Under construction

New design coming soon!

CIC News engine statistics

CIC News for 06-08-2014 contains 218 articles: cybercrime(76),cyber security(62),data breach(39),other(41)

CIC News update contains 191 English and 27 Dutch articles for today.
There are 7 published advisories, 0 are English and 7 are Dutch.
In today's English news articles:
- 62 related to cybercrime
- 60 related to cyber security
- 39 related to data breach and identity theft
- 30 for the category other news

In today's Dutch news articles:
- 14 related to cybercrime
- 2 related to cyber security
- 11 for the category other news

Have fun reading.

English cybercrime related news

New banking Trojan 'Kronos' attacks French banksLocation: Paris, France
Date published: 05-08-2014

The much-rumoured banking Trojan 'Kronos' has appeared in the wild and is stealing money unbeknown to the French bank account holders that it targets. Kronos Kronos At the start of last month security vendor Trusteer detailed how Kronos (the name of the Greek god Zeus' father) was being advertised o... Read more

Source: www.scmagazineuk.com

Top found tags: trojan(2),cybercrime(3),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
We Are Taking Vertical-Specific Approach For DDoS ProtectionLocation: New Delhi, India
Date published: 04-08-2014

How big is the DDOS market in India? What is the total addressable market (TAM) for Juniper?DDoS is a horizontal problem faced by enterprises and service providers, costing companies on an average about $3.5 million annually per attack. Computer Emergency Response Team-India (CERT-In) in its recent ... Read more

Source: www.crn.in

Top found tags: health sector(2),medical sector(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
First data-scrubbing center in PHL set to open this yearLocation: Nexusguard - San Jose, United States
Date published: 03-08-2014

IP CONVERGE Data Services Inc. (IPC) has tied up with Nexusguard to launch the first locally hosted data-scrubbing hub this year to shield e-commerce portals from distributed denial of service (DDoS) attacks.Such threats are generally composed of strategies aimed at interrupting the services of a ho... Read more

Source: businessmirror.com.ph

Top found tags: DoS(2),United States(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Botnet Screenshots of various paid cybercrime tools [Zeus, Solar, Citadel and more]Location: New York, United States
Date published: 02-08-2014

Do you want to know how cybercrime botnet panels look like?We have collected some live environments which are hosting the Zeus, Solar, Citadel and other various botnet C&C panels.The botnet panels have been collected via information which is provided via the cybercrime-tracker website. The tra... Read more

Source: cyberwarzone.com

Top found tags: financial sector(2),malware(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Gamover Zeus Botnet Generates 1,000 Domains Per DayLocation: Seculert - Petah Tikva, Israel
Date published: 01-08-2014

The Gamover Zeus takedown was a huge victory for government authorities against cybercriminal operations, as the financial malware reaped over $150 million dollars from the initial operations, with its large success it was bound to reappear.Researchers as Seculert have identified a new Gamover Ze... Read more

Source: freedomhacker.net

Top found tags: malware(4),cybercrime(5),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber money launderers target the channelLocation: London, United Kingdom
Date published: 05-08-2014

IT channel companies -- particularly electronics retailers -- are regularly targeted by cyber criminals that have gained control of personal details exposed online, a security expert has warned.In his Krebs on Security column this week, US security blogger Brian Krebs said that cyber crime targeting... Read more

Source: www.channelweb.co.uk

Top found tags: financial sector(2),malware(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Does Australia need to step up its cyber security efforts?Location: Berlin, Germany
Date published: 05-08-2014

Cyber crime poses a huge threat to developed nations around the world, from computer viruses, phishing scams and distributed denial-of-service (DDoS) attacks to cyber terrorism and cyber warfare. It's why governments are investing millions into tackling cyber crime; developing national strategies, s... Read more

Source: www.michaelbaileyassociates.com

Top found tags: update(2),government(3),cybercrime(11)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Warfare: The Black Hole of Online CrimeLocation: Home Affairs Select Committee - London, United Kingdom
Date published: 11-12-2014

Christmas is coming, and in the build-up millions of people across the UK will be shopping for presents online. But the Met Police has warned web users it's a time when many could also become the victims of fraud.Earlier this year a Home Affairs Select Committee report listed the danger of cyber-ass... Read more

Source: www.youtube.com

Top found tags: cybercrime(3),Home Affairs Select Committee(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Louisiana undercover operation leads to 8 child exploitation arrestsLocation: East Baton Rouge, United States
Date published: 04-08-2014

BATON ROUGE, La. - Louisiana's Internet Crimes Against Children (ICAC) task force affiliates have joined forces in arresting eight men for crimes related to the sexual exploitation of children. Led by Attorney General Buddy Caldwells Cyber Crime Unit, Louisiana ICAC task force affiliates comprise... Read more

Source: www.ktbs.com

Top found tags: child pornography(4),cybercrime(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Special team to tackle cyber crimeLocation: New York, United States
Date published: 04-08-2014

SURAT: City police will soon have a dedicated group of cops to fight the menace of cyber crimes. The cops in the group would need to clear a certification examination to become eligible to carry out cyber crime-related investigation. Each police station in the city will have experts to investigate i... Read more

Source: timesofindia.indiatimes.com

Top found tags: police(2),financial sector(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Could YOU crack a terrorist's hard drive? Cyber security challenge is hunting for the UK's best hackersLocation: National Crime Agency - London, United Kingdom
Date published: 04-08-2014

It may sound like a plot from 24, but a cyber security unit is asking for help to hack into a terrorist's hard drive.The challenge is part of a series of online competitions based on fictional threats, designed to find the best technical minds in the country.As part of the latest challenge, called A... Read more

Source: www.dailymail.co.uk

Top found tags: threat(1),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report Cyber Crime, Cops Urge Women NetizensLocation: Facebook - Menlo Park, United States
Date published: 04-08-2014

BANGALORE: A day after the arrest of V R Bhat, who allegedly threatened a woman activist on Facebook, senior officers have asked women not to ignore cyber crimes but bring such instances to the notice of police at the earliest.We are always ready to take action on any complaint, but if people do ... Read more

Source: www.newindianexpress.com

Top found tags: government(2),social media(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Be prepared for cyber attacksLocation: Des Moines, Iowa, United States
Date published: 03-08-2014

Few crises can affect a business as much as a cyber attack by criminals.That is why, on Tuesday, about 20 leaders from area organizations attended a speech by an FBI agent who specializes in cyber crime.After the event, The Des Moines Register caught up with two experts in the field to talk about cy... Read more

Source: www.desmoinesregister.com

Top found tags: government(2),Nigeria(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Delhi Police gets Cyber Lab to deal with online fraudLocation: Branch, United States
Date published: 02-08-2014

Around 131 cases of cyber crime were registered with the Delhi Police in 2013. Interestingly, these are only 10 per cent of the cases that actually happened during that year, the remaining 90 per cent went unreported, according to the police.To deal with the increasing number of cases each year, the... Read more

Source: www.thehindu.com

Top found tags: cybercrime(3),government(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook fiend walks free after terrorising former fianceLocation: Facebook - Menlo Park, United States
Date published: 02-08-2014

ISLAMABAD: In the absence of a proper legal framework to check crimes committed online, nearly all those accused of harassment, cyber attacks or leaking private material, manage to escape prosecution.Recently, the Islamabad High Court (IHC) freed a young man accused of uploading compromisi... Read more

Source: www.dawn.com

Top found tags: Pakistan(1),social media(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vectra Networks Raises $25 Million to Help Detect Cyber Attacks In ProgressLocation: Juniper Networks - Sunnyvale, United States
Date published: 05-08-2014

Vectra Networks, a provider of real-time detection of cyber attacks in progress, today announced that it has received $25 Million in an oversubscribed Series C financing round led by VC firm Accel Partners. According to the San Jose, Calif.-based company, the investment will accelerate research and ... Read more

Source: securityweek.com

Top found tags: threat(1),cybercrime(2),Juniper Networks(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US cyber-army's cyber-warriors 'cyber-humiliated by cyber-civvies in cyber-games'Location: DEF CON - Las Vegas, United States
Date published: 05-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines The US military held a series of online war games to pit reservist hackers against its active-duty cyber-warriors and the results weren't pretty for the latter, we're told. US Military hacking team "Have you tried turning it off and then... Read more

Source: go.theregister.com

Top found tags: training(1),cybercrime(3),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
One arrested by Koraput police for cyber fraudLocation: New York, United States
Date published: 01-08-2014

A special team of Koraput police with support of local police there had tracked down and arrested the accused, Chetan Singh Saasi alias Yuvaraj in Noida, on July 26.Koraput district police nabbed a person involved in cyber fraud from Noida in Uttar Pradesh. This arrest was made during investigation ... Read more

Source: www.thehindu.com

Top found tags: cybercrime(3),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Protecting Your Data: What you need to know about Advanced Evasion TechniquesLocation: New York, United States
Date published: 31-07-2014

Hackers today are more dangerous than ever, utilizing new advanced evasion techniques to penetrate even the most locked-down networks. Combine this with the fact that most security personnel dont have the knowledge or tools to defend against this new wave of cyber crime, and you can see why hacke... Read more

Source: bitpipe.computerweekly.com

Top found tags: EN(1),hackers(1),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The FBI Is Infecting Tor Users With Malware To Catch Kiddie Porn CreepsLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 05-08-2014

Tor's had a tough week. Just a few days ago, the organization made the difficult announcement that an attack on their system likely stripped users of anonymity. Now, Wired reports that the FBI effort has been running a campaign to identify Tor users by installing malware on their computers for years... Read more

Source: www.gizmodo.in

Top found tags: pornography(3),child pornography(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware sneaks into online ads: researchersLocation: Cisco HQ - San Jose, United States
Date published: 05-08-2014

Hackers are increasingly slipping malicious software into online advertising, creating risks for the Internet economic model, security researchers said Tuesday.A report presented at the Black Hat security conference said \"malvertising\" has become increasingly prevalent and difficult for users to d... Read more

Source: phys.org

Top found tags: cybercrime(3),malware(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Banking malware danger in Malaysia high, especially mobile devicesLocation: Trend Micro - Cupertino, United States
Date published: 05-08-2014

Online banking malware infections in Malaysia has decreased further from April to June this year due to a high awareness on cyber security among corporations.Trend Micro director for core technology marketing Myla V. Pilao however said the threat was still prevalent especially due to the countrys... Read more

Source: www.therakyatpost.com

Top found tags: mobile device(2),telecom sector(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Exposed: An inside look at the Magnitude Exploit KitLocation: Black Hat - Las Vegas, United States
Date published: 05-08-2014

LAS VEGAS (Black Hat USA) - Researchers at Trustwave have provided CSO with an inside look at the Magnitude Exploit Kit's infrastructure.Linked to attacks against PHP.net and Yahoo, this kit has gone from obscurity to a certified threat in a short amount of time, while generating more than $60,000 U... Read more

Source: www.csoonline.com

Top found tags: Trustwave(1),Black Hat(4),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Online Banking Malware Infections Still Prevalent - Trend MicroLocation: Trend Micro - Cupertino, United States
Date published: 05-08-0214

PUTRAJAYA, Aug 5 (Bernama) -- Online banking malware infections in Malaysia has decreased further from April to June this year due to a high awareness on cyber security among corporations.Trend Micro Director, Core Technology Marketing, Myla V. Pilao however said the threat was still prevalent espec... Read more

Source: www.bernama.com.my

Top found tags: mobile device(2),telecom sector(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PASSENGER JET HACK? CYBER SECURITY RESEARCHER TO DETAIL EXPLOIT AT CONFERENCELocation: Black Hat - Las Vegas, United States
Date published: 05-08-2014

You know that B-movie you watched on the plane on your last trip? Turns out hackers may be able to use a passenger jets in-flight entertainment system and Wi-Fi to access the jets satellite communications equipment.Ruben Santamarta, a cyber security researcher, has come up with a way to do jus... Read more

Source: www.newsledge.com

Top found tags: cybercrime(2),Syrian Electronic Army(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hotel Phishing Attack Imitates Popular Booking WebsiteLocation: Boyd, United States
Date published: 04-08-2014

Booking.com has once again been used in a new phishing attack aimed at guests booking a hotel in Spain, reports The Register. This news closely follows CERT Polands recent report on a malware phishing attack targeting Booking.com and Allegro.pl.This new attack is unique in its apparent authentici... Read more

Source: vpncreative.net

Top found tags: credit card(2),social engineering(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware found hidden in computer registry infects a system without installing filesLocation: Microsoft HQ - Redmond, United States
Date published: 04-08-2014

SECURITY RESEARCHERS have discovered a malware program that infects a system without the need to install any files, by living in the registry.The rare form of malware was discovered by a security company called Gdata, which found that it does not create any file on the infected system because it liv... Read more

Source: www.theinquirer.net

Top found tags: Microsoft(2),Syrian Electronic Army(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A Website of Filipino Government Harboring Malware, Says MalwarebytesLocation: Malwarebytes - San Jose, United States
Date published: 04-08-2014

Malwarebytes the security company states that a cache of harmful web-links set up for ensuring online security has of late labeled Philippine government's Department of Agriculture as the government wing which is having malware on its authorized online site.The company states that a spam program had... Read more

Source: www.spamfighter.com

Top found tags: Black Hat(2),government(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Poweliks malware caught hiding in Windows RegistryLocation: Trend Micro - Cupertino, United States
Date published: 04-08-2014

Hackers are using a malware, codenamed Poweliks, to steal information from Microsoft Windows customers, according to Trend Micro.Trend Micro threat analyst Roddell Santos said in a blog post that the malware hides itself in Windows Registry code, making it difficult for traditional security services... Read more

Source: www.v3.co.uk

Top found tags: Windows(1),Microsoft(2),Trend Micro(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese police arrest smartphone Trojan hackerLocation: Microsoft HQ - Redmond, United States
Date published: 04-08-2014

China's police have arrested a suspect who allegedly spread the XXshenqi, a Trojan horse that has infected smartphones in several regions of the country.A Trojan horse is a malware program that contains malicious code. When the codes are executed, the contaminated device carries out actions determin... Read more

Source: www.wantchinatimes.com

Top found tags: trojan(2),cybercrime(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
10 Facebook Scams People Actually Fall ForLocation: Facebook - Menlo Park, United States
Date published: 04-08-2014

Lets face it. Were all a little bit obsessed with Facebook so much that it can cloud our judgement. For some, that might be stalking or befriending an ex, but for others, it can cost them seriously.Bitdefender has released a list of the top ten Facebook scams. They say clicking on these wi... Read more

Source: www.fox.com.au

Top found tags: website(1),cybercrime(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Citadel Malware has Remote Attack Capabilities: Banking and Financial User Data At RiskLocation: IBM HQ - Armonk, United States
Date published: 03-08-2014

Researchers at Trusteer, a Boston-based computer security division of IBM, now claim to have detected a new variant of the Citadel malware, that is known to attack users throughout the world and steal banking and finance related information.According to an official blog post, security researchers st... Read more

Source: www.ibtimes.co.uk

Top found tags: Windows(1),financial sector(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New 'Fake ID' Security Scam Exposes Android Devices to Multiple Threats, Could Steal Banking Related User Data from SmartphonesLocation: Google HQ - Mountain View, United States
Date published: 03-08-2014

Researchers have discovered a new threat within Google's Android operating system, which puts malware into Android applications that masquerades as trusted apps, thus letting cyber-criminals completely take control of a host system.The latest Android bug has been labelled 'Fake ID' by US based mobil... Read more

Source: www.ibtimes.co.uk

Top found tags: vulnerability(2),cybercrime(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fiesta Exploit Kit Starts Delivering a Double PayloadLocation: Oracle - Redwood City, United States
Date published: 01-08-2014

The Fiesta exploit kit has apparently learned a new trick, and is dropping two pieces of malware on unsuspecting victims machines.A few days ago, we began noticing a strange new pattern with the Fiesta exploit kit. We were getting a double payload where before only one was delivered, explai... Read more

Source: www.infosecurity-magazine.com

Top found tags: exploit kit(4),malware(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Almost one in ten Android apps infected by malwareLocation: Google HQ - Mountain View, United States
Date published: 01-08-2014

As many as 9 per cent of Android apps are infected with malware, according to a new piece of research, although the majority of the blame (as ever) lies with dodgy third-party app stores particularly in Asia.The figure comes from Cheetah Mobile's latest security report for the first half of 2014 (sp... Read more

Source: www.itproportal.com

Top found tags: report(1),research(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyberoam Secures Against Dropbox Malware KDR_PLUGX.ZTBF-ALocation: Dropbox - San Francisco, United States
Date published: 01-08-2014

A few weeks ago, Cyberoam had reported the targeted attack against a government agency in Taiwan. The malware was named KDR_PLUGX.ZTBF-A and the targeted attack is known as the first attack to use a cloud service (Dropbox) as a host for updates to the C&C centre. Cyberoam has now released IPS ... Read more

Source: www.cyberoam.com

Top found tags: Taiwan(1),backdoor(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BadUSB exploit can hack any device, and theres no cure in sightLocation: New York, United States
Date published: 01-08-2014

Ready for another security scare? Good, because every single USB device that you plug into your computer could pose a threat thats worse than any malware.It really is as bad as it sounds. Security researchers Karsten Nohl and Jakob Lell of SR Labs have stumbled upon a flaw in every single USB dev... Read more

Source: siliconangle.com

Top found tags: Karsten Nohl(2),malware(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US GOVERNMENT ALERTS RETAILERS OF STEALTHY POINT-OF-SALE MALWARELocation: New York, United States
Date published: 31-07-2014

Today, the U.S. Computer Emergency Readiness Team (US-CERT) released an advisory warning retailers of the discovery of malicious point-of-sale malware targeting businesses using various remote desktop applications.The sophisticated malware, named Backoff, was found capable of stealthily surpas... Read more

Source: www.tripwire.com

Top found tags: report(1),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
White Label Money Laundering ServicesLocation: Neiman Marcus - Dallas, United States
Date published: 04-08-2014

Laundering the spoils from cybercrime can be a dicey affair, fraught with unreliable middlemen and dodgy, high-priced services that take a huge cut of the action. But large-scale cybercrime operations can avoid these snares and become much more profitable when theyre able to disguise their operat... Read more

Source: krebsonsecurity.com

Top found tags: malware(2),financial sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Special team to tackle cyber crimeLocation: New York, United States
Date published: 04-08-2014

SURAT: City police will soon have a dedicated group of cops to fight the menace of cyber crimes. The cops in the group would need to clear a certification examination to become eligible to carry out cyber crime-related investigation. Each police station in the city will have experts to investigate i... Read more

Source: timesofindia.indiatimes.com

Top found tags: police(2),financial sector(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Paolo Bediones seeks anti-cybercrime police's helpLocation: Manila, Philippines
Date published: 01-08-2014

MANILA, Philippines Television host Paolo Bediones approached the Anti-Cybercrime Division of the Philippine National Police on Thursday to ask help over the spread of his alleged sex video.Chief Inspector Jay Guillermo, head of the intelligence section of the division, said in a radio report th... Read more

Source: www.philippine-press.com

Top found tags: report(1),Anonymous(2),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Europol Battles Cybercrime And Prepares For The FutureLocation: Europol HQ - Den Haag, The Netherlands
Date published: 01-08-2014

Europol, based in The Hague, Netherlands, is the European Unions police office. Staffed by high-level police officers from the 28 EU member states, John Occhipinti says it functions as the hub of a liaison network that manages a database of criminal intelligence.The Canisius College politic... Read more

Source: kgou.org

Top found tags: EU(2),Europe(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime cases on the rise, but city cops are being trained to prevent themLocation: Mumbai, India
Date published: 06-08-2014

The recent incident of a policeman abducting a woman and taking money from her ATM account has struck fear in the minds of people. How do you plan to deal with such rogue cops? The police constable involved - S Narawade of Taloja police station - was immediately suspended. In 2013, there were five s... Read more

Source: timesofindia.indiatimes.com

Top found tags: police(2),cybercrime(3),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sophos: One Infected Machine Sends Up To 30 GB Of Spam A WeekLocation: Sophos HQ - Oxfordshire, United Kingdom
Date published: 05-08-2014

Ever wondered who sends all those spam messages that end up in your inbox? It could be the computer of your neighbour or a colleague, who have unwittingly become part of a botnet a collection of infected machines that receive instructions from a Command and Control (C&C) server run by cybe... Read more

Source: www.techweekeurope.co.uk

Top found tags: spam(1),website(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gameover Increases Use of Domain Generation AlgorithmsLocation: Divide, United States
Date published: 06-08-2014

Earlier this year, the Federal Bureau of Investigation disrupted the activities of the Gameover botnet.That disruption had a significant effect on thescale of the ZBOT threat, but it was unlikely that cybercriminals would not respond in some fashion. The use of domain generation algorithms (DGAs... Read more

Source: trendmicro.com

Top found tags: telecom sector(4),United States(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: June phishing attacks account for over $400M in lossesLocation: New York, United States
Date published: 06-08-2014

A tremendous increase in phishing attacks has been identified by security experts in the month of June, resulting in more than $400 million in global losses. According to researchers at RSA's Anti-Fraud Command Center, 55,813 phishing attacks were identified in June, an increase of 43 percent from M... Read more

Source: www.scmagazine.com

Top found tags: RSA(1),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NTP DrDoS down in Q2, multi-vector attacks up, study findsLocation: New York, United States
Date published: 05-08-2014

DDoS attacks remain up, stronger in Q2, report says Black Lotus's second quarter threat report attributed the decline in amplified attacks to successful patching and systems upgrades. Peak bit volume of Network Time Protocol (NTP) distributed reflection denial-of-service (DrDoS) amplification attack... Read more

Source: www.scmagazine.com

Top found tags: DoS(2),threat(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Watch this Aussie infosec bod open car doors from afarLocation: Black Hat - Las Vegas, United States
Date published: 06-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Silvio Cesare Silvio Cesare has probably spent enough on home alarm systems at hardware stores to buy a small pacific island. The Canberra hacker has over the last three years embarrassed manufacturers by buying remote alarms, baby monitors ... Read more

Source: go.theregister.com

Top found tags: backdoor(2),social media(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FireEye, Fox-IT launch free service to combat Cryptolocker ransomwareLocation: Fox-IT - Delft, The Netherlands
Date published: 06-08-2014

FireEye and Fox-IT have launched a free tool to assist victims of the CryptoLocker ransomware. Announced on Wednesday, the new service, dubbed DecryptCryptoLocker, is available for free to assist those impacted by the CryptoLocker ransomware. CryptoLocker is Windows-based malware that arrives on a s... Read more

Source: www.zdnet.com

Top found tags: CryptoLocker(2),Department of Justice(3),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China bans Apple products from government purchases: BloombergLocation: Beijing, China
Date published: 06-08-2014

BEIJING (Reuters) - China has prohibited government agencies from purchasing Apple Inc hardware products due to security concerns, Bloomberg News reported on Wednesday, citing government officials familiar with the matter. Ten Apple products including versions of the iPad tablet and MacBook laptop h... Read more

Source: reuters.com

Top found tags: mobile device(4),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IP EXPO Europe 2014 seeks participants for Cyber Hack labLocation: Londen, United Kingdom
Date published: 06-08-2014

IP EXPO Europe 2014 seeks participants for Cyber Hack lab. Cyber Security EXPO, which is a part of IP EXPO Europe 2014, has sent out a call for folks who are interested in contributing to Cyber Hack, a live open source security lab which will be present at the show. The lab will have some top securi... Read more

Source: itproportal.com

Top found tags: research(1),vulnerability(1),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Multi-vector DDoS traffic soars: Are hackers returning to trusted methods?Location: Lyon, United States
Date published: 06-08-2014

Multi-vector DDoS traffic soars: Are hackers returning to trusted methods?. As the security industry has got wise to the use of the Network Time Protocol vulnerability to create DrDoS (Distributed reflected Denial of Service) attacks their traffic levels have dropped by 86 per cent. However, traditi... Read more

Source: itproportal.com

Top found tags: DoS(2),threat(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Israel-Hamas conflict sparks surge in DDoS attacksLocation: Tel Aviv, Israel
Date published: 06-08-2014

cyberattack trends. Tension between countries and changing political landscapes can now often be linked to cybercrime campaigns worldwide. From constant spats between the US and China to increased targeting of Syrian and Thai targets during political unrest, digital weaponry is now a key tool for gr... Read more

Source: www.zdnet.com

Top found tags: government(2),Thailand(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Free Service Helps CryptoLocker Victims Recover FilesLocation: Fox-IT - Delft, The Netherlands
Date published: 06-08-2014

FireEye and Fox-IT have teamed up to provide a new service to assist users whose computers have been infected with the notorious CryptoLocker ransomware. CryptoLocker has been designed to encrypt the most important files found on infected computers and keep them that way until victims pay the ransom... Read more

Source: securityweek.com

Top found tags: financial sector(2),malware(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New PoS Malware Backoff Targets USLocation: Trend Micro - Cupertino, United States
Date published: 06-08-2014

Last week, the US Computer Emergency Readiness Team (US-CERT) reported about a newly discovered malware, dubbed Backoff, whichtargets point-of-sale (PoS) systems. Similar to other PoS malware such as Dexterand Scraper, Backoff is also used to steal financial information for malicious purpo... Read more

Source: trendmicro.com

Top found tags: Trend Micro(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CryptoLocker victims can recover encrypted filesLocation: FireEye HQ - Milpitas, United States
Date published: 06-08-2014

A new online portal allows the estimated 545,000 CrytoLocker victims to freely recover files that were once encrypted by the ransom-demanding malware. Cryptolocker attacks up Cryptolocker attacks up Security researchers at malware defence company FireEye and UK-based outfit Fox-IT built the online p... Read more

Source: www.scmagazineuk.com

Top found tags: cybercrime(4),financial sector(4),malware(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LogRhythm Launches Honeypot Security Analytics SuiteLocation: New York, United States
Date published: 06-08-2014

Just weeks after announcing that it had raised $40 million in a new round of equity financing, SIEM and security intelligence vendor LogRhythm has released a new analytics suite that monitors honeypots in order to detect and track would-be attackers. According to the Boulder, Colorado-based Company,... Read more

Source: securityweek.com

Top found tags: threat(1),cybercrime(5),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whitehats recover, release keys to CryptoLocker ransomwareLocation: FireEye HQ - Milpitas, United States
Date published: 06-08-2014

Whitehat hackers have struck back at the operators of the pernicious CryptoLocker ransom trojan that has held hundreds of thousands of hard drives hostage. Further Reading Youre infectedif you want to see your data again, pay us $300 in Bitcoins Ransomware comes of age with unbreakable crypto,... Read more

Source: arstechnica.com

Top found tags: cybercrime(3),malware(3),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft to block outdated Java versions in Internet ExplorerLocation: Oracle - Redwood City, United States
Date published: 06-08-2014

An update to Internet Explorer, for installation on PCs running Windows 7 Service Pack 1 or Windows 8.x, will introduce a new security feature called out-of-date ActiveX control blocking. ActiveX controls, which expand the capabilities of Internet Explorer in useful but also potentially dangerous wa... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),update(2),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
APT Group Hijacks Popular Domains to Mask C&C Communications: FireEyeLocation: FireEye HQ - Milpitas, United States
Date published: 06-08-2014

Researchers at FireEye have examined a new campaign in which advanced persistent threat (APT) actors used some clever techniques to avoid being detected. According to the security firm, multiple Internet infrastructure service providers in the United States and Asia, a U.S.-based media company, and ... Read more

Source: securityweek.com

Top found tags: cybercrime(4),financial sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android banking apps vulnerable to cash theft by CAS hole hackersLocation: IBM HQ - Armonk, United States
Date published: 06-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Hackers can swipe login credentials and other sensitive data from one in 10 Android banking apps, and about six per cent of all Android apps, IBM researchers warn. Users should avoid using the vulnerable apps, which were built using Apache C... Read more

Source: go.theregister.com

Top found tags: financial sector(2),vulnerability(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Another Bypass Identified in PayPal 2FALocation: PayPal HQ - San Jose, United States
Date published: 05-08-2014

A security researcher has uncovered a simple method for bypassing the two-factor authentication mechanism that PayPal uses to protect accounts that are tied to eBay accounts. The vulnerability is related to the way that the login flow works when a user is prompted to connect her eBay account to her ... Read more

Source: threatpost.com

Top found tags: cyber security(2),WhiteHat Security(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Over 90% of Enterprises Exposed to Man-in-the-Browser Attacks: CiscoLocation: Cisco HQ - San Jose, United States
Date published: 05-08-2014

Cisco released on Tuesday its Midyear Security Report which analyzes threat intelligence and cybersecurity trends for the first half of 2014. After analyzing malicious traffic from its customers' networks, the company determined that roughly 94 percent of them have issued DNS requests to hostnames w... Read more

Source: securityweek.com

Top found tags: cyber security(4),exploit kit(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese Worm Infects Thousands of Android PhonesLocation: Google HQ - Mountain View, United States
Date published: 05-08-2014

Last weekend, it was reported in China that an SMS worm was wildly spreading among Android mobile phones, with more than 500,000 devices infected. The malware spread by sending SMS texts to a phones contacts with a message body such as: XXXhttp://cdn..com/down/4279139/XXshenq... Read more

Source: blogs.mcafee.com

Top found tags: financial sector(2),trojan(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RAT uses Yahoo Mail to fool security teamsLocation: G Data Software - Bochum, Germany
Date published: 05-08-2014

German security research firm G Data is warning of a newly discovered RAT called IcoScript that hides behind popular email services like Yahoo Mail, giving corporate security teams another attack 'vector' to worry about. RAT uses Yahoo Mail to fool security teams RAT uses Yahoo Mail to fool security... Read more

Source: www.scmagazineuk.com

Top found tags: trojan(2),cybercrime(4),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CryptoWall - Another Ransomware MenaceLocation: Microsoft HQ - Redmond, United States
Date published: 05-08-2014

CryptoWall is another entry in the popular category of malware known as ransomware. This type of malware holds your data hostage by encrypting your files and then charging a ransom to decrypt the files. The malware displays a message informing the victim that their files have been encrypted and that... Read more

Source: blog.fortinet.com Anonymous Continues Cyber-Attacks on Israeli Government Websites Knocking Mossad and IDF Offline | Anonymous continues to wage cyber-war on Israel in protest at its attack on Gaza knocking hundreds of government websites offline including those belonging to secret service Mossad and the Israel Defence Force (IDF).Over the last 24 hours dozens of major Israeli government websites have been knocked offline as part of a continuing cyber-attack against the country by members of the online hacktivist collective known as Anonymous.Announced by the @AnonymousGlobo Twitter account, the attacks were also in part a retaliation against the killing of 22-year-old Tayeb Abu Shehada who was wearing the iconic Guy Fawkes mask associated with the group when he was shot by an Israeli soldier in the West Bank.While many of the official Israeli government websites are still offline at the time of publication, some which had been attacked were back online, including the IDF website.The website belonging to Mossad, the Israeli secret service, is also back online having been offline intermittently for the last seven days.Anonymous has listed over 100 websites it has taken offline as part oft eh attacks, as well as posting details for those looking to take part on how to download automated tools which carry out distributed denial of service (DDoS) attacks.#OpSaveGazaThe attacks are part of a widespread campaign called #OpSaveGaza which which began earlier this month and which was initiated by the AnonGhost Team group of hackers.The campaign has targeted multiple Israeli websites in the last couple of weeks claiming at one point to have taken thousands of Israeli websites offline.It is hard to estimate just how much impact the action is having, with Israel typically claiming that such distributed denial of service attacks have little to no impact. | https://uk.news.yahoo.com/anonymous-continues-cyber-attacks-israeli-government-websites-knocking-143350450.html#dmvC4dq | 04-08-2014 | uk.news.yahoo.com

Top found tags: RSA(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why your USB device is a security riskLocation: Black Hat - Las Vegas, United States
Date published: 04-08-2014

Researchers have uncovered a fundamental flaw in the design of the USB specification that could have a significant impact on day-to-day computing. At the very least, it should call into question the trustworthiness of many mundane devices we insert into our PCs: mice, keyboards, thumb drives, extern... Read more

Source: www.cbsnews.com

Top found tags: Karsten Nohl(2),Black Hat(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The World's Critical Infrastructure Is at RiskLocation: New York, United States
Date published: 04-08-2014

It's no surprise to business and IT leaders that cyber-security risks have reached alarming levels, but a recent report from Unisys and the Ponemon Institute has unveiled some shocking research about the state of cyber-security in critical infrastructure industries. This situation has serious reperc... Read more

Source: www.baselinemag.com

Top found tags: survey(1),Ponemon Institute(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
House Passes Three Bipartisan Cybersecurity Bills to Protect Critical InfrastructureLocation: Department of Homeland Security - Washington, United States
Date published: 01-08-2014

On July 28, 2014, the House of Representatives passed three bills aimed at enhancing the cybersecurity efforts of the Department of Homeland Security (DHS) in certain critical infrastructure sectors, including the energy sector: 1H.R. 3696 the National Cybersecurity and Critical Infrastructure P... Read more

Source: www.jdsupra.com

Top found tags: DHS(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pornography concernsLocation: Facebook - Menlo Park, United States
Date published: 05-08-2014

Internet users are being urged not to post pictures of their children online over fears the images can be copied and misappropriated by paedophiles. According to an announcement by the police Cyber Crime Unit, parents who post photos of their children on social media could be unwittingly putting the... Read more

Source: incyprus.philenews.com

Top found tags: child pornography(6),cybercrime(6),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The $445 billion question of how to tackle cyber crimeLocation: London, United Kingdom
Date published: 04-08-2014

A number of UK projects are gearing up to tackle the spectre of cyber-crime. The cost and risk associated with cyber-threats are difficult to quantify, but often assumed to be significant.A McAfee report published this year, in one of its estimates, puts the global cost of cyber-crime at $445billion... Read more

Source: business-reporter.co.uk

Top found tags: United Kingdom(4),cyber security(6),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Delhi to join cyber police network to curb crimeLocation: NCRB - New Delhi, India
Date published: 03-08-2014

New Delhi: Delhi Police are all set to join the Criminal Tracking Network System (CCTNS), a cyber highway of criminal records data, along with other states that would enhance their crime-fighting prowess. According to a report by the National Crime Records Bureau (NCRB), Delhi along with West Bengal... Read more

Source: zeenews.india.com

Top found tags: police(2),India(3),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fighting crimes without bordersLocation: London, United Kingdom
Date published: 03-08-2014

Cyber crime is the perfect fraud for criminals in a digital economy, where information is easily changed and monetised for personal gain.Weaknesses are exploited and incidents go undetected. Fraudsters hide behind real and digital borders and their crimes are often victimless, making it easier to ra... Read more

Source: business-reporter.co.uk

Top found tags: cybercrime(2),data theft(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Maps and Cyber crime Dont exactly Fit well TogetherLocation: Google HQ - Mountain View, United States
Date published: 02-08-2014

Google is actually a multinational company primarily based in America, which specializes in numerous web products and solutions that have become the most sought following medium for the fundamental assistance within the internet, such as info gathering, maps, suggested destinations as well as a lot ... Read more

Source: www.streetwisetech.com

Top found tags: Google Glass(2),cybercrime(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EU cyber crime taskforce to pilot in SeptemberLocation: National Crime Agency - London, United Kingdom
Date published: 01-08-2014

The National Cyber Crime Unit deputy head, Andy Archibald, will soon chair a specialist task force in the Netherlands-based European Cybercrime Centre.Just days after the National Crime Agency played a pivotal role in taking down the toxic Shylock Trojan, the Joint Cybercrime Action Taskforce will u... Read more

Source: www.acumin.co.uk

Top found tags: trojan(2),United Kingdom(2),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Payment cards used on Wireless Emporium website compromised by malwareLocation: New York, United States
Date published: 05-08-2014

After malware was discovered on the www.wirelessemporium.com computer server, the company began notifying an undisclosed number of individuals that their personal information including payment card data might have been compromised. How many victims? Undisclosed. Wireless Emporium did not res... Read more

Source: www.scmagazine.com

Top found tags: firewall(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: Shadowy Russian hacker group hijacked 1.2 billion usernames, passwordsLocation: New York Times - New York, United States
Date published: 05-08-2014

360 million recently compromised passwords for sale online Login credentials from multiple services available in underground crime forums. A Wisconsin security firm claims that a Russian criminal group has accumulated the largest known collection of stolen online usernames and passwords via SQL inje... Read more

Source: arstechnica.com A Cold War in Cyberspace: Does the US Have Jurisdiction Over Russian Hackers? | The recent arrest of Russian citizen Roman Valeravich Seleznev by US authorities for alleged cyber crimes highlights one of the most difficult jurisdictional problems facing the international community today. In brief, does the country in which a cybercrime originates have sole jurisdiction over the act and the person committing the crime, or can countries whose citizens have been harmed by the crime, in this instance hacking, bring the criminal to justice? The United States has taken the stance that it has jurisdiction over criminals who hack into American computers and has taken vigorous action to bring these individuals to court. The Secret Service, FBI, CIA and other state agencies have conducted extensive investigations into the actions of hackers worldwide; Mr. Seleznev is one of several alleged Russian cyber criminals who have been arrested by US authorities over the last few years.The case involving Mr. Seleznev is based on an indictment handed down in US District Court for the Western District of Washington that was sealed charging him with \"hacking into point of sale systems at retailers through the United States.\" The indictment took place in March 2011 and was unsealed when the Russian citizen was found in Maldives and arrested in Guam. He is presently in jail in Guam awaiting extradition to the US. This became a cause of tension between Russia and the US partially due to the fact the father of the defendant is a member of the Duma (the Russian parliament) named Valery Seleznev and has accused the US of kidnapping his son in the Maldives.The jurisdictional question of arrest has arisen several times between the US and Russia involving cybercrimes with Russia accusing the US of taking unauthorized custody of its citizens and the US considering Russia a \"safe haven\" for cyber criminals. The basis for this problem is the fact that the two countries have no extradition treaty. This was certainly given media attention by the recent asylum granted by the Russians to Edward Snowden.Members of the criminal defense bar have stated that American officials have become increasingly relaxed in their overall recognition of established guidelines when pursuing accused cyber criminals across international boundaries. In September 2013, Russia\'s Foreign Ministry issued a warning for \"citizens to refrain from traveling abroad, especially to countries that have signed agreements with the US on mutual extradition, if there is reasonable suspicion that US law enforcement agencies\" have a case pending against them. | http://jurist.org/hotline/2014/08/arkady-bukh-cyber-crime.php | 01-08-2014 | jurist.org

Top found tags: conference(3),Black Hat(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Safety Advocates SnoopWall and Miss Teen USA 2013 Partner to Protect the 2014 Miss Teen USA ContestantsLocation: New York, United States
Date published: 01-08-2014

SnoopWall and Cassidy Wolf Share Leading Edge Privacy Tips and Warn That Smartphone Apps Violate Personal Privacy via Webcam, Microphone, GPS and other Ports.NASHUA, N.H., Aug. 1, 2014 /PRNewswire/ -- SnoopWall ( www.snoopwall.com ), the world's first counterveillance software company, announced the... Read more

Source: www.marketwatch.com

Top found tags: cyber security(4),cybercrime(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tanzania: Dar Hailed Over Cyber Crime FightLocation: Dodoma, Tanzania
Date published: 31-07-2014

TANZANIA is reportedly doing fine in the fight against cyber crime, with plans to embark on deployment of egovernment being hailed as a good move.This was said by Cyberoam's Country Manager, Mr Kalpesh Maheshwari in reference to the country report by International Telecommunication Union, which proj... Read more

Source: allafrica.com

Top found tags: cyber security(2),government(3),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Leaked FinFisher spyware docs detail surveillance limitations, antivirus detectionLocation: Fisher, United States
Date published: 04-08-2014

A parody Gamma International Twitter account is releasing secret documents that detail FinFisher spyware limitations, spying modules, mobile capabilities, price list and antivirus detection of the malware typically sold to governments.Phineas Fisher aka @GammaGroupPR, a parody Twitter account ... Read more

Source: www.networkworld.com

Top found tags: government(3),malware(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Leaked docs reveal power of malware-for-government product 'FinFisher'Location: Gamma International - Troisdorf, Germany
Date published: 05-08-2014

A string of documents detailing the operations and effectiveness of the FinFisher suite of surveillance platforms appears to have been leaked.The documents, some dated 4 April this year, detail the anti-virus detection rates of the FinFisher spyware which German based Gamma Group sold to governments... Read more

Source: www.theregister.co.uk

Top found tags: social media(2),spyware(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
600 retailers ensnared in major new malware attackLocation: Department of Homeland Security - Washington, United States
Date published: 02-08-2014

(Time) The Department of Homeland Security is investigating the widespread use of Backoff malicious software, which steals data through remote access applicationsThe number of businesses ensnared in a new malware attack revealed in a Department of Homeland Security report this week may run to ... Read more

Source: www.wnd.com

Top found tags: cyber security(4),DHS(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The GOZ Virus Marches On In JapanLocation: Tokio, Japan
Date published: 02-08-2014

A recent call from the US to Japan, informing about the globally widespread computer virus, GameOver Zeus (GOZ), has helped the Japanese authorities in taking a rearguard action. Emerging as the latest challenge for the experts working in cybersecurity, GOZ has already swept off a huge fortune from ... Read more

Source: vpncreative.net

Top found tags: telecom sector(4),cybercrime(5),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Experts Say Android Phone Users At Risk For Malicious AppsLocation: Google HQ - Mountain View, United States
Date published: 01-08-2014

PITTSBURGH (KDKA) Experts are warning Android phone users about a security issue. Its called Fake ID, and could allow malicious apps to access the other programs on your phone.The Fake ID malware sneaks onto your smartphone through Trojan apps sometimes taking over the actual apps complet... Read more

Source: pittsburgh.cbslocal.com

Top found tags: cyber security(2),trojan(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Criminals get hands on Russian malwareLocation: Moscow, Russia
Date published: 31-07-2014

Sentinel Labs, the US security vendor, has located what is believed to be one of very first instances of cyber criminals getting their hands on government malware.Udi Shamir, the head of research for Sentinel, filed a report in which he said that the malware known as Gyges has been recently tacked o... Read more

Source: www.acumin.co.uk

Top found tags: information security(2),malware(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Andrew Serwin Joins Board of National Cyber-Forensics and Training AllianceLocation: Morrison, United States
Date published: 05-08-2014

Prominent nonprofit and its partners exercise global reach in fighting cybercrime; Serwin is an internationally recognized authority on privacy and information security.Morrison & Foerster Global Privacy and Data Security partner Andrew Serwin has been named to the board of directors of the National... Read more

Source: www.s-ox.com

Top found tags: cybercrime(2),information security(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Experts Harp on Capacity to Combat CybercrimeLocation: New York, United States
Date published: 04-08-2014

Stakeholders in the information technology security ecosystem have identified capacity challenge as major in the fight against cyber attack in the country and reeled out measures to combat the menace.Oluseyi Akindeinde, chief technical officer, Digital Encode- Centre for Information Security Intelli... Read more

Source: nigeriacommunicationsweek.com.ng

Top found tags: government(2),information security(2),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dammam leads in cybercrimeLocation: New York, United States
Date published: 03-08-2014

Saudi courts have cleared some 78 cases of cybercrime over the past six months, a local daily reported.According to these sources, Dammams court received more than 46 percent of the total number of cases Kingdom-wide, with 36 cases, followed by Riyadh with 10 cases (12.8 percent).Khamis Mushayt, ... Read more

Source: www.arabnews.com

Top found tags: cybercrime(2),cyber security(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hi-tech lab to help cops in fight against cybercrimeLocation: New Delhi, India
Date published: 03-08-2014

NEW DELHI: Delhi Police's fight against cyber crime just got a boost. A state-of-the-art cyber lab has come up at the Police Training College in Jharoda Kalan where officers will be trained to handle such crimes. Inaugurated by police chief B S Bassi, the lab will train all investigators, particular... Read more

Source: timesofindia.indiatimes.com

Top found tags: police(3),cybercrime(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian Hackers Obtained 1.2 Billion Passwords: ReportLocation: Moscow, Russia
Date published: 06-08-2014

Password Lists A Russian hacker group has obtained an estimated 1.2 billion Internet credentials collected from various websites around world, Nicole Perlroth and David Gelles of the New York Times reported Tuesday. According to data provided to the newspaper by Hold Security, the Times reported tha... Read more

Source: securityweek.com

Top found tags: cybercrime(4),cyber security(4),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PayPal addressing another two-factor authentication bypassLocation: PayPal HQ - San Jose, United States
Date published: 05-08-2014

PayPal addresses two-factor authentication bypass PayPal said it is working on a fix to a two-factor authentication bypass exploit discovered by an Australian researcher. PayPal account security is at risk again. Australian researcher Joshua Rogers has discovered a method for getting past PayPal's t... Read more

Source: www.scmagazine.com

Top found tags: vulnerability(1),cyber security(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian hackers SLURP '1.2 BILLION passwords' from 420,000 websitesLocation: Moscow, Russia
Date published: 05-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines A mysterious Russian crime gang has reportedly amassed the largest ever cache of stolen website passwords more than a billion, swiped from poorly secured user databases. A network of computers quietly hijacked by malware, and controlled ... Read more

Source: go.theregister.com

Top found tags: cyber security(2),vulnerability(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chrysler, Nissan looking into claims their cars 'most hackable'Location: Miller, United States
Date published: 06-08-2014

NEW YORK/LAS VEGAS (Reuters) - Chrysler and Nissan said they are reviewing a report by well-known cyber security experts that rates their vehicles among the three "most hackable" cars on the market, along with a General Motors model. Computer security researchers Charlie Miller and Chris Valasek con... Read more

Source: reuters.com

Top found tags: social media(2),Black Hat(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. Defense Department, NSA did not get Tor user dataLocation: National Security Agency - Fort Meade, United States
Date published: 06-08-2014

LAS VEGAS (Reuters) - The U.S. Department of Defense did not receive personal data on users of Internet privacy service Tor through a government-funded project to detect vulnerabilities, a Defense spokeswoman told Reuters on Tuesday. "This particular project was focused on identifying vulnerabilitie... Read more

Source: reuters.com

Top found tags: Black Hat(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chrysler, Nissan looking into claims their cars 'most hackable'Location: Miller, United States
Date published: 06-08-2014

NEW YORK/LAS VEGAS (Reuters) - Chrysler and Nissan said they are reviewing a report by well-known cyber security experts that rates their vehicles among the three "most hackable" cars on the market, along with a General Motors model. Computer security researchers Charlie Miller and Chris Valasek con... Read more

Source: reuters.com

Top found tags: social media(2),Black Hat(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. Defense Department, NSA did not get Tor user dataLocation: National Security Agency - Fort Meade, United States
Date published: 06-08-2014

LAS VEGAS (Reuters) - The U.S. Department of Defense did not receive personal data on users of Internet privacy service Tor through a government-funded project to detect vulnerabilities, a Defense spokeswoman told Reuters on Tuesday. "This particular project was focused on identifying vulnerabilitie... Read more

Source: reuters.com

Top found tags: Black Hat(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NIST drafts updated guidance for agencies assessing security, privacyLocation: National Institute of Standards - Gaithersburg, United States
Date published: 06-08-2014

Cybersecurity as realpolitik The guidance gives federal agencies improved assessment procedures for securing systems and networks. The National Institute of Standards and Technology (NIST) is updating guidance that helps federal agencies assess the security and privacy controls of their inform... Read more

Source: www.scmagazine.com

Top found tags: United States(2),government(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple products removed from government procurement list in ChinaLocation: Beijing, China
Date published: 06-08-2014

National Development and Reform Commission (NDRC) the countrys top planning body. However, they've disappeared in the July version, according to a Bloomberg report on Wednesday, citing an unnamed government official. This change is due to security concerns, the official indicated, adding the ... Read more

Source: www.zdnet.com

Top found tags: government(4),United States(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australia PM Says New Terror Laws Will Not Invade PrivacyLocation: Sydney, Australia
Date published: 06-08-2014

SYDNEY - Australian Prime Minister Tony Abbott on Wednesday defended tough new terror laws under which digital data will be retained for up to two years, denying it is an invasion of privacy. The government plans to overhaul laws to make it easier to arrest and prosecute terrorists and make it an of... Read more

Source: securityweek.com

Top found tags: cyber security(2),government(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco identifies the enterprise security landscape's three weakest linksLocation: Cisco HQ - San Jose, United States
Date published: 06-08-2014

Cisco has unveiled three compelling security insights tying enterprises to malicious traffic 'Weak links' in organisations are contributing to an increasingly dynamic threat landscape, according to Cisco's 2014 Midyear Security Report, released today. These weak links which could be outdated sof... Read more

Source: www.information-age.com Record-breaking data breach highlights widespread security flaws | In what appears to be the biggest data breach ever, a Russian gang reportedly has stolen 1.2 billion user names and passwords and more than 500 million email addresses from 420,000 websites.The scale of the attack and the fact that it comes after multiple reports of previous cyber assaults raises significant questions about the security practices of thousands of companies around the globe and puts at risk the financial and personal information of a significant fraction of the planet\'s population.\"This sounds all too familiar -- weakly secured sites, preventable vulnerabilities that aren\'t patched,\" said Mark Bower of Cupertino-based Voltage Security. \"Yet more evidence the bad guys are winning big at consumers\' expense.\"The breach was discovered by Hold Security of Milwaukee, which could not immediately be reached for comment by this newspaper. But according to the New York Times, the security firm didn\'t name any of the victimized websites because of nondisclosure agreements with those sites or because the host companies remain vulnerable.\"They targeted any website they could get, ranging from Fortune 500 companies to very small websites,\" Alex Holden of Hold Security told the Times. \"And most of these sites are still vulnerable.\"Hold drew criticism late Tuesday when it reportedly posted a notice on its site offering to let companies know if their site was affected by the breach for \"as low as $120\" a month. The company quickly took down the notice. The Times said it asked for an analysis of the database by an outside expert, who confirmed its authenticity. The Times also said Hold had a history of revealing major hacking attacks.While there is little evidence so far of any financial losses from the breach, experts say the Russian thieves might be able to access bank accounts and other valuable information.Despite repeated and increasingly devastating cyber attacks, experts say companies are still not taking the steps to bolster their networks against hackers and protect the data they gather from consumers or other sources. They advise companies to establish layers of security measures, which not only try to prevent crooks from getting into their networks but also monitor them when they\'re inside, divert them to nonessential data and otherwise limit what they take.\"It\'s frustrating,\" said James Pledger, head of research for San Francisco security firm RiskIQ. \"It\'s not an issue of it being unsolvable. People just need to be more accountable to users and take ownership of their users and protect them. That\'s really the takeaway of this.\" In many instances, he added, \"it\'s negligence.\"Pierluigi Stella of Houston-based security firm Network Box USA was similarly critical. | http://www.mercurynews.com/business/ci_26281956/record-breaking-data-breach-highlights-widespread-security-flaws | 06-08-2014 | www.mercurynews.com

Top found tags: cybercrime(4),cyber security(4),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A Brief History of Cyber CrimeLocation: Jackson, United States
Date published: 05-08-2014

Our modern society demands a degree of connectivity between citizens, businesses, financial institutions and governments that must cross political and cultural boundaries. Digital technology provides this connectivity and gives its users many valuable benefits. But at the same time, it provides a ri... Read more

Source: www.floridatechonline.com

Top found tags: cybercrime(6),financial sector(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime ring steals 1.2 billion Internet passwordsLocation: Moscow, Russia
Date published: 05-08-2014

A Russian crime ring has stolen the largest known collection of username and password combinations ever, in a trend that is becoming the crime of the 21st century. CBS News looked into it.Hackers targeted 420,000 Internet sites of companies large and small. According to Hold Security, the cybersecur... Read more

Source: www.cbsnews.com

Top found tags: United States(2),cybercrime(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Protect Critical Infrastructure Systems With WhitelistingLocation: New York, United States
Date published: 30-07-2014

Protection of critical infrastructure computer systems from malware and zero-dayexploits is imperative because critical systems provide for the well-being of the public by supplying valuable public resources, such as water, gas, and electricity. This paper explains whitelisting and its use to protec... Read more

Source: www.sans.org

Top found tags: cybercrime(2),cyber security(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Hackable Is Your Car? Consult This Handy ChartLocation: Miller, United States
Date published: 06-08-2014

traffic-jam-getty [gallery-ca] Stuart Dee/Getty Last year, when hackers Charlie Miller and Chris Valasek showed they could hijack the steering and brakes of a Ford Escape and a Toyota Prius with nothing but laptops connected to the cars, they raised two questions: Could hackers perform the same tric... Read more

Source: wired.com

Top found tags: Black Hat(4),cyber security(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Internet of Things,' not privacy, to dominate at Black HatLocation: Black Hat - Las Vegas, United States
Date published: 06-08-2014

the past been found to be vulnerable to hacks. Researchers expect vulnerabilities to become riskier as more home devices gain Internet connections. Dong Ngo/CNET As many as 13 new zero-day vulnerabilities in home Wi-Fi routers are set to be disclosed at the Black Hat computer security conference tha... Read more

Source: cnet.com.ortal.com

Top found tags: government(5),cyber security(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FishNet Security's New Lab Lets Customers Put Latest Technologies to The TestLocation: Minnesota, United States
Date published: 06-08-2014

Photo of FishNet Security's CLab Information security solutions provider FishNet Security, this week announced the opening of a new technology testing lab that allows the company and its partners and customers to vet technologies in a virtual IT environment using simulated network conditions and att... Read more

Source: securityweek.com

Top found tags: mobile device(2),telecom sector(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Combating New Threats as Internet Advertising SurgesLocation: New York, United States
Date published: 06-08-2014

Malvertising Threats Underscore the Need for an Approach to Security that Addresses the Full Attack Continuum. Internet advertising spend outpaces all other forms of media according to the most recent reports from Nielsen. Together, global display advertising across the web, mobile Internet and apps... Read more

Source: securityweek.com

Top found tags: cybercrime(4),cyber security(4),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PayPal Confirms New Two-factor Authentication Bypass IssueLocation: PayPal HQ - San Jose, United States
Date published: 06-08-2014

Researchers have identified a new method that can be used to bypass the two-factor authentication (2FA) mechanism that is supposed to give PayPal customers an extra layer of protection for their accounts. PayPal's 2FA system, called "Security Key," is designed to ensure that accounts can't be access... Read more

Source: securityweek.com

Top found tags: website(1),cyber security(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Are your username and password available to hackers? 1.2bn credentials uncovered in grand heistLocation: Moscow, Russia
Date published: 06-08-2014

PaulMCCooper. Are your username and password available to hackers? 1.2bn credentials uncovered in grand heist A Russian criminal gang has pulled off the biggest online data heist ever, lifting 1.2 billion usernames and passwords belonging to more than 500 million email addresses. This is the largest... Read more

Source: itproportal.com

Top found tags: social media(2),government(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
As Facebook privacy suit reaches 25,000 participant target, court is still unsure if it will allow itLocation: Facebook - Menlo Park, United States
Date published: 06-08-2014

As Facebook privacy suit reaches 25,000 participant target, court is still unsure if it will allow it An Austrian class action lawsuit against Facebook over the companys privacy policies is expected to reach a limit of 25,000 participants on Wednesday. It remains however uncertain if the co... Read more

Source: www.pcworld.com

Top found tags: United Kingdom(2),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Using Military Strategy to Fight Cyber BattlesLocation: Cross, United States
Date published: 06-08-2014

LAS VEGAS: The modern IT security landscape is often thought of as an adversarial battlefield, which is why it makes sense to ascribe military terms to IT security conflict. "The Library of Sparta is a euphemism for the corpus of military doctrine, " said Tom Cross, director of security research at ... Read more

Source: www.esecurityplanet.com

Top found tags: conference(2),Black Hat(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CyberVor Breach Exposes 1.2 Billion User Names, PasswordsLocation: New York Times - New York, United States
Date published: 06-08-2014

Hold Security researchers are reporting that a cybercrime gang based in Russia has collected 1.2 billion user names and passwords and over 500 email addresses stolen from more than 4.5 billion user records at over 400,000 websites and FTP sites worldwide. The researchers are calling the gang CyberVo... Read more

Source: www.esecurityplanet.com

Top found tags: website(1),cyber security(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CryptoLocker victims offered free key to unlock ransomed filesLocation: FireEye HQ - Milpitas, United States
Date published: 06-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Security researchers have released a tool that allows victims of the infamous CryptoLocker ransomware to unlock their computers at no charge. DecryptoLocker from net security firm FireEye and threat intelligence company FoxIT offers a cure f... Read more

Source: go.theregister.com

Top found tags: malware(4),financial sector(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple devices banned as Chinese government purchases -- reportLocation: Beijing, China
Date published: 06-08-2014

Apple iPad AirApple's iPad Air. Josh Miller/CNET Apple is reportedly facing a purchasing ban on certain products for Chinese government use. The powers-that-be in Beijing have excluded the iPad and MacBook from a list of products that can be bought with public money, Bloomberg said Wednesday, citing... Read more

Source: cnet.com.ortal.com

Top found tags: Apple(3),mobile device(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Buy All the Cybersecurity Vulnerabilities: Black Hat KeynoteLocation: Black Hat - Las Vegas, United States
Date published: 06-08-2014

[BlackHatdude] LAS VEGAS: Dan Geer, a well known and respected digital security expert and the CISO of In-Q-Tel, had a unique opportunity this year, as he was the only keynote speaker at the Black Hat USA conference. In his address, Geer outlined a number of disparate steps and initiatives he sees a... Read more

Source: www.esecurityplanet.com

Top found tags: conference(3),Black Hat(6),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Wikimedia: Right to be forgotten results in 'Internet riddled with memory holes'Location: Google HQ - Mountain View, United States
Date published: 06-08-2014

Wikimedia: Right to be forgotten results in 'Internet riddled with memory holes' Google has removed over 50 links to Wikipedia from its search results on European domains as a consequence of the EUs right to be forgotten ruling which, according to Wikimedia, punches holes in freeknowle... Read more

Source: www.pcworld.com

Top found tags: government(2),The Netherlands(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

33 P.F. Changs Locations Identified in Ongoing Data Breach InvestigationLocation: Neiman Marcus - Dallas, United States
Date published: 05-08-2014

P.F. Changs China Bistro Ltd. said on Monday that it has contained an ongoing data breach, though an investigation is still underway. The company, which was first notified of a possible security problem in early June by the Secret Service, has been processing payments securely since June 11. The ... Read more

Source: blogs.mcafee.com

Top found tags: malware(2),financial sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Retailer Target expects data breach to cost $148 millionLocation: Target HQ - Minneapolis, United States
Date published: 05-08-2014

The massive data breach of Target that was announced in December 2013 may end up costing the company $148 million, the retail giant announced on Tuesday. The expenses offset by a $38 million insurance payout are owed to what it expects to pay in potential breach claims, but those expenses co... Read more

Source: www.scmagazine.com

Top found tags: EN(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian crime ring reportedly nabbed 1.2 billion online credentialsLocation: Target HQ - Minneapolis, United States
Date published: 05-08-2014

swath of stolen Internet credentials ever. Target CEO departure watershed for IT, business alignment Target CEO departure watershed for IT, business alignment A crime ring based in Russia is said to have stolen more than 1.2 billion Internet credentials (usernames and passwords) with more than 500 m... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),data breach(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime: Port city stands second in countryLocation: Bangalore, Karnataka, India
Date published: 01-08-2014

The port city has earned a dubious distinction of being the second city after Bangalore in the country in cyber crime rate, according to a recent report from the National Crime Records Bureau (NCRB).There are different types of cyber crimes such as e-mail abuse, cyber stalking, phishing, hacking, on... Read more

Source: www.thehindu.com

Top found tags: police(3),cybercrime(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Govt to work with Kenyan, Korean experts in controlling cybercrimeLocation: Seoul, South Korea
Date published: 01-08-2014

The government in collaboration with experts from South Korea and Kenya is discussing the possibility of introducing an online identity and verification system aimed at controlling cyber crime in Tanzania. The system to be adopted from South Korea and Kenya is known as Public Key Infrastructure. Acc... Read more

Source: www.ippmedia.com

Top found tags: identity theft(2),South Korea(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime biggest threatLocation: New York, United States
Date published: 31-07-2014

The 13th Global Fraud Survey from EY (the artist formerly known as Ernst & Young) has found cybercrime to be one of the biggest concerns for UK businesses. Specifically, 74 per cent of respondents stated cybercrime to be a high risk to their organisation compared to 49 per cent globally second o... Read more

Source: www.itij.com

Top found tags: data breach(2),government(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target data breach a sideshow: ExpertLocation: Target HQ - Minneapolis, United States
Date published: 05-08-2014

Jan Kniffen, J. Rogers Kniffen Worldwide Enterprises, says price competition with Wal-Mart, not the data breach is the reason Target lowered its profit margins.... Read more

Source: video.cnbc.com

Top found tags: EN(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Illinois survey shows consumers feeling the pain of identity theft as data breach incidents have increased in frequencyLocation: Illinois, United States
Date published: 05-08-2014

COSTA MESA, Calif., Aug. 5, 2014 /PRNewswire/ -- A new online survey conducted for Experian's ProtectMyID(R) reveals that while many Illinoisans know some of the dos and don'ts of how to protect themselves against identity theft, they are still victims at a high rate. The survey shows that 50 percen... Read more

Source: online.wsj.com

Top found tags: telecom sector(2),cybercrime(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PF CHANG'S NAMES 33 RESTAURANTS IN DATA BREACHLocation: St. Louis, United States
Date published: 04-08-2014

SCOTTSDALE, Ariz. (AP) P.F. Chang's is providing more details on its ongoing investigation into a security breach, saying data may have been stolen from certain credit and debit cards used at 33 P.F. Chang's China Bistro restaurants in the U.S.P.F. Chang's confirmed in June that data from credit... Read more

Source: bigstory.ap.org

Top found tags: EN(1),data breach(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ARE CISOS COMPANIES' DATA BREACH SCAPEGOATS?Location: New York, United States
Date published: 04-08-2014

Why CISOs are the first ones to go after a data leak.Chief information security officers (CISOs) are viewed as scapegoats in the event of a data breach, according to a new report.Three-quarters of C-suite executives don't see CISOs as part of a business's leadership team, and 44% would blame them fo... Read more

Source: www.cbronline.com

Top found tags: information security(2),medical sector(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
USB drives could lead to identity theftLocation: Berlin, Germany
Date published: 04-08-2014

(CNNMONEY) -- It's time to start thinking of smartphones and USB Flash drives like toothbrushes or razors -- for personal use only.German security researchers have discovered that USB-connected devices have a fatal flaw. Anything that connects via USB can be reprogrammed to pose as another device.Th... Read more

Source: www.11alive.com

Top found tags: Karsten Nohl(2),cyber security(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mozilla Fesses up to Accidental Data BreachLocation: Mozilla - Mountain View, United States
Date published: 04-08-2014

Firefox maker Mozilla has admitted it accidentally exposed the email addresses of almost 80,000 members of its Developer Network, along with thousands of encrypted passwords.A Mozilla developer discovered the incident around two weeks ago, according to a new blog post by operations security manager ... Read more

Source: www.infosecurity-magazine.com

Top found tags: password(1),cyber security(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rhode Island Women & Infants Hospital to Pay $150K for Data BreachLocation: Rhode Island, United States
Date published: 23-07-2014

Women & Infants Hospital of Rhode Island will pay $150,000 to settle data breach allegations that affected more than 12,000 Massachusetts patients.Attorney General Martha Coakley announced that the breach was reported to her office in November 2012, and included patients names, dates of birth, So... Read more

Source: www.boston.com

Top found tags: data breach(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australia deserves a whack of the data breach notification stickLocation: Blair, United States
Date published: 04-08-2014

Summary: Australian businesses shouldn't have to clean up after other organisations' infosec oopsies. Its time to get tough about data breach notification.\"The arguments contrary to mandatory breach notification are quite spurious,\" says Gary Blair, adjunct professor with the Edith Cowan Univer... Read more

Source: www.zdnet.com

Top found tags: information security(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ID thieves these days want your number, not your nameLocation: Federal Trade Commission - Washington, United States
Date published: 03-08-2014

Most American consumers have come to embrace or at least tolerate synthetics.Every day, they shell out millions of dollars for fabrics, foods and household goods that arent the handiwork of Mother Nature.One relative newcomer to the marketplace of man-made alternatives, however, never wil... Read more

Source: www.dispatch.com

Top found tags: identity theft(2),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK Online Travel Company Fined 150,000 After Data BreachLocation: New York, United States
Date published: 03-08-2014

A UK-based online travel company known as Think W3 has been fined 150,000 by the ICO (Information Commissioners Office), after a hacker breached its subsidiary business website Essential Travel and accessed credit card details.The hacker was able to retrieve credit card data going b... Read more

Source: vpncreative.net

Top found tags: cybercrime(2),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Saratoga police search for identity theft suspectLocation: Saratoga, United States
Date published: 03-08-2014

SARATOGA SPRINGS, N.Y. -- Saratoga County Sheriff's are looking for a man they say was involved in an identity theft case.The incident happened in the town of Halfmoon on June 10.Police say a black male is believed to have found or stolen a credit card at the Hess Mart located on Route 9 and then us... Read more

Source: www.news10.com

Top found tags: credit card(2),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Breach Reporting: A Job Killer or Business Saver?Location: Sydney, Australia
Date published: 03-08-2014

Theres quite a brouhaha bubbling up Down Under.It all stems from a Sydney Morning Herald opinion piece written by the CEO of the Association of Data Driven Marketing and Advertising opposing the mandatory data breach reporting law introduced to the Australian Parliament by federal attorney genera... Read more

Source: smartdatacollective.com

Top found tags: data breach(2),government(2),legislation(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Missouri man gets 15 years for identity theftLocation: Morrow, United States
Date published: 01-08-2014

INDEPENDENCE, Mo. (AP) A Missouri car dealer who orchestrated one of the largest identity thefts ever prosecuted in the state has been sentenced to 15 years in prison.Twenty-seven-year-old Terry Lee Morrow Jr. pleaded guilty in April to two counts of identity theft and nine counts each of forger... Read more

Source: www.maryvilledailyforum.com

Top found tags: EN(1),fraud(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Paddy Power condemned after waiting FOUR YEARS to tell 650,000 customers of data breachLocation: Ottawa, Ontario, Canada
Date published: 01-08-2014

Popular gambling site Paddy Power has been heavily criticised after taking an incredible four years to tell 650,000 customers that their personal data has been compromised in a data breach dating back to 2010.In a website announcement posted on Thursday in advance of customer notification letters, t... Read more

Source: news.techworld.com

Top found tags: cyber security(2),data breach(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach impacts nearly 650,000 Paddy Power customersLocation: Brussel, Belgium
Date published: 01-08-2014

Irish bookmaker Paddy Power is contacting 649,055 customers, whose personal, but not financial, details have been compromised in a data breach dating back to 2010.The compromised data includes customer names, usernames, addresses, email addresses, phone numbers, dates of birth, and question-and-answ... Read more

Source: www.easybranches.eu

Top found tags: update(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Judge orders transfer of hacker from Guam to Seattle in Broadway Grill data breach caseLocation: Seattle, Washington, United States
Date published: 01-08-2014

A federal judge ordered a suspected Russian hacker be transferred from Guam to Seattle on Friday, where he was indicted in 2011 for allegedly hacking into point of sales systems at Washington restaurants, including a data breach in 2010 that involved stealing credit card information from hundreds of... Read more

Source: www.capitolhillseattle.com

Top found tags: identity theft(2),Department of Justice(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
14 Ways To Protect Yourself From Identity TheftLocation: Experian HQ - Dublin,Ireland
Date published: 01-08-2014

So how can you protect yourself and stop this from happening to you?You cant prevent all identity theft, but there are several steps you can take to minimize the risk of it happening to you. Some of the best anti-identity theft tips include:Before you throw anything away, check to see whether it ... Read more

Source: tbgsecurity.com

Top found tags: cyber security(2),identity theft(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gulfport man sentenced for identity theftLocation: Internal Revenue Service - Washington, United States
Date published: 01-08-2014

GULFPORT, Miss. (AP) Gulfport man has been sentenced to two years in federal prison after pleading guilty in May to aggravated identity theft involving income tax refunds he obtained by using other people's names and Social Security numbers.Richard Terrell Jasper was sentenced Tuesday by U.S. Di... Read more

Source: www.seattlepi.com

Top found tags: government(2),identity theft(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach at University of West FloridaLocation: Florida, United States
Date published: 31-07-2014

The University of West Florida announced Thursday morning that passwords and usernames for about 160 people may have been compromised in an data breach of the universitys main campus networks, a news release from UWF said.University officials believe that some individuals attacked the network to ... Read more

Source: www.databreaches.net

Top found tags: data breach(2),education(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whats Your Identity Theft IQ?Location: Privacy Rights Clearinghouse - San Diego, United States
Date published: 01-08-2014

The first step when it comes to identity theft is admitting you have a problem. Knowing your ID IQ is a good place to start.Youve probably seen those red-and-white buttons that warble when swatted, That was easy! However, on the battlefield of identity theft awareness, nothing is easy. Peop... Read more

Source: blog.credit.com

Top found tags: identity theft(2),medical sector(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Target Corp. CEO hired to restore U.S. business, fix Canadian storesLocation: Target HQ - Minneapolis, United States
Date published: 31-07-2014

Target has hired Pepsi executive Brian Cornell as its new chairman and CEO as it looks to recover from a huge data breach, and troubles in Canada.Brian Cornell, the new chief executive officer of Target Corp., has experience in the Canadian retail marketplace.He took over as CEO and president of Sam... Read more

Source: www.thestar.com

Top found tags: EN(1),data breach(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Former Jackson County car dealer gets 15-year prison sentence in identity theft case BY BRIAN BURNESTHE KANSAS CITY STARLocation: Morrow, United States
Date published: 31-07-2014

A former Kansas City area used car dealer behind one of the largest identify theft cases ever prosecuted in a Missouri court was sentenced Thursday to 15 years in prison.Terry Lee Morrow Jr. used his customers names, birth dates and Social Security numbers, along with fake addresses and other det... Read more

Source: www.kansascity.com

Top found tags: fraud(1),scam(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Goodwill working with secret service to investigate data breachLocation: Target HQ - Minneapolis, United States
Date published: 31-07-2014

Following reports of the well-documented Target data breach in 2013, the need to improve the existing security framework to ensure that customer credit card numbers and other personal data are no longer at risk has been brought up by corporations and media alike. Target Corp. responded to their data... Read more

Source: www.cybersecuritybusiness.com

Top found tags: data breach(2),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CERT issues alert about new Backoff PoS malwareLocation: Trustwave - Chicago, United States
Date published: 04-08-2014

Over in the US, CERT (the Computer Emergency Readiness Team) has issued a warning over a nasty strain of malware which targets PoS (point of sale terminals).CERT, in association with the National Cybersecurity and Communications Integration Center, US Secret Service and Trustwave Spiderlabs, has nam... Read more

Source: www.itproportal.com

Top found tags: data breach(2),malware(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target tosses US$148m onto data breach barbecueLocation: Target HQ - Minneapolis, United States
Date published: 06-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Target's infamous 2013 data breach, which resulted in the company being relieved of 40 million credit card numbers, has cost the company another US$148m according to its latest quarterly finance report. The retailer dedicates a whole section... Read more

Source: go.theregister.com

Top found tags: credit card(2),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
One in 2900 phone calls is an IDENTITY THIEFLocation: Black Hat - Las Vegas, United States
Date published: 06-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines One in every 2900 phone calls to contact centres was made by fraudsters attempting to gain customer account details to steal funds or buy merchandise, according to Pindrop Security's Vijay Balasubramaniyan. Researchers canvassed 105 million ... Read more

Source: go.theregister.com

Top found tags: social engineering(2),Black Hat(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian crime ring amasses over a billion stolen Internet credentialsLocation: New York Times - New York, United States
Date published: 05-08-2014

A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion username and password combinations and more than 500 million e-mail addresses, security researchers say.The records, discovered by Hold Security, a firm in Milwaukee, include confident... Read more

Source: www.theglobeandmail.com

Top found tags: cyber security(4),financial sector(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Baltimore Man Pleads Guilty in Identity Theft and Credit Card Fraud RingLocation: Baltimore, United States
Date published: 05-08-2014

ALEXANDRIA, VAOlanrewaju Abiola, 39, of Baltimore, Maryland, pleaded guilty today to conspiracy to commit access device fraud for participating in an identity theft and credit card fraud ring that operated in the Washington, D.C. and Baltimore region. Dana J. Boente, U.S. Attorney for the Eastern... Read more

Source: www.fbi.gov

Top found tags: government(2),identity theft(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian hackers steal over a billion usernames and passwordsLocation: Moscow, Russia
Date published: 06-08-2014

A group of Russian cyber criminals attacked 500 million email addresses and stole 1.2 billion usernames and passwords. According to US cyber security company Hold Security, the gang has the largest cache of stolen data in the history of cyber crime. In a blog post written by Hold Security, the compa... Read more

Source: www.computerweekly.com

Top found tags: social media(2),cyber security(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Economic Impact of Cybercrime and Cyber EspionageLocation: McAfee - Santa Clara, United States
Date published: 06-08-2014

Extracting value from the computers of unsuspecting companies and government agencies is a big business for criminals. The past 12 months has seen a continued increase in the number and complexity of advanced malware threats affecting business and government operations. The impact of cybercrime an... Read more

Source: blogs.mcafee.com

Top found tags: social media(2),cyber security(8),cybercrime(13)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Billion plus credentials hacked by Russian gang: industry reactionLocation: Moscow, Russia
Date published: 06-08-2014

US security firm Hold Security claims to have discovered the biggest ever hack, with 4.5 billion records stolen, but it also sought to charge hacked websites for confirmation of breach. Billion plus credentials hacked by Russian gang: industry reaction Billion plus credentials hacked by Russian gang... Read more

Source: www.scmagazineuk.com

Top found tags: website(1),cyber security(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dan Geer: Security at the Forefront of Policy DecisionsLocation: New York, United States
Date published: 06-08-2014

LAS VEGAS Dan Geer carried his version of computer securitys Ten Commandments to a rapt Black Hat 2014 audience today, offering up 10 personal recommendations and observations related to the current state of security in the context of government surveillance and eroding privacy. Adorned in bi... Read more

Source: threatpost.com

Top found tags: government(4),cyber security(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Insider breach at Las Vegas brain and spine surgery centerLocation: Las Vegas, Nevada, United States
Date published: 06-08-2014

In July, Las Vegas-based Western Regional Center for Brain & Spine Surgery (WRCBSS) began notifying patients that their personal information including Social Security numbers might have been stolen by a former employee and used for fraudulent purposes. How many victims? 12,000, according to ... Read more

Source: www.scmagazine.com

Top found tags: data breach(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Mocana offers 'Drop-In' OpenSSL Replacement for Apache Web ServersLocation: San Francisco, United States
Date published: 05-08-2014

Security solutions vendor Mocana has taken somewhat of a sidestep from its focus as a provider of embedded device and mobile security solutions, and has released what it calls a highly secure drop-in replacement for the widely adopted OpenSSL stack for Apache Web servers. Dubbed NorthStar, the solut... Read more

Source: securityweek.com

Top found tags: energy(2),OpenSSL(2),smart grid(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple Changing the Way OS X Recognizes Signed AppsLocation: Apple HQ - Cupertino, United States
Date published: 05-08-2014

Pre-release notes published by Apple for OS X Mavericks 10.9.5 and Yosemite Developer Preview 5 are informing developers that they might have to re-sign their apps if they don't want Apple's Gatekeeper anti-malware feature to block them. According to the tech titan, version 1 signatures, the ones cr... Read more

Source: securityweek.com

Top found tags: ISP(1),Apple(2),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
White Hats splat Black Hat chats: Talks on home alarm flaws and Russian spy tools axedLocation: Black Hat - Las Vegas, United States
Date published: 05-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Two further talks have been pulled from this year's Black Hat USA program. A presentation on weaknesses in home security alarms systems, and another about Russian espionage software, have been yanked from the annual hacking conference, which... Read more

Source: go.theregister.com

Top found tags: social media(2),government(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to attack a smart meter (Utilities: better find out before the criminals do)Location: Trend Micro - Cupertino, United States
Date published: 05-08-2014

Quick Take: Security vendor Trend Micro has published an article detailing ways criminals can use smart meters to do harm. They range from adjusting bills up or down, determining whether or not anyone is home, taking a free ride on the cellular connection and more. Once you install smart meters, it ... Read more

Source: www.smartgridnews.com

Top found tags: smart meter(2),Trend Micro(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers question the security of sat-com, USB techLocation: New York, United States
Date published: 05-08-2014

Cybersecurity researchers are set to unveil separate reports Aug. 7 that they say show vulnerabilities in satellite communications gear used in government and critical infrastructure networks, as well as a fundamental flaw in the USB technology that almost all computers use.One of the two papers, wh... Read more

Source: fcw.com

Top found tags: conference(2),government(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Visa token service key to Apple's mobile payments plans - analystsLocation: Apple HQ - Cupertino, United States
Date published: 05-08-2014

Analysts at Pacific Crest Securities (PCS) have joined the Apple mobile payments guessing game, speculating that recent security moves by Visa will see the iPhone 6 go contactless.Last month reports surfaced claiming that Apple is in talks with Visa ahead of a potential mobile wallet launch when the... Read more

Source: www.finextra.com

Top found tags: critical infrastructure(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SCALABLE to Demonstrate Cyber Security Solutions for Critical Infrastructure at the Black Hat Security ConferenceLocation: Black Hat - Las Vegas, United States
Date published: 04-08-2014

CULVER CITY, CA--(Marketwired - August 04, 2014) - SCALABLE Network Technologies, Inc. (SCALABLE), a leader in wireless network design and optimization tools, announced today that it will be demonstrating network simulation-based solutions for evaluating critical infrastructure environments for resi... Read more

Source: www.digitaljournal.com

Top found tags: conference(2),government(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google tips off Texas police, leading to arrest of sex offenderLocation: Google HQ - Mountain View, United States
Date published: 05-08-2014

Google upheld its policy of monitoring user content for child sexual abuse this past week when it tipped Texas police off to a man who was receiving explicit images of an underaged girl. John Henry Skillern is a registered sex offender who had already been convicted of sexually assaulting an eight-y... Read more

Source: www.scmagazine.com

Top found tags: government(1),police(1),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ottawa man facing 181 charges in cyber bullying probeLocation: Ottawa, Ontario, Canada
Date published: 02-08-2014

OTTAWA A man who was harassed online for the past 12 years says he's relieved to hear an arrest has been made.Friday was \"definitely a good day. I'm happy, very happy. I'm jumping inside,\" said the man at the Elgin St. courthouse.His family has been tormented sporadically since 2002 with the c... Read more

Source: cnews.canoe.ca

Top found tags: United Kingdom(2),United States(2),cyber bullying(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2014 Bag Lecture Series: Visualizing Critical Infrastructure - Todd SearsLocation: Todd, United States
Date published: 04-08-2014

Bag Lecture Series: Visualizing Critical Infrastructure: The Challenges of Achieving Broad Spectrum Domain Awareness in Time of CrisisAugust 1 @ 12:00 PM - 1:00 PMThe State Emergency Operations Center (SEOC) exists to provide leadership decision support and to enable operational coordination in time... Read more

Source: www.youtube.com

Top found tags: awareness(1),EN(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
THE KIM KARDASHIAN GAME IS A PLAYGROUND FOR MALWARE AND SCAMMERSLocation: Hollywood, Los Angeles, United States
Date published: 03-08-2014

The ridiculous Kim Kardashian Hollywood is seemingly the most popular app in the world right now - you're probably reading this in-between tapping on fire hydrants and pigeons in a desperate attempt to get more energy, and going on dates with secretly gay baseball players who criticise your outfits ... Read more

Source: www.pedestrian.tv

Top found tags: report(1),scam(1),spyware(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook scams trick to click? Rihanna's sex tape, free Disneyland trip reportedLocation: Facebook - Menlo Park, United States
Date published: 02-08-2014

Do you have a link on Facebook to see Rihannas sex tape? Or a free trip to Disneyland? The latest Facebook scams are leaving social media users angered as they are victims of gimmicks to spread malware on the social network. With so many people unaware that they might be victims, it appears that ... Read more

Source: www.examiner.com

Top found tags: report(1),scam(1),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Govt denies installing SSO spywareLocation: Wellington, New Zealand
Date published: 01-08-2014

The government is firmly denying claims it's installed controversial spyware to expand its ability to intercept internet and phone communications, and says there are no plans to do so.The New Zealand Herald on Friday reported an engineer from the US National Security Agency's Special Source Operatio... Read more

Source: news.msn.co.nz

Top found tags: United States(2),telecom sector(4),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Power to Destroy: How Malware WorksLocation: New York, United States
Date published: 31-07-2014

When it comes to IT security, an ounce of prevention is worth a pound of cure. But with malware attacks becoming increasingly sophisticated and numerous by the day, how can website owners prevent these attacks from targeting their sites and customers?In this white paper, youll learn how malware w... Read more

Source: bitpipe.computerweekly.com

Top found tags: EN(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crouching Yeti, Hidden Dragon: New Threat Steals DataLocation: Department of Homeland Security - Washington, United States
Date published: 31-07-2014

Moscow-based Kaspersky Lab has added to what's known about a previously detected malware campaign that has been stealing sensitive data from major manufacturing, industrial, pharmaceutical, construction and IT companies in the United States, Spain, Germany, Poland, France, Japan, Italy, Turkey, Irel... Read more

Source: www.tomsguide.com

Top found tags: antivirus(4),Kaspersky Lab(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. intelligence officials looking into suspected new spy leakLocation: New York, United States
Date published: 06-08-2014

WASHINGTON (Reuters) - U.S. intelligence officials were considering on Tuesday whether to ask the Department of Justice to open a criminal investigation into the suspected leak of a classified counter-terrorism document to a website, a U.S. official familiar with the matter said. The intelligence of... Read more

Source: reuters.com

Top found tags: Department of Justice(3),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers still find iOS apps to be riskier than Android appsLocation: Google HQ - Mountain View, United States
Date published: 05-08-2014

Following previous studies, researchers are still finding that mobile apps on iOS are riskier than apps on Android. The summer 2014 Appthority App Reputation Report reveals that 87 percent of the top paid iOS apps exhibited at least one top 10 risky behavior, whereas only 78 percent of the top paid ... Read more

Source: www.scmagazine.com

Top found tags: framework(1),report(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US government faces new post-Snowden leakerLocation: Sydney, Australia
Date published: 06-08-2014

new leaker in its ranks, after leaked documents relating to the country's central counterterrorism database were published online this week by The Intercept. The leaked documents, entitled Directorate of Terrorist Identities (DTI) Strategic Accomplishments 2013, were prepared by the National Counter... Read more

Source: www.zdnet.com

Top found tags: Department of Justice(3),telecom sector(4),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Latest US Media Intel Scoop Suggests New LeakerLocation: National Security Agency - Fort Meade, United States
Date published: 06-08-2014

WASHINGTON - The latest media scoop about the internal workings of the US intelligence community has convinced officials they have a new leaker feeding information to journalists, reports said Tuesday. The concerns came after The Intercept, a news site that has access to documents from known leaker ... Read more

Source: securityweek.com

Top found tags: Hong Kong(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
132 arrested in child cybersex crackdown, authorities sayLocation: Polk, United States
Date published: 05-08-2014

POLK COUNTY, Fla. One hundred thirty-two people were arrested over five months in a statewide crackdown on online predators, law enforcement officials from several agencies announced Tuesday.Polk County Sheriff Grady Judd spoke at the news conference Tuesday. He has developed a national reputatio... Read more

Source: www.wesh.com

Top found tags: EN(1),government(1),legislation(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry wins key security OK for service to manage Android, iOS devicesLocation: BlackBerry HQ - Ontario, Canada
Date published: 06-08-2014

TORONTO (Reuters) - BlackBerry Ltd said on Wednesday its Android and iOS device-management service has won key security clearance from the U.S. Defense Information Systems Agency (DISA). The company said the DISA clearance will allow its customers in various U.S. Department of Defense agencies to be... Read more

Source: reuters.com

Top found tags: United States(2),mobile device(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK government review looks for Bitcoin's role in British businessLocation: London, United Kingdom
Date published: 06-08-2014

The UK government has said it will launch an investigation into the role of digital currencies like Bitcoin in the British finance system. Bitcoin is a digital currency, introduced in 2009, that lets users pay for goods and services from a computer or phone, independent of any bank. Each virtual coi... Read more

Source: cnet.com.ortal.com

Top found tags: financial sector(4),telecom sector(4),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Myanmar's first non-government phone carrier, Ooredoo, goes liveLocation: Singapore
Date published: 06-08-2014

Myanmar. Myint Lwin Oo Ooredoo, Myanmar's first non-government linked mobile carrier, went live this past weekend in three of the Asian country's major cities, Yangon, Mandalay and Naypyidaw. It was a highly anticipated launch for both the Myanmar people and telecoms industry watchers alike, as fewe... Read more

Source: cnet.com.ortal.com

Top found tags: smartphone(2),social media(4),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Edward Snowden's not a one-off: US.gov hunts new secret doc leakerLocation: National Security Agency - Fort Meade, United States
Date published: 06-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines It appears former NSA contractor Edward Snowden is not the only leaker of secret US documents around, as the US government searches for another whistleblower in the aftermath of another leak of classified information. CNN reports that leaked... Read more

Source: go.theregister.com

Top found tags: United States(2),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSS Labs Launches Enterprise Cyber Risk Management SolutionLocation: NSS Labs - Austin, United States
Date published: 06-08-2014

Security research firm NSS Labs has introduced a new SaaS offering designed to help organizations with managing their cyber risk. According to the company, the NSS Cyber Resiliency Center (CRC) enables enterprises to identify threats targeting their systems, evaluate their security posture, and crea... Read more

Source: securityweek.com

Top found tags: EN(1),research(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lookingglass Releases Solution to Correlate Network Telemetry and Threat IntelligenceLocation: New York, United States
Date published: 06-08-2014

Lookingglass Cyber Solutions, a provider of cyber threat intelligence management solutions, has released a new solution designed to help organizations correlate threat intelligence feeds with network telemetry in order to generate actionable threat reports across businesses globally. The new offerin... Read more

Source: securityweek.com

Top found tags: report(1),trend(1),threat(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Synology NAS Devices Hit in Ransomware Attack, Firm Advises UpgradeLocation: Ransom, United States
Date published: 06-08-2014

A network-attached storage (NAS) vendor has confirmed that ransomware is targeting some of its devices and urged users to upgrade. Taiwanese-based Synology issued a statement about the issue after users on an online forum reported that ransomware known as 'SynoLocker' was targeting their Diskstation... Read more

Source: securityweek.com

Top found tags: CryptoLocker(2),financial sector(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pwnie Express Targets Remote Locations With New Cloud-based Security Assessment SolutionLocation: Boston, United States
Date published: 06-08-2014

Pwn Pulse Combines Hack-in-a-box Sensors with Central Management for Remote Location Intelligence Pwnie Express, the experts behind network security testing platform that power the Pwn Pad, Pwn Plug, and Pwn Phone have launched a software-as-a-service (SaaS) version. Called the Pwn Pulse, the ... Read more

Source: securityweek.com

Top found tags: financial sector(2),mobile device(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CGI accredited for cyber security evaluations by CESGLocation: CGI HQ - Montreal, Canada
Date published: 06-08-2014

CGI has become the only test lab in the UK able to perform common criteria tailored assurance scheme (CTAS), commercial product assurance (CPA), security evaluations, and CESG assured services (CAS) evaluations following approval by CESG, the UK Government National Technical Authority for Informatio... Read more

Source: www.scmagazineuk.com

Top found tags: threat(1),government(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Decryption tool released to aid those impacted by CryptoLockerLocation: Fox-IT - Delft, The Netherlands
Date published: 06-08-2014

A recent collaboration between two security entities has resulted in the creation of a decryption tool that victims of the original CryptoLocker ransomware can leverage to regain their data. Security firm FireEye has collaborated with Fox-IT to create the tool that is designed to provide those impac... Read more

Source: www.scmagazine.com

Top found tags: ransomware(1),website(1),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Trailing the Trojan njRATLocation: Microsoft HQ - Redmond, United States
Date published: 05-08-2014

One Trojan that just wont go away is the remote access tool njRAT. Microsoft recently took down a leading domain associated with the malware, but that action did not come off as smoothly as the company hoped. We closely track this remote access tool (RAT) and see a rise in its popularity every ye... Read more

Source: blogs.mcafee.com

Top found tags: Syrian Electronic Army(3),cybercrime(5),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Zwaar securityprobleem maakt van elk USB-apparaat een potentile bron van malwareLocation: Black Hat - Las Vegas, United States
Date published: 04-08-2014

Een securitylacune in de implementatie van de Universal Serial Bus kan eender welk USB-device, inclusief geheugensticks, tot een bron van malware maken, aldus een presentatie op Black Hat.Op de Black Hat ict security-conferentie in Las Vegas tonen onderzoekers van het Duitse securityonderzoeksbedrij... Read more

Source: datanews.knack.be

Top found tags: research(2),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Firmware van USB-Controllers voorzien van malwareLocation: New York, United States
Date published: 02-08-2014

Twee beveiligingsonderzoekers zijn er in geslaagd om de firmware van een populaire USB controller te hacken en deze te voorzien van malware. Deze contoroller wordt actief gebruikt in verschillende USB-Sticks, toetsenborden, muizen en andere devices.Naast de randapparatuur kan de malware ook gensta... Read more

Source: technieuws.com

Top found tags: cyber security(2),Karsten Nohl(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Hackers stelen 1,2 miljard inloggegevens en 500 miljoen e-mailadressen'Location: New York Times - New York, United States
Date published: 06-08-2014

Russische hackers hebben volgens een beveiligingsbedrijf ongeveer 1,2 miljard combinaties van gebruikersnamen en wachtwoorden gestolen. Het gaat vermoedelijk om de grootste roof van inloggegevens tot nu toe. Er werden ook 500 miljoen e-mailadressen buitgemaakt. Dat meldt The New York Times op basis ... Read more

Source: tweakers.net

Top found tags: website(1),United Kingdom(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Bende steelt 1,2 miljard wachtwoorden via SQL Injection"Location: Amsterdam, The Netherlands
Date published: 06-08-2014

Een bende cybercriminelen heeft door middel van SQL Injection 1,2 miljard unieke wachtwoorden en bijbehorende gebruikersnamen weten te stelen, zo claimt een Amerikaans beveiligingsbedrijf. De gegevens werden bij zo'n 420.000 websites buitgemaakt, aldus Hold Security. Volgens het beveiligingsbedrijf ... Read more

Source: www.security.nl

Top found tags: spam(1),website(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers verslaan encryptie CryptoLocker-ransomwareLocation: Fox-IT - Delft, The Netherlands
Date published: 06-08-2014

Onderzoekers van het Nederlandse beveiligingsbedrijf Fox-IT en het Amerikaanse FireEye zijn erin geslaagd om de privsleutels van de CryptoLocker te achterhalen, waardoor alle slachtoffers van deze ransomware hun versleutelde bestanden kosteloos kunnen terugkrijgen. CryptoLocker is ransomware die b... Read more

Source: www.security.nl

Top found tags: malware(4),United States(4),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Heartbleed vier keer genomineerd voor Pwnie AwardLocation: Black Hat - Las Vegas, United States
Date published: 06-08-2014

Elk jaar worden tijdens de Black Hat conferentie in Las Vegas de "Pwnie Awards" uitgereikt, een prijs voor de grootste beveiligingsblunders, ergste lekken, meest baanbrekende onderzoeken, grootste "fails" en slechtste reacties van leveranciers op gemelde beveiligingsproblemen. Dit jaar is de Hearble... Read more

Source: www.security.nl

Top found tags: conference(3),Black Hat(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Identiteit Heemskerker misbruikt voor oplichting festivalgangersLocation: Hee, Terschelling, Friesland, The Netherlands
Date published: 05-08-2014

HEEMSKERK Een naeve Heemskerker is het slachtoffer geworden van identiteitsdiefstal. Dat bleek toen hij maandag naar de politie stapte om te melden dat zijn identiteit werd gebruikt bij de 'verkoop' van tickets voor muziekfestivals.De man had zijn rijbewijs, inclusief foto, op zijn Facebookpagina ... Read more

Source: www.rtvnh.nl

Top found tags: police(1),identity theft(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Belgisch ministerie eindelijk verlost van Snake-rootkitLocation: Ministry of Foreign Affairs - Den Haag, The Netherlands
Date published: 06-08-2014

Het Belgische Ministerie van Buitenlandse Zaken is er na drie maanden eindelijk in geslaagd om de geavanceerde Snake-rootkit helemaal te verwijderen. Begin mei werd bekend dat aanvallers via de malware tenminste n vertrouwelijk diplomatiek rapport over de Oekrane hadden gestolen. Snake staat o... Read more

Source: www.security.nl

Top found tags: government(2),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man die rijbewijs op Facebook zet slachtoffer ID-fraudeLocation: Facebook - Menlo Park, United States
Date published: 06-08-2014

Een inwoner van Heemskerk is het slachtoffer van identiteitsfraude geworden nadat hij zijn rijbewijs inclusief foto op zijn Facebookpagina had geplaatst. Onbekenden kopieerden de afbeelding en gebruikten die om zich te legitimeren bij de verkoop van valse festivalkaarten. Een aantal mensen kocht de ... Read more

Source: www.security.nl

Top found tags: financial sector(2),identity theft(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bende steelt 1,2 miljard inloggegevensLocation: Amsterdam, The Netherlands
Date published: 06-08-2014

Een Russische bende heeft 1,2 miljard inloggegevens buitgemaakt via een botnet dat meer dan 420.000 websites compromitteerde met sql-injecties. Daarnaast werden meer dan 500 miljoen e-mailadressen buitgemaakt. Het is de grootste dataroof ooit.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: e-mail(1),NL(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sms-worm besmet 500.000 Android-toestellen in ChinaLocation: Beijing, China
Date published: 06-08-2014

Een worm die zich op 2 augustus, de Chinese Valentijnsdag, via sms-berichten in China verspreidde wist binnen slechts zes uur zo'n 500.000 toestellen te besmetten. Dat laat het Russische anti-virusbedrijf Kasperksky Lab weten. De malware bestond uit twee kwaadaardige APK-bestanden. Het eerste APK-be... Read more

Source: www.security.nl

Top found tags: China(2),cybercrime(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fabrikant noemt hack van oscilloscoop copyrightschendingLocation: Amsterdam, The Netherlands
Date published: 06-08-2014

Een fabrikant van oscilloscopen heeft de uitleg hoe standaard aanwezige maar uitgeschakelde functies kunnen worden ingeschakeld van een website laten verwijderen omdat er sprake van copyrightschending zou zijn. Een oscilloscoop is een apparaat dat wordt gebruikt om elektrische signalen te meten. Fab... Read more

Source: www.security.nl

Top found tags: website(1),government(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NCSC onderzoekt impact omvangrijke wachtwoorddiefstalLocation: Berlin, Germany
Date published: 06-08-2014

Zowel de Nederlandse als Duitse autoriteiten zijn een onderzoek gestart naar de mogelijke impact van de 1,2 miljard wachtwoorden die door cybercriminelen bij ruim 400.000 websites zijn buitgemaakt. De Amerikaanse IT-beveiliger Hold Security had de gestolen inloggegevens tijdens een onderzoek ontdekt... Read more

Source: www.security.nl

Top found tags: The Netherlands(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Veel populaire gratis Android apps volgen locatie gebruikersLocation: Google HQ - Mountain View, United States
Date published: 06-08-2014

82% van de Top 100 gratis Android apps volgt de locatie van gebruikers. Bij de Top 100 betaalde apps is dit 49%, zo blijkt uit onderzoek van Appthority. Het bedrijf onderzocht in totaal 400 apps, waaronder 200 Android en 200 iOS apps. Op elk platform werden de 100 populairste gratis en betaalde apps... Read more

Source: www.security.nl

Top found tags: privacy(1),research(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2500 Nederlanders sluiten zich aan bij privacyzaak tegen FacebookLocation: Facebook - Menlo Park, United States
Date published: 06-08-2014

Bijna 2500 Nederlanders hebben zich bij een class-action-zaak tegen Facebook gevoegd. In totaal staat het aantal aanmeldingen op 25.000; de inschrijvingen zijn inmiddels gesloten. De aanmeldingen kwamen uit meer dan honderd landen. Facebook LogoNederland is een van de landen met de meeste mensen die... Read more

Source: tweakers.net

Top found tags: cyber security(2),Germany(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Ransomware gijzelt NAS-opslagLocation: Amsterdam, The Netherlands
Date published: 04-08-2014

NAS-systemen van Synology zijn doelwit van nieuwe malware die de opgeslagen data versleutelt en dan losgeld eist. De zo gegijzelde gegevens moeten in Bitcoin worden betaald.De zogeheten Synolocker-malware lijkt binnen te komen via de webinterface van de Synology NAS-apparaten (network attached stora... Read more

Source: www.pcmweb.nl

Top found tags: social media(2),The Netherlands(2),Ministry of Economic Affairs(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bug dwingt Oracle tot nieuwe Java-updateLocation: Oracle - Redwood City, United States
Date published: 06-08-2014

Een belangrijke Java-update die Oracle drie weken geleden uitbracht blijkt een bug te bevatten waardoor er nu een ongeplande update is uitgekomen. Java 7 Update 65 verhielp 20 lekken, waarvan sommige zo kritiek dat een aanvaller het onderliggende systeem er volledig door kan overnemen. Deze versie i... Read more

Source: www.security.nl

Top found tags: patch(1),update (1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
QNX wil dat auto's wegbeheerders op de hoogte stellen van gaten in de wegLocation: BlackBerry HQ - Ontario, Canada
Date published: 06-08-2014

Het Canadese QNX, onderdeel van smartphonemaker BlackBerry, ontwikkelt een technologie die auto's automatisch gaten in de weg laat detecteren en die informatie doorspeelt aan wegebeheerders, zodat die de gaten kunnen dichten. Dat moet mogelijk worden door auto's uit te rusten met sensoren die de gat... Read more

Source: tweakers.net

Top found tags: smartphone(1),mobile device(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Chinese overheidsinstanties mogen geen Apple-producten meer kopen'Location: Beijing, China
Date published: 06-08-2014

De Chinese overheidsinstanties zouden niet langer Apple-producten mogen aanschaffen. Dat meldt persbureau Bloomberg. Daardoor mogen ze niet langer Macbooks en iPads aanschaffen vanwege 'beveiliging', vermoedelijk de angst voor hacks vanuit de Amerikaanse overheid. De wijziging is pas onlangs doorgev... Read more

Source: tweakers.net

Top found tags: telecom sector(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Geen Windows 8.1 Update 2, en Patch Tuesday is geschiedenisLocation: Microsoft HQ - Redmond, United States
Date published: 06-08-2014

Er komt geen Windows 8.1 Update 2, heeft Microsofts Brandon LeBlanc geblogd. En passant herdoopte hij Patch Tuesday in Update Tuesday. Microsoft had al eerder te kennen gegeven dat het naar andere methoden zocht om verbeteringen aan te brengen in zijn software dan het periodiek uitbrengen van update... Read more

Source: www.automatiseringgids.nl

Top found tags: Microsoft(2),patch(3),update(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Chinese overheid weert Apple vanwege veiligheidsredenen"Location: Beijing, China
Date published: 06-08-2014

De Chinese overheid zou iPads en MacBooks vanwege veiligheidsredenen van een lijst met producten hebben verwijderd die met belastinggeld mogen worden gekocht, zo meldt persbureau Bloomberg aan de hand van een anonieme Chinese overheidsfunctionaris. In totaal zou het om tien producten van Apple gaan,... Read more

Source: www.security.nl

Top found tags: Kaspersky Lab(4),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Creditcarddiefstal kost Target 110 miljoen dollarLocation: Target HQ - Minneapolis, United States
Date published: 06-08-2014

De grootschalige creditcarddiefstal bij Target heeft de Amerikaanse winkelketen al 110 miljoen dollar gekost, zo laat het bedrijf in een vooruitblik op de resultaten van het tweede kwartaal weten. Aanvallers wisten bij de winkelketen in te breken en installeerden vervolgens malware op de kassasystem... Read more

Source: www.security.nl

Top found tags: threat(1),trend(1),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICO wijst Britse advocaten op beveiliging papieren documentenLocation: London,United Kingdom
Date published: 06-08-2014

Het Britse Information Commissioners Office (ICO), dat toeziet op de databescherming, waarschuwt advocaten en notarissen om persoonlijke informatie goed te beveiligen en dan met name papieren documenten en dossiers. Het advies volgt op verschillende datalekken bij advocaten en notarissen. De afge... Read more

Source: www.security.nl

Top found tags: NL(1),financial sector(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ransomware versleutelt Synology NAS via oud lekLocation: Amsterdam, The Netherlands
Date published: 06-08-2014

De SynLocker-ransomware die bestanden op Synology NAS-devices versleutelt blijkt een 7 maanden oud lek te gebruiken dat in december 2013 door Synology werd gepatcht. De data wordt versleuteld en de gebruiker wordt gedwongen om bitcoins over te maken voordat de data weer wordt ontsleuteld.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: patch(1),ransomware(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Datalekken zijn desastreus voor klantvertrouwenLocation: Amsterdam, The Netherlands
Date published: 06-08-2014

Datalekken bij bedrijven betekenen meestal een einde in het vertrouwen dat klanten in ondernemingen hebben. Dat blijkt uit onderzoek van SafeNet in verschillende landen. Twee derde van de ondervraagden geeft aan dat ze vermoedelijk nooit meer zullen kopen bij een bedrijf nadat gegevens op straat kom... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Synology: ransomware treft alleen ongepatchte systemenLocation: New York, United States
Date published: 06-08-2014

Een kwetsbaarheid die wordt misbruikt om ransomware te installeren op nas-systemen van Synology, is al in december gedicht. Wie DiskStation Manager heeft bijgewerkt naar de nieuwste versie, loopt geen gevaar, belooft het bedrijf. Afgelopen week kwam aan het licht dat nas-systemen van Synology worden... Read more

Source: tweakers.net

Top found tags: ransomware(1),vulnerability(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Symantec verhelpt kwetsbaarheid in Symantec Endpoint ProtectionLocation: Symantec HQ - Mountain View, United States
Date published: 06-08-2014

Samenvatting: Symantec heeft updates uitgebracht die een kwetsbaarheid in Symantec Endpoint Protection Client verhelpen. Gevolgen: Een kwaadwillende kan toegang krijgen tot het syteem met rechten van Symantec Endpoint Protection Client (systeemrechten, beheersrechten). Beschrijving: CVE-2014-3434 Er... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Symantec(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Nginx verholpenLocation: Amsterdam, The Netherlands
Date published: 06-08-2014

Samenvatting: Er is een kwetsbaarheid in Nginx verholpen waardoor een kwaadwillend persoon toegang kan verkrijgen tot gevoelige gegevens. Gevolgen: Door deze kwetsbaarheid te misbruiken kan een kwaadwillend persoon toegang verkrijgen tot gevoelige gegevens. Beschrijving: Er is een kwetsbaarheid ontd... Read more

Source: www.ncsc.nl

Top found tags: NL(1),SSL (1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in yum-updatesdLocation: Amsterdam, The Netherlands
Date published: 06-08-2014

Samenvatting: Er is een kwetsbaarheid verholpen in yum-updatesd. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken voor het omzeilen van een beveiligingmaatregel en het installeren van een kwaadaardig pakket. Beschrijving: Een kwetsbaarheid in yum-updatesd zorgt ervoor dat de handtekening ... Read more

Source: www.ncsc.nl

Top found tags: NL(1),vulnerability(1),Red Hat(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mediaberichtgeving over de diefstal van 1,2 miljard e-mailadressenLocation: National Cyber Security Centre - Den Haag, The Netherlands
Date published: 06-08-2014

In de media zijn berichten verschenen over diefstal van 1,2 miljard e-mailadressen door een Russische criminele bende, waaronder 500 miljoen unieke e-mailadressen. Het Amerikaanse bedrijf Hold Security zegt de beschikking te hebben over de gestolen gegevens. Op dit moment zijn door het bedrijf slech... Read more

Source: www.ncsc.nl

Top found tags: government(5),United States(6),critical infrastructure(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in libvirtLocation: Amsterdam, The Netherlands
Date published: 06-08-2014

Samenvatting: Er is een kwetsbaarheid in de libvirt-bibliotheek verholpen. Gevolgen: Kwaadwillenden kunnen de gevonden kwetsbaarheid misbruiken voor het verkrijgen van gevoelige informatie of om een Denial-of-Service te veroorzaken. Beschrijving: - CVE-2014-0179 Door deze kwetsbaarheid kunnen XML-en... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Fedora(2),Red Hat(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in PHPLocation: Hewlett-Packard - Palo Alto, United States
Date published: 06-08-2014

Samenvatting: De makers van PHP hebben updates uitgebracht voor PHP5 die de kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan op afstand toegang verkrijgen tot gevoelige gegevens en kan mogelijk willekeurige code uitvoeren met de rechten van het PHP proces. Beschrijving: - CVE-2014-0207, CVE... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ernstige kwetsbaarheid in Samba verholpenLocation: Ubuntu - London, United Kingdom
Date published: 06-08-2014

Samenvatting: Een is een ernstige kwetsbaarheid in Samba verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om willekeurige code uit te voeren onder root rechten. Beschrijving: Een kwaadwillende kan via het netwerk packets sturen naar de NetBIOS name services daemon (nmb... Read more

Source: www.ncsc.nl

Top found tags: Red Hat(2),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish