Under construction

New design coming soon!

CIC News engine statistics

CIC News for 08-08-2014 contains 119 articles: cybercrime(27),cyber security(37),data breach(11),other(44)

CIC News update contains 94 English and 25 Dutch articles for today.
There are 9 published advisories, 0 are English and 9 are Dutch.
In today's English news articles:
- 21 related to cybercrime
- 35 related to cyber security
- 11 related to data breach and identity theft
- 27 for the category other news

In today's Dutch news articles:
- 6 related to cybercrime
- 2 related to cyber security
- 17 for the category other news

Have fun reading.

English cybercrime related news

Cisco: Malicious Websites, DDoS and PoS, Oh MyLocation: Cisco HQ - San Jose, United States
Date published: 06-08-2014

The attacker community continues to evolve, innovate, and think up new ways to discover and exploit weak links in the security chain. And, they sometimes simply use tried and true methods to exploit some of the same old vulnerabilities that continue to present themselves. While these cybercriminal r... Read more

Source: www.infosecurity-magazine.com

Top found tags: DoS(2),exploit kit(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Iran-Linked Botnet Helps Drive Cyber-Attacks Against Israel Up By 500%Location: Tel Aviv, Israel
Date published: 07-08-2014

Cyber-attacks against Israel have increased 500% in the last month with a new report suggesting a powerful botnet controlled by an pro-Islamic Iranian group of hackers being used as part of an Anonymous-backed cyber-campaign.This week Arbor Network's ASERT team published research looking at the dram... Read more

Source: www.ibtimes.co.uk

Top found tags: Anonymous(2),DoS(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Natural Gas Companies Work to Secure Critical Infrastructure Against Cyber ThreatsLocation: New York, United States
Date published: 06-08-2014

According to an alert issued last year by the U.S. Department of Homeland Security, hackers using a tactic called spear phishing sent targeted emails to insert malware in computers belonging to natural gas sector organizations. In a separate series of attacks, intruders attempted to obtain inf... Read more

Source: breakingenergy.com

Top found tags: phishing(2),United States(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Iran-Linked Botnet Helps Drive Cyber-Attacks Against Israel Up By 500%Location: Tel Aviv, Israel
Date published: 07-08-2014

Cyber-attacks against Israel have increased 500% in the last month with a new report suggesting a powerful botnet controlled by an pro-Islamic Iranian group of hackers being used as part of an Anonymous-backed cyber-campaign.This week Arbor Network's ASERT team published research looking at the dram... Read more

Source: www.ibtimes.co.uk

Top found tags: Anonymous(2),DoS(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
48% of Financial Firms Fail to Take Cyber Crime SeriouslyLocation: Kaspersky HQ - Moscow, Russia
Date published: 06-08-2014

In a report by threat management system developer Kaspersky Lab and market research company B2B International, just over half of financial companies (52%) - and only 46% of firms engaged in e-commerce - believe in taking steps to provide enhanced protection for financial transactions. And even fewer... Read more

Source: www.misco.co.uk

Top found tags: financial sector(2),Kaspersky Lab(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chrysler Jeep Cherokee, Nissan Infiniti Q50 among most hackable carsLocation: Cherokee, United States
Date published: 07-08-2014

In a glaring exposure, the cyber security experts have cautioned the auto makers Chrysler and Nissan against the possible threat on their profitable car models, saying their vehicles are among the three most hackable cars along with a General Motors model.Cyber crime researchers Charlie Miller... Read more

Source: www.wallstreetotc.com

Top found tags: vulnerability(2),cybercrime(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Singaporeans fear cyber crimeLocation: Singapore
Date published: 07-08-2014

Concern over cyber crime is increasing in Singapore.A study by Paypal has found more than 75 per cent of Singaporeans shop online at least once a month, however, 57 per cent of them fear their financial details might be stolen by cyber criminals, 20 per cent worry theyre sharing their credit card... Read more

Source: insideretail.asia

Top found tags: credit card(2),financial sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kenya: Cyber Crime is a Threat to Security, Says CS Matiang'iLocation: Interpol - Lyon, France
Date published: 07-08-2014

ICT Secretary Fred Matiang'i has said cyber crime still pauses a critical danger to security information.He said the government needs to come up with modern ways of securing information.Speaking at United States International University during the internet and digital world forum yesterday, Matiang'... Read more

Source: allafrica.com

Top found tags: United States(2),cybercrime(3),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DOJ conducts Cybercrime Training for State LawyersLocation: Graft, Graft-De Rijp, Noord-Holland, The Netherlands
Date published: 05-08-2014

The, Department of Justice (DOJ) Office of Cybercrime (OOC) recently completed a two (2)-day training seminar for State Counsels, Public Attorneys in the National Capital Region (NCR) and representatives of the Inter-Agency Anti-Graft Coordinating Council (IAAGCC)on 31 July to 1 August 2014 in Manil... Read more

Source: www.doj.gov.ph

Top found tags: cybercrime(2),Department of Justice(3),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Make the Move to McAfee and Earn MoreLocation: McAfee - Santa Clara, United States
Date published: 07-08-2014

With the global cost of cybercrime adding up to over $400 billion dollars per year, security remains a top issue for todays business leaders. The launch of our new Make the Move program makes it easier for you to earn 10% in additional Deal Registration margin, when you successfully migrate a cus... Read more

Source: blogs.mcafee.com

Top found tags: EN(1),McAfee(1),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critical WordPress plugin bug affects hundreds of thousands of sitesLocation: WordPress - San Francisco, United States
Date published: 08-08-2014

warned Thursday. The vulnerability affects Custom Contacts Form, a plugin with more than 621,000 downloads, according to a blog postby researchers from Sucuri. It allows attackers to take unauthorized control of vulnerable websites. It stems from a bug affecting a function known as adminInit(). Ha... Read more

Source: arstechnica.com

Top found tags: vulnerability(1),website(1),WordPress(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat: Bruce Schneier talks incident response, trendsLocation: Black Hat - Las Vegas, United States
Date published: 08-08-2014

In his Black Hat 2014 session entitled The State of Incident Response, security guru Bruce Schneier, CTO of Co3 Systems, Inc., said that hackers will invariably breach networks, but it is what comes next that really matters. Placing a great deal of emphasis on automated systems and technology ... Read more

Source: www.scmagazine.com

Top found tags: Black Hat(4),Bruce Schneier(4),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat:"Saving cyberspace" requires next-level defense focusLocation: Black Hat - Las Vegas, United States
Date published: 08-08-2014

Fraudsters market new malware Kronos on underground The internet will only endure so much abuse before it's irreversibly damaged, Jason Healey said. At Black Hat 2014, a cyber conflict and security expert asked attendees to contemplate the irreversible damage facing the internet if abuse, such as go... Read more

Source: www.scmagazine.com

Top found tags: United States(2),cybercrime(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China refutes claim of government ban on Apple purchasesLocation: Apple HQ - Cupertino, United States
Date published: 08-08-2014

BEIJING (Reuters) - Apple Inc (AAPL.O) products such as laptops and tablets are not banned from Chinese government procurement lists, according to the country's chief procurement center, refuting a report claiming Apple was blacklisted on national security concerns. According to a Bloomberg News rep... Read more

Source: reuters.com

Top found tags: government(3),Kaspersky Lab(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Nest Thermostat hack could be used for spyingLocation: Google HQ - Mountain View, United States
Date published: 08-08-2014

phelanto. Google Nest Thermostat hack could be used for spying A team of researchers have discovered an easy hack that could be abused for surveillance of homeowners. Grant Hernandez and Yier Jin from the University of Central Florida, working with independent researcher Daniel Buentello, revealed t... Read more

Source: itproportal.com

Top found tags: Black Hat(2),conference(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Thousands of U.S. Devices Infected With New Gameover Zeus Variant: ReportLocation: Kiev, Ukraine
Date published: 08-08-2014

Researchers at Bitdefender have been monitoring two new Gameover Zeus variants spotted in the wild and found that most of the computers they have infected are located in the United States and Ukraine. The Gameover Zeus botnet was disrupted in June as a result of a takedown operation in which various... Read more

Source: securityweek.com

Top found tags: cybercrime(3),financial sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Cyber Business Intelligence Can Be Your "Canary in the Boardroom"Location: Neiman Marcus - Dallas, United States
Date published: 08-08-2014

Cyber Business Intelligence is Quickly Becoming the Canary in the Boardroom Well into the 20th century, coal miners used canaries to detect methane and other poisonous gases. The ability of the tiny birds to sense even small amounts of potentially harmful gases is legendary and saved many live... Read more

Source: securityweek.com

Top found tags: cybercrime(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminals Steal Cryptocurrency Via BGP HijackingLocation: Dell HQ - Round Rock, United States
Date published: 08-08-2014

Cybercriminals Steal Cryptocurrency from Mining Pools Via BGP Hijacking Over the course of four months, threat actors managed to make tens of thousands of dollars by redirecting the connections of cryptocurrency miners to mining pools they control, the research team at Dell SecureWorks' Counter Thre... Read more

Source: securityweek.com

Top found tags: financial sector(2),cybercrime(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobiles hijacked without user knowledgeLocation: Google HQ - Mountain View, United States
Date published: 08-08-2014

Android is extremely susceptible to malware within its advertisement libraries says FireEye. Mobiles hijacked without user knowledge Mobiles hijacked without user knowledge FireEye has posted a video showing how hackers can gain control of android mobile devices without the owners' knowledge - even ... Read more

Source: www.scmagazineuk.com

Top found tags: mobile device(2),cybercrime(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
More than 40 governments hit by suspected Russian-state cyber attackLocation: Kaspersky HQ - Moscow, Russia
Date published: 08-08-2014

A likely Russian state cyber-attack has hit a Western European government ministry, a US medical organisation and more than 45 Eastern Bloc and Middle East governments, according to new information from Kaspersky and Symantec. More than 40 governments hit by suspected Russian-state cyber attack More... Read more

Source: www.scmagazineuk.com

Top found tags: cybercrime(4),telecom sector(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Intruder alert: Cyber thugs are using steganography to slip in malware badnessLocation: Stone, United States
Date published: 08-08-2014

Common or garden cybercrooks have taken to using steganography the art of hiding secret information within another image or message file to run a click-fraud scam. Steganography has long been the stuff of spy trade-craft and cypherpunk novels, but now cybercrooks have made the practice downm... Read more

Source: go.theregister.com

Top found tags: website(1),cyber espionage(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Registration Opens For The Next Cybersecurity Framework WorkshopLocation: National Institute of Standards - Gaithersburg, United States
Date published: 06-08-2014

The National Institute of Standards and Technology (NIST) will hold a workshop on the Framework for Improving Critical Infrastructure Cybersecurity on Oct. 29 and 30, hosted by the Florida Center for Cybersecurity(FC2) located at the University of South Florida in Tampa. The purpose of the Cybersecu... Read more

Source: www.hstoday.us

Top found tags: update(2),cyber security(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Scary State of Cybersecurity and Critical InfrastructureLocation: United States Capitol - Washington D.C., United States
Date published: 05-08-2014

Among the already scary global state of affairs, cybersecurity and critical infrastructure are also areas that have become increasingly tense. In July, The Economist ran a special section on cybersecurity, and one of the stories focused on critical infrastructure attacks. One passage explains perhap... Read more

Source: www.itbusinessedge.com

Top found tags: Ponemon Institute(2),United States(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Anfield Group and Tripwire Announce Cybersecurity PartnershipLocation: Moscow, Russia
Date published: 06-08-2014

The Anfield Group, a global cyber security and reliability consulting firm, and Tripwire, Inc., a leading global provider of advanced threat, security and compliance solutions, today announced a cybersecurity technology partnership. The partnership is part of the Tripwire NERC Alliance Network (NAN)... Read more

Source: www.digitaljournal.com

Top found tags: government(2),cyber security(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nation-E cyber-security centre fosters IT-operational security collaborationLocation: New York, United States
Date published: 07-08-2014

Australian utilities are being encouraged to get involved in a new centre of excellence (CoE) launched to improve long-ignored infrastructure security by improving collaboration between information technology and operational technology leaders.The Energy Cyber Security Center (ECSC), developed and e... Read more

Source: www.cso.com.au

Top found tags: training(1),vulnerability(1),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is Russia Really the Cybercrime Capital?Location: Moscow, Russia
Date published: 06-08-2014

The New York Times reported yesterday that a Russian crime ring had assembled a collection of more than a billion Internet passwords. While some are casting doubt on claims that this is the biggest hack ever, it does appear to be a significant milestone in the history of cybercrime as well as ... Read more

Source: www.slate.com

Top found tags: financial sector(4),United States(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Expert Warns of Chip-and-PIN PitfallsLocation: Warns, Nijefurd, Friesland, The Netherlands
Date published: 07-08-2014

Alexander In the Wake of the Snowden remote access tool RAT Malware Communicating Via Yahoo Mail Podcasts Latest Podcasts All MSFT-takedown Threatpost News Wrap, July 4, 2014 Encrypt! Threatpost News Wrap, June 23, 2014 nsa_spying Threatpost News Wrap, June 6, 2014 How I Got Here: Joe Grand H... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),telecom sector(4),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Yahoo to Release End-to-End Encryption for Email UsersLocation: Twitter - San Francisco, United States
Date published: 07-08-2014

Alexander In the Wake of the Snowden remote access tool RAT Malware Communicating Via Yahoo Mail Podcasts Latest Podcasts All MSFT-takedown Threatpost News Wrap, July 4, 2014 Encrypt! Threatpost News Wrap, June 23, 2014 nsa_spying Threatpost News Wrap, June 6, 2014 How I Got Here: Joe Grand H... Read more

Source: threatpost.com

Top found tags: telecom sector(2),Kaspersky Lab(4),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook Looks to Boost Server Security With Acquisition of Cybersecurity StartupLocation: Facebook - Menlo Park, United States
Date published: 07-08-2014

In a move to bolster the security of its massive global server network, Facebook announced on Thursday it was acquiring Palo Alto, California-based cybersecurity startup PrivateCore. PrivateCore describes that its vCage software transparently secures data in use with full memory encryption for any a... Read more

Source: securityweek.com

Top found tags: threat(1),social media(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat: Expert sheds light on government sponsored malware creationLocation: Black Hat - Las Vegas, United States
Date published: 07-08-2014

Black Hat: Expert sheds light on government sponsored malware creation Black Hat: Expert sheds light on government sponsored malware creation Parallels can be made between the nuclear arms race of the 1940s and the activities governments are currently involved in within the cyber threat landscape, a... Read more

Source: www.scmagazine.com

Top found tags: trojan(2),Black Hat(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man arrested in Utah university breach affecting 1,200Location: Utah, United States
Date published: 07-08-2014

Up to 1,200 students, faculty and staff at Webster State University (WSU) in Utah might have had personal information compromised earlier this year and the man suspected of the breach has been nabbed. Joseph W. Langford was arrested and charged for burglary in connection with the case, according to ... Read more

Source: www.scmagazine.com

Top found tags: police(1),cyber security(2),education(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat: Airport security equipment at riskLocation: Black Hat - Las Vegas, United States
Date published: 07-08-2014

Black Hat: Airport security equipment at risk Bugs in trace detection scanners, x-ray machines and time and attendance clocks could make them vulnerable to attack, according to experts. While the Transportation Safety Administration and the Department of Homeland Security are very exacting in the sp... Read more

Source: www.scmagazine.com

Top found tags: DHS(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Yahoo CISO: End-to-end Mail encryption by 2015Location: Yahoo HQ - Sunnyvale, United States
Date published: 08-08-2014

Today at Black Hat USA 2014, Yahoo's CISO announced in a presentation that consumers will be seeing end-to-end encryption in its Mail product by 2015. Announcing a new PGP plugin that piggybacks off of Google's PGP plugin, Alex Stamos told the audience at his talk Building Safe Systems at Scale - Le... Read more

Source: www.zdnet.com

Top found tags: Electronic Frontier Foundation(3),government(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Podcast: Black Hat News WrapLocation: Black Hat - Las Vegas, United States
Date published: 08-08-2014

Alexander In the Wake of the Snowden remote access tool RAT Malware Communicating Via Yahoo Mail Podcasts Latest Podcasts All BlackHat keynote_Geer Podcast: Black Hat News Wrap MSFT-takedown Threatpost News Wrap, July 4, 2014 Encrypt! Threatpost News Wrap, June 23, 2014 nsa_spying Threatpost ... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),Black Hat(6),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Connected Medical Devices Simultaneously Increase Risk and SafetyLocation: Black Hat - Las Vegas, United States
Date published: 08-08-2014

Alexander In the Wake of the Snowden remote access tool RAT Malware Communicating Via Yahoo Mail Podcasts Latest Podcasts All BlackHat keynote_Geer Podcast: Black Hat News Wrap MSFT-takedown Threatpost News Wrap, July 4, 2014 Encrypt! Threatpost News Wrap, June 23, 2014 nsa_spying Threatpost ... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),Black Hat(6),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Network hijacker steals $83,000 in Bitcoin ... and enough Dogecoin for a cup of coffeeLocation: Dell HQ - Round Rock, United States
Date published: 07-08-2014

Researchers at Dell's SecureWorks Counter Threat Unit (CTU) have identified an exploit that can be used to steal cryptocurrency from mining pools and they claim that at least one unknown miscreant has already used the technique to pilfer tens of thousands of dollars in digital cash. The heist wa... Read more

Source: go.theregister.com

Top found tags: cyber security(2),financial sector(2),ISP(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Yahoo to begin offering PGP encryption support in Yahoo Mail serviceLocation: Yahoo HQ - Sunnyvale, United States
Date published: 08-08-2014

willbegin giving users the option of seamlessly wrapping their e-mails in PGP encryption. According to Kashmir Hill at Forbes, the encryption capability will be offered through a modified version of the same End-to-End browser plug-in that Google uses for PGP in Gmail. The announcement was tweeted... Read more

Source: arstechnica.com

Top found tags: e-mail(3),telecom sector(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Yahoo! to! deploy! E2E! crypto! by! 2015!Location: Yahoo HQ - Sunnyvale, United States
Date published: 08-08-2014

Yahoo will fire up end-to-end (E2E) encryption for its email users by 2015, chief security officer Alex Stamos announced at Black Hat overnight. The Purple Palace has also created a PGP plugin forked from Google's new offering that will be native in mobile apps allowing Gmail and Yahoo mail to easil... Read more

Source: go.theregister.com

Top found tags: Electronic Frontier Foundation(3),Black Hat(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DON'T PANIC! Satellite comms hacking won't be able to crash an aircraftLocation: Black Hat - Las Vegas, United States
Date published: 08-08-2014

Black Hat 2014 Nervous fliers have one less thing to worry about after it turns out that, despite some alarmist reports, hackers won't be making planes fall out of the sky any time soon. The sensational headlines came after reporters learned that Ruben Santamarta, a consultant with security firm IOA... Read more

Source: go.theregister.com

Top found tags: conference(2),cyber security(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data retention laws increase privacy breach risk: PilgrimLocation: New York, United States
Date published: 08-08-2014

By AAP August 8, 2014 -- 07:49 GMT (08:49 BST) The coalition's plan to have telcos retain the phone and internet records of millions of people will increase the risk of a privacy breach, the Australian Privacy Commissioner warns. Timothy Pilgrim, who was not consulted before the government announced... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
More Details Regarding the Gizmodo Brazil CompromiseLocation: Brasilia-Federal District, Brazil
Date published: 08-08-2014

At the tail end of July, we wrote about Gizmodo Brazil being compromised by cybercriminals in order to lead visitors into downloading backdoor malware into their machine. This is of course a very big deal, since it is a rather large and noteworthy website being hacked into but its par for the... Read more

Source: trendmicro.com

Top found tags: Trend Micro(2),vulnerability(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat: Yahoo to implement end-to-end mail encryption by next yearLocation: Yahoo HQ - Sunnyvale, United States
Date published: 08-08-2014

Yahoo will implement end-to-end mail encryption for its users by next year, according to an announcement made by its CISO. Presenting at this year's Black Hat conference in Las Vegas, Alex Stamos, CISO at Yahoo, shared the news with the audience. The new feature of its Mail system, which will be imp... Read more

Source: www.scmagazine.com

Top found tags: cyber security(2),Google(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
An Analysis of the Backoff PoS MalwareLocation: Microsoft HQ - Redmond, United States
Date published: 07-08-2014

On July 31, 2014, the United States Computer Emergency Readiness Team (US-CERT) published an advisory of a newly identified point-of-sale (PoS) malware dubbed Backoff. This family of PoS malware consists of three versions: 1.44, 1.55, and the most recent 1.56. Backoff variants began to have ve... Read more

Source: blog.fortinet.com

Top found tags: update(2),cybercrime(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker hijacks ISPs, steals $83,000 from Bitcoin mining poolsLocation: Dell HQ - Round Rock, United States
Date published: 08-08-2014

It's no longer surprising when we hear a cryptocurrency exchange has suffered a security breach, but now a hacker has targeted mining pools -- and managed to steal $83,000 in cryptocurrency as a result. The Dell SecureWorks Counter Threat Unit (CTU) research team said Thursday they have identified a... Read more

Source: www.zdnet.com

Top found tags: threat(1),financial sector(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to Use Your Cat to Hack Your Neighbors Wi-FiLocation: DEF CON - Las Vegas, United States
Date published: 08-08-2014

Coco, modeling the WarKitteh collar. Coco, modeling the WarKitteh collar. [gallery-ca] Gene Bransfield Late last month, a Siamese cat named Coco went wandering in his suburban Washington, DC neighborhood. He spent three hours exploring nearby backyards. He killed a mouse, whose carcass he thoughtful... Read more

Source: wired.com

Top found tags: information security(2),cyber security(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2 bilion mobile devices vulnerable: Black Hat reportLocation: Black Hat - Las Vegas, United States
Date published: 08-08-2014

2 bilion mobile devices vulnerable: Black Hat report 2 bilion mobile devices vulnerable: Black Hat report Hidden controls found in a wide array of devices from smart phones and laptops to embedded M2M devices and some cars could be leveraged by attackers for wide scale exploitation, research... Read more

Source: www.scmagazineuk.com

Top found tags: vulnerability(2),Black Hat(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why businesses must urgently change the way they think about cyber securityLocation: Palo Alto, United States
Date published: 08-08-2014

By failing to share information and experience, corporations always remain a step behind the hackers With the continued growth and spread of computing, we are close to seeing an increase from around 5 billion users online to 7 billion, as well as 50 billion things. In such a world, how d... Read more

Source: www.information-age.com

Top found tags: government(3),cyber security(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Austrian court rejects Facebook 'class action' privacy suit, refers it to another courtLocation: Facebook - Menlo Park, United States
Date published: 08-08-2014

Austrian court rejects Facebook 'class action' privacy suit, refers it to another court A class action suit against Facebook over its privacy policies was rejected by the commercial court of Vienna, and referred to the regional court in the same city, a commercial court spokesman said Friday. ... Read more

Source: www.pcworld.com

Top found tags: government(2),social media(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IE to Block Older ActiveX Controls, Starting with JavaLocation: Microsoft HQ - Redmond, United States
Date published: 08-08-2014

Alexander In the Wake of the Snowden remote access tool RAT Malware Communicating Via Yahoo Mail Podcasts Latest Podcasts All BlackHat keynote_Geer Podcast: Black Hat News Wrap MSFT-takedown Threatpost News Wrap, July 4, 2014 Encrypt! Threatpost News Wrap, June 23, 2014 nsa_spying Threatpost ... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),Black Hat(6),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker swipes $83,000 from Bitcoin mining poolsLocation: Dell HQ - Round Rock, United States
Date published: 08-08-2014

It's no longer surprising when we hear that a cryptocurrency exchange has suffered a security breach, but now a hacker has targeted mining pools -- and managed to steal $83,000 in cryptocurrency as a result. The Dell SecureWorks Counter Threat Unit (CTU) research team said Thursday it has identified... Read more

Source: cnet.com.ortal.com

Top found tags: threat(1),financial sector(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cancer Clinic Employee Charged with Theft of Patient DataLocation: Riverside, United States
Date published: 08-08-2014

Virginia's Riverside Health System has acknowledged that a former employee of the Riverside-owned Cancer Specialists of Tidewater has been charged with improperly accessing patients' credit card information and Social Security numbers (h/t PHIprivacy.net). T'sha Riddick, 33, worked for almost two ye... Read more

Source: www.esecurityplanet.com

Top found tags: medical sector(2),United Kingdom(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Android vulnerability hands over full access to camera, dialler and moreLocation: Google HQ - Mountain View, United States
Date published: 08-08-2014

. Android smartphone owners are being warned to be on the look out for a vulnerability that lets an attacker gain full access to a device and carry out any actions they want to. Related: Inherent vulnerabilities pose risk to Android, BlackBerry and Apple devices FireEye Labs identified the new vulne... Read more

Source: itproportal.com

Top found tags: mobile device(2),vulnerability(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Podcast: Black Hat News Wrap, Day TwoLocation: Black Hat - Las Vegas, United States
Date published: 08-08-2014

Dennis Fisher, Mike Mimoso and Brian Donohue discuss the news from day two of Black Hat, including a CryptoLocker working group, a medical device security and privacy roundtable and overview of the various security and privacy improvements at Yahoo over the last year. http://threatpost.com/files/201... Read more

Source: threatpost.com

Top found tags: threat(1),cyber security(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Data Breach Bulletin: Credit Card Breach Confirmed At 33 P.F. Chang's LocationsLocation: New York, United States
Date published: 06-08-2014

Heres a roundup of the latest data breach news for the week of July 28, 2014.P.F. Changs After two months of investigation following the discovery of a possible credit card breach in June, P.F. Changs China Bistro has now revealed that 33 restaurants across the country were affected by ... Read more

Source: www.forbes.com

Top found tags: credit card(2),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Another Data Breach? How To Use A Password ManagerLocation: Moscow, Russia
Date published: 06-08-2014

GREENSBORO, NC -- Another data breach. This time, a Milwaukee company called \"Hold Security\" said a gang of Russian thieves stole 1.2 billion user names and passwords.Now the way the gang got this information is nothing new. But this breach is believed to be the biggest combined data theft in hist... Read more

Source: www.wfmynews2.com

Top found tags: cyber security(2),data breach(2),data theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Suspect Arrested In Connection With Data Breach At Weber StateLocation: Weber, United States
Date published: 06-08-2014

A suspect has been arrested in connection with a data breach at Weber State University.Officers say the student, whose name is not released at this time, broke into the Science Lab Building and stole personal information and exams from a series of computers. About 1,200 students and staff members ar... Read more

Source: www.kutv.com

Top found tags: EN(1),data breach(2),education(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Identity theft costing Floridians millionsLocation: Florida, United States
Date published: 07-08-2014

ORANGE PARK One of the newest trends in identity theft involves stealing the IDs of infants and small children.Cathy Costley, a victims services program specialist in the Florida Attorney Generals Jacksonville Office, told a Clay County audience recently that thieves will stop at nothing to g... Read more

Source: www.claytodayonline.com

Top found tags: credit card(2),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Computer security concerns in wake of massive data breachLocation: McAfee - Santa Clara, United States
Date published: 06-08-2014

EMERYVILLE, Calif. A gang of Russian hackers has stolen 1.2 billion usernames and passwords as well as a half-billion email accounts, from 420,000 business websites.This case is the largest of a string of mega hacks in recent years.It all boils down to one ultimate question: Is the digital secur... Read more

Source: www.ktvu.com

Top found tags: cybercrime(3),Electronic Frontier Foundation(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Local Cybersecurity Expert Weighs In On Data Breach Of More Than A Billion Usernames And PasswordsLocation: Moscow, Russia
Date published: 06-08-2014

PHILADELPHIA (CBS) A top security firm says a group of Russian hackers stole over a billion usernames and passwords after going through more than 400,000 websites.If youre watching the news every single day, its happening every single day right now, said Norm Balchunas, Director of D... Read more

Source: philadelphia.cbslocal.com

Top found tags: cyber security(2),data breach(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Homeland Security halts work with U.S. contractor after data breachLocation: Department of Homeland Security - Washington, United States
Date published: 07-08-2014

WASHINGTON >> A major U.S. contractor that conducts background checks for the Department of Homeland Security has suffered a computer breach that probably resulted in the theft of employees personal information, officials said Wednesday.The company, USIS, said in a statement that the intrusion ... Read more

Source: www.nhregister.com

Top found tags: DHS(4),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Your passwords are like money in a bank vault: ColumnLocation: Federal Trade Commission - Washington, United States
Date published: 07-08-2014

Data breaches are a threat to consumer confidence, and a wake-up call for businesses, policymakers.When asked why he robbed banks, slick Willie Sutton is said to have remarked, \"Because that's where the money is.\" For today's cybercriminals, the Internet is where the money is full to the brim ... Read more

Source: www.usatoday.com

Top found tags: telecom sector(4),United States(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
To stop security breaches, kill the username and passwordLocation: Facebook - Menlo Park, United States
Date published: 07-08-2014

secure passwords helps, as does using different ones for every site you visit. You can also use multiple email addresses, even different physical aliases and addresses for online shopping. But, so long as the sites you use keep proving vulnerable, some segment of your data will always be at risk. Th... Read more

Source: cnet.com.ortal.com

Top found tags: cyber security(4),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fighting fire with fire will lead us to a dangerous futureLocation: McAfee - Santa Clara, United States
Date published: 07-08-2014

Perfect cybersecurity is a myth. Defenders face an asymmetric strategic challenge. In the current environment, the concept of active defense has gained popularity among armed forces and some companies. Active defense is a military term that refers to efforts to thwart an attack by attacking th... Read more

Source: blogs.mcafee.com

Top found tags: government(3),cyber security(4),cybercrime(13)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What the Cyber Essentials Scheme means for UK businessLocation: New York, United States
Date published: 08-08-2014

The government's initiative to set a baseline certification scheme for cyber security, Cyber Essentials, is now underway and John Godwin encourages companies to get certified as soon as possible. What the Cyber Essentials Scheme means for UK business What the Cyber Essentials Scheme means for UK bus... Read more

Source: www.scmagazineuk.com

Top found tags: government(2),information security(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Police charge 2 in Kona credit card fraud caseLocation: New York, United States
Date published: 05-08-2014

Big Island police have charged the remaining two people who had been sought for fraudulent use of a credit card in Kona.At 12:25 p.m. Tuesday, Luke Kaniaupio, 21, of Kailua-Kona was charged with burglary, criminal property damage, two counts of unauthorized control of a propelled vehicle, five count... Read more

Source: westhawaiitoday.com

Top found tags: police(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Skimming: The new frontier for ATM fraudLocation: Phuket, Thailand
Date published: 07-08-2014

BANKS are spending millions of baht upgrading ATMs throughout the country and hope to replace all ATM cards with more secure microchipped versions by the end of next year. The project aims to stem the rising tide of the worlds fastest-growing computer crime: skimming. But what are the best ways t... Read more

Source: www.phuketgazette.net

Top found tags: government(2),Thailand(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Credit card fraud hits P.E.I. woman 3 times this summerLocation: Hitchcock, United States
Date published: 07-08-2014

One Charlottetown woman is encouraging people to report credit card fraud to police after her information was stolen three times in the past month and a half.Jesse Hitchcock is on credit card number four since mid-June.\"You feel a little weird especially because, in this case, the bank told me that... Read more

Source: www.cbc.ca

Top found tags: credit card(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Another Washington Think Tank Paper on Critical Infrastructure - Another MissLocation: Washington, United States
Date published: 07-08-2014

The most recent Washington think tank to write a paper involving cyber security and the electric grid is the Center for the Study of the Presidency and Congress and the paper is Understanding the threats to the most critical infrastructure while securing a changing grid. As with the other pape... Read more

Source: www.infosecisland.com

Top found tags: threat(1),energy(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Site Recovers Files Locked by Cryptolocker RansomwareLocation: Microsoft HQ - Redmond, United States
Date published: 06-08-2014

Until today, Microsoft Windows users whove been unfortunate enough to have the personal files on their computer encrypted and held for ransom by a nasty strain of malware called CryptoLocker have been faced with a tough choice: Pay cybercrooks a ransom of a few hundred to several thousand dollars... Read more

Source: krebsonsecurity.com

Top found tags: Microsoft(2),The Netherlands(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Judge Won't Free Russian Accused of HackingLocation: Moscow, Russia
Date published: 06-08-2014

A federal judge in the U.S. territory of Guam denied a motion [to] release a Russian lawmaker's son accused of hacking computers inside hundreds of U.S. businesses.U.S. District Court Chief Judge Frances Tydingco-Gatewood ruled her court had jurisdiction over the case against Roman Seleznev and allo... Read more

Source: www.cio-today.com

Top found tags: malware(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australian whistleblower charged after leaking information on prime minister's daughterLocation: New York, United States
Date published: 07-08-2014

A 20-year-old whistleblower is being investigated in Australia after leaking documents showing that Frances Abbott, the daughter of Prime Minister Tony Abbott, received a large, unadvertised scholarship to a private college. Freya Newman, a former part-time librarian at the Whitehouse Institute of D... Read more

Source: www.scmagazine.com

Top found tags: France(1),Australia(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Breach of USIS believed to be state-sponsored, DHS reportedly impactedLocation: Department of Homeland Security - Washington, United States
Date published: 07-08-2014

A provider of information and security services to government agencies and commercial enterprises, including the Department of Homeland Security (DHS) and Office of Personnel Management (OPM), has been breached. U.S. Investigations Services, LLC (USIS) announced in statement posted on Wednesday that... Read more

Source: www.scmagazine.com

Top found tags: DHS(4),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Awooga: August Patch Tuesday incoming with two remote-code exec bugs in IE, WindowsLocation: Microsoft HQ - Redmond, United States
Date published: 07-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Microsoft has published advance notification for what it says will be a total of nine security update bulletins for its products two of which are rated critical. The company said that the latest patch batch, set to arrive on August 12, w... Read more

Source: go.theregister.com

Top found tags: patch(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft throws old versions of Internet Explorer under the busLocation: Microsoft HQ - Redmond, United States
Date published: 07-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Microsoft has confirmed that it's ending support for old versions of Internet Explorer, and it's giving you just shy of 18 months to get up to date. Roger Capriotti, director of the IE team, blogged on Thursday that beginning on January 12, ... Read more

Source: go.theregister.com

Top found tags: telecom sector(2),United States(2),Google(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Flying United Airlines? If you could just scan your passport with your phone, that'd be greatLocation: New York, United States
Date published: 07-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines United Airlines is testing a passport-scanning feature in its phone app that could speed up the check-in process for international flights. The biz's iOS and Android software will allow passengers to upload an image of their passports within... Read more

Source: go.theregister.com

Top found tags: NFC(2),United Kingdom(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Best in Show: Black Hat USA 2014Location: Black Hat - Las Vegas, United States
Date published: 08-08-2014

Leading security conference Black Hat showcased its 2014 USA vendors and sponsors in its sprawling new location at Mandalay Bay, Las Vegas, Nevada. Over 8,000 attendees wandered through the expo floor, where America's largest security companies and startups alike presented schwag, new hacking hardwa... Read more

Source: www.zdnet.com

Top found tags: training(1),conference(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tomorrow Daily 032: Hacking the human body, 3D-printed birds, robo-bees, and moreLocation: Twitter - San Francisco, United States
Date published: 08-08-2014

Rich is out of town today, so Mike Hobbs is stepping in to co-host the show. That means a Mario Kart challenge is imminent... Oh, and we're also talking about students hacking the human body, robo-birds, and robo-bees. There's some crazy tech coming our way in a few years. We're sure someone will ta... Read more

Source: cnet.com.ortal.com

Top found tags: research(1),Twitter(1),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sysinternals new Sysmon tool looks for intruder tracesLocation: Microsoft HQ - Redmond, United States
Date published: 08-08-2014

monitors for and logs certain specific events. Sysinternals is a set of Windows utility programs first released in 1996, long before Russinovich joined Microsoft. Almost all were written by Russinovich and his then-partner Bruce Cogswell. Sysmon, written by Russinovich and Thomas Garnier, also of Mi... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook acquires server security firm PrivateCoreLocation: Facebook - Menlo Park, United States
Date published: 08-08-2014

Lulea, Sweden Facebook Looking to make user data more secure, Facebook announced Thursday that it has acquired secure server technology company PrivateCore. PrivateCore, which was founded in 2012 and is based in Palo Alto, Calif., develops software that authenticates and secures server data. The com... Read more

Source: cnet.com.ortal.com

Top found tags: WhatsApp(1),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Prepping Nine Security Bulletins for Patch TuesdayLocation: Microsoft HQ - Redmond, United States
Date published: 08-08-2014

Microsoft has two 'critical' bulletins planned for release next week as part of this month's Patch Tuesday update. The two bulletins deal with issues in Windows and Internet Explorer, respectively, and both address vulnerabilities that could lead to remote code execution. All together, Microsoft is ... Read more

Source: securityweek.com

Top found tags: update(2),vulnerability(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat: Mind Your Hypervisors, Says Security ResearcherLocation: Black Hat - Las Vegas, United States
Date published: 08-08-2014

Security Researcher Explains How Vulnerable Hypervisors Put Enterprises At Risk Hypervisors have become an important part of enterprise environments and while they should normally reduce the attack surface, experts warn that they can be plagued by security vulnerabilities that could be leveraged by ... Read more

Source: securityweek.com

Top found tags: government(3),vulnerability(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russia grants Snowden three-year residenceLocation: National Security Agency - Fort Meade, United States
Date published: 08-08-2014

By AAP August 8, 2014 -- 04:07 GMT (05:07 BST) Fugitive US intelligence operative Edward Snowden has been granted a three-year residence permit in Russia, his Russian lawyer says. "The request was accepted and accordingly Edward Snowden was given a three-year residence permit" which allows him to mo... Read more

Source: www.zdnet.com

Top found tags: airport sector(2),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russia grants Snowden three-year residenceLocation: National Security Agency - Fort Meade, United States
Date published: 08-08-2014

By AAP August 8, 2014 -- 04:07 GMT (05:07 BST) Fugitive US intelligence operative Edward Snowden has been granted a three-year residence permit in Russia, his Russian lawyer says. "The request was accepted and accordingly Edward Snowden was given a three-year residence permit" which allows him to mo... Read more

Source: www.zdnet.com

Top found tags: airport sector(2),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government boasts that superfast broadband rollout has reached a million UK homes and businessesLocation: Brussels,Belgium
Date published: 08-08-2014

Government boasts that superfast broadband rollout has reached a million UK. homes and businesses The government has announced that its superfast broadband rollout has now reached the one million milestone in terms of households and businesses which have been covered. Apparently the 1.7 billion pr... Read more

Source: itproportal.com

Top found tags: EU(1),government(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Up to two BEEELLION' mobes easily hacked by evil base stationsLocation: Black Hat - Las Vegas, United States
Date published: 08-08-2014

Black Hat 2014 videos The mechanisms used to update smartphone operating systems over the air are vulnerable to hijacking and abuse, researchers have claimed. Speaking at the Black Hat conference in Las Vegas on Thursday, the infosec bods believe up to two billion handsets are at risk, and that in s... Read more

Source: go.theregister.com

Top found tags: Black Hat(4),mobile device(4),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mozilla posts plan for certificate revocation checkingLocation: Google HQ - Mountain View, United States
Date published: 08-08-2014

2014 seems to be the year of the great certificate revocation debate. Revocation was always a sore subject with cryptoheads, but the noise level on the issue shot up to 11 this spring with the news of the Heartbleed bug in OpenSSL. As is often the case with TLS/SSL, Google was out front on this prob... Read more

Source: www.zdnet.com

Top found tags: Microsoft(2),OpenSSL(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Codenomicon Program Helps Verify Security of Critical SystemsLocation: Helsinki, Finland
Date published: 08-08-2014

Codenomicon, the Finland-based security firm that claimed discovery (along with Googles Neel Mehta) and branded the Heartbleed bug, has launched a new verification program designed to help critical systems manufacturers test the security and robustness of their products. Dubbed CodeVerify by the ... Read more

Source: securityweek.com

Top found tags: Verizon(1),critical infrastructure(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Smartcard firm Gemalto slurps SafeNet in $890m securo-boost dealLocation: New York, United States
Date published: 08-08-2014

Security company Gemalto is buying data protection firm SafeNet. The deal, announced Friday, is valued at $890m and is being financed through cash and existing long-term credit facilities. Once completed the acquisition will add data protection technologies to Gemalto's core authentication products ... Read more

Source: go.theregister.com

Top found tags: EN(1),financial sector(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russia bans anonymous Wi-FiLocation: Moscow, Russia
Date published: 08-08-2014

The report says that Prime Minister Dmitry Medvedev has signed an order banning such access to the Internet in establishments offering Wi-Fi connections, such as restaurants and public spaces. Instead, the operators of the communications services will have to identify users with a full name confirme... Read more

Source: www.zdnet.com

Top found tags: Russia(1),Anonymous(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gemalto to Acquire SafeNet for $890 MillionLocation: New York, United States
Date published: 08-08-2014

European security firm Gemalto said on Friday that it has agreed to buy data protection firm SafeNet for $890 million in cash. Gemalto says the move will help expand its footprint in cloud data, software and transaction security, and adds core network data protection technologies to its authenticati... Read more

Source: securityweek.com

Top found tags: bank(1),EN(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russia bans anonymous wifiLocation: Moscow, Russia
Date published: 08-08-2014

According to the state-owned news agency ITAR-TASS, the government of Russia has banned anonymous access to wifi. The report says that Prime Minister Dmitry Medvedev has signed an order banning such access to the internet in establishments offering wifi connections, such as restaurants and public sp... Read more

Source: www.zdnet.com

Top found tags: wireless(1),Anonymous(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Misbruikt Amerikaans bedrijf \"grootste datadiefstal ooit\"?Location: New York Times - New York, United States
Date published: 07-08-2014

Volgens Hold Security, een Amerikaans internetbeveiligingsbedrijf, heeft een groep Russische hackers niet minder dan 1,2 miljard online-identiteiten wereldwijd gestolen. Het zou gaan om de grootste diefstal van onlinegegevens ooit. Experts stellen zich echter vragen bij de claim van het bedrijf.Volg... Read more

Source: m.demorgen.be

Top found tags: data theft(2),United States(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminelen zoeken weer Nederlandse katvangersLocation: Amsterdam, The Netherlands
Date published: 08-08-2014

Na een golf van phishingaanvallen op Nederlandse internetgebruikers de afgelopen maanden lijken criminelen nu weer op zoek naar Nederlandse katvangers die hun rekening ter beschikking willen stellen. De e-mails die rondgaan hebben als onderwerp "Beschikbare posities - Nederland" en "nieuwe Baan". Vo... Read more

Source: www.security.nl

Top found tags: financial sector(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple GoTo Fail grootste beveiligingsblunder 2014Location: Las Vegas, Nevada, United States
Date published: 08-08-2014

De Goto Fail van Apple is tijdens de jaarlijkse Pwnie Awards in Las Vegas uitgeroepen tot de grootste beveiligingsblunder van 2014. De uitreiking van de Pwnie Awards vond deze week plaats tijdens de Black Hat conferentie in Las Vegas. Het is een prijs voor de grootste beveiligingsblunders, ergste le... Read more

Source: www.security.nl

Top found tags: financial sector(2),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internetverkeer van 19 providers gekaapt voor bitcoindiefstalLocation: Toronto, Canada
Date published: 08-08-2014

Een cybercrimineel is er tussen februari en mei van dit jaar erin geslaagd om 51 netwerken van 19 verschillende internetproviders, waaronder Amazon, Digital Ocean en LeaseWeb, te kapen om zo bitcoins en andere digitale valuta te kunnen stelen. De aanvaller richtte zich op zogeheten "bitcoin mining p... Read more

Source: www.security.nl

Top found tags: cybercrime(2),financial sector(2),ISP(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Keurmerk voor internetbankieren controleert staat computerLocation: Amsterdam, The Netherlands
Date published: 08-08-2014

Het webwinkelkeurmerk ICTWaarborg heeft een nieuw keurmerk gelanceerd waarmee consumenten zeker zouden weten dat hun computer voldoet aan de bankregels voor veilig internetbankieren. ICTKeurmerk, zoals het keurmerk word genoemd, controleert de computer aan de hand van acht punten. Het gaat dan om de... Read more

Source: www.security.nl

Top found tags: online banking(2),financial sector(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker laat kat kwetsbare wifi-netwerken opsporenLocation: Las Vegas, Nevada, United States
Date published: 08-08-2014

Een hacker heeft voor katten een halsband gemaakt waarmee kwetsbare wifi-netwerken kunnen worden opgespoord. "WarKitteh", zoals Gene Bransfield de halsband noemt, is een variatie op wardriving, waarbij er via een auto naar openstaande of slecht beveiligde wifi-netwerken wordt gezocht. Bransfield wer... Read more

Source: www.security.nl

Top found tags: wireless(1),DEF CON(2),conference(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Yahoo gaat e-mail gebruikers met PGP versleutelenLocation: Yahoo HQ - Sunnyvale, United States
Date published: 08-08-2014

Yahoo zal later dit jaar een PGP-plug-in aan gebruikers van Yahoo Mail gaan aanbieden waarmee ze hun e-mail volledig kunnen versleutelen, zo heeft de internetgigant tijdens de Black Hat conferentie in Las Vegas laten weten. De plug-in is gebaseerd op de PGP-plug-in van Google, die in juni werd onthu... Read more

Source: www.security.nl

Top found tags: cyber security(2),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Versleutelde e-mail bij Yahoo en GoogleLocation: Google HQ - Mountain View, United States
Date published: 08-08-2014

Yahoo werkt samen met Google aan versleutelde e-mail, waarbij de twee bedrijven zelf geen sleutels hebben. Hierdoor kunnen datagraaiers niets meer opvragen. De bedrijven willen privacy terug brengen naar de massa.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),privacy(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Ministerie analyseert datadiefstalLocation: New York Times - New York, United States
Date published: 06-08-2014

Het Nationaal Cyber Security Centrum van het ministerie van Veiligheid analyseert of de wereldwijde datadiefstal door een Russische bende gevolgen heeft voor Nederland.Het veiligheidscentrum kwam in actie na berichten in de New York Times dat de bende een recordaantal internetwachtwoorden, gebruiker... Read more

Source: nos.nl

Top found tags: data theft(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mogelijk grootste datadiefstal ooit ontdektLocation: Moscow, Russia
Date published: 06-08-2014

Russische internetcriminelen hebben van 1,2 miljard mensen de inloggegevens gestolen. Dat heeft een Amerikaans beveiligingsbedrijf ontdekt. Het zou gaan om de grootste datadiefstal ooit. De informatie is gestolen bij Amerikaanse bedrijven.In totaal gaat het om 4,5 miljard gegevens waaronder 1,2 milj... Read more

Source: www.bnr.nl

Top found tags: website(1),data theft(2),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BNR Topic: Het gebruik van wachtwoorden is achterhaaldLocation: Moscow, Russia
Date published: 06-08-2014

Het is misschien wel de grootste datadiefstal ooit. Een Russische bende heeft de hand weten te leggen op 1,2 miljard namen en wachtwoorden van internetgebruikers.Volgens internetdeskundige Brenno de Winter is het hoog tijd dat we gaan zoeken naar een opvolger voor het wachtwoord. Die is te fraudegev... Read more

Source: www.bnr.nl

Top found tags: fraud(1),NL(1),data theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Randstad samen in cyber securityLocation: Den Haag, Den Haag, Zuid-Holland, The Netherlands
Date published: 06-08-2014

De Universiteit Leiden, TU Delft en De Haagse Hogeschool werken samen in de stichting Cyber Security Academy The Hague (CSA), een platform voor kennisontwikkeling en vernieuwende opleidingstrajecten voor hoger opgeleide professionals op het terrein van cyber security in Den Haag.De samenwerking is g... Read more

Source: www.scienceguide.nl

Top found tags: NL(1),government(2),local authority(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Security opleiding van start in Den HaagLocation: Den Haag, Den Haag, Zuid-Holland, The Netherlands
Date published: 06-08-2014

De Universiteit Leiden, TU Delft en De Haagse Hogeschool bundelen hun krachten in de stichting Cyber Security Academy The Hague (CSA), een platform voor kennisontwikkeling en vernieuwende opleidingstrajecten voor hoger opgeleide professionals op het terrein van cyber security in Den Haag.De samenwer... Read more

Source: denhaagfm.nl

Top found tags: government(1),NL(1),local authority(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft stopt ondersteuning oude IE-versies vanaf 2016Location: Microsoft HQ - Redmond, United States
Date published: 07-08-2014

Vanaf 12 januari 2016 zal Microsoft de ondersteuning van oudere IE-versies op Windows stoppen, wat inhoudt dat gebruikers met alleen de meest recente IE-versie voor een betreffende Windowsversie technische ondersteuning en beveiligingsupdates zullen blijven ontvangen. Dat heeft Microsoft vanavond aa... Read more

Source: www.security.nl

Top found tags: Windows(1),Internet Explorer(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook neemt serverbeveiliger PrivateCore overLocation: Facebook - Menlo Park, United States
Date published: 08-08-2014

Facebook heeft de Amerikaanse serverbeveiliger PrivateCore overgenomen, wat volgens de laatstgenoemde zal helpen bij het beschermen van Facebookgebruikers. PrivateCore audit en beveiligt OpenStack servers tegen persistente malware, zoals rootkits en bootkits, en het gevaar van insiders. Insiders zij... Read more

Source: www.security.nl

Top found tags: NL(1),social media(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oud-eigenaren DigiNotar moeten miljoenen betalenLocation: Google HQ - Mountain View, United States
Date published: 08-08-2014

De oud-eigenaren van het Beverwijkse DigiNotar moeten miljoenen aan Vasco Data Security International betalen, dat in 2011 het bedrijf overnam. Dat heeft de rechter eind juli bepaald, zo blijkt uit deze uitspraak die gisteren online verscheen en waar Emerce over bericht. DigiNotar was een certificaa... Read more

Source: www.security.nl

Top found tags: financial sector(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft dicht dinsdag kritieke lekken in IE en WindowsLocation: Microsoft HQ - Redmond, United States
Date published: 08-08-2014

Microsoft zal aanstaande dinsdag negen updates uitbrengen die lekken in Windows, Internet Explorer, Microsoft OneNote, SQL Server, SharePoint en het Windows Media Center TV Pack voor Windows Vista zullen verhelpen. Twee van de patches, voor IE en Windows, zijn als kritiek bestempeld. Dit houdt in da... Read more

Source: www.security.nl

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Xbox One-versie Diablo III draait na patch wel op 1080pLocation: Microsoft HQ - Redmond, United States
Date published: 08-08-2014

Blizzard geeft een zogenoemde day one-patch vrij voor de Xbox One-versie van Diablo III: Ultimate Evil Edition. Na installatie van de patch draait de game op 1080p, dezelfde native resolutie als de versie voor PlayStation 4. De Ultimate Evil Edition verschijnt op 19 augustus. Blizzard liet een maand... Read more

Source: tweakers.net

Top found tags: Windows(1),Microsoft(2),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google gaat veiligheid meewegen bij rankingLocation: Google HQ - Mountain View, United States
Date published: 08-08-2014

Google heeft besloten om de resultaten van een zoekactie anders te groeperen. Met dien verstande dat sites die gebruik maken van https automatisch hoger in de lijst komen te staan. Het achterliggende doel is, om de toepassing van het veilige HTTPS-protocol te bevorderen. Twee technici van de zoekmac... Read more

Source: www.automatiseringgids.nl

Top found tags: Google(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese overheid weerspreekt verbod op Apple-productenLocation: Beijing, China
Date published: 08-08-2014

Producten van Apple zijn niet door de Chinese overheid verboden zoals eerder deze week in het nieuws kwam. Dat laat de Chinese overheid weten. Volgens persbureau Bloomberg waren 10 producten van Apple, zoals iPads en MacBooks, vanwege veiligheidsredenen van een overheidslijst verwijderd Dit zou inho... Read more

Source: www.security.nl

Top found tags: mobile device(2),telecom sector(2),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Expert: VS moet alle zero days opkopen en openbaar makenLocation: New York, United States
Date published: 08-08-2014

De Amerikaanse overheid zou alle zero day-lekken die op marktplaatsen worden aangeboden moeten opkopen, om ze vervolgens openbaar te maken zodat leveranciers ze kunnen patchen. Daarvoor pleitte beveiligingsexpert Dan Geer deze week tijdens zijn keynote op de Black Hat conferentie in Las Vegas. "Als ... Read more

Source: www.security.nl

Top found tags: government(3),Black Hat(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Verplicht invullen paspoortgegevens bij publieke wifiLocation: Moscow, Russia
Date published: 08-08-2014

De Russische overheid verplicht voortaan gebruikers van publieke wifi-hotspots om hun paspoortgegevens in te vullen voordat ze online kunnen. De overheid wil anoniem gebruik van hotspots tegengaan. De aanbieder van de hotspot is verantwoordelijk voor het verzamelen van de paspoortgegevens.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),wireless(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Groot aantal kritieke lekken in populaire NASsen ontdektLocation: Black Hat - Las Vegas, United States
Date published: 08-08-2014

Een Amerikaanse beveiligingsonderzoeker heeft een groot aantal kritieke lekken in populaire NASsen ontdekt waardoor een aanvaller de netwerkopslagapparaten volledig kan overnemen en updates om de kwetsbaarheden te verhelpen zijn in alle gevallen nog niet beschikbaar. Dat liet Jacob Holcomb van Indep... Read more

Source: www.security.nl

Top found tags: conference(3),Black Hat(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft lanceert nieuwe gratis tool voor systeemmonitoringLocation: Microsoft HQ - Redmond, United States
Date published: 08-08-2014

Microsoft heeft een nieuwe gratis tool gelanceerd waarmee Windowsgebruikers hun systeem op malware en activiteiten kunnen monitoren. De tool heet Sysmon en is onderdeel van Sysinternals, is een populaire verzameling van programma's om onder andere malware te vinden en te verwijderen. Sysinternals is... Read more

Source: www.security.nl

Top found tags: NL(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China: overheidsinstanties mogen wel Apple-producten kopenLocation: Beijing, China
Date published: 08-08-2014

Chinese overheidsinstanties mogen wel Apple-producten kopen. Dat zegt de Chinese overheid tegen persbureau Reuters. Volgens China berustten berichten dat overheidsorganisaties geen Apple-producten mogen kopen op een misverstand. Apple logoWoensdag schreef persbureau Bloomberg op basis van anonieme b... Read more

Source: tweakers.net

Top found tags: mobile device(2),telecom sector(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Mediaberichtgeving over de diefstal van 1,2 miljard e-mailadressenLocation: Moscow, Russia
Date published: 06-08-2014

In de media zijn berichten verschenen over diefstal van 1,2 miljard e-mailadres/wachtwoord-combinaties door een Russische criminele bende, waaronder 500 miljoen unieke e-mailadressen. Het Amerikaanse bedrijf Hold Security zegt de beschikking te hebben over de gestolen gegevens. Op dit moment zijn do... Read more

Source: www.ncsc.nl

Top found tags: government(5),United States(6),critical infrastructure(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco verhelpt kwetsbaarheid in Cisco Unified Communications ManagerLocation: Cisco HQ - San Jose, United States
Date published: 08-08-2014

Samenvatting: Cisco heeft een update uitgebracht voor Cisco Unified Communications Manager die de kwetsbaarheid verhelpt. Gevolgen: De kwetsbaarheid kan er voor zorgen dat een geauthenticeerde kwaadwillende niet zichtbaar is als geauthenticeerde gebruiker. Beschrijving: Een kwetsbaarheid in de CLI r... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden verholpen in OpenSSLLocation: Ubuntu - London, United Kingdom
Date published: 08-08-2014

Samenvatting: De makers van OpenSSL hebben diverse updates uitgebracht om kwetsbaarheden in versies 0.9.8, 1.0.0 en 1.0.1 te verhelpen. Zie "Mogelijke oplossingen" voor software updates. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om een Denial-of-Service te veroorzaken. Be... Read more

Source: www.ncsc.nl

Top found tags: Debian(2),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in diverse f5 producten verholpenLocation: Amsterdam, The Netherlands
Date published: 08-08-2014

Samenvatting: F5 heeft updates uitgebracht die een kwetsbaarheid verhelpen in diverse producten. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken om een Denial of Service te veroorzaken. Beschrijving: - CVE-2006-4925 Er bevindt zich een kwetsbaarheid in packet.c. Een aanvaller kan een Den... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),cybercrime(2),DoS(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden verholpen in Kerberos 5Location: Amsterdam, The Netherlands
Date published: 08-08-2014

Samenvatting: MIT heeft diverse updates uitgebracht om verschillende kwetsbaarheden in Kerberos 5 te verhelpen. Zie paragraaf "Mogelijke oplossingen" voor meer informatie. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: - CV... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Fedora(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in dpkgLocation: Ubuntu - London, United Kingdom
Date published: 08-08-2014

Samenvatting: Meerdere Linux distributeurs hebben updates uitgebracht die beide kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan toegang krijgen tot gevoelige informatie en kan mogelijk verhoogde gebruikersrechten verkrijgen. Beschrijving: - CVE-2014-3864, CVE-2014-3865 Door een directory t... Read more

Source: www.ncsc.nl

Top found tags: Fedora(2),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ernstige kwetsbaarheid in Samba verholpenLocation: Ubuntu - London, United Kingdom
Date published: 08-08-2014

Samenvatting: Een is een ernstige kwetsbaarheid in Samba verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om willekeurige code uit te voeren onder root rechten. Beschrijving: Een kwaadwillende kan via het netwerk packets sturen naar de NetBIOS name services daemon (nmb... Read more

Source: www.ncsc.nl

Top found tags: Red Hat(2),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Wireshark verholpenLocation: Amsterdam, The Netherlands
Date published: 08-08-2014

Samenvatting: Er zijn meerdere kwetsbaarheden verholpen in Wireshark. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: - CVE-2014-5161, CVE-2014-5162: De Catapult DCT2000 en IrDA dissectors bevatten een "buffer underrun" kwe... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Fedora(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Linux kernel verholpenLocation: Amsterdam, The Netherlands
Date published: 08-08-2014

Samenvatting: Er zijn updates vrijgegeven die een aantal kwetsbaarheden in de Linux kernel verhelpen. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende lees- en schrijfrechten krijgen tot het kernel geheugen of een Denial of Service veroorzaken. Beschrijving: - CVE-2014-3534 Een... Read more

Source: www.ncsc.nl

Top found tags: DoS(2),Fedora(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish