Under construction

New design coming soon!

CIC News engine statistics

CIC News for 01-08-2014 contains 131 articles: cybercrime(34),cyber security(47),data breach(24),other(26)

CIC News update contains 116 English and 15 Dutch articles for today.
There are 8 published advisories, 1 are English and 7 are Dutch.
In today's English news articles:
- 27 related to cybercrime
- 45 related to cyber security
- 24 related to data breach and identity theft
- 20 for the category other news

In today's Dutch news articles:
- 7 related to cybercrime
- 2 related to cyber security
- 6 for the category other news

Have fun reading.

English cybercrime related news

FBI to increase staffing in Pittsburgh cyber crime unitLocation: Pittsburgh, United States
Date published: 30-07-2014

In 2007, as the nation continued to adjust to a high-security paradigm forged in the aftermath of 9/11, the current assistant attorney general for national security, John Carlin, was tasked with helping then-FBI director Robert Mueller draft a speech identifying the new face of terror.The speech,... Read more

Source: www.post-gazette.com

Top found tags: malware(3),cybercrime(8),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Heads in the Sand When It Comes to Small Business SecurityLocation: Kaspersky HQ - Moscow, Russia
Date published: 30-07-2014

Last week I attended a round-table that explored how micro businesses are targeted by cybercriminals. It may be surprising to many people to learn just how at risk from cybercriminal activity even the smallest of businesses can be - fraud, banking Trojans, ransomware and phishing attacks all target ... Read more

Source: www.huffingtonpost.co.uk

Top found tags: Kaspersky Lab(4),telecom sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New cybercop unit will monitor extremist Facebook groupsLocation: Facebook - Menlo Park, United States
Date published: 30-07-2014

Karen Hkkerup, the justice minister, told parliament that the newly-established internet crime unit, the National Cyber Crime Centre (NC3), will be fighting hackers, investigating internet fraud and busting up paedophile rings. She also said, in written answers to parliaments legal committee, t... Read more

Source: cphpost.dk

Top found tags: child pornography(2),cybercrime(4),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Industry competition, DDoS attacks can't stop MoveLocation: Real, United States
Date published: 30-07-2014

Online real estate company Move (MOVE) posted another revenue increase, with second-quarter revenue growing 7% year-over-year to $61.3 million, recording positive gains despite hurdles during the quarter. First, the company overcame a dedicated denial of service (DDoS) attack that disrupted its webs... Read more

Source: www.housingwire.com

Top found tags: website(1),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Did Not Flood LAs Critical InfrastructureLocation: Los Angeles, United States
Date published: 30-07-2014

Yesterday, a water main broke at UCLA, causing flooding and the tremendous waste of drought-era CAs scarcest resource, water.The rupture of the 90-year-old main sent a geyser shooting 30 feet in the air and deluged Sunset Boulevard and UCLA with 8 million to 10 million gallons of water before it ... Read more

Source: www.emptywheel.net

Top found tags: EN(1),hackers(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Real Hacks of Critical Infrastructure are Occurring Information Sharing is Not WorkingLocation: Aurora, United States
Date published: 30-07-2014

June 24th I gave a presentation on ICS cyber security at Cyber Endeavor 2014 at the Naval PostGraduate School and discussed both Aurora and Project Shine. Aurora is a PHYSICAL gap in protection of the electric grid that with the exception of very few utilities, is not being mitigated. Project Shine ... Read more

Source: www.infosecisland.com

Top found tags: Department of Energy(3),critical infrastructure(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Launches EMET 5.0Location: Microsoft HQ - Redmond, United States
Date published: 31-07-2014

Microsoft announced on Thursday the general availability of the Enhanced Mitigation Experience Toolkit (EMET) 5.0. According to the company, version 5.0 of the free security tool comes with two new mitigations, Attack Surface Reduction (ASR) and Export Address Table Filtering Plus (EAF+), both of wh... Read more

Source: securityweek.com

Top found tags: SSL (1),website(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Serious Android Security Flaw, Fake I.D., Found, Illustrates the Importance of UpdatesLocation: Google HQ - Mountain View, United States
Date published: 31-07-2014

As a society, we like I.D. cards. They are the manifestation of our trust that a person is who they say they are and that, yes, bartender, the possessor is old enough to enjoy a glass of cognac. But sometimes those I.D.s arent right. Sometimes theyre manipulated into stating things that aren... Read more

Source: blogs.mcafee.com

Top found tags: NFC(2),social media(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cryptoblocker variant emerges, encryption differs from CryptoLockerLocation: Trend Micro - Cupertino, United States
Date published: 31-07-2014

While law enforcement won an important battle against cyber crime by taking down the Gameover Zeus botnet and hampering the threat of CryptoLocker malware, that hasn't stopped persistent and innovative criminals from producing variants on file-encryption malware like the recently detected Cryptobloc... Read more

Source: www.scmagazine.com

Top found tags: Trend Micro(2),malware(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Paper: Learning about Bflient through sample analysisLocation: New York, United States
Date published: 30-07-2014

Flexible module-handling mechanism allows malware to adjust functionalities at will.The history of the 'Bflient' worm goes back to the discovery of its first variants in June 2010. The malware was created using the 'ButterFly Flooder' toolkit, which is an update to 'ButterFly Bot' - made (in)famous ... Read more

Source: www.virusbtn.com

Top found tags: botnet(2),cybercrime(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android malware targets sensitive dataLocation: Google HQ - Mountain View, United States
Date published: 30-07-2014

A FLAW in the Android mobile operating system leaves the personal and financial details of users at risk of hacking, a mobile analytics firm says.THE malicious software, called Fake ID, can impersonate other apps to gain access to secure areas of your phone and sensitive data that it holds, without ... Read more

Source: www.dailytelegraph.com.au

Top found tags: malware(2),vulnerability(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware Warning Outdated Java Plugins Cause 90% of InfectionsLocation: Oracle - Redwood City, United States
Date published: 31-07-2014

It seems like every week that we beg and pray that our readers stop using Java. There is a good reason for this to, a recent analysis shows just how popular Java is among Cyber Criminals, with an enormous 90.52% of all Cyber Attacks exploiting Java Vulnerabilities to perform Drive-By-Exploits on the... Read more

Source: blog.check-and-secure.com

Top found tags: cybercrime(2),Internet Explorer(2),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kaspersky: Bots, Malware Using Amazon Elasticsearch VulnerabilityLocation: New York, United States
Date published: 31-07-2014

More information about how nogoodniks are using Amazon Web Services' (AWS) hosting services to launch attacks and host their own malware sites is emerging. Now Kaspersky's principal security researcher has published a blog that discusses how the abuse of Elasticsearch is being used on Amazon's cloud... Read more

Source: talkincloud.com

Top found tags: vulnerability(2),Kaspersky Lab(4),cybercrime(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US requests $5b in extra funding to bolster cybercrime defencesLocation: F-Secure - Helsinki, Finland
Date published: 31-07-2014

US President Barack Obamas defence agency is ramping up its efforts to fight cyber crime by requesting a $5 billion [3 billion] package of extra funding for the upcoming year of activities.IT Security Guru quotes a US Department of Defence budget request that reveals the departments total bu... Read more

Source: www.itproportal.com

Top found tags: government(2),United States(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Cyber Prosecutor Sending Nude-Photo Thieves To PrisonLocation: Facebook - Menlo Park, United States
Date published: 31-07-2014

Federal prosecutor Wesley Hsu has been working cybercrime cases for over a decade. Chief of the cyber crime unit at the U.S. Attorneys Office in Los Angeles, his initial focus was on helping Hollywood protect its intellectual property and getting justice for companies that had been hacked by ex-e... Read more

Source: www.forbes.com

Top found tags: United States(2),telecom sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Arab monarchies use malware to track journalistsLocation: Gamma International - Troisdorf, Germany
Date published: 31-07-2014

U.S. allies Bahrain and the United Arab Emirates, along with Syria, are using malicious email and Facebook messages to track and entrap journalists, dissidents and campaigners, who face jail and torture if identified and arrested, according to a new study.The cyberattacks are often very simple j... Read more

Source: www.politico.com

Top found tags: United States(2),United Arab Emirates(3),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bishop Fox to Present at Black Hat 2014 and Security B-Sides in Las VegasLocation: Black Hat - Las Vegas, United States
Date published: 31-07-2014

Leading global IT security consultancy, Bishop Fox, announced today that several of its researchers will present at Black Hat and Security B-Sides in Las Vegas Aug. 5 - 8.Joe DeMesy, Senior Security Associate and Dan Petro, Senior Security Analyst, will present \"Untwisting the Mersenne Twister: How... Read more

Source: digitaljournal.com

Top found tags: financial sector(2),Black Hat(4),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Canada takes steps to secure network after China hacking claimLocation: Ottawa, Ontario, Canada
Date published: 01-08-2014

TORONTO (Reuters) - Canada's top research body has taken steps to tighten security on its computer network, it said on Thursday, days after the government accused state-backed Chinese hackers of breaking into the system. Canada has declined to give details of the attack on the National Research Coun... Read more

Source: reuters.com

Top found tags: website(1),China(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Singapore shoppers still anxious about online securityLocation: Singapore
Date published: 01-08-2014

financial details would land in the wrong hands. Some 78 percent of consumers in the country would shop online at least once a month, with 66 percent spending more than S$100 (US$80.24) over the past three months, revealed a survey commissioned by e-payment provider PayPal. In addition, 55 percent c... Read more

Source: www.zdnet.com

Top found tags: social media(2),telecom sector(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DHL SMS Spam Distributes Android Malware in GermanyLocation: DHL HQ - Bonn, Germany
Date published: 01-08-2014

One of the most common methods for distributing PC malware is the use of email spam messages that pose as tracking notifications from popular delivery companies such as DHL Express, FedEx, or UPS. The reason for this popularity is the malwares effectiveness. Most of the time the victim receiving ... Read more

Source: blogs.mcafee.com

Top found tags: Germany(2),mobile device(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
USB sticks could be the keys to your computer for malicious hackersLocation: Black Hat - Las Vegas, United States
Date published: 01-08-2014

USB sticks could be the keys to your computer for malicious hackers. USB devices are ubiquitous: keyboards, mice, headsets and pocket drives and now they have become a potential security threat. Karsten Nohl, the chief scientist at SR Labs in Germany, has released a report that says malicious softwa... Read more

Source: itproportal.com

Top found tags: Karsten Nohl(2),malware(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
USB Device Firmware Can Be Reprogrammed to Hide Sophisticated MalwareLocation: Black Hat - Las Vegas, United States
Date published: 01-08-2014

Researchers Develop BadUSB to Demonstrate Extreme Threats Posed by USB Devices Users have long been warned about the dangers of using USB drives, but new research shows significant threats that stem from USB devices that go far beyond thumb drives. Most security solutions can easily identify a... Read more

Source: securityweek.com

Top found tags: United States(2),Black Hat(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NATO Unprepared for Russian Attack: UK LawmakersLocation: NATO - Brussel, Belgium
Date published: 01-08-2014

"Events in Ukraine this year, following on from the cyber attack on Estonia in 2007 and the invasion of Georgia by Russia in 2008, are a 'wake-up call' for NATO." LONDON - NATO is not ready to deal with a military attack by Russia on a member state and must adjust to the unconventional tactics seen ... Read more

Source: securityweek.com

Top found tags: legislation(2),United Kingdom(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Denial of Service Vulnerability Fixed in SCADA ServerLocation: Ottawa, Ontario, Canada
Date published: 01-08-2014

A hole has been fixed in a popular industrial control system data management server that if left unpatched, could result in a remotely exploitable denial of service condition. Subnet Solutions, Inc., a Canadian manufacturer of electric utility products, fixed the vulnerability along with another... Read more

Source: threatpost.com

Top found tags: ICS(2),vulnerability(2),critical infrastructure(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gameover Trojan 'surges' after police takedownLocation: Seculert - Petah Tikva, Israel
Date published: 01-08-2014

What constitutes winning in the fight against malware, and what's the value of a takedown ask commentators in the wake of Gameover Zeus' bounceback. Gameover Trojan 'surges' after police takedown Gameover Trojan 'surges' after police takedown The value of law enforcement takedowns of major malware h... Read more

Source: www.scmagazineuk.com

Top found tags: government(4),cybercrime(5),malware(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android malware spreads via mail tracking SMS spamLocation: Google HQ - Mountain View, United States
Date published: 01-08-2014

Attackers are spreading Android malware to users under the guise of phony mail tracking notifications made to look like DHL Express correspondence, analysts warn. On Thursday, Carlos Castillo, a mobile malware researcher at McAfee, revealed in a blog post that the brand name of logistics company DHL... Read more

Source: www.scmagazine.com

Top found tags: threat(1),Germany(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PittyTiger spearphishing campaign speaks multiple languagesLocation: FireEye HQ - Milpitas, United States
Date published: 01-08-2014

Experts with FireEye have identified two phishing campaigns involving a remote administration tool. A threat group operating out of China continues its damage using older exploits, FireEye researchers said. A group of attackers known as PittyTiger that use social engineering to deliver spearphishing... Read more

Source: www.scmagazine.com

Top found tags: malware(2),Poison Ivy(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Absence of Cybercrime Law Worries Information Security SocietyLocation: Lagos, Nigeria
Date published: 31-07-2014

The Information Security Society of Africa, Nigeria (ISSAN) and some stakeholders in the banking industry have decried the absence of cybercrime law to deal with e-fraud offenders in the country.They expressed their dissatisfaction over the situation at an event organised for chief internal auditors... Read more

Source: www.thisdaylive.com

Top found tags: financial sector(2),information security(2),Nigeria(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Counting the cost of cyber crimeLocation: Bent, United States
Date published: 30-07-2014

SIFMA President and CEO Kenneth E Bentsen Jr, said on Bloomberg Televisions Market Makers in late June that private industry and government need to work together to thwart cybersecurity threats. Bentsen said the matter was a top priority for the securities industry and the rest of the financia... Read more

Source: www.ftseglobalmarkets.com

Top found tags: cyber security(4),cybercrime(8),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Introducing the Next Generation Tofino Cyber Security SolutionLocation: New York, United States
Date published: 30-07-2014

When I started Tofino Security in 2006, my two goals were to make industrial cyber security easy to deploy and better suited for the real needs of mission critical networks. Our first generation products went a long way in doing that, but like any initial offerings they reflected a limited feedback ... Read more

Source: www.belden.com

Top found tags: SMS(1),cyber security(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crippling DDoS Hits Major Aussie Broadband ProviderLocation: Corero Network Security - Hudson, United States
Date published: 31-07-2014

Cirrus Communications had half of its network taken down by attack earlier this week.The largest fixed wireless broadband carrier in Australia, Cirrus Communications, suffered a major DDoS attack earlier this week which took out over half of its network.On its website, the firm claims that: a rob... Read more

Source: www.infosecurity-magazine.com

Top found tags: cyber security(2),government(2),ISP(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Twitter acquiring password security manager startup Mitro LabsLocation: Twitter - San Francisco, United States
Date published: 31-07-2014

Twitter password security could be changing, especially for corporate accounts staffed by multiple employees and teams. Read more about Twitter The San Francisco-headquartered company is acquiring Mitro Labs, a startup based in Lower Manhattan with a service designed for sharing passwords safely for... Read more

Source: www.zdnet.com

Top found tags: telecom sector(2),Electronic Frontier Foundation(3),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Turn Remote Desktop Tools Into Gateways for Point-of-Sale Malware AttacksLocation: Trustwave - Chicago, United States
Date published: 31-07-2014

Just as autoimmune diseases turn cells against the body, hackers are turning legitimate remote administration tools into weapons for breaching networks. In a new report released today by the U.S. Department of Homeland Security, security experts laid out how cybercriminals are using legitimate progr... Read more

Source: securityweek.com

Top found tags: DHS(4),United States(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Severe Flaw Found in Certain File Locker AppsLocation: Google HQ - Mountain View, United States
Date published: 31-07-2014

Protecting data has always been one of the most important aspects of our digital life. Given the amount of activity done on smartphones, this is especially rings true for smartphones. While users may use the built-in privacy and security settings of their devices, others take it a step further and e... Read more

Source: trendmicro.com

Top found tags: cyber security(4),financial sector(8),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware on Backcountry Gear website, payment cards compromisedLocation: New York, United States
Date published: 31-07-2014

Malware installed on the Backcountry Gear website for about three months beginning in late April likely resulted in a compromise of customer information , including payment card data. How many victims? Undisclosed. Backcountry Gear did not immediately respond to a SCMagazine.com request for the numb... Read more

Source: www.scmagazine.com

Top found tags: report(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Latest Citadel trick allows RDP access after malware's removalLocation: Microsoft HQ - Redmond, United States
Date published: 31-07-2014

Police, security firms abate Shylock malware threat Trusteer, an IBM company, said the new Citadel configuration was detected this month. Attackers have updated Citadel with a new trick that gives them device access even after the banking malware has been detected and removed by administrators... Read more

Source: www.scmagazine.com

Top found tags: cyber security(2),financial sector(2),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nearly 600 U.S. businesses compromised by 'Backoff' POS malwareLocation: Trustwave - Chicago, United States
Date published: 31-07-2014

Small businesses running cloud-based POS software hit with unique POSCLOUD malware The Backoff malware logs keystrokes and payment card data and sends the information to remote servers controlled by the attackers. Attackers are brute-forcing popular remote desktop software to infect point-of-s... Read more

Source: www.scmagazine.com

Top found tags: telecom sector(2),cyber security(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple hit with privacy class-action over iPhone location serviceLocation: Apple HQ - Cupertino, United States
Date published: 31-07-2014

Apple updates guidelines for gov't, law enforcement data requests A woman claims she did not realize the company was using location services to track her and accuses the company of giving the data to third parties. Apple has been hit with a class-action suit for using the location service function o... Read more

Source: www.scmagazine.com

Top found tags: telecom sector(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft must let US feds into its overseas servers, says US courtLocation: Microsoft HQ - Redmond, United States
Date published: 31-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Microsoft has lost the first round in its fight to prevent US authorities from seizing customer data stored in its overseas data centers. Following a two-hour hearing before the US District Court for the Southern District of New York on Thur... Read more

Source: go.theregister.com

Top found tags: United Kingdom(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware evolution demands new security stanceLocation: Stevens, United States
Date published: 30-07-2014

The evolution of advanced malware and zero-day attacks require a new approach; one that combines big data security, threat intelligence and full visibility.According to Gartner, enterprises are overly dependent on blocking and prevention mechanisms that are not effective against advanced attacks. Th... Read more

Source: www.itweb.co.za

Top found tags: cyber security(2),telecom sector(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New steganographic malware causes alarmLocation: Microsoft HQ - Redmond, United States
Date published: 30-07-2014

A new paper written in conjunction with researchers from the Warsaw Institute of Technology, the National Research Council of Italy and a private information security research firm recently revealed that a new, highly sophisticated form of covert malware is becoming increasingly prevalent and is cau... Read more

Source: www.merlin-intl.com

Top found tags: information security(2),cybercrime(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why the Security of USB Is Fundamentally BrokenLocation: Black Hat - Las Vegas, United States
Date published: 31-07-2014

Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB de... Read more

Source: www.wired.com

Top found tags: malware(2),cybercrime(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Packaged Malware Is Getting More Evasive, Warns McAfeeLocation: McAfee - Santa Clara, United States
Date published: 31-07-2014

Security vendor believes AETs are a serious problem ignored by the majority of its competitiors. Cyber attackers are finding new ways to wrap their malware up and make it look innocent, but the security vendors are striking back. Last week, Intel subsidiary McAfee showed the media the scale of the p... Read more

Source: www.techweekeurope.co.uk

Top found tags: threat(1),cyber security(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is there a Rihanna sex tape? No, it's a malware scam on FacebookLocation: Facebook - Menlo Park, United States
Date published: 31-07-2014

There is no sex tape of Rihanna and her boyfriend doing the rounds online. You cant see whos been looking at your Facebook profile. And you cant change your Facebook colour either.This may all sound obvious, but according to antivirus firm Bitdefender, these are the most popular malware sca... Read more

Source: www.theguardian.com

Top found tags: cyber security(2),social engineering(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Credit card fraud affects OC banksLocation: New York, United States
Date published: 31-07-2014

Credit card fraud has impacted the checking accounts of Visa debit card accounts at two local banks.Visa notified Taylor Bank and Bank of Ocean City that some of their customers' debit card numbers may have been compromised by an outside source.Police are investigating the breach, which may have ori... Read more

Source: www.delmarvanow.com

Top found tags: security measures(2),telecom sector(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Twitter acquires password security startup MitroLocation: Twitter - San Francisco, United States
Date published: 01-08-2014

Twitter has acquired a small startup called Mitro, which focuses on password security. Mitro announced Thursday that it is joining Twitter in its New York office and will be "focusing on a variety of geo-related projects." The company will not be integrated into the social network, but rather keep w... Read more

Source: cnet.com.ortal.com

Top found tags: social media(2),update(2),Electronic Frontier Foundation(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Plug and PREY: Hackers reprogram USB drives to silently infect PCsLocation: Black Hat - Las Vegas, United States
Date published: 31-07-2014

Researchers say they have managed to reprogram the firmware within some flash drives with malicious code code executed by the gadget's micro-controller to ultimately install malware on a PC or redirect network traffic without a victim knowing. Karsten Nohl and Jakob Lell, from German security sk... Read more

Source: go.theregister.com

Top found tags: Black Hat(4),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stealthy new malware snatching credit cards from retailers POS systemsLocation: Trustwave - Chicago, United States
Date published: 01-08-2014

researchers at Trustwaves Spiderlabs, haveissued an alert about a newly-identified variant of malware installed on point-of-sale (POS) systems that was used in a series of recent attacks by cyber criminals. Called Backoff, the malware shares characteristics with the oneused to attack Ta... Read more

Source: arstechnica.com

Top found tags: Internet Explorer(2),cyber security(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Retailers shot up by PoS scraping brute force cannonLocation: Target HQ - Minneapolis, United States
Date published: 01-08-2014

The US Computer Emergency Response Team has warned of a new point of sale malware that is targeting retailers. The malware is a RAM-scraper of the kind made infamous by the Target breach that saw attackers plant wares on terminals to nab credit cards while they were temporarily unencrypted. This att... Read more

Source: go.theregister.com

Top found tags: credit card(2),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security chap writes recipe for Raspberry Pi honeypot networkLocation: New York, United States
Date published: 01-08-2014

Honeypots are the perfect bait for corporate IT shops to detect hackers targeting and already within their networks and now one security bod has devised a means to build a battalion of the devices from Raspberry Pis. University of Arizona student Nathan Yee (@nathanmyee) has published instructions f... Read more

Source: go.theregister.com

Top found tags: cyber security(2),financial sector(2),Raspberry Pi(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why technology security should be a priority for SMEsLocation: Lea, United States
Date published: 01-08-2014

Symantec has found that cyber attacks on SMEs increased threefold in 2011 alone Technology is an essential part of SMEs' growth so much so that almost 80% of companies agreed with that statement in a recent survey. Yet in another study, 76% admitted they 'struggle to identify, quantify and... Read more

Source: www.information-age.com

Top found tags: United Kingdom(2),cyber security(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Yes, Hackers Could Build an iPhone BotnetThanks to WindowsLocation: Georgia Institute of Technology - Atlanta, United States
Date published: 01-08-2014

iphone-botnet [gallery-ca] Ariel Zambelich/WIRED A reminder to Apple and smug iPhone owners: Just because iOS has never been the victim of a widespread malware outbreak doesnt mean mass iPhone hacking isnt still possible. Now one group of security researchers plans to show how to enslave an en... Read more

Source: wired.com

Top found tags: cybercrime(6),mobile device(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
When Will U.S. Cyber Alarms Match its Cyber Threats?Location: Made, Drimmelen, Noord-Brabant, The Netherlands
Date published: 01-08-2014

Former Secretary of State Madeline Albright recently stated that the world is a mess. And indeed it is. From Russias stoking of a war of insurrection in the Ukraine to the Israel-Hamas war to conflicts in Syria, Iraq and throughout much of the Middle East and North Africa, large swaths of t... Read more

Source: securityweek.com

Top found tags: cybercrime(4),cyber security(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Pitty Tiger" Threat Actors Possibly Active Since 2008: FireEyeLocation: FireEye HQ - Milpitas, United States
Date published: 01-08-2014

Researchers at FireEye have analyzed the operations of the advanced persistent threat (APT) group dubbed "Pitty Tiger," and determined that it might have been active since as far back as 2008. The activities of the Pitty Tiger (PDF) group were first brought to light in mid-July by the cybersecurity ... Read more

Source: securityweek.com

Top found tags: cyber security(4),cybercrime(10),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GCHQ certifies six MSc cyber security degreesLocation: GCHQ - Cheltenham, United Kingdom
Date published: 01-08-2014

Francis Maude, Minister for the Cabinet Office, announced today that six Master's degree courses in cyber security are to be certified by GCHQ. GCHQ certifies six MSc cyber security degrees GCHQ certifies six MSc cyber security degrees Earlier this year UK universities were invited to submit their C... Read more

Source: www.scmagazineuk.com

Top found tags: education(4),United Kingdom(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fury as CIA found guilty of spying on SenateLocation: White House - Washington D.C., United States
Date published: 01-08-2014

Fury as CIA found guilty of spying on Senate. An internal investigation has found the CIA guilty of hacking the US Senate during the preparation of its Intelligence committee's report on CIA's controversial detention and interrogation scheme. The investigation found that CIA officers bypassed a fire... Read more

Source: itproportal.com

Top found tags: Intel(1),report(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Austrian privacy campaigner files 'class action' suit against Facebook over privacy policyLocation: Facebook - Menlo Park, United States
Date published: 01-08-2014

Austrian privacy campaigner files 'class action' suit against Facebook over privacy policy Privacy campaign group Europe-v-Facebook is inviting Facebook users outside the U.S. and Canada to join a lawsuit against the company, which it alleges violates privacy laws. Europe-v-Facebooks front man Ma... Read more

Source: www.pcworld.com

Top found tags: government(3),social media(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Citadel Malware Variant Allows Attackers Remote Access, Even After RemovalLocation: Microsoft HQ - Redmond, United States
Date published: 01-08-2014

When hackers have compromised a valuablecomputer, maintaining persistence on that machine is the key to maintaining access to its resources and stored assets. A new variant of the Citadel banking malware has been discovered that comes with a feature that allows the attacker to leverage remote mana... Read more

Source: threatpost.com

Top found tags: cybercrime(3),malware(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Twitter Gains Team From Password Management Company MitroLocation: Electronic Frontier Foundation - San Francisco, United States
Date published: 01-08-2014

Twitter has announced that a cloud-based password management company called Mitro has joined the Twitter team, and all of Mitros code is now free and open source. Mitros offering a secure password manager thats meant to help distributed teams share passwords for accounts and services. The p... Read more

Source: threatpost.com

Top found tags: cyber security(2),social media(2),Electronic Frontier Foundation(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Twitter Acquires Password Management Startup MitroLocation: Electronic Frontier Foundation - San Francisco, United States
Date published: 01-08-2014

The security startup behind the Mitro password manager has been acquired by Twitter, the team at Mitro announced on Thursday. The financial terms of the deal were not disclosed. The talent at Mitro will move to Twitter's New York offices, but according to the Electronic Frontier Foundation (EFF), Mi... Read more

Source: securityweek.com

Top found tags: cyber security(2),social media(2),Electronic Frontier Foundation(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Ransomware Uses GnuPG to Encrypt FilesLocation: Trend Micro - Cupertino, United States
Date published: 01-08-2014

Ransomware Using GnuPG to Encrypt Files Security companies have come across a new piece of ransomware that's designed to encrypt files on infected computers. What's interesting about this threat is that it's easy to update and it uses open source software to encrypt files. Both Symantec and Trend Mi... Read more

Source: securityweek.com

Top found tags: trojan(2),United States(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese Hackers Hit Canada's National Research CouncilLocation: Ottawa, Ontario, Canada
Date published: 01-08-2014

Canada's Chief Information Officer this week announced that the IT infrastructure of the National Research Council of Canada was recently breached by "a highly sophisticated Chinese state-sponsored actor." "While the National Research Council's networks do not currently operate within the broader Go... Read more

Source: www.esecurityplanet.com

Top found tags: United States(2),cybercrime(3),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security Partnerships: Engaging at the right levelLocation: New York, United States
Date published: 01-08-2014

A holistic approach to security management is needed to bridge the gap between stategy and technology says Chris Yule. Security Partnerships: Engaging at the right level Security Partnerships: Engaging at the right level The role and strategic importance within an organisation of the Chief Informati... Read more

Source: www.scmagazineuk.com

Top found tags: information sharing(2),security management(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Privacy fears as US court rules against MicrosoftLocation: Microsoft HQ - Redmond, United States
Date published: 01-08-2014

A New York court has told Microsoft it must hand over customer data to the US Government even though it's held overseas - reigniting a privacy debate that has also dragged in the UK Government's controversial new 'DRIP' law. Privacy fears as US court rules against Microsoft Privacy fears as US court... Read more

Source: www.scmagazineuk.com

Top found tags: legislation(2),United Kingdom(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GCHQ awards cyber security approval to 6 Masters degreesLocation: GCHQ - Cheltenham, United Kingdom
Date published: 01-08-2014

GCHQ awards cyber security approval to 6 Masters degrees. GCHQ has rubber stamped six Masters degrees in cyber security that it hopes increases the countrys defences against all facets of a critical threat. Related: GCHQ shocked by intimate bodyparts while spying on millions of webcam... Read more

Source: itproportal.com

Top found tags: information security(2),government(6),United Kingdom(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM snaps up identity access gatekeeper techLocation: IBM HQ - Armonk, United States
Date published: 01-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines IBM has snapped up privately held security software firm CrossIdeas. Financial terms of the deal, announced Thursday, were undisclosed. Rome, Italy based CrossIdeas has been developing identity access technology since 2011. Its technology al... Read more

Source: go.theregister.com

Top found tags: cyber security(2),information security(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Canada's NRC breach work of Chinese state-sponsored actorLocation: Ottawa, Ontario, Canada
Date published: 01-08-2014

Canada's National Research Council network was recently breached by a highly sophisticated Chinese state-sponsored actor, according to a statement issued by office of the Canadian government's CIO, Corinne Charette. Offering assurances that the NRC's networks do not currently operate within... Read more

Source: www.scmagazine.com

Top found tags: threat(1),cyber security(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google hands litany of 'right to be forgotten' woes to EU regulatorsLocation: Google HQ - Mountain View, United States
Date published: 01-08-2014

The right to be forgotten ruling has turned out to be as unpopular as it is unwieldy with Google weighing in this week with a protracted statement to European regulators detailing the complications that are arising from attempting to comply with a court's May decision. The internet search engi... Read more

Source: www.scmagazine.com

Top found tags: Google(1),privacy(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

New Backoff PoS Malware Identified in Several AttacksLocation: Target HQ - Minneapolis, United States
Date published: 31-07-2014

A new breed of point-of-sale malware has been found in several recent attacks, and experts say that the tool, known as Backoff, has extensive data stealing and exfiltration capabilities, including keylogging, memory scraping and injection into running processes. The Backoff malware doesnt necessa... Read more

Source: threatpost.com

Top found tags: cybercrime(2),cyber security(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Grabby baddie scours Paddy Power's towers: 650k punters leaked and it took 4 years to admit itLocation: Dublin, Ireland
Date published: 31-07-2014

Adaptable System Recovery (ASR) for Linux virtual machines Irish bookmakers Paddy Power has admitted miscreants copied from its systems more than 649,000 customer records containing personal information. The snaffled dataset contained names, usernames, addresses, email addresses, phone contact numbe... Read more

Source: go.theregister.com

Top found tags: security measures(2),telecom sector(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Real Cost of a Retail Data BreachLocation: Berlin, Germany
Date published: 30-07-2014

When I was growing up and found myself in hot water with my parents, there was nothing in the fallout no punishment, no lost privileges that compared to hearing my father use his go-to haymaker: You broke my trust. It was said quietly, but it stung and stuck with me for days the few ti... Read more

Source: data-protection.safenet-inc.com

Top found tags: United Kingdom(2),United States(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Riverside warns of data breach; ex-employee chargedLocation: Riverside, United States
Date published: 31-07-2014

Riverside Health System announced a possible data breach this week after a former employee was charged with stealing credit card information from cancer patients.Tsha Riddick, a 33-year-old convicted felon who worked for nearly two years at one of the companys medical practices in South Hampto... Read more

Source: hamptonroads.com

Top found tags: financial sector(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Class action lawsuit filed against eBay over data breachLocation: eBay - San Jose, United States
Date published: 30-07-2014

NEW ORLEANS (Legal Newsline) A class action lawsuit has been filed against eBay after class members claim it failed to protect personal information when it suffered a data breach.In February or March, eBays files were accessed by identity thieves, without eBays permission, the complaint sa... Read more

Source: legalnewsline.com

Top found tags: data breach(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attackers use domino effect to compromise your accountsLocation: New York, United States
Date published: 30-07-2014

Data breach after data breach has illustrated just how weak and ineffective passwords can be for protecting accounts and sensitive information. Many sites and services have implemented secondary security protocols and two-factor authentication, but users frequently use information and email accounts... Read more

Source: www.pcworld.com

Top found tags: password(1),cyber security(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Placer County Sheriffs Office is offering a free identity theft prevention classLocation: Placer County, United States
Date published: 30-07-2014

The Placer County Sheriffs Office is offering a free identity theft prevention class on Monday, August 25, from 6 to 8 p.m. at the Auburn Justice Center.The class is open to the public and will be held in the community room at sheriffs headquarters, 2929 Richardson Drive in Auburn.Detective Ry... Read more

Source: placercountyonline.com

Top found tags: government(1),legislation(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man sentenced to 6 years in identity theftLocation: Miller, United States
Date published: 30-07-2014

BALTIMORE (AP) A Baltimore man has been sentenced to more than six years in prison for wire fraud conspiracy and identity theft.Thirty-year-old Tavares Davon Miller was also ordered to pay more than $105,000 in restitution at sentencing Wednesday in federal court in Baltimore.According to his pl... Read more

Source: www.sfgate.com

Top found tags: credit card(2),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Antioch man faces charges in identity theft and burglaryLocation: Lake County, Florida, United States
Date published: 30-07-2014

A 21-year-old man has been charged with burglary and unlawful use of a credit card after a joint investigation by the Round Lake Park and Round Lake Beach police departments, authorities said Wednesday.Rolando Hernandez, of Antioch, was also charged with identity theft after his arrest Monday, Round... Read more

Source: www.dailyherald.com

Top found tags: financial sector(2),government(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Riverside warns of data breach; ex-employee chargedLocation: Riverside, United States
Date published: 31-07-2014

Riverside Health System announced a possible data breach this week after a former employee was charged with stealing credit card information from cancer patients.Tsha Riddick, a 33-year-old convicted felon who worked for nearly two years at one of the companys medical practices in South Hampto... Read more

Source: hamptonroads.com

Top found tags: financial sector(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Online Identity Theft Soars By More Than A ThirdLocation: Experian HQ - Dublin,Ireland
Date published: 31-07-2014

Stolen identity fraud soared by more than a third last year, according to new research.The number of fraudsters reported as taking on someone elses identity was up 37% compared to the year before, says financial market research specialists Experian.More than 13,000 cases were reported in 2013 ... Read more

Source: parsherald.com

Top found tags: United Kingdom(2),telecom sector(8),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target Announces New CEO To Lead Recovery After Data BreachLocation: Target HQ - Minneapolis, United States
Date published: 31-07-2014

Brian Cornell will help \"bring vision, focus and a wealth of experience to Targets transformation,\" the company said Thursday.Target announced a new CEO Thursday as it looks to rebound from the damage wrought last year by a massive data breach that prompted former CEO Gregg Steinhafels resig... Read more

Source: time.com

Top found tags: EN(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
WHY ACTIVITY TRACKER APPS COULD EXPOSE YOU TO IDENTITY THEFTLocation: Symantec HQ - Mountain View, United States
Date published: 31-07-2014

Activity-tracking wearables and apps can be hacked with nothing more than a credit card-sized Raspberry Pi computer and a few retail components, according to security firm Symantec.Scanners taken to busy public locations in Ireland and Switzerland, as well as major sporting events, were found to be ... Read more

Source: www.cbronline.com

Top found tags: identity theft(2),Raspberry Pi(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Massive data breach at Paddy Power bookmakersLocation: New Delhi, India
Date published: 31-07-2014

THERE'S been a massive data breach at gambling firm Paddy Power, with personal details of over 649,000 customers having been stolen.About 120,000 of the customers are based in Ireland.The stolen data includes personal information entered by customers signing up to the Paddy Power online service in 2... Read more

Source: www.independent.ie

Top found tags: Canada(1),EN(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police issue warning after Peacehaven resident reports theftLocation: London, United Kingdom
Date published: 31-07-2014

A woman is concerned she may have been the victim of identity theft after two full bags of rubbish were taken from her wheelie bin.The Peachaven resident has reported that two full bags of rubbish were taken from the Council landfill wheelie bin outside her house in Seaview Avenue overnight between ... Read more

Source: www.theargus.co.uk

Top found tags: police(1),report(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How the Cybersecurity Framework Affects GovernmentLocation: National Institute of Standards - Gaithersburg, United States
Date published: 31-07-2014

Designed to protect infrastructure, NISTs framework stands to impact agencies, too.Research by Lloyds of London insurer Aegis London warns of a shift in the cyberthreat landscape, away from typical data breaches to attacks on the operational systems that support global critical infrastructure.Two... Read more

Source: www.fedtechmagazine.com

Top found tags: DHS(4),government(8),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US warns of 'Backoff,' latest entry into POS malware marketLocation: Department of Homeland Security - Washington, United States
Date published: 01-08-2014

The US Department of Homeland Security has issued an advisory alerting businesses to the existence of Backoff, a new kind of point-of-sale malware which infiltrate retailer computer systems. The alert, issued on Thursday (.PDF), states that Backoff has been spotted three times in forensic investigat... Read more

Source: www.zdnet.com

Top found tags: telecom sector(4),cybercrime(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The 5 most read articles this week: July 25-31Location: Tel Aviv, Israel
Date published: 01-08-2014

Here are the five most popular articles, as read by you the reader, in the week for July 25 to 31. The 5 most read articles this week: July 25-31 The 5 most read articles this week: July 25-31 Researcher develops BadUSB code to compromise USB sticks and their computer hosts Karsten Nohl, the chi... Read more

Source: www.scmagazineuk.com

Top found tags: Karsten Nohl(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICYMI: Driverless cars, cyber espionage & the hidden cost of data breachesLocation: NCC Group - Manchester, United Kingdom
Date published: 01-08-2014

This week's In Case You Missed column considers early security questions on driverless cars, the hidden cost behind data breaches and new claims of industrial cyber espionage. ICYMI: Driverless cars, cyber espionage & the hidden cost of data breaches ICYMI: Driverless cars, cyber espionage & the hid... Read more

Source: www.scmagazineuk.com

Top found tags: cyber espionage(4),government(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The privacy paradoxes: what businesses need to knowLocation: Gartner - Stamford, United States
Date published: 01-08-2014

Will consumers be willing to forfeit their benefits of being in a connected world for the assurances of privacy? This year is already stacking up to be a seminal year in online privacy. News stories about the issue have fuelled debates about how much access governments and businesses should have int... Read more

Source: www.information-age.com

Top found tags: social media(4),telecom sector(6),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
C-Level Execs to CISOs: No Seat for You!Location: Target HQ - Minneapolis, United States
Date published: 01-08-2014

Enterprise Board of Directors Room While information security is being increasingly treated as a strategic concern, many c-suite executives appear to still not consider chief information security officers as equal partners. In a recent survey of 203 U.S.-based CEOs, CIOs, CFOs, presidents, COOs, gen... Read more

Source: securityweek.com

Top found tags: medical sector(2),United States(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Information-centric security: Protecting data from the inside outLocation: Sullivan, United States
Date published: 01-08-2014

'When attackers do break through the network security system, they can sit quietly for months or even years stealing data' Symantecs recent admission that antivirus software is dead should sound the alarm to all companies and government agencies that the traditional approach of hardening th... Read more

Source: www.information-age.com

Top found tags: cybercrime(4),telecom sector(6),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Study: CISO leadership capacity undervalued by most C-level execsLocation: ThreatTrack - Reston, United States
Date published: 01-08-2014

Survey respondents praise, but neglect, continuous monitoring According to a ThreatTrack Security study, 74 percent of execs believed that CISOs didn't belong on organization's senior leadership teams. A recent poll of C-level executives revealed that most doubt CISOs' organizational leadership abil... Read more

Source: www.scmagazine.com

Top found tags: information security(2),medical sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

CEI to lead DHS Critical Infrastructure Resilience Center of ExcellenceLocation: Department of Homeland Security - Washington, United States
Date published: 30-07-2014

CEI is leading the response to the center lead proposal and the smaller independent partner proposals. There has been significant activity gathering intel and strategizing as TAMU already leads a DHS center of excellence. The lead proposal will be based on the NSF ERC proposal themes and prior... Read more

Source: c-emergencyinformatics.tamu.edu

Top found tags: EN(1),government(1),DHS(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Alleged skimmers arrestedLocation: Auckland, New Zealand
Date published: 31-07-2014

Two men, one 27 and the other 28, are scheduled to appear in the Auckland District Court tomorrow to face 54 joint charges of using a document (counterfeit ATM cards), nine of obtaining a document and one of possession of implements for forgery.The arrests were made by staff from Police Financial Cr... Read more

Source: www.voxy.co.nz

Top found tags: skimming(1),New Zealand(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Skimming device installed on ATMLocation: Niagara, United States
Date published: 30-07-2014

A Montreal resident who installed a tiny camera and a credit card skimming device on an ATM in the heart of Niagara Falls' tourism district has been placed on probation for 18 months.Dragos Patru, 45, pleaded guilty Wednesday in an Ontario Court of Justice in St. Catharines to a charge of possession... Read more

Source: www.niagarafallsreview.ca

Top found tags: credit card(2),government(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CIA Apologizes for Spying on US SenateLocation: Boyd, United States
Date published: 31-07-2014

WASHINGTON - The head of the CIA has apologized to US lawmakers after an investigation confirmed claims that his officers had "improperly" accessed Senate computers, the agency said Thursday. In March, CIA Director John Brennan dismissed allegations the agency had spied on Senate intelligence commit... Read more

Source: securityweek.com

Top found tags: Barack Obama(2),legislation(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM Expands Security Portfolio with CrossIdeas AcquisitionLocation: IBM HQ - Armonk, United States
Date published: 31-07-2014

IBM today announced the acquisition of privately-held security firm CrossIdeas. Financial terms of the deal are not being publicly disclosed. Ravi Srinivasan, director of strategy at IBM Security Systems, told eSecurityPlanet that the CrossIdeas teams will begin collaborating with IBM teams immediat... Read more

Source: www.esecurityplanet.com

Top found tags: EN(1),Intel(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Jimmy John's sandwich chain investigating possible breachLocation: Sally Beauty - Denton, United States
Date published: 31-07-2014

Jimmy John's sandwich chain is investigating a possible breach of customer credit card information. Various financial institutions noticed fraudulent charges on cards that were recently used at multiple Jimmy John's locations, according to technology blogger Brian Krebs. The restaurant chain said in... Read more

Source: www.scmagazine.com

Top found tags: report(1),credit card(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SC Magazine brings home national and regional honorsLocation: Armstrong, United States
Date published: 31-07-2014

This cover by Art Director Michael Strong was recognized with three awards. This cover by Art Director Michael Strong was recognized with three awards. In the past month, SC Magazine picked up seven awards from two of the most distinguished associations representing the trade publishing industry. Th... Read more

Source: www.scmagazine.com

Top found tags: report(1),website(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security researchers say USB security broken, can take over Macs or PCsLocation: Black Hat - Las Vegas, United States
Date published: 31-07-2014

The USB standard has a fundamental security flaw that allows an attacker to take over any device it is connected to, whether PC or Mac, say security researchers in a frightening piece by Wired.Describing the proof-of-concept Karsten Nohl and Jakob Lell plan to present at the Black Hat conference nex... Read more

Source: 9to5mac.com

Top found tags: conference(2),Karsten Nohl(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Trustlook Introduces the First Android FakeID Vulnerability Security ScannerLocation: Google HQ - Mountain View, United States
Date published: 31-07-2014

SAN JOSE, CA--(Marketwired - July 31, 2014) - Trustlook Inc., a provider of innovative next-generation mobile security solutions, announces the first FakeID vulnerability detection tool, FakeID Security Scanner, which helps users detect FakeID vulnerability on Android phones and tablets.The Android ... Read more

Source: www.digitaljournal.com

Top found tags: Google(3),Google Play(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
McAfees SIEM Steps Out Smartly as a Leader for Federal and Enterprise CustomersLocation: McAfee - Santa Clara, United States
Date published: 31-07-2014

Its hard enough to keep pace with network demands and be able to detect threats in real time. Its even harder to stay on top of all the information generated about those threats, intrusions and suspicious network behavior. Enter SIEM, Security Information and Event Management, which in an age ... Read more

Source: blogs.mcafee.com

Top found tags: threat(1),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Some are twisting the facts in requests to be forgotten, Google saysLocation: Google HQ - Mountain View, United States
Date published: 01-08-2014

Some of those seeking to scrub their histories from the Web under Europes right to be forgotten rule are being economical with the truth when making their requests, Google said Thursday. In a letter to European data regulators, Google listed some of the challenges it faces in complying with... Read more

Source: www.pcworld.com

Top found tags: Germany(2),Microsoft(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dragon's Den star Piers Linney offered government role to reform UK tech industryLocation: Linn, United States
Date published: 01-08-2014

Dragon's Den star Piers Linney offered government role to reform UK tech. industry Joanna Shields, Chair of Tech City UK, will be joining the Prime Ministers Digital Taskforce as adviser on the country's digital economy, while current Dragon's Den TV star and business expert Piers Linney is also ... Read more

Source: itproportal.com

Top found tags: TV (1),government(5),United Kingdom(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Not so subtle: NSA recruits Director of Strategic Communications on LinkedInLocation: National Security Agency - Fort Meade, United States
Date published: 01-08-2014

Not so subtle: NSA recruits Director of Strategic Communications on LinkedIn. The NSA is looking for a Director of Strategic Communications on LinkedIn. Why is it even advertised? When you think of NSA you probably do think about job security. Nice government job. Good benefits. Nice pension. But, w... Read more

Source: itproportal.com

Top found tags: NSA (1),social media(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cannabis-stuffed drone crashes outside maximum security prisonLocation: South Carolina, United States
Date published: 01-08-2014

PaulMCCooper. Cannabis-stuffed drone crashes outside maximum security prison Drones are being put to use in all kinds of new and innovative areas. Whether it's Amazon experimenting with delivery drones, or drones being used to check for damage to rail systems and aircraft, unmanned aircraft are tran... Read more

Source: itproportal.com

Top found tags: drones(1),EN(1),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hey, big spender. Are you as secure as a whitebox vendor?Location: Hewlett-Packard - Palo Alto, United States
Date published: 01-08-2014

Sysadmin blog Security flaws are a great source of inter-company marketing FUD, but it is how a company responds to them that determines how trustworthy they are. Can you bet your business or your personal data on a company that simply brushes flaws under a rug? Where does the vendor's respo... Read more

Source: go.theregister.com

Top found tags: vulnerability(1),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pentagon hacker McKinnon can't visit sick dad for fear of extraditionLocation: Edinburgh, Scotland, United Kingdom
Date published: 01-08-2014

Pentagon hacker Gary McKinnon is afraid tor visit his sick father in Glasgow after advice from his lawyers about the possibility of extradition. McKinnon's father, Charlie, is in hospital after suffering a stroke. But lawyers for the London-based hacker have advised him against visiting his dad in h... Read more

Source: go.theregister.com

Top found tags: TOR(1),United Kingdom(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Certify Early & Double Down on CE CreditsLocation: New York, United States
Date published: 01-08-2014

Thank you to all that have participated in our Continuing Education Program. Year to date, we have seen an 89% increase in the number of certifications completed using Continuing Education! Its great that so many of you have been proactive in your training! I am happy to announce that if ... Read more

Source: blogs.mcafee.com

Top found tags: PLC (1),training(1),critical infrastructure(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft must give gov't customer records on foreign serverLocation: Microsoft HQ - Redmond, United States
Date published: 01-08-2014

Microsoft must turn over a customer's emails stored on a server in Ireland to the U.S. government in response to a search warrant, a federal judge has ruled. After hearing oral arguments from both Microsoft and the federal government, Judge Loretta Preska of the U.S. District Court in Manhattan uphe... Read more

Source: www.scmagazine.com

Top found tags: Verizon(1),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Terrorists embracing new Android crypto in wake of Snowden revelationsLocation: National Security Agency - Fort Meade, United States
Date published: 01-08-2014

their countermeasures in the wake of the Edward Snowden revelations. "Al-Fajr, one of Al-Qaedas media arms, released a new Android encryption the latest technological advancements and provides '4096 bit public key' encryption," intelligence firm Recorded Future said in a Friday report. The ... Read more

Source: arstechnica.com

Top found tags: United States(2),government(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

SubSTATION Server Telegyr 8979 Master VulnerabilitiesLocation: Microsoft HQ - Redmond, United States
Date published: 31-07-2014

Microsoft announced on Thursday the general availability of the Enhanced Mitigation Experience Toolkit (EMET) 5.0. According to the company, version 5.0 of the free security tool comes with two new mitigations, Attack Surface Reduction (ASR) and Export Address Table Filtering Plus (EAF+), both of wh... Read more

Source: ics-cert.us-cert.gov

Top found tags: SSL (1),website(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Amerikaan met kinderporno gearresteerd dankzij GoogleLocation: Google HQ - Mountain View, United States
Date published: 01-08-2014

De Amerikaanse politie heeft een man die kinderporno via zijn Gmailaccount verstuurde dankzij een tip van Google kunnen arresteren. Volgens de politie detecteerde Google expliciete foto's van een jong meisje dat de man naar een vriend stuurde, waarop de autoriteiten werden gewaarschuwd. "Hij probeer... Read more

Source: www.security.nl

Top found tags: government(2),pornography(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft beveiligt Windows met gratis tool EMET 5.0Location: Microsoft HQ - Redmond, United States
Date published: 01-08-2014

Microsoft heeft de finale versie van de Enhanced Mitigation Experience Toolkit (EMET) 5.0 gelanceerd, een gratis beveiligingstool ontwikkeld om Windows tegen aanvallen te beschermen. EMET staat voor Enhanced Mitigation Experience Toolkit. Het programma voegt een extra beveiligingslaag aan Windows en... Read more

Source: www.security.nl

Top found tags: cybercrime(2),Internet Explorer(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ransomware gebruikt opensource om bestanden te versleutelenLocation: Ransom, United States
Date published: 01-08-2014

Een nieuwe variant van ransomware gebruikt een populair opensource-encryptieprogramma om bestanden op besmette computers voor losgeld te versleutelen. De maker van Ransomcrypt, zoals de ransomware wordt genoemd, gebruikt namelijk GnuPG voor het gijzelen van bestanden. Deze opensource-implementatie v... Read more

Source: www.security.nl

Top found tags: trend(1),RSA(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gates-malware infecteert Linux en WindowsLocation: Gates, United States
Date published: 01-08-2014

Een malware-familie genaamd Gates waarvan het bekend was dat het Linux-computers infecteerde blijkt ook Windows-machines te besmetten. De Gates-malware werd begin dit jaar voor het eerst ontdekt en blijkt besmette Linux-systemen voor het uitvoeren van DDoS-aanvallen te gebruiken. De malware bestaat ... Read more

Source: www.security.nl

Top found tags: website(1),Windows(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware opent Windows Remote Desktop als backdoorLocation: Microsoft HQ - Redmond, United States
Date published: 01-08-2014

Een nieuwe variant van de Citadel-malware voegt op besmette systemen een gebruiker toe die via de Remote Desktopfunctie van Windows kan inloggen voor het geval de malware zelf van het systeem verwijderd wordt. Dat meldt beveiligingsbedrijf Trusteer, dat onderdeel van IBM is. Citadel is een banking T... Read more

Source: www.security.nl

Top found tags: financial sector(2),trojan(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoek: 35% pc-gamers gebruikt geen virusscannerLocation: Webroot - Broomfield, United States
Date published: 01-08-2014

Iets meer dan een derde van de pc-gamers zou geen virusscanner en andere beveiligingssoftware gebruiken, om zo de computer beter te laten presteren. Dat stelt anti-virusbedrijf Webroot aan de hand van onderzoek onder 1200 gamers tijdens de E3 Conferentie van dit jaar. De E3 is een grote gameconferen... Read more

Source: www.security.nl

Top found tags: conference(2),cyber attack(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Braziliaanse website Gizmodo verspreidde malwareLocation: Brasilia-Federal District, Brazil
Date published: 01-08-2014

Aanvallers zijn erin geslaagd om toegang tot de Braziliaanse website van het techblog Gizmodo te krijgen en plaatsten vervolgens kwaadaardige code die bezoekers naar een andere gehackte site met malware doorstuurde. Deze site toonde de bezoekers een waarschuwing dat ze Flash Player moesten updaten. ... Read more

Source: www.security.nl

Top found tags: backdoor(2),cybercrime(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

NPO scherpt cookiebeleid aanLocation: Amsterdam, The Netherlands
Date published: 01-08-2014

Het cookiebeleid van de Nederlandse Publieke Omroep wordt versneld aangepast, nadat ook de ACM heeft vastgesteld dat het de regels overtreedt. Eerder deze maand concludeerde privacywaakhond CBP in een vernietigend rapport al dat de sites van de publieke omroepen stelselmatig de privacywet overtreden... Read more

Source: www.beveiligingnieuws.nl

Top found tags: privacy(1),report(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft in hoger beroep tegen overhandigen e-mail aan VSLocation: Microsoft HQ - Redmond, United States
Date published: 01-08-2014

Microsoft gaat in hoger beroep tegen een uitspraak van een Amerikaanse rechter gisteren dat de softwaregigant e-mails die in het buitenland zijn opgeslagen aan de Amerikaanse autoriteiten moet overhandigen. Het gaat om e-mails die zich in het Microsoft datacentrum in het Ierse Dublin bevinden. Volge... Read more

Source: www.security.nl

Top found tags: privacy(1),cyber security(2),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Overheid vraagt Twitter 5 keer om gebruikersgegevensLocation: Twitter - San Francisco, United States
Date published: 01-08-2014

De Nederlandse overheid heeft in de eerste helft van 2014 Twitter vijf keer om gegevens van gebruikers gevraagd. Dat laat de microbloggingdienst in een nieuwe versie van het transparantierapport weten. De verzoeken worden volgens Twitter vooral in het kader van politieonderzoeken gedaan. De vijf Ned... Read more

Source: www.security.nl

Top found tags: social media(2),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Daling Windows XP-gebruikers zet verder doorLocation: Microsoft HQ - Redmond, United States
Date published: 01-08-2014

Het percentage internetgebruikers dat nog steeds met Windows XP werkt is in juli onder de 25% uitgekomen, zo beweert marktvorser Net Applications. Het marktaandeel van het niet meer ondersteunde besturingssysteem moest 0,5% inleveren en kwam daardoor op 24,8% uit. Dit is het laagste niveau in meer d... Read more

Source: www.security.nl

Top found tags: NL(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mozilla Firefox nadert dieptepunt van 2006Location: Mozilla - Mountain View, United States
Date published: 01-08-2014

Mozilla Firefox is er in juli niet in geslaagd om het grote verlies van gebruikers in juni te herstellen, aangezien de opensource browser verder terrein moest prijsgeven en nu langzaam het niveau van eind 2006 nadert. In juni verloor Firefox volgens Net Applications 1,3% van het aandeel. Het grootst... Read more

Source: www.security.nl

Top found tags: Google(2),Internet Explorer(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Windows 8.1 verstevigt tweede positie in NederlandLocation: Microsoft HQ - Redmond, United States
Date published: 01-08-2014

Het marktaandeel van Windows 8.1 is in juli flink gestegen in Nederland, zo blijkt uit cijfers van StatCounter. Het besturingssysteem passeerde in april al het aandeel van Windows XP. Afgelopen maand groeide het aantal gebruikers van Windows 8.1 in Nederland met 1,22%, naar 13,55%. Windows 7 is nog ... Read more

Source: www.security.nl

Top found tags: NL(1),Windows(1),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beslist.nl stelt conversiepixel niet verplicht voor webwinkelsLocation: Amsterdam, The Netherlands
Date published: 01-08-2014

Vergelijkingssite Beslist.nl gaat het gebruik van een conversiepixel toch niet voor alle webwinkels verplichten zoals het eerst van plan was. Met de conversiepixel stellen webwinkels Beslist.nl in staat om te registreren welke bestellingen bij de webshop zijn geplaatst. Het gaat echter om alle order... Read more

Source: www.security.nl

Top found tags: NL(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaanse internetoplichter moet 26,9 miljoen dollar betalenLocation: New York, United States
Date published: 01-08-2014

Een Amerikaanse internetoplichter die beweerde banden met Google te hebben en een groot aantal mensen via allerlei thuiswerkscams oplichtte moet alsnog 26,9 miljoen dollar terugbetalen omdat hij zich niet aan de voorwaarden van een in 2009 getroffen schikking heeft gehouden. Jonathan Eborn was n... Read more

Source: www.security.nl

Top found tags: financial sector(2),government(2),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Meerdere kwetsbaarheden in Linux kernel verholpenLocation: Amsterdam, The Netherlands
Date published: 01-08-2014

Samenvatting: Er is zijn updates vrijgegeven die een aantal kwetsbaarheden in de Linux kernel verhelpen. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende lees- en schrijfrechten krijgen tot het kernel geheugen of een Denial of Service veroorzaken. Beschrijving: - CVE-2014-3534 ... Read more

Source: www.ncsc.nl

Top found tags: DoS(2),Fedora(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden gevonden in de LZO en LZ4 algoritmesLocation: Ubuntu - London, United Kingdom
Date published: 01-08-2014

Samenvatting: Er zijn een aantal kwetsbaarheid gevonden in de Oberhumer LZO en LZ4 algoritmes. Verschillende fabrikanten hebben updates uitgebracht die deze kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken van de applicatie die gebruikmaakt van de LZO en LZ... Read more

Source: www.ncsc.nl

Top found tags: Ubuntu(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in PHPLocation: Hewlett-Packard - Palo Alto, United States
Date published: 01-08-2014

Samenvatting: De makers van PHP hebben updates uitgebracht voor PHP5 die de kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan op afstand toegang verkrijgen tot gevoelige gegevens en kan mogelijk willekeurige code uitvoeren met de rechten van het PHP proces. Beschrijving: - CVE-2014-0207, CVE... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden verholpen in Network Security Services (NSS)Location: Amsterdam, The Netherlands
Date published: 01-08-2014

Samenvatting: Voor meerdere Linux distributies zijn updates uitgebracht die diverse kwetsbaarheden verhelpen in de Network Security Services (NSS). Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om de applicatie te laten crashen of om willekeurige code uit te voeren onder de re... Read more

Source: www.ncsc.nl

Top found tags: information security(2),Red Hat(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in HP NonStop NetBatch verholpenLocation: Hewlett-Packard - Palo Alto, United States
Date published: 01-08-2014

Samenvatting: HP heeft een update beschikbaar gesteld voor het verhelpen van een kwetsbaarheid in HP NonStop NetBatch. Gevolgen: Deze kwetsbaarheid maakt het mogelijk voor een kwaadwillende om op afstand een batch taak uit te voeren met de rechten van een lokale gebruiker. Beschrijving: De kwetsbaar... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Ubuntu Unity verholpenLocation: Ubuntu - London, United Kingdom
Date published: 01-08-2014

Samenvatting: Ubuntu heeft een kwetsbaarheid in Unity op Ubuntu 14.04 LTS verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken voor het omzeilen van authenticatie en het verkrijgen van gevoelige informatie. Beschrijving: Als een actieve sessie door de gebruiker gelockt wordt kan he... Read more

Source: www.ncsc.nl

Top found tags: NL(1),vulnerability(1),Ubuntu(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden in de Linux kernel verholpenLocation: Ubuntu - London, United Kingdom
Date published: 01-08-2014

Samenvatting: Ubuntu, RedHat en CentOS hebben updates uitgebracht om een groot aantal kwetsbaarheden in de Linux Kernel te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden misbruiken voor het verkrijgen van gevoelige (systeem-)informatie, het uitvoeren van willekeurige code, het veroorza... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Red Hat(2),Ubuntu(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish