Under construction

New design coming soon!

CIC News engine statistics

CIC News for 30-07-2014 contains 140 articles: cybercrime(36),cyber security(44),data breach(18),other(42)

CIC News update contains 108 English and 32 Dutch articles for today.
There are 5 published advisories, 1 are English and 4 are Dutch.
In today's English news articles:
- 29 related to cybercrime
- 38 related to cyber security
- 18 related to data breach and identity theft
- 23 for the category other news

In today's Dutch news articles:
- 7 related to cybercrime
- 6 related to cyber security
- 19 for the category other news

Have fun reading.

English cybercrime related news

Google fixes Android's Fake ID security holeLocation: Google HQ - Mountain View, United States
Date published: 29-07-2014

security hole that dates all the way back to Android 2.1. This hole, Fake ID, can be used by malware to impersonate trusted applications without any user notification. Android Fake ID IconThe Android Fake ID security hole has been patched, but it still poses a potential threat. Can you say bad news?... Read more

Source: www.zdnet.com

Top found tags: update(2),vulnerability(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vulnerabilities in Alipay Android App FixedLocation: Google HQ - Mountain View, United States
Date published: 29-07-2014

Alipay is a popular third-party payment platform in China that is operated by Alibaba, one of the biggest Internet companies in China. We recently found two vulnerabilities in their Android app that could be exploited by an attacker to carry out phishing attacks to steal Alipay credentials. Alipay... Read more

Source: trendmicro.com

Top found tags: update(2),vulnerability(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Golden Rule Of The Internet- Tips To Help You Train Your Kids To Become Good NetizensLocation: New York, United States
Date published: 29-07-2014

There are rules and then there are rules for kids. A set of rules for school, another defined set at games, and a complete set of unwritten rules at home. But there is one field that our kids traverse almost daily, spending hours there at their own free will, mostly unsupervisedthe cyber world. Y... Read more

Source: blogs.mcafee.com

Top found tags: threat(1),cybercrime(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: Hackers stole data from Israeli defense firmsLocation: Tel Aviv, Israel
Date published: 29-07-2014

According to a recent report by security journalist Brian Krebs, hackers, believed to be based in China, stole intellectual property related to Israel's defense sector. On Monday, Krebs revealed on his website that three firms Elisra Group, Israel Aerospace Industries and Rafael Advanced Defense... Read more

Source: www.scmagazine.com

Top found tags: website(1),cyber espionage(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Neverquest trojan targets regional banks in JapanLocation: Tokio, Japan
Date published: 29-07-2014

Fraudsters using financial malware called Neverquest have now set their sights on several regional banks in Japan, according to researchers. In a Monday blog post, Symantec's security team revealed that a new variant of the banking trojan was in use, and as predicted, the threat had been updat... Read more

Source: www.scmagazine.com

Top found tags: trojan(2),United Kingdom(2),financial sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IG scolds NOAA on security deficiencies, recommends fixesLocation: Microsoft HQ - Redmond, United States
Date published: 29-07-2014

IG scolds NOAA on security deficiencies, recommends fixes An audit of NOAA found security shortcomings, including the link between information systems and satellite systems. The security climate is in need of change at the National Oceanic and Atmospheric Administration (NOAA) after a report from th... Read more

Source: www.scmagazine.com

Top found tags: vulnerability(2),Department of Commerce(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Canada Says China Hacked Science Agency ComputersLocation: Beijing, China
Date published: 30-07-2014

OTTAWA - Canada accused China on Tuesday of hacking into the computers of its research and development arm, which Beijing strongly denied. China partners each year with thousands of Canadians firms to roll out new technologies, and took advantage of this arrangement to engage in a cyber attack, Otta... Read more

Source: securityweek.com

Top found tags: cyber espionage(2),cybercrime(3),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Qualys Enhances Continuous Monitoring ServicesLocation: Gartner - Stamford, United States
Date published: 30-07-2014

Qualys, a provider of cloud-based security and compliance solutions, announced enhancements to its cloud service Qualys Continuous Monitoring (CM) solution this week. New features in the offering include automated alerts for changes in perimeter IP addresses, as well as a new API interface that enab... Read more

Source: securityweek.com

Top found tags: ISP(1),threat(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firm issues soft denial against Iron Dome hackLocation: Tel Aviv, Israel
Date published: 30-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines An Israeli defence firm linked to Israel's Iron Dome missile defence platform has denied reports it was hacked by Chinese attackers who made off with information on the military technology. Israel Aerospace Industries (IAI) spokeswoman Elian... Read more

Source: go.theregister.com

Top found tags: report(1),cybercrime(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDOS takes down Cirrus CommunicationsLocation: New York, United States
Date published: 30-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Fixed wireless broadband provider Cirrus Communications has experienced a distributed denial of service (DDOS) attack that incapacitated half its network. Cirrus provides wireless networks to business, apartment complexes, residential colleg... Read more

Source: go.theregister.com

Top found tags: Linux(1),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Thwarted dev sets Instasheep to graze on Facebook accountsLocation: Instagram - Menlo Park, United States
Date published: 30-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines London developer Stevie Graham has built an Instagram stealer dubbed Instasheep that can hijack accounts over public networks. Graham (@stevegraham) published Instasheep - a play on the 2010 Facebook stealer Firesheep - after claiming Facebo... Read more

Source: go.theregister.com

Top found tags: report(1),spam(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Few UK smartphone users realise the value of basic handset securityLocation: New York, United States
Date published: 30-07-2014

Few UK smartphone users realise the value of basic handset security. Smartphone users in the UK are failing to act on the security front, and leaving themselves more vulnerable to fraud as a result. This is according to a new survey from phone comparison site TigerMobiles.com, which quizzed almost 5... Read more

Source: itproportal.com

Top found tags: smartphone(2),United Kingdom(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attackers install DDoS bots on Amazon cloud, exploiting Elasticsearch weaknessLocation: Kaspersky HQ - Moscow, Russia
Date published: 28-07-2014

Attackers are exploiting a vulnerability in distributed search engine software Elasticsearch to install DDoS malware on Amazon and possibly other cloud servers.Elasticsearch is an increasingly popular open-source search engine server developed in Java that allows applications to perform full-text se... Read more

Source: www.pcworld.com

Top found tags: United States(2),cybercrime(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDOS attacks are leveraging the cloudLocation: Prolexic - Hollywood, United States
Date published: 28-07-2014

The latest quarterly report on distributed denial of service attacks by Prolexic finds that this years DDOS attacks are packing more of a punch.The attacks during Q2 2014 were shorter but used more bandwidth and delivered more packets than during the same period last year. This is due, at least i... Read more

Source: gcn.com

Top found tags: government(2),Microsoft(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber insecurity on the high seas threatens international shippingLocation: Oxford, United Kingdom
Date published: 28-07-2014

The threat to global shipping in the future may not be pirates or terrorists, but hackers people accessing shipboard systems via computers, either on the ship or thousands of miles away on dry land.That was the message that came out of an afternoon seminar aboard the HQS Wellington, a former con... Read more

Source: www.securitynewsdesk.com

Top found tags: threat(1),financial sector(2),New Zealand(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime Delves Into Google MapsLocation: Google HQ - Mountain View, United States
Date published: 30-07-2014

Google is a multinational company based in America, which specializes in various internet products and services that have become the most sought after medium for the basic assistance in the web, including information gathering, maps, recommended destinations and a lot more. It was supposed to help p... Read more

Source: www.streetwisetech.com

Top found tags: cybercrime(2),financial sector(2),information gathering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian Citizen Seleznevs Cybercrime Hearing in Guam Postponed Due to WeatherLocation: Moscow, Russia
Date published: 30-07-2014

MOSCOW, July 30 (RIA Novosti) - Russian citizen Roman Seleznevs court hearing on the island of Guam has been rescheduled due to bad weather, the courts representatives said Wednesday.The court is closed because of a storm. A new trial date has not yet been announced.Seleznev is charged with fr... Read more

Source: en.ria.ru

Top found tags: financial sector(2),Supreme Court(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Koler police mobile ransomware now targets PCs as well as Android - Kaspersky LabLocation: Kaspersky HQ - Moscow, Russia
Date published: 28-07-2014

Kaspersky Lab has detected a hidden part of the malicious campaign which introduced Koler police mobile ransomware for Android devices to the world in April 2014. This part includes some browser-based ransomware and an exploit kit. Since July 23 the mobile component of the campaign has been di... Read more

Source: www.information-age.com

Top found tags: exploit kit(4),Kaspersky Lab(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
7 serious smart meter security threats that do NOT involve hacking the networkLocation: New York, United States
Date published: 29-07-2014

When we think about smart meter security, we typically think of hackers who crack the network to get access to smart meters. Yes, that's a significant risk, but there's much more to it than that. Kris Ardis is Executive Director for Energy Products at Maxim Integrated. In this first installment of a... Read more

Source: www.smartgridnews.com

Top found tags: smart grid(2),smart meter(2),energy(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Smart Meters May Provide An Entrance Point for Cyber Attacks on the Connected HomeLocation: Trend Micro - Cupertino, United States
Date published: 29-07-2014

Adoption of Internet-enabled Smart Meters is growing, and the meters may be intrinsic to future widespread efforts to connect a home to the Smart Grid and enable efficient home energy use. But cyber security solutions provider Trend Micro says smart meters offer a pathway for cyber criminals to acce... Read more

Source: www.appliancemagazine.com

Top found tags: Trend Micro(2),United States(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Georgia Tech launches early warning system for cyberthreatsLocation: Forest, United States
Date published: 28-07-2014

Called BlackForest, the system can provide early warnings for distributed denial-of-service attacks or the latest malware variations under development. Georgia Institute of Technology's applied research arm has launched an early warning system to help organizations prepare for possible cyberattacks.... Read more

Source: www.csoonline.com

Top found tags: phishing(2),Georgia Institute of Technology(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
TROJAN SNIFULA IS GAINING GROUND ON JAPANESE BANKSLocation: Tokio, Japan
Date published: 29-07-2014

The range of victims is growing, according to Symantec.The Snifula trojan is targeting more than 30 financial groups in Japan, including 12 regional banks, according to security firm Symantec.Hackers are now using the malware to conduct man in the browser attacks to steal financial data from smaller... Read more

Source: www.cbronline.com

Top found tags: United Kingdom(2),cybercrime(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Purge' incidents sexually exploit local teensLocation: Williams, United States
Date published: 29-07-2014

COLLIER COUNTY, Fla. - WINK News has new information about a frightening social media trend that's sexually exploiting children in Collier County. Detectives say teenagers are posting naked pictures of other teens on Instagram. Some of the girls are so distraught, some of them have talked about suic... Read more

Source: www.winknews.com

Top found tags: cybercrime(3),pornography(3),child pornography(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CYBER SECURITY AND HACKTIVISM IN LATIN AMERICA: PAST AND FUTURE ANALYSISLocation: Caribbean
Date published: 28-07-2014

Along with the opportunities brought by the proliferation of the personal computer and societal penetration of the Internet across the world, came the enormous increase of cyber crime a global evil that impacted an estimated 556 million victims in 2012. [1] Cyber crime has most commonly manifest... Read more

Source: www.eurasiareview.com

Top found tags: government(2),telecom sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firms team up to beat cyber criminalsLocation: Preston, United States
Date published: 29-07-2014

Preston-based accountants and business advisors WNJ has teamed up with security experts at Sanitas Data Security to highlight the many and growing threats and to underline what action companies can take to protect themselves.Cyber criminals are coming up with increasing numbers of ways to gain a... Read more

Source: www.lep.co.uk

Top found tags: spam(1),threat(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Computacenter examines security cycle to help organisations prevent cyber crimeLocation: Center for Strategic and International Studies - Washington, United States
Date published: 29-07-2014

London, United Kingdom WEBWIRE Tuesday, July 29, 2014According to Computacenter, organisations must understand the true end-to-end visibility of the security cycle to prevent cyber crime, whereby organisations must detect, block, and remediate risks faster than ever. It has been noted by the... Read more

Source: www.webwire.com

Top found tags: threat(1),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FIRST CYBER SECURITY LAB UNVEILEDLocation: Lusaka, Zambia
Date published: 30-07-2014

VISITING International Telecommunications Union (ITU) deputy secretary-general Houlin Zhao has launched the first-ever cyber security laboratory in Zambia, which will enable law-enforcement agencies to combat Information Communication Technology (ICT)-related crimes.The laboratory is based at the Za... Read more

Source: www.times.co.zm

Top found tags: legislation(1),training(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
South Africa: Government Tackles Crime HolisticallyLocation: Cape Town, West-Kaap, South Africa
Date published: 30-07-2014

Pretoria Police Minister Nkosinathi Nhleko says government is working towards fighting crime from a different angle, one that takes into account societal issues, which have a ripple effect that influence the spread and intensity of crime.Tabling his Budget Vote at the National Council of Provinc... Read more

Source: allafrica.com

Top found tags: South Africa(2),cybercrime(3),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Your iPhone Can Finally Make Free, Encrypted CallsLocation: Google HQ - Mountain View, United States
Date published: 29-07-2014

signal The encrypted calling app Signal. The two seemingly random words beneath the contacts name are meant to be read out at the beginning of a conversation to make sure no man-in-the-middle snoop has eavesdropped on the call. [gallery-il] WIRED If youre making a phone call with your iPhone, ... Read more

Source: wired.com

Top found tags: social media(4),United States(4),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NOAA, Satellite Data, Fraught With VulnerabilitiesLocation: U.S. Department of Commerce - Washington, United States
Date published: 29-07-2014

The informational systems that the National Oceanic and Atmospheric Administration (NOAA) run are fraught with vulnerabilities and what the U.S. Department of Commerce deems significant security deficiencies that could leave it vulnerable to cyber attacks. Thats according to the findings of... Read more

Source: threatpost.com

Top found tags: government(6),telecom sector(6),United States(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Signal App Brings Encrypted Calling to iPhoneLocation: Apple HQ - Cupertino, United States
Date published: 29-07-2014

iPhone users concerned about government surveillance efforts putting unencrypted calls at risk now have a free app at their disposal that brings secure communication to the Apple phone. Open WhisperSystems, developers of RedPhone for Android, have developed a similar app for iPhone called Signal, wh... Read more

Source: threatpost.com

Top found tags: government(2),mobile device(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Protection Scheme Makes Weak Passwords Virtually UncrackableLocation: New York, United States
Date published: 29-07-2014

A team of researchers at the New York University Polytechnic School of Engineering say they have found a way to help organizations better protect passwords. Using an open-source password protection scheme they dubbed PolyPasswordHasher, the researchers believe they can make it much more difficult fo... Read more

Source: securityweek.com

Top found tags: password(1),research(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Are Your Kids Using Decoy Apps to Hide Photos, Videos?Location: Page, United States
Date published: 29-07-2014

3Wouldnt it be convenientif the dangers heading toward our kids had neon signs pointing to them? Unfortunately, thats not the way things work and, more often than not, the dangers are camouflaged, sometimes intentionally. While its normal for kids to have secrets, when you add technology ... Read more

Source: blogs.mcafee.com

Top found tags: cyber security(2),mobile device(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HP tests 10 popular IoT devices, most raise privacy concernsLocation: Hewlett-Packard - Palo Alto, United States
Date published: 29-07-2014

Talk stresses IoT concerns as today's problems HP Fortify tested 10 popular Internet of Things (IoT) devices, including TVs, webcams, home alarms. A security scan of 10 popular Internet of Things (IoT) devices revealed that a number of issues, including unencrypted communications and inadequate auth... Read more

Source: www.scmagazine.com

Top found tags: United States(2),vulnerability(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry Buys German Anti-Eavesdropping FirmLocation: Berlin, Germany
Date published: 30-07-2014

OTTAWA - Canadian smartphone maker BlackBerry announced Tuesday the purchase of German voice and data encryption and anti-eavesdropping firm Secusmart, whose customers include NATO and German Chancellor Angela Merkel and her government. Financial details of the transaction, which is subject to regul... Read more

Source: securityweek.com

Top found tags: United States(4),government(5),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senate introduces USA FREEDOM Act to curb NSA spying excessesLocation: New York, United States
Date published: 29-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Senator Patrick Leahy (D-VT) has introduced the USA FREEDOM Act to the Senate and claims, that, if passed, the legislation will severely curtail the amount of mass surveillance that can be carried out by the NSA and others provided you'r... Read more

Source: go.theregister.com

Top found tags: cyber security(2),legislation(2),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft, Akamai launch security startup accelerator in IsraelLocation: Akamai - Boston, United States
Date published: 30-07-2014

venture capital firm Jerusalem Venture Partners JVP. The program, which is located at the Microsoft Ventures Accelerator in Tel Aviv, is aimed at providing security startups with mentorship and market expertise, helping them to accelerate their business and "create breakthroughs in cybersecurity", a... Read more

Source: www.zdnet.com

Top found tags: threat(1),Akamai(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Things' on the Internet-of-things have 25 vulnerabilities apieceLocation: Hewlett-Packard - Palo Alto, United States
Date published: 30-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Ten of the most popular Internet of Things devices contain an average of 25 security vulnerabilities, many severe, HP researchers have found. HP's investigators found 250 vulnerabilities across the Internet of Things (IoT) devices each of wh... Read more

Source: go.theregister.com

Top found tags: financial sector(2),vulnerability(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Keep your iPhone calls private, whispers SignalLocation: Apple HQ - Cupertino, United States
Date published: 30-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines The crew at Open Whisper Systems has announced Signal, an app offering encrypted voice calls between iPhones. The open source group has been working on its projects ever since Whisper Systems, co-founded by Moxie Marlinspike, was acquired by... Read more

Source: go.theregister.com

Top found tags: social media(2),cyber security(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Connected devices have huge security holesLocation: New York, United States
Date published: 30-07-2014

By AAP July 30, 2014 -- 08:06 GMT (09:06 BST) A study by the Hewlett-Packard security unit Fortify found 70 per cent of the most commonly used "Internet of Things" devices contain vulnerabilities, including inadequate passwords or encryption, or lax access restrictions. "While the Internet of Things... Read more

Source: www.zdnet.com

Top found tags: financial sector(2),United States(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Accuvant Hires Former Coca-Cola CISOLocation: Clark, United States
Date published: 30-07-2014

Accuvant, a Denver-based company that provides solutions and services to help clients develop and manage security programs, announced on Tuesday that former Coca-Cola chief information security officer (CISO) Renee Guttmann has joined the company as a vice president in the Accuvant Office of the CIS... Read more

Source: securityweek.com

Top found tags: privacy(1),information security(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
At a million a month, Keith Alexander's post-NSA career looks promisingLocation: Keith, United States
Date published: 29-07-2014

At a million a month, Keith Alexander's post-NSA career looks promising At a million a month, Keith Alexander's post-NSA career looks promising Offering his expertise to major corporations who need help protecting their networks from hackers, recently retired NSA director, Keith Alexander's vast exp... Read more

Source: www.scmagazineuk.com

Top found tags: cybercrime(4),cyber security(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA Surveillance Programs Directly Damage Internet Security: ReportLocation: National Security Agency - Fort Meade, United States
Date published: 30-07-2014

The NSA has both weakened overall trust in the network and directly harmed the security of the Internet. A report published by the New America Foundations Open Technology Institute on Tuesday details the impact of NSA surveillance activities on the United Sates economy, foreign policy and I... Read more

Source: securityweek.com

Top found tags: government(5),cyber security(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
House Passes Bipartisan Legislation to Protect Critical Infrastructure from Cyber AttackLocation: Rankin, United States
Date published: 28-07-2014

Today, the U.S. House of Representatives overwhelmingly passed H.R. 3696, H.R. 2952, and H.R. 3107 - bipartisan legislation to strengthen efforts to combat cyber attacks on our critical infrastructure through the distribution of cyber threat information, the development and procurement of new techno... Read more

Source: homeland.house.gov

Top found tags: United States(6),government(7),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NACD, AIG, ISA and DHS Announce New Effort to Enhance Corporate Boards' Cybersecurity OversightLocation: National Institute of Standards - Gaithersburg, United States
Date published: 29-07-2014

WASHINGTON, Jul 29, 2014 (GLOBE NEWSWIRE via COMTEX) --Today, the National Association of Corporate Directors (NACD) , American International Group (AIG) , the Internet Security Alliance (ISA) and the Department of Homeland Securit y (DHS)announced at the National Press Club the availability of the ... Read more

Source: www.marketwatch.com

Top found tags: United States(2),cyber security(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HOUSE APPROVES STRONGER CYBER PROTECTIONS FOR CRITICAL INFRASTRUCTURELocation: Neiman Marcus - Dallas, United States
Date published: 29-07-2014

Two bills to strengthen cybersecurity in the systems that underlie the nations energy, water and food supplies passed the House on Monday evening, along with a measure to improve the federal government's cyber workforce.A bill (H.R. 3696) introduced by Rep. Michael McCaul, R-Texas, seeks to stren... Read more

Source: www.nextgov.com

Top found tags: DHS(4),United States(4),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why Switching From Signatures To PINs Won't Stop Credit Card FraudLocation: New York, United States
Date published: 30-07-2014

From this Friday, Australian credit card holders wont be able to use a signature for in-store transactions; youll only be able to use a PIN. While thats an improvement in security, it doesnt mean the end of credit card fraud and it shifts more of the onus to individuals rather than b... Read more

Source: www.lifehacker.com.au

Top found tags: information security(2),telecom sector(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers seed Amazon cloud with potent denial-of-service botsLocation: Kaspersky HQ - Moscow, Russia
Date published: 28-07-2014

Attackers have figured out a new way to get Amazon's cloud service to wage potent denial-of-service attacks on third-party websitesby exploiting security vulnerabilities in an open source search and analytics application known as Elasticsearch.The power of Backdoor.Linux.Ganiw.a was documented ea... Read more

Source: arstechnica.com

Top found tags: antivirus(3),Kaspersky Lab(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime: Growing globally though less than 1% of GDPLocation: Center for Strategic and International Studies - Washington, United States
Date published: 28-07-2014

Online attacks drain less than 1 per cent from the nations economy, but experts say the trend is going in the wrong direction and most companies arent implementing even basic measures to stop it.The annual cost of cybercrime is either staggering, or a mere blip on the worlds economic bo... Read more

Source: dailyindependentnig.com

Top found tags: cybercrime(4),United States(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Banks as Cybercrime Fighters?Location: New York, United States
Date published: 29-07-2014

Karl Schimmeck of the Securities Industry and Financial Markets Association won't discuss reports about the group's alleged backing of the formation of a cyberwar council, but says financial institutions must play a role in protecting critical infrastructure.C-level executives at financial instituti... Read more

Source: www.bankinfosecurity.com

Top found tags: government(5),financial sector(6),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Dawn of Government-Grade Cybercrime: GygesLocation: Microsoft HQ - Redmond, United States
Date published: 29-07-2014

Gyges, a malware currently being used for cybercrime purposes, was found in the wild in March 2014. Believed to have originated in Russia, its stealth techniques suggest that it was developed originally for use in government espionage programs. Such reuse constitutes a step-up in cybercrime sophisti... Read more

Source: www.cyactive.com

Top found tags: cyber security(2),government(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime among top global risks WEFLocation: Center for Strategic and International Studies - Washington, United States
Date published: 29-07-2014

MANILA, Philippines - The World Economic Forum (WEF) has raised cybercrime as among the major global risks within the decade, aside from unemployment/underemployment, and extreme weather conditions.Increasing reliance on the Internet and the explosive growth in devices that are connected to it has i... Read more

Source: www.philstar.com

Top found tags: government(3),financial sector(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Commerce IG finds weather satellite ground systems vulnerable to cyber attacksLocation: Microsoft HQ - Redmond, United States
Date published: 28-07-2014

Cyber attackers could potentially gain access to critical weather satellite systems through interconnected information systems, an internal Commerce Department audit has found.The department's inspector general said in a report (pdf) released July 25 that the ground support systems of the Polar-orbi... Read more

Source: www.fiercegovernmentit.com

Top found tags: mobile device(2),security measures(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackForest aggregates threat information to warn of possible cyber attacksLocation: Forest, United States
Date published: 28-07-2014

Coordinating distributed denial-of-service attacks, displaying new malware code, offering advice about network break-ins and posting stolen information these are just a few of the online activities of cyber-criminals. Fortunately, activities like these can provide cyber-security specialists with... Read more

Source: www.domain-b.com

Top found tags: information security(2),cybercrime(6),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese phones with spyware could be security riskLocation: Beijing, China
Date published: 29-07-2014

On July 19, Vietnamese learned that Redmi Note, a Chinese Xiaomis smartphone model, contained spyware. Some days later, they heard that not only Xiaomis products, but many Chinese mobile devices available in the Vietnamese market contain spyware as well.So Hoa, a website updating technology ne... Read more

Source: english.vietnamnet.vn

Top found tags: information security(2),mobile device(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Free movie link delivers malware payload: reportLocation: Wellington, New Zealand
Date published: 30-07-2014

Social engineers lured 149 Australian consumers with offer of free Transformers 4, 22 Jump Street and Maleficent movies.Consumers in Australia and around the world have fallen for a social engineering link promising a free download of Transformers 4, 22 Jump Street or Maleficent.The users have had m... Read more

Source: www.computerworld.com.au

Top found tags: United States(2),social media(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Answer to OTP Bypass: Out-of-Band Two-Factor AuthenticationLocation: Trend Micro - Cupertino, United States
Date published: 30-07-2014

Trend Micros one-time password (OTP)-based two-factor authentication bypass report (PDF) is hardly news to those in the tech world, but it is well-packaged and even branded with a weird name - Operation Emmental (also known as Swiss cheese) - how media-ready!The story is the same: Good ol phis... Read more

Source: smartdatacollective.com

Top found tags: Trend Micro(2),update(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Health products like wristband monitors prompt privacy worriesLocation: Palo Alto, United States
Date published: 27-07-2014

For the last year, Charlie Wynkoop has been tracking his exercise with a digital fitness device he wears on his wrist and syncs with his smartphone.\"If you pass your goal, it plays some da-da! music to make you feel good about yourself,\" says the 56-year-old project manager from West Los Angeles. ... Read more

Source: www.latimes.com

Top found tags: medical sector(2),United States(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RDB strengthens fight against cyber crimeLocation: Kigali, Rwanda
Date published: 29-07-2014

Fighting Internet fraud and other related crimes could soon become easier after the government pledged to sharpen skills of personnel dealing in cyber crime. The government has also set up a public hotline for people to report such cases.Charles Mugisha, the head of cyber security at the Rwanda Deve... Read more

Source: www.newtimes.co.rw

Top found tags: financial sector(2),government(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Proper security measures needed in creating wi-fi zones: FadiaLocation: Hyderabad, Andhra Pradesh, India
Date published: 30-07-2014

Hyderabad: Lauding the proposals to create wi-fi zones at different places in the country, a cyber security expert today said the government needs to take appropriate security measures to prevent cyber crime. \"While it (creation of wi-fi zones) has a lot of positives like increase in productivity, ... Read more

Source: zeenews.india.com

Top found tags: telecom sector(2),government(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to keep your smart meters safe from attack (and not just cyber-attacks)Location: New York, United States
Date published: 30-07-2014

In Part One of this two-part series, Maxim Integrated's Kris Ardis warned us of seven serious threats to smart meter security above and beyond cybersecurity. Now he is back to explain the solutions to those dangers. He describes the methods used by Maxim in the products it sells, but you don't have ... Read more

Source: www.smartgridnews.com

Top found tags: smart meter(2),energy(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Multipath TCP Introduces Security Blind SpotLocation: Black Hat - Las Vegas, United States
Date published: 30-07-2014

If multipath TCP is the next big thing to bring resilience and efficiency to networking, then there are some serious security issues to address before it goes mainstream. MPTCP is an extension to the Internets primary communication protocol. It allows a TCP session to move over multiple connectio... Read more

Source: threatpost.com

Top found tags: Black Hat(4),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICS-CERT Warns of Flaw in Innominate mGuard Secure Cloud ProductLocation: ICS-CERT - Alexandria, United States
Date published: 30-07-2014

The ICS-CERT is warning users about a vulnerability in a secure public cloud product from Innominate that enables an attacker to gain valuable configuration data about a target system, information that could be used in future attacks. The vulnerability is an information disclosure bug in theInnomi... Read more

Source: threatpost.com

Top found tags: Germany(2),government(2),RSA(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook Plans to Fix Instagram Mobile Session Hijack-EventuallyLocation: Instagram - Menlo Park, United States
Date published: 30-07-2014

Two unrelated researchers this week disclosed a similar session hijack bug in the Instagram mobile applications for Android and iOS. Facebook has reportedly acknowledged the problem, which arose from a failure to fully encrypt all data traffic on the service, but the worlds largest social network... Read more

Source: threatpost.com

Top found tags: cyber security(2),information security(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Canadas National Research Council Hit by Apparent Chinese Cyber AttackLocation: Ottawa, Ontario, Canada
Date published: 30-07-2014

One of Canadas premier research and technology organizations was hit with a cyber-attack recently that forced the cooperative offline; the attack which appears to be Chinese in origin was so serious the organization isbeing forced to rebuild its entire system. The National Research Coun... Read more

Source: threatpost.com

Top found tags: cybercrime(3),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Alarming gaps in Kiwi security leave critical infrastructure openLocation: Wellington, New Zealand
Date published: 30-07-2014

A new survey shows 86% of critical infrastructure providers in New Zealand and Australia have had at least one security breach in the past year resulting in lost confidential information or disrupted operations.The ANZ figure is higher than the global average, of nearly 70% reporting at least one se... Read more

Source: techday.com

Top found tags: New Zealand(2),Ponemon Institute(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Get help with Rising DDoS threatsLocation: Arbor Networks - Burlington, United States
Date published: 28-07-2014

The number of cyber threats are growing, but most enterprises still feel unprepared to deal with them. The answer lies in expert assistance and formalised plans, says Networks Unlimited.Anton Jacobsz, Managing Director of Arbor Networks distributor Networks Unlimited, says while downtime or data bre... Read more

Source: www.itnewsafrica.com

Top found tags: DoS(2),South Africa(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
86% of critical infrastructure providers breached - researchLocation: Wellington, New Zealand
Date published: 29-07-2014

New global research from Unisys finds alarming gaps in the security of critical infrastructure organisations. 86 percent of New Zealand and Australia executives surveyed at companies responsible for power, water and other critical functions and nearly 70 percent of executives globally have reported ... Read more

Source: www.voxy.co.nz

Top found tags: Ponemon Institute(2),cyber security(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CISOs obsess over malware outbreaks, data breachesLocation: New York, United States
Date published: 28-07-2014

Worries over malware outbreaks and data breaches continue to keep CISOs up at night, which isn't surprising considering that most organizations report they can't find an acceptable security solution.That is one of the findings of new research from Wisegate and Scale Ventures Partners, which polled C... Read more

Source: www.fiercecio.com

Top found tags: research(1),threat(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Almost 13 million people were the victims of identity theft in 2012; are you protected?Location: Santa Rosa, United States
Date published: 28-07-2014

What comes to your mind when you hear identity theft? Possibly, some undesirable has used one of your credit cards to make a purchase. Now you need to contact the credit card company, if it has not contacted you by the time you get your monthly statement. Hopefully, you can prove the purchase ... Read more

Source: www.northbaybusinessjournal.com

Top found tags: identity theft(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Demand for data leakage prevention software is on the rise: Vadim Kuznetsov, InfoWatchLocation: New York, United States
Date published: 28-07-2014

In this interview, Vadim Kuznetsov, International Sales Director, InfoWatch, elaborates on importance of data protection and analysis for manufacturing companies. Information flow for many big conglomerates transcends across continents with a threat of espionage looming large on their big data repos... Read more

Source: www.business-standard.com

Top found tags: information security(2),Ponemon Institute(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Medical identity theft can threaten health as well as bank accountLocation: Salt Lake City, United States
Date published: 28-07-2014

Anndorie Sachs had her life turned upside down when authorities showed up at her door in Salt Lake City and threatened to take her four children away - all because another woman had stolen her identity and given birth to a baby who tested positive for drugs.When CBS News first reported her story bac... Read more

Source: www.kbzk.com

Top found tags: health sector(6),medical sector(6),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Irish man wanted by US authorities to face fraud, money laundering, and identity theft chargesLocation: Lee, United States
Date published: 29-07-2014

A date will be set for judgment next October in the case of a Co Kildare man wanted by US authorities to face fraud, money laundering, and identity theft charges.Patrick Lee (41) is alleged to have knowingly engaged in a scheme with others to intentionally defraud numerous US banks and mortgage lend... Read more

Source: www.independent.ie

Top found tags: legislation(1),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Three Israeli Defense Firms Hacked, Critical Documents Stolen in Data BreachLocation: Tel Aviv, Israel
Date published: 29-07-2014

Three Israeli defense contractors housing detailed schematics of information on anti-ballistics missiles, information about rockets, and a trove of critically sensitive documents were were comprised by hackers in a data breach from 2011 to 2012, new reports state.According to Maryland-based threat i... Read more

Source: freedomhacker.net

Top found tags: government(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Breach Bulletin: Russian Hacker Claims To Have Infiltrated Both Wall Street Journal and ViceLocation: Wall Street, New York City, New York, United States
Date published: 29-07-2014

Heres a roundup of the latest data breach news for the week of July 21, 2014:Wall Street Journal and Vice The Wall Street Journal and Vice allegedly got hacked this week by Russian hacker W0rm, who claimed to be selling their databases for one Bitcoin each. This should sound familiar as CNET ... Read more

Source: www.forbes.com

Top found tags: data breach(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What to do when you are on the receiving end of a data breachLocation: New York, United States
Date published: 29-07-2014

Earlier in the week I shared my experience, which is probably (or at least hopefully) like most, with having credit card information stolen. Since that time, theres been a nice article written with some common sense ways for folks like us to proactively protect ourselves rather than relying on th... Read more

Source: www.csoonline.com

Top found tags: cyber security(2),data breach(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cloud Infographic: The Cost Of A Data BreachLocation: New York, United States
Date published: 29-07-2014

Cloud security is an area that we have covered more than any other on CloudTweaks over the past several years. From Security Tools, Downtime to Privacy issues we have found a way to cover them in some capacity. Here is an excellent cloud security related infographic produced and provided by the grou... Read more

Source: cloudtweaks.com

Top found tags: privacy(1),cyber security(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Canada Blames China for Data BreachLocation: Ottawa, Ontario, Canada
Date published: 29-07-2014

A \"highly sophisticated Chinese state-sponsored actor\" is responsible for a recent data breach at the National Research Council of Canada, according to Canada's chief information officer.The breach involved a \"cyber intrusion on the IT infrastructure\" of the council, says Corinne Charette, the g... Read more

Source: www.govinfosecurity.com

Top found tags: update(2),cyber security(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ID Thieves Could Ruin a College Students Financial FutureLocation: Young, United States
Date published: 29-07-2014

Without much money or assets of their own yet, college students may not worry about identity theft but a new name, social security number and clean reputation are all ID thieves need to score big.Identity theft is the main consumer complaint in the U.S. right now, and those between the ages of 2... Read more

Source: www.thefiscaltimes.com

Top found tags: identity theft(2),education(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Woman sentenced in federal identity theft case stole more than 700 identitiesLocation: Miller, United States
Date published: 29-07-2014

A West Palm Beach woman who stole more than 700 identities was sentenced on Tuesday to 5 years and 10 months in federal prison, according to the United States Attorney for the Southern District of Florida.Tia Lashonda Miller, 39, had stolen the identities of 726 people to file tax returns and get pr... Read more

Source: www.sun-sentinel.com

Top found tags: financial sector(2),identity theft(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why are fraudsters targeting your child's identity?Location: Federal Trade Commission - Washington, United States
Date published: 30-07-2014

Crafting an identity essentially out of thin air: It sounds almost make-believe, but as banks and credit card companies scramble to develop safeguards against the forever-advancing means of what experts deem \"true identity theft\" - the classic hijacking of another person's name or financial inform... Read more

Source: www.cbsnews.com

Top found tags: identity theft(2),financial sector(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Online harassment of women is on the riseLocation: New York, United States
Date published: 29-07-2014

Without a supportive legal framework and a general lack of awareness, internet devices are in urgent need of regulationWhen leadership coach Aparna Jain decided to file a complaint against a pervert follower who was tweeting abusive messages little did she know it would end up a nuisance for her. Th... Read more

Source: www.dnaindia.com

Top found tags: identity theft(2),social media(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Webroot Survey Reveals PC Gaming Vulnerable Against Online ThreatsLocation: Webroot - Broomfield, United States
Date published: 30-07-2014

PR NewswireBROOMFIELD, Colo., July 30, 2014BROOMFIELD, Colo., July 30, 2014 /PRNewswire/ -- A new study on security and PC gamers, conducted by Webroot, the market leader in cloud-based, real-time Internet threat detection, details the security perspective of players on their gaming systems. The stu... Read more

Source: www.digitaljournal.com

Top found tags: identity theft(2),trojan(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Seattle University donor checks possibly exposed due to settings errorLocation: Seattle, Washington, United States
Date published: 29-07-2014

Seattle University is notifying an undisclosed number of donors that incorrect permission settings on an internal drive made it possible for anyone with a Seattle University computer account to view scanned checks, without authorization. How many victims? Undisclosed. What type of personal informati... Read more

Source: www.scmagazine.com

Top found tags: bank(1),EN(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vulnerability impacting multiple versions of Android could enable device takeoverLocation: Google HQ - Mountain View, United States
Date published: 29-07-2014

Vulnerability impacting multiple versions of Android could enable device takeover The vulnerability, dubbed "Fake ID," exists in Android versions 2.1 to 4.3 and could enable device takeover. All mobile devices running Android version 2.1 to 4.3 contain a vulnerability dubbed Fake ID th... Read more

Source: www.scmagazine.com

Top found tags: NFC(2),Black Hat(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry acquires Secusmart to bolster the security of political leadersLocation: BlackBerry HQ - Ontario, Canada
Date published: 29-07-2014

BlackBerry acquires Secusmart to bolster the security of political leaders. BlackBerry is bolstering its mobile security defences with the purchase of Secusmart in order to further develop its enterprise wardrobe in a mobile setting. Related: BlackBerry gets governmental certification for iOS and An... Read more

Source: itproportal.com

Top found tags: government(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android busted for carrying Fake ID: OS doesn't check who really made that 'Adobe' pluginLocation: Google HQ - Mountain View, United States
Date published: 29-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Google Android allows malware to masquerade as legit, trusted apps thanks to weaknesses in the way the operating system checks digital certificates of authenticity. The flaw, dubbed Fake ID by its discoverers at Bluebox Security, affects all... Read more

Source: go.theregister.com

Top found tags: Google(2),Google Play(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Instagram iOS and Android apps vulnerable to session hijackingLocation: Instagram - Menlo Park, United States
Date published: 29-07-2014

While tinkering around with the Android version of the popular Instagram app, Mazin Ahmed, a student and researcher, discovered that sessions can be hijacked in a man-in-the-middle (MitM) attack. Using an open-source network protocol analyzer known as Wireshark, Ahmed noticed unsecured information g... Read more

Source: www.scmagazine.com

Top found tags: report(1),research(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Canada's boffins need A WHOLE YEAR to recover from China hack attackLocation: Ottawa, Ontario, Canada
Date published: 30-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Canada's CIO has pointed the finger at China over a security breach at the nation's National Research Council. Ongoing attempts to breach the research agency's computers led the NRC to hit the off switch on Monday of this week, accordi... Read more

Source: go.theregister.com

Top found tags: research(1),China(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Controversial MyGov login could be used as e-voting IDLocation: New York, United States
Date published: 30-07-2014

trial electronic voting. The proposal was floated yesterday during a parliamentary inquiry into the 2013 election by Department of Communications deputy secretary Abul Rizvi as one possibility for an e-voting trial for the 2016 election. In March, ZDNet reported that the department was advocating fo... Read more

Source: www.zdnet.com

Top found tags: vulnerability(1),website(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brace yourself! Taxpayers fork out 700m as Government loses NHS IT battle against FujitsuLocation: National Health Service - London, United Kingdom
Date published: 30-07-2014

Brace yourself! Taxpayers fork out 700m as Government loses NHS IT battle. against Fujitsu The government has reportedly lost a legal battle with tech giant Fujitsu relating to the failed NHS National Programme for IT (NPfIT). According to UK newspaper The Telegraph, taxpayers will be footing the ... Read more

Source: itproportal.com

Top found tags: health sector(4),medical sector(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security: The Ultimate Balancing ActLocation: New York, United States
Date published: 30-07-2014

The phrase balls to the wall is one that has been co-opted to mean things you wouldnt want to discuss with your grandmother. But in its original context, it referred to a centrifugal governor used on steam engines to regulate a consistent speed, regardless of the load placed on the machine.... Read more

Source: securityweek.com

Top found tags: online banking(2),telecom sector(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
iWallet: No BONKING PLEASE, we're AppleLocation: Apple HQ - Cupertino, United States
Date published: 30-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Apple's iWallet mobile money app could be the start of a more general trend that sees web giants such as Facebook pushing into the payment industry, according to online payment experts. iWallet would give iPhone-toting consumers the ability ... Read more

Source: go.theregister.com 3 Bills To Protect Critical Infrastructure From Cyber Attack Passed By House | The House overwhelmingly passed three bills Monday to strengthen efforts to combat cyber attacks on our critical infrastructure through the distribution of cyber threat information, the development and procurement of new technologies and support for the Department of Homleand Securitys (DHS) cybersecurity workforce. The National Cybersecurity and Critical Infrastructure Protection Act of 2014 (HR 3696), among other things, would codify and strengthen the National Cybersecurity and Communications Integration Center, a federal civilian, transparent interface to facilitate real-time cyber threat information sharing across critical infrastructure sectors, and establish a true partnership between private industry and DHS, and ensures that DHS properly recognizes industry-led entities to facilitate critical infrastructure protection and incident response. The Critical Infrastructure Research and Development Advancement Act (HR 2952) would amend the Homeland Security Act of 2002 to make certain improvements in the laws relating to the advancement of security technologies for critical infrastructure protection and for other purposes. The Homeland Security Cybersecurity Boots-on-the-Ground Act (HR 3107) would require the Secretary of Homeland Security to establish cybersecurity occupation classifications, assess the cybersecurity workforce, develop a strategy to address identified gaps in the cybersecurity workforce, and for other purposes. Last week, the former co-chair of the 9/11 Commission testified that we are in a pre-9/11 mindset when it comes to cybersecurity. A successful cyber attack on our nations water systems, oil and gas pipelines, power grids and mass transit systems on the scale of the recent retail breaches could cause crippling economic damage and could even cost lives, said House Committee on Homeland Security Chairman Mike McCaul (R-Texas). The reality is the threat is outpacing our readiness to combat it. We must take action and the National Cybersecurity and Critical Infrastructure Protection Act is an important step toward addressing the cyber threat,\" McCaul said, noting that, \"This bipartisan bill establishes a true partnership between DHS and the private sector to ensure the distribution of real-time cyber threat information in order to secure our nation in cyberspace without burdensome mandates or regulations. The cyber risk is among the most serious our nation faces today. Terrorist groups like Hamas, nation-states like Iran, China and Russia and criminal gangs across the world are constantly attempting to breach our systems. But existing laws that have been on the books for years are not designed to cope with the threat, stated Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies Chairman Patrick Meehan (R-Penn). The National Cybersecurity and Critical Infrastructure Protection Act -- the result of consultations with hundreds of stakeholders across government, the private sector and privacy advocates -- will enable government and the private sector work together to prevent and defeat cyber attacks. And it does it while being, in the words of the ACLU, both pro-privacy and pro-security, Meehan said. Continuing, Meehan said, The Critical Infrastructure Research and Development Advancement Act is a bipartisan accomplishment. Its the product of collaboration between Republicans and Democrats, the Department of Homeland Security and other stakeholders. We identified a problem -- barriers that prevented the department from acquiring the best equipment available to protect the homeland -- and we worked together to solve it. This bill will protect Americans by strengthening DHSs ability to develop the latest technology to stay one step ahead of terrorists who wish to do us harm. I am pleased that the House is getting the opportunity to consider these three important bipartisan cybersecurity measures, added committee ranking member Bennie G. Thompson (D-Miss). With their passage, the House will have taken meaningful action to move the ball forward on improving our nations cybersecurity posture. I am particularly pleased that one of the bills we will be considering is legislation authored by Rep. Yvette Clarke (D-NY), the Homeland Security Cybersecurity Boots-on-the-Ground Act. DHSs success depends on how well it recruits, hires and trains its cyber workforce. That said, the jurisdictional jockeying that kept the McCaul-Thompson cyber bill in limbo for many months is troubling and demands a rethinking of how legislative jurisdiction is divided within the House. | http://www.hstoday.us/briefings/daily-news-analysis/single-article/3-bills-to-protect-critical-infrastructure-from-cyber-attack-passed-by-house/23ae7921394489cf0714febca24c5f57.html | 28-07-2014 | www.hstoday.us

Top found tags: social media(2),mobile device(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Two charged with credit card fraudLocation: Braxton, United States
Date published: 29-07-2014

Police arrested two people Saturday and charged them with using a stolen credit card to make more than $1,000 worth of purchases in less than 24 hours.Shawn Tyrell McDowell, 29, of Hobgood was charged with obtaining property by false pretenses, second-degree trespassing and forgery of an instrument.... Read more

Source: www.rockymounttelegram.com

Top found tags: credit card(2),financial sector(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Skimming HUD money ends with prison termLocation: Whitley, United States
Date published: 29-07-2014

HUNTINGTON, W.Va. A Proctorville woman will spend the next year and a half in prison for skimming money from several government-subsidized apartment bank accounts in West Virginia.Connie Lynn Whitley, 51, of 19B Township Road 1247, was sentenced Monday in U.S. District Court in Huntington. She p... Read more

Source: www.irontontribune.com

Top found tags: government(2),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
5 sought in credit card fraud at Grand Strand Walmarts and TargetLocation: Myrtle Beach, United States
Date published: 29-07-2014

MYRTLE BEACH, S.C. - Conway Police on Tuesday released information about the latest person sought on the Grand Strand for credit card fraud.Conway Police say they are trying to locate Janel Charmaine Walker, 20, of North Carolina, for fraud.\"On Friday June 13 the suspect is alleged to have presente... Read more

Source: www.wbtw.com

Top found tags: police(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Five Severe Vulnerabilities Fixed in Siemens SIMATIC WinCC SCADA SystemLocation: Siemens HQ - Munich, Germany
Date published: 29-07-2014

Siemens has issued an update to its SIMATIC WinCC SCADA system due to five severe vulnerabilities, the company said in an advisory. Impacted products include SIMATIC WinCC before version 7.3, and SIMATIC PCS7 before version 8.1.The most severe of these vulnerabilities could allow privilege escala... Read more

Source: www.hotforsecurity.com

Top found tags: critical infrastructure(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Can information sharing stop bots in their tracks?Location: Check Point - Tel Aviv, Israel
Date published: 29-07-2014

Bots are a bigger security problem than we think. Those of us who work in security are not unaccustomed to running into bots on the networks we monitor; in Check Points 2014 Annual Security Report, released last month, our research found that 49 percent of organizations had seven or more bot-infe... Read more

Source: www.csoonline.com

Top found tags: report(1),research(1),information sharing(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry Guardian Will Scan Android Apps For MalwareLocation: BlackBerry HQ - Ontario, Canada
Date published: 29-07-2014

BlackBerry will be making Android apps available on their BlackBerry platform later this year with the launch of BlackBerry 10.3, and now the company has announced BlackBerry Guardian.The Android apps that will be available on the platform will come from the Amazon Appstore, and now the company is l... Read more

Source: www.geeky-gadgets.com

Top found tags: smartphone(1),mobile device(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BRIDGING YOUR GAPS PART 2: SOCIAL ENGINEERING AND BROWSER SECURITYLocation: ING HQ - Amsterdam, The Netherlands
Date published: 28-07-2014

In our previous segment (Bridging Your Gaps Part 1), we covered network segmentation and egress filtering. Now lets focus on some of the gaps that can directly lead to access to your sensitive data.Social Engineering and Browser SecurityThe attackers in the Lockheed Martin breach of 2011, lev... Read more

Source: www.directdefense.com

Top found tags: social engineering(2),social media(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DHS Wants To Help Developers Secure Open-Source SoftwareLocation: Department of Homeland Security - Washington, United States
Date published: 30-07-2014

The Department of Homeland Security is funding a project aimed at protecting the nation's critical infrastructure and networks by providing tools that test for defects in open source and commercial software.The Morgridge Institute for Research, Madison, Wis., is leading the open-source effort called... Read more

Source: www.cruxialcio.com

Top found tags: government(3),DHS(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
You don't need a fast car to rob a bank any more, just malwareLocation: Brasilia-Federal District, Brazil
Date published: 30-07-2014

The number of physical robberies on banks has fallen dramatically in recent years, but the amount of money banks are losing through electronic methods has rocketed. In 2013 for example, the annual fraud indicator estimated the annual cost of fraud in the UK was 52bn what it was five years before. ... Read more

Source: phys.org

Top found tags: United Kingdom(2),telecom sector(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor warns users it was attacked, but details on deanonymizing efforts sketchyLocation: National Security Agency - Fort Meade, United States
Date published: 30-07-2014

Developers of the anonymous browsing service Tor are warning users they may have been affected by an attack conducted earlier this year. NSA likely targets anybody who's 'Tor-curious' NSA likely targets anybody who's 'Tor-curious' Unnamed attackers were for as long as six months targeting the servic... Read more

Source: www.zdnet.com

Top found tags: NSA(2),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

Innominate mGuard Unauthorized Leakage of System DataLocation: New York, United States
Date published: 29-07-2014

A team of researchers at the New York University Polytechnic School of Engineering say they have found a way to help organizations better protect passwords. Using an open-source password protection scheme they dubbed PolyPasswordHasher, the researchers believe they can make it much more difficult fo... Read more

Source: ics-cert.us-cert.gov

Top found tags: password(1),research(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Canadese onderzoeksraad gaat offline wegens aanvalLocation: Toronto, Canada
Date published: 30-07-2014

De Canadese onderzoeksraad heeft besloten om alle computers uit te schakelen om zo een reeks aanvallen te stoppen en te voorkomen dat er vertrouwelijke informatie werd gestolen. Maandag werd tot de complete "shutdown" van de systemen overgegaan, aangezien dit de enige oplossing zou zijn. De National... Read more

Source: www.security.nl

Top found tags: cybercrime(2),research(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nederlanders minder bang voor cyberaanvallen gewordenLocation: Amsterdam, The Netherlands
Date published: 30-07-2014

Nederlanders zijn in de afgelopen maanden iets minder bang voor cyberaanvallen geworden, zo blijkt uit een onderzoek dat onderzoeksbureau Ipsos in opdracht van de Nationaal Cordinator Terrorismebestrijding en Veiligheid (NCTV) in juni onder 816 Nederlanders via het internet uitvoerde. In juni 2013... Read more

Source: www.security.nl

Top found tags: cybercrime(2),The Netherlands(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ex-NSA-baas verdient miljoenen met beveilingsadviezenLocation: National Security Agency - Fort Meade, United States
Date published: 30-07-2014

Hackers zijn vaak prima beveiligers. De meest ervaren hacker ter wereld, voormalig NSA-baas generaal Keith Alexander, verdient tegenwoordig dan ook zo'n 1 miljoen dollar per maand met het geven van IT-beveiligingsadvies en verkoop van beveiligingssoftware. NSA heeft vooral Duitsland op de korrel 'NS... Read more

Source: www.automatiseringgids.nl

Top found tags: Gen. Keith Alexander(3),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man krijgt 9 jaar cel in VS wegens stelen creditcardgegevensLocation: New York, United States
Date published: 30-07-2014

Een Turkse man is in de Verenigde Staten veroordeeld tot een gevangenisstraf van 9 jaar en 4 maanden wegens het stelen en verhandelen van creditcardgegevens en het plegen van identiteitsfraude. Het gaat om de 35-jarige Alper Erdogan die door Georgi aan de VS werd uitgeleverd. Erdogan wist in te br... Read more

Source: www.security.nl

Top found tags: cybercrime(2),identity theft(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nederland krijgt grote HackathonLocation: Amsterdam, The Netherlands
Date published: 30-07-2014

In september krijgt Nederland een zeer grote hackerswedstrijd, de Dutch Open Hackathon. Het gebeuren vindt op 20 en 21 september plaats in Amsterdam en hackers/ontwikkelaars kunnen hun kunsten uitproberen op websites van 10 grote ondernemingen. Het initiatief is genomen door de KLM en de Rabobank. D... Read more

Source: www.automatiseringgids.nl

Top found tags: airport(2),financial sector(2),The Netherlands(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers hadden vrij spel met miljoenen datarecordsLocation: Sydney, Australia
Date published: 30-07-2014

In het afgelopen kwartaal zijn hackers er in geslaagd om bij 237 grote bedrijven in Cyberspace in te breken. Daarbij werden naar schatting 175 miljoen records met klantgegevens buitgemaakt. Dit stelt beveiligingsbedrijf SafeNet na onderzoek. Dat blijkt uit de SafeNet Breach Level Index (BLI), de wee... Read more

Source: www.automatiseringgids.nl

Top found tags: threat(1),trend(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ransomware voor Android maakt sprong naar pcLocation: Google HQ - Mountain View, United States
Date published: 28-07-2014

Samenvatting:De ransomware die eerder dit jaar op Androidtoestellen opdook, heeft nu ook zijn weg gevonden naar de pc.De ransomware Koler.A, die eerder dit jaar op Androidtoestellen opdook, heeft nu ook zijn weg gevonden naar de pc. Dat meldt beveiligingsexpert Kaspersky.Het onderzoekslab van de Rus... Read more

Source: www.zdnet.be

Top found tags: malware(2),cybercrime(3),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Nieuw systeem voor beveiligen wachtwoorden ontwikkeldLocation: New York, United States
Date published: 30-07-2014

Wetenschappers hebben een nieuw systeem ontwikkeld voor het beveiligen van wachtwoorden, waardoor het zo goed als onmogelijk zou moeten worden om wachtwoorden uit een gestolen database te achterhalen. Dit zou de gevolgen van een gestolen database moeten beperken of zelfs elimineren. Om wachtwoorden ... Read more

Source: www.security.nl

Top found tags: NL(1),password(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware door oud lek in AndroidLocation: Google HQ - Mountain View, United States
Date published: 29-07-2014

MOUNTAIN VIEW - Een lek dat al sinds 2010 in Android zit, zorgt ervoor dat het heel makkelijk is om malware in apps te krijgen. Door het lek kunnen kwaadwillenden codes toevoegen aan bijna iedere app. Daarvoor waarschuwt het beveiligingsbedrijf BlueBox op zijn website.Het lek komt door een ontwikkel... Read more

Source: www.bndestem.nl

Top found tags: SSL(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaanse overheid doneerde 1,8 miljoen dollar aan TorLocation: New York, United States
Date published: 30-07-2014

De Amerikaanse overheid heeft vorig jaar 1,8 miljoen dollar aan het Tor Project gedoneerd, waarmee het de grootste geldschieter is. Dat blijkt uit de financile jaarstukken die de ontwikkelaars van Tor online hebben gezet. Tor helpt internetgebruikers om anoniem te kunnen internetten. Vorig jaar we... Read more

Source: www.security.nl

Top found tags: cyber security(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoek: surveillance NSA tast internetveiligheid aanLocation: National Security Agency - Fort Meade, United States
Date published: 30-07-2014

De surveillance door de NSA mag volgens de Amerikaanse geheime dienst noodzakelijk zijn om de Verenigde Staten te beschermen, maar de geheime spionageprogramma's hebben gevolgen voor de internetveiligheid, het buitenlandbeleid van de VS en de economie van het land. Dat stelt de New America Foundatio... Read more

Source: www.security.nl

Top found tags: The Netherlands(2),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaanse overheid doneerde 1,8 miljoen dollar aan TorLocation: New York, United States
Date published: 30-07-2014

De Amerikaanse overheid heeft vorig jaar 1,8 miljoen dollar aan het Tor Project gedoneerd, waarmee het de grootste geldschieter is. Dat blijkt uit de financile jaarstukken die de ontwikkelaars van Tor online hebben gezet. Tor helpt internetgebruikers om anoniem te kunnen internetten. Vorig jaar we... Read more

Source: www.security.nl

Top found tags: cyber security(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoek: surveillance NSA tast internetveiligheid aanLocation: National Security Agency - Fort Meade, United States
Date published: 30-07-2014

De surveillance door de NSA mag volgens de Amerikaanse geheime dienst noodzakelijk zijn om de Verenigde Staten te beschermen, maar de geheime spionageprogramma's hebben gevolgen voor de internetveiligheid, het buitenlandbeleid van de VS en de economie van het land. Dat stelt de New America Foundatio... Read more

Source: www.security.nl

Top found tags: The Netherlands(2),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Malware door oud lek in AndroidLocation: Google HQ - Mountain View, United States
Date published: 29-07-2014

Een lek dat al sinds 2010 in Android zit, zorgt ervoor dat het heel makkelijk is om malware in apps te krijgen. Door het lek kunnen kwaadwillenden codes toevoegen aan bijna iedere app. Google denkt dat 82 procent van de Android-toestellen kwetsbaar zijn.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Google(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Blackberry koopt mobiel beveiligingsbedrijf SecusmartLocation: BlackBerry HQ - Ontario, Canada
Date published: 29-07-2014

Blackberry neemt het mobiele beveiligingsbedrijf Secusmart over. Het Duitse bedrijf richt zich op het voorkomen van spionage. De overname van Secusmart zorgt onder meer dat Blackberry toegang krijgt tot technieken voor het versleutelen van tekstberichten en telefoongesprekken.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Duitsland koopt 20.000 crypto-telefoonsLocation: Berlin, Germany
Date published: 29-07-2014

De Duitse overheid gaat 20.000 cryptotelefoons kopen om zo het afluisteren door buitenlandse inlichtingendiensten te dwarsbomen. De telefoons worden door BlackBerry geproduceerd. De toestellen gebruiken daarnaast een aparte Secusmart MicroSD-kaart voor de opslag van vertrouwelijke informatie.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: mobile device(2),telecom sector(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackathon laat ontwikkelaars api's Bol.com, Philips en AH gebruikenLocation: Schiphol
Date published: 30-07-2014

Meerdere grote Nederlandse bedrijven , waaronder Bol.com, Albert Heijn en Philips, geven ontwikkelaars tijdens een grote hackathon toegang tot hun api's en technologie. Maximaal vijfhonderd ontwikkelaars kunnen meedoen aan de hackathon. Onder meer Albert Heijn, Philips, de Rabobank en TomTom stellen... Read more

Source: tweakers.net

Top found tags: website(1),government(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry verstevigt veilig imago met Duitse overnameLocation: BlackBerry HQ - Ontario, Canada
Date published: 30-07-2014

BlackBerry kondigt aan het Duitse Secusmart over te nemen, een specialist in hoogbeveiligde datacommunicatie. Meer over BlackBerry BlackBerry dringt verlies terug BlackBerry bevestigt komst toestel met vierkant scherm BlackBerry stort zich op Internet of Things De aankondiging komt op een goed momen... Read more

Source: www.automatiseringgids.nl

Top found tags: smartphone(1),mobile device(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Datingsite OkCupid experimenteerde met gebruikersLocation: Facebook - Menlo Park, United States
Date published: 30-07-2014

Na Facebook heeft ook datingsite OkCupid bekend dat het met gebruikers heeft gexperimenteerd. Zo werden er tijdens de experimenten foto's of teksten van profielen verwijderd. Ook kregen mensen te zien dat ze een 90% match met de andere persoon hadden, terwijl dit in werkelijkheid 30% was. "Als we ... Read more

Source: www.security.nl

Top found tags: research(1),website(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gratis app voor versleuteld bellen op iPhone gelanceerdLocation: Apple HQ - Cupertino, United States
Date published: 30-07-2014

Er is een gratis app voor iPhone-gebruikers verschenen waarmee ze versleuteld kunnen bellen, zowel naar andere iPhone-eigenaren als gebruikers van een Android-toestel. De app heet Signal en is ontwikkeld door Whisper Systems, dat is opgezet door de bekende beveiligingsonderzoeker Moxie Marlinspike. ... Read more

Source: www.security.nl

Top found tags: Apple(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Omvangrijke aanval op gebruikers Tor-netwerk ontdektLocation: Amsterdam, The Netherlands
Date published: 30-07-2014

Gebruikers van Tor-netwerk zijn het doelwit van een aanval geworden die mogelijk 5 maanden lang plaatsvond voordat die werd ontdekt en waarbij waarschijnlijk werd geprobeerd om de identiteit van Tor-gebruikers te achterhalen. Het Tor-netwerk laat gebruikers hun echte IP-adres verbergen. Ook maakt To... Read more

Source: www.security.nl

Top found tags: NL(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry koopt Duits encryptiebedrijf SecusmartLocation: BlackBerry HQ - Ontario, Canada
Date published: 30-07-2014

Telefoonfabrikant BlackBerry heeft het Duitse encryptiebedrijf Secusmart overgenomen, dat oplossingen aanbiedt om telefoons tegen afluisteren te beschermen. Hoeveel er voor de overname is betaald is onbekend. Het nieuws volgt op het bericht dat de Duitse overheid 20.000 BlackBerry-toestellen wil kop... Read more

Source: www.security.nl

Top found tags: government(2),mobile device(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rechter: AFAS mag niet om ING-inlogcodes vragenLocation: ING HQ - Amsterdam, The Netherlands
Date published: 30-07-2014

Het online huishoudboekje van softwareontwikkelaar AFAS mag ING-klanten niet om hun inlogcodes vragen, zo heeft de voorzieningenrechter van de rechtbank Midden-Nederland vandaag bepaald. Via het online huishoudboekje kunnen ING-klanten inzicht kunnen in hun geldzaken krijgen. De transactiegegevens v... Read more

Source: www.security.nl

Top found tags: NL(1),online banking(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Uber verwijdert passagiersrating na JavaScript-hackLocation: Twitter - San Francisco, United States
Date published: 30-07-2014

Taxi-app Uber heeft de mogelijkheid verwijderd waardoor passagiers hun eigen rating konden opvragen. Via de Uber-app kunnen gebruikers eenvoudig een taxi bestellen. Na afloop van de taxirit is er de mogelijkheid om de taxichauffeur een beoordeling te geven. Chauffeurs kunnen echter ook klanten beoor... Read more

Source: www.security.nl

Top found tags: NL(1),Twitter(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rechter dwingt huishoudboekje te stoppen met importeren ING-transactiesLocation: Amsterdam, The Netherlands
Date published: 30-07-2014

Gebruikers van online huishoudboekje Afas kunnen in de toekomst niet langer transacties van rekeningen bij de ING-bank importeren door in te loggen op internetbankieren. Afas had die koppeling mogelijk gemaakt, maar een rechter heeft het systeem verboden. Een rechter van de rechtbank Midden-Nederlan... Read more

Source: tweakers.net

Top found tags: NL(1),online banking(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Canada beschuldigt China van hacken overheidsnetwerkenLocation: Ottawa, Ontario, Canada
Date published: 30-07-2014

Canada beschuldigt de Chinese overheid ervan te hebben ingebroken op systemen van het National Research Council, een onderzoeksorganisatie die onderdeel van de Canadese overheid is. China ontkent de aantijgingen. China Chinese vlagHet is de eerste keer dat Canada China beschuldigt van hacking, meldt... Read more

Source: tweakers.net

Top found tags: China(2),government(2),research(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry koopt bedrijf dat beveiliging telefoon bondskanselier Merkel doetLocation: BlackBerry HQ - Ontario, Canada
Date published: 30-07-2014

BlackBerry heeft het Duitse bedrijf SecuSmart gekocht. Het Duitse bedrijf regelt de beveiliging van de telefoon van onder meer de Duitse bondskanselier Angela Merkel. Met de overname wil de Canadese smartphonemaker de beveiliging van zijn besturingssysteem verder opvoeren. Er zijn nog wel overheidsi... Read more

Source: tweakers.net

Top found tags: United States(4),government(7),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rechter: AFAS mag niet om ING-inlogcodes vragenLocation: ING HQ - Amsterdam, The Netherlands
Date published: 30-07-2014

Het online huishoudboekje van softwareontwikkelaar AFAS mag ING-klanten niet om hun inlogcodes vragen, zo heeft de voorzieningenrechter van de rechtbank Midden-Nederland vandaag bepaald. Via het online huishoudboekje kunnen ING-klanten inzicht kunnen in hun geldzaken krijgen. De transactiegegevens v... Read more

Source: www.security.nl

Top found tags: NL(1),online banking(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Uber verwijdert passagiersrating na JavaScript-hackLocation: Twitter - San Francisco, United States
Date published: 30-07-2014

Taxi-app Uber heeft de mogelijkheid verwijderd waardoor passagiers hun eigen rating konden opvragen. Via de Uber-app kunnen gebruikers eenvoudig een taxi bestellen. Na afloop van de taxirit is er de mogelijkheid om de taxichauffeur een beoordeling te geven. Chauffeurs kunnen echter ook klanten beoor... Read more

Source: www.security.nl

Top found tags: NL(1),Twitter(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rechter dwingt huishoudboekje te stoppen met importeren ING-transactiesLocation: Amsterdam, The Netherlands
Date published: 30-07-2014

Gebruikers van online huishoudboekje Afas kunnen in de toekomst niet langer transacties van rekeningen bij de ING-bank importeren door in te loggen op internetbankieren. Afas had die koppeling mogelijk gemaakt, maar een rechter heeft het systeem verboden. Een rechter van de rechtbank Midden-Nederlan... Read more

Source: tweakers.net

Top found tags: NL(1),online banking(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Canada beschuldigt China van hacken overheidsnetwerkenLocation: Ottawa, Ontario, Canada
Date published: 30-07-2014

Canada beschuldigt de Chinese overheid ervan te hebben ingebroken op systemen van het National Research Council, een onderzoeksorganisatie die onderdeel van de Canadese overheid is. China ontkent de aantijgingen. China Chinese vlagHet is de eerste keer dat Canada China beschuldigt van hacking, meldt... Read more

Source: tweakers.net

Top found tags: China(2),government(2),research(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry koopt bedrijf dat beveiliging telefoon bondskanselier Merkel doetLocation: BlackBerry HQ - Ontario, Canada
Date published: 30-07-2014

BlackBerry heeft het Duitse bedrijf SecuSmart gekocht. Het Duitse bedrijf regelt de beveiliging van de telefoon van onder meer de Duitse bondskanselier Angela Merkel. Met de overname wil de Canadese smartphonemaker de beveiliging van zijn besturingssysteem verder opvoeren. Er zijn nog wel overheidsi... Read more

Source: tweakers.net

Top found tags: United States(4),government(7),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Meerdere kwetsbaarheden verholpen in IBM websphere portalLocation: IBM HQ - Armonk, United States
Date published: 30-07-2014

Samenvatting: IBM heeft updates beschikbaar gemaakt die meerdere kwetsbaarheden in IBM websphere portal verhelpen. Beschrijving: De volgende kwetsbaarheden zijn verholpen: - CVE-2014-3054 Een open URL redirect kan door een kwaadwillende misbruikt worden voor phishing. - CVE-2014-3055 Een SQL-injecti... Read more

Source: www.ncsc.nl

Top found tags: NL(1),phishing(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Linux kernel verholpenLocation: Amsterdam, The Netherlands
Date published: 30-07-2014

Samenvatting: Er zijn updates uitgebracht om de kwetsbaarheden te verhelpen in de kernel. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende een Denial-of-Service veroorzaken of verhoogde gebruikersrechten verkrijgen. Beschrijving: - CVE-2014-2678 Er zit een kwetsbaarheid in de r... Read more

Source: www.ncsc.nl

Top found tags: Debian(2),Red Hat(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in SAP Netweaver Business Warehouse verholpenLocation: Ware, United States
Date published: 30-07-2014

Samenvatting: SAP heeft een update beschikbaar gesteld die een kwetsbaarheid in SAP Netweaver verhelpt. Gevolgen: Een kwaadwillende kan zonder authenticatie op afstand niet nader omschreven informatie uit het SAP Netweaver Business Warehouse component verkrijgen. Beschrijving: Authenticatie ontbreek... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in SAP Netweaver Business Warehouse verholpenLocation: Ware, United States
Date published: 30-07-2014

Samenvatting: SAP heeft een update beschikbaar gesteld die een kwetsbaarheid in SAP Netweaver verhelpt. Gevolgen: Een kwaadwillende kan zonder authenticatie op afstand niet nader omschreven informatie uit het SAP Netweaver Business Warehouse component verkrijgen. Beschrijving: Authenticatie ontbreek... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish