Under construction

New design coming soon!

CIC News engine statistics

CIC News for 12-08-2014 contains 88 articles: cybercrime(21),cyber security(28),data breach(5),other(34)

CIC News update contains 70 English and 18 Dutch articles for today.
There are 4 published advisories, 0 are English and 4 are Dutch.
In today's English news articles:
- 14 related to cybercrime
- 26 related to cyber security
- 5 related to data breach and identity theft
- 25 for the category other news

In today's Dutch news articles:
- 7 related to cybercrime
- 2 related to cyber security
- 9 for the category other news

Have fun reading.

English cybercrime related news

Two new Gameover Zeus variants in the wildLocation: Kiev, Ukraine
Date published: 11-08-2014

Lite Zeus has fewer tricks, but updated encryption Two new Gameover Zeus variants have been found in the wild. Just two months after international law enforcement and security companies teamed to dismantle the Gameover Zeus botnet, researchers have found two new variants of the malware in the ... Read more

Source: www.scmagazine.com

Top found tags: United States(2),financial sector(4),malware(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Espionage programs linked to spying on former Soviet targetsLocation: Symantec HQ - Mountain View, United States
Date published: 12-08-2014

Flickr user: Antti Kaakinen A one-two combination of malware programs has infiltrated the embassies and government systems of a number of former Eastern Bloc nations as well as European targets, according to a technical analysis by security researchers. Using exploits and malicious downloads deliver... Read more

Source: arstechnica.com

Top found tags: USB (1),website(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
APAC seeing more APT attacks than other regionsLocation: FireEye HQ - Milpitas, United States
Date published: 12-08-2014

accounting for more than 80 percent of such attacks. In addition, high-value verticals are popular targets of advanced cyberattacks, according to a study released Tuesday by APT security vendor FireEye. These include the services, government, and high-tech industries. The study monitored computer ne... Read more

Source: www.zdnet.com

Top found tags: South Korea(2),Thailand(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fifteen countries KO'd in malware one-two punchLocation: Berlin, Germany
Date published: 12-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Someone suspected to be backed by a nation state is attacking embassies of former soviet states with a malware tool that has infiltrated networks across more than 15 countries. Hacked embassies of unnamed former soviet states include those l... Read more

Source: go.theregister.com

Top found tags: Germany(2),trojan(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple's iOS blocks gov't spying efforts, Gamma's FinSpy useless against iPhoneLocation: Gamma International - Troisdorf, Germany
Date published: 12-08-2014

Must See Gallery Best in Show: Black Hat USA 2014 Best in Show: Black Hat USA 2014 While Android phones are constantly targeted by cybercriminals, the iPhone is considered more secure. Now, leaked documents from one of the world's leading surveillance companies have reaffirmed the idea. As spotted b... Read more

Source: www.zdnet.com

Top found tags: Black Hat(4),mobile device(4),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Moscow-based hackers attack former Soviet Embassies across 15 countriesLocation: Kiev, Ukraine
Date published: 12-08-2014

AlysiaJudge. Moscow-based hackers attack former Soviet Embassies across 15 countries A huge cyber-attack has been carried out across more than 15 countries, with the hackers targeting former soviet embassies across the globe. Embassies in France, Ukraine, China, Poland and others have all been hit b... Read more

Source: itproportal.com

Top found tags: website(1),cybercrime(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
European Spammers Set Their Sights on Android DevicesLocation: Google HQ - Mountain View, United States
Date published: 12-08-2014

These days, thanks to advances in technology and an overwhelming amount of options, many of us choose to order items online in favor of walking into a brick and mortar store to make a purchase. Unfortunately, malware has caught onto this and is exploiting the trend on both mobile and desktop environ... Read more

Source: blogs.mcafee.com

Top found tags: financial sector(2),mobile device(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Moscow based hackers attack former Soviet Embassies in 15 countriesLocation: Moscow, Russia
Date published: 12-08-2014

AlysiaJudge. Moscow based hackers attack former Soviet Embassies in 15 countries A huge cyber-attack has been carried out across more than 15 countries, with the hackers targeting former soviet embassies across the globe. Embassies in France, Ukraine, China, Poland and others have all been hit by ha... Read more

Source: itproportal.com

Top found tags: website(1),cybercrime(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese cops cuff teen over Heart App Android malware flapLocation: Google HQ - Mountain View, United States
Date published: 12-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Chinese authorities have arrested a 19-year-old suspected of unleashing a fast spreading strain of malware that infects Android smartphones. Police told Chinese newspapers including Sina.com that "Li", a 19-year-old software engineering stud... Read more

Source: go.theregister.com

Top found tags: Google(2),Google Play(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
France working to protect critical infrastructure from cyber attacksLocation: Paris, France
Date published: 12-08-2014

ANSSI, France's national agency for computer systems security, has drawn up plans to make its critical infrastructure more resilient from cyber-attacks. The agency has revealed on its website how industry stakeholders (OEMs, integrators, industrial associations and end users) have been working toget... Read more

Source: www.scmagazineuk.com

Top found tags: website(1),cybercrime(2),France(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Krysanec RAT hides in fake Android appsLocation: Google HQ - Mountain View, United States
Date published: 12-08-2014

Anti-virus vendor ESET says that a new Android 'backdoor' Remote Access Trojan (RAT), Krysanec, has been masquerading as free and paid-for applications on third-party app stores. Fake AV apps spotted on Google Play, Windows Phone Store Fake AV apps spotted on Google Play, Windows Phone Store In a ne... Read more

Source: www.scmagazineuk.com

Top found tags: malware(3),cybercrime(7),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Todays Tech: Russian hackers invade Europe, robots invade the Tate Britain and John McAfee shows off his BrownListLocation: Tate, United States
Date published: 12-08-2014

Todays Tech: Russian hackers invade Europe, robots invade the Tate Britain and. John McAfee shows off his BrownList Someone's hacked off with former Soviet Embassies Moscow based hackers attack former Soviet Embassies in 15 countries Symantec has discovered that nation backed hackers have s... Read more

Source: itproportal.com

Top found tags: conference(2),DEF CON(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Millions of PCs Affected by Mysterious Computrace BackdoorLocation: Black Hat - Las Vegas, United States
Date published: 11-08-2014

Computrace Backdoor exploitability as follows: The software is extremely flexible. Its a tiny piece of code which is a part of the BIOS. As far as it is a piece of the BIOS, it is not very easy to update the software as often. So they made it very extensible. It can do nearly anything. It can ... Read more

Source: threatpost.com

Top found tags: vulnerability(2),Black Hat(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Checking In On Africa: The Latest Developments in CybercrimeLocation: Lagos, Nigeria
Date published: 11-08-2014

In the early 2000s, Africa gained notoriety due to the 419 Nigerian scam. This scam involved making payments in exchange for a reward for helping so-called high-ranking Nigerian officials and their families. While all the scams may not have necessarily originated from Africa, the use of Nigeri... Read more

Source: trendmicro.com

Top found tags: financial sector(4),malware(4),cybercrime(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SMU program fasttracks health care security, risk pros to leadership rolesLocation: New York, United States
Date published: 11-08-2014

Southern Methodist University (SMU) Cox School of Business and HITRUST have joined forces to develop a graduate program aimed at closing the skills and competencies gaps for senior risk and security officers at health care organizations. The security industry is facing a shortage of trained professi... Read more

Source: www.scmagazine.com

Top found tags: cyber security(2),education(2),information security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Your Password May Not Be as Safe as You ThinkLocation: Trustwave - Chicago, United States
Date published: 12-08-2014

Last week's announcement that a group of cybercriminals reputedly had gotten their hands on 1.2 billion user credentials turned the cyber-world's attention to a subject with whom many people have a love-hate relationship - the password. Sometimes memorable, sometimes forgotten, passwords are the key... Read more

Source: securityweek.com

Top found tags: Windows(1),cyber security(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2,285,295 Aussie logins nabbed in Russian password haulLocation: Moscow, Russia
Date published: 11-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines More than two million unique login credentials for Australian internet users were stolen as part of the massive haul of 1.2 billion passwords by a Russian hacker outfit. Earlier this month Hold Security reported that Russian hackers under th... Read more

Source: go.theregister.com

Top found tags: Google(2),government(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amtrak employee sold customer data to DEA for two decadesLocation: New York, United States
Date published: 12-08-2014

A former Amtrak employee has been giving passenger information to the Drug Enforcement Administration in exchange for money for nearly two decades, according to reports from the Whittier Daily News. A total of over $854,460 changed hands over the last 20 years, despite the fact thatinformation rel... Read more

Source: arstechnica.com

Top found tags: cyber security(2),financial sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NIST wants better SCADA securityLocation: National Institute of Standards - Gaithersburg, United States
Date published: 12-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines America's National Institute of Standards and Technology (NIST) wants to take a hand in addressing the SCADA industry's chronic insecurity, by building a test bed for industrial control systems. The Reconfigurable Industrial Control Systems ... Read more

Source: go.theregister.com

Top found tags: United States(2),critical infrastructure(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australian businesses uncertain about data handling: IDCLocation: Parke, United States
Date published: 12-08-2014

Some of the reforms that were made included giving consumers the power to request access to their personal information held by an organisation or agent; request a correction to their personal information held by an organisation or agency; opt out of receiving direct marketing communications from org... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),social media(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Xiaomi updates cloud messaging after privacy scareLocation: F-Secure - Helsinki, Finland
Date published: 12-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Chinese mobe-maker Xiaomi has changed the defaults on its cloud messaging service, in response to concerns raised by F-Secure that it was storing users' private data. At issue is a service provided for its Mi phones, which was switched on by... Read more

Source: go.theregister.com

Top found tags: cyber security(2),update(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google leaves STUPID vuln on Nest devicesLocation: Google HQ - Mountain View, United States
Date published: 12-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Google's Nest thermostat, poster-child for its Internet of Things ambitions and data collector of your home habits, gives root access to anyone with a USB drive and a quarter-minute to spare. That's the conclusion that Yier Jin, Grant Hernan... Read more

Source: go.theregister.com

Top found tags: backdoor(2),Black Hat(2),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Not All Intrusions Involve MalwareLocation: New York, United States
Date published: 12-08-2014

There is no shortage of headlines these days detailing breaches, Advanced Persistent Threats (APTs), and other such attention grabbing topics. The details vary in each individual case of course, but most of these stories have one common thread: they all involve malicious code, also known as malware.... Read more

Source: securityweek.com

Top found tags: threat(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NIST Testbed to Measure Industrial Control Systems Under CyberattackLocation: National Institute of Standards - Gaithersburg, United States
Date published: 12-08-2014

NIST to Develop Cybersecurity Testbed for ICS The National Institute of Standards and Technology (NIST) is seeking information to build a reconfigurable cybersecurity testbed for industrial control systems (ICS). The supervisory control and data acquisition (SCADA) systems, distributed control syste... Read more

Source: securityweek.com

Top found tags: government(4),United States(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Africa's cybercrime gangs move way beyond 419 scamsLocation: Trend Micro - Cupertino, United States
Date published: 12-08-2014

African cyber-criminals have expanded far beyond the simple '419' Nigerian scams they are notorious for, and are now using sophisticated botnets, RATs and targeted attack techniques, according to Trend Micro. Africa's cybercrime gangs move way beyond 419 scams Africa's cybercrime gangs move way beyo... Read more

Source: www.scmagazineuk.com

Top found tags: financial sector(4),malware(5),cybercrime(17)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Nest hacked 'in 15 seconds' as reality bites for Internet of ThingsLocation: Google HQ - Mountain View, United States
Date published: 12-08-2014

Security researchers quickly rooted Google's Nest at Black Hat over the weekend, with one describing the internet-connected thermostat as a "computer you cannot patch". Google Nest hacked 'in 15 seconds' as reality bites for Internet of Things Google Nest hacked 'in 15 seconds' as reality bites for ... Read more

Source: www.scmagazineuk.com

Top found tags: financial sector(2),Black Hat(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker exploits Android and roots Blackphone at DefCon conferenceLocation: Black Hat - Las Vegas, United States
Date published: 11-08-2014

phelanto. Hacker exploits Android and roots Blackphone at DefCon conference The Blackphone, billed as a super secure consumer alternative to standard smartphones, has been successfully hacked. The hack comes not long after Blackphone sparred with Blackberry after the latter called the secure device ... Read more

Source: itproportal.com

Top found tags: conference(3),Black Hat(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Government CTO Liam Maxwell will be keynote speaker at IP EXPO Europe 2014Location: Hall, United States
Date published: 11-08-2014

Government CTO Liam Maxwell will be keynote speaker at IP EXPO Europe 2014. Liam Maxwell, the government's Chief Technology Officer, has been announced as a speaker at this year's IP EXPO Europe, along with Adrienne Hall, who is general manager of Microsoft's Trustworthy Computing group. Maxwell is ... Read more

Source: itproportal.com

Top found tags: cyber security(2),government(2),Bruce Schneier(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Unsuspecting cat turned into hacker's accompliceLocation: New York, United States
Date published: 11-08-2014

Unsuspecting cat turned into hacker's accomplice. We are shocked. Shocked, we say. Warkitteh turned a household cat into an unwitting hacker's accomplice. Cats, hacker humor, Wifi security. Gene Bransfield is a 20 year veteran with IT and cybersecurity credentials. He works as principle system secur... Read more

Source: itproportal.com

Top found tags: DEF CON(2),information security(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook Messenger: Much ado about nothingLocation: Facebook - Menlo Park, United States
Date published: 12-08-2014

standalone mobile messaging app! It's Facebook! They make their money from watching everything you do on the net! What did you expect their new messaging-only app to do? Facebook-MessengerFacebook Messenger: No less, nor no more, respecting of your privacy than ever. If you're late to this tempest i... Read more

Source: www.zdnet.com

Top found tags: social media(2),Black Hat(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Authentication Bypass Bug Fixed in BlackBerry Z10Location: BlackBerry HQ - Ontario, Canada
Date published: 12-08-2014

/t.co/cCreFny4xg #BlackHat < @Hannibals works at @CubicaLabs Blog in English Welcome > Blog Home>Mobile Security > Authentication Bypass Bug Fixed in BlackBerry Z10 the fileserver fails to ask for a password and allows access even without specifying creden... Read more

Source: threatpost.com

Top found tags: cyber security(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Password manager LastPass goes titsup: Users LOCKED OUTLocation: Stephenson, United States
Date published: 12-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Updated Popular password management service Last Pass went on the blink today, leaving users locked out of their accounts. Reg reader Tim Stephenson, head of IT at Liftshare, told us that the firms employees had experienced timeouts tryin... Read more

Source: go.theregister.com

Top found tags: cyber security(2),financial sector(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amazon Adds Two-Factor Authentication to WorkSpacesLocation: Microsoft HQ - Redmond, United States
Date published: 12-08-2014

Amazon WorkSpaces customers can now add an extra layer of protection to their virtual desktops by enabling the two-factor authentication (2FA) feature introduced by the company on Monday. Launched in March, Amazon WorkSpaces is a cloud-based managed desktop service that can be utilized to create vir... Read more

Source: securityweek.com

Top found tags: Symantec(1),cyber security(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data residency in a borderless environmentLocation: Berlin, Germany
Date published: 12-08-2014

International use of personal data emphasises the differing laws that need to be adhered to, but there are solutions explains Alan Kessler. Data residency in a borderless environment Data residency in a borderless environment With more than 99 countries having data privacy laws in place as of mid-20... Read more

Source: www.scmagazineuk.com

Top found tags: government(2),legislation(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
European Commission backs Microsoft in privacy fight with USLocation: Microsoft HQ - Redmond, United States
Date published: 12-08-2014

Microsoft has won the European Commission's support as it battles in court to prevent the US Government getting hold of one of its customer's emails, stored at its Dublin data centre. All Microsoft-seized domains back with No-IP All Microsoft-seized domains back with No-IP On 31 July, New York judge... Read more

Source: www.scmagazineuk.com

Top found tags: Europe(3),government(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Splunk Launches Free App for Real-Time Wire Data CaptureLocation: Lee, United States
Date published: 12-08-2014

Operational intelligence software provider Splunk has introduced a new application that is designed to help enterprises capture real-time streaming wire data. Wire data is transmitted between applications and can provide useful information on security and IT infrastructure issues, app performance, a... Read more

Source: securityweek.com

Top found tags: website(1),cyber security(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2Q 2014 Security Roundup: Turning the Tables on Cyber AttacksLocation: New York, United States
Date published: 12-08-2014

The incidents that cropped up in the months of April to June 2014from the data breaches, DDoS attacks, to malware improvements and threats to privacyhighlighted the need for enterprises to craft a more strategic response against and in anticipation of security threats. There were plenty of thr... Read more

Source: trendmicro.com

Top found tags: government(4),telecom sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Stole 2 Million Customer Records Per Day in Q2 2014Location: Berlin, Germany
Date published: 12-08-2014

The second quarter of 2014 saw 237 data breaches that exposed more than 175 million customer records worldwide, according to the SafeNet Breach Level Index . That's almost 2 million customer records stolen or lost per day. The retail industry was hit hardest, with more than 145 million customer reco... Read more

Source: www.esecurityplanet.com

Top found tags: United Kingdom(2),United States(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Patient data at risk following missing unencrypted CDLocation: Jersey City, United States
Date published: 12-08-2014

Jersey City Medical Center (JCMC) patients are being notified that their information may have been compromised after an unencrypted CD went missing after being mailed. How many victims? The number of patients affected is undisclosed. What type of personal information? Names, Social Security numbers ... Read more

Source: www.scmagazine.com

Top found tags: health sector(2),identity theft(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Schnucks reaches data breach settlementLocation: St. Louis, United States
Date published: 12-08-2014

Schnuck Markets (Schnucks) has settled lawsuits resulting from a 2013 data breach, agreeing to pay customers for documented lost time, fraudulent charges and extraordinary unreimbursed monetary losses likely resulting from the breach. The Circuit Court of the City of St. Louis in Missour... Read more

Source: www.scmagazine.com

Top found tags: legislation(1),PoC(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

DefCon: Advice on Evading Black HelicoptersLocation: Pennsylvania, United States
Date published: 11-08-2014

In the modern post-Snowden world, the idea that we're all constantly being watched is not as farfetched as it once was. But how does an individual who thinks they are being watched all the time avoid being watched? Speaking at last week's Defcon security conference, Philip Polstra, associate profess... Read more

Source: www.esecurityplanet.com

Top found tags: conference(3),DEF CON(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Go Fish! How to Reel in Your ReadersLocation: New York, United States
Date published: 11-08-2014

Blogging is an important component to a digital communication strategy. Whether it is a corporate blog like ours at McAfee or convincing an executive to take to the blogosphere and provide some transparency into the company, the importance of taking ownership of your brands online voice c... Read more

Source: blogs.mcafee.com

Top found tags: health sector(2),medical sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: Hacker posts Gamma International data exposing FinFisher concernsLocation: Fisher, United States
Date published: 11-08-2014

A hacker claims to have exposed Gamma International, a U.K. company which distributes controversial spyware called FinFisher. Last week, a Reddit user called PhineasFisher claimed to have made off with 40GB of data from Gamma's networks, and in doing so, provided proof of the compa... Read more

Source: www.scmagazine.com

Top found tags: telecom sector(2),United Kingdom(2),Electronic Frontier Foundation(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PCI council releases third-party security assurance guidanceLocation: Lea, United States
Date published: 11-08-2014

PCI council releases third-party security assurance guidance The guidance is meant to help merchants and third parties better understand their roles and responsibilities in the payment security ecosystem. The PCI Security Standards Council has published supplemental guidance to help merchants and th... Read more

Source: www.scmagazine.com

Top found tags: EN(1),ISP(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google announces use of HTTPS as ranking signalLocation: Google HQ - Mountain View, United States
Date published: 11-08-2014

In an effort to bolster security on the web, Google has announced that it will boost the search engine ranking of sites that use HTTPS encryption by default. The Wall Street Journal had previously reported that the search engine giant was flirting with the idea, but according to a recent Webmaster C... Read more

Source: www.scmagazine.com

Top found tags: EN(1),Google(1),report(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese gov't drops 10 Apple products from approved listLocation: Beijing, China
Date published: 11-08-2014

Chinese government workers won't be watching Netflix or downloading apps on iPads any time soon the Chinese government has dropped it and nine more Apple products from its approved procurement list, according to Bloomberg. The government, which last month nixed Symantec and Kaspersky products, d... Read more

Source: www.scmagazine.com

Top found tags: mobile device(2),telecom sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM takes a shine to Lighthouse, gobbles bouncer-in-the-cloud bizLocation: IBM HQ - Armonk, United States
Date published: 11-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines IBM has acquired upstart Lighthouse Security Group, which lets sysadmins manage user accounts and identities in an off-premises cloud. Big Blue said the privately held Rhode Island firm will, fittingly, join the IT giant's Security Identity ... Read more

Source: go.theregister.com

Top found tags: EN(1),Linux(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Car hacking a growing concern with wireless techLocation: New York, United States
Date published: 11-08-2014

CNET Update takes the wheel: In today's tech news roundup, get caught up on the latest car hacking concerns. One security group is petitioning for the auto industry to test cars for vulnerabilities with a cyber-safety rating. This comes just as two researchers give us reason to worry about security ... Read more

Source: cnet.com.ortal.com

Top found tags: vulnerability(1),Google(2),Google Glass(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
PCI Council Publishes Guidance on Working With Third-party ProvidersLocation: New York, United States
Date published: 12-08-2014

The Payment Card Industry (PCI) Security Standards Council has published an information supplement to help organizations that want to achieve or maintain PCI DSS compliance and work efficiently with third-party service providers. Many entities turn to third-parties to store, process and transmit car... Read more

Source: securityweek.com

Top found tags: EN(1),ISP(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Todays Tech: BlackPhone gets hacked; Apple and Microsoft fight; Amazon hates authors; British government faces "revolution"Location: Microsoft HQ - Redmond, United States
Date published: 11-08-2014

Todays Tech: BlackPhone gets hacked; Apple and Microsoft fight; Amazon hates. authors; British government faces "revolution" This is war (again)! Microsoft trolls Apple in new Surface Pro 3 adverts: Mac vs PC war is back (video) Not content with mocking Siri, Microsoft has unleashed another "come... Read more

Source: itproportal.com

Top found tags: United States(2),Black Hat(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What can Windows users expect from August's Patch Tuesday?Location: Microsoft HQ - Redmond, United States
Date published: 11-08-2014

What can Windows users expect from August's Patch Tuesday?. As all Windows users will know, the second Tuesday in each month means it's patch time. So that system admins dont get caught out Microsoft has published its advanced notification ahead of August's Patch Tuesday. So what can we expect to... Read more

Source: itproportal.com

Top found tags: Microsoft(2),vulnerability(2),website(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fog Lifts on Rooted Blackphone Merry-Go-RoundLocation: Ford, United States
Date published: 12-08-2014

/t.co/cCreFny4xg #BlackHat < @Hannibals works at @CubicaLabs Blog in English Welcome > Blog Home>Mobile Security > Fog Lifts on Rooted Blackphone Merry-Go-Round Case disclosed to SGP Technologies, which quickly countered that the ADB bug was not a vulnerabilit... Read more

Source: threatpost.com

Top found tags: update(2),vulnerability(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Have You Taught Your Teen This Crucial Life Skill?Location: New York, United States
Date published: 12-08-2014

shutterstock_161232707 The taste of trepidation in our house this week is palpable, as my daughter approaches her first day of high school. As a freshman shes anxious about finding her classes, making new friends, tough teachers, and of course, the social hierarchy, better known as mean girls.... Read more

Source: blogs.mcafee.com

Top found tags: EN(1),McAfee(1),cyber bullying(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM bolsters cloud security with Lighthouse acquisitionLocation: IBM HQ - Armonk, United States
Date published: 12-08-2014

IBM bolsters cloud security with Lighthouse acquisition. IBMs cloud security portfolio got a significant shot in the arm thanks to the acquisition of Lighthouse Security Group and its renowned identity management solution. Related: Cloud: safeguarding the cloud with IBM security solutions The mai... Read more

Source: itproportal.com

Top found tags: EN(1),ISP(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US government sets up special team to avert major tech disastersLocation: Verizon HQ - New York, United States
Date published: 12-08-2014

US government sets up special team to avert major tech disasters. The US government has put together a team of IT experts, which it hopes could bring an end to tech disasters like last year's HeathCare.gov launch. HealthCare.gov was set up to help US residents apply for and manage their health insur... Read more

Source: itproportal.com

Top found tags: ISP(1),Verizon(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft patches Windows, IE, Office and serversLocation: Microsoft HQ - Redmond, United States
Date published: 12-08-2014

Microsoft has released security updates for Windows, OneNote 2007, SQL Server 2008 and above, SharePoint Server 2013 and Windows Media Center TV Pack. The updates and the vulnerabilities they address are described in nine bulletins. Most (26) of the vulnerabilities are memory corruption vulnerabilit... Read more

Source: www.zdnet.com

Top found tags: patch(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Research: 41 percent increasing IT security budget in 2014Location: New York, United States
Date published: 12-08-2014

worries. 244 respondents from around the globe and from organizations of all sizes. The resulting report, IT Security: Concerns, budgets, trends and plans, focuses on the key findings from the survey. Budgets were a hot subject. Overall, 41 percent of survey respondents said they will increase their... Read more

Source: www.zdnet.com

Top found tags: survey(1),trend(1),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe patches Flash and zero-day Acrobat bugsLocation: Adobe HQ - San Jose, United States
Date published: 12-08-2014

exploited in the wild "...in limited, isolated attacks targeting Adobe Reader users on Windows." The OS X versions of Acrobat and Reader are not affected. Users may update Acrobat and Reader with the Help > Check for Updates menu option. Flash Player users may download the latest version from Adobe ... Read more

Source: www.zdnet.com

Top found tags: Google(3),Kaspersky Lab(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat and DEF CON Wrap UpLocation: Black Hat - Las Vegas, United States
Date published: 12-08-2014

Dennis Fisher and Mike Mimoso look back on the news from the last week in Las Vegas at Black Hat and DEF CON, including the Blackphone rooting, the Computrace research and the more upbeat mood at the conferences this year. http://threatpost.com/files/2014/08/digital_underground_162.mp3 Download:di... Read more

Source: threatpost.com

Top found tags: conference(2),Black Hat(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe Patches Reader Zero Day Used in Targeted AttacksLocation: Adobe HQ - San Jose, United States
Date published: 12-08-2014

Adobe today released an out-of-band patch for a zero-day vulnerability in Adobe Reader and Acrobat that has been leveraged in targeted attacks. Kaspersky Lab Global Research and Analysis Team director Costin Raiu is credited with reporting the vulnerability. Details were not announced, but Raiu said... Read more

Source: threatpost.com

Top found tags: vulnerability(2),Kaspersky Lab(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Fixes Critical Vulnerabilities in Internet Explorer, WindowsLocation: Microsoft HQ - Redmond, United States
Date published: 12-08-2014

Microsoft and Adobe released a set of patches today to fix critical vulnerabilities in their products. In the case of Microsoft, the company released a total of nine security bulletins to patch 37 bugs. Included in that number are critical fixes for Internet Explorer and Windows. The Internet Explor... Read more

Source: securityweek.com

Top found tags: update(2),vulnerability(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft to End Support for Old Versions of Internet ExplorerLocation: Microsoft HQ - Redmond, United States
Date published: 12-08-2014

Microsoft has announced its intention to stop supporting older versions of the Internet Explorer Web browser starting with January 12, 2016. Announced last week, the decision is part of the company's efforts to get users to migrate to newer, more secure versions of the application. Microsoft points ... Read more

Source: securityweek.com

Top found tags: Microsoft(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple iOS Safe From FinSpy Surveillance Software Unless Jailbroken: DocumentLocation: Gamma International - Troisdorf, Germany
Date published: 12-08-2014

A leaked document believed to have come from a manufacturer of surveillance equipment shows Apple iOS is more resistant to the company's spyware than other mobile operating systems on the market. The document appears to come from the Gamma Group International, a manufacturer of surveillance and moni... Read more

Source: securityweek.com

Top found tags: mobile device(2),spyware(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacked Canadian ISP leads to virtual currency theftLocation: Ottawa, Ontario, Canada
Date published: 12-08-2014

A hacker who gained privileged access to a Canadian ISP's network hijacked net traffic from foreign networks and stole more than $83,000 in virtual currency. The hacker, who experts believe may be a former employee of the Canadian ISP and is working alone, compromised the servers of firms that gener... Read more

Source: www.scmagazine.com

Top found tags: report(1),research(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
White House charges elite tech team with improving websitesLocation: White House - Washington D.C., United States
Date published: 12-08-2014

The White House has put together a team of private sector technology professionals, including former Google website manager Mikey Dickerson, to upgrade the country's technology infrastructure and better government websites. The administration is hoping to avoid the same issues that plagued its healt... Read more

Source: www.scmagazine.com

Top found tags: medical sector(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Hackersgroep wil veiligheid auto's verbeterenLocation: Amsterdam, The Netherlands
Date published: 11-08-2014

Een hackersgroep wil fabrikanten helpen om de beveiliging van auto's sterk te verbeteren. De huidige moderne auto heeft ergens tussen de 60 en de 100 sensoren aan boord, gekoppeld aan computers. De groep vraagt de industrie om standaard beveiligingsprotocollen te gebruiken om het hacken van autosyst... Read more

Source: www.beveiligingnieuws.nl

Top found tags: cybercrime(1),hackers(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Journaliste blijft achter verhaal over wachtwoorddiefstal staanLocation: New York Times - New York, United States
Date published: 12-08-2014

Een bericht in de New York Times over de diefstal van 1,2 miljard wachtwoorden door cybercriminelen houdt de gemoederen nog altijd bezig, maar de schrijfster van het stuk blijft achter haar verhaal staan. Via de New York Times en de eigen website meldde Hold Security de "grootste datadiefstal ooit".... Read more

Source: www.security.nl

Top found tags: cybercrime(3),cyber security(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers waarschuwen voor Computrace-backdoorLocation: Black Hat - Las Vegas, United States
Date published: 12-08-2014

Beveiligingsonderzoekers hebben tijdens de Black Hat conferentie in Las Vegas weer gewaarschuwd voor een veel gebruikt programma dat gestolen laptops en computers moet terugvinden, maar soms stiekem genstalleerd en geactiveerd is en zich gedraagt als een backdoor. Het gaat om het programma Computr... Read more

Source: www.security.nl

Top found tags: information security(2),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overheid bouwt eigen opensource Dropbox-alternatiefLocation: Lee, United States
Date published: 12-08-2014

De overheid zal in de herfst van dit jaar een eigen versleutelde cloudopslagdienst lanceren genaamd LocalBox die tevens opensource zal zijn. Hierdoor kan straks iedereen zijn eigen LocalBox-server opzetten. Het idee voor de beveiligde clouddienst is afkomstig vanuit de Tweede Kamer. LocalBox werd di... Read more

Source: www.security.nl

Top found tags: The Netherlands(2),United States(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overheid werkt aan opensource-cloudopslagdienstLocation: Dropbox - San Francisco, United States
Date published: 12-08-2014

De overheid werkt samen met een aantal ict-bedrijven aan een decentraal Dropbox-alternatief, dat bovendien veiliger moet zijn dan bestaande cloudopslagdiensten. De code wordt opensource, zodat iedereen er een eigen server mee kan opzetten. Het idee voor de cloudopslagdienst, LocalBox, kwam vanuit de... Read more

Source: tweakers.net

Top found tags: conference(2),The Netherlands(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Overheid komt met eigen Dropbox-alternatiefLocation: Den Haag, The Netherlands
Date published: 12-08-2014

De Nederlandse overheid werkt aan een eigen, open source-versie van Dropbox onder de naam LocalBox. Dit moet een veiligere opslagdienst opleveren waarbij gegevens niet eenvoudig in handen van derden kunnen komen. LocalBox is een initiatief van 2 ambtenaren, Marcus Bremer en Ruud Vriens, en ICT-journ... Read more

Source: www.automatiseringgids.nl

Top found tags: conference(2),The Netherlands(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoek: virusscanners laten bijna kwart malware doorLocation: Amsterdam, The Netherlands
Date published: 12-08-2014

In het tweede kwartaal van dit jaar hebben virusscanners bijna een kwart van de malware doorgelaten, zo blijkt uit onderzoek van het Nederlandse beveiligingsbedrijf RedSocks. Het bedrijf verzamelde in april, mei en juni bij elkaar 21 miljoen malware-exemplaren, die vervolgens werden geanalyseerd. Da... Read more

Source: www.security.nl

Top found tags: threat(1),trend(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Privacylek in website ov-chipkaart.nl opgelostLocation: Amsterdam, The Netherlands
Date published: 12-08-2014

Het privacylek in de site ov-chipkaart.nl waardoor kaarthouders tijdens het inloggen soms de gegevens van andere reizigers te zien kregen is opgelost, zo heeft Trans Link Systems (TLS), het bedrijf achter de OV-chipkaart, laten weten. Een bug in de webserversoftware was de boosdoener. Het probleem, ... Read more

Source: www.security.nl

Top found tags: webserver(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Spionagesoftware FinSpy werkt niet op normale iPhone'Location: Apple HQ - Cupertino, United States
Date published: 12-08-2014

De spionagesoftware FinFisher van surveillancebedrijf Gamma International lijkt niet op een normale iPhone te werken, zo blijkt uit gelekte documenten van het bedrijf waar de Washington Post over bericht. Onlangs wist een aanvaller bij het bedrijf in te breken en maakte 40GB aan gegevens buit. Al in... Read more

Source: www.security.nl

Top found tags: spyware(2),government(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Gartner: einde Windows 7 kan nieuwe XPocalypse wordenLocation: Microsoft HQ - Redmond, United States
Date published: 12-08-2014

Bedrijven moeten nu al aan de slag met het einde van Windows 7 in 2020, anders kan zich een nieuwe XPocalypse voordoen, zo waarschuwt marktvorser Gartner. Tenzij er geen veranderingen optreden stopt Microsoft over iets minder dan zes jaar de ondersteuning van Windows 7. Hoewel dit nog ver weg lijkt,... Read more

Source: www.security.nl

Top found tags: update (1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers vinden backdoors in allerlei firmwareLocation: San Diego, United States
Date published: 12-08-2014

Bij het eerste grote openbare onderzoek naar firmware in allerlei apparaten hebben onderzoekers tientallen onbekende lekken ontdekt, waaronder verschillende backdoors. Onderzoekers van het Franse Eurecom onderzochten 32.000 firmware-exemplaren van bekende fabrikanten. Het ging onder andere om Xerox,... Read more

Source: www.security.nl

Top found tags: website(1),backdoor(2),report(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft verschuift blokkade oude Java-versies in IELocation: Oracle - Redwood City, United States
Date published: 12-08-2014

Microsoft heeft besloten om de maatregel waardoor oude versies van de Java-plug-in in Internet Explorer worden geblokkeerd met 30 dagen te verschuiven, van augustus naar september. Oorspronkelijk zou de softwaregigant de blokkade, die IE-gebruikers tegen aanvallen moet beschermen, vandaag invoeren. ... Read more

Source: www.security.nl

Top found tags: Internet Explorer(2),Microsoft(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beveiligde Blackphone binnen minuten gekraaktLocation: Amsterdam, The Netherlands
Date published: 12-08-2014

Het is een hacker gelukt om de beveiligde smartphone Blackphone binnen vijf minuten te kraken met volledige rechten, maar wel met medewerking van de telefooneigenaar. Voor de hack is het wel noodzakelijk om de Blackphone met een computer te koppelen.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),smartphone(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM neemt beveiligingsbedrijf Lighthouse overLocation: IBM HQ - Armonk, United States
Date published: 12-08-2014

IBM heeft voor een onbekend bedrag de Amerikaanse beveiligingsfirma Lighthouse Security Group overgenomen. Met de overname wil de Amerikaanse it-reus zijn positie op de markt voor beveiligingssoftware op basis van identiteitsbeheer verbeteren. IBM LogoHet Amerikaanse Lighthouse levert onder andere G... Read more

Source: tweakers.net

Top found tags: Symantec(1),antivirus(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Superveilige Blackphone moeiteloos gehacktLocation: Google HQ - Mountain View, United States
Date published: 12-08-2014

De als zeer veilig aangeprezen Blackphone is door een hacker in vijf minuten gekraakt tijdens de Defcon-conferentie in de VS deze week. Hacker Justin Case wist enkele zwakke plekken en lekken in de Blackphone te vinden. Daarmee kreeg hij binnen vijf minuten toegang tot de root zonder de bootloader t... Read more

Source: www.automatiseringgids.nl

Top found tags: United States(2),conference(3),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Eigen foto's op gestolen tablet worden inbreker fataalLocation: Bergen op Zoom, Bergen op Zoom, Noord-Brabant, The Netherlands
Date published: 12-08-2014

Een man uit Bergen op Zoom die afgelopen vrijdag bij zijn onderburen had ingebroken en daarbij een tablet, televisie en laptop buitmaakte is dankzij eigen foto's die hij op de gestolen tablet zette tegen de lamp gelopen. De eigenaar van de gestolen spullen kwam de inbreker zelf op het spoor. Hij wis... Read more

Source: www.security.nl

Top found tags: government(1),NL(1),police(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LastPass laat gebruikers niet inloggen door storing datacentrumLocation: Amsterdam, The Netherlands
Date published: 12-08-2014

Een onbekend aantal gebruikers van wachtwoordmanager LastPass kon de afgelopen uren niet op websites inloggen doordat er een storing in n van de datacentra was, zo laat het bedrijf weten. LastPass is een wachtwoordmanager die gebruikers hun wachtwoorden in de cloud laat opslaan. Doordat er probl... Read more

Source: www.security.nl

Top found tags: Twitter(1),website(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
USB-organisatie: gebruik geen vreemde USB-sticksLocation: Black Hat - Las Vegas, United States
Date published: 12-08-2014

Een non-profitorganisatie die zich inzet voor de promotie en support van de Universal Serial Bus (USB) heeft consumenten gewaarschuwd dat ze geen USB-sticks van vreemden moeten gebruiken en hun eigen USB-sticks niet aan onbekenden moeten geven. De waarschuwing van het USB Implementers Forum (USB-IF)... Read more

Source: www.security.nl

Top found tags: Karsten Nohl(2),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Diverse kwetsbaarheden verholpen in Kerberos 5Location: Ubuntu - London, United Kingdom
Date published: 12-08-2014

Samenvatting: MIT heeft diverse updates uitgebracht om verschillende kwetsbaarheden in Kerberos 5 te verhelpen. Zie paragraaf "Mogelijke oplossingen" voor meer informatie. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: - C... Read more

Source: www.ncsc.nl

Top found tags: Fedora(2),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in mod_security van Apache HTTP ServerLocation: Amsterdam, The Netherlands
Date published: 12-08-2014

Samenvatting: Er is een kwetsbaarheid ontdekt in mod_security van Apache HTTP Server. Zie "Mogelijke oplossingen" voor meer informatie. Gevolgen: Een aanvaller kan content opvragen wat verwijderd had moeten worden door mod_security. Beschrijving: - CVE-2013-5705 Er is een kwetsbaarheid ontdekt in de... Read more

Source: www.ncsc.nl

Top found tags: Debian(2),Fedora(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in Apache SubversionLocation: Amsterdam, The Netherlands
Date published: 12-08-2014

Samenvatting: Apache heeft verschillende kwetsbaarheden verholpen in Subversion. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende toegang verkrijgen tot gevoelige gegevens. Beschrijving: - CVE-2014-3522: Door het onvoldoende valideren van SSL certificaten kan een kwaadwillende ... Read more

Source: www.ncsc.nl

Top found tags: SSL (1),SSL(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in kde4libsLocation: Ubuntu - London, United Kingdom
Date published: 12-08-2014

Samenvatting: Er is een kwetsbaarheid in kde4libs verholpen. Gevolgen: Een lokale aanvaller kan door het misbruiken van deze kwetsbaarheid zich verhoogde rechten verschaffen op het kwetsbare systeem. Beschrijving: - CVE-2014-5033 Er bevindt zich een kwetsbaarheid in de kauth van kde4libs. Een kwaadw... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Debian(2),Ubuntu(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish