags: United States(2),cyber security(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Judge dismisses second class-action suit against Advocate HealthLocation: Illinois, United States
Date published: 15-07-2014

Advocate Health and Hospitals Corp. is off the hook in a class-action lawsuit resulting from a data breach that exposed more than four million patient records after an Illinois judge dismissed the suit with prejudice Friday. Judge James Murphy in the Kane County Circuit Court ruled that plaintiffs i... Read more

Source: www.scmagazine.com

Top found tags: health sector(2),medical sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New York suffered 900 data breaches in 2013, AG reportsLocation: New York City, New York, United States
Date published: 15-07-2014

Public and private organizations in New York state were hit by more than 900 data breaches last year that exposed the personal and financial records of 7.3 million residents, a report released by the State Attorney General Eric J. Schneiderman revealed. The report, which covers security incidents ov... Read more

Source: www.scmagazine.com

Top found tags: research(1),data breach(2),Ponemon Institute(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mandatory data breach laws back on Australian agendaLocation: Sydney, Australia
Date published: 16-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Australia's on-again, off-again debate about data breach notification laws is on again, courtesy of a report into financial system regulation, at least until the government cans the idea (again). Register readers will recall that a Privacy A... Read more

Source: go.theregister.com

Top found tags: cyber security(2),data breach(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK data watchdog suffered data security breachLocation: New York, United States
Date published: 16-07-2014

A data breach can really happen to anyone - just ask the UK s Information Commissioner s Office (ICO). Buried in the recently made public 2013-2014 Annual Report, the authority tasked with making sure that UK organizations - private and governmental - keep customer and user data secure, has stated t... Read more

Source: net-security.org

Top found tags: data breach(2),government(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Hamas hacks Israeli TV sat channel to broadcast pics of Gaza woundedLocation: Tel Aviv, Israel
Date published: 15-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Gaza leaders Hamas took over an Israeli satellite channel for few minutes on Monday to broadcast pictures of Gaza wounded. Viewers who tuned into Israeli Channel 10 reported seeing images of people wounded from Israeli airstrikes on Gaza as ... Read more

Source: go.theregister.com

Top found tags: report(1),TV (1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Early Review of LibreSSL Finds Problematic PRNGLocation: New York, United States
Date published: 15-07-2014

When the OpenBSD foundation sent LibreSSL out the door last weekend, it was with the full intention of getting some feedback and scrutiny in return, all in the name of making the crypto library stable and secure. What they likely didnt expect were claims surfacing that LibreSSL shared some of the... Read more

Source: threatpost.com

Top found tags: website(1),OpenSSL(2),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Artist sends NSA a super-encrypted mixtapeLocation: National Security Agency - Fort Meade, United States
Date published: 15-07-2014

acrylic for the case "to symbolically give transparency to the device you were using." David Huerta When you're an artist and a software engineer and you want to thumb your nose at the NSA, what do you do? Send them a mixtape, of course. Only the mixtape David Huerta sent to the National "Spy" (OK, ... Read more

Source: cnet.com.ortal.com

Top found tags: social media(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Scan: 5 Ways to Keep Your Kids Safe OnlineLocation: New York, United States
Date published: 15-07-2014

Hey guys! Im Bradi and this is the Scan. Its ten oclock do you know where your teens are online? The results from McAfees Secret Life of Teens survey are in and surprise, surprise parents arent really all that hip to what their teens are up to online. 80% of parents ... Read more

Source: blogs.mcafee.com

Top found tags: EN(1),McAfee(1),survey(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google creates 'Project Zero' team to protect the internetLocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

Google announced Project Zero on Tuesday, a team of researchers dedicated to uncovering zero-day vulnerabilities, flaws and other security issues that could represent a threat to internet users. The Project Zero team plans to work in real-time, which means the researchers will quickly report a... Read more

Source: www.scmagazine.com

Top found tags: telecom sector(2),vulnerability(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Run Oracle? Want to sleep tonight? Then sort these 113 patchesLocation: Oracle - Redwood City, United States
Date published: 16-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Oracle has emitted its quarterly Critical Patch Update, this time offering a mere 113 patches sysadmins and security folks should get busy implementing. This time around there's 29 fixes for Oracle Fusion Middleware, 20 for Java SE, ten in M... Read more

Source: go.theregister.com

Top found tags: patch(1),threat(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oracle delivers 113 updatesLocation: Oracle - Redwood City, United States
Date published: 16-07-2014

Oracle's Quarterly Critical Patch Update (CPU) is never a minor event. In April we saw 104 security issues addressed, in January it was 144. This time around we are faced with 113 updates. These updates span the entire portfolio of Oracle software, including the JRE, Solaris, Oracle Database, MySQL,... Read more

Source: net-security.org

Top found tags: Rapid7(1),update (1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How email user habits impact personal lifeLocation: New York, United States
Date published: 16-07-2014

GFI Software announced the findings of its second independent study into email user habits, which revealed a stark increase in the way that work email is encroaching into the personal lives and downtime of staff. Of those surveyed, some 41% admit to checking work email at least once a day in their p... Read more

Source: net-security.org

Top found tags: mobile device(2),United Kingdom(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
65 challenges that cloud computing poses to forensics investigatorsLocation: National Institute of Standards - Gaithersburg, United States
Date published: 16-07-2014

The National Institute of Standards and Technology (NIST) has issued for public review and comment a draft report summarizing 65 challenges that cloud computing poses to forensics investigators who uncover, gather, examine and interpret digital evidence to help solve crimes. The report, NIST Cloud C... Read more

Source: net-security.org

Top found tags: NIST(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whitepaper: VoIP for beginnersLocation: New York, United States
Date published: 16-07-2014

In layman's terms, VoIP is the transmission of voice over the digital network. While VoIP services can be less expensive than standard telephone network services, call quality can be a factor in one's decision to switch to VoIP. However, constant innovation and upgrades are making VoIP comparable in... Read more

Source: net-security.org

Top found tags: EN(1),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Common Misconceptions IT Admins Have on Targeted AttacksLocation: New York, United States
Date published: 16-07-2014

In our efforts around addressing targeted attacks, we often work with IT administrators from different companies in dealing with threats against their network. During these collaborations, weve recognizedcertain misconceptions that IT administrators or perhaps enterprises in general hav... Read more

Source: trendmicro.com

Top found tags: update(2),vulnerability(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK data watchdog BREACHED data law, says UK data watchdogLocation: London, United Kingdom
Date published: 16-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Britain's data cops have coughed to a serious security screw-up at the Information Commissioner's Office, and concluded that the ICO - only mildly - violated the Data Protection Act that it is supposed to police. It carried out an internal p... Read more

Source: go.theregister.com

Top found tags: police(2),government(3),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New data law a serious expansion of surveillance, say law expertsLocation: National Security Agency - Fort Meade, United States
Date published: 16-07-2014

The emergency surveillance legislation being rushed through the UK parliament could be in breach of European law, 15 technology law experts have warned. The controversial Data Retention and Investigatory Powers bill is a serious expansion of the surveillance state, the group of UK academics sa... Read more

Source: www.computerweekly.com

Top found tags: United Kingdom(4),United States(4),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
OpenVPN Warns Customers of CSRF Bug in Access Server Desktop ClientLocation: Microsoft HQ - Redmond, United States
Date published: 16-07-2014

OpenVPN is advising users of its Desktop Client to upgrade as soon as possible to avoid attacks against a CSRF vulnerability that can allow remote code execution. The vulnerability lies ina product that the company no longer supports and considers obsolete. An attacker could exploit the vulnerabil... Read more

Source: threatpost.com

Top found tags: vulnerability(1),webserver(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
OpenBSD Downplays PRNG Vulnerability in LibreSSLLocation: Google HQ - Mountain View, United States
Date published: 16-07-2014

LibreSSL, the open-source implementation of the SSL/TLS protocol forked from OpenSSL, is unsafe on Linux due to a flaw in the pseudorandom number generator (PRNG), a researcher said this week. However, the OpenBSD Project, which develops LibreSSL, believes the issue has been overblown. According to ... Read more

Source: securityweek.com

Top found tags: research(1),vulnerability(1),OpenSSL(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
German loss of trust heralds return of typewritersLocation: Berlin, Germany
Date published: 16-07-2014

Many Germans have personally experienced mass state surveillance by the Stasi, hence the move to use typewriters to prevent NSA survellance. German loss of trust heralds return of typewriters German loss of trust heralds return of typewriters The German government may have ace up its sleeve to count... Read more

Source: www.scmagazineuk.com

Top found tags: United States(2),government(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google enlists top hacker for Project Zero campaignLocation: Google HQ - Mountain View, United States
Date published: 16-07-2014

Google enlists top hacker for Project Zero campaign. Prolific hacker George Hotz has been enlisted by Google as a key part of its new Project Zero team that is designed to identify critical bugs and vulnerabilities in all software. Related: George Geohot Hotz has taken a job at Facebook Hotz, ... Read more

Source: itproportal.com

Top found tags: vulnerability(2),telecom sector(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Swedish Court to Julian Assange: Youre Not Going AnywhereLocation: Stockholm, Sweden
Date published: 16-07-2014

Julian Assange, Feb. 2, 2012. Julian Assange, Feb. 2, 2012. [gallery-ca] Matt Dunham/AP The Stockholm District Court in Sweden today upheld an arrest warrant for WikiLeaks founder Julian Assange, rejecting a motion that might have allowed him to leave the Ecuadorian embassy in London, where he has b... Read more

Source: wired.com

Top found tags: Wikileaks(1),United Kingdom(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Google zet team op om spionnen en hackers te dwarsbomenLocation: Google HQ - Mountain View, United States
Date published: 16-07-2014

Google stelt een team beveiligingsspecialisten samen dat onder meer tot taak heeft spionerende veiligheidsdiensten buiten de deur te houden. Het team, genaamd Project Zero, zal bestaan uit minstens 10, nog aan te nemen, beveiligingsexperts. Zij zullen hun volledige werktijd besteden aan het zoeken n... Read more

Source: www.automatiseringgids.nl

Top found tags: patch(1),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gapend gat in Microsoft Active Directory ontdektLocation: Microsoft HQ - Redmond, United States
Date published: 16-07-2014

Microsoft Active Directory, de basis voor toegangsbewaking van de meeste bedrijfsnetwerken, bevat een essentile ontwerpfout die hackers de mogelijkheid geeft elk wachtwoord te wijzigen. Microsoft stelt in een reactie dat het probleem al enige tijd bekend is en er al aan gewerkt wordt. Toch beweert... Read more

Source: www.automatiseringgids.nl

Top found tags: NL(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft: cybercrime lucratiever dan drugshandelLocation: Microsoft HQ - Redmond, United States
Date published: 16-07-2014

Cybercrime zou volgens Microsoft lucratiever dan de drugshandel zijn, maar waar de softwaregigant deze uitspraak op baseert is onduidelijk. Vorige week liet Microsofts Ton Koenraadt tijdens een evenement van KPN weten dat er meer geld in cybercrime omgaat dan in de drugshandel. De vergelijking tusse... Read more

Source: www.security.nl

Top found tags: government(2),telecom sector(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers schieten gaten in veiligheid hotelkluisjesLocation: G Data Software - Bochum, Germany
Date published: 16-07-2014

Wie op vakantie gaat moet niet al teveel vertrouwen in de kluisjes van hotels hebben, zo waarschuwen onderzoekers van anti-virusbedrijf G Data. Volgens de onderzoekers zijn de kluisjes op verschillende manieren te openen, daarnaast kunnen ze worden gebruikt voor het skimmen van creditcards. Het eers... Read more

Source: www.security.nl

Top found tags: NL(1),research(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
USB-stick met wifi-adapter voor veilig internetbankierenLocation: Amsterdam, The Netherlands
Date published: 16-07-2014

Een Amerikaans bedrijf heeft een product ontwikkeld waarmee internetgebruikers veilig kunnen internetbankieren, zonder angst voor malware, ook als ze over een draadloos netwerk beschikken. Het gaat om de ZeusGard, een verwijzing naar de beruchte Zeus banking Trojan. Zeus is een populair Trojaans paa... Read more

Source: www.security.nl

Top found tags: wireless(2),cybercrime(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dixons-klanten moeten wachtwoord wijzigen door nieuwe siteLocation: Dixon, United States
Date published: 16-07-2014

Alle klanten van Dixons moeten hun wachtwoord wijzigen nu het bedrijf een nieuwe website heeft gelanceerd, zo blijkt uit een verstuurde e-mail. "Uit beveiligingsoverweging hebben we ervoor gekozen om al onze klanten op de nieuwe website opnieuw hun wachtwoord in te laten stellen", zo laat de mail we... Read more

Source: www.security.nl

Top found tags: spam(1),website(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI: botnets besmetten 18 computers per secondeLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 16-07-2014

Elk seconde worden wereldwijd 18 computers onderdeel van een botnet, wat neerkomt op zo'n 500 miljoen besmette computers per jaar. Dat liet Joseph Demarest, adjunct-directeur van FBI's cyberdivisie, gisteren tijdens een hoorzitting voor een Amerikaanse Senaatscommissie weten. Demarest kwam de voortg... Read more

Source: www.security.nl

Top found tags: government(2),cybercrime(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware op Japanse pornosites besmet alleen IE-gebruikersLocation: Tokio, Japan
Date published: 16-07-2014

Onderzoekers hebben op Japanse pornosites malware ontdekt die alleen gebruikers van Internet Explorer infecteert en vervolgens probeert gegevens voor internetbankieren en hostingproviders te stelen. Aibatook, zoals de malware heet, gebruikt een bekend Java-lek uit 2013 om zich te verspreiden. Als ge... Read more

Source: www.security.nl

Top found tags: Internet Explorer(2),online banking(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

BlackBerry en Blackphone ruzin over veiligheid smartphoneLocation: BlackBerry - Ontario, Canada
Date published: 16-07-2014

Smartphonefabrikant BlackBerry heeft in een blogposting uitgehaald naar de Blackphone, dat ongeschikt voor de zakelijke markt zou zijn, maar de makers van Blackphone halen in een reactie weer uit naar BlackBerry. De Blackphone is een nieuwe smartphone die veiligheid en privacy voorop stelt. Het toes... Read more

Source: www.security.nl

Top found tags: mobile device(2),United States(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Microsoft laat mensen 56-bit codes onthoudenLocation: Microsoft HQ - Redmond, United States
Date published: 16-07-2014

Vaak wordt gesteld dat mensen geen lange of complexe wachtwoorden kunnen onthouden, maar onderzoekers van Microsoft hebben via onderzoek aangetoond dat gebruikers met voldoende training willekeurig toegekende 56-bit codes als wachtwoord kunnen leren en blijven herinneren. Voor de test werden 56-bit ... Read more

Source: www.security.nl

Top found tags: NL(1),research(1),training(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Online drugsdealers lekken gegevens via Exif-data'Location: Amsterdam, The Netherlands
Date published: 16-07-2014

Drugsdealers die op online marktplaatsen actief zijn blijken vaak zonder dat ze het weten informatie over hun locatie openbaar te maken via de foto's die ze van hun handelswaar nemen. De foto's bevatten namelijk Exchangeable image file format (Exif)- data. Hierbij worden allerlei gegevens van de gem... Read more

Source: www.security.nl

Top found tags: NL(1),smartphone(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australi weigert broncode verkiezingen openbaar te makenLocation: Amsterdam, The Netherlands
Date published: 16-07-2014

De Australische overheid weigert de broncode openbaar te maken die wordt gebruikt voor het tellen van de stemmen tijdens de Senaatsverkiezingen. Een advocaat had de Australian Electoral Commission (AEC) vorig jaar al via een Wob-verzoek om de broncode gevraagd. Dat verzoek werd afgewezen, volgens de... Read more

Source: www.security.nl

Top found tags: hacking(1),NL(1),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oracle patcht kritieke Java-lekkenLocation: Oracle - Redwood City, United States
Date published: 16-07-2014

Oracle heeft gisteren updates voor een groot aantal programma's uitgebracht, waaronder Java. In totaal werden er 20 Java-lekken gepatcht, die aanwezig zijn in Java 5.0 update65, Java 6 update75, Java 7 update 60 en Java 8 update 5, waarvan enkele als zeer kritiek zijn bestempeld. Via deze kritieke l... Read more

Source: www.security.nl

Top found tags: Windows(1),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Echte naam niet meer verplicht voor Google PlusLocation: Google HQ - Mountain View, United States
Date published: 16-07-2014

Het is niet meer verplicht voor gebruikers van Google Plus om zich met hun echte naam te registreren, zo heeft Google laten weten. Toen Google Plus drie jaar geleden begon had Google allerlei regels opgesteld wat betreft de naam die mensen mochten gebruiken. "Dit hielp met het opzetten van een gemee... Read more

Source: www.security.nl

Top found tags: Google(1),NL(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nederlander trapt in "gestrande reiziger" scamLocation: Amsterdam, The Netherlands
Date published: 16-07-2014

Een Nederlander is in een scam getrapt waarbij internetoplichters een gehackt e-mailadres gebruikte om zich als gestrande reiziger voor te doen. Deze vorm van fraude is al vele jaren gaande, maar wordt volgens de Fraudehelpdesk nu ook in Nederland ingezet. In twee weken tijd kwamen er bij de organis... Read more

Source: www.security.nl

Top found tags: scam(1),social media(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overblown LibreSSL PRNG Vulnerability PatchedLocation: New York, United States
Date published: 16-07-2014

The OpenBSD Foundation late last night rushed out a patch for a vulnerability in the LibreSSL pseudo random number generator (PRNG). The flaw was disclosed two days ago by the founder of secure backup company Opsmate, Andrew Ayer, who said the vulnerability was a catastrophic failure of the PRNG.... Read more

Source: threatpost.com

Top found tags: OS X(2),United States(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Meerdere kwetsbaarheden in file verholpenLocation: Ubuntu - London, United Kingdom
Date published: 16-07-2014

Samenvatting: Meerdere kwetsbaarheden in file kunnen leiden tot een Denial-of-Service op de file applicatie. Gevolgen: Een kwaadwillende kan de kwetsbaarheden misbruiken voor het laten crashen van de file applicatie. Beschrijving: - CVE-2012-1571, CVE-2014-0207, CVE-2014-3487, CVE-2014-3479, CVE-201... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in diverse f5 producten verholpenLocation: Amsterdam, The Netherlands
Date published: 16-07-2014

Samenvatting: F5 heeft updates uitgebracht die een kwetsbaarheid verhelpt in diverse producten. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken om een Denial of Service te veroorzaken en mogelijk willekeurige code uit te voeren met gebruikersrechten. Beschrijving: - CVE-2009-3245 Er bevi... Read more

Source: www.ncsc.nl

Top found tags: NL(1),OpenSSL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in libav verholpenLocation: Ubuntu - London, United Kingdom
Date published: 16-07-2014

Samenvatting: Er zijn meerdere kwetsbaarheden ontdekt in libav. Over deze kwetsbaarheden zijn weinig details bekend gemaakt. Gevolgen: Een kwaadwillende kan lokaal een Denial of Service-aanval of willekeurige code uitvoeren met de rechten van de gebruiker. Beschrijving: Er zijn meerdere kwetsbaarhed... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden in Oracle Java SE verholpenLocation: Oracle - Redwood City, United States
Date published: 16-07-2014

Samenvatting: Er bevindt zich een groot aantal kwetsbaarheden in Java waarvoor Oracle updates heeft uitgebracht. Gevolgen: Misbruik van de kwetsbaarheden kan leiden tot het uitvoeren van willekeurige code met gebruikersrechten en het omzeilen van beveiligingsmaatregelen. Beschrijving: Oracle heeft v... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM verhelpt kwetsbaarheid in IBM productenLocation: IBM HQ - Armonk, United States
Date published: 16-07-2014

Samenvatting: IBM heeft updates uitgebracht om verschillende zoekpad (search path) kwetsbaarheden in verschillende DB2 producten op te lossen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om zich root rechten toe te eigenen. Beschrijving: - CVE-2014-0907 Een aantal zoekpad kw... Read more

Source: www.ncsc.nl

Top found tags: patch(1),Windows(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden in libXfont verholpenLocation: Ubuntu - London, United Kingdom
Date published: 16-07-2014

Samenvatting: Er zijn meerdere kwetsbaarheden verholpen in libXfont. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om willekeurige code uit te voeren onder de rechten van een gebruiker. Beschrijving: CVE-2014-0209 Door een Integer overflow in de font metadata file parsing kan... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden in Oracle MySQL verholpenLocation: Oracle - Redwood City, United States
Date published: 16-07-2014

Samenvatting: Er bevindt zich een groot aantal kwetsbaarheden in MySQL waarvoor Oracle updates heeft uitgebracht. Gevolgen: Misbruik van de kwetsbaarheden kan leiden tot het gedeeltelijk onbeschikbaar maken van MySQL. Tevens is het mogelijk om gedeeltelijk gevoelige gegevens in te zien en/of te wijz... Read more

Source: www.ncsc.nl

Top found tags: patch(2),United States(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwestbaarheid in HP Storage Data Protector ontdektLocation: Hewlett-Packard - Palo Alto, United States
Date published: 16-07-2014

Samenvatting: HP heeft bekend gemaakt dat er een kwetsbaarheid in HP Data Protector is ontdekt. Deze kwetsbaarheid maakt het mogelijk voor een kwaadwillende op afstand commando's uit te voeren. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken om willekeurige commando's uit te voeren. Besc... Read more

Source: www.ncsc.nl

Top found tags: ISP(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden in Oracle VirtualBox verholpenLocation: Oracle - Redwood City, United States
Date published: 16-07-2014

Samenvatting: Er bevindt zich een aantal kwetsbaarheden in Oracle VirtualBox die alleen door lokale kwaadwillenden misbruikt kan worden. Oracle heeft nieuwe versies van VirtualBox uitgebracht om deze kwetsbaarheden te verhelpen. Gevolgen: Misbruik van de kwetsbaarheden kan leiden tot lokaal verhoogd... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Windows(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Juniper Junos OS switches, routers en firewals verholpenLocation: Juniper Networks - Sunnyvale, United States
Date published: 16-07-2014

Samenvatting: Juniper Networks heeft kwetsbaarheden verholpen in JunOS switches, routers en firewalls. Gevolgen: Binnen de tekstuele gebruikersinterface kunnen gebruikers root rechten verkrijgen. Er zijn diverse kwestbaarheden waarbij een malafide pakket kan leiden tot een Denial-Of-Service. Gebruik... Read more

Source: www.ncsc.nl

Top found tags: Juniper Networks(2),website(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in Adobe Flash PlayerLocation: Adobe HQ - San Jose, United States
Date published: 16-07-2014

Samenvatting: Adobe heeft meerdere kwetsbaarheden verholpen in Flash Player. Gevolgen: Een aanvaller kan deze kwetsbaarheden misbruiken voor het uitvoeren van een Cross-Site Scripting (XSS) aanval of een Cross-Site Request Forgery (CSRF) aanval. Een dergelijke aanval kan leiden tot de uitvoer van wi... Read more

Source: www.ncsc.nl

Top found tags: OS X(2),telecom sector(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden in Oracle Java SE verholpenLocation: Oracle - Redwood City, United States
Date published: 16-07-2014

Samenvatting: Er bevindt zich een groot aantal kwetsbaarheden in Java waarvoor Oracle updates heeft uitgebracht. Gevolgen: Misbruik van de kwetsbaarheden kan leiden tot het uitvoeren van willekeurige code met gebruikersrechten en het omzeilen van beveiligingsmaatregelen. Beschrijving: Oracle heeft v... Read more

Source: www.ncsc.nl

Top found tags: patch(2),United States(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish