Under construction

New design coming soon!

CIC News engine statistics

CIC News for 22-07-2014 contains 139 articles: cybercrime(40),cyber security(58),data breach(12),other(29)

CIC News update contains 114 English and 25 Dutch articles for today.
There are 12 published advisories, 1 are English and 11 are Dutch.
In today's English news articles:
- 33 related to cybercrime
- 50 related to cyber security
- 12 related to data breach and identity theft
- 19 for the category other news

In today's Dutch news articles:
- 7 related to cybercrime
- 8 related to cyber security
- 10 for the category other news

Have fun reading.

English cybercrime related news

EFF Releases Open Wireless Router FirmwareLocation: Electronic Frontier Foundation - San Francisco, United States
Date published: 21-07-2014

The EFF is working on an open wireless router firmware thats designed to be a secure and flexible alternative to the existing software that runs on home and small business routers, much of which is notoriously insecure. The Open Wireless Router project, which the organization announced at the HOP... Read more

Source: threatpost.com

Top found tags: website(1),XSS(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Metadata-hiding Dark Mail protocol soon to be realityLocation: National Security Agency - Fort Meade, United States
Date published: 21-07-2014

At the Hackers on Planet Earth (HOPE) conference held this weekend in New York, NSA whistleblower Edward Snowden called for hackers, coders and developers to "help build a better future by encoding our rights into the programs and protocols upon which we rely everyday." He was talking about encrypti... Read more

Source: net-security.org

Top found tags: NSA (1),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critroni: First File-Encrypting Ransomware to Use TorLocation: Kaspersky HQ - Moscow, Russia
Date published: 21-07-2014

A new file-encrypting piece of ransomware advertised on underground forums since mid-June is being increasingly used by cybercriminals, a security expert reported last week. The threat, dubbed "CTB-Locker" and detected as Critroni.A by Microsoft, was initially used against Russian-speaking users, bu... Read more

Source: securityweek.com

Top found tags: Kaspersky Lab(4),malware(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fake Air Force One Crash Messages Posted on Hacked WSJ Facebook PageLocation: Facebook - Menlo Park, United States
Date published: 21-07-2014

Unknown hackers hijacked the official Facebook page of the Wall Street Journal on Sunday and posted bogus headlines. One of the posts published by the hackers claimed that Air Force One, the aircraft carrying the president of the United States, had possibly crashed over Russian airspace. The announc... Read more

Source: securityweek.com

Top found tags: United States(2),Syrian Electronic Army(3),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MH17 spammers direct Twitter users to Zeus-ridden websitesLocation: Twitter - San Francisco, United States
Date published: 21-07-2014

In the aftermath of the MH17 tragedy which saw almost 300 people lose their lives in an airplane crash over Ukraine, cyber-criminals are taking advantage by leading social media users to malicious websites. MH17 spammers direct Twitter users to Zeus-ridden websites MH17 spammers direct Twitter users... Read more

Source: www.scmagazineuk.com

Top found tags: malware(3),social media(6),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EU's new cybercrime taskforce set to launchLocation: European Cybercrime Centre - Den Haag, The Netherlands
Date published: 21-07-2014

Andy Archibald, deputy head of the UK's National Cyber Crime Unit (NCCU), is to chair a new cyber-crime taskforce based out of the European Cybercrime Centre (EC3) in The Hague in Netherlands. EU's new cybercrime taskforce set to launch EU's new cybercrime taskforce set to launch Coming a week after... Read more

Source: www.scmagazineuk.com

Top found tags: malware(3),financial sector(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pair jailed for Apple-themed phishing scams, racket supported criminal transportLocation: Londen, United Kingdom
Date published: 21-07-2014

A man and a woman accused of participating in a phishing scam, aimed at generating funds to bring foreign criminals into the U.K., have been sentenced to 14 years in prison. Constanta Agrigoroaie, 23, and Radu Savoae, 28, who were sentenced last Thursday, pleaded guilty to conspiracy to commit fraud... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),United Kingdom(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
On Facebook, fake video of disrobing woman leads to malwareLocation: Facebook - Menlo Park, United States
Date published: 21-07-2014

Shortened URLs, which supposedly lead to a risqu webcam video on YouTube, are actually spreading malware to duped Facebook users, researchers warn. Bitdefender Labs revealed that scammers created over 20,000 unique URLs, which they in turn used to redirect victims to malicious websites hosting the... Read more

Source: www.scmagazine.com

Top found tags: social media(2),telecom sector(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Staying safe while mobile in the age of industrialised hackingLocation: Juniper Networks - Sunnyvale, United States
Date published: 21-07-2014

Staying safe while mobile in the age of industrialised hacking. The use of mobile devices for work purposes is on the up, creating all sorts of new opportunities for the modern worker. In fact, according to a recent report from Juniper Research, the number of employee-owned smartphones and tablets i... Read more

Source: itproportal.com

Top found tags: cybercrime(4),exploit kit(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber scum pump ransomware at victims from spambot-stuffed websitesLocation: New York, United States
Date published: 22-07-2014

Miscreants have brewed up a strain of ransomware which functions like the recently dead CryptoLocker - and this one communicates using the Tor browsing anonymization network. Critroni appears geared towards exploiting a gap in the market created by a takedown operation against the CryptoLocker and G... Read more

Source: go.theregister.com

Top found tags: cybercrime(6),malware(6),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lawyers came in like wrecking ball when boffins tried to break TorLocation: Black Hat - Las Vegas, United States
Date published: 22-07-2014

Boring Carnegie-Mellon University lawyers have scuppered one of the most anticipated talks at Black Hat talks which would show how to reveal hidden services and user IP addresses with less than $3000 of kit. The university did not say why it torpedoed the accepted talk triggering speculation that it... Read more

Source: go.theregister.com

Top found tags: Black Hat(4),child pornography(4),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hidden network packet sniffer in MILLIONS of iPhones, iPads expertLocation: Apple HQ - Cupertino, United States
Date published: 21-07-2014

Updated An analysis of iOS by a security expert has highlighted various tools in the operating system that could be used for surveillance. Jonathan Zdziarski concluded that the vast majority of iThing owners are unaware of lax mechanisms protecting their data. Data forensics expert and author Zdziar... Read more

Source: go.theregister.com

Top found tags: social media(4),government(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BBC website and iPlayer suffer weekend outage: 'severe load' on servers suggests DDoS attackLocation: London, United Kingdom
Date published: 21-07-2014

The BBC hit technical problems over the weekend leaving its website and the iPlayer catch-up service unavailable to some users. See also: Amazon set to launch Prime Instant Video app for Android: 4K content coming.Gremlins have managed to find their way into the BBC's systems causing technical probl... Read more

Source: www.pcadvisor.co.uk

Top found tags: DoS(2),social media(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fresh threat to critical infrastructure found in Havex malwareLocation: London, United Kingdom
Date published: 21-07-2014

A dangerous open-platform communication (OPC) scanner that could be used to launch cyber attacks against critical infrastructure areas has been discovered in a variant of the Havex malware.The scanner was uncovered by researchers at FireEye while investigating a variant of Havex commonly referred to... Read more

Source: www.v3.co.uk

Top found tags: trojan(2),cybercrime(4),critical infrastructure(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian cyberweapons cross-pollinating commercial malware, analysis claimsLocation: Moscow, Russia
Date published: 21-07-2014

Sophisticated code of the sort used in Russian Government cyberweapons could be seeping into the commercial malware wielded by the country's criminals, a security firm has suggested after analysing the apparent cross-pollination in a previously unknown piece of malware called Gyges.Frustrating... Read more

Source: news.techworld.com

Top found tags: government(2),telecom sector(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Scams create phony Malaysia crash-victim tribute sitesLocation: Australian Competition and Consumer Commission - Adelaide, Australia
Date published: 21-07-2014

Scammers have set up false Facebook pages and other web sites using the name of victims of the Malaysia Airlines crash to spread malware and divert unsuspecting viewers to lurid sex sites, according to Australian SCAMWatch, which also warns against phony charity sites for Flight MH17.SCAMWatch, whic... Read more

Source: www.usatoday.com

Top found tags: social media(2),The Netherlands(2),Australian Competition and Consumer Commission(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MH17: Twitter and Facebook spammers exploit crashLocation: Facebook - Menlo Park, United States
Date published: 21-07-2014

Scammers are using the MH17 disaster in east Ukraine to spread objectionable links, online security experts have warned.A link to a pornographic website disguised as a video of the Malaysia Airlines crash was posted on a Facebook page dedicated to one victim.Many tweets have been posted that appeare... Read more

Source: www.bbc.com

Top found tags: airport sector(2),social media(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrimes major threat to businesses: KPMG reportLocation: KPMG - Amstelveen, The Netherlands
Date published: 21-07-2014

New Delhi, July 21 (IANS) Cybercrime has emerged as a major threat for businesses across the country as acknowledged by an overwhelming 89 percent of executives surveyed, a KPMG report here on Monday said.Over the past few years, the global cybercrime landscape has changed dramatically, with crimina... Read more

Source: www.focusnews.com

Top found tags: government(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber frauds cost India $870 million in 2013Location: New Delhi, India
Date published: 21-07-2014

Online scams and frauds have targeted and defrauded many Indians into losing upto $870 million to the scamsters in the last year alone Two separate surveys with different objectives released almost simultaneously, reveal how susceptible Indians are to cyber fraud and email scams. The first report, b... Read more

Source: www.moneylife.in

Top found tags: Nigeria(3),telecom sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Teen in Virginia Sexting Case Accuses Authorities of ExploitationLocation: Virginia, United States
Date published: 21-07-2014

In our last post, we introduced the story of a Manassas County, Virginia, teen accused of child pornography after he sent an explicit video to his 15-year-old girlfriend. As this strange case continues to unfold, numerous questions remain, including:Was the act the 17-year-old committed really a cri... Read more

Source: www.cybercrimelawyerblog.com

Top found tags: child pornography(4),cybercrime(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber-crime a real threat to small business in BritainLocation: Kaspersky HQ - Moscow, Russia
Date published: 21-07-2014

LONDON, July 21 (UPI) --The danger of Cyber-crime isn't only a concern for large businesses but is also a costly danger to small British enterprises, a new analysis reports.Kaspersky Lab, a vendor of computer security products, recently surveyed 250 small enterprises of 10 employees or less in the c... Read more

Source: www.upi.com

Top found tags: United Kingdom(2),Kaspersky Lab(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime: still only a tiny percentage of GDP, but its growingLocation: Center for Strategic and International Studies - Washington, United States
Date published: 21-07-2014

Online attacks drain less than 1% from the nations economy, but experts say the trend is going in the wrong direction and most companies arent implementing even basic measures to stop it.The annual cost of cybercrime is either staggering, or a mere blip on the worlds economic bottom lin... Read more

Source: www.csoonline.com

Top found tags: cybercrime(2),Germany(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Son of a High-Profile Russian Politician Arrested in a Cybercrime CaseLocation: Moscow, Russia
Date published: 21-07-2014

Roman Valerevich Seleznev, a Russian man accused of hacking into American computer systems, was arrested by the US Secret Service on Saturday, according to reports from the Department of Homeland Security.Seleznev, who was indicted in Washington State three years ago, was wanted on charges including... Read more

Source: jurist.org

Top found tags: cybercrime(5),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime presents major threat for Indian businesses - surveyLocation: Moscow, Russia
Date published: 21-07-2014

The majority of Indian executives believe cyber-attacks could seriously damage their business, The Times of India reported Monday citing the KPMG Cybercrime Survey 2014.Businesses have increasingly embraced the Internet for seamless delivery of products, services and to help reduce costs. However... Read more

Source: indian.ruvr.ru

Top found tags: survey(1),threat(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese, Taiwanese arrested for cybercrimeLocation: Beijing, China
Date published: 22-07-2014

The National Police arrested 35 Chinese people and 21 Taiwanese people in Batam, Riau Islands, and Semarang, East Java, over their alleged involvement in a cybercrime network that targeted public officials and taxpayers in China.The polices economics and special crime investigations director, Bri... Read more

Source: www.thejakartapost.com

Top found tags: financial sector(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FG initiates bill to tackles cyber-crimeLocation: Lagos, Nigeria
Date published: 21-07-2014

The Federal government has initiated a bill aimed at tackling the menace of cyber-crime in the country.Minister of Communications Technology, Mrs Omobola Johnson made this known at the ongoing Bayelsa State Investment and Economic Forum in Yenagoa.Mrs Johnson said the bill which was currently before... Read more

Source: www.radionigeriaibadan.com

Top found tags: cybercrime(3),Nigeria(3),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
We must end cyber warfare: RSA's Arthur CovielloLocation: Berlin, Germany
Date published: 22-07-2014

Coviello says relationships between the United States and China/Europe are strained because of cyber espionage.RSA executive chairman Arthur W. Coviello has called for an end to cyber warfare before an international incident happens.Speaking at the RSA Asia Pacific & Japan conference in Singapore, C... Read more

Source: www.computerworld.com.au

Top found tags: government(4),United States(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trio of Flaws Found in OleumTech Wireless Monitoring SystemLocation: ICS-CERT - Alexandria, United States
Date published: 22-07-2014

Researchers have identified several remotely exploitable vulnerabilities in a wireless remote monitoring product from OleumTech that is used in energy, water and other critical infrastructure sectors. Two of the three flaws are related to the encryption implementation in the affected products, inclu... Read more

Source: threatpost.com

Top found tags: critical infrastructure(2),government(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Leverage Russian Government MalwareLocation: Moscow, Russia
Date published: 22-07-2014

Sentinel Labs researchers recently detected what they describe as "virtually invisible" malware called Gyges, which appears to have originated in Russia as part of a government espionage campaign. "This specific Gyges variant ... caught our attention due to its sophisticated anti-tampering and anti-... Read more

Source: www.esecurityplanet.com

Top found tags: United States(2),telecom sector(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Study: 66% of UK enterprise internal apps remain untested against key security threatsLocation: New York, United States
Date published: 22-07-2014

Study: 66% of UK enterprise internal apps remain untested against key security. threats UK enterprises are trailing their US counterparts on application security with less money being spent meaning that a lower level of testing is taking place on applications. Related: Google vows to revolutionise e... Read more

Source: itproportal.com

Top found tags: vulnerability(1),cybercrime(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apples iOS security: Not what its cracked up to beLocation: Apple HQ - Cupertino, United States
Date published: 22-07-2014

Apples iOS security: Not what its cracked up to be. Forensic scientist and author Jonathan Zdziarski has revealed backdoors, attack points and surveillance mechanisms built into iOS Devices. Speaking at the Hackers On Planet Earth (HOPE/X) conference in New York, Jonathan Zdziarski basically s... Read more

Source: itproportal.com

Top found tags: government(4),mobile device(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Could Take Control of Your Car. This Device Can Stop ThemLocation: Miller, United States
Date published: 22-07-2014

[ap_carhack] [gallery-il] David Schwen Wheel: Getty Hackers Charlie Miller and Chris Valasek have proven more clearly than anyone in the world how vulnerable cars are to digital attack. Now theyre proposing the first step towards a solution. Last year the two Darpa-funded security researchers spe... Read more

Source: wired.com

Top found tags: government(3),Black Hat(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Could MH17 sanctions push Russia to cyber warfare?Location: Jackson, United States
Date published: 22-07-2014

A leading cyber security academic has warned the US and European governments that tougher sanctions on Russia relating to the MH17 airplane crash could result in the start of cyber warfare. Could MH17 sanctions push Russia to cyber warfare? Could MH17 sanctions push Russia to cyber warfare? Followin... Read more

Source: www.scmagazineuk.com

Top found tags: cybercrime(7),United Kingdom(8),government(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Tor break talk axed from Black Hat conferenceLocation: Black Hat - Las Vegas, United States
Date published: 22-07-2014

Hat USA 2014 conference in Las Vegas next month. The talk, 'You dont have to be the NSA to Break Tor: Deanonymizing Users on a Budget' by speakers, Alexander Volynkin and Michael McCord, from Carnegie Mellon University's Computer Emergency Response Team, had reportedly been highly anticipated by ... Read more

Source: www.zdnet.com

Top found tags: Black Hat(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Splunk adds risk scoring to latest Enterprise Security appLocation: New York, United States
Date published: 21-07-2014

Machine data player Splunk has released version 3.1 of its Splunk App for Enterprise Security. The company said the latest app iteration enables faster threat detection with a new risk score feature, as well as simplified access to security analytics. device quarter Splunk said key features of versi... Read more

Source: www.zdnet.com

Top found tags: threat(1),cyber security(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Please sign on the dotted line. Electronically.Location: New Hampshire, United States
Date published: 21-07-2014

promptly downloaded, printed, signed, scanned, converted to a PDF, and emailed back. That process took more than 30 minutes to complete. I pondered that scenario after the email finally chugged its way out of my outbox. Research: 41 percent increasing IT security budget in 2014 Research: 41 percent ... Read more

Source: www.zdnet.com

Top found tags: Supreme Court(2),telecom sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Forensic scientist identifies suspicious 'back doors' running on every iOS deviceLocation: Apple HQ - Cupertino, United States
Date published: 21-07-2014

Forensic scientist and author Jonathan Zdziarski has posted the slides (PDF) from his talk at the Hackers On Planet Earth (HOPE/X) conference in New York called Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices. The HOPE conference started in 1994 and bills itself as "... Read more

Source: www.zdnet.com

Top found tags: mobile device(4),government(5),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IT security training: Be proactiveLocation: New York, United States
Date published: 22-07-2014

Security is a fast paced industry. You only need to use the Internet for a short time to understand how and why the activities of digital criminals pose a real and significant threat to consumers and enterprises alike. The threat is real, persistent and constantly evolving. How can a company best pr... Read more

Source: net-security.org

Top found tags: cybercrime(2),cyber security(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whitepaper: BYOD security that worksLocation: New York, United States
Date published: 22-07-2014

Today's emerging security technologies for cloud and mobile give IT organizations more control, while also protecting employee privacy. Persistent digital watermarking technology and data leakage prevention make it possible to protect each piece of important data, rather than trying to control an en... Read more

Source: net-security.org

Top found tags: EN(1),privacy(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EFF invites hackers to test, secure its Open Wireless RouterLocation: Electronic Frontier Foundation - San Francisco, United States
Date published: 21-07-2014

The Electronic Frontier Foundation (EFF) has released Open Wireless Router, an experimental alpha release of wireless router software that is meant to improve some and add new capabilities to existing routers. The software is solid push towards the creation of open wireless networks, and is a direct... Read more

Source: net-security.org

Top found tags: update (1),cyber security(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Funny Facebook video scam leaves unamusing TrojanLocation: Facebook - Menlo Park, United States
Date published: 21-07-2014

A new funny video spreading on Facebook leaves a not-so-hilarious Trojan in its wake on users computers, according to research by Bitdefender. The malware, believed to originate from Albania, can access a large amount of data from the user s internet browser. The scam begins with what appears to be ... Read more

Source: net-security.org

Top found tags: trojan(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Splunk App for Enterprise Security Gets New FeaturesLocation: San Francisco, United States
Date published: 22-07-2014

Splunk, a provider of software that helps organizations gather and make use of machine data from a diverse set of sources, has released the latest version of the Splunk App for Enterprise Security. Now in Version 3.1, the company has introduced a new risk scoring framework to enable easier, faster t... Read more

Source: securityweek.com

Top found tags: ISP(2),cyber security(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Survey Highlights Communications Levels Between Security Pros and ExecutivesLocation: New York, United States
Date published: 21-07-2014

A new survey by the Ponemon Institute suggests that the walls between IT and the business side of the house have not fully come down. According to a survey of nearly 5,000 IT security professionals around the globe, 31 percent of cyber-security teams never speak with their executive team about cyber... Read more

Source: securityweek.com

Top found tags: United States(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PoS Security Challenges in the Spotlight at Upcoming Black Hat ConferenceLocation: Black Hat - Las Vegas, United States
Date published: 21-07-2014

It seems to be in the news more and more: hackers penetrating point-of-sale (PoS) terminals at major retailers and making off with credit and debit card information. At the upcoming Black Hat USA conference in Las Vegas, Lucas Zaichkowsky, enterprise defense architect at AccessData, plans to spotlig... Read more

Source: securityweek.com

Top found tags: information security(2),Black Hat(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EFF intros wireless router software to boost industry standardLocation: Electronic Frontier Foundation - San Francisco, United States
Date published: 21-07-2014

Researchers have observed attackers using DNS redirection attacks due to bugs in home routers. EFF is calling all hackers to help the organization "test, develop, improve, and harden" the Open Wireless Router. This weekend, the Electronic Frontier Foundation (EFF) introduced a hacker alpha releas... Read more

Source: www.scmagazine.com

Top found tags: vulnerability(3),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden, Ellsberg ask hackers to help obscure whistleblower activityLocation: National Security Agency - Fort Meade, United States
Date published: 21-07-2014

The U.S. is after Edward Snowden for leaking top-secret NSA documents. Crowds of people came out to see Daniel Ellsberg chat with Edward Snowden at HOPE X conference. Daniel Ellsberg and Edward Snowden, whose leaks of classified documents rocked the public and exposed government's illegal activities... Read more

Source: www.scmagazine.com

Top found tags: telecom sector(4),United States(4),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AddThis springs Canvas tracking test on users without askingLocation: University of California - San Diego, United States
Date published: 22-07-2014

A persistent web tracking mechanism developed by academics has been used to track web users across many of the world's most popular websites, including those of the White House and even wholesale smut barn YouPorn. The canvas fingerprinting technique was described in 2012 by University of California... Read more

Source: go.theregister.com

Top found tags: cyber security(2),financial sector(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Don't look, Snowden: Security biz chases Tails with zero-day flaws alertLocation: Black Hat - Las Vegas, United States
Date published: 21-07-2014

Vulnerability analysis outfit Exodus Intelligence has warned that the Tails operating system has a number of critical vulnerabilities that can expose the identity of its users if properly finessed by an attacker. Tails, which received a recommendation from fugitive whistleblower Edward Snowden, is a... Read more

Source: go.theregister.com

Top found tags: Black Hat(4),United States(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Secondhand Point-o-Sale terminal was horrific security middenLocation: eBay - San Jose, United States
Date published: 21-07-2014

Second hand point-of-sale systems sold through eBay are likely to contain all sorts of sensitive information, according to the work of a security researcher at HP. HP sleuth Matt Oh bought an Aloha point-of-sale terminal on eBay for $200. This type of terminal is widely used in cash registers within... Read more

Source: go.theregister.com

Top found tags: credit card(2),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EFF's snoop-stopping, ad-smashing Privacy Badger plugin hits betaLocation: Electronic Frontier Foundation - San Francisco, United States
Date published: 21-07-2014

The Electronic Frontier Foundation, a digital privacy rights group, has released a downloadable plugin for Chrome and Firefox designed to stop third parties from tracking peoples Web browsing. The tool, Privacy Badger, is in beta and comes following an alpha launch several months ago. Since then ... Read more

Source: www.pcworld.com

Top found tags: cyber security(2),telecom sector(2),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA whistleblower Edward Snowden plans to work on easy-to-use privacy toolsLocation: National Security Agency - Fort Meade, United States
Date published: 21-07-2014

NSA whistleblower Edward Snowden doesn't yet know whether he'll be spending the next year in a U.S. prison or an undisclosed location in Russia. Nevertheless, Snowden hopes to work on anti-surveillance technologies in the future. During a nearly 90-minute discussion at the Hackers on Planet Earth Co... Read more

Source: www.pcworld.com

Top found tags: government(4),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Undocumented iOS functions allow monitoring of personal data, expert saysLocation: Apple HQ - Cupertino, United States
Date published: 21-07-2014

Zdziarski Apple has endowed iPhones with undocumented functions that allow unauthorized people in privileged positions to wirelessly connect and harvest pictures, text messages, and other sensitive data without entering a password or PIN, a forensic scientist warned over the weekend. Jonathan Zdziar... Read more

Source: arstechnica.com

Top found tags: social media(4),government(5),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EFF releases Firefox, Chrome plugin to stop online trackingLocation: Electronic Frontier Foundation - San Francisco, United States
Date published: 22-07-2014

The Electronic Frontier Foundation (EFF) has released a beta version of Privacy Badger, a browser extension for Firefox and Chrome that detects and blocks online advertising and other embedded content that tracks you without your permission. Privacy Badger was launched in an alpha version less than ... Read more

Source: net-security.org

Top found tags: telecom sector(2),website(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Passwords are key when firing employeesLocation: New York, United States
Date published: 22-07-2014

you have to do is to remove the employee's access to company resources. This many companies don't do, at least not effectively. Much of this is common sense, such as deactivating card keys and other physical access methods. Where it gets murkier is when IT resources are involved. Indeed, Lieberman S... Read more

Source: www.zdnet.com

Top found tags: information security(2),social media(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What Catbird believes security systems should doLocation: New York, United States
Date published: 22-07-2014

policies in the era of cloud computing. The challenge, he points out, is that cloud computing environments are too agile, can grow or shrink to meet business requirements, and can make it very difficult for organization's static security processes to keep up. Catbird believes that security systems s... Read more

Source: www.zdnet.com

Top found tags: government(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Private contact, calendar sync service for AndroidLocation: Google HQ - Mountain View, United States
Date published: 22-07-2014

Open Whisper Systems has released Flock, a private cloud service for securely and privately syncing contacts and calendars between multiple mobile Android devices, and is meant to replaces the sync services provided by Google. "Flock is mobile oriented, and integrates seamlessly with the Android acc... Read more

Source: net-security.org

Top found tags: ISP(1),password(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critical de-anonymization 0-days found in TailsLocation: Black Hat - Las Vegas, United States
Date published: 22-07-2014

Tails, the security-focused Debian-based Linux distribution favoured by Edward Snowden, journalists and privacy-minded users around the world, sports a number of critical vulnerabilities that can lead to the user's identity to be discovered by attackers. The claim has been made by researchers with v... Read more

Source: net-security.org

Top found tags: vulnerability(2),Black Hat(4),0-day(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Finding Holes in Banking Security: Operation EmmentalLocation: Emmen, Emmen, Drenthe, The Netherlands
Date published: 22-07-2014

knowyourenemies3 Like Swiss Emmental cheese, the ways your online banking accounts are protected might be full of holes. Banks have been trying to prevent crooks from accessing your online accounts for ages. Passwords, PINs, coordinate cards, TANs, session tokens all of these were created to hel... Read more

Source: trendmicro.com

Top found tags: financial sector(2),cybercrime(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Insiders can use whistleblowing tools to steal data without a trailLocation: Lawrence, United States
Date published: 22-07-2014

The tools exist to by-pass many data leakage programmes and facilitate mass exfiltration of data, so enable internal whistelblowing - to avoid external access says Edward Parsons. Insiders can use whistleblowing tools to steal data without a trail Insiders can use whistleblowing tools to steal data ... Read more

Source: www.scmagazineuk.com

Top found tags: financial sector(4),government(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers reveal 3 devious ways online trackers shatter your privacy and follow your digital footstepsLocation: Brussel, Belgium
Date published: 22-07-2014

Researchers reveal 3 devious ways online trackers shatter your privacy and follow your digital footsteps Three stealthy tracking mechanisms designed to avoid weaknesses in browser cookies pose potential privacy risks to Internet users, a new research paper has concluded. The methodsknown as canva... Read more

Source: www.pcworld.com

Top found tags: cyber security(2),financial sector(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat presentation on unmasking TOR users suddenly cancelledLocation: Black Hat - Las Vegas, United States
Date published: 22-07-2014

A presentation on a low-budget method to unmask users of a popular online privacy tool, TOR, will no longer go ahead at the Black Hat security conference early next month. The talk was nixed by the legal counsel with Carnegie Mellons Software Engineering Institute after a finding that materials f... Read more

Source: www.pcworld.com Skimming bij pinautomaat | Voorburg - Op donderdag 17 juli werden politiemensen gestuurd naar een pinautomaat aan de Prins Bernhardlaan te Voorburg. Na het pinnen kwam er geen geld uit de automaat. De automaat stond ook niet in storing. Toen de agenten de automaat nader bekeken, vertrouwden zij de geldlade niet.In de geldlade was dubbeltape aangebracht. Het gepinde geldbedrag kleefde nog aan de tape. De tape werd verwijderd en het geld aan de benadeelde gegeven. Let dus goed op. komt uw geld na het pinnen niet uit de automaat, loop niet weg en blijf bij de automaat. Bel direct 112. | http://www.hetkrantje-online.nl/nieuws/actueel/skimming-bij-pinautomaat/2/18842 | 21-07-2014 | www.hetkrantje-online.nl

Top found tags: cybercrime(3),government(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: Explosion of electric grid-connected devices will complicate securityLocation: New York, United States
Date published: 21-07-2014

The proliferation of smart-grid technology and the integration of more devices into the electric grid system will only add to the complex security matters facing the grid in the United States, says a report from the Center for the Study of the Presidency and Congress.The center is a nonpartisan poli... Read more

Source: www.fiercehomelandsecurity.com

Top found tags: United States(2),government(5),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Exploit Dealer: Snowden's Favourite OS Tails Has Zero-Day Vulnerabilities Lurking InsideLocation: National Security Agency - Fort Meade, United States
Date published: 21-07-2014

Researchers have warned of critical unpatched flaws in the privacy-focused operating system Tails, which was made famous by global surveillance whistleblower Edward Snowden.The zero-day flaws were uncovered by Exodus Intelligence, which finds vulnerabilities and lets customers know before informing ... Read more

Source: www.forbes.com

Top found tags: United States(4),government(5),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ghanaian government worried about rising cybercrimeLocation: Accra, Greater Accra, Ghana
Date published: 21-07-2014

GHANAIAN Vice-President Kwesi Amissah-Arthur has urged ISPs to put in place effective measures to combat internet fraud, amid rapidly increasingly cybercrime. Ghana is currently ranked second in Africa behind Nigeria in terms of cybercrime. Cameroon is third.In Ghana cybercrime is called Sakawa, and... Read more

Source: www.africatelecomit.com

Top found tags: Nigeria(3),government(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Swivel Secure Research: Password Plague Puts US Businesses in JeopardyLocation: Thomas, United States
Date published: 21-07-2014

SEATTLE, Jul 21, 2014 (BUSINESS WIRE) -- New research conducted by two factor authentication provider, Swivel Secure, today reveals a culture of carelessness amongst US business owners that is jeopardizing company security and inviting cyber crime.The study*, which questioned 2,500 working Americans... Read more

Source: www.marketwatch.com

Top found tags: Syrian Electronic Army(3),cybercrime(6),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
India Turns Into Land of No Resistance for Cyber Criminals - OfficialLocation: New Delhi, India
Date published: 22-07-2014

NEW DELHI, July 22 (RIA Novosti) India has become a land of no resistance for hackers, and now the target is also large enterprises and business executives, Vinay Mohan Kwatra, Joint Secretary at Ministry of External Affairs responsible for the Counter Terrorism and Cyber Security, said Monday.... Read more

Source: en.ria.ru

Top found tags: phishing(2),government(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AU: University of Newcastle apologizes to students for privacy breachLocation: Newcastle, United Kingdom
Date published: 18-07-2014

The University of Newcastle has apologised to several thousand students after personal information was posted online.The University says the student administration information inadvertently became available in an online test environment, but access was quickly closed down when it was notified ... Read more

Source: www.databreaches.net

Top found tags: EN(1),privacy(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SMEs: How to arm your business against cyber crimeLocation: London, United Kingdom
Date published: 22-07-2014

Small British businesses are under attack every day from cyber criminals yet, according to experts at accountancy firm KPMG, two thirds of all companies disregard the threat.A lack of resources can render SMEs vulnerable compared to the rich pickings of the FTSE 250, so arm yourselves with these bas... Read more

Source: www.telegraph.co.uk

Top found tags: cyber security(2),government(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Privacy Badger Extension Blocks Tracking Through Social IconsLocation: Electronic Frontier Foundation - San Francisco, United States
Date published: 22-07-2014

Online tracking has been athornyproblem for years, and as Web security companies, browser vendors and users have become more aware of the problem and smarter about how to defend themselves, ad companies and trackers haveresponded in kind. The advent of social networks has made it far easier fo... Read more

Source: threatpost.com

Top found tags: telecom sector(2),WhiteHat Security(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
iOS Backdoors Expose Personal Data: ResearcherLocation: Apple HQ - Cupertino, United States
Date published: 22-07-2014

Several undocumented forensic services running on all iOS devices can be leveraged as attack points and surveillance mechanisms, a security researcher revealed at the Hope X conference last week. Jonathan Zdziarski, an expert in iOS security and forensics who has often assisted law enforcement and t... Read more

Source: securityweek.com

Top found tags: government(4),United States(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attackers Bypass 2FA Systems Used by Banks in 'Operation Emmental'Location: Trend Micro - Cupertino, United States
Date published: 22-07-2014

2FA Systems Used by Banks Bypassed with Malware, Rogue Mobile Apps SMS-based two-factor authentication (2FA) mechanisms used by banks to secure their customers' accounts have been bypassed by cybercriminals using a combination of malware, mobile apps, rogue DNS servers, and phishing sites, according... Read more

Source: securityweek.com

Top found tags: cybercrime(5),financial sector(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is Disckreet App Really That Discreet?Location: McAfee - Santa Clara, United States
Date published: 22-07-2014

Love is a powerful feeling that can cause an individual to do things they wouldnt normally dosometimes in a way that could compromise personal security. As we found in the Love, Relationships & Technology study released earlier this year, nearly 50% of people have shared or received intimate o... Read more

Source: blogs.mcafee.com

Top found tags: mobile device(2),cyber security(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden, Ellsberg ask hackers to help obscure whistleblower activityLocation: National Security Agency - Fort Meade, United States
Date published: 22-07-2014

Crowds of people came out to see Daniel Ellsberg chat with Edward Snowden at HOPE X conference. Snowden, Ellsberg ask hackers to help obscure whistleblower activity Snowden, Ellsberg ask hackers to help obscure whistleblower activity Daniel Ellsberg and Edward Snowden, whose leaks of classified docu... Read more

Source: www.scmagazineuk.com

Top found tags: United States(2),telecom sector(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple accused of hiding backdoors in all 600 million iOS devicesLocation: Apple HQ - Cupertino, United States
Date published: 22-07-2014

Apple has built backdoors in its iOS operating system that can leak the personal data of all 600 million iPhone and iPad users and may have been exploited by the US secret service, according to a new US research paper. Apple accused of hiding backdoors in all 600 million iOS devices Apple accused of... Read more

Source: www.scmagazineuk.com

Top found tags: Apple(3),mobile device(4),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker claims breach of Wall Street Journal and Vice websites, punts 'user data' for saleLocation: Wall Street, New York City, New York, United States
Date published: 22-07-2014

A hacker known for attacking news websites has claimed successful hacks against both the Wall Street Journal and Vice. An individual going under the handle "w0rm" posted screenshots in a bid to substantiate his claims of hacks against the WSJ (here) and Vice (here) before offering to sell stolen dat... Read more

Source: go.theregister.com

Top found tags: social media(2),update(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor Project working to fix weakness that can unmask usersLocation: Black Hat - Las Vegas, United States
Date published: 22-07-2014

Developers of Tor software believe theyve identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users. The Black Hat organizers recently announced that a talk entitled You Dont Have to be the NSA to Bre... Read more

Source: www.pcworld.com

Top found tags: Black Hat(4),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RSA's security utopia requires China, US to be friendsLocation: RSA HQ - Bedford, United States
Date published: 22-07-2014

potential such a world has to offer. Art Coviello, RSAAcceptable norms of behavior are lacking in the digital world, says RSA's Art Coviello. RSA Executive Chairman Art Coviello urged the need for greater cooperation between nations and establish national and global policies that are appropriate for... Read more

Source: www.zdnet.com

Top found tags: social media(2),United States(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Thousands of Sites Found Tracking Users Through Practically Unblockable Fingerprint MechanismLocation: Harris, United States
Date published: 22-07-2014

The rise of sophisticated new online tracking mechanisms, including one known as canvas fingerprinting thats been infiltratingthe Internet, could soon raise the ire of privacy conscious users. A recent study, a collaborative effort between researchers at Princeton University and researche... Read more

Source: threatpost.com

Top found tags: social media(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Waterfall Security Teams With Schneider Electric to Protect Control System NetworksLocation: New York, United States
Date published: 22-07-2014

Waterfall Security Solutions, a provider of security solutions for industrial control networks and critical infrastructures, has teamed with energy management solutions maker Schneider Electric to offer Waterfalls Unidirectional Security Gateways to Schneiders customers. Protecting the safety ... Read more

Source: securityweek.com

Top found tags: Schneider Electric(2),critical infrastructure(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Queen's website hosts controversial tracking techniqueLocation: White House - Washington D.C., United States
Date published: 22-07-2014

Advertising tracking called 'canvas fingerprinting' is used on many websites and identifies unique individuals and their browsing habits and works surreptitiously. Queen's website hosts controversial tracking technique Queen's website hosts controversial tracking technique The privacy threat present... Read more

Source: www.scmagazineuk.com

Top found tags: Kaspersky Lab(2),telecom sector(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Chip and PIN security no panacea against payment card fraudLocation: Cambridge, United Kingdom
Date published: 21-07-2014

In June 2011, Alex Gambin had his wallet stolen while on the Spanish island of Mallorca. A few minutes later, unauthorized charges of more than $1,800 were made to his HSBC credit card, despite the fact that his card contained a security chip designed specifically to prevent that kind of theft and t... Read more

Source: searchsecurity.techtarget.com

Top found tags: government(3),Black Hat(4),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Point-of-Sale Dealers Need a Security Sit-DownLocation: Microsoft HQ - Redmond, United States
Date published: 21-07-2014

The travails of small retail and hospitality businesses struggling with hackers have been documented for years in the annual Verizon Data Breach Investigations Report. Mom-and-pop businesses, small restaurants and regional hotel chains are perfect targets of opportunity for attackers adept at scanni... Read more

Source: threatpost.com

Top found tags: Microsoft(2),Black Hat(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Halfway There - Where Does Security Stand?Location: University of Maryland - Washington, United States
Date published: 21-07-2014

The beginning of July always marks a turning point. Summer finally feels like its in full swing, vacations, BBQs, and summer camps are ramping up, and it provides the perfect time to reflect back on the first half of the year and see how we did and what we should change. Looking back on 2014, I t... Read more

Source: securityweek.com

Top found tags: OpenSSL(2),Ponemon Institute(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
10 Experts, One Topic, 800 Million AETsLocation: McAfee - Santa Clara, United States
Date published: 22-07-2014

To say cyber threats are getting more advanced may be the understatement of the year. Every minute, our 500-plus team at McAfee Labs learns something new about the behavior of malware and other types of network attacks. The most commonly undetected threat these days is the advanced evasion techn... Read more

Source: blogs.mcafee.com

Top found tags: identity theft(2),social media(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Medical Identity Theft Can be DeadlyLocation: New York, United States
Date published: 21-07-2014

If you feel like you are starting to get the flu, going to the doctors office can get you some medicine and get you on the road to recovery. But, theres no pill or surgery that can protect you from medical identity theftwhich can kill you. Literally. The thief who steals your identity doesn... Read more

Source: blogs.mcafee.com

Top found tags: government(3),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Know thy neighbour: Dealing with third-party cyber attacksLocation: Foster, United States
Date published: 21-07-2014

It'd not enough to protect your own network, you aslo have to be prepared to cope with third party negligence says Brian Foster. Know thy neighbour: Dealing with third-party cyber attacks Know thy neighbour: Dealing with third-party cyber attacks Securing your corporate network is challenging enough... Read more

Source: www.scmagazineuk.com

Top found tags: financial sector(2),Ponemon Institute(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber security guide to the 10 most disruptive enterprise technologiesLocation: Gartner - Stamford, United States
Date published: 21-07-2014

CIOs and CSOs face the difficult task of embracing emerging trends without leaving vulnerable cracks in the organisation's security setup Deploying the latest and greatest technologies in an enterprise is one of the most effective ways of gaining competitive advantage, increasing efficiency, attract... Read more

Source: www.information-age.com

Top found tags: cybercrime(5),cyber security(8),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
8 online safety rules for college-bound kidsLocation: New York, United States
Date published: 22-07-2014

Iovation is providing eight digital safety tips for college-bound kids. Previous generations didn't need to have "the digital talk" but in a world where what goes online stays online, it's essential. 1. The Internet is forever - Think about future employers, including those coveted summer internship... Read more

Source: net-security.org

Top found tags: financial sector(4),social media(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Using Cyber Insurance and Cybercrime Data to Limit Your Business RiskLocation: New York, United States
Date published: 21-07-2014

Overview: The market for cyber liability insurance has been around for over a decade, but only recently has it experienced a spike in demand. The variety of recent high-profile data breaches have cast light on the importance of having coverage should a cyber-attack strike a business. No business is ... Read more

Source: www.informationweek.com

Top found tags: EN(1),cybercrime(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Breach Bulletin: Anonymous Targets Kenyan Defense Forces Twitter AccountLocation: Nairobi, Kenya
Date published: 21-07-2014

This weeks data breach roundup has an international focus, with a Russian hacker group and breaches in Kenya, Australia, and the UK. While most of the breaches reported this week occurred recently, one breach wasnt reported for three whole years. Read on for more details:Kenya Defense Forces T... Read more

Source: www.forbes.com

Top found tags: data breach(2),government(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Embrace and Secure Shadow ITLocation: McAfee - Santa Clara, United States
Date published: 22-07-2014

Shadow IT is stepping out into the light of day. Business users are eagerly embracing the cloud and especially Software-as-a-Service (SaaS) in search of cost-effective productivity tools for file sharing and storage, collaboration, social media, and anything else that makes them more effective... Read more

Source: blogs.mcafee.com

Top found tags: identity theft(2),cybercrime(5),social media(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Identifying Risk, or Finding a Needle in a HaystackLocation: New York, United States
Date published: 22-07-2014

Risk management is a hot topic these days. Many industry publications have shifted their focus away from compliance or security to risk management practices. Newer regulations and industry standards are now mandating a risk-based approach to security. This is forcing many organizations to transition... Read more

Source: securityweek.com

Top found tags: data breach(2),social media(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

IBM Fixes Code Execution, Cookie-Stealing Vulnerabilities in SwitchesLocation: IBM HQ - Armonk, United States
Date published: 21-07-2014

IBM recently patched a handful of vulnerabilities in some of its KVM switches that, if exploited, could have given an attacker free reign over any system attached to it. The problem specifically affects builds of IBMs Global Console Managers; keyboard, video and mouse (KVM) switches that let end ... Read more

Source: threatpost.com

Top found tags: research(1),threat(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researcher Identifies Hidden Data-Acquisition Services in iOSLocation: Apple HQ - Cupertino, United States
Date published: 21-07-2014

There are a number of undocumented and hidden features and services in Apple iOS that can be used to bypass the backup encryption on iOS devices and remove large amounts of users personal data. Several of these features began as benign services but have evolved in recent years to become powerful ... Read more

Source: threatpost.com

Top found tags: government(2),social media(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Siemens Industrial Products Affected by OpenSSL VulnerabilitiesLocation: Siemens HQ - Munich, Germany
Date published: 21-07-2014

Four recently-patched OpenSSL vulnerabilities have been found to affect several industrial products from Siemens. According to advisories published by both Siemens and the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), the security holes affect APE versions prior to 2.0.2 (only... Read more

Source: securityweek.com

Top found tags: United States(2),vulnerability(3),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
68 Percent of Employees Expose Critical Corporate Data by MistakeLocation: Will, United States
Date published: 21-07-2014

A recent survey of 800 knowledge workers worldwide has found that 68 percent of professionals are exposing their companies' confidential information by failing to remove hidden data from documents they share with customers, suppliers or colleagues. That's happening even though 65 percent of employee... Read more

Source: www.esecurityplanet.com

Top found tags: medical sector(2),United Kingdom(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Breaches driving organizational security strategy, survey indicatesLocation: National Security Agency - Fort Meade, United States
Date published: 21-07-2014

Smucker's breached, possible ties to other high-profile attacks Nearly 70 percent of respondents said NSA leaks and POS breaches are impacting business security strategies. Breaches are driving organizational security strategy, Adam Bosnian, executive vice president of the Americas at CyberArk, told... Read more

Source: www.scmagazine.com

Top found tags: trend(1),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Siemens industrial products impacted by four OpenSSL vulnerabilitiesLocation: Siemens HQ - Munich, Germany
Date published: 21-07-2014

Several Siemens products used for process and network control and monitoring in critical infrastructure sectors are affected by four vulnerabilities in the company's OpenSSL cryptographic software library. The vulnerabilities CVE-2014-0224, CVE-2014-0198, CVE-2010-5298, and CVE-2014-3470 can... Read more

Source: www.scmagazine.com

Top found tags: CERT(2),critical infrastructure(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple to use TLS encryption for iCloud email, other providersLocation: Microsoft HQ - Redmond, United States
Date published: 21-07-2014

As part of an ongoing attempt to assure the public after Snowden revelations prompted concerns that the company cooperated with the government, Apple has begun encrypting email correspondences between its iCloud service and other third-party providers. The company has always encrypted emails between... Read more

Source: www.scmagazine.com

Top found tags: ISP(1),Microsoft(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Thousands had data on computers stolen from California medical officeLocation: California, United States
Date published: 21-07-2014

Three desktop computers were stolen from the California office of Bay Area Pain Medical Associates, resulting in roughly 2,780 patients being notified that their personal information was in a spreadsheet that could have been accessed. How many victims? About 2,780. What type of personal information?... Read more

Source: www.scmagazine.com

Top found tags: EN(1),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government cloud computing adoptionLocation: New York, United States
Date published: 21-07-2014

Please enable JavaScript to view the comments powered by Disqus. blog comments. powered by Disqus Tweet About Us Our Sites Sitemap Contact Write for Us Advertise Terms and Conditions Feedback Copyright Net Communities 2014 01-06-cybercrime1.txt 01-06-cybercrime3.txt 0... Read more

Source: itproportal.com

Top found tags: EN(1),Java(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New BOMB detect-o-tech 'could give sniffer dogs competition': TRUELocation: New York, United States
Date published: 21-07-2014

Researchers working on a new type of bomb detector technology have made the rather underwhelming boast that their kit "could soon give bomb-sniffing dogs some serious competition". Bomb-sniffing dogs are expensive to train, and they can become tired, said study co-lead author Ren-Min Ma, one o... Read more

Source: go.theregister.com

Top found tags: United Kingdom(2),airport(4),airport sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lawyer reviewing terror laws and special powers: Definition of 'terrorism' is too broadLocation: Green, United States
Date published: 22-07-2014

The definition of terrorism in current UK law is too broad and should be narrowed to avoid "catching" journalists, bloggers and hate criminals, a top lawyer said today. David Anderson QC, who is Britain's independent reviewer of terrorism legislation, argued during an interview on the BBC's Radio 4 ... Read more

Source: go.theregister.com

Top found tags: United States(2),United Kingdom(4),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Third-Party Software Library Risks To Be Scrutinized at Black HatLocation: Price, United States
Date published: 22-07-2014

Enterprise application developers are under real pressures to push projects out the door quickly and cheaply, and each new version certainly has to be better than the last. This forces them to make decisions that, at a minimum, improve efficiencyand also introduce additional risks. Of particular ... Read more

Source: threatpost.com

Top found tags: update(2),vulnerability(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SCADA Security: The Five Stages of Cyber GriefLocation: Austin, TX, United States
Date published: 21-07-2014

Learn the five stages of grief that organizations seem to pass through as they come to terms with security risks and how far weve come regarding Industrial Control Systems.SCADA Security: The Five Stages of Cyber Grief Tom Cross Director of Security ResearchVulnerabilities Im credited on ... Read more

Source: www.slideshare.net

Top found tags: vulnerability(1),Windows(1),critical infrastructure(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Samsung and Google provide more details on Knox contribution to Android LLocation: Samsung HQ - Seoul, South Korea
Date published: 22-07-2014

While the material design features of Android L captured most of the attention at Google I/O, the Samsung contribution of Knox is important to the enterprise audience considering future Android devices. Yesterday, Google and Samsung posted more details on Knox integration coming in Android L. Must-R... Read more

Source: www.zdnet.com

Top found tags: Samsung(1),smartphone(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor Security Talk Cancelled at Black Hat ConferenceLocation: Black Hat - Las Vegas, United States
Date published: 22-07-2014

A presentation on cracking the anonymity of the TOR network scheduled to be held at the upcoming Black Hat USA conference in Las Vegas has been cancelled. The presentation, titled 'You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget', has been pulled from the schedule - a rela... Read more

Source: securityweek.com

Top found tags: United States(2),website(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM Patches Vulnerabilities in Global Console Manager SwitchesLocation: IBM HQ - Armonk, United States
Date published: 22-07-2014

IBM is advising the owners of certain KVM switches to update the firmware on their devices to address a total of three security holes that can be exploited remotely. According to an advisory published by the company last week, the affected products are the IBM Global 2x2x16 Console Manager (GCM16) a... Read more

Source: securityweek.com

Top found tags: patch(2),update(2),vulnerability(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LogRhythm Raises $40 MillionLocation: New York, United States
Date published: 22-07-2014

SIEM vendor LogRhythm has raised a $40 million round of new equity financing, the company announced Tuesday. According to the long time SIEM vendor, which has transformed itself into a more wide-ranging security intelligence solution, the new funding will be used to accelerate product development, s... Read more

Source: securityweek.com

Top found tags: Intel(1),threat(1),cyber defense(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diaries Go Digital: Curbing Teens Online RantsLocation: Boston, United States
Date published: 22-07-2014

shutterstock_109130027 Every inch of every page was filled front and back and the little gold lock kept the contents of my diary safe from prying eyes. I recorded every dream, fear, parental injustice, and teenage catastrophe in the pages of my very private, and always hidden, little blue book. But ... Read more

Source: blogs.mcafee.com

Top found tags: health sector(2),medical sector(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

OleumTech WIO Family VulnerabilitiesLocation:
Date published: 21-07-2014

Risk management is a hot topic these days. Many industry publications have shifted their focus away from compliance or security to risk management practices. Newer regulations and industry standards are now mandating a risk-based approach to security. This is forcing many organizations to transition... Read more

Source: ics-cert.us-cert.gov

Top found tags: data breach(2),social media(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Europese cybercrime taskforce start 1 septemberLocation: Brussel, Belgium
Date published: 21-07-2014

Op 1 september start in Den Haag een nieuwe Europese cybercrime taskforce die zich met de bestrijding van cybercriminelen gaat bezighouden. De Joint Cybercrime Action Taskforce (J-CAT) zal zich voornamelijk op botnets, banking Trojans en het 'darknet' gaan richten. Andy Archibald van de Britse Natio... Read more

Source: www.security.nl

Top found tags: United Kingdom(2),government(3),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Linux-malware infecteert 1400 webserversLocation: WordPress - San Francisco, United States
Date published: 21-07-2014

Onderzoekers hebben Linux-malware ontdekt die wereldwijd zo'n 1400 webservers heeft genfecteerd. Mayhem, zoals de malware wordt genoemd, is in werkelijkheid een PHP-script dat besmette webservers onderdeel van een botnet maakt, dat vervolgens kan worden gebruikt om websites aan te vallen. Het gaat... Read more

Source: www.security.nl

Top found tags: Windows(1),WordPress(1),Germany(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Crypto-ransomware nog steeds een bedreiging"Location: Webroot - Broomfield, United States
Date published: 21-07-2014

Ransomware die bestanden op computers voor losgeld versleutelt is nog steeds een bedreiging, ondanks de overwinning die de FBI onlangs op de Cryptolocker-ransomware claimde. Begin juni voerden de FBI, Europol en verschillende IT-bedrijven een operatie tegen het GameOver Zeus-botnet uit. Dit botnet w... Read more

Source: www.security.nl

Top found tags: United States(4),government(5),malware(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
23 virusscanners voor Windows XP getestLocation: Microsoft HQ - Redmond, United States
Date published: 21-07-2014

Windows XP mag dan niet meer door Microsoft worden ondersteund, anti-virusbedrijven blijven nog wel steeds updates voor virusscanners op dit platform uitbrengen. Het Duitse testorgaan AV-Test.org besloot daarom 23 virusscanners en Security Suites voor consumenten op Windows XP te testen. De test wer... Read more

Source: www.security.nl

Top found tags: antivirus(3),Kaspersky Lab(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden wil zelf software gaan schrijven om online privacy beter te beschermenLocation: National Security Agency - Fort Meade, United States
Date published: 21-07-2014

Klokkenluider Edward Snowden heeft tijdens een videochat op een hackersconferentie aangegeven dat hij overweegt om zich te gaan richten op het schrijven van protocollen en applicaties om zo de privacy van internetgebruikers te verbeteren. Edward SnowdenSnowden sprak via een Google Hangout-sessie met... Read more

Source: tweakers.net

Top found tags: conference(2),cyber security(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers 'los' op populaire routersLocation: Las Vegas, Nevada, United States
Date published: 21-07-2014

Veiligheidsonderzoekers/hackers zullen in het kader van de beveiligingsconferentie Defcon 22, volgende maand in Las Vegas, uitvoerig proberen 'in te hacken' op routers die worden gebruikt om particuliere woningen en kleine kantoren van wifi te voorzien. De hackpogingen worden in het vat gegoten van ... Read more

Source: www.automatiseringgids.nl

Top found tags: social engineering(2),conference(3),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple ontkent vermeende backdoor in iOS7Location: Apple HQ - Cupertino, United States
Date published: 22-07-2014

Apple ontkent dat het een backdoor aan iOS7 heeft toegevoegd zoals de afgelopen uren door de media naar buiten werd gebracht, het zou juist om diagnostische functies gaan. Beveiligingsonderzoeker Jonathan Zdziarski gaf tijdens de HOPE X conferentie in New York een lezing over de veiligheid van iOS. ... Read more

Source: www.security.nl

Top found tags: telecom sector(2),government(3),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Australische webwinkel waarschuwt klanten na 3 jaar voor lekLocation: Amsterdam, The Netherlands
Date published: 21-07-2014

De grootste webwinkel van Australi heeft klanten pas na 3 jaar gewaarschuwd voor een inbraak op de database waarbij allerlei privgegevens van klanten werden gestolen. Volgens CatchoftheDay was het begin 2011, net als verschillende andere webwinkels, het slachtoffer van een aanval. De aanvallers ... Read more

Source: www.security.nl

Top found tags: website(1),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
KPN stelt release op privacy gerichte Android-toestel BlackPhone uitLocation: KPN HQ - Den Haag, The Netherlands
Date published: 22-07-2014

De Nederlandse provider KPN stelt de release van het op privacy gerichte Android-toestel BlackPhone uit. De provider wil meer tijd om te kijken of de smartphone zijn belofte van meer privacy kan waarmaken in testen. KPN verwacht de release nu eind dit jaar. KPN test zoals gebruikelijk bij smartphone... Read more

Source: tweakers.net

Top found tags: SMS(1),cyber security(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beveiligingsonderzoeker legt backdoors bloot in iOS 7Location: Apple HQ - Cupertino, United States
Date published: 21-07-2014

Beveiligingsonderzoeker Jonathan Zdziarski claimt een aantal backdoors in iOS 7 te hebben gevonden. De achterdeurtjes kunnen gebruikt worden om de versleuteling van het OS te omzeilen. Apple heeft nog niet op de bevindingen gereageerd. Volgens Zdziarski is gebruikersdata toegankelijk via de zogenaam... Read more

Source: tweakers.net

Top found tags: mobile device(4),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Privacytool beschermt gebruikers tegen Facebook Like-buttonLocation: Facebook - Menlo Park, United States
Date published: 22-07-2014

Er is een nieuwe versie van de Privacy Badger verschenen die de privacy van gebruikers nu tegen de social media widgets beschermt die op veel websites actief zijn, zoals de Facebook Like-button, zonder de functionaliteit te breken. Het gaat om de Privacy Badger, een privacytool voor Firefox Chrome. ... Read more

Source: www.security.nl

Top found tags: telecom sector(2),United States(4),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers annuleren lezing over aanval op Tor-netwerkLocation: Black Hat - Las Vegas, United States
Date published: 22-07-2014

Twee beveiligingsonderzoekers die een manier hadden gevonden waardoor het voor slechts 3.000 dollar mogelijk was om gebruikers van het Tor-anonimiseringsnetwerk te identificeren en de locatie van Tor-servers te ontdekken hebben besloten hun lezing tijdens de Black Hat conferentie te annuleren. Het T... Read more

Source: www.security.nl

Top found tags: cyber security(2),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CNN-app verstuurt wachtwoorden onversleuteld over internetLocation: Apple HQ - Cupertino, United States
Date published: 22-07-2014

Onderzoekers hebben ontdekt dat de iPhone-app van CNN wachtwoorden onversleuteld over internet verstuurt. De app staat op de tweede plek van meest gedownloade gratis nieuws-apps. Naast nieuws en video's biedt het gebruikers via de iReport-functie de mogelijkheid om zelf materiaal te uploaden. Het ga... Read more

Source: www.security.nl

Top found tags: information security(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
KPN verschuift lancering Blackphone in NederlandLocation: KPN HQ - Den Haag, The Netherlands
Date published: 22-07-2014

KPN heeft de lancering van de op security en privacy gerichte Blackphone verschoven, waardoor het toestel mogelijk pas later dit jaar in Nederland zal verschijnen, zo heeft de telecomprovider laten weten. De Blackphone is door het Amerikaanse Silent Circle en het Spaanse Geeksphone ontwikkeld. Als b... Read more

Source: www.security.nl

Top found tags: cyber security(2),United States(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
STILL no move by Brit data cops over Google's 2012 privacy slurpLocation: Google HQ - Mountain View, United States
Date published: 22-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Britain's data cops are still investigating Google's sneaky privacy policy tweak from last year, even though many of its counterparts elsewhere in Europe have already taken action against the advertising giant. On Monday, Italy's regulator w... Read more

Source: go.theregister.com

Top found tags: government(2),The Netherlands(2),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Succesvolle hack van Tesla Model S geclaimdLocation: Beijing, China
Date published: 21-07-2014

Onderzoekers van het Chinese beveiligingsbedrijf Qihoo 360 zouden tijdens een wedstrijd op een hackerconferentie in Beijing erin zijn geslaagd om een Tesla Model S te hacken. Via de hack is het mogelijk om op afstand de koplampen, ruitenwissers, dak, claxon en sloten te bedienen. "Tesla-eigenaren mo... Read more

Source: www.security.nl

Top found tags: conferentie(1),NL(1),conference(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beveiligingsonderzoeker legt backdoors bloot in iOS 7Location: Apple HQ - Cupertino, United States
Date published: 21-07-2014

Een beveiligingsonderzoeker claimt een aantal backdoors in iOS 7 te hebben gevonden. De achterdeurtjes kunnen gebruikt worden om de versleuteling van het OS te omzeilen. Zo zijn bijvoorbeeld adresboeken uit te lezen, accountgegevens op te vragen en gps-logs te bekijken. Apple heeft nog niet op de be... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),research(1),backdoor(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Seagate is gestart met sampling 8TB-hdd'sLocation: New York, United States
Date published: 21-07-2014

Seagate is begonnen met het verstrekken van harde schijven met een capaciteit van 8TB aan bedrijven die interesse hebben in het gebruik ervan. Klanten krijgen de mogelijkheid om de harde schijven te testen, aldus de fabrikant. Steve Luczo, ceo bij Seagate, gaf tijdens een conference call met investe... Read more

Source: tweakers.net

Top found tags: conference(1),NL(1),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Criminelen vangen geld op via dubbeltape in geldautomaatLocation: Den Haag, The Netherlands
Date published: 22-07-2014

De politie van Leidschendam-Voorburg waarschuwt voor een low-tech methode die criminelen toepassen om geld in geldautomaten op te vangen. Vorige week onderzochten politieagenten een geldautomaat aan de Prins Bernhardlaan te Voorburg. Na het pinnen was er namelijk geen geld uit de automaat gekomen. D... Read more

Source: www.security.nl

Top found tags: ATM(2),social media(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ook DigiD voor mensen in het buitenlandLocation: Den Haag, The Netherlands
Date published: 22-07-2014

Het is nu ook mogelijk voor mensen die voor 1994 naar het buitenland zijn vertrokken om een DigiD aan te vragen, zo heeft de waarnemend Nationale ombudsman Frank van Dooren laten weten. Het aanvragen van DigiD door mensen in het buitenland was n van de vier meest voorkomende problemen. De Nation... Read more

Source: www.security.nl

Top found tags: report(1),The Netherlands(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI waarschuwt voor toename van 'sextortion' op social mediaLocation: Openbaar Ministerie - Den Haag, The Netherlands
Date published: 22-07-2014

Volgens Amerikaanse opsporingsdiensten vindt er een toename van 'sextortion' op social media plaats, waarbij zowel kinderen als volwassenen worden afgeperst om naaktfoto's van zichzelf te maken en aan de afperser te geven. Iets wat vaak een grote impact op de slachtoffers heeft. Zo werd er begin dit... Read more

Source: www.security.nl

Top found tags: social media(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Japanner steelt gegevens 22,6 miljoen mensen via smartphoneLocation: Den Haag, The Netherlands
Date published: 22-07-2014

De Japanse systeemingenieur die vorige week werd opgepakt wegens diefstal van klantgegevens blijkt informatie van 22,6 miljoen mensen via zijn smartphone te hebben meegenomen. Ook zouden de gegevens van 400.000 andere mensen via andere kanalen zijn gelekt, zo blijkt uit onderzoek. De zaak draait ron... Read more

Source: www.security.nl

Top found tags: research(1),smartphone(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Duitse bedrijven zien grote vraag naar typemachinesLocation: Berlin, Germany
Date published: 22-07-2014

Door alle onthullingen over de spionagepraktijken van de Amerikaanse geheime dienst NSA in Duitsland is er een grote vraag naar Duitse typemachines ontstaan, waarbij fabrikant Olympia dit jaar meer typemachines verwacht te verkopen dan in de afgelopen 20 jaar. Onlangs kwam de voorzitter van de Duits... Read more

Source: www.security.nl

Top found tags: Germany(2),government(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Geniepige webtracker volgt internetters via unieke tekeningLocation: Oracle - Redwood City, United States
Date published: 22-07-2014

Websites maken gebruik van een geniepige webtracker om internetgebruikers op internet te kunnen volgen, waarbij computers de opdracht krijgen om een tekening te maken die voor elk apparaat uniek is, zo hebben onderzoekers van de Princeton Universiteit en KU Leuven Universiteit ontdekt. Canvas finger... Read more

Source: www.security.nl

Top found tags: research(1),website(1),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beveiligingsbedrijf claimt meerdere lekken in anoniem OS TailsLocation: Twitter - San Francisco, United States
Date published: 22-07-2014

Een Amerikaans beveiligingsbedrijf claimt dat het meerdere lekken in het anonieme besturingssysteem Tails heeft ontdekt waardoor een aanvaller willekeurige code kan uitvoeren en de identiteit van gebruikers kan achterhalen, maar de ontwikkelaars van Tails zijn nog niet over de problemen ingelicht. T... Read more

Source: www.security.nl

Top found tags: government(3),Black Hat(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid in CUPS verholpenLocation: Amsterdam, The Netherlands
Date published: 21-07-2014

Samenvatting: Fedora heeft een update beschikbaar gesteld waarmee een kwetsbaarheid in CUPS wordt verholpen. Gevolgen: Een lokale aanvaller kan de kwetsbaarheid gebruiken om zijn rechten te verhogen en zodoende bestanden in te zien waar hij dit normaal niet toe gerechtigd is. Beschrijving: - CVE-201... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Apache verholpenLocation: Amsterdam, The Netherlands
Date published: 21-07-2014

Samenvatting: Er zijn meerdere kwetsbaarheden in Apache ontdekt die door een aanvaller misbruikt kunnen worden om een Denial-of-Service te veroorzaken. Gevolgen: Een aanvaller kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: - CVE-2014-0117 Een kwetbaarheid in ... Read more

Source: www.ncsc.nl

Top found tags: DoS(1),NL(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid gevonden in mod_status module van Apache WebserverLocation: Amsterdam, The Netherlands
Date published: 21-07-2014

Samenvatting: Het Zero Day Initiative (ZDI) heeft een kwetsbaarheid bekend gemaakt in de mod_status module van de Apache Webserver. Deze module is standaard aanwezig maar standaard niet geactiveerd. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om willekeurige code uit te voer... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),webserver(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in dpkgLocation: Ubuntu - London, United Kingdom
Date published: 21-07-2014

Samenvatting: Meerdere Linux distributeurs hebben updates uitgebracht die beide kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan toegang krijgen tot gevoelige informatie en kan mogelijk verhoogde gebruikersrechten verkrijgen. Beschrijving: - CVE-2014-3864, CVE-2014-3865 Door een directory t... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fedora verhelpt kwetsbaarheid in de Linux kernelLocation: Amsterdam, The Netherlands
Date published: 21-07-2014

Samenvatting: De ontwikkelaars van Fedora hebben een kwetsbaarheid in de Linux kernel opgelost. Gevolgen: Een aanvaller kan de kwetsbaarheid misbruiken om mogelijk gevoelige gegevens te bemachtigen en verhoogde rechten te verkijgen. Beschrijving: - CVE-2014-4943 Een kwetsbaarheid in de implementatie... Read more

Source: www.ncsc.nl

Top found tags: Linux(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwestbaarheden in F5 networks producten verholpenLocation: Amsterdam, The Netherlands
Date published: 21-07-2014

Samenvatting: F5 Networks heeft diverse updates beschikbaar gemaakt voor verschillende versies van haar BIG-IP producten, de ARX GUI en Enterprise Manager. Gevolgen: Een kwaadwillende met toegang tot de configuratie utility kan een Denial-Of-Service veroorzaken en diverse beveiligingsmaatregelen omz... Read more

Source: www.ncsc.nl

Top found tags: OpenSSL(1),vulnerability(1),webserver(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden in Drupal verholpenLocation: Cross, United States
Date published: 21-07-2014

Samenvatting: De ontwikkelaars van Drupal hebben diverse kwetsbaarheden in Drupal-Core versies 6.x en 7.x verholpen. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende de volgende malafide acties uitvoeren; Denial of Service (DoS), toegang tot gevoelige gegevens, omzeilen van aut... Read more

Source: www.ncsc.nl

Top found tags: DoS(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden in phpMyAdmin verholpenLocation: Amsterdam, The Netherlands
Date published: 21-07-2014

Samenvatting: De ontwikkelaars van phpMyAdmin hebben updates uitgebracht om meerdere XSS kwetsbaarheden te verhelpen. Gevolgen: Een aanvaller kan de kwetsbaarheid misbruiken voor het uitvoeren van een Cross-Site Scripting (XSS) aanval. Een dergelijke aanval kan leiden tot de uitvoer van willekeurige... Read more

Source: www.ncsc.nl

Top found tags: website(1),XSS(1),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden in Oracle Java SE verholpenLocation: Oracle - Redwood City, United States
Date published: 22-07-2014

Samenvatting: Er bevindt zich een groot aantal kwetsbaarheden in Java waarvoor Oracle updates heeft uitgebracht. Gevolgen: Misbruik van de kwetsbaarheden kan leiden tot het uitvoeren van willekeurige code met gebruikersrechten en het omzeilen van beveiligingsmaatregelen. Beschrijving: Oracle heeft v... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in CUPS verholpenLocation: Ubuntu - London, United Kingdom
Date published: 22-07-2014

Samenvatting: Meerdere Linuxdistributies hebben een update beschikbaar gesteld waarmee een kwetsbaarheid in CUPS wordt verholpen. Gevolgen: Een lokale aanvaller kan de kwetsbaarheid gebruiken om zijn rechten te verhogen en zodoende bestanden in te zien waar hij dit normaal niet toe gerechtigd is. Be... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Apache verholpenLocation: Amsterdam, The Netherlands
Date published: 22-07-2014

Samenvatting: Er zijn meerdere kwetsbaarheden in Apache ontdekt die door een aanvaller misbruikt kunnen worden om een Denial-of-Service te veroorzaken. Gevolgen: Een aanvaller kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: - CVE-2014-0117 Een kwetbaarheid in ... Read more

Source: www.ncsc.nl

Top found tags: DoS(1),NL(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish