Under construction

New design coming soon!

CIC News engine statistics

CIC News for 25-07-2014 contains 157 articles: cybercrime(39),cyber security(51),data breach(36),other(31)

CIC News update contains 136 English and 21 Dutch articles for today.
There are 12 published advisories, 2 are English and 10 are Dutch.
In today's English news articles:
- 30 related to cybercrime
- 48 related to cyber security
- 36 related to data breach and identity theft
- 22 for the category other news

In today's Dutch news articles:
- 9 related to cybercrime
- 3 related to cyber security
- 9 for the category other news

Have fun reading.

English cybercrime related news

DDoS attacks present opportunity for ISPsLocation: Arbor Networks - Burlington, United States
Date published: 23-07-2014

Distributed denial of service (DDoS) attacks may strike fear into the hearts of anyone involved in the online space, but protecting against them presents a new business opportunity for Internet service providers (ISPs).So says Anton Jacobsz, MD of Arbor Networks distributor Networks Unlimited, who a... Read more

Source: www.itweb.co.za

Top found tags: DoS(2),ISP(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDoS Protection: Recommended PracticesLocation: New York, United States
Date published: 23-07-2014

A DDoS attack can be a stressful engagement where parts of the network will be unresponsive and equipment may be failing all around. That is not the time to be planning a defensepreparing your network applications during peacetime will go a long way to helping you mitigate the attack in the... Read more

Source: www.computerworld.com.au

Top found tags: DoS (1),EN(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australians ripped off in cyber sting as police reveal criminals hack into webcams to spyLocation: Sydney, Australia
Date published: 23-07-2014

HUNDREDS of Australians have had up to $10 million siphoned from their bank accounts in an elaborate cyber sting.Mules as young as 17 were able to steal six-figures sums in a single hit under the alleged direction of a Melbourne mastermind.The lucrative scam is just a small part of what Austra... Read more

Source: www.heraldsun.com.au

Top found tags: cybercrime(3),telecom sector(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Concealed cyber crime gang uncoveredLocation: Cisco HQ - San Jose, United States
Date published: 23-07-2014

Targets lucrative industries, hosted on Dropbox.A hacking group that has been operating virtually undetected by anti virus systems since at least 2007 has been exposed by a team of researchers at Cisco.The String of Paerls group - which distributes malware almost entirely undetectable by anti-virus ... Read more

Source: www.crime-research.org

Top found tags: financial sector(2),phishing(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australian Federal Police foil Russian crime gangs $570m cyber theft bid as nation loses $4.6 billion-a-year to computer crimeLocation: Sydney, Australia
Date published: 23-07-2014

POLICE have foiled an elaborate bid by a Russian organised crime gang to steal $570 million from Australian companies it hacked into.Australian Federal Police are expecting arrests to be made overseas in what is an ongoing investigation by it and Russian authorities into the massive attempted theft.... Read more

Source: www.heraldsun.com.au

Top found tags: financial sector(2),malware(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gujarat youth held in online job fraudLocation: Mumbai, India
Date published: 24-07-2014

VISAKHAPATNAM: The Cyber Crime Investigation Cell (CCIC) police nabbed 27-year-old Manzil Jikesh Kumar Shah from Gujarat for duping several job aspirants, including a Vizag youth, through an online job racket. The cops have now launched a manhunt for Shah's accomplice Lincoin Joseph Luicien from Mum... Read more

Source: timesofindia.indiatimes.com

Top found tags: government(3),police(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Un-hack my wheels! Device promises to block cyber car attacksLocation: Las Vegas, Nevada, United States
Date published: 24-07-2014

Two security experts who show how easy it is to cyber hack the Toyota Prius and Ford Escape say theyve got a solution.At the Def Con hacking conference in Las Vegas last year, Chris Valasek and Charlie Miller described ways that cyberhackers can launch dangerous attacks, including manipulating th... Read more

Source: www.thestar.com.my

Top found tags: financial sector(2),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EU Launches Cybercrime Taskforce for Cross Border InvestigationsLocation: National Crime Agency - London, United Kingdom
Date published: 24-07-2014

The European Union is set to roll out an international cybercrime task force for a six-month investigations trial. It will coordinate investigations across Europe, as well as with several other countries, including the United States, Canada, and Australia.According to Govinfosecurity, Andy Archibald... Read more

Source: vpncreative.net

Top found tags: United Kingdom(2),United States(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report on Cyber Crime Outlines Security Cycle to Help OrganisationsLocation: Center for Strategic and International Studies - Washington, United States
Date published: 24-07-2014

LONDON, UNITED KINGDOM--(Marketwired - Jul 24, 2014) - A new report published by Computacenter is outlining the security cycle in order to help tackle and prevent cyber crime amongst organisations.To ensure improvement efforts are focused on the right areas, organisations must first understand where... Read more

Source: www.digitaljournal.com

Top found tags: threat(1),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Demystifying the Shylock TrojanLocation: London, United Kingdom
Date published: 24-07-2014

Last week we heard that yet another cybercrime campaign has been disrupted by an alliance of law enforcement and industry bodies. This comes just a few weeks after police were able to take down the infrastructure behind the GameOver Zeus botnet. This latest operation involved measures against the In... Read more

Source: www.huffingtonpost.co.uk

Top found tags: malware(3),financial sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber-criminals able to access Irish computers for 10 cents a machineLocation: New York, United States
Date published: 23-07-2014

Gangs of cyber-criminals selling access to do it yourself malware platforms are able to sell access to compromised computers for as little as US$0.10 per computer.These gangs can infect millions of computers around the globe with their own custom malware. Then in a sinister move they will then... Read more

Source: www.siliconrepublic.com

Top found tags: hacked(1),report(1),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Three Russian Citizens Accused of Cybertheft in US - ReportsLocation: Moscow, Russia
Date published: 24-07-2014

MOSCOW, July 24 (RIA Novosti) - Three Russian citizens have been arrested by the US authorities in connection with an international cybercrime ring that stole more than $1.6 million in tickets, USA Today reported Wednesday.Vadim Polyakov, Nikolay Matveychuk and Sergei Kirin are among seven people ar... Read more

Source: en.ria.ru

Top found tags: credit card(2),cybercrime(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fake Googlebots Serving as Tools for DDoSLocation: Google HQ - Mountain View, United States
Date published: 24-07-2014

Real Googlebots help Google discover new and updated webpages so they can be added to the search engine's index; fake Googlebots have no such good intentions. As it turns out, the evil twins of Googlebots are often used these days as the starting point for distributed denial-of-service (DDoS) attack... Read more

Source: securityweek.com

Top found tags: United States(2),website(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Target Browsers, Especially IE: Bromium LabsLocation: Oracle - Redwood City, United States
Date published: 24-07-2014

While Java was a huge target for hackers in 2013, the number of Java-related attacks has dropped dramatically this year. Somewhat surprisingly, no zero day Java exploits were reported in the first half of 2014, according to Bromium Labs' report on endpoint exploitation trends for the first half of t... Read more

Source: www.esecurityplanet.com

Top found tags: vulnerability(2),Google(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anonymous wages 'cyber war' against Israel in support of GazaLocation: Tel Aviv, Israel
Date published: 23-07-2014

In continuation of the hacktivist collective Anonymous' cyber-campaign against Israel, the latest group of hackers to successfully impact Israeli government function, @IzzahHackers on twitter, claim to have published the login credentials of 4,000 Israeli citizens yesterday, after having taken down ... Read more

Source: www.scmagazineuk.com

Top found tags: hacktivism(2),cybercrime(3),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Text message spammer settles charges filed by FTCLocation: Federal Trade Commission - Washington, United States
Date published: 24-07-2014

FTC lodges new set of complaints against alleged cell phone spammers Verma and his company were charged with spamming millions of text messages that dishonestly promised free merchandise. Rishab Verma and his company, Verma Holdings, LLC, agreed to settle charges filed by the Federal Trade Commissio... Read more

Source: www.scmagazine.com

Top found tags: government(2),telecom sector(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Role of Smartphones in the Internet of EverythingLocation: New York, United States
Date published: 24-07-2014

Ever since the mobile boom, smartphones have become an integral part of our lives, enough that theyve become virtually indispensable in todays fast-paced world. Not only do they serve to connect us to our friends and loved ones wherever they may be, but they also allow us to do our daily tasks... Read more

Source: trendmicro.com

Top found tags: smartphone(1),cybercrime(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sony tries to make PlayStation Network hack row go away with $15m in cash and gamesLocation: New York, United States
Date published: 24-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Sony has offered a $15m settlement to gamers after its PlayStation Network (PSN) was comprehensively pwned, but it refuses to admit that it was at fault. In April 2011 the Japanese giant was forced to shut down PSN after hackers got into its... Read more

Source: go.theregister.com

Top found tags: Linux(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Putin: Crack Tor for me and I'll make you a MILLIONAIRELocation: Moscow, Russia
Date published: 25-07-2014

Russia's Interior Ministry has posted a tender seeking parties willing to study the possibility of obtaining technical information about users (user equipment) TOR anonymous network". The tender appears to be open only to organisations rated to do secret work for the Russian government, but concl... Read more

Source: go.theregister.com

Top found tags: TOR(1),Anonymous(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Roll out the welcome mat to hackers and crackersLocation: Wellington, New Zealand
Date published: 25-07-2014

A clear and easy to read policy is key to developing a good internal bug bounty program, according to BugCrowd which has published guidelines to help businesses encourage the security community to report vulnerabilities. Bug bounties are an increasingly popular means to provide a legally safe avenue... Read more

Source: go.theregister.com

Top found tags: social media(2),vulnerability(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Four fake Google haxbots hit YOUR WEBSITE every dayLocation: Google HQ - Mountain View, United States
Date published: 25-07-2014

One in every 24 Googlebots is a imitation spam-flinging denial of service villain that masquerades as Mountain View to sneak past web perimeter defences, according to security chaps at Incapsula. Villains spawn the "evil twins" to hack and crack legitimate websites and form what amounted to the thir... Read more

Source: go.theregister.com

Top found tags: website(1),DoS(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
An Atlas Of Internet InsecurityLocation: New York, United States
Date published: 25-07-2014

Once relegated to the phreaks and nerds, cyberthreats now occupy a central place in the cultural conversation as the internet has become a more hostile place. Look at the growth in just one common scourge: Distributed denial-of-service attacks. Solutions? We asked 10 of the smarter people we know fo... Read more

Source: forbesindia.com

Top found tags: hackers(1),threat(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UH OH, U.S. MOBILE BANKING APPS TARGETED BY HACKERSLocation: Bank of America HQ - Charlotte, United States
Date published: 24-07-2014

Kaspersky Lab recently reported that it detected a significant malware threat that could affect the 102 million Americans who use mobile banking, according to BizTech.The malware, called Svpeng, is first appeared in Russia in September and has since made its way to the U.S. The malware specifi... Read more

Source: www.pymnts.com

Top found tags: Kaspersky Lab(4),telecom sector(4),financial sector(18)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UAE Twitter activist not guilty but still in custodyLocation: Abu Dhabi, United Arab Emirates
Date published: 24-07-2014

An Emirati who was arrested after criticizing the lack of free speech in his country in an interview with CNN has been acquitted of the charges against him, but is still being held by the enigmatic security forces of the United Arab Emirates (UAE).Obaid Yousef al-Zaabi was arrested Dec. 12, 2013, af... Read more

Source: www.al-monitor.com

Top found tags: social media(4),government(5),United Arab Emirates(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacked Irish computer details cost a few centsLocation: New York, United States
Date published: 24-07-2014

Cyber criminals can now gain access to hacked Irish computers for record low prices of just a few cents.According to Irish IT security firm, Smarttech.ie, access to dangerous malware (malicious software) has become significantly easier, with gangs of cyber criminals now selling DIY malware pla... Read more

Source: www.irishexaminer.com

Top found tags: report(1),malware(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firefox adds anti-malware file reputation serviceLocation: Mozilla - Mountain View, United States
Date published: 25-07-2014

reputation service to determine if they are known malware. Firefox has checked web site URLs against Google's Safe Browsing service since version 2.0. Originally, that service checked only to see if sites were known phishing sites; later on, a list of sites known to serve malware was added to the se... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Human Rights Court Approves Extradition of Gozi Malware Suspect to U.S.Location: Riga, Rga, Latvia
Date published: 25-07-2014

The European Court of Human Rights (ECHR) ruled on Thursday that a Latvian man suspected of being involved in the creation of the Gozi banking Trojan would not be exposed to a real risk of ill-treatment if he were to be extradited to the United States. Deniss Calovskis, 29, was charged by a US court... Read more

Source: securityweek.com

Top found tags: government(4),United States(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A new species in end-point security: Panda extols resilience over preventionLocation: Gartner - Stamford, United States
Date published: 25-07-2014

Panda believes the way to combat next-generation malware is continuous, real-time monitoring and the use of big data to identify attack patterns After decades of investment into intrusion prevention controls, IT departments have long suspected they were fighting a losing battle against malware and v... Read more

Source: www.information-age.com

Top found tags: threat(1),antivirus(2),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Andromeda bot spreads Tor-using CTB-Locker ransomwareLocation: Kaspersky HQ - Moscow, Russia
Date published: 25-07-2014

Survey respondents praise, but neglect, continuous monitoring Kaspersky Lab identified CTB-Locker as Trojan-Ransom.Win32.Onion, but Microsoft identified it as Critroni.A. Last week a security researcher posted that the Angler Exploit Kit was delivering new ransomware advertised as CTB-Locker now... Read more

Source: www.scmagazine.com

Top found tags: exploit kit(4),Kaspersky Lab(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Real-Time Hacking Threats to Smart Meters and the Smart GridLocation: New York, United States
Date published: 23-07-2014

Hacking and cyber-security issues arent just a thought in the minds of conspiracy theorists. Nearly 2/3 of the 256 cyber attacks in the U.S. last year were on the energy sector. Twice in the last month, Bloomberg News and many other media outlets have reported on hacking in relation to smart mete... Read more

Source: www.smartmetereducationnetwork.com

Top found tags: energy(3),telecom sector(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Smart meters are a \"time bomb\" for utilities, warns insurance expertLocation: Will, United States
Date published: 23-07-2014

Quick Take: As an industry, we've done a lot of thinking about the smart meter cost/benefit equation. But I wonder if we've adequately considered what would happen if smart meters made insurance rates go up? Two recent articles in the Insurance Journal suggest that the insurance industry is waking u... Read more

Source: www.smartgridnews.com

Top found tags: security measures(2),smart meter(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Point-of-sale security efforts lackluster as threats increaseLocation: Black Hat - Las Vegas, United States
Date published: 23-07-2014

Point-of-sale machines are constantly under attack by cybercriminals, trying to hijack customer payment info that can be sold and traded online.Small businesses and local mom-and-pop stores are familiar with cybersecurity risks they face, but major retailers and corporations also suffer from difficu... Read more

Source: www.tweaktown.com

Top found tags: Black Hat(4),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
65 Percent DVDs, PCs With Pre-Installed Programs Have MalwareLocation: New Delhi, India
Date published: 24-07-2014

The threats include stealing of confidential data leading to huge monetary loss to the end-user besides making the installed system vulnerable to attacks.According to a survey commissioned by Microsoft India, and conducted by Truth Labs, Indias first independent Forensic Science Lab, the usage of... Read more

Source: www.crn.in

Top found tags: trojan(2),government(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ex-Cyber Spys Message to Board Members: Youre Not OKLocation: National Security Agency - Fort Meade, United States
Date published: 23-07-2014

In his new role as CEO of Darktrace, a cyber-security firm based in Cambridge, U.K., Andrew France OBE is meeting a lot of anxious board members at some of the biggest firms in the U.K. and abroad. The cost of cyber crime to the global economy is around $445 billion annually, with the U.K. alone los... Read more

Source: blogs.wsj.com

Top found tags: cyber security(6),telecom sector(8),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Veep calls for more efforts in fighting cyber-crimeLocation: Accra, Greater Accra, Ghana
Date published: 23-07-2014

Ghanas Vice-President, Kwesi Amissah-Arthur has urged ISPs to put in place effective measures to combat internet fraud, amid rapidly increasingly cybercrime.Ghana is currently ranked second in Africa behind Nigeria in terms of cybercrime.Most cybercriminals in Ghana are young (21-35 years of age)... Read more

Source: www.citifmonline.com

Top found tags: government(3),Nigeria(3),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Six indicted in alleged hack of StubHub customers' credit cardsLocation: StubHub HQ - San Francisco, United States
Date published: 23-07-2014

An international cyber-crime ring was able to take over StubHub user accounts to steal identifying information and use victims credit cards to purchase tickets to concerts and sporting events, authorities announced Wednesday.Six people were indicted in connection with the alleged scheme to defrau... Read more

Source: www.latimes.com

Top found tags: United Kingdom(2),United States(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Uganda's Business Community Decries Rise in Cyber CrimeLocation: Kampala, Central, Uganda
Date published: 23-07-2014

The business community in Uganda is on high alert. This is because of increased incidences of internet access in Uganda which has in turn led to an upsurge in cyber-related crime.Some of the reasons for this are that first of all, cybercrime is cheaper than what is considered to be the more traditio... Read more

Source: allafrica.com

Top found tags: telecom sector(2),cybercrime(4),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
This emerging malware sends secret messages and is practically impossible to detectLocation: Budapest, Hungary
Date published: 23-07-2014

As if computer malware that steals your data werent enough, now theres a new kind to worry about: Malware that does it via covert messages that are practically impossible to detect. And its becoming more prevalent, according to a new paper by researchers at the Warsaw University of Technolo... Read more

Source: qz.com

Top found tags: government(2),information security(2),Department of Justice(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bank Security Full of Holes? Malware Strikes 34 InstitutionsLocation: Trend Micro - Cupertino, United States
Date published: 23-07-2014

More than 30 banks have been targeted by a cyberattack designed to steal funds from customers accounts.According to a report by security company Trend Micro, the attack, dubbed Emmental, after the Swiss cheese characterized by its abundance of holes, uses multiple methods in order to bypass... Read more

Source: www.cruxialcio.com

Top found tags: telecom sector(2),Trend Micro(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pirated, counterfeit software abets cybercrime: ReportLocation: Microsoft HQ - Redmond, United States
Date published: 23-07-2014

The use of pirated and counterfeit software products, often exploited to spread malware at a massive scale, can cause substantial productivity and economic losses to manufacturers and businesses, besides posing serious security risks and threats to the critical infrastructure of country, CERT-In Dir... Read more

Source: www.thehindu.com

Top found tags: cyber security(2),cybercrime(3),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
34 European Banks Hit by Android-Skirting MalwareLocation: Google HQ - Mountain View, United States
Date published: 22-07-2014

Criminals have been finding gaping holes in Android-based two-factor authentication systems that banks around the world are using. The result: 34 banks in four countries have fallen victim to a sophisticated spear-phishing and malware campaign known as Operation Emmental.The malware campaign is appr... Read more

Source: www.cio-today.com

Top found tags: Trend Micro(2),cybercrime(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
White House caught secretly tracking Web visitors with sneaky spywareLocation: White House - Washington D.C., United States
Date published: 23-07-2014

They proudly say that they comply with federal privacy law, eschewing cookies, but sneakily use Addthis's \"canvas fingerprinting,\" a product whose other major user is Youporn (but they stopped after they were outed, and the White House didn't).The original research comes from a team at KU Leuven a... Read more

Source: boingboing.net

Top found tags: research(1),spyware(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacking virus Bladabindi on the prowl in Indian cyberspaceLocation: Microsoft HQ - Redmond, United States
Date published: 24-07-2014

NEW DELHI, JULY 24: Cyber security sleuths have alerted Indian Internet users against hacking attempts of a clandestine multi-identity virusBladabindiwhich steals sensitive personal information of a user for nefarious purposes.The virus, the Computer Emergency Response TeamIndia (CERT-In) s... Read more

Source: www.thehindubusinessline.com

Top found tags: telecom sector(2),cybercrime(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Air ticket malware flying around the webLocation: Kaspersky HQ - Moscow, Russia
Date published: 24-07-2014

Kaspersky Lab has registered an increase in fraudulent messages sent out on behalf of booking services. These fake notifications imitate hotel or air ticket booking confirmations and usually contain Trojan spyware masked as bills for reservations.As a rule, fraudulent messages imitating corresponden... Read more

Source: www.gadget.co.za

Top found tags: cyber security(4),Kaspersky Lab(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime a huge BCM threatLocation: Cape Town, West-Kaap, South Africa
Date published: 24-07-2014

Although SA ranks third-highest on the list of cybercrime victims (after Russia and China), local companies are not adequately committed to improving their cyber security.\"Cyber security is currently one of the biggest threats to business continuity, and yet there is limited general awareness among... Read more

Source: www.itweb.co.za

Top found tags: cyber security(2),information security(2),South Africa(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Proliferation of cybercrime increases risks to Public Safety and National SecurityLocation: Microsoft HQ - Redmond, United States
Date published: 24-07-2014

Truth Labs, India's first independent Forensic Science Lab, today reiterated linkages between the proliferation of cybercrime through the use of pirated and counterfeit software to the breaches in the information, communication and network security that eventually lead to multidimensional risks and ... Read more

Source: www.dqindia.com

Top found tags: government(3),cyber security(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Integration: The only true provision against cybercrimeLocation: Londen, United Kingdom
Date published: 24-07-2014

Cyber security woes continue to burden the minds of organisations of all sizes. This has been further exemplified by the announcement from C5 Capital to launch the first cyber security-focused venture capital fund in Europe, as concerns about leaks and digital technology securities grow.The London-b... Read more

Source: www.itproportal.com

Top found tags: government(2),information security(2),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CNN news app has major security flaw, user data at riskLocation: Apple HQ - Cupertino, United States
Date published: 24-07-2014

CNN news app has major security flaw, user data at risk. CNN's iOS application has a major vulnerability that threatens to leak user information. According to a report by information security company Zscaler, the app is the second most popular news app and is ranked number 165 among all free applica... Read more

Source: itproportal.com

Top found tags: cyber security(4),mobile device(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Integration: The only true provision against cybercrimeLocation: Apple HQ - Cupertino, United States
Date published: 24-07-2014

Data Integration: The only true provision against cybercrime. Cyber security woes continue to burden the minds of organisations of all sizes. This has been further exemplified by the announcement from C5 Capital to launch the first cyber security-focused venture capital fund in Europe, as concerns a... Read more

Source: itproportal.com

Top found tags: mobile device(4),telecom sector(4),cyber security(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple heavily denies filling iPhones and iPads with NSA backdoorsLocation: Apple HQ - Cupertino, United States
Date published: 24-07-2014

PaulMCCooper. Apple heavily denies filling iPhones and iPads with NSA backdoors Apple has vociferously denied putting surveillance backdoors into its iOS operating system, which is used on the iPhone and iPad range of devices. The Cupertino-based company released a strongly-worded statement denying ... Read more

Source: itproportal.com

Top found tags: mobile device(4),government(6),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What can cat photos teach us about the dangers of online privacy?Location: Florida State University - Tallahassee, United States
Date published: 24-07-2014

What can cat photos teach us about the dangers of online privacy?. In a world of spying, surveillance leaks and advanced analytics tracking our every move, a new website is tracking the locations of a million cats. Owen Mundy, a professor at Florida State University has launched a unique site that t... Read more

Source: itproportal.com

Top found tags: cybercrime(2),social media(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Content service addresses privacy fears with self-destructing dataLocation: Dropbox - San Francisco, United States
Date published: 24-07-2014

Content service addresses privacy fears with self-destructing data. When you send a file to someone else theres always a risk that it could be copied or forwarded, even if it's intended to remain private - as many a snapper of naked selfies has found to their cost. There have been attempts to sol... Read more

Source: itproportal.com

Top found tags: Google(2),Google Play(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor rushing to patch vulnerability that threatens its USPLocation: National Security Agency - Fort Meade, United States
Date published: 23-07-2014

Tor rushing to patch vulnerability that threatens its USP. Tor developers are frantically working to issue a fix for a weakness in the anonymous dark web browser that discloses the identity of hundreds of thousands of users and you dont have to be the National Security Agency [NSA] to do so. ... Read more

Source: itproportal.com

Top found tags: Black Hat(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Scan: Breaches are Not a Game, Theyre GameoverLocation: New York, United States
Date published: 25-07-2014

Hey guys! Im Bradi, and this is The Scan bringing you the very latest in security news! Sharing is Caring The Senate Intelligence Committee just approved the Cybersecurity Information Sharing Act, which would make it easier for the government and private sector to share security threat inform... Read more

Source: blogs.mcafee.com

Top found tags: cyber security(4),financial sector(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Avast nabs startup Inmite to bolster its mobile security offeringsLocation: New York, United States
Date published: 25-07-2014

Avast nabs startup Inmite to bolster its mobile security offerings. Avast has announced that it has snapped up a mobile app developer, Inmite, to help its efforts on the mobile security front. Avast is a well-known player in the security field with a highly regarded free security suite, and of cours... Read more

Source: itproportal.com

Top found tags: mobile device(2),cybercrime(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers of the world unite as privacy startups answer Snowdens callLocation: Google HQ - Mountain View, United States
Date published: 25-07-2014

'The building blocks of the free and open internet' Addressing the Hackers on Planet Earth (HOPE) conference over the weekend, Edward Snowden entreated hackers, engineers and activists to fight surveillance by building a new generation of privacy tools for everyone to use. In fact, privacy startups ... Read more

Source: www.information-age.com

Top found tags: Google(3),government(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple faces privacy suit following Chinese TV reportLocation: Apple HQ - Cupertino, United States
Date published: 25-07-2014

An iPhone user has filed a lawsuit for invasion of privacy against Apple, about a week after a Chinese state broadcaster raised security concerns about the devices location-tracking functions. The U.S. class action lawsuit, filed by a woman named Chen Ma, alleges that Apple has intentionally i... Read more

Source: www.pcworld.com CRITICAL INFRASTRUCTURE PROTECTION IN THE CYBER-AGE | Cyber security is becoming increasingly complicated, as connected electronic devices become more pervasive in everyday objects, and malicious actors become more willing to be destructive, panellists told at Security and Defence Agenda debate. That means traditional thinking about damage prevention needs to change. Approaching cyber security from the idea of walls, moats and gates is no longer adequate, said Michael Daniel, Special Assistant to US President Barack Obama. You have to look holistically at the problem from beginning to end. You have to work from the assumption that your networks are compromised. The Security & Defence Agenda welcomed Michael Daniel, Special Assistant to the U.S. President and Senior White House Cybersecurity Coordinator on June 30th, 2014 for a discussion on the recently launched U.S. Cybersecurity Framework. | http://www.securitydefenceagenda.org/Contentnavigation/Library/Libraryoverview/tabid/1299/articleType/ArticleView/articleId/3696/Critical-infrastructure-protection-in-the-cyberage.aspx | 24-07-2014 | www.securitydefenceagenda.org

Top found tags: United States(2),government(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers Working To Fix Tor Security ExploitLocation: Black Hat - Las Vegas, United States
Date published: 24-07-2014

The Tor de-masking exploit is said to be able to reveal the identities of hundreds of thousands of Tor users, and was discovered by Alexander Volynkin and Michael McCord of Carnegie Mellon University. Attorneys for the university and the Software Engineering Institute asked that a talk on the exploi... Read more

Source: www.sci-tech-today.com

Top found tags: cyber security(2),government(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
International cybercrime ring behind $1.6M StubHub theft taken downLocation: StubHub HQ - San Francisco, United States
Date published: 24-07-2014

An international cybercrime ring was behind the breach of the StubHub online ticketing service that resulted in the theft of $1.6 million worth of tickets, according to Manhattan District Attorney Cyrus Vance.At a Wednesday press conference, Vance announced the indictment of six individuals associat... Read more

Source: www.fierceitsecurity.com

Top found tags: United States(2),cybercrime(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Uganda moves to fight cybercrimeLocation: Kampala, Central, Uganda
Date published: 24-07-2014

The Ugandan authorities are moving to curb cybercrime, the growth of which is put down to unemployment and the influx of a large pool of youth highly skilled in information technology.The New Vision reports entities running critical IT systems will be required to create technical and administrative ... Read more

Source: www.humanipo.com

Top found tags: information security(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Apple backdoor that wasn'tLocation: Apple HQ - Cupertino, United States
Date published: 25-07-2014

Before the iPhone came out, and long before anyone heard the name "Ed Snowden," the most common use of the word "backdoor" was relegated to an industry that applied the term as a colorful anatomical descriptive, helping potential customers select the preferred access point for their adult entertainm... Read more

Source: www.zdnet.com

Top found tags: government(4),mobile device(4),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The App I Used to Break Into My Neighbors HomeLocation: New York, United States
Date published: 25-07-2014

key-me-inline [gallery-il] WIRED When I broke into my neighbors home earlier this week, I didnt use any cat burglar skills. I dont know how to pick locks. Im not even sure how to use a crowbar. It turns out all anyone needs to break into a friends apartment is an off switch for their ... Read more

Source: wired.com

Top found tags: The Netherlands(2),government(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Securing the energy industry: is success a dead CERT?Location: Carter, United States
Date published: 25-07-2014

Securing the energy industry: is success a dead CERT? Securing the energy industry: is success a dead CERT? Firewall technologies were once seen as the saviour when trying to safeguard against cyber-attacks, none more so than in the energy market. This was back in a time when energy companies weren'... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(2),financial sector(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CTB-Locker Ransomware Uses Unusual Cryptographic Scheme: KasperskyLocation: Kaspersky HQ - Moscow, Russia
Date published: 25-07-2014

After analyzing a recently discovered piece of ransomware called CTB-Locker ( Critroni), security researchers from Kaspersky Lab have determined that the threat has a number of features that separate it from many other forms of malware. According to the security firm, which detects this malware fami... Read more

Source: securityweek.com

Top found tags: trojan(2),Kaspersky Lab(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Improved Malware Protection Introduced in Firefox BrowserLocation: Mozilla - Mountain View, United States
Date published: 25-07-2014

Starting with Firefox 31, the malware detection mechanism integrated into the Web browser has been expanded to include downloaded files, Mozilla announced on Wednesday. Firefox has been providing protection against dangerous websites by using the Google Safe Browsing API. However, the latest version... Read more

Source: securityweek.com

Top found tags: Windows(1),cyber security(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
4% of Googlebots are fake and can launch attacksLocation: Google HQ - Mountain View, United States
Date published: 25-07-2014

Admins' fear of damaging their SEO gives malicious search engine bots a 'VIP pass' into sites. 4% of Googlebots are fake and can launch attacks 4% of Googlebots are fake and can launch attacks Millions of evil twin' search engine bots are infiltrating websites daily to carry out DDoS attacks, hac... Read more

Source: www.scmagazineuk.com

Top found tags: Thailand(2),cybercrime(3),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
More questions than answers as BBC outage fuels DDoS talkLocation: BBC HQ - London, United Kingdom
Date published: 25-07-2014

The British Broadcasting Corporation was hit by a prolonged outage on its website and iPlayer video-on-demand service (VOD) last weekend, raising questions about the cause and whether it was subjected to a distributed-denial-of-service (DDoS) attack. More questions than answers as BBC outage fuels D... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(2),DoS(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Want Everybody to Know You're Flirting? This App is For You!Location: Google HQ - Mountain View, United States
Date published: 25-07-2014

Once again, SherlockDroid/Alligator spotted a potentially unwanted application for us. The application is a Chinese flirting social networking application whose security level is distressingly low. We detect it as Riskware/Blued! Android. [blued_main] Figure 1. It is probably okay members of the soc... Read more

Source: blog.fortinet.com

Top found tags: cyber security(2),update(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian government offers huge reward for help unmasking anonymous Tor usersLocation: Moscow, Russia
Date published: 25-07-2014

The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around $111,000, for a method to identify users on the Tor network. The Tor software anonymizes Internet traffic by encrypting it and passing it through several random relays in order to prevent potential network eavesdropper... Read more

Source: www.pcworld.com

Top found tags: United States(6),government(9),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russia publicly joins war on Tor privacy with $111,000 bountyLocation: Moscow, Russia
Date published: 25-07-2014

The Russian Ministry of Internal Affairs (MVD) has offered a 3.9 million ruble (approximately $111,000) contract for technology that can identify the users of Tor, the encrypted anonymizing network used by Internet users seeking to hide their activities from monitoring by law enforcement, government... Read more

Source: arstechnica.com

Top found tags: Black Hat(4),child pornography(4),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
People Have War Stories TooLocation: Jay, United States
Date published: 25-07-2014

We read about hacks and vulnerabilities all of the time. A retailer is successfully attacked via malware and credit cards are stolen. A credit card processing company is hacked via cross site scripting and credit cards are stolen. An online social media company is attacked through an SQL injection a... Read more

Source: securityweek.com

Top found tags: medical sector(4),social media(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Open Socket Poses Risks To Android Security ModelLocation: Google HQ - Mountain View, United States
Date published: 25-07-2014

The security of theAndroid platform is based on its sandbox and permission protection mechanism, which isolates each app and restricts how processes can communicate with each other. However, because it is designedto be open to includeother open source projects like Linux and OpenSSL, it can in... Read more

Source: trendmicro.com

Top found tags: Trend Micro(2),vulnerability(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Survey: 53 percent change privileged logins quarterlyLocation: Microsoft HQ - Redmond, United States
Date published: 25-07-2014

A survey of IT security professionals revealed that most individuals stick to a infrequent schedule for updating privileged credentials. On Wednesday, Lieberman Software published its 2014 Information Security Survey (PDF), which found that 53 percent of respondents changed service and process... Read more

Source: www.scmagazine.com

Top found tags: information security(2),cybercrime(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ECB database hacked, attackers ask for financial compensationLocation: Berlin, Germany
Date published: 25-07-2014

Cyber thieves hacked into a database at European Central Bank (ECB) and stole email addresses and contact information for users who signed up for bank events via its public website, ECB said Thursday. The bank discovered the breach after attackers sent an anonymous email requesting money in exchange... Read more

Source: www.scmagazine.com

Top found tags: cyber security(2),financial sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Is IT ready for the security challenges of digital enterprises?Location: Sullivan, United States
Date published: 24-07-2014

'The silver lining seems to be in powerful analytics and turning the Big Identity Data into part of the solution' Nowadays, employees expect immediate access to data and applications, as well as more collaborative business tools that can enable flexible working. These trends will become much more wi... Read more

Source: www.information-age.com Security Think Tank: Resilience is about understanding the real threat | Cyber resilience is not a new concept. There has been a language change but not a change in concept. Cyber security is part of cyber resilience, which in turn is a part of business resilience.Building cyber resilience has always been about understanding actual threat, not perceived threat. From that comes a realistic understanding of risk and from there you can build your strategy to mitigate risks.Getting ahead of the threat is the key. Too many organisations focus on dealing with the event that is here and now, without investing time, attention and resources into looking to the horizon and planning ahead.There are reasons why this happens. The main reason is that many organisations (around 63% according to Ponemon Institute research) place the responsibility for cyber security with IT, which deals with what needs to happen right now. This also means information sitting outside IT security may not even be scoped. The other problem is that just 5% of organisations have chief risk officers, which explains why just 38% of them align their information (or cyber) security with their organisational risk appetite. Most align it with their IT policy.Hopefully you are beginning to see the issue here. It is not about saying that IT cannot handle security, it is about IT handling IT security but policy being driven by risk to the business not risk to IT.Every business goes through the process of horizon scanning as part of regular business planning, cyber needs to be built into this process; looking forward to what could become a risk to the organisation, deciding if this is within risk tolerance and appetite and then taking appropriate and proportionate steps based upon this clear understanding. | http://www.computerweekly.com/opinion/Security-Think-Tank-Resilience-is-about-understanding-the-real-threat | 23-07-2014 | www.computerweekly.com

Top found tags: cyber security(2),data breach(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber thieves got into 1,000 StubHub accounts; company says it issued refundsLocation: StubHub HQ - San Francisco, United States
Date published: 23-07-2014

NEW YORK -- Cyber thieves got into more than 1,000 StubHub customers' accounts and fraudulently bought tickets for events through the online ticket reseller, a law enforcement official and the company said.Arrests were expected in a case that sprawled across international borders, said the official,... Read more

Source: www.cp24.com

Top found tags: cyber security(2),data breach(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
No data breach at Portland-area Goodwill storesLocation: Portland, Oregon, United States
Date published: 22-07-2014

NEW YORK (AP) Nonprofit organization Goodwill Industries Inc. is working with federal officials to investigate a possible security breach.The Rockville, Maryland-based organization said late Monday that it was contacted Friday by a payment card industry fraud investigative unit and federal autho... Read more

Source: koin.com

Top found tags: data breach(2),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Intel's Latest SSD 2500 Pro Solid State Drive Will Self-Encrypt Your Naughty BitsLocation: Intel HQ - Santa Clara, United States
Date published: 23-07-2014

Snowden, the NSA, Target's data breach, eBay's data breach I could go on with buzzwords and catch phrases but you get the idea. Security is big business these days, whether it be securing networks or devices. And end point data security could be considered the end game on some levels. Once... Read more

Source: www.forbes.com

Top found tags: data breach(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Goodwill investigating possible data breachLocation: Kent, United States
Date published: 23-07-2014

LOUISVILLE, Ky. (WDRB) -- There has been a possible data breach at some of Goodwill Industries' 2,900 stores, but Kentuckians do not need to worry. Goodwill Industries, Inc. was contacted late Friday by authorities and were told that customers' card numbers had been stolen.Upon learning of the data ... Read more

Source: www.wdrb.com

Top found tags: EN(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stolen Passwords At Core Of StubHub Breach, Company SaysLocation: StubHub HQ - San Francisco, United States
Date published: 23-07-2014

Six men face money laundering, identity theft and grand larceny charges for their role in an international cybercrime ring that defrauded online-ticket reseller StubHub of $1 million, by purchasing thousands of fraudulent e-tickets to popular concerts, sporting events and Broadway shows.Police charg... Read more

Source: www.crn.com

Top found tags: identity theft(2),security measures(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cal Expo police arrest identity theft suspect in south SacramentoLocation: San Francisco, United States
Date published: 24-07-2014

The Cal Expo Police Department made an arrest Tuesday in south Sacramento on a man who allegedly made unauthorized charges on credit cards.A victim of identity theft discovered at the California State Fair that unauthorized charges had been made on a credit card. Those charges were not made at the f... Read more

Source: www.bizjournals.com

Top found tags: credit card(2),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Goodwill Industries says U.S. authorities probing possible data breachLocation: New York, United States
Date published: 22-07-2014

(Reuters) - U.S. charity Goodwill Industries International says federal authorities told it that some of its U.S. store locations may have been the victims of possible theft of payment card numbers.\"At this point, no breach has been confirmed but an investigation is underway,\" the non-profit organ... Read more

Source: in.reuters.com

Top found tags: report(1),data breach(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sony agrees to $15M settlement in data breach class action; $2.75M for attorneysLocation: San Diego, United States
Date published: 23-07-2014

SAN DIEGO (Legal Newsline) Sony has agreed to a $15 million preliminary settlement in a class action lawsuit regarding its 2011 data breach.PlayStation Network claimants who did not participate in the Welcome Back package offered to PSN accountholders are eligible to receive two of the fol... Read more

Source: washingtonexaminer.com

Top found tags: legislation(1),data breach(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Woman wanted for identity theft, multiple chargesLocation: Roanoke, United States
Date published: 23-07-2014

A 40-year-old woman is wanted by the Halifax County Sheriffs Office on multiple charges, including identity theft, according to Detective Sgt. Obert Wiltsie.Wiltsie said the suspect, Jennifer Bowers, a Roanoke Rapids local with ties to Gaston, Garysburg and Weldon, has two counts of worthless che... Read more

Source: www.rrdailyherald.com

Top found tags: EN(1),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Duma to consider law changes targeting online identity theftLocation: New York, United States
Date published: 24-07-2014

A group of Lower House MPs have suggested a law that would force social networks to delete fake accounts registered using a real persons name if they receive a complaint.The bill would make the state watchdog Roskomnadzor, which is currently enforcing government restrictions on distributing infor... Read more

Source: rt.com

Top found tags: identity theft(2),legislation(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Multiple charges filed after women caught at mall with forged checksLocation: Towns, United States
Date published: 24-07-2014

Two California women were booked in the Jackson County Jail on a slew of forgery, identity theft and first-degree theft charges for alleged use of forged travelers checks to make purchases at businesses around the Rogue Valley.Deborah Burrell Townsend, 50, and Kimberly Michelle Campbell, 56, both of... Read more

Source: www.mailtribune.com

Top found tags: government(1),police(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Online travel services firm faces 150,000 penalty after data breachLocation: London, United Kingdom
Date published: 24-07-2014

The Information Commissioners Office said that a serious breach of the Data Protection Act by Think W3 Limited allowed hackers to gain access to the website of subsidiary Essential Travel Ltd.Insecure coding on the site allowed them to extract more than a million credit and debit reco... Read more

Source: business-technology.co.uk

Top found tags: hackers(1),website(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Settlement approved from 2011 PSN data breach caseLocation: New York, United States
Date published: 23-07-2014

Back in 2011, the PlayStation Network suffered from a huge data breach that left the service in tatters for a number of weeks. The US District Court for the Southern District of California has preliminarily approved a settlement relating to the case.Heres what we know:- The settlement includes an... Read more

Source: gamingeverything.com

Top found tags: data breach(2),identity theft(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
For less than the cost of a weeks groceries, you too can be a cybercriminalLocation: Trustwave - Chicago, United States
Date published: 23-07-2014

Its fairly common when discussing the cost of things to compare it to other items people commonly buy. Commercials for charities often state that donating costs less than a cup of coffee per day, and many tech articles cite cost in terms of a visit to Starbucks (apparently coffee is a useful them... Read more

Source: www.csoonline.com

Top found tags: trojan(2),cybercrime(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Hackers Hid a Money-Mining Botnet in Amazons CloudLocation: Google HQ - Mountain View, United States
Date published: 24-07-2014

Hackers have long used malware to enslave armies of unwitting PCs, but security researchers Rob Ragan and Oscar Salazar had a different thought: Why steal computing resources from innocent victims when theres so much free processing power out there for the taking?At the Black Hat conference in La... Read more

Source: www.wired.com

Top found tags: Black Hat(4),cybercrime(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Potential Breach At Goodwill Highlights That Not Even Charities Are Safe From CybercrimeLocation: Sally Beauty - Denton, United States
Date published: 23-07-2014

Bargain shopping might have just become more costly with the news that Goodwill Industries International is investigating a potential credit card breach. Federal authorities and a payment card industry fraud investigative unit contacted Goodwill late in the afternoon last Friday about a potential cr... Read more

Source: www.forbes.com

Top found tags: data breach(2),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminal strikes can be small, but mightyLocation: Rains, United States
Date published: 23-07-2014

Cybercrime is a growing threat for businesses as attackers are getting more creative and skilled in their methods of stealing information.Cyberattacks on large companies such as Target, Neiman Marcus and P.F. Chang's made headlines across the country and affected millions of consumers. Verizon's 201... Read more

Source: archive.pnj.com

Top found tags: data breach(2),cyber security(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rhode Island hospital to pay $150K for past data breachLocation: Rhode Island, United States
Date published: 24-07-2014

A Rhode Island hospital must pay $150,000 after a data breach compromised more than 12,000 Massachusetts residents' personal information. Patients' names, dates of birth, Social Security numbers, exam dates, physicians' names and ultrasound images were compromised in November 2012, according to a Ma... Read more

Source: www.scmagazine.com

Top found tags: encryption(1),report(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sony to shell out $15M in PSN breach settlementLocation: Zurich, Wnseradiel, Friesland, The Netherlands
Date published: 24-07-2014

Experts say the settlement serves as a small win for plaintiffs, and a bigger one for plaintiffs. The 2011 hack exposed the personal data of roughly 77 million users. Sony has agreed to a $15 million preliminary settlement in hopes of quashing even heftier costs associated with its massive PlayStati... Read more

Source: www.scmagazine.com

Top found tags: MBR(1),identity theft(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IT manager fired following massive Maricopa college district breachLocation: Maricopa County, United States
Date published: 24-07-2014

Officials with Maricopa County Community College District (MCCCD), which announced a massive data breach in December 2013, voted to fire IT manager Miguel Corzo on Tuesday, according to an azfamily.com report. The former IT manager said he was being made into a scapegoat, stating he went above an... Read more

Source: www.scmagazine.com

Top found tags: data breach(2),education(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
When it comes to security, honesty is the best policyLocation: eBay - San Jose, United States
Date published: 23-07-2014

When it comes to security, honesty is the best policy. It has never been harder for businesses to build and preserve a relationship of trust with their customers. The rise of increasingly sophisticated, and targeted, cyber-attacks means there are more threats to watch out for than ever before. But l... Read more

Source: itproportal.com

Top found tags: Ponemon Institute(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
USM Studios Investigates How to Prevent Identity TheftLocation: New York, United States
Date published: 24-07-2014

There are simple steps everyone should take to prevent having to deal with personal identity theft.PR NewswireCORAL SPRINGS, Fla., July 24, 2014CORAL SPRINGS, Fla., July 24, 2014 /PRNewswire-iReach/ -- USM Studios is preparing a segment on identity theft and how to prevent becoming a victim of it. T... Read more

Source: www.digitaljournal.com

Top found tags: EN(1),hackers(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hamilton County Woman Charged With TennCare FraudLocation: Hamilton County, New York, United States
Date published: 24-07-2014

A Hamilton County woman is charged with TennCare fraud and identity theft for obtaining medical treatment and using a TennCare member's benefits to pay for them.Deborah Faye Ellis, also known as Deborah Hanes, Deborah F. Lee, and Deborah Faye Lee, 58, of Chattanooga has been arrested and charged.\E... Read more

Source: www.newschannel9.com

Top found tags: health sector(2),identity theft(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
9 Investigates Florida convicts committing identity theft from behind barsLocation: Florida, United States
Date published: 24-07-2014

ORANGE COUNTY, Fla. 9 Investigates discovered convicts serving time in Florida prisons are committing identity theft and financial crimes from behind bars.Channel 9 anchor Vanessa Welch learned inmates are ripping off consumer credit card numbers, using them to get cash and redirecting the money... Read more

Source: www.wftv.com

Top found tags: financial sector(2),identity theft(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Retail Cyber CrimeLocation: London, United Kingdom
Date published: 24-07-2014

Over the past few years, several retail organizations have been hit with high-profile data breaches that have left millions of customers' credit card details and personal information exposed. Retailers will continue to be prime targets for motivated cyber criminals targeting sensitive and lucrative ... Read more

Source: www.bankinfosecurity.co.uk

Top found tags: cybercrime(2),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Managing corporate information leaksLocation: New York, United States
Date published: 25-07-2014

Data leakage can happen in any organisation and lead to damaging consequences. Stephanie Lhomme and Ramin Tabatabai of Control Risks provide practical solutions for dealing with information breaches.A major data breach is every organisation's worst nightmare. Customers have to be assured that their ... Read more

Source: www.globallegalpost.com

Top found tags: USB (1),data breach(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK Travel Company Fined After Card Data HackLocation: Cook, United States
Date published: 25-07-2014

UK Travel Company Fined After Hackers Stole Details of 1.1 Million Payment Cards The United Kingdom's Information Commissioner's Office (ICO) announced on Thursday that a UK-based online travel services firm has been fined for failing to protect customers' personal information as required under the ... Read more

Source: securityweek.com

Top found tags: United States(2),telecom sector(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Six Charged with $1 Million StubHub BreachLocation: StubHub HQ - San Francisco, United States
Date published: 25-07-2014

Manhattan District Attorney Cyber R. Vance, Jr., this week announced the indictment of six men worldwide in connection with the theft of personal and financial information from user accounts at eBay subsidiary StubHub. In March 2013, StubHub discovered that more than 1,000 customer accounts had been... Read more

Source: www.esecurityplanet.com

Top found tags: United States(2),financial sector(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The 5 most read articles this week: July 18-24Location: Apple HQ - Cupertino, United States
Date published: 25-07-2014

Here are the five most popular SC articles, as seen by you the reader, in the week for July 18 to 24. The 5 most read articles this week: July 18-24 The 5 most read articles this week: July 18-24 EU's new cybercrime taskforce set to launch On Monday, SC revealed how the European Cybercrime Centre is... Read more

Source: www.scmagazineuk.com

Top found tags: government(5),cybercrime(6),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brit Lauri Love faces more US hacking chargesLocation: Love, United States
Date published: 25-07-2014

Lauri Love, a 29-year-old British man from Stradishall in Suffolk, has been charged by a US court with hacking into multiple US government computers and stealing more than 100,000 employee and financial records. UK law could propose life sentences for cyber crimes UK law could propose life sentences... Read more

Source: www.scmagazineuk.com

Top found tags: government(4),telecom sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICYMI: Questions on cyber warfare, start-up money and helping out charitiesLocation: Moscow, Russia
Date published: 25-07-2014

This week's In Case You Missed column considers the possibility of cyber warfare, the money reaching cyber security start-ups and how charity can start at home for InfoSec practitioners. ICYMI: Questions on cyber warfare, start-up money and helping out charities ICYMI: Questions on cyber warfare, st... Read more

Source: www.scmagazineuk.com

Top found tags: ISP(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Laptop stolen from Self Regional Healthcare contained patient dataLocation: South Carolina, United States
Date published: 25-07-2014

South Carolina-based Self Regional Healthcare (SRH) is notifying at least 500 patients that their personal information including Social Security numbers and financial data was on a laptop stolen from an SRH facility. How many victims? At least 500. What type of personal information? Names, S... Read more

Source: www.scmagazine.com

Top found tags: health sector(2),identity theft(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.K. hacker charged in third state for Adobe ColdFusion exploitationLocation: Department of Energy - Washington, United States
Date published: 25-07-2014

English hacker Lauri Love was indicted for a third time in the U.S. yesterday, this time in Virginia, for stealing the personal and financial information of more than 100,000 federal government employees. Love allegedly coordinated with other hackers to gain unauthorized access to government agency ... Read more

Source: www.scmagazine.com

Top found tags: identity theft(2),United Kingdom(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Security breach: Amazon.in dishing out malwareLocation: New Delhi, India
Date published: 24-07-2014

Amazon India, the Indian arm of the world's biggest e-commerce player has certainly been making all the right moves and a few months ago reportedly hit the $200 million mark in sales and could hit the $1 billion number by March 2016.Amazon India sells 15 million products across 20 product categories... Read more

Source: firstbiz.firstpost.com

Top found tags: financial sector(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CERT-In warns of new malwareLocation: Microsoft HQ - Redmond, United States
Date published: 23-07-2014

New Delhi: Governments cyber security arm CERT-In has warned about spreading of a new malware Bladabindi which steals user info.Some of the Bladabindi variants could capture keyboard, control computer camera and later send collected sensitive information to remote attacker, warned CER... Read more

Source: www.deccanchronicle.com

Top found tags: USB (1),Windows(1),backdoor(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mass exploit of WordPress plugin backdoors sites running Joomla, Magento, tooLocation: WordPress - San Francisco, United States
Date published: 23-07-2014

As many as 50,000 websites have been remotely commandeered by attackers exploiting a recently patched vulnerability in a popular plugin for the WordPress content management system, security researchers said Wednesday.As Ars reported in early July, the vulnerability in MailPoet, a WordPress plugin wi... Read more

Source: arstechnica.com

Top found tags: website(1),WordPress(1),backdoor(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ArcSight Co-Founder Joins Threat Intelligence StartupLocation: Martin, United States
Date published: 24-07-2014

Hugh Njemanze, Founder and CTO of ArcSight Joins ThreatStream as CEO ThreatStream, a security startup that offers a SaaS-based cyber security intelligence platform, announced this week that Hugh Njemanze, former co-founder, CTO and executive vice president of research and development at ArcSight, ha... Read more

Source: securityweek.com

Top found tags: Intel(1),research(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Tries to Patch Up Spy Row With BerlinLocation: Berlin, Germany
Date published: 24-07-2014

BERLIN - The White House chief of staff and his German counterpart met Tuesday amid a serious rift over allegations of US spying. Germany ordered the Berlin CIA station chief to leave the country on July 10 in an unprecedented show of anger after uncovering two cases of suspected US spying, hot on t... Read more

Source: securityweek.com

Top found tags: Germany(4),government(7),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Command tests gov't collaboration in wake of attacksLocation: New York, United States
Date published: 24-07-2014

The U.S. Cyber Command (USCYBERCOM) recently oversaw a two-week exercise in attack readiness called Cyber Guard 14-1. The exercise was designed to test operational and interagency coordination among participants, and their ability to thwart, respond to and recover from critical infrastru... Read more

Source: www.scmagazine.com

Top found tags: government(2),United States(2),U.S. Cyber Command(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government promises significant funding to police controversial new data lawLocation: BBC HQ - London, United Kingdom
Date published: 24-07-2014

Government promises significant funding to police controversial new data law. The UK government has earmarked a raft of new funding for the Information Commissioners Office to monitor its controversial new data law that was passed earlier this month. Related: Emergency UK government snoopin... Read more

Source: itproportal.com

Top found tags: legislation(2),United Kingdom(2),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is this the end of Microsoft Office in the UK government?Location: Microsoft HQ - Redmond, United States
Date published: 23-07-2014

Is this the end of Microsoft Office in the UK government?. The UK government has formally announced that all government departments are to use the open document format [ODF] for documents immediately in a move that is part of the governments total savings target of 1.2 billion. Related: UK gove... Read more

Source: itproportal.com

Top found tags: threat(1),United Kingdom(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tomorrow Daily 024: Art by chainsaw-wielding robot, Sharknado light shows, and moreLocation: Twitter - San Francisco, United States
Date published: 25-07-2014

It's our last show of the week, and we're going out with a bang. We've got robots who can adjust their gait after being incapacitated, a crazy light syncing experience for your Sharknado 2 viewing party (if you've got some Philips Hue bulbs laying around), and an artist using a gigantic robot arm wi... Read more

Source: cnet.com.ortal.com

Top found tags: Google(1),Twitter(1),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google devs: Tearing Chrome away from OpenSSL not that easyLocation: Google HQ - Mountain View, United States
Date published: 25-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Google is trying to migrate its Chrome browser away from the buggy OpenSSL cryptography library toward BoringSSL, its homegrown fork, but swapping out the crypto code is proving more difficult than it sounds. Google engineer David Benjamin p... Read more

Source: go.theregister.com

Top found tags: telecom sector(2),United States(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australias Covata eyes US financial sectorLocation: Sydney, Australia
Date published: 25-07-2014

its sights on the United States financial sector. The company, which is a subsidiary of Sydney's Cocoon Data, has been operating in the US for the past couple of years. In June, the company signed a deal with ASX-listed Prime Minerals in a bid to launch a reverse takeover and list publicly in Septem... Read more

Source: www.zdnet.com

Top found tags: Australia(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google granting half of 'right to be forgotten' requestsLocation: Google HQ - Mountain View, United States
Date published: 25-07-2014

far agreed to remove around half of the links it was requested to. Following a European Court of Justice ruling in April, EU citizens can ask for search engines to stop providing links to material that is out of date, irrelevant, or excessive, in the results for searches on their names. Google loses... Read more

Source: www.zdnet.com

Top found tags: Microsoft(1),report(1),Germany(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australias Covata eyes US financial sectorLocation: Sydney, Australia
Date published: 25-07-2014

its sights on the United States financial sector. The company, which is a subsidiary of Sydney's Cocoon Data, has been operating in the US for the past couple of years. In June, the company signed a deal with ASX-listed Prime Minerals in a bid to launch a reverse takeover and list publicly in Septem... Read more

Source: www.zdnet.com

Top found tags: Australia(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New security update for G-Cloud loomingLocation: New York, United States
Date published: 25-07-2014

New security update for G-Cloud looming. The Government Digital Service (GDS) has announced that a new G-Cloud Security Approach will be coming into effect shortly and apply to the Digital Marketplace as well. This update asks for supplier self-assertion and removes the need for providers using the ... Read more

Source: itproportal.com

Top found tags: update (1),government(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Goodwill stores in Will County safe from credit card fraudLocation: Will, United States
Date published: 24-07-2014

JOLIET Fears of possible credit card fraud at Goodwill stores have so far come up empty, with stores in Will County showing no signs of fraudulent activity.Federal authorities and a payment card industry fraud investigative unit contacted Goodwill Industries International Inc. on July 18 and inf... Read more

Source: www.morrisdailyherald.com

Top found tags: credit card(2),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TAILS Team Recommends Workarounds for Flaw in I2PLocation: New York, United States
Date published: 25-07-2014

The developers of the TAILS operating system say that users can mitigate the severity of the critical vulnerability researchers discovered in the I2P software thats bundled with TAILS with a couple of workarounds, but there is no patch for the bug yet. The vulnerability that affectsTAILS is in ... Read more

Source: threatpost.com

Top found tags: research(1),Anonymous(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EU, Google, Microsoft, Yahoo meet on 'right to be forgotten' but questions remainLocation: Google HQ - Mountain View, United States
Date published: 25-07-2014

EU, Google, Microsoft, Yahoo meet on 'right to be forgotten' but questions remain European data protection authorities still have questions after meeting with Google, Microsoft and Yahoo about the implementation of a recent ruling that gave European citizens the right to be forgotten by search engin... Read more

Source: www.pcworld.com

Top found tags: website(1),EU(2),ISP(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Siemens Patches Five Vulnerabilities in SIMATIC SystemLocation: Siemens HQ - Munich, Germany
Date published: 25-07-2014

Siemens releasedan update for two builds of its SIMATIC automation system this week, addressing a quintet of vulnerabilities, four of which are remotely exploitable. The German companys SIMATIC WinCC, a SCADA system and SIMATIC PCS7, a distributed control system (DCS) are directly affected by t... Read more

Source: threatpost.com

Top found tags: patch(2),update(2),critical infrastructure(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Exec Says Company Has Never Been Asked to Backdoor a ProductLocation: Microsoft HQ - Redmond, United States
Date published: 25-07-2014

One of Microsofts top security executives said the company has never been asked by the United States government to build a backdoor into any of its products, and if the company was asked, it would fight the order in the courts. Since the Edward Snowden revelations began last summer, there have be... Read more

Source: threatpost.com

Top found tags: telecom sector(2),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Outdated browsers put U.K. users at risk of malwareLocation: Berlin, Germany
Date published: 25-07-2014

Research from German security firm cyscon GmbH has revealed that 70 percent of internet users in the U.K. are using an outdated web browsers, leaving them more vulnerable to malware scams, according to a blog post on the Check and Secure website, a security campaign run by cyscon GmbH. At particular... Read more

Source: www.scmagazine.com

Top found tags: website(1),Internet Explorer(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CyberMaryland conference returns, hosts job fair for military vetsLocation: Maryland, United States
Date published: 25-07-2014

CyberMaryland, a conference in its fourth year that supports cyber security initiatives and training in the state, will take the national stage this fall. On October 29 and 30, the event will be held at the Baltimore Convention Center and work to connect entrepreneurs and military veterans with thos... Read more

Source: www.scmagazine.com

Top found tags: Intel(1),legislation(1),training(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

Morpho Itemiser 3 Hard-Coded CredentialLocation: Berlin, Germany
Date published: 24-07-2014

BERLIN - The White House chief of staff and his German counterpart met Tuesday amid a serious rift over allegations of US spying. Germany ordered the Berlin CIA station chief to leave the country on July 10 in an unprecedented show of anger after uncovering two cases of suspected US spying, hot on t... Read more

Source: ics-cert.us-cert.gov

Top found tags: Germany(4),government(7),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Siemens SIMATIC WinCC VulnerabilitiesLocation: Berlin, Germany
Date published: 24-07-2014

BERLIN - The White House chief of staff and his German counterpart met Tuesday amid a serious rift over allegations of US spying. Germany ordered the Berlin CIA station chief to leave the country on July 10 in an unprecedented show of anger after uncovering two cases of suspected US spying, hot on t... Read more

Source: ics-cert.us-cert.gov

Top found tags: Germany(4),government(7),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

PALO ALTO NETWORKS BRENGT MALWARE VAN 419-OPLICHTERS UIT NIGERIA IN KAARTLocation: Palo Alto, United States
Date published: 24-07-2014

Palo Alto Networks, speler op het gebied van enterprise security, onthult dat cybercriminelen in Nigeria de bekende malwarecampagnes verder hebben doorontwikkeld, om te kunnen infiltreren in bedrijven die voorheen niet hun primaire doelwitten waren.419 Evolution is een nieuw rapport dat wordt gepubl... Read more

Source: www.dutchitchannel.nl

Top found tags: spam(1),cyber security(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oprichter Malwarebytes woedend over anti-virustestLocation: Malwarebytes - San Jose, United States
Date published: 25-07-2014

De maker van een populaire anti-malwaretool is woedend over een recente anti-virustest waarbij zijn product samen met Security Essentials onderaan eindigde. Het gaat om de gratis editie van Malwarebytes Anti-Malware, dat veel consumenten als aanvulling op een virusscanner gebruiken. De gratis versie... Read more

Source: www.security.nl

Top found tags: Trend Micro(2),Kaspersky Lab(4),antivirus(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Klanten internationale banken getroffen door Android-malwareLocation: Google HQ - Mountain View, United States
Date published: 25-07-2014

Tweefactor authenticatie op Android blijkt zeer gevoelig voor malware. 34 banken in vier Europese landen zijn slachtoffer geworden van een spear-fishing actie. Cybercriminelen maken misbruik van de sessietokens die via SMS aan klanten van banken worden verzonden.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: cybercrime(2),financial sector(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Aanvallers breken in op site Europese Centrale BankLocation: Brussel, Belgium
Date published: 25-07-2014

Hackers hebben ingebroken op de website van de Europese Centrale Bank en wisten daarbij e-mailadressen en andere contactgegevens buit te maken. De ECB kwam de hack op het spoor na een anonieme e-mail waarin een financile vergoeding geist is.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),website(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gehackte Wordpress-plugin bedreigt ook andere sitesLocation: WordPress - San Francisco, United States
Date published: 24-07-2014

Samenvatting:De achterpoortjes in de vorige versie van WordPress-plugin MailPoet, uitgebuit op wel 50.000 websites, vormen ook een bedreiging voor websites die niet draaien op Wordpress.Door een ondertussen gepatchte kwetsbaarheid in een populaire Wordpress-plugin hebben hackers ondertussen al 50.00... Read more

Source: www.zdnet.be

Top found tags: vulnerability(1),website(1),WordPress(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firefox gaat Windows extra beschermen tegen malwareLocation: Mozilla - Mountain View, United States
Date published: 24-07-2014

MOUNTAIN VIEW - De makers van webbrowser Firefox gaan Windows extra beschermen tegen malware. Dat heeft ontwikkelaar Mozilla bekendgemaakt. Vanaf Firefox 32 wordt een nieuwe functie aan de downloadcontrole toegevoegd.Vanaf versie 31 maakt Firefox gebruik van de Google Safe Browsing API. Die geeft ni... Read more

Source: www.gldstemt.nl

Top found tags: phishing(1),website(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
STEEDS MEER RANSOMWARE OP MOBIELE APPARATENLocation: Google HQ - Mountain View, United States
Date published: 25-07-2014

Fortinet, speler op het gebied van high-performance netwerkbeveiliging, geeft een waarschuwing af en adviseert gebruikers van mobiele apparaten waakzaam te zijn voor mobiele ransomware, dat de afgelopen maanden flink in opkomst is.Ransom betekent losgeld en ransomware is een vorm van malware d... Read more

Source: www.dutchitchannel.nl

Top found tags: mobile device(4),cybercrime(5),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bijzondere ransomware gebruikt elliptische-kromme-encryptieLocation: RSA HQ - Bedford, United States
Date published: 25-07-2014

Ransomware is n van de snelst groeiende categorien van malware en heeft zich de afgelopen jaren steeds verder ontwikkeld, maar onderzoekers zeggen n van de meest geavanceerde exemplaren tot nu toe gevonden te hebben. Het gaat om CTB-locker, wat staat voor Curve-Tor-Bitcoin Locker. De malwa... Read more

Source: www.security.nl

Top found tags: RSA(2),cybercrime(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internetoplichters dreigen met valse KPN-factuurLocation: KPN HQ - Den Haag, The Netherlands
Date published: 25-07-2014

Internetgebruikers zijn gewaarschuwd voor dreigmails die rondgaan en stellen dat er beslag op de rekening van de ontvanger wordt gelegd tenzij er een openstaande rekening wordt betaald. De e-mails hebben onder andere als onderwerp "Betaal uw factuur binnen 3 dagen!" en "KPN - Factuurnummer". In het ... Read more

Source: www.security.nl

Top found tags: website(1),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Wetsvoorstel geeft verzekeraars inzage in medische dossiersLocation: Den Haag, The Netherlands
Date published: 25-07-2014

Minister Schippers van Volksgezondheid heeft onlangs een wetsvoorstel naar de Tweede Kamer gestuurd waarmee zorgverzekeraars inzage kunnen krijgen in medische dossiers. Dit zou zorgfraude moeten tegengaan, maar deskundigen stellen dat hiervoor een wetswijziging niet nodig is. Hoeveel zorgfraude er w... Read more

Source: www.security.nl

Top found tags: The Netherlands(2),politics(3),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple aangeklaagd na uitzending Chinese televisieLocation: Apple HQ - Cupertino, United States
Date published: 25-07-2014

Een iPhone-gebruiker in de Verenigde Staten heeft Apple aangeklaagd wegens het schenden van haar privacy en die van anderen. De vrouw diende de aanklacht in na het zien van een uitzending van de Chinese staatstelevisie, waarin werd gezegd dat Apple gebruikers via de Location Services kan volgen. De ... Read more

Source: www.security.nl

Top found tags: cyber security(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoek: domoticasystemen zijn zeer gevoelig voor privacyschendingLocation: Berlin, Germany
Date published: 25-07-2014

Draadloze huisautomatiseringsystemen zijn zelden voorzien van adequate beveiliging en op basis van te onderscheppen data kan eenvoudig een profiel van het gedrag en de gewoontes van bewoners gemaakt worden, stellen onderzoekers van een Duitse universiteit. De onderzoekers van de Duitse universiteit ... Read more

Source: tweakers.net

Top found tags: privacy(1),research(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Attorney general talks scams at Elgin roundtableLocation: St. Charles, United States
Date published: 24-07-2014

Attorney General Lisa Madigan and her staff discussed how to identify and avoid major consumer scams, including identity theft and home repair fraud, as well as schemes that target seniors.The occasion was a round-table discussion Wednesday at the Centre of Elgin.Representatives of the Elgin, West D... Read more

Source: www.dailyherald.com

Top found tags: police(1),scam(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Extra beveiliging voor zakelijke versie Google DriveLocation: Google HQ - Mountain View, United States
Date published: 25-07-2014

Google heeft extra beveiligingsmaatregelen aan de zakelijke versie van de online opslagdienst Google Drive toegevoegd, waardoor IT-mangers en beheerders meer controle over de documenten in de cloud hebben en inzicht krijgen in hoe hun werknemers werken. De nieuwe maatregel heet Drive Audit en maakt ... Read more

Source: www.security.nl

Top found tags: e-mail(1),Google(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brit aangeklaagd in wegens aanval op Amerikaanse serversLocation: Love, United States
Date published: 25-07-2014

In de Verenigde Staten is een 29-jarige Brit aangeklaagd wegens het aanvallen van verschillende servers van de Amerikaanse overheid, waarbij grote hoeveelheden gevoelige data werden gestolen. Volgens de aanklacht wist Lauri Love met zijn handlangers bij verschillende overheidsinstanties in te breken... Read more

Source: www.security.nl

Top found tags: update(2),United States(6),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chrome voor Android versimpelt inloggenLocation: Google HQ - Mountain View, United States
Date published: 25-07-2014

De Android-app van Chrome, Google's eigen browser, krijgt de mogelijkheid om met hun Google-account via n optie direct in te loggen bij alle Google-diensten. Andere wachtwoorden die binnen Chrome zijn opgeslagen zijn ook op deze manier beschikbaar, evenals bookmarks.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Chrome(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese overheid vindt dat Qualcomm een monopolie bezitLocation: Beijing, China
Date published: 25-07-2014

De overheid van China is na onderzoek naar machtsmisbruik door Qualcomm tot de conclusie gekomen dat de Amerikaanse chipmaker een monopolie bezit. Het onderzoek richtte zich op de bedragen die Qualcomm zou vragen voor bepaalde technologien. Qualcomm-socDaarbij gaat het vermoedelijk niet om zijn mo... Read more

Source: tweakers.net

Top found tags: government(3),United States(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Grote webwinkels weigeren conversiepixel Beslist.nlLocation: Amsterdam, The Netherlands
Date published: 25-07-2014

Grote webwinkels zoals Bol.com, Wehkamp.nl en Coolblue zeggen geen conversiepixel van Beslist.nl op hun websites te zullen plaatsen, aangezien de prijsvergelijker daarmee teveel gegevens van klanten in handen krijgt. Beslist.nl zou de conversiepixel echter verplicht willen gaan stellen. De prijsverg... Read more

Source: www.security.nl

Top found tags: NL(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rusland looft beloning uit voor identificatie Tor-gebruikersLocation: Moscow, Russia
Date published: 25-07-2014

Het Russische Ministerie van Binnenlandse Zaken heeft een beloning van zo'n 83.000 euro uitgeloofd voor een technische oplossing waarmee het mogelijk is om gebruikers van het Tor-netwerk te identificeren. Via Tor kunnen gebruikers hun IP-adres verbergen en gecensureerde websites bezoeken. Het Tor-ne... Read more

Source: www.security.nl

Top found tags: website(1),government(3),Ministry of the Interior and Kingdom Relations(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brit aangeklaagd wegens aanval op Amerikaanse serversLocation: Love, United States
Date published: 25-07-2014

In de Verenigde Staten is een 29-jarige Brit aangeklaagd wegens het aanvallen van verschillende servers van de Amerikaanse overheid, waarbij grote hoeveelheden gevoelige data werden gestolen. Volgens de aanklacht wist Lauri Love met zijn handlangers bij verschillende overheidsinstanties in te breken... Read more

Source: www.security.nl

Top found tags: update(2),United States(6),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware installeert vals SSL-certificaat voor bankfraudeLocation: Google HQ - Mountain View, United States
Date published: 25-07-2014

Onderzoekers hebben malware ontdekt die op besmette Windowscomputers een vals root SSL-certificaat installeert, zodat gebruikers geen waarschuwing krijgen als ze een nagemaakte versie van hun banksite bezoeken. De criminelen proberen op deze manier gegevens te stelen om bankfraude te plegen. De aanv... Read more

Source: www.security.nl

Top found tags: Germany(2),telecom sector(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Meerdere kwetsbaarheden in Apache verholpenLocation: Ubuntu - London, United Kingdom
Date published: 25-07-2014

Samenvatting: Er zijn meerdere kwetsbaarheden in Apache ontdekt die door een aanvaller misbruikt kunnen worden om een Denial-of-Service te veroorzaken. Gevolgen: Een aanvaller kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: - CVE-2014-0117 Een kwetsbaarheid in... Read more

Source: www.ncsc.nl

Top found tags: Red Hat(2),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in PHP verholpenLocation: Hewlett-Packard - Palo Alto, United States
Date published: 25-07-2014

Samenvatting: Er zijn updates uitgebracht om kwetsbaarheid in PHP 5.5 te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken om toegang te krijgen tot gevoelige informatie of om een Denial-of-Service te veroorzaken. Beschrijving: - CVE-2014-4670 Er is een kwetsbaarheid in het SPL ... Read more

Source: www.ncsc.nl

Top found tags: NL(1),PHP(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Red Hat verhelpt kwetsbaarheden in qemu-kvmLocation: Amsterdam, The Netherlands
Date published: 25-07-2014

Samenvatting: Red Hat heeft updates uitgebracht voor QEMU die de kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken van het QEMU proces of mogelijk willekeurige code uitvoeren met de rechten van het QEMU proces. Beschrijving: Door meerdere invoervalidatie, bu... Read more

Source: www.ncsc.nl

Top found tags: NL(1),vulnerability(1),Red Hat(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cross-Site-Scripting kwetsbaarheid in Barracuda Spam & Virus FirewallLocation: Cross, United States
Date published: 25-07-2014

Samenvatting: Barracuda Networks heeft bekend gemaakt dat er een Cross-Site-Scripting (XSS) kwetsbaarheid in de management web-interface van haar Spam & Virus firewalls is ondekt. Gevolgen: Een aanvaller kan de kwetsbaarheid misbruiken voor het uitvoeren van een Cross-Site-Scripting (XSS) aanval. Ee... Read more

Source: www.ncsc.nl

Top found tags: cyber security(2),vulnerability(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Windows XP SP3 (MQAC.sys) gevondenLocation: Microsoft HQ - Redmond, United States
Date published: 25-07-2014

Samenvatting: Er is een kwetsbaarheid gevonden in de MQAC.sys library in het besturingssysteem Windows XP SP3. Microsoft brengt GEEN updates meer uit voor deze versie van Windows. Exploitcode is beschikbaar in het Metasploit framework. Gevolgen: Een lokale aanvaller kan door het misbruiken van deze ... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden in Oracle Java SE verholpenLocation: Oracle - Redwood City, United States
Date published: 25-07-2014

Samenvatting: Er bevindt zich een groot aantal kwetsbaarheden in Java waarvoor Oracle updates heeft uitgebracht. Gevolgen: Misbruik van de kwetsbaarheden kan leiden tot het uitvoeren van willekeurige code met gebruikersrechten en het omzeilen van beveiligingsmaatregelen. Beschrijving: Oracle heeft v... Read more

Source: www.ncsc.nl

Top found tags: Debian(2),Red Hat(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Geheugenlek verholpen in XenLocation: Amsterdam, The Netherlands
Date published: 25-07-2014

Samenvatting: Er bevindt zich een kwetsbaarheid in Xen die gebruikers op gastsystemen in staat stelt om delen van het geheugen van de hypervisor in te zien. Xen heeft updates uitgebracht om deze kwetsbaarheid te verhelpen. Gevolgen: Misbruik van de kwetsbaarheid stelt kwaadwillenden in staat om in b... Read more

Source: www.ncsc.nl

Top found tags: patch(1),Fedora(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden gevonden in de LZO en LZ4 algoritmesLocation: Ubuntu - London, United Kingdom
Date published: 25-07-2014

Samenvatting: Er zijn een aantal kwetsbaarheid gevonden in de Oberhumer LZO en LZ4 algoritmes. Verschillende fabrikanten hebben updates uitgebracht die deze kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken van de applicatie die gebruikmaakt van de LZO en LZ... Read more

Source: www.ncsc.nl

Top found tags: Ubuntu(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid ontdekt in Apple QuickTimeLocation: Apple HQ - Cupertino, United States
Date published: 25-07-2014

Samenvatting: Er is een kwetsbaarheid ontdekt in Apple QuickTime. Op het moment van schrijven is er nog geen oplossing van Apple beschikbaar. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken of willekeurige code uitvoeren. Beschrijving: - CVE-2014-4979 De kwetsbaarheid is ontdekt in... Read more

Source: www.ncsc.nl

Top found tags: DoS(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fedora verhelpt kwetsbaarheid in de Linux kernelLocation: Amsterdam, The Netherlands
Date published: 25-07-2014

Samenvatting: De ontwikkelaars van Fedora hebben een kwetsbaarheid in de Linux kernel opgelost. Gevolgen: Een aanvaller kan de kwetsbaarheid misbruiken om mogelijk gevoelige gegevens te bemachtigen en verhoogde rechten te verkijgen. Beschrijving: - CVE-2014-4943 Een kwetsbaarheid in de implementatie... Read more

Source: www.ncsc.nl

Top found tags: NL(1),vulnerability(1),Fedora(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish