Under construction

New design coming soon!

CIC News engine statistics

CIC News for 13-08-2014 contains 143 articles: cybercrime(55),cyber security(30),data breach(15),other(43)

CIC News update contains 110 English and 33 Dutch articles for today.
There are 31 published advisories, 0 are English and 31 are Dutch.
In today's English news articles:
- 41 related to cybercrime
- 28 related to cyber security
- 15 related to data breach and identity theft
- 26 for the category other news

In today's Dutch news articles:
- 14 related to cybercrime
- 2 related to cyber security
- 17 for the category other news

Have fun reading.

English cybercrime related news

Microsoft Keeps Focus on IE Security With Patch Tuesday UpdatesLocation: Microsoft HQ - Redmond, United States
Date published: 12-08-2014

Microsoft today released its monthly Patch Tuesday Security Bulletins, and the top priority is another cumulative update for Internet Explorer; this one patches 26 vulnerabilities, including one thats been publicly reported, Microsoft said, and is likely being exploited. All of them are rated cri... Read more

Source: threatpost.com

Top found tags: vulnerability(2),website(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers trace 'Epic Turla' infection vectorLocation: Kaspersky HQ - Moscow, Russia
Date published: 12-08-2014

"Latest Citadel trick allows RDP access after malware's removal" Ten months after G-Data released its findings on Turla, researchers at Kaspersky Lab and Symantec have detailed a massive cyber-espionage operation. After spending the last 10 months analyzing a massive cyber espionage campaign, resear... Read more

Source: www.scmagazine.com

Top found tags: Kaspersky Lab(4),malware(4),0-day(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security movement urges automakers to collaborate with researchersLocation: New York, United States
Date published: 12-08-2014

A grassroots security movement called I am the Calvary, has introduced a cyber safety program to encourage collaboration between researchers and automakers as vehicles become increasingly connected. On Friday, the group presented an open letter (PDF) to the heads of automotive companies challe... Read more

Source: www.scmagazine.com

Top found tags: report(1),research(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
August's Patch TuesdayLocation: Adobe HQ - San Jose, United States
Date published: 13-08-2014

News Another Patch Tuesday is upon us, and both Microsoft and Adobe have pushed out updates to fix issues with multiple products. Title Microsoft Microsoft released nine updates today to address 37 CVEs. These updates impact Windows, Internet Explorer, .NET, OneNote, SharePoint, and SQL Server. Two ... Read more

Source: blog.fortinet.com

Top found tags: Google(3),cybercrime(4),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Dangers of the Android FakeID VulnerabilityLocation: Google HQ - Mountain View, United States
Date published: 13-08-2014

Security researchers from Bluebox Labs recently uncovered a vulnerability that may allow malicious apps to impersonate legitimate ones. This vulnerability, dubbed as FakeID, is involved with the checking of certificate signatures to prove the legitimacy of applications. What makes this highly ... Read more

Source: trendmicro.com

Top found tags: update(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beware of Greeks bearing spammy small omicrons, says GoogleLocation: Google HQ - Mountain View, United States
Date published: 13-08-2014

A week after switching on non-Eurocentric character support in Gmail, Google has announced that it's working to get its spam filters working in the new world. Last week, the Chocolate Factory flipped the switch on non-Latin character support. That gives it a brand-new spam-catching issue to address,... Read more

Source: go.theregister.com

Top found tags: financial sector(2),Google(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google tackles future threat of 'homoglyph' spam with tighter filtersLocation: Google HQ - Mountain View, United States
Date published: 13-08-2014

attacks. Google's latest effort to prevent spammers from tricking Gmail users into open unwanted email will tackle complications that arise from email supporting scripts from different language groups. As anyone with an accented character in their name would know, that character can't be used in a G... Read more

Source: www.zdnet.com

Top found tags: financial sector(2),Google(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lookout Mobile Security nabs $150 million in fundingLocation: Lookout HQ - San Francisco, United States
Date published: 13-08-2014

their company was beginning to take off. James Martin/CNET Protecting mobile devices from hackers is big business, as evidenced by the latest round of funding for Lookout Mobile Security. The nine-year-old startup announced on Wednesday that it has secured $150 million in a new round of financing, t... Read more

Source: cnet.com.ortal.com

Top found tags: New Zealand(2),Lookout Mobile Security(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China Launching 'Severe' Cyber Attacks on Taiwan: MinisterLocation: Taipei, Taiwan
Date published: 13-08-2014

TAIPEI - Taiwan's science and technology minister said Wednesday that China is launching frequent cyber attacks on the island despite warming ties between the two former rivals. "The Chinese cyberwar units have been engaging with Taiwan units almost every day, with some severe attacks every few mont... Read more

Source: securityweek.com

Top found tags: cyber warfare(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe Flash Player Installer Scams Reappear on Google PlayLocation: Google HQ - Mountain View, United States
Date published: 13-08-2014

Adobe Flash Player has been a boon to Android malware creators for a long time. These developers have taken advantage of Flashs popularity to create premium SMS Trojans and droppers, as well as other types of malware. McAfee Labs has detected a common scam appAndroid/Fladstep.Bon the Google... Read more

Source: blogs.mcafee.com

Top found tags: trojan(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LulzSec supergrass Sabu led attacks against Turkey reportLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 13-08-2014

Just months after reports emerged that LulzSec "kingpin" turned FBI snitch Hector Xavier Monsegur had allegedly led cyber-attacks against foreign governments while under FBI control, a "cache of sealed court documents" has provided some more startling reading. Monsegur whom prosecutors insist is... Read more

Source: go.theregister.com

Top found tags: United States(2),government(5),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Historic measures to curb cybercrime in GhanaLocation: Accra, Greater Accra, Ghana
Date published: 13-08-2014

from MASAHUDU KUNATEH in Accra, GhanaACCRA GHANA has established the countrys historical Computer Emergency Response Team (CERT) to curb cybercrime.The CERT, globally known as Computer Incident Response Team (CIRT) and its portal, scheduled for launch on Friday this week, is hailed as a certa... Read more

Source: cajnewsafrica.com

Top found tags: threat(1),cybercrime(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Internets Vulnerable BackboneLocation: New York, United States
Date published: 12-08-2014

How cybercriminals hijacked the Webs architecture to mine bitcoins.Some Internet security problems can be fixed. Vulnerabilities like Heartbleed, for instance, may have massive reach and widespread impact, but they ultimately come down to a clear flaw that we can mend by rewriting code. Its a ... Read more

Source: www.slate.com

Top found tags: research(1),financial sector(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
British Virgin Islands revises cybercrime bill to add public interest clauseLocation: London, United Kingdom
Date published: 11-08-2014

In a rare move by the British Virgin Islands (BVI) Governor to withhold assent, the House of Assembly opted to revisit and amend the Computer Misuse and Cybercrime Act last week to include a public-interest exemption.After months of campaigning against specific sections of the former bill, the Inter... Read more

Source: www.ifex.org

Top found tags: report(1),cybercrime(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Underground markets for stolen data as organized as real businessesLocation: Target HQ - Minneapolis, United States
Date published: 12-08-2014

Cybercriminals can easily steal bulk data and quickly sell it online before moving onto the next target, it was recently confirmed at DefCon. Criminals that compromise networks and steal large amounts of information are finding easier and more organized methods to quickly get rid of the data. Data d... Read more

Source: www.tweaktown.com

Top found tags: EN(1),cybercrime(2),DEF CON(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Austrian cybercrime on the increase in 2013: reportLocation: Vienna, Austria
Date published: 12-08-2014

VIENNA, Aug. 11 (Xinhua) -- The number of Austrian cybercrime offenses has increased 8.6 percent in 2013 though the number of solved cases also increased, latest report from the Federal Criminal Police Office (BK) said Monday.The total number of reported cases of cybercrime reached 11,199 for the ye... Read more

Source: www.shanghaidaily.com

Top found tags: Google Glass(2),social media(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The making of a cybercrime marketLocation: Fox-IT - Delft, The Netherlands
Date published: 11-08-2014

How two underground entities surfaced, battled, aligned, and ultimately extracted billions from some of the worlds largest financial institutions via unsuspecting, everyday banking client victims.I recently had the opportunity to speak with two representatives from the Netherlands-based security ... Read more

Source: www.csoonline.com

Top found tags: The Netherlands(2),cybercrime(5),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICT: Conference on the Budapest Convention on Cybercrime (Government of the Republic of Mauritius)Location: Budapest, Hungary
Date published: 11-08-2014

Government of the Republic of Mauritius ) Description GIS - August 11, 2014: A Conference on the Budapest Convention on Cybercrime, aiming at promoting the use of the Convention by stakeholders in Mauritius, opened this morning at Intercontinental Resort in Balaclava. Organised by the Ministry of In... Read more

Source: article.wn.com

Top found tags: government(1),Thailand(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Abu Dhabi Police say people are still falling prey to indecent cyber crimeLocation: New York, United States
Date published: 10-08-2014

Officials at Abu Dhabi Police have issued fresh warnings against cyber scams after 33 online blackmail cases were recorded in six months.Abu Dhabi Police found people are still falling prey to indecent cyber scams, despite several awareness campaigns.The police also noted international gangs r... Read more

Source: 7daysindubai.com

Top found tags: webcam(1),financial sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Awareness of threats key to tackling cyber crimeLocation: New York, United States
Date published: 13-08-2014

MANAMA: Doing basic cyber hygiene right can reduce the risk of a cyber breach by as much as 80 per cent, according to an expert.The fact that the Middle East is one of the areas that saw the highest cyber crime activity last year, should alert businesses to better protect themselves against cyber cr... Read more

Source: www.gulf-daily-news.com

Top found tags: threat(1),training(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Campaign for cyber attack awarenessLocation: National Crime Agency - London, United Kingdom
Date published: 13-08-2014

Not installing anti-virus and security software on new devices such as laptops and mobiles means that almost half of us are at risk from cyber attacks.That is the view of the National Crime Agency, which is launching a new campaign to increase awareness of the dangers of not protecting yourself onli... Read more

Source: uk.news.yahoo.com

Top found tags: USB (1),United Kingdom(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK Home To More Botnet Command And Control Servers Than Any Other CountryLocation: Trend Micro - Cupertino, United States
Date published: 13-08-2014

32 percent of known botnet C&C servers are hosted in Britain says Trend Micro, which warns of ongoing Windows XP threats and Heartbleed danger.The UK is home to more botnet Command and Control (C&C) servers than any other country in the world, suggests the latest quarterly report by Japanese securit... Read more

Source: www.techweekeurope.co.uk

Top found tags: financial sector(4),United Kingdom(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime must be a policing priorityLocation: London, United Kingdom
Date published: 13-08-2014

The technological revolution of the last decade has changed how society interacts and connects and how we are ever more dependent on the accuracy and confidentiality of information available at our fingertips, writes Jonathan Craig.As well as changing how we engage and conduct our affairs online, th... Read more

Source: www.newsletter.co.uk

Top found tags: survey(1),cybercrime(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Expanding Goondas Act puts personal liberty at stakeLocation: Chennai, India
Date published: 13-08-2014

CHENNAI: By paving the way for slapping the Goondas Act on single-crime offenders and including more offences in the bouquet of sins for detention under the stringent law, the Tamil Nadu government has virtually thrown down the gauntlet to the judiciary.It is for the judiciary now to hear and dispos... Read more

Source: timesofindia.indiatimes.com

Top found tags: police(1),government(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tamil Nadu govt to bring sexual offenders, cyber criminals under Goondas ActLocation: Forest, United States
Date published: 11-08-2014

Chennai: The state government today introduced two bills in the Assembly to amend Tamil Nadu Act 14 of 1982 and bring offenders in cyber crime and sexual offences against women under the Goondas Act. The laws seeks to empower the state to arrest offenders involved in Cyber crime and sexual offences ... Read more

Source: www.firstpost.com

Top found tags: legislation(1),cybercrime(3),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Clark Howard speaks on cyber crimeLocation: Howard, United States
Date published: 11-08-2014

The Jewish Education Loan Fund (JELF) is hosting a special event featuring Clark Howard on Wednesday, Aug. 13th at Maggiano's in Buckhead. The reception begins at 5:30 p.m. At 6:15, Howard will address the topic \"What Cyber Criminals Want From You and How You Can Stop Them.\"The event is open to th... Read more

Source: www.ajc.com

Top found tags: EN(1),cybercrime(3),education(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI Informant Led Cyber Attacks On Turkey GovtLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 11-08-2014

Hector Xavier Monsegur agreed to take down key hacking figures in return for avoiding a 20-year prison sentence for cyber crimes. A hacker turned FBI informant led cyber attacks on Turkey's government while under US supervision, a new report claims.Hector Xavier Monsegur known online as Sabu - a... Read more

Source: news.sky.com

Top found tags: Anonymous(2),government(3),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android Trojan passes off crafty RAT as ESET security softwareLocation: ESET HQ - Bratislava, Slovak Republic
Date published: 12-08-2014

Security firm ESET has discovered a crafty Android backdoor remote access Trojan (RAT) passing itself off as a variety of apps, including the firms own Mobile Security software.What the app, Krysanec, was trying to do is pretty straightforward fool users into downloading it on the... Read more

Source: news.techworld.com

Top found tags: telecom sector(2),trojan(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Retired policewoman loses P400,000 to ATM scamLocation: Bureau, United States
Date published: 12-08-2014

The National Bureau of Investigation (NBI) is warning the public about the rising incidents of money theft through ATM skimming.The NBI said a retired police officer sought the help of NBIs Cybercrime Division last Friday after she lost almost all her retirement fund amounting to nearly P400,000.... Read more

Source: anc.yahoo.com

Top found tags: skimming(1),cybercrime(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
State-of-the-art spear phishing and defensesLocation: Anti-Phishing Working Group - San Francisco, United States
Date published: 11-08-2014

The number of phishing sites was up 10.7-percent as of Q1 this year (over last year) while at the same time almost 32.7-percent of PCs globally were infected with malware, including adware and spyware, indicating that phishing is an increasing issue for the enterprise, according to a report from the... Read more

Source: www.csoonline.com

Top found tags: spyware(1),cybercrime(2),phishing(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden: Clapper Comments Pushed Me to Become LeakerLocation: National Security Agency - Fort Meade, United States
Date published: 13-08-2014

WASHINGTON - Edward Snowden says dishonest comments to Congress by the US intelligence chief were the final straw that prompted him to flee the country and reveal a trove of national security documents. In an interview with Wired magazine over several days in Moscow, Snowden said he had been long be... Read more

Source: securityweek.com

Top found tags: telecom sector(4),United States(6),government(11)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gmail Blocking Suspicious Addresses Containing Non-Latin CharactersLocation: Google HQ - Mountain View, United States
Date published: 13-08-2014

Google has updated Gmail spam filters to block out emails coming from addresses using suspicious combinations of Latin and non-Latin characters, the company said on Tuesday. Google announced last week that it has adopted an email standard that supports addresses with non-Latin and accented Latin cha... Read more

Source: securityweek.com

Top found tags: Google(2),Kaspersky Lab(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Number of Malware Infections Depends on Company Policy, Not Size: DamballaLocation: Damballa - Atlanta, United States
Date published: 13-08-2014

Threat detection firm Damballa has released its State of Infections Report for the second quarter of 2014. The company has been monitoring active infections on enterprise networks and found there is no correlation between the size of an organization and the proportion of machines infected with malwa... Read more

Source: securityweek.com

Top found tags: threat(1),USB (1),Damballa(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security naivety forces NCA to debut online awareness campaignLocation: National Crime Agency - London, United Kingdom
Date published: 13-08-2014

The UK's National Crime Agency has formed a new partnership with the government's Cyber Streetwise campaign after new figures from the Office of National Statistics revealed that there were 10,731 adult victims of cyber-crime last year. UK hacker breaches US Defences - faces 20 years UK hacker breac... Read more

Source: www.scmagazineuk.com

Top found tags: update(2),government(4),cybercrime(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anonymous threatens to name cop who shot dead unarmed teenLocation: Fergus, United States
Date published: 13-08-2014

A group claiming to be affiliated with hacktivist collective Anonymous has threatened to release the name of the police officer who shot unarmed teen Michael Brown in the town of Ferguson, Missouri. Operation Ferguson says it is a group of hackers linked to Anonymous. It was set up a day after the 1... Read more

Source: go.theregister.com

Top found tags: medical sector(2),social media(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden: The NSA, not Assad, took Syria off the Internet in 2012Location: Damascus, Damascus Governorate, Syria
Date published: 13-08-2014

An Arbor Networks graphic showing the sudden drop-off in network traffic from Syria on November 29, 2012 as the country was essentially erased from network routing tables. In a Wiredinterview with well-known National Security Agency journalist James Bamfordthat waspublished today, Edward Snowd... Read more

Source: arstechnica.com

Top found tags: social media(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden claims NSA, not Assad, caused Syrian Internet outage in 2012Location: Damascus, Damascus Governorate, Syria
Date published: 13-08-2014

Snowden claims NSA, not Assad, caused Syrian Internet outage in 2012. Edward Snowden has claimed that the US accidentally took most of Syria off the Internet while attempting to bug the country's online traffic. Speaking to National Security Agency journalist James Bamford for Wired, the whistleblow... Read more

Source: itproportal.com

Top found tags: NSA(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

DorkBot, a Twin Botnet of NgrBotLocation: Microsoft HQ - Redmond, United States
Date published: 12-08-2014

DorkBot is another modified IrcBot that is extremely similar to NgrBot, which is why many antivirus software treat them the same way, oftentimes using the same detection. Our botnet monitoring system has even captured NgrBot and DorkBot at almost the same time. However, according to a deeper analysi... Read more

Source: blog.fortinet.com

Top found tags: cyber security(2),United States(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New study: Activists pose easy target for nation-state attackersLocation: Microsoft HQ - Redmond, United States
Date published: 12-08-2014

according to an academic study of a four-year campaign targeting one such group. In a paper to be delivered at the USENIX Security Conference next week, six academic researchers analyzed nearly 1,500 suspicious e-mail messages targeting the World Uyghur Congress (WUC). The teamfound that, while th... Read more

Source: arstechnica.com

Top found tags: cybercrime(4),government(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Blackphone goes to Def Con and gets hackedsort ofLocation: Sawyer, United States
Date published: 12-08-2014

Chief Technology Officer Jon Callas and newly hired SGP Technologies Chief Security Officer Dan Fordwas looking to both reach a natural customer base and get help with further locking down the device. Ask and you shall receive. Jon Justin Case Sawyer, the CTO of Applied Cybersecurity LLC, w... Read more

Source: arstechnica.com

Top found tags: Black Hat(4),mobile device(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cat Hacker Scouts Out Weak Wi-Fi NetworksLocation: New York, United States
Date published: 13-08-2014

Man has always had an innate fascination with our feline friends. Ancient Egyptians famously worshiped them, some in the Middle Ages feared them, and todays Internet denizens pay money to have their pictures taken with meme-generating kitties. But theres another reason to consider the cat: it ... Read more

Source: blogs.mcafee.com

Top found tags: government(3),cyber security(8),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Naughty NSA was so drunk on data it forgot collection rulesLocation: National Security Agency - Fort Meade, United States
Date published: 13-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Declassified documents from America's Foreign Intelligence Surveillance Court (FISC) shows that even the NSA didn't know the limits of what it was supposed to collect, and overstepped its authorisations for years. The documents were released... Read more

Source: go.theregister.com

Top found tags: cyber security(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amazon tightens WorkSpaces cloud desktop security with multi-factor authenticationLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Amazon launches annual software subscription prices on AWS Marketplace Amazon launches annual software subscription prices on AWS Marketplace Amazon Web Services says the multi-factor authentication just added to WorkSpaces is the first in a series of security developments for its managed-desktop-in... Read more

Source: www.zdnet.com

Top found tags: mobile device(2),smartphone(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meet MonsterMind, the NSA Bot That Could Wage Cyberwar AutonomouslyLocation: Monster, Westland, Zuid-Holland, The Netherlands
Date published: 13-08-2014

arrows [gallery-il] Sean Gladwell/Getty Edward Snowden has made us painfully aware of the governments sweeping surveillance programs over the last year. But a new program, currently being developed at the NSA, suggests that surveillance may fuel the governments cyber defense capabilities, too.... Read more

Source: wired.com

Top found tags: cybercrime(4),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report Details China's Unrelenting Cyberattacks Against ActivistsLocation: New York Times - New York, United States
Date published: 13-08-2014

Cyber-attackers backed by China have conducted a series of apparently targeted, sophisticated cyber-attacks against activists representing the Uyghurs, a religious minority in China, a group of researchers have found. Researchers analyzed more than 1,400 email messages sent to members of the W... Read more

Source: securityweek.com

Top found tags: cybercrime(4),government(5),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
August 2014 Patch Tuesday Includes Two Critical UpdatesLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Patch-Tuesday_grayMicrosoft has rolled out nine security bulletins for their AugustPatch Tuesday. Two bulletins arerated as Critical, while the rest are rated asImportant. Microsoft Windows, Internet Explorer, Microsoft SQL Server, and Microsoft .NET Framework are some of the affected applicat... Read more

Source: trendmicro.com

Top found tags: Trend Micro(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
We told you jailbreaking your iThing was dangerousLocation: Apple HQ - Cupertino, United States
Date published: 13-08-2014

Chinese malware has infected more than 75,000 iPhones and hijacked some 22 million advertisements and stealing revenue from developers on the iOS jailbreak community, virus prober Axelle Apvrille says. The AdThief malware relied on the Cydia Substrate extension present only on jailbroken Apple devic... Read more

Source: go.theregister.com Justice Says Court Order Helped Shutdown Large Botnet | The Department of Justice in a court filing has said that technical and legal measures it has undertaken to disrupt the GameOver Zeus botnet and Cryptolocker malware have proven successful, and that significant progress has been made in remediating computers infected with GameOver Zeus (which siphons user data such as banking credentials and hijacks machines, and is said to have accounted for over $100 million in theft). In a status report filed with the US District Court for the Western District of Pennsylvania - where it unsealed criminal charges against the administrator of GameOverZeus earlier this year and announced an international effort to shut it down - DoJ said all or nearly all of the computers infected with GameOver Zeus have been liberated from the criminals\' control and are now communicating exclusively with a substitute server established pursuant to a court order. It also said traffic data from the substitute server shows that remediation efforts by Internet service providers and victims have reduced the number of computers infected with GameOver Zeus by 31 percent since the disruption commenced. Further, DoJ saidCryptolocker(used to force victims to pay to have their files unlocked) has been neutralized by the disruption and cannot communicate with the infrastructure used to control the malicious software. | http://www.fedweek.com/item-view.php?tbl=15&ID=248&a=b | 11-08-2014 | www.fedweek.com

Top found tags: mobile device(2),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
[How to] Brute forcing password cracking devices (LUKS)Location: New York, United States
Date published: 11-08-2014

We have written in the past about how to crack passwords on password-protected RAR and ZIP files, but in those cases someone wrote a program to extract the password hashes from the RAR and ZIP files first. After that, we could use John the Ripper to generate passwords (or use a dictionary) to attack... Read more

Source: www.cybercrimetech.com

Top found tags: EN(1),password(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Shielding company against cybercrimeLocation: New York, United States
Date published: 12-08-2014

Technology brings a lot of great opportunities for business, enabling companies to do things today that were unthinkable only a few years ago. However, as with most opportunities, there are associated challenges. Over recent years, cyber crime has become big business the cost has been calculated... Read more

Source: www.saudigazette.com.sa

Top found tags: social media(6),cybercrime(7),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NIST wants better SCADA securityLocation: National Institute of Standards - Gaithersburg, United States
Date published: 12-08-2014

America's National Institute of Standards and Technology (NIST) wants to take a hand in addressing the SCADA industry's chronic insecurity, by building a test bed for industrial control systems.The Reconfigurable Industrial Control Systems Cybersecurity Testbed is only in its earliest stages. Accord... Read more

Source: www.theregister.co.uk

Top found tags: United States(2),critical infrastructure(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NCA Kicks Off Cybersecurity Awareness CampaignLocation: National Crime Agency - London, United Kingdom
Date published: 12-08-2014

A new initiative by the National Crime Agency (NCA) is kicking off a campaign in the UK designed to highlight the dangers of not being protected online and encourage computer, mobile and tablet users to download and update their security software.NCAs National Cyber Crime Unit (NCCU) is working i... Read more

Source: www.infosecurity-magazine.com

Top found tags: update(2),cyber security(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Animal hackers: War Kitteh sniffs out insecure Wi-fi networksLocation: Las Vegas, Nevada, United States
Date published: 11-08-2014

Def Con hacking convention showcases new security role for cats and dogs, but projects are no joke.The intersection of animals and technology is about more than cat videos on YouTube and the Doge meme. This years Def Con hacking convention in Las Vegas showcased a pair of projects mixing pets wit... Read more

Source: www.theguardian.com

Top found tags: cybercrime(2),cyber security(2),DEF CON(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Tweaks Gmail to Help Limit SpamLocation: Black Hat - Las Vegas, United States
Date published: 13-08-2014

Move Over Web Security, Embedded Devices Podcasts Latest Podcasts All 14666090570_72a1b4cce7_k Black Hat and DEF CON Wrap Black Hat News Wrap Podcast Podcast: Black Hat News Wrap, Day BlackHat keynote_Geer Podcast: Black Hat News Wrap embedded device security Podcast: Wendy Nather on th... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),Black Hat(6),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Private Equity Firm Buys Majority Stake in IAM Vendor SailPointLocation: Cross, United States
Date published: 13-08-2014

Private equity investment firm Thoma Bravo announced on Wednesday that it would take a significant equity investment in SailPoint, a provider of identity and access management (IAM) solutions. The company would not disclose the size of the stake, but a company spokesperson told SecurityWeek that the... Read more

Source: securityweek.com

Top found tags: EN(1),ISP(1),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DEF CON 22 Turns up the Heat on DevicesLocation: DEF CON - Las Vegas, United States
Date published: 13-08-2014

One resounding but unsurprising message from this yearsDEF CON conference in Las Vegas, Nevadawas the increase in hacks against IoT devices. The lineup of hacked IoT devices was extensive. Many sessions focused on individual device hacks of consumer devices such as media players, IP... Read more

Source: trendmicro.com

Top found tags: TV (1),cyber security(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android 'wide open' as SMS attack hits 100,000 usersLocation: Google HQ - Mountain View, United States
Date published: 13-08-2014

SMS phishing malware such as the recent Heart App attack - which sent out 20 million messages and infected 100,000 Android users in China - could spread epidemically in future and cannot be stopped even by the newer versions of 'wide open' Android, researchers have warned. Android 'wide open' as SMS... Read more

Source: www.scmagazineuk.com

Top found tags: social engineering(2),cybercrime(3),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A way forward in information sharingLocation: New York, United States
Date published: 13-08-2014

Josh Goldfarb asks how can the infosec community move from informal and exclusive trust circles to more mature formal information sharing approaches, without losing agility and effectiveness. A way forward in information sharing A way forward in information sharing In the security realm, information... Read more

Source: www.scmagazineuk.com

Top found tags: information security(2),information sharing(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Retailers install shopper-tracking mannequinsLocation: Berlin, Germany
Date published: 13-08-2014

"Creepy" innovation raises privacy fears as it sends electronic beacons out to consumers passing by stores and helps them buy. Retailers install shopper-tracking mannequins Retailers install shopper-tracking mannequins In a world-first, four British retailers have installed mannequins in their store... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(2),United Kingdom(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden leaks show that terrorists are JUST LIKE USLocation: National Security Agency - Fort Meade, United States
Date published: 13-08-2014

NSA whistleblower Edward Snowden's media allies have launched a counteroffensive against allegations by intelligence agencies that terrorists have upped their game in cryptography as a result of his leaks about NSA spying. Glenn Greenwald's The Intercept published leaked GCHQ mobile phone OPSEC guid... Read more

Source: go.theregister.com

Top found tags: cyber security(4),United Kingdom(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Threat Intel TodayLocation: New York, United States
Date published: 13-08-2014

Threat Intelligence Today Strategy: How to Choose Multifactor Authentication Michael Cobb 07/31/14 Collecting, Analyzing, and Monitoring Enterprise Security Information You're likely swimming in security data, but what are the best tools and practices for analyzing it all? How can you use data to un... Read more

Source: reports.informationweek.com

Top found tags: RSA(2),cybercrime(4),exploit kit(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Disqus Patches CSRF, Other Flaws in PluginLocation: Black Hat - Las Vegas, United States
Date published: 13-08-2014

Move Over Web Security, Embedded Devices Podcasts Latest Podcasts All 14666090570_72a1b4cce7_k Black Hat and DEF CON Wrap Black Hat News Wrap Podcast Podcast: Black Hat News Wrap, Day BlackHat keynote_Geer Podcast: Black Hat News Wrap embedded device security Podcast: Wendy Nather on th... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),Black Hat(6),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Alleged scheme included fake picture with Bill ClintonLocation: Bowman, United States
Date published: 12-08-2014

DENVER Three people are accused of multiple schemes that include breaking into gym storage lockers, committing identity theft and selling stolen items through Craigslist, according to a 53-count indictment from a Denver Grand Jury.Scott Diehl, 44, and Jessica Fox, 27, are accused of breaking int... Read more

Source: www.9news.com

Top found tags: identity theft(2),social media(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Will Too Much Data Blind You to a Data Breach on Your Network?Location: Will, United States
Date published: 12-08-2014

Certainly, you have a security system or two deployed in your network. These systems, such as Intrusion Prevention Systems (IPS) or next generation firewalls (NGFW), alert you of suspicious activity on a daily basis. Furthermore, you are probably compliant to whatever your industry mandates such as ... Read more

Source: innovationinsights.wired.com

Top found tags: threat(1),cyber security(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SCHNUCK SETTLES DATA BREACH LAWSUITLocation: New York, United States
Date published: 12-08-2014

Schnuck Markets (which does business as Schnucks) announced Monday (Aug. 11) that it has settled a 2013 security breach and will be sending checks to some of its shoppers. The settlement includes paying shoppers for documented lost time, which is unusual in these kinds of databreach cases.The ... Read more

Source: www.pymnts.com

Top found tags: report(1),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
More Questions than Answers from Data Breach ReportLocation: Moscow, Russia
Date published: 11-08-2014

The American media has never paid more attention to data breaches and cybersecurity than it does today. Major breaches in the last year at large companies like Target and eBay have made information security discussions more worrying and more widespread, albeit still not universally understoo... Read more

Source: www.sys-con.com

Top found tags: information security(2),cybercrime(3),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian Cyberattack May Trigger State Security Laws And Notification ObligationsLocation: Moscow, Russia
Date published: 11-08-2014

This cyberattack also raises questions regarding whether other state data breach notification obligations are triggered even if those states do not define personal information to include usernames and passwords...Now that entities are aware that at least 1.2 billion records have been compromised fro... Read more

Source: www.jdsupra.com

Top found tags: security measures(2),update(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senoia Woman Charged With Multiple Counts Of Identity TheftLocation: Atlanta, Georgia, United States
Date published: 13-08-2014

A Senoia woman suspected of multiple counts of identity theft was arrested in Atlanta Friday following an investigation by the Senoia Police Department.The investigation began on July 9 this year when the owner of the Big Chic in Senoia discovered $7,000 had been stolen from his checking account, sa... Read more

Source: www.times-herald.com

Top found tags: EN(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian hacking suspect makes first Seattle court appearance for Broadway Grill data breachLocation: Seattle, Washington, United States
Date published: 11-08-2014

The Russian man accused in a widespread hacking operation that affected many on Capitol Hill in 2010 made his first appearance in a Seattle courtroom on Friday afternoon.Roman Seleznev, 30, was arraigned in the downtown federal courthouse after a federal judge in Guam ordered his transfer from the i... Read more

Source: www.capitolhillseattle.com

Top found tags: United States(2),financial sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Breach Hits DHS Background Check ContractorLocation: Department of Homeland Security - Washington, United States
Date published: 11-08-2014

Officials said a U.S. background check contractor for the Department of Homeland Security (DHS) suffered a data breach that most likely resulted in the theft of personally identifiable information (PII) of some DHS employees, according to a report from The Washington Post.The Post reports that the b... Read more

Source: www.esrcheck.com

Top found tags: DHS(4),government(8),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Breach Bulletin: Anonymous Launches Cyber Attack on Israeli WebsitesLocation: New York Times - New York, United States
Date published: 11-08-2014

Heres a roundup of the latest data breach news for the week of August 4, 2014:CyberVor If you follow security news, the announcement that a Russian cyber gang allegedly stole 1.2 billion passwords was arguably the biggest story of the week. Last Tuesday, the New York Times broke the news that... Read more

Source: www.forbes.com

Top found tags: data breach(2),update(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Power of the Web: Anticipating Cyber AttacksLocation: Interpol - Lyon, France
Date published: 12-08-2014

IT security teams are under siege, constantly defending against data breaches, IP theft, cyber crime, and other threats in a long and costly war. Interpol estimates cyber crime costs people and businesses billions of dollars each year. Last year Lloyds listed cyber security as the number three ri... Read more

Source: www.recordedfuture.com

Top found tags: United States(2),government(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lack of incident response holding back cyber insurance marketLocation: Target HQ - Minneapolis, United States
Date published: 12-08-2014

The hottest topic in the insurance world today is cyber risk insurance, or coverage for the response to and fallout from cyber crime and breaches. As Reuters recently highlighted, the cyber insurance market is set to double in 2014 over 2013 heady times indeed for a traditionally slow-growth ind... Read more

Source: www.propertycasualty360.com

Top found tags: government(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beware of the Risks of Online Gaming and Fantasy FootballLocation: McAfee - Santa Clara, United States
Date published: 13-08-2014

August may mean the last days of summer vacation and start of back to school for some, but for die hard NFL fans it also means the return of football (American football that is). And for many this also means the start of their fantasy football league. And though these fantasy teams are not real, the... Read more

Source: blogs.mcafee.com

Top found tags: telecom sector(2),United States(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The ex-employee menace: why companies need a security 'exit' strategyLocation: Palo Alto, United States
Date published: 13-08-2014

A new study suggests 89% of ex-employees retain access to Salesforce, PayPal & other sensitive corporate apps What do you take with you when you leave your job? According to a new report from IT apps specialist Intermedia, the answer probably includes IT accesssuch as passwords to the corporate T... Read more

Source: www.information-age.com

Top found tags: social media(4),cyber security(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK watchdog ICO complains about limited powersLocation: Brussels,Belgium
Date published: 13-08-2014

The Information Commissioner's Office (ICO) has once again hit out at its limited powers, but might get more resources and money when new EU data protection laws go live. ICO wants more power as privacy complaints hit record levels ICO wants more power as privacy complaints hit record levels In a bl... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(2),government(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Subcontractor breach impacts more than 60K Tennessee workersLocation: Tennessee, United States
Date published: 13-08-2014

More than 60,000 staffers who participated in Tennessee employee health screenings are being notified that their personal information may have been accessed by an unknown attacker that hacked into the computer system of Onsite Health Diagnostics, a subcontractor hired by Healthways, the state's well... Read more

Source: www.scmagazine.com

Top found tags: government(2),identity theft(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Blackphone hits back at DefCon hackerLocation: Ford, United States
Date published: 12-08-2014

phelanto. Blackphone hits back at DefCon hacker Blackphone has responded to @TeamAndIRC, the hacker that managed to crack the company's high security smartphone. Justin Case, who goes by the @TeamAndIRC, exposed two vulnerabilities within the phone at the DefCon conference and posted photo below. Ch... Read more

Source: itproportal.com

Top found tags: update(2),vulnerability(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
On Patch Tuesday, Microsoft releases nine patches for 37 bugsLocation: Microsoft HQ - Redmond, United States
Date published: 12-08-2014

On Patch Tuesday, Microsoft shipped nine fixes for 37 bugs in its software, bringing a cumulative update for Internet Explorer and addressing security issues in Windows, Office, SharePoint Server, SQL Server software, and the .NET Framework. In an August security bulletin, the tech giant detailed th... Read more

Source: www.scmagazine.com

Top found tags: update(2),vulnerability(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
You've got three days to patch Adobe Flash, Air, ReaderLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Adobe has patched seven vulnerabilities in its Flash and Air platforms and one in Reader and Acrobat that is being exploited by attackers. The vulnerabilities could allow attacker to "take control of affected systems" dubbed critical by the company. Administrators were urged to apply the updates wit... Read more

Source: go.theregister.com

Top found tags: Kaspersky Lab(2),Microsoft(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Looking forward to the end of Tuesday? You've patched this month's 37 Microsoft bugs, right?Location: Microsoft HQ - Redmond, United States
Date published: 12-08-2014

True to its word, Microsoft released nine security patches this month, two of which are rated as critical. The company said that the August edition of Patch Tuesday addresses a total of 37 CVE-listed security vulnerabilities. Most of the flaws will be addressed by the cumulative Internet Explorer se... Read more

Source: go.theregister.com

Top found tags: Microsoft(2),OS X(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fifteen zero days found in hacker router comp rompLocation: DEF CON - Las Vegas, United States
Date published: 13-08-2014

DEF CON Researchers have unveiled 15 zero day vulnerabilities in four home and small business routers as part of the SOHOpelessly Broken hacker competition in DEF CON this week. Four of the 10 routers offered for attack including the ASUS RT-AC66U; Netgear Centria WNDR4700; Belkin N900, and TRENDnet... Read more

Source: go.theregister.com

Top found tags: backdoor(2),Electronic Frontier Foundation(3),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile security company Lookout raises $150 millionLocation: San Francisco, United States
Date published: 13-08-2014

(Reuters) - Mobile security company Lookout Inc said it raised $150 million from a group of investors including Morgan Stanley and Goldman Sachs Group Inc. San Francisco-based Lookout, whose customers include AT&T Inc and T-Mobile US Inc, said the latest round of financing was led by T.Rowe Price As... Read more

Source: reuters.com

Top found tags: EN(1),T-Mobile(1),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden: I Left the NSA Clues, But They Couldnt Find ThemLocation: National Security Agency - Fort Meade, United States
Date published: 13-08-2014

11_Cnt27_Fr16* [gallery-ca] Platon If the NSA still doesnt know the full extent of the greatest leak of secrets in its history, its not because of Edward Snowdens attempts to cover his tracks. On the contrary, the NSAs most prolific whistleblower now claims he purposefully left a trail o... Read more

Source: wired.com

Top found tags: Gen. Keith Alexander(3),United States(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware Upping Its Game Against Virtual Environments: ReportLocation: Symantec HQ - Mountain View, United States
Date published: 13-08-2014

Virtual Machine Host Servers Should be Hardened and Protected to Defend Against Increasinlgy Complex Malware Threats While some pieces of malware are designed to stop running when they detect the presence of virtual machines in an effort to avoid being detected, researchers from Symantec have determ... Read more

Source: securityweek.com

Top found tags: conference(2),telecom sector(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe Patches Security Flaw Leveraged in Targeted AttacksLocation: Adobe HQ - San Jose, United States
Date published: 13-08-2014

Adobe Patches Reader Sandbox Escape Vulnerability Leveraged in Targeted Attacks Adobe Systems released security updates for Adobe Flash Player, Adobe Reader and Adobe Acrobat on Tuesday to address several critical vulnerabilities, including one that has been exploited in the wild. The flaw that has ... Read more

Source: securityweek.com

Top found tags: Google(3),Kaspersky Lab(4),vulnerability(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Just when you thought you were alone in the bath: Hi-res mapping satellite ready for launchLocation: National Health Service - London, United Kingdom
Date published: 13-08-2014

An American firm is preparing to launch a satellite which will map the world in a higher resolution than the public has ever seen before. Tomorrow, DigitalGlobe expects to send its WorldView-3 satellite into orbit, where it will begin sending images of objects as small as 30cm in size. It will zoom ... Read more

Source: go.theregister.com

Top found tags: ISP(1),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How To Fix Hopelessly Hackable Power Plants? Start With BeerLocation: Las Vegas, Nevada, United States
Date published: 12-08-2014

Beer is the answer to and cause of many of lifes problems. Two security experts believe its the key to exposing a dirty secret amongst manufacturers of critical infrastructure technology, one the hacker world has known for some time: the machines running power and water plants today are hopele... Read more

Source: www.forbes.com

Top found tags: SCADA (1),DEF CON(2),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Thousands of teens blackmailed by 'sextortion' criminals who threaten to post naked pictures onlineLocation: London, United Kingdom
Date published: 11-08-2014

A Mirror investigation has revealed year-on-year increases in reports of the same sextortion scam which drove teenager Daniel Perry to kill himself. eens across the UK are being blackmailed by criminals who threaten to post naked pictures of them online.A Mirror investigation has revealed year... Read more

Source: www.mirror.co.uk

Top found tags: threat(1),website(1),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker stole $83K in bitcoins: cyber expertsLocation: Ottawa, Ontario, Canada
Date published: 11-08-2014

A hacker with access to a Canadian Internet provider hijacked net traffic from large foreign networks to steal more than US$83,000 in virtual currency over a four-month period, a cyber security company said Monday.Researchers with the U.S... Read more

Source: www.bramptonguardian.com

Top found tags: ISP(1),research(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
iOS scores as most secure mobile OS in spyware reportLocation: Apple HQ - Cupertino, United States
Date published: 12-08-2014

FinSpy spyware can hack its way into Android, BlackBerry, and older versions of Windows Phone but can't touch iOS unless the device is jailbroken, according to a leaked report from Gamma Group.Apple's iOS has emerged as the most spyware-proof mobile operating system in a test conducted by a surveill... Read more

Source: www.cnet.com

Top found tags: government(3),mobile device(4),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Paper: Inside the iOS/AdThief malwareLocation: Apple HQ - Cupertino, United States
Date published: 12-08-2014

75,000 jailbroken iOS devices infected with malware that steals ad revenues.Believing that the device or operating system you use reduces your chance of being affected by malware is generally a bad idea, but those using iOS have the numbers on their side: malware targeting Apple's mobile platform is... Read more

Source: www.virusbtn.com

Top found tags: China(2),mobile device(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Turla spyware: Defending against undetectable malwareLocation: Lewis, United States
Date published: 12-08-2014

Is there a way to detect malware that's designed to avoid detection? Nick Lewis explains how the Turla spyware works and how to defend against it.In reading recently about the advanced Turla spyware, I'm concerned about how it can go dormant when its controllers sense a possible detection effort. Ho... Read more

Source: searchsecurity.techtarget.com

Top found tags: EN(1),malware(1),spyware(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RUSSIA BUGS UKRAINE GOVERNMENT OFFICES WITH SPYWARELocation: Kiev, Ukraine
Date published: 11-08-2014

Snake, an espionage tool linked to Moscow, has been found in the computers of Ukraines prime minister and various embassies of its allies in Eastern Europe. Sensitive diplomatic information has been made available to the perpetrators of the attack as a result, the Financial Times reports.Th... Read more

Source: www.nextgov.com

Top found tags: Germany(2),government(2),Ukraine(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Retail Credit Card Breaches: Payment Industry Faces Longstanding HurdlesLocation: Black Hat - Las Vegas, United States
Date published: 11-08-2014

Retailers will continue to face an uphill battle against credit card thieves who are consistently taking advantage of the tiniest crack in payment systems that are often difficult and expensive to protect, according to a security researcher studying the problem. The massive credit card breach at Tar... Read more

Source: www.crn.com

Top found tags: credit card(2),financial sector(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Taking a trip to the ATM? Beware of SkimmersLocation: New York, United States
Date published: 11-08-2014

(FBI.gov) Two brothers from Bulgaria were charged in U.S. federal court in New York with using stolen bank account information to defraud two banks of more than $1 million.Their scheme involved installing surreptitious surveillance equipment on New York City ATMs that allowed them to record customer... Read more

Source: wwlp.com

Top found tags: United States(2),telecom sector(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lookout Raises $150 Million to Grow Enterprise Mobile Security BusinessLocation: San Francisco, United States
Date published: 13-08-2014

In an effort to tap the growing demand from large businesses for mobile protection solutions, San Francisco-based Lookout, announced on Wednesday that it has raised a massive $150 million round of funding. The company currently claims a customer based of more than 50 million consumer users, of which... Read more

Source: securityweek.com

Top found tags: New Zealand(2),telecom sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Computer Thefts Expose Over 45,000 Patients' Personal DataLocation: New York, United States
Date published: 13-08-2014

Three recent burglaries at medical facilities exposed 47,686 patients' personal information, ranging from their names and years of service to their Social Security numbers, driver's license numbers and diagnosis information. South Carolina's Self Regional Healthcare recently announced that an unencr... Read more

Source: www.esecurityplanet.com

Top found tags: government(2),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BlackBerry Patches Authentication Bypass, Information Disclosure VulnerabilitiesLocation: BlackBerry HQ - Ontario, Canada
Date published: 13-08-2014

BlackBerry released patches Tuesday to plug a pair of security vulnerabilities. The first vulnerability affects the BlackBerry 10 file-sharing service vulnerability and impacts BlackBerry Z10, BlackBerry Z30, BlackBerry Q10 and BlackBerry Q5 smartphones. According to the company, the vulnerability c... Read more

Source: securityweek.com

Top found tags: update(2),vulnerability(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to Detect SSL Leakage in Mobile AppsLocation: Google HQ - Mountain View, United States
Date published: 13-08-2014

The Secure Sockets Layer protocol (SSL) is a foundational technology on the modern Internet, enabling data in transit to be encrypted and travel securely. Yet according to security researchers Tony Trummer and Tushar Dalvi, many popular mobile apps do not properly implement SSL. Trummer and Tushar, ... Read more

Source: www.esecurityplanet.com

Top found tags: DEF CON(2),financial sector(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lookout raises $150 million in financingLocation: Price, United States
Date published: 13-08-2014

Mobile security vendor Lookout has raised $150 million from a group of prominent investors to grow its security platform out to large enterprises. The company's Whole Population Security Analytics process uses a predictive model to identify and thwart malicious activity before it has an effect on a ... Read more

Source: www.scmagazine.com

Top found tags: threat(1),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tennessee company sues its bank for cyberheist lossesLocation: Tennessee, United States
Date published: 13-08-2014

TEC Industrial, a Tennessee-based electrical company, has sued TriSummit Bank following a cyberheist that stole $327,804 from the firm. TEC Industrial, was notified that cyber criminals were targeting its accounts on May 10, 2012 by investigative security journalist Brian Krebs after he was tipped o... Read more

Source: www.scmagazine.com

Top found tags: EN(1),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese teen arrested 17 hours after creating malicious 'Heart App'Location: Beijing, China
Date published: 13-08-2014

A Chinese teen has been arrested following his creation of a new malware strain called the Heart App, which has reportedly infected at least 100,000 phones. The 19-year-old software engineering student identified as Li, created the malware to show off his coding chops during his summer vacatio... Read more

Source: www.scmagazine.com

Top found tags: report(1),Sophos(1),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Belangrijke update Adobe Flash Player verhelpt kritieke lekkenLocation: Adobe HQ - San Jose, United States
Date published: 13-08-2014

Naast een update voor Adobe Reader en Acrobat heeft Adobe ook een belangrijke update voor Flash Player uitgebracht die zeven lekken verhelpt. De kwetsbaarheden zijn door Adobe als kritiek bestempeld en zorgen ervoor dat een aanvaller willekeurige code op de computer kan uitvoeren. Het bezoeken van e... Read more

Source: www.security.nl

Top found tags: telecom sector(2),update(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Noodpatch voor actief aangevallen lek in Adobe ReaderLocation: Adobe HQ - San Jose, United States
Date published: 13-08-2014

Adobe heeft gisteren een noodpatch uitgebracht voor een kritiek lek in de Windowsversie van Adobe Reader en Acrobat Reader dat al voor het verschijnen van de patch gebruikt werd om internetgebruikers met malware te infecteren. Volgens Adobe zou het om beperkte en "gesoleerde" aanvallen gaan. Dat w... Read more

Source: www.security.nl

Top found tags: patch(2),update(2),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft start botnetschoonmaak na actie FacebookLocation: Facebook - Menlo Park, United States
Date published: 13-08-2014

Microsoft is begonnen met de schoonmaak van een botnet dat dankzij Facebook begin juli werd uitgeschakeld. Het gaat om het Lecpetex-botnet dat eind vorig jaar verscheen en Facebook, spamberichten en Torrent-sites gebruikte om zichzelf te verspreiden. Naast het laten delven van computers naar digital... Read more

Source: www.security.nl

Top found tags: social media(2),update(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Britse politie start campagne voor gebruik virusscannerLocation: National Crime Agency - London, United Kingdom
Date published: 13-08-2014

De Britse politie is een landelijke campagne gestart waarbij volwassenen worden opgeroepen anti-virus op hun computer en smartphone te installeren, aangezien dit nog te weinig wordt gedaan. 40% van de Britten zou namelijk niet altijd beveiligingssoftware op nieuwe computers en smartphones installere... Read more

Source: www.security.nl

Top found tags: cybercrime(2),United Kingdom(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google verbetert spamfilters GmailLocation: Google HQ - Mountain View, United States
Date published: 13-08-2014

Om te voorkomen dat spammers niet-Latijnse karakters voor hun spamberichten gebruiken heeft Google besloten de spamfilters van Gmail te verbeteren. Vorige week kondigde de zoekgigant de ondersteuning van niet-Latijnse karakters aan, waardoor bijvoorbeeld ook Chinese karakters straks werken. Spammers... Read more

Source: www.security.nl

Top found tags: spam(1),e-mail(2),Google(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hold Security hekelt negatieve publiciteit na grote datadiefstalLocation: Sydney, Australia
Date published: 13-08-2014

Het Amerikaanse beveiligingsbedrijf Hold Security dat vorige week de diefstal van 1,2 miljard wachtwoorden bekendmaakte hekelt de negatieve publiciteit die het de afgelopen dagen ontving. Het bedrijf liet via de NY Times weten dat het een bende cybercriminelen op het spoor was gekomen. De bende had ... Read more

Source: www.security.nl

Top found tags: cybercrime(2),data theft(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Belangrijke update Adobe Flash Player verhelpt kritieke lekkenLocation: Adobe HQ - San Jose, United States
Date published: 13-08-2014

Naast een update voor Adobe Reader en Acrobat heeft Adobe ook een belangrijke update voor Flash Player uitgebracht die zeven lekken verhelpt. De kwetsbaarheden zijn door Adobe als kritiek bestempeld en zorgen ervoor dat een aanvaller willekeurige code op de computer kan uitvoeren. Het bezoeken van e... Read more

Source: www.security.nl

Top found tags: telecom sector(2),update(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Noodpatch voor actief aangevallen lek in Adobe ReaderLocation: Adobe HQ - San Jose, United States
Date published: 13-08-2014

Adobe heeft gisteren een noodpatch uitgebracht voor een kritiek lek in de Windowsversie van Adobe Reader en Acrobat Reader dat al voor het verschijnen van de patch gebruikt werd om internetgebruikers met malware te infecteren. Volgens Adobe zou het om beperkte en "gesoleerde" aanvallen gaan. Dat w... Read more

Source: www.security.nl

Top found tags: patch(2),update(2),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fake recruiter falls in cyber-sting operation in CDOLocation: New York, United States
Date published: 13-08-2014

An illegal recruiter who used a fake website to fleece prospective overseas Filipino workers was arrested in a sting operation in Cagayan de Oro City on Tuesday.The city police's anti-cybercrime unit arrested the suspect at a fast-food outlet in the city, GMA Northern Mindanao's Joe Legaspina report... Read more

Source: www.gmanetwork.com

Top found tags: website(1),cybercrime(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anti-cybercrime group nabs online fraudsterLocation: New York, United States
Date published: 13-08-2014

THE regions Anti-Cybercrime Group (IDC) arrested Tuesday a person suspected of engaging in fraud by allegedly targeting people who go online looking for work.One of the modus operandi or methods of operation used by the suspect was posting a job hiring at misorjobs.com, a website that offers empl... Read more

Source: www.sunstar.com.ph

Top found tags: cybercrime(2),website(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Grote twijfel aan 'enorme Russische datadiefstal'Location: Amsterdam, The Netherlands
Date published: 11-08-2014

Het Nationaal Cyber Security Centrum (NCSC) zegt geen nadere informatie te hebben gekregen over de vermeende diefstal van miljarden account- en inloggegevens door een Russische hackersbende.Vijf dagen na de melding van de diefstal van 4,5 miljard accountgegevens, gekoppeld aan 500 miljoen unieke e-m... Read more

Source: m.volkskrant.nl

Top found tags: The Netherlands(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Grote twijfel aan 'enorme datadiefstal'Location: New York Times - New York, United States
Date published: 11-08-2014

Het Nationaal Cyber Security Centrum (NCSC) zegt geen nadere informatie te hebben gekregen over de vermeende diefstal van miljarden account- en inloggegevens door een Russische hackersbende.Vijf dagen na de melding van de diefstal van 4,5 miljard accountgegevens, gekoppeld aan 500 miljoen unieke e-m... Read more

Source: www.telegraaf.nl

Top found tags: cyber security(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kovter-ransomware besmet 43.000 computers op n dagLocation: Amsterdam, The Netherlands
Date published: 13-08-2014

Een agressieve vorm van ransomware genaamd Kovter heeft in juni op n dag 43.000 computers weten te besmetten. Net als veel andere ransomware vergrendelt Kovter de computer. Gebruikers krijgen vervolgens een waarschuwing te zien dat ze een misdrijf hebben begaan. Om weer toegang tot de gegevens t... Read more

Source: www.security.nl

Top found tags: child pornography(2),Damballa(2),pornography(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
20% malware zou niet op Virtual Machines werkenLocation: VMware - Palo Alto, United States
Date published: 13-08-2014

Om detectie door onderzoekers te voorkomen is malware in staat om de aanwezigheid van een Virtual Machine (VM) te detecteren, maar dit biedt geen garantie dat het systeem niet genfecteerd wordt. Via een VM kan malware worden geanalyseerd zonder dat het onderliggende productiesysteem besmet raakt. ... Read more

Source: www.security.nl

Top found tags: research(1),Symantec(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Onderzoeker: Blackphone-aanval niet toepasbaar in het echtLocation: Google HQ - Mountain View, United States
Date published: 13-08-2014

De onderzoeker die dit weekend de op privacy- en security-gerichte Blackphone wist te rooten zegt dat zijn aanval niet in het echt toepasbaar is, daarnaast had hij meer dan de 5 minuten nodig zoals door verschillende websites werd gemeld. Dat laat Justin Case tegenover ThreatPost weten. De Blackphon... Read more

Source: www.security.nl

Top found tags: conference(3),United States(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Iran blokkeert internetverkeer Tor-gebruikersLocation: Teheran, Iran
Date published: 13-08-2014

De Iraanse telecommaatschappij is begonnen met het blokkeren van het internetverkeer van Tor-gebruikers, maar gebruikers lijken een manier gevonden te hebben om de blokkade te omzeilen. Via het Tor-netwerk kunnen gebruikers hun IP-adres verbergen en gecensureerde websites bezoeken. Het wordt dan ook... Read more

Source: www.security.nl

Top found tags: government(2),information security(2),Iran(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Onderzoekers vinden 15 nieuwe router-lekken tijdens wedstrijdLocation: Electronic Frontier Foundation - San Francisco, United States
Date published: 13-08-2014

Onderzoekers hebben tijdens een wedstrijd waarbij de beveiliging van routers werd getest 15 min of meer nieuwe beveiligingslekken ontdekt. De "SOHOpelessly Broken" wedstrijd was een initiatief van burgerrechtenbeweging EFF en het beveiligingsbedrijf Independent Security Evaluators (ISE). De wedstrij... Read more

Source: www.security.nl

Top found tags: trend(1),Verizon(1),Electronic Frontier Foundation(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SynoLocker versleutelt gegevens 10.000 Chinese patintenLocation: Beijing, China
Date published: 13-08-2014

De SynoLocker-ransomware die bestanden op ongepatchte NASsen van fabrikant Synology versleutelt heeft bij een Chinese universiteit de gegevens van meer dan 10.000 Chinese patinten, onderzoek en lesmateriaal versleutelt. Om de bestanden terug te krijgen moet er 250 euro losgeld worden betaald. Een ... Read more

Source: www.security.nl

Top found tags: China(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft patcht aangevallen zero day-lek in ExplorerLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Tijdens de patchdinsdag van augustus heeft Microsoft in totaal negen updates uitgebracht voor 37 lekken in Internet Explorer, Windows, SharePoint Server, .NET Framework en OneNote, waardoor een aanvaller in het ergste geval volledige controle over de computer kon krijgen. De meeste updates, 26 in to... Read more

Source: www.security.nl

Top found tags: Microsoft(2),patch(3),update(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
iOS best beveiligde besturingssysteemLocation: Apple HQ - Cupertino, United States
Date published: 13-08-2014

levert intrusion-software ten behoeve van inlichtingendiensten Het besturingssysteem iOS van Apples iPhone en iPad, blijkt veel moeilijker te hacken dan concurrerende besturingssystemen zoals Android, BlackBerry OS of Windows Mobile. Die conclusie valt te trekken uit een rapport van Gamma Group, waa... Read more

Source: www.automatiseringgids.nl

Top found tags: smartphone(3),mobile device(6),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware op gejailbreakte iPhones kaapt 22 miljoen advertentiesLocation: Apple HQ - Cupertino, United States
Date published: 13-08-2014

Malware die zo'n 75.000 gejailbreakte iPhones infecteerde heeft naar schatting 22 miljoen advertenties weten te kapen, wat de malwaremaker waarschijnlijk een aardig bedrag heeft opgeleverd. De malware werd in maart van dit jaar ontdekt en deed zich voor als een plug-in voor het Cydia Substrate frame... Read more

Source: www.security.nl

Top found tags: smartphone(1),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers vinden 15 nieuwe router-lekken tijdens wedstrijdLocation: Electronic Frontier Foundation - San Francisco, United States
Date published: 13-08-2014

Onderzoekers hebben tijdens een wedstrijd waarbij de beveiliging van routers werd getest 15 min of meer nieuwe beveiligingslekken ontdekt. De "SOHOpelessly Broken" wedstrijd was een initiatief van burgerrechtenbeweging EFF en het beveiligingsbedrijf Independent Security Evaluators (ISE). De wedstrij... Read more

Source: www.security.nl

Top found tags: trend(1),Verizon(1),Electronic Frontier Foundation(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SynoLocker versleutelt gegevens 10.000 Chinese patintenLocation: Beijing, China
Date published: 13-08-2014

De SynoLocker-ransomware die bestanden op ongepatchte NASsen van fabrikant Synology versleutelt heeft bij een Chinese universiteit de gegevens van meer dan 10.000 Chinese patinten, onderzoek en lesmateriaal versleutelt. Om de bestanden terug te krijgen moet er 250 euro losgeld worden betaald. Een ... Read more

Source: www.security.nl

Top found tags: China(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft patcht aangevallen zero day-lek in ExplorerLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Tijdens de patchdinsdag van augustus heeft Microsoft in totaal negen updates uitgebracht voor 37 lekken in Internet Explorer, Windows, SharePoint Server, .NET Framework en OneNote, waardoor een aanvaller in het ergste geval volledige controle over de computer kon krijgen. De meeste updates, 26 in to... Read more

Source: www.security.nl

Top found tags: Microsoft(2),patch(3),update(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden liet 'digitale broodkruimels' achter voor NSALocation: National Security Agency - Fort Meade, United States
Date published: 13-08-2014

Klokkenluider Edward Snowden heeft hints achtergelaten voor de NSA zodat ze precies zouden weten wat voor informatie hij meegenomen heeft en kan lekken. Dat vertelt Snowden in een interview met Wired. Volgens de klokkenluider heeft de NSA zijn "digitale broodkruimels" nog niet gevonden. Snowden wist... Read more

Source: www.nutech.nl

Top found tags: NSA (1),government(7),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Noodpatch voor actief aangevallen lek in Adobe ReaderLocation: Adobe HQ - San Jose, United States
Date published: 13-08-2014

Naast een belangrijke update voor Flash Player, heeft Adobe een noodpatch uitgebracht voor een kritiek lek in de Windowsversie van Adobe Reader dat al voor het verschijnen van de patch gebruikt werd om internetgebruikers met malware te infecteren.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Windows(1),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Moordverdachte vroeg Siri om hulp bij dumpen lichaamLocation: Amsterdam, The Netherlands
Date published: 13-08-2014

Een smartphone is in toenemende mate een goudmijn voor informatie over de gebruiker. Dat bewijst een opmerkelijke getuigenis van een rechercheur in een moordzaak in Florida. Daar zou de 20-jarige verdachte zijn huisgenoot in 2012 om het leven hebben gebracht en vervolgens Siri hebben gevraagd naar e... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),smartphone(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden liet hints voor NSA achterLocation: National Security Agency - Fort Meade, United States
Date published: 13-08-2014

NSA-klokkenluider Edward Snowden liet op servers van de NSA hints achter om zo aan te geven welke documenten hij had meegenomen. Ook wilde hij daardoor laten weten dat hij geen spion was, maar een klokkenluider. Edward SnowdenDat zegt Snowden, die al ruim een jaar in Rusland verblijft, in een interv... Read more

Source: tweakers.net

Top found tags: NSA (1),government(3),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kaseya koopt beveiliger ScorpionLocation: Kaseya HQ - Lausanne, Switzerland
Date published: 13-08-2014

Kaseya, leverancier van IT-beheersystemen heeft Scorpion Software overgenomen. Doel is de cloudgebaseerde beheerproducten aan te vullen met authenticatie-oplossingen van Scorpion. Wat Kaseya voor Scorpion betaalt, meldt het bedrijf niet. Het belangrijkste product van Scorpion is AuthAnvil, dat twee ... Read more

Source: www.automatiseringgids.nl

Top found tags: NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
iOS best beveiligde besturingssysteemLocation: Apple HQ - Cupertino, United States
Date published: 13-08-2014

levert intrusion-software ten behoeve van inlichtingendiensten Het besturingssysteem iOS van Apples iPhone en iPad, blijkt veel moeilijker te hacken dan concurrerende besturingssystemen zoals Android, BlackBerry OS of Windows Mobile. Die conclusie valt te trekken uit een rapport van Gamma Group, waa... Read more

Source: www.automatiseringgids.nl

Top found tags: smartphone(3),mobile device(6),telecom sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beveiligingsbedrijf: 'Spionagesoftware op iPhone werkt niet'Location: Apple HQ - Cupertino, United States
Date published: 12-08-2014

Uit uitgelekte documenten van een beveiligingsbedrijf blijkt dat het niet lukt om FinSpy-spyware te installeren op een iPhone, meldt The Washington Post. De spyware werkt wel op andere mobiele platform zoals Android en BlackBerry.Afluisteren van mobiele telefoons'FinSpy Mobile' is door beveiligingsb... Read more

Source: www.icreatemagazine.nl

Top found tags: government(3),mobile device(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google dicht dozijn beveiligingslekken in ChromeLocation: Google HQ - Mountain View, United States
Date published: 13-08-2014

Er is een nieuwe versie van Google Chrome verschenen waarin 12 beveiligingslekken zijn verholpen. Ook bevat Chrome 36.0.1985.143 updates voor de ingebedde Adobe Flash Player. Twee van de lekken die Google dit keer patchte waren afkomstig van externe beveiligingsonderzoekers. En van hen, Collin Pay... Read more

Source: www.security.nl

Top found tags: Chrome(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden: router-hack NSA veroorzaakte internetstoring in SyriLocation: National Security Agency - Fort Meade, United States
Date published: 13-08-2014

Een poging van de Amerikaanse inlichtingendienst NSA om op de router van een grote Syrische internetprovider in te breken zorgde ervoor dat het land in 2012 opeens volledig van het internet was afgesloten. Dat zegt klokkenluider Edward Snowden in een uitgebreid interview met Wired. De Tailored Acces... Read more

Source: www.security.nl

Top found tags: NSA (1),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid in Adobe Reader and Adobe Acrobat verholpenLocation: Adobe HQ - San Jose, United States
Date published: 13-08-2014

Samenvatting: Adobe heeft updates beschikbaar gesteld om kwetsbaarheid in Adobe Reader en Adobe Acrobat te verhelpen. Gevolgen: Kwaadwillenden kunnen de kwetsbaarheden misbruiken om Adobe Acrobat Reader en Adobe Acrobat om willekeurige code uit te voeren met de rechten van de ingelogde gebruiker. Be... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Windows(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe verhelpt kwetsbaarheden in Adobe Flash PlayerLocation: Adobe HQ - San Jose, United States
Date published: 13-08-2014

Samenvatting: Adobe heeft meerdere kwetsbaarheden verholpen in Flash Player. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende willekeurige code uitvoeren en beveiligingsmaatregelen omzeilen. Beschrijving: - CVE-2014-0540, CVE-2014-0542, CVE-2014-0543, CVE-2014-0544, CVE-2014-05... Read more

Source: www.ncsc.nl

Top found tags: telecom sector(2),vulnerability(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-051: Microsoft verhelpt meerdere kwetsbaarheden in Internet ExplorerLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft een groot aantal kwetsbaarheden in Internet Explorer verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden misbruiken om willekeurige code uit te voeren onder de beperkte rechten van Internet Explorer of de rechten van een gebruiker. Beschrijving: Microsoft heeft... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-050: Kwetsbaarheid in Microsoft SharePoint verholpenLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft updates beschikbaar gesteld voor SharePoint 2013 waarmee een kwetsbaarheid wordt verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om willekeurige code uit te voeren onder de rechten van een ingelogde gebruiker. Beschrijving: Er bevindt zic... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-049: Kwetsbaarheid in Microsoft Windows verholpenLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft updates beschikbaar gesteld waarmee een kwetsbaarheid in Microsoft Windows wordt verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om willekeurige code uit te voeren onder SYSTEM rechten. Beschrijving: Er bevindt zich een kwetsbaarheid in M... Read more

Source: www.ncsc.nl

Top found tags: Windows(1),Microsoft(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-048: Kwetsbaarheid in Microsoft OneNote verholpenLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft updates beschikbaar gesteld voor OneNote 2007 SP3 waarmee een kwetsbaarheid wordt verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om op afstand willekeurige code uit te voeren onder de rechten van de ingelogde gebruiker. Beschrijving: Er ... Read more

Source: www.ncsc.nl

Top found tags: update (1),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-047: Microsoft verhelpt kwetsbaarheid in RPC serverLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft een kwetsbaarheid in de Remote Procedure Call (RPC) server verholpen. Gevolgen: Door de kwetsbaarheid te misbruiken kan een kwaadwillende het geheugen van een proces vullen met malafide RPC berichten. Als een kwaadwillende nog een kwetsbaarheid kent kan dit kan vervolge... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-046: Microsoft verhelpt kwetsbaarheid in .NET frameworkLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft een kwetsbaarheid in het .NET Framework verholpen. Gevolgen: Deze kwetsbaarheid helpt bij het omzeilen van Adress Space Layout Randomisation (ASLR). Als een kwaadwillende een andere kwetsbaarheid kent kan de hier omschreven kwetsbaarheid helpen misbruik van de andere kw... Read more

Source: www.ncsc.nl

Top found tags: update (1),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-045: Microsoft verhelpt meerdere kwetsbaarheden in de Windows kernelLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft een aantal kwetsbaarheden in de Windows kernel verholpen. Gevolgen: Een kwaadwillende die programma's kan uitvoeren kan door misbruik te maken van een kwetsbaarheid instructies uitvoeren binnen de kernel. Zo kunnen alle kernel beveiligingsmaatregelen omzeild worden. Ook... Read more

Source: www.ncsc.nl

Top found tags: Microsoft(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-044: Kwetsbaarheden in Microsoft SQL Server verholpenLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft updates beschikbaar gesteld waarmee kwetsbaarheden in SQL Server worden verholpen. Gevolgen: Een kwaadwillende kan door de kwetsbaarheden te misbruiken een Cross-Site Scripting (XSS) aanval uitvoeren of een Denial-of-Service veroorzaken. Beschrijving: - CVE-2014-1820 Er... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-043: Windows Media Center kwetsbaarheid verholpenLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft een kwetsbaarheid verholpen in Windows Media Center. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om willekeurige code uit te voeren onder de rechten van een gebruiker. Beschrijving: Er bevindt zich een kwetsbaarheid in Microsoft Windows Media Ce... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Cisco Unified Communications Manager verholpenLocation: Cisco HQ - San Jose, United States
Date published: 13-08-2014

Samenvatting: Cisco heeft meerdere kwetsbaarheden in de Cisco Unified Communications Manager verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om een Denial-of-Service te veroorzaken of zich verhoogde rechten verschaffen op het kwetsbare systeem. Beschrijving: -CVE-201... Read more

Source: www.ncsc.nl

Top found tags: DoS(1),NL(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Wordpress verholpenLocation: WordPress - San Francisco, United States
Date published: 13-08-2014

Samenvatting: Er is een nieuwe versie van Wordpress uitgebracht waarin meerdere kwetsbaarheden worden verholpen. Gevolgen: Een kwaadwillende kan een van de kwetsbaarheden mogelijk misbruiken om een Denial-of-Service van het webserver proces te veroorzaken. Voor deze kwetsbaarheid is exploit code pub... Read more

Source: www.ncsc.nl

Top found tags: XSS(1),Debian(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Drupal verholpenLocation: Amsterdam, The Netherlands
Date published: 13-08-2014

Samenvatting: Er zijn nieuwe versies van Drupal uitgebracht waarin een kwetsbaarheid wordt verholpen. Gevolgen: Door deze kwetsbaarheid te misbruiken kan een kwaadwillende een Denial-of-Service van het webserver proces veroorzaken. Beschrijving: De XML-RPC endpoint in Drupal Core bevat een kwetsbaar... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),webserver(1),Debian(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden in Oracle VirtualBox verholpenLocation: Oracle - Redwood City, United States
Date published: 13-08-2014

Samenvatting: Er bevindt zich een aantal kwetsbaarheden in Oracle VirtualBox die alleen door lokale kwaadwillenden misbruikt kan worden. Oracle heeft nieuwe versies van VirtualBox uitgebracht om deze kwetsbaarheden te verhelpen. Gevolgen: Misbruik van de kwetsbaarheden kan leiden tot lokaal verhoogd... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Windows(1),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Adobe Reader and Adobe Acrobat verholpenLocation: Adobe HQ - San Jose, United States
Date published: 13-08-2014

Samenvatting: Adobe heeft updates beschikbaar gesteld om kwetsbaarheid in Adobe Reader en Adobe Acrobat te verhelpen. Gevolgen: Kwaadwillenden kunnen de kwetsbaarheden misbruiken om Adobe Acrobat Reader en Adobe Acrobat om willekeurige code uit te voeren met de rechten van de ingelogde gebruiker. Be... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Windows(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe verhelpt kwetsbaarheden in Adobe Flash PlayerLocation: Adobe HQ - San Jose, United States
Date published: 13-08-2014

Samenvatting: Adobe heeft meerdere kwetsbaarheden verholpen in Flash Player. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende willekeurige code uitvoeren en beveiligingsmaatregelen omzeilen. Beschrijving: - CVE-2014-0540, CVE-2014-0542, CVE-2014-0543, CVE-2014-0544, CVE-2014-05... Read more

Source: www.ncsc.nl

Top found tags: telecom sector(2),vulnerability(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-051: Microsoft verhelpt meerdere kwetsbaarheden in Internet ExplorerLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft een groot aantal kwetsbaarheden in Internet Explorer verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden misbruiken om willekeurige code uit te voeren onder de beperkte rechten van Internet Explorer of de rechten van een gebruiker. Beschrijving: Microsoft heeft... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-050: Kwetsbaarheid in Microsoft SharePoint verholpenLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft updates beschikbaar gesteld voor SharePoint 2013 waarmee een kwetsbaarheid wordt verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om willekeurige code uit te voeren onder de rechten van een ingelogde gebruiker. Beschrijving: Er bevindt zic... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-049: Kwetsbaarheid in Microsoft Windows verholpenLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft updates beschikbaar gesteld waarmee een kwetsbaarheid in Microsoft Windows wordt verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om willekeurige code uit te voeren onder SYSTEM rechten. Beschrijving: Er bevindt zich een kwetsbaarheid in M... Read more

Source: www.ncsc.nl

Top found tags: Windows(1),Microsoft(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-048: Kwetsbaarheid in Microsoft OneNote verholpenLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft updates beschikbaar gesteld voor OneNote 2007 SP3 waarmee een kwetsbaarheid wordt verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om op afstand willekeurige code uit te voeren onder de rechten van de ingelogde gebruiker. Beschrijving: Er ... Read more

Source: www.ncsc.nl

Top found tags: update (1),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-047: Microsoft verhelpt kwetsbaarheid in RPC serverLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft een kwetsbaarheid in de Remote Procedure Call (RPC) server verholpen. Gevolgen: Door de kwetsbaarheid te misbruiken kan een kwaadwillende het geheugen van een proces vullen met malafide RPC berichten. Als een kwaadwillende nog een kwetsbaarheid kent kan dit kan vervolge... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-046: Microsoft verhelpt kwetsbaarheid in .NET frameworkLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft een kwetsbaarheid in het .NET Framework verholpen. Gevolgen: Deze kwetsbaarheid helpt bij het omzeilen van Adress Space Layout Randomisation (ASLR). Als een kwaadwillende een andere kwetsbaarheid kent kan de hier omschreven kwetsbaarheid helpen misbruik van de andere kw... Read more

Source: www.ncsc.nl

Top found tags: update (1),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-045: Microsoft verhelpt meerdere kwetsbaarheden in de Windows kernelLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft een aantal kwetsbaarheden in de Windows kernel verholpen. Gevolgen: Een kwaadwillende die programma's kan uitvoeren kan door misbruik te maken van een kwetsbaarheid instructies uitvoeren binnen de kernel. Zo kunnen alle kernel beveiligingsmaatregelen omzeild worden. Ook... Read more

Source: www.ncsc.nl

Top found tags: Microsoft(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-044: Kwetsbaarheden in Microsoft SQL Server verholpenLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft updates beschikbaar gesteld waarmee kwetsbaarheden in SQL Server worden verholpen. Gevolgen: Een kwaadwillende kan door de kwetsbaarheden te misbruiken een Cross-Site Scripting (XSS) aanval uitvoeren of een Denial-of-Service veroorzaken. Beschrijving: - CVE-2014-1820 Er... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
MS14-043: Windows Media Center kwetsbaarheid verholpenLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Samenvatting: Microsoft heeft een kwetsbaarheid verholpen in Windows Media Center. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om willekeurige code uit te voeren onder de rechten van een gebruiker. Beschrijving: Er bevindt zich een kwetsbaarheid in Microsoft Windows Media Ce... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Cisco Unified Communications Manager verholpenLocation: Cisco HQ - San Jose, United States
Date published: 13-08-2014

Samenvatting: Cisco heeft meerdere kwetsbaarheden in de Cisco Unified Communications Manager verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om een Denial-of-Service te veroorzaken of zich verhoogde rechten verschaffen op het kwetsbare systeem. Beschrijving: -CVE-201... Read more

Source: www.ncsc.nl

Top found tags: DoS(1),NL(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe verhelpt kwetsbaarheden in Adobe Flash PlayerLocation: Adobe HQ - San Jose, United States
Date published: 13-08-2014

Samenvatting: Adobe heeft meerdere kwetsbaarheden verholpen in Flash Player. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende willekeurige code uitvoeren en beveiligingsmaatregelen omzeilen. Beschrijving: - CVE-2014-0540, CVE-2014-0542, CVE-2014-0543, CVE-2014-0544, CVE-2014-05... Read more

Source: www.ncsc.nl

Top found tags: telecom sector(2),vulnerability(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Blackberry producten verholpenLocation: BlackBerry HQ - Ontario, Canada
Date published: 13-08-2014

Samenvatting: Blackberry heeft updates uitgebracht die kwetsbaarheden verhelpen in de Blackberry Enterprise Service 10 en Blackberry Enterprise Server 5.0.4 en in Blackberry 10 OS. Gevolgen: Kwaadwillenden kunnen de gevonden kwetsbaarheden misbruiken voor het verkrijgen van gevoelige informatie. Bes... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(2),mobile device(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in Google ChromeLocation: Google HQ - Mountain View, United States
Date published: 13-08-2014

Samenvatting: Google heeft een aantal kwetsbaarheden verholpen in de Google Chrome browser. Er zijn weinig details bekend gemaakt over de verholpen kwetsbaarheden. Gevolgen: Wanneer kwaadwillenden misbruik weten te maken van de gevonden kwetsbaarheden kan er willekeurige code worden uitgevoerd onder... Read more

Source: www.ncsc.nl

Top found tags: update(2),vulnerability(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ubuntu verhelpt meerdere kwetsbaarheden in de Linux kernelLocation: Ubuntu - London, United Kingdom
Date published: 13-08-2014

Samenvatting: De ontwikkelaars van Ubuntu hebben meerdere kwetsbaarheden in de Linux kernel verholpen. Gevolgen: Een aanvaller kan de kwetsbaarheden misbruiken om mogelijk gevoelige gegevens te bemachtigen, verhoogde rechten te verkijgen of om een Denial-of-Service te veroorzaken. Beschrijving: - CV... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish