Under construction

New design coming soon!

CIC News engine statistics

CIC News for 27-07-2014 contains 28 articles: cybercrime(12),cyber security(5),data breach(7),other(4)

CIC News update contains 27 English and 1 Dutch articles for today.
There are 0 published advisories, 0 are English and 0 are Dutch.
In today's English news articles:
- 11 related to cybercrime
- 5 related to cyber security
- 7 related to data breach and identity theft
- 4 for the category other news

In today's Dutch news articles:
- 1 related to cybercrime
- 0 related to cyber security
- 0 for the category other news

Have fun reading.

English cybercrime related news

DDoS attacks: what they are and how you can keep them at bayLocation: New York, United States
Date published: 26-07-2014

Cyber criminals are becoming increasingly sophisticated in their attacks on organisations, with intricate script-writing and manipulative social engineering creating new modes of offence every day.But one tried and tested attack vector you would no doubt have read about before is the Distributed Den... Read more

Source: www.techradar.com

Top found tags: DoS(2),social engineering(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Businesses the New Target for Nigerias 419 Cyber-ScammersLocation: Lagos, Nigeria
Date published: 26-07-2014

Nigeria has long been a hotbed for cyber scammers notorious for preying on individuals to steal funds using social engineering techniques, but according to a new report, now businesses are becoming their targets and data theft their objective. Global Digital Forensics founder talks about the impo... Read more

Source: www.prweb.com

Top found tags: trojan(2),Nigeria(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critical infrastructure at risk from SCADA vulnerabilitiesLocation: New York, United States
Date published: 27-07-2014

Is critical infrastructure any more secure than it was a year ago, or five years ago? Well, according to three different reports from experts, it doesnt seem like it. Instead, it seems like critical infrastructure is a ripe target that is pretty sweet for attackers.SCADA (Supervisory Control and ... Read more

Source: amiyadutta.wordpress.com

Top found tags: critical infrastructure(4),financial sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android \"FBI Lock\" malware - how to avoid paying the ransomLocation: Ransom, United States
Date published: 25-07-2014

SophosLabs just alerted us to yet another example of Android ransomware.Ransomware is the stuff that locks up your computer or phone with a pop-up that covers all your other apps, and sometimes even scrambles your data files.What we're talking about here is extortion or demanding money with menaces.... Read more

Source: nakedsecurity.sophos.com

Top found tags: financial sector(2),malware(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Up to 50,000 WordPress Users Hit by MailPoet Malware AttackLocation: WordPress - San Francisco, United States
Date published: 24-07-2014

Security experts are warning that tens of thousands of WordPress sites have been compromised thanks to a known vulnerability in the MailPoet plug-in, leading to mass defacements, spam and outages. Daniel Cid, CTO and founder of Sucuri, revealed the news in a blog post, after spotting a spike in Word... Read more

Source: www.dfinews.com

Top found tags: vulnerability(1),website(1),WordPress(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
WHY CYBERCRIMINALS ARE SELLING THEIR WARES ONLINELocation: Center for Strategic and International Studies - Washington, United States
Date published: 25-07-2014

Hacking, drugs and murder now at the click of a button.There's something rather pleasing about the corrupt sounding jargon of \"cybercrime-as-a-service\". The notion that criminals are outsourcing with the same obfuscating sales pitches and the Office style antics the rest of world endures seems too... Read more

Source: www.cbronline.com

Top found tags: telecom sector(4),financial sector(6),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dark Nets and Why They Are a Challenge for PoliceLocation: BBC HQ - London, United Kingdom
Date published: 26-07-2014

Based on the BBC News article \"Dark net used by tens of thousands of paedophiles\" (2014), one might wonder what \"Dark Net\" is, and why Police are having such a hard time catching criminals.To understand \"Dark Net\" you first need to understand a little bit about how the Internet works. As an ex... Read more

Source: www.cybercrimetech.com

Top found tags: credit card(2),financial sector(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fake Googlebots used to run application-layer DDoSLocation: Google HQ - Mountain View, United States
Date published: 25-07-2014

Security experts at Incapsula are observing a surge in the used of fake Googlebots to launch and carry out application-layer DDoS.Googlebots crawl websites are the software used to index and rank the content of websites for the popular search engine. Its not a mystery that the visits of Googlebot... Read more

Source: securityaffairs.co

Top found tags: website(1),DoS(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber-crime: Think twice before sharing that postLocation: Hughes, United States
Date published: 26-07-2014

Do the laws of Kenya protect us from cyber-defamation, cyber-bullying and cyber-crimes? The other day a good friend sent me an email. Another sent me a WhatsApp message. The content was the same. It was a link to an article in one of the social media sites. The story, an article posted on Daily P... Read more

Source: www.standardmedia.co.ke

Top found tags: social media(2),cybercrime(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

IoT gets a boost from Cisco in Barcelona (and more smart grid developments)Location: Cisco HQ - San Jose, United States
Date published: 25-07-2014

This weeks collection of smart grid wins makes up for its brevity with variety, from IoT and transmission to metering, a new partnership on cybersecurity and grants for community microgrids in California. PROJECTS AND DEVELOPMENTSCisco plans to open a new center dedicated to Internet of Things re... Read more

Source: www.smartgridnews.com

Top found tags: government(2),smart grid(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Threat Level Thursday: iOS Security, Tor Anonymity, HHS, the Navy, and Exploiting an ExploitLocation: Apple HQ - Cupertino, United States
Date published: 24-07-2014

In this week's Threat Level Thursday we have iOS, Tor, and the U.S. Department of Health and Services all susceptible to ailments of some kind while a former Navy official recommends leniency in cybersecurity's infancy, and of course, something just plain ol' mean.iOS and the NSA in Bed Together?Las... Read more

Source: www.latinpost.com

Top found tags: United States(4),cyber security(10),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
An update on malware found at TweakTown - it's been fixedLocation: Microsoft HQ - Redmond, United States
Date published: 26-07-2014

TweakTown responds to malware attack on its pages and provides an update for its readers. Earlier today we discovered that TweakTown had been attacked with malicious code from rmr-group.com being inserted to most of our pages. We first discovered the attack due to a warning from Google Chrome. It's ... Read more

Source: www.tweaktown.com

Top found tags: telecom sector(2),update(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime costs the North West 107m a yearLocation: Lancaster, United States
Date published: 25-07-2014

Cybercrime is costing North Wests businesses almost 107m every year, thats according to a new report from Lancaster University.It found that smaller businesses are most vulnerable to hackers and industrial espionage, partly due to their size, but also as theyre unlikely to have robust sec... Read more

Source: www.prolificnorth.co.uk

Top found tags: cyber security(2),security measures(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime: The Wolf is at Your Digital DoorLocation: New York, United States
Date published: 25-07-2014

With media converging, with the physical world hard linking to the digital world, with sites like OneName Global gathering threads from every corner of our lives, it sometimes appears that there is nothing whatsoever that hasnt been digitized. Our media, calendars, social engagements, relationshi... Read more

Source: onenameglobal.com

Top found tags: health sector(2),medical sector(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

eBay Demonstrates Resilience following Data BreachLocation: eBay - San Jose, United States
Date published: 24-07-2014

The uproar surrounding last years data breach at Target Corporation did more than simply tarnish Targets reputation. The breach hit the companys bottom line and hit it hard. In its 4th quarter (the period in which the breach was exposed), Targets profits declined by hundreds of milli... Read more

Source: www.sys-con.com

Top found tags: cybercrime(2),cyber security(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Florida Makes Amendments to Tighten Data SecurityLocation: Florida, United States
Date published: 25-07-2014

Newport, UK -- (SBWIRE) -- 07/25/2014 -- The new changes to the Florida data breach law has now been effective since July 1, 2014. The Florida Information Protection Act of 2014 essentially repeals Floridas existing data breach notification law and replaces it with one of the nations most exte... Read more

Source: www.digitaljournal.com

Top found tags: cyber security(2),data breach(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Consumer Needs for Identity Theft Security Grows with Popularity of Latest Smart Technology Products - Biometrically Secure Digital Wallet to Replace Credit Card DependencyLocation: NASDAQ - New York, United States
Date published: 25-07-2014

CORAL SPRINGS, Florida, July 25, 2014 /PRNewswire/ --Biometrics industry expands and becomes more influential as more consumers are turning to digital technology for online & commerce payments while seeking security comfort: NXT-ID, Inc. (OTCBB: NXTD), Google Inc. (NASDAQ: GOOG), LifeLock Inc. (NYSE... Read more

Source: online.wsj.com

Top found tags: identity theft(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
5 Mistakes That Can Lead To A Data BreachLocation: Verizon HQ - New York, United States
Date published: 25-07-2014

Symantecs Internet Security Threat Report 2014 outlines the biggest information breaches of the previous year. It includes real names, birth dates, government ID numbers, home addresses, medical records, phone numbers, financial information, email addresses, user names and passwords, and insuranc... Read more

Source: databreachinsurancequote.com

Top found tags: health sector(2),medical sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nearly 39,000 affected by potential data breach at Greenwood hospitalLocation: Green, United States
Date published: 25-07-2014

Officials at a hospital in Greenwood are sending notifications to nearly 39,000 patients whose sensitive information may have been contained on a laptop that was stolen earlier this year and remains missing.Self Regional Healthcare revealed the potential data breach in a press release and statement ... Read more

Source: www.southcarolinaradionetwork.com

Top found tags: data breach(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EUROPEAN CENTRAL BANK BLACKMAILED AFTER DATA BREACHLocation: New York, United States
Date published: 25-07-2014

Hackers penetrated a database containing the personal information of individuals who had registered for events at the European Central Bank, Bloomberg reports.ECB said in a statement Thursday, No internal systems or market-sensitive data were compromised.The institution received an email July ... Read more

Source: www.nextgov.com

Top found tags: report(1),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware Can Hide in the Most Obvious PlacesLocation: New York Times - New York, United States
Date published: 26-07-2014

You never know when malware will bite. Even browsing an online restaurant menu can download malicious code, put there by hackers.Much has been said that Targets hackers accessed the giants records via its heating and cooling system. Theyve even infiltrated thermostats and printers among the... Read more

Source: www.huffingtonpost.com

Top found tags: report(1),Windows(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

3 arrested in Selma on credit card fraud chargesLocation: Perry, United States
Date published: 26-07-2014

SELMA, AL (WSFA) -The Selma Police Department arrested three people on Thursday on charges of fraudulent use of a credit card. Selma arrested 22-year-old Uribe Rashun Sneed, 26-year-old Christopher Tobais Davis, and 40-year-old Tyedreke Antone Perry. Police say that the arrest stem from an investiga... Read more

Source: www.wsfa.com

Top found tags: credit card(2),financial sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The government wants to wiretap online communications or in some cases hack themLocation: Columbia University - New York, United States
Date published: 25-07-2014

Law enforcement and intelligence agencies want to be able to wiretap social media, instant message and chat services. But building in ways to wiretap these kinds of communication can lead to less secure systems, say technical experts, including former National Security Agency officials.Some security... Read more

Source: www.washingtonpost.com

Top found tags: social media(2),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A Sysmas Carol - singing the praises of sysadmins everywhere!Location: New York, United States
Date published: 25-07-014

Ever felt as though there should be a song for system administrators?One that is perfect for belting out in the server room over the noise of all that equipment?Like a Sysmas Carol, perhaps, celebrating The 0x0C days of Sysmas?Well, here it is!... Read more

Source: nakedsecurity.sophos.com

Top found tags: EN(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber bullying makes the child dangerously timidLocation: New Delhi,India
Date published: 27-07-2014

With youngsters getting more and more active on social networking sites, cyber bullying is on an all-time high. According to a new study published by The Journal of the American Medical Association (JAMA), one in every four Indian teenager has been a victim of cyber bullying. The data is more stagge... Read more

Source: www.thenewage.co.za

Top found tags: India(1),cyber bullying(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

An IT emperor with no clothes, India lays bare to cyber attacksLocation: New Delhi, India
Date published: 27-07-2014

Ironically for a country that is seen as an IT superpower, India is stunningly vulnerable to cyber attacks. Our approach to the exponential growth of cyber crime and warfare is marked by ignorance and nonchalance. This has to change quickly to avoid catastrophe.Real data on cyber attacks is hard to ... Read more

Source: timesofindia.indiatimes.com

Top found tags: cyber espionage(4),government(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

No articles for today, maybe tomorrow!

Dutch advisories

No advisories for today, maybe tomorrow!


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish