Under construction

New design coming soon!

CIC News engine statistics

CIC News for 04-08-2014 contains 82 articles: cybercrime(26),cyber security(28),data breach(3),other(25)

CIC News update contains 62 English and 20 Dutch articles for today.
There are 6 published advisories, 0 are English and 6 are Dutch.
In today's English news articles:
- 16 related to cybercrime
- 28 related to cyber security
- 3 related to data breach and identity theft
- 15 for the category other news

In today's Dutch news articles:
- 10 related to cybercrime
- 0 related to cyber security
- 10 for the category other news

Have fun reading.

English cybercrime related news

Cyber extortionists pose growing threat to tech firmsLocation: New York, United States
Date published: 01-08-2014

If you live out your life on the internet, getting knocked offline can ruin your day.But if you make your living on the internet, then someone killing your connection is a whole lot more serious. Your entire business could be in jeopardy.That is the threat that a new wave of cyber extortionists are ... Read more

Source: www.bbc.com

Top found tags: report(1),threat(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anonymous attacks website in Israel to condemn attacks on GazaLocation: Tel Aviv, Israel
Date published: 01-08-2014

While many have opted to stay silent on the issue of Israels military action on Gaza, Anonymous decided to take some action and stand with the people of Palestine. The loose group of hackers, Anonymous has reportedly used its cyber arm power to take down the website of Israel Intelligence Agency ... Read more

Source: daily.bhaskar.com

Top found tags: Anonymous(2),cybercrime(2),Israel(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Registry-infecting reboot-resisting malware has NO FILESLocation: Microsoft HQ - Redmond, United States
Date published: 04-08-2014

Researchers have detailed a rare form of malware that maintains infection on machines and steals data without installing files. The malware resides in the computer registry only and is therefore not easy to detect. It code reaches machines through a malicious Microsoft Word document before creating ... Read more

Source: go.theregister.com

Top found tags: cybercrime(2),Microsoft(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Watch This Wireless Hack Pop a Cars Locks in MinutesLocation: Black Hat - Las Vegas, United States
Date published: 04-08-2014

unlocked-door [gallery-ca] Getty Shims and coat hangers are the clumsy tools of last centurys car burglars. Modern-day thieves, if theyre as clever as Silvio Cesare, may be able to unlock your vehicles door without even touching it. As part of a talk on the insecurity of wireless devices at... Read more

Source: wired.com

Top found tags: conference(2),vulnerability(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Poweliks" Malware Uses Windows Registry to Avoid DetectionLocation: Trend Micro - Cupertino, United States
Date published: 04-08-2014

Researchers at Trend Micro have analyzed a new Trojan that uses the Windows registry to hide all its malicious code, the security company reported on Friday. The threat, detected by Trend Micro as TROJ_POWELIKS.A or "Poweliks", is designed to provide attackers with system information which they can ... Read more

Source: securityweek.com

Top found tags: trojan(2),malware(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker proves passenger jets are at risk of cyber attackLocation: Black Hat - Las Vegas, United States
Date published: 04-08-2014

AlysiaJudge. Hacker proves passenger jets are at risk of cyber attack A cyber security researcher has worked out how to hack into passenger jets through the plane's Wi-Fi and inflight entertainment systems. If confirmed, the claim could prompt a comprehensive restructure of aircraft security. Ruben ... Read more

Source: itproportal.com

Top found tags: conference(2),cybercrime(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RAT Malware Communicating Via Yahoo MailLocation: Yahoo HQ - Sunnyvale, United States
Date published: 04-08-2014

A new remote administration Trojan (RAT) receives command and control instructions through Yahoo Mail, and could be easily modified to communicate with its authors through Gmail or other popular webmail providers. This new RATs significance stems primarily from its ability to elude the notice of ... Read more

Source: threatpost.com

Top found tags: Microsoft(2),trojan(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Remote Code Execution Flaw Patched in Samba 4Location: Microsoft HQ - Redmond, United States
Date published: 04-08-2014

All versions of Samba 4.x.x are affected by a vulnerability that could be exploited for remote code execution. Patches for this security hole were released on Friday. Samba is an open source software suite that provides file and print services to Server Message Block (SMB) and Common Internet File S... Read more

Source: securityweek.com

Top found tags: patch(2),update(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US-CERT Warns of New Backoff MalwareLocation: New York Times - New York, United States
Date published: 04-08-2014

The Department of Homeland Security's U.S. Computer Emergency Readiness Team ( US-CERT), in collaboration with Trustwave SpiderLabs, FS-ISAC and the U.S. Secret Service, recently issued an alert warning of new malware called Backoff, which specifically targets point-of-sale (PoS) systems. According ... Read more

Source: www.esecurityplanet.com

Top found tags: government(3),telecom sector(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Security Challenge launches cyber anti-terrorism competitionLocation: National Crime Agency - London, United Kingdom
Date published: 04-08-2014

Sophos and Cyber Security Challenge UK are currently working together to recruit amateur cyber defenders to partake in a competition to find the country's best cyber defenders. The competition, Assignment: Flag Drive, entails the participants breaking into a fictional cyber terrorist's hard drive, a... Read more

Source: www.scmagazineuk.com

Top found tags: Sophos(1),United Kingdom(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critical code execution bug in Samba gives attackers superuser powersLocation: Microsoft HQ - Redmond, United States
Date published: 04-08-2014

receiving end of attacks that allow hackers on the same local network to run programs with nearly unfettered administrative privileges. Samba is anopen source implementation of the file-sharing components ofMicrosoft Windows. Most Linux releases and a wide variety of other operating systems use ... Read more

Source: arstechnica.com

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RAT Abuses Yahoo Mail for C&C CommunicationsLocation: G Data Software - Bochum, Germany
Date published: 04-08-2014

Researchers at anti-malware solutions provider G Data Software have analyzed a remote administration tool (RAT) that's capable of using popular webmail and other types of services for command and control (C&C) communications. The threat, dubbed Win32.Trojan.IcoScript.A by the company, has been aroun... Read more

Source: securityweek.com

Top found tags: trojan(2),cybercrime(5),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese TV channel hacked while on airLocation: Beijing, China
Date published: 04-08-2014

Hacktivists in China put anti-government messages up over broadcast programmes while Wenzhou TV station was on air. Chinese TV channel hacked while on air Chinese TV channel hacked while on air At 7:30 pm last Friday messages appeared on Chinese social networking sites saying something seemed to be ... Read more

Source: www.scmagazineuk.com

Top found tags: China(2),government(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China's gov't nixes Symantec, Kaspersky, favors domestic brandsLocation: Beijing, China
Date published: 04-08-2014

China continues to ditch technology from foreign companies in favor of homegrown products and services, this week saying the government has excluded Symantec & Kaspersky from an approved roster of security providers. The state-controlled People's Daily tweeted the news Sunday, followed by a se... Read more

Source: www.scmagazine.com

Top found tags: Kaspersky Lab(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Mozilla 'accidentally' reveals developer emails and passwordsLocation: Mozilla - Mountain View, United States
Date published: 04-08-2014

Mozilla Developer Network. In a blog posted over the weekend, Mozilla director of developer relations, Stormy Peters, said that 76,000 users had their email address exposed via a database dump that was accessible to the wider internet. The dump also contained 4,000 encrypted user passwords. "As soon... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Your fitness tracker is a SNITCH says SymantecLocation: Symantec HQ - Mountain View, United States
Date published: 04-08-2014

If you're the kind of person whose gadgets auto-tweet your exercise, sex or sleep habits all vanguard applications of the odiously-named quantified self movement you can be tracked, identified and hacked, according to Symantec. In this post, the security outfit explains that the age-ol... Read more

Source: go.theregister.com

Top found tags: cyber security(2),Raspberry Pi(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mozilla gaffe exposed 76,000 email addresses, 4000 passwordsLocation: Mozilla - Mountain View, United States
Date published: 03-08-2014

Mozilla has 'fessed up to accidentally exposing the email addresses for 76,000 members of its Developer Network, along with 4000 encrypted passwords. The breach was caused by a bad script that on July 23 was found to have inadvertently published the records online over the previous month. The offend... Read more

Source: go.theregister.com DDoS Attack Hits Australian ISP Cirrus Communications | Australian wireless broadband provider Cirrus Communications suffered a DDoS attack earlier this week which knocked out half of its network. The attack had been mostly mitigated by Wednesday afternoon local time, but details of the attack continue to be scarce.The attack was on Cirrus core network, rather than peripheral radio equipment, according to The Register.We are very close to full recovery. Weve only got a couple of per cent of the network down at present, Cirrus CEO Eric Heyde told The Register. Its too early to say where the attack came from.The company website and Facebook page do not offer a statement or any information on the attack, and details like the duration, size, and type of attack are all unclear.Cirrus is the largest fixed wireless broadband carrier in Australia, and serves mostly business and government clients.Large scale DDoS attacks have risen dramatically within the past year, according to a July Arbor Networks report. Mitigation attempts have met with varied success, however, and UltraDNS mitigated an attack on one customer which peaked at well over 200Gbps in a matter of hours in April. | http://www.thewhir.com/web-hosting-news/ddos-attack-hits-australian-isp-cirrus-communications | 01-08-2014 | www.thewhir.com

Top found tags: website(1),security measures(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GCHQ names the Hogwarts for HackersLocation: GCHQ - Cheltenham, United Kingdom
Date published: 04-08-2014

The UK's Government Communications Headquarters (GCHQ) has certified six Masters of Cyber Security degrees. The certifications were issued under the UK's Cyber Security Strategy that, among other things, calls for the nation to Strengthen postgraduate education to expand the pool of experts with ... Read more

Source: go.theregister.com

Top found tags: information security(2),education(3),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK spy agency GCHQ confronts cybersecurity skills shortage with certified degreesLocation: GCHQ - Cheltenham, United Kingdom
Date published: 04-08-2014

degree courses. The agency has accredited six Master's degree courses at UK universities as meeting its 'stringent criteria' for providing a foundation in 'cybersecurity'. The UK government warned last year that the country's ability to defend itself online could be compromised by an ongoing IT secu... Read more

Source: www.zdnet.com

Top found tags: United Kingdom(4),government(5),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China excludes Symantec, Kaspersky Lab from approved anti-virus vendorsLocation: Beijing, China
Date published: 04-08-2014

China has excluded Symantec and Kaspersky Lab from a list of approved anti-virus vendors, suggesting the trend of restrictions imposed on foreign technology in favor of home-grown varieties is continuing. State-owned news agency People's Daily reported the news on Sunday. In a tweet, the publication... Read more

Source: www.zdnet.com

Top found tags: cybercrime(5),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker says to show passenger jets at risk of cyber attackLocation: Black Hat - Las Vegas, United States
Date published: 04-08-2014

BOSTON (Reuters) - Cyber security researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and inflight entertainment systems - a claim that, if confirmed, could prompt a review of aircraft security. Santamarta, a con... Read more

Source: reuters.com

Top found tags: cybercrime(3),Black Hat(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Student mods Raspberry Pi to catch HackersLocation: Londen, United Kingdom
Date published: 04-08-2014

Student mods Raspberry Pi to catch Hackers. University of Arizona student Nathan Yee has released instructions about how to build a "honeypot" using a Raspberry Pi. Yee states that the honeypot is used to "detect anomalous events. We gain awareness and insight into our network." A "honeypot" is a de... Read more

Source: itproportal.com

Top found tags: cyber security(2),financial sector(2),Raspberry Pi(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crumbs! Holiday phish based on genuine hotel booking surfacesLocation: Fergus, United States
Date published: 04-08-2014

Scammers have launched a devious phishing campaign aimed at tricking customers of targeted hotels into transferring funds to a drop account. Securobods suggested cybercrooks either hacked into a Spanish hotel's system or persuaded someone to hand over customer records on a false pretext before using... Read more

Source: go.theregister.com

Top found tags: cybercrime(4),telecom sector(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China boots Kaspersky and Symantec off security contractor listLocation: Beijing, China
Date published: 04-08-2014

Updated Kaspersky Labs and Symantec have both been booted off Chinas list of approved security vendors for government agencies, as the country continues to tighten up against foreign tech firms in the wake of the NSA indiscriminate surveillance revelations. The Peoples Daily reported first in ... Read more

Source: go.theregister.com

Top found tags: antivirus(4),government(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Two more talks pulled from Black Hat hacking conferenceLocation: Black Hat - Las Vegas, United States
Date published: 04-08-2014

BOSTON (Reuters) - Security researchers have pulled two scheduled talks in this week's Black Hat internet-security conference in Las Vegas - one on breaking into home-alarm systems and the other on a sophisticated Russian espionage campaign known as "Snake." The withdrawals follow the cancellation l... Read more

Source: reuters.com

Top found tags: critical infrastructure(2),cyber security(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Developers Told to Change Passwords After Accidental Mozilla Password DumpLocation: Mozilla - Mountain View, United States
Date published: 04-08-2014

Some members of the Mozilla Developer Network are being advised to change their passwords after email addresses and encrypted credentials were disclosed on a public server. Mozilla director of developer relations Stormy Peters said the organization has been investigating the disclosure for 10 days. ... Read more

Source: threatpost.com

Top found tags: website(1),social media(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Backdoor Techniques in Targeted AttacksLocation: New York, United States
Date published: 04-08-2014

Backdoors are an essential part of targeted attacks, as they allow an externalthreat actorto exercise control over any compromised machines. These allow the threat actor to collect information and move laterallywithin the targeted organization. Our investigations into various targeted attacks ... Read more

Source: trendmicro.com

Top found tags: threat(1),backdoor(2),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security researcher to demo airplane Wi-Fi hackLocation: IOActive - Seattle, United States
Date published: 04-08-2014

IOActive security researcher Ruben Santamarta claims to have figured out how to hack the satellite communication equipment on airplanes, by infiltrating on-board Wi-Fi and entertainment systems. Security researcher to demo airplane Wi-Fi hack Security researcher to demo airplane Wi-Fi hack Santamart... Read more

Source: www.scmagazineuk.com

Top found tags: Black Hat(4),Hack In The Box(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China slams Kaspersky and Symantec with government bansLocation: Beijing, China
Date published: 04-08-2014

PaulMCCooper. China slams Kaspersky and Symantec with government bans China has come down hard on US-based security company Symantec and its Russian counterpart Kaspersky, removing it from the list of approved antivirus providers in Chinese government computer systems. The news comes amid a move fro... Read more

Source: itproportal.com

Top found tags: antivirus(4),cybercrime(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Inherent vulnerabilities pose risk to Android, Blackberry and Apple devicesLocation: BlackBerry HQ - Ontario, Canada
Date published: 04-08-2014

phelanto. Inherent vulnerabilities pose risk to Android, Blackberry and Apple devices Government surveillance and malicious hacking could be facilitated by built-in vulnerabilities in mobile devices. Research consultants with Accuvant Labs, Mathew Solnik and Marc Blanchou, found in a research that t... Read more

Source: itproportal.com

Top found tags: Black Hat(4),mobile device(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Over 11,000 jump on European 'class action' privacy suit against FacebookLocation: Facebook - Menlo Park, United States
Date published: 04-08-2014

A lawsuit filed in Austria against Facebook over the companys privacy policies has gathered over 11,500 participants since Friday, raising the claim against the company to 5.75 million (US$7.7 million), complainant Europe-v-Facebook said Monday. It is much more than we expected, said pri... Read more

Source: www.pcworld.com

Top found tags: The Netherlands(2),United Kingdom(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Inside the Backdoor Techniques Used in Advanced AttacksLocation: Trend Micro - Cupertino, United States
Date published: 04-08-2014

Disrupting a network is one thing; maintaining access and controlling computers is another. That second part requires creating backdoors, which have become vital parts of cyber-attack campaigns. In a new paper, researchers at Trend Micro have outlined some of the techniques backdoors use to enable a... Read more

Source: securityweek.com

Top found tags: security measures(2),Trend Micro(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dude, How Secure Is My Connected Car?Location: Morrison, United States
Date published: 04-08-2014

[green-yellow-orange-abstract-250x1] The driverless car may be here before we know it. A county in Iowa, wanting to be in the forefront of autonomous vehicles, has already passed a resolution to allow them on its streets, reports USA Today. An official quoted in the story predicts driverless cars wi... Read more

Source: www.esecurityplanet.com

Top found tags: mobile device(4),social media(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Evernote Patches Vulnerability in Android AppLocation: Google HQ - Mountain View, United States
Date published: 04-08-2014

We have previously discussed anAndroid vulnerabilitythat may lead to user data being captured or used to launch attacks. We discovered that the popular Android app for Evernote contained the said vulnerability. We disclosed the details to Evernote, and they took action by issuing an update to ... Read more

Source: trendmicro.com

Top found tags: data theft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Before Wallet 2.0 Hits the Streets, Security Needs to be in PlaceLocation: Google HQ - Mountain View, United States
Date published: 04-08-2014

The purse dates back hundreds of years. Made from leather and originally worn around the waist, the purse was the go-to place to store coins and trinkets. But then the paper bill, with its lightweight and clear denominations, came along and changed everything. People no longer needed to carry purses... Read more

Source: blogs.mcafee.com

Top found tags: social media(2),update(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Marketers Can Navigate the Ever-Changing Security LandscapeLocation: New York, United States
Date published: 04-08-2014

Last week was the 25^th anniversary of the firewall, marking an impressive milestone for a technology that continues to grow and evolve. To celebrate the lifetime of the firewall, we at McAfee produced a comprehensive infographic highlighting the milestones that our favorite invisible wall has... Read more

Source: blogs.mcafee.com

Top found tags: website(1),social media(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Before Getting Rid of Your Old Printer, Say Goodbye to Lingering DataLocation: New York, United States
Date published: 04-08-2014

In the security business, theres a lot of talk about protecting your smartphones and computers from malware and viruses, as well as loss and theft. It makes sense. Most of us use our smartphones and computers on a daily basis and keep important information on them like passwords, user names, and ... Read more

Source: blogs.mcafee.com

Top found tags: health sector(2),medical sector(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
HeartBleed - further lessonsLocation: New York, United States
Date published: 04-08-2014

HeartBleed - further lessons HeartBleed - further lessons 7 April 2014 was the day the digital world stood still as news broke of what was billed as one of the most devastating cyber hacks ever. Well, we're all still here to tell the tale so was it a close shave or merely an over-hyped issue? Who kn... Read more

Source: www.scmagazineuk.com

Top found tags: data theft(2),OpenSSL(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK government proposes public sector data sharingLocation: National Health Service - London, United Kingdom
Date published: 04-08-2014

A leaked document reveals that the British government plans to revise data collection laws so that it can share personal details on earnings, tax and criminal records, benefits payments and more with all agencies in the public sector. UK government proposes public sector data sharing UK government p... Read more

Source: www.scmagazineuk.com

Top found tags: legislation(2),United Kingdom(2),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Today's Tech: Planes get hacked, the US seizes data stored abroad and Google looks at your emails (if you're a paedophile)Location: Google HQ - Mountain View, United States
Date published: 04-08-2014

Today's Tech: Planes get hacked, the US seizes data stored abroad and Google. looks at your emails (if you're a paedophile) US vs. them US District Judge Loretta Preska has ruled that Microsoft needs to hand over emails despite being stored in an Irish data centre. Despite the emails being under Eur... Read more

Source: itproportal.com

Top found tags: airport(4),airport sector(4),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Australia deserves a whack of the data breach notification stickLocation: Blair, United States
Date published: 04-08-2014

Research Institute. "Organisations not coming clean has a collateral impact, and that causes collateral damage to the rest of the industry." The Catch of the Day data breach is a clear example. It was only reported to customers last month three years after it had taken place for reasons that... Read more

Source: www.zdnet.com

Top found tags: cyber security(4),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
P.F. Chang's Provides Data Breach Update, Confirms Compromised LocationsLocation: Beijing, China
Date published: 04-08-2014

P.F. Chang's China Bistro has been investigating a breach involving its payment card processing system since the US. Secret Service alerted the company of a possible compromise back on June 10, 2014. While the investigation is ongoing, the restaurant chain said on Monday that the security compromise... Read more

Source: securityweek.com

Top found tags: data breach(2),financial sector(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Its Coming: Think Big at Partner Summit 2014Location: McAfee - Santa Clara, United States
Date published: 04-08-2014

The fourth annual McAfee Global Partner Summit, brought to you by Intel Security, is just around the corner, and youre invited. On October 26-27, McAfee leaders, customers, and partners from around the world are descending on the Venetian hotel in Las Vegas, NV, for two days to Think Big. A... Read more

Source: blogs.mcafee.com

Top found tags: identity theft(2),social media(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Israel Spied on Kerry During Peace Talks: ReportLocation: Tel Aviv, Israel
Date published: 03-08-2014

BERLIN - Israel eavesdropped on US Secretary of State John Kerry during doomed peace talks with the Palestinians last year, German news weekly Der Spiegel reported Sunday. The article said the Israelis and at least one other secret service listened in on Kerry's conversations as he tried to mediate,... Read more

Source: securityweek.com

Top found tags: United States(2),government(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco patches OSPF bug that sends traffic into black holesLocation: Cisco HQ - San Jose, United States
Date published: 04-08-2014

Cisco has shipped a patch for a buggy Open Shortest Path First (OSPF) routing implementation it says offers exploits that include traffic blackholing or interception. As the advisory notes, the vulnerability could allow an unauthenticated attacker to take full control of the OSPF Autonomous Syste... Read more

Source: go.theregister.com

Top found tags: OS X(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft hacks out new EMET, spits out Adobe FlashLocation: Microsoft HQ - Redmond, United States
Date published: 04-08-2014

Microsoft has emitted a new version of EMET its Enhanced Mitigation Experience Toolkit. Redmond often recommends deployment of EMET as a frontline defence against attacks, so the release of a new version is noteworthy. The big two enhancements that Microsoft is talking up the loudest are an impr... Read more

Source: go.theregister.com

Top found tags: patch(1),website(1),Internet Explorer(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Execs showing interest in bring your own identity: PonemonLocation: Facebook - Menlo Park, United States
Date published: 04-08-2014

Australia, in bring your own identity (BYOID) initiatives where social networking or digital identities are used for application login. The Identity Imperative for the Open Enterprise 2014 report, shows while BYOID deployment using social IDs is still in its infancy, 74 percent of Australian busines... Read more

Source: www.zdnet.com

Top found tags: research(1),Ponemon Institute(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Israel turns spying tables on US, hacks John Kerry's phone callsLocation: Tel Aviv, Israel
Date published: 04-08-2014

PaulMCCooper. Israel turns spying tables on US, hacks John Kerry's phone calls With so much in the news over the past year about the vastly inflated spying capabilities of United States intelligence services, it's been easy to forget that the US is just as often a victim of spying. This week it emer... Read more

Source: itproportal.com

Top found tags: United States(4),government(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco releases patch for OSPF faultLocation: Cisco HQ - San Jose, United States
Date published: 04-08-2014

Cisco releases patch for OSPF fault. Cisco has released a patch for a vulnerable Open Shortest Path First (OSPF) routing implementation that gives attackers the opportunity to intercept traffic. In an advisory released last week, the firm revealed that the fault "could allow an unauthenticated attac... Read more

Source: itproportal.com

Top found tags: OS X(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LG G Watch gets patched to remedy corrosion issueLocation: LG HQ - Seoul, Korea
Date published: 04-08-2014

LG G Watch gets patched to remedy corrosion issue. LG's smartwatch, which went on sale last month, is apparently suffering from teething troubles in terms of corrosion but this is something a software update will resolve. Yes, it sounds a little silly, but let us explain. The actual problem is t... Read more

Source: itproportal.com

Top found tags: patch(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EE rolls out London bus pay-by-bonk app only fandoids need applyLocation: Londen, United Kingdom
Date published: 04-08-2014

Riding a London bus is about as pleasurable as trying to saddle a twitchy rhino that has decided to charge at the slightest perceived threat. But the business of bus-based travelling through an ancient city designed with horse and cart in mind might be set to get a teeny bit easier - at least for EE... Read more

Source: go.theregister.com

Top found tags: NFC(2),smartphone(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA hands Gaza targeting data to Israel, say latest Snowden docsLocation: Tel Aviv, Israel
Date published: 04-08-2014

According to the latest drop of leaks from NSA whistleblower Edward Snowden, the US spy agency provides financial assistance, weapons and signals intelligence to Israel. The Intercept reports that Canadian, British and Jordanian signals intelligence is also shared with Israel. This intelligence rela... Read more

Source: go.theregister.com

Top found tags: United Kingdom(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Twitter Weighing Legal Options On Publishing National Security Requests DataLocation: Twitter - San Francisco, United States
Date published: 04-08-2014

Twitter officials are pushing the United States government for more freedom to publish specific numbers about national security information requests, and said the company is considering its legal options if the government doesnt allow more data to be made public. In its latest transparency report... Read more

Source: threatpost.com

Top found tags: social media(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Samba Patches Heap Overflow Bug in Current VersionsLocation: Microsoft HQ - Redmond, United States
Date published: 04-08-2014

The keepers of Samba, an open source software package that provides Windows operability for Linux and UNIX systems, have patched a serious heap overflow vulnerability in all 4.x.x versions of the software. The bug was in the nmbd NetBIOS name services daemon, and a hacker exploiting the flaw could r... Read more

Source: threatpost.com

Top found tags: vulnerability(1),website(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Free streams of 22 Jump Street, Transformers lead to adware, malwareLocation: Trend Micro - Cupertino, United States
Date published: 04-08-2014

22 Jump Street and Transformers: Age of Extinction topped the list of summer flicks used in social engineering, according to a Tuesday post by Trend Micro. In some cases, links to free streams, hosted predominately on Tumblr and WordPress websites, brings users to another site that asks them to down... Read more

Source: www.scmagazine.com

Top found tags: social engineering(2),Trend Micro(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

China verbiedt virusscanners Kaspersky en SymantecLocation: Beijing, China
Date published: 04-08-2014

De Chinese overheid heeft het Russische Kaspersky Lab en het Amerikaanse Symantec van een lijst met goedgekeurde beveiligingsleveranciers gehaald. Daardoor mogen alleen nog Chinese virusscanners en beveiligingssoftware op systemen van de Chinese overheid worden gebruikt. De overgebleven bedrijven op... Read more

Source: www.security.nl

Top found tags: government(3),Kaspersky Lab(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sms-spam gebruikt voor verspreiden Android-malwareLocation: DHL HQ - Bonn, Germany
Date published: 04-08-2014

In Duitsland is een campagne ontdekt waarbij sms-berichten worden verstuurd die van DHL afkomstig lijken, maar in werkelijkheid Android-malware proberen te verspreiden. De sms-spam doet zich voor als een trackingmelding van een DHL-pakket dat de ontvanger van het bericht zogenaamd zal ontvangen. Om ... Read more

Source: www.security.nl

Top found tags: Germany(2),telecom sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Veel telecomaanbieders blijken hackers te helpenLocation: Black Hat - Las Vegas, United States
Date published: 04-08-2014

Zo'n 2 miljard smartphones, draaiend op iOS, Android en BlackBerry, zijn kwetsbaar voor een softwarefout in managementsoftware die telecomaanbieders plaatsen op de toestellen die zij uitleveren. De details over deze bevinding presenteren onderzoekers van Accuvant Lab deze week op de Black Hat-confer... Read more

Source: www.automatiseringgids.nl

Top found tags: conference(3),Black Hat(4),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
30 virusscanners voor Android getestLocation: G Data Software - Bochum, Germany
Date published: 04-08-2014

Mobiele virusscanners voor het Android-platform hebben weinig moeite met kwaadaardige apps, zo blijkt uit een test van het Duitse testorgaan AV-Test.org , dat 30 verschillende anti-virus apps vergeleek. In totaal werden de 30 virusscanners met 2627 kwaadaardige apps uit de afgelopen vier weken getes... Read more

Source: www.security.nl

Top found tags: Google(2),Google Play(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
1200 klachten over IBAN-phishingmailsLocation: Amsterdam, The Netherlands
Date published: 04-08-2014

De Fraudhelpdesk heeft dit jaar ruim 1200 klachten over IBAN-phishingmails ontvangen. De phishingmails, die de afgelopen periode veelvuldig werden verstuurd, waarschuwen ontvangers voor de overstap op IBAN en dat de ontvanger gratis een IBAN-betaalpas moet aanvragen. De link waar dit zogenaamd kan w... Read more

Source: www.security.nl

Top found tags: NL(1),phishing(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware verstopt zich volledig in Windows RegisterLocation: Microsoft HQ - Redmond, United States
Date published: 04-08-2014

Onderzoekers hebben een malware-exemplaar ontdekt dat zich volledig in het Windows Register verbergt. Deze Poweliks Trojan zou het lastiger maken om de malware te vinden en te analyseren. De trojan kan aanvullende malware downloaden en installeren en systeeminformatie stelen.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),Windows(1),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
30 virusscanners voor Android getestLocation: G Data Software - Bochum, Germany
Date published: 04-08-2014

Mobiele virusscanners voor het Android-platform hebben weinig moeite met kwaadaardige apps, zo blijkt uit een test. Slechts vijf virusscanners scoren lager dan 98%. AhnLab, Avast!, Avira, BitDefender, ESET, G Data, Cheetah Mobile, McAfee, Qihoo en Quick Heal scoorden de maximale 13 punten. Zeven app... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),antivirus(2),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ransomware levert bende bijna 17.000 euro opLocation: Amsterdam, The Netherlands
Date published: 04-08-2014

Een bende cybercriminelen die computers met de Cryptowall-ransomware infecteert zou inmiddels bijna 17.000 euro aan Bitcoins van slachtoffers hebben ontvangen. Cryptowall versleutelt bestanden op computers en eist een bedrag ter waarde van 500 euro in Bitcoin dat binnen een bepaalde tijd moet worden... Read more

Source: www.security.nl

Top found tags: ransomware(1),cybercrime(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Nederland in Top 10 landen met veiligste internetomgeving"Location: Amsterdam, The Netherlands
Date published: 04-08-2014

Nederland behoort tot de Top 10 van landen met de veiligste internetomgeving, zo stelt het Russische anti-virusbedrijf Kaspersky Lab aan de hand van eigen onderzoek tijdens het tweede kwartaal van dit jaar. Bijna 30% van de computers op het internet kregen het afgelopen kwartaal met tenminste n ... Read more

Source: www.security.nl

Top found tags: Germany(2),South Africa(2),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China verbiedt virusscanners Kaspersky en Symantec - updateLocation: Beijing, China
Date published: 04-08-2014

De Chinese overheid heeft het Russische Kaspersky Lab en het Amerikaanse Symantec van een lijst met goedgekeurde beveiligingsleveranciers gehaald. Daardoor mogen alleen nog Chinese virusscanners en beveiligingssoftware op systemen van de Chinese overheid worden gebruikt. De overgebleven bedrijven op... Read more

Source: www.security.nl

Top found tags: government(3),Kaspersky Lab(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

Update Politie app maakt pushberichten mogelijkLocation: Den Haag, The Netherlands
Date published: 04-08-2014

Er is een update voor de Politie app uitgekomen waardoor de politie nu ook specifieke pushberichten aan n of meerdere gemeentes kan versturen, bijvoorbeeld in het geval van vermissingen, als er een grote brand is of als een gevaarlijke overvaller zich in de gemeente van de gebruiker schuilhoudt.... Read more

Source: www.security.nl

Top found tags: local authority(2),social media(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
31% Nederlanders zou Facebookverbod op werk negerenLocation: Amsterdam, The Netherlands
Date published: 04-08-2014

Bijna n op de drie Nederlanders zou overdag regelmatig op Facebook kijken, ook al is dit niet door de werkgever toegestaan. Dat stelt Samsung aan de hand van een Europees onderzoek, waarbij ook 1.000 mensen in de Belgi en Nederland werden genterviewd. Het zouden in Nederland vooral werknemer... Read more

Source: www.security.nl

Top found tags: Samsung(1),website(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ransomware versleutelt bestanden op Synology NASLocation: Amsterdam, The Netherlands
Date published: 04-08-2014

Op internet zijn verschillende meldingen verschenen van eigenaren van een Synology NAS waarvan bestanden door een nieuwe vorm van ransomware zijn versleuteld. Een NAS (Network Attached Storage) is een opslagapparaat dat via het netwerk te bereiken is en grote hoeveelheden bestanden kan bevatten. De ... Read more

Source: www.security.nl

Top found tags: financial sector(2),The Netherlands(2),Ministry of Economic Affairs(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chrome-extensie voor versleutelen bestanden onlineLocation: Amsterdam, The Netherlands
Date published: 04-08-2014

De maker van de versleutelde chat-app Cryptocat heeft een extensie voor Google Chrome ontwikkeld waarmee het kinderspel wordt om bestanden te versleutelen en te delen. De door Nadim Kobeissi ontwikkelde extensie heet miniLock en werd begin juli al aangekondigd. Via de extensie kunnen gebruikers door... Read more

Source: www.security.nl

Top found tags: Chrome(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Geen beveiligingssoftware van Kaspersky en Symantec in ChinaLocation: Kaspersky HQ - Moscow, Russia
Date published: 04-08-2014

De Chinese overheid heeft Kaspersky en Symantec geschrapt als leverancier van beveiligingssoftware. De maatregel past in de koude oorlog tussen de Verenigde Staten en China over spionage over en weer via gaten in techproducten. Overheidsinstanties mogen voortaan alleen de spullen van vijf Chinese le... Read more

Source: www.beveiligingnieuws.nl

Top found tags: China(2),government(2),Kaspersky Lab(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoeker: communicatiesysteem vliegtuig te hackenLocation: Black Hat - Las Vegas, United States
Date published: 04-08-2014

Een beveiligingsonderzoeker claimt dat systemen voor satellietcommunicatie in vliegtuigen kunnen worden gehackt, mogelijk via inflight-entertainmentsystemen en wifi aan boord. De makers van de systemen zelf relativeren de bevindingen. VliegtuigBeveiligingsonderzoeker Ruben Santamarta van IOActive te... Read more

Source: tweakers.net

Top found tags: wireless(1),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nog meer lezingen Black Hat conferentie teruggetrokkenLocation: Black Hat - Las Vegas, United States
Date published: 04-08-2014

Opnieuw hebben beveiligingsonderzoekers besloten om hun lezing tijdens de Black Hat conferentie in Las Vegas deze week terug te trekken. Onlangs lieten ook al andere onderzoekers weten dat ze hun lezing over het ontmaskeren van Tor-gebruikers met een beperkt budget niet zouden geven. Nu is ook een l... Read more

Source: www.security.nl

Top found tags: research(1),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Laptop Ierse politieagent in Amsterdams bordeel gevondenLocation: Den Haag, The Netherlands
Date published: 04-08-2014

De Ierse politie is samen met Europol een onderzoek gestart nadat een laptop en documenten van een Ierse politieagent in een Amsterdams bordeel werden aangetroffen. De uitbaatster van het bordeel zou de tas met de computer en documenten hebben gevonden en vervolgens de politie hebben ingelicht. De N... Read more

Source: www.security.nl

Top found tags: police(1),research(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers vermommen honeypot als slimme meterLocation: Amsterdam, The Netherlands
Date published: 04-08-2014

Onderzoekers hebben een honeypot ontwikkeld die zich als slimme meter kan voordoen, om zo eventuele aanvallen op slimme meters te kunnen detecteren. Een honeypot is een systeem dat opzettelijk is neergezet om te worden aangevallen, om zo aanvallers en hun tactieken in kaart te kunnen brengen. De Con... Read more

Source: www.security.nl

Top found tags: honeypot(1),NL(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fabrikanten bagatelliseren satelliet-hack in vliegtuigenLocation: Black Hat - Las Vegas, United States
Date published: 04-08-2014

Een onderzoeker zal deze week tijdens de Black Hat conferentie in Las Vegas demonstreren hoe het in theorie mogelijk is om via de wifi en entertainmentsystemen van vliegtuigen toegang tot de satellietcommunicatie te krijgen, maar volgens de fabrikanten van de apparatuur is het risico klein. Ruben Sa... Read more

Source: www.security.nl

Top found tags: wireless(1),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Ernstige kwetsbaarheid in Samba verholpenLocation: Ubuntu - London, United Kingdom
Date published: 04-08-2014

Samenvatting: Een is een ernstige kwetsbaarheid in Samba verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om willekeurige code uit te voeren onder root rechten. Beschrijving: Een kwaadwillende kan via het netwerk packets sturen naar de NetBIOS name services daemon (nmb... Read more

Source: www.ncsc.nl

Top found tags: NL(1),vulnerability(1),Ubuntu(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM verhelpt kwetsbaarheden in WebSphere Application ServerLocation: IBM HQ - Armonk, United States
Date published: 04-08-2014

Samenvatting: IBM heeft een aantal kwetsbaarheden verholpen in de IBM WebSpere Application Server (WAS). Gevolgen: Kwaadwillenden kunnen de gevonden kwetsbaarheden misbruiken voor het verkrijgen van informatie over het systeem of het verkrijgen van authenticatiecookies via Cross-Site Scripting (XSS)... Read more

Source: www.ncsc.nl

Top found tags: XSS(1),cyber security(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden gevonden in de LZO en LZ4 algoritmesLocation: Ubuntu - London, United Kingdom
Date published: 04-08-2014

Samenvatting: Er zijn een aantal kwetsbaarheid gevonden in de Oberhumer LZO en LZ4 algoritmes. Verschillende fabrikanten hebben updates uitgebracht die deze kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken van de applicatie die gebruikmaakt van de LZO en LZ... Read more

Source: www.ncsc.nl

Top found tags: Ubuntu(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden verholpen in de SUSE kernelLocation: Amsterdam, The Netherlands
Date published: 04-08-2014

Samenvatting: De makers van SUSE Linux hebben updates vrijgegeven die een grote hoeveelheid kwetsbaarheden in de kernel verhelpen. Gevolgen: Een lokale kwaadwillende kan deze grote groep kwetsbaarheden misbruiken om onder andere: - verhoogde gebruikersrechten te verkrijgen, - systeeminformatie te ve... Read more

Source: www.ncsc.nl

Top found tags: NL(1),The Netherlands(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in TYPO3 CMSLocation: Cross, United States
Date published: 04-08-2014

Samenvatting: TYPO3 heeft diverse kwetsbaarheden in haar CMS verholpen. Misbruik kan o.a. leiden tot de mogelijkheid tot Cross-Site-Scripting (XSS) aanvallen en toegang tot gevoelige informatie. Gevolgen: Kwaadwillenden kunnen de gevonden kwetsbaarheid misbruiken voor het verkrijgen van gevoelige in... Read more

Source: www.ncsc.nl

Top found tags: XSS(1),Debian(2),vulnerability(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Wireshark verholpenLocation: Amsterdam, The Netherlands
Date published: 04-08-2014

Samenvatting: Er zijn meerdere kwetsbaarheden verholpen in Wireshark. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: - CVE-2014-5161, CVE-2014-5162: De Catapult DCT2000 en IrDA dissectors bevatten een "buffer underrun" kwe... Read more

Source: www.ncsc.nl

Top found tags: DoS(1),NL(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish