Under construction

New design coming soon!

CIC News engine statistics

CIC News for 09-08-2014 contains 81 articles: cybercrime(21),cyber security(25),data breach(11),other(24)

CIC News update contains 69 English and 12 Dutch articles for today.
There are 0 published advisories, 0 are English and 0 are Dutch.
In today's English news articles:
- 19 related to cybercrime
- 24 related to cyber security
- 11 related to data breach and identity theft
- 15 for the category other news

In today's Dutch news articles:
- 2 related to cybercrime
- 1 related to cyber security
- 9 for the category other news

Have fun reading.

English cybercrime related news

Black Hat: Researchers hack into Cisco EnergyWiseLocation: Wise, United States
Date published: 08-08-2014

Black Hat: Researchers hack into Cisco EnergyWise Vulnerabilities in EnergyWise could let attackers cause huge blackouts if abused. Photo Credit: Black Hat 2014 Misconfigurations and vulnerabilities in Cisco's EnergyWise suite can allow attackers to cause huge blackouts if the protocol is abused, re... Read more

Source: www.scmagazine.com

Top found tags: vulnerability(2),Black Hat(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vulnerabilities in WordPress and Drupal enable DoS attacksLocation: WordPress - San Francisco, United States
Date published: 08-08-2014

Security researcher Nir Goldshlager has identified vulnerabilities in widely-used WordPress and Drupal that enable XML denial-of-service (DoS) attacks. Updating to WordPress 3.9.2 and to Drupal core 7.31 or 6.33 will mitigate the issues. The WordPress issue exists in PHP's XML processing, according ... Read more

Source: www.scmagazine.com

Top found tags: WordPress(1),cybercrime(2),DoS(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacking group wants to play nice with automakersLocation: Las Vegas, Nevada, United States
Date published: 08-08-2014

LAS VEGAS (Reuters) - A group of well-known hackers and security professionals are trying to build better ties with the auto industry in an effort to enlist their help in improving vehicle security, one of the hottest areas of cyber research. The non-profit group, known as "I am the Calvary," is ask... Read more

Source: reuters.com

Top found tags: cybercrime(3),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat: Hackers execute code on mobile POS devices, play their version of Flappy BirdLocation: Black Hat - Las Vegas, United States
Date published: 08-08-2014

The retailer announced that it had become the target of a more than two-week-long attack. Device vulnerabilities could allow attackers to access card data using multiple attack vectors. Researchers who discovered vulnerabilities in mobile point-of-sale devices (mPOS), which could allow malicious cod... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),vulnerability(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DefCon: Traffic control systems vulnerable to hackingLocation: New York, United States
Date published: 09-08-2014

DefCon: Traffic control systems vulnerable to hacking Cesar Cerrudo spoke at DefCon about how traffic control systems used in the U.S. and other countries can be hacked. Traffic control systems used in the U.S. and other countries can be hacked to cause significant traffic problems, or can even be ... Read more

Source: www.scmagazine.com

Top found tags: DEF CON(2),social engineering(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacking group wants to play nice with automakersLocation: Las Vegas, Nevada, United States
Date published: 09-08-2014

LAS VEGAS (Reuters) - A group of well-known hackers and security professionals are trying to build better ties with the auto industry in an effort to enlist their help in improving vehicle security, one of the hottest areas of cyber research. The non-profit group, known as "I am the Cavalry," is ask... Read more

Source: reuters.com

Top found tags: cybercrime(3),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
John McAfee speaks at hacker conference, unveils complaint websiteLocation: McAfee - Santa Clara, United States
Date published: 09-08-2014

LAS VEGAS (Reuters) - John McAfee, the flamboyant anti-virus software industry pioneer, made a surprise appearance at a computer hackers' conference on Friday evening, where he unveiled a new website to give people a place online to vent their anger. The one-time millionaire who fled the Central Ame... Read more

Source: reuters.com

Top found tags: DEF CON(2),cybercrime(3),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacking attempts on Israeli targets increased five-fold during Gaza warLocation: Tel Aviv, Israel
Date published: 07-08-2014

Denial of Service attacks on Israeli networks and servers reached unprecedented levels of size and duration during Operation Protective Edge.Hacking attempts against Israeli networks and servers increased more than five-fold during the war in Gaza, according to a report released this week by network... Read more

Source: www.haaretz.com

Top found tags: Israel(1),report(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Irish Domains hit with denial of service attackLocation: New York, United States
Date published: 08-08-2014

Web-hosting company Irish Domains was the target of a distributed denial of service (DDoS) attack on Friday, incapacitating numerous websites of its client companies.The company said that it had seen a significant slowdown on several services following the DDoS attack, whereby an online servic... Read more

Source: www.irishtimes.com

Top found tags: website(1),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
WHEN CYBERCROOKS TARGET ERP PLATFORMSLocation: Beijing, China
Date published: 07-08-2014

Who would have thought that malware placed in handheld product scanners could jeopardize the security of enterprise resource planning (ERP) platforms? But a Chinese manufacturer stands accused of conducting such an attack, enabling firmware in the devices to harvest businesses financial and custo... Read more

Source: www.pymnts.com

Top found tags: website(1),Windows(1),China(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers discover exploit kit serversLocation: Trustwave - Chicago, United States
Date published: 07-08-2014

Trustwave researchers have uncovered eight central control servers three in the UK, four in the Netherlands and one in Ukraine - that cyber criminals are using to manage one of the world's most prevalent exploit kits.According to Trustwave, this specific exploit kit, Magnitude, is being used to ... Read more

Source: www.itweb.co.za

Top found tags: vulnerability(1),The Netherlands(2),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Crime A Serious Threat To BusinessesLocation: Nairobi, Kenya
Date published: 07-08-2014

Information, Communications and Technology Cabinet Secretary Dr Fred Matiangi has called for stringent measures in the war against cyber crime in the wake of recent attacks on website accounts.Speaking during an internet and digital world forum at the United States International University (USIU)... Read more

Source: kenyanewsagency.go.ke

Top found tags: United States(2),cybercrime(3),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DOJ's National Security Division Chief Warns of Dire Cyber Threat; Pleads for Public-Private CooperationLocation: Pittsburgh, United States
Date published: 07-08-2014

With enough cooperation, the Department of Justice can protect the United States against the potentially devastating effects of cybercrime, Assistant Attorney General for National Security John Carlin said in a recent major speech.Quoting the 9/11 Commissions recently issued 10th anniversary repo... Read more

Source: www.mainjustice.com

Top found tags: Department of Justice(3),telecom sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Understand Technology to Battle Cyber CrimeLocation: New York, United States
Date published: 08-08-2014

BANGALORE: With online transactions increasing and cyber criminals employing new tactics, it is important that the police understand technology, said Police Commissioner M N Reddi.He was speaking at the inauguration of a two-day workshop on cyber crime organised by HDFC Bank and the police departmen... Read more

Source: www.newindianexpress.com

Top found tags: credit card(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Smart grid attack scenarios (understand the threat to defend against it)Location: Trend Micro - Cupertino, United States
Date published: 08-08-2014

Quick Take: It's a war out there -- literally. Hackers from hostile countries target the U.S. power grid every day. That's why I wanted to run this adaptation of a recent blog post from Trend Micro, an IT security company. I previously shared their view of the ways to attack a smart meter. This arti... Read more

Source: #.U-Yq4VZtKQY

Top found tags: United States(2),government(3),energy(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Epic Turla Operation: Information on Command and Control Server infrastructureLocation: Hewlett-Packard - Palo Alto, United States
Date published: 07-08-2014

Together with international partners, we have investigated the Turla/Uroburos/Snake related Epic/Wipbot/TavDig/Wordlcupsec operations and the command and control server infrastructure of it. Although hundreds of servers related to the threats were discovered by the community, most of them are not al... Read more

Source: www.crysys.hu

Top found tags: PHP(1),threat(1),Uroburos(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Work-at-home fraud scam targeting people on Facebook, InstagramLocation: Instagram - Menlo Park, United States
Date published: 07-08-2014

BILOXI -- Biloxi police and the Gulf Coast Cybercrime Task Force are warning people about a new twist on a work-at-home fraud scheme. The new scam targets people on Facebook or via Instagram.The scheme typically involves gaining a person's confidence via chat rooms or emails and asking him or her to... Read more

Source: www.sunherald.com

Top found tags: financial sector(2),social media(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PNP: 84 foreigners arrested for cybercrime in H1Location: New York, United States
Date published: 09-08-2014

The Philippine National Police (PNP) arrested at least 84 foreign cybercrime suspects in the first six months of the year.PNP chief Director General Alan Purisima said these arrested foreigners were involved in telecom fraud, online gambling and cybersex operations preying on women and children.Puri... Read more

Source: www.mb.com.ph

Top found tags: EN(1),fraud(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacking is simple, says author claiming role in breach of spyware firmLocation: Gamma International - Troisdorf, Germany
Date published: 09-08-2014

has published a how-to guide for other hacktivists. "I'm not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz it took to 0wn Gamma," wrote the author, who rightly cautions that the unauthorized access of other people's networks is illegal. "I'm writing this to demystify hackin... Read more

Source: arstechnica.com

Top found tags: report(1),spyware(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Critical Vulnerability Found in Popular WordPress Contact Form PluginLocation: WordPress - San Francisco, United States
Date published: 08-08-2014

A critical, remotely exploitable vulnerability has been found in a popular WordPress plugin that allows users to easily customize every aspect of the contact forms they embed into their websites. The flaw in Custom Contact Forms was identified by researchers from Sucuri during a routine audit for th... Read more

Source: securityweek.com

Top found tags: cyber security(2),update(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK businesses falling behind on mobile securityLocation: Cavalier, United States
Date published: 08-08-2014

UK businesses falling behind on mobile security UK businesses falling behind on mobile security Smartphones and tablets are flooding the workplace, but users appear to dismiss the security of these devices. That is the key finding from new research from identity-based security solutions company Entr... Read more

Source: www.scmagazineuk.com

Top found tags: mobile device(2),United Kingdom(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
WordPress and Drupal flaw hits 23% of world's websitesLocation: WordPress - San Francisco, United States
Date published: 08-08-2014

Up to 230 million websites, including the US White House and the UK's main government data site, are at risk from a denial of service flaw in their WordPress and Drupal content management systems. The two suppliers have rushed out a fix. WordPress and Drupal flaw hits 23% of world's websites WordPre... Read more

Source: www.scmagazineuk.com

Top found tags: patch(2),update(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The 5 most read articles this week: August 1-7Location: GCHQ - Cheltenham, United Kingdom
Date published: 08-08-2014

Here are the five most popular articles, as read by you, the reader, in the week for August 1 to 7. The 5 most read articles this week: August 1-7 The 5 most read articles this week: August 1-7 RAT uses Yahoo Mail to fool security teams German security research firm G Data warned earlier this week o... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(4),United Kingdom(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook buys cyber-security startup PrivateCoreLocation: Facebook - Menlo Park, United States
Date published: 08-08-2014

Facebook buys cyber-security startup PrivateCore. Facebook has purchased PrivateCore for an undisclosed sum, to help protect the data of its users. PrivateCore is a cyber-security company that authenticates and secures server data. Oded Horovitz, PrivateCore's CEO said, "Facebook has done more than ... Read more

Source: itproportal.com

Top found tags: social media(2),Trend Micro(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DefCon: Panel discusses diversty in security and just being yourselfLocation: DEF CON - Las Vegas, United States
Date published: 09-08-2014

DefCon: Panel discusses diversty in security and just being yourself Being yourself and being able to be yourself were topics discussed at a panel on diversity in information security at DefCon 22. During a rapid-fire discussion entitled Diversity in Information Security at DefCon 22 in Las Ve... Read more

Source: www.scmagazine.com

Top found tags: cyber security(2),DEF CON(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft, Google, others back Facebook in New York privacy disputeLocation: New York, United States
Date published: 09-08-2014

Key technology companies including Google, Microsoft and Twitter on Friday filed in support of Facebooks dispute with the New York County District Attorneys office over the collection of user data in bulk under a gag order for a fraud investigation. The New York Civil Liberties Union and the A... Read more

Source: www.pcworld.com

Top found tags: United States(4),government(5),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crypto Daddy Phil Zimmerman says surveillance society is DOOMEDLocation: DEF CON - Las Vegas, United States
Date published: 09-08-2014

Defcon 22 A killer combination of rapidly advancing technology and a desire for greater privacy among the public should condemn current surveillance state to an historical anachronism, according to PGP creator Phil Zimmermann. In an extended talk at Defcon 22 in Las Vegas, Zimmermann said it might s... Read more

Source: go.theregister.com

Top found tags: United States(2),government(8),telecom sector(18)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Two new variants of Gameover Zeus banking Trojan identifiedLocation: New York, United States
Date published: 07-08-2014

Gameover Zeus, the banking Trojan whose communications network was taken down by international coordination at the beginning of June, has been resurrected, with two new variants identified in the wild by security software company Bitdefender.\"One of them generates 1,000 domains per day and the othe... Read more

Source: www.computing.co.uk

Top found tags: financial sector(4),cybercrime(5),malware(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber crime: Insurers in the firing lineLocation: New York, United States
Date published: 08-08-2014

As banks become more sophisticated and effective at defending themselves against attack, the focus of much cyber crime is changing. Increasingly, insurance companies are becoming the target. The risks are very real and very serious. Insurers need to raise their game as a matter of urgency.The focus ... Read more

Source: www.compasscayman.com

Top found tags: cyber security(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Aussie banks seen as easy targets for cyber crimeLocation: Londen, United Kingdom
Date published: 08-08-2014

Australias banks will be increasingly seen as soft targets for cyber criminals. Ernst & Youngs global head of information security warns. On a flying visit to Australia to meet clients this week, Ken Allan said while banks here suffered fewer attacks than their European or US counterparts, the... Read more

Source: www.smh.com.au

Top found tags: United Kingdom(2),government(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
North America Cyber Security Market is Expected to Reach $61.91 billion in 2019 - New Report by MicroMarket MonitorLocation: New York, United States
Date published: 08-08-2014

The Cyber Security Solutions and Services report defines and segments the market in North America with analysis and forecast of revenue. The cyber security solutions and services market in North America is estimated to grow from $41.19 billion in 2014 to $61.91 billion by 2019, at a CAGR of 8.50% fr... Read more

Source: insurancenewsnet.com

Top found tags: United States(2),cybercrime(4),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tony Sager: Fight Against Cyber Crime Needs Team EffortLocation: National Security Agency - Fort Meade, United States
Date published: 08-08-2014

Tony Sager, chief technologist for the Council on Cybersecurity, believes that bringing different organizations together to share cyber intelligence is key in the fight against security threats, GovInfoSecurity reported Friday.Eric Chabrow writes that Sager discussed the nonprofits collaboration ... Read more

Source: www.executivegov.com

Top found tags: information security(2),United States(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stopping Cyberattacks Likened to a WarLocation: Moscow, Russia
Date published: 08-08-2014

Following this week's stunning revelation that Russian crooks have stolen 1.2 billion user names and passwords, the biggest breach on record, experts say making the Internet more secure Relevant Products/Services will take a massive global effort -- everything from bolstering website security Releva... Read more

Source: www.cio-today.com

Top found tags: website(1),cybercrime(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Critical infrastructure protection in the cyber-ageLocation: Brussels,Belgium
Date published: 07-08-2014

On June 30th, the Security & Defence Agenda held an evening debate in Brussels, for a discussion on the cyber-security landscape in Europe and the possibilities offered by transatlantic cooperation in this field.Critical infrastructure protection in the cyber-age appears to be one of the main ... Read more

Source: isiseurope.wordpress.com

Top found tags: cybercrime(3),government(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Just How Did Those Russian Hackers Steal a Billion Passwords?Location: Moscow, Russia
Date published: 08-08-2014

Reports that a Russian hacking ring had stolen more than a billion online credentials sent Internet users scrambling to reset their passwords. But how did this group manage to amass such a huge collection and is it really as bad as it sounds?First, you should know that this wasn't some \"Mission... Read more

Source: www.nbcnews.com

Top found tags: cybercrime(4),telecom sector(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is Russia Really the Cybercrime Capital?Location: Moscow, Russia
Date published: 06-08-2014

The New York Times reported yesterday that a Russian crime ring had assembled a collection of more than a billion Internet passwords. While some are casting doubt on claims that this is the biggest hack ever, it does appear to be a significant milestone in the history of cybercrime as well as ... Read more

Source: www.slate.com

Top found tags: financial sector(4),United States(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Indianapolis Readying For Cybercrime SummitLocation: Indiana, United States
Date published: 08-08-2014

In the wake of thefts by Russian hackers of more than a billion pieces of online user data, the City of Indianapolis is planning a day-long cybersecurity summit aimed at protecting the citys infrastructure from internet criminals.Public Safety Director Troy Riggs says attempts have been made to h... Read more

Source: wbaa.org

Top found tags: vulnerability(1),cyber security(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DEFCON 22 vendors: Tesla, Blackphone and moreLocation: DEF CON - Las Vegas, United States
Date published: 09-08-2014

America's biggest hacker conference is setting a new record for attendance at its 22nd annual event, at the Rio Hotel and Casino, Las Vegas, Nevada -- and its vendors reflect the event's growth. This year's vendor floor was wall-to-wall attendees and packed with hardware and schwag, PR booths and ar... Read more

Source: www.zdnet.com

Top found tags: smartphone(1),cyber security(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Father of PGP encryption: Telcos need to get out of bed with governmentsLocation: National Institute of Standards - Gaithersburg, United States
Date published: 09-08-2014

LAS VEGASPhil Zimmermann, the creator of Pretty Good Privacy public-key encryption, has some experience when it comes to the politics of crypto. During the crypto wars of the 1990s, Zimmermann fought to convince the US government to stop classifying PGP as a munition and shut down the... Read more

Source: arstechnica.com

Top found tags: United States(4),government(12),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

ICYMI: Black Hat news, biggest breach ever & figures to take to the CEOLocation: Black Hat - Las Vegas, United States
Date published: 08-08-2014

This week's In Case You Missed It (ICYMI) highlights from the Black Hat conference, and reaction to the 'biggest data breach ever'. ICYMI: Black Hat news, biggest breach ever & figures to take to the CEO ICYMI: Black Hat news, biggest breach ever & figures to take to the CEO BlackHat news The Black ... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(6),cybercrime(8),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Scan: Have You Scanned Lately?Location: StubHub HQ - San Francisco, United States
Date published: 08-08-2014

Hey guys! Im Bradi, and this is the Scan, bringing you the security news you need to become popular and successful. StubHub Thieves Snubbed Six men are facing money laundering, identity theft and other charges for ripping off StubHub for a million dollars worth of fraudulent e-tickets. The thi... Read more

Source: blogs.mcafee.com

Top found tags: identity theft(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DefCon: Stolen data markets are as organized as legitimate online businessesLocation: Holt, United States
Date published: 09-08-2014

DefCon 22: Stolen data markets are as organized as legitimate online businesses In order to cause disruption within the stolen data markets of the dark web, the organizational structure of it must be analyzed, according to Tom Holt. The massive retailer data breaches that have taken place this year ... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),Liberty Reserve(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Worlds Top 5 Cybercrime HotspotsLocation: New York Times - New York, United States
Date published: 08-08-2014

A Russian crime ring is suspected of obtaining access to a record 1.2 billion username and password combinations, shedding renewed light on how vulnerable online personal information can be. Cybersecurity firm Hold Security said the gang of hackers was based in a city in south central Russia and com... Read more

Source: www.dfinews.com

Top found tags: Trend Micro(2),cybercrime(6),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pueblo police searching for identity theft suspectsLocation: Pueblo, United States
Date published: 07-08-2014

PUEBLO, Colo. -The Pueblo Police Department is searching for two people it says used a stolen debit card at a south side convenience store.The crime happened July 29, 2014 between 3:45 a.m. and 4:45 a.m. at the Loaf N' Jug in the 3900 block of Ivywood Lane.Police say the man and woman bought several... Read more

Source: www.krdo.com

Top found tags: government(1),police(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Missouri women plead guilty to identity theftLocation: Buffalo, United States
Date published: 07-08-2014

SPRINGFIELD, Mo. (AP) - Two southwest Missouri women have admitted using stolen identities to obtain credit cards on which they spent nearly $61,000.The U.S. Attorney's office says 35-year-old Kelly Marie Lockhart, of Buffalo, pleaded guilty Thursday to aggravated identity theft. Forty-year-old Stac... Read more

Source: www.ksdk.com

Top found tags: identity theft(2),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why you shouldn't be scared by the 'largest data breach' everLocation: New York Times - New York, United States
Date published: 07-08-2014

Experts say the reported heist of 1.2 billion account credentials is legit, but caution that for most people there's little they can do -- or should be worried about.LAS VEGAS -- There's a good chance that one of your email accounts is among the 1.2 billion accounts compromised in what appears to be... Read more

Source: www.cnet.com

Top found tags: government(2),United States(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Breach fatigue' could leave you vulnerable to hackLocation: Moscow, Russia
Date published: 07-08-2014

Retired Phoenix lawyer Jim Ryder read about Russian hackers stealing more than a billion network passwords Wednesday and didn't think twice about it. He didn't take steps to secure his computer. He didn't reset any of his financial passwords.\"The Russian thing,\" he said. \"I haven't given it any t... Read more

Source: www.azcentral.com

Top found tags: identity theft(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
5 Worst Data Breaches Of 2014Location: North Dakota University - Grand Forks, United States
Date published: 07-08-2014

Data breaches have unfortunately become a common occurrence in today's society. It seems a newsworthy breach has taken place almost every week since the massive Target hack occurred in late 2013.A data breach can cripple a business and cause havoc for consumers. According to a recent survey, 52% of ... Read more

Source: www.lowcards.com

Top found tags: health sector(4),medical sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Simi Valley police arrest man for identity theft, burglary and forgeryLocation: New York, United States
Date published: 08-08-2014

Simi Valley police detectives have arrested Robert Vanvlymen in connection with identity theft, burglary and forgery.In January, detectives began an investigation after several Discover credit card accounts had been hijacked.Police identified Vanvllymen, 63, of Simi Valley, as the main suspect and i... Read more

Source: www.dailynews.com

Top found tags: credit card(2),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Consumers Foot the Bill for Data BreachesLocation: Target HQ - Minneapolis, United States
Date published: 09-08-2014

Whether data breaches happen to individuals, companies or whole government organizations, they are rarely if ever cheap to deal with or in any way funny. In all of these cases, somebody is going to end up paying for the costs of a breach and usually that person is the end user or consumer of a given... Read more

Source: smartdatacollective.com

Top found tags: data theft(2),financial sector(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Podcast: Inside the Epic Turla Cyber-Espionage CampaignLocation: Kaspersky HQ - Moscow, Russia
Date published: 08-08-2014

Security Conversations PodcastDirector of Kaspersky Lab Global Research & Analysis Team Costin Raiu joins the podcast to discuss the latests discoveries surrounding the Epic Turla cyber-espionage campaign. Raiu talks about the infection mechanisms used by the malware and provides a global look at vi... Read more

Source: securityweek.com

Top found tags: cyber espionage(2),telecom sector(2),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Yahoo CISO Details Challenge of Security at ScaleLocation: Yahoo HQ - Sunnyvale, United States
Date published: 08-08-2014

LAS VEGAS: Since joining Yahoo as its CISO six months ago, Alex Stamos has been focused on one big challenge: how to do security at scale. In a standing-room-only session at the Black Hat USA conference, Stamos detailed why security products don't work for Web-scale companies and explained what Yaho... Read more

Source: www.esecurityplanet.com

Top found tags: conference(2),financial sector(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What I do Online (Domestic Engineering Special!)Location: Coles, United States
Date published: 08-08-2014

I spend a lot of time online usually under the guise of domestic management! Like anybody, one search leads to another and hey presto! where has the time gone? So, in the spirit of caring and sharing, I thought Id detail where I spend my time online. In this post, I will share my pragmati... Read more

Source: blogs.mcafee.com

Top found tags: credit card(2),financial sector(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russia extends Snowden stayLocation: National Security Agency - Fort Meade, United States
Date published: 08-08-2014

Russia has extended NSA whistleblower Edward Snowden's asylum by three years. For the past year, Snowden has been staying in Russia after the US cancelled his passport whilst he was travelling to Latin America. Snowden's lawyer Anatoly Kucherena said in an interview with a Russian news agency: Th... Read more

Source: www.scmagazineuk.com

Top found tags: Russia(1),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gemalto acquires SafeNet for $890 millionLocation: Amsterdam, The Netherlands
Date published: 08-08-2014

On Friday, Gemalto, a Dutch digital security company, announced plans to acquire U.S.-based SafeNet for $890 million. SafeNet's portfolio of data protection solutions is expected to complement Gemalto's embedded software and portable secure element offerings, according to a release. SafeNet already ... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),The Netherlands(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google implements HTTPS signal into search engine algorithmLocation: Google HQ - Mountain View, United States
Date published: 08-08-2014

Google has begun using HTTPS as a signal in its search engine's ranking algorithm. The new ranking qualifier will give sites using Transport Layer Security (TLS) higher priority compared to sites that have not yet integrated it, according to a Google blog post. The company has experimented with the ... Read more

Source: www.scmagazine.com

Top found tags: EN(1),Google(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft previews nine bulletins, critical fixes for Windows, IE aheadLocation: Microsoft HQ - Redmond, United States
Date published: 08-08-2014

Microsoft seizes No-IP domains in effort to stop malware infections Two critical fixes from the tech giant will plug RCE bugs impacting Windows and IE users. Windows and Internet Explorer vulnerabilities that could allow remote code execution (RCE) will take precedence this Patch Tuesday, according ... Read more

Source: www.scmagazine.com

Top found tags: Microsoft(2),vulnerability(2),website(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat: SAP systems vulnerable to payment card theft, rerouting paymentsLocation: Black Hat - Las Vegas, United States
Date published: 08-08-2014

Stealing stored payment card data and rerouting payments in SAP systems is easy for Ertunga Arsal. In a demonstration at Black Hat 2014, Arsal, who has audited hundreds of corporate and government enterprise SAP systems and uncovered hundreds of vulnerabilities, used a tool to launch a remote shell ... Read more

Source: www.scmagazine.com

Top found tags: financial sector(2),government(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oracle Database 12c's data redaction security smashed live on stageLocation: Oracle - Redwood City, United States
Date published: 08-08-2014

Defcon 22 Oracles much-ballyhooed data redaction feature in Database 12c is easy to subvert without needing to use exploit code, attendees at Defcon 22 in Las Vegas have heard. The redaction features in 12c are designed to automatically protect sensitive database material by either totally obscur... Read more

Source: go.theregister.com

Top found tags: research(1),DEF CON(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beware WarKitteh, the connected cat that sniffs your Wi-Fi privatesLocation: Ward, United States
Date published: 09-08-2014

Defcon 22 An inventive security researcher has successfully tested a war-driving kitty collar so its wearer can prowl around the neighborhood exposing the lamentable state of Wi-Fi security. WarKitteh collar Wardriving cat couture. Credit: Gene Bransfield Gene Bransfield, a security researcher w... Read more

Source: go.theregister.com

Top found tags: airport sector(2),DEF CON(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spyware on mobile devices a nightmare for VietnameseLocation: Beijing, China
Date published: 07-08-2014

On hi-tech forums, Vietnamese experts have advised mobile device users not to install apps sourced from China.A test with a Xiaomi smartphone at a mobile phone shop in HCM City conducted by a Nguoi lao dong reporter showed clear evidence that the smartphone had a connection with a server in China an... Read more

Source: english.vietnamnet.vn

Top found tags: mobile device(2),update(2),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Yahoo ad system used to push CryptoWall ransom 'malvertising'Location: Yahoo HQ - Sunnyvale, United States
Date published: 08-08-2014

The world has come to fear the effects of ransom malware but how does it get near the PCs of its victims in the first place?A common technique is to lure unsuspecting users into opening malicious attachments but there are a number of other channels. After some poking around, security firm Blue Coat ... Read more

Source: www.cso.com.au

Top found tags: ransomware(1),research(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Watch a Hacker Fry a Hair Dryer With Her RadioLocation: Las Vegas, Nevada, United States
Date published: 09-08-2014

hair-dryer [gallery-il] Getty As Maggie Jauregui was getting ready for a date last November, she was simultaneously blow drying her hair and chatting with her boyfriend over a walkie talkiethe sort of electronic gadget that the hacker couple enjoy messing around with. Suddenly, the hair dryers... Read more

Source: wired.com

Top found tags: research(1),conference(2),DEF CON(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Keurmerk voor internetbankieren controleert computerLocation: Amsterdam, The Netherlands
Date published: 09-08-2014

Het webwinkelkeurmerk ICTWaarborg heeft het ICTKeurmerk gelanceerd waarmee consumenten zeker zouden weten dat hun computer voldoet aan de bankregels voor veilig internetbankieren. De controle betreft de beveiliging en instellingen van de router en internetverbinding, het up-to-date zijn van software... Read more

Source: www.beveiligingnieuws.nl

Top found tags: cyber security(2),online banking(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
John McAfee waarschuwt voor gebruik smartphonesLocation: McAfee - Santa Clara, United States
Date published: 09-08-2014

Anti-viruspionier John McAfee heeft tijdens zijn keynote op de Defcon Conferentie in Las Vegas gewaarschuwd voor het gebruik van smartphones, die een bedreiging voor de privacy vormen. De oprichter van het gelijknamige anti-virusbedrijf stelde dat luiheid van consumenten, die vaak geen gebruikersove... Read more

Source: www.security.nl

Top found tags: DEF CON(2),government(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Gratis Android app vindt en verwijdert spywareLocation: Google HQ - Mountain View, United States
Date published: 09-08-2014

Een nieuwe Android app beweert spyware op tablets en smartphones te kunnen detecteren, uitschakelen en verwijderen. De "Privacy App" is door het Amerikaanse SnoopWall ontwikkeld en gebruikt een zelfontwikkelde techniek om de privacy-impact van genstalleerde apps te beoordelen. Aan de hand deze ris... Read more

Source: www.security.nl

Top found tags: Google Play(2),United States(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Website ov-chipkaart gegevens bevat lekLocation: Amsterdam, The Netherlands
Date published: 09-08-2014

De website ov-chipkaart.nl, waarop reizigers hun reis- en saldogegevens kunnen beheren bevat een lek. Mensen krijgen soms informatie van andere gebruikers te zien, die ook deels aanpasbaar is. Onder meer de naam, adres, woonplaats en rekeningnummer zijn dan zichtbaar.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ov-chipkaart.nl lekt soms gegevens kaartgebruikersLocation: Amsterdam, The Netherlands
Date published: 09-08-2014

De website ov-chipkaart.nl blijkt door een technisch probleem soms de reisgegevens van reizigers aan andere kaartgebruikers te tonen. Het gaat dan om zaken als rekeningnummer, naam, adres en woonplaats die soms zichtbaar zijn voor anderen en deels gewijzigd kunnen worden, zo meldt NRC. Het lekken va... Read more

Source: www.security.nl

Top found tags: update (1),website(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaan pleegt voor 23 miljoen dollar creditcardfraudeLocation: Amsterdam, The Netherlands
Date published: 09-08-2014

Een 40-jarige Amerikaan heeft bekend tussen 2010 en juli 2013 meer dan 114.000 gestolen creditcardaccounts via het internet te hebben gekocht, waar hij voor miljoenen mee fraudeerde. Miguel Gonzalez kocht de gestolen creditcarddata van verschillende leveranciers. De gestolen creditcardgegevens, die ... Read more

Source: www.security.nl

Top found tags: government(1),NL(1),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers kapen Linux-pc met op Windows besmette USBLocation: Microsoft HQ - Redmond, United States
Date published: 09-08-2014

Tijdens de Black Hat conferentie in Las Vegas hebben beveiligingsonderzoekers Karsten Nohl en Jakob Lell aangetoond hoe ze met een geprepareerde USB-stick computers volledig kunnen overnemen. De aankondiging van de demonstratie genereerde al voor de conferentie de nodige aandacht. De twee onderzoeke... Read more

Source: www.security.nl Checking for vulnerabilities in the Smart Grid System | SCADA systems are not composed the same way as regular IT systems. Therefore, the risk and vulnerability assessment cannot be performed as it is done for any other IT system. The most important differences are:SCADA Pentesting should not be done in production environment: SCADA devices are very fragile and some activities that could pose harmless to regular IT environments could be catastrophic to the process availability. Think of massive blackouts or no water supply for a city.SCADA devices have specific outputs for the industrial process they are controlling. The architecture and operating systems are not the same, so risks assessment approach is not performed in the same way. For electrical systems, we need to address devices belonging to the Advanced Metering Infrastructure (AMI), Demand Response (DR), Distributed Energy Resources (DER), Distributed Grid Management (DGM), Electric Transportation (ET) and Wide Area Monitong, Protection and Control (WAMPAC). This means we need to address devices like the following, instead of conventional network devices, services, laptops, desktop computers or mobile devices:This means we need to considering a specific methodology for this type of infrastructure that leads to effective risk mitigation for proper detection of vulnerabilities in the smartgrid system. I want to recommend one today named Guide to Penetration Testing for Electric Uitilities created by the National Electric Sector Cybersecurity Organization Resource (NESCOR). This metodology is composed by the following steps: | https://isc.sans.edu/diary/Checking+for+vulnerabilities+in+the+Smart+Grid+System/18499 | 07-08-2014 | isc.sans.edu

Top found tags: Karsten Nohl(2),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft gaat oude Internet Explorer plugins blokkerenLocation: Microsoft HQ - Redmond, United States
Date published: 07-08-2014

Microsoft heeft besloten om actie te ondernemen tegen zeer verouderde plugins voor Internet Explorer. Het bedrijf gaat deze binnenkort blokkeren in de nieuwste versie van Internet Explorer. Hierdoor daalt waarschijnlijk het aantal malware-besmettingen op Windows-computers.Malware voor Windows-comput... Read more

Source: www.techzine.nl

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Controle spyware computers experts MH17Location: Den Haag, The Netherlands
Date published: 08-08-2014

De computers en andere apparatuur van de Nederlandse experts die in Oost-Oekrane zijn geweest, worden gecontroleerd om te kijken of er spionageprogrammaatjes op zijn gezet. Dat heeft de politie bevestigd na berichtgeving van de NOS. Een woordvoerder wilde niet zeggen of er gericht wordt gekeken na... Read more

Source: www.spitsnieuws.nl

Top found tags: NL(1),police(1),spyware(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beveiligingsbedrijf slaat slaatje uit datadiefstalLocation: New York, United States
Date published: 07-08-2014

MILWAUKEE - Het Amerikaanse beveiligingsbedrijf dat de enorme datadiefstal door een Russische bende ontdekte, vraagt geld van websites die willen weten of ze getroffen zijn.De diefstal van 1,2 miljard inloggegevens werd door het Amerikaanse beveiligingsbedrijf Hold Security ontdekt. Het weigert om v... Read more

Source: www.gelderlander.nl

Top found tags: website(1),data theft(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

No advisories for today, maybe tomorrow!


This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish