Under construction

New design coming soon!

CIC News engine statistics

CIC News for 29-07-2014 contains 90 articles: cybercrime(28),cyber security(34),data breach(2),other(26)

CIC News update contains 72 English and 18 Dutch articles for today.
There are 1 published advisories, 0 are English and 1 are Dutch.
In today's English news articles:
- 24 related to cybercrime
- 30 related to cyber security
- 2 related to data breach and identity theft
- 16 for the category other news

In today's Dutch news articles:
- 4 related to cybercrime
- 4 related to cyber security
- 10 for the category other news

Have fun reading.

English cybercrime related news

Cybercrime Exposed Part 1: The Security Risks of PhishingLocation: Trend Micro - Cupertino, United States
Date published: 28-07-2014

While new threats are emerging that hit new avenues or targets like PoS systems and cryptocurrencies, old threats likephishingremains to be an effective means of gathering user data. A simple spam email that leverages holidays, online shopping,release of anticipated gadgets, and hot/current ne... Read more

Source: trendmicro.com

Top found tags: phishing(2),Trend Micro(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Study: Asian Android users at higher risk of malware exposureLocation: Asia
Date published: 28-07-2014

Asian Android phone users are at two to three times greater risk of downloading malware onto their devices than those in Europe or the Americas, according to a new study. Cheetah Mobile's 2014 Half Year Security Report found that Asia, Vietnam and India had the highest infection rates. The gro... Read more

Source: www.scmagazine.com

Top found tags: Vietnam(1),cybercrime(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Companies accused of peddling bogus AV ordered to pay $5.1MLocation: New York, United States
Date published: 28-07-2014

Trustmark has voluntarily dismissed its claims related to the class-action lawsuit filed last week. A federal court issued default judgments against 14 companies and individuals for operating AV scams. Fourteen companies, accused of selling bogus anti-virus tools to consumers, have been ordered to p... Read more

Source: www.scmagazine.com

Top found tags: FTC(2),government(3),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bug in MailPoet plugin exploited to compromise thousands of WordPress sitesLocation: WordPress - San Francisco, United States
Date published: 28-07-2014

RCE vulnerability in TimThumbs WebShot feature puts WordPress users at risk Version 2.6.7 of the MailPoet plugin fixes a severe vulnerability that could allow an attacker to take over WordPress sites. Ongoing exploitation of a severe vulnerability in MailPoet, a popular newsletter plugin for blog... Read more

Source: www.scmagazine.com

Top found tags: website(1),WordPress(1),backdoor(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Changes in the Asprox BotnetLocation: Microsoft HQ - Redmond, United States
Date published: 28-07-2014

Asprox, a.k.a. Zortob, is an old botnet that was uncovered in 2007. It is known to spread by arriving as an attachment in spam emails that purport to be from well-known companies. The attachment itself is disguised as a legitimate document file by using icons such as those of a .doc or .pdf file. As... Read more

Source: blog.fortinet.com

Top found tags: update(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SEC to Facebook: yeah, we're good, Homeland Security does software, and go ahead and unlock your cellphone [Government IT Week]Location: Google HQ - Mountain View, United States
Date published: 29-07-2014

ZDNet's DIY-IT, every week I'll bring you a selection of the best government-related articles posted by our intrepid reporters and analysts. Here are some of the most interesting from the last week. Top stories this week Cell phone unlocking will be legal again In 2012, the Library of Congress ruled... Read more

Source: www.zdnet.com

Top found tags: United States(4),telecom sector(6),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Israel's Iron Dome missile tech grasped by Chinese hackersLocation: Tel Aviv, Israel
Date published: 29-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines A Chinese hacking team previously fingered as the bunch behind raids against US defence contractors has been accused of a new data heist: Cyber Engineering Services says the group has plundered Israel's Iron Dome missile protection system. B... Read more

Source: go.theregister.com

Top found tags: South Korea(2),trojan(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware gets your Android blabbering to HACKERSLocation: Google HQ - Mountain View, United States
Date published: 29-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Researchers from the Chinese University of Hong Kong have developed bizarre malware that dictates contacts, emails and other sensitive text data in order to steal it. In the novel attack a seemingly innocuous app that required no permissions... Read more

Source: go.theregister.com

Top found tags: Hong Kong(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android "Fake ID" Vulnerability Lets Malicious Apps Impersonate Trusted AppsLocation: Google HQ - Mountain View, United States
Date published: 29-07-2014

A serious vulnerability exists in the Android operating system, which could allow malicious apps to impersonate well-known trusted apps such as Google Wallet, researchers said. Every Android app has a unique identity, and a flaw in the operating system dating back to 2010 lets malicious apps copy an... Read more

Source: securityweek.com

Top found tags: update(2),Black Hat(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Highly Secure Operating System seL4 Released as Open SourceLocation: New York, United States
Date published: 29-07-2014

Secure embedded L4 (seL4), said to be the world's most highly-assured operating system, has been released as open source, Australia's Information and Communications Technology Research Centre of Excellence (NICTA) and U.S. aerospace and defense company General Dynamics C4 Systems announced on Tuesda... Read more

Source: securityweek.com

Top found tags: research(1),cybercrime(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese hackers pull off Israel Iron Dome hackLocation: Tel Aviv, Israel
Date published: 29-07-2014

PaulMCCooper. Chinese hackers pull off Israel Iron Dome hack Chinese hackers have broken into the computer systems of three Israeli defence contractors instrumental in the construction of Israel's Iron Dome missile defence system. The hacks were allegedly carried out by the elite cyber operations gr... Read more

Source: itproportal.com

Top found tags: Israel(1),report(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Think you can crack TOR? The Russian government wants to give you 4m rublesLocation: U.S. Naval Research Laboratory - Washington D.C., United States
Date published: 28-07-2014

PaulMCCooper. Think you can crack TOR? The Russian government wants to give you 4m rubles Russia's government has issued a 4 million rubles (about 60,000) bounty to anyone who cracks the Tor anonymity network's encryption protocols. Tor, which began as a secret project from the US Naval Research L... Read more

Source: itproportal.com

Top found tags: pornography(3),child pornography(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android crypto blunder exposes users to highly privileged malwareLocation: Google HQ - Mountain View, United States
Date published: 29-07-2014

The majority of devices running Google's Android operating system are susceptible to hacks that allow malicious apps to bypass a key security sandbox so they can steal user credentials, read e-mail, and access payment histories and other sensitive data, researchers have warned. The high-impact vulne... Read more

Source: arstechnica.com

Top found tags: trojan(2),Black Hat(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Podcast: Bluebox Labs Explains Android 'Fake ID' VulnerabilityLocation: Google HQ - Mountain View, United States
Date published: 29-07-2014

Security Conversations With Ryan NaraineChief Technology Officer at Bluebox Security Jeff Forristal joins the podcast to discuss a significant Android vulnerability that lets hackers create a malicious application by copying the ID of a legitimate application to gain the same special privileges of t... Read more

Source: securityweek.com

Top found tags: hackers(1),RSS(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese Hackers Forced Shutdown of Systems at Canada's National Research CouncilLocation: Ottawa, Ontario, Canada
Date published: 29-07-2014

Chinese threat actors recently hacked into the computer networks of the National Research Council (NRC) in Canada, the CIO of the Canadian government said on Tuesday. The NRC is the Government of Canada's research and technology organization which provides innovation support, strategic research, sci... Read more

Source: securityweek.com

Top found tags: threat(1),China(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
22 Jump Street, Transformers Are Top Movie Lures for SummerLocation: Trend Micro - Cupertino, United States
Date published: 29-07-2014

Summertime has become synonymous with blockbuster movies. Unfortunately, these movies have become a go-to social engineering lure used by cybercriminals. Just like in previous years, Trend Micro engineers searched for possible threats related to movies released during the summer. This year, 22 Jump ... Read more

Source: trendmicro.com

Top found tags: Trend Micro(2),cybercrime(3),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Real threats start with humans, not technologyLocation: Real, United States
Date published: 29-07-2014

When the two IPs meet (intellectual property and internet protocol) the value of the business becomes vulnerable says Dave King, with IT often just providing a sticking plaster to hide C-suite ignorance. Real threats start with humans, not technology Real threats start with humans, not technology ... Read more

Source: www.scmagazineuk.com

Top found tags: social engineering(2),social media(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese hackers pull off Israel Iron Dome hackLocation: Tel Aviv, Israel
Date published: 29-07-2014

PaulMCCooper. Chinese hackers pull off Israel Iron Dome hack Chinese hackers have broken into the computer systems of three Israeli defence contractors instrumental in the construction of Israel's Iron Dome missile defence system. The hacks were allegedly carried out by the elite cyber operations gr... Read more

Source: itproportal.com

Top found tags: Israel(1),report(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Threat Intelligence Tool Connects Dots on Pre-Attack DataLocation: Forest, United States
Date published: 29-07-2014

Enterprises longing for an automated system that sends up a smoke signal that attackers may be planning a move against a particular organization or are promoting a new tool that targets companies in a specific industry may have had their wish come true. Georgia Tech Research Institute has released a... Read more

Source: threatpost.com

Top found tags: social media(2),DoS(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Instagram App Exposes Users to Man-in-the-Middle Attacks: ResearcherLocation: Instagram - Menlo Park, United States
Date published: 29-07-2014

A security researcher has released details of an issue affecting the Instagram application for iOS devices that exposes users to hackers launching man-in-the-middle attacks. "In a nutshell some API endpoints are HTTP which means I can most probably take control of your account if we're on the same w... Read more

Source: securityweek.com

Top found tags: mobile device(2),social media(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese hackers steal confidential documents on Israeli missile defence systemLocation: Tel Aviv, Israel
Date published: 29-07-2014

Chinese hackers comprised the computer systems of three Israeli defence contractors between 10 October 2011 and 13 August 2012 in order to steal hundreds on confidential documents on Israel's Iron Dome missile defence system. Chinese hackers steal confidential documents on Israeli missile defence sy... Read more

Source: www.scmagazineuk.com

Top found tags: China(2),trojan(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Missile Defense Plans Hacked from Israeli ContractorsLocation: Tel Aviv, Israel
Date published: 28-07-2014

Detailed schematics for a particular type of anti-ballistic missile, information about rockets, and pages upon pages of other mechanical documents were allegedly stolen from a trio of Israeli defense contractors between 2011 and 2012, it was revealed today. A Maryland-based threat intelligence firm ... Read more

Source: threatpost.com

Top found tags: cyber security(2),telecom sector(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Neverquest Banking Trojan Updated to Include More Than 30 Financial Institutions in JapanLocation: Tokio, Japan
Date published: 29-07-2014

Whoever is behind the development of the Neverquest (Snifula) Trojan has been busy. A new variant has been found targeting more than 30 Japanese financial institutions, including 12 regional banks. The update builds upon the Trojan's previous capability to target eight banks in the country, and cont... Read more

Source: securityweek.com

Top found tags: cybercrime(4),United States(4),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EFF asks court to find NSA internet spying a violation of Fourth AmendmentLocation: National Security Agency - Fort Meade, United States
Date published: 28-07-2014

Experts say the settlement serves as a small win for plaintiffs, and a bigger one for plaintiffs. Experts say the settlement serves as a small win for plaintiffs, and a bigger one for plaintiffs. Asking that a judge rule the National Security Agency (NSA) is in violation for copying and searching th... Read more

Source: www.scmagazine.com

Top found tags: government(4),Electronic Frontier Foundation(6),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senator Leahy prepares bill to tackle NSA snoopingLocation: Lea, United States
Date published: 28-07-2014

Privacy advocates' tepid response to the USA Freedom Act, which passed the House in May, has incited one senator to introduce new legislation to counter NSA's unfettered surveillance. Over the weekend, The New York Times revealed that Sen. Patrick Leahy, D-Vt., intends to introduce the bill on Tuesd... Read more

Source: www.scmagazine.com

Top found tags: report(1),cyber security(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dropping Files Into Temp Folder Raises Security ConcernsLocation: Microsoft HQ - Redmond, United States
Date published: 28-07-2014

Recently, the McAfee Advanced Exploit Detection System (AEDS) has delivered some interesting RTF files to our table. These RTFs have executables attached to the documents. Usually, some words in the documents try to convince users to click and run the attachments. The following figure shows th... Read more

Source: blogs.mcafee.com

Top found tags: Microsoft(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firefox 32 feature could cut undetected malware downloads 'in half'Location: Mozilla - Mountain View, United States
Date published: 28-07-2014

Firefox 32, which is set to be released in September, aims to further beef up defenses against downloading malware on Windows computers. The feature works by comparing the verified signature of downloaded application files against a list of known safe publishers, according to a Wednesday post by Sid... Read more

Source: www.scmagazine.com

Top found tags: privacy(1),Windows(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Huawei sees massive handset growth outside ChinaLocation: Huawei HQ - Guangdong, China
Date published: 29-07-2014

comparted to same time last year. The company said its consumer business group made 34.27 million smartphone shipments for 1H 2014, out of 64.21 million total consumer devices shipped. Huawei pinned the increase on the launch of its Ascend P7 and Mate 2 4G handsets made during the half, claiming the... Read more

Source: www.zdnet.com

Top found tags: United States(2),cyber security(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internet of things big security worry, says HPLocation: Hewlett-Packard - Palo Alto, United States
Date published: 29-07-2014

according to Hewlett-Packard. HP's data is based on it Fortify division and a scan of 10 of the most popular Internet of things devices. HP found 25 vulnerabilities per device. These devices included TVs, Webcams, thermostats, remote power outlets, sprinklers, door locks, home alarms, scales and gar... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),United States(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Huawei sees massive handset growth outside ChinaLocation: Huawei HQ - Guangdong, China
Date published: 29-07-2014

comparted to same time last year. The company said its consumer business group made 34.27 million smartphone shipments for 1H 2014, out of 64.21 million total consumer devices shipped. Huawei pinned the increase on the launch of its Ascend P7 and Mate 2 4G handsets made during the half, claiming the... Read more

Source: www.zdnet.com

Top found tags: United States(2),cyber security(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Personal Privacy Is Only One of the Costs of NSA SurveillanceLocation: National Security Agency - Fort Meade, United States
Date published: 29-07-2014

ff_nsadatacenter_f There is no doubt the integrity of our communications and the privacy of our online activities have been the biggest casualty of the NSAs unfettered surveillance of our digital lives. But the ongoing revelations of government eavesdropping has had a profound impact on the econo... Read more

Source: wired.com

Top found tags: United States(6),government(9),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is Security An Unsolvable Problem?Location: New York, United States
Date published: 29-07-2014

Framing the Challenges in the Security Realm Properly is an Important First Step in Addressing Them As a child, I was taught that if a problem was frustrating me, I should approach it from a different angle. Indeed, in adulthood, I have found that a fresh perspective can often make the unsolvable so... Read more

Source: securityweek.com

Top found tags: cyber security(2),information security(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers of the world unite as privacy startups answer Snowdens callLocation: Google HQ - Mountain View, United States
Date published: 28-07-2014

Hackers of the world unite as privacy startups answer Snowdens call. Addressing the Hackers on Planet Earth (HOPE) conference over the weekend of 18 July, Edward Snowden entreated hackers, engineers and activists to fight surveillance by building a new generation of privacy tools for everyone to ... Read more

Source: itproportal.com

Top found tags: Google(3),government(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Only '3% of web servers in top corps' fully fixed after Heartbleed snafuLocation: New York, United States
Date published: 29-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines A study of the public-facing web servers run by some of the world's largest firms has suggested only three per cent of the machines have been fully protected against the OpenSSL vulnerability known as Heartbleed. The research, carried out by... Read more

Source: go.theregister.com

Top found tags: OpenSSL(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
14 antivirus apps found to have security problemsLocation: ESET HQ - Bratislava, Slovak Republic
Date published: 29-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Organisations should get their antivirus products security tested before deployment because the technology across the board dangerously elevates attack surfaces, COSEINC researcher Joxean Koret says. COSEINC is a Singapore security outfit th... Read more

Source: go.theregister.com

Top found tags: cyber security(2),vulnerability(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Privacy groups call for action to stop Facebook's off site user tracking plansLocation: Facebook - Menlo Park, United States
Date published: 29-07-2014

U.S. and EU privacy and consumer groups called on privacy regulators to stop Facebooks plans to gather the Internet browsing patterns of its users while they visit other sites. The groups, gathered in the Transatlantic Consumer Dialogue (TACD) asked the U.S. Federal Trade Commission (FTC) and the... Read more

Source: www.pcworld.com

Top found tags: government(3),telecom sector(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Consumer Groups Urge FTC to Halt Facebook Data Collection ProgramLocation: Facebook - Menlo Park, United States
Date published: 29-07-2014

A collectionof privacy and consumer groups from the United States and Europe has asked the Federal Trade Commission to force Facebook to suspend a recently installed program that mines information on sites that users visit around the Web in order to serve them interest-based ads. The groups say... Read more

Source: threatpost.com

Top found tags: social media(2),government(3),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Americans' online privacy worries center on money -- and porn, a bitLocation: New York, United States
Date published: 29-07-2014

Matyszczyk/CNET If I were to consider running for president -- which I am still doing, however irrationally -- it's clear that the most promising platform is to be socially liberal and fiscally conservative. I fancy that Americans will never fall out of love with money. However, our attitudes toward... Read more

Source: cnet.com.ortal.com

Top found tags: financial sector(2),Google(2),Google Glass(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Many Antivirus Engines Plagued by Vulnerabilities: ResearcherLocation: ESET HQ - Bratislava, Slovak Republic
Date published: 29-07-2014

Several of the most popular antivirus products contain vulnerabilities that can be exploited locally or remotely, a security researcher revealed at the SyScan 360 security conference in Beijing earlier this month. Joxean Koret, a researcher at Singapore-based security company Coseinc, tested roughly... Read more

Source: securityweek.com

Top found tags: update(2),vulnerability(2),antivirus(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security researcher finds exploitable flaws in 14 antivirus enginesLocation: ESET HQ - Bratislava, Slovak Republic
Date published: 29-07-2014

Joxean Koret, a security researcher at Singapore-based consultancy COSEINC, has found exploitable local and remote flaws in 14 of the 17 major antivirus (AV) engines used by most major AV manufacturers. Security researcher finds exploitable flaws in 14 antivirus engines Security researcher finds exp... Read more

Source: www.scmagazineuk.com

Top found tags: cybercrime(3),antivirus(5),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese military hacked Israels Iron DomeLocation: Iron, United States
Date published: 29-07-2014

Police to replace ads with warnings on piracy sites 5. [IMG_78] Retina MacBook Pros get faster CPUs, more RAM, and a few price cuts Android crypto blunder exposes users to highly privileged malware Site Links About Us Advertise with us Contact Us Reprints Subscriptions Su... Read more

Source: arstechnica.com

Top found tags: privacy(1),RSS(1),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Instasheep: Coder builds tool to hijack Instagram accounts over Wi-FiLocation: Instagram - Menlo Park, United States
Date published: 29-07-2014

Sean Gallagher Stevie Graham, a London-based developer, recently submitted a bug report to Facebook outlining what he saw as a security vulnerability in Instagram that would allow someone to hijack a users session based on data captured over a public Wi-Fi network. When he was told that he wouldn... Read more

Source: arstechnica.com

Top found tags: update(2),social media(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Leahy Introduces Bill to End Bulk Call Record CollectionLocation: Lea, United States
Date published: 29-07-2014

Sen. Patrick Leahy has introduced an updated, tougher version of the USA FREEDOM Act that would end the bulk collection of data under Section 215 of FISA and also would require the appointment of a panel of special legal advocates who would represent the interests of individual privacy and civil lib... Read more

Source: threatpost.com

Top found tags: government(6),United States(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
70% of IoT Devices Vulnerable to Cyberattacks: HPLocation: Hewlett-Packard - Palo Alto, United States
Date published: 29-07-2014

A new "Internet of Things Security: State of the Union" study published by HP on Tuesday reveals that 70% of the most popular Internet of Things (IoT) devices contain serious vulnerabilities. The company used its HP Fortify on Demand application security testing service to check ten of the most comm... Read more

Source: securityweek.com

Top found tags: website(2),vulnerability(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Servers Still Not Safe from Heartbleed Attacks: VenafiLocation: New York, United States
Date published: 29-07-2014

Only 3 percent of external-facing servers in the world's largest companies have been fully protected from the Heartbleed vulnerability, researchers found. In a scan of external servers owned by the Global 2000 companies, 97 percent of the machines were still vulnerable to the OpenSSL flaw, Venafi sa... Read more

Source: securityweek.com

Top found tags: patch(2),update(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Accuvant taps Coca Cola CISO Guttmann as VPLocation: Coca Cola HQ - Atlanta, United States
Date published: 29-07-2014

Enterprise information security firm Accuvant has tapped former Coca-Cola Chief Information Security Officer (CISO) Renee Guttmann as a vice president in the company's Office of the CISO. Guttmann, who became CISO at Fortune 50 Coca Cola in January 2011, three years before a former employee stole un... Read more

Source: www.scmagazine.com

Top found tags: RSA(1),cyber security(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry to slurp encrypted mobile comms firm SecusmartLocation: BlackBerry HQ - Ontario, Canada
Date published: 29-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines BlackBerry has bought privately held German firm Secusmart as part of its drive to become the mobile handset provider of choice for security-conscious clients like government agencies and big businesses. Secusmart, which specialises in voice... Read more

Source: go.theregister.com

Top found tags: Germany(3),government(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senator pushes new version of bill to limit NSA phone records collectionLocation: Lea, United States
Date published: 29-07-2014

U.S. Senator Patrick Leahy has introduced a new version of a bill to rein in the National Security Agencys bulk collection of U.S. phone records in an effort to strengthen legislation that passed the House of Representatives this year. The new version of Leahys USA Freedom Act, introduced Tues... Read more

Source: www.pcworld.com

Top found tags: telecom sector(4),United States(6),government(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

DEF CON Hosting SOHO Wireless Router Hacking ContestLocation: DEF CON - Las Vegas, United States
Date published: 28-07-2014

Home and small office wireless routers are feature-rich networking devices, providing consumers and mom-and-pop shops with much more than an Internet gateway. Some, for example, have a print server function, while others store personal filesand very few are secure out of the box. Hackers and rese... Read more

Source: threatpost.com

Top found tags: vulnerability(2),Electronic Frontier Foundation(3),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Travel Agent Fined $255,000 for Data BreachLocation: Cook, United States
Date published: 29-07-2014

The U.K. Information Commissioner's Office (ICO) has fined the travel company Think W3 Ltd. 150,000 (approximately $255,000) for a data breach in December 2012, when a vulnerability on the website of Think W3 subsidiary Essential Travel was leveraged to steal 1,163,996 debit and credit card record... Read more

Source: www.esecurityplanet.com

Top found tags: financial sector(2),United Kingdom(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Bonsai and bouquet photographed in the stratosphereLocation: New York Times - New York, United States
Date published: 28-07-2014

least.Makoto Azuma Japanese artist Makoto Azuma moved to Tokyo in 1997 to start a rock band. While trying to get the group going, he worked as a trader in one of the city's biggest markets of flowers and ornamental plants. Soon, the band receded into the distance as Azuma became captivated by all th... Read more

Source: cnet.com.ortal.com

Top found tags: smartphone(1),social media(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware used to compromise payment cards at Wendy's restaurant in MichiganLocation: Michigan, United States
Date published: 28-07-2014

Customers who paid with credit and debit cards at the South State Street Wendy's in Big Rapids, Michigan may have had those payment cards compromised, according to a statement from local Wendy's franchisees that was emailed to SCMagazine.com on Monday. The perpetrator, which initial information sugg... Read more

Source: www.scmagazine.com

Top found tags: EN(1),report(1),Russia(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brit responsible for Biggest military hack of all time launches 40-an-hour SEO firmLocation: BBC HQ - London, United Kingdom
Date published: 28-07-2014

Brit responsible for Biggest military hack of all time launches 40-an-hour. SEO firm Former computer hacker Gary McKinnon has put a notorious extradition case behind him to reinvent his life as a search expert that charges 40-an-hour to help companies increase visibility. Related: Home Sec... Read more

Source: itproportal.com

Top found tags: website(1),United Kingdom(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Maps community competition falls foul of Indian regulationsLocation: Google HQ - Mountain View, United States
Date published: 29-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines The Chocolate Factory has found itself in hot water in India, with the country's Central Bureau of Investigation launching a formal investigation into Google Maps for allegedly publishing the location of sensitive locations. The problem aris... Read more

Source: go.theregister.com

Top found tags: Linux(1),police(1),survey(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critical Android FakeID Bug Allows Attackers to Impersonate Trusted AppsLocation: Google HQ - Mountain View, United States
Date published: 29-07-2014

There is a critical vulnerability in millions of Android devices that allows a malicious app to impersonate a trusted application in a transparent way, enabling an attacker to take a number of actions, including inserting malicious code into a legitimate app or even take complete control of an affec... Read more

Source: threatpost.com

Top found tags: NFC(2),telecom sector(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government pulls 50m grant for Tech City regenerationLocation: Londen, United Kingdom
Date published: 29-07-2014

Government pulls 50m grant for Tech City regeneration. The government has decided to pull the 50 million set aside for the regeneration of Old Street's Silicon Roundabout in East London. Following an interview with TechWorld in March, it was thought that the money was being held until City Hall ... Read more

Source: itproportal.com

Top found tags: EN(1),United Kingdom(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Francis Maude pushes for UK government to "go digital"Location: Silicon Valley, United States
Date published: 29-07-2014

Francis Maude pushes for UK government to "go digital". Minister for the Cabinet Office Francis Maude has re-emphasised the digital by default agenda. If it can be done online, it should be done online, and only online digital by default, he told delegates at the Reform Conference, T... Read more

Source: itproportal.com

Top found tags: social media(2),United Kingdom(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brit responsible for Biggest military hack of all time launches 40-an-hour SEO firmLocation: BBC HQ - London, United Kingdom
Date published: 28-07-2014

Brit responsible for Biggest military hack of all time launches 40-an-hour. SEO firm Former computer hacker Gary McKinnon has put a notorious extradition case behind him to reinvent his life as a search expert that charges 40-an-hour to help companies increase visibility. Related: Home Sec... Read more

Source: itproportal.com

Top found tags: website(1),United Kingdom(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Looking for business? The Scottish Government is seeking new IT framework suppliersLocation: Edinburgh, Scotland, United Kingdom
Date published: 28-07-2014

Looking for business? The Scottish Government is seeking new IT framework. suppliers The Scottish Government will be seeking suppliers to provide it with a framework for the delivery managed IT services. According to a prior information notice published in the Official Journal of the European Union ... Read more

Source: itproportal.com

Top found tags: website(1),EU(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry acquires Secusmart, ups voice security anteLocation: BlackBerry HQ - Ontario, Canada
Date published: 29-07-2014

down on the enterprise as well as mobile security. Six good reasons to still consider a BlackBerry 10 smartphone Six good reasons to still consider a BlackBerry 10 smartphone The two companies have been partners since 2009. The plan is for Secusmart, known recently for its anti-eavesdropping softwar... Read more

Source: www.zdnet.com

Top found tags: Germany(4),mobile device(6),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry buffs up security credentials with Secusmart dealLocation: BlackBerry HQ - Ontario, Canada
Date published: 29-07-2014

NEW YORK (Reuters) - BlackBerry Ltd (BBRY.O) (BB.TO) is buying a privately held German firm that specializes in voice and data encryption, it said on Tuesday, in a bid to burnish its credentials with highly security-conscious clients like government agencies. The Waterloo, Ontario-based smartphon... Read more

Source: reuters.com

Top found tags: Germany(4),mobile device(6),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry ups mobile security ante with Secusmart buyLocation: BlackBerry HQ - Ontario, Canada
Date published: 29-07-2014

NEW YORK -- BlackBerry said Tuesday that it will acquire Secusmart, a German mobile security company. The purchase highlights how BlackBerry is doubling down on the enterprise as well as mobile security. The two companies have been partners since 2009. The plan is for Secusmart, known recently for i... Read more

Source: cnet.com.ortal.com

Top found tags: Germany(4),mobile device(6),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government pulls 50m grant for Tech City regenerationLocation: Londen, United Kingdom
Date published: 29-07-2014

Government pulls 50m grant for Tech City regeneration. The government has decided to pull the 50 million set aside for the regeneration of Old Street's Silicon Roundabout in East London. Following an interview with TechWorld in March, it was thought that the money was being held until City Hall ... Read more

Source: itproportal.com

Top found tags: EN(1),United Kingdom(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Francis Maude pushes for UK government to "go digital"Location: Silicon Valley, United States
Date published: 29-07-2014

Francis Maude pushes for UK government to "go digital". Minister for the Cabinet Office Francis Maude has re-emphasised the digital by default agenda. If it can be done online, it should be done online, and only online digital by default, he told delegates at the Reform Conference, T... Read more

Source: itproportal.com

Top found tags: social media(2),United Kingdom(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malicious Utility Can Defeat Windows PatchGuardLocation: Microsoft HQ - Redmond, United States
Date published: 29-07-2014

In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at the kernel level to bypass Microsofts security for 64-bit Windows systems. Today a small utility program named KPP-Destroyer can be found online. FP_BLOG_140728_1 Previous versions of KP... Read more

Source: blogs.mcafee.com

Top found tags: patch(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICO fines U.K. travel firm 150,000 for 2012 breachLocation: New York, United States
Date published: 29-07-2014

What's the price for leaking information on more than one million credit cards? For one U.K. travel company, the answer is a 150,000-fine more than $250,000 imposed by the Information Commissioner's Office. According to the ICO, Think W3 Limited violated the country's Data Protection Act a... Read more

Source: www.scmagazine.com

Top found tags: credit card(2),financial sector(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

'Chinese staatshackers stalen gevoelige info Isralisch defensiesysteem'Location: Tel Aviv, Israel
Date published: 29-07-2014

Hackers zouden tussen 2011 en 2012 zijn binnengedrongen bij bedrijven die werkten aan technologie voor het Israelische defensieprogramma 'Iron Dome', die het land moet beschermen tegen raketaanvallen. De hackers zouden grote hoeveelheden documenten hebben gestolen. De aanvallen vonden plaats tussen ... Read more

Source: tweakers.net

Top found tags: China(2),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Nieuwe Windows-installatie niet altijd nodig bij besmette pc"Location: Microsoft HQ - Redmond, United States
Date published: 29-07-2014

Het is niet altijd nodig om bij een besmette computer Windows opnieuw te installeren, zoals experts vaak aanraden. Dat stelt het Duitse testorgaan AV-Test.org na een uitgebreide test van 17 anti-viruspakketten en verwijdertools, waarbij er werd gekeken hoe goed de software malware kan verwijderen. I... Read more

Source: www.security.nl

Top found tags: cybercrime(2),Kaspersky Lab(2),antivirus(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Nieuwe Windows-installatie niet altijd nodig bij besmette pc"Location: Microsoft HQ - Redmond, United States
Date published: 29-07-2014

Het is niet altijd nodig om bij een besmette computer Windows opnieuw te installeren, zoals experts vaak aanraden. Dat stelt het Duitse testorgaan AV-Test.org na een uitgebreide test van 17 anti-viruspakketten en verwijdertools, waarbij er werd gekeken hoe goed de software malware kan verwijderen. I... Read more

Source: www.security.nl

Top found tags: cybercrime(2),Kaspersky Lab(2),antivirus(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Waarschuwingssysteem voor cyberaanvallen ontwikkeldLocation: Forest, United States
Date published: 29-07-2014

Wetenschappers van het Amerikaanse Georgia Tech Research Institute (GTRI) hebben een opensource-informatiesysteem ontwikkeld dat informatie van cybecrimefora verzamelt en experts in een vroeg stadium voor cyberaanvallen kan waarschuwen die nog moeten plaatsvinden. Het systeem heet BlackForest en ver... Read more

Source: www.security.nl

Top found tags: social media(2),United States(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Instagram-accounts nog steeds te kapen via open wifi-netwerkLocation: Instagram - Menlo Park, United States
Date published: 29-07-2014

Een lek in de populaire fotodienst Instagram dat al anderhalf jaar bekend is, is nog steeds aanwezig, waardoor een aanvaller de accounts van gebruikers die de Instagram-app op hun iPhone of iPad hebben genstalleerd kan kapen. De Instagram app op iOS blijkt sessiecookies onversleuteld uit te wissel... Read more

Source: www.security.nl

Top found tags: mobile device(4),social media(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Consumentengroepen tegen trackingplannen FacebookLocation: Facebook - Menlo Park, United States
Date published: 29-07-2014

Een coalitie van Europese en Amerikaanse consumentengroepen heeft een brief naar Amerikaanse en Ierse toezichthouders gestuurd waarin ze oproepen om het plan van Facebook, om het surfgedrag van gebruikers op te slaan en zo gerichte advertenties te kunnen tonen, te stoppen. De brief is afkomstig van ... Read more

Source: www.security.nl

Top found tags: social media(2),government(4),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Instagram-accounts nog steeds te kapen via open wifi-netwerkLocation: Instagram - Menlo Park, United States
Date published: 29-07-2014

Een lek in de populaire fotodienst Instagram dat al anderhalf jaar bekend is, is nog steeds aanwezig, waardoor een aanvaller de accounts van gebruikers die de Instagram-app op hun iPhone of iPad hebben genstalleerd kan kapen. De Instagram app op iOS blijkt sessiecookies onversleuteld uit te wissel... Read more

Source: www.security.nl

Top found tags: mobile device(4),social media(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HP hekelt veiligheid Internet of Things-apparatenLocation: Hewlett-Packard - Palo Alto, United States
Date published: 29-07-2014

De beveiliging van Internet of Things (IoT)-apparaten laat ernstig te wensen over, zo stelt computergigant HP aan de hand van een onderzoek waarbij 10 apparaten en bijbehorende applicaties werden onderzocht. Het zou om de "tien populairste" IoT-apparaten van het moment gaan. Om wat voor apparaten he... Read more

Source: www.security.nl

Top found tags: cyber security(2),encryption(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Duitsland koopt 20.000 crypto-telefoons wegens afluisterenLocation: Berlin, Germany
Date published: 29-07-2014

De Duitse overheid gaat 20.000 cryptotelefoons kopen om zo het afluisteren door buitenlandse inlichtingendiensten te dwarsbomen. Dat blijkt uit een vertrouwelijk document waar de Duitse krant Bild over schrijft, zo meldt de Duitse media. De telefoons worden door BlackBerry geproduceerd. Met een bedr... Read more

Source: www.security.nl

Top found tags: telecom sector(2),Germany(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Britse politie neemt telefoons niet bij elk ongeluk in beslagLocation: Den Haag, The Netherlands
Date published: 29-07-2014

De Britse politie zal niet bij elk auto-ongeluk de mobiele telefoon van bestuurders in beslag nemen om de surfgeschiedenis of verstuurde WhatsApp-berichten te controleren, zoals dit weekend in de Britse media werd beweerd. Dat laat politiecommissaris Suzette Davenport in een verklaring weten. "Ik he... Read more

Source: www.security.nl

Top found tags: social media(2),telecom sector(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nep-Microsoftmedewerkers krijgen boete van 5,1 miljoen dollarLocation: Microsoft HQ - Redmond, United States
Date published: 29-07-2014

Veertien bedrijven en veertien personen die zich als medewerker van Microsoft en andere computerbedrijven voordeden en mensen thuis belden dat ze problemen met hun computer hadden, hebben in de Verenigde Staten een boete van bij elkaar 5,1 miljoen dollar gekregen. Bij de telefoonscams worden mensen ... Read more

Source: www.security.nl

Top found tags: antivirus(2),government(2),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Expert: opensource niet inherent veiliger dan gesloten softwareLocation: Amsterdam, The Netherlands
Date published: 29-07-2014

Veel mensen denken dat opensourcesoftware inherent veiliger dan gesloten software is, maar volgens beveiligingsexpert Robert Graham is dit niet waar. Graham stelt dat mensen opensource voornamelijk vertrouwen omdat ze kunnen controleren of de code geen bugs of lekken bevat. En als ze het niet zelf k... Read more

Source: www.security.nl

Top found tags: OpenSSL(2),telecom sector(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor komt met "meldpunt" voor kwaadaardige relaysLocation: Amsterdam, The Netherlands
Date published: 29-07-2014

Het Tor Project heeft een pagina online geplaatst waarin wordt uitgelegd hoe gebruikers van het netwerk kwaadaardige, verkeerd ingestelde of andere defecte relays kunnen melden. Via het Tor-netwerk kunnen internetgebruikers hun IP-adres verbergen, wat de anonimiteit online kan beschermen. Het Tor-ne... Read more

Source: www.security.nl

Top found tags: e-mail(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Duitsland koopt 20.000 crypto-telefoons wegens afluisterenLocation: Berlin, Germany
Date published: 29-07-2014

De Duitse overheid gaat 20.000 cryptotelefoons kopen om zo het afluisteren door buitenlandse inlichtingendiensten te dwarsbomen. Dat blijkt uit een vertrouwelijk document waar de Duitse krant Bild over schrijft, zo meldt de Duitse media. De telefoons worden door BlackBerry geproduceerd. Met een bedr... Read more

Source: www.security.nl

Top found tags: telecom sector(2),Germany(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Britse politie neemt telefoons niet bij elk ongeluk in beslagLocation: Den Haag, The Netherlands
Date published: 29-07-2014

De Britse politie zal niet bij elk auto-ongeluk de mobiele telefoon van bestuurders in beslag nemen om de surfgeschiedenis of verstuurde WhatsApp-berichten te controleren, zoals dit weekend in de Britse media werd beweerd. Dat laat politiecommissaris Suzette Davenport in een verklaring weten. "Ik he... Read more

Source: www.security.nl

Top found tags: social media(2),telecom sector(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China Confirms Microsoft Probe for 'Monopoly' ActionsLocation: Microsoft HQ - Redmond, United States
Date published: 29-07-2014

SHANGHAI - China is investigating Microsoft for allegedly operating a monopoly in its market, the government said Tuesday, as it took aim at the US software giant over business practices. The move makes the company the latest foreign firm to face Beijing's scrutiny, in fields ranging from computing ... Read more

Source: securityweek.com

Top found tags: United States(2),government(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android-lek laat malware kwaadaardige code in apps injecterenLocation: Google HQ - Mountain View, United States
Date published: 29-07-2014

Een beveiligingslek dat in de meeste versies van Android aanwezig is maakt het mogelijk voor malware om kwaadaardige code in allerlei apps te injecteren, waardoor aanvallers gevoelige gegevens kunnen stelen en het toestel zelfs kunnen overnemen, zo waarschuwt beveiligingsbedrijf BlueBox. Het problee... Read more

Source: www.security.nl

Top found tags: SSL(1),website(1),conference(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Zeer veilig besturingssysteem seL4 gaat opensourceLocation: Amsterdam, The Netherlands
Date published: 29-07-2014

Een besturingssysteem dat volgens de ontwikkelaars tot n van de veiligste ter wereld behoort gaat verder als opensourcesoftware. Dat hebben het Australische NICTA en General Dynamics C4 Systems laten weten. Het besturingssysteem in kwestie is de secure embedded L4 (seL4) microkernel. Het zou de ... Read more

Source: www.security.nl

Top found tags: BYOD(1),NL(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid in HP Storage Data Protector ontdektLocation: Hewlett-Packard - Palo Alto, United States
Date published: 29-07-2014

Samenvatting: Het Zero Day Initiative (ZDI) heeft een kwetsbaarheid ontdekt in HP Data Protector. Gevolgen: Door deze kwetsbaarheid te misbruiken kan een ongeauthenticeerde kwaadwillende via het netwerk een directory traversal uitvoeren die kan leiden tot het aanmaken van een willekeurig bestand. Be... Read more

Source: www.ncsc.nl

Top found tags: NL(1),patch(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish