Under construction

New design coming soon!

CIC News engine statistics

CIC News for 07-08-2014 contains 107 articles: cybercrime(32),cyber security(35),data breach(11),other(29)

CIC News update contains 87 English and 20 Dutch articles for today.
There are 8 published advisories, 0 are English and 8 are Dutch.
In today's English news articles:
- 19 related to cybercrime
- 35 related to cyber security
- 11 related to data breach and identity theft
- 22 for the category other news

In today's Dutch news articles:
- 13 related to cybercrime
- 0 related to cyber security
- 7 for the category other news

Have fun reading.

English cybercrime related news

Yahoo Ads Serve Mobile Fake AlertsLocation: Google HQ - Mountain View, United States
Date published: 06-08-2014

Android Armour, a malicious knockoff of Armor For Android, has been circulating for some timewith no end in sight, perhaps due in part to advertisements over Yahoos ad network. I happened to recently be served a couplemyself. The lure starts off with some alarming pop-up dialog prom... Read more

Source: blogs.mcafee.com

Top found tags: website(1),cybercrime(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Twitter link shortening service hit by pharma spammerLocation: Twitter - San Francisco, United States
Date published: 06-08-2014

Experts have caught on to a pharma spam campaign that leverages Twitter's link shortening service to send users to pages touting bootleg drugs made in India. In a blog post by Andrew Conway, research analyst at Cloudmark, details a recent spike in malicious URL activity using the t.co service. Using... Read more

Source: www.scmagazine.com

Top found tags: threat(1),Twitter(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internet Explorer to start blocking old Java pluginsLocation: Oracle - Redwood City, United States
Date published: 06-08-2014

feature: it will block out-of-date ActiveX controls. More specifically, it will block out-of-date versions of the Java plugin. Although Microsoft is describing the feature as an ActiveX block, the list of prohibited plugins is currently Java-centric. Stale versions of Flash and Silverlight will be a... Read more

Source: arstechnica.com

Top found tags: report(1),Internet Explorer(2),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. Homeland Security contractor reports computer breachLocation: Department of Homeland Security - Washington, United States
Date published: 07-08-2014

WASHINGTON (Reuters) - A company that performs background checks for the U.S. Department of Homeland Security said on Wednesday it was the victim of a cyber attack, adding in a statement that "it has all the markings of a state-sponsored attack." The computer breach at Falls Church, Virginia-based U... Read more

Source: reuters.com

Top found tags: DHS(4),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CIA infosec guru: US govt must buy all zero-days and set them freeLocation: Black Hat - Las Vegas, United States
Date published: 07-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Black Hat 2014 Computer security luminary Dan Geer has proposed a radical shakeup of the software industry in hope of avoiding total disaster online. Geer played a crucial role in the development of the X Window System and the Kerberos authe... Read more

Source: go.theregister.com

Top found tags: Black Hat(4),Bruce Schneier(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Car hackers build kit to protect you and your motor from fiery deathLocation: Black Hat - Las Vegas, United States
Date published: 07-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Black Hat 2014 At last years Black Hat USA, Charlie Miller, security engineer at Twitter and Apple-cracker extraordinaire, and Chris Valasek, director of security intelligence at IOActive, showed delegates how to hack a car. This year the... Read more

Source: go.theregister.com

Top found tags: IDS(2),social media(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sudan Security-linked Website Hacked AgainLocation: Reporters Without Borders - Paris, France
Date published: 07-08-2014

KHARTOUM - For the second time in a month, hackers have attacked a Sudanese website close to the country's powerful security apparatus, AFP learned on Thursday. The website of the Sudanese Media Centre (SMC), http://smc.sd, was inaccessible and carried the message: "hacked again by 7r9 al7dod". Ther... Read more

Source: securityweek.com

Top found tags: police(1),report(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researcher snaps a Zeus hacker's photo through his webcamLocation: FireEye HQ - Milpitas, United States
Date published: 07-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Security researcher Raashid Bhatt has detailed how to bust the security protections of the Zeus banking trojan allowing him to take a webcam photo of the scammer. Bhatt (@raashidbhatt) wrote in a technical blog how he reverse-engineered the ... Read more

Source: go.theregister.com

Top found tags: cybercrime(4),malware(5),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meet the Puzzle Mastermind Who Designs Def Cons Hackable BadgesLocation: Clark, United States
Date published: 07-08-2014

badge-glasses Badge master Ryan Clarke (above), aka LostboY and LosT, has been designing the Def Con badges since 2012. This years badge theme plays off the sic-fi cult classic film They Live about a homeless drifter who stumbles upon a box of mysterious sunglasses that allow him to see aliens in... Read more

Source: wired.com

Top found tags: social engineering(2),conference(3),DEF CON(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DHS Contractor Targeted in Apparent State-Sponsored AttackLocation: Department of Homeland Security - Washington, United States
Date published: 07-08-2014

US Investigations Services (USIS), a Department of Homeland Security (DHS) contractor that conducts background checks for the agency, has been the target of a cyberattack that appears to have been launched by a state-sponsored entity. Officials told The Washington Post that the scope of the intrusio... Read more

Source: securityweek.com

Top found tags: DHS(4),United States(8),government(11)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The initial compromise is only a fraction of a hackers attack cycleLocation: Microsoft HQ - Redmond, United States
Date published: 07-08-2014

PaulMCCooper. The initial compromise is only a fraction of a hackers attack cycle ITProPortal spoke to Simon Edwards, senior security consultant at Damballa, about a how businesses have to get used to the idea that their data isn't safe, and move forward into an assumption of imminent security br... Read more

Source: itproportal.com

Top found tags: government(2),ISP(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft to Block Outdated ActiveX Controls in Internet ExplorerLocation: Microsoft HQ - Redmond, United States
Date published: 07-08-2014

In an effort to provide an enhanced level of protection to Internet Explorer users, Microsoft has decided to introduce a new feature that's designed to block ActiveX controls that are out of date, the company announced on Wednesday. ActiveX controls, which are basically add-ons for Internet Explorer... Read more

Source: securityweek.com

Top found tags: vulnerability(2),website(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attackers Used Multiple Zero-Days to Hit Spy Agencies in Cyber-Espionage CampaignLocation: Kaspersky HQ - Moscow, Russia
Date published: 07-08-2014

Kaspersky Lab said that it has discovered how victims of an ongoing massive cyber espionage campaign were infected, shedding light on questions previously left unanswered in earlier research. The campaign, called Epic Turla, targeted intelligence agencies, government institutions, embassies, militar... Read more

Source: securityweek.com

Top found tags: government(4),Kaspersky Lab(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New FireEye Services Help Insurance Industry Manage Exposure to Cyber ThreatsLocation: FireEye HQ - Milpitas, United States
Date published: 07-08-2014

Threat protection solutions provider FireEye has announced a new line of services designed specifically to help brokers and underwriters gain visibility into enterprises' exposure to cyber threats. The program, Cyber Risk Evaluation and Threat Engagement (CREATE), will enable insurers to leverage Fi... Read more

Source: securityweek.com

Top found tags: threat(1),critical infrastructure(2),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker Redirects Traffic From 19 Internet Providers to Steal BitcoinsLocation: Dell HQ - Round Rock, United States
Date published: 07-08-2014

ff-whatisbitcoin-f-lead2 [gallery-ca] Adam Voorhes [gallery-il] Gail Anderson + Joe Newton Among all the scams and thievery in the bitcoin economy, one recent hack sets a new bar for brazenness: Stealing an entire chunk of raw internet traffic from more than a dozen internet service providers, then ... Read more

Source: wired.com

Top found tags: DEF CON(2),financial sector(2),ISP(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SMS Worm Hits Chinese Users Hard, Installs Android BackdoorLocation: Beijing, China
Date published: 07-08-2014

A large number of Android devices in China were infected with an SMS worm on August 2, the day the country celebrated Valentine's Day. The creator of this piece of malware has already been identified and detained, according to reports. Kaspersky Lab said on Wednesday that the malware made its way on... Read more

Source: securityweek.com

Top found tags: cybercrime(3),Kaspersky Lab(4),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police issue computer malware warningLocation: Malta
Date published: 06-08-2014

The police today again warned about variant of a computer malware, known as police ransomware, which involves the misuse of the Malta Police Force logo.Computer systems infected with the virus display a warning message claiming that the users computer had been suspended on the grounds of... Read more

Source: www.timesofmalta.com

Top found tags: report(1),cybercrime(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cryptolocker victims to get files back for freeLocation: Fox-IT - Delft, The Netherlands
Date published: 06-08-2014

All 500,000 victims of Cryptolocker can now recover files encrypted by the malware without paying a ransom.The malicious program encrypted files on Windows computers and demanded a substantial fee before handing over the key to the scrambled files.Thanks to security experts, an online portal has bee... Read more

Source: www.bbc.com

Top found tags: government(2),cybercrime(3),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Top gov't spyware company hacked; Gamma's FinFisher leakedLocation: Fisher, United States
Date published: 06-08-2014

internet. The slick and highly secret surveillance software can remotely control any computer it infects, copy files, intercept Skype calls, log keystrokes -- and now we know it can do much, much more. Gamma PR 01 A hacker has announced on Reddit and Twitter that they'd hacked Anglo-German company G... Read more

Source: www.zdnet.com

Top found tags: government(5),telecom sector(8),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian hackers show who values passwordsLocation: Moscow, Russia
Date published: 06-08-2014

brian campbell lock and screw The New York Times reported Tuesday that a Russian crime ring has amassed the largest known collection of stolen internet credentials, including 1.2 billion username and password combinations and more than 500 million email addresses. Once again, Milwaukee-based H... Read more

Source: www.zdnet.com

Top found tags: social media(4),0-day(1),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CIA Insider: U.S. Should Buy All Security Exploits, Then Disclose ThemLocation: New York, United States
Date published: 06-08-2014

hack [gallery-ca] Getty LAS VEGAS To increase the security of the internet and computers, the government should corner the market on zero-day vulnerabilities and exploits, offering top-dollar to force out all other buyers. At least, thats what Dan Geer thinks, and his opinion matters. Geer is... Read more

Source: wired.com

Top found tags: cyber security(4),cybercrime(5),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Car Hacking Enters Remote Exploitation PhaseLocation: Twitter - San Francisco, United States
Date published: 06-08-2014

Alexander In the Wake of the Snowden remote access tool RAT Malware Communicating Via Yahoo Mail Podcasts Latest Podcasts All MSFT-takedown Threatpost News Wrap, July 4, 2014 Encrypt! Threatpost News Wrap, June 23, 2014 nsa_spying Threatpost News Wrap, June 6, 2014 How I Got Here: Joe Grand H... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),social media(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pervasive OTA Carrier Controls Exploitable on a Massive ScaleLocation: Twitter - San Francisco, United States
Date published: 06-08-2014

Alexander In the Wake of the Snowden remote access tool RAT Malware Communicating Via Yahoo Mail Podcasts Latest Podcasts All MSFT-takedown Threatpost News Wrap, July 4, 2014 Encrypt! Threatpost News Wrap, June 23, 2014 nsa_spying Threatpost News Wrap, June 6, 2014 How I Got Here: Joe Grand H... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),social media(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile Broadband Modems Seen as Easy Targets for AttackersLocation: Twitter - San Francisco, United States
Date published: 06-08-2014

Alexander In the Wake of the Snowden remote access tool RAT Malware Communicating Via Yahoo Mail Podcasts Latest Podcasts All MSFT-takedown Threatpost News Wrap, July 4, 2014 Encrypt! Threatpost News Wrap, June 23, 2014 nsa_spying Threatpost News Wrap, June 6, 2014 How I Got Here: Joe Grand H... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),social media(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian hacker gang steals 1.2B passwordsLocation: New York Times - New York, United States
Date published: 06-08-2014

It's clear that companies do not have what it takes to keep our data safe from hackers. In today's CNET Update, learn how a team in Russia hacked 1.2 billion user credentials from 420,000 websites. First reported by The New York Times, the data heist was revealed by the Hold Security firm -- which a... Read more

Source: cnet.com.ortal.com

Top found tags: website(1),cyber security(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oracle Database Redaction Trivial to BypassLocation: Oracle - Redwood City, United States
Date published: 07-08-2014

Alexander In the Wake of the Snowden remote access tool RAT Malware Communicating Via Yahoo Mail Podcasts Latest Podcasts All MSFT-takedown Threatpost News Wrap, July 4, 2014 Encrypt! Threatpost News Wrap, June 23, 2014 nsa_spying Threatpost News Wrap, June 6, 2014 How I Got Here: Joe Grand H... Read more

Source: threatpost.com

Top found tags: telecom sector(2),Kaspersky Lab(4),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CIAs venture firm security chief:US should buy zero-days, reveal themLocation: National Security Agency - Fort Meade, United States
Date published: 07-08-2014

Sean Gallagher LAS VEGASIn a wide-ranging keynote speech at the Black Hat information security conference today, computer security icon Dan Geer gave attendees a sort of personal top 10 list of things that could be done to make the Internet more secure, more resilient, and less of a threat to per... Read more

Source: arstechnica.com

Top found tags: government(5),cyber security(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Homeland Security data possibly stolen in cyberattackLocation: Department of Homeland Security - Washington, United States
Date published: 07-08-2014

One of the US government's biggest contractors revealed Wednesday that its computer systems were hit by hackers, according to the Washington Post. US Investigations Services, which performs government background checks, said the breach most likely involved the theft of personal information from US D... Read more

Source: cnet.com.ortal.com

Top found tags: government(5),cyber security(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security expert calls home routers a clear and present dangerLocation: DEF CON - Las Vegas, United States
Date published: 07-08-2014

Black Hat information security conference, In-Q-Tel chief information security officer Dan Geer expressed concern about the growing threat of botnets powered by home and small office routers. The inexpensive Wi-Fi routers commonly used for home Internet accesswhich are rarely patched by their own... Read more

Source: arstechnica.com

Top found tags: information security(2),Electronic Frontier Foundation(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber defender Brandis is proving unfit for purposeLocation: CERT Australia - Barton, Australia
Date published: 07-08-2014

midst of a cyber cold war is mounting daily as is the evidence that one of Australia's key defenders isn't fit for purpose. As industrial control system (ICS) hackers told me two years ago, while the SCADA systems control everything from power stations and oil refineries to chocolate factories a... Read more

Source: www.zdnet.com

Top found tags: cyber security(4),Kaspersky Lab(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sending Mixed Messages With PasswordsLocation: Microsoft HQ - Redmond, United States
Date published: 07-08-2014

The biggest security headache that consumers face on a regular basis may well be the password. You needone to do just about anything online nowadays.This makes them very valuable targets of theft as the news that1.2 billion passwords were stolen highlights. Unfortunately,remem... Read more

Source: trendmicro.com

Top found tags: website(1),cyber security(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russia, China could ban western tech if they want to live in the PASTLocation: Beijing, China
Date published: 07-08-2014

Implementing global e-invoicing with guaranteed legal certainty Russia and China have both, of late, threatened western IT companies with difficult trading conditions or banishment if they can't prove their products are secure. The reason for their ire is, of course, Edward Snowden's many revelation... Read more

Source: go.theregister.com

Top found tags: Microsoft(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft blocking of old ActiveX not enoughLocation: Microsoft HQ - Redmond, United States
Date published: 07-08-2014

Tuesday the company will be adding another feature to clean up old messes, i.e. the ability to block old versions of ActiveX controls, a very common exploit vector on Windows. My colleague Ed Bott calls this change "monumental," and it is important, especially as it focuses initially on the sing... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),United States(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Symantec, Kaspersky clarify China banLocation: Beijing, China
Date published: 07-08-2014

agencies funded by the central government and do not include local governments and large enterprises. The U.S. and Russian IT security vendors were responding to reports their products had been removed from a list of antivirus software suppliers approved to sell to government agencies. Kaspersky Lab... Read more

Source: www.zdnet.com

Top found tags: antivirus(4),cyber security(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM offers cloud-based services to Chinese firms to address security concernsLocation: IBM HQ - Armonk, United States
Date published: 07-08-2014

BEIJING (Reuters) - International Business Machines Corp said on Thursday it would provide cloud-based risk analysis for a Chinese financial data firm in a deal that executives heralded as a model for future business in China, where state-owned enterprises are increasingly shunning foreign technolog... Read more

Source: reuters.com

Top found tags: financial sector(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Legal Divide Between Security Research and Cybercrime Remains MurkyLocation: Twitter - San Francisco, United States
Date published: 07-08-2014

Alexander In the Wake of the Snowden remote access tool RAT Malware Communicating Via Yahoo Mail Podcasts Latest Podcasts All MSFT-takedown Threatpost News Wrap, July 4, 2014 Encrypt! Threatpost News Wrap, June 23, 2014 nsa_spying Threatpost News Wrap, June 6, 2014 How I Got Here: Joe Grand H... Read more

Source: threatpost.com

Top found tags: social media(6),telecom sector(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Drupal and WordPress Coordinate Security Updates to Fix DoS FlawLocation: WordPress - San Francisco, United States
Date published: 07-08-2014

For the first time ever, the security teams at Drupal and WordPress have worked together on addressing a remotely exploitable vulnerability that affects tens of millions of websites that use their publishing platforms. The flaw, a denial-of-service (DoS) issue in PHP XML parsing, was reported to Dru... Read more

Source: securityweek.com

Top found tags: update(2),DoS(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook accused of Prism collaboration in new EU privacy caseLocation: Facebook - Menlo Park, United States
Date published: 07-08-2014

Facebook accused of Prism collaboration in new EU privacy case. A data privacy campaign aiming to bring a class action lawsuit against Facebook has gained 25,000 signatures. Max Schrems of Vienna, claims that the way the social network monitors its users is in breach on EU law. Mr Schrems also alleg... Read more

Source: itproportal.com

Top found tags: cyber security(2),social media(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Podcast: Wendy Nather on the Black Hat BuzzLocation: Black Hat - Las Vegas, United States
Date published: 07-08-2014

Alexander In the Wake of the Snowden remote access tool RAT Malware Communicating Via Yahoo Mail Podcasts Latest Podcasts All MSFT-takedown Threatpost News Wrap, July 4, 2014 Encrypt! Threatpost News Wrap, June 23, 2014 nsa_spying Threatpost News Wrap, June 6, 2014 How I Got Here: Joe Grand H... Read more

Source: threatpost.com

Top found tags: Black Hat(4),Kaspersky Lab(4),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Epic Operation Kicks Off Multistage Turla APT CampaignLocation: Kaspersky HQ - Moscow, Russia
Date published: 07-08-2014

Alexander In the Wake of the Snowden remote access tool RAT Malware Communicating Via Yahoo Mail Podcasts Latest Podcasts All MSFT-takedown Threatpost News Wrap, July 4, 2014 Encrypt! Threatpost News Wrap, June 23, 2014 nsa_spying Threatpost News Wrap, June 6, 2014 How I Got Here: Joe Grand H... Read more

Source: threatpost.com

Top found tags: malware(3),Kaspersky Lab(4),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Backoff PoS Malware Demonstrated at Black Hat [VIDEO]Location: Black Hat - Las Vegas, United States
Date published: 07-08-2014

LAS VEGAS: Last week, the U.S. Secret Service warned of the dangers of malware targeting point-of-sale (POS) systems, in particular a nasty variant called Backoff. The Backoff malware was jointly investigated by security vendor Trustwave. Trustwave brought Backoff to the Black Hat USA 2014 conferenc... Read more

Source: www.esecurityplanet.com

Top found tags: financial sector(2),United States(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM mends bridges with China through landmark cloud computing security dealLocation: IBM HQ - Armonk, United States
Date published: 07-08-2014

AlysiaJudge. IBM mends bridges with China through landmark cloud computing security deal In a country where state-owned enterprises are increasingly rejecting foreign technology that pose "security risks," IBM has revealed it will be helping bolster the security of a Chinese financial data firm usin... Read more

Source: itproportal.com

Top found tags: cyber security(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Behind the CryptoLocker DisruptionLocation: Twitter - San Francisco, United States
Date published: 07-08-2014

Alexander In the Wake of the Snowden remote access tool RAT Malware Communicating Via Yahoo Mail Podcasts Latest Podcasts All MSFT-takedown Threatpost News Wrap, July 4, 2014 Encrypt! Threatpost News Wrap, June 23, 2014 nsa_spying Threatpost News Wrap, June 6, 2014 How I Got Here: Joe Grand H... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),malware(6),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Flaws in Email and Web Filtering Solutions Expose Organizations to Attacks: ResearcherLocation: Williams, United States
Date published: 07-08-2014

Today at the Black Hat security conference in Las Vegas, a researcher demonstrated how weaknesses in email and Web filtering solutions can be leveraged by attackers to gather valuable information which they can use in their operations. In his presentation, Ben Williams, a senior security consultant ... Read more

Source: securityweek.com

Top found tags: cybercrime(2),Black Hat(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oracle Helps Enterprises Tackle Encryption Key Management ChallengesLocation: Oracle - Redwood City, United States
Date published: 07-08-2014

As the saying goes, a chain is only as strong as its weakest link. And in the technology world, while encryption is an instrumental component in protecting sensitive data, encryption is only as strong as its key management. As organizations increasingly encrypt data to comply with regulatory require... Read more

Source: securityweek.com

Top found tags: OpenSSL(2),The Mask(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat: Hidden controls open 2 billion mobile devices to exploitationLocation: Black Hat - Las Vegas, United States
Date published: 07-08-2014

HackingTeam tool makes use of mobile malware targeting all major platforms A pair of researchers from Accuvant at the 2014 Black Hat conference showed how the OMA-DM protocol can be leveraged to gain access to mobile devices. Hidden controls found in a wide array of devices from smartphones and ... Read more

Source: www.scmagazine.com

Top found tags: vulnerability(2),Black Hat(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hey guys. We've got 1.2 BILLION stolen accounts here. Send us your passwords, 'cos safetyLocation: Johns Hopkins University - Baltimore, United States
Date published: 07-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines The backlash is growing against the infosec firm that claimed it had uncovered a Russia-based gang's stash of 1.2 billion nicked website passwords. Hold Security claimed the gang was hoarding over a one billion unique stolen usernames and pa... Read more

Source: go.theregister.com

Top found tags: website(2),Black Hat(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
In major shift, Google boosts search rankings of HTTPS-protected sitesLocation: Google HQ - Mountain View, United States
Date published: 07-08-2014

tweaking its search engine to favor sites that use HTTPS to protect end users' privacy and security. Sites that properly implement the transport layer security (TLS) protocol may be ranked higher in search results than those that transmit in plaintext, company officials said in a blog post published... Read more

Source: arstechnica.com Why It\'s Easier To Rob A Bank With Malware Than With Guns | The number of physical robberies on banks has fallen dramatically in recent years, but the amount of money banks are losing through electronic methods has rocketed.In 2013 for example, the annual fraud indicator estimated the annual cost of fraud in the UK was 52bn what it was five years before. So its easy to put up CCTV cameras, bulletproof glass and alarm bells, but in an electronic world there are infinite ways to commit fraud.In fact there are so many targets in a electronic world that criminals can focus their efforts on the customer, the bank or the merchant. With virtually no footprint at all, criminal gangs can install malware within any part of the e-commerce infrastructure and either steal user credentials or modify transactions. It may be tempting to see this as a victimless crime, but large-scale fraud can have serious implications on the global financial market, not to mention user trust.Individuals have been finding ways around electronic security for decades. Well known examples include John Draper (aka Captain Crunch), who in the 1970s used a whistle tuned to 2.6kHz that was given away in cereal packs to fool the pitch-controlled security system on the US telephone network, allowing him to make long-distance calls free of charge. Then there was Vladmir Levin, from Russia, who siphoned off millions from Citibank customers in the early 1990s by finding a way around their dial-up wire transfer service.These days, any script kiddie can create their own targeted attack on the finance system. You dont need extensive programming skills or even a deep knowledge of how the e-commerce infrastructure works. A key target is the end user, since they tend to be the weakest link in the chain.Holy Boleto!The latest reminder came with the recent attacks on Boleto Bancrio, the Brazilian inter-bank payment system, which were announced earlier this month. Known colloquially as Boleto, a vast amount of low-dollar transactions were hijacked by the latest malware, most probably set up by Brazilian organised crime gangs. With the theft amounting to nearly $4bn (2.4bn), it could be the largest fraud in history.Boleto is the second-most-popular payment method in Brazil after credit cards and has around 18% of all purchases. It is typically used to pay phone and shopping bills. One reason it is popular is that many Brazilians dont have a credit card, and even when they do have one, they are often not trusted.The fraud worked very simply. It tricked customers to install a piece of malware on their system and then waited until they visited their banks website. It spread using what is called spear phishing, which is the most common method these days, where users are sent emails with links on them. When the user clicks on them, they will run a program on their computer, and install the malware. | http://www.lifehacker.com.au/2014/08/why-its-easier-to-rob-a-bank-with-malware-than-with-guns/ | 06-08-2014 | www.lifehacker.com.au

Top found tags: government(2),social media(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

US contractor firm that vetted Snowden suffers major breach; data likely snatchedLocation: National Security Agency - Fort Meade, United States
Date published: 06-08-2014

A contractor working for the US Dept. of Homeland Security has suffered a data breach, which likely led to the leak of personal employee information. USIS, a private company that conducts background checks on behalf of the government agency, has been suspended until the Federal Bureau of Investigati... Read more

Source: www.zdnet.com

Top found tags: Department of Justice(3),United States(8),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat keynote talks cyber policies for field's futureLocation: Black Hat - Las Vegas, United States
Date published: 06-08-2014

At a time where cyber security has become more relevant than ever to senior leadership at companies, experts challenged practitioners to simplify their focus, while taking up a radical approach, to remain effective as a field. On Wednesday morning, Dan Geer, the CISO of Arlington, Va.-based investme... Read more

Source: www.scmagazine.com

Top found tags: conference(2),data breach(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
More than a billion unique credentials pilfered by Russian hackersLocation: Moscow, Russia
Date published: 06-08-2014

Tricky new malware strain, Dyre, skirts detection and steals banking credentials Of more than 4.5 billion records possessed by CyberVor, more than 1.2 billion are unique user IDs and passwords. A group of Russian hackers, dubbed CyberVor, are sitting on the biggest cache of stolen credentials ... Read more

Source: www.scmagazine.com

Top found tags: social media(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian Hackers Steal 1.2 Billion PasswordsLocation: New York Times - New York, United States
Date published: 06-08-2014

On Tuesday afternoon, The New York Times revealed that a group of Russian hackers now holds 1.2 billion username and password combinations and over 500 million email addresses. The hacking group, working under the name CyberVor, apparently holds the largest known database of stolen account credentia... Read more

Source: blogs.mcafee.com

Top found tags: social media(4),telecom sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man pleads guilty to role in identity theft and credit card fraud ringLocation: Baltimore, United States
Date published: 06-08-2014

A Baltimore man pleaded guilty on Tuesday to conspiracy to commit access device fraud for his role in an identity theft and credit card fraud ring. Olanrewaju Abiola and his co-conspirators purchased stolen credit card data, typically on the internet, and then loaded it onto gift cards and other pay... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),identity theft(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Half of all UK adults shun mobile bankingLocation: PayPal HQ - San Jose, United States
Date published: 07-08-2014

Half of all UK adults shun mobile banking Half of all UK adults shun mobile banking More than half of adults in the UK would never use mobile banking services, and many avoid using mobile financial services according to a new report from Intercede, entitled The Rise of the Identity Centric Econom... Read more

Source: www.scmagazineuk.com

Top found tags: social media(2),telecom sector(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security fears throttling mobile commerce in the UKLocation: New York, United States
Date published: 07-08-2014

Fears were highest with 18-24 year olds, with 62% refusing to ever use mobile banking apps Digital identity expert Intercede today revealed the results of its new research The Rise of the Identity Centric Economy which found that 53% of UK consumers would never use mobile banking services, while man... Read more

Source: www.information-age.com

Top found tags: social media(2),United Kingdom(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gambling Site Acknowledges Four-Year-Old Data BreachLocation: Facebook - Menlo Park, United States
Date published: 07-08-2014

The gambling website Paddy Power recently began notifying 649,055 customers that their personal information may have been exposed as a result of a data breach in 2010. Paddy Power was notified in May 2014 that an unidentified person in Canada was in possession of a customer database dating from 2010... Read more

Source: www.esecurityplanet.com

Top found tags: social media(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook to acquire Internet security company PrivateCoreLocation: Facebook - Menlo Park, United States
Date published: 07-08-2014

SAN FRANCISCO (Reuters) - Facebook Inc said on Thursday it will to acquire a company that helps protect the computers and data centers that power Internet services. Facebook did not disclose financial terms for the acquisition of PrivateCore, which was founded in 2011 and is based in Palo Alto, Cali... Read more

Source: reuters.com

Top found tags: data breach(2),social media(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government spyware exposed after massive data breachLocation: Gamma International - Troisdorf, Germany
Date published: 07-08-2014

Gamma International Ltd - an Anglo-German company that makes and sells FinFisher spyware to various European, American and Asia Pacific governments and law enforcement agencies - has been bit by a big data breach, revealing hundreds of confidential documents. Government spyware exposed after massive... Read more

Source: www.scmagazineuk.com

Top found tags: Microsoft(3),government(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Symantec CEO credits enterprise growth amid positive Q1 earnings reportLocation: Symantec HQ - Mountain View, United States
Date published: 06-08-2014

Symantec started its fiscal 2015 on a high note with better-than-expected earnings after the bell on Wednesday. The security software giant reported a net income of $236 million, or 34 cents per share (statement). Non-GAAP earnings were 45 cents per share on a revenue of $1.735 billion. Wall Street ... Read more

Source: www.zdnet.com

Top found tags: report(1),Symantec(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Wikimedia Foundation lists removed links under 'right to be forgotten'Location: Google HQ - Mountain View, United States
Date published: 06-08-2014

The Wikimedia Foundation, the non-profit group who runs Wikipedia, issued a notice today detailing which of its posts were hidden from Google's search results under a European court's right to be forgotten ruling. Of the 328,000 requested link removals, more than fifty related to content on Wi... Read more

Source: www.scmagazine.com

Top found tags: EN(1),Google(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Now even Internet Explorer will throw lousy old Java into the abyssLocation: Oracle - Redwood City, United States
Date published: 07-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Internet Explorer will soon join its rival browsers by automatically blocking old, insecure add-ons and it's got its eye set squarely on Java. Microsoft said on Wednesday that starting on August 12, Internet Explorer will begin alerting ... Read more

Source: go.theregister.com

Top found tags: patch(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Free service gives decryption keys to Cryptolocker victimsLocation: Fox-IT - Delft, The Netherlands
Date published: 07-08-2014

encrypted by the ransomware known as Cryptolocker. As Fireeye explains in a blog post, the infrastructure of Cryptolocker and some other malware was taken down in June in a coordinated campaign called Operation Tovar, but there are still cases where Cryptolocker is attacking users. decryptcryptolock... Read more

Source: www.zdnet.com

Top found tags: CryptoLocker(2),RSA(2),malware(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China Student Sold 'Intelligence' for $32,000: XinhuaLocation: Beijing, China
Date published: 06-08-2014

BEIJING - A student in China has been detained for selling "intelligence" to foreigners for more than $32,000, state media said Wednesday in the country's latest espionage accusation. The student, surnamed Chang, is an aerospace graduate student at Harbin University in northeast China's Heilongjiang... Read more

Source: securityweek.com

Top found tags: mobile device(2),telecom sector(2),education(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researcher demonstrates how he controlled room devices in luxury hotelLocation: Black Hat - Las Vegas, United States
Date published: 07-08-2014

Talk stresses IoT concerns as today's problems An insecure home automation protocol allowed the hacker to control room amenities, like lights, TVs and temperature settings. At a Black Hat 2014 session, one hacker revealed how he was able to control basic amenities in a luxury hotel and why the h... Read more

Source: www.scmagazine.com

Top found tags: United States(2),update(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Zero-day hits Symantec endpoint productsLocation: Symantec HQ - Mountain View, United States
Date published: 07-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Get patching, sysadmins, there's a zero-day in Symantec Endpoint Protection (SEP). This US-CERT advisory is alerting anyone who ignored Symatec's note about the issue. CVE-2014-3434 is a local access vulnerability with a public exploit. A cl... Read more

Source: go.theregister.com

Top found tags: vulnerability(1),Black Hat(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cracker takes control of 200 rooms in Chinese hotelLocation: Apple HQ - Cupertino, United States
Date published: 07-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Black Hat 2014 A security consultant staying in the St Regis hotel in the Chinese city of Shenzhen got bored one night and successfully commandeered the controls of 200 rooms thanks to an insecure automation protocol. Jesus Molina, a former ... Read more

Source: go.theregister.com

Top found tags: mobile device(2),telecom sector(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Watchdog goes after local government waste in ITLocation: New York, United States
Date published: 07-08-2014

Watchdog goes after local government waste in IT. Socitm, the representative body for people in public sector IT, has issued guidance it says can help leaders in the sector better tackle inconsistency, waste and duplicated efforts in digital government. The publication follows the organisations r... Read more

Source: itproportal.com

Top found tags: EN(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google confirms it's giving HTTPS sites higher search rankingsLocation: Google HQ - Mountain View, United States
Date published: 07-08-2014

Google details troubles it and others face meeting right to be forgotten requests Google details troubles it and others face meeting right to be forgotten requests Google says it's already rewarding sites that use HTTPS with a slightly higher ranking in internet searches but it may be cranking u... Read more

Source: www.zdnet.com

Top found tags: trend(1),website(1),Google(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russia Grants Snowden Three-year Residence PermitLocation: National Security Agency - Fort Meade, United States
Date published: 07-08-2014

MOSCOW - Fugitive US intelligence operative Edward Snowden has been granted a three-year residence permit in Russia, his Russian lawyer said at a press conference Thursday. "The request was accepted and accordingly Edward Snowden was given a three-year residence permit" which allows him to move abou... Read more

Source: securityweek.com

Top found tags: airport sector(2),government(3),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Website encryption boosted by Google promotion of HTTPSLocation: Google HQ - Mountain View, United States
Date published: 07-08-2014

The latest change in Google's search engine optimisation (SEO) algorithm looks set to boost the uptake of encryption for websites by rating sites using HTTPS higher than those with HTTP. Website encryption boosted by Google promotion of HTTPS Website encryption boosted by Google promotion of HTTPS I... Read more

Source: www.scmagazineuk.com

Top found tags: e-mail(2),Google(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden is FREE to ESCAPE FROM RUSSIA, say officialsLocation: National Security Agency - Fort Meade, United States
Date published: 07-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Russia has given fugitive NSA whistleblower Edward Snowden a three year residency permit after his previous visa expired at the end of July. Snowden's lawyer, Anatoly Kucherena, told journalists that Snowden's request for a residence permit ... Read more

Source: go.theregister.com

Top found tags: United Kingdom(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Evolution of SIEM: Part 1Location: McAfee - Santa Clara, United States
Date published: 07-08-2014

They say you cant teach an old dog, new tricksor can you? The technology landscape has changed dramatically over the last 10 years, and many security approaches organizations previously relied on are no match for todays advanced threats. Tools like Security Information and Event Management ... Read more

Source: blogs.mcafee.com

Top found tags: McAfee(1),report(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat: Researcher demonstrates how he controlled room devices in luxury hotelLocation: Black Hat - Las Vegas, United States
Date published: 07-08-2014

Talk stresses IoT concerns as today's problems An insecure home automation protocol allowed the hacker to control room amenities, like lights, TVs and temperature settings. At a Black Hat 2014 session, one hacker revealed how he was able to control basic amenities in a luxury hotel and why the h... Read more

Source: www.scmagazine.com

Top found tags: United States(2),update(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry gets US security clearance for Secure Work Space on iOS and AndroidLocation: BlackBerry HQ - Ontario, Canada
Date published: 07-08-2014

BlackBerry gets US security clearance for Secure Work Space on iOS and Android. Blackberry security credentials have received a significant boost after the US Department of Defense [DoD] approved its Secure Work Space for iOS and Android. Related: BlackBerry Enterprise Service 10 tops cost effective... Read more

Source: itproportal.com

Top found tags: government(2),mobile device(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft to issue many Windows patchesLocation: Microsoft HQ - Redmond, United States
Date published: 07-08-2014

August 12, two of them rated critical. Microsoft has painted bold design strokes with Windows 8, but the business impact remains hotly debated. ZDNet and TechRepublic have the enterprise and SMB perspectives on Windows 8 covered from virtually every angle. The two critical bugs affect Windows and In... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook buys server security startup PrivateCoreLocation: Facebook - Menlo Park, United States
Date published: 07-08-2014

Facebook announced Thursday that it has acquired the server security startup PrivateCore. Financial terms of the deal were not immediately disclosed. contagion' study finished Founded by security vets from VMware and Google, the Palo Alto, Calif.-based company develops software to validate and secur... Read more

Source: www.zdnet.com

Top found tags: Google(1),threat(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Wikipedia contests EU ruling on 'right to be forgotten'Location: Smith, United States
Date published: 07-08-2014

Wikipedia has been criticised for deciding not to comply with the 'right to be forgotten', a key proponent of the forthcoming EU General Data Protection Law, with UK watchdog ICO also voicing concerns over logistics. When speaking at Wikipedia's annual Wikimania conference in London yesterday, found... Read more

Source: www.scmagazineuk.com

Top found tags: Google(1),website(1),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Americans to be guinea pigs in vast chip-and-PIN security experimentLocation: Black Hat - Las Vegas, United States
Date published: 07-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Black Hat 2014 Next year US banks will begin a wide-scale rollout of chip-and-PIN bank cards, just 11 years after the UK made it mandatory. In doing so, Americans will take part in a vast experiment to test chip-and-PIN against chip-and-sign... Read more

Source: go.theregister.com

Top found tags: United Kingdom(2),United Arab Emirates(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware Gives Itself Away by Trying to HideLocation: Black Hat - Las Vegas, United States
Date published: 06-08-2014

A person running away from a crime scene naturally attracts the interest of responding officers. If the canine unit turns up someone hiding in a dumpster nearby, the police will definitely want some questions answered. Intel researchers Rodrigo Branco (pictured above, left, with Neil Rubenking) and ... Read more

Source: securitywatch.pcmag.com

Top found tags: research(1),conference(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Maker afluistersoftware voor overheden gehacktLocation: Gamma International - Troisdorf, Germany
Date published: 06-08-2014

Gamma International, een bedrijf dat afluister- en hacksoftware ontwikkelt voor overheden, is gehackt. Dat meldt het Duitse weekblad Der Spiegel. Met de software van Gamma International hebben overheden de mogelijkheid om computers en smartphones af te luisteren. In totaal hebben hackers 40 gigabyte... Read more

Source: www.nutech.nl

Top found tags: police(1),smartphone(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Amerikaans beveiligingsministerie gehackt door overheid'Location: Department of Homeland Security - Washington, United States
Date published: 07-08-2014

Bij het Amerikaanse Department of Homeland Security zijn personeelsgegevens ontvreemd in een aanval die vermoedelijk is genitieerd door de overheid in het buitenland. Meer over cyberspionage Chinese hackers mogen hackconferenties niet in van VS Nederland prooi in omvangrijke digitale spionage Chin... Read more

Source: www.automatiseringgids.nl

Top found tags: DHS(4),government(6),United States(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
D66 stelt Opstelten vragen over 1,2 miljard gestolen loginsLocation: Ministry of Security and Justice - Den Haag, The Netherlands
Date published: 07-08-2014

D66 wil van minister Opstelten van Veiligheid en Justitie weten of hij kan bevestigen dat cybercriminelen 1,2 miljard wachtwoorden hebben gestolen zoals door het Amerikaanse beveiligingsbedrijf Hold Security wordt beweerd. D66-Kamerleden Verhoeven en Berndsen-Jansen hebben de minister dat gevraagd. ... Read more

Source: www.security.nl

Top found tags: cybercrime(3),United States(4),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beveiligingsexpert bezorgd over botnet van wifi-routersLocation: Black Hat - Las Vegas, United States
Date published: 07-08-2014

De gerenommeerde beveiligingsexpert Dan Geer heeft tijdens de Black Hat conferentie in Las Vegas gewaarschuwd voor de dreiging van botnets die uit wifi-routers bestaan en mogelijk zelfs het internet kunnen verlammen. Volgens Geer moeten wifi-routers dan ook als kritieke infrastructuur worden gezien.... Read more

Source: www.security.nl

Top found tags: wireless(1),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoeker fotografeert cybercrimineel via webcamLocation: Amsterdam, The Netherlands
Date published: 07-08-2014

Een beveiligingsonderzoeker is erin geslaagd om een foto van een cybercrimineel te maken die de onderzoeker eigenlijk met malware probeerde te infecteren. Onderzoeker Raashid Bhat ontving onlangs een e-mail met het bericht dat er iemand van zijn kantoor dood op straat was gevonden. Bhat moest volgen... Read more

Source: www.security.nl

Top found tags: trojan(2),cybercrime(5),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Miljoenen XP-computers aangevallen via Stuxnet-lekLocation: Microsoft HQ - Redmond, United States
Date published: 07-08-2014

Een beveiligingslek in Windows dat Microsoft in 2010 patchte en door de beruchte Stuxnet-worm gebruikt werd is nog altijd zeer populair bij cybercriminelen en wordt vooral gebruikt om XP-computers aan te vallen. Dat meldt het Russische anti-virusbedrijf Kaspersky Lab aan de hand van eigen statistiek... Read more

Source: www.security.nl

Top found tags: cybercrime(4),Kaspersky Lab(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Telefoonoplichters maken gebruikers bang via geluidseffectenLocation: Malwarebytes - San Jose, United States
Date published: 07-08-2014

Oplichters die mensen thuis bellen en vertellen dat de computer met malware besmet is geraakt of dat er andere zogenaamde problemen zijn waarvoor moet worden betaald om ze op te lossen, gebruiken nu ook websites met allerlei geluidseffecten en grote waarschuwingen om internetgebruikers bang te maken... Read more

Source: www.security.nl

Top found tags: research(1),website(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Botnet toont pornoadvertenties op besmette computersLocation: Amsterdam, The Netherlands
Date published: 07-08-2014

Een botnet dat al zeven jaar bestaat is onlangs door de makers gepgraded, zodat het ook advertenties voor pornosites, casino's, mobiele spyware en leningen op besmette computers kan tonen. De Asprox Trojan bestaat al sinds 2007, maar is dankzij een recente spamcampagne weer aan het groeien. Eind j... Read more

Source: www.security.nl

Top found tags: trojan(2),United Kingdom(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Maker afluistersoftware voor overheden gehacktLocation: Amsterdam, The Netherlands
Date published: 07-08-2014

Hackers zeggen dat ze 40 gigabyte aan documenten hebben buitgemaakt bij het bedrijf Gamma International. Dat bedrijf maakt software voor overheden waarmee ze gecodeerde mails kunnen lezen en gesprekken kunnen afluisteren.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: cybercrime(1),hackers(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Maker afluistersoftware gehacktLocation: Gamma International - Troisdorf, Germany
Date published: 07-08-2014

Gamma International, dat afluister- en hacksoftware ontwikkelt voor overheden, is zelf gehackt. Dat meldt het Duitse weekblad Der Spiegel. Met de software van Gamma International kunnen overheden gecodeerde mails lezen en gesprekken afluisteren. Hackers hebben 40 gigabyte aan interne documenten van ... Read more

Source: www.automatiseringgids.nl

Top found tags: hackers(1),NL(1),police(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Geavanceerde spionage-rootkit nog steeds actief in EuropaLocation: Kaspersky HQ - Moscow, Russia
Date published: 07-08-2014

De zeer geavanceerde spionage-rootkit genaamd Snake die het Belgische Ministerie van Buitenlandse Zaken infecteerde is nog steeds in Europa en het Midden-Oosten actief, zo meldt het anti-virusbedrijf Kaspersky Lab. De virusbestrijder onderzocht de spionagecampagne de afgelopen 10 maanden. Snake staa... Read more

Source: www.security.nl

Top found tags: Kaspersky Lab(4),government(5),Ministry of the Interior and Kingdom Relations(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaan met kinderporno opgepakt na tip van MicrosoftLocation: Microsoft HQ - Redmond, United States
Date published: 07-08-2014

Een 20-jarige Amerikaan die kinderporno bezat is dankzij een tip van Microsoft opgepakt. De man zou twee keer hebben geprobeerd om kinderporno in zijn OneDrive-account te plaatsen, de cloudopslagdienst van Microsoft, zo meldt The Smoking Gun. De softwaregigant scant afbeeldingen echter op kinderporn... Read more

Source: www.security.nl

Top found tags: child pornography(2),Google(2),pornography(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Inlichtingendiensten slachtoffer van grootschalige hack'Location: Kaspersky HQ - Moscow, Russia
Date published: 07-08-2014

Twee inlichtingendiensten en honderden overheden zijn het slachtoffer van een grootschalige hack waarbij veel data is buitgemaakt. Dat meldt Reuters op basis van een onderzoek van het Russische antivirusbedrijf Kaspersky Lab. De twee inlichtingendiensten zijn afkomstig uit Europa en het Midden-Ooste... Read more

Source: www.nutech.nl

Top found tags: Kaspersky Lab(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

Superveilig besturingssysteem Qubes R2 bijna klaarLocation: Warschau,Poland
Date published: 07-08-2014

Er is een tweede release candidate van het superveilige besturingssysteem Qubes OS R2 verschenen, dat nagenoeg identiek zal zijn aan de uiteindelijke versie die na de zomervakantie uitkomt, zo hebben de ontwikkelaars laten weten. Qubes is een opensource-besturingssysteem gebaseerd op Xen, X Window S... Read more

Source: www.security.nl

Top found tags: NL(1),vulnerability(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Veel vragen over 1,2 miljard gestolen wachtwoordenLocation: Adobe HQ - San Jose, United States
Date published: 07-08-2014

De aankondiging van een Amerikaans beveiligingsbedrijf dat het 1,2 miljard gestolen wachtwoorden heeft ontdekt heeft voor veel vragen bij experts gezorgd. Hold Security kwam met het nieuws dat het een database met gestolen inloggegevens had ontdekt, die bij 420.000 sites zouden zijn buitgemaakt. Om ... Read more

Source: www.security.nl

Top found tags: data theft(2),antivirus(3),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google geeft versleutelde sites hogere plaats in zoekresultatenLocation: Google HQ - Mountain View, United States
Date published: 07-08-2014

Google is begonnen om websites die HTTPS gebruiken om het verkeer van bezoekers te versleutelen hoger in de zoekresultaten te plaatsen. De beslissing om websites met HTTPS voor te trekken volgt op geruchten uit april, toen een Google-ingenieur het plan tijdens een conferentie had geopperd. Door het ... Read more

Source: www.security.nl

Top found tags: SSL(1),website(1),conference(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft gaat oude Java plug-ins in Explorer blokkerenLocation: Microsoft HQ - Redmond, United States
Date published: 07-08-2014

Om internetgebruikers tegen malware te beschermen zal Microsoft vanaf 12 augustus verouderde Java plug-ins in Internet Explorer automatisch blokkeren en dit later ook met andere plug-ins gaan doen. Volgens de softwaregigant worden veel plug-ins niet automatisch bijgewerkt en dat is een risico. Gebru... Read more

Source: www.security.nl

Top found tags: Windows(1),Internet Explorer(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Versleutelde websites hoger in zoekresultaten GoogleLocation: Google HQ - Mountain View, United States
Date published: 07-08-2014

Google benadeelt op termijn websites die niet versleuteld zijn met HTTPS. Om het web veiliger te maken krijgen site met TLS voorrang in de zoekresultaten. Op dit moment weegt HTTPS nog nauwelijks mee.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Google(1),NL(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoeker bestuurt luxe hotelkamer via laptopLocation: Apple HQ - Cupertino, United States
Date published: 07-08-2014

Een beveiligingsonderzoeker heeft tijdens de Black Hat conferentie in Las Vegas gedemonstreerd hoe hij zijn kamer in een luxe 5-sterren hotel in China via zijn laptop kon bedienen en in theorie alle hotelkamers en bijbehorende apparaten op afstand zou kunnen aansturen. Vorig jaar verbleef Jesus Moli... Read more

Source: www.security.nl

Top found tags: telecom sector(2),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoek naar gevolgen diefstal internetdataLocation: Moscow, Russia
Date published: 06-08-2014

Het Nationaal Cyber Security Centrum (NCSC) van het ministerie van Veiligheid zoekt uit of de diefstal van internetdata door een Russische bende gevolgen heeft voor Nederland. Dat heeft een woordvoerder van het centrum gezegd. Het NCSC hoopt daar woensdagmiddag meer over te weten.Volgens de woordvoe... Read more

Source: www.refdag.nl

Top found tags: The Netherlands(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid in Red Hat Enterprise Virtualization verholpenLocation: Amsterdam, The Netherlands
Date published: 07-08-2014

Samenvatting: Red Hat heeft updates beschikbaar gemaakt die een kwetsbaarheid verhelpen in Red Hat Enterprise Virtualization manager. Gevolgen: Een kwaadwillende kan toegang krijgen tot gegevens die overschreven hadden moeten zijn. Beschrijving: Voor VM`s die gevoelige informatie verwerken biedt Red... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Red Hat(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Splunk verholpenLocation: Amsterdam, The Netherlands
Date published: 07-08-2014

Samenvatting: Splunk heeft een tweetal kwetsbaarheden verholpen in Splunk Enterprise. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende een XSS-aanval uitvoeren en toegang verkrijgen tot gevoelige gegevens. Beschrijving: Splunk heeft een tweetal kwetsbaarheden verholpen in Splun... Read more

Source: www.ncsc.nl

Top found tags: website(1),XSS(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Wordpress verholpenLocation: WordPress - San Francisco, United States
Date published: 07-08-2014

Samenvatting: Er is een nieuwe versie van Wordpress uitgebracht waarin meerdere kwetsbaarheden worden verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om een Denial-of-Service te veroorzaken, willekeurige code uit te voeren met de rechten van de gebruiker waaronder de... Read more

Source: www.ncsc.nl

Top found tags: WordPress(1),XSS(1),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden verholpen in OpenSSLLocation: Amsterdam, The Netherlands
Date published: 07-08-2014

Samenvatting: De makers van OpenSSL hebben diverse updates uitgebracht om kwetsbaarheden in versies 0.9.8, 1.0.0 en 1.0.1 te verhelpen. Zie "Mogelijke oplossingen" voor software updates. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om een Denial-of-Service te veroorzaken. Be... Read more

Source: www.ncsc.nl

Top found tags: OpenSSL(1),Debian(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Linux kernel verholpenLocation: Amsterdam, The Netherlands
Date published: 07-08-2014

Samenvatting: Er zijn verschillende kwetsbaarheden in de Linux Kernel verholpen. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende een Denial-of-Service veroorzaken, toegang tot gevoelige gegevens verkrijgen en beveiligingsmaatregelen omzeilen. Beschrijving: - CVE-2014-0181: Dez... Read more

Source: www.ncsc.nl

Top found tags: Red Hat(2),The Netherlands(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Drupal verholpenLocation: Amsterdam, The Netherlands
Date published: 07-08-2014

Samenvatting: Er zijn nieuwe versies van Drupal uitgebracht waarin een kwetsbaarheid wordt verholpen. Gevolgen: Door deze kwetsbaarheid te misbruiken kan een kwaadwillende een Denial-of-Service veroorzaken. Beschrijving: De XML-RPC endpoint in Drupal Core bevat een kwetsbaarheid in het verwerken van... Read more

Source: www.ncsc.nl

Top found tags: DoS(1),NL(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in PHPLocation: Hewlett-Packard - Palo Alto, United States
Date published: 07-08-2014

Samenvatting: De makers van PHP hebben updates uitgebracht voor PHP5 die de kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan op afstand toegang verkrijgen tot gevoelige gegevens en kan mogelijk willekeurige code uitvoeren met de rechten van het PHP-proces. Beschrijving: - CVE-2014-0207, CVE... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Denial-Of-Service kwetsbaarheid in Cisco IOS en Cisco IOS XE verholpenLocation: Cisco HQ - San Jose, United States
Date published: 07-08-2014

Samenvatting: Er is een Denial-Of-Service kwetsbaarheid verholpen in Cisco IOS en Cisco IOS XE. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken om een herstart en dus een Denial-of-Service te veroorzaken. Dit kan op afstand en zonder authenticatie. Beschrijving: Een kwetsbaarheid in de v... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),OS X(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish