Under construction

New design coming soon!

CIC News engine statistics

CIC News for 18-07-2014 contains 219 articles: cybercrime(80),cyber security(57),data breach(52),other(30)

CIC News update contains 200 English and 19 Dutch articles for today.
There are 8 published advisories, 2 are English and 6 are Dutch.
In today's English news articles:
- 67 related to cybercrime
- 56 related to cyber security
- 52 related to data breach and identity theft
- 25 for the category other news

In today's Dutch news articles:
- 13 related to cybercrime
- 1 related to cyber security
- 5 for the category other news

Have fun reading.

English cybercrime related news

ScarePakage ransomware warns Android users of FBI probeLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 17-07-2014

Lookout has identified what it calls ScarePakage mobile ransomware that not only renders phones inoperable and data inaccessible, but sends users a message that they are being investigated by the FBI in an attempt to extort several hundred dollars via a MoneyPak voucher. The ransomware masquerades a... Read more

Source: www.scmagazine.com

Top found tags: ransomware(1),cybercrime(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critical infrastructure under attack -- and unpreparedLocation: New York, United States
Date published: 14-07-2014

What: \"Critical Infrastructure: Security Preparedness and Maturity,\" a report from the Ponemon Institute and Unisys, based on a survey of 599 security executives at utility, oil and gas, energy and manufacturing companies in 13 countries; conducted in April and May.Why: Critical infrastructure pro... Read more

Source: fcw.com

Top found tags: Ponemon Institute(2),critical infrastructure(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US critical infrastructure unprepared for cyber attack - reportLocation: New York, United States
Date published: 15-07-2014

US critical infrastructure is largely unprepared for cyber attack with just 17 per cent of utilities claiming that their IT security programmes are deployed.That is the result of research from Unisys, conducted by the Ponemon Institute.\"Fifty per cent of respondents say their IT security activities... Read more

Source: www.computing.co.uk

Top found tags: cybercrime(2),government(2),Ponemon Institute(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A10 enlists software-defined networking for ANZ DDoS responseLocation: Wellington, New Zealand
Date published: 17-07-2014

A year after it signed Digital Networks Australia (DNA) as its Australia-New Zealand distributor, security solutions provider A10 Networks is looking to a redesigned channel partner program to expand its reach in the region and tap into growing demand for tools to fight increasingly virulent distrib... Read more

Source: www.cso.com.au

Top found tags: DoS(2),New Zealand(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese YouTube Used as DDoS MachineLocation: New York, United States
Date published: 17-07-2014

Even the biggest websites in the world are vulnerable to DDoS. Want proof?Well, all throughout this past April, a hacker took advantage of a hole in Sohu.coms security to launch Persistent Cross-Site Swapping (XSS) attacks against various targets across the globe.Sohu.com, in case you dont kno... Read more

Source: www.economicvoice.com

Top found tags: XSS(1),website(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cimation University Releases New Suite of Online ICS Cyber Security CoursesLocation: Houston, United States
Date published: 09-07-2014

HOUSTON, TX -- (Marketwired) -- 07/09/14 -- Today Cimation, an operations consulting company delivering secure technology solutions to the global energy industry, announced their release of a new suite of courses available now at Cimation University. Launched earlier this year, Cimation University i... Read more

Source: www.itbusinessnet.com

Top found tags: training(1),education(2),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
49% of vulnerable programs come from Non-Microsoft vendorsLocation: Secunia - Copenhagen, Denmark
Date published: 14-07-2014

DUBAI, United Arab Emirates - 14 July 2014 - Secunia, the leading provider of IT security solutions that enable businesses and private individuals to manage and control vulnerability threats, recently published the Personal Software Inspector (PSI) Country Report for Saudi Arabia for the second quar... Read more

Source: www.zawya.com

Top found tags: vulnerability(2),cybercrime(3),United Arab Emirates(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Even Little Bobby KnowsLocation: Tokio, Japan
Date published: 14-07-2014

We are working with Robert M. Lee and his publisher to get SCADA and Me in Japanese for a giveaway on OTDay of S4xJapan (agenda and registration open on Aug 4th). I wish I had the page above as a hidden slide to pull out at ICSJWG last month.While most of my presentation involved the secure and inse... Read more

Source: www.digitalbond.com

Top found tags: phishing(2),critical infrastructure(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DOJ: Cryptolocker Trojan Is Now Out Of CommissionLocation: New York, United States
Date published: 14-07-2014

The Department of Justice declared victory over the Cryptolocker Trojan, calling its global operation against the Gameover Zeus botnet effective in completely knocking out the infrastructure used to communicate with the notorious ransomware.Cryptolocker emerged in 2013, crippling consumer and busine... Read more

Source: www.crn.com

Top found tags: Department of Justice(3),government(3),malware(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hundreds arrested as police trace paedophiles on internetLocation: Scotland, United Kingdom
Date published: 17-07-2014

A total of 339 suspected paedophiles have been arrested by police targeting online abusers in the past 15 months.Police Scotland said it has carried out enforcement action targeting online paedophiles in all of the country's 14 policing divisions since the force was created in April 2013.Those a... Read more

Source: www.heraldscotland.com

Top found tags: threat(1),child pornography(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Philippines nabs Taiwanese, Chinese linked to scamLocation: Taipei, Taiwan
Date published: 10-07-2014

MANILA, Philippines -- Philippine police arrested 44 foreigners who allegedly ran an online blackmail syndicate that defrauded victims in China and Taiwan by duping them into believing that their bank accounts have been used by money launderers or terrorists, police said Thursday.The arrests of 42 T... Read more

Source: www.miamiherald.com

Top found tags: New Zealand(2),government(5),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybersex den uncoveredLocation: La Paz, United States
Date published: 11-07-2014

THE Criminal Investigation and Detection Group (CIDG) in Iloilo province has uncovered a cybersex den preying on girls for sex play in the Internet for American and Australian customers.The CIDG swooped down Thursday afternoon, July 10, a two-storey house at Barangay Sinikway, La Paz and caught four... Read more

Source: www.sunstar.com.ph

Top found tags: education(1),EN(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Romanian man involved in phishing scam sentenced to 45 monthsLocation: Bucharest, Romania
Date published: 11-07-2014

A Romanian citizen has been sentenced to 45 months in federal prison for his role in an international phishing operation that targeted U.S. bank holdersRomanian citizen Iulian Schiopu was sentenced to 45 months in prison for his role in a cybercrime operation related to phishing. Schiopu and his acc... Read more

Source: www.tweaktown.com

Top found tags: telecom sector(4),United States(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is your business prepared for wearable technology?Location: Google HQ - Mountain View, United States
Date published: 12-07-2014

According to the Ponemon Institute, cybercrime costs the average UK business around 3 million a year. As applications, platforms and devices grow, so does the number of opportunities for hackers to develop sophisticated attacks. As wearable technology begins to infiltrate the workplace this will b... Read more

Source: www.itproportal.com

Top found tags: update(2),cybercrime(3),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New GameOver Zeus Variant uses FastFlux C&CLocation: Amsterdam, The Netherlands
Date published: 11-07-2014

Over on the Malcovery Security Blog yesterday we covered a new version of GameOver Zeus (see: GameOver Zeus Mutates, Launches Attack ) that was distributed in three spam campaigns on July 10, 2014. At the bottom of that blog post, we're sharing a detailed \"T3 Report\" by analysts Brendan Griffin an... Read more

Source: garwarner.blogspot.nl

Top found tags: Zeus(1),financial sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime: FIA arrests two, seizes 15,000 illegal SIM cardsLocation: Punjab, India
Date published: 12-07-2014

LAHORE: The Cyber Crime Circle of the Federal Investigation Agency (FIA) has arrested two people dealing in unauthorised SIM cards, The Express Tribune has learnt.FIA Punjab Director Usman Anwar told The Express Tribune they had received information that Tahir Abbas, a resident of Green Cap Housing ... Read more

Source: tribune.com.pk

Top found tags: cybercrime(2),government(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is Ghanas cybercrime out of control?Location: Accra, Greater Accra, Ghana
Date published: 12-07-2014

Barely two weeks after Ghana Vice-President Kwesi Amissah-Arthur called on young people not to get involved in illegal internet activities, police arrested a twenty six years old undergraduate student for allegedly defrauding many people through a bogus online organisation that provided foreig... Read more

Source: securityfailures.com

Top found tags: education(2),United Kingdom(2),Nigeria(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese Businessman Charged For Hacking Boeing And Other US Defense Contractors - Find Ways To Protect Your SystemLocation: Beijing, China
Date published: 14-07-2014

The US Department of Justice has charged a Chinese businessman for hacking into Boeing's computer system and stealing information about US military aircraft and weapons this Friday, July 11th.Mr. Su Bin, the said businessman, has been stealing data from the US between 2009 and 2013. He has been work... Read more

Source: au.ibtimes.com

Top found tags: Department of Justice(3),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CERT-In reports over 62,000 cyber attacks till May 2014: GovtLocation: New Delhi,India
Date published: 14-07-2014

New Delhi: Government's cyber security arm Computer Emergency Response Team-India (CERT-In) reported 62,189 cyber security incidents in the first five months of the current calendar year, Parliament was informed today. Similarly, the government body reported that 9,174 Indian websites were hacked by... Read more

Source: zeenews.india.com

Top found tags: website(1),cybercrime(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker involved in $14 million theft pleads guilty to bank fraudLocation: New York, United States
Date published: 15-07-2014

The U.S. federal government gets another guilty plea, as cybercriminal decides to plead guilty to bank fraud that stole $14 million in just 48 hoursQendrim Dobruna, 27, has pleaded guilty to bank fraud in a case stemming back to 2011, and could face up to 30 years in prison. Operating under the name... Read more

Source: www.tweaktown.com

Top found tags: government(2),United States(2),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google sets up cybercrime-busting task forceLocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

Google has set up an internal task force that will work to expose the activities and techniques of malicious Internet wrongdoers, aiming to cut down on the number of targeted cyberattacks.You should be able to use the Web without fear that a criminal or state-sponsored actor is exploiting softwar... Read more

Source: www.cio.com

Top found tags: vulnerability(2),cybercrime(7),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime is growing problem in New YorkLocation: New York City, New York, United States
Date published: 15-07-2014

ALBANY, N.Y. A new report states millions of New Yorkers have fallen victim to cybercrime.More than seven million New Yorkers had their personal records hacked in 2013 alone. Now, State Attorney General Eric Schneiderman is hoping awareness and safety tips can stop the growing problem.A new repo... Read more

Source: www.fox23news.com

Top found tags: cybercrime(3),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google sets up a cybercrime-busting task force -- Project ZeroLocation: Google HQ - Mountain View, United States
Date published: 15-07-2014

After unearthing the Heartbleed flaw, Google sets up a research group dedicated to finding vulnerabilities in Web softwareIDG News Service - Google has set up an internal task force that will work to expose the activities and techniques of malicious Internet wrongdoers, aiming to cut down on the num... Read more

Source: www.computerworld.com

Top found tags: OpenSSL(2),cybercrime(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firms absorb losses caused by cybercrime - surveyLocation: Kaspersky HQ - Moscow, Russia
Date published: 17-07-2014

Cape Town - According to a survey conducted by Kaspersky Lab together with B2B International in 2014, 52 percent of financial companies reimburse customer losses caused by Internet fraud without actually investigating the circumstances.Almost a third of companies believe the costs incurred by cyber ... Read more

Source: www.iol.co.za

Top found tags: South Africa(2),Kaspersky Lab(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese hackers take command of Tesla Model SLocation: New York, United States
Date published: 17-07-2014

2014 Tesla Model SChinese hackers claim they were able to gain control of the Tesla Model S's door locks, sunroof, and other features. Wayne Cunningham/CNET The first documented successful hack of a Tesla Model S has come from China, Chinese security giant Qihoo 360 Security Technology announced Thu... Read more

Source: cnet.com.ortal.com

Top found tags: conference(2),DEF CON(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Government-Grade' Malware in Cybercriminals' Arsenal: Sentinel LabsLocation: Microsoft HQ - Redmond, United States
Date published: 18-07-2014

Security researchers believe cybercriminals may be taking a page from government agencies when it comes to malware. According to Sentinel Labs, that metaphorical page has the name of a piece of malware known as 'Gyges' scribbled on it, as well as a list of capabilities normally associated with malwa... Read more

Source: securityweek.com

Top found tags: cyber espionage(4),malware(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Project Zero Focuses on Internet SecurityLocation: Google HQ - Mountain View, United States
Date published: 17-07-2014

Google is no stranger to the world of security, though not all of its efforts are well known. The search giant revealed a formerly secret effort with the announcement this week of the Google Project Zero initiative. "Our objective is to significantly reduce the number of people harmed by targeted at... Read more

Source: www.esecurityplanet.com

Top found tags: OS X(2),vulnerability(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Neverquest' banking trojan evolves as U.S. attacks continueLocation: New York, United States
Date published: 17-07-2014

On Wednesday, Symantec revealed that the Neverquest banking trojan, also called Snifula, had evolved, allowing fraudsters to loot even more funds from victims. In a blog post, the firm said that Neverquest's capabilities include keystroke logging, screenshot and video capturing, remote control... Read more

Source: www.scmagazine.com

Top found tags: trojan(2),United States(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian espionage malware adapted for ransomware scamsLocation: Microsoft HQ - Redmond, United States
Date published: 17-07-2014

Syrian Electronic Army claims it obtained U.S. Central Command docs via hack Sentinel Labs dubbed the repurposed malware Gyges. Espionage malware, believed to be authored by Russians, has been repurposed to carry out money-making cyber schemes, researchers revealed. According to Sentinel Labs,... Read more

Source: www.scmagazine.com

Top found tags: United States(2),Syrian Electronic Army(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Follow malware's tracks to thwart cyber attacksLocation: New York, United States
Date published: 09-07-2014

To defeat malware, government agencies need to determine how threats entered a network and where they went once inside. But this relatively simple task is complicated by attackers ability to cover their tracks and to do so over an extended period of time.The latest improvements in threat detectio... Read more

Source: gcn.com

Top found tags: cybercrime(2),financial sector(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft settles with No-IP in botnet hunt, after seizing its domainsLocation: Microsoft HQ - Redmond, United States
Date published: 09-07-2014

Microsoft has reached a settlement with domain provider No-IP to disable some of its domains, after taking control of part of its network to shut down a botnet.Microsoft in late June filed a civil suit against the U.S. domain hosting company Vitalwerks, which operates as No-IP.com, for its role in h... Read more

Source: www.pcworld.com

Top found tags: Microsoft(1),social media(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile malware stealing data from legitimate appsLocation: WhatsApp - Mountain View, United States
Date published: 10-07-2014

Cybercriminals are shifting their mobile malware from stealing data directly from users to slurping it from leaky but legitimate apps.Alex Hinchliffe, manager of research and operations at McAfee's mobile engineering unit, said: \"We've seen a changing trend for malware to extract ... sensitive data... Read more

Source: www.pcpro.co.uk

Top found tags: cybercrime(2),social media(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile ads replace porn as No.1 malware carrierLocation: Kuala Lumpur, Malaysia
Date published: 10-07-2014

Web advertisements have now replaced pornography as the number one mobile content that leads to malware attacks, according to Blue Coats 2014 Mobile Malware Report: A New Look At Old Threats.A user is directed to mobile malware through Web advertisements, one in every five times. This is three ti... Read more

Source: www.thestar.com.my

Top found tags: mobile device(2),cybercrime(5),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Zeus Banking Malware Active Despite Recent Botnet TakedownLocation: Federal Trade Commission - Washington, United States
Date published: 09-07-2014

Despite recent law enforcement action severely crippling one of the most active botnets associated with the notorious Zeus banking malware, security researchers say criminals continue to conduct attacks using the Trojan, including a new campaign targeting customers of banks in Canada.Researchers at ... Read more

Source: www.crn.com

Top found tags: government(4),malware(5),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Shylock malware exits stage left, pursued by UK cyber policeLocation: National Crime Agency - London, United Kingdom
Date published: 10-07-2014

National Crime Agency leads campaign to knock out Shakespearian malware that infected at least 30,000 PCs.The UKs National Crime Agency has led a global campaign to knock out the Shylock malware, which infected at least 30,000 Windows PCs across the world and stole funds from victims online ba... Read more

Source: www.theguardian.com

Top found tags: United Kingdom(4),government(5),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Source code for tiny 'Tinba' banking malware leakedLocation: Center for Strategic and International Studies - Washington, United States
Date published: 10-07-2014

The source code for an impressively small but capable malware program that targets online bank accounts has been leaked, according to CSIS Security Group of Denmark.The program, known as Tinba or Zusy, was discovered around mid-2012 and infected tens of thousands of computers in Turkey. ... Read more

Source: www.pcworld.com

Top found tags: exploit kit(4),financial sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NCA lead operation to combat Shylock malwareLocation: National Crime Agency - London, United Kingdom
Date published: 10-07-2014

An international operation led by the National Crime Agency, and supported by CERT-UK and other key partners from across government and the private sector, is combating the threat from Shylock malware used by criminals to steal from bank accounts.The activity is being carried out from the operationa... Read more

Source: www.cert.gov.uk

Top found tags: United Kingdom(2),cybercrime(3),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber-Criminals Revive Pernicious GameOver Zeus MalwareLocation: National Crime Agency - London, United Kingdom
Date published: 11-07-2014

Five weeks after a global takedown of the Gameover Zeus botnet by law enforcement agencies in 11 countries - including Europol, the FBI and the UK's National Cyber Crime Unit - cybercriminals have begun to resurrect the pernicious malware.At the time of the takedown, the UK's National Crime Agency i... Read more

Source: www.ibtimes.co.uk

Top found tags: update(2),government(3),cybercrime(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese Hackers Infiltrate Firms Using Malware-Laden Handheld ScannersLocation: Beijing, China
Date published: 12-07-2014

China-based threat actors are using sophisticated malware installed on handheld scanners to target shipping and logistics organizations from all over the world. According to security firm TrapX, the attack begins at a Chinese company that provides hardware and software for handheld scanners used by ... Read more

Source: yro.slashdot.org

Top found tags: Windows(1),China(2),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
World Cup fans are the latest to be targeted by cyber criminalsLocation: Brasilia-Federal District, Brazil
Date published: 11-07-2014

As rival football teams have been battling it out in this year's World Cup, cyber criminals have had their eye on a different goal to cash in on this global distraction at any opportunity.Among the legitimate marketing campaigns, these cyber criminals have been trying to exploit the public's ent... Read more

Source: phys.org

Top found tags: website(1),cybercrime(2),Kaspersky Lab(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Attacks Target Teleco IndustryLocation: Kaspersky HQ - Moscow, Russia
Date published: 12-07-2014

TEHRAN (FNA)- Kaspersky Lab found that targeted cyber attacks are on the rise year-over-year, and also identified the business sectors most likely to be targeted.A survey of nearly 4,000 IT managers across 27 countries, revealed that 12% of all businesses reporting a targeted attack in 2013, has ris... Read more

Source: english.farsnews.com

Top found tags: antivirus(3),Kaspersky Lab(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CryptoLocker's delivery platform remains operationalLocation: BitDefender HQ - Bucharest, Romania
Date published: 14-07-2014

A new report from BitDefender warns that the content delivery network used by CryptoLocker is still up and running, and while it isn't serving the ransomware that made it famous, it's still a vital communications channel for various other threats.FEATURED RESOURCEPresented by Citrix Systems10 essent... Read more

Source: www.csoonline.com

Top found tags: cybercrime(4),malware(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GCHQ Catalog of Exploit ToolsLocation: Microsoft HQ - Redmond, United States
Date published: 14-07-2014

The latest Snowden story is a catalog of exploit tools from JTRIG (Joint Threat Research Intelligence Group), a unit of the British GCHQ, for both surveillance and propaganda. It's a list of code names and short descriptions, such as these:GLASSBACK: Technique of getting a targets IP address by pret... Read more

Source: www.schneier.com

Top found tags: social media(2),United Kingdom(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA 'back doors' in US software standardsLocation: National Institute of Standards - Gaithersburg, United States
Date published: 15-07-2014

US government standards for software may enable spying by the National Security Agency through widely used coding formulas that should be jettisoned, some of the countrys top independent experts concluded in papers released on Monday.Such mathematical formulas, or curves, are an arcane but essent... Read more

Source: www.stuff.co.nz

Top found tags: trojan(2),government(7),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cryptowall malware computer virus warningLocation: London, United Kingdom
Date published: 15-07-2014

Police have issued a warning about a new form of computer virus.Humberside Police say the malware Cryptowall can block access to all files on a computer.The National Fraud Intelligence Bureau (NFIB) said the virus poses a \"significant\" threat.A spokesman for the NFIB said: \"Cryptowall is the late... Read more

Source: www.hulldailymail.co.uk

Top found tags: website(1),cybercrime(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
\"Gameover\" malware revival - is it really up from the canvas?Location: Sophos HQ - Oxfordshire, United Kingdom
Date published: 15-07-2014

When we talk about \"the XYZ malware,\" especially when law enforcement conducts some sort of takedown, we never literally mean \"one piece of malware.\"We're just using synecdoche, which is the dinner-party way of referring to a figure of speech where you let a part refer to the whole.In the same w... Read more

Source: nakedsecurity.sophos.com

Top found tags: malware(3),telecom sector(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Leaked GCHQ catalog of exploit tools for manipulation and mass surveillanceLocation: GCHQ - Cheltenham, United Kingdom
Date published: 16-07-2014

Just as civil liberties groups challenge the legality of the UK intelligence agencys mass surveillance programs, a catalog of exploit tools for monitoring and manipulation is leaked online.The Joint Threat Research Intelligence Group (JTRIG), a department within the Government Communications Head... Read more

Source: blogs.computerworld.com

Top found tags: social media(2),United Kingdom(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
THE JAPANESE NEED TO WATCH OUT FOR THIS BANKING TROJANLocation: Tokio, Japan
Date published: 17-07-2014

A new member of the Snifula family is out to cause trouble.The banking trojan, Neverquest, is continuing to evolve as it targets the Japanese, German and American banking sectors, according to security firm Symantec.The malware allows hackers to steal bank login details from users by modifying the p... Read more

Source: www.cbronline.com

Top found tags: cybercrime(2),trojan(2),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian malware infiltrated the Nasdaq servers, says BusinessweekLocation: NASDAQ - New York, United States
Date published: 17-07-2014

A Bloomberg Businessweek report has revealed that the CIA, NSA, and other agencies spent months investigating a major malware attack on Nasdaq, revealing the stock exchange service's vulnerability. In 2010, the FBI picked up hints that an intruder had compromised Nasdaq's central servers. After look... Read more

Source: www.theverge.com

Top found tags: vulnerability(1),financial sector(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Botnet Targets Point-of-Sale SystemsLocation: Los Angeles, United States
Date published: 09-07-2014

A new botnet has been discovered by security researchers, who observed that it uses the infected machines to scan for the presence of point-of-sale systems and gain access to the information through brute-force attacks. Los Angeles-based cyber threat intelligence firm IntelCrawler says that the name... Read more

Source: www.hackbusters.com

Top found tags: Intel(1),research(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crooks Seek Revival of Gameover Zeus BotnetLocation: Crook, United States
Date published: 10-07-2014

Cybercrooks today began taking steps to resurrect the Gameover ZeuS botnet, a complex crime machine that has been blamed for the theft more than $100 million from banks, businesses and consumers worldwide. The revival attempt comes roughly five weeks after the FBI joined several nations, researchers... Read more

Source: krebsonsecurity.com

Top found tags: update(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Botnet virtual currency hackers caught by Greek policeLocation: Facebook - Menlo Park, United States
Date published: 11-07-2014

Greek police have arrested two people in connection with a botnet that hacked computers to mine a virtual currency similar to Bitcoin and affected over 250,000 machines worldwide.Facebooks Threat Infrastructure team published a blog post that explained as many as 50,000 Facebook accounts have bee... Read more

Source: www.tgdaily.com

Top found tags: government(3),financial sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tasty Spam: The Gameover Trojan is BackLocation: Cloud, United States
Date published: 12-07-2014

Botnet takedowns aren't permanent. Less than a month after law enforcement officials and security researchers took down the Cutwail botnet, the gang appears to be back in action.A joint operation back in May between law enforcement and security researchers took the Cutwail botnet offline. While spam... Read more

Source: au.pcmag.com

Top found tags: cybercrime(4),financial sector(4),malware(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police Scotland targets online paedophilesLocation: Scotland, United Kingdom
Date published: 17-07-2014

PAEDOPHILES who prey on vulnerable people online are being warned that theres no place to hid, after Police Scotland announced they have arrested over 300 suspected paedophiles in the past year.Officers from Police Scotland arrested 339 suspected paedophiles since April 2013, as part of an ongoin... Read more

Source: www.cumbernauld-media.com

Top found tags: threat(1),child pornography(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Juniper boosts DDoS Secure appliance to mitigate UDP-based amplification attacksLocation: Juniper Networks - Sunnyvale, United States
Date published: 17-07-2014

Juniper Networks has added a new way for its anti-DDoS appliance to mitigate whats known as massive UDP-based amplification attacks that typically work by exploiting compromised servers of different kinds to both spoof and vastly increase the denial-of-service barrage.One type of such attack that... Read more

Source: www.networkworld.com

Top found tags: DoS(2),Juniper Networks(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
L33t haxxors compete to p0wn popular home routersLocation: Cisco HQ - San Jose, United States
Date published: 18-07-2014

Gird your loins router-makers: a throng of hackers are set to pry apart your woefully insecure hardware in a competition to expose bad firmware and hard-coded credentials. The competition will take place at the DEF CON 22 conference and glories in the name "SOHOpelessly Broken". The event is the bra... Read more

Source: go.theregister.com

Top found tags: website(1),backdoor(2),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Acunetix offers free network security scanLocation: New York, United States
Date published: 18-07-2014

Acunetix is offering 10,000 free network security scans with Acunetix Online Vulnerability Scanner in a bid to make it easier for businesses to take control of their network security. Acunetix Online Vulnerability Scanner is a hosted security scanner that will scan a perimeter server for network lev... Read more

Source: net-security.org

Top found tags: trojan(2),United States(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EC3 aids Romanian cybercriminal network takedownLocation: European Cybercrime Centre - Den Haag, The Netherlands
Date published: 18-07-2014

The European Cybercrime Centre (EC3) at Europol in Holland reports the take-down earlier this week of a Romania-based organised cybercrime network suspected of sophisticated electronic payment crimes causing losses of at least 2 million through the use of RATs (Remote Access Tool) with key logger... Read more

Source: www.scmagazineuk.com

Top found tags: Germany(2),government(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Video of child beaten with shovel goes viralLocation: Facebook - Menlo Park, United States
Date published: 17-07-2014

The Cyber Crime Unit of the Trinidad and Tobago Police Service (TTPS) has been ordered to investigate a video circulating on various social media sites yesterday, in which a woman used a shovel to beat a young boy about his body. The video, which is four minutes 37 seconds long, depicts an older wom... Read more

Source: www.trinidadexpress.com

Top found tags: Twitter(1),cybercrime(2),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Industry should team up with Govt to tackle cyber crime: Telangana IT ministerLocation: New York, United States
Date published: 18-07-2014

HYDERABAD, JULY 18: Industry should collaborate with Government in tackling cyber crime, according to K T Ramarao, Minister for IT and Panchayat Raj, Government of Telangana.He was addressing the delegates at the inaugural session of a conference on cyber security organised by the Confederation of I... Read more

Source: www.thehindubusinessline.com

Top found tags: India(1),government(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government-grade malware in hacker handsLocation: Microsoft HQ - Redmond, United States
Date published: 18-07-2014

"Government-grade" malware, which lurks in computer systems undetected for long periods of time, is believed to be in the hands of hackers using it to make rootkits and ransomware more potent. According to security researchers at Sentinel Labs, malware originally created for the purpose for governme... Read more

Source: www.zdnet.com

Top found tags: government(2),malware(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hi-tech Fagin couple used Apple scam cash to fly pickpockets to UKLocation: Metropolitan Police - London, United Kingdom
Date published: 18-07-2014

A pair of phishing fraudsters each received long jail terms after they were convicted of making 15,000 through online scams before using the funds to finance the travel of other crooks into the UK. Constanta Agrigoroaie, 23, and Radu Savoae, 28, both of Mornington Avenue, Ilford, both pleaded guil... Read more

Source: go.theregister.com

Top found tags: telecom sector(2),United Kingdom(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critroni Crypto Ransomware Seen Using Tor for Command and ControlLocation: Kaspersky HQ - Moscow, Russia
Date published: 18-07-2014

Theres a new kid on the crypto ransomware block, known as Critroni, thats beensold in underground forums for the last month or so and is now being dropped by the Angler exploit kit. The ransomware includes a number of unusual features and researchers say its the first crypto ransomware se... Read more

Source: threatpost.com

Top found tags: United States(4),malware(5),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
vBulletin Fixes SQL Injection Vulnerability That Exposes Website DatabasesLocation: vBulletin - Segundo, United States
Date published: 18-07-2014

Software developer vBulletin announced on Wednesday that it had released a patch to address a serious SQL injection vulnerability affecting the its forum software. The existence of the security hole came to light on Tuesday, when Nytro, the administrator of the hacker community forum Romanian Securi... Read more

Source: securityweek.com

Top found tags: vulnerability(2),cybercrime(3),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Criminals get hold of 'Russian state malware'Location: Microsoft HQ - Redmond, United States
Date published: 18-07-2014

One of the first cases of government-grade malware falling into the hands of common cyber criminals has been uncovered by US security firm Sentinel Labs. Criminals get hold of 'Russian state malware' Criminals get hold of 'Russian state malware' Sentinel research head Udi Shamir reported on Thursday... Read more

Source: www.scmagazineuk.com

Top found tags: Microsoft(2),trojan(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Embedded Windows XP systems targeted by new Chinese malwareLocation: Microsoft HQ - Redmond, United States
Date published: 17-07-2014

Chinese firm uses unusual techniques to infected legacy computer systems. Embedded Windows XP systems targeted by new Chinese malware Embedded Windows XP systems targeted by new Chinese malware A research firm has spotted a piece of Windows XP malware designed specifically for embedded systems - eff... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(2),financial sector(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBay Q2 results up, password reset took toll on user activityLocation: PayPal HQ - San Jose, United States
Date published: 17-07-2014

Despite second quarter financials that were on par or slightly better than predicted, eBay had a challenging quarter and took significant body blows after a breach prompted the company to ask users to reset their passwords and PayPal President Dave Marcus stepped down, CEO Jack Donahoe s... Read more

Source: www.scmagazine.com

Top found tags: password(1),report(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pay-as-You-Go Security With AWSLocation: Fortinet - Sunnyvale, United States
Date published: 17-07-2014

Just a few short months ago, Fortinet had a major milestone for public cloud computing with the release of our flagship FortiGate security solution on Amazon Web Services environments. Security and privacy continue to be a top issues, if not the #1 concern, for enterprises looking to move servers an... Read more

Source: blog.fortinet.com

Top found tags: trend(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How elite hackers (almost) stole the NASDAQLocation: NASDAQ - New York, United States
Date published: 17-07-2014

In 2010, elite hackers, most likely from Russia, used at least two zero-day vulnerabilities to penetrate the computer network operated by Nasdaq Stock Market, a hack that allowed them to roam unmolested for months and plant destructive malware designed to cause disruptions, according to a media repo... Read more

Source: arstechnica.com DHS Mistakenly Releases 840 Pages of Critical Infrastructure Documents | The Operation Aurora attack was publicized in 2010 and impacted Google and a number of other high-profile companies. However, DHS responded to the request by releasing more than 800 pages of documents related to the \'Aurora\' experiment conducted several years ago at the Idaho National Laboratory, where researchers demonstrated a way to damage a generator via a cyber-attack. Of the documents released by the DHS, none were related to the Operation Aurora cyber attack as requested. Many of the 840 pages are comprised of old weekly reports from the DHS\' Control System Security Program (CSSP) from 2007. Other pages that were released included information about possible examples of facilities that could be vulnerable to attack, such as water plants and gas pipelines. | http://omnifeed.com/article/news.slashdot.org/story/14/07/09/1427215/dhs-mistakenly-releases-840-pages-of-critical-infrastructure-documents | 09-07-2014 | omnifeed.com

Top found tags: government(7),0-day(1),financial sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
National Labs and Industry Partner to Train Critical Infrastructure Cybersecurity SpecialistsLocation: Los Alamos, United States
Date published: 14-07-2014

Lawrence Livermore National Laboratory, Los Alamos National Laboratory and Bechtel BNI are joining forces to a new class of cyberdefense professionals to protect the nations critical digital infrastructure. The Bechtel-Lawrence Livermore-Los Alamos Cyber Career Development Program is designed to ... Read more

Source: www.afcea.org

Top found tags: research(1),training(1),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Securing the U.S. Electrical Grid, the \"Most Critical of Critical Infrastructure\"Location: New York, United States
Date published: 16-07-2014

The Center for the Study of the Presidency & Congress (CSPC) released a report this month on the U.S. electrical grid, a system it dubs \"the most critical of critical infrastructure.\" In preparation for its report, CSPC conducted a series of off-the-record discussions with experts from the governm... Read more

Source: www.hsdl.org

Top found tags: cyber security(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Time to Pay Attention to the NIST Guide to ICS SecurityLocation: National Institute of Standards - Gaithersburg, United States
Date published: 09-07-2014

About 6 months ago I wrote an article for this blog about the NIST Cybersecurity Framework. The article described how the framework came to be, what it is, what it is supposed to do and what you should do about it.If you have any interest in industrial cyber security you will want to download the la... Read more

Source: www.belden.com

Top found tags: government(2),NIST(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Readers Write: PSEG LI Smart Meters a threat to privacyLocation: Island, United States
Date published: 10-07-2014

We would do well to educate our local county and city representatives to educate them and update them on all the issues and concerns and ask them to ban the installation in our local communities as has been done in 47 places so far in California. There are presently pilot programs of Smart Meters... Read more

Source: www.theislandnow.com

Top found tags: cyber security(2),smart meter(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critical Infrastructure Companies Lack CyberdefensesLocation: New York, United States
Date published: 11-07-2014

Although the U.S. government has established a framework for managing cybersecurity risks, it is voluntary, and few of the world's critical infrastructure companies follow it. NIST's guidance \"is very daunting, and many agencies don't know where to start,\" said Tripwire CTO Dwayne Melancon. So, th... Read more

Source: www.technewsworld.com

Top found tags: United States(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beware of infected hotel PCs stealing guests passwords, feds warnLocation: Microsoft HQ - Redmond, United States
Date published: 15-07-2014

The US Secret Service is warning hotel operators to be on the lookout for malware that steals passwords and other sensitive data from guests using PCs in business centers, according to a published report.The non-public advisory was issued on last Thursday, KrebsOnSecurity reporter Brian Krebs report... Read more

Source: arstechnica.com

Top found tags: OS X(2),telecom sector(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Hazards Of Probing The Internet's Dark SideLocation: The Washington Post - Washington, D.C., United States
Date published: 08-07-2014

Late last year, hackers breached Target's data security and stole information from millions of credit cards. Brian Krebs, who writes about cybercrime and computer security for his blog, Krebs on Security, broke the story. A few days later, he broke the story of a credit card breach at Neiman Marcus.... Read more

Source: wyomingpublicmedia.org

Top found tags: cyber security(2),financial sector(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Cyber Security Talent Gap: Why Cybercrime is No Longer an IT IssueLocation: New York, United States
Date published: 09-07-2014

For boards of directors and leaders across organisations, cyber security is no longer an IT issue but an urgent matter of risk management.The list of risks is long and continues to get longer: theft of intellectual property, breaches of customer information, denial of service, malicious code, viruse... Read more

Source: uk.news.yahoo.com

Top found tags: cyber security(4),cybercrime(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brazil cybertheft could be biggest everLocation: Brasilia-Federal District, Brazil
Date published: 10-07-2014

WASHINGTON: A scheme that has been skimming funds from Brazilian bank payments over the past two years may be the largest cybercrime heist in history, at some US$3.75bil (RM11.91bil), security researchers say. The scheme targets a Brazilian payment system called the Boleto, which can be issued onlin... Read more

Source: www.thestar.com.my

Top found tags: cyber security(4),financial sector(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Will smart cities power the future of cybercrime and mass surveillance?Location: Berlin, Germany
Date published: 10-07-2014

Research by a group of European cybersecurity experts is raising new concerns about the increasing stealthiness of hacker techniques to command and control massive networks of compromised computers, including future scenarios concerning smartphones, buildings and so-called smart cities.In a pa... Read more

Source: fedscoop.com

Top found tags: cybercrime(3),cyber security(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nigeria: Combating Cybercrime Through Constructive EngagementLocation: Lagos, Nigeria
Date published: 10-07-2014

As the Office of the National Security Adviser begins moves to check cybercrime, which has over the years given Nigeria away as a community of fraudsters, Raheem Akingbolu sees the step as a good approach to fixing the country's battered image.Among other issues, cybercrime and insurgency in the nor... Read more

Source: allafrica.com

Top found tags: government(2),cyber security(4),Nigeria(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Combating Cybercrime Through Constructive EngagementLocation: Lagos, Nigeria
Date published: 10-07-2014

As the Office of the National Security Adviser begins moves to check cybercrime, which has over the years given Nigeria away as a community of fraudsters, Raheem Akingbolu sees the step as a good approach to fixing the country's battered image.Among other issues, cybercrime and insurgency in the nor... Read more

Source: www.ictafrica.info

Top found tags: cyber security(4),government(4),Nigeria(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacking techniques are advanced, but are your security measures?Location: New York, United States
Date published: 14-07-2014

Businesses are not equipping themselves to deal with Advanced Evasion Techniques, instead choosing to hide behind traditional firewalls. High profile hacking incidents such as the recent cyber attacks on eBay and shoe retailer Office have encouraged a number of businesses to take the threat of cyber... Read more

Source: www.information-age.com

Top found tags: security measures(2),cyber security(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New banking malware 'Kronos' advertised on underground forumsLocation: Kaspersky HQ - Moscow, Russia
Date published: 15-07-2014

A new Trojan program designed to steal log-in credentials and other financial information from online banking websites is being advertised to cybercriminal groups on the underground market.The new malware is called Kronos, and based on a recent ad seen in a Russian cybercriminal forum it can steal c... Read more

Source: www.cso.com.au

Top found tags: financial sector(4),Kaspersky Lab(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers, Inc.: Online crime pays, big-timeLocation: Seoul, South Korea
Date published: 15-07-2014

At 2 p.m. on March 20, 2013 the hard drives of tens of thousands of computers in South Korea were suddenly wiped clean in a massive cyberattack. The main targets were banks and news agencies. At first the assault looked like a case of cyber-vandalism. But as they probed deeper, the computer sleuths ... Read more

Source: thechronicleherald.ca

Top found tags: cyber security(4),South Korea(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
University of Cincinnati Recognized for Fight Against Cyber CrimeLocation: National Security Agency - Fort Meade, United States
Date published: 15-07-2014

The United States National Security Agency, NSA, announced that that UC is among five universities named as Cyber Operations Centers of Excellence.Students in the College of Engineering and Applied Science (CEAS) Department of Electrical Engineering and Computer Systems (EECS) are eager to continue ... Read more

Source: www.uc.edu

Top found tags: government(4),United States(4),education(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
University of Cincinnati Recognized for Fight Against Cyber CrimeLocation: National Security Agency - Fort Meade, United States
Date published: 15-07-2014

The United States National Security Agency, NSA, announced that that UC is among five universities named as Cyber Operations Centers of Excellence.Students in the College of Engineering and Applied Science (CEAS) Department of Electrical Engineering and Computer Systems (EECS) are eager to continue ... Read more

Source: www.uc.edu

Top found tags: government(4),United States(4),education(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Emergency surveillance bill puts public at risk of cyber criminalsLocation: London, United Kingdom
Date published: 17-07-2014

Customers' personal information could be more vulnerable to cybercrime if the emergency surveillance law is passed, industry experts have warned.Analysts have raised alarms about the lack of detail on data protection in the bill, given it significantly increases the amount of customer information wh... Read more

Source: www.politics.co.uk

Top found tags: cybercrime(4),cyber security(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden: 'Wannabe PRISM partner' Dropbox is 'hostile to privacy'Location: National Security Agency - Fort Meade, United States
Date published: 17-07-2014

Edward Snowden said cloud storage service Dropbox is "hostile to privacy," and called for more companies to offer services that prevent government snooping. In an interview with The Guardian, the newspaper which the former government contractor went to publish classified materials detailing the U.S.... Read more

Source: www.zdnet.com

Top found tags: privacy(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden: 'Wannabe PRISM partner' Dropbox is 'hostile to privacy'Location: National Security Agency - Fort Meade, United States
Date published: 17-07-2014

Edward Snowden said cloud storage service Dropbox is "hostile to privacy," and called for more companies to offer services that prevent government snooping. In an interview with The Guardian, the newspaper which the former government contractor went to publish classified materials detailing the U.S.... Read more

Source: www.zdnet.com

Top found tags: privacy(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Top 10 Things Cybersecurity Professionals Need to Know About the Internet of EverythingLocation: New York, United States
Date published: 18-07-2014

The Internet of Everything (IoE) is accelerating, creating significant opportunities for organizations, individuals, communities, and countries as more things come online along with the people, processes, and data that interact with them. Building on the foundation of the Internet of Things, or ... Read more

Source: securityweek.com

Top found tags: smart meter(2),cyber security(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Privacy groups, security experts and others implore Obama to veto CISALocation: White House - Washington D.C., United States
Date published: 17-07-2014

Nearly three-dozen privacy groups, security experts and other organizations were named as signatories in letter sent to President Barack Obama on Tuesday, which implores the U.S. leader to veto the Cybersecurity Information Sharing Act (CISA) of 2014. CISA, which passed the Senate Intelligence Commi... Read more

Source: www.scmagazine.com

Top found tags: information sharing(2),Jacob Appelbaum(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA spies just LOVE swapping your sexts, says Snowden: 'It's a fringe benefit'Location: National Security Agency - Fort Meade, United States
Date published: 17-07-2014

Edward Snowden has given an interview to The Guardian from his Russian hideout and warned that, among other things, those naked selfies people send to their loved ones are common currency among NSA staff. "You've got young enlisted guys, 18 to 22 years old. They've suddenly been thrust into a positi... Read more

Source: go.theregister.com

Top found tags: telecom sector(2),United States(2),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tesla Model S hack reportedly controls locks, horn, headlights while in motionLocation: Palo Alto, United States
Date published: 17-07-2014

susceptible to hacks that can remotely control the cars locks, horn, headlights, and skylight while the car is in motion, according to a published report. Further Reading [Tesla_Mode] How mobile app weakness could let hackers track and unlock a Tesla Model S Lack of limits on wrong passwords, thr... Read more

Source: arstechnica.com Trio charged in York County with credit-card fraud now indicted federally | Three New York City men already charged in York County for allegedly possessing more than 60 counterfeit credit cards have now been indicted in federal court.Dawill Miguel Almonte, 22, Danilo Vargas, 25, and Jeriel Delosangeles, 25, all of the Bronx, remain free on bail, charged in York County with illegally possessing counterfeit credit cards, according to county court records.On Wednesday, a federal grand jury in Harrisburg indicted the trio on a federal charge of possessing 15 or more counterfeit or unauthorized access device cards, according to federal court records.State police on Nov. 19 pulled over a vehicle with the three men inside. During that traffic stop, troopers found 62 counterfeit credit cards, according to a news release from the U.S. Attorney\'s Office in Harrisburg.State police filed charges in February of this year, county court records state.It is not unusual for defendants charged in common pleas court also to be charged federally, if their alleged crimes also violate federal law.When that happens in York County, the local cases are normally put on hold until the federal charges are resolved. If there is a guilty plea or conviction in federal court, the York County charges are usually dropped. | http://www.yorkdispatch.com/breaking/ci_26166781/trio-charged-york-county-credit-card-fraud-now | 17-07-2014 | www.yorkdispatch.com

Top found tags: China(2),cyber security(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malwarebytes, Started by Teenager, Raises $30 Million to Battle MalwareLocation: Harrison, United States
Date published: 10-07-2014

Ten years ago, when Marcin Kleczynski was 14, he accidentally infected his parents computer while looking for a key generator for a videogame. The computer had antivirus software from a major vendor already installed.Mr. Kleczynski was surprised, but being helpless and jobless, he said, he ... Read more

Source: blogs.wsj.com

Top found tags: website(1),cybercrime(2),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Shylock' malware hit by authoritiesLocation: National Crime Agency - London, United Kingdom
Date published: 10-07-2014

A cybersecurity threat known as Shylock has been disrupted thanks to an international operation, the UK's National Crime Agency (NCA) has said.Shylock was said to have been installed on more than 30,000 machines worldwide, but mostly targeted bank accounts of people living in the UK.As ever, the NCA... Read more

Source: www.bbc.com

Top found tags: cyber security(4),financial sector(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Private Detective London Phone Forensics Department Gives Input on Solving Spyware CasesLocation: Londen, United Kingdom
Date published: 11-07-2014

As reported by the article in BBC News, dated 18 June 2014: eBay pulls sales of Chinese 'spyware phones', popular website eBay has banned the sale of a smartphone after it was discovered that the model in particular comes equipped with pre-installed spy software in its native Chinese factory. As dis... Read more

Source: www.digitaljournal.com

Top found tags: Google(3),Google Play(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Shipping companies' computers compromised by malware-infected Chinese scannersLocation: New York, United States
Date published: 11-07-2014

Malware-infected scanners sold by a Chinese manufacturer led to the theft of sensitive financial and operational data from at least a half-dozen U.S. and European logistics and shipping companies.The malware was also found in software available for download on the manufacturer's Website, security ve... Read more

Source: www.itnews.com

Top found tags: DHS(2),government(3),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LibreSSL ships first portable version, now up to 48% less huge!Location: Ottawa, Ontario, Canada
Date published: 13-07-2014

Just under three months ago, we wrote about a coding project called LibreSSL.LibreSSL was started by the redoubtable OpenBSD team in the wake of the Heartbleed vulnerability in OpenSSL, a very widely-used open source cryptographic toolkit for secure communications.In case you missed the excitement, ... Read more

Source: nakedsecurity.sophos.com

Top found tags: cyber security(2),financial sector(2),OpenSSL(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gameover Zeus malware returns after US crackdownLocation: Emsisoft - Thalgau, Austria
Date published: 14-07-2014

WASHINGTON: Malicious software used to steal millions from bank accounts has re-emerged a month after US authorities broke up a major hacker network using the scheme, security researchers say.The security firm Malcovery said it identified a new trojan based on the Gameover Zeus malware, which offici... Read more

Source: timesofindia.indiatimes.com

Top found tags: Department of Justice(3),financial sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UTSA to discuss cybersecurity with government, business leaders at Washington meetingsLocation: National Security Agency - Fort Meade, United States
Date published: 14-07-2014

(July 14, 2014) -- UTSA President Ricardo Romo will lead a contingent of university officials to Washington, D.C., this week to discuss critical issues in cybersecurity and UTSA's growing capabilities in cybersecurity and cloud computing.UTSA has emerged as a national leader in cybersecurity researc... Read more

Source: www.utsa.edu

Top found tags: cyber security(4),government(8),United States(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ESET discovers decryptor tool for Simplocker malwareLocation: ESET HQ - Bratislava, Slovak Republic
Date published: 17-07-2014

BANGALORE, INDIA:ESET, a global pioneer in proactive protection for 25-years, discovers Decryptor tool ESET Simplocker Decryptor, an easy-to-use tool to decrypt files that have been encrypted by Simplocker malware. The research and development team of ESET was successful to notice and to be the firs... Read more

Source: www.ciol.com

Top found tags: Ukraine(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Exploit Nest Thermostats Vulnerability To Prevent Data From Being Shared With GoogleLocation: Google HQ - Mountain View, United States
Date published: 17-07-2014

Most of the time, hackers take advantage of a vulnerability in software to do something malicious, such as stealing account information, gaining backdoor access to someones computer, and so on. However interestingly enough, it seems that a group of hackers have decided that they would be using a ... Read more

Source: www.ubergizmo.com

Top found tags: backdoor(2),cyber security(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BrutPOS: RDP Bruteforcing Botnet Targeting POS SystemsLocation: New York, United States
Date published: 09-07-2014

There have been an increasing number of headlines about breaches at retailers in which attackers have made off with credit card data after compromising point-of-sale (POS) terminals. However, what is not commonly discussed is the fact that one third of these breaches are a result of weak default pas... Read more

Source: www.fireeye.com

Top found tags: financial sector(2),cybercrime(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook dismantled Lecpetex botnet which infected 250,000 ComputersLocation: Facebook - Menlo Park, United States
Date published: 10-07-2014

Facebook in a joint operation with the Greek Cyber Crime Division dismantled the Lecpetex botnet, which infected 250,000 Computers in different countries.Facebook has announced to have successfully conducted the takeover of the Lecpetex botnet in Greece. The bad actors operating in Greece were using... Read more

Source: securityaffairs.co

Top found tags: cybercrime(4),social media(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers know who is shipping what, and to whereLocation: New York, United States
Date published: 10-07-2014

Seven shipping and logistics companies across continents have discovered malware in their scanners that siphoned their financial, customer and other data to a Chinese botnet.The botnet a network of computers infected with malware and controlled as a group without its owners knowing led to th... Read more

Source: www.marketwatch.com

Top found tags: United States(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senate Weighs Botnet Busting ChangesLocation: White, United States
Date published: 17-07-2014

The Obama administration wants Congress to update U.S. anti-hacking laws to allow law enforcement agencies to more easily crack down on fraudsters operating abroad, disrupt botnets used to distribute spam and distributed-denial-of-service attacks and bust \"for hire\" malware and botnet service prov... Read more

Source: www.govinfosecurity.com

Top found tags: update(2),government(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Are endpoints the most vulnerable part of the network?Location: Lea, United States
Date published: 18-07-2014

Only 39% of companies have advanced endpoint security protections in place even though 74% consider endpoints to be most vulnerable to a cyber-attack, and 76% say the number of endpoints is rising. In addition, 58% of respondents said traditional anti-virus defenses no longer address advanced target... Read more

Source: net-security.org

Top found tags: security measures(2),telecom sector(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Seagate delivers five new NAS productsLocation: New York, United States
Date published: 18-07-2014

Seagate announced five NAS products in a range of capacities from 2TB to 30TB and performance suited for the home office to small businesses with up to 50 employees. The Seagate NAS and NAS Pro lines set the standard for ease-of-use by introducing a intuitive operating system, NAS OS 4, together wit... Read more

Source: net-security.org

Top found tags: cyber security(2),mobile device(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Mayhem malware targets Linux, UNIX serversLocation: Microsoft HQ - Redmond, United States
Date published: 18-07-2014

A new malware that runs on UNIX-like servers even with restricted privileges has already infected machines in Australia and is actively hunting for more targets, a new research paper has shown.Three researchers from Russian web provider Yandex - Andrej Kovalev, Konstantin Ostrashkevich and Evgeny Si... Read more

Source: www.itnews.com.au

Top found tags: Windows(1),cyber security(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New York proposes BitLicense regime for virtual currency firmsLocation: New York City, New York, United States
Date published: 18-07-2014

The new 'BitLicense' regulatory framework, published on Thursday, outlines new rules for businesses that trade, store, or provide exchange services for virtual currencies proposed by the state. The framework looks to introduce consumer protections, anti-money laundering compliance, and security rule... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),information security(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government-grade malware used for ransomware attacksLocation: Microsoft HQ - Redmond, United States
Date published: 18-07-2014

It was only a matter of time until cyber criminals got their hands on a piece of government-made malware and repurposed it for their own criminal needs. Sentinel Labs researchers have unearthed and have managed to analyze a variant of the malware they dubbed Gyges, which they believe was previously ... Read more

Source: net-security.org

Top found tags: trojan(2),cybercrime(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden calls on businesses to encrypt data, shun DropboxLocation: National Security Agency - Fort Meade, United States
Date published: 18-07-2014

UK cyber experts side with NSA whistle-blower who urges companies to adopt encryption and to shun Dropbox because the cloud storage company is 'hostile to privacy'. Snowden calls on businesses to encrypt data, shun Dropbox Snowden calls on businesses to encrypt data, shun Dropbox US cyber spying whi... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(4),government(6),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A Convicted Hacker and an Internet Icon Join Forces to Thwart NSA SpyingLocation: New York City, New York, United States
Date published: 18-07-2014

Stephen Watt (L) and Ladar Levison at their home office in Garland, TX, where they're creating Dark Mail. Stephen Watt (L) and Ladar Levison in the home office in Garland, TX, where theyre creating Dark Mail. [gallery-ca] Brandon Thibodeaux/WIRED The internet is littered with burgeoning email enc... Read more

Source: wired.com

Top found tags: education(3),United States(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fake Flash Player steals credit card informationLocation: Google HQ - Mountain View, United States
Date published: 18-07-2014

A new trojan that's after credit card details is targeting Android users, warn antivirus experts from Dr. Web. The malware is currently targeting Russian users, but it can easily be modified to target others. It comes in the guise of Adobe Flash Player and, once installed and run, it immediately tri... Read more

Source: net-security.org

Top found tags: cybercrime(3),financial sector(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers Analyze Multipurpose Malware Targeting Linux/Unix Web ServersLocation: Arbor Networks - Burlington, United States
Date published: 18-07-2014

An in-depth analysis of a recently discovered piece of malware that's designed to target Linux and Unix Web servers has been published on Thursday by Virus Bulletin. Andrew Kovalev, Konstantin Otrashkevich and Evgeny Sidorov, researchers at the Russian Internet company Yandex, have studied both the ... Read more

Source: securityweek.com

Top found tags: antivirus(4),Kaspersky Lab(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IT Pros Report Surge in Concern About RansomwareLocation: Ransom, United States
Date published: 18-07-2014

According to the results of a recent KnowBe4 survey of more than 300 IT professionals, 73 percent of respondents said they're very or extremely concerned about the impact of ransomware, up from 48 percent in a similar survey by Webroot in January of this year. Eighty-eight percent of respondents exp... Read more

Source: www.esecurityplanet.com

Top found tags: pornography(3),child pornography(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Edward Snowden: Dropbox is 'hostile to privacy'Location: Dropbox - San Francisco, United States
Date published: 18-07-2014

Dropbox is a very popular cloud storage service, butNSA whistleblower Edward Snowdenis no fan.In a recent interview with The Guardian, Snowden called Dropbox a "targeted, wannabe PRISM partner" that is "very hostile to privacy." Snowden also isn't happy about Dropbox's decision in April to add... Read more

Source: www.pcworld.com

Top found tags: cyber security(4),United States(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple expands 2FA feature to boost securityLocation: Google HQ - Mountain View, United States
Date published: 18-07-2014

Apple has expanded its two-factor authentication (2FA) for iCloud and other services to 48 more countries, bringing the total to 59. The feature was initially launched in 11 countries, including the UK, to help protect users from hackers trying to access their accounts. Anyone using the feature will... Read more

Source: www.computerweekly.com

Top found tags: cyber security(2),United Kingdom(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mayhem malware ropes Linux, UNIX servers into botnetsLocation: WordPress - San Francisco, United States
Date published: 18-07-2014

A new malware that researchers have dubbed Mayhem is being used to target Linux and Unix web servers and has so far compromised over 1,400 Linux and FreeBSD servers around the world, warn researchers from Russian Internet giant Yandex. Mayhem has the functions of a traditional Windows bot, but doesn... Read more

Source: net-security.org

Top found tags: vulnerability(2),website(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Kenilworth Police report case of identity theftLocation: Worth, United States
Date published: 09-07-2014

KENILWORTH On July 3 at 1:56 p.m., Patrolman Sean Kaverick took a report of identity theft.The victim reported that his car was stolen two years ago from 8th Street in Kenilworth and he believes his identity was stolen at that time, police said.In the vehicle at the time of the theft was his wal... Read more

Source: www.nj.com

Top found tags: credit card(2),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The State Of Data Breach In UniversitiesLocation: Butler, United States
Date published: 09-07-2014

Lone-wolf hacker groups creating nuisance hacking tools in the basement have been replaced by sophisticated data-breach criminals as the top cybersecurity threat to universities. Hackers today are working around the clock to steal sensitive research, intellectual property, and personal information, ... Read more

Source: vpncreative.net

Top found tags: cyber security(4),education(6),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Woman gets 12 years for tax fraud schemeLocation: Johnson, United States
Date published: 09-07-2014

JACKSONVILLE, Fla. -A 37-year-old Jacksonville woman was recently sentenced to 12 years in prison for her involvement in an identity theft scheme known as Operation Zig Zag.In March, Latissha Johnson pleaded guilty to charges of identity theft and defrauding a financial institution by schemes.Invest... Read more

Source: www.news4jax.com

Top found tags: identity theft(2),United States(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Calloway man charged with identity theftLocation: Rutherford, United States
Date published: 10-07-2014

Kentucky State Police Trooper Joey Brigmon arrested John Rutherford for allegedly using another persons credit to purchase oil.According to the complaint, Rutherford, 44, of Calloway, used Brenda Craigs personal information in order to make credit transactions at Advance Auto Parts.The complai... Read more

Source: www.harlandaily.com

Top found tags: police(1),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Patient data breach at San Diego hospitalLocation: San Diego, United States
Date published: 09-07-2014

SAN DIEGO (AP) Southern California's Rady Children's Hospital says the private health data of more than 20,000 young patients was mistakenly shared with a handful of job applicants.U-T San Diego reported Tuesday (http://bit.ly/1lUL6qx) that in one breach this month a Rady employee emailed a spre... Read more

Source: www.bayoubuzz.com

Top found tags: financial sector(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DMHC, Blue Shield Announce Data Breach Affecting 18K Calif. DoctorsLocation: California, United States
Date published: 10-07-2014

The Social Security numbers of about 18,000 California physicians were accidentally released with other data by Blue Shield of California and the state Department of Managed Health Care, Medical Daily reports (Wolford, Medical Daily, 7/9).Details of IncidentThe incident occurred after Blue Shield of... Read more

Source: www.californiahealthline.org

Top found tags: identity theft(2),medical sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
State warns of identity theft scamsLocation: Madison, United States
Date published: 10-07-2014

MADISONState officials are warning of a new trend in identity theft that centers on tax returns.The Wisconsin Department of Agriculture, Trade and Consumer Protection said consumers are receiving notices from tax agencies in other states about filed tax returns.The consumers didn't earn income or... Read more

Source: www.gazettextra.com

Top found tags: scam(1),trend(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
No likely data breach from reported Chinese hacking: USLocation: Beijing, China
Date published: 11-07-2014

WASHINGTON: The personal data of thousands of US government workers was not compromised in a recently reported cyber-attack, officials said on Thursday amid fresh allegations that Chinese hackers accessed computers housing employee information.The Office of Personnel Management and the Department of... Read more

Source: www.channelnewsasia.com

Top found tags: cyber security(4),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man with the Bentley logo tattooed on his forehead arrested for defrauding hundreds of Florida residents of $120k (that's only 80k short of affording his dream car)Location: Florida, United States
Date published: 10-07-2014

In a way, Florida's Derek Denesevich went out of his way to help police officers when he got a Bentley logo tattooed across his forehead, since from then on it'd be hard to picture mistaking him for anyone else. And yet it was charges of identity theft that Denesevich, 26, of Lauderhill, surrendered... Read more

Source: www.dailymail.co.uk

Top found tags: police(1),government(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Schnucks Could Pay Up to $500,000 in Data Breach SettlementLocation: St. Louis, United States
Date published: 11-07-2014

ST. LOUIS (KMOX) - Schnucks customers who joined a class action lawsuit after their credit and debit cards were breached will soon be able to seek compensation.A judge has given preliminary approval to the data breach settlement and has raised the amount Schnucks will have to pay out from $300,000 t... Read more

Source: stlouis.cbslocal.com

Top found tags: financial sector(2),identity theft(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
No likely data breach from reported Chinese hacking: USLocation: Beijing, China
Date published: 11-07-2014

WASHINGTON- The personal data of thousands of US government workers was not compromised in a recently reported cyber attack, officials said Thursday amid fresh allegations that Chinese hackers accessed computers housing employee information. The Office of Personnel Management and the Department of H... Read more

Source: www.newvision.co.ug

Top found tags: cyber security(4),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Another POS System Data Breach Adds To Growing Security ConcernsLocation: New York, United States
Date published: 11-07-2014

Information Systems and Supplies Inc. (IS&S) was the recent victim of a series of data breaches through their POS (point-of-sale) systems remote access software. This software, LogMeIn, was used by IS&S to remotely access their clients systems to help facilitate file sharing, data backup, and ... Read more

Source: www.phirelight.com

Top found tags: cyber security(2),data breach(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brian Krebs: Data breach victims need transaction monitoring, not credit monitoringLocation: Target HQ - Minneapolis, United States
Date published: 10-07-2014

Ace security journalist Brian Krebs was on Terry Gross Fresh Air show on NPR yesterday (listen here).In the interview, Krebs discusses his discovery of the Target data breach, the threats hes faced in his work, and the nature of current cybercrime. Very interesting stuff, but what caught our a... Read more

Source: blog.billguard.com

Top found tags: data breach(2),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mickey Mouse is victim of identity theft in Washington stateLocation: Washington, United States
Date published: 12-07-2014

Bellevue police found the iconic Disney character on a fake Washington state driver's license when they recovered a slew of fraudulent IDs, documents and checks tied to an identity theft operation.Authorities in Bellevue, Wash., came across a familiar face when they busted a prolific identity theft ... Read more

Source: www.nydailynews.com

Top found tags: identity theft(2),police(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Experts: Wi-Fi Hotspots Can Leave Users Vulnerable To Identity TheftLocation: Centraal Bureau voor de Statistiek - Den Haag, The Netherlands
Date published: 13-07-2014

NEW YORK(CBSNewYork) Free Wi-Fi can be found everywhere, from the airport to public parks, and even coffee shops.Its convenient for consumers, but as CBS 2s Jericka Duncan reported its also a prime target for hackers.At Gregorys Coffee, Caleb Huff, a private Wi-Fi security expert sho... Read more

Source: newyork.cbslocal.com

Top found tags: financial sector(2),identity theft(2),The Netherlands(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US States Strengthen Data Breach Notification LawsLocation: Florida, United States
Date published: 14-07-2014

As many as 47 states in the US have recently amended, passed or proposed data breach notification laws that require businesses to notify customers when a data breach compromises their sensitive information. The notification requirement will include all affected individuals rather than just those res... Read more

Source: vpncreative.net

Top found tags: education(2),financial sector(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why changing passwords isnt the answer to a data breachLocation: eBay - San Jose, United States
Date published: 14-07-2014

Recommending passwords be changed post breach is becoming common practice. But is it good practice? Another day, another retailer hacked, with user accounts (potentially) compromised. Cue some blanket advising all users to change their passwords.But is this an effective way to deal with cyber attack... Read more

Source: www.information-age.com

Top found tags: cybercrime(2),cyber security(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Preliminary $15M Settlement Reached in Sony PSN Data Breach Class Action LawsuitLocation: San Francisco, California, United States
Date published: 14-07-2014

San Francisco, CA: A $15 million preliminary settlement has been reached in the data breach class action pending against Sony. If approved, the settlement would see $15 million in games and online currency made available to class members as well as identity theft reimbursement. The lawsuit was broug... Read more

Source: www.bigclassaction.com

Top found tags: legislation(1),data breach(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Businesses Learn the Hard Way When It Comes to Cyber AttacksLocation: New York, United States
Date published: 15-07-2014

When it comes to how businesses are approaching cyber security, most know what to do in the event of a cyber incident, defending against phishing and social engineering attacks is priority, and concern over company web facing applications is high, according to a recent survey by TrainACE, a cyber se... Read more

Source: smartdatacollective.com

Top found tags: trojan(2),update(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New York's Data BreachLocation: New York City, New York, United States
Date published: 15-07-2014

Nearly 23 million private records of New Yorkers have been exposed in data security breaches reported by more than 3,000 businesses, nonprofits and governments over the past eight years, New York's attorney general reported.Deliberate hacking was responsible for 40 percent of the 5,000 incidents, wh... Read more

Source: www.wfuv.org

Top found tags: security measures(2),government(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Cost of a Data Breach Is Higher Than You ThinkLocation: New York, United States
Date published: 15-07-2014

Did you know that its possible to experience a serious data breach even if you dont store cardholder data after a transaction? Cyber criminals have become adept at breaking into merchants POS systems that capture and forward electronic payments. Todays attacks have become sophisticated a... Read more

Source: www.firstdata.com

Top found tags: research(1),Trustwave(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mandatory data breach laws back on Australian agendaLocation: Sydney, Australia
Date published: 16-07-2014

Australia's on-again, off-again debate about data breach notification laws is on again, courtesy of a report into financial system regulation, at least until the government cans the idea (again).Register readers will recall that a Privacy Alerts bill was proposed by the previous government before th... Read more

Source: www.theregister.co.uk

Top found tags: cyber security(2),data breach(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Guidelines for Responding to Data BreachesLocation: National Institute of Standards - Gaithersburg, United States
Date published: 16-07-2014

These practical suggestions will prepare your organization to respond quickly and effectively to what experts consider nearly inevitable: a data breach.By Tom Zeno and Lindsay HolmesIn the first part of this two-part article (\"Best Practices for Avoiding Costly Data Breaches\"), we offered practica... Read more

Source: www.baselinemag.com

Top found tags: data breach(2),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICO hit by internal data breach but watchdog coy on detailsLocation: London, United Kingdom
Date published: 16-07-2014

The Information Commissioners Office (ICO) has admitted it suffered an internal data-loss incident, although it has not provided any details about what happened.In the data watchdog's annual report, issued on Tuesday, it noted on page 46 that one \"non-trivial\" incident occured over the past 12 ... Read more

Source: www.v3.co.uk

Top found tags: data breach(2),social media(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New study says Chicagoans are among biggest victims of data fraudLocation: Chicago, United States
Date published: 16-07-2014

Chicagoans have one of the strongest data-breach notification fraud laws in the nation, but they are among the biggest victims of having their data used for fraudulent online purchases. Thats one of the findings of a study released Wednesday by a consumer-advocacy group that called on Congress to... Read more

Source: politics.suntimes.com

Top found tags: social media(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Suspect Nabbed by NCPD in Woodmere Credit Card Theft CaseLocation: New York City, New York, United States
Date published: 16-07-2014

Woodmere, NY - July 16th, 2014 - The Crimes Against Property Squad reports the details of an arrest for Forgery and Identity Theft that occurred in Woodmere.According to detectives, on July 9, 2014 a 49 year old male victim noticed that he had not received mail at his Woodmere home for a couple of d... Read more

Source: www.longisland.com

Top found tags: identity theft(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Penn Medicine Rittenhouse has data breachLocation: Phillips, United States
Date published: 16-07-2014

Penn Medicine Tuesday announced a data breach involving receipts from Penn Medicine Rittenhouse that were stolen last month from a locked office in Pennsylvania Hospital.Notifications of the theft were sent to 661 patients Monday, said Susan Phillips, a senior vice president and spokeswoman for the ... Read more

Source: www.philly.com

Top found tags: health sector(2),identity theft(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rady Children's Hospital takes steps in preventing another patient data breachLocation: San Diego, United States
Date published: 17-07-2014

SAN DIEGO (CNS) - Administrators at Rady Children's Hospital took steps to prevent another patient data breach, the acting president of the hospital told a City Council committee Wednesday.Dr. Donald Kearns told members of the Public Safety and Livable Neighborhoods Committee that staffers had been ... Read more

Source: www.kusi.com

Top found tags: health sector(2),medical sector(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICO faced internal data breach; remains tight-lippedLocation: London, United Kingdom
Date published: 17-07-2014

The UK watchdog, Information Commissioners Office (ICO), in charge of ensuring data privacy and security, has been hit by a data security breach, which it describes to be a non-trivial data security incident.The annual report of ICO states that it suffered an internal data breach without me... Read more

Source: www.techienews.co.uk

Top found tags: data breach(2),government(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach epidemic shines spotlight on shared secretsLocation: Adobe HQ - San Jose, United States
Date published: 17-07-2014

Recent history has not been kind to businesses and consumers when it comes to Internet security. From LinkedIn to Adobe to eBay, we continue to hear the same story: X number of passwords/records leaked via company Y data breach. According to Tripwire, the Adobe breach alone compromised over 234,000 ... Read more

Source: gcn.com

Top found tags: OpenSSL(2),social media(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Study finds significant gaps in worlds critical infrastructureLocation: Unisys - Blue Bell, United States
Date published: 15-07-2014

Approximately 70 percent of surveyed critical infrastructure providers reported at least one security breach in the past 12 months, according to research from Unisys Corporation and the Ponemon Institute.In a survey of 599 security executives at oil and gas, utility, and manufacturing companies, the... Read more

Source: bioprepwatch.com

Top found tags: Ponemon Institute(2),telecom sector(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
KnowBe4 Warns New Ransomware Strain Causes Data BreachesLocation: New Hampshire, United States
Date published: 17-07-2014

The recent data breach at brokerage house Benjamin F. Edwards & Co. (BFE) was a result of a CryptoLocker copycat ransomware called CryptoWall, according to a document posted on the DOJ.NH website. The brokerage house announced this week that they had suffered the data breach on May 24, 2014 when the... Read more

Source: insurancenewsnet.com

Top found tags: data breach(2),cybercrime(3),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internet of Things and Cybercrime what risks?Location: European Parliament - Brussel, Beglium
Date published: 11-07-2014

The Internet of Things is expected to lead to 50 billion connected devices by 2020 collecting and exchanging personal data about their users, their lives, their preferences and tastes. This will lead not only to relevant data protection issues, but also to increased cybercrime related risks triggeri... Read more

Source: www.jdsupra.com

Top found tags: security measures(2),cybercrime(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Turning the Tide Against Cybercrime: The Imperative for Investment in Robust SecurityLocation: 32.7379910,-117.1606350
Date published: 11-07-2014

As digital information grows, so does the number of exploits that compromise privacy. We are just not doing enough, or spending enough to stop it. The 2013 Data Breach Investigation Report revealed alarming statistics on cyber attacks: intrusions have been successfully carried out within minutes, ye... Read more

Source: insights.wired.com

Top found tags: telecom sector(4),0-day(1),cybercrime(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Five worst SMB security threats... and how to solve themLocation: Winde, Tynaarlo, Drenthe, The Netherlands
Date published: 15-07-2014

Cybercrime isn't only a problem for big businesses. Here's Davey Winder's picks of the top five small-business security threatsWith the amount of media coverage that recent data breaches such as those experienced by the likes of eBay, Evernote and Domino's Pizza quite rightly attract, you may be for... Read more

Source: www.pcpro.co.uk

Top found tags: vulnerability(1),data breach(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime opens new avenues for insurersLocation: Brussels,Belgium
Date published: 16-07-2014

PARIS Insurers are eagerly eyeing exponential growth in the tiny cyber coverage market but their lack of experience and skills in handling hackers and data breaches may keep their ambitions in check.High-profile cases of hackers seizing sensitive customer data from companies, such as US retailer... Read more

Source: www.bdlive.co.za

Top found tags: hackers(1),data breach(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report finds poor security communication among executivesLocation: New York, United States
Date published: 17-07-2014

Security breaches at high-profile businesses like Target Corp. have forced many companies to consider hiring a chief information security officer for the first time, or elevating the CISO to a more prominent role. Still, according to a new report, a majority of executives rarely -- if ever -- commun... Read more

Source: searchsecurity.techtarget.com

Top found tags: information gathering(2),information security(2),Ponemon Institute(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report finds poor security communication among executivesLocation: New York, United States
Date published: 17-07-2014

Security breaches at high-profile businesses like Target Corp. have forced many companies to consider hiring a chief information security officer for the first time, or elevating the CISO to a more prominent role. Still, according to a new report, a majority of executives rarely -- if ever -- commun... Read more

Source: searchsecurity.techtarget.com

Top found tags: information gathering(2),information security(2),Ponemon Institute(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Execs rate protection of IP higher than customer data: PonemonLocation: Wellington, New Zealand
Date published: 18-07-2014

security concerns rather than customer information breaches, despite the latter occurring more frequently. The study, Exposing the Cybersecurity Cracks: Australia Part 2, found that although there were more known data security breaches involving customer information, breaches concerning intellectual... Read more

Source: www.zdnet.com

Top found tags: Ponemon Institute(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Study: 72 percent of Chicago fraud victims also data breach victimsLocation: Chicago, United States
Date published: 17-07-2014

Chicagoans who have been affected by data breaches are at a higher risk of becoming victims of fraud than anyone whose information was breached in either Miami and Los Angeles. At least 72 percent of Chicago-based fraud victims were also victims of a data breach, according to a study from the Nation... Read more

Source: www.scmagazine.com

Top found tags: data breach(2),government(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
KnowBe4 Warns New Ransomware Strain Causes Data BreachesLocation: New Hampshire, United States
Date published: 17-07-2014

The recent data breach at brokerage house Benjamin F. Edwards & Co. (BFE) was a result of a CryptoLocker copycat ransomware called CryptoWall, according to a document posted on the DOJ.NH website. The brokerage house announced this week that they had suffered the data breach on May 24, 2014 when the... Read more

Source: www.digitaljournal.com

Top found tags: data breach(2),cybercrime(3),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Catch of the Day waits 3 years to reveal data breachLocation: Day, United States
Date published: 18-07-2014

Screenshot by Josh Taylor/ZDNet) The company which owns the Catch of the Day, Scoopon, EatNow, GroceryRun, and MumGo websites informed customers late on Friday that people who joined the site prior to May 7, 2011 should change their passwords as a result. "In early 2011, Catch of the Day and... Read more

Source: www.zdnet.com

Top found tags: social media(2),cyber security(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
40% of IT security teams keep executives in the darkLocation: London,United Kingdom
Date published: 18-07-2014

A new survey uncovered the communication challenges between IT security professionals and executives, a desire to overhaul current security systems and limited security knowledge among executives and employees, according to Websense. The survey of nearly 5,000 global IT security professionals reveal... Read more

Source: net-security.org

Top found tags: cyber security(4),telecom sector(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How hackers get in: Lessons from a network security auditLocation: New York, United States
Date published: 18-07-2014

Data security is a defining challenge for our time, yet many businesses and other organizations remain under-prepared. The problem stems from numerous sources: lack of concern or awareness, unclear security regulations and specifications, and the inherent complexity of the topic. More challenging st... Read more

Source: net-security.org

Top found tags: cybercrime(3),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Major healthcare IT security issues unearthed in worrying reportLocation: Major, United States
Date published: 17-07-2014

Major healthcare IT security issues unearthed in worrying report. Vendors are not being held accountable for meeting minimum security standards by healthcare organisations, claims a new survey. Carried out by security risk management firm Corl Technologies, the research claims that more than half of... Read more

Source: itproportal.com Equipping law-enforcing agencies on cyber crime | Kohima: Addressing a workshop, JI Yaden, IGP & Director, Vigilance & Anti-Corruption said that the conventional transaction and communication is now becoming more user/client friendly with the advancement of IT, which involves the use of alternative means to paper based methods of communication and storage of information.He disclosed that highly intellect criminals with more advanced and updated information and gadgets commit cyber crimes and there is an urgent need for the law enforcing agencies to arm themselves with adequate knowledge and information on cyber forensics and cyber security to contain the alarming rise of cyber crime.A press release on the event reported that the Directorate of Vigilance & Anti-Corruption Police, Nagaland, Kohima in collaboration with National Institute of Electronics & Information Technology (NIELIT) conducted two-day workshop on Cyber Security, Cyber Crimes & Investigation thereof on July 16 and 17 for Investigating Officers at the Conference Hall, Vigilance Commission, Kohima and Forensics Laboratory, NIELIT, Kohima. The welcome address was delivered by JI Yaden, IGP & Director, Vigilance & Anti-Corruption.The resource persons Er Lanuwapang (Director-in-charge), NEILIT, Er Morimenba, Asst. Director, NEILIT and Darmoni, Project Associate, NEILIT spoke on the various topics under Cyber Forensics, Cyber Crime, Mobile & Cyber Security and IT Act. The workshop concluded with practical sessions for the Investigating Officers at the Forensic Laboratory, NIELIT, Kohima. | http://www.morungexpress.com/local/118844.html | 17-07-2014 | www.morungexpress.com

Top found tags: information sharing(2),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Plaintiffs Holding Hospitals Feet to the Fire Over Data BreachLocation: New York, United States
Date published: 17-07-2014

Dothan, AL: A data breach stemming from online commerce is concerning enough, given the growth of e-commerce. With more and more retailers encouraging purchases online, the potential for further data breaches looms, akin to the massive data breach last year involving Target.But there are other disco... Read more

Source: www.lawyersandsettlements.com

Top found tags: medical sector(2),Supreme Court(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DoD provides tips to avoid scammersLocation: Federal Trade Commission - Washington, United States
Date published: 17-07-2014

WASHINGTON, D.C. Service members and their Families can be easy targets for scammers, and financial education is key to prevention, the deputy director of the Pentagons office of Family policy and children and youth said.In an interview with DoD News, Navy Cmdr. Peter Hoegel noted that Wednes... Read more

Source: www.fortcampbellcourier.com

Top found tags: vulnerability(1),identity theft(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
You want privacy? Give us the money and the powers so we can do the job, says watchdogLocation: Graham, United States
Date published: 18-07-2014

best data should die? At the launch of the ICO's latest annual report, the Information Commissioner, Christopher Graham, warned that his organisation needs better funding. "A strong regulator is needed if a data breach affects millions of people," Graham said, "but to do our job properly and to repr... Read more

Source: www.zdnet.com

Top found tags: data breach(2),social media(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Many Security Pros Believe Their Java Applications Are Vulnerable: SurveyLocation: Oracle - Redwood City, United States
Date published: 18-07-2014

Nearly half of the IT professionals surveyed recently by Waratek, a company focused on security and management of Java enterprise applications, believe that the Java applications used by their organizations are vulnerable. The survey revealed that 32% of the roughly 130 CISOs, CIOs, CSOs and other I... Read more

Source: securityweek.com

Top found tags: Windows(1),data breach(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICYMI: Google's Project Zero, ICO breach & sharing intel on critical infrastructureLocation: Google HQ - Mountain View, United States
Date published: 18-07-2014

This week's In Case You Missed It (ICYMI) column takes a look at Google's Project Zero, accusations of double-standards at the ICO and the need to share intelligence on critical infrastructure. George Hotz George Hotz Google's Project Zero gets muted response Google established Project Zero', a t... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(4),government(5),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Benjamin F. Edwards tells New Hampshire AG CryptoWall led to breachLocation: New Hampshire, United States
Date published: 18-07-2014

The data breach that hit brokerage house Benjamin F. Edwards & Co. (BFE) in May was the handiwork of CryptoLocker copycat ransomware. In a breach notification letter to the New Hampshire attorney general's office, the brokerage firm said that an employee was the victim of CryptoWall that encrypted f... Read more

Source: www.scmagazine.com

Top found tags: data breach(2),financial sector(2),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Report: 31 percent of IT security teams don't speak to company execsLocation: New York, United States
Date published: 17-07-2014

Report: Organizations recognize security risks, slow to take action Nearly a third of IT security teams don't communicate with company executives, increasing the risk of attack. Nearly a third of IT security teams never speak with their company's executives about cyber security and of those who did,... Read more

Source: www.scmagazine.com

Top found tags: threat(1),Ponemon Institute(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
This Idaho Lab Holds The Key To Protecting Critical Infrastructure From Cyber-AttacksLocation: Idaho, United States
Date published: 12-07-2014

In the high desert some 50 miles west of Idaho Falls, the terrain is so rugged that the vehicle in which your correspondent was touring the facilities at Idaho National Laboratory (INL) ended up with two shredded tyres.Originally set up in the 1940s to test naval artillery, the high-security governm... Read more

Source: www.businessinsider.com

Top found tags: DHS(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why critical infrastructure needs both asynchronous and synchronous componentsLocation: New York, United States
Date published: 15-07-2014

In the last article we explored the organization and components needed to pull together the Security Ecosystem for the Critical Infrastructure environment. In doing so we explored the need for management of secrets in devices across the four Trust Accountability (TA) Chains: Product Lifecycle, Onboa... Read more

Source: www.fiercesmartgrid.com

Top found tags: EN(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critical infrastructure providers still favorite cyber-attack targetsLocation: New York, United States
Date published: 16-07-2014

Critical infrastructure providers continue to be a favorite target of cyber-attacks. Indeed, two-thirds (67 percent) of IT security executives at utility, oil and gas, energy and manufacturing companies report that they have experienced at least one security breach in the past 12 months. Those incid... Read more

Source: www.fiercecio.com

Top found tags: survey(1),critical infrastructure(2),Ponemon Institute(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bank alert after reports of Boorowa ATM skimming deviceLocation: New York, United States
Date published: 17-07-2014

RURAL residents have been warned not to be lulled into a false sense of security as they punch their PIN into an ATM.Fraud inquiries are under way after a card skimming device was reportedly attached to a Boorowa ATM last month, highlighting bank customers in the bush aren't immune to having their a... Read more

Source: www.dailyadvertiser.com.au

Top found tags: report(1),skimming(1),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Credit Card Fraud Is Spiking Ahead of EMV Secure Chip IntroductionLocation: Ingen, Buren, Gelderland, The Netherlands
Date published: 17-07-2014

The belated rollout of EMV security chips in credit cards in the US is expected to lead to an increase in fraud.In fact, more fraud is already here, said Allen Friedman, director of payment services at Ingenico, a provider of card payment terminals and servicesSixty-seven percent of the UK-issued... Read more

Source: www.forbes.com

Top found tags: credit card(2),United Kingdom(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Park Hill School District reports data security breach compromised more than 10,000 peopleLocation: Park, United States
Date published: 09-07-2014

PLATTE CITY, Missouri A suburban Kansas City school district said it has warned more than 10,000 current and former employees and students that their personal information may have been compromised by a data security breach earlier this year.The Park Hill School District announced Tuesday that th... Read more

Source: www.greenfieldreporter.com

Top found tags: EN(1),Google(1),report(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critical infrastructure providers still favorite cyber-attack targetsLocation: New York, United States
Date published: 16-07-2014

Critical infrastructure providers continue to be a favorite target of cyber-attacks. Indeed, two-thirds (67 percent) of IT security executives at utility, oil and gas, energy and manufacturing companies report that they have experienced at least one security breach in the past 12 months. Those incid... Read more

Source: www.fiercecio.com

Top found tags: survey(1),critical infrastructure(2),Ponemon Institute(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Survey: Most critical infrastructure businesses had a major security breach in the last yearLocation: Unisys - Blue Bell, United States
Date published: 16-07-2014

Unisys Corporation recently sponsored a survey by the Ponemon Institute of 599 security executives of critical infrastructure providers. The top three functions of the respondents were chief information officer, business operations leader and IT security leader.According to the report, the research ... Read more

Source: www.cybersecuritybusiness.com

Top found tags: critical infrastructure(2),Ponemon Institute(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber-bullying, omnibus crime bill among those signed by governorLocation: Alaska, United States
Date published: 17-07-2014

JUNEAU, Alaska Gov. Sean Parnell has signed legislation that criminalizes cyber-bullying.SB128, from Sen. Kevin Meyer, classifies as harassment the sending or publishing of electronic communications that insult or intimidate a minor in a way that that person is in fear of physical injury.It was ... Read more

Source: www.greenfieldreporter.com

Top found tags: EN(1),government(1),legislation(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Online transactions and security stance: Move from if' to when'Location:
Date published: http://www.ciol.com/ciol/columnists/217708/online-transactions-security-stance-move-if-when

SMB segment vulnerability, brand-related implications, lifecycle mindset, avoiding IT lockdowns during peak hours and integrated approach are some facets crucial to explore when it comes to securityColumnists... Read more

Source: 17-07-2014 | www.ciol.com

Top found tags: EN(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
In the Internet of Things, Marketing Will Change Heres HowLocation: Will, United States
Date published: 17-07-2014

Last week, an exciting move for the progress of the Internet of Things came into play when several major tech companies Intel included announced the Open Interconnect Consortium (OIC). What exactly does this mean? Well, with the introduction of the OIC, not only is it setting a precedent for... Read more

Source: blogs.mcafee.com

Top found tags: EN(1),Intel(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Severe RCE vulnerability affects several Cisco productsLocation: Center for Strategic and International Studies - Washington, United States
Date published: 17-07-2014

Cisco Email Security Appliance The vulnerability can be exploited to inject arbitrary commands and execute arbitrary code with elevated privileges. Cisco, one of the leading manufacturers of networking equipment, announced yesterday that a significant remote code execution vulnerability exists in th... Read more

Source: www.scmagazine.com

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NASDAQ IT security spend: $1bn. Finding mystery malware on your servers: PricelessLocation: NASDAQ - New York, United States
Date published: 17-07-2014

NASDAQ servers were infected by malware that exploited two mystery zero-day vulnerabilities, according to a magazine cover story published today. Despite spending a ton of money on computer security, the stock exchange was wide open to attack, we're told. Today's report pulls back the curtain back t... Read more

Source: go.theregister.com

Top found tags: vulnerability(2),financial sector(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple blocking older versions of Flash after yet another security exploitLocation: Apple HQ - Cupertino, United States
Date published: 11-07-2014

Apple is now blocking older versions of the Adobe Flash web plugin, advising users to upgrade to the latest version in order to continue using it. This is due to a recent vulnerability that could cause user data to be lost to attackers exploiting the issue on a number of vulnerable sites.Users runni... Read more

Source: www.imore.com

Top found tags: Apple(2),OS X(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beware Keyloggers at Hotel Business CentersLocation: Worth, United States
Date published: 14-07-2014

The U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers, warning that crooks have been compromising hotel business center PCs with keystroke-logging malware in a bid to steal personal and financial data from guests.In a non... Read more

Source: krebsonsecurity.com

Top found tags: government(2),financial sector(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
When Online Words HurtLocation: New York, United States
Date published: 18-07-2014

Whether we admit it or not, the vast majority of us humans have an inherent desire to be liked. Sure, we can put on a brave face but criticism and disapproval can be hard to swallow, particularly at a tender age. As an adult, I still have clear memories of some rather unpleasant interactions I exper... Read more

Source: blogs.mcafee.com

Top found tags: website(1),telecom sector(4),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chromecast hack Rickrolls Google's TV stickLocation: Google HQ - Mountain View, United States
Date published: 18-07-2014

Chromecast-owning households may be set to endure Rick Astley's ghastly oeuvre, thanks to a new device that can hijack victims' TV sticks and insert replacement content. Dan Petro's device, the "Rickmote", is a slick Ardunio box that can knock the Google Chromecast video streaming utility off wirele... Read more

Source: go.theregister.com

Top found tags: United States(2),Google(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mitigating UAF Exploits with Delay Free for Internet ExplorerLocation: Microsoft HQ - Redmond, United States
Date published: 18-07-2014

After introducing the isolated heap in June security patch for Internet Explorer, Microsoft has once again introduced several improvements in the July patch for Internet Explorer. The most interesting and smart improvement is one which we will call delay free. This improvement is designe... Read more

Source: trendmicro.com

Top found tags: Internet Explorer(2),vulnerability(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whitepaper: History of cryptographyLocation: New York, United States
Date published: 18-07-2014

This whitepaper presents a brief history of cryptography and how encryption-related technologies have evolved and will continue to evolve as well as the measures Internet users should consider when implementing modern encryptions.... Read more

Source: net-security.org

Top found tags: EN(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Newcastle squares up to government: "You need to rethink your digital skills approach"Location: Newcastle-under-Lyme, United Kingdom
Date published: 18-07-2014

Newcastle squares up to government: "You need to rethink your digital skills. approach" In its submission to the Labour Digital Government Review, Newcastle City Council has called upon the Government Digital Service (GDS) to revamp its approach to digital inclusion. According to the local authority... Read more

Source: itproportal.com

Top found tags: government(2),telecom sector(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lack of communication a security risk for 40 per cent of UK firmsLocation: New York, United States
Date published: 17-07-2014

Lack of communication a security risk for 40 per cent of UK firms. There is a huge communication gap between IT security professionals and executive teams that leaves companies susceptible to data theft, according to a new survey. The report, "Roadblocks, Refresh & Raising the Human Security IQ," wa... Read more

Source: itproportal.com

Top found tags: data theft(2),Ponemon Institute(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Newcastle squares up to government: "You need to rethink your digital skills approach"Location: Newcastle-under-Lyme, United Kingdom
Date published: 18-07-2014

Newcastle squares up to government: "You need to rethink your digital skills. approach" In its submission to the Labour Digital Government Review, Newcastle City Council has called upon the Government Digital Service (GDS) to revamp its approach to digital inclusion. According to the local authority... Read more

Source: itproportal.com

Top found tags: government(2),telecom sector(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Siemens Working on Patches for OpenSSL Bugs Under ExploitLocation: Siemens HQ - Munich, Germany
Date published: 18-07-2014

Siemens says it is working on patches for four critical vulnerabilities in the OpenSSL libraries it uses in a number of its industrial control products, flaws that are being exploited in the wild. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) cautioned too that critical inf... Read more

Source: threatpost.com

Top found tags: United States(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

Siemens OpenSSL VulnerabilitiesLocation: Siemens HQ - Munich, Germany
Date published: 17-07-2014

The Internet of Everything (IoE) is accelerating, creating significant opportunities for organizations, individuals, communities, and countries as more things come online along with the people, processes, and data that interact with them. Building on the foundation of the Internet of Things, or ... Read more

Source: ics-cert.us-cert.gov

Top found tags: smart meter(2),cyber security(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cogent DataHub Code Injection VulnerabilityLocation:
Date published: 16-07-2014

The Internet of Everything (IoE) is accelerating, creating significant opportunities for organizations, individuals, communities, and countries as more things come online along with the people, processes, and data that interact with them. Building on the foundation of the Internet of Things, or ... Read more

Source: ics-cert.us-cert.gov

Top found tags: smart meter(2),cyber security(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Centrum voor cyberveiligheid staat in de steigersLocation: Brussel, Belgium
Date published: 17-07-2014

Het centrum voor cyberveiligheid komt een stap dichterbij. De regering in lopende zaken heeft het koninklijk besluit rond dat de oprichting regelt van wat het \"Centrum Cyber Security Belgium\" (CCSB) zal heten. Het zal worden geleid door een directeur en een adjunct-directeur, van verschillende taa... Read more

Source: www.demorgen.be

Top found tags: NL(1),cyber attack(2),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Europol brengt trojan-infrastructuur die zich op bankgegevens richt slag toeLocation: Europol HQ - Den Haag, The Netherlands
Date published: 10-07-2014

Europol heeft in samenwerking met de FBI, verschillende politiekorpsen en een aantal beveiligingsbedrijven op 8 en 9 juli de servers en domeinen platgelegd die de basis vormen voor de communicatie tussen computers die genfecteerd zijn met de Shylock Trojan.De Shylock Trojan richt zich op het stele... Read more

Source: tweakers.net

Top found tags: government(4),Kaspersky Lab(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Europol pakt infrastructuur gevaarlijke trojan aanLocation: Europol HQ - Den Haag, The Netherlands
Date published: 11-07-2014

De meeste trojans en andere online malware zijn afhankelijk van een ingewikkeld netwerk van servers, internetdomeinen en natuurlijk de software zelf, die door cybercriminelen wordt gebruikt om hun illegale activiteiten te ontplooien. Een verbond van Europol, politie, justitie en de industrie heeft n... Read more

Source: nl.pcmag.com

Top found tags: Kaspersky Lab(4),United Kingdom(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'ZAKELIJKE REIZIGERS ZIJN DOELWIT VAN MALWARE OP HOTEL-PC'S'Location: Amsterdam, The Netherlands
Date published: 14-07-2014

Medewerkers overnachten op reis vaak in hotels. In deze hotels zijn allerlei computers beschikbaar die bezoekers doorgaans gratis of tegen een kleine vergoeding kunnen gebruiken. De cybercrime-afdeling van de Secret Service waarschuwt echter dat het gebruik van deze computers niet zonder risico is. ... Read more

Source: www.executive-people.nl

Top found tags: government(4),cybercrime(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Play is nummer n in gebruikers en malwareLocation: Google HQ - Mountain View, United States
Date published: 17-07-2014

Samenvatting:De Play Store van Google trekt meer gebruikers dan eender welke andere app store, en dat is naar de zin van malafide individuen met duistere intenties.Android is met grote voorsprong het populairste besturingssysteem voor mobiele apparaten. Dat impliceert dat de Play Store de grootste w... Read more

Source: www.zdnet.be

Top found tags: Google Play(4),Kaspersky Lab(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anti-virusbedrijf: openzetten wifi-netwerk slecht ideeLocation: Trend Micro - Cupertino, United States
Date published: 18-07-2014

Het openzetten van het eigen wifi-netwerk zodat anderen hier gebruik van kunnen maken is een slecht idee, zo waarschuwt het Japanse anti-virusbedrijf Trend Micro. Onlangs kwam de Open Wireless beweging in het nieuws, die router-firmware wil gaan ontwikkelen om wifi-netwerken open te zetten. Dit moet... Read more

Source: www.security.nl

Top found tags: cybercrime(2),cyber security(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android-ransomware vergrendelt smartphonesLocation: Google HQ - Mountain View, United States
Date published: 18-07-2014

Een nieuwe vorm van ransomware voor Android vergrendelt smartphones op zo'n manier dat het toestel onbruikbaar wordt en gebruikers de toegang tot hun data kunnen verliezen. ScarePakage, zoals de ransomware wordt genoemd, doet zich voor als bekende software zoals Adobe Flash en anti-virus apps. Eenma... Read more

Source: www.security.nl

Top found tags: smartphone(1),cybercrime(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers hacken Nest-thermostaat als waarschuwingLocation: Google HQ - Mountain View, United States
Date published: 18-07-2014

Hackers hebben de Nest thermostaat, die nu onderdeel vormt van het Google-aanbod, gehackt. Het is een protest tegen het ongevraagd zenden van informatie door de thermostaat naar het zoekmachinebedrijf dat drijft op advertentieverkoop. Meer over Nest Nest beweegt nu al richting hellend vlak 'Google k... Read more

Source: www.automatiseringgids.nl

Top found tags: smartphone(1),wireless(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft wapent Server 2003 tegen valse Google-certificatenLocation: Microsoft HQ - Redmond, United States
Date published: 18-07-2014

Een week na de noodupdate voor andere ondersteunde Windowsversies heeft Microsoft ook een update voor Window Server 2003 uitgebracht die bescherming tegen valse certificaten van Google en Yahoo biedt. De certificaten waren door een Indiaas bedrijf uitgegeven. Via de valse certificaten is het mogelij... Read more

Source: www.security.nl

Top found tags: Windows(1),Microsoft(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trojaans paard voor Android steelt creditcardgegevensLocation: Google HQ - Mountain View, United States
Date published: 18-07-2014

Er is een Trojaans paard voor Android ontdekt dat creditcardgegevens kan stelen en sms-berichten kan onderscheppen. De malware, die BankBot wordt genoemd, doet zich voor als Adobe Flash Player. Eenmaal genstalleerd vraagt de malware elke 0,1 seconden om adminrechten. Volgens het Russische anti-vir... Read more

Source: www.security.nl

Top found tags: Google(2),Google Play(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Duo krijgt bij elkaar 14 jaar cel wegens Apple-phishingmailLocation: Den Haag, The Netherlands
Date published: 18-07-2014

In Groot-Brittanni zijn twee mensen veroordeeld tot een gevangenisstraf van bij elkaar 14 jaar wegens hun rol in een phishingaanval waarbij meer dan 15.000 pond werd gestolen. De 23-jarige Constanta Agrigoroaie werd veroordeeld tot zes jaar, de 28-jarige Radu Savoae kreeg 8 jaar. Het duo verstuurd... Read more

Source: www.security.nl

Top found tags: mobile device(2),telecom sector(2),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Two-factor authenticatie van Apple beschikbaar in NederlandLocation: Apple HQ - Cupertino, United States
Date published: 18-07-2014

Apple past al two-factor authenticatie toe voor het inloggen op hun account, nu is dit ook voor Nederlanders mogelijk. iPhone 5sDe twee-staps-authentificatie is bedoeld om de beveiliging van Apple ID s te versterken. Hiermee zijn gegevens in het account namelijk een stuk veiliger opgeslagen omdat ze... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Apple(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android-ransomware vergrendelt smartphonesLocation: Google HQ - Mountain View, United States
Date published: 18-07-2014

Een nieuwe vorm van ransomware voor Android vergrendelt smartphones op zo'n manier dat het toestel onbruikbaar wordt en gebruikers de toegang tot hun data kunnen verliezen. ScarePakage, zoals de ransomware wordt genoemd, doet zich voor als bekende software zoals Adobe Flash en anti-virus apps.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: smartphone(1),cybercrime(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Snowden waarschuwt voor gebruik van DropboxLocation: National Security Agency - Fort Meade, United States
Date published: 18-07-2014

Klokkenluider Edward Snowden heeft in een interview met de Britse krant The Guardian gewaarschuwd voor het gebruik van opslagdienst Dropbox, omdat het een bedreiging voor de privacy zou zijn. De kritiek van Snowden is vooral gebaseerd op de aanstelling van Condoleezza Rice tot de raad van bestuur. "... Read more

Source: www.security.nl

Top found tags: cyber security(2),United Kingdom(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Apple patenteert zelflerende beveiligingLocation: Apple HQ - Cupertino, United States
Date published: 17-07-2014

Apple heeft patent aangevraagd voor een zelflerende beveiliging. De fysieke activiteit van een gebruiker wordt bijgehouden via de sensoren van het apparaat. Als de iPhone vervolgens op een significant afwijkende manier wordt gebruikt, kan deze bijvoorbeeld vergrendeld worden of ontvangt de eigenaar ... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Apple(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple patenteert zelflerende beveiligingLocation: Apple HQ - Cupertino, United States
Date published: 17-07-2014

Apple heeft patent aangevraagd voor een zelflerende beveiliging. De fysieke activiteit van een gebruiker wordt bijgehouden via de sensoren van het apparaat. Als de iPhone vervolgens op een significant afwijkende manier wordt gebruikt, kan deze bijvoorbeeld vergrendeld worden of ontvangt de eigenaar ... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Apple(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Japanner opgepakt wegens diefstal miljoenen klantgegevensLocation: Tokio, Japan
Date published: 18-07-2014

Een werknemer van een Japans bedrijf is opgepakt op verdenking van het stelen van de persoonsgegevens van miljoenen klanten om die vervolgens aan een derde partij te verkopen, die zo de klanten met allerlei commercile aanbiedingen kon benaderen. Het gaat om de 39-jarige Masaomi Matsuzaki, die als ... Read more

Source: www.security.nl

Top found tags: Japan(1),NL(1),police(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple versleutelt iCloud-mails tussen providersLocation: Cloud, United States
Date published: 18-07-2014

Apple heeft TLS-encryptie voor e-mails van en naar iCloud.com, mac.com en me.com ingeschakeld, wat het lastiger moet maken om de inhoud van berichten te onderscheppen. Dat blijkt uit statistieken van Google. In juni publiceerde de zoekgigant cijfers over welke providers TLS toepassen. Transport Laye... Read more

Source: www.security.nl

Top found tags: iCloud(1),ISP(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Banken waarschuwen voor telefoonfraude bij internetbankierenLocation: Microsoft HQ - Redmond, United States
Date published: 18-07-2014

Nederlandse banken waarschuwen voor oplichters die zich voordoen als helpdeskmedewerkers van Microsoft of andere bekende softwareleveranciers en als uiteindelijk doel hebben om te frauderen met internetbankieren. De scam begint met mensen die worden gebeld vanwege zogenaamde pc-problemen. De oplicht... Read more

Source: www.security.nl

Top found tags: scam(1),online banking(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid verholpen in Perl liblwpLocation: Ubuntu - London, United Kingdom
Date published: 18-07-2014

Samenvatting: De makers van Ubuntu hebben een update uitgebracht om een kwetsbaarheid in de Perl liblwp te verhelpen. Gevolgen: Kwaadwillenden kunnen de gevonden kwetsbaarheid misbruiken voor het verkrijgen van gevoelige informatie. Beschrijving: - CVE-2014-3230 Er is ontdekt dat de LWP::Protocol::h... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ubuntu verhelpt meerdere kwetsbaarheden in de Linux kernelLocation: Door, United States
Date published: 18-07-2014

Samenvatting: De ontwikkelaars van Ubuntu hebben meerdere kwetsbaarheden in de Linux kernel verholpen. Gevolgen: Een aanvaller kan de kwetsbaarheden misbruiken om mogelijk gevoelige gegevens te bemachtigen, verhoogde rechten te verkijgen of om een Denial-of-Service te veroorzaken. Beschrijving: - CV... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden in Oracle MySQL verholpenLocation: Oracle - Redwood City, United States
Date published: 18-07-2014

Samenvatting: Er bevindt zich een groot aantal kwetsbaarheden in MySQL waarvoor Oracle updates heeft uitgebracht. Gevolgen: Misbruik van de kwetsbaarheden kan leiden tot het gedeeltelijk onbeschikbaar maken van MySQL. Tevens is het mogelijk om gedeeltelijk gevoelige gegevens in te zien en/of te wijz... Read more

Source: www.ncsc.nl

Top found tags: patch(2),United States(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Noodpatch van Microsoft trekt valse certificaten inLocation: Microsoft HQ - Redmond, United States
Date published: 18-07-2014

Samenvatting: Microsoft heeft een noodpatch beschikbaar gesteld om een aantal SSL-certificaten in te trekken. Een kwaadwillende die deze certificaten in handen heeft kan een Man-in-the-Middle aanval opzetten. Gevolgen: Indien een kwaadwillende de certificaten in handen heeft, kan deze een Man-in-the... Read more

Source: www.ncsc.nl

Top found tags: NL(1),patch(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden in Drupal verholpenLocation: Door, United States
Date published: 18-07-2014

Samenvatting: De ontwikkelaars van Drupal hebben diverse kwetsbaarheden in Drupal-Core versies 6.x en 7.x verholpen. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende de volgende malafide acties uitvoeren; Denial of Service (DoS), toegang tot gevoelige gegevens, omzeilen van aut... Read more

Source: www.ncsc.nl

Top found tags: DoS(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden in Oracle Java SE verholpenLocation: Oracle - Redwood City, United States
Date published: 18-07-2014

Samenvatting: Er bevindt zich een groot aantal kwetsbaarheden in Java waarvoor Oracle updates heeft uitgebracht. Gevolgen: Misbruik van de kwetsbaarheden kan leiden tot het uitvoeren van willekeurige code met gebruikersrechten en het omzeilen van beveiligingsmaatregelen. Beschrijving: Oracle heeft v... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish