Under construction

New design coming soon!

CIC News engine statistics

CIC News for 19-07-2014 contains 66 articles: cybercrime(21),cyber security(26),data breach(11),other(8)

CIC News update contains 57 English and 9 Dutch articles for today.
There are 2 published advisories, 2 are English and 0 are Dutch.
In today's English news articles:
- 17 related to cybercrime
- 24 related to cyber security
- 11 related to data breach and identity theft
- 5 for the category other news

In today's Dutch news articles:
- 4 related to cybercrime
- 2 related to cyber security
- 3 for the category other news

Have fun reading.

English cybercrime related news

Report: Zero-day attack used in 2010 NASDAQ breachLocation: NASDAQ - New York, United States
Date published: 18-07-2014

According to Bloomberg, hackers leveraged two zero-day vulnerabilities in their efforts to breach NASDAQ's servers in 2010. After months of digging into the attack, and talking to more than a dozen people familiar in varying degrees with officials' investigations, Bloomberg revealed its findings on ... Read more

Source: www.scmagazine.com

Top found tags: vulnerability(1),financial sector(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. hosted most Q2 malware, top 10 ISPs still main sourcesLocation: New York, United States
Date published: 18-07-2014

Expensive new trojan, Pandemiya, based on 25K original lines of C code Solutionary's SERT research team analyzed threats for the second quarter for its Quarterly Threat Intelligence Report. More than half 56 percent of the malware captured in the second quarter of 2014 and analyzed by Soluti... Read more

Source: www.scmagazine.com

Top found tags: trojan(2),update(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hamas targets TV station via satellite hackLocation: Tel Aviv, Israel
Date published: 18-07-2014

As violence between Israel and Palestinian militants of Hamas intensifies, reports have surfaced that a satellite TV hack may have been used to incite further turbulence between the groups. On Tuesday, Ynetnews.com revealed that Hamas hackers were able to take over programming displayed to a limited... Read more

Source: www.scmagazine.com

Top found tags: Israel(1),report(1),TV (1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SOHOpelessly BROKEN hacking contest aims to test home router securityLocation: DEF CON - Las Vegas, United States
Date published: 18-07-2014

TP-Link, or others, small office/home office (SOHO) routers have suffered a variety of real-world attacks that in some cases have allowed hackers to remotely commandeer hundreds of thousands of devices. Further Reading Hackers hijack 300,000-plus wireless routers, make malicious changes Devices made... Read more

Source: arstechnica.com

Top found tags: conference(2),DEF CON(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminals Hitchhike on the News of MH17 CrashLocation: Twitter - San Francisco, United States
Date published: 19-07-2014

A few months after the case of the missing Malaysian Airlines Flight 370, the world was shocked again with another tragic news involving the crash of Malaysian Airlines 777(also known as MH17) over Ukraine that killed nearly 300 passengers and crew members. As with past incidents, cybercriminals a... Read more

Source: trendmicro.com

Top found tags: Trend Micro(2),Ukraine(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Notorious Shylock banking malware taken out by law enforcementLocation: National Crime Agency - London, United Kingdom
Date published: 18-07-2014

Law enforcement action led by the National Crime Agency (NCA) in the UK has knocked out the infrastructure of a banking malware that infected at least 30,000 computers.The malware is known as Shylock, because of code containing quotes from the character in Shakespeare's Merchant of Venice.According ... Read more

Source: nakedsecurity.sophos.com

Top found tags: malware(2),United Kingdom(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Virtual space, real risks: minimising dangers in cyberspaceLocation: New York, United States
Date published: 18-07-2014

NGOs are not immune to hacking and surveillance. Join us from 2-4pm BST on 24 July to discuss how to protect yourselves In June the Friends of the Global Fight Against Aids Tuberculosis and Malaria was hacked, revealing that NGOs are as vulnerable to cyber crime as other organisations. It's not just... Read more

Source: www.theguardian.com

Top found tags: social media(2),Syrian Electronic Army(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Crimes Spiral in State But Cops Fail to Bring Offenders to BookLocation: Facebook - Menlo Park, United States
Date published: 19-07-2014

However, only 13 cases of Facebook abuse and three cases of internet misuse have been chargesheeted so far while in other cases, investigations are underway.KOZHIKODE: If the data available with the Home Department is any indication, bringing the perpetrators in cases related to abuse via Facebook a... Read more

Source: m.newindianexpress.com

Top found tags: government(3),social media(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Crimes Spiral in State But Cops Fail to Bring Offenders to BookLocation: Facebook - Menlo Park, United States
Date published: 19-07-2014

However, only 13 cases of Facebook abuse and three cases of internet misuse have been chargesheeted so far while in other cases, investigations are underway.KOZHIKODE: If the data available with the Home Department is any indication, bringing the perpetrators in cases related to abuse via Facebook a... Read more

Source: m.newindianexpress.com

Top found tags: government(3),social media(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Telangana moots cyber labs in all districtsLocation: Hyderabad, Andhra Pradesh, India
Date published: 18-07-2014

Hyderabad: Telangana police plans to set up cyber labs in all districts of the state to tackle cyber crime, said a top official Friday. The Crime Investigation Department (CID) is also training police officials in the districts in dealing with the cyber crime. T Krishna Prasad, additional director g... Read more

Source: zeenews.india.com

Top found tags: India(2),government(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
International police operation busts Romanian cybercriminal networkLocation: Europol HQ - Den Haag, The Netherlands
Date published: 18-07-2014

About 65 people were taken into custody and large sums of money, luxury vehicles and IT equipment when an international organised cybercrime network made up mainly of Romanian citizens was successfully taken down in Romania and France, Europol said.The operation took place on July 16, Europol said i... Read more

Source: sofiaglobe.com

Top found tags: government(3),financial sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kaspersky: Government isn't doing enough to educate about cybercrimeLocation: Kaspersky HQ - Moscow, Russia
Date published: 18-07-2014

Says bigger marketing campaigns are needed to alert mainstream citizens. THE UK GOVERNMENT isn't doing enough to warn about the risks of cybercrime on a mass level, security firm Kaspersky has claimed.Speaking at a company roundtable event at the firm's European hub in London on Thursday, Kaspersky ... Read more

Source: www.theinquirer.net

Top found tags: mobile device(2),telecom sector(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government-grade code found in criminal malwareLocation: New York, United States
Date published: 18-07-2014

A variant of the Gyges malware was found bolted onto mainstream attack code to avoid detection by security products.Cybercriminals have inserted government-grade malware into run-of-the-mill ransomware and online banking Trojans to bolster their ability to avoid detection and block tampering.The var... Read more

Source: www.csoonline.com

Top found tags: malware(2),trojan(2),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Romanian gang used malware to defraud international money transfer firmsLocation: Bucharest, Romania
Date published: 18-07-2014

Romanian and French authorities have dismantled a cybercriminal network that infected computers at money transfer outlets across Europe and used them to perform illegal transactions.The gang was also involved in the theft of credit card details through skimming, credit card cloning, money laundering... Read more

Source: www.pcworld.com

Top found tags: United Kingdom(2),cybercrime(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PhishMe reveals source and metrics behind new phishing attackLocation: Kiev, Ukraine
Date published: 18-07-2014

Researchers at PhishMe uncovered a new malware threat dubbed Dyre about a month ago. Now, a new blog post from PhishMe provides intricate details about a new variation on Dyre that provide a look at the potential source and impact of the threat.Dyre is a RAT (root access Trojan). Dyre is part ... Read more

Source: www.csoonline.com

Top found tags: Ukraine(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Improved Neverquest Trojan Targeting Bank Customers in Japan, USLocation: Tokio, Japan
Date published: 18-07-2014

Ever since its existence came to light in November 2013, the Neverquest banking Trojan has been enhanced with new features that make it an efficient tool for cybercriminals that are after sensitive information. According to Symantec, whose products detect Neverquest as Trojan.Snifula, an evolution o... Read more

Source: securityweek.com

Top found tags: telecom sector(4),financial sector(6),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The 5 most read articles this week: July 11-17Location: London, United Kingdom
Date published: 18-07-2014

The 5 most read articles this week: July 11-17 The 5 most read articles this week: July 11-17 China accused of global zero-day attack on shipping firms A suspected Chinese government cyber-attack called 'Zombie Zero' has been targeting shipping, logistics and manufacturing companies worldwide, accor... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(4),government(5),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The dungeon of the 'Deep Web'; where even the spiders dare not travelLocation: Charles, United States
Date published: 18-07-2014

Charles Sweeney asks, are your staff inadvertently leaving the back door open via an innocent lunch-time browse? The dungeon of the 'Deep Web'; where even the spiders dare not travel The dungeon of the 'Deep Web'; where even the spiders dare not travel The underbelly of the internet, known as the de... Read more

Source: www.scmagazineuk.com

Top found tags: security measures(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Net neutrality a key battleground in growing fight over encryption, activists sayLocation: Facebook - Menlo Park, United States
Date published: 18-07-2014

Net neutrality a key battleground in growing fight over encryption, activists say Plans to favor some Internet packets over others threaten consumers hard-won right to use encryption, a digital privacy advocate says. Activists and tech companies fended off efforts in the U.S. in the 1990s to ban ... Read more

Source: www.pcworld.com

Top found tags: government(3),United States(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critical industrial control systems remain vulnerable to Heartbleed exploitsLocation: Siemens HQ - Munich, Germany
Date published: 18-07-2014

by Siemens remain susceptible to hijacking or crashes that can be triggered by the bug, federal officials have warned. The products are used to control switches, valves, and other equipment in chemical, manufacturing, energy, and wastewater facilities. Heartbleed is the name given to a bug in the wi... Read more

Source: arstechnica.com

Top found tags: OpenSSL(2),United States(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
July 2014 Oracle CPU: Java security problems persistLocation: Oracle - Redwood City, United States
Date published: 18-07-2014

Oracle Corp.'s third quarterly Critical Patch Update of 2014 delivered fixes for a total 113 vulnerabilities across 13 of its product lines, including patches for a number of serious Java vulnerabilities that highlight the security risk of running Oracle's long-maligned software runtime environment.... Read more

Source: searchsecurity.techtarget.com

Top found tags: United States(2),vulnerability(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft researchers recommend sometimes ditching complicated passwordsLocation: Microsoft HQ - Redmond, United States
Date published: 18-07-2014

New research suggests that users should stop using complex passwords for every online account they have, and instead, save complicated passwords for sites requiring extra security. Microsoft researchers concluded from their new study that users should reuse weak passwords for websites that don't hol... Read more

Source: www.scmagazine.com

Top found tags: website(1),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diluting data profiles with obfuscation, a hot topic at HOPE X hacker conferenceLocation: Stanley, United States
Date published: 18-07-2014

Experts discussed online privacy expectations given the expanding accessibility of users' data. Hacker conference HOPE X kicked off on Friday, with obfuscation being one of the hot topics. People spend a lot of time concerned about getting their information off the internet and out of the hands of o... Read more

Source: www.scmagazine.com

Top found tags: legislation(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Manic malware Mayhem spreads through Linux, FreeBSD web serversLocation: New York, United States
Date published: 18-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Malware dubbed Mayhem is spreading through Linux and FreeBSD web servers, researchers say. The software nasty uses a grab bag of plugins to cause mischief, and infects systems that are not up to date with security patches. Andrej Kovalev, Ko... Read more

Source: go.theregister.com

Top found tags: update(2),cybercrime(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US needs to restore trust following NSA revelations, tech groups sayLocation: New York, United States
Date published: 18-07-2014

The U.S government can take action to slow the calls in other countries to abandon U.S. tech vendors following revelations about widespread National Security Agency surveillance, some tech representatives said Friday. Decisions by other governments to move their residents data away from the U.S. ... Read more

Source: www.pcworld.com

Top found tags: telecom sector(4),United States(6),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
July #SecChat Targeted Attacks Set Sights on Vital SystemsLocation: Twitter - San Francisco, United States
Date published: 19-07-2014

Targeted attacks can take on many different forms and are flexible enough to adopt a variety of tactics. Think of them as a specialized unit for cyber criminals. They are utilized for very specific missions and operate with the precision of a surgical strike, rather than the carpet-bombing technique... Read more

Source: blogs.mcafee.com

Top found tags: cyber security(2),information security(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MANAGING CRYPTOGRAPHIC KEYS FOR CRITICAL INFRASTRUCTURELocation: INQ HQ - Amsterdam, The Netherlands
Date published: 18-07-2014

Introduction to July article. This article marks one year of monthly releases in the Security Management for Critical Infrastructure series. However not until this article did we get to content which originally started research in this area, this original topic was Managing Cryptographic Keys for Cr... Read more

Source: www.frequency.com

Top found tags: research(1),cyber security(2),security management(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Garda warning over hackers and credit card fraudLocation: Dublin, Ireland
Date published: 18-07-2014

A senior member of An Garda Sochna in Mayo and a district court judge have expressed serious concern about the ease with which online credit card fraud is being carried out following the jailing this week of a Glenisland man for his murky internet dealing.Superintendent Pat Diskin said garda g... Read more

Source: www.advertiser.ie

Top found tags: cyber security(2),financial sector(2),security measures(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trend Micro Report Finds Criminals Unlikely to Abuse NamecoinLocation: Trend Micro - Cupertino, United States
Date published: 18-07-2014

Namecoins domain-name system is an attractive environment for malicious users, but is not likely to gain widespread use among criminals, according to a research report from digital security firm Trend Micro.The report, published last September and written by members of Trend Micros Forward-Loo... Read more

Source: www.coindesk.com

Top found tags: cyber security(2),malware(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Criminals Build Web Server-Powered Botnet To Steal PasswordsLocation: Hewlett-Packard - Palo Alto, United States
Date published: 18-07-2014

Criminals Build Web Server-Powered Botnet To Steal PasswordsRussian researchers have found a new type of malware that takes control of Linux- and FreeBSD-based Web servers to form a powerful network for launching password-stealing attacks.The researchers at Web provider Yandex call the malware Mayhe... Read more

Source: www.cruxialcio.com

Top found tags: United States(2),cybercrime(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internet-connected cars vulnerable to cyber-hijacksKasperskyLocation: Kaspersky HQ - Moscow, Russia
Date published: 18-07-2014

They may be smart and a joy to drive, Internet-connected cars may also be the latest vehicle for cyber-crime. Security vendor Kaspersky Lab said that while the connected car can offer information and entertainment at the snap of a finger, it can also be vulnerable to cyber-attacks. \"Connected cars ... Read more

Source: www.gmanetwork.com

Top found tags: Kaspersky Lab(4),telecom sector(6),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Greek Authorities Alert for Shylock MalwareLocation: National Crime Agency - London, United Kingdom
Date published: 18-07-2014

The officers of the Cyber Crime Unit of the Greek Police are alert after the appearance of the Shylock malware in Greece.According to a Europol announcement, Shylock has infected at least 30,000 computers running Microsoft Windows worldwide. Intelligence suggests that Shylock targets the UK mo... Read more

Source: greece.greekreporter.com

Top found tags: Kaspersky Lab(4),United Kingdom(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is Your Car Vulnerable to Hackers?Location: Brown, United States
Date published: 18-07-2014

By 2017, more than 60% of cars will be connected to the Internet, literally creating a moving target for cyber criminals. Earlier this week, experts came together at Delphi Automotive (DLPH) headquarters in Michigan to discuss the increasing threat of cyber crime.Quite honestly, the vehicles and ... Read more

Source: www.foxbusiness.com

Top found tags: vulnerability(1),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Will Drip law make UK citizens' data more attractive to hackers?Location: Davis, United States
Date published: 18-07-2014

The Data Retention and Investigatory Powers (Drip) bill that yesterday cleared the House of Lords will make companies holding UK citizens communications data far more attractive to criminal hackers, a security expert has warned.This will likely be a long-term consequence of the law as it will spr... Read more

Source: www.theguardian.com

Top found tags: update(2),cybercrime(3),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Liberty alert: Cyber Crime (Infographic)Location: Liberty, United States
Date published: 18-07-2014

ne of the biggest emerging threats to liberty in the 21st century is cyber crime. Privacy in the Technology Age is difficult enough, but the issue is being compounded as more of our daily lives are taking place online. Even if you dont shop via the Internet, information about you is gathered (and... Read more

Source: absoluterights.com

Top found tags: cybercrime(3),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A closer look at Edward Snowdens latest revelations concerning government surveillanceLocation: National Security Agency - Fort Meade, United States
Date published: 19-07-2014

A closer look at Edward Snowdens latest revelations concerning government. surveillance In a lengthy interview with the Guardian, NSA whistle blower Edward Snowden spoke with editor Alan Rusbridger about his extraordinary rise to infamy. Currently in exile in Russia, he talked about how he dissem... Read more

Source: itproportal.com

Top found tags: United States(4),government(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Googles Project Zero: Good News for Cyber SecurityLocation: Google HQ - Mountain View, United States
Date published: 18-07-2014

Google has assembled a team of counter-hackers to search, identify and patch zero day vulnerabilities and malware across the Web. Its name? Project Zero. Its purpose? Keeping you safe online. Googles new initiative aims to reduce the number of zero-day vulnerabilities on the Internet by emp... Read more

Source: blogs.mcafee.com

Top found tags: cybercrime(6),telecom sector(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australian daily deals site discloses data breach after three yearsLocation: Sydney, Australia
Date published: 18-07-2014

An Australian daily deals website company, Catch of the Day, alerted its users on Friday of a data breach that impacted one of its websites in 2011. Data compromised in the attack on CatchoftheDay.com.au included account information such as passwords and credit card numbers of an undisclosed number ... Read more

Source: www.scmagazine.com

Top found tags: data breach(2),cyber security(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CryptoLocker Ransomware Alive and Evolving, Says ResearcherLocation: New Hampshire, United States
Date published: 18-07-2014

U.S. and European law enforcement officials last month, performed a coordinated takedown of the GameOver Zeus botnet. At the time, they claimed that the operation also neutralized the infamous CryptoLocker ransomware, which criminals had distributed using GameOvers infrastructure. However, Tyler ... Read more

Source: threatpost.com

Top found tags: government(2),United States(2),malware(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.K. data security office quietly discloses breachLocation: New York, United States
Date published: 18-07-2014

The U.K.'s data security watchdog has disclosed a data breach it suffered in the last year. In its recently released annual report, the Information Commissioner's Office (ICO) shared that it had experienced a non-trivial data security incident that was treated as a self-reported breach a... Read more

Source: www.scmagazine.com

Top found tags: report(1),data breach(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The 5 most common cyber security mistakesLocation: New York, United States
Date published: 18-07-2014

Recent headlines confirm that cyber attacks are growing in scale and incidents are on the rise.Organizations are increasingly vulnerable as a result of technological advances and a changing workplace, including remote access, big data, cloud computing, social media and mobile technology.The amount a... Read more

Source: finance-commerce.com

Top found tags: data breach(2),information security(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Healthcares in the thick of cyber-crimeLocation: New York, United States
Date published: 18-07-2014

Its well-understood that cyber-crime is not going away and that cyber-security is becoming more important. The impact of cyber-crime on healthcare may be a little less clear. A special report on cyber-security in The Economist makes it explicit.It has eight parts:Defending the digital frontierCyb... Read more

Source: ehna.org

Top found tags: Ponemon Institute(2),cyber security(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A data breach will damage your business, brand and profits are you prepared?Location: New York, United States
Date published: 17-07-2014

If your business experienced a data breach today, will you be prepared for tomorrow?It is estimated that it can take approximately one to two years to recover a company's reputation, brand and profits following a data breach.According to the Ponemon Institute's 2014 Cost of Data Breach Study, the av... Read more

Source: www.azcentral.com

Top found tags: social media(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Breach Damage from NYs POV: Over 1 Billion in 2013 AloneLocation: New York City, New York, United States
Date published: 17-07-2014

A new report from New York States Attorney General details the damage to the states citizens and organizations from reported data breaches over the last eight years. Information Exposed: Historical Examination of Data Breaches in New York State attempts to illustrate the exponential grow... Read more

Source: www.itbusinessedge.com

Top found tags: EN(1),report(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Three Killeen residents plead guilty in identity theft ringLocation: Cole, United States
Date published: 19-07-2014

AUSTIN Two men and a woman from Killeen pleaded guilty to involvement in an identity theft and tax fraud scheme that resulted in more than $1.3 million in false tax claims.Albert Powell, Ronnie Cole and Paris Stephens all pleaded guilty to charges of identity theft, conspiracy and tax fraud in c... Read more

Source: kdhnews.com

Top found tags: government(1),IRS (1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
7 ON YOUR SIDE: SUMMER SCAMS TO BE AWARE OFLocation: New York City, New York, United States
Date published: 18-07-2014

NEW YORK (WABC) -- ID thieves have been busy. According to the Identity Theft Resource Center, stolen id crimes are up nearly 19 percent with 10 million Americans report being victimized.Picture this, you're in your hotel room, the phone rings, the caller says it's the front desk, they need to verif... Read more

Source: 7online.com

Top found tags: financial sector(2),identity theft(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Catch of the Day reveals three-year old data breachLocation: Day, United States
Date published: 19-07-2014

Delays advising customers of early 2011 \"cyber intrusion\".Daily deals website Catch of the Day last night revealed it had suffered a serious data breach in 2011 that led to customer passwords and a number of credit card details being stolen.Catch of the Day, which also owns Scoopon and GroceryRun,... Read more

Source: www.itnews.com.au

Top found tags: data breach(2),cyber security(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Report: Old bugs in Microsoft XML still haunt users, program 'most exposed'Location: Microsoft HQ - Redmond, United States
Date published: 18-07-2014

Federal watchdog says SEC security issues put financial data at risk Federal watchdog says SEC security issues put financial data at risk A quarterly report revealing the most exposed programs on users' systems, found that old vulnerabilities in Microsoft XML Core Services continued to plague ... Read more

Source: www.scmagazine.com

Top found tags: Microsoft(2),United States(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man caught at border in skimming case takes pleaLocation: Ottawa, Ontario, Canada
Date published: 17-07-2014

Niagara Gazette A man caught at a local bridge with gift cards altered with credit card numbers imbedded in them took a plea offer in the case.U.S. Attorney William J. Hochul, Jr. said Petar Petrov, 42, a citizen of Bulgaria who resides Mississauga, Ont., pleaded guilty before U.S. Magistrate Ju... Read more

Source: www.niagara-gazette.com

Top found tags: credit card(2),United States(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man jailed 8 years for credit card fraudLocation: New York, United States
Date published: 19-07-2014

SINGAPORE - A man who played a pivotal role in multiple conspiracies to commit credit card fraud and other financial crimes was jailed for eight years on Friday.Tan Wei Kwang, who is unemployed, recruited accomplices to use the credit cards to make fraudulent purchases.The 41-year-old was no mere ru... Read more

Source: www.straitstimes.com

Top found tags: Singapore(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Roanoke County police arrest 3 people on credit card fraud chargesLocation: Georgia, United States
Date published: 18-07-2014

Roanoke County Police arrested three people on Wednesday on charges of credit card theft and forgery.According to a news release, police were investigating a suspicious vehicle in the parking lot of the Super 8 Motel on Thirlane Road Northwest when they came into contact with the three subjects.Stev... Read more

Source: www.roanoke.com

Top found tags: credit card(2),financial sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Securing the smart grid: achieving 3 goals of safe information accessLocation: New York, United States
Date published: 17-07-2014

Confidentiality. Integrity. Availability. These three supreme goals of information system security apply across all industries. So its no surprise that the benchmarks of smart grid security are:Ensuring that authorized people have access to specific information and others do not (confidentiality)... Read more

Source: www.intelligentutility.com

Top found tags: training(1),energy(2),smart grid(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

Advantech WebAccess VulnerabilitiesLocation: New Hampshire, United States
Date published: 17-07-2014

U.S. and European law enforcement officials last month, performed a coordinated takedown of the GameOver Zeus botnet. At the time, they claimed that the operation also neutralized the infamous CryptoLocker ransomware, which criminals had distributed using GameOvers infrastructure. However, Tyler ... Read more

Source: ics-cert.us-cert.gov

Top found tags: government(2),United States(2),malware(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cogent DataHub Code Injection VulnerabilityLocation: New Hampshire, United States
Date published: 17-07-2014

U.S. and European law enforcement officials last month, performed a coordinated takedown of the GameOver Zeus botnet. At the time, they claimed that the operation also neutralized the infamous CryptoLocker ransomware, which criminals had distributed using GameOvers infrastructure. However, Tyler ... Read more

Source: ics-cert.us-cert.gov

Top found tags: government(2),United States(2),malware(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Openzetten wifi-netwerk is een slecht ideeLocation: Trend Micro - Cupertino, United States
Date published: 18-07-2014

Het openzetten van het eigen wifi-netwerk zodat anderen hier gebruik van kunnen maken is een slecht idee, zo waarschuwt het Japanse anti-virusbedrijf Trend Micro. Wat er via jouw internetverbinding gebeurt is namelijk jouw verantwoordelijkheid.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: wireless(1),cybercrime(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybersecurity onderzoeksprojecten krijgen een miljoenLocation: Team High Tech Crime - Driebergen, The Netherlands
Date published: 18-07-2014

Onderzoeksprojecten zijn onderdeel van de NCSS2 van het kabinet.De Nederlandse Organisatie voor Wetenschappelijk Onderzoek (NWO) geeft n miljoen euro aan onderzoek op het gebied van cybersecurity.OnderzoeksprojectenDe projecten die gezamenlijk n miljoen euro krijgen voor onderzoek zijn vijf ... Read more

Source: www.marqit.nl

Top found tags: research(1),cyber security(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft laat meeste malware door tijdens anti-virustestLocation: Microsoft HQ - Redmond, United States
Date published: 19-07-2014

Microsoft Security Essentials behoort tot n van de populairste virusscanners onder internetgebruikers, maar volgens een uitgebreide test van het Oostenrijkse testorgaan AV-Comparatives laten de prestaties te wensen over. Tijdens de test werden 23 pakketten over een periode van vier maanden getes... Read more

Source: www.security.nl

Top found tags: social engineering(2),antivirus(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nieuwe crypto-ransomware verbergt zich via Tor-netwerkLocation: Amsterdam, The Netherlands
Date published: 19-07-2014

Er is een nieuwe vorm van ransomware actief die bestanden op computers voor losgeld versleutelt en zich via het Tor-netwerk voor onderzoekers en opsporingsdiensten probeert te verbergen. Het gaat om de CTB-Locker (Curve-Tor-Bitcoin Locker), die door Microsoft 'Critroni' wordt genoemd. De malware wor... Read more

Source: www.security.nl

Top found tags: research(1),cybercrime(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Netflix test 'privacy mode' voor verbergen kijkactiviteitLocation: New York, United States
Date published: 19-07-2014

Netflix is bezig met het testen van een zogenaamde private modus, die ervoor zorgt dat bekeken video's en films niet in het activiteitenlog worden opgeslagen en niet worden gebruikt voor aanbevelingen. Het is nog onduidelijk of de feature daadwerkelijk wordt uitgerold. Het testen van de privmodus ... Read more

Source: tweakers.net

Top found tags: NL(1),privacy(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden: alle e-mail moet standaard versleuteld zijnLocation: London,United Kingdom
Date published: 19-07-2014

Alle e-mail en andere communicatie zou standaard versleuteld moeten zijn om de inhoud te beschermen, zeker bij beroepsgroepen zoals advocaten, journalisten, artsen en accountants waarbij vertrouwelijkheid belangrijk is, maar in de praktijk blijkt dit niet te gebeuren. Dat zegt klokkenluider Edward S... Read more

Source: www.security.nl

Top found tags: information security(2),United States(2),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Apothekersassistenten hebben weinig kennis van EPDLocation: Amsterdam, The Netherlands
Date published: 19-07-2014

Meer dan de helft van de apothekersassistenten heeft te weinig kennis van het elektronisch patintendossier (EPD) en het landelijk schakelpunt (LSP) om patinten erover te informeren. Dat zou blijken uit een farmakundig afstudeeronderzoek. Het onderzoek werd uitgevoerd in opdracht van het lectoraa... Read more

Source: www.security.nl

Top found tags: research(1),government(2),The Netherlands(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google dicht spoofing-lek in Chrome voor AndroidLocation: Google HQ - Mountain View, United States
Date published: 19-07-2014

Google heeft een beveiligingslek in Chrome voor Android gedicht waardoor een aanvaller een URL in de adresbalk kon vervalsen, zodat gebruikers zouden denken dat een kwaadaardige website een legitieme website was. Het spoofing-lek werd door de Japanse app-ontwikkelaar Keita Haga ontdekt. Google beloo... Read more

Source: www.security.nl

Top found tags: Google Play(2),Google(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Zorgmedewerker VS steelt gegevens 5.000 mensen via e-mailLocation: Johnson, United States
Date published: 19-07-2014

Een Amerikaanse zorgmedewerker is in de Verenigde Staten tot een gevangenisstraf van vier jaar veroordeeld wegens het stelen van privgegevens van meer dan 5.000 mensen. De 27-jarige Drew Johnson werkte voor Paragon Benefits, een bedrijf dat de zorguitgaven voor andere bedrijven regelt. Johnson ble... Read more

Source: www.security.nl

Top found tags: NL(1),data theft(2),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

No advisories for today, maybe tomorrow!


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish