Under construction

New design coming soon!

CIC News engine statistics

CIC News for 11-08-2014 contains 74 articles: cybercrime(16),cyber security(33),data breach(10),other(15)

CIC News update contains 54 English and 20 Dutch articles for today.
There are 16 published advisories, 0 are English and 16 are Dutch.
In today's English news articles:
- 11 related to cybercrime
- 26 related to cyber security
- 10 related to data breach and identity theft
- 7 for the category other news

In today's Dutch news articles:
- 5 related to cybercrime
- 7 related to cyber security
- 8 for the category other news

Have fun reading.

English cybercrime related news

US 911 service needs emergency upgrade and some basic security against scumbagsLocation: DEF CON - Las Vegas, United States
Date published: 11-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Defcon 22 The US emergency response system is in urgent need of better security as its surprisingly easy to disable or spoof 911 calls. In a talk at Defcon 22 two doctors (who are also hackers) and a security consultant presented research... Read more

Source: go.theregister.com

Top found tags: medical sector(2),social engineering(2),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why hackers won't be able to hijack your next flight - the factsLocation: Boeing International HQ - Chicago, United States
Date published: 10-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Defcon 22 Two seasoned pilots, one of whom is a published hacking expert, have been puncturing some of the myths about aircraft hacking at Defcon 22. Dr. Phil Polstra, professor of digital forensics at Bloomberg University (and a qualified c... Read more

Source: go.theregister.com

Top found tags: airport(4),airport sector(4),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CryptoWall! crooks! 'turn! to! Yahoo! ads! to! spread! ransomware!'Location: Yahoo HQ - Sunnyvale, United States
Date published: 11-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Crooks are using Yahoo!'s advertising network to infect PCs with the CryptoWall ransomware, it's claimed. Windows software nasty CryptoWall encrypts a victim's files using an OpenSSL-generated key pair before demanding a ransom to decrypt th... Read more

Source: go.theregister.com

Top found tags: vulnerability(1),website(1),Windows(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Abu Dhabi Police say people are still falling prey to indecent cyber crimeLocation: New York, United States
Date published: 10-08-2014

Officials at Abu Dhabi Police have issued fresh warnings against cyber scams after 33 online blackmail cases were recorded in six months.Abu Dhabi Police found people are still falling prey to indecent cyber scams, despite several awareness campaigns.The police also noted international gangs r... Read more

Source: 7daysinabudhabi.com

Top found tags: website(1),financial sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacking group wishes to aid automobile industry against cyber threatsLocation: DEF CON - Las Vegas, United States
Date published: 10-08-2014

It has been reported that a hacking group and security professionals are putting a helping hand to the automobile industry. Well, according to the reports, the top hackers and security professionals from around the world are looking forward to create better relationship with the auto makers around t... Read more

Source: thenextdigit.com

Top found tags: report(1),threat(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PNP: 84 foreigners arrested for cybercrime in H1Location: New York, United States
Date published: 09-08-2014

The Philippine National Police (PNP) arrested at least 84 foreign cybercrime suspects in the first six months of the year.PNP chief Director General Alan Purisima said these arrested foreigners were involved in telecom fraud, online gambling and cybersex operations preying on women and children.Puri... Read more

Source: ph.celebrity.yahoo.com

Top found tags: EN(1),fraud(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Breach at USIS Exposes Government Employees' DataLocation: Department of Homeland Security - Washington, United States
Date published: 11-08-2014

U.S. Investigations Services (USIS), which provides background checks for the U.S. government, recently acknowledged that its network was compromised by a cyber attack. "We are working closely with federal law enforcement authorities and have retailed an independent computer forensics investigations... Read more

Source: www.esecurityplanet.com

Top found tags: DHS(4),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crash testing needed for the connected carLocation: New York, United States
Date published: 11-08-2014

Technology and standards need to evolve to cope with the rise of the connected car says Fred Kost. Crash testing needed for the connected car Crash testing needed for the connected car Car manufacturing is one of the most regulated industries. At some point, most people reading this will have seen t... Read more

Source: www.scmagazineuk.com

Top found tags: research(1),threat(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI informant 'Sabu' leads cyber attacks against Turkish governmentLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 11-08-2014

The US government is being questioned over its involvement in several cyber-attacks against the Turkish government, which were reportedly carried out by hacker turned FBI informant Hector Xavier Monsegur (known online as 'Sabu'). FBI informant 'Sabu' leads cyber attacks against Turkish government FB... Read more

Source: www.scmagazineuk.com

Top found tags: telecom sector(4),government(5),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Harnessing people power: crowdsourcing for securityLocation: New York, United States
Date published: 11-08-2014

'Crowdsourcing may still be in its infancy, but its clear that the model, if approached sensibly and carefully, could provide substantial benefits' Throughout 2014 businesses have continued to be plagued by software vulnerabilities, which remain among the biggest concerns for organisations. A par... Read more

Source: www.information-age.com

Top found tags: update(2),vulnerability(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

What happens in Vegas: Black Hat and Def Con in picturesLocation: Black Hat - Las Vegas, United States
Date published: 10-08-2014

events here every summer (including BsidesLVand PasswordsCon) that results in a week-long festival of infosec overload so scary,it's now even more frightening to use hotel Wi-Fi. While Jeff Moss, aka "TheDarkTangent," is the founder of both Black Hat and Def Con, the two events have continued ... Read more

Source: arstechnica.com

Top found tags: Black Hat(4),cyber security(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meet WordHound, the tool that puts a personal touch on password crackingLocation: Twitter - San Francisco, United States
Date published: 10-08-2014

crack, many people embed clues into their login credentials, choosing for instance, "playstationplaystationdec2014" to safeguard a recently created gaming account or "L0an@ w0rk!" for an IT administrative account at a financial services company. Now, a whitehat hacker is capitalizing on the habit wi... Read more

Source: arstechnica.com

Top found tags: website(1),cyber security(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM patents cloud data location management techLocation: IBM HQ - Armonk, United States
Date published: 11-08-2014

comply with regulations governing where data can be stored in different countries and continents. "During the early years of cloud computing, it was evident that storing and accessing business data across geographically dispersed cloud computing environments could present logistical and regulatory c... Read more

Source: www.zdnet.com

Top found tags: social media(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Unsuspecting cat turned into hacker's accompliceLocation: New York, United States
Date published: 11-08-2014

Unsuspecting cat turned into hacker's accomplice. We are shocked. Shocked, we say. Warkitteh turned a household cat into an unwitting hacker's accomplice. Cats, hacker humor, Wifi security. Gene Bransfield is a 20 year veteran with IT and cybersecurity credentials. He works as principle system secur... Read more

Source: itproportal.com

Top found tags: DEF CON(2),information security(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AVG and Opera team up for browser-security bundleLocation: AVG HQ - San Francisco, United States
Date published: 11-08-2014

AVG and Opera team up for browser-security bundle. While many of us would prefer our web browser to come bare bones, and avoid things like toolbars that frequently ride along with free software, there are those folks who like a few extras. For them, AVG has partnered with Opera to mix security in wi... Read more

Source: itproportal.com

Top found tags: website(1),cyber security(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anonymous wifi the latest casualty of Russia net neurosisLocation: Moscow, Russia
Date published: 11-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Russians will be required to hand over their passport-validated phone numbers to access public wireless networks under new laws. The laws ban the use of public wireless networks, creating confusion around precisely which networks would be af... Read more

Source: go.theregister.com

Top found tags: social media(2),Electronic Frontier Foundation(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
O2 vs Vodafone: Mobe firms grab for GCHQ, gov.uk security badgeLocation: Vodafone HQ - Maastricht, The Netherlands
Date published: 11-08-2014

Both Vodafone and O2 are claiming to be the best mobile phone network for people, particularly government people, who are worried about security. O2 is crowing about achieving the secure and government-approved network certification known as CAS(T), which stands for CESG Assured Service (Telecommuni... Read more

Source: go.theregister.com Criminal Data Exchanges Offer Great Customer Service Experience | It\'s bad enough when our personal and financial information gets exposed during a data breach. It\'s adding insult to injury when we become identity theft victims because some other criminal got their hands on the information and had a shopping spree.For each of the retail breaches that we\'ve seen this year, such as Target, Neiman Marcus, P.F. Chang, and numerous others, the unpalatable reality is that the attackers don\'t hoard the millions of credit card numbers they\'ve stolen for their personal use. Instead, they turn around and sell them to other cyber-criminals on underground data exchanges. And as a cyber-crime expert explained to DEF CON attendees on Friday, these exchanges \"have a good deal of administrative oversight\" and are professional. The underground forums are not the ad-hoc efforts or \"Wild West\" marketplaces you may have imagined.Understanding how the cyber-criminal underground operates is essential in order to effectively target cyber-crime gangs and disrupt their operations, Tom Holt, an associate professor at Michigan State University specializing in cyber-crime, said during his talk. The best way to shut down the criminal enterprises is to go after these data exchanges, Holt said. Removing the entire forum disrupts criminal activity much more effectively than going after individual groups.\"Taking out an entire site is going to have a much more dramatic impact,\" he said.Organized EcosystemData dumps of credentials, such as username/password combinations, and those with payment card details, are among the most popular products sold on these exchanges, Holt said.\"When we think about the markets themselves they are organized in a unique fashion,\" he said. | http://securitywatch.pcmag.com/internet-crime/326260-criminal-data-exchanges-offer-great-customer-service-experience | 10-08-2014 | securitywatch.pcmag.com

Top found tags: United Kingdom(4),government(7),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Xiaomi's MIUI Cloud Messaging service made optional following security criticismLocation: F-Secure - Helsinki, Finland
Date published: 11-08-2014

Chinese smartphone company Xiaomi has made rapid changes to its MIUI Cloud Messaging service in order to stem security worries caused by an F-Secure report released last week. MIUI Cloud Messaging is a free service offered as part of the MIUI operating system. Working much in the same way as Apple's... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),update(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Xiaomi's MIUI Cloud Messaging service made optional following security criticismLocation: F-Secure - Helsinki, Finland
Date published: 11-08-2014

Chinese smartphone company Xiaomi has made rapid changes to its MIUI Cloud Messaging service in order to stem security worries caused by an F-Secure report released last week. MIUI Cloud Messaging is a free service offered as part of the MIUI operating system. Working much in the same way as Apple's... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),update(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Xiaomi makes cloud messaging 'opt-in' amid privacy concernsLocation: Beijing, China
Date published: 11-08-2014

Xiaomi, a popular Chinese smartphone maker, apologized to customers and made key changes to its cloud-based messaging service, the company's vice president announced Sunday. In a lengthy post to Google+, Xiaomi Vice President Hugo Barra responded to a report published last week from security firm F-... Read more

Source: cnet.com.ortal.com

Top found tags: smartphone(2),update(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM Acquires Cloud-based IAM Firm Lighthouse Security GroupLocation: IBM HQ - Armonk, United States
Date published: 11-08-2014

IBM has made yet another move to expand and enhance its Identity and Access Management (IAM) offerings, today announcing that it has acquired the business operations of Lighthouse Security Group, LLC. Founded in 2007, Lincoln, Rhode Island-based Lighthouse Security offers a cloud-hosted IAM gateway ... Read more

Source: securityweek.com

Top found tags: EN(1),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers Uncover Security Vulnerabilities in Ultra-Private BlackphoneLocation: Sawyer, United States
Date published: 11-08-2014

Multiple vulnerabilities have been identified in Blackphone, the first smartphone developed with security and privacy in mind, a researcher announced on Twitter on Sunday. Jon "Justin Case" Sawyer, CTO of Applied Cybersecurity, and Tim "diff" Strazzere, lead research and response engineer at Lookout... Read more

Source: securityweek.com

Top found tags: vulnerability(2),Lookout Mobile Security(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker roots Blackphone at Black Hat conferenceLocation: Black Hat - Las Vegas, United States
Date published: 11-08-2014

phelanto. Hacker roots Blackphone at Black Hat conference The Blackphone, billed as a super secure consumer alternative to standard smartphones, has been successfully hacked. The hack comes not long after Blackphone sparred with Blackberry after the latter called the secure device "unacceptable" for... Read more

Source: itproportal.com

Top found tags: mobile device(2),Black Hat(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government CTO Liam Maxwell will be keynote speaker at IP EXPO Europe 2014Location: Hall, United States
Date published: 11-08-2014

Government CTO Liam Maxwell will be keynote speaker at IP EXPO Europe 2014. Liam Maxwell, the government's Chief Technology Officer, has been announced as a speaker at this year's IP EXPO Europe, along with Adrienne Hall, who is general manager of Microsoft's Trustworthy Computing group. Maxwell is ... Read more

Source: itproportal.com

Top found tags: cyber security(2),government(2),Bruce Schneier(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DIME for your TOP SECRET thoughts? Son of Snowden's crypto-chatter client here soonLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 11-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines DefCon Lavabit founder Ladar Levison will within six months carve out a military-grade email service from the ashes of Ed Snowden's favourite email client. As many of you will remember, Levison killed the service to prevent his clients' info... Read more

Source: go.theregister.com

Top found tags: cyber security(4),United States(4),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GCHQ recruits spotty teens for upcoming Hack IdolLocation: Seoul, South Korea
Date published: 11-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines The GCHQ-backed Cyber Security Challenge UK is bringing cybersecurity education to UK schoolkids aged from 12 to 18 with the importation of the US-created Cyber Patriot programme. The US Air Force Association CyberPatriot youth programme ... Read more

Source: go.theregister.com

Top found tags: education(3),cyber security(4),United Kingdom(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China's Xiaomi faces privacy hurdles ahead of international expansionLocation: Beijing, China
Date published: 11-08-2014

Chinas Xiaomi has apologized for causing privacy concerns, after the fledgling smartphone maker faced scrutiny over whether it can be trusted with users personal data. Last week, red flags were raised when security firm F-Secure tested a Xiaomi phone, only to find that it sent contact informat... Read more

Source: www.pcworld.com Data breach shows dangers of weak passwords | Another day, another potentially crippling data breach.It might sound dramatic, but, if reports this week are accurate, a Russian cyber gang has pulled off an Internet heist of jaw-dropping proportions, compromising more than a billion passwords and user name combinations.Let\'s pause for that to sink in: The owners of more than 1.2 billion Internet credentials, including 500,000 unique email addresses representing one-third of all the email accounts on the entire planet are potentially at risk of identity theft, financial theft and a slew of other nefarious repercussions that my peon brain perhaps can\'t even fathom. And it\'s all because these hackers managed to write a code that infiltrated unwitting accomplices\' home computers to rob data from the more than 420,000 websites they infiltrated.Hold Security, the Milwaukee firm that uncovered the breach, warned in a Tuesday blog post: \"Whether you are a computer expert or a technophobe, as long as your data is somewhere on the World Wide Web, you may be affected by this breach. Your data has not necessarily been stolen from you directly. It could have been stolen from the service or goods providers to whom you entrust your personal information, from your employers, even from your friends and family.\"This breach makes the heart-skipper last fall appropriately dubbed Heartbleed, a bug that could leak passwords, credit card digits and more at millions of websites seem like a middle school prank in comparison.Ohio Attorney General Mike DeWine this week suggested that consumers change their passwords and keep watch over their accounts.\"Even if you don\'t know whether or not you have been directly affected, take common-sense steps to protect yourself,\" he said. | http://www.cincinnati.com/story/news/your-watchdog/consumer/2014/08/09/russian-hackers-highlight-dangers-weak-passwords/13851651/ | 10-08-2014 | www.cincinnati.com

Top found tags: United States(2),update(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EU screams foul over Microsoft data privacy case... three years too lateLocation: Microsoft HQ - Redmond, United States
Date published: 11-08-2014

If anyone's ever late to the party, you can count on Europe to drag its feet. The European Commission, the executive body of the 28 European member states, has reportedly expressed extreme concern about a court decision, forcing Microsoft to hand over data it stores overseas. Microsoft ordered to ha... Read more

Source: www.zdnet.com

Top found tags: telecom sector(4),United States(4),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Back in the USSR: Snowden leaves West behind, anonymous wifi makes Russians sing and shout [Government IT Week]Location: Black Hat - Las Vegas, United States
Date published: 11-08-2014

ZDNet's worldwide team provides global 24/7 technology news and analysis. In addition to my own coverage analysis here in the ZDNet Government column and on ZDNet's DIY-IT, every week I'll bring you a selection of the best government-related articles posted by our intrepid reporters and analysts. He... Read more

Source: www.zdnet.com

Top found tags: United States(4),cyber security(8),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Move Over Web Security, Embedded Devices Are Darling of Black HatLocation: Black Hat - Las Vegas, United States
Date published: 11-08-2014

At the risk of diving headfirst into the Internet of Things fray, embedded device security emerged as a shiny new penny during last weeks Black Hat and DEF CON festivities. Firmware is the new hacker black, and everything from USB sticks, to home routers, to automobiles is in play for exploits, d... Read more

Source: threatpost.com

Top found tags: update(2),Black Hat(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
More than a dot on a grid - Gartner's Magic QuadrantLocation: Gartner - Stamford, United States
Date published: 11-08-2014

In case you missed it, the 2014 Gartner Magic Quadrant for Unified Threat Management is out. Obviously, this is something that we at Fortinet are very proud of and because of its significance; however it is worth calling out a few points relating to this report. Qualification For starters, I thi... Read more

Source: blog.fortinet.com

Top found tags: research(1),threat(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Mumbai cyber fraudsters try to dupe Fort-based share-broking companyLocation: New York, United States
Date published: 11-08-2014

Cyber-crime frauds tried to dupe a Fort based share broking agency by allegedly hacking its computer system and sending bogus emails to its clients for providing them a loan.Police sources claim that the email was sent from the IP addresses of USA and Indonesia. Alert clients informed the company ab... Read more

Source: www.dnaindia.com

Top found tags: cybercrime(2),identity theft(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Healthcare Employee Sentenced For Identity TheftLocation: Georgia, United States
Date published: 10-08-2014

Michael J. Moore, United States Attorney for the Middle District of Georgia, announced today that Drew Johnson, 27, of Columbus, Georgia, was sentenced to serve 4 years in federal prison for accessing personal information files. The sentence was handed down by the Honorable Clay D. Land, United Stat... Read more

Source: bainbridgega.com

Top found tags: ISP(1),identity theft(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Europe's new data laws: Just how many cloud vendors would comply?Location: Brussels,Belgium
Date published: 11-08-2014

Google details troubles it and others face meeting right to be forgotten requests Google details troubles it and others face meeting right to be forgotten requests Tougher EU data protection rules are planned for adoption late this year or early next. Yet as things stand an overwhelming majority of ... Read more

Source: www.zdnet.com

Top found tags: government(2),legislation(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Preparing For Your First Board Meeting? Security Now #1 TopicLocation: New York, United States
Date published: 11-08-2014

Board of Directors Discuss Information Security Corporate Board Member and FTI Consulting recently conducted a study involving more than 500 directors and general counsel. Among the many interesting findings was a significant rise in concerns related to IT and cyber risk. When asked, What keeps y... Read more

Source: securityweek.com

Top found tags: cyber security(2),data breach(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Back to School Time Means Online Safety TimeLocation: McAfee - Santa Clara, United States
Date published: 11-08-2014

Its August which for parents (and kids) means it is back to school time. It can be easy to reminisce about your school dayspassing notes to the cute girl or boy in class, late-night study sessions with friends, or playing tag on the playground. But your kids school experience is way differe... Read more

Source: blogs.mcafee.com

Top found tags: social media(4),cybercrime(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Good passwords won't save you from data breachLocation: New York Times - New York, United States
Date published: 10-08-2014

Conventional wisdom tells us that the best way to safeguard online accounts is to set strong passwords and change them regularly. But all that really provides is a false sense of confidence, because data thieves almost never go after individuals. Why bother trying to hack one account when you can st... Read more

Source: www.sfgate.com

Top found tags: data breach(2),Google(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Paddy Power pursued data breach to Ontario homeLocation: Fergus, United States
Date published: 11-08-2014

Jason Ferguson said the job was straightforward: buy a gambling companys client data and flip it to a rival who could use the information to win new customers. Instead, the story ended last month with a fleet of cars arriving outside his home in a cul-de-sac in a suburb of Brockville, a town thre... Read more

Source: www.irishtimes.com

Top found tags: financial sector(2),government(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware Infects Point-of-Sale System at Chicago Yacht ClubLocation: Chicago, United States
Date published: 11-08-2014

Chicago Yacht Club Completes Credit Card Breach Investigation The Chicago Yacht Club has determined that a piece of malware was installed on one of its point-of-sale (PoS) servers between April 26 and June 21, the organization said on Sunday. The breach was discovered after the club called in a secu... Read more

Source: securityweek.com

Top found tags: telecom sector(4),United States(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Six Lessons I Learned About Being a Great LeaderLocation: McAfee - Santa Clara, United States
Date published: 11-08-2014

A leader serves at the front of the organization and makes a concerted effort to identify the needs of a team. More importantly, leaders foster collaboration to drive a mission forward, efficiently and effectively. They employ keen listening skills, and demonstrate that they understand the best inte... Read more

Source: blogs.mcafee.com

Top found tags: identity theft(2),social media(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Double Digit Growth, Think Big and Key ActionsLocation: McAfee - Santa Clara, United States
Date published: 11-08-2014

Last week, my leadership team and I held our Q3 Global Channels Webcast. If you were unable to attend, I encourage you to watch the replay, access the highlighted resources, and work with your channel account manager to execute on our second half priorities. You did a phenomenal job in Q2. Were s... Read more

Source: blogs.mcafee.com

Top found tags: identity theft(2),social media(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Blackphone rooted at BlackHatLocation: Ford, United States
Date published: 11-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines A security researcher at BlackHat has sparked a did-he-didn't-he Tweet-storm over the extent of an alleged hack of the secure by design Blackphone. The Twitter argument continues, with @TeamAndIRC first announcing that it o... Read more

Source: go.theregister.com

Top found tags: social media(2),vulnerability(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What can Windows users expect from August's Patch Tuesday?Location: Microsoft HQ - Redmond, United States
Date published: 11-08-2014

What can Windows users expect from August's Patch Tuesday?. As all Windows users will know, the second Tuesday in each month means it's patch time. So that system admins dont get caught out Microsoft has published its advanced notification ahead of August's Patch Tuesday. So what can we expect to... Read more

Source: itproportal.com

Top found tags: Microsoft(2),vulnerability(2),website(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Square Launches Bug Bounty, Hires Top Security ResearcherLocation: Black Hat - Las Vegas, United States
Date published: 11-08-2014

The bug bounty phenomenon began mainly with major software vendors and security companies, which were the main targets for security researchers and attackers. But it is now moving to virtually every corner of the Web and software ecosystem, and the latest company to join the party is Square, the mob... Read more

Source: threatpost.com

Top found tags: vulnerability(1),Black Hat(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Moves to Boost Search Ranking For HTTPS SitesLocation: Google HQ - Mountain View, United States
Date published: 11-08-2014

In the last couple of years, Google has been making a series of changes to its Web infrastructure to employ encryption more widely and help defeat active attackers. Much of this has gone on in the background, with the company securing the links between its data centers and making other less-noticeab... Read more

Source: threatpost.com

Top found tags: EN(1),Google(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
White House tech team to improve government websites after HealthCare.gov rolloutLocation: White House - Washington D.C., United States
Date published: 11-08-2014

WASHINGTON (Reuters) - The White House launched a new team on Monday to improve government websites and upgrade U.S. technology infrastructure in an effort to prevent a repeat of the problems with last Octobers botched rollout of the Affordable Care Act website. The move comes as Republicans seek... Read more

Source: reuters.com

Top found tags: medical sector(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Uses HTTPS in Search Engine RankingsLocation: Google HQ - Mountain View, United States
Date published: 11-08-2014

Google is now using whether a site is leveraging HTTPS as one of the factors in its search ranking. The move follows a growing emphasis on HTTPS by Google during the past few years. In 2010, Google for example began using HTTPS by default for Gmail and Web searches. A few months ago at Google I/0, t... Read more

Source: securityweek.com

Top found tags: trend(1),website(1),Google(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Todays Tech: BlackPhone gets hacked; Apple and Microsoft fight; Amazon hates authors; British government faces "revolution"Location: Microsoft HQ - Redmond, United States
Date published: 11-08-2014

Todays Tech: BlackPhone gets hacked; Apple and Microsoft fight; Amazon hates. authors; British government faces "revolution" This is war (again)! Microsoft trolls Apple in new Surface Pro 3 adverts: Mac vs PC war is back (video) Not content with mocking Siri, Microsoft has unleashed another "come... Read more

Source: itproportal.com

Top found tags: United States(2),Black Hat(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Malware bestuurt computer via verborgen pixels in afbeeldingLocation: Adobe HQ - San Jose, United States
Date published: 11-08-2014

Een malware-exemplaar dat in februari van dit jaar al werd ontdekt maar waar weinig over bekend was, blijkt digitale steganografie te gebruiken om besmette computers opdrachten te geven. Steganografie is het verbergen van informatie in onschuldig ogende objecten, zoals afbeeldingen, muziek en video'... Read more

Source: www.security.nl

Top found tags: patch(1),research(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Diefstal 1,2 miljard wachtwoorden lijkt marketingactie'Location: New York, United States
Date published: 11-08-2014

De diefstal van 1,2 miljard wachtwoorden door cybercriminelen die vorige week geopenbaard werd zou best weleens een marketingactie kunnen zijn, zo stelt Axel Arnbak, onderzoeker cybersecurity en informatierecht aan de Universiteit van Amsterdam, tegenover het Financieele Dagblad. De grootschalige da... Read more

Source: www.security.nl

Top found tags: cyber security(4),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyberwedstrijd moet Britse tieners warm maken voor IT-securityLocation: London,United Kingdom
Date published: 11-08-2014

In Groot-Brittanni wordt binnenkort een nieuwe cyberwedstrijd gestart die Britse tieners warm moet maken voor een carrire in de IT-security. De wedstrijd heet CyberCenturion en is afkomstig uit de VS, waar de wedstrijd Cyber Patriot wordt genoemd en al sinds 2010 wordt ingezet om nieuw talent te... Read more

Source: www.security.nl

Top found tags: cybercrime(2),United Kingdom(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Student opgepakt die 1 miljoen Android-toestellen besmetteLocation: Beijing, China
Date published: 11-08-2014

In China is een 19-jarige student opgepakt nadat hij een sms-virus verspreidde dat een miljoen smartphones infecteerde. De student wilde naar eigen zeggen alleen zijn vaardigheden laten zien en had geen criminele bedoelingen. De malware, die uit 2 APK-bestonden bestond, verspreidde zich via sms. Het... Read more

Source: www.security.nl

Top found tags: China(2),cybercrime(2),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyberwedstrijd moet Britse tieners warm maken voor IT-securityLocation: London,United Kingdom
Date published: 11-08-2014

In Groot-Brittanni wordt binnenkort een nieuwe cyberwedstrijd gestart die Britse tieners warm moet maken voor een carrire in de IT-security. De wedstrijd heet CyberCenturion en is afkomstig uit de VS, waar de wedstrijd Cyber Patriot wordt genoemd en al sinds 2010 wordt ingezet om nieuw talent te... Read more

Source: www.security.nl

Top found tags: cybercrime(2),United Kingdom(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Gegevens op website OV-chipkaart niet veiligLocation: Den Haag, The Netherlands
Date published: 11-08-2014

De website van OV-chipkaart is niet veilig. Door een bug in de software kunnen persoonlijke gegevens van OV-chipkaarthouders met een online-account zichtbaar zijn voor anderen, zo bevestigde een woordvoerster van het bedrijf achter de chipkaart Trans Link Systems zaterdag. Sommige gegevens zijn te w... Read more

Source: www.automatiseringgids.nl

Top found tags: government(2),politics(2),The Netherlands(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Uitbreiding TCP maakt firewalls en beveiligingssoftware onwerkzaam'Location: Thomas, United States
Date published: 11-08-2014

Als Multipath TCP gemeengoed wordt, ontstaat voor beveiligers een nachtmerrie. Apples spraakassistent Siri is n van de weinige technieken die het al gebruikt. Dat stellen Catherine Pearce en Patrick Thomas van Neohapsis tijdens een presentatie op de Black Hat-conferentie. Het probleem voor de be... Read more

Source: www.automatiseringgids.nl

Top found tags: Microsoft(2),conference(4),Black Hat(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Webgiganten steunen Facebook in privacyzaak overheidLocation: Facebook - Menlo Park, United States
Date published: 11-08-2014

Elf toonaangevende webbedrijven hebben hun steun betuigd aan Facebook in een zaak aangespannen tegen de Amerikaanse overheid over het ongecontroleerd opvragen van klantgegevens. Facebook heeft de zaak aangespannen omdat de openbaar aanklager in New York (NYDA) de gegevens van 381 klanten had opgevra... Read more

Source: www.automatiseringgids.nl

Top found tags: government(3),United States(4),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EFF prijst Google wegens voortrekken van HTTPS-sitesLocation: Google HQ - Mountain View, United States
Date published: 11-08-2014

De Amerikaanse burgerrechtenbeweging EFF is vol lof over de beslissing van Google om websites die HTTPS aanbieden iets hoger in de zoekresultaten te plaatsen. Google kondigde de maatregel vorige week aan en wil zo het gebruik van HTTPS onder websites aanmoedigen. Door het gebruik van HTTPS wordt het... Read more

Source: www.security.nl

Top found tags: government(2),Electronic Frontier Foundation(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dark Mail wordt ecosysteem met mailserver en e-mailclientLocation: New York, United States
Date published: 11-08-2014

Een groep ontwikkelaars die aan een nieuw e-mailprotocol werkt waardoor internetgebruikers straks volledig anoniem en veilig met elkaar moeten kunnen e-mailen heeft een compleet ecosysteem ontwikkeld, inclusief eigen mailserversoftware en e-mailcient. Dat liet Ladar Levison, n van de grondlegger... Read more

Source: www.security.nl

Top found tags: conference(3),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EFF prijst Google wegens voortrekken van HTTPS-sitesLocation: Google HQ - Mountain View, United States
Date published: 11-08-2014

De Amerikaanse burgerrechtenbeweging EFF is vol lof over de beslissing van Google om websites die HTTPS aanbieden iets hoger in de zoekresultaten te plaatsen. Google kondigde de maatregel vorige week aan en wil zo het gebruik van HTTPS onder websites aanmoedigen. Door het gebruik van HTTPS wordt het... Read more

Source: www.security.nl

Top found tags: government(2),Electronic Frontier Foundation(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Website ov-chipkaart bevat sinds januari privacyprobleemLocation: New York, United States
Date published: 11-08-2014

De website van de ov-chipkaart bevat op tenminste sinds januari een beveiligingsprobleem waardoor gebruikers soms gegevens van andere reizigers zagen. De technische dienst van het bedrijf achter de ov-chipkaart werd echter niet op de hoogte gesteld. Ov-chipkaartTrans Link Systems werd eind januari a... Read more

Source: tweakers.net

Top found tags: privacy(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Gartner voorspelt sterke groei van verkoop ChromebooksLocation: Gartner - Stamford, United States
Date published: 11-08-2014

Het aantal verkochte Chromebooks zal dit jaar sterk groeien ten opzichte van vorig jaar en ook in de toekomst zullen de laptops met het Chrome OS van Google het goed blijven doen, zo voorspelt Gartner. Dit jaar worden er 5,2 miljoen Chromebooks verkocht, een stijging van 79% ten opzichte van 2013. H... Read more

Source: www.security.nl

Top found tags: Chrome(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chipfabrikanten willen hardware eerste verdedigingslaag makenLocation: Amsterdam, The Netherlands
Date published: 11-08-2014

Nu mobiele apparaten steeds meer vertrouwelijke gegevens bevatten willen chipfabrikanten dat de chips die in tablets en smartphones zitten de eerste verdedigingslaag gaan vormen om het lekken van data en andere aanvallen tegen te gaan. Dat werd duidelijk tijdens het Hot Chips symposium in Cupertino.... Read more

Source: www.security.nl

Top found tags: website(1),conference(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SP stelt Kamervragen over gebruik spionagesoftware politieLocation: Den Haag, The Netherlands
Date published: 11-08-2014

De SP heeft Minister Opstelten van Veiligheid en Justitie vragen gesteld over het gebruik van de spionagesoftware FinFisher door de Nederlandse politie. Onlangs wist een aanvaller bij de aanbieder van de spyware, Gamma International, in te breken en maakte een database met gegevens buit. In de datab... Read more

Source: www.security.nl

Top found tags: malware(2),spyware(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoeker vindt lekken in luchthavenscanners VSLocation: New York, United States
Date published: 11-08-2014

Een beveiligingsonderzoeker heeft meerdere lekken in de scanners en apparatuur ontdekt die op Amerikaanse luchthavens worden toegepast, zoals backdoor-accounts en vaste wachtwoorden. Dat liet onderzoeker Billy Rios vorige week tijdens de Black Hat conferentie in Las Vegas weten. Rios onderzocht drie... Read more

Source: www.security.nl

Top found tags: Black Hat(4),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Website ov-chipkaart.nl lekte al veel langer gegevensLocation: Amsterdam, The Netherlands
Date published: 11-08-2014

De website ov-chipkaart.nl blijkt al veel langer gegevens van kaartgebruikers gelekt te hebben dan eerst werd gemeld, zo blijkt uit mailwisselingen tussen reizigers en de klantenservice van de site. Dit weekend werd bekend dat een gebruiker die een account aanmaakte de data van andere reizigers te z... Read more

Source: www.security.nl

Top found tags: update (1),website(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SP stelt Kamervragen over gebruik spionagesoftware politieLocation: Den Haag, The Netherlands
Date published: 11-08-2014

De SP heeft Minister Opstelten van Veiligheid en Justitie vragen gesteld over het gebruik van de spionagesoftware FinFisher door de Nederlandse politie. Onlangs wist een aanvaller bij de aanbieder van de spyware, Gamma International, in te breken en maakte een database met gegevens buit. In de datab... Read more

Source: www.security.nl

Top found tags: malware(2),spyware(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoeker vindt lekken in luchthavenscanners VSLocation: New York, United States
Date published: 11-08-2014

Een beveiligingsonderzoeker heeft meerdere lekken in de scanners en apparatuur ontdekt die op Amerikaanse luchthavens worden toegepast, zoals backdoor-accounts en vaste wachtwoorden. Dat liet onderzoeker Billy Rios vorige week tijdens de Black Hat conferentie in Las Vegas weten. Rios onderzocht drie... Read more

Source: www.security.nl

Top found tags: Black Hat(4),government(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM buys cloud security provider LighthouseLocation: IBM HQ - Armonk, United States
Date published: 11-08-2014

services. Financial terms of the deal were not immediately disclosed. Lighthouse is a subsidiary of longtime IBM partner Lighthouse Computer Services. Its signiture platform Gateway is used to protect identity and data in IT environments where company information is increasingly being stored in the ... Read more

Source: www.zdnet.com

Top found tags: antivirus(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Meerdere kwetsbaarheden in Wordpress verholpenLocation: WordPress - San Francisco, United States
Date published: 11-08-2014

Samenvatting: Er is een nieuwe versie van Wordpress uitgebracht waarin meerdere kwetsbaarheden worden verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om een Denial-of-Service te veroorzaken, willekeurige code uit te voeren met de rechten van de gebruiker waaronder de... Read more

Source: www.ncsc.nl

Top found tags: XSS(1),Debian(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Nginx verholpenLocation: Amsterdam, The Netherlands
Date published: 11-08-2014

Samenvatting: Er is een kwetsbaarheid in Nginx verholpen waardoor een kwaadwillend persoon toegang kan verkrijgen tot gevoelige gegevens. Gevolgen: Door deze kwetsbaarheid te misbruiken kan een kwaadwillend persoon toegang verkrijgen tot gevoelige gegevens. Beschrijving: Er is een kwetsbaarheid ontd... Read more

Source: www.ncsc.nl

Top found tags: NL(1),SSL (1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Drupal verholpenLocation: Amsterdam, The Netherlands
Date published: 11-08-2014

Samenvatting: Er zijn nieuwe versies van Drupal uitgebracht waarin een kwetsbaarheid wordt verholpen. Gevolgen: Door deze kwetsbaarheid te misbruiken kan een kwaadwillende een Denial-of-Service veroorzaken. Beschrijving: De XML-RPC endpoint in Drupal Core bevat een kwetsbaarheid in het verwerken van... Read more

Source: www.ncsc.nl

Top found tags: NL(1),vulnerability(1),Debian(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in Google ChromeLocation: Google HQ - Mountain View, United States
Date published: 11-08-2014

Samenvatting: Google heeft een update uitgebracht voor Google Chrome die diverse kwetsbaarheden verhelpt. Gevolgen: Google heeft geen details bekend gemaakt over de verholpen kwetsbaarheden. Door het omzeilen van de same origin policy kan code uitgevoerd worden in context van een andere website. Bes... Read more

Source: www.ncsc.nl

Top found tags: Google Play(4),Google(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in Google ChromeLocation: Google HQ - Mountain View, United States
Date published: 11-08-2014

Samenvatting: Google heeft een update uitgebracht voor Google Chrome die de kwetsbaarheden verhelpt. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken van de Google Chrome browser en mogelijk kan de kwaadwillende code uitvoeren met de rechten van de gebruiker. Beschrijving: Door dive... Read more

Source: www.ncsc.nl

Top found tags: telecom sector(2),update(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in IBM Tivoli MonitoringLocation: IBM HQ - Armonk, United States
Date published: 11-08-2014

Samenvatting: IBM heeft updates beschikbaar gesteld voor IBM Tivoli Monitoring die de kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan op afstand invloed hebben op de confidentialiteit en integriteit. Beschrijving: - CVE-2014-0411, CVE-2014-0453 Een kwaadwillende kan op afstand invloed hebb... Read more

Source: www.ncsc.nl

Top found tags: Java(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden verholpen in Kerberos 5Location: Amsterdam, The Netherlands
Date published: 11-08-2014

Samenvatting: MIT heeft diverse updates uitgebracht om verschillende kwetsbaarheden in Kerberos 5 te verhelpen. Zie paragraaf "Mogelijke oplossingen" voor meer informatie. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: - CV... Read more

Source: www.ncsc.nl

Top found tags: Debian(2),Fedora(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden verholpen in OpenSSLLocation: Ubuntu - London, United Kingdom
Date published: 11-08-2014

Samenvatting: De makers van OpenSSL hebben diverse updates uitgebracht om kwetsbaarheden in versies 0.9.8, 1.0.0 en 1.0.1 te verhelpen. Zie "Mogelijke oplossingen" voor software updates. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om een Denial-of-Service te veroorzaken. Be... Read more

Source: www.ncsc.nl

Top found tags: Fedora(2),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Wireshark verholpenLocation: Amsterdam, The Netherlands
Date published: 11-08-2014

Samenvatting: Er zijn meerdere kwetsbaarheden verholpen in Wireshark. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: - CVE-2014-5161, CVE-2014-5162: De Catapult DCT2000 en IrDA dissectors bevatten een "buffer underrun" kwe... Read more

Source: www.ncsc.nl

Top found tags: Debian(2),Fedora(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Linux kernel verholpenLocation: Amsterdam, The Netherlands
Date published: 11-08-2014

Samenvatting: Er zijn meerdere kwetsbaarheden in de Linux kernel verholpen. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende verhoogde gebruikersrechten verkrijgen, een Denial-of-Service veroorzaken, toegang verkrijgen tot gevoelige gegevens of beveiligingsmaatregelen omzeilen.... Read more

Source: www.ncsc.nl

Top found tags: NL(1),The Netherlands(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden verholpen in libavLocation: Ubuntu - London, United Kingdom
Date published: 11-08-2014

Samenvatting: De makers van libav hebben een update beschikbaar gemaakt die diverse kwetsbaarheden verhelpt. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om een Denial-of-Service of Man-In-The-Middle aanval uit te voeren. Beschrijving: - CVE-2013-0860, CVE-2013-3672, CVE-2013... Read more

Source: www.ncsc.nl

Top found tags: Ubuntu(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in Google ChromeLocation: Google HQ - Mountain View, United States
Date published: 11-08-2014

Samenvatting: Google heeft een update uitgebracht voor Google Chrome die diverse kwetsbaarheden verhelpt. Gevolgen: Google heeft geen details bekend gemaakt over de verholpen kwetsbaarheden. Door het omzeilen van de same origin policy kan code uitgevoerd worden in context van een andere website. Bes... Read more

Source: www.ncsc.nl

Top found tags: Google Play(4),Google(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in Google ChromeLocation: Google HQ - Mountain View, United States
Date published: 11-08-2014

Samenvatting: Google heeft een update uitgebracht voor Google Chrome die de kwetsbaarheden verhelpt. Gevolgen: Een kwaadwillende kan een Denial-of-Service veroorzaken van de Google Chrome browser en mogelijk kan de kwaadwillende code uitvoeren met de rechten van de gebruiker. Beschrijving: Door dive... Read more

Source: www.ncsc.nl

Top found tags: telecom sector(2),update(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in IBM Tivoli MonitoringLocation: IBM HQ - Armonk, United States
Date published: 11-08-2014

Samenvatting: IBM heeft updates beschikbaar gesteld voor IBM Tivoli Monitoring die de kwetsbaarheden verhelpen. Gevolgen: Een kwaadwillende kan op afstand invloed hebben op de confidentialiteit en integriteit. Beschrijving: - CVE-2014-0411, CVE-2014-0453 Een kwaadwillende kan op afstand invloed hebb... Read more

Source: www.ncsc.nl

Top found tags: Java(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden verholpen in Kerberos 5Location: Amsterdam, The Netherlands
Date published: 11-08-2014

Samenvatting: MIT heeft diverse updates uitgebracht om verschillende kwetsbaarheden in Kerberos 5 te verhelpen. Zie paragraaf "Mogelijke oplossingen" voor meer informatie. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: - CV... Read more

Source: www.ncsc.nl

Top found tags: Debian(2),Fedora(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden verholpen in OpenSSLLocation: Ubuntu - London, United Kingdom
Date published: 11-08-2014

Samenvatting: De makers van OpenSSL hebben diverse updates uitgebracht om kwetsbaarheden in versies 0.9.8, 1.0.0 en 1.0.1 te verhelpen. Zie "Mogelijke oplossingen" voor software updates. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om een Denial-of-Service te veroorzaken. Be... Read more

Source: www.ncsc.nl

Top found tags: Fedora(2),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish