Under construction

New design coming soon!

CIC News engine statistics

CIC News for 17-07-2014 contains 164 articles: cybercrime(58),cyber security(47),data breach(8),other(51)

CIC News update contains 140 English and 24 Dutch articles for today.
There are 5 published advisories, 0 are English and 5 are Dutch.
In today's English news articles:
- 49 related to cybercrime
- 42 related to cyber security
- 8 related to data breach and identity theft
- 41 for the category other news

In today's Dutch news articles:
- 9 related to cybercrime
- 5 related to cyber security
- 10 for the category other news

Have fun reading.

English cybercrime related news

Chinese aerospace exec arrested in connection with Boeing hackLocation: Beijing, China
Date published: 14-07-2014

milbul. Chinese aerospace exec arrested in connection with Boeing hack Chinese aerospace executive Su Bin is being held in custody in Canada on suspicion of hacking into the private data of global organizations holding military and defense contracts. It is believed Bin targeted companies holding inf... Read more

Source: itproportal.com

Top found tags: threat(1),United States(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Certificates associated with malware added to SSL BlacklistLocation: Bern, Switzerland
Date published: 16-07-2014

Introduced on Tuesday, the SSL Blacklist (SSLBL) is designed to aid in detecting botnet traffic that uses SSL to communicate, including Shylock malware and variants of the infamous Zeus trojan, according to a post on Swiss security blog abuse.ch. Noting an increase in attackers shifting to SSL in or... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),malware(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pushdo botnet gets DGA update, over 6,000 machines host new variantLocation: Georgia Institute of Technology - Atlanta, United States
Date published: 16-07-2014

The first half of 2013 saw a 355 percent uptick in social spam. Facebook is a big target. In less than a day, over 6,000 infected machines were updated with the new Pushdo variant. The Pushdo botnet, known for delivering a bevy of malware through its spamming module Cutwail, is being updated to leve... Read more

Source: www.scmagazine.com

Top found tags: United States(2),cybercrime(3),malware(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bitcoin pool GHash.io commits to 40% hashrate limit after its 51% breachLocation: Londen, United Kingdom
Date published: 16-07-2014

Further Reading [1030752757] After reaching 51% network power, Bitcoin mining pool says trust us GHash notes it has never attacked, double-spent against Bitcoin. Bitcoin pool GHash.io announced on Wednesdaythat it is not aiming to overcome This marks a clear departure from the large pool... Read more

Source: arstechnica.com

Top found tags: website(1),Anonymous(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vietnamese duo charged for credit card fraudLocation: Ho Chi Minh City, Vietnam
Date published: 15-07-2014

Ho Chi Minh City police have wrapped up their investigation of a couple who stand accused of using stolen credit card numbers to buy dozens of plane tickets between 2008 and 2010.Police asked prosecutors to charge Tran Cao Vu, 34, and Nguyen Hong Anh, 29 for online theft.Investigators found Vu and A... Read more

Source: www.thanhniennews.com

Top found tags: airport sector(2),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Norway banks hit in largest-ever DDoS attack, Anonymous 'takes credit'Location: Norg, Noordenveld, Drenthe, The Netherlands
Date published: 10-07-2014

Norway's top financial institutions have been hit in what appears to be a coordinated cyber-attack, the biggest-ever the country has experienced. Anonymous Norway may be responsible for the operation.The Tuesday attack targeted at least eight top Norway companies, including central Norges Bank, Spar... Read more

Source: rt.com

Top found tags: cybercrime(2),telecom sector(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Anatomy of an Anonymous AttackLocation: New York, United States
Date published: 11-07-2014

This infographic depicts the timeline of attacks perpetrated by hacktivist group Anonymous, notorious for its DDoS attacks on controversial organisations around the world. The infographic breaks down the processes of recruiting and communications, cyber probes and application attacks, and DDoS attem... Read more

Source: bitpipe.computerweekly.com

Top found tags: infographic(1),Anonymous(2),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crooks Reanimate A Dead Botnet To Target High-Value Bank AccountsLocation: Target HQ - Minneapolis, United States
Date published: 11-07-2014

In something that sounds like the plot of a Hollywood movie, hackers have reanimated an apparently dead botnet called Gameover Zeus even as malware researchers dismantled the previous version of the network.The botnet, essentially a collection of zombie computers that can be activated to perform den... Read more

Source: techcrunch.com

Top found tags: Zeus(1),cybercrime(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Arbor Networks Reports the Most Volumetric DDoS Attacks Ever in the First Half of 2014Location: Arbor Networks - Burlington, United States
Date published: 15-07-2014

BURLINGTON, Mass.--(Business Wire)--Arbor Networks Inc., a leading provider of DDoS and advanced threat protection solutions for enterprise and service provider networks, today released global DDoS attack data derived from its ATLAS threat monitoring infrastructure. The data shows an unparalleled... Read more

Source: www.digitaljournal.com

Top found tags: cybercrime(2),Google(2),Project Shield(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Angry Pirate, Imperial Barge: GCHQ's secret spy programmes revealedLocation: GCHQ - Cheltenham, United Kingdom
Date published: 15-07-2014

The hacking and spying techniques of the UK's Government Communications headquarters (GCHQ) have been exposed in the latest leak by Edward Snowden. The wide-ranging techniques include invasive methods for online surveillance, as well as some of the very techniques that the US and UK have harshly pro... Read more

Source: www.itproportal.com

Top found tags: telecom sector(4),United Kingdom(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
WHY HACKERS MAY BE IMPERSONATING YOUR COLLEAGUESLocation: Microsoft HQ - Redmond, United States
Date published: 16-07-2014

McAfee claims to have uncovered a spear phishing campaign in which hackers are exploiting Microsoft Word to access confidential data at a French firm.Yahoo France and La Poste email accounts are said to be used to send out malware to monitor networks, with hackers possibly impersonating the firm's e... Read more

Source: www.cbronline.com

Top found tags: government(2),phishing(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lucknow tops in cyber crime, state witnesses 81.5% spurtLocation: NCRB - New Delhi, India
Date published: 10-07-2014

ALLAHABAD: The state witnessed 81.5% spurt in cyber crime in 2013. National Crime Record Bureau (NCRB 2013) report states that 682 cases, including 372 under the IT Act and 310 under various sections of the IPC were registered with the police. The state capital reported the highest number of such ca... Read more

Source: timesofindia.indiatimes.com

Top found tags: government(2),police(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CYBER FRAUD: Taiwanese cybercrime syndicate bustedLocation: Taipei, Taiwan
Date published: 10-07-2014

ILOILO City Forty-three Taiwanese suspected of preying on their compatriots back home through online extortion were arrested in separate police raids in Mandurriao and Jaro districts.The Taiwanese, now under the Iloilo City Police Office (ICPO) custody, were members of a bigger cyber fraud syndi... Read more

Source: panaynewsphilippines.com

Top found tags: financial sector(2),telecom sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Shylock malware exits stage left, pursued by UK cyber policeLocation: National Crime Agency - London, United Kingdom
Date published: 10-07-2014

The UKs National Crime Agency has led a global campaign to knock out the Shylock malware, which infected at least 30,000 Windows PCs across the world and stole funds from victims online banking accounts.Command and control servers for Shylock, so named as its code contained quotes from Shakesp... Read more

Source: www.theguardian.com

Top found tags: United Kingdom(4),government(5),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
42 Taiwanese, 2 Chinese linked to fraud nabbedLocation: Taipei, Taiwan
Date published: 10-07-2014

ILOILO CITY (Updated) - The Philippine police arrested 44 foreigners who allegedly ran an online blackmail syndicate that defrauded victims in China and Taiwan by duping them into believing that their bank accounts have been used by money launderers or terrorists.The suspects were arrested in two hi... Read more

Source: www.sunstar.com.ph

Top found tags: government(3),cybercrime(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US and China in frank talks over cyber crimeLocation: Beijing, China
Date published: 10-07-2014

What have been described as frank talks on internet security have taken place between the US and China during the annual Strategic and Economic Dialogue meeting now in its fifth year.Its unclear if any progress was made in resuming a working group between the two states on cyber security af... Read more

Source: www.euronews.com

Top found tags: threat(1),China(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Greek Cyber Crime Unit Hires Two Young HackersLocation: New York, United States
Date published: 10-07-2014

The Greek Cyber Crime Unit recently managed to capture two hackers messing with Facebook, receiving a thank you note from the social networks representatives.It appears, however, that this unit has made several innovative decisions without holding back as other public services usually do. Accordi... Read more

Source: greece.greekreporter.com

Top found tags: police(1),social media(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber-Criminals Revive Pernicious GameOver Zeus MalwareLocation: National Crime Agency - London, United Kingdom
Date published: 11-07-2014

Five weeks after a global takedown of the Gameover Zeus botnet by law enforcement agencies in 11 countries - including Europol, the FBI and the UK's National Cyber Crime Unit - cybercriminals have begun to resurrect the pernicious malware.At the time of the takedown, the UK's National Crime Agency i... Read more

Source: www.ibtimes.co.uk

Top found tags: update(2),government(3),cybercrime(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Debra Williams blog: No-one is safe from cyber crimeLocation: London, United Kingdom
Date published: 11-07-2014

I WAS enjoying a quiet evening at home when the familiar tone of an email coming through could be heard. I should have ignored it until the morning.It alerted me that someone took out a mobile phone contract in my name, didn't pay the monthly charges and somehow I have ended up with a default for ... Read more

Source: www.southwales-eveningpost.co.uk

Top found tags: update(2),telecom sector(10),cybercrime(11)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trio held for duping girl with fake job offerLocation: New York, United States
Date published: 12-07-2014

HYDERABAD: Three persons were arrested on Friday on the charge of duping a girl by issuing her a fake appointment letter of a multinational company.The cyber crime wing of Cyberabad police identified the accused as P Praveen, G Venugopal Kalyan and Arshad Naveed. According to the 23-year-old girl, A... Read more

Source: timesofindia.indiatimes.com

Top found tags: financial sector(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber attacks target teleco industryLocation: Kaspersky HQ - Moscow, Russia
Date published: 11-07-2014

Kaspersky Lab has found that targeted cyber attacks are on the rise year-over-year, and also identified the business sectors most likely to be targeted.A survey of nearly 4,000 IT managers across 27 countries, revealed that 12% of all businesses reporting a targeted attack in 2013, has risen from th... Read more

Source: businesstech.co.za

Top found tags: antivirus(3),Kaspersky Lab(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime: FIA arrests two, seizes 15,000 illegal SIM cardsLocation: Punjab, India
Date published: 12-07-2014

LAHORE: The Cyber Crime Circle of the Federal Investigation Agency (FIA) has arrested two people dealing in unauthorised SIM cards, The Express Tribune has learnt.FIA Punjab Director Usman Anwar told The Express Tribune they had received information that Tahir Abbas, a resident of Green Cap Housing ... Read more

Source: tribune.com.pk

Top found tags: cybercrime(2),government(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nigerian arrested for cyber fraudLocation: Mumbai, India
Date published: 12-07-2014

Hyderabad: In a major breakthrough in the series of increasing frauds, the Cyber Crime Police, Cyberabad, arrested Israel Chimezie, 35, a native of Nigeria, in connection with a fraud to the tune of Rs 10.9 lakh reported in April.A message from the accused (presently residing at Mumbai) calling for ... Read more

Source: www.thehansindia.com

Top found tags: report(1),cybercrime(2),Nigeria(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Most cyber crime accused are friends-turned foesLocation: Kochi, India
Date published: 12-07-2014

KOCHI: In an alarming fact, the data available with the police shows that the accused in the majority of cyber crime incidents reported in Kochi are relatives, friends and neighbours of the complainant. The motive for most cyber crimes are eve teasing, defamation and harassment.As per the data relea... Read more

Source: www.newindianexpress.com

Top found tags: education(2),cybercrime(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
7 more cells to check e-crimes in AhmedabadLocation: Ahmedabad, India
Date published: 14-07-2014

AHMEDABAD: It was in December 2007 when the state had reported its first cyber crime. A 22-year-old college student from Ahmedabad had vented his anger online against a girl with whom he was in one-sided love affair and was crestfallen when rejected. He decided to get even and posted her morphed pho... Read more

Source: timesofindia.indiatimes.com

Top found tags: financial sector(4),cybercrime(6),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CERT-In reports over 62,000 cyber attacks till May 2014: GovtLocation: New Delhi,India
Date published: 14-07-2014

New Delhi: Government's cyber security arm Computer Emergency Response Team-India (CERT-In) reported 62,189 cyber security incidents in the first five months of the current calendar year, Parliament was informed today. Similarly, the government body reported that 9,174 Indian websites were hacked by... Read more

Source: zeenews.india.com

Top found tags: Anonymous(2),government(5),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brazilian users hit by largest cyber crime heist in historyLocation: Brasilia-Federal District, Brazil
Date published: 14-07-2014

A scheme which has been skimming funds from Brazilian bank payments over the past two years may be the largest cyber crime heist in history. According to Bit Community, the amount stolen was around $3.75 billion. The scheme targets a Brazilian payment system called the Boleto, which can be issued on... Read more

Source: itsecurityguru.org

Top found tags: RSA(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese Executive charged of hacking on Boeing and other defense contractorsLocation: Beijing, China
Date published: 14-07-2014

Chinese Executive charged of Hacking on Boeing and other defense contractors to steal military data and advanced technologic projects.According to a US criminal complaint, computers of Boeing and other military contractors have been hacked to steal intellectual property and trade secrets on transpor... Read more

Source: securityaffairs.co

Top found tags: government(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime cell gets a new laboratoryLocation: New York, United States
Date published: 15-07-2014

The Cyber Crime Cell of the City Police has been equipped with a cyber laboratory containing a host of gadgets to aid the investigation.The laboratory has now enabled investigators to analyse cyber-related data instead of being dependant on other sister agencies.Sophisticated equipment including cal... Read more

Source: www.thehindu.com

Top found tags: threat(1),telecom sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tech Hub Has no Cyber Lab to Give Certified ReportsLocation: Bangalore, Karnataka, India
Date published: 16-07-2014

BANGALORE: Bangalores IT tag may be its pride, but when it comes to facilities to probe cyber-related crimes, it lags behind cities like Ahmedabad and Hyderabad.Even 14 years after it witnessed an IT boom, the city does not have a cyber laboratory that can give certified forensic reports. This, d... Read more

Source: www.newindianexpress.com

Top found tags: cybercrime(3),government(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Karen Bradley's Speech to the Finance Services Cybercrime SummitLocation: National Crime Agency - London, United Kingdom
Date published: 15-07-2014

83% of households in the UK have access to the internet, and 3 in 4 adults use the internet every day.Were doing our supermarket shopping on our smartphone on the train, booking a summer holiday on our tablets, and talking to colleagues and friends across the world over the internet. This provide... Read more

Source: www.gov.uk

Top found tags: telecom sector(6),cybercrime(7),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Botnets infecting 18 systems per second, warns FBILocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 16-07-2014

Criminals are developing increasingly sophisticated attack strategies that let them infect as many as 18 systems per second with their botnet armies, according to the FBI.FBI assistant director Joseph Demarest revealed the statistic while briefing a Senate sub-committee about the agency's current an... Read more

Source: www.v3.co.uk

Top found tags: government(3),financial sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
600 arrests in child abuse investigation on industrial scaleLocation: National Crime Agency - London, United Kingdom
Date published: 16-07-2014

More than 660 suspected paedophiles have arrested in the UKs largest ever child abuse cyber crime operation.They include doctors, teachers, care workers, scout leaders and former police officers from across the UK.The National Crime Agency (NCA) says more than 400 children have been, as they put ... Read more

Source: blogs.channel4.com

Top found tags: health sector(2),medical sector(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Digital fraudster tetereff' gets five years hard timeLocation: National Crime Agency - London, United Kingdom
Date published: 16-07-2014

Estonian hacker Andrei Sergejev has been sentenced to five years in prison, following his arrest in March 2012.The UK National Crime Agency (NCA) announced his sentencing in a statement on Wednesday. The sentencing comes one month after Sergejev, known as \"tetereff\" online, pleaded guilty to 12 ch... Read more

Source: www.v3.co.uk

Top found tags: United Kingdom(2),cybercrime(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Operation Notarise: a snapshot of child abuse in the UKLocation: National Crime Agency - London, United Kingdom
Date published: 16-07-2014

Results of Operation Notarise serve only to underline the complexity and scale of the problem facing law enforcement.Of the 660 suspects arrested, the only common thread was that they used the internet to look up pictures of children being sexually abused. There was no single website, no organised p... Read more

Source: www.theguardian.com

Top found tags: United Kingdom(2),Internet Watch Foundation(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DHS accidentally releases 800+ pages about critical infrastructure cyber attacksLocation: Aurora, United States
Date published: 09-07-2014

Researchers who submitted a FOIA request about Operation Aurora, a 2010 cyber attack, were surprised to receive 840 pages on the wrong \"Aurora\"--an experiment demonstrating physical damage to water plants and gas utilities. It is a major proof of concept for physical effects of cyber attacks on cr... Read more

Source: www.hacksurfer.com

Top found tags: research(1),cybercrime(2),DHS(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senate subcommittee looks to stop botnet threatLocation: Federal Trade Commission - Washington, United States
Date published: 17-07-2014

Attackers brute-force POS systems utilizing RDP in global botnet operation In a Tuesday hearing, a Senate subcommittee heard testimony from government and private sector security experts over the botnet explosion. Concerned that botnets can marshal a virtual army of millions, most of whom have no... Read more

Source: www.scmagazine.com

Top found tags: United States(4),government(7),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Skiddes turn Amazon cloud into 'crime-as-a-service' security bodLocation: GoDaddy HQ - Scottsdale, United States
Date published: 17-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Amazon Web Services' share of cloud-hosted malware-slingers has more than doubled in the last six months. That's according to NTT subsidiary Solutionary, which revealed the finding in its Q2 2014 Security Engineering Research Team (SERT) rep... Read more

Source: go.theregister.com

Top found tags: malware(2),trojan(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Q2 2014 DDoS attacks: Heavier and in higher volumeLocation: Arbor Networks - Burlington, United States
Date published: 17-07-2014

The first half of 2014 has seen the most volumetric DDoS attacks on record, making the attack events heavier and more difficult for corporations to cope with. According to the Q2 ATLAS report released by Arbor Networks, there has been double the number of DDoS events reaching over 20Gbps in comparis... Read more

Source: www.zdnet.com

Top found tags: Google(2),Project Shield(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pushdo Trojan infects 11,000 systems in 24 hoursLocation: Hanoi, Vietnam
Date published: 17-07-2014

[click-infe]Bitdefender has discovered that a new variant of the Trojan component, Pushdo, has emerged. 77 machines have been infected in the UK via the botnet in the past 24 hours, with more than 11,000 infections reported worldwide in the same period. The countries most affected so far by the Push... Read more

Source: net-security.org

Top found tags: malware(2),trojan(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Juniper Networks boosts DDoS protection for service providersLocation: Juniper Networks - Sunnyvale, United States
Date published: 17-07-2014

DDoS Secure is designed to defend websites against flood and application layer distributed denial of service (DDoS) attacks. DDoS-style attacks have been on the rise in the last year, according to a report by Arbor Networks in January, as many attackers have been learning from other attempts. DDoS a... Read more

Source: www.zdnet.com

Top found tags: Juniper Networks(2),DoS(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google recruits top PS3 hacker for Project ZeroLocation: Google HQ - Mountain View, United States
Date published: 17-07-2014

Google has hired a prolific hacker by the name of George Hotz to join the Project Zero team. Hotz is well-known for hacking Sony's PlayStation 3 and Apple's iPhone. The 24-year-old also known as geohot hacked into the PlayStation 3 in order to install alternate operating system software, wit... Read more

Source: www.zdnet.com

Top found tags: vulnerability(2),cybercrime(3),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2014 DDoS attacks: Heavier and in higher volumeLocation: Arbor Networks - Burlington, United States
Date published: 17-07-2014

The first half of 2014 has seen the most volumetric DDoS attacks on record, making the attack events heavier and more difficult for corporations to cope with. According to the Q2 ATLAS report released by Arbor Networks, there has been double the number of DDoS events reaching over 20Gbps in comparis... Read more

Source: www.zdnet.com

Top found tags: Google(2),Project Shield(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Heres How Easy It Could Be for Hackers to Control Your Hotel RoomLocation: Apple HQ - Cupertino, United States
Date published: 17-07-2014

A view of the St. Regis Shenzhen hotel. A view of the St. Regis Shenzhen hotel. [gallery-ca] St. Regis Shenzhen is the Silicon Valley of mainland China. Situated about 50 minutes north of Hong Kong, the modern city is home to the Shenzhen Stock Exchange and numerous high-tech giants and startups. So... Read more

Source: wired.com

Top found tags: trojan(2),vulnerability(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Botnets gain 18 infected systems per secondLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 17-07-2014

"According to industry estimates, botnets have caused over $9 billion in losses to US victims and over $110 billion in losses globally. Approximately 500 million computers are infected globally each year, translating into 18 victims per second," Joseph Demarest, assistant director for FBI's Cyber Di... Read more

Source: net-security.org

Top found tags: government(4),cybercrime(6),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Estonian Man Sentenced to Prison in UK for Cyber FraudLocation: National Crime Agency - London, United Kingdom
Date published: 17-07-2014

An Estonian national who admitted stealing personal information and creating fake identification documents has been sentenced to prison, the United Kingdom's National Crime Agency (NCA) announced on Wednesday. According to the agency, 42-year-old Andrei Sergejev, known online as "tetereff," was arre... Read more

Source: securityweek.com

Top found tags: financial sector(2),United Kingdom(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pushdo Trojan outbreak: 11 THOUSAND systems infected in just 24 hoursLocation: Hanoi, Vietnam
Date published: 17-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines A wave of attacks by cybercrooks pushing a new variant of the resilient Pushdo Trojan has compromised more than 11,000 systems in just 24 hours. Indian PCs have been most affected by the outbreak, but systems in the UK, France and the US hav... Read more

Source: go.theregister.com

Top found tags: United Kingdom(2),cybercrime(4),malware(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Five Vulnerabilities Fixed in Apache Web ServerLocation: Day, United States
Date published: 17-07-2014

There are five vulnerabilities fixed in the latestrelease of the Apache Web server, including a buffer overflow and several denial-of-service vulnerabilities. Fixes for these flaws have landed in the developer release of the server, 2.4.10-dev. The buffer overflow vulnerability is rated moderate b... Read more

Source: threatpost.com

Top found tags: cybercrime(2),DoS(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

vBulletin vulnerable to SQL injectionLocation: vBulletin - Segundo, United States
Date published: 16-07-2014

A Romanian hacking community has discovered and responsibly reported a critical SQL injection vulnerability found in the latest version (5.1.2) of the popular web forum software vBulletin. The flaw could allow attackers to inject an SQL command and getting their hands on administrator credentials, w... Read more

Source: net-security.org

Top found tags: website(1),cyber security(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Are TrueCrypt Users Screwed?Location: Microsoft HQ - Redmond, United States
Date published: 16-07-2014

The anonymous developers of the free and hugely popular TrueCrypt disk encryption program dropped a bombshell at the end of May when they abruptly abandoned the project. The top of TrueCrypt's website was emblazoned with the following message in red: "WARNING: Using TrueCrypt is not secure as it may... Read more

Source: www.esecurityplanet.com

Top found tags: United Kingdom(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Comodo Internet Security Pro 2014 reviewLocation: Comodo Group HQ - Clifton, United States
Date published: 16-07-2014

Company. Comodo Price $40 (23) for 3 devices, 1 year Website comodo.com Good Points Automatic sandboxing Complete secure browser 24/7 online support Nicely priced Bad Points A few false positives No bells or whistles such as backup Comodo Internet Security Pro 2014 review S... Read more

Source: itproportal.com

Top found tags: cybercrime(3),cyber security(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
96% of IT companies hit by serious security incident in 2013Location: Berlin, Germany
Date published: 15-07-2014

96% of IT companies hit by serious security incident in 2013. Just a third of IT companies are confident that security solutions will get to a level high enough to provide effective protection for their organisation in the future. Related: Cybersecurity scourge causes 70% of critical infrastructure ... Read more

Source: itproportal.com

Top found tags: mobile device(2),security management(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Artist sends the world's most secure mixtape to the NSALocation: National Security Agency - Fort Meade, United States
Date published: 15-07-2014

milbul. Artist sends the world's most secure mixtape to the NSA David Huerta, an artist and software engineer has sent an encrypted mixtape to the NSA which he says they will never be able to crack. Huerta made the tape as a response to the NSA's publishing of Edward Snowden's documents online and a... Read more

Source: itproportal.com

Top found tags: government(2),social media(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Are iPhones a security threat? Apple rejects Chinese claimsLocation: Apple HQ - Cupertino, United States
Date published: 15-07-2014

Are iPhones a security threat? Apple rejects Chinese claims. In a carefully and respectfully worded post on Apples Chinese website the company denied claims made on Chinese television that iPhones were a concern to national security. The post stated that Apple appreciates the television sta... Read more

Source: itproportal.com

Top found tags: United States(2),government(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Your money or your website!" Russian hacker group ransoms CNET for BitcoinsLocation: Bank of America HQ - Charlotte, United States
Date published: 15-07-2014

AlysiaJudge. "Your money or your website!" Russian hacker group ransoms CNET for Bitcoins Technology news website CNET has fallen prey to an attack by the Russian hacker group w0rm who attempted to ransom the personal data of more than one million users. The cybercriminals managed to steal usernames... Read more

Source: itproportal.com

Top found tags: social media(2),cybercrime(5),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBay execs shed more light on Q2 hacking, look toward recoveryLocation: eBay - San Jose, United States
Date published: 16-07-2014

More about e-commerce strategies "The cyber attack clearly impacted eBays performance in the second quarter, admitted CEO John Donahoe during the quarterly shareholders call. Donahoe asserted that eBay was performing above expectations for at least the first half of the second quarter. "We got... Read more

Source: www.zdnet.com

Top found tags: password(1),cybercrime(2),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Law Enforcement Asks Congress for More Power Against Botnet OperatorsLocation: White, United States
Date published: 16-07-2014

Senate Subcommittee on Crime and Terrorism Conducts Hearing on Botnets and Cybercrime Cyber-attackers are increasingly using botnets to drive their criminal enterprises, whether they are sending spam, infecting computers with malware, or launching denial-of-service attacks, experts testified at a Se... Read more

Source: securityweek.com

Top found tags: United States(6),cybercrime(8),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden Deserves Protection From Prosecution: UN Rights ChiefLocation: National Security Agency - Fort Meade, United States
Date published: 16-07-2014

GENEVA - Fugitive US intelligence agent Edward Snowden deserves shielding from prosecution for having thrown the spotlight on state snooping, UN human rights chief Navi Pillay said Wednesday. "Those who disclose human rights violations should be protected. We need them," Pillay told reporters. "And ... Read more

Source: securityweek.com

Top found tags: United States(4),government(7),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amazon Web Services Increasingly Used to Host Malware: ReportLocation: GoDaddy HQ - Scottsdale, United States
Date published: 16-07-2014

The Security Engineering Research Team (SERT) at managed security services provider Solutionary has published its threat intelligence report for the second quarter of 2014. Data from the company's honeypots and honeynets shows that 56% of captured malware was hosted in the United States, which repre... Read more

Source: securityweek.com

Top found tags: trend(2),United Kingdom(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CISOs breaking free from IT control, missing board supportLocation: Londen, United Kingdom
Date published: 15-07-2014

Some of the UK's chief information security officers (CISOs) are breaking away from IT budgets and reporting lines but are still missing C-level support, a new study reveals. CISOs breaking free from IT control, missing board support CISOs breaking free from IT control, missing board support IT cons... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Compromised Japanese porn websites distribute banking trojanLocation: Tokio, Japan
Date published: 16-07-2014

Pwnium 4 prizes aimed at Chrome OS hacks Aibatook only targets Japanese companies, but the malware can easily be repurposed for use in the U.S. Attackers have compromised popular Japanese adult websites in order to distribute a trojan that is primarily targeting customers of two major banks in the c... Read more

Source: www.scmagazine.com

Top found tags: United States(2),website(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mathematics makes strong case that snoopy2 can be just fine as a passwordLocation: New York Times - New York, United States
Date published: 16-07-2014

passwords to lock down your digital assets. Never use the same password across two or more accounts. In abstract terms, the dictates are some of the best ways to protect against breaches suffered by one sitesay, the one that hit Gawker in 2010 that exposed poorly cryptographically scrambled passw... Read more

Source: arstechnica.com Drie gevaren van botnet-aanvallen | Er zijn een aantal manieren waarop botnets uw bedrijf schade kunnen toebrengenEen botnet bestaat uit een netwerk van door hackers overgenomen computers die voor cyberaanvallen worden ingezet. Maar er zijn drie specifieke gevaren van botnets waar u als bedrijf rekening mee moet houden.DDoS-aanvallenDe bekendste manier waarop botnets kunnen worden ingezet is toch wel de DDoS-aanval. Bij een DDoS-aanval, wat staat voor Distributed Denial of Service, wordt een server aangevallen via een netwerk van computer, met de bedoeling om deze onbruikbaar te maken. Heel veel computers, waar cybercriminelen de controle over hebben verkregen, maken dan tegelijkertijd verbinding met n server.Deze aanvallen worden gepleegd om bijvoorbeeld websites uit de lucht te kunnen halen of moeilijk bereikbaar te maken. Elke minuut dat een website onbereikbaar is, loopt u als bedrijf geld mis, bijvoorbeeld door misgelopen kliks, weglopende bezoekers en natuurlijk door de hoge kosten om de schade te herstellen.Ongewenste e-mailsBotnets kunnen worden ingezet om ongewenste e-mails, oftewel spam te versturen. Hoewel deze aanvallen normaal gesproken vooral gelinkt worden aan desktops, vinden er tegenwoordig ook steeds vaker aanvallen plaats op mobiele apparaten, zoals smartphones. En met de opkomst van the Internet of Things blijkt het zelfs mogelijk dat domotica wordt ingezet voor het versturen van spam.Het gevolg van deze aanvallen is dat de bandbreedte en de rekenkracht van het slachtoffer van het botnet overbelast raken. Wanneer dit gebeurt bij medewerkers van bedrijven, zullen deze bijvoorbeeld tijdelijk niet kunnen werken. Dit is dus een nadelig effect op de productiviteit van werknemers.IdentiteitsdiefstalTen slotte kunnen botnets ook gebruikt worden voor identiteitsdiefstal. Via botnets kunnen namelijk allerlei gegevens worden gestolen, zoals gevoelige bedrijfsdata, inloggegevens en persoonlijke informatie van uw klanten en medewerkers. Met deze informatie kunnen hackers vervolgens inloggen op accounts van hun slachtoffers en kunnen de hackers zich op die manier voordoen als hun slachtoffer. Zij kunnen dan bijvoorbeeld creditcard fraude plegen en ze kunnen toegang krijgen tot data die staat opgeslagen binnen het account van deze persoon.Door deze grote risicos als gevolg van botnet-aanvallen, gaat het Kabinet zich ook inzetten voor de bestrijding van botnets. Er zijn ook zeker maatregelen nodig, aangezien onlangs is gebleken dat botnets nog lang blijven bestaan wanneer het botnet al is opgeheven. | http://www.marqit.nl/newsitem/13216/drie-gevaren-van-botnet-aanvallen | 11-07-2014 | www.marqit.nl

Top found tags: website(1),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Miljoen voor onderzoek cyber securityLocation: Wier, Menaldumadeel, Friesland, The Netherlands
Date published: 14-07-2014

In totaal krijgen vijf UT-onderzoeksprojecten op het gebied van cyber security een subsidie n miljoen euro van de Nederlandse Organisatie voor Wetenschappelijk Onderzoek (NWO).De projecten van onderzoeksinstituut CTIT dragen bij aan het vergroten van de veiligheid van de digitale samenleving, zo... Read more

Source: www.utnieuws.nl

Top found tags: government(2),DoS(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brazil cybertheft could be biggest everLocation: Brasilia-Federal District, Brazil
Date published: 10-07-2014

A scheme that has been skimming funds from Brazilian bank payments over the past two years may be the largest cybercrime heist in history, at some US$3.75 billion, security researchers say.WASHINGTON: A scheme that has been skimming funds from Brazilian bank payments over the past two years may be t... Read more

Source: www.channelnewsasia.com

Top found tags: cyber security(4),financial sector(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US firm helps Hamas, Netanyahu keep hackers at bayLocation: Tel Aviv, Israel
Date published: 14-07-2014

Both the terror group and the premier are customers of CloudFlare; even the IDF has used its DDOS protectionThere isnt much Prime Minister Benjamin Netanyahu and Hamas have in common but one thing they do agree on is how to keep their websites safe from hackers. Both rely on a web service cal... Read more

Source: www.timesofisrael.com

Top found tags: cybercrime(4),cyber security(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why Australia is the No.1 DDoS targetLocation: Sydney, Australia
Date published: 16-07-2014

Organisations all over the world are increasingly experiencing disruptive cyber-attacks, especially Distributed Denial of Service (DDoS) attacks, but it has now become clear that Australia is being hit the hardest.A DDoS attack makes machines or network resources unavailable to users. It works by fl... Read more

Source: www.businessspectator.com.au

Top found tags: DoS(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The threat of Cyber crimeLocation: European Cybercrime Centre - Den Haag, The Netherlands
Date published: 10-07-2014

By Robin Murray Brown of London-based executive search firm, Tyzack www.tyzackpartners.comWhilst the digital era provides substantial opportunities for corporate growth and expansion, it also brings unprecedented challenges in relation to company security, and particularly the security of custom... Read more

Source: www.thelondoneconomic.com

Top found tags: telecom sector(2),cybercrime(7),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Prevention is better than cureLocation: GCHQ - Cheltenham, United Kingdom
Date published: 12-07-2014

CYBERSPACE WILL NEVER be completely secure. The threats posed by what Sir David Omand, an academic and former head of Britains GCHQ intelligence agency, calls the cesspit of modernityonline crime, espionage, sabotage and subversionare not going to disappear. Nor is the temptation for ... Read more

Source: www.economist.com

Top found tags: Bruce Schneier(4),United Kingdom(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers IncLocation: Seoul, South Korea
Date published: 12-07-2014

AT 2PM ON March 20th 2013 the hard drives of tens of thousands of computers in South Korea were suddenly wiped clean in a massive cyber-attack. The main targets were banks and news agencies. At first the assault looked like a case of cyber-vandalism. But as they probed deeper, the computer sleuths i... Read more

Source: www.economist.com

Top found tags: South Korea(4),malware(5),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Growing Problem of Cyber Crime [Infographic]Location:
Date published: 11-07-2014

I think cyber crime is one of those things that you never thing is going to happen to you especially if youre a geek but these statistics tell us otherwise. In fact, mobile devices are the most at risk connected device with only 50% of users using basic security precautions.Social media i... Read more

Source: churchm.ag

Top found tags: social media(2),telecom sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New cyber fraud virus sparks police alertLocation: London, United Kingdom
Date published: 14-07-2014

Police are warning people to step up security to stop cyber fraudsters targeting their personal files, after attacks featuring a new computer virus.The National Fraud Intelligence Bureau has recently received a number of reports relating to malicious software known as Cryptowall.Cryptowall is ... Read more

Source: www.chad.co.uk

Top found tags: cyber security(2),malware(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AG Quintet Gathers In London For Cyber Crime SummitLocation: National Crime Agency - London, United Kingdom
Date published: 15-07-2014

Last week brought together the Attorneys General of the UK, the US, Canada, Australia and New Zealand for their annual meeting to discuss challenges posed by cyber crime and ways of boosting international efforts to fight it. The first meeting took place in 2009 in London and the UK capital played h... Read more

Source: www.misco.co.uk

Top found tags: social media(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CISA Drawing Major Criticism as the U.S. Government Tries to Crackdown on Cyber CrimeLocation: New York, United States
Date published: 15-07-2014

Last week, the U.S. Senate Intelligence Committee approved the Cybersecurity Information Sharing Act 2014 (CISA) which seeks to seriously expand the information gathering abilities of U.S. intelligence organizations by authorizing voluntary sharing of information between these government organizatio... Read more

Source: www.technavio.com

Top found tags: United States(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A Lesson in Why You Should Be Wary of Public ComputersLocation: New York, United States
Date published: 17-07-2014

Porta-Johns, Kings Commode, Royal Throne, Porta-Pottiesthere are countless names for the portable restroom, but they all share two traits: theyre useful when needed, but they often leave the user feeling unclean. The same principal, sadly, also applies to publicly available computers. Libra... Read more

Source: blogs.mcafee.com

Top found tags: cybercrime(6),cyber security(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UN to Five Eyes nations: Your mass surveillance is breaking the lawLocation: National Security Agency - Fort Meade, United States
Date published: 17-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Edward Snowden should be shielded from prosecution because the world needs people willing to expose violations of human rights, says the UN's High Commissioner for Human rights Navi Pillay. Speaking at the launch of a report into digital pri... Read more

Source: go.theregister.com

Top found tags: cyber security(2),United States(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LibreSSL RNG bug fix: What's all the forking fuss about, ask devsLocation: Kaspersky HQ - Moscow, Russia
Date published: 17-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines A bug found and fixed in LibreSSL, the OpenSSL fork maintained by OpenBSD developers, is catastrophic" or "overblown", depending on whom you talk to. Just days after the release of a portable version of the crypto library, a flaw was repo... Read more

Source: go.theregister.com

Top found tags: United States(2),Kaspersky Lab(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft security critic Aorato in Redmond giant's buyout sightsLocation: Microsoft HQ - Redmond, United States
Date published: 17-07-2014

in the Wall Street Journal. Microsoft is said to have made an offer for Aorato, a Tel Aviv-based company that has made a business of uncovering and remediating holes in Microsoft's security schemes for Active Directory made all the worse by the fact that they appear to be "design flaws", accordi... Read more

Source: www.zdnet.com

Top found tags: Windows(1),cyber security(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Flaws found in Bitdefender enterprise endpoint managerLocation: New York, United States
Date published: 17-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Holes have been reported in Bitdefender's Gravity end-point protection platform that allow hackers to target corporate infrastructure. Researcher Stefan Viehbock of SEC Consult Vulnerability Lab said the flaw affecting the latest version pro... Read more

Source: go.theregister.com

Top found tags: patch(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
WordPress plugin vulnerabilities affect over 20 million downloadsLocation: WordPress - San Francisco, United States
Date published: 17-07-2014

A new vulnerability in WordPress plugin WPTouch highlights a series of recent discoveries that critically affect active plugins downloaded and used by millions of WordPress bloggers. Since May, security company Sucuri has found serious security holes in WordPress plugins WPTouch (5,670,626 downloads... Read more

Source: www.zdnet.com

Top found tags: update(2),vulnerability(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft's Bing follows Google in offering Europeans the 'right to be forgotten'Location: Microsoft HQ - Redmond, United States
Date published: 17-07-2014

Microsoft's Bing follows Google in offering Europeans the 'right to be forgotten' Microsoft has started accepting requests from users in Europe who want to remove search links from Bing under a recent right-to-be-forgotten ruling by Europes top court. The company has asked European resident... Read more

Source: www.pcworld.com

Top found tags: cyber security(2),EU(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
European Authorities Take Down Cybercrime OperationLocation: Europol HQ - Den Haag, The Netherlands
Date published: 17-07-2014

An international cybercrime operation that targeted money transfer services throughout Europe was taken down this week in a joint operation involving law enforcement agencies in Europe. According to authorities at Europol, the cybercrime network was comprised mostly of Romanian citizens. The law enf... Read more

Source: securityweek.com

Top found tags: cyber security(4),financial sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminals Roll Out New Variant of PushDo MalwareLocation: Seoul, South Korea
Date published: 17-07-2014

A new variant of the PushDo malware has already been distributed to tens of thousands of computers across the globe, researchers from Bitdefender reported. After analyzing the threat, the security firm determined that its authors have made some significant changes compared to earlier PushDo variants... Read more

Source: securityweek.com

Top found tags: update(2),malware(3),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CISO Challenge: Flexible Mobile ManagementLocation: New York, United States
Date published: 17-07-2014

These days the mobile fleet in most organization breaks down into three categories: corporate-owned devices, shared corporate-owned devices (tablets for events, point of sale, or for QA testing and field services teams that take them to service calls), and BYOD devices. While most organizations stil... Read more

Source: securityweek.com

Top found tags: cyber security(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Embedded WinXP systems targeted by new Chinese malwareLocation: Microsoft HQ - Redmond, United States
Date published: 17-07-2014

Chinese firm uses unusual techniques to infected legacy computer systems Embedded WinXP systems targeted by new Chinese malware Embedded WinXP systems targeted by new Chinese malware A research firm has spotted a piece of Windows XP malware designed specifically for embedded systems - effectively ma... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(2),financial sector(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Subcontractor breach impacts 1,700 in Dominion Resources employee wellness planLocation: Rich, United States
Date published: 17-07-2014

About 1,700 people in the employee wellness program for Virginia-based Dominion Resources are being notified that their personal information was accessed by an attacker who gained entry to the systems of a subcontractor, Onsite Health Diagnostics. How many victims? About 1,700. What type of personal... Read more

Source: www.scmagazine.com

Top found tags: patch(1),cyber security(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple Implements Email Encryption in Transit For iCloudLocation: Google HQ - Mountain View, United States
Date published: 17-07-2014

Apple quietly began encrypting virtually all of the email flowing in and out of its servers for its iCloud.com, mac.com and me.com domains, a move that throws up an important roadblock for attackers and others attempting to snoop on those transmissions. The change from Apple comes as security expert... Read more

Source: threatpost.com

Top found tags: privacy(1),report(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dealing With Open Wi-Fi and Public HotspotsLocation: New York, United States
Date published: 17-07-2014

The topic of open Wi-Fi and public hotspots has been in the news again, for several reasons. Last month, the Electronic Frontier Foundation launched OpenWireless.org, a project to create router firmware that would provide open wirelessaccess toanyone in range of the users router. Notionally, ... Read more

Source: trendmicro.com

Top found tags: password(1),cyber security(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android apps too free and easy with access permissionsLocation: Google HQ - Mountain View, United States
Date published: 17-07-2014

Android apps ask for far too many device and data permissions, with 68 percent of 75,000 apps scanned requiring the ability to generate text messages, according to new research. Android apps too free and easy with access permissions Android apps too free and easy with access permissions The analysis... Read more

Source: www.scmagazineuk.com

Top found tags: mobile device(2),cybercrime(3),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Document posted to California city website, employee data accessedLocation: California, United States
Date published: 16-07-2014

In California, the City of Encinitas and San Dieguito Water District is notifying 615 current and former employees that a California Public Employees' Retirement System (CalPERS) payment document containing their personal information including Social Security numbers was inadvertently made p... Read more

Source: www.scmagazine.com

Top found tags: EN(1),website(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Internet of Things and Cybercrime what risks?Location: European Parliament - Brussel, Beglium
Date published: 10-07-2014

Analysis of the compliance measures to be put in place in order to face data protection issues affecting the Internet of Things.The Internet of Things is expected to lead to 50 billion connected devices by 2020 collecting and exchanging personal data about their users, their lives, their preferences... Read more

Source: securityaffairs.co

Top found tags: security measures(2),cybercrime(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime insurance boom?Location: Neiman Marcus - Dallas, United States
Date published: 14-07-2014

Insurers are eagerly eyeing exponential growth in the tiny cyber coverage market but their lack of experience and skills handling hackers and data breaches may keep their ambitions in check.High profile cases of hackers seizing sensitive customer data from companies, such as US retailer Target C... Read more

Source: www.therakyatpost.com

Top found tags: data breach(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Infographic The Biggest Attacks In History Cyber SecurityLocation: Berlin, Germany
Date published: 15-07-2014

$8.9 million the annual average cost of cyber crime for a global company.$300 billion -$1 trillion the low to high cost estimate of how much is lost globally through cyber crime on an annual basis, as calculated by McAfee in 2012.55% of UK companies have been a victim of data theft in the past year.... Read more

Source: www.infographicscreator.com

Top found tags: telecom sector(2),United Kingdom(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
49% of security pros think Java apps are vulnerable to attacksLocation: Oracle - Redwood City, United States
Date published: 17-07-2014

In a recent poll, half of the senior IT professionals polled said their Java applications are vulnerable (32%) or very vulnerable (17%) to attacks. They cited insecure coding (60%) and vulnerabilities in third party libraries (25%) as the leading threats. Meanwhile, nearly 90 percent of respondents ... Read more

Source: net-security.org

Top found tags: threat(1),vulnerability(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Major healthcare IT security issues unearthed in worrying reportLocation: Major, United States
Date published: 17-07-2014

Major healthcare IT security issues unearthed in worrying report. Vendors are not being held accountable for meeting minimum security standards by healthcare organisations, claims a new survey. Carried out by security risk management firm Corl Technologies, the research claims that more than half of... Read more

Source: itproportal.com

Top found tags: information sharing(2),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IT security pros prioritise new tech over trainingLocation: New York, United States
Date published: 17-07-2014

New research from IT security vendor Websense and Ponemon Institute indicates that security professionals want their companies to invest in new technology, but are doing little to 'upskill' existing staff. IT security pros prioritise new tech over training IT security pros prioritise new tech over t... Read more

Source: www.scmagazineuk.com

Top found tags: information security(2),Ponemon Institute(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBay counts the cost after 'challenging' data breachLocation: eBay - San Jose, United States
Date published: 17-07-2014

John Donahoe, the chief executive officer of eBay, has confirmed that May's data breach has had a negative impact on revenues and user activity. eBay counts the cost after 'challenging' data breach eBay counts the cost after 'challenging' data breach Donahoe was speaking during the firm's second-qua... Read more

Source: www.scmagazineuk.com

Top found tags: RSA(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

NIST to NSA: get your hands off our encryption (please)Location: National Institute of Standards - Gaithersburg, United States
Date published: 16-07-2014

NIST cryptographers want to be able to reject NSA guidance. NIST to NSA: get your hands off our encryption (please) NIST to NSA: get your hands off our encryption (please) A working/advisory group set up by NIST - the US National Institute for Standards and Technology - to look at reports that the N... Read more

Source: www.scmagazineuk.com

Top found tags: DHS(4),United States(6),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google enlists top hacker for Project Zero campaignLocation: Google HQ - Mountain View, United States
Date published: 16-07-2014

Google enlists top hacker for Project Zero campaign. Prolific hacker George Hotz has been enlisted by Google as a key part of its new Project Zero team that is designed to identify critical bugs and vulnerabilities in all software. Related: George Geohot Hotz has taken a job at Facebook Hotz, ... Read more

Source: itproportal.com

Top found tags: vulnerability(2),telecom sector(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK and European SMBs shun cloud backup due to security worriesLocation: Pacific, United States
Date published: 15-07-2014

UK and European SMBs shun cloud backup due to security worries. Small and medium sized businesses [SMBs] in the UK and Western Europe are trailing US companies when it comes to backing up data to the cloud as security worries dog the uptake of cloud computing. Related: Whitepaper: Why cloud backup? ... Read more

Source: itproportal.com

Top found tags: survey(1),Germany(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is use-after-free exploitation dead? The new IE memory protector will tell youLocation: Microsoft HQ - Redmond, United States
Date published: 16-07-2014

The Isolated Heap for DOM objects included in the Microsoft Patch Tuesday for June 2014 was just a fire drill aimed at making the exploitation of use-after-free (UAF) vulnerabilities more difficult. The patch for July 2014, however, has been quite a shock to exploit developers! In this release, Micr... Read more

Source: blog.fortinet.com Nederland versterkt cybertroepen | Achtergrond - Het aantal Nederlandse onderzoekers en analytici naar cybercrime en digitale spionage wordt verder verhoogd. De grootste dreiging komt nog altijd van beroepscriminelen en het buitenland.Nederland werkt aan meer mankracht in de strijd tegen cybercriminelen. De onderzoeks- en analysecapaciteiten van het NCSC, de nationale politie, de AIVD en de MIVD worden versterkt, schrijft Minister Opstelten in zijn beleidsreactie op de jaarlijkse Cyber Security Beeld, alweer de vierde rapportage over de bedreigingen in en om Nederland.Het doel is om in te zetten op detectie, analyse en respons. Zo wil het NCSC digitale aanvallen sneller in kaart brengen en storingen in zo kort mogelijke tijd verhelpen. Er werken op dit moment 60 FTE onderzoekers bij NCSC, laat het ministerie van Veiligheid en Justitie in een reactie weten aan Computerworld .Werving loopt\"Daarvan hebben we al eerder aangekondigd in kamerbrieven dat de capaciteit omhoog gaat, naar straks totaal rond de 90 FTE. Daar wordt nu ook voor geworven\", meldt woordvoerder Edmond Messchaert, die ook aangeeft dat de nationale politie al langere tijd bezig is met het werven van nieuwe mensen volgens al lopende afspraken. | http://computerworld.nl/beveiliging/83200-nederland-versterkt-cybertroepen | 14-07-2014 | computerworld.nl

Top found tags: patch(1),vulnerability(1),Internet Explorer(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Content Security Policy Mitigates XSS, Breaks WebsitesLocation: Roberts, United States
Date published: 16-07-2014

Content Security Policy (CSP) is an effective, browser-based deterrent against cross-site scripting attacks. Despite this, the vast majority of websites do not deploy the standard, and the majority of those that do, deploy it improperly. The goal of CSP is to mitigate content injection attacks again... Read more

Source: threatpost.com

Top found tags: Internet Explorer(2),website(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NIST Advisory Group Preaches Transparency in Development of Encryption StandardsLocation: National Institute of Standards - Gaithersburg, United States
Date published: 16-07-2014

A report released this week by the National Institute of Standards and Technology (NIST) stated it needs to increase its staff of cryptography experts and work to increase transparency. The report comes out of a review process that was requested in the fall of 2013, when former NIST Director Patrick... Read more

Source: securityweek.com

Top found tags: NIST(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CSA releases updated cloud security guidanceLocation: Cloud, United States
Date published: 16-07-2014

The Cloud Security Alliance (CSA) has published updated versions of two industry security standards: the Cloud Controls Matrix (CCM) and the Consensus Assessments Initiatives Questionnaire (CAIQ). Version 3.0.1 of the documents, released on Wednesday, brings significant improvements to the guidance ... Read more

Source: www.scmagazine.com

Top found tags: government(1),ISP(1),legislation(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oracle: Java on Windows XP will still get security updatesLocation: Oracle - Redwood City, United States
Date published: 16-07-2014

Users still running Microsoft's no-longer-supported software Windows XP, can still look forward to updates for Java. Last Friday, Oracle, the maker of the popular Java plug-in, put an end to murmurs that the software would no longer work on XP, or receive compatible security fixes. In a blog post, H... Read more

Source: www.scmagazine.com

Top found tags: patch(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russia protests arrest of hacker Seleznev, demands releaseLocation: New York, United States
Date published: 16-07-2014

In an official protest, or demarche, presented to a representative at the U.S. Embassy in Moscow, the Russian Foreign Ministry has demanded that the U.S. immediately release a Russian hacker arrested last week in Guam, according to a report by the Russian's ITAR-TASS News Agency. Roman Seleznev was ... Read more

Source: www.scmagazine.com

Top found tags: government(2),legislation(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Credit card fraud arrest in Golden GateLocation: Collier, United States
Date published: 09-07-2014

GOLDEN GATE, Fla. - Collier County detectives arrested a 38-year-old man on charges of fraudulent use of credit cards and grand theft Tuesday.The arrest of Michael Laranoa stemmed from a call last month to a Publix store where employees told deputies that Laranoa fled the store after trying to use a... Read more

Source: www.jrn.com

Top found tags: credit card(2),financial sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stamford man charged with credit card fraudLocation: Stamford, United States
Date published: 15-07-2014

STAMFORD -- A Stamford man was charged Monday with nine counts of credit card fraud for allegedly using People's United Bank financial information to buy a motorcycle and other items, according to police.Miguel Angel Palencia used credit card numbers to which he had access as an employee of Newfield... Read more

Source: www.stamfordadvocate.com

Top found tags: police(1),credit card(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NCB hosts seminar on credit card fraudLocation: Kingston, Jamaica
Date published: 14-07-2014

KINGSTON, Jamaica -- The National Commercial Bank (NCB) will this Wednesday (July 16) host a seminar on the prevention of credit card fraud.Scheduled for the Knutsford Court Hotel in Kingston, the seminar targets some 250 merchants in the retail and distribution sector in the parishes of St Catherin... Read more

Source: www.jamaicaobserver.com

Top found tags: fraud(1),credit card(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Men wanted for putting skimming devices on Va. ATM machinesLocation: Fairfax, United States
Date published: 11-07-2014

FAIRFAX COUNTY, Va. (WUSA9) -- Fairfax County Police Department is searching for three men who have placed skimming devices on at least four ATMs in Fairfax County over the past few weeks.Authorities said one of the skimming devices was put on at the drive thru ATM at the SunTrust Bank at 6052 Burke... Read more

Source: www.wusa9.com

Top found tags: EN(1),skimming(1),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Romanian law school dropout joined Tube ticket machine 'skimming' gangLocation: Bucharest, Romania
Date published: 11-07-2014

A Romanian law student helped a gang fleece commuters after placing skimming devices on Tube station ticket machines, a court heard.Raducu Beta, 24, dropped out of his law course in his homeland and came to Britain to look for work.After losing his job washing cars, he joined the gang which placed ... Read more

Source: www.standard.co.uk

Top found tags: financial sector(2),United Kingdom(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government's voting source code secrecy is dumb and dangerousLocation: Sydney, Australia
Date published: 17-07-2014

it to a group of masked strangers? They take the sack away somewhere somewhere secret, so no-one can interfere with them and some time later they return and just tell us who won. I reckon it'd be cheaper and a lot less trouble for everyone than all this slow, manual counting in front of scru... Read more

Source: www.zdnet.com

Top found tags: research(1),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Own a Cisco modem or wireless gateway? It might be owned by someone else, tooLocation: Cisco HQ - San Jose, United States
Date published: 17-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines A number of Cisco home network gateways have a security bug that allows attackers to hijack the devices remotely. A firmware update to close the hole is being rolled out to ISPs to deploy. The networking giant said that certain Wireless Home... Read more

Source: go.theregister.com

Top found tags: ISP(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Supposed 'leader' of LulzSec pleads guilty to hacking, hubrisLocation: Sydney, Australia
Date published: 17-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Matthew Flannery, once paraded by the Australian Federal Police (AFP) as the leader of international hacking collective LulzSec, has pleaded guilty to the five remaining charges against him, in Gosford Local Court. Flannery has waited ... Read more

Source: go.theregister.com

Top found tags: Linux(1),LulzSec(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New IP-based wireless networking protocol createdLocation: New York, United States
Date published: 17-07-2014

Recognizing the need for a better way to connect products in the home, seven companies announced that they ve joined forces to develop Thread, a new IP-based wireless networking protocol. Thread Group founding members consist of industry-leading companies including Yale Security, Silicon Labs, Samsu... Read more

Source: net-security.org

Top found tags: vulnerability(1),financial sector(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Unlocking the hidden value of informationLocation: New York, United States
Date published: 17-07-2014

Unstructured content accounts for 90% of all digital information. This content is locked in a variety of formats, locations, and applications made up of separate repositories, according to IDC. When connected and used properly, such information typically can help increase revenue, reduce costs, resp... Read more

Source: net-security.org

Top found tags: research(1),survey(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whitepaper: The value of perfect forward secrecyLocation: RSA HQ - Bedford, United States
Date published: 17-07-2014

When it comes to security, IT professionals need to think ahead: An eavesdropper who records traffic today may successfully decrypt it in the future. A solution is to employ Perfect Forward Secrecy, in which unrecoverable temporary session keys are generated, used and discarded. When implemented cor... Read more

Source: net-security.org

Top found tags: EN(1),RSA (1),RSA(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
German NSA probe chief mulls spy-busting typewritersLocation: Berlin, Germany
Date published: 17-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Germany's government has mulled a return to typewriters in a bid to evade US spy agencies, according to the head of the nation's National Security Agency inquiry. The incredulous decision came in response to a torrent of allegations that the... Read more

Source: go.theregister.com

Top found tags: Germany(4),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SAP sees edge in cloud security, raises sales forecastLocation: Berlin, Germany
Date published: 17-07-2014

FRANKFURT (Reuters) - German business software maker SAP raised its sales forecast for web-based software on Thursday, saying competitors were unable to match the security of its cloud computing systems. Cloud computing allows businesses to cut costs by ditching bulky servers for network-based syste... Read more

Source: reuters.com

Top found tags: report(1),research(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Don't put that duffel bag full of cash in the hotel room safeLocation: Berlin, Germany
Date published: 17-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Hotel safes are far less secure than guests are led to believe. Widespread use of default codes and other issues mean that it is relatively easy for criminals to get at hotel guests' valuables, security firm G DATA warns. The input panel, in... Read more

Source: go.theregister.com

Top found tags: skimming(1),credit card(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Exposing the insecurity of hotel safesLocation: G Data Software - Bochum, Germany
Date published: 17-07-2014

Travel documents, cash, mobile devices, cameras, jewellery and company documents on holiday or on a business trip, tourists and business people alike often carry valuable objects in their luggage. For a small fee, many hotels offer a room safe for keeping important documents and valuables safe. Howe... Read more

Source: net-security.org

Top found tags: mobile device(2),financial sector(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco fixes critical flaw in modems and wireless gatewaysLocation: Cisco HQ - San Jose, United States
Date published: 17-07-2014

Cisco has fixed a critical vulnerability affecting a number of its wireless residential gateways and cable modems, and is urging users to check whether their service providers and third-party support organizations have pushed out the upgraded software with the fix. Customers without service contract... Read more

Source: net-security.org

Top found tags: legislation(1),report(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
63% of businesses don't encrypt credit cardsLocation: New York, United States
Date published: 17-07-2014

In its third study on unencrypted card data, SecurityMetrics found that 63.86% of businesses store the unencrypted 16-digit sequence on the front of credit cards, also known as the Primary Account Number (PAN). Furthermore, 7% of businesses store the magnetic stripe data on the back of credit cards.... Read more

Source: net-security.org

Top found tags: credit card(2),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Telecom Industry Warns of Increase in Caller ID Spoofing ScamsLocation: New York, United States
Date published: 17-07-2014

USTelecom, a trade association representing service providers and suppliers in the telecom industry, has warned consumers about an increase in the number of scams that rely on caller ID spoofing. According to the organization, one tactic used by sales people and fraudsters attempting to collect pers... Read more

Source: securityweek.com

Top found tags: financial sector(2),social engineering(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Total internet failure: are you prepared?Location: Bonner, United States
Date published: 16-07-2014

A total internet failure is the one thing that could stop any business in its tracks, yet few are preparing for this possibility, consultancy KPMG has warned. Stephen Bonner, partner in information protection and business resilience at KPMG, said this could happen within the next five years as the n... Read more

Source: www.computerweekly.com

Top found tags: airport sector(2),ISP(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Multiple Cisco home products vulnerable to exploitLocation: Cisco HQ - San Jose, United States
Date published: 17-07-2014

buffer overflow that could allow arbitrary code execution. More from Cisco Live 2014 cloud meeting rooms Cisco Live ThreatGrid The web server fails to validate inputs properly. An attacker could send a particular HTTP request to the device, crash the device and run arbitrary code with elevated privi... Read more

Source: www.zdnet.com

Top found tags: ISP(1),threat(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco Patches Wireless Residential Gateway VulnerabilitiesLocation: Cisco HQ - San Jose, United States
Date published: 17-07-2014

US-CERT issued an advisory yesterday warning of a critical vulnerability in Ciscos Wireless Residential Gateway. Cisco has patched the vulnerability and also released its own warning, informing customers of a remote code execution vulnerability in the web server used by the gateway that is presen... Read more

Source: threatpost.com

Top found tags: report(1),vulnerability(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US government rebuffs Aereo's first shot at rebootingLocation: Federal Communications Commission - Washington, United States
Date published: 17-07-2014

Online-television startup Aereo's request for a copyright license that might let it resume streaming -- despite TV network opposition and a Supreme Court ruling against it -- isn't going to be simple. The US Copyright Office told Aereo it wouldn't process the startup's request for a license that pay... Read more

Source: cnet.com.ortal.com

Top found tags: Supreme Court(2),United States(2),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco Patches Serious Vulnerability Affecting Modems, Wireless GatewaysLocation: Cisco HQ - San Jose, United States
Date published: 17-07-2014

Several Cisco cable modems and wireless residential gateways are plagued by a vulnerability that can be exploited for remote code execution, the company said on Wednesday. According to Cisco, a buffer overflow flaw affecting the Web server embedded into the devices can be leveraged by a remote, unau... Read more

Source: securityweek.com

Top found tags: report(1),vulnerability(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
73 Percent of IT Staff Currently Have Unresolved Network EventsLocation: New York, United States
Date published: 17-07-2014

According to the results of a recent Emulex survey of 547 U.S. and European network and security operations professionals, fully 73 percent of IT staff said they currently have unresolved network events. "An unresolved network event is one in which the root cause has not been established and therefo... Read more

Source: www.esecurityplanet.com

Top found tags: report(1),survey(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Controversial DRIP bill set to become UK lawLocation: New York, United States
Date published: 17-07-2014

The controversial DRIP (Data Retention and Investigatory Powers) bill completed its Lords committee stage without amendment yesterday, after effectively being rubber-stamped into the legislative books overnight. Controversial DRIP bill set to become UK law Controversial DRIP bill set to become UK la... Read more

Source: www.scmagazineuk.com

Top found tags: social media(4),telecom sector(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lack of communication a security risk for 40 per cent of UK firmsLocation: New York, United States
Date published: 17-07-2014

Lack of communication a security risk for 40 per cent of UK firms. There is a huge communication gap between IT security professionals and executive teams that leaves companies susceptible to data theft, according to a new survey. The report, "Roadblocks, Refresh & Raising the Human Security IQ," wa... Read more

Source: itproportal.com

Top found tags: data theft(2),Ponemon Institute(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chaos Computer Club bolsters NSA spying complaint with Tor snooping evidenceLocation: Berlin, Germany
Date published: 17-07-2014

The German Chaos Computer Club said Wednesday that it has added to its legal complaint about U.S. spying on German citizens evidence that the NSA allegedly snooped on at least one of its Tor servers. The CCC filed a complaint with Germanys federal prosecutor, Harald Range, in February, demanding ... Read more

Source: www.pcworld.com

Top found tags: government(4),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chrome for Android Update Fixes Critical URL Spoofing BugLocation: Google HQ - Mountain View, United States
Date published: 17-07-2014

The latest update to Chrome on Android pushed yesterday fixes two bugs, including a critical flaw in the browser that could have let an attacker trick a user into visiting a malicious site. developer Keita Haga. The bug, which netted the researcher a $3,000 bug bounty from Google, could have... Read more

Source: threatpost.com

Top found tags: mobile device(2),update(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
vBulletin releases patches for critical SQL injection flawLocation: vBulletin - Segundo, United States
Date published: 17-07-2014

The vBulletin team has issued emergency patches for the critical SQL injection vulnerability responsibly reported by the Romanian Security Team. The flaw affects vBulletin versions 5.0.4, 5.0.5, 5.1.0, 5.1.1, and 5.1.2 - vBulletin 4 users are safe. Registered customers are urged to pick up the patch... Read more

Source: net-security.org

Top found tags: report(1),Romania(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft to Cut 18,000 Jobs in Major ReorganizationLocation: Microsoft HQ - Redmond, United States
Date published: 17-07-2014

NEW YORK - Microsoft said Thursday it would slash 18,000 jobs from its global workforce over the next year, the majority from the integration of the Nokia unit acquired this year. A Microsoft statement said the move is part of "a restructuring plan to simplify its operations and align the recently a... Read more

Source: securityweek.com

Top found tags: Microsoft(2),mobile device(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Nederland ICT aan bedrijven en overheden: Maak van opstellen cyber risicoprofiel standaardprocedureLocation: Bee, United States
Date published: 10-07-2014

Uit het jaarlijkse Cyber Security Beeld Nederland van het Nationaal Cyber Security Centrum blijkt dat digitale spionage en cybercrime grote risicos vormen voor Nederlandse bedrijven en overheden. Economie en samenleving halen veel voordelen uit het gebruik van ICT en het internet. Dat deze voorde... Read more

Source: www.nederlandict.nl

Top found tags: The Netherlands(2),cybercrime(3),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybersecuritybeeld Nederland: meer aandacht voor ICT-duurzaamheidLocation: Ministry of Security and Justice - Den Haag, The Netherlands
Date published: 10-07-2014

Cybercrime en digitale spionage blijven de grootste dreiging op het gebied van cyber security. De potentile impact van cyberaanvallen en verstoringen neemt door snelle digitalisering alleen maar toe. Een andere in het oog springende bevinding is het gebrek aan zogenaamde ICT Duurzaamheid. Een voor... Read more

Source: www.rijksoverheid.nl

Top found tags: critical infrastructure(8),The Netherlands(10),government(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Patintendossiers nauwelijks online toegankelijkLocation: Amsterdam, The Netherlands
Date published: 17-07-2014

Veel Nederlanders zouden graag hun patintendossier via internet willen bekijken, maar ziekenhuizen doen er weinig aan om dit ook mogelijk te maken. Slechts 3% van de Nederlandse ziekenhuizen biedt patinten de mogelijkheid om hun medische gegevens via de ziekenhuiswebsite op te vragen. 41 procent... Read more

Source: www.security.nl

Top found tags: website(1),cyber security(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Est krijgt bijna 5 jaar cel wegens handel in gestolen ID-gegevensLocation: Est, Neerijnen, Gelderland, The Netherlands
Date published: 17-07-2014

Een 42-jarige man uit Estland is in Groot-Brittanni veroordeeld tot een gevangenisstraf van bijna 5 jaar wegens de online handel in gestolen identiteitsgegevens. Andrei Sergejev, online bekend als 'tetereff', handelde op internet in gestolen financile gegevens. Onderzoekers wisten de nickname di... Read more

Source: www.security.nl

Top found tags: cybercrime(2),financial sector(2),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Britse politie arresteert 660 mensen wegens online kinderpornoLocation: Den Haag, The Netherlands
Date published: 17-07-2014

Het internet is geen schuilplaats meer voor mensen die kinderporno bekijken, zo heeft een topfunctionaris van de Britse politie laten weten na de aanhouding van 660 mensen. De operatie van het National Crime Agency (NCA) en 45 regionale politiekorpsen nam zes maanden in beslag. Het was gericht op me... Read more

Source: www.security.nl

Top found tags: pornography(2),The Netherlands(2),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Frans bedrijf aangevallen via meerdere Word-lekkenLocation: Microsoft HQ - Redmond, United States
Date published: 17-07-2014

Een Frans bedrijf is in mei het doelwit van een gerichte aanval geworden waarbij er werd geprobeerd om via twee lekken in Microsoft Word computers met malware te infecteren. Dat laat anti-virusbedrijf McAfee weten. De virusbestrijder toont drie e-mails die de aanvallers voor hun aanval gebruikten. D... Read more

Source: www.security.nl

Top found tags: patch(3),update(3),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Justitie VS vraagt meer bevoegdheden om botnets te bestrijdenLocation: Caldwell, United States
Date published: 17-07-2014

Tijdens een hoorzitting van een Amerikaanse Senaatscommissie over de bestrijding van botnets heeft het Amerikaanse Ministerie van Justitie om meer bevoegdheden gevraagd. Die zijn volgens het ministerie noodzakelijk om de de dreiging van botnets effectief te kunnen blijven bestrijden. "Ik zou graag e... Read more

Source: www.security.nl

Top found tags: cybercrime(5),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Europol ontmantelt netwerk van Roemeense cybercriminelenLocation: Europol HQ - Den Haag, The Netherlands
Date published: 17-07-2014

Europol heeft gisteren met de Roemeense en Franse autoriteiten een netwerk van voornamelijk Roemeense cybercriminelen ontmanteld. De bende hield zich met allerlei financile fraude bezig, waaronder het inbreken op betalingssystemen via het gebruik van malware. Ook zouden de criminelen betrokken zij... Read more

Source: www.security.nl

Top found tags: government(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco dicht kritiek lek in modemsLocation: Cisco HQ - San Jose, United States
Date published: 17-07-2014

Een aantal typen thuismodems van Cisco zijn door hackers via het internet over te nemen. Het concern rolt firmware-updates uit. Ziggo laat weten dat hun Cisco-modems niet kwetsbaar zijn. Die hebben al een recentere firmware-versie. Ook UPC weet te melden dat dit geen impact heeft.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: firmware(1),hackers(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Geen teken van verband tussen hacken en iTunesLocation: The Hague, The Netherlands
Date published: 14-07-2014

Geen teken van verband tussen hacken en iTunesDEN HAAG - Bij het Nationaal Cyber Security Centrum en bij de politie zijn tot nog toe geen signalen binnengekomen van een verband tussen hacken en iTunes. Dat meldt minister Ivo Opstelten (Veiligheid en Justitie) aan de Tweede Kamer. In het voorjaar ont... Read more

Source: www.telegraaf.nl

Top found tags: The Netherlands(2),government(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cloud Security Alliance updates guidance documentsLocation: Cloud, United States
Date published: 17-07-2014

The Cloud Security Alliance (CSA) announced significant updates to two de facto industry standards, the Cloud Controls Matrix (CCM) Version 3.0.1 and the Consensus Assessments Initiatives Questionnaire (CAIQ) 3.0.1. With the updates, the CSA has completed a major milestone in the alignment between t... Read more

Source: net-security.org

Top found tags: information security(2),security measures(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
VN-chef hekelt gebrek aan toezicht bij massasurveillanceLocation: Amsterdam, The Netherlands
Date published: 17-07-2014

De Hoge Commissaris voor de Mensenrechten van de Verenigde Naties heeft in een nieuw rapport uitgehaald naar de grootschalige surveillance op internet die overheden wereldwijd zonder toezicht en transparantie uitvoeren en waarbij ook private bedrijven worden gedwongen om mee te werken. Door het gebr... Read more

Source: www.security.nl

Top found tags: cyber security(2),The Netherlands(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bits of Freedom pleit voor meer open wifi-netwerkenLocation: Amsterdam, The Netherlands
Date published: 17-07-2014

Burgerrechtenbeweging Bits of Freedom (BoF) pleit voor meer open wifi-netwerken, aangezien dit de privacy van internetgebruikers ten goede komt. De organisatie volgt daarmee het idee van de onlangs aangekondigde Open Wireless beweging. Deze beweging werkt aan router-firmware waardoor gebruikers stra... Read more

Source: www.security.nl

Top found tags: privacy(1),wireless(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Belgisch Cyber Security Centrum stap dichterbijLocation: Brussel, Belgium
Date published: 17-07-2014

De Belgische regering heeft het koninklijk besluit rond dat de oprichting regelt van een Belgisch Cyber Security Centrum dat vorig jaar al werd aangekondigd en in april naar de Belgische Raad van State werd gestuurd. Het Centrum voor cybersecurity Belgi (CCB) houdt zich bezig met crisisbeheer bij ... Read more

Source: www.security.nl

Top found tags: NL(1),government(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

USB-stick met wifi-adapter voor veilig internetbankierenLocation: Amsterdam, The Netherlands
Date published: 16-07-2014

ZeusGard is een oplossing tegen malware, waarbij de computer draait vanaf een USB-stick met wifi-adapter en het op Linux Debian-gebaseerde besturingssysteem. ZeusGard is geen volledig besturingssysteem, maar alleen een gestripte webrowser.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Zeus(1),online banking(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Groeiende behoefte cyber security BelgiLocation: Brussel, Belgium
Date published: 15-07-2014

Belgi heeft een groeiende behoefte aan cyber security-oplossingen. Die ontwikkeling biedt mogelijkheden voor Nederlandse ondernemingen.Bij onze zuiderburen verdubbelde het aantal cyber security-aanvallen het afgelopen jaar. Vooral midden- en kleinbedrijven (mkb) en overheidsinstellingen zijn slach... Read more

Source: www.rvo.nl

Top found tags: e-mail(1),NL(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft: onveilige wachtwoorden niet altijd verkeerdLocation: Microsoft HQ - Redmond, United States
Date published: 17-07-2014

Het gebruik van onveilige wachtwoorden of het gebruik van n wachtwoord voor meerdere accounts wordt door veel beveiligingsexperts afgeraden, maar onderzoekers van Microsoft laten weten dat dit onder de juiste voorwaarden onderdeel van een goede wachtwoordstrategie hoort te zijn. Door het toeneme... Read more

Source: www.security.nl

Top found tags: Microsoft(1),NL(1),research(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google dicht 26 lekken in Chrome 36Location: Google HQ - Mountain View, United States
Date published: 17-07-2014

Google heeft Chrome 36 gelanceerd, waarmee het 26 beveiligingslekken in de browser verhelpt. Slechts n lek was afkomstig van een externe beveiligingsonderzoeker. Het ging om een kwetsbaarheid die Google als medium bestempelde en waarvoor het Christian Schneider 2.000 dollar betaalde. Via lekken ... Read more

Source: www.security.nl

Top found tags: Google(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Franse moet schadevergoeding betalen om prominente negatieve recensieLocation: Paris, France
Date published: 17-07-2014

Een Franse rechtbank heeft een blogger veroordeeld tot een schadevergoeding van 1500 euro omdat een negatieve recensie van een restaurant te hoog in de Google-zoekresultaten verscheen. Ook moet ze de titel van de recensie aanpassen. De recensie van de blogger, Caroline Doudet, kwam als vierde naar b... Read more

Source: tweakers.net

Top found tags: Google(1),NL(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft gaat ook zoekresultaten EU-burgers verwijderenLocation: Microsoft HQ - Redmond, United States
Date published: 17-07-2014

Na Google heeft ook Microsoft een formulier online gezet dat Europese burgers kunnen invullen als ze willen dat zoekresultaten in de zoekmachine Bing worden verwijderd. In tegenstelling tot Google hoeven internetgebruikers bij Microsoft geen kopie van een identiteitsbewijs te uploaden. Het verwijder... Read more

Source: www.security.nl

Top found tags: website(1),government(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco dicht ernstig lek in modems UPC, ZeelandNet en ZiggoLocation: Cisco HQ - San Jose, United States
Date published: 17-07-2014

Cisco heeft een belangrijke update voor een ernstig lek in verschillende kabelmodems uitgebracht, die onder andere door klanten van UPC, ZeelandNet en Ziggo worden gebruikt. Via het lek, dat zich in de webserver van de modem bevindt, kan een aanvaller willekeurige code op het apparaat uitvoeren. Hie... Read more

Source: www.security.nl

Top found tags: patch(2),United States(2),update(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple rolt tweestaps-verificatie uit in NederlandLocation: Apple HQ - Cupertino, United States
Date published: 17-07-2014

Apple heeft een beveiligingsmaatregel die Apple ID-gebruikers extra bescherming biedt ook in Nederland uitgerold. Het gaat om tweestaps-verificatie waardoor gebruikers naast hun wachtwoord ook een code, die op een vertrouwd apparaat wordt ontvangen, moeten invoeren. Gebruikers kunnen de maatregel ee... Read more

Source: www.security.nl

Top found tags: update(2),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBay: gestolen database had impact op prestatiesLocation: eBay - San Jose, United States
Date published: 17-07-2014

De inbraak op het netwerk van eBay waarbij eind mei de gegevens van 145 miljoen gebruikers werden gestolen had invloed op de prestaties van de veilingsite in het tweede kwartaal, zo liet CEO John Donahoe tijdens de presentatie van de kwartaalcijfers weten. Met name in juni zou de verkoop scherp zijn... Read more

Source: www.security.nl

Top found tags: NL(1),threat(1),trend(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Inspectie SZW geeft iPhone-reparateur Pegatron officile waarschuwingLocation: Apple HQ - Cupertino, United States
Date published: 17-07-2014

De Inspectie SZW, vroeger bekend als de Arbeidsinspectie, heeft iPhone-reparateur Pegatron een officile waarschuwing gegeven. Het bedrijf wordt verzocht om onder andere 'structurele maatregelen te treffen om hitte en hoge luchtvochtigheid op de werkvloer te bestrijden'. Ook moet Pegatron 'ergonomi... Read more

Source: tweakers.net

Top found tags: smartphone(1),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid in Python verholpenLocation: Door, United States
Date published: 17-07-2014

Samenvatting: Er is een kwetsbaarheid verholpen in de JSON module van Python. Gevolgen: Door deze kwetsbaarheid te misbruiken kan een kwaadwillende toegang verkrijgen tot gevoelige gegevens. Beschrijving: Er is een kwetsbaarheid verholpen in de ingebouwde JSON module van Python, veroorzaakt door het... Read more

Source: www.ncsc.nl

Top found tags: Fedora(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in Google ChromeLocation: Google HQ - Mountain View, United States
Date published: 17-07-2014

Samenvatting: Google heeft een update uitgebracht voor Google Chrome die diverse kwetsbaarheden verhelpt. Gevolgen: Google heeft geen details bekend gemaakt over de verholpen kwetsbaarheden. Door het omzeilen van de same origin policy kan code uitgevoerd worden in context van een andere website. Bes... Read more

Source: www.ncsc.nl

Top found tags: Google(4),Google Play(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Geheugenlek verholpen in XenLocation: Amsterdam, The Netherlands
Date published: 17-07-2014

Samenvatting: Er bevindt zich een kwetsbaarheid in Xen die gebruikers op gastsystemen in staat stelt om delen van het geheugen van de hypervisor in te zien. Xen heeft updates uitgebracht om deze kwetsbaarheid te verhelpen. Gevolgen: Misbruik van de kwetsbaarheid stelt kwaadwillenden in staat om in b... Read more

Source: www.ncsc.nl

Top found tags: NL(1),patch(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden verholpen in de SUSE kernelLocation: Door, United States
Date published: 17-07-2014

Samenvatting: De makers van SUSE Linux hebben updates vrijgegeven die een grote hoeveelheid kwetsbaarheden in de kernel verhelpen. Gevolgen: Een lokale kwaadwillende kan deze grote groep kwetsbaarheden misbruiken om onder andere: - verhoogde gebruikersrechten te verkrijgen, - systeeminformatie te ve... Read more

Source: www.ncsc.nl

Top found tags: NL(1),The Netherlands(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid gevonden in mod_status module van Apache WebserverLocation: Door, United States
Date published: 17-07-2014

Samenvatting: Het Zero Day Initiative (ZDI) heeft een kwetsbaarheid bekend gemaakt in de mod_status module van de Apache Webserver. Deze module is standaard aanwezig maar standaard niet geactiveerd. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om willekeurige code uit te voer... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),webserver(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish