Under construction

New design coming soon!

CIC News engine statistics

CIC News for 28-07-2014 contains 64 articles: cybercrime(20),cyber security(21),data breach(6),other(17)

CIC News update contains 53 English and 11 Dutch articles for today.
There are 6 published advisories, 0 are English and 6 are Dutch.
In today's English news articles:
- 15 related to cybercrime
- 21 related to cyber security
- 6 related to data breach and identity theft
- 11 for the category other news

In today's Dutch news articles:
- 5 related to cybercrime
- 0 related to cyber security
- 6 for the category other news

Have fun reading.

English cybercrime related news

AusCERT chief Ingram steps downLocation: AusCERT - Brisbane, Australia
Date published: 28-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Graham Ingram, the head of Australia's first Computer Emergency Response Team (AusCERT), has stepped down after 12 years in the role. Ingram joined the University of Queensland's AusCERT in 1993 and was on Friday replaced by the university's... Read more

Source: go.theregister.com

Top found tags: education(2),telecom sector(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Think you can crack TOR? The Russian government wants to give you 4m rublesLocation: U.S. Naval Research Laboratory - Washington D.C., United States
Date published: 28-07-2014

PaulMCCooper. Think you can crack TOR? The Russian government wants to give you 4m rubles Russia's government has issued a 4 million rubles (about 60,000) bounty to anyone who cracks the Tor anonymity network's encryption protocols. Tor, which began as a secret project from the US Naval Research L... Read more

Source: itproportal.com

Top found tags: pornography(3),child pornography(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DARPA-derived secure microkernel goes open source tomorrowLocation: DARPA - Arlington, United States
Date published: 28-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines A nippy microkernel mathematically proven to be bug free*, and used to protect drones from hacking, will be released as open source tomorrow. The formal-methods-based secure embedded L4 (seL4) microkernel was developed by Australian boffins ... Read more

Source: go.theregister.com

Top found tags: DARPA(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kaspersky Analyzes Distribution Network for Koler Mobile RansomwareLocation: Kaspersky HQ - Moscow, Russia
Date published: 28-07-2014

Kaspersky Lab has published a new research paper on Koler, the "police" ransomware that has been targeting Android users since April. According to the report released Monday by the security firm, the mobile component of the campaign has not been functional since July 23, with the command and control... Read more

Source: securityweek.com

Top found tags: exploit kit(4),Kaspersky Lab(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Journalist Lekhnath Adhikari arrested on charge of cyber crimeLocation: Metropolitan Police - London, United Kingdom
Date published: 27-07-2014

JUL 27 KATHMANDU.Police on Sunday arrested Lekhnath Adhikari, deputy editor of Nepal Samacharpatra daily, on charge of cyber crime.Journalist Adhikari was arrested by the crime department of Metropolitan Police. Meanwhile, Federation of Nepali Journalist s ( FNJ ) President Mahendra Bista has re... Read more

Source: khabartime.com

Top found tags: EN(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Experts warn against Malware-Spreading Fake MH17 Video in FBLocation: Facebook - Menlo Park, United States
Date published: 27-07-2014

Last week, the tragedy of Malaysia Airlines Flight MH 17 became one of the biggest news. It was sensationalized enough that online scammers found it is an opportunity to victimize unsuspecting and gullible social media users worldwide.The Hacker News Network (THN) has recently reported what it descr... Read more

Source: www.morningnewsusa.com

Top found tags: airport(2),airport sector(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Melbourne recruitment firm fined $11k for Office 2007 piracyLocation: New York, United States
Date published: 28-07-2014

Business Software Alliance (BSA) orders to the company to buy legitimate copies of Microsoft Office.The Software Alliance has settled a software copyright breach case out of court with a Melbourne-based recruitment firm that used unlicensed copies of Office 2007 Enterprise.The company paid $11,190 i... Read more

Source: www.computerworld.com.au

Top found tags: Microsoft(1),survey(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber warfare: The next front in the Israel-Gaza conflict?Location: Tel Aviv, Israel
Date published: 28-07-2014

House Intelligence Committee Chairman Mike Rogers, R-Mich, is sounding the alarm that that cyber warfare could be the next front in the conflict between Israel and Hamas as nations allied with the Gaza-based militants look for non-military ways to aid their cause.It's a possibility Rogers says could... Read more

Source: www.cbsnews.com

Top found tags: Saudi Arabia(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Operation Emmental' Malware Campaign Targeting Banks Across EuropeLocation: Emmen, Emmen, Drenthe, The Netherlands
Date published: 28-07-2014

A new malware campaign believed to be the handiwork of cyber criminals based out of Russia is now targeting banks across the world, particularly those in countries like Switzerland and Austria, according to a new study.The study carried out by security firm Trend Micro has determined that the online... Read more

Source: www.ibtimes.co.uk

Top found tags: telecom sector(2),Trend Micro(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker service drains Google AdWords budgetsLocation: Google HQ - Mountain View, United States
Date published: 28-07-2014

YouTube ads from GoodGoogle pitching its AdWords click fraud service. Photo: ScreenshotThe longer one lurks in the internet underground, the more difficult it becomes to ignore the harsh reality that for nearly every legitimate online business there is a cybercrime-originated anti-business.Cas... Read more

Source: www.smh.com.au

Top found tags: website(1),Google(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Koler Ransomware Infrastructure Complex and AgileLocation: Google HQ - Mountain View, United States
Date published: 28-07-2014

While the Koler ransomware may be a simplistic money-generating malware scam, the infrastructure standing up its campaigns is anything but. Researchers at Kaspersky Lab published a report today that not only explained details of how the attackerspossibly the group behind the Reveton ransomware ... Read more

Source: threatpost.com

Top found tags: exploit kit(4),Kaspersky Lab(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminals Abuse Amazon Cloud to Host Linux DDoS TrojansLocation: Kaspersky HQ - Moscow, Russia
Date published: 28-07-2014

Cloud services provided by Amazon and other companies are being abused by profit-driven cybercriminals to host DDoS bots, Kaspersky Lab reported on Friday. Earlier this month, researchers published an analysis of a sophisticated Linux Trojan (Backdoor.Linux.Mayday.f) capable of conducting DNS amplif... Read more

Source: securityweek.com

Top found tags: United States(2),Kaspersky Lab(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Details emerge about PlugX/Kaba RAT in Pacific RimLocation: Pacific, United States
Date published: 28-07-2014

The well-known remote access tool (RAT) known as PlugX/Kaba continued its assault on companies in countries on both sides of the Pacific Ocean in 2013 and 2014, hitting technology, aerospace/defense, entertainment/media and government the hardest, according to a blog post from researchers at FireEye... Read more

Source: www.scmagazine.com

Top found tags: Hong Kong(2),South Korea(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

New Research Shows Cyberbullying Has Risen 56% Just 12 MonthsLocation: Facebook - Menlo Park, United States
Date published: 28-07-2014

The results of McAfees latest Teens, Tweens and Technology research study released today are enough to make any parent want to wrap their child in cotton wool forever. The study has shown that 81 per cent of Australian tweens and teens have witnessed cyberbullying online over the last 12 months... Read more

Source: blogs.mcafee.com

Top found tags: cyber bullying(2),cyber security(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers of the world unite as privacy startups answer Snowdens callLocation: Google HQ - Mountain View, United States
Date published: 28-07-2014

Hackers of the world unite as privacy startups answer Snowdens call. Addressing the Hackers on Planet Earth (HOPE) conference over the weekend of 18 July, Edward Snowden entreated hackers, engineers and activists to fight surveillance by building a new generation of privacy tools for everyone to ... Read more

Source: itproportal.com

Top found tags: Google(3),government(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminals Exploiting Malaysia Airlines Flight MH17 TragedyLocation: Facebook - Menlo Park, United States
Date published: 28-07-2014

The crash of the Malaysia Airlines flight MH17 in eastern Ukraine on June 17 continues to make headlines, making it a perfect event for cybercriminals to leverage in their malicious campaigns. The incident is surrounded by mystery, and several conspiracy theories have emerged, allowing cybercrooks t... Read more

Source: securityweek.com

Top found tags: Kaspersky Lab(4),social media(6),cybercrime(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
8 in 10 Brits would ditch passwords for biometric securityLocation: Clay, United States
Date published: 28-07-2014

More than half of banking customers would like to see banks implementing innovative security measures, such as biometrics Eight in ten (79%) Brits are ready to ditch their passwords in favour of biometric security measures like fingerprint scanners, new research shows. iPhone 5s sales of more than 1... Read more

Source: www.information-age.com Two women wanted for credit card fraud; according to Myrtle Beach Police | MYRTLE BEACH, S.C. (PRESS RELEASE) - The Myrtle Beach Police Department is asking for assistance in identifying two women in reference to multiple credit card fraud incidents within the City of Myrtle Beach, on and around July 28.If you have any information on the identity of this person please contact Detective Adams with the Myrtle Beach Police Department at 843-918-1904 and reference incident numbers 14-015268. | http://www.wbtw.com/story/26127016/two-women-wanted-for-credit-card-fraud-according-to-myrtle-beach-police | 28-07-2014 | www.wbtw.com

Top found tags: cyber security(4),mobile device(6),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security Think Tank: How to build a resilient defence against cyber attacksLocation: New York, United States
Date published: 28-07-2014

Organisations are facing new and unpredictable cyber threats, which can appear overnight and are difficult to prevent. According to PwCs 11th Annual Global Information Security Survey, the number of security incidents detected climbed by 25% from 2012 to 2013 and the average losses per incidents ... Read more

Source: www.computerweekly.com

Top found tags: cyber resilience(2),information security(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EFF Files Motion Asking Judge to Rule NSA Data Collection UnconstitutionalLocation: National Security Agency - Fort Meade, United States
Date published: 28-07-2014

The EFF has asked a federal judge to rule that the NSAs collection of massive amounts of upstream user data is unconstitutional, violating the Fourth Amendment. The motion for partial summary judgment in the case of Jewel v. NSA, a six-year-old lawsuit related to NSA data collection on AT&Ts n... Read more

Source: threatpost.com

Top found tags: United States(2),Electronic Frontier Foundation(3),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Securing The New Information EconomyLocation: San Francisco, United States
Date published: 28-07-2014

Enterprises Can Gain Competitive Advantages by Having IT Focus on the Things That Matter Users and Information Many years ago, what differentiated a business was literally keeping the lights on. Electricity was a critical utility, and the businesses that won were the ones located closest to powe... Read more

Source: securityweek.com

Top found tags: online banking(2),cyber security(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
10 Tips to Stay Safe OnlineLocation: McAfee - Santa Clara, United States
Date published: 28-07-2014

Hang ten, dude! Its summertime and surfers are taking to the ocean to go catch some gnarly waves. Experienced surfers know that there are dangers out in the water and are trained to look out for them. These dangers include rip currents, shallow water, and of course, sharks. Just like there are da... Read more

Source: blogs.mcafee.com

Top found tags: cyber security(4),social media(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian government promises 60k bounty to Tor hackersLocation: Moscow, Russia
Date published: 28-07-2014

The Russian Ministry of Internal Affairs (MVD) is offering a 3.9 million ruble (approximately 64,600) reward to anyone who can find a way of identifying and tracking users of the anonymous Tor network. Russian government promises 60k bounty to Tor hackers Russian government promises 60k bounty... Read more

Source: www.scmagazineuk.com

Top found tags: Black Hat(4),United States(6),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Privacy-focused Tails OS compromised: How to stay safe until it's patchedLocation: National Security Agency - Fort Meade, United States
Date published: 28-07-2014

Vulnerabilities in the Tails operating system could reveal your IP address, but you can avoid trouble by taking a couple of precautions. Tails, a portable operating system that employs a host of privacy-focused components, plans to patch flaws contained in I2P, a networking tool developed by the Inv... Read more

Source: www.pcworld.com Firefox checkt voortaan elke download op malware | Samenvatting:Firefox blokkeert al langere tijd phishing- en kwaadaardige websites. Vanaf nu checkt het ook de reputatie van elke individuele download.Mozilla heeft aangekondigd dat de nieuwe Firefox (versie 31.0 is onlangs verschenen) elke individuele download checkt via Googles Safe Browsing-reputatiedienst om vast te stellen of er sprake is van bekende malware.Firefox checkt de url\'s van websites via Googles Safe Browsing sinds versie 2.0. Oorspronkelijk keek de dienst alleen of het ging om bekende phishingwebsites, maar later werden adressen aan de lijst toegevoegd waarvan bekend was dat ze malware verspreiden. Als je op een dergelijke website belandt geeft Firefox een duidelijke waarschuwing:Versie 31.0 voegt hier iets nieuws aan toe. Als tijdens een download de website door de reputatiecheck komt, stuurt Firefox voor voltooiing ook nog een SHA-256 hash naar de Safe Browsing-dienst. Deze bestandsreputatiedienst is geen gedocumenteerd onderdeel van de Safe Browsing API, maar Google heeft Firefox toegang gegeven. Uiteraard beschikt Googles eigen browser Chrome over deze functionaliteit sinds de lancering van de dienst in 2012.Firefox laat tevens weten dat versie 32, die gepland staat voor september, een efficintere manier toevoegt om malware te checken. Voordat het de reputatie van een individueel bestand checkt, bekijkt het de geldigheid van de digitale handtekening (als die een heeft) en of de uitgever bekend staat als betrouwbaar. Als het bestand voor deze test slaagt wordt het gemarkeerd als goed. Zo niet, dan voert Firefox als nog de reputatiecheck uit. | http://www.zdnet.be/article/157004/firefox-checkt-voortaan-elke-download-op-malware/ | 28-07-2014 | www.zdnet.be

Top found tags: government(3),United States(4),vulnerability(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Cybercrime Exploits Digital CertificatesLocation: Comodo Group HQ - Clifton, United States
Date published: 28-07-2014

What is a digital certificate?The digital certificate is a critical component of a public key infrastructure. It is an electronic document that associates the individual identity of a person to the public key associated with it.A certificate can then be associated with a natural person, a private co... Read more

Source: resources.infosecinstitute.com

Top found tags: cyber security(2),e-mail(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trojan virus secretly uses Tor network to hide bitcoin extortionistLocation: Kaspersky HQ - Moscow, Russia
Date published: 27-08-2014

An unusual ransomware Trojan, discovered by cybersecurity experts last month, is the first of its kind to secretly use a Tor anonymizing network to hide its communication with a command-and-control server.Ransomware is a malicious program that takes control of some functions of a computer and demand... Read more

Source: rt.com

Top found tags: Kaspersky Lab(4),telecom sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Palo Alto Networks uncovers new source of cyber threats targeting businessesLocation: Palo Alto, United States
Date published: 28-07-2014

Palo Alto Networks, a leading enterprise security company, revealed today that cyber criminals in Nigeria, have evolved common malware campaigns infiltrating businesses which were not previously their primary targets.419 Evolution, released a new report, from Unit 42, the team of Palo Alto Networks ... Read more

Source: www.financialexpress.com

Top found tags: financial sector(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Amazon knows so much about you and how to regain your privacyLocation: LinkedIn HQ - Mountain View, United States
Date published: 28-07-2014

Although I am not logged in, Amazon shows me how much it knows about me and my online activities. Band of Brothers refers to an MP3 file in my Dropbox folder, placed there last week, and Kindle Fire is one of the terms used in a distribution list email I received recently. I have been researching Cl... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),financial sector(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russia Offers Over $100k for Defeating Tor Network AnonymityLocation: Black Hat - Las Vegas, United States
Date published: 28-07-2014

Russia is looking for hackers to help take down the anonymity of the Tor network. In a posting to Russia government's procurement portal earlier this month, the country's Ministry of Internal Affairs (MVD) offered a 3.9 million rubles (roughly $109,000 USD) reward for research on methods for identif... Read more

Source: securityweek.com

Top found tags: United States(2),Black Hat(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: Japan eyes law requiring security incident reportingLocation: Tokio, Japan
Date published: 28-07-2014

The Japanese government is considering cyber legislation that would require companies to 'fess up when security incidents occur, a recent report said. According to a Bloomberg article, the government is expected to pass the law in coming months in response to the country's shortage of informat... Read more

Source: www.scmagazine.com

Top found tags: information security(2),legislation(2),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers seed Amazon cloud with potent denial-of-service botsLocation: Kaspersky HQ - Moscow, Russia
Date published: 28-07-2014

Attackers have figured out a new way to get Amazon's cloud service to wage potent denial-of-service attacks on third-party websitesby exploiting security vulnerabilities in an open source search and analytics application known as Elasticsearch. The power of Backdoor.Linux.Ganiw.a was documented e... Read more

Source: arstechnica.com

Top found tags: Kaspersky Lab(4),social media(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

SMBs overlooking online security risks: ZurichLocation: Australian Communications and Media Authority - Pyrmont, Australia
Date published: 28-07-2014

according to a new report from Zurich. The Global interconnections of cyber risk: impact on small and medium-sized enterprises report (PDF) has warned that while the internet has provided SMEs with "countless benefits", including allowing organisations to handle more customers at the same time and c... Read more

Source: www.zdnet.com

Top found tags: New Zealand(2),government(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK watchdog warns firms on Big Data risksLocation: Brussels,Belgium
Date published: 28-07-2014

UK watchdog The Information Commissioner's Office (ICO) has released a comprehensive report into big data which warns companies that their data analytics activities must adhere to existing data protecting laws. UK watchdog warns firms on Big Data risks UK watchdog warns firms on Big Data risks The g... Read more

Source: www.scmagazineuk.com

Top found tags: government(2),social media(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Governments should butt out of cyber protection schemesLocation: Sydney, Australia
Date published: 28-07-2014

It appears many governments, including ours, dont know their role in the fight against cybercrime. They are up to their elbows in the day-to-day slog against cyber attackers, generating scheme after scheme to try and keep pace with the onslaught, when in fact, they should just be governing. Earli... Read more

Source: www.smh.com.au

Top found tags: cybercrime(4),cyber security(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Financial institutions and Cybercrime: Its only just begunLocation: National Crime Agency - London, United Kingdom
Date published: 28-07-2014

A recent bout of high profile cyber-attacks on financial institutions across the UK, US and Canada has put the spotlight back on the importance of data security and the need to be diligent when it comes to cybersecurity within the banking industry, writes Alex Raistrick.Over the last few weeks GOZeu... Read more

Source: www.bankingtech.com

Top found tags: cybercrime(6),cyber security(6),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
European Central Bank HackedLocation: Brussel, Belgium
Date published: 28-07-2014

The European Central Bank (ECB) acknowledged on July 24, 2014 that a database serving its public website had been hacked, resulting in the theft of email addresses, phone numbers and mailing addresses for people who had registered for events at the bank. An ECB spokeswoman told Computerworld that th... Read more

Source: www.esecurityplanet.com

Top found tags: data breach(2),financial sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Michaels class-action suit tossed after plaintiffs can't show damageLocation: Illinois, United States
Date published: 28-07-2014

Michaels has ducked a putative class-action lawsuit after a federal judge ruled that the plaintiffs could demonstrate any kind of economic damage from a breach that compromised the hobby retailer's customer data between May 8, 2013 and Jan. 27, 2014. Plaintiffs in Moyer v. Michaels had accused... Read more

Source: www.scmagazine.com

Top found tags: identity theft(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Looking for business? The Scottish Government is seeking new IT framework suppliersLocation: Edinburgh, Scotland, United Kingdom
Date published: 28-07-2014

Looking for business? The Scottish Government is seeking new IT framework. suppliers The Scottish Government will be seeking suppliers to provide it with a framework for the delivery managed IT services. According to a prior information notice published in the Official Journal of the European Union ... Read more

Source: itproportal.com

Top found tags: website(1),EU(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft says government officials make sudden visits to China officesLocation: Beijing, China
Date published: 28-07-2014

BEIJING (Reuters) - Chinese government officials have made sudden visits to Microsoft Corp (MSFT.O) offices in China, a spokeswoman for the company said on Monday, but declined to give any reason for the inspections. China's State Administration for Industry & Commerce, which Chinese media reported ... Read more

Source: reuters.com

Top found tags: telecom sector(4),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Siemens Fixes Vulnerabilities in SIMATIC WinCC SCADA SystemLocation: Siemens HQ - Munich, Germany
Date published: 28-07-2014

Siemens has released version 7.3 of the SIMATIC WinCC supervisory control and data acquisition (SCADA) system to address several vulnerabilities, most of which can be exploited remotely. According to advisories published by both Siemens and ICS-CERT last week, the vulnerabilities affect all prior ve... Read more

Source: securityweek.com

Top found tags: update(2),vulnerability(3),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Says Under Antitrust Probe in ChinaLocation: Microsoft HQ - Redmond, United States
Date published: 28-07-2014

NEW YORK - Microsoft said Monday it was under investigation by antitrust authorities in China, pledging to cooperate in the investigation. "We aim to build products that deliver the features, security and reliability customers expect, and we will address any concerns the government may have," Micros... Read more

Source: securityweek.com

Top found tags: Microsoft(2),United Kingdom(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Uber Passenger Ratings Exposed via JavaScript HackLocation: Oracle - Redwood City, United States
Date published: 28-07-2014

The rating given by Uber drivers to their passengers could have been accessed until a few hours ago by simply pasting a piece of JavaScript code into a Web browser's console. Uber is an increasingly popular mobile application that allows users to instantly book a private car or taxi. The app enables... Read more

Source: securityweek.com

Top found tags: XSS(1),social media(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Data Sweep Harms Press, Democratic Rights: StudyLocation: New York Times - New York, United States
Date published: 28-07-2014

WASHINGTON - Large-scale surveillance by the US government has begun to have an impact on press freedom and broader democratic rights, a study released Monday showed. The report by the American Civil Liberties Union and Human Rights Watch found that the vast surveillance efforts aimed at thwarting t... Read more

Source: securityweek.com

Top found tags: telecom sector(4),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese Regulators Visit Microsoft Offices: Dow JonesLocation: Microsoft HQ - Redmond, United States
Date published: 28-07-2014

BEIJING - Officials from China's corporate regulator paid visits Monday to software giant Microsoft's offices in four cities in the country, Dow Jones Newswires reported, citing people familiar with the matter. Microsoft offices visited by China's State Administration for Industry and Commerce were ... Read more

Source: securityweek.com

Top found tags: Microsoft(2),United Kingdom(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New ThreatStream CEO Wants to Solve SIEM ChallengeLocation: Hewlett-Packard - Palo Alto, United States
Date published: 28-07-2014

Hugh Njemanze is no stranger to the world of security startups. In the year 2000, Njemanze founded security incident and event management (SIEM) pioneer ArcSight, that was acquired by HP in 2010 for $1.5 billion. Njemanze continued to serve as CTO until 2012. Njemanze is starting on a new adventure ... Read more

Source: www.esecurityplanet.com

Top found tags: threat(1),update (1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dissecting the CVE-2013-2460 Java ExploitLocation: Oracle - Redwood City, United States
Date published: 28-07-2014

IntroductionIn this vulnerability, code is able to get the references of some restricted classes which are cleverly used for privilege escalation and bypassing the JVM sandbox. The vulnerable invoke method of the sun.tracing.ProviderSkeleton class is used to issue calls to the Class.forN... Read more

Source: research.zscaler.com

Top found tags: vulnerability(1),Zscaler(1),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Siemens Fixes Vulnerabilities in SIMATIC WinCC SCADA SystemSLocation: Siemens HQ - Munich, Germany
Date published: 28-07-2014

Siemens has released version 7.3 of the SIMATIC WinCC supervisory control and data acquisition (SCADA) system to address several vulnerabilities, most of which can be exploited remotely.According to advisories published by both Siemens and ICS-CERT last week, the vulnerabilities affect all prior ver... Read more

Source: www.securityweek.com

Top found tags: government(2),vulnerability(3),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Harnessing the Power of an Android Cluster for Security ResearchLocation: Google HQ - Mountain View, United States
Date published: 28-07-2014

When the topicof mobile security comes up, users and researchers often discuss Android as if its one monolithic operating system like iOS is. But the fact is that there are nearly as many versions of Android as there are Android devices, which has led to plenty of confusion when its time to ... Read more

Source: threatpost.com

Top found tags: vulnerability(3),Black Hat(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Pornosites sturen Android-gebruikers naar ransomwareLocation: Google HQ - Mountain View, United States
Date published: 28-07-2014

Onderzoekers hebben een netwerk van kwaadaardige pornosites ontdekt dat bezoekers met een Android-toestel naar een webpagina met ransomware doorstuurt. Het gaat hierbij niet om gehackte pornosites, maar websites die specifiek voor de ransomware zijn ontwikkeld. Ze bieden geen eigen materiaal aan, ma... Read more

Source: www.security.nl

Top found tags: cybercrime(2),telecom sector(2),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Webdienst verbrast Google advertentiebudget concurrentieLocation: Google HQ - Mountain View, United States
Date published: 28-07-2014

Cybercriminelen bieden al enkele jaren een dienst aan waarmee bedrijven en organisaties het Google advertentiebudget van concurrenten kunnen verbrassen. De dienst heet GoodGoogle en richt zich op Google AdWords. Dit zijn de advertenties die Google bij zoekresultaten laat zien. Elke keer dat er op de... Read more

Source: www.security.nl

Top found tags: Google(1),NL(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Letland mag vermeende virusschrijver aan VS uitleverenLocation: Ministry of Foreign Affairs - Den Haag, The Netherlands
Date published: 28-07-2014

Een Letse man die verdacht wordt van het ontwikkelen van een Trojaans paard waarmee cybercriminelen miljoenen euros van bankrekeningen wisten te stelen mag toch aan de Verenigde Staten worden uitgeleverd. Zo heeft het Europees Hof voor de Rechten van de Mens bepaald. Deniss Calovskis, alias 'Miami... Read more

Source: www.security.nl

Top found tags: government(3),cybercrime(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoeker: virusscanner maakt computer kwetsbaarderLocation: F-Secure - Helsinki, Finland
Date published: 28-07-2014

Anti-virussoftware moet computers juist tegen aanvallen en malware beschermen, maar volgens n onderzoeker maakt een virusscanner de computer juist kwetsbaarder, wat ook nog ten koste van de prestaties gaat. Dat stelde Joxean Koret tijdens de SyScan 360 Conferentie. Koret is onderzoeker bij het S... Read more

Source: www.security.nl

Top found tags: cybercrime(2),cyber security(2),antivirus(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers spelen klassieker Doom op geldautomaatLocation: Microsoft HQ - Redmond, United States
Date published: 28-07-2014

Twee Australische hackers zijn erin geslaagd om het bekende computerspel Doom werkend op een geldautomaat te krijgen, zo blijkt uit een YouTube-video. Details over de hack zijn nog schaars, maar het is bekend dat geldautomaten gewoon computers zijn, waarvan een groot deel op Windows XP draait. De ha... Read more

Source: www.security.nl

Top found tags: Windows(1),ATM(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

"Gecrashte harde schijf voornaamste oorzaak dataverlies"Location: Amsterdam, The Netherlands
Date published: 28-07-2014

Gecrashte harde schijven zouden nog steeds de voornaamste oorzaak van dataverlies zijn, zo blijkt uit onderzoek onder ruim 1.000 mensen in Noord-Amerika, Europa en Azi. 72% van de deelnemers aan het onderzoek gaf aan dat er gegevens waren verloren door een gecrashte harde schijf in een computer. D... Read more

Source: www.security.nl

Top found tags: NL(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firefox-lekken gepatcht in Tor BrowserLocation: Mozilla - Mountain View, United States
Date published: 28-07-2014

De ontwikkelaars van het Tor Project hebben door het verschijnen van een nieuwe Firefox-versie vorige week die verschillende lekken verhielp ook een nieuwe versie van Tor Browser gelanceerd. Dit is een programma waarmee internetgebruikers eenvoudig van het Tor-netwerk gebruik kunnen maken. Via Tor k... Read more

Source: www.security.nl

Top found tags: NL(1),patch(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internet Explorer geeft aanvaller informatie over beveiligingLocation: Amsterdam, The Netherlands
Date published: 28-07-2014

Aanvallers gebruiken verschillende functies in Internet Explorer zonder dat gebruikers hier weet van hebben. Dit kan ervoor zorgen dat er informatie over de beveiliging van een computer en genstalleerde software en updates kan worden opgevraagd.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),Internet Explorer(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese overheid valt binnen bij MicrosoftLocation: Microsoft HQ - Redmond, United States
Date published: 28-07-2014

De Chinese overheid is binnengevallen bij kantoren van Microsoft in vier steden in het land. Ook is er een officieel onderzoek naar het bedrijf geopend. Onduidelijk is echter waar het onderzoek precies over gaat; mogelijk gaat het om samenwerking met Amerikaanse spionagediensten. MicrosoftZowel Micr... Read more

Source: tweakers.net

Top found tags: Microsoft(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kritiek op Google-zoekbalk in nieuwe Firefox-tabLocation: Mozilla - Mountain View, United States
Date published: 28-07-2014

Met de lancering van Firefox 31 heeft Mozilla een aanpassing doorgevoerd waardoor nu standaard de Google-zoekbalk in nieuw geopende tabpagina's wordt getoond, tot onvrede van sommige gebruikers. Dat blijkt uit reacties op het forum van MozillaZine, een community over de software van Mozilla. Met het... Read more

Source: www.security.nl

Top found tags: Chrome(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Draadloze aanval laat inbreker alarmsysteem uitschakelenLocation: Black Hat - Las Vegas, United States
Date published: 28-07-2014

Het aantal huizen met een alarmsysteem is de afgelopen jaren gegroeid, maar een kwetsbaarheid in n van de gebruikte technologien maakt het mogelijk om op afstand het alarm uit te schakelen of te kijken of mensen echt over een alarmsysteem beschikken en niet alleen een sticker hebben opgeplakt.... Read more

Source: www.security.nl

Top found tags: vulnerability(1),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid in CUPS verholpenLocation: Ubuntu - London, United Kingdom
Date published: 28-07-2014

Samenvatting: Meerdere Linuxdistributies hebben een update beschikbaar gesteld waarmee een kwetsbaarheid in CUPS wordt verholpen. Gevolgen: Een lokale aanvaller kan de kwetsbaarheid gebruiken om zijn rechten te verhogen en zodoende bestanden in te zien waar hij dit normaal niet toe gerechtigd is. Be... Read more

Source: www.ncsc.nl

Top found tags: Fedora(2),Ubuntu(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden verholpen in qemu-kvmLocation: Amsterdam, The Netherlands
Date published: 28-07-2014

Samenvatting: Red Hat heeft updates uitgebracht voor QEMU die de kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken van het QEMU proces of mogelijk willekeurige code uitvoeren met de rechten van het QEMU proces. Beschrijving: Door meerdere invoervalidatie, bu... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Fedora(2),Red Hat(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Linux kernel verholpenLocation: Amsterdam, The Netherlands
Date published: 28-07-2014

Samenvatting: Er zijn updates uitgebracht om de kwetsbaarheden te verhelpen. Voor meer informatie, zie "Mogelijke oplossingen". Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende een denial-of-service veroorzaken, verhoogde gebruikersrechten verkrijgen. Beschrijving: - CVE-2014-2... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Red Hat(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in mod_security van Apache HTTP ServerLocation: Amsterdam, The Netherlands
Date published: 28-07-2014

Samenvatting: Er is een kwetsbaarheid ontdekt in mod_security van Apache HTTP Server. Zie "Mogelijke oplossingen" voor meer informatie. Gevolgen: Een aanvaller kan content opvragen wat verwijderd had moeten worden door mod_security. Beschrijving: - CVE-2013-5705 Er is een kwetsbaarheid ontdekt in de... Read more

Source: www.ncsc.nl

Top found tags: website(1),Debian(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Apache Struts verholpenLocation: IBM HQ - Armonk, United States
Date published: 28-07-2014

Samenvatting: Apache en IBM hebben een kwetsbaarheid verholpen in het Apache Struts web framework. Gevolgen: Een kwaadwillende kan de kwetsbaarheid op afstand misbruiken om beveiligingsmaatregelen te omzeilen om zo mogelijke andere aanvallen uit te voeren. Beschrijving: De kwetsbaarheid kan op afsta... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cross-Site-Scripting kwetsbaarheid in Barracuda FirewallLocation: Cross, United States
Date published: 28-07-2014

Samenvatting: Barracuda Networks heeft bekend gemaakt dat er een Cross-Site-Scripting (XSS) kwetsbaarheid in de management web-interface van haar firewalls is ondekt. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken voor het uitvoeren van een Cross-Site-Scripting (XSS) aanval. Een dergeli... Read more

Source: www.ncsc.nl

Top found tags: XSS(1),cyber security(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish