Under construction

New design coming soon!

CIC News engine statistics

CIC News for 05-08-2014 contains 82 articles: cybercrime(17),cyber security(34),data breach(8),other(23)

CIC News update contains 66 English and 16 Dutch articles for today.
There are 3 published advisories, 0 are English and 3 are Dutch.
In today's English news articles:
- 10 related to cybercrime
- 32 related to cyber security
- 8 related to data breach and identity theft
- 16 for the category other news

In today's Dutch news articles:
- 7 related to cybercrime
- 2 related to cyber security
- 7 for the category other news

Have fun reading.

English cybercrime related news

Android malware SandroRAT disguised as mobile security appLocation: Google HQ - Mountain View, United States
Date published: 04-08-2014

Researchers are again warning users to steer clear of app downloads from unvetted sources, particularly since new Android malware is making the rounds through phishing emails. Over the weekend, Carlos Castillo, a mobile malware researcher at McAfee, detailed the new variant of remote access trojan (... Read more

Source: www.scmagazine.com

Top found tags: update(2),cybercrime(3),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker proves passenger airplanes are open to cyber attackLocation: Black Hat - Las Vegas, United States
Date published: 04-08-2014

AlysiaJudge. Hacker proves passenger airplanes are open to cyber attack A cyber security researcher has worked out ways to hack into passenger jets through the plane's Wi-Fi and inflight entertainment systems. If confirmed, the claim could prompt a comprehensive restructure of aircraft security, and... Read more

Source: itproportal.com

Top found tags: conference(2),cybercrime(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Will Bitcoin Succeed?Location: Will, United States
Date published: 05-08-2014

When you work for a security company, sometimes people think you must know everything there is to know about technology. So sometimes I get asked, Will Bitcoin and other cryptocurrencies succeed? Unfortunately, Im an engineer, not an economist. I cant speak to how big central banks like ... Read more

Source: trendmicro.com

Top found tags: United Kingdom(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
In the Game of Hacks, you win... or you get hackedLocation: Oracle - Redwood City, United States
Date published: 05-08-2014

In the Game of Hacks, you win... or you get hacked. How sharp are your coders when it comes to security? Checkmarx has launched a new game for developers that tests their knowledge of common code vulnerabilities. Its an interesting idea. Checkmarx, an application security firm, believes that play... Read more

Source: itproportal.com

Top found tags: telecom sector(2),vulnerability(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why no one smells a RAT: Trojan uses YAHOO WEBMAIL to pick up instructionsLocation: G Data Software - Bochum, Germany
Date published: 05-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Cybercrooks commonly run botnet command-and-control networks using servers or (less frequently) a peer-to-peer network, but one gang of scammers has broken the mould by managing a Trojan using Yahoo webmail. The recently discovered IcoScript... Read more

Source: go.theregister.com

Top found tags: trojan(2),social media(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile Users Targeted With SandroRat Posing as Security SoftwareLocation: WhatsApp - Mountain View, United States
Date published: 05-08-2014

An attack targeting Google Android users in Europe with a new variant of a remote access tool has taken an ironic twist - the malware at the center of it is posing as a legitimate security program. According to McAfee researcher Carlos Castillo, an email spam campaign was spotted in Poland distribut... Read more

Source: securityweek.com

Top found tags: antivirus(3),Kaspersky Lab(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apache Cordova Vulnerabilities Expose Android AppsLocation: Oracle - Redwood City, United States
Date published: 05-08-2014

A large number of mobile applications are affected by a series of vulnerabilities in the Android platform of Apache Cordova, researchers at IBM Security Systems reported on Tuesday. Apache Cordova, previously known as PhoneGap, is a set of APIs that enable mobile application developers to access var... Read more

Source: securityweek.com

Top found tags: cybercrime(3),vulnerability(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Poor measurement leaves networks dangerously open to attackLocation: Millard, United States
Date published: 05-08-2014

The ever-changing threat landscape is causing problems, with many business networks unable to keep up with the pace of innovation, argues Gavin Millard. Poor measurement leaves networks dangerously open to attack Poor measurement leaves networks dangerously open to attack The Heartbleed bug not only... Read more

Source: www.scmagazineuk.com

Top found tags: cybercrime(2),United Kingdom(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ransomware attacks Synology NAS devicesLocation: Ransom, United States
Date published: 05-08-2014

software on the NAS, encrypts the files on the device and demands that the user pay 0.6 BitCoins to retrieve the files. A Synology spokesperson told ZDNet that "Synology is fully dedicated to investigating this issue and possible solutions. Based on our current observations, this issue only affects ... Read more

Source: www.zdnet.com

Top found tags: vulnerability(1),financial sector(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Call Center Phone Fraud for Fun and Profit at Black HatLocation: Black Hat - Las Vegas, United States
Date published: 05-08-2014

Reconnaissance in the context of targeted attacks usually involves scouring freely available online resources such as social media and developer forums. Personal information willfully posted to these sites are clues a hacker can use to build a profile on a target, map systems and network architectur... Read more

Source: threatpost.com

Top found tags: Black Hat(4),0-day(1),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Hack an airplane? Researchers reveal new security concernsLocation: New York, United States
Date published: 04-08-2014

CNET Update doesn't take USB sticks from strangers: In this tech-news roundup, learn about a few of the latest cybersecurity concerns. Black Hat and Def Con, two of the largest hacking conferences, are about to kick off in Las Vegas. Security researchers will present data on new vulnerabilities, suc... Read more

Source: cnet.com.ortal.com

Top found tags: Black Hat(4),cyber security(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco Patches Security Vulnerability Impacting Multiple ProductsLocation: Cisco HQ - San Jose, United States
Date published: 04-08-2014

Cisco Systems has patched a vulnerability affecting multiple products that could allow an attacker to intercept traffic. The vulnerability involves the Open Shortest Path First (OSPF) Routing Protocol Link State Advertisement (LSA) database. According to Cisco, the vulnerability could allow an unaut... Read more

Source: securityweek.com

Top found tags: cyber security(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Most Top Free and Paid Mobile Apps Pose Threat to Enterprises: ReportLocation: Google HQ - Mountain View, United States
Date published: 04-08-2014

Mobile app risk management solutions provider Appthority has analyzed 400 of the most popular free and paid applications for Android and iOS devices and presented the results in a report released on Monday. The risky behaviors identified by the company are related to the type of data that's collecte... Read more

Source: securityweek.com

Top found tags: ISP(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Today's Tech: Planes get hacked, the US seizes data stored abroad and Google looks at your emails (if you're a paedophile)Location: Google HQ - Mountain View, United States
Date published: 04-08-2014

Today's Tech: Planes get hacked, the US seizes data stored abroad and Google. looks at your emails (if you're a paedophile) US vs. them US District Judge Loretta Preska has ruled that Microsoft needs to hand over emails despite being stored in an Irish data centre. Despite the emails being under Eur... Read more

Source: itproportal.com

Top found tags: airport(4),airport sector(4),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China slams Kaspersky and Symantec with government bansLocation: Beijing, China
Date published: 04-08-2014

PaulMCCooper. China slams Kaspersky and Symantec with government bans China has come down hard on US-based security company Symantec and its Russian counterpart Kaspersky, removing it from the list of approved antivirus providers in Chinese government computer systems. The news comes amid a move fro... Read more

Source: itproportal.com

Top found tags: antivirus(4),cybercrime(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Inherent vulnerabilities pose risk to Android, Blackberry and Apple devicesLocation: BlackBerry HQ - Ontario, Canada
Date published: 04-08-2014

phelanto. Inherent vulnerabilities pose risk to Android, Blackberry and Apple devices Government surveillance and malicious hacking could be facilitated by built-in vulnerabilities in mobile devices. Research consultants with Accuvant Labs, Mathew Solnik and Marc Blanchou, found in a research that t... Read more

Source: itproportal.com

Top found tags: Black Hat(4),mobile device(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Student mods Raspberry Pi to catch HackersLocation: Londen, United Kingdom
Date published: 04-08-2014

Student mods Raspberry Pi to catch Hackers. University of Arizona student Nathan Yee has released instructions about how to build a "honeypot" using a Raspberry Pi. Yee states that the honeypot is used to "detect anomalous events. We gain awareness and insight into our network." A "honeypot" is a de... Read more

Source: itproportal.com

Top found tags: cyber security(2),financial sector(2),Raspberry Pi(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Over 11,000 claimants join class action against Facebook's NSA collusionLocation: Facebook - Menlo Park, United States
Date published: 04-08-2014

Over 11,000 claimants join class action against Facebook's NSA collusion. When twenty-six year old Austrain law student Max Schrems filed a lawsuit against Facebook claiming damages because it allowed the NSA to spy on him, as in the average user, he helped to open up a potential world of hurt for t... Read more

Source: itproportal.com

Top found tags: The Netherlands(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA leaker Thomas Drake says Oz security reforms are 'scary'Location: Thomas, United States
Date published: 04-08-2014

Thomas Drake and Jesselyn Radack Thomas Drake and Jesselyn Radack National Security Agency whistleblower Thomas Drake says Australia's looming national security reforms makes him 'shudder', labelling them ambiguous and a plot to stamp out legitimate public-interest whistleblowing. Drake, who Edward ... Read more

Source: go.theregister.com

Top found tags: NSA(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Can a plane be hacked via in-flight Wi-Fi? Researcher says it's soLocation: Black Hat - Las Vegas, United States
Date published: 05-08-2014

Terdiman/CNET In a world where everything from the latest breaking news to "Lost" provides plenty of reasons to worry about your next flight, here's one more thing to justify your travel neuroses -- it's theoretically possible for a flight to be hijacked using only the in-flight Wi-Fi. I'll wait whi... Read more

Source: cnet.com.ortal.com

Top found tags: vulnerability(2),Black Hat(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Can a plane be hacked via in-flight Wi-Fi? Researcher says it's soLocation: Black Hat - Las Vegas, United States
Date published: 05-08-2014

Terdiman/CNET In a world where everything from the latest breaking news to "Lost" provides plenty of reasons to worry about your next flight, here's one more thing to justify your travel neuroses -- it's theoretically possible for a flight to be hijacked using only the in-flight Wi-Fi. I'll wait whi... Read more

Source: cnet.com.ortal.com

Top found tags: vulnerability(2),Black Hat(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Over 11,000 claimants join class action against Facebook's NSA collusionLocation: Facebook - Menlo Park, United States
Date published: 04-08-2014

Over 11,000 claimants join class action against Facebook's NSA collusion. When twenty-six year old Austrain law student Max Schrems filed a lawsuit against Facebook claiming damages because it allowed the NSA to spy on him, as in the average user, he helped to open up a potential world of hurt for t... Read more

Source: itproportal.com

Top found tags: The Netherlands(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Leaked docs reveal power of malware-for-government product 'FinFisher'Location: Fisher, United States
Date published: 05-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines A string of documents detailing the operations and effectiveness of the FinFisher suite of surveillance platforms appears to have been leaked. The documents, some dated 4 April this year, detail the anti-virus detection rates of the FinFishe... Read more

Source: go.theregister.com

Top found tags: government(3),Microsoft(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ransomware attack hits Synology's NAS boxenLocation: Ransom, United States
Date published: 05-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Synology Diskstations and Rackstations are being hit by malware dubbed Synolocker. The malware is a similar to the infamous Cryptolocker ransomware in that it encrypts all your files and then demands a ransom to unlock them. The vulnerabilit... Read more

Source: go.theregister.com

Top found tags: cyber security(2),vulnerability(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Labor will decide if Australia chooses mandatory data retentionLocation: Sydney, Australia
Date published: 05-08-2014

years for each and every person resident in Australia, the only thing standing between an unwilling populace and yet another step towards a surveillance state is the Labor party. God help us. A bit over a year has passed since the Gillard Labor government shelved its data retention plans, and moved ... Read more

Source: www.zdnet.com

Top found tags: United Kingdom(2),United States(2),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Encryption error exposes sensitive Mozilla data for 30 daysLocation: Mozilla - Mountain View, United States
Date published: 04-08-2014

The credentials of 76,000 users along with 4,000 encrypted passwords were left publically available for well over a month before discovery, ironically due to a server error in the midst of a database sanitisation process. Though, the exposed developer's data was immediately removed from the unencryp... Read more

Source: www.scmagazineuk.com

Top found tags: password(1),privacy(1),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government reveals new controversial data sharing plansLocation: New York, United States
Date published: 05-08-2014

Government reveals new controversial data sharing plans. UK citizens information, including financial history, qualifications and property of wealth could be shared across central government without their consent. Whitehall is proposing to link up thousands of state databases used by schools, cou... Read more

Source: itproportal.com

Top found tags: cyber security(2),United Kingdom(2),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Synology and the NAS-ty malware-flingers: What can be learnedLocation: Microsoft HQ - Redmond, United States
Date published: 05-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Sysadmin blog The recent Synology Synolocker issue should serve as a splash of cold water to any vendors in the tech industry that design and sell systems that are largely unattended or unmanaged. As described in The Reg yesterday, Synology ... Read more

Source: go.theregister.com

Top found tags: malware(3),financial sector(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Multi Function p0wnage just getting worse, researcher findsLocation: New York, United States
Date published: 05-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines It is now easier than ever to hack corporate networks through multifunction printers, which can even offer up access to Active Directory accounts according to security consultant Deral Heiland. The mustachioed Rapid 7 tech veteran said his t... Read more

Source: go.theregister.com

Top found tags: password(1),research(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Building a holistic cyber security framework - the ISACA guideLocation: ENISA - Heraklion, Greece
Date published: 05-08-2014

The global impact of cybercrime has been estimated to be US $3 trillion in 2013 To understand the present cybersecurity landscape, ISACA studies APTs in relation to previous types of threats. They are characterised by stealthiness, adaptability and persistence. For example, while traditional cyberth... Read more

Source: www.information-age.com

Top found tags: cybercrime(5),cyber security(10),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Visit the Wrong Website, and the FBI Could End Up in Your ComputerLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 05-08-2014

us-spy [gallery-il] Getty Security experts call it a drive-by download: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. Its one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims ... Read more

Source: wired.com

Top found tags: United States(6),0-day(1),government(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
In the Wake of the Snowden Revelations, A Wave of InnovationLocation: National Security Agency - Fort Meade, United States
Date published: 05-08-2014

It was an absurd scene. Keith Alexander, the director of the NSA and a four-star general in the Army, stood alone on the stage, squinting through the floodlights as members of the standing-room-only crowd shouted insults and accusations. Armed men in dark suits roamed the area in front of the stage,... Read more

Source: threatpost.com

Top found tags: United States(4),government(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Flaw Enabled Access to Internal Yahoo Administration PanelLocation: Yahoo HQ - Sunnyvale, United States
Date published: 05-08-2014

An Australian security researcher has uncovered a bug that provided him access to an unsecured administration panel for an internal content management system (CMS) used by staff at Yahoo. The issue, which could have reportedly allowed an attacker to gain a foothold into part of the company's network... Read more

Source: securityweek.com

Top found tags: information security(2),cyber security(4),vulnerability(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Teenage Aussie hacker reveals PayPal flawLocation: PayPal HQ - San Jose, United States
Date published: 05-08-2014

17-year-old hacker divides industry opinion by going public before PayPal fixes problem. Teenage Aussie hacker reveals PayPal flaw Teenage Aussie hacker reveals PayPal flaw A teenage Australian white hat' hacker who found a flaw in PayPal's authentication system in June has now gone public on the... Read more

Source: www.scmagazineuk.com

Top found tags: government(2),responsible disclosure(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SaaS Security Risks: It's the Users, StupidLocation: Google HQ - Mountain View, United States
Date published: 05-08-2014

Software-as-a-service (SaaS) applications offer organizations convenience and constant feature refreshes without the need to install and deploy software on-premises. But SaaS also brings a host of security concerns that could open an enterprise's data to attack. At the Black Hat USA conference in La... Read more

Source: www.esecurityplanet.com

Top found tags: cyber security(2),Black Hat(4),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Air, Clouds and FactoriesLocation: McAfee - Santa Clara, United States
Date published: 05-08-2014

Intel estimates that 85% of industrial system devices are not networked today. But thats changing for very good reasons. Industrial control systems are part of the rapid evolution to exploit connectivity, big data and cloud computing. Manufacturers are designing in new capabilities as their c... Read more

Source: blogs.mcafee.com

Top found tags: ICS(2),critical infrastructure(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Digital Etiquette: Did You Ask, Do You Care?Location: Facebook - Menlo Park, United States
Date published: 05-08-2014

shutterstock_204683521Shhhh! Did you hear that? Its the sound of a social collision caused by a slow but subtle dismantling of thenew normal pushing out the old.With everyone between the ages of eight and 80 now possessing a mobile phone, weve become a culture of 24/7 publishers. With that... Read more

Source: blogs.mcafee.com

Top found tags: cyber security(2),social media(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PayPal 2FA is easily bypassed, teenage whitehat hacker saysLocation: PayPal HQ - San Jose, United States
Date published: 05-08-2014

accounts. The circumvention requires little more than spoofing a browser cookie set when users link their eBay and PayPal accounts, according to Joshua Rogers, a 17-year-old living in Melbourne, Australia. Once the cookiewhich is tied to a function PayPal identifies as "=_integrated-registration"... Read more

Source: arstechnica.com

Top found tags: cyber security(2),government(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

American services, European users: a privacy mess [Government IT Week]Location: Sydney, Australia
Date published: 04-08-2014

ZDNet's DIY-IT, every week I'll bring you a selection of the best government-related articles posted by our intrepid reporters and analysts. Here are some of the most interesting from the last week. Top stories this week How one judge single-handedly killed trust in the US technology industry Well t... Read more

Source: www.zdnet.com

Top found tags: United Kingdom(4),government(7),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Script fails, thousands of Mozilla developer emails, passwords possibly exposedLocation: Mozilla - Mountain View, United States
Date published: 04-08-2014

Script fails, thousands of Mozilla developer emails, passwords possibly exposed About 76,000 email addresses and roughly 4,000 passwords ended up on a publicly accessible server. It is not uncommon for data breaches to be the result of programming errors that is exactly what happened to Mozilla ... Read more

Source: www.scmagazine.com

Top found tags: website(1),cyber security(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PF Chang's security breach: Data stolen from 33 locations over 8 monthsLocation: New Jersey, United States
Date published: 05-08-2014

Restaurant chain PF Chang's has released fresh details concerning the hack of the chain's credit-card processing terminals across the United States. The operation hit 33 locations and continued for approximately eight months. On Monday, the company disclosed the locations affected by the cybercrimin... Read more

Source: www.zdnet.com

Top found tags: financial sector(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Exploit kit variety, point of sale attacks reign in 2014: CiscoLocation: Cisco HQ - San Jose, United States
Date published: 05-08-2014

conducted by Cisco. Cisco's Midyear Security Report tracks and analyzes cyberattack trends, exploits used, and the changing landscape of security as new technology comes to the foreground. According to the Ponemon Institute, the average cost of an organizational data breach was $5.4 million in 2014,... Read more

Source: www.zdnet.com

Top found tags: United States(2),exploit kit(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target Provides Update on Costs Related to Data BreachLocation: Target HQ - Minneapolis, United States
Date published: 05-08-2014

Target Retail Store Target Provides Update on Costs Related to Data Breach Minneapolis-based Target Corporation announced on Tuesday that its second quarter financial results are expected to include gross expenses of $148 million, partially offset by a $38 million insurance receivable, related to th... Read more

Source: securityweek.com

Top found tags: information security(2),information sharing(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target's data breach tab: $110 millionLocation: Target HQ - Minneapolis, United States
Date published: 05-08-2014

from its 2013 data breach just keep coming. Why do many boards leave IT security primarily to security technicians, and why cant techies convince their boards to spend scarce cash on protecting stakeholder information? We offer guidance on how to close the IT security governance gap. Target annou... Read more

Source: www.zdnet.com

Top found tags: report(1),data breach(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mozilla Exposes 4,000 Passwords by MistakeLocation: Mozilla - Mountain View, United States
Date published: 05-08-2014

Mozilla director of developer relations Stormy Peters and operations security manager Joe Stevensen recently announced that the email addresses of approximately 76,000 Mozilla Developer Network (MDN) users, along with about 4,000 users' encrypted passwords, had been mistakenly exposed. According to ... Read more

Source: www.esecurityplanet.com

Top found tags: financial sector(2),Google(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vulnerability in Spotify Android App May Lead to PhishingLocation: Google HQ - Mountain View, United States
Date published: 05-08-2014

We have discovered a vulnerability that affects versions of the Spotify app for Android older than 1.1.1. If exploited, the vulnerability can allow bad guys to control what is being displayed on the app interface. This vulnerability can be potentially abused by cybercriminals to launch phishing at... Read more

Source: trendmicro.com

Top found tags: identity theft(2),cybercrime(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

comScore acquires MdotLabs, aims to curb ad fraudLocation: New York, United States
Date published: 04-08-2014

mdotlabs Non-human traffic, which includes bots, click farms and other networks, has been an issue for marketers since it can increase advertising costs and create fraudulent clicks. Non-human traffic can account for more than 50 percent of a digital ad campaign. MdotLabs uses signal processing, mac... Read more

Source: www.zdnet.com

Top found tags: EN(1),fraud(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
P.F. Chang's update says 33 restaurant locations affectedLocation: New York, United States
Date published: 04-08-2014

P.F. Chang's China Bistro restaurant chain issued an update on its June security breach earlier today and stated that the the breach affected point-of-sale (POS) systems at 33 locations. The stolen information includes card numbers, as well as some cardholders' names and card expiration dates, accor... Read more

Source: www.scmagazine.com

Top found tags: patch(1),update (1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Poweliks" downloads additional malware, abuses PowerShellLocation: Trend Micro - Cupertino, United States
Date published: 04-08-2014

According to researchers at Trend Micro, a threat dubbed TROJ.POWELIKS.A. can open users to additional malware downloads and steal system data, like universally unique identifiers (UUIDs), to deliver the information to attackers. On Friday, the security firm detailed the malware in a blog post... Read more

Source: www.scmagazine.com

Top found tags: trend(1),Windows(1),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Two more sessions pulled on eve of Black HatLocation: Black Hat - Las Vegas, United States
Date published: 04-08-2014

Two more sessions have been pulled from the Black Hat conference lineup by the researchers who were set to present them in Las Vegas this week, according to a report in Reuters. Home insecurity: no alarms, false alarms and sigint, which was to go over how to compromise home security systems fr... Read more

Source: www.scmagazine.com

Top found tags: conference(2),critical infrastructure(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco releases patch for OSPF faultLocation: Cisco HQ - San Jose, United States
Date published: 04-08-2014

Cisco releases patch for OSPF fault. Cisco has released a patch for a vulnerable Open Shortest Path First (OSPF) routing implementation that gives attackers the opportunity to intercept traffic. In an advisory released last week, the firm revealed that the fault "could allow an unauthenticated attac... Read more

Source: itproportal.com

Top found tags: OS X(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LG G Watch gets patched to remedy corrosion issueLocation: LG HQ - Seoul, Korea
Date published: 04-08-2014

LG G Watch gets patched to remedy corrosion issue. LG's smartwatch, which went on sale last month, is apparently suffering from teething troubles in terms of corrosion but this is something a software update will resolve. Yes, it sounds a little silly, but let us explain. The actual problem is t... Read more

Source: itproportal.com

Top found tags: patch(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Embarrassed Israel exposed hacking John Kerry's phone callsLocation: Tel Aviv, Israel
Date published: 04-08-2014

PaulMCCooper. Embarrassed Israel exposed hacking John Kerry's phone calls With so much in the news over the past year about the vastly inflated spying capabilities of United States intelligence services, it's been easy to forget that the US is just as often a victim of spying. This week it emerged t... Read more

Source: itproportal.com

Top found tags: United States(4),government(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
If you ate at one of these PF Chang's restaurants, your bank card is at riskLocation: California, United States
Date published: 04-08-2014

US eatery chain P.F. Chang's has named 33 of its restaurants that were compromised by bank card fraudsters this year. The company said payment systems at its Chinese bistros in states from California to Florida were infiltrated, allowing crooks to siphon off victims' credit and debit card details. A... Read more

Source: go.theregister.com

Top found tags: China(2),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China Probes Canadians for Alleged Spying: XinhuaLocation: Ottawa, Ontario, Canada
Date published: 05-08-2014

BEIJING - Chinese authorities are investigating two Canadians for alleged espionage, state media reported Tuesday, a week after Canada accused Beijing of "state-sponsored" hacking. "Two Canadian nationals are under investigation for suspected theft of state secrets about China's military and nationa... Read more

Source: securityweek.com

Top found tags: website(1),China(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Podcast: Threatpost Previews Black Hat 2014Location: Black Hat - Las Vegas, United States
Date published: 05-08-2014

In this special edition of the Digital Underground Podcast, Dennis Fisher interviews fellow Threatpost editor Mike Mimoso and also Threatpost reporter Brian Donohue about the Black Hat security conference, which begins this week in Las Vegas. Topics of discussion include Chris Valasek and Charlie Mi... Read more

Source: threatpost.com

Top found tags: vulnerability(1),conference(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bitglass Raises $25 Million to Expand Enterprise Data Protection BusinessLocation: Silicon Valley, United States
Date published: 05-08-2014

Bitglass, a Silicon Valley-based provider of enterprise data protection solutions, today announced that it has secured $25 million in a Series B funding round. The new injection of capital brings Bitglass total funding to date to $35 million, and will be used to expand sales, marketing and techno... Read more

Source: securityweek.com

Top found tags: medical sector(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Israel snooped on John Kerry's phone calls during Middle East peace talksLocation: Tel Aviv, Israel
Date published: 05-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Israeli spies are alleged to have snooped on John Kerrys phone calls during recent Middle East peace talks. The IDF tapped the US Secretary of State's unencrypted calls while trying to broker a ceasefire between Israel and the Palestinian... Read more

Source: go.theregister.com

Top found tags: United States(4),government(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CrowdStrike Launches Threat Intelligence Exchange Program for VendorsLocation: Check Point - Tel Aviv, Israel
Date published: 05-08-2014

CrowdStrike, a security firm focused detection and mitigation of targeted attacks, today announced the launch of a new threat intelligence exchange platform that facilitates the access and exchange of threat intelligence between vendor partners. According to the company, the CrowdStrike Intelligence... Read more

Source: securityweek.com

Top found tags: Intel(1),threat(1),trend(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Win-win or lose-lose? Comcast uses Customer Routers as Wi-Fi HotspotsLocation: Houston, United States
Date published: 05-08-2014

Sharing is something that we teach children to do at a young age, as well as an ability that we value across all aspects of our daily lives. However, sometimes sharing isnt all that its cracked up to beespecially when it comes to keeping your private information secured while browsing the I... Read more

Source: blogs.mcafee.com

Top found tags: Verizon(1),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Kronos-malware voor internetbankieren mogelijk ontdektLocation: Amsterdam, The Netherlands
Date published: 05-08-2014

Vorige maand liet IBM weten dat het een advertentie had ontdekt waarin een nieuw Trojaans paard voor het aanvallen van internetbankieren werd aangeboden, maar of de malware ook bestond was onduidelijk. Een Spaans beveiligingsbedrijf denkt de malware nu te hebben gevonden. Kronos, zoals de malware wo... Read more

Source: www.security.nl

Top found tags: online banking(2),trojan(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Echte hotelreservering gebruikt voor phishingaanvalLocation: Fergus, United States
Date published: 05-08-2014

Cybercriminelen hebben de echte reserveringsgegevens van vakantiegangers in een Spaans hotel gebruikt voor het uitvoeren van een zeer overtuigende phishingaanval. Gasten die bij het hotel hadden gereserveerd ontvingen een e-mail met het verzoek om het CVV-nummer van hun creditcard. Ook werd er gevra... Read more

Source: www.security.nl

Top found tags: website(1),Trend Micro(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Yahoo Mail gebruikt voor besturing Trojaans paardLocation: Yahoo HQ - Sunnyvale, United States
Date published: 05-08-2014

Een Trojaans paard dat twee jaar lang onopgemerkt wist te blijven blijkt via Yahoo Mail te worden bestuurd, wat detectie van de malware binnen bedrijven lastig maakt. De IcoScript Trojan is een remote administration tool (RAT) waarmee aanvallers volledige controle over de besmette computer krijgen. ... Read more

Source: www.security.nl

Top found tags: social media(2),trojan(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI gebruikte malware voor identificatie Tor-gebruikersLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 05-08-2014

De FBI heeft drive-by downloads gebruikt om malware onder Tor-gebruikers te verspreiden waardoor hun identiteit achterhaald kon worden, zo blijkt uit gerechtelijke documenten. Een drive-by download is code die op een website wordt toegevoegd en misbruik maakt van lekken in de software van bezoekers.... Read more

Source: www.security.nl

Top found tags: pornography(3),United States(4),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vraagtekens over effectiviteit botnet-aanpakLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 05-08-2014

Recentelijk kwamen verschillende operaties in het nieuws waarbij opsporingsinstanties claimden verschillende botnets uit de lucht te hebben gehaald, maar sommige experts vragen zich af hoe effectief dit soort acties zijn. Zo lieten Europol en de FBI begin juli weten het Shylock-botnet grotendeels te... Read more

Source: www.security.nl

Top found tags: financial sector(2),government(2),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese politie arresteert 22 mensen wegens cybercrimeLocation: Beijing, China
Date published: 05-08-2014

De Chinese politie heeft 22 mensen wegens cybercrime gearresteerd, waaronder de maker van een Trojaans paard. Volgens berichten in de Chinese media zou het Trojaanse paard automatisch worden genstalleerd zodra smartphonegebruikers een populaire Chinese chat-app openden. Eenmaal actief had de malwa... Read more

Source: www.security.nl

Top found tags: website(1),cybercrime(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco: besmette advertenties bedreigen interneteconomieLocation: Cisco HQ - San Jose, United States
Date published: 05-08-2014

Het gebruik van kwaadaardige advertenties om internetgebruikers met malware te infecteren komt steeds vaker voor en kan verstrekkende gevolgen voor de interneteconomie hebben, zo waarschuwt netwerkgigant Cisco. Bij malvertising, zoals deze aanvallen worden genoemd, maken cybercriminelen gebruik van ... Read more

Source: www.security.nl

Top found tags: website(1),cybercrime(2),Germany(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Florida bank notifies roughly 72,500 customers of breachLocation: Florida, United States
Date published: 04-08-2014

Early in July, Florida-based TotalBank began notifying a reported 72,500 customers that their personal information including banking information and possibly Social Security numbers may have been compromised by an unauthorized individual who obtained access to the TotalBank computer network.... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),identity theft(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers ontwikkelen privacyschil voor AndroidLocation: Facebook - Menlo Park, United States
Date published: 05-08-2014

Onderzoekers hebben een nieuwe oplossing ontwikkeld waardoor Androidgebruikers meer controle over hun privacy krijgen. De software heet NativeWrap en is bedacht door onderzoekers van de Universiteit van North Carolina. Het biedt gebruikers een derde optie om het web te gebruiken. Op dit moment hebbe... Read more

Source: www.security.nl

Top found tags: Google Play(2),social media(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

'In-flight wifi laat hacker vliegtuig kapen'Location: Black Hat - Las Vegas, United States
Date published: 05-08-2014

De satellietcommunicatie van vliegtuigen is zeer kwetsbaar en is te manipuleren via de in flight wifi. Ook andere systemen in vliegtuigen bieden mogelijkheden tot een hack. Deze alarmerende boodschap komt van IT-beveiliger Ruben Santamara van IOActive die op de Black Hat beveiligingsconferentie laat... Read more

Source: www.automatiseringgids.nl

Top found tags: vulnerability(2),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Wetenschappers luisteren gesprek af via zakje chipsLocation: Amsterdam, The Netherlands
Date published: 05-08-2014

Wetenschappers van het Massachusetts Institute of Technology (MIT), Microsoft en Adobe zijn erin geslaagd om een gesprek in een geluidsdichte kamer deels af te luisteren door de vibraties van een zakje chips op te nemen en vervolgens te analyseren. De onderzoekers ontwikkelden een algoritme dat een ... Read more

Source: www.security.nl

Top found tags: research(1),scam(1),conference(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Creditcarddiefstal bij PF Chang's bleef 8 maanden onopgemerktLocation: Amsterdam, The Netherlands
Date published: 05-08-2014

Acht maanden lang hebben criminelen toegang tot de creditcardgegevens van klanten van de Amerikaanse restaurantketen PF Chang's gehad voordat de inbraak aan het licht kwam. Dat laat de keten in een verklaring weten. Begin juni werd bekend dat aanvallers bij PF Chang's hadden toegeslagen. Nu blijkt d... Read more

Source: www.security.nl

Top found tags: government(1),NL(1),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackvriendelijke auto's onthuld tijdens Black Hat conferentieLocation: Black Hat - Las Vegas, United States
Date published: 05-08-2014

Twee bekende beveiligingsonderzoekers zullen tijdens de Black Hat conferentie in Las Vegas deze week een overzicht van de meest hackvriendelijke auto's geven. Charlie Miller en Chris Valasek lieten vorig jaar al zien hoe ze kwetsbaarheden in auto's konden gebruiken om de besturing over te nemen. Dit... Read more

Source: www.security.nl

Top found tags: medical sector(2),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ex-werknemer Telfort pleegt 0900-fraude bij klantenLocation: Amsterdam, The Netherlands
Date published: 05-08-2014

Een oud-medewerker van telecomaanbieder Telfort heeft bij klanten met 0900-nummers gefraudeerd, waardoor er ten onrechte bedragen in rekening werden gebracht. "Onlangs is er fraude door een malafide exploitant van 0900-nummers aan het licht gekomen. Hierdoor is van een gering aantal klanten een klei... Read more

Source: www.security.nl

Top found tags: police(1),research(1),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tiener omzeilt twee factor-authenticatie PayPalLocation: PayPal HQ - San Jose, United States
Date published: 05-08-2014

Een Australische tiener heeft een manier gevonden waardoor het mogelijk is om de twee factor-authenticatie van PayPal te omzeilen door alleen een "speciale" PayPal-pagina te bezoeken. Het lek wordt veroorzaakt door de mogelijkheid om een PayPal-account aan een eBay-account te koppelen. De koppeling ... Read more

Source: www.security.nl

Top found tags: NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Synology NAS-boxen versleuteld via 7 maanden oud lekLocation: Amsterdam, The Netherlands
Date published: 05-08-2014

De SynLocker-ransomware die bestanden op Synology NAS-boxen versleutelt blijkt een 7 maanden oud lek te gebruiken dat in december 2013 door Synology werd gepatcht. Dat heeft de fabrikant laten weten naar aanleiding van eigen onderzoek. Gisteren werd bekend dat er een nieuwe ransomware rondging. De r... Read more

Source: www.security.nl

Top found tags: research(1),vulnerability(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid verholpen in yum-updatesdLocation: Amsterdam, The Netherlands
Date published: 05-08-2014

Samenvatting: RedHat heeft een update uitgebracht om een kwetsbaarheid te verhelpen in yum-updatesd. Zie "Mogelijke oplossingen" voor meer informatie. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken voor het omzeilen van een beveiligingmaatregel en het installeren van een kwaadaardig pak... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Red Hat(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in glibcLocation: Ubuntu - London, United Kingdom
Date published: 05-08-2014

Samenvatting: Er zijn meerdere kwetsbaarheden ontdekt in GNU libc. Ubuntu heeft updates beschikbaar gemaakt die deze kwetsbaarheden verhelpt. Gevolgen: Een kwaadwillende kan een Denial-Of-Service veroorzaken. Verder kan een kwaadwillende beveiligingsmaatregelen in meerdere toepassingen die van de kw... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Symantec verhelpt kwetsbaarheid in Symantec Endpoint ProtectionLocation: Symantec HQ - Mountain View, United States
Date published: 05-08-2014

Samenvatting: Symantec heeft updates uitgebracht die een kwetsbaarheid in Symantec Endpoint Protection Client verhelpen. Gevolgen: Een kwaadwillende kan toegang krijgen tot het syteem met rechten van Symantec Endpoint Protection Client (systeemrechten, beheersrechten). Beschrijving: CVE-2014-3434 Er... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Symantec(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish