Under construction

New design coming soon!

CIC News engine statistics

CIC News for 23-07-2014 contains 109 articles: cybercrime(24),cyber security(41),data breach(16),other(28)

CIC News update contains 87 English and 22 Dutch articles for today.
There are 6 published advisories, 2 are English and 4 are Dutch.
In today's English news articles:
- 20 related to cybercrime
- 35 related to cyber security
- 16 related to data breach and identity theft
- 16 for the category other news

In today's Dutch news articles:
- 4 related to cybercrime
- 6 related to cyber security
- 12 for the category other news

Have fun reading.

English cybercrime related news

DDoS attacks remain up, stronger in Q2, report saysLocation: Prolexic - Hollywood, United States
Date published: 22-07-2014

Online gambling site hit by five-vector DDoS attack peaking at 100Gbps Prolexic's second quarter DDoS report noted the proliferation of shorter attacks that ate up more bandwidth. Instead of fluctuating as it typically does, distributed denial-of-service (DDoS) attacks have remained elevated through... Read more

Source: www.scmagazine.com

Top found tags: DoS(2),update(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Superman soars above fellow superheroes as most toxic search termLocation: McAfee - Santa Clara, United States
Date published: 22-07-2014

Superhero fans looking to learn more about their favorite characters online might run into security risks that even Superman can't detect. Search engine users who searched for Superman, Superman and free torrent download, Superman and watch, Superman and free app, and Supe... Read more

Source: www.scmagazine.com

Top found tags: threat(1),website(1),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Op Emmental spoofs bank sites, uses Android malware to maintain account accessLocation: Google HQ - Mountain View, United States
Date published: 22-07-2014

The fairly convincing phishing scam is being hosted on a compromised EA Games server. So far, Operation Emmental has targeted victims' accounts in Austria, Switzerland, Sweden and Japan. Cyber criminals have crafted an intricate attack method for maintaining a foothold in victim's online bank accoun... Read more

Source: www.scmagazine.com

Top found tags: Trend Micro(2),cybercrime(3),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android ransomware demands 12x more cash, targets English-speakersLocation: Google HQ - Mountain View, United States
Date published: 23-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Cybercrooks have further refined a strain of file-infecting ransomware that infects Android smartphones so that it targets English speakers and is more difficult to remove. The newest variant of Android/Simplocker displays the ransom note in... Read more

Source: go.theregister.com

Top found tags: child pornography(4),cybercrime(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attackers raid SWISS BANKS with DNS and malware bombsLocation: Trend Micro - Cupertino, United States
Date published: 23-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Attackers suspected of residing in Russia are raiding Swiss bank accounts with a multi-faceted attack that intercepts SMS tokens and changes domain name system settings, researchers have warned. The attacks sported a clever implementation of... Read more

Source: go.theregister.com

Top found tags: cybercrime(5),financial sector(6),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Results- vs. Device-Centric Threats: Why Cyber-Attacks Should be in the WMD ConversationLocation: West Virginia, United States
Date published: 23-07-2014

This week were heading to Colorado for the Aspen Institutes annual Aspen Security Forum. Ill be speaking on a Friday panel entitled WMD: The Nightmare Scenario, discussing the application of cyber-attacks against critical infrastructure such as water systems, power plants, the electri... Read more

Source: blogs.mcafee.com

Top found tags: energy(2),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anonymous wages 'cyber war' against Israel in support of GazaLocation: Tel Aviv, Israel
Date published: 22-07-2014

In continuation of the hacktivist collective Anonymous' cyber-campaign against Israel, the latest group of hackers to successfully impact Israeli government function, @IzzahHackers on twitter, claim to have published the login credentials of 4,000 Israeli citizens yesterday, after having taken down ... Read more

Source: www.scmagazineuk.com

Top found tags: hacktivism(2),cybercrime(3),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Banks cyber resilience requires ongoing review against escalating threatsLocation: National Crime Agency - London, United Kingdom
Date published: 22-07-2014

The news last month (June) that the Luuuk malware had snared its first victim, an unnamed European bank, has again highlighted the magnitude of the challenge facing the banking sector. While the reported theft of 500,000 during the course of a week certainly does not break any records, the discov... Read more

Source: www.bankingtech.com

Top found tags: vulnerability(2),financial sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Modern Electric Grid Fighting Cyber VulnerabilitiesLocation: Palo Alto, United States
Date published: 22-07-2014

Utility companies are spending millions annually in cyber security costs, and the trend will continue with investments in smart meters and other technology meant to bring the electric grid up to date.The recent push to modernize the electric grid has increased communication between utilities and con... Read more

Source: www.govtech.com

Top found tags: data theft(2),smart meter(2),energy(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Iraq conflict breeds cyber-war among rival factionsLocation: New York, United States
Date published: 22-07-2014

A cyber-civil war is being waged alongside the armed conflict in Iraq, research by security firms suggests.As well as using social media to rally supporters and spread propaganda, some factions are employing hackers to gather intelligence.Well-known attack programs have been re-purposed in a bid to ... Read more

Source: www.bbc.com

Top found tags: cybercrime(2),social media(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HACKERS EXPLOIT MH17 SORROW; REDIRECT ONLINE TRIBUTES TO MALWARELocation: Facebook - Menlo Park, United States
Date published: 21-07-2014

Fake Facebook pages set up for victims of the Malaysia Airlines crash are driving traffic to pop-up advertisements and malicious software on external sites, the Daily Mail reports. The passengers named include young Australian siblings who died with their grandfather.The pages were created the day t... Read more

Source: www.nextgov.com

Top found tags: mobile device(2),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese, Taiwanese arrested for cybercrimeLocation: Beijing, China
Date published: 22-07-2014

The National Police arrested 35 Chinese people and 21 Taiwanese people in Batam, Riau Islands, and Semarang, East Java, over their alleged involvement in a cybercrime network that targeted public officials and taxpayers in China.The polices economics and special crime investigations director, Bri... Read more

Source: www.thejakartapost.com

Top found tags: financial sector(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
KPMG Cybercrime survey report 2014Location: KPMG - Amstelveen, The Netherlands
Date published: 21-07-2014

Cybercrime continues to remain a tough challenge for organisations. Over the years there has been a significant increase in the number of cybercrime attacks prompting organisations to stay alert, seek means to fight cybercrime threats. We, at KPMG, have been on the forefront to help ensure strong se... Read more

Source: www.kpmg.com

Top found tags: threat(1),cybercrime(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
StubHub was victim of cyber fraud ring; arrests to be announcedLocation: Londen, United Kingdom
Date published: 23-07-2014

(Reuters) - eBay Inc's StubHub online ticket resale service said it was the victim of a massive international cyber fraud ring, the details of which authorities plan to disclose on Wednesday as they announce arrests in the case.StubHub's head of global communications, Glenn Lehrman, told Reuters lat... Read more

Source: in.reuters.com

Top found tags: hacking(1),legislation(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Goodwill Industries Hit by Credit Card BreachLocation: New Jersey, United States
Date published: 23-07-2014

Goodwill Industries has acknowledged that it's investigating a possible credit card breach affecting several of its locations nationwide. Krebs on Security's Brian Krebs reports that Goodwill was warned on July 18, 2014 by a payment card industry fraud investigative unit and federal authorities that... Read more

Source: www.esecurityplanet.com

Top found tags: credit card(2),financial sector(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
WSJ the latest publisher to be hit by 'w0rm' hackerLocation: Wall Street, New York City, New York, United States
Date published: 23-07-2014

The Wall Street Journal has become the latest US media organisation to be hacked, just days after similar attacks against Vice Media and Metro US. WSJ the latest publisher to be hit by 'w0rm' hacker WSJ the latest publisher to be hit by 'w0rm' hacker News of the incident broke on Twitter on Tuesday ... Read more

Source: www.scmagazineuk.com

Top found tags: airport sector(2),financial sector(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacking experts build device to protect cars from cyber attacksLocation: Ford, United States
Date published: 23-07-2014

BOSTON (Reuters) - Two security experts who a year ago exposed methods for hacking the Toyota Prius and Ford Escape say they have developed technology that would keep automobiles safe from cyber attacks. At last summer's Def Con hacking conference in Las Vegas, the two researchers, Chris Valasek and... Read more

Source: reuters.com

Top found tags: United States(2),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Comodo SecureBox Protects Endpoint ApplicationsLocation: Comodo Group HQ - Clifton, United States
Date published: 23-07-2014

Security services provider and certificate authority Comodo announced on Wednesday the launch of Comodo SecureBox, a solution designed to help organizations protect the important applications running on their endpoints. According to the company, the new desktop application provides a layer of protec... Read more

Source: securityweek.com

Top found tags: health sector(2),ISP(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critical National Infrastructure: how to reduce industrial-scale riskLocation: Trend Micro - Cupertino, United States
Date published: 23-07-2014

Nation-state attacks on CNI will be faciliated by the internet of things, and government regulation is needed to set standards, but the actual likelihood of CNI attacks remains very low says Raimund Genes. Critical National Infrastructure: how to reduce industrial-scale risk Critical National Infras... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(2),cybercrime(5),critical infrastructure(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Vice.com hacked, possibly The Wall Street Journal website tooLocation: Wall Street, New York City, New York, United States
Date published: 22-07-2014

Possibly 350K ransomware infections, $70K earned, in Dropbox phishing scheme When W0rm similarly hacked CNET, it told the tech news site that it was only looking to expose security flaws. On Monday, a reported Russian hacker group known as W0rm tweeted, along with screenshots, that it had hacked pop... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),vulnerability(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lads from Lagos turn from 419 scams to basic malware slingingLocation: Palo Alto, United States
Date published: 22-07-2014

Nigerian scammers are developing beyond 419 advance-fee fraud scams against individuals by using trojans to steal valuable information from businesses instead. Security researchers at Palo Alto Networks reports that cyber criminals in Nigeria have evolved common malware campaigns to infiltrate busin... Read more

Source: go.theregister.com

Top found tags: trojan(2),Nigeria(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacking experts build device to protect cars from cyber attacksLocation: Ford, United States
Date published: 22-07-2014

BOSTON (Reuters) - Two security experts who a year ago exposed methods for hacking the Toyota Prius and Ford Escape say they have developed technology that would keep automobiles safe from cyber attacks. At last summer's Def Con hacking conference in Las Vegas, the two researchers, Chris Valasek and... Read more

Source: reuters.com

Top found tags: conference(3),Black Hat(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacking experts build device to protect cars from cyber attacksLocation: Ford, United States
Date published: 22-07-2014

BOSTON (Reuters) - Two security experts who a year ago exposed methods for hacking the Toyota Prius and Ford Escape say they have developed technology that would keep automobiles safe from cyber attacks. At last summer's Def Con hacking conference in Las Vegas, the two researchers, Chris Valasek and... Read more

Source: reuters.com

Top found tags: conference(3),Black Hat(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers Plan to Disclose Critical Bugs to TAILS Team SoonLocation: New York, United States
Date published: 22-07-2014

The developers of the TAILS operating system are poised to releasea new version of the softwarewhich is designed to preserve privacy and anonymityand it includes several security fixes. However, there are several other security issues that arent patched in the new release, vulnerabilities... Read more

Source: threatpost.com

Top found tags: United States(2),vulnerability(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacking experts build device to protect cars from cyber attacksLocation: Ford, United States
Date published: 22-07-2014

BOSTON (Reuters) - Two security experts who a year ago exposed methods for hacking the Toyota Prius and Ford Escape say they have developed technology that would keep automobiles safe from cyber attacks. At last summer's Def Con hacking conference in Las Vegas, the two researchers, Chris Valasek and... Read more

Source: reuters.com

Top found tags: conference(3),Black Hat(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers Plan to Disclose Critical Bugs to TAILS Team SoonLocation: New York, United States
Date published: 22-07-2014

The developers of the TAILS operating system are poised to releasea new version of the softwarewhich is designed to preserve privacy and anonymityand it includes several security fixes. However, there are several other security issues that arent patched in the new release, vulnerabilities... Read more

Source: threatpost.com

Top found tags: United States(2),vulnerability(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nigerian Cybercriminals Evolve Tactics to Target Businesses: Palo Alto NetworksLocation: Palo Alto, United States
Date published: 22-07-2014

Nigerian cybercriminals are evolving their tactics and targeting enterprises, according to researchers at Palo Alto Networks. During the past three months, researchers at Palo Alto Networks have identified a series of attacks believed to be coming from Nigerian cybercriminals that are targeting cust... Read more

Source: securityweek.com

Top found tags: Nigeria(3),cyber security(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Microsoft Handles BYODLocation: Microsoft HQ - Redmond, United States
Date published: 22-07-2014

The "Bring Your Own Device" (BYOD) phenomenon has picked up quite a bit of steam over the last year, matching the uptick in tablet ownership and usage patterns. Tablets have graduated from personal content consumption devices into full-blown productivity tools. With the release of Microsoft Office o... Read more

Source: www.esecurityplanet.com

Top found tags: cyber security(4),mobile device(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EFF looses Privacy Badger to munch cookies and scriptsLocation: Electronic Frontier Foundation - San Francisco, United States
Date published: 23-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Chrome and Firefox users can get a better handle on who is tracking their browsing, with the EFF releasing its Privacy Badger browser plug-in to public beta. Privacy Badger, which went in front of alpha testers in May 2014, both exposes Webs... Read more

Source: go.theregister.com

Top found tags: website(1),cyber security(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google privacy policy lawsuit to forge ahead, judge rulesLocation: Google HQ - Mountain View, United States
Date published: 23-07-2014

Privacy advocates had a measured win against Google on Monday. It appears a lawsuit filed against the tech giant will proceed despite the company's attempts to have it dismissed, according to Reuters. US District Judge Paul Grewal ruled Monday not to throw out the suit, which alleges that Google mis... Read more

Source: cnet.com.ortal.com

Top found tags: Google Play(2),update(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker worms their way into WSJ computer systemsLocation: New York, United States
Date published: 23-07-2014

The Wall Street Journal was forced to take systems offline following a security breach, as yet another online publication suffers cyberattack. According to the paper's publisher Dow Jones & Co, computer systems hosting the WSJ's news graphics were infiltrated by outside parties, and the security bre... Read more

Source: www.zdnet.com

Top found tags: social media(4),cybercrime(6),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EdgeWave Raises $6 Million in Series A Funding RoundLocation: New York, United States
Date published: 23-07-2014

Data security and cyber threat protection firm EdgeWave announced on Tuesday that it has closed a $6 million Series A funding round from TVC Capital. The financing will be used to support accelerating demand for EdgeWaves enterprise security solutions, the company said. Led by retired U.S. Navy C... Read more

Source: securityweek.com

Top found tags: financial sector(2),United States(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi networkLocation: York, United States
Date published: 23-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Bungling cops in Yorkshire have called upon householders to lock down their Wi-Fi after mistaking a free hotspot user for a piggybacking connection thief. A Reg reader from Heckmondwike claims that a local busybody called the police after se... Read more

Source: go.theregister.com

Top found tags: government(2),police(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyberwar building between warring factions in Iraq as tensions buildLocation: New York, United States
Date published: 22-07-2014

There has been an uptick in cyberattacks within Iraq, as groups fighting for control of the country try to steal data from one another. The continued political unrest in Iraq has led to armed conflict, but has led to a rise in something a bit more surprising: a cyberwar that has used social media an... Read more

Source: www.tweaktown.com

Top found tags: cyber security(4),telecom sector(4),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Treasury Secretary Warns of Financial Cyber ThreatsLocation: Warns, Nijefurd, Friesland, The Netherlands
Date published: 22-07-2014

US Treasury Secretary Jacob Lew has called on the financial sector to step up the endeavors to protect its critical infrastructure and consumer privacy from the risk of cyber-attacks.The Internet has revolutionized the way the banking sector does business from receiving bank deposits and opening... Read more

Source: vpncreative.net

Top found tags: threat(1),cyber security(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware Bypasses 2-Factor AuthenticationLocation: Trend Micro - Cupertino, United States
Date published: 22-07-2014

Criminals have been bypassing the Android-based two-factor authentication systems in use at 34 banks across four different countries, as part of a sophisticated spear-phishing and malware campaign that's been dubbed Operation Emmental - after the Swiss cheese, owing to the attackers targeting 16 ban... Read more

Source: www.bankinfosecurity.com

Top found tags: cybercrime(6),cyber security(6),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dirty Dozen Spampionship which country is spewing the most spam?Location: Sophos HQ - Oxfordshire, United Kingdom
Date published: 22-07-2014

With the 2014 World Cup complete, and the Commonwealth Games just round the corner, we thought it was a good time to publish the latest SophosLabs Spampionship charts.We measured which computers in the world sent the most spam in the second quarter (April, May and June) of 2014, and turned our measu... Read more

Source: nakedsecurity.sophos.com

Top found tags: website(1),cyber security(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime wave whacks European banksLocation: Trend Micro - Cupertino, United States
Date published: 23-07-2014

Banks across Europe are now coping with a wave of cybercrime in which crooks are transferring funds out of customer accounts through a scam involving bypassing some two-factor authentication systems to steal large sums, according to a security firm assisting in the investigation. The funds transfers... Read more

Source: banking.einnews.com

Top found tags: Trend Micro(2),cybercrime(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EU to Roll Out Cybercrime TaskforceLocation: European Cybercrime Centre - Den Haag, The Netherlands
Date published: 22-07-2014

The European Union is set to launch a trial run of an international cybercrime task force that will coordinate investigations across Europe, as well as with a handful of other countries, including Australia, Canada and the United States.The EU Joint Cybercrime Action Taskforce, or J-CAT, will launch... Read more

Source: www.govinfosecurity.com

Top found tags: malware(3),United Kingdom(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker worms his way into WSJ computer systemsLocation: New York, United States
Date published: 23-07-2014

The Wall Street Journal was forced to take systems offline following a security breach, as yet another online publication suffers cyberattack. According to the paper's publisher Dow Jones & Co, computer systems hosting the WSJ's news graphics were infiltrated by outside parties, and the security bre... Read more

Source: www.zdnet.com

Top found tags: social media(4),cybercrime(6),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Thieves Can Hack and Disable Your Home Alarm SystemLocation: Lamb, United States
Date published: 23-07-2014

adt [gallery-ca] Logan Lamb When it comes to the security of the Internet of Things, a lot of the attention has focused on the dangers of the connected toaster, fridge and thermostat. But a more insidious security threat lies with devices that arent even on the internet: wireless home alarms. Two... Read more

Source: wired.com

Top found tags: government(3),Black Hat(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dropbox for Business bolsters security featuresLocation: Dropbox - San Francisco, United States
Date published: 23-07-2014

Placing security at the forefront of its cloud-based service, the company is improving the sharing permission of links by adding password protection and expiration to ensure the links do not say active forever. These links are often shared via email to other users that do not have a Dropbox account.... Read more

Source: www.zdnet.com

Top found tags: government(3),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple refers to iOS back doors as 'diagnostic capabilities'Location: Apple HQ - Cupertino, United States
Date published: 23-07-2014

Yesterday I wrote about Forensic Scientist Jonathan Zdziarski's presentation at HOPE/X where he demonstrated "a number of undocumented high-value forensic services running on every iOS device" and "suspicious design omissions in iOS that make collection easier." Apple today addressed some of his con... Read more

Source: www.zdnet.com

Top found tags: privacy(1),backdoor(2),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Firewall is Turning 25, but is it Really All Grown Up?Location: McAfee - Santa Clara, United States
Date published: 23-07-2014

When I turned 25, I saw this as a pretty big milestone in my life. At 25 years old, I felt like a true adult I was now all grown up. I was educated, employed, experienced and stable. But when I look back, the journey from childhood to adulthood was really far from over at the age of 25.... Read more

Source: blogs.mcafee.com

Top found tags: threat(1),cyber security(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Insider threat levels from ex-staffers greater than expectedLocation: Walker, United States
Date published: 23-07-2014

A third of of ex-employees have access to company data and 9 percent have used their access privileges, says new research. Insider threat levels from ex-staffers greater than expected Insider threat levels from ex-staffers greater than expected Research just published suggests that around a third (3... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(2),United Kingdom(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor rushing to patch vulnerability that threatens its USPLocation: National Security Agency - Fort Meade, United States
Date published: 23-07-2014

Tor rushing to patch vulnerability that threatens its USP. Tor developers are frantically working to issue a fix for a weakness in the anonymous dark web browser that discloses the identity of hundreds of thousands of users and you dont have to be the National Security Agency [NSA] to do so. ... Read more

Source: itproportal.com

Top found tags: Black Hat(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The First 1 Terabit Per Second Firewall Has ArrivedLocation: New York, United States
Date published: 23-07-2014

1 Tb per second The way we do business has changed, and the threat landscape along with it. Mobile computing, public and private cloud services, social media, everything-as-a-Service, and Big Data. These trends mean the firewall cannot become a bottleneck, and the bar has to constantly be raised hig... Read more

Source: blog.fortinet.com

Top found tags: trend(1),cyber security(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch spy agencies can receive NSA data, court rulesLocation: Amsterdam, The Netherlands
Date published: 23-07-2014

Dutch intelligence services can receive bulk data that might have been obtained by the U.S. National Security Agency (NSA) through mass data interception programs, even though collecting data that way is illegal for the Dutch services, the Hague District Court ruled Wednesday. The possibility that d... Read more

Source: www.pcworld.com

Top found tags: United States(4),The Netherlands(6),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
WSJ website hacked, data offered for sale for 1 bitcoinLocation: Wall Street, New York City, New York, United States
Date published: 23-07-2014

Street Journal database. Dow Jones & Co. took two servers that store the news graphics for the Wall Street Journal website offline yesterday evening after a confirmed intrusion by a hacker calling himself w0rm. The hacker was offering what he claimed was user information and server access cred... Read more

Source: arstechnica.com

Top found tags: social media(2),vulnerability(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple documents previously undocumented services that can leak user dataLocation: Apple HQ - Cupertino, United States
Date published: 23-07-2014

Four days after a forensics expert warned that undocumented functions in iOS could leak personal user data, Apple has documented three services it says serve diagnostic purposes. Further Reading Undocumented iOS functions allow monitoring of personal data, expert says "Backdoor" can be abused by gov... Read more

Source: arstechnica.com

Top found tags: Apple(3),mobile device(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Unprepared for Cyber-Attack: 9/11 Report AuthorsLocation: White House - Washington D.C., United States
Date published: 23-07-2014

WASHINGTON - The United States has failed to sufficiently adapt to new cyber-security threats, exposing itself to potential terror strikes as devastating as September 11, authors of the report on the 2001 attacks warned Wednesday. In July 2004, the independent 9/11 commission issued a comprehensive,... Read more

Source: securityweek.com

Top found tags: United States(2),cyber security(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Metro News Website Compromised to Serve MalwareLocation: New York, United States
Date published: 23-07-2014

The United States website of the Metro newspaper (metro.us), which serves an estimated 1 million visitors every month, has been compromised and abused to distribute a piece of malware, Websense reported on Tuesday. According to the security firm, cybercriminals have injected a malicious iFrame into ... Read more

Source: securityweek.com

Top found tags: malware(3),exploit kit(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
34 European banks hit by Android app security attacksLocation: Google HQ - Mountain View, United States
Date published: 23-07-2014

Banks need to put their heads together to develop common and more secure methodologies says Sarb Sembhi, STORM Guidance, following operation Emmental. 34 European banks hit by Android app security attacks 34 European banks hit by Android app security attacks Cybercriminals have reportedly used a mul... Read more

Source: www.scmagazineuk.com

Top found tags: telecom sector(2),Trend Micro(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

$4 billion breach suit against Sutter Health dismissedLocation: Sutter, United States
Date published: 22-07-2014

An appeals court has dismissed several class action lawsuits filed against Sutter Health, due to a data breach it suffered nearly three years ago. On Monday, the California Third District Court of Appeal ruled (PDF) that plaintiffs, which filed on behalf of over four million impacted patients, faile... Read more

Source: www.scmagazine.com

Top found tags: health sector(2),medical sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
29% of consumers dont trust retailers to keep personal financial data safe from hackersLocation: Will, United States
Date published: 22-07-2014

29% of consumers dont trust retailers to keep personal financial data safe. from hackers Consumers dont trust retailers to keep personal and financial data safe from hackers or data breaches as almost a third admitted to being worried once stores have the information. Related: UK retailer Offi... Read more

Source: itproportal.com

Top found tags: United Kingdom(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Catch of the Day failed to inform AFP on data breachLocation: Sydney, Australia
Date published: 23-07-2014

breach to the Australian Federal Police at the time of the attack. On Friday evening, Catch of the Day quietly notified customers to change their password, revealing that it had been the victim of a data breach in May 2011, where credit card details, email addresses, delivery addresses, hashed passw... Read more

Source: www.zdnet.com

Top found tags: financial sector(4),government(4),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Almost a third of online consumers don't trust retail securityLocation: New York, United States
Date published: 22-07-2014

A new, global fraud research report, which surveyed consumers across 20 countries, reveals that a startling 29 percent of online shoppers do not trust retailers with their personal data. The study, conducted by ACI Worldwide, identified a general feeling of satisfaction with financial institutions s... Read more

Source: www.scmagazineuk.com

Top found tags: data breach(2),United Kingdom(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Manhattan Man Arrested in Bethpage for Identity Theft, Grand LarcenyLocation: Nassau County, United States
Date published: 22-07-2014

Crimes Against Property Squad detectives report the arrest of a Manhattan man for grand larceny and identity theft which occurred throughout Nassau County beginning Friday, ...Bethpage, NY - July 22nd, 2014 - Crimes Against Property Squad detectives report the arrest of a Manhattan man for grand lar... Read more

Source: www.longisland.com

Top found tags: credit card(2),identity theft(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Goodwill, feds investigate possible data breachLocation: New York, United States
Date published: 22-07-2014

NEW YORK (AP) Nonprofit organization Goodwill Industries Inc. is working with federal officials to investigate a possible security breach.The Rockville, Maryland-based organization said late Monday that it was contacted Friday by a payment card industry fraud investigative unit and federal autho... Read more

Source: www.sfgate.com

Top found tags: data breach(2),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HEALTH CARE EMPLOYEE SENTENCED FOR IDENTITY THEFTLocation: Georgia, United States
Date published: 22-07-2014

COLUMBUS, GA Michael J. Moore, United States Attorney for the Middle District of Georgia, announced today that Drew Johnson, 27, of Columbus, Georgia, was sentenced to serve four years in federal prison for accessing personal information files. The sentence was handed down by the Honorable Clay ... Read more

Source: valdostatoday.com

Top found tags: ISP(1),identity theft(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
If You Think Data Security is ITs Responsibility, Think AgainLocation: Verizon HQ - New York, United States
Date published: 23-07-2014

What does Ebay, Target and Adobe have in common? These companies, among countless others, have all experienced a significant data breach in the last year. While these breaches have cost millions of dollars to fix, theyve also cost some executives their jobs. If you dont think data security is ... Read more

Source: smartdatacollective.com

Top found tags: vulnerability(1),cybercrime(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Smart Phones More Vulnerable To Cyber Attacks'Location: Marshall, United States
Date published: 23-07-2014

BANGALORE: Smart phones and tablets are slowly replacing laptops and desktops, but they seem to be more vulnerable to cyber attacks, Richard H L Marshall, former director of Global Cyber Security Management, Department of Homeland Security, USA, said.With mobile transactions set to touch $1.3 trilli... Read more

Source: www.newindianexpress.com

Top found tags: United States(4),telecom sector(6),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
When it comes to security, honesty is the best policyLocation: eBay - San Jose, United States
Date published: 23-07-2014

When it comes to security, honesty is the best policy. It has never been harder for businesses to build and preserve a relationship of trust with their customers. The rise of increasingly sophisticated, and targeted, cyber-attacks means there are more threats to watch out for than ever before. But l... Read more

Source: itproportal.com

Top found tags: Ponemon Institute(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Poor Control Over Open Source Component Use Puts Organizations at Risk: SurveyLocation: New York, United States
Date published: 23-07-2014

Many software development firms still fail to ensure that the components they use don't contain security vulnerabilities, according to a report published on Tuesday by software supply chain management company Sonatype. One in ten of the roughly 3,300 software developers, architects and application s... Read more

Source: securityweek.com

Top found tags: data breach(2),OpenSSL(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Goodwill Investigating Possible Payment Card BreachLocation: Ottawa, Ontario, Canada
Date published: 23-07-2014

Goodwill Industries International, Inc., a non-profit organization that aims at helping people who are disabled or disadvantaged through various programs, is investigating a possible data breach that might have impacted several of its stores across the United States. The organization, which has 165 ... Read more

Source: securityweek.com

Top found tags: United States(2),telecom sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Entrepreneur develops hacked data search engineLocation: New York, United States
Date published: 23-07-2014

A Portuguese entrepreneur is said to have developed a specialised search engine that can allow access to leaked or allegedly stolen access credentials. Entrepreneur develops hacked data search engine Entrepreneur develops hacked data search engine One of the biggest problems with accessing the darkn... Read more

Source: www.scmagazineuk.com

Top found tags: financial sector(2),social media(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
StubHub Hit in Cyber-Attack That May Have Stolen $10M in TicketsLocation: AppRiver - Gulf Breeze, United States
Date published: 23-07-2014

Online ticket service StubHub was reportedly hit in a cyber-attack that compromised more than a thousand accounts. Arrests are expected to be officially announced today. According to reports, the attack was the work of a cybercrime operation that spanned the globe and may have stolen some $10 millio... Read more

Source: securityweek.com

Top found tags: United Kingdom(2),United States(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Goodwill Suffers Potential Card Breach, Feds InvestigateLocation: Neiman Marcus - Dallas, United States
Date published: 23-07-2014

Everyone loves a good dealincluding hackers. Unfortunately, after a brief quiet period in the world of data breaches, it appears as though Goodwill Industries, purveyor of second-hand clothing and goods, may be suffering from a series of credit card breaches nationwide. This is especially troubli... Read more

Source: blogs.mcafee.com

Top found tags: United States(2),cybercrime(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Goodwill investigates compromise of credit, debit card infoLocation: New York, United States
Date published: 22-07-2014

Those bargain finds might not look so good now to shoppers if their credit or debit card information was compromised at one of several Goodwill stores across the country. In a statement on its website, Goodwill Industries International said it was notified last week by federal authorities and what i... Read more

Source: www.scmagazine.com

Top found tags: credit card(2),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor developers vow to fix bug that can uncloak usersLocation: Black Hat - Las Vegas, United States
Date published: 22-07-2014

a low-cost way for adversaries to deanonymize hundreds of thousands of users. The talk previously scheduled for next month's Black Hat security conference in Las Vegas was titled "You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget." The abstract said that the hack cost less t... Read more

Source: arstechnica.com

Top found tags: update(2),vulnerability(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Putin signs data retention lawLocation: Moscow, Russia
Date published: 23-07-2014

By AAP July 23, 2014 -- 03:02 GMT (04:02 BST) Russian President Vladimir Putin has signed a law requiring internet companies to store all personal data of Russian users at data centres in Russia, a move which could chill criticism on foreign social networking sites like Facebook and Twitter. These c... Read more

Source: www.zdnet.com

Top found tags: airport sector(2),government(3),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat talk on Tor weaknesses canceledLocation: Black Hat - Las Vegas, United States
Date published: 22-07-2014

It appears lawyers have stepped in to pull the plug on a Black Hat talk that was set to reveal vulnerabilities impacting the Tor network. The planned session at the Las Vegas hacking conference, You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget, was to be presented by ... Read more

Source: www.scmagazine.com

Top found tags: conference(2),government(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
More charged for roles in three separate Android app piracy groupsLocation: Lee, United States
Date published: 22-07-2014

Indictments unsealed on Monday charge additional members of separate Android app piracy groups, according to a Monday FBI release. Joshua Taylor and Scott Walton, of SnappzMarket Group, were arrested on Monday and, along with Gary Sharp, were charged with conspiracy to commit criminal copyright infr... Read more

Source: www.scmagazine.com

Top found tags: government(1),airport(2),airport sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Goodwill's goodwill rocked as Feds probe bank card hacking scamLocation: New Jersey, United States
Date published: 22-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines American charity Goodwill is being investigated by US federal authorities as the possible ground zero for a major debit and credit card security breach. But the company says it thinks it's in the clear. "Goodwill Industries International was... Read more

Source: go.theregister.com

Top found tags: credit card(2),United States(4),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Wall Street Journal Takes Computers Offline After HackingLocation: Wall Street, New York City, New York, United States
Date published: 23-07-2014

WASHINGTON - The Wall Street Journal took some of its computers housing news graphics offline after they were hacked, publisher Dow Jones & Co said. People familiar with the matter told the Journal that the move was intended to isolate any possible attacks. Workers were reviewing the systems to dete... Read more

Source: securityweek.com

Top found tags: vulnerability(1),website(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
StubHub ticked off by trans-Atlantic fraudsters says New York DALocation: New York, United States
Date published: 23-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines eBay's ticket-selling offshoot StubHub has admitted to a breach of some users' security by a ring of fraudsters. Reuters and AP have both received notification from New York district attorney Cyrus Vance of an event to be staged on Wednesday... Read more

Source: go.theregister.com

Top found tags: EN(1),fraud(1),Linux(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PayPal post-checkout cash slurp a FEATURE not a BUGLocation: PayPal HQ - San Jose, United States
Date published: 23-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines An apparent flaw that lets users add any amount of money onto already processed PayPal transactions is a feature, not a bug, according to the payments giant. The function was designed to allow sellers to add additional costs for services lik... Read more

Source: go.theregister.com Feedly kampt met problemen in Europa | Momenteel ondervindt de RSS dienst Feedly verschillende problemen, de dienst is in Europa slecht bereikbaar door een combinatie van problemen met Cloudfare. Inmiddels heeft Feedly via de sociale kanalen de gebruikers op de hoogte gebracht van de storing. Indien gebruikers de website bezoekers verschijnt er een foutmelding en wordt de website niet geladen, vanochtend kampte de website ook al met verschillende problemen. Een aantal maanden geleden kampte Feedly ook met problemen door een DDoS aanval. Enkele maanden geleden eiste de gebruiker geld om te stoppen met de DDoS aanvallen. De storing welke op dit moment aanwezig is lijkt niet door een DDoS aanval veroorzaakt te zijn. Feedly laat in een Tweet weten dat ze momenteel de problemen met Cloudfare oplossen.Indien er meer informatie bijkomt zullen wij dit artikel bijwerken. Update 12:56 : Feedly lijkt weer te werken | http://technieuws.com/36153/feedly-kampt-met-problemen-in-europa | 22-07-2014 | technieuws.com

Top found tags: vulnerability(1),website(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bulgaria seizes skimming devices for illegal ATM withdrawals at border with RomaniaLocation: Sofia, Bulgaria
Date published: 22-07-2014

SOFIA, July 22 (Xinhua) -- Bulgarian law enforcement officers have seized four full sets of skimming equipment at Danube Bridge checkpoint near the northwestern town of Vidin, officials said on Tuesday.According to a joint press release issued by the Ministry of Interior, State Agency for National S... Read more

Source: www.globalpost.com

Top found tags: skimming(1),USB (1),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firefox 31 Patches 11 Security FlawsLocation: Mozilla - Mountain View, United States
Date published: 23-07-2014

Mozilla has released a new version of Firefox, which includes patches for 11 security vulnerabilities. Three of the bugs fixed in Firefox 31 are critical, including a use-after-free vulnerability and a handful of memory safety issues. There are actually several separate use-after-free vulnerabilitie... Read more

Source: threatpost.com

Top found tags: patch(1),report(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Motorola taps 'digital tattoo' for phone securityLocation: Motorola HQ - Chicago, United States
Date published: 23-07-2014

phone by touching the handset to it. Motorola Motorola is offering a unusual approach to unlocking your smartphone: a piece of circuitry that adheres to your wrist. The so-dubbed "digital tattoo" for the Moto X smartphone was launched Tuesday. It was first mentioned last year at the D: All Things Di... Read more

Source: cnet.com.ortal.com

Top found tags: smartphone(1),NFC(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mozilla Fixes 11 Vulnerabilities With Release of Firefox 31Location: Mozilla - Mountain View, United States
Date published: 23-07-2014

Firefox 31 was released by Mozilla on Tuesday and fixes a total of 11 vulnerabilities affecting earlier versions. Three of the flaws in the the popular Web browser have been rated critical, which indicates that they can be exploited to execute code and install software without requiring user interac... Read more

Source: securityweek.com

Top found tags: report(1),research(1),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK government decision to implement Open Document Format across all departments signals demise of Microsoft Office contractLocation: Microsoft HQ - Redmond, United States
Date published: 23-07-2014

UK government decision to implement Open Document Format across all departments. signals demise of Microsoft Office contract The UK government has formally announced that all government departments are to use the open document format [ODF] for documents immediately in a move that is part of the gove... Read more

Source: itproportal.com

Top found tags: threat(1),United Kingdom(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

Omron NS Series HMI VulnerabilitiesLocation: Palo Alto, United States
Date published: 22-07-2014

Nigerian cybercriminals are evolving their tactics and targeting enterprises, according to researchers at Palo Alto Networks. During the past three months, researchers at Palo Alto Networks have identified a series of attacks believed to be coming from Nigerian cybercriminals that are targeting cust... Read more

Source: ics-cert.us-cert.gov

Top found tags: Nigeria(3),cyber security(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Honeywell FALCON XLWeb Controllers VulnerabilitiesLocation: Palo Alto, United States
Date published: 22-07-2014

Nigerian cybercriminals are evolving their tactics and targeting enterprises, according to researchers at Palo Alto Networks. During the past three months, researchers at Palo Alto Networks have identified a series of attacks believed to be coming from Nigerian cybercriminals that are targeting cust... Read more

Source: ics-cert.us-cert.gov

Top found tags: Nigeria(3),cyber security(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Hackers openen alle deuren van rijdende TeslaLocation: Beijing, China
Date published: 23-07-2014

De schrik voor alle verkeersveiligheidsdeskundigen: Hackers zijn er in geslaagd de bediening van de grotendeels elektrische aangedreven en aangestuurde sportwagen Tesla Model S over te nemen. Meer over robotauto's FBI ziet bommen in zelfrijdende auto's 'Google serieuze concurrent autoindustrie' Drie... Read more

Source: www.automatiseringgids.nl

Top found tags: NL(1),research(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android-ransomware eist 300 dollar losgeld voor bestandenLocation: Google HQ - Mountain View, United States
Date published: 23-07-2014

Er is een nieuwe versie van de Simplocker-ransomware voor Android verschenen die nu meer bestanden op de SD-kaart versleutelt en slachtoffers een veel hoger bedrag vraagt als ze hun bestanden terug willen krijgen. Ook is de waarschuwing nu in het Engels en is die voorzien van een FBI-logo. Om gebrui... Read more

Source: www.security.nl

Top found tags: pornography(2),cybercrime(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firefox 31 controleert downloads op malwareLocation: Mozilla - Mountain View, United States
Date published: 23-07-2014

Met de lancering van Firefox 31 heeft Mozilla een nieuwe functie aan de browser toegevoegd waardoor gedownloade bestanden voortaan op malware worden gecontroleerd, net zoals Google Chrome dat doet. Het blokkeren gebeurt aan de hand van de reputatie van het bestand en de site die het bestand aanbiedt... Read more

Source: www.security.nl

Top found tags: website(1),Google(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
18 jaar oud macrovirus in documenten Chinese overheidLocation: Beijing, China
Date published: 23-07-2014

Op een website van de Chinese overheid hebben onderzoekers verschillende Excel-documenten gevonden waarin een 18 jaar oud macrovirus bleek te zitten. Het gaat om het Laroux macrovirus uit 1996. De spreadsheets stonden op de website van de Chinese Securities Regulatory Commission. Deze commissie regu... Read more

Source: www.security.nl

Top found tags: Windows(1),cybercrime(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Nederland mag gegevens blijven uitwisselen met NSALocation: Amsterdam, The Netherlands
Date published: 23-07-2014

De Nederlandse inlichtingendiensten AIVD en MIVD mogen gegevens blijven uitwisselen met de Amerikaanse NSA. Dat heeft de rechtbank in Den Haag besloten na een rechtszaak die verschillende burgers en organisaties hadden aangespannen tegen de Staat. In de uitspraak erkent de rechtbank dat er een mogel... Read more

Source: www.nutech.nl

Top found tags: United States(4),The Netherlands(6),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rechter: Nederland mag NSA-data blijven gebruikenLocation: Amsterdam, The Netherlands
Date published: 23-07-2014

De overheid mag gegevens die buitenlandse inlichtingendiensten in strijd met de Nederlandse wet verzamelden, blijven gebruiken. Dat heeft de rechtbank in Den Haag geoordeeld. Een coalitie van organisaties en burgers had de Staat aangeklaagd. Ronald PlasterkDe aanklagers wilden dat de Nederlandse sta... Read more

Source: tweakers.net

Top found tags: The Netherlands(2),United States(4),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rechtbank: Nederland mag data met NSA blijven uitwisselenLocation: Amsterdam, The Netherlands
Date published: 23-07-2014

De Nederlandse inlichtingendiensten AIVD en MIVD mogen telecomgegevens met de Amerikaanse National Security Agency (NSA) uitwisselen, zo heeft de rechtbank in Den Haag geoordeeld in een civiele zaak tussen een aantal individuen en de Nederlandse Vereniging voor Strafrechtadvocaten (NVS), de Nederlan... Read more

Source: www.security.nl

Top found tags: The Netherlands(4),United States(8),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Uitwisselen telecominformatie met NSA magLocation: Amsterdam, The Netherlands
Date published: 23-07-2014

De Nederlandse geheime diensten AIVD en MIVD mogen telecommunicatie uitwisselen met de Amerikaanse veiligheidsdienst NSA. Dat kan door de de beugel, besloot de rechtbank in Den Haag woensdag in een civiele zaak. Daarbij waren onder meer de Nederlandse Vereniging voor Strafrechtadvocaten (NVSA) en de... Read more

Source: www.automatiseringgids.nl

Top found tags: The Netherlands(4),United States(6),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rechter staat invoering nieuw elektronisch patintendossier toeLocation: Amsterdam, The Netherlands
Date published: 23-07-2014

De rechtbank in Utrecht heeft vandaag bepaald dat de invoering en het verder ontwikkelen van het nieuwe elektronisch patintendossier (EPD) gewoon kan doorgaan. De Vereniging van Praktijkhoudende Huisartsen (VPH) had om een verbod van de invoering en ontwikkeling gevraagd. De Vereniging van Zorgaan... Read more

Source: www.security.nl

Top found tags: cyber security(2),financial sector(2),The Netherlands(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IT-beveiliger ontkent gesjoemel met lekken in privacy-OS TailsLocation: National Security Agency - Fort Meade, United States
Date published: 23-07-2014

Exodus Intelligence beweert geen informatie te hebben verkocht over Tails, het besturingssysteem ontworpen om maximale geheimhouding te bewerkstelligen. Het bureau staat wel bekend om het exploiteren van kennis over softwarefouten. Meer over Tails 5 manieren om je te onttrekken aan afluisteren door ... Read more

Source: www.automatiseringgids.nl

Top found tags: cyber security(2),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

KNMG: patintgegevens slachtoffers MH17 afgeven aan politieLocation: Den Haag, The Netherlands
Date published: 23-07-2014

Artsen die een verzoek krijgen van nabestaanden van passagiers van vlucht MH17 om patintgegevens van de overledene, kunnen een kopie van de gegevens die voor identificatie relevant zijn afgeven aan de politie. Dit adviseert de KNMG na overleg met het OM en het Landelijk Team Forensische Opsporing.... Read more

Source: www.security.nl

Top found tags: Openbaar Ministerie(2),The Netherlands(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor gaat lek dichten dat anonieme gebruikers kon ontmaskerenLocation: Black Hat - Las Vegas, United States
Date published: 23-07-2014

De ontwikkelaars van het Tor Project denken het lek te hebben gevonden dat twee onderzoekers zouden hebben ontdekt en gebruikt om gebruikers op het netwerk te ontmaskeren. Het Tor-netwerk is juist ontwikkeld om de anonimiteit van gebruikers op internet te beschermen. Michael McCord en wetenschapper ... Read more

Source: www.security.nl

Top found tags: update(2),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaanse website Metro verspreidt malwareLocation: New York, United States
Date published: 23-07-2014

Aanvallers zijn erin geslaagd om toegang tot de Amerikaanse website van de gratis krant Metro te krijgen en daar een iframe te plaatsen die bezoekers met malware probeert te infecteren. Het iframe laadt zonder dat bezoekers dit door hebben of iets voor hoeven te doen een exploit vanaf een andere web... Read more

Source: www.security.nl

Top found tags: research(1),website(1),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mozilla dicht kritieke lekken in Firefox 31Location: Mozilla - Mountain View, United States
Date published: 23-07-2014

Mozilla heeft gisteren Firefox 31 uitgebracht, die in totaal 14 lekken verhelpt, waarvan vier zo kritiek dat een aanvaller het onderliggende systeem erdoor zou kunnen overnemen. Via de andere verholpen lekken was het mogelijk om gevoelige data van andere geopende sites te stelen of daar code aan toe... Read more

Source: www.security.nl

Top found tags: Firefox(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overheidsdiensten VK moeten odf ondersteunenLocation: Microsoft HQ - Redmond, United States
Date published: 23-07-2014

Softwareproducten of office-diensten die overheidsdiensten in het Verenigd Koninkrijk afnemen moeten het open bestandsformaat odf ondersteunen, zo heeft het Cabinet Office in het VK bepaald. Microsofts ooxml-formaat is niet vereist. Demand odfVoor het bekijken van overheidsdiensten is pdf of html ve... Read more

Source: tweakers.net

Top found tags: Microsoft(2),OS X(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BKR houdt voor banken politici in de gatenLocation: Amsterdam, The Netherlands
Date published: 23-07-2014

partijleiders, bevelhebbers van strijdkrachten en bestuurders van bedrijven die ter plaatse staatseigendom zijn. Gedacht moet worden aan staatshoofden zoals Poetin, belangrijke politici, partijleiders, bevelhebbers van strijdkrachten en bestuurders van bedrijven die ter plaatse staatseigendom zijn. ... Read more

Source: www.automatiseringgids.nl

Top found tags: legislation(1),NL(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Engelse overheid negeert lobby Microsoft, kiest voor ODFLocation: Microsoft HQ - Redmond, United States
Date published: 23-07-2014

De Engelse regering heeft, tegen de zin van Microsoft, het Open Document Format tot standaard verheven voor de Engelse overheid. De dagen van felle strijd tussen Microsoft en de voorstanders van het open bestandsformaat ODF liggen al weer geruime tijd achter ons. Microsoft was, en is, voorstander va... Read more

Source: www.automatiseringgids.nl

Top found tags: NL(1),government(2),United Kingdom(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
WSJ haalt servers offline vanwege inbraakLocation: New York, United States
Date published: 23-07-2014

De Wall Street Journal (WSJ) heeft gisteren verschillende servers offline gehaald nadat er een inbraak op de systemen had plaatsgevonden, zo laat de Amerikaanse krant weten. Op de servers stonden afbeeldingen die voor artikelen van de krant worden gebruikt. Volgens bronnen die met de zaak bekend zij... Read more

Source: www.security.nl

Top found tags: vulnerability(1),social media(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anoniem OS Tails verstopt zich met Windows 8-camouflageLocation: Microsoft HQ - Redmond, United States
Date published: 23-07-2014

De ontwikkelaars van het anonieme besturingssysteem Tails hebben versie 1.1 gelanceerd, die een aantal grote veranderingen bevat waardoor het OS op moderne computers werkt, een andere Debian-versie gebruikt en daardoor OpenOffice heeft ingeruild en zich nu als Windows 8 kan camoufleren. The Amnesic ... Read more

Source: www.security.nl

Top found tags: UEFI(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PayPal app ondersteunt mobiel betalen in NederlandLocation: PayPal HQ - San Jose, United States
Date published: 23-07-2014

PayPal heeft een nieuwe functie aan de eigen app toegevoegd waardoor het straks mogelijk is om bij meer dan 1500 locaties in Nederland, waaronder restaurants, winkels en parkeerplaatsen, mobiel te betalen. Hiervoor wordt samengewerkt met MyOrder, de mobiele betaaloplossing van de Rabobank. Alle loca... Read more

Source: www.security.nl

Top found tags: bank(1),NL(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Recordaantal lekken in Internet Explorer gepatchtLocation: Microsoft HQ - Redmond, United States
Date published: 23-07-2014

In de eerste zes maanden van dit jaar zijn er meer lekken door Microsoft in Internet Explorer gepatcht dan in heel 2013 bij elkaar opgeteld. Verhielp Microsoft vorig jaar nog 130 IE-lekken, in de eerste helft van dit jaar staat de teller al op 133, zo meldt beveiligingsbedrijf Bromium in een nieuw r... Read more

Source: www.security.nl

Top found tags: patch(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers ontwikkelen aanvalsdetectiesysteem voor auto'sLocation: Miller, United States
Date published: 23-07-2014

Twee onderzoekers hebben een systeem ontwikkeld waarmee het mogelijk is om aanvallen op auto's te detecteren en te voorkomen. Charlie Miller en Chris Valasek kwamen vorig jaar in het nieuws doordat ze erin slaagden om een Ford Escape en een Toyota Prius aan te vallen en de besturing over te nemen. D... Read more

Source: www.security.nl

Top found tags: research(1),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Diverse kwetsbaarheden in Oracle Java SE verholpenLocation: Oracle - Redwood City, United States
Date published: 23-07-2014

Samenvatting: Er bevindt zich een groot aantal kwetsbaarheden in Java waarvoor Oracle updates heeft uitgebracht. Gevolgen: Misbruik van de kwetsbaarheden kan leiden tot het uitvoeren van willekeurige code met gebruikersrechten en het omzeilen van beveiligingsmaatregelen. Beschrijving: Oracle heeft v... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden in libXfont verholpenLocation: Ubuntu - London, United Kingdom
Date published: 23-07-2014

Samenvatting: Er zijn meerdere kwetsbaarheden verholpen in libXfont. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om willekeurige code uit te voeren onder de rechten van een gebruiker. Beschrijving: CVE-2014-0209 Door een Integer overflow in de font metadata file parsing kan... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden in Oracle MySQL verholpenLocation: Oracle - Redwood City, United States
Date published: 23-07-2014

Samenvatting: Er bevindt zich een groot aantal kwetsbaarheden in MySQL waarvoor Oracle updates heeft uitgebracht. Gevolgen: Misbruik van de kwetsbaarheden kan leiden tot het gedeeltelijk onbeschikbaar maken van MySQL. Tevens is het mogelijk om gedeeltelijk gevoelige gegevens in te zien en/of te wijz... Read more

Source: www.ncsc.nl

Top found tags: patch(2),United States(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ubuntu verhelpt kwetsbaarheid in acpiLocation: Ubuntu - London, United Kingdom
Date published: 23-07-2014

Samenvatting: Er is een kwetsbaarheid ontdekt in acpi dat alleen Ubuntu 12.04 LTS treft. Gevolgen: Een aanvaller kan de kwetsbaarheden misbruiken om een lokale gebruiker root rechten te laten bemachtigen. Beschrijving: - CVE-2014-1419, USN-2297-1 Er zit een kwetsbaarheid in policy-funcs script van a... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish