Under construction

New design coming soon!

CIC News engine statistics

CIC News for 31-07-2014 contains 123 articles: cybercrime(29),cyber security(53),data breach(5),other(36)

CIC News update contains 105 English and 18 Dutch articles for today.
There are 3 published advisories, 0 are English and 3 are Dutch.
In today's English news articles:
- 22 related to cybercrime
- 49 related to cyber security
- 5 related to data breach and identity theft
- 29 for the category other news

In today's Dutch news articles:
- 7 related to cybercrime
- 4 related to cyber security
- 7 for the category other news

Have fun reading.

English cybercrime related news

Trio of Flaws Fixed in Facebook Android AppLocation: Facebook - Menlo Park, United States
Date published: 30-07-2014

Facebook has fixed avulnerability in its Androidapp could allow an attacker to cause a denial-of-service condition on a device or run up the victims mobile bill by transferring large amounts of data to and from the device. The flaw lies in the way that the Facebook app handles HTTP requests. ... Read more

Source: threatpost.com

Top found tags: update(2),vulnerability(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Canada accuses China of hacking into National Research CouncilLocation: Ottawa, Ontario, Canada
Date published: 30-07-2014

Canada has accused China of hacking into government servers and attempting to steal information. The National Research Council, which handles Canada's research and development efforts on behalf of its government, confirmed Tuesday that its IT infrastructure was hacked but said the intrusion was isol... Read more

Source: cnet.com.ortal.com

Top found tags: China(2),cyber espionage(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China allegedly behind attack on Canadian research groupLocation: Ottawa, Ontario, Canada
Date published: 30-07-2014

One day on from claims that Chinese hacker group 'Comment Crew' was behind the theft of confidential documents on an Israeli missile defense system, the country is also being cited for more recent attacks against a Canadian government research organisation. China allegedly behind attack on Canadian ... Read more

Source: www.scmagazineuk.com

Top found tags: China(2),government(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Few UK smartphone users realise the value of basic handset securityLocation: New York, United States
Date published: 30-07-2014

Few UK smartphone users realise the value of basic handset security. Smartphone users in the UK are failing to act on the security front, and leaving themselves more vulnerable to fraud as a result. This is according to a new survey from phone comparison site TigerMobiles.com, which quizzed almost 5... Read more

Source: itproportal.com

Top found tags: smartphone(2),United Kingdom(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers tap flaws in Amazon cloud to host DDoS botnetsLocation: Check Point - Tel Aviv, Israel
Date published: 30-07-2014

Profitable and easy-to-use vulnerability exploited by cybercriminals says security researcher Hackers tap flaws in Amazon cloud to host DDoS botnets Hackers tap flaws in Amazon cloud to host DDoS botnets Botnets are one of those rare IT instances where the sum of the technology is potentially far gr... Read more

Source: www.scmagazineuk.com

Top found tags: update(2),Kaspersky Lab(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers can tap USB devices in new attacks, researcher warnsLocation: Black Hat - Las Vegas, United States
Date published: 31-07-2014

BOSTON (Reuters) - USB devices such as mice, keyboards and thumb-drives can be used to hack into personal computers in a potential new class of attacks that evade all known security protections, a top computer researcher revealed on Thursday. Karsten Nohl, chief scientist with Berlin's SR Labs, note... Read more

Source: reuters.com

Top found tags: government(4),United States(6),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brazil faced almost 90,000 cyber attacks during World CupLocation: Brasilia-Federal District, Brazil
Date published: 30-07-2014

The FIFA World Cup frenzy may have officially kicked off on 12 June for millions of passionate sports fans, but for cybercriminals, the World Cup targeting malware escapades started well over a year in advance. According to findings recently released by Kapersky Labs, there were an astonishing 87,77... Read more

Source: www.scmagazineuk.com

Top found tags: financial sector(2),trojan(2),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China slams Canada for 'irresponsible' hacking accusationsLocation: Ottawa, Ontario, Canada
Date published: 31-07-2014

BEIJING (Reuters) - China's foreign ministry accused Canada on Thursday of making irresponsible accusations lacking any credible evidence after Canada singled out Chinese hackers for attacking a key computer network and lodged a protest with Beijing. Officials said "a highly sophisticated Chinese st... Read more

Source: reuters.com

Top found tags: China(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook fixes app security flaw that left users at riskLocation: Facebook - Menlo Park, United States
Date published: 31-07-2014

Facebook fixes app security flaw that left users at risk. The latest update to Facebook's mobile app has fixed a security flaw that could have seen users' mobile phone bills suddenly increase. The vulnerability made it possible for scammers to cause a denial-of-service attack on the device or run up... Read more

Source: itproportal.com

Top found tags: update(2),vulnerability(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Experts in Cyber Crime Units urge parents to beware of online predatorsLocation: Baton Rouge, United States
Date published: 31-07-2014

BATON ROUGE, LA (WAFB) -A quiet evening recently turned horrifying for one local mother after she realized her 16 year old girl was gone.It took the most grueling 12 hours of my life for them to find her, said the woman who asked to remain unidentified.The mother says she still remembers the d... Read more

Source: www.wafb.com

Top found tags: cybercrime(2),social media(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China rebuffs Canada for 'irresponsible' hacking claimsLocation: Ottawa, Ontario, Canada
Date published: 31-07-2014

Canada publicly charged China of hacking into its National Research Council, but the Asian country is denying the accusation. China's Foreign Ministry on Thursday issued a statement saying "the Canadian side, while lacking credible evidence, offered criticism for no reason." The government agency, w... Read more

Source: cnet.com.ortal.com

Top found tags: mobile device(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime threat landscape evolving rapidlyLocation: Google HQ - Mountain View, United States
Date published: 31-07-2014

New research claims to show that, whilst spam levels fell to a five-year low last month, the increasing complexity of cyber-criminal attacks shows no sign of easing, with increasing levels of malware attacks and dangerous PDFs rapidly becoming the norm. Cybercrime threat landscape evolving rapidly C... Read more

Source: www.scmagazineuk.com

Top found tags: financial sector(6),telecom sector(8),cybercrime(13)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US requests $5b in extra funding to bolster cybercrime defencesLocation: DARPA - Arlington, United States
Date published: 31-07-2014

US requests $5b in extra funding to bolster cybercrime defences. US President Barack Obamas defence agency is ramping up its efforts to fight cyber crime by requesting a $5 billion [3 billion] package of extra funding for the upcoming year of activities. Related: Cybercrime a bigger risk to UK ... Read more

Source: itproportal.com

Top found tags: United States(4),cybercrime(5),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook fixes app security flaw that left users at riskLocation: Facebook - Menlo Park, United States
Date published: 31-07-2014

Facebook fixes app security flaw that left users at risk. The latest update to Facebook's mobile app has fixed a security flaw that could have seen users' mobile phone bills suddenly increase. The vulnerability made it possible for scammers to cause a denial-of-service attack on the device or run up... Read more

Source: itproportal.com

Top found tags: update(2),vulnerability(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Releases New Version of EMET Exploit Mitigation ToolLocation: Microsoft HQ - Redmond, United States
Date published: 31-07-2014

The latest version of Microsofts freely available stopgap against zero-day exploits was released today with two new exploit mitigations and a batch of new configuration options. The update to Microsofts Enhanced Mitigation Experience Tool kit, or EMET, comes six months after a technical previe... Read more

Source: threatpost.com

Top found tags: RSA(2),update(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New GameOver Zeus Variant Generates 1,000 Domains DailyLocation: Seculert - Petah Tikva, Israel
Date published: 31-07-2014

The GameOver Zeus takedown was trumpeted as a victory against cybercrime, and for all its success, even those involved understood it was likely a temporary win. Researchers at Seculert have spotted a new variant of GameOver Zeus that has spurned previous versions peer-to-peer communication infras... Read more

Source: threatpost.com

Top found tags: malware(4),telecom sector(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ford invites hackers to use Los Angeles city dataLocation: Ford, United States
Date published: 31-07-2014

2015 Ford Fiesta EcoboostFord's Sync AppLink platform integrates apps running on a smartphone with the car's voice command system. Wayne Cunningham/CNET At what it bills as the auto industry's first app developer conference, Ford will sponsor a hackathon for its Sync AppLink platform. In a unique tw... Read more

Source: cnet.com.ortal.com

Top found tags: airport(2),airport sector(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security Firm Analyzes Success of Botnet TakedownsLocation: Seculert - Petah Tikva, Israel
Date published: 31-07-2014

Israel-based threat detection firm Seculert has been monitoring the effects of the recent Gameover Zeus and Shylock botnet takedown operations, and found that the cybercriminals have already taken steps to resurrect their campaigns. The international operation against Gameover Zeus, which also disru... Read more

Source: securityweek.com

Top found tags: Department of Justice(3),cybercrime(6),malware(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Deloitte Brings Cyber War Games to the EnterpriseLocation: New York, United States
Date published: 31-07-2014

Deloitte's Cyber Risk Services group has launched new cyber war-gaming and simulation services that aim to unite those tasked with managing enterprise-wide responses to cyber-attacks. According to Deloitte, its cyber threat war-gaming approach relies on thinking from the military and academia ... Read more

Source: securityweek.com

Top found tags: Quantum Dawn 2(3),government(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Crouching Yeti' Attack Campaign Targeting Industries Worldwide Detailed in New ReportLocation: Kaspersky HQ - Moscow, Russia
Date published: 31-07-2014

Researchers at Kaspersky Lab released a detailed analysis of an advanced attack campaign that has struck about 2,800 victims across multiple industries worldwide. Dubbed 'Energetic Bear' by CrowdStrike and renamed 'Crouching Yeti' by Kaspersky Lab, the attack campaign has gone on to infect companies... Read more

Source: securityweek.com

Top found tags: United States(4),cybercrime(5),malware(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US requests $5b in extra funding to bolster cybercrime defencesLocation: DARPA - Arlington, United States
Date published: 31-07-2014

US requests $5b in extra funding to bolster cybercrime defences. US President Barack Obamas defence agency is ramping up its efforts to fight cyber crime by requesting a $5 billion [3 billion] package of extra funding for the upcoming year of activities. Related: Cybercrime a bigger risk to UK ... Read more

Source: itproportal.com

Top found tags: United States(4),cybercrime(5),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tunisia Cyber-Crime Law Threatens Internet ProgressLocation: Reporters Without Borders - Paris, France
Date published: 30-07-2014

A leaked draft for a new cybercrime law in Tunisia is raising concerns among its citizens, reports Global Voices Online. In the past couple of years Tunisia has gained attention as an exemplary pioneer in recognizing Internet rights and freedoms in the MENA region. This proposed law, however, is far... Read more

Source: vpncreative.net

Top found tags: website(1),government(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Online shopping taking off here, but e-shoppers sweat over securityLocation: PayPal HQ - San Jose, United States
Date published: 31-07-2014

The top concerns among online shoppers were having their financial details being stolen by cybercriminals and falling victim to fraud, and sharing credit card details with a website they had not visited before, according to a PayPal survey.SINGAPORE: More Singaporeans are shopping online - with more... Read more

Source: www.channelnewsasia.com

Top found tags: social media(2),cybercrime(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Trio of Cybersecurity Bills Pass HouseLocation: Department of Homeland Security - Washington, United States
Date published: 30-07-2014

The House of Representatives passed three cyber-security bills this week designed to bolster efforts to guard critical infrastructure companies against attacks. Cyber Security Bills Passed in Senate On July 28, the House passed the bi-partisan 'National Cybersecurity and Critical Infrastructure Prot... Read more

Source: securityweek.com

Top found tags: United States(4),government(7),cyber security(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
iPhone App "Signal" Enables Free Encrypted Phone CallsLocation: Google HQ - Mountain View, United States
Date published: 30-07-2014

Open Whisper Systems, the creators of the RedPhone secure calling app for Android, announced on Tuesday the availability of Signal, an iPhone application that lets users make encrypted voice calls worldwide for free. According to the open source software group, Signal is specifically created for mob... Read more

Source: securityweek.com

Top found tags: cyber security(4),mobile device(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Crypto-Ransomware Emerge in the WildLocation: RSA HQ - Bedford, United States
Date published: 30-07-2014

One of the recent triumphs against cybercrime is the disruption of the activities of the Gameover ZeuS botnet. Perhaps what makes this more significant is that one major threat was also affectedthe notorious CryptoLocker malware. However, this disruption hasnt deterred cybercriminals from usin... Read more

Source: trendmicro.com

Top found tags: malware(3),financial sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fake ID Android flaw allows apps to be impersonatedLocation: Google HQ - Mountain View, United States
Date published: 30-07-2014

A new and potentially serious flaw has been discovered in all Android devices, from version 2.1 upwards. The flaw, dubbed `Fake ID' by BlueBox Labs, allows malware to impersonate trusted applications. Fake ID Android flaw allows apps to be impersonated Fake ID Android flaw allows apps to be imperson... Read more

Source: www.scmagazineuk.com

Top found tags: Google Play(4),cyber security(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internet of Things creates new set of security headachesLocation: Hewlett-Packard - Palo Alto, United States
Date published: 30-07-2014

New research claims to show that the Internet of Things (IOT) is riddled with potential security inconsistencies, which make the IP interconnection of electrical devices - a key feature of the IoT - extraordinarily difficult to secure in practice. Internet of Things creates new set of security heada... Read more

Source: www.scmagazineuk.com

Top found tags: webcam(1),cyber security(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internet of Things: 70% of devices have critical security vulnerabilities that need addressingLocation: Hewlett-Packard - Palo Alto, United States
Date published: 30-07-2014

Internet of Things: 70% of devices have critical security vulnerabilities that. need addressing Almost three quarters of top Internet of Things device manufacturers are failing to plug grave vulnerabilities that have the potential to damage the credibility of the sector. Related: Internet of Things:... Read more

Source: itproportal.com

Top found tags: United States(2),vulnerability(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
America's self harm problem: How the NSA is killing the US economyLocation: National Security Agency - Fort Meade, United States
Date published: 30-07-2014

America's self harm problem: How the NSA is killing the US economy. After a year of NSA leaks and revelations, New America's Open Technology Institute has released a report detailing the cost of the NSA's PRISM program on the American economy. The paper outlined the shift in data storage trends from... Read more

Source: itproportal.com

Top found tags: privacy(2),Germany(3),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Active attack on Tor network tried to decloak users for five monthsLocation: Black Hat - Las Vegas, United States
Date published: 30-07-2014

beginning in February. The campaign exploited a previously unknown vulnerability in the Tor protocol to carry out two classes of attack that together may have been enough to uncloak people using Tor Hidden Services, an advisory published Wednesday warned. Tor officials said the characteristics of th... Read more

Source: arstechnica.com

Top found tags: government(2),update(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nasdaq's 2010 brush with disaster only now truly understoodLocation: NASDAQ - New York, United States
Date published: 30-07-2014

When an insidious malware was detected infecting the Nasdaq (NDAQ) back in October 2010, the resulting domino effect of shock, growing alarm, international finger pointing and, ultimately, a chaotic investigation process, was a slowly unfolding travesty that is only now becoming truly understood. In... Read more

Source: www.scmagazineuk.com

Top found tags: government(4),telecom sector(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry acquires voice and data encryption firm SecusmartLocation: BlackBerry HQ - Ontario, Canada
Date published: 30-07-2014

On Tuesday, BlackBerry announced its acquisition of voice and data encryption firm Secusmart. According to a release from the Canada-based smartphone maker, the firm had previously worked with Germany-based Secusmart to enhance security offerings for customers, namely in the release of its SecuSUITE... Read more

Source: www.scmagazine.com

Top found tags: government(2),mobile device(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
OTI report exposes economic costs of NSA spyingLocation: New York, United States
Date published: 30-07-2014

Report details China-based cyber spying on U.S. aerospace sector A report from New America OTI found that the NSA surveillance program has had a chilling effect on U.S. commerce and foreign policy. In the 13 months since Edward Snowden leaked details revealing the extent of National Security Agency ... Read more

Source: www.scmagazine.com

Top found tags: government(5),cyber security(6),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internet of Things: 70% of devices have critical security vulnerabilities that need addressingLocation: Hewlett-Packard - Palo Alto, United States
Date published: 30-07-2014

Internet of Things: 70% of devices have critical security vulnerabilities that. need addressing Almost three quarters of top Internet of Things device manufacturers are failing to plug grave vulnerabilities that have the potential to damage the credibility of the sector. Related: Internet of Things:... Read more

Source: itproportal.com

Top found tags: United States(2),vulnerability(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
America's self harm problem: How the NSA is killing the US economyLocation: National Security Agency - Fort Meade, United States
Date published: 30-07-2014

America's self harm problem: How the NSA is killing the US economy. After a year of NSA leaks and revelations, New America's Open Technology Institute has released a report detailing the cost of the NSA's PRISM program on the American economy. The paper outlined the shift in data storage trends from... Read more

Source: itproportal.com

Top found tags: privacy(2),Germany(3),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NOAA Cybersecurity Criticized in Audit by Inspector GeneralLocation: U.S. Department of Commerce - Washington, United States
Date published: 31-07-2014

A cybersecurity audit of the National Oceanic and Atmospheric Administration uncovered an agency challenged by inconsistent security controls. The audit was performed by the U.S. Department of Commerce Inspector General Office, and was released late last week. The audit focused on select systems in ... Read more

Source: securityweek.com

Top found tags: cyber security(4),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Leahy bill would end bulk data collection, introduce reformsLocation: Lea, United States
Date published: 30-07-2014

Leahy bill would end bulk data collection, introduce reforms Sen. Patrick Leahy introduced an NSA reform bill that would update the USA Freedom Act. In a bill aimed at ending government spying on Americans and bolstering privacy, Sen. Patrick Leahy (D-Vt.), chairman of the Senate Judiciary Committee... Read more

Source: www.scmagazine.com

Top found tags: telecom sector(4),Electronic Frontier Foundation(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BitTorrent launches decentralised crypto-fied chat appLocation: National Security Agency - Fort Meade, United States
Date published: 31-07-2014

BitTorrent has joined the increasingly crowded post-Snowden market for anonymous online chat services with "Bleep", a decentralised voice and text communications platform. The platform uses the BitTorrent network to spread users' voice and text through nodes rather than a centralised server. Project... Read more

Source: go.theregister.com

Top found tags: cyber security(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Multipath TCP speeds up the Internet so much that security breaksLocation: Black Hat - Las Vegas, United States
Date published: 31-07-2014

The burgeoning Multipath TCP (MPTCP) standard promises to speed up the internet but will also break security solutions including intrusion detection and data leak prevention, says security researcher Catherine Pearce. MPTCP technology is an update to the core communications backbone of the internet ... Read more

Source: go.theregister.com

Top found tags: cyber security(2),update(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fitness tracking goes under the security spotlightLocation: Symantec HQ - Mountain View, United States
Date published: 31-07-2014

The wearable market is currently estimated be worth around $14 billion and it's on the way up. According to AB Research, by 2018 over 485 million wearable devices will ship each year. Fitness trackers are just one part of the market, but they're a high profile one and it's little surprise that they'... Read more

Source: cnet.com.ortal.com

Top found tags: United States(2),cyber security(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Challenging US Court Order on Overseas DataLocation: Microsoft HQ - Redmond, United States
Date published: 31-07-2014

NEW YORK - In a case closely watched by the tech sector, Microsoft will challenge Thursday a US court order requiring it to give prosecutors electronic mail content associated with an overseas server. Microsoft said it plans to argue that the warrant, which would require the tech giant to turn over ... Read more

Source: securityweek.com

Top found tags: cyber security(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Battling online security concerns with layers: CiscoLocation: Cisco HQ - San Jose, United States
Date published: 31-07-2014

Thursday, the traditional impression that online security is renowned as being the "guns and gates" of preventing things from happening needs to change. Instead, Alistair MacGibbon, Dimension Data Australia general manager of security, argued that people's perspective of online security should be th... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),government(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why the Security of USB Is Fundamentally BrokenLocation: Black Hat - Las Vegas, United States
Date published: 31-07-2014

[gallery-ca] Josh Valcarcel/WIRED Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But... Read more

Source: wired.com

Top found tags: malware(3),Black Hat(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Canada's government set back one year by devastating Chinese cyber attackLocation: Ottawa, Ontario, Canada
Date published: 31-07-2014

PaulMCCooper. Canada's government set back one year by devastating Chinese cyber attack Canada's National Research Council (NRC) was hit by a sophisticated hack apparently initiating from China. The Canadian government has said it will take it a year to build a more secure IT infrastructure after th... Read more

Source: itproportal.com

Top found tags: United States(2),update(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICO warns businesses of Big Data privacy issuesLocation: Brussels,Belgium
Date published: 31-07-2014

ICO warns businesses of Big Data privacy issues. The Information Commissioners Office (ICO) has warned organisations that Big Data initiatives can and must operate within data protection law. In a report, ICO claims although operations must be legal, this should not be seen as a barrier to innova... Read more

Source: itproportal.com

Top found tags: report(1),cyber security(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fiendishly complex password app extension ships for iOS 8Location: Apple HQ - Cupertino, United States
Date published: 31-07-2014

AgileBits wants more apps to use 1Password's strong passwords, and has released an extension on github to that end. The idea is that app developers can grab the extension, write a few lines of code into their apps, and allow their app users to create strong passwords during registration. Naturally, ... Read more

Source: go.theregister.com

Top found tags: password(1),cyber security(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russia to Apple, SAP: Give us source code, prove you're not spiesLocation: Moscow, Russia
Date published: 31-07-2014

Communications and Mass Communications Russia has requested that both Apple and SAP willingly hand over their software source code so it can be tested for spyware. The nation's Ministry of Communications and Mass Media announced the request on Wednesday, with Communications minister Nikolai Nikiforo... Read more

Source: www.zdnet.com

Top found tags: government(3),mobile device(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Can Control Your Phone Using a Tool Thats Already Built Into ItLocation: BlackBerry HQ - Ontario, Canada
Date published: 31-07-2014

One of the vulnerable phones: the HTC One M7. One of the vulnerable phones: the HTC One M7. [gallery-ca] Ariel Zambelich/ WIRED A lot of concern about the NSAs seemingly omnipresent surveillance over the last year has focused on the agencys efforts to install back doors in software and hardwar... Read more

Source: wired.com

Top found tags: Black Hat(4),mobile device(8),telecom sector(18)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor Project unearths attack that identifies usersLocation: Black Hat - Las Vegas, United States
Date published: 31-07-2014

Users of The Onion Router (TOR) network have been warned of an attack that could deanonymise them if they used the service from February to July this year. Tor Project unearths attack that identifies users Tor Project unearths attack that identifies users Writing in a security advisory published on ... Read more

Source: www.scmagazineuk.com

Top found tags: vulnerability(2),conference(3),Black Hat(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Securobods claim Middle East govts' fingerprints all over malware flung at journosLocation: Damascus, Damascus Governorate, Syria
Date published: 31-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Researchers at Toronto-based Citizen Lab have shot down denials by Syria, Bahrain and the United Arab Emirates regarding attacks against activists, journalists and dissidents, labelling some of the assaults as incompetent. The team gathered ... Read more

Source: go.theregister.com

Top found tags: government(3),cybercrime(4),United Arab Emirates(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
In a hyper-social world, some seek a little privacyLocation: Facebook - Menlo Park, United States
Date published: 31-07-2014

After years of cajoling their users into sharing every thought, emotion and selfie, online firms are seeing that providing more private online spaces might also be profitable. Some recent developments suggest companies are starting to understand that their users dont want to indiscriminately shar... Read more

Source: www.pcworld.com Cyber crime cell investigates MLAs sons blackmail case | Thane: The Thane cyber crime cell is investigating the case of Shiv Sena MLA Pratap Sarnaik\'s son Purvesh, in which he has said that he was lured by an Australian couple with funds for the Yuva Sena and later blackmailed with a vilification campaign.The cell is investigating Purvesh\'s complaint that the couple, Marie Louis and Sanjit Sharma, whom he met through a social networking website had invited him to a Bandra hotel and demanded Rs 1 crore. While Purvesh has been unavailable for comment since Tuesday, Louis has threatened to go public with the accusation that she was pregnant with his child if he failed to pay the demanded money. The couple also threatened him saying that the vilification campaign would have a disastrous impact on the forthcoming state elections. A police officer said, \"On the networking site, the woman appreciated Purvesh\'s social work and boasted about her connections with national and international non government organizations and suggested tapping them for funds.\" | http://timesofindia.indiatimes.com/City/Thane/Cyber-crime-cell-investigates-MLAs-sons-blackmail-case/articleshow/39313768.cms | 31-07-2014 | timesofindia.indiatimes.com

Top found tags: cyber security(2),social media(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crouching Yeti APT Campaign Stretches Back Four YearsLocation: Kaspersky HQ - Moscow, Russia
Date published: 31-07-2014

A new analysis of a long-term APT campaign targeting manufacturers, industrial, pharmaceutical, construction and IT companies in several countries has uncovered fresh details of the attack, including identification of nearly 3,000 victims and the unmasking of the command-and-control infrastructure. ... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),United States(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile Apps Are Replacing the Web - Is Your Enterprise Ready?Location: Gartner - Stamford, United States
Date published: 31-07-2014

We know mobile is quickly changing the way we do business and now its also beginning to replace the web. A recent Gartner study shows that 86 percent of users are now using mobile apps compared to the 14 percent still using mobile browsers. The trajectory is very clearly shifting from web to mobi... Read more

Source: securityweek.com

Top found tags: trend(1),cyber security(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Innominate Patches Vulnerability in mGuard Industrial Security RoutersLocation: Berlin, Germany
Date published: 31-07-2014

Innominate Security Technologies, a Germany-based company that specializes in communication security components and solutions for industrial networks, has fixed a vulnerability affecting its mGuard series industrial security routers. According to an advisory from ICS-CERT, the flaw, which has been a... Read more

Source: securityweek.com

Top found tags: medical sector(2),RSA(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Akamai Joins Microsoft in Cybersecurity Startup AcceleratorLocation: Akamai - Boston, United States
Date published: 31-07-2014

Internet infrastructure giant Akamai Technologies has joined Microsoft and venture capital firm Jerusalem Venture Partners (JVP) in the cybersecurity startup accelerator program launched recently in Israel. "Tech startups have the potential to shape the future of cyber security," commented Zack Weis... Read more

Source: securityweek.com

Top found tags: threat(1),Akamai(2),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor HackedLocation: Black Hat - Las Vegas, United States
Date published: 31-07-2014

The online privacy tool Tor yesterday announced that it was recently hit by an attack aimed at deanonymizing users. The attack, according to Tor co-founder Roger Dingledine, involved modifying Tor protocol headers to execute traffic confirmation attacks. "The attacking relays joined the network on J... Read more

Source: www.esecurityplanet.com

Top found tags: conference(2),cyber security(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to Minimize Enterprise File Sharing RisksLocation: Dropbox - San Francisco, United States
Date published: 31-07-2014

Since the days of the floppy disk, users have tried to piece together convenient ways to share files between one another. Every system seemed sloppy in its own way. Email was the first file exchange platform, albeit an informal one, due to its convenience factor. But the costs of exchanging files wi... Read more

Source: www.esecurityplanet.com

Top found tags: New Zealand(2),telecom sector(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Canada's government set back one year by devastating Chinese cyber attackLocation: Ottawa, Ontario, Canada
Date published: 31-07-2014

PaulMCCooper. Canada's government set back one year by devastating Chinese cyber attack Canada's National Research Council (NRC) was hit by a sophisticated hack apparently initiating from China. The Canadian government has said it will take it a year to build a more secure IT infrastructure after th... Read more

Source: itproportal.com

Top found tags: United States(2),update(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICO warns businesses of Big Data privacy issuesLocation: Brussels,Belgium
Date published: 31-07-2014

ICO warns businesses of Big Data privacy issues. The Information Commissioners Office (ICO) has warned organisations that Big Data initiatives can and must operate within data protection law. In a report, ICO claims although operations must be legal, this should not be seen as a barrier to innova... Read more

Source: itproportal.com

Top found tags: report(1),cyber security(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
This thumbdrive hacks computers. BadUSB exploit makes devices turn evilLocation: Black Hat - Las Vegas, United States
Date published: 31-07-2014

When creators of the state-sponsored Stuxnet worm used a USB stick to infect air-gapped computers inside Iran's heavily fortified Natanz nuclear facility, trust in the ubiquitous storage medium suffered a devastating blow. Now, white-hat hackers have devised a feat even more seminalan exploit tha... Read more

Source: arstechnica.com

Top found tags: Black Hat(4),cyber security(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BadUSB: Big, bad USB security problems aheadLocation: Black Hat - Las Vegas, United States
Date published: 31-07-2014

in a USB stick and flash! all the secret plans to conquer Chicago are sucked down into the thumb-drive. The only fiction is how fast it takes to download data. In the real world, office data thieves walk out with stolen data everyday on their flash drives. Skull-Crossbones-USBUSB memory stic... Read more

Source: www.zdnet.com

Top found tags: Black Hat(4),mobile device(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft ordered to hand over overseas email, throwing EU privacy rights in the fireLocation: Microsoft HQ - Redmond, United States
Date published: 31-07-2014

A US judge has ordered Microsoft to hand over foreign data it stores back to the US, despite allegedly strong privacy protections in Europe to mitigate such processes. Yes, the FBI and CIA can read your email. Here's how Yes, the FBI and CIA can read your email. Here's how The logic of the court is ... Read more

Source: www.zdnet.com

Top found tags: United States(2),social media(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Zero-Day Vulnerabilities Found in Symantec Endpoint ProtectionLocation: Symantec HQ - Mountain View, United States
Date published: 31-07-2014

While conducting penetration testing for one of its customers, Offensive Security uncovered three zero-day vulnerabilities in Symantec Endpoint Protection (SEP) that can be exploited for privilege escalation. Offensive Security, which is known for the Kali Linux penetration testing distribution, pub... Read more

Source: securityweek.com

Top found tags: cybercrime(3),Black Hat(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researcher develops BadUSB code to compromise USB sticks - and their computer hostsLocation: New York, United States
Date published: 31-07-2014

Karsten Nohl also reveals how an enhanced security approach can beat his USB architecture compromise. Researcher develops BadUSB code to compromise USB sticks - and their computer hosts Researcher develops BadUSB code to compromise USB sticks - and their computer hosts The humble USB stick - develop... Read more

Source: www.scmagazineuk.com

Top found tags: malware(2),Black Hat(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Paddy Power breach impacting 650K customers dates back to 2010Location: Ottawa, Ontario, Canada
Date published: 31-07-2014

Irish bookmaker Paddy Power is notifying 649,055 customers that their data was stolen in a breach dating back to 2010. The compromised data included names, usernames, addresses, email addresses, phone numbers, dates of birth, and prompted questions and answers, according to a Thursday notification, ... Read more

Source: www.scmagazine.com

Top found tags: password(1),cyber security(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Cisco Introduces Certification for Industrial Networking SpecialistsLocation: Cisco HQ - San Jose, United States
Date published: 30-07-2014

Cisco announced on Tuesday that it has expanded its certification portfolio to include specialists in industrial networking and other fields. As information technologies (IT) and operational technologies (OT) converge, IP Networking and Ethernet connectivity plays an important role on the industrial... Read more

Source: securityweek.com

Top found tags: training(1),data breach(2),Ponemon Institute(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sony Settles Data Breach Lawsuit for $15 MillionLocation: eBay - San Jose, United States
Date published: 30-07-2014

Sony recently offered to settle a class action lawsuit over the 2011 breach of its PlayStation Network, which exposed tens of millions of user names, addresses, passwords and credit card numbers (h/t Infosecurity). According to the terms of the proposed $15 million settlement, the money will be paid... Read more

Source: www.esecurityplanet.com

Top found tags: United Kingdom(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Breach index: Encryption used in 4 percent of Q2 incidentsLocation: Berlin, Germany
Date published: 30-07-2014

Michaels investigates possible payment card breach Among 237 disclosed data breaches last quarter, encryption was used in only 10 instances. Last quarter, organizations that reported data breaches only used encryption around four percent of the time to further safeguard data, a report found. On Wedn... Read more

Source: www.scmagazine.com

Top found tags: Germany(2),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Customer Loyalty Seriously Affected by Data Breaches: SafeNetLocation: Berlin, Germany
Date published: 31-07-2014

A global survey conducted by data protection solutions provider SafeNet once again confirms that data breaches, especially ones that involve financial data, have a negative impact on customer loyalty. According to the study, 65% of the roughly 4,500 respondents are unlikely to do business with a com... Read more

Source: securityweek.com

Top found tags: Germany(2),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What's the odds? Paddy Power loses 650,000 records in 2010 breachLocation: Dublin, Ireland
Date published: 31-07-2014

Popular bookmaker Paddy Power has admitted that a data breach it suffered it 2010 affected 649,055 people - around a third of all customers - but stresses that no financial information or passwords were compromised. What's the odds? Paddy Power loses 650,000 records in 2010 breach What's the odds? P... Read more

Source: www.scmagazineuk.com

Top found tags: financial sector(2),update(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Tor Sniffs Out Attacks Trying to Deanonymize Hidden Services UsersLocation: National Security Agency - Fort Meade, United States
Date published: 30-07-2014

UPDATE: For a little more than six months, attackers were on the Tor network trying to deanonymize users who operate or use Tor hidden services. Tor issued a security advisory this morning warning users who operated or accessed hidden services between Jan. 30 and July 4 that they were likely affecte... Read more

Source: threatpost.com

Top found tags: vulnerability(2),government(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Secure Microkernel seL4 Code Goes Open-SourceLocation: Goes, Goes, Zeeland, The Netherlands
Date published: 30-07-2014

General Dynamics C4 Systems and Australias Information and Communications Technology Research Centre (NICTA) today open sourced the code-base of a secure microkernel project known as seL4. Touted as the most trustworthy general purpose microkernel in the world, seL4 has previously been adap... Read more

Source: threatpost.com

Top found tags: government(1),research(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Country-Specific Web Domains Can't Be Seized: ICANNLocation: Pyongyang, North Korea
Date published: 30-07-2014

Country Web Domains Can't be Seized: Regulator WASHINGTON - The Internet's regulatory authority said Wednesday that country-specific Web domains cannot be seized in court proceedings, as it sought to quash an effort to recover assets in terrorism-related lawsuits. The Internet Corporation for Assign... Read more

Source: securityweek.com

Top found tags: Israel(1),legislation(1),Syria(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor Warns of Attack Attempting to Deanonymize UsersLocation: Black Hat - Las Vegas, United States
Date published: 30-07-2014

The Tor Project has disclosed details of an attack which appeared to be an attempt to deanonymize users of the popular anonymity network. According to Tor Project Leader Roger Dingledine, the attack was detected on July 4 while the organization was trying to identify attacks leveraging a method disc... Read more

Source: securityweek.com

Top found tags: patch(2),update(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK Lords slams EU ruling on "right to be forgotten"Location: Brussels,Belgium
Date published: 30-07-2014

A committee sitting in the UK's House of Lords has said that the EU's ruling on the 'right to be forgotten', which requires companies to delete data on request where appropriate, is 'unworkable'. UK Lords slams EU ruling on "right to be forgotten" UK Lords slams EU ruling on "right to be forgotten" ... Read more

Source: www.scmagazineuk.com

Top found tags: social media(2),United Kingdom(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brace yourself! Taxpayers fork out 700m as Government loses NHS IT battle against FujitsuLocation: National Health Service - London, United Kingdom
Date published: 30-07-2014

Brace yourself! Taxpayers fork out 700m as Government loses NHS IT battle. against Fujitsu The government has reportedly lost a legal battle with tech giant Fujitsu relating to the failed NHS National Programme for IT (NPfIT). According to UK newspaper The Telegraph, taxpayers will be footing the ... Read more

Source: itproportal.com

Top found tags: health sector(4),medical sector(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry acquires Secusmart to bolster the security of political leadersLocation: BlackBerry HQ - Ontario, Canada
Date published: 29-07-2014

BlackBerry acquires Secusmart to bolster the security of political leaders. BlackBerry is bolstering its mobile security defences with the purchase of Secusmart in order to further develop its enterprise wardrobe in a mobile setting. Related: BlackBerry gets governmental certification for iOS and An... Read more

Source: itproportal.com

Top found tags: government(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor attack nodes RIPPED MASKS off users for 6 MONTHSLocation: Black Hat - Las Vegas, United States
Date published: 30-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines The Tor Project has warned users about a subtle attack aimed at partially uncloaking their activities on the anonymising network. The attack, which ran from late January until early July, when it was thwarted, bears hallmarks attributed to a... Read more

Source: go.theregister.com

Top found tags: conference(2),government(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Right to be forgotten' ruling is unworkable and misguided, UK Lords sayLocation: Brussels,Belgium
Date published: 30-07-2014

The EU court ruling that gives people the right to be forgotten by search engines is misguided in principle and unworkable in practice, said a U.K. House of Lords subcommittee Wednesday. A May ruling by the Court of Justice of the European Union (CJEU) gave EU citizens the right to compel sear... Read more

Source: www.pcworld.com

Top found tags: legislation(2),United Kingdom(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gizmodo Brazil Compromised, Leads to BackdoorLocation: Google HQ - Mountain View, United States
Date published: 30-07-2014

Recently, I learnt that attackers compromised Gizmodos Brazilian regional site. The attackers wereable to modify the Gizmodo main page to add a script which redirected them to another compromised website. This second compromised site was hosted in Sweden, and used a.se domain name. The attack... Read more

Source: trendmicro.com

Top found tags: backdoor(2),ISP(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Programming error results in CVS Caremark mailing blunderLocation: New York, United States
Date published: 30-07-2014

About 350 CVS Caremark customers are being notified that a programming error resulted in mailers containing their personal information being sent to the wrong customers. How many victims? About 350. What type of personal information? Names and full lists of medications. What happened? A programming ... Read more

Source: www.scmagazine.com

Top found tags: EN(1),United States(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
House of Lords subcommittee highlights 'right to be forgotten' flawsLocation: Brussels,Belgium
Date published: 30-07-2014

The House of Lords subcommittee has deemed the right to be forgotten ruling to be outdated and unreasonable. In its EU Data Protection law: a right to be forgotten?' report, the House of Lords EU Home Affairs, Health and Education subcommittee called the May ruling by the Court of Jus... Read more

Source: www.scmagazine.com

Top found tags: legislation(1),report(1),EU(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
House passes two cyber security billsLocation: Department of Homeland Security - Washington, United States
Date published: 30-07-2014

Earlier this week, The House of Representatives passed two bills which aim to strengthen cyber security in the nation. One bill, backed by lawmakers via a voice vote on Monday, aims to thwart critical infrastructure attacks through the development of strategic plan outlined by the Department of Home... Read more

Source: www.scmagazine.com

Top found tags: DHS(4),United States(4),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A five-month-long Tor attack attempting to 'deanonymize' usersLocation: Black Hat - Las Vegas, United States
Date published: 30-07-2014

Tor is a network designed to make locating users virtually impossible, but that all changed on Wednesday when a Tor researcher announced a roughly five-month-long attack attempting to deanonymize users. The attack involved modifying Tor protocol headers to do traffic confirmation attacks,... Read more

Source: www.scmagazine.com

Top found tags: research(1),vulnerability(1),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Symantec Endpoint Protection vulnerabilities enable privilege escalationLocation: Symantec HQ - Mountain View, United States
Date published: 30-07-2014

Symantec Endpoint Protection vulnerabilities enable privilege escalation The vulnerabilities can be exploited to escalate privileges, perhaps resulting in a complete Windows domain takeover. It seems even security software needs security these days on Tuesday, researchers with Offensive Security... Read more

Source: www.scmagazine.com

Top found tags: conference(2),vulnerability(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russia to SAP, Apple: Hand over source code to prove you're not spiesLocation: Apple HQ - Cupertino, United States
Date published: 31-07-2014

Russia has asked SAP an Apple to hand over their products' source code so it can be tested for spyware. The nation's Ministry of Communications and Mass Media announced the request on Wednesday. The shrinkwrapped statement about the request features Communications minister Nikolai Nikiforov Edward S... Read more

Source: go.theregister.com

Top found tags: social media(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Local government IT spending has skyrocketedLocation: New York, United States
Date published: 31-07-2014

Local government IT spending has skyrocketed. Following a decline in 2012, local government IT spending started to grow again last year, according to a new report. Conducted by market research firm TechMarketView, the study claims that the UK public sector technology market should be growing more th... Read more

Source: itproportal.com

Top found tags: survey(1),government(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AVG stung as search revenue from freebie scanners dries upLocation: AVG HQ - San Francisco, United States
Date published: 31-07-2014

Security software firm AVG net income has fallen from $24.7m in Q2 2013 to $13.7mn in Q2 2014, according to financial results out Wednesday. The profits slide is explained by the slip in revenue from $100.4m in Q2 2013 to $88m in the three months running up to 30 June 2014. AVG responded to the resu... Read more

Source: go.theregister.com

Top found tags: AVG(1),EN(1),gaming(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM snaps up Italian cloud security vendor CrossIdeasLocation: IBM HQ - Armonk, United States
Date published: 31-07-2014

applications and data in cloud and on-premise systems. IBM announced on Thursday it had acquired the Italian security vendor, adding to Big Blue's broad portfolio of security services that has already seen it become the world's third largest security vendor by revenue. CrossIdeas, already an IBM par... Read more

Source: www.zdnet.com

Top found tags: threat(1),Akamai(2),antivirus(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Who's afraid of the NSA? BitTorrent unveils secure chat app "Bleep" for WindowsLocation: Microsoft HQ - Redmond, United States
Date published: 31-07-2014

Who's afraid of the NSA? BitTorrent unveils secure chat app "Bleep" for Windows. Recent revelations, courtesy of Edward Snowden, have given insight into just how much citizens need to worry about NSA activity, and it was an alarmingly large amount. BitTorrent has been working to mitigate these issue... Read more

Source: itproportal.com

Top found tags: Windows(1),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM Acquires Italian Cybersecurity Startup CrossIdeasLocation: IBM HQ - Armonk, United States
Date published: 31-07-2014

IBM today announced that it has acquired CrossIdeas, a privately held provider of Access Governance software that helps organizations manage user access to applications and data across on-premise and cloud environments. With this acquisition, IBM is adding advanced analytics capabilities to its port... Read more

Source: securityweek.com

Top found tags: ISP(1),Italy(1),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Local government IT spending has skyrocketedLocation: New York, United States
Date published: 31-07-2014

Local government IT spending has skyrocketed. Following a decline in 2012, local government IT spending started to grow again last year, according to a new report. Conducted by market research firm TechMarketView, the study claims that the UK public sector technology market should be growing more th... Read more

Source: itproportal.com

Top found tags: survey(1),government(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Who's afraid of the NSA? BitTorrent unveils secure chat app "Bleep" for WindowsLocation: Microsoft HQ - Redmond, United States
Date published: 31-07-2014

Who's afraid of the NSA? BitTorrent unveils secure chat app "Bleep" for Windows. Recent revelations, courtesy of Edward Snowden, have given insight into just how much citizens need to worry about NSA activity, and it was an alarmingly large amount. BitTorrent has been working to mitigate these issue... Read more

Source: itproportal.com

Top found tags: Windows(1),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pentagon hacker McKinnon reinvents himself as SEO guruLocation: The Pentagon - Washington, United States
Date published: 31-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Former hacker and US extradition target Gary McKinnon has found a new career as a search engine optimisation expert. McKinnon - who successfully fought a 10-year campaign against extradition to the US over charges he hacked into Pentagon sys... Read more

Source: go.theregister.com

Top found tags: threat(1),website(1),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BitTorrent Presents Secure, Serverless Chat Application "Bleep"Location: Microsoft HQ - Redmond, United States
Date published: 31-07-2014

BitTorrent has provided additional details on Bleep, an encrypted voice and messaging application which, unlike similar solutions, doesn't rely on central servers. According to BitTorrent Bleep project head Farid Fadaie, the application has two main components: the engine, which is the company's new... Read more

Source: securityweek.com

Top found tags: Windows(1),mobile device(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attackers compromise Gizmodo BrazilLocation: Trend Micro - Cupertino, United States
Date published: 31-07-2014

Attacks on Gizmodo's Brazilian site and the website of an unnamed logistics firm hosted by the same ISP have prompted Trend Micro to investigate whether a vulnerability was used in order to penetrate the web servers, according to a company blog post. Attackers modified Gizmodo's main page by a... Read more

Source: www.scmagazine.com

Top found tags: website(1),backdoor(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CIA boss apologizes for snooping on Senate computersLocation: The Washington Post - Washington, D.C., United States
Date published: 31-07-2014

accessed computers that were supposed to be available only to committee investigators, according to multiple reports on Thursday. Further Reading How CIA snooped on Senate Intel Committees files It's easy to search someone's network when you hired the IT department. The mea culpafrom CIA Direct... Read more

Source: arstechnica.com Russian cyber-crime suspect to be sent from Guam to US mainland | A federal judge on Guam has denied a motion to discharge a Russian cyber-crime suspect who says he was kidnapped by the US government while on holiday and brought to the island.Roman Seleznev is being held on Guam after he was seized by American secret agents earlier this month while on holiday in the Maldives, forced onto a plane and flown to the US territory before being arrested.The Pacific Daily News reports that Judge Frances Tydingco-Gatewood denied a motion put forward by Mr Seleznev\'s lawyers, which argued that the way in which he was brought to Guam breached international law.The judgement means that Mr Seleznev - who\'s accused of being the mastermind behind a massive credit card hacking scam - is likely to be sent to the US state of Washington to face trial. | http://www.radionz.co.nz/international/pacific-news/251110/russian-cyber-crime-suspect-to-be-sent-from-guam-to-us-mainland | 31-07-2014 | www.radionz.co.nz

Top found tags: report(1),government(2),legislation(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Superveilig Tor-netwerk slachtoffer van hackLocation: The Washington Post - Washington, D.C., United States
Date published: 31-07-2014

Het Tor-netwerk, opgezet om gebruikers in volledige anonimiteit gegevens te laten uitwisselen, blijkt al maanden genfiltreerd, waarschuwt de organisatie zelf. Meer over Tor Rusland zet premie op nekken Tor-net Pentagon werkt aan opvolger Tor Kaspersky vindt Android-malware voor Tor Anonimiteit Tor... Read more

Source: www.automatiseringgids.nl

Top found tags: Black Hat(4),government(5),United States(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers demonstreren nieuwe USB-aanval op Black Hat conferentieLocation: Black Hat - Las Vegas, United States
Date published: 31-07-2014

Twee onderzoekers zullen volgende week tijdens de Black Hat conferentie in Las Vegas demonstreren hoe USB-sticks een computer volledig kunnen overnemen, door malware die niet op de stick zelf staat, maar in de firmware van het apparaat is verstopt en nauwelijks te detecteren. Ook zullen onderzoekers... Read more

Source: www.security.nl

Top found tags: government(3),Black Hat(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internet of Things blijkt hacker-walhallaLocation: Hewlett-Packard - Palo Alto, United States
Date published: 31-07-2014

creativecommons.org/licenses/by-sa/2.0/deed.en (door: dmje) Bij meer dan de helft van de apps die nodig zijn voor de bediening van op internet aangesloten apparaten in huis rammelt de beveiliging. Ook de apparaten zelf bleken vaak vatbaar voor online aanvallen. De steekproef van Fortify omvatte (app... Read more

Source: www.automatiseringgids.nl

Top found tags: cyber security(2),information security(2),OpenSSL(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Symantec waarschuwt voor zero day-lek in Endpoint ProtectionLocation: Symantec HQ - Mountain View, United States
Date published: 31-07-2014

Anti-virusbedrijf Symantec waarschuwt organisaties voor een zero day-lek in het anti-viruspakket Symantec Antivirus Endpoint Protection, waardoor een aanvaller die al toegang tot het systeem heeft zijn rechten kan verhogen. De kwetsbaarheid werd onlangs door beveiligingsbedrijf Offensive Security ti... Read more

Source: www.security.nl

Top found tags: cyber security(2),update(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Broncode gamebedrijven doelwit van cheaters en crackersLocation: Dell HQ - Round Rock, United States
Date published: 31-07-2014

Een groep cybercriminelen is al jaren bezig om bij gamebedrijven in te breken en zo de broncode van games te kunnen stelen waarmee cheats zouden worden ontwikkeld om vals te spelen. Ook zou de groep zogeheten 'cracks' ontwikkelen om de kopieerbeveiliging van de spellen te omzeilen en wordt de bronco... Read more

Source: www.security.nl

Top found tags: report(2),trojan(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware kaapt kassasystemen via remote desktopLocation: Amsterdam, The Netherlands
Date published: 31-07-2014

Het Computer Emergency Readiness Team (US-CERT) van de Amerikaanse overheid heeft samen met de Secret Service en IT-beveiliger Trustwave Spiderlabs een waarschuwing afgegeven voor een nieuwe malware-variant die kassasystemen infecteert om vervolgens creditcardgegevens van klanten te stelen. De malwa... Read more

Source: www.security.nl

Top found tags: cybercrime(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nieuwe Cryptoblocker-ransomware hanteert 100MB-limietLocation: Trend Micro - Cupertino, United States
Date published: 31-07-2014

Onderzoekers hebben nieuwe crypto-ransomware ontdekt die bestanden op computers tegen losgeld versleutelt. Om weer toegang tot de bestanden te krijgen moeten slachtoffers een bepaald bedrag betalen. Opmerkelijk aan Cryptoblocker, zoals de ransomware heet, is dat het een 100MB-limiet hanteert. Bestan... Read more

Source: www.security.nl

Top found tags: cybercrime(2),financial sector(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Rusland wil toegang tot broncode Apple en SAPLocation: Moscow, Russia
Date published: 31-07-2014

De Russische autoriteiten willen dat Apple en SAP toegang tot hun broncode geven, om zo te controleren dat er geen backdoors in zitten verstopt waardoor buitenlandse inlichtingendiensten Rusland kunnen bespioneren. Het voorstel werd vorige week gedaan door de Russische Minister van Communicatie, Nik... Read more

Source: www.security.nl

Top found tags: cyber security(2),United States(6),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BitTorrent onthult privacyvriendelijke chat-app BleepLocation: Amsterdam, The Netherlands
Date published: 31-07-2014

De ontwikkelaars van de P2P-software BitTorrent hebben een chat-applicatie onthuld die meer privacy en veiligheid zou bieden dan bestaande applicaties. Hoewel er al veel chat-applicaties zijn die encryptie en privacy beloven, gaan die volgens de ontwikkelaars niet goed om met de metadata van gebruik... Read more

Source: www.security.nl

Top found tags: NL(1),privacy(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft in beroep tegen afstaan e-mail op overzeese serversLocation: Microsoft HQ - Redmond, United States
Date published: 31-07-2014

Microsoft gaat vandaag in beroep tegen een gerechtelijk bevel waardoor de softwaregigant gedwongen wordt om de inhoud van e-mails die op overzeese servers staan aan de Amerikaanse autoriteiten af te staan. Het gaat dan om e-mails die zich in het Ierse datacentrum van Microsoft in Dublin bevinden. Vo... Read more

Source: www.security.nl

Top found tags: telecom sector(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NPO scherpt cookiebeleid aan na dreiging met dwangsomLocation: Amsterdam, The Netherlands
Date published: 31-07-2014

De Stichting Nederlandse Publieke Omroep (NPO) gaat het cookiebeleid aanpassen nadat de Autoriteit Consument & Markt (ACM) met een een dwangsom van 25.000 euro per week had gedreigd. Volgens de ACM worden op verschillende websites die de NPO beheert cookies bij gebruikers geplaatst zonder dat zij da... Read more

Source: www.security.nl

Top found tags: social media(2),The Netherlands(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Google lanceert 64-bit testversie Chrome voor WindowsLocation: Google HQ - Mountain View, United States
Date published: 31-07-2014

Google heeft een 64-bit testversie van Google Chrome voor Windows 7 en Windows 8 gelanceerd, waarmee een uiteindelijke 64-bit versie een stap dichterbij is. Google hanteert verschillende testkanalen voor Chrome. Zo is er een canary en developer channel, met zeer vroege testversies van de browser. Oo... Read more

Source: www.security.nl

Top found tags: Chrome(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gestolen iMac na maand teruggevonden dankzij "vind app"Location: Apple HQ - Cupertino, United States
Date published: 31-07-2014

De politie heeft dankzij een "vind app" een iMac die een maand geleden in het Zuid-Hollandse Hekelingen werd gestolen in het Brabantse Son en Breugel, zo'n 124 kilometer verderop, teruggevonden. De Apple iMac werd eind juni samen met diverse andere goederen uit een woning in Hekelingen gestolen. De ... Read more

Source: www.security.nl

Top found tags: NL(1),police(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BitTorrent start veilig WhatsApp alternatief BleepLocation: Amsterdam, The Netherlands
Date published: 31-07-2014

BitTorrent komt met een gedecentraliseerde chatclient. De chatdienst van BitTorrent is bedoeld voor privgesprekken tussen vrienden, journalisten en hun afgeschermde bronnen, politici of diplomaten die niet afgeluisterd willen worden en zakelijke gebruikers. Er kan ook zonder gebruikersnaam gechat ... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),WhatsApp(1),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
USB-aanval via firmware is nauwelijks te detecterenLocation: Black Hat - Las Vegas, United States
Date published: 31-07-2014

Twee onderzoekers zullen volgende week tijdens de Black Hat conferentie in Las Vegas demonstreren hoe USB-sticks een computer volledig kunnen overnemen, door malware die niet op de stick zelf staat, maar in de firmware van het apparaat is verstopt en nauwelijks te detecteren.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: research(1),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Iers gokbedrijf bekent diefstal klantgegevens na 4 jaarLocation: Toronto, Canada
Date published: 31-07-2014

Het Ierse gokbedrijf Paddy Power heeft 649.000 klanten na 4 jaar gewaarschuwd dat hun gegevens in 2010 bij een inbraak op het netwerk van het bedrijf zijn buitgemaakt. Het gaat om naam, gebruikersnaam, e-mailadres, telefoonnummer, geboortedata en beveiligingsvraag en antwoord. Er zouden destijds gee... Read more

Source: www.security.nl

Top found tags: police(1),research(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"NS onduidelijk over alternatieven voor OV-chipkaart"Location: Amsterdam, The Netherlands
Date published: 31-07-2014

De NS informeert reizigers onvoldoende over alternatieven voor de OV-chipkaart, zo concluderen Rover en de Consumentenbond naar aanleiding van klachten over het afschaffen van het papieren treinkaartje. De organisaties zeggen de ontvangen klachten met de NS te gaan bespreken. Ze roepen de vervoerder... Read more

Source: www.security.nl

Top found tags: NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker kraakt baseband-chip telefoons om malware te installerenLocation: BlackBerry HQ - Ontario, Canada
Date published: 31-07-2014

Een onderzoeker van het Amerikaanse beveiligingsbedrijf Accuvant heeft een gat gevonden in de baseband-chips van meerdere telefoons, waardoor iemand die zichzelf voordoet als een telecomprovider malware op het toestel zou kunnen installeren. Beveiligingsonderzoeker Martin Solnik, die zijn bevindinge... Read more

Source: tweakers.net

Top found tags: mobile device(4),United States(4),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid in Microsoft Internet Explorer ontdektLocation: Microsoft HQ - Redmond, United States
Date published: 31-07-2014

Samenvatting: Het Zero Day Initiative (ZDI) heeft een kwetsbaarheid ontdekt in Microsoft Internet Explorer versies 6 tot en met 11. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om willekeurige code uit te voeren onder de rechten van een gebruiker. Beschrijving: De kwetsbaarhe... Read more

Source: www.ncsc.nl

Top found tags: patch(1),vulnerability(1),Internet Explorer(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden in Drupal verholpenLocation: Cross, United States
Date published: 31-07-2014

Samenvatting: De ontwikkelaars van Drupal hebben diverse kwetsbaarheden in Drupal-Core versies 6.x en 7.x verholpen. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende de volgende malafide acties uitvoeren; Denial of Service (DoS), toegang tot gevoelige gegevens, omzeilen van aut... Read more

Source: www.ncsc.nl

Top found tags: Fedora(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in CUPS verholpenLocation: Ubuntu - London, United Kingdom
Date published: 31-07-2014

Samenvatting: Meerdere Linuxdistributies hebben een update beschikbaar gesteld waarmee een kwetsbaarheid in CUPS wordt verholpen. Gevolgen: Een lokale aanvaller kan de kwetsbaarheid gebruiken om zijn rechten te verhogen en zodoende bestanden in te zien waar hij dit normaal niet toe gerechtigd is. Be... Read more

Source: www.ncsc.nl

Top found tags: Fedora(2),Ubuntu(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish