Under construction

New design coming soon!

CIC News engine statistics

CIC News for 14-08-2014 contains 109 articles: cybercrime(25),cyber security(35),data breach(9),other(40)

CIC News update contains 94 English and 15 Dutch articles for today.
There are 5 published advisories, 0 are English and 5 are Dutch.
In today's English news articles:
- 20 related to cybercrime
- 34 related to cyber security
- 9 related to data breach and identity theft
- 31 for the category other news

In today's Dutch news articles:
- 5 related to cybercrime
- 1 related to cyber security
- 9 for the category other news

Have fun reading.

English cybercrime related news

Virtual servers: No safer than any other kindLocation: Symantec HQ - Mountain View, United States
Date published: 13-08-2014

server operating system. Then, along came KVM, Hyper-V, VMware, and all the rest of the virtual machine (VM) hypervisors and more recently Docker with its containers. Now the idea of a single server operating system on a solo box is downright quaint. it-security Don't think, however, that just becau... Read more

Source: www.zdnet.com

Top found tags: vulnerability(1),Windows(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android Trojan Krysanec Comes Disguised as Legitimate AppsLocation: Google HQ - Mountain View, United States
Date published: 13-08-2014

Researchers at ESET have uncovered a new remote access Trojan (RAT) for Android that has been masked by cybercriminals as various popular applications. The malware, detected by the security firm as Android/Spy.Krysanec, is capable of infiltrating both free and paid Android apps, and it has been dist... Read more

Source: securityweek.com

Top found tags: malware(3),telecom sector(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden explains decision to leak secretsLocation: National Security Agency - Fort Meade, United States
Date published: 14-08-2014

By AAP August 13, 2014 -- 22:43 GMT (23:43 BST) In a wide-ranging interview with Wired magazine over several days from Moscow, Edward Snowden said he had been troubled for years by the activities of the National Security Agency but that national intelligence chief James Clapper's testimony prompted ... Read more

Source: www.zdnet.com

Top found tags: telecom sector(4),United States(4),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden explains decision to leak secretsLocation: National Security Agency - Fort Meade, United States
Date published: 14-08-2014

By AAP August 13, 2014 -- 22:43 GMT (23:43 BST) In a wide-ranging interview with Wired magazine over several days from Moscow, Edward Snowden said he had been troubled for years by the activities of the National Security Agency but that national intelligence chief James Clapper's testimony prompted ... Read more

Source: www.zdnet.com

Top found tags: telecom sector(4),United States(4),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden claims NSA, not Assad, caused Syrian Internet outage in 2012Location: Damascus, Damascus Governorate, Syria
Date published: 13-08-2014

Snowden claims NSA, not Assad, caused Syrian Internet outage in 2012. Edward Snowden has claimed that the US accidentally took most of Syria off the Internet while attempting to bug the country's online traffic. Speaking to National Security Agency journalist James Bamford for Wired, the whistleblow... Read more

Source: itproportal.com

Top found tags: NSA(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Todays Tech: Russian hackers invade Europe, robots invade the Tate Britain and John McAfee shows off his BrownListLocation: Tate, United States
Date published: 12-08-2014

Todays Tech: Russian hackers invade Europe, robots invade the Tate Britain and. John McAfee shows off his BrownList Someone's hacked off with former Soviet Embassies Moscow based hackers attack former Soviet Embassies in 15 countries Symantec has discovered that nation backed hackers have s... Read more

Source: itproportal.com

Top found tags: conference(2),DEF CON(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Dangers of the Android FakeID VulnerabilityLocation: Google HQ - Mountain View, United States
Date published: 13-08-2014

Security researchers from Bluebox Labs recently uncovered a vulnerability that may allow malicious apps to impersonate legitimate ones. This vulnerability, dubbed as FakeID, is involved with the checking of certificate signatures to prove the legitimacy of applications. What makes this highly ... Read more

Source: trendmicro.com

Top found tags: update(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vulnerabilities Found in Disqus Plugin for WordPressLocation: WordPress - San Francisco, United States
Date published: 14-08-2014

A researcher has identified several vulnerabilities in the WordPress plugin for Disqus, the popular comment hosting service for websites and online communities. A total of three flaws have been identified by Nik Cubrilovic, who detailed his findings on his personal blog. The most serious issue he fo... Read more

Source: securityweek.com

Top found tags: update(2),website(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Tweet Resignation of Russian Prime MinisterLocation: Moscow, Russia
Date published: 14-08-2014

MOSCOW - Hackers broke into Russian Prime Minister Dmitry Medvedev's Twitter account on Thursday, tweeting his resignation and criticizing President Vladimir Putin. "I'm resigning. I'm ashamed of the government's actions. Forgive me," said Medvedev's Russian-language Twitter account. "I've wanted to... Read more

Source: securityweek.com

Top found tags: social media(2),United States(2),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian Prime Minister Medvedev Twitter hacked, resigns to become a 'freelance photographer'Location: Moscow, Russia
Date published: 14-08-2014

AlysiaJudge. Russian Prime Minister Medvedev Twitter hacked, resigns to become a 'freelance photographer' This week proved that even high-ranking Russian officials aren't impervious to cybercriminals, after the Russian Prime Minister's Twitter account was hacked. The infiltrators posted a Tweet stat... Read more

Source: itproportal.com

Top found tags: telecom sector(2),cybercrime(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ghana: Historic Measures to Curb Cybercrime in GhanaLocation: Accra, Greater Accra, Ghana
Date published: 13-08-2014

Accra GHANA has established the countrys historical Computer Emergency Response Team (CERT) to curb cybercrime.The CERT, globally known as Computer Incident Response Team (CIRT) and its portal, scheduled for launch on Friday this week, is hailed as a certain and trusted way of safeguarding th... Read more

Source: allafrica.com

Top found tags: threat(1),cybercrime(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ZeroAccess botnet History and propagationLocation: Sophos HQ - Oxfordshire, United Kingdom
Date published: http://cloudcomputingvocabulary.com/zeroaccess-botnet-history-and-propagation/

The ZeroAccess botnet was initially ascertained about July 2011. The ZeroAccess rootkit accountable for the botnet outspread is approximated to have been here and now on at minimum 9 million setups. Estimates of the dimension of the botnet differ athwart sources; anti-virus seller Sophos approximate... Read more

Source: 13-08-2014 | cloudcomputingvocabulary.com

Top found tags: Sophos(1),ZeroAccess(1),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian PM's Twitter account hacked: 'I am resigning'Location: Moscow, Russia
Date published: 14-08-2014

on Twitter Russian Prime Minister Dmitry Medvedev's Twitter account was apparently hacked on Thursday and used to criticize the Russian government and President Vladimir Putin. The first tweet, published on Medvedev's official Twitter account @MedvedevRussia, said -- via translation by The Interpret... Read more

Source: cnet.com.ortal.com

Top found tags: update(2),government(4),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Zeus Gameover employs novel approach to malwareLocation: Arbor Networks - Burlington, United States
Date published: 14-08-2014

NewGOZ could be upgraded with Cryptolocker-like software in the future, says Lancope's Tom Cross. Game on for Gameover? Game on for Gameover? Ongoing research into the latest incarnation of Zeus - newGOZ (new Zeus Gameover) - suggests that the cyber-criminals behind the malware may have made extra w... Read more

Source: www.scmagazineuk.com

Top found tags: financial sector(2),cybercrime(3),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Thursday Threat Report: Kovter ransomware on the rise, and a glaring Android camera vulnerabilityLocation: Google HQ - Mountain View, United States
Date published: 14-08-2014

PaulMCCooper. Thursday Threat Report: Kovter ransomware on the rise, and a glaring Android camera vulnerability Welcome to ITProPortal's Thursday Threat Report, where we round up the three greatest security threats facing Internet users, smooth-running enterprise, and occasionally even the survival ... Read more

Source: itproportal.com

Top found tags: malware(3),Kaspersky Lab(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Safe Browsing to expand warningsLocation: Google HQ - Mountain View, United States
Date published: 14-08-2014

Software as a Service offers irresistible benefits for organizations of all sizes from cost savings to scalability to mobile accessibility. We offer guidance on avoiding the pitfalls of the cloud and choosing your SaaS partners well. Safe Browsing is a public web service used by Google Chrome, M... Read more

Source: www.zdnet.com

Top found tags: telecom sector(2),update(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ukrainian Hackers Claim Attack on Polish WebsitesLocation: Kiev, Ukraine
Date published: 14-08-2014

WARSAW - Ukrainian hackers hostile to the government claimed Thursday to have launched a cyber attack against the websites of Poland's presidency and the Warsaw Stock Exchange. The hacker group Cyber Berkut said it blocked the sites, both down on Thursday afternoon, in response to what it said were ... Read more

Source: securityweek.com

Top found tags: Ukraine(2),cybercrime(3),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lockheed: Attackers Went Quiet After APT1 Report Exposed Chinese HackersLocation: Martin, United States
Date published: 14-08-2014

Lockheed Martin Defense & Intelligence Solutions Technology Media Summit Lockheed Martin Says Attackers Went Quiet After Mandiant's APT1 Report Called Out Chinese Cyber Spies Threat actors targeting Lockheed Martin immediately halted their cyberattacks against the defense contractor following the re... Read more

Source: securityweek.com

Top found tags: phishing(2),United States(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fake Tor website serves up malwareLocation: Paris, France
Date published: 14-08-2014

A new website, Torbundlebrowser.org, may look almost identical to the original Tor Project but is in fact a fake serving up malicious software. Fake Tor website Fake Tor website First spotted by French security researcher Florent Daigniere and detailed in full by computer science student Julien Vois... Read more

Source: www.scmagazineuk.com

Top found tags: malware(2),website(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SOHOpelessly contest at DefCon yields 15 router flawsLocation: DEF CON - Las Vegas, United States
Date published: 14-08-2014

At the SOHOpelessly Broken contest organized by the Electronic Frontier Foundation (EFF) and Independent Security Evaluators and held during DefCon, hackers proved that routers still suffer from security issues by uncovering 15 new zero-day vulnerabilities. Security researchers had a go at 10 router... Read more

Source: www.scmagazine.com

Top found tags: DEF CON(2),Electronic Frontier Foundation(3),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Study Confirms Uyghur Remain in Crosshairs of Targeted AttacksLocation: Black Hat - Las Vegas, United States
Date published: 13-08-2014

Move Over Web Security, Embedded Devices Podcasts Latest Podcasts All 14666090570_72a1b4cce7_k Black Hat and DEF CON Wrap Black Hat News Wrap Podcast Podcast: Black Hat News Wrap, Day BlackHat keynote_Geer Podcast: Black Hat News Wrap embedded device security Podcast: Wendy Nather on th... Read more

Source: threatpost.com

Top found tags: Black Hat(6),social media(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Internet routers hitting 512K limit, some become unreliableLocation: New York, United States
Date published: 13-08-2014

novel technical issue that impacts older Internet routers. At the heart of the issue, the growth ofroutable networks on the Internet overwhelmed the amount of memory set aside in infrastructure hardware, typically routers and switches, that determines the appropriate way to route data through the ... Read more

Source: arstechnica.com

Top found tags: cyber security(2),ISP(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ACLU, NYCLU court filing backs Facebook challenge to Manhattan DALocation: Facebook - Menlo Park, United States
Date published: 13-08-2014

"EFF asks court to find NSA internet spying a violation of Fourth Amendment" An ACLU and NYCLU court filing backs Facebook's challenge to Manhattan DA's warrants. The New York Civil Liberties Union (NYCLU) and the American Civil Liberties Union (ACLU) have thrown their support behind Facebook's chal... Read more

Source: www.scmagazine.com

Top found tags: social media(4),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FCC creates task force to scrutinize illegal stingray useLocation: Federal Communications Commission - Washington, United States
Date published: 13-08-2014

FCC creates task force to scrutinize illegal stingray use The task force will examine the use of the technology by foreign intelligence agencies and criminals targeting Americans. A digital rights group says it is wary of a new government task force set to examine the illegal use of stingray devices... Read more

Source: www.scmagazine.com

Top found tags: telecom sector(6),United States(10),government(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware threatens virtual machines, according to reportLocation: Symantec HQ - Mountain View, United States
Date published: 13-08-2014

Criminals fuse Zeus, Carberp code for more sinister trojan Malware waits for virtual machines to restart, or for a certain number of mouse clicks, to evade automated analysis systems. Malware for virtual machines is a threat one that uses advanced techniques to evade automated analysis and has t... Read more

Source: www.scmagazine.com

Top found tags: social engineering(2),trojan(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ACLU, NYCLU court filing backs Facebook challenge to Manhattan DALocation: Facebook - Menlo Park, United States
Date published: 13-08-2014

"EFF asks court to find NSA internet spying a violation of Fourth Amendment" An ACLU and NYCLU court filing backs Facebook's challenge to Manhattan DA's warrants. The New York Civil Liberties Union (NYCLU) and the American Civil Liberties Union (ACLU) have thrown their support behind Facebook's chal... Read more

Source: www.scmagazine.com

Top found tags: social media(4),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FCC creates task force to scrutinize illegal stingray useLocation: Federal Communications Commission - Washington, United States
Date published: 13-08-2014

FCC creates task force to scrutinize illegal stingray use The task force will examine the use of the technology by foreign intelligence agencies and criminals targeting Americans. A digital rights group says it is wary of a new government task force set to examine the illegal use of stingray devices... Read more

Source: www.scmagazine.com

Top found tags: telecom sector(6),United States(10),government(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware threatens virtual machines, according to reportLocation: Symantec HQ - Mountain View, United States
Date published: 13-08-2014

Criminals fuse Zeus, Carberp code for more sinister trojan Malware waits for virtual machines to restart, or for a certain number of mouse clicks, to evade automated analysis systems. Malware for virtual machines is a threat one that uses advanced techniques to evade automated analysis and has t... Read more

Source: www.scmagazine.com

Top found tags: social engineering(2),trojan(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brit infosec firm lets hackers think they've stolen somethingLocation: Swift, United States
Date published: 14-08-2014

Implementing global e-invoicing with guaranteed legal certainty Security strategies generally concentrate on keeping the bad guys out, but British security outfit ClearSwift has stumbled upon another approach: if the bad guys get in, let them out with something. But scrub it clean on the way out the... Read more

Source: go.theregister.com

Top found tags: hackers(1),legislation(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Five Totally Believable Things Car Makers Must Do To Thwart HackersLocation: Black Hat - Las Vegas, United States
Date published: 14-08-2014

Implementing global e-invoicing with guaranteed legal certainty Car manufacturers are urged to implement a five-step program to improve their motors' computer security defenses. Today's rides are PCs on wheels and thus vulnerable to all sorts of potential hacks such as the ones documented by Cha... Read more

Source: go.theregister.com

Top found tags: DEF CON(2),Black Hat(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A portable router that conceals your Internet trafficLocation: Rogers, United States
Date published: 14-08-2014

Sean Gallagher The news over the past few years has been spattered with cases of Internet anonymity being stripped away, despite (or because) of the use of privacy tools. Tor, the anonymizing darknet service, has especially been in the crosshairsand even some of its most paranoid users have... Read more

Source: arstechnica.com

Top found tags: financial sector(2),Raspberry Pi(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Many US companies failing to uphold EU privacy rules, privacy group claims in FTC complaintLocation: New York, United States
Date published: 14-08-2014

At least thirty US companies are "failing to provide" safeguards for European citizens promised by the US government, a new complaint alleges. A filing submitted to the US Federal Trade Commission (FTC) on Thursday by the Center for Digital Democracy (CDD) claims Salesforce, Adobe, AOL, and other co... Read more

Source: www.zdnet.com

Top found tags: privacy(2),government(9),United States(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dozens of US tech firms violate EU privacy promises, advocacy group saysLocation: Brussels,Belgium
Date published: 14-08-2014

Thirty U.S. data brokers and data management firms, including Adobe Systems, AOL and Salesforce.com, are violating privacy promises theyve made regarding their handling of the personal information of EU residents, a privacy group said in a complaint to be filed Thursday. The 30 companies have all... Read more

Source: www.pcworld.com

Top found tags: Department of Commerce(3),government(6),United States(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The automated threat mitigation tool helping to beat Big Data security bluesLocation: Tel Aviv, Israel
Date published: 14-08-2014

When it comes to detecting threats to your IT infrastructure, sometimes security systems can be too good. In large companies especially, the plethora of security alerts coming in can overload staff, who have to try and triage their way through reams of alerts that may or may not signal a major emerg... Read more

Source: www.zdnet.com

Top found tags: Microsoft(1),threat(1),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DEF CON 22 Turns up the Heat on DevicesLocation: DEF CON - Las Vegas, United States
Date published: 13-08-2014

One resounding but unsurprising message from this yearsDEF CON conference in Las Vegas, Nevadawas the increase in hacks against IoT devices. The lineup of hacked IoT devices was extensive. Many sessions focused on individual device hacks of consumer devices such as media players, IP... Read more

Source: trendmicro.com

Top found tags: TV (1),cyber security(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
August 2014 Patch Tuesday Includes Two Critical UpdatesLocation: Microsoft HQ - Redmond, United States
Date published: 13-08-2014

Patch-Tuesday_grayMicrosoft has rolled out nine security bulletins for their AugustPatch Tuesday. Two bulletins arerated as Critical, while the rest are rated asImportant. Microsoft Windows, Internet Explorer, Microsoft SQL Server, and Microsoft .NET Framework are some of the affected applicat... Read more

Source: trendmicro.com

Top found tags: Trend Micro(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The fight to be forgotten: Google vs governmentLocation: Brussels,Belgium
Date published: 14-08-2014

The fight to be forgotten: Google vs government. The current uproar around various facets of data collection and use be it "the right to be forgotten" or the emergency data legislation being considered by David Cameron is divisive to say the least. If your only source of information is the m... Read more

Source: itproportal.com

Top found tags: United Kingdom(2),United States(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Are younger generations suffering from security fatigue?Location: Palo Alto, United States
Date published: 14-08-2014

Younger generations time and time again appearing to have worse attitudes and behaviour towards security than their seniors It seems barely a week goes past at the moment without some kind of security scare. Weve had major breaches hit the media in recent months from big businesses like eBay, and... Read more

Source: www.information-age.com Youth arrested for cyber crime | CUTTACK: Crime Branch on Wednesday arrested a youth from Bhubaneswar for creating a fake profile of a woman on a social networking site and threatening her for rejecting his marriage proposal.The accused Rajaram Biswal, 28, a resident of Bhimatangi, had approached a Bhubaneswar- based girl for marriage but she refused. The refusal did not go down well with the accused and he created a fake account of the girl and started posting messages and photos of the girl.He also sent messages to the girl threatening her with dire consequences for rejecting his marriage proposal. The girl had filed an FIR at the cyber police station, functioning under the Crime Branch last month, said police. | http://timesofindia.indiatimes.com/City/Bhubaneswar/Youth-arrested-for-cyber-crime/articleshow/40256766.cms | 14-08-2014 | timesofindia.indiatimes.com

Top found tags: United Kingdom(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The NSA wants to eliminate malware once and for all, no matter the costLocation: National Security Agency - Fort Meade, United States
Date published: 13-08-2014

Well over a year after the Snowden leaks changed the way we think of security in the United States, the man still has plenty of information left to reveal. In an exhaustive interview with Wireds James Bamford, Snowden discussed the NSAs development of a new cyberwarfare program codenamed Monst... Read more

Source: bgr.com

Top found tags: cyber security(2),cyber warfare(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware spiked in days before Israel-Hamas hostilities beganLocation: Tel Aviv, Israel
Date published: 13-08-2014

Findings of cybersecurity study show spread of malware might be able to predict upcoming world conflicts.The amount of malware attacking Israel rose dramatically in the days before the fighting with Hamas and in the lead-up to the conflict over Crimea earlier this year, researchers from cybersecurit... Read more

Source: www.haaretz.com

Top found tags: Israel(1),research(1),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Gyroscopes in Your Phone Could Let Apps Eavesdrop on ConversationsLocation: Google HQ - Mountain View, United States
Date published: 14-08-2014

eavesdrop [gallery-il] Getty In the age of surveillance paranoia, most smartphone users know better than to give a random app or website permission to use their devices microphone. But researchers have found theres another, little-considered sensor in modern phones that can also listen in on t... Read more

Source: wired.com

Top found tags: United States(2),Google(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SynoLocker Trojan crime gang: We QUIT this gigLocation: F-Secure - Helsinki, Finland
Date published: 14-08-2014

Implementing global e-invoicing with guaranteed legal certainty A ransomware Trojan gang appears to be moving on, and has offered to sell its remaining decryption keys in bulk for 200 BTC ($103,000, 61,500). Cybercrooks behind the recent SynoLocker Trojan which targets the network attached sto... Read more

Source: go.theregister.com Solving cybercrime a \'global effort\' | After the stunning revelation that Russian crooks had stolen 1.2 billion user names and passwords, the biggest breach on record, experts say making the internet more secure will take a huge global effort - bolstering website security, a stronger push to prosecute the cybercriminals and better vigilance by consumers.How much all that might cost is unclear, with some experts estimating it could take billions of dollars, while others insist its more a matter of redirecting what already is being spent toward more fruitful areas. But even then, critical information on the internet may never be entirely safe, given the growing sophistication and ability of hackers to find new ways to steal it.The attack by a Russian gang, uncovered by a Milwaukee security firm, has inflamed concerns about data protection on the internet and whether the security practices of thousands of companies around the world are sufficient to protect financial and personal information.Security experts say businesses need to take the lead in countering the threat, particularly since the software and gadgets they make to access the internet are frequently riddled with weaknesses that hackers can exploit.There is zero or very little corporate responsibility being taken to insure products in the market are safe, said Melissa Hathaway, a former top federal cybersecurity official with the National Security Council and the Office of the Director of National Intelligence, who now has a consulting firm.If we continue to see the market the way it is, well see more victims.Critics have faulted many companies for being slow to address their vulnerabilities because of factors including ignorance about the extent of their flaws and the cost associated with fixing them. | http://www.stuff.co.nz/technology/digital-living/60648610/solving-cybercrime-a-global-effort | 14-08-2014 | www.stuff.co.nz

Top found tags: trojan(2),malware(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DHS Info Sharing Program Starts SlowlyLocation: Department of Homeland Security - Washington, United States
Date published: 14-08-2014

The Department of Homeland Security could do a better job getting critical infrastructure operators to participate in its Enhanced Cybersecurity Service program.Only three of the 16 designated critical infrastructure sectors - defense industrial base, energy and communications services - participate... Read more

Source: www.govinfosecurity.com

Top found tags: DHS(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attacker could use default defibrillator password to launch denial of serviceLocation: Black Hat - Las Vegas, United States
Date published: 13-08-2014

A medical device security and privacy roundtable discussion at Black Hat looked at how adding more security to devices could pose risks to patients' privacy. Medical device is a term that encompasses all manner of health-related devices, but who is responsible for deploying patches when a device is ... Read more

Source: www.networkworld.com

Top found tags: medical sector(2),Black Hat(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Password Manager LastPass Suffers OutageLocation: New York, United States
Date published: 14-08-2014

Early in the morning of August 12, 2014, one of the data centers used by password manager LastPass went down, causing connection errors for an undisclosed number of LastPass users for several hours. In a blog post at the time, the company explained, "Our team immediately took action to migrate LastP... Read more

Source: www.esecurityplanet.com

Top found tags: password(1),cyber security(2),ISP(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian PM's Twitter hacked to slap down Putin, post fake resignationLocation: Moscow, Russia
Date published: 14-08-2014

Implementing global e-invoicing with guaranteed legal certainty The Twitter feed of the Russian prime minister was hacked on Thursday to post false claims that Dmitry Medvedev had resigned to try his hand as a freelance photographer. The Russian-language profile, which boasts more than 2.5 million f... Read more

Source: go.theregister.com

Top found tags: social media(2),telecom sector(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
In wake of hacks, incident response efforts weak in enterpriseLocation: New York Times - New York, United States
Date published: 14-08-2014

incident response to deal with such circumstances, according to a SANS Institute survey. The survey showed that only 9 percent of organizations believe their incident response is "very effective". What that means is that most organizations are ill equipped to mobilize once hackers have pried open th... Read more

Source: www.zdnet.com

Top found tags: information security(2),Ponemon Institute(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Easy Pickings at DEF CON Router Hacking ContestLocation: Young, United States
Date published: 14-08-2014

Its becoming clich to say its trivial to pop a small office or home router. Vendors are making it easy, since most are interested in cramming features such as print, file and media servers into these boxes and less so on basic security measures. Therefore, it sometimes helps to illustrate th... Read more

Source: threatpost.com

Top found tags: cyber security(4),telecom sector(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Password confessions of a security expertLocation: Berlin, Germany
Date published: 14-08-2014

Password confessions of a security expert. I have a confession. It's hard to admit, and I know it might make me a bit of a social pariah and an outcast in the industry I work in but I need to get this off my chest: I used a single password for many online services *deep breath* for a long time. It w... Read more

Source: itproportal.com

Top found tags: Germany(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Kaseya Acquires Scorpion Software to Build Identity Management as a Service BusinessLocation: Kaseya HQ - Lausanne, Switzerland
Date published: 13-08-2014

Cloud-based IT management vendor Kaseya has acquired Scorpion Software in a bid to build out a cloud authentication business. Scorpion Software specializes in two-factor authentication, single sign-on and password management solutions. According to Kaseya, adding Scorpion Software's AuthAnvil produc... Read more

Source: securityweek.com

Top found tags: password(1),cyber security(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2Q 2014 Security Roundup: Turning the Tables on Cyber AttacksLocation: New York, United States
Date published: 12-08-2014

The incidents that cropped up in the months of April to June 2014from the data breaches, DDoS attacks, to malware improvements and threats to privacyhighlighted the need for enterprises to craft a more strategic response against and in anticipation of security threats. There were plenty of thr... Read more

Source: trendmicro.com

Top found tags: government(4),telecom sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vast majority of hackers believe they're above the law -- surveyLocation: St. Louis, United States
Date published: 14-08-2014

When most hackers are infiltrating computer systems, the last thing on their mind is getting caught, according to new data. In fact, despite many highly publicized arrests, 86 percent of hackers believe they will never face repercussions. Password protection software firm Thycotic published the resu... Read more

Source: cnet.com.ortal.com

Top found tags: Black Hat(4),government(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Preparing for the aftermath of a data breachLocation: New York, United States
Date published: 13-08-2014

Im pleased to say that security executives have made some serious headway with educating their colleagues on data breach preparedness. With the help of heightened awareness on the subject from recent, highly-publicized data breaches, now most C-suite executives are on board with prioritizing a da... Read more

Source: www.securityinfowatch.com

Top found tags: awareness(1),EN(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
10 Things We Need to Fix to Slow Down the March of Identity TheftLocation: New York, United States
Date published: 13-08-2014

Were now almost two decades into the epidemic of identity theft and things couldnt be better. At least if youre a thief. As identity theft becomes easier in many ways, and the payoff bigger, the chances of a thief being caught, prosecuted and doing time are slim to none.And that realization... Read more

Source: www.creditsesame.com

Top found tags: data breach(2),identity theft(2),Department of Justice(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Whats a Breach? Man Who Found Russian Hack Doesnt Want to Argue SemanticsLocation: Moscow, Russia
Date published: 13-08-2014

One week after Alex Holden said he found arguably the largest data breach to date, he doesnt want to argue semantics.Holden, founder of Hold Security, gained a measure of fame last week when he said he had obtained 1.2 billion unique online credentials from a Russian gang.Some competitors a... Read more

Source: blogs.wsj.com

Top found tags: cybercrime(3),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Elgin caregiver accused of identity theft of Barrington womanLocation: Williams, United States
Date published: 13-08-2014

An Elgin woman was charged with stealing from a resident of The Garlands of Barrington, authorities said.Vanessa Williams, 35, was charged with theft and aggravated identity theft for using the victim's debit card without authorization from April 25 to July 27, said Cynthia Vargas, spokeswoman for t... Read more

Source: www.dailyherald.com

Top found tags: EN(1),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bulk of Ex-Employees Retain Access to Corporate Apps: SurveyLocation: Google HQ - Mountain View, United States
Date published: 14-08-2014

The assets of numerous organizations are at risk because their former employees continue to have access to sensitive corporate applications even after they leave the company, according to a report published Wednesday by cloud business applications provider Intermedia. Rogue access is an issue that a... Read more

Source: securityweek.com

Top found tags: vulnerability(1),data breach(2),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vitamin seller website attacked, payment cards and other info compromisedLocation: New York, United States
Date published: 14-08-2014

Anyone who made credit or debit card purchases on TheNaturalOnline.com website between April 22 and July 17 may have had their information compromised by an attacker who forced their way into The Natural's computer system. How many victims? Undisclosed. The Natural did not immediately return a SCMag... Read more

Source: www.scmagazine.com

Top found tags: social engineering(2),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Skimming con drains pension of retired officer in PhilippinesLocation: Manila, Metro Manila, Philippines
Date published: 13-08-2014

Nearly all of a retired policewoman's retirement fund was drained as a result of an ongoing skimming incident in the Philippines, a report from the ABS-CBN News Channel (ANC) revealed. According to the outlet, the scam was brought to light by the Philippines' National Bureau of Investigation (NBI) v... Read more

Source: www.scmagazine.com

Top found tags: scam(1),skimming(1),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DEA paid $850K for Amtrak passenger info that was available for freeLocation: Iowa, United States
Date published: 13-08-2014

An unnamed Amtrak secretary to a train and engine crew received $854,460 for recurrently providing passenger name records (PNR) to the DEA from 1995 to the present information the DEA could have attained for free due to a relationship between the drug agency and the Amtrak Police Department (APD... Read more

Source: www.scmagazine.com

Top found tags: EN(1),report(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe plugs critical Flash Player vulnerabilitiesLocation: Adobe HQ - San Jose, United States
Date published: 13-08-2014

Adobe has released fixes for seven critical bugs in its Flash Player plug-in. On Tuesday, the company published a security bulletin detailing the vulnerabilities, which could potentially allow an attacker to takeover vulnerable systems, Adobe said. Five bugs were memory leakage vulnerabilities which... Read more

Source: www.scmagazine.com

Top found tags: patch(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The NSA's MonsterMind machine could trigger cyberwar automaticallyLocation: National Security Agency - Fort Meade, United States
Date published: 13-08-2014

Edward Snowden says the NSA has developed software that will automatically attack foreign computers deemed a threat without checking in with a human first. The system, dubbed MonsterMind, is designed to detect strikes against key US servers and block the assaults as quickly as possible. But it i... Read more

Source: go.theregister.com

Top found tags: telecom sector(4),United States(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anonymous hacks Ferguson police site for dispatch tapesLocation: St. Louis, United States
Date published: 14-08-2014

A lot of speculation has been circling around police procedure during and after the shooting of Michael Brown. Now, Anonymous is hoping to shine a light on what the police knew that day. It appears the hacking group has gotten its hands on dispatch tapes from the St. Louis County Police. On Wednesda... Read more

Source: cnet.com.ortal.com

Top found tags: social media(2),update(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Anonymous hacks Ferguson police site for dispatch tapesLocation: St. Louis, United States
Date published: 14-08-2014

A lot of speculation has been circling around police procedure during and after the shooting of Michael Brown. Now, Anonymous is hoping to shine a light on what the police knew that day. It appears the hacking group has gotten its hands on dispatch tapes from the St. Louis County Police. On Wednesda... Read more

Source: cnet.com.ortal.com

Top found tags: social media(2),update(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Blackphone hits back at DefCon hackerLocation: Ford, United States
Date published: 12-08-2014

phelanto. Blackphone hits back at DefCon hacker Blackphone has responded to @TeamAndIRC, the hacker that managed to crack the company's high security smartphone. Justin Case, who goes by the @TeamAndIRC, exposed two vulnerabilities within the phone at the DefCon conference and posted photo below. Ch... Read more

Source: itproportal.com

Top found tags: update(2),vulnerability(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM bolsters cloud security with Lighthouse acquisitionLocation: IBM HQ - Armonk, United States
Date published: 12-08-2014

IBM bolsters cloud security with Lighthouse acquisition. IBMs cloud security portfolio got a significant shot in the arm thanks to the acquisition of Lighthouse Security Group and its renowned identity management solution. Related: Cloud: safeguarding the cloud with IBM security solutions The mai... Read more

Source: itproportal.com

Top found tags: EN(1),ISP(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US government sets up special team to avert major tech disastersLocation: Verizon HQ - New York, United States
Date published: 12-08-2014

US government sets up special team to avert major tech disasters. The US government has put together a team of IT experts, which it hopes could bring an end to tech disasters like last year's HeathCare.gov launch. HealthCare.gov was set up to help US residents apply for and manage their health insur... Read more

Source: itproportal.com

Top found tags: ISP(1),Verizon(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Thales awarded 3.8m contract for home office security serviceLocation: New York, United States
Date published: 14-08-2014

phelanto. Thales awarded 3.8m contract for home office security service Thales has been awarded a two year, 3.8m,contract to provide the Home Office with what it claims is a new fully-managed Public Key Infrastructure Shared Service (PKISS). The deal, awarded through the Cabinet Office's PSN Ser... Read more

Source: itproportal.com

Top found tags: EU(1),framework(1),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA's MonsterMind AI project: good idea or worrying volatility?Location: National Security Agency - Fort Meade, United States
Date published: 14-08-2014

NSA's MonsterMind AI project: good idea or worrying volatility?. In a recent Wired interview Edward Snowden revealed among other things that the NSA was (and may still be) working on a project codenamed MonsterMind. The autonomous AI would monitor all data traffic entering the US from anywhere in th... Read more

Source: itproportal.com

Top found tags: airport sector(2),United States(2),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Redmond stall means IE Java axe won't swing till SeptemberLocation: Microsoft HQ - Redmond, United States
Date published: 14-08-2014

Implementing global e-invoicing with guaranteed legal certainty Microsoft has handed sysadmins a reprieve by delaying the blockage of vulnerable old versions of Java in its flagship Internet Explorer web browser until September. The postponement was made on the back of complaints to Redmond, which o... Read more

Source: go.theregister.com

Top found tags: Microsoft(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBay users complain about downtime, demanding compensationLocation: eBay - San Jose, United States
Date published: 14-08-2014

eBay users complain about downtime, demanding compensation. It probably didn't escape your attention that earlier this week, eBay went down in flames with a major outage, and users of the auction site are not happy about the situation at all. In fact, many have taken to social media channels to vent... Read more

Source: itproportal.com

Top found tags: website(1),United Kingdom(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crime Watch: A parents guide to cyber-bullyingLocation: Young, United States
Date published: 13-08-2014

In the previous I have written about concerns that can occur with social networking now we are going to review a single of the dangers: cyber-bullying.Young persons are making use of the World-wide-web much more than ever. Most have World-wide-web access...In the previous I have written about concer... Read more

Source: www.dailynewsen.com

Top found tags: hacktivism(1),Anonymous(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
13 cyber blackmailing cases filed during RamadanLocation: Dubai, United Arab Emirates
Date published: 14-08-2014

Online extortion gangs get in touch with specifically young males through social media websites and lure them into engaging in lewd acts. The Dubai Police have registered 13 cases of cyber blackmailing during Ramadan this year. According to Major-General Salem bin Salmeen, Director of the Anti... Read more

Source: www.khaleejtimes.com

Top found tags: website(1),United Arab Emirates(3),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Author of Android \"Heart App\" malware arrested in just 17 hoursLocation: Google HQ - Mountain View, United States
Date published: 13-08-2014

The 19-year-old responsible for creating a malware that infected more than 100,000 phones was arrested in just 17 hours. An unnamed 19-year-old software engineering student, identified only as \"Li,\" was arrested just 17 hours after his \"Heart App\" Google Android malware infected more than 100,00... Read more

Source: www.tweaktown.com

Top found tags: government(1),police(1),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BadUSB, keynote controversy: Black Hat USA 2014 videos now onlineLocation: Black Hat - Las Vegas, United States
Date published: 14-08-2014

Black Hat USA 2014 hosted over 9,000 attendees in Las Vegas last week and featured 110 highly informative briefings. Don't fret if you missed it: Some of BHUSA's best talks have now been uploaded to YouTube. In addition, Black Hat has been busy collecting as many white papers and presentation materi... Read more

Source: www.zdnet.com

Top found tags: Karsten Nohl(2),telecom sector(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Qualcomm denies direct financial links with Chinese antitrust expertLocation: Beijing, China
Date published: 14-08-2014

BEIJING (Reuters) - Qualcomm Inc, under investigation for possible monopolistic practices in China, said it had no direct financial links with an antitrust expert sacked from a government advisory post after state media reported he had received payments from the firm. The San Diego-based company has... Read more

Source: reuters.com

Top found tags: United States(2),government(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Declassified: Secret court slammed NSA over 'systemic overcollection'Location: National Security Agency - Fort Meade, United States
Date published: 14-08-2014

PaulMCCooper. Declassified: Secret court slammed NSA over 'systemic overcollection' Recently declassified documents show that the NSA's system of almost limitless collection of data through the PRISM and Boundless Informant programmes was highly criticised by the court responsible for approving its ... Read more

Source: itproportal.com

Top found tags: webcam(1),cyber espionage(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Harmonizing smart grid standards, interoperabilityLocation: New York, United States
Date published: 13-08-2014

In the shifting energy paradigm, active distribution grid operation is an inevitable requirement driven by growing amounts of data and new technologies that allow network operators to monitor and coordinate energy flows, as well as facilitate new services -- presenting new and significant challenges... Read more

Source: www.fiercesmartgrid.com

Top found tags: report(1),energy(2),smart grid(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man sentenced for skimming $190,000Location: New York, United States
Date published: 13-08-2014

FARGO A bookkeeper accused of skimming more than $190,000 from ATMs at a Fargo truck stop has been sentenced to a year in jail and 18 months of supervised probation.Charles John Putney, who worked for the Petro Stopping Center in Fargo, pleaded guilty to a felony theft charge in June. At Monday... Read more

Source: www.jamestownsun.com

Top found tags: report(1),skimming(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Woman pleads guilty to forgery, credit card fraudLocation: Cheyenne, United States
Date published: 13-08-2014

CHEYENNE - A local woman has pleaded guilty to seven counts of forgery after stealing another woman's credit cards and checkbook and using them to make unauthorized purchases.Tisha Reese, 32, told Laramie County District Court Judge Steven Sharpe that she had stolen credit cards and a checkbook belo... Read more

Source: www.wyomingnews.com

Top found tags: financial sector(2),mobile device(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple Patches Series of WebKit Flaws in SafariLocation: Apple HQ - Cupertino, United States
Date published: 14-08-2014

Apple has released a new version of Safari that fixes seven security vulnerabilities, all of which are related to the WebKit framework in the browser. The advisory from Apple is typically bare-bones, with almost no information about the vulnerabilities fixed in Safari 6.1.6 and 7.0.6. Apple said tha... Read more

Source: threatpost.com

Top found tags: update(2),vulnerability(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Berlin bans Uber as furious cabbies brand car-sharing app unsafeLocation: Berlin, Germany
Date published: 14-08-2014

AlysiaJudge. Berlin bans Uber as furious cabbies brand car-sharing app unsafe The popular taxi-hailing smartphone app Uber has suddenly become very unpopular in Germany, after the city of Berlin voted to ban the service due to concerns over its safety. Despite offering in 110 cities around the world... Read more

Source: itproportal.com

Top found tags: website(1),Germany(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Adds Warnings About Deceptive Software to Safe Browsing ServiceLocation: Google HQ - Mountain View, United States
Date published: 14-08-2014

The Google Safe Browsing service has become an integral part of most of the major browsers, integrating malware alerts, warnings about malicious Web sites and suspicious content. The company has been expanding the capabilities of the service steadily over the last few years, and now Google is adding... Read more

Source: threatpost.com

Top found tags: telecom sector(2),Google(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple Patches Multiple Vulnerabilities in Safari Web BrowserLocation: Apple HQ - Cupertino, United States
Date published: 14-08-2014

Safari 6.1.6 and Safari 7.0.6, the latest versions of Apple's Web browser, come with fixes for several security vulnerabilities, some of which could be exploited to remotely execute arbitrary code. Apple hasn't provided specific details on the vulnerabilities, but the advisory published by the compa... Read more

Source: securityweek.com

Top found tags: update(2),Google(3),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vulnerability exploited by Stuxnet still a threatLocation: Kaspersky HQ - Moscow, Russia
Date published: 14-08-2014

Despite being patched four years ago by Microsoft, a vulnerability in XP, Vista, Windows 7, and Windows Server 2003/2008 that Stuxnet exploits is still around and kicking, according to researchers at Kaspersky Lab. Stuxnet was first discovered in June 2010 and by the beginning of August that same ye... Read more

Source: www.scmagazine.com

Top found tags: Microsoft(2),vulnerability(2),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple's Safari browser updates available following bug fixesLocation: Apple HQ - Cupertino, United States
Date published: 14-08-2014

Apple has released version 6.1.6 and 7.0.6 of its Safari browser following patched vulnerabilities recently discovered by its researchers. The fixes address seven bugs tied to memory corruption issues which could lead to arbitrary code execution via a drive-by-download attack, according to a post on... Read more

Source: www.scmagazine.com

Top found tags: vulnerability(1),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Todays Tech: Apple sues itself, Judge slams the NSA, and someone finally invents a reversible USB cableLocation: Apple HQ - Cupertino, United States
Date published: 14-08-2014

Todays Tech: Apple sues itself, Judge slams the NSA, and someone finally. invents a reversible USB cable Apple tries to eat itself Apple battered by furious shareholder lawsuit over illegal employee poaching deal Apple shareholders have joined together to file a class-action lawsuit, suing Steve ... Read more

Source: itproportal.com

Top found tags: report(1),USB (1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
It's time for PGP to die, says ... no, not the NSA a US crypto profLocation: Green, United States
Date published: 14-08-2014

Implementing global e-invoicing with guaranteed legal certainty A senior cryptographer has sparked debate after calling time on PGP the gold standard for email and document encryption. Matthew Green is an assistant research professor who lectures in computer science and cryptography at Johns Hop... Read more

Source: go.theregister.com

Top found tags: Google(2),government(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

SynoLocker-ransomware geeft 5500 slachtoffers deadlineLocation: F-Secure - Helsinki, Finland
Date published: 14-08-2014

De SynoLocker-ransomware die bestanden op ongepatchte NASsen van fabrikant Synology versleutelt heeft 5500 slachtoffers een deadline gegeven om te betalen. SynoLocker kan toegang tot NASsen krijgen die een update uit december 2013 missen. Eenmaal actief versleutelt de ransomware allerlei bestanden. ... Read more

Source: www.security.nl

Top found tags: financial sector(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bank VS aangeklaagd na cyberdiefstal van 327.000 dollarLocation: Amsterdam, The Netherlands
Date published: 14-08-2014

Een Amerikaanse bank is door een Amerikaans constructiebedrijf aangeklaagd nadat cybercriminelen via malware 327.000 dollar van de bankrekening wisten te stelen. TEC Industrial was in mei 2012 het doelwit van een aanval, waarbij de computer van de financieel controller met malware besmet was geraakt... Read more

Source: www.security.nl

Top found tags: online banking(2),financial sector(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft waarschuwt voor blokkade oude Java-versies in IELocation: Oracle - Redwood City, United States
Date published: 14-08-2014

Microsoft heeft bedrijven en organisaties gewaarschuwd voor de naderende blokkade van oude Java-versies in Internet Explorer. Om gebruikers te beschermen zal Microsoft vanaf 9 september verouderde Java-plug-ins blokkeren. Gebruikers krijgen dan op websites die Java gebruiken een waarschuwing te zien... Read more

Source: www.security.nl

Top found tags: Internet Explorer(2),Microsoft(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Besmette versie Tor Browser aangeboden via valse websiteLocation: Amsterdam, The Netherlands
Date published: 14-08-2014

Cybercriminelen hebben via een kopie van de officile Tor-website enige tijd een besmette versie van Tor Browser aangeboden, de software waarmee gebruikers eenvoudig via het Tor-netwerk kunnen surfen. Ook de gebruikte domeinnaam leek van het Tor Project te zijn, de ontwikkelaars van Tor Browser. Be... Read more

Source: www.security.nl

Top found tags: research(1),website(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US can launch automated cyber-attacks, says SnowdenLocation: National Security Agency - Fort Meade, United States
Date published: 14-08-2014

Problems with attribution mean that automated responses to say DDoS attacks could hit those spoofed or used for routing attacks. Edward Snowden appearing via video link at SXSW Edward Snowden appearing via video link at SXSW Former NSA system admin and Dell/CIA IT specialist Edward Snowden claims th... Read more

Source: www.scmagazineuk.com

Top found tags: cyber security(4),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Cryptografieprofessor: hoogste tijd dat PGP verdwijntLocation: Green, United States
Date published: 14-08-2014

De bekende cryptografieprofessor Matthew Green, die onder andere betrokken is bij de audit van het encryptieprogramma TrueCrypt, heeft een betoog online gezet waarin hij pleit voor het verdwijnen van Pretty Good Privacy (PGP). PGP wordt onder andere gebruikt voor het versleutelen van e-mail. Onlangs... Read more

Source: www.security.nl

Top found tags: encryption(2),information security(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Onderzoekers hacken Macbook via FireWireLocation: National Security Agency - Fort Meade, United States
Date published: 14-08-2014

Onderzoekers hebben tijdens de Defcon conferentie in Las Vegas een klein apparaatje gedemonstreerd waarmee ze Macbooks via FireWire kunnen hacken. Slotscreamer, zoals het apparaatje heet, kan het geheugen uitlezen en zodoende het wachtwoord van een vergrendelde Mac achterhalen. De tool is onderdeel ... Read more

Source: www.security.nl

Top found tags: government(2),United States(2),conference(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple patcht 7 WebKit-lekken in SafariLocation: Apple HQ - Cupertino, United States
Date published: 14-08-2014

Apple heeft nieuwe versies van Safari uitgebracht waarin zeven lekken zijn opgelost. Via de lekken in de WebKit-implementatie van Safari kan een aanvaller willekeurige code uitvoeren als een gehackte of kwaadaardige website wordt bezocht. Ook is het mogelijk dat Safari crasht. WebKit is de engine di... Read more

Source: www.security.nl

Top found tags: OS X(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crypto-experts gaan OpenSSL doorlichtenLocation: Green, United States
Date published: 14-08-2014

Het Open Crypto Audit Project, een initiatief dat nu bezig is met de analyse van het encryptieprogramma TrueCrypt, zal binnenkort starten met het doorlichten van OpenSSL. Dat hebben cryptografieprofessor Matthew Green en crypto-expert Kenn White tijdens de Defcon conferentie in Las Vegas laten weten... Read more

Source: www.security.nl

Top found tags: DEF CON(2),OpenSSL(2),conference(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nagemaakte webshop Computerland verspreidde malwareLocation: Amsterdam, The Netherlands
Date published: 14-08-2014

Oplichters hebben onlangs de webshop van de computerketen Computerland nagebouwd en gebruikt voor het oplichten en infecteren van klanten met malware. De domeinnaam die de oplichters gebruikten, computerland-outlet.nl, werd op 3 augustus via hostingbedrijf Versio geregistreerd. Precies een week late... Read more

Source: www.security.nl

Top found tags: Twitter(1),website(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Wetenschappers bouwen supercondensator op basis van hennepvezelsLocation: New York, United States
Date published: 14-08-2014

Amerikaanse onderzoekers hebben een methode ontwikkeld om een supercondensator te bouwen op basis van nanolaagjes van hennepvezels. Het natuurlijke materiaal zou een goed alternatief vormen voor grafeen. Hoewel grafeen een prima basismateriaal vormt voor de fabricage van supercondensators, is de pro... Read more

Source: tweakers.net

Top found tags: NL(1),research(1),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Twitteraccount Medvedev gehacktLocation: Moscow, Russia
Date published: 14-08-2014

'Ik neem ontslag, ik schaam me voor de acties van de regering'. Zo begon een tweet die vanmorgen binnenkwam bij zo'n 2,5 miljoen volgers van de Russische premier Dmitry Medvedev. Ook werd in de ogenschijnlijk van Medvedev afkomstige tweets het beleid van president Putin gehekeld. Maar al snel liet d... Read more

Source: www.automatiseringgids.nl

Top found tags: mobile device(2),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Draagbare mini-router beschermt wifi-verkeer via TorLocation: Amsterdam, The Netherlands
Date published: 14-08-2014

Om ervoor te zorgen dat mensen ook onderweg hun internetverkeer kunnen afschermen hebben drie beveiligingsonderzoekers speciale software voor verschillende modellen draagbare mini-routers ontwikkeld die ervoor zorgt dat al het internetverkeer via het Tor-netwerk gaat. Tor verbergt het IP-adres van g... Read more

Source: www.security.nl

Top found tags: wireless(1),DEF CON(2),conference(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Miljoenenfraude met online gestolen chequesLocation: Amsterdam, The Netherlands
Date published: 14-08-2014

In de Verenigde Staten zijn vijf mannen aangeklaagd die met online gestolen cheques voor miljoenen fraudeerden. Volgens de aanklacht kochten de vijf mannen persoonlijke informatie zoals namen, geboortedata en social security nummers, alsmede bankrekeningnummers. Met deze gegevens probeerden ze op de... Read more

Source: www.security.nl

Top found tags: government(1),NL(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pico moet einde aan alle wachtwoorden makenLocation: Amsterdam, The Netherlands
Date published: 14-08-2014

Wachtwoorden als de universele inlogmethode zijn een grote fout en een oneerlijke "deal" die beveiligingsexperts aan normale gebruikers hebben opgedrongen, zo stelt beveiligingsonderzoeker Frank Stajano die al een aantal jaren aan een oplossing werkt die alle wachtwoorden moet laten verdwijnen. De o... Read more

Source: www.security.nl

Top found tags: NL(1),website(1),research(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheid in Cisco Unified Communications Manager verholpenLocation: Cisco HQ - San Jose, United States
Date published: 14-08-2014

Samenvatting: Cisco heeft een update uitgebracht voor Cisco Unified Communications Manager die de kwetsbaarheid verhelpt. Gevolgen: Een ongeauthenticeerde kwaadwillende kan op afstand een SQL-injection aanval uitvoeren. Beschrijving: Een SQL-injectie kwetsbaarheid in meerdere pagina's van Cisco Unif... Read more

Source: www.ncsc.nl

Top found tags: update (1),vulnerability(1),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in Apple SafariLocation: Apple HQ - Cupertino, United States
Date published: 14-08-2014

Samenvatting: Apple heeft meerdere kwetsbaarheden verholpen in Safari voor OS X. Gevolgen: Door gebruik te maken van de kwetsbaarheden kan een kwaadwillende middels een malafide website een Denial-of-Service veroorzaken en mogelijk code uitvoeren onder gebruikersrechten. Beschrijving: - CVE-2014-138... Read more

Source: www.ncsc.nl

Top found tags: website(1),Apple(2),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in Python verholpenLocation: CGI HQ - Montreal, Canada
Date published: 14-08-2014

Samenvatting: Er is een kwetsbaarheid in Python verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken voor het verkrijgen van informatie van het systeem of om willekeurige code uit te voeren onder de rechten van de gebruiker waaronder het proces draait. Beschrijving: Een kw... Read more

Source: www.ncsc.nl

Top found tags: NL(1),vulnerability(1),webserver(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in XenLocation: Amsterdam, The Netherlands
Date published: 14-08-2014

Samenvatting: Er zijn updates beschikbaar gesteld om de kwetsbaarheden te verhelpen in Xen. Gevolgen: Een lokale kwaadwillende gebruiker kan mogelijk een Denial-of-Service veroorzaken van de Xen host of verhoogde gebruikersrechten verkrijgen op de guest. Beschrijving: - CVE-2014-5146, CVE-2014-5149 ... Read more

Source: www.ncsc.nl

Top found tags: NL(1),patch(1),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe verhelpt kwetsbaarheden in Adobe Flash PlayerLocation: Adobe HQ - San Jose, United States
Date published: 14-08-2014

Samenvatting: Adobe heeft meerdere kwetsbaarheden verholpen in Flash Player. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende willekeurige code uitvoeren en beveiligingsmaatregelen omzeilen. Beschrijving: - CVE-2014-0540, CVE-2014-0542, CVE-2014-0543, CVE-2014-0544, CVE-2014-05... Read more

Source: www.ncsc.nl

Top found tags: telecom sector(2),vulnerability(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish