Under construction

New design coming soon!

CIC News engine statistics

CIC News for 15-08-2014 contains 75 articles: cybercrime(28),cyber security(21),data breach(6),other(20)

CIC News update contains 60 English and 15 Dutch articles for today.
There are 3 published advisories, 1 are English and 2 are Dutch.
In today's English news articles:
- 20 related to cybercrime
- 20 related to cyber security
- 6 related to data breach and identity theft
- 14 for the category other news

In today's Dutch news articles:
- 8 related to cybercrime
- 1 related to cyber security
- 6 for the category other news

Have fun reading.

English cybercrime related news

Gameover Zeus Botnet RebuildsLocation: Arbor Networks - Burlington, United States
Date published: 14-08-2014

It didnt take long for an updated version of GameOver Zeus to make some headway in rebuilding itself. Research published today from Arbor Networks demonstrates that cybercriminals behind GameOver Zeus, which was taken down by law enforcement in early June, have renewed the botnet with at least 12... Read more

Source: threatpost.com

Top found tags: telecom sector(4),malware(5),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Bolsters Safe Browsing Service With New Alert for Suspicious SoftwareLocation: Google HQ - Mountain View, United States
Date published: 15-08-2014

Google is bolstering its Safe Browsing service with a new alert for potentially unwanted programs. According to Google Staff Engineer Moheeb Abu Rajab, Google is expanding its Safe Browsing protection against malicious software programs disguised as legitimate downloads that make unexpected changes ... Read more

Source: securityweek.com

Top found tags: malware(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSA works to automatically detect attacks, return strikes from foreign adversariesLocation: National Security Agency - Fort Meade, United States
Date published: 14-08-2014

cyber attack The MonsterMind program was being developed as recently as last year, reports reveal. A developing NSA program called MonsterMind would allow the intelligence agency to automatically detect attacks from foreign adversaries, and even retaliate with cyber strikes as a means of defus... Read more

Source: www.scmagazine.com

Top found tags: United States(2),cybercrime(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Email spammer settles for $350K with FTCLocation: Federal Trade Commission - Washington, United States
Date published: 14-08-2014

An email spammer and his company are settling with the Federal Trade Commission (FTC) for $350,000 after they were charged with using misleading emails to deceive American consumers. Yair Shalev and his company, Kobeni Inc., sent emails ahead of the Affordable Care Act's launch that claimed recipien... Read more

Source: www.scmagazine.com

Top found tags: website(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2 Bulgarians Handed 6-Year Jail Terms for Skimming Scam in PhilippinesLocation: Sofia, Bulgaria
Date published: 14-08-2014

Two Bulgarian nationals have been sentenced to six years of imprisonment for installing a skimming device at an ATM in a shopping center in province of Pampanga in the Philippines.A spokesperson for the Philippine National Police, as cited by local media outlets and the BGNES news agency, said that ... Read more

Source: www.novinite.com

Top found tags: cybercrime(2),government(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Credit card fraud a continuing global problemLocation: London,United Kingdom
Date published: 14-08-2014

The eurozone is quickly becoming a hotbed for credit card fraud.Recent data released by Euromonitor International, a private analytics company, shows that Europe totaled $2.1 billion in losses in 2013, a 6.2 percent increase from 2012. The combined total puts the 19 countries profiled second to the ... Read more

Source: www.pbs.org

Top found tags: financial sector(2),United States(2),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
One-fifth of work PCs harbour malware studyLocation: Damballa - Atlanta, United States
Date published: 14-08-2014

Almost 20 per cent of corporate PCs are infected with some form of malware, according to a report by threat protection company Damballa in its latest State of Infections report.Furthermore, there was no correlation between size and infection, with large organisations - which ought to have better res... Read more

Source: www.computing.co.uk

Top found tags: telecom sector(2),trojan(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DoST launches Internet infra to protect netizens from cybercrimeLocation: New Delhi, India
Date published: 14-08-2014

MANILA, PhilippinesWith 9 of 10 Internet users falling prey to cyber criminals, the Department of Science and Technology (DoST) has started an initiative that will enable netizens to be safe from online poseurs and avail of government services faster.The DoSTs Philippine National Public Key In... Read more

Source: technology.inquirer.net

Top found tags: Philippines(1),cybercrime(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Know what Ferguson city needs right now? It's not Anonymous doxing random peopleLocation: St. Louis, United States
Date published: 15-08-2014

Anonymous has called off efforts to name and shame the cop who shot unarmed teen Michael Brown dead in Ferguson, Missouri after the hacktivists identified a bloke whom the police say has never worked as a beat officer. On Thursday the group released the name and pictures from Facebook of a man t... Read more

Source: go.theregister.com

Top found tags: Twitter(1),Anonymous(2),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
7 Places to Check for Signs of a Targeted Attack in Your NetworkLocation: New York, United States
Date published: 15-08-2014

Targetedattacks are designed to circumvent existing policies and solutions within the target network, thus making their detection a big challenge. As weve stressed in our previous entry about common misconceptions about targeted attacks, there is no one-size-fits-all solution against it; enterp... Read more

Source: trendmicro.com

Top found tags: vulnerability(2),phishing(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Networks facing no shortage of security risks, Cisco survey saysLocation: Cisco HQ - San Jose, United States
Date published: 14-08-2014

Anyone who thinks their companys network is secure is living in a fools paradise, according to networking giant Cisco. In its 2014 mid-year security report, it noted that every corporate network surveyed showed evidence of some sort of malicious traffic.Cisco, whose security arm provides produ... Read more

Source: business.financialpost.com

Top found tags: financial sector(2),cybercrime(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Crime wave: 63 girls lured into sex trade on the internetLocation: Bogota, Colombia
Date published: 14-08-2014

Ugandas Director of Interpol Asan Kasingye has said the police are investigating over 63 cases of young girls being sexually exploited on the internet. Kansigye says the unsuspecting girls are asked to post their nude photos on quack websites in exchange for money. Kasingye has cautioned parents ... Read more

Source: ntvuganda.co.ug

Top found tags: website(1),cybercrime(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Information session held on combating cybercrimeLocation: New York, United States
Date published: 15-08-2014

An information session has been held for the Management Board of the Maldives Police Service on the topic of using technology to combat cybercrime.The information session was held yesterday during a meeting of the Management Board and was conducted by the Senior Director of the Oracle Public Sector ... Read more

Source: www.miadhu.com

Top found tags: EN(1),Oracle(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ferguson, Mo., police site hit with DDoS attackLocation: St. Louis, United States
Date published: 14-08-2014

In the wake of the shooting of unarmed teen Michael Brown, hackers launch a cyberattack to take out the police department's website and email.Hackers have made the St. Louis County Police their new target. The police department's website has been offline since Wednesday and continued to be down on T... Read more

Source: www.cnet.com

Top found tags: DoS(2),e-mail(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2014 ICS Cyber Security Conference Agenda UpdateLocation: Aurora, United States
Date published: 15-08-2014

Our team is busy putting together the best ICS Cyber Security Conference to date. As always, the conference will address real world problems and discuss actual ICS cyber incidents, many of which have never been told before. The 14th ICS Cyber Security Conference will have 5 major themes: Actual ICS ... Read more

Source: securityweek.com

Top found tags: critical infrastructure(2),cybercrime(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Research: Almost 1 in 5 company devices infectedLocation: Damballa - Atlanta, United States
Date published: 15-08-2014

New research claims to show that enterprises are seeing around 18.5 per cent - that's almost one in five units - of their corporate devices being infected , suggesting a major rise in successful infections by malware and other electronic trickery. Research: Almost 1 in 5 company devices infected Res... Read more

Source: www.scmagazineuk.com

Top found tags: trojan(2),cybercrime(4),malware(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Infection rate from Zeus variant grows 1,879 percentLocation: Arbor Networks - Burlington, United States
Date published: 15-08-2014

Zeus variant "Maple" targets financial data of Canadian users Infection rate for Zeus variant newGOZ rose 1,879 percent. During the three weeks after Malcovery Security discovered a new Gameover Zeus variant known as newGOZ, infection rates from the mutation grew 1,879 percent, according to a blog p... Read more

Source: www.scmagazine.com

Top found tags: malware(2),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook, the security companyLocation: Facebook - Menlo Park, United States
Date published: 15-08-2014

"perfect fit" for the social media company. Ariel Zambelich/WIRED On August 7, as Def Con was kicking off far below in the bowels of the Rio Hotels convention center in Las Vegas, I was ushered into a suite on the 19thfloor to see aman who has one of the most high-profile security gigs in the... Read more

Source: arstechnica.com

Top found tags: Black Hat(4),social media(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Wearing Your Tech on Your SleeveLocation: Google HQ - Mountain View, United States
Date published: 14-08-2014

Sartorial decisions and technology are often considered two separate, distinct items. However, the surge of wearable smart devices has blurred the line between the two. Nowadays, it is common to see people accessorized in pieces of equipment that complement their day-to-day activities. Some mi... Read more

Source: trendmicro.com

Top found tags: mobile device(2),cybercrime(3),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Suspicious Login Message Faked, Distributes BackdoorLocation: Google HQ - Mountain View, United States
Date published: 14-08-2014

Legitimate services are often used by cybercriminals to try and make their attacks more convincing. Recently, Ispotted attacks that usedservices andplatforms like Google Drive and Dropboxin order tolook less suspicious to unwary users. I received a spammed message like the one shown right ... Read more

Source: trendmicro.com

Top found tags: Trend Micro(2),e-mail(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Volumetric DDoS activity up big-time in Q2 2014, report indicatesLocation: McPherson, United States
Date published: 14-08-2014

An email sent out to the social media management platform's users addressed the attack. Verisign observed and mitigated the biggest DDoS attack it has ever seen in Q2 2014, which peaked at 300 Gbps. Volumetric distributed denial-of-service (DDoS) activity is up big-time in the second quarter of this... Read more

Source: www.scmagazine.com

Top found tags: social media(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SpiderOak says you'll know it's secure because a little bird told youLocation: New York, United States
Date published: 14-08-2014

Edward Snowdenendorsed cloud storage provider SpiderOak has added an additional safeguard to ensure that its users' data doesn't fall into the hands of law enforcement without their knowledge, in the form of a "warrant canary." The term takes its inspiration from the practice of bringing actual c... Read more

Source: go.theregister.com

Top found tags: United States(2),Electronic Frontier Foundation(3),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Korea introduces security readiness guideline for private sectorLocation: New York, United States
Date published: 15-08-2014

By ZDNet Staff August 15, 2014 -- 01:58 GMT (02:58 BST) The Ministry of Science, ICT, and Future Planning and the Korea Internet & Security Agency (KISA) hosted a conference in Seoul on Wednesday 13 August to explain details about the information security readiness system. A ministry official said "... Read more

Source: www.zdnet.com

Top found tags: security management(2),South Korea(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Security fails without usabilityLocation: Green, United States
Date published: 14-08-2014

There's a general trade-off between usability and security. It's an old phenomenon, going back well before the computer age. General Benjamin W. Chidlaw, while commander in chief of the joint service Continental Air Defense Command (part of what eventually became NORAD) in 1954, put it this way: Sim... Read more

Source: www.zdnet.com

Top found tags: United States(2),Electronic Frontier Foundation(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Where does a hacker's drive come from?Location: Black Hat - Las Vegas, United States
Date published: 15-08-2014

Where does a hacker's drive come from?. Ever wondered why hackers do what they do? Thycotic, a software firm specialising in privileged access password protection, conducted a survey of 127 hackers at Black Hat USA 2014 to try and understand their thinking. The company found that more than half of t... Read more

Source: itproportal.com

Top found tags: United States(2),Black Hat(4),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Who needs hackers? 'Password1' opens a third of business' doorsLocation: AMD HQ - Sunnyvale, United States
Date published: 15-08-2014

Hundreds of thousands of hashed corporate passwords have been cracked within minutes by penetration testers using graphics processing units. The 626,718 passwords were harvested during penetration tests over the last two years conducted across corporate America by Trustwave infosec geeks. The firm's... Read more

Source: go.theregister.com

Top found tags: Trustwave(1),cyber security(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacking the economy of smartphone theftLocation: Londen, United Kingdom
Date published: 15-08-2014

According to the Met Police, as many as 10,000 mobile phones are stolen every month in London alone According to the Met Police, as many as 10,000 mobile phones are stolen every month in London alone, while phones account for approximately 70% of items taken in personal robberies. In addition to the... Read more

Source: www.information-age.com Three involved massive identity theft ring sentenced to prison | EVERETT It was an unusual case in several ways.The investigation turned up 500 potential victims and nearly a half million dollars gained through a sophisticated scheme of stealing identities and racking up bills with ill-gotten credit.Snohomish County prosecutors can\'t remember handling an identity theft case with so many victims.Sadly, a deputy prosecutor wrote in court papers, the vastness and complexity of this case surpasses the state\'s ability to investigate it.Banks and retailers also were hard hit. Nordstrom\'s alone was out more than $47,000.The investigation tracked victims from Snohomish County to New Jersey. None of the three defendants had been convicted of a felony before their 29th birthday. All had decent work histories until a few years ago. One had earned an economics degree from the University of Washington and went on to work in public television for a spell.In the end, they\'re all headed to prison for lengthy terms. Snohomish County Superior Court Judge Joseph Wilson saw to that during their sentencing Wednesday.David J. King, 34, of Lake Stevens, who wrestled and played soccer player before spending four years in the Navy, was sentenced to more than five years in prison.Vikram Chorpa, 32, a high school honors student and UW graduate from Renton, was given a seven-year term. That was the maximum under state sentencing guidelines. | http://www.heraldnet.com/article/20140815/NEWS01/140819425/Three-involved-massive-identity-theft-ring-sentenced-to-prison | 15-08-2014 | www.heraldnet.com

Top found tags: United Kingdom(2),cyber security(4),telecom sector(16)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple to store some user data in China: Weighing the pros and consLocation: Apple HQ - Cupertino, United States
Date published: 15-08-2014

Apple has started to store some of its Chinese users' data on servers in mainland China, becoming one of the very few technology giants to store information on Chinese soil. Apple defends government-mandated gaps in new transparency report Apple defends government-mandated gaps in new transparency r... Read more

Source: www.zdnet.com

Top found tags: mobile device(4),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cridex Malware Takes Lesson From GameOver ZeusLocation: Arbor Networks - Burlington, United States
Date published: 15-08-2014

The GameOver Zeus malware had a nice run for itself, making untold millions of dollars for its creators. But it was a run that ended with a multi-continent operation from law enforcement and security researchers to disassemble the infrastructure. Now researchers have identified a new variant of the ... Read more

Source: threatpost.com

Top found tags: United States(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bypassing Security Defenses: DEF CONLocation: DEF CON - Las Vegas, United States
Date published: 15-08-2014

In an attacker's ideal world, he or she would infect a desktop, steal the user's RDP password and move smoothly across the network to the RDP server and immediately gain access. In real life however, things can get a little more complicated. Zoltan Balazs, chief technology officer at MRG Effitas, re... Read more

Source: securityweek.com

Top found tags: vulnerability(1),backdoor(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Partnerships, Innovation Drive CyberPatriot SuccessLocation: Moscow, Russia
Date published: 15-08-2014

The report of the largest known harvest of Internet credentials, an estimated 1.2 billion passwords, names and personal information from 420,000 web sites by a group of Russian hackers, is but the latest incident in a surging tide of global cybercrime. In other cyber theaters, conflicts around the w... Read more

Source: securityweek.com

Top found tags: education(4),telecom sector(4),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Bugat Malware Uses HTML Injections Taken From Gameover ZeusLocation: London,United Kingdom
Date published: 15-08-2014

Researchers have uncovered a new variant of the Bugat banking Trojan which uses HTML injection techniques that are very similar to the ones used by Gameover Zeus. The disruption of the Gameover Zeus botnet was announced in early June by law enforcement agencies and private sector companies. Shortly ... Read more

Source: securityweek.com

Top found tags: United Kingdom(2),cybercrime(6),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bank Faces Lawsuit Over $327,000 in Losses from Cyber AttackLocation: Summit, United States
Date published: 15-08-2014

Investigative reporter Brian Krebs reports that TEC Industrial, a Tennessee-based industrial maintenance and construction company, is suing TriSummit Bank over a May 2012 cyber attack during which hackers stole $327,804 from TEC's accounts. Despite an established system under which all transfers had... Read more

Source: www.esecurityplanet.com

Top found tags: financial sector(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
50% of corporate passwords crackable within a few minutesLocation: Trustwave - Chicago, United States
Date published: 15-08-2014

Security admins need to be more creative when it comes to developing security systems, says Adrian Davis of ISC(2). 50% of corporate passwords crackable within a few minutes 50% of corporate passwords crackable within a few minutes The twin dangers of high-powered password-crunching `brute force' at... Read more

Source: www.scmagazineuk.com

Top found tags: Trustwave(1),Windows(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Don't think you're SAFE from Windows zombies just 'cos you have an iPhone - researchLocation: Apple HQ - Cupertino, United States
Date published: 15-08-2014

Fanbois aren't safe from Windows malware - and it's all down to iTunes syncing. The music software's sync is the Achilles' heel that could expose otherwise secure iOS devices to malware, security researchers warn. Simply connecting an iPhone or iPad to an infected Windows machine through a USB cable... Read more

Source: go.theregister.com

Top found tags: Georgia Institute of Technology(4),mobile device(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Fourteen Indicted in Identity Theft Crackdown in Puerto RicoLocation: San Juan, Puerto Rico
Date published: 14-08-2014

The U.S. Justice Department announced Tuesday they charged 14 people in three separate indictments over identity fraud, theft and money laundering for their role in trafficking the identities and documents of Puerto Rican U.S. citizens.So far five have been arrested in Puerto Rico and Florida and wi... Read more

Source: www.latinpost.com

Top found tags: fraud(1),identity theft(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Joplin woman pleads guilty in fraud caseLocation: New York, United States
Date published: 14-08-2014

A 23-year-old Joplin woman pleaded guilty Thursday in federal court to aggravated identity theft and to fraudulently receiving federal disaster benefits in the wake of the May 22, 2011, tornado.Brittany A. Barnes changed her pleas to guilty on the charges in U.S. District Court in Springfield in a p... Read more

Source: www.joplinglobe.com

Top found tags: government(2),identity theft(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: IRS Exposed 1.4 Million Taxpayers to Identity TheftLocation: U.S. Internal Revenue Service HQ - Washington, United States
Date published: 14-08-2014

The geniuses at the Internal Revenue Service gave sensitive data on over a million taxpayers to a printing contractor wiout checking the bona fides of any of the contractor's employees, says the Treasury Inspector General for Tax Administration. The news comes from a report dated last month but just... Read more

Source: reason.com

Top found tags: cyber security(2),government(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Huron Legal Adds Data Breach Speciality PracticeLocation: Huron, United States
Date published: 14-08-2014

Data breaches are evermore in the news, and are getting larger, if the recent hack by Russian criminals is any indication. Huron Consulting Group has scented an opportunity, and has announced the launch of Huron Legals Cyber Security Incident Response offering to help companies that have experien... Read more

Source: www.infosecurity-magazine.com

Top found tags: data breach(2),government(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber attackers lurk behind cloudLocation: Center for Strategic and International Studies - Washington, United States
Date published: 15-08-2014

A South Korean walks past a credit card advertisement in Seoul. Payment card systems are coming under increasing attacks from cyber criminals even as businesses step up measures to secure their networks and applications. (AFP)The advent of big data or data sets that are too large or complex to m... Read more

Source: www.chinadailyasia.com

Top found tags: government(4),South Korea(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Compromise Point-of-Sale Systems at Grocery Giants Supervalu, Albertson'sLocation: Minnesota, United States
Date published: 15-08-2014

Hackers Breach Payment Card Processing Systems of Supermarket Chain Supervalu and Albertsons Supermarket chains Supervalu and Albertsons told customers on Thursday that information associated with their payment cards might have been stolen after hackers broke into systems that process credit and ... Read more

Source: securityweek.com

Top found tags: threat(1),data breach(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Facial recognition software helps FBI snag fugitive 15 years laterLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 14-08-2014

A fugitive on the run for nearly a decade and a half was finally captured in Nepal after new facial recognition software revealed his true identity, according to a Tuesday FBI release. Neil Stammer was arrested in New Mexico in 1999 on multiple state charges such as child sex abuse and kidnapping, b... Read more

Source: www.scmagazine.com

Top found tags: FBI(1),fraud(1),government(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ransomware crooks claim private key database is for saleLocation: F-Secure - Helsinki, Finland
Date published: 14-08-2014

According to researchers, operators of a ransomware campaign are now looking to sell their collection of decryption keys for a set price. On Wednesday, F-Secure revealed in a blog post that criminals using SynoLocker, malware named after a targeted product network-attached storage (NAS) devices ... Read more

Source: www.scmagazine.com

Top found tags: research(1),website(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is your company one of the two fifths hit by IP theft?Location: New York, United States
Date published: 14-08-2014

Worldwide theft of intellectual property is more rife now than ever before, according to new research. A study conducted by Kaspersky Lab has revealed that 21 per cent of manufacturers have suffered a loss of intellectual property (IP) within the past year.The survey, which quizzed nearly 4,000 IT m... Read more

Source: www.itproportal.com

Top found tags: mobile device(2),telecom sector(2),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
75,000 Jailbroken iPhones, iPads Hit by Chinese MalwareLocation: Apple HQ - Cupertino, United States
Date published: 14-08-2014

Owners of iPhones and iPads who jailbreak their devices generally understand that they're losing Apple's security protections, but that message hasn't really hit home until now. Two security researchers have documented that iOS malware called AdThief malware may have infected more than 75,000 jailbr... Read more

Source: www.tomsguide.com

Top found tags: Apple(3),mobile device(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: DHS needs to improve cyber threat data sharing with critical infrastructure sectorsLocation: Department of Homeland Security - Washington, United States
Date published: 14-08-2014

A voluntary program to share cyber threat data with organizations across 16 critical infrastructure sectors has expanded over the past year. But the Homeland Security Department's watchdog recently said enrollment has been slow and the quality of information shared needs improvement.In February 2013... Read more

Source: www.fiercehomelandsecurity.com

Top found tags: government(2),United States(2),DHS(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chrome update to raise alarms over deceptive download bundlesLocation: Google HQ - Mountain View, United States
Date published: 15-08-2014

Google is planning to roll out an update to the Safe Browsing feature of its Chrome web browser that will alert users to a new category of suspicious downloads: ones that look like they're installing helpful software but could also include additional, unexpected payloads. Safe Browsing already issue... Read more

Source: go.theregister.com

Top found tags: telecom sector(2),update(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oz science and technology needs its own Team AustraliaLocation: Sydney, Australia
Date published: 15-08-2014

you get there because you forgot to pack one," said Australia's Chief Scientist, Professor Ian Chubb, delivering the 2014 Jack Beale lecture at the University of New South Wales on Wednesday night. Chubb is right. But Australia has arrived at the middle of the second decade of the twenty-first centu... Read more

Source: www.zdnet.com

Top found tags: Australia(2),education(3),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spy agency computer taps face oversight deficiencyLocation: New York, United States
Date published: 15-08-2014

if the oversight body isn't given additional resources. In July, Attorney-General George Brandis introduced legislation that will see the powers of the Australian Security Intelligence Organisation (ASIO) significantly boosted, enabling the agency to target, tap, and disrupt all computers and third ... Read more

Source: www.zdnet.com

Top found tags: legislation(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is the Cyber Sweep Too Much to Handle?Location: New York, United States
Date published: 15-08-2014

The recent regulatory sweeps around cyber security by the Securities and Exchange Commission and FINRA are starting to hit financial advisors, and many, especially smaller practices, are not prepared for it.On June 10, Donald J. Kalil, president of Wilmington, Del... Read more

Source: wealthmanagement.com

Top found tags: EN(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Don't get ripped off by credit card skimmingLocation: New York, United States
Date published: 14-08-2014

When you swipe your credit or debit card, there is always a risk of giving ID-theft criminals what they need to steal your money through what is known as \"skimming.\"Criminals install electronic devices at locations at which we use cards, such as an ATM, a grocery store or a gas pump. As you use yo... Read more

Source: www.azcentral.com

Top found tags: skimming(1),credit card(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tennessee man is 2nd to plead guilty in multi-state credit card fraud spreeLocation: Salem, United States
Date published: 14-08-2014

The second man charged in a multistate credit card fraud scheme pleaded guilty in Salem Circuit Court on Thursday.Matthew Shane Beaty, 26, of Athens, Tennessee, pleaded guilty to two counts of credit card fraud and one count of obtaining money under false pretenses. He was given a suspended 15-year ... Read more

Source: www.roanoke.com

Top found tags: credit card(2),government(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Giving your old Tesco Hudl to Auntie June? READ THIS FIRSTLocation: eBay - San Jose, United States
Date published: 15-08-2014

Implementing global e-invoicing with guaranteed legal certainty UK supermarket Tescos Hudl tablet will offer up data from past users even if its been factory reset. The Register spoke to Ken Munro from security firm Pen Test Partners, who said he'd bought 17 Hudls and AllWinner tablets fro... Read more

Source: go.theregister.com

Top found tags: police(1),social media(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Fixes 12 Vulnerabilities in Chrome 36Location: Microsoft HQ - Redmond, United States
Date published: 15-08-2014

Google patched its Chrome browser this week, fixing 12 vulnerabilities, includingboth a serious information disclosure bug and a use-after-free vulnerability that could let users obtain potentially sensitive information and execute arbitrary code. French security researcher Antoine Delignat-Lavaud... Read more

Source: threatpost.com

Top found tags: vulnerability(2),Google(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tech News Weekly podcast 31: NASA probe back from the dead, and the unhackable phone gets hackedLocation: Cooper, United States
Date published: 15-08-2014

PaulMCCooper. Tech News Weekly podcast 31: NASA probe back from the dead, and the unhackable phone gets hacked On this week's Tech News Weekly Podcast from ITProPortal, crowd funding is responsible for reviving an abandoned space probe, why the internet of things might be over-hyped, blackphone - th... Read more

Source: itproportal.com

Top found tags: social media(2),United Kingdom(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

Siemens OpenSSL Vulnerabilities (Update B)Location: Google HQ - Mountain View, United States
Date published: 14-08-2014

Google is bolstering its Safe Browsing service with a new alert for potentially unwanted programs. According to Google Staff Engineer Moheeb Abu Rajab, Google is expanding its Safe Browsing protection against malicious software programs disguised as legitimate downloads that make unexpected changes ... Read more

Source: ics-cert.us-cert.gov

Top found tags: malware(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Hacker vooral gedreven door lol en spanningLocation: Black Hat - Las Vegas, United States
Date published: 15-08-2014

Hackers blijken zelden gedreven door financile motieven of roem, blijkt uit een onderzoek onder hackers. Meer over Black Hat 2014 Gevaarlijke USB-stick tikt code als bezetene Firewalls: al 25 jaar stoten onder de gordel Chinese hackers mogen hackconferenties niet in van VS Black Hat legt volgende ... Read more

Source: www.automatiseringgids.nl

Top found tags: conference(3),Black Hat(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nieuw GameOver Zeus-botnet groeit vooral in VSLocation: Arbor Networks - Burlington, United States
Date published: 15-08-2014

Begin juni haalden de FBI en Europol het GameOver Zeus-botnet uit de lucht, maar een nieuwe variant is inmiddels actief en heeft al duizenden computers genfecteerd, vooral in de VS. GameOver Zeus is een zogeheten banking Trojan, die vooral is ontwikkeld om gegevens voor internetbankieren te stelen... Read more

Source: www.security.nl

Top found tags: United States(2),cybercrime(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Duitse overheidsspyware klaar voor gebruikLocation: Berlin, Germany
Date published: 15-08-2014

Door de Duitse overheid ontwikkelde spyware waarmee politie op afstand toegang tot computers van verdachten kan krijgen is klaar voor gebruik. In totaal zou er aan twee zogeheten "Bundestrojaners" gewerkt zijn, waarvan er n nog steeds in ontwikkeling is, zo meldt de Duitse media. De overheidsspy... Read more

Source: www.security.nl

Top found tags: trojan(2),government(6),Ministry of the Interior and Kingdom Relations(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Opstelten kan cybercrimeschatting McAfee niet bevestigenLocation: Amsterdam, The Netherlands
Date published: 15-08-2014

Minister Opstelten van Veiligheid en Justitie kan niet bevestigen dat cybercrime de Nederlandse economie elk jaar 8,8 miljard euro en in potentie 150.000 banen kost, zoals anti-virusbedrijf McAfee beweert. Dat blijkt uit antwoorden (PDF) van de minister op vragen van PvdA-Kamerlid Jeroen Recourt. De... Read more

Source: www.security.nl

Top found tags: research(1),government(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Apple heeft teveel vertrouwen in USB-verbinding iPhone"Location: Apple HQ - Cupertino, United States
Date published: 15-08-2014

De onderzoekers die volgende week tijdens het 23ste Usenix Security Symposium in San Diego zullen laten zien hoe ze door middel van besmette Windowscomputers een botnet van iPhones kunnen maken zeggen dat Apple teveel vertrouwen in de USB-verbinding van de iPhone heeft. De onderzoekers demonstreerde... Read more

Source: www.security.nl

Top found tags: Apple(2),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ZeroLocker-ransomware doet zich voor als herstelsoftwareLocation: Amsterdam, The Netherlands
Date published: 15-08-2014

Sinds het verschijnen van een tool van de beveiligingsbedrijven FireEye en Fox-IT voor het ontsleutelen van bestanden die door de CryptoLocker-ransomware zijn versleuteld, is er een nieuwe ransomware-variant verschenen die min of meer hetzelfde beweert, alleen hier 300 dollar voor vraagt. De ransomw... Read more

Source: www.security.nl

Top found tags: ransomware(1),cybercrime(2),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nieuw-Zeelandse ambtenaren doelwit van spear phishingLocation: National Cyber Security Centre - Den Haag, The Netherlands
Date published: 15-08-2014

Het Nieuw-Zeelandse National Cyber Security Centre (NCSC) heeft ambtenaren gewaarschuwd (PDF) dat ze het doelwit van spear phishingaanvallen zijn. Bij spear phishing worden gericht e-mails gebruikt die de ontvanger verleiden tot het openen van een meegestuurde bijlage of link. In dit geval gaat het ... Read more

Source: www.security.nl

Top found tags: phishing(2),The Netherlands(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Insert coin to continue: GameOver ZeuS zombie MUTATES, shuffles back to its feetLocation: Arbor Networks - Burlington, United States
Date published: 15-08-2014

The resurfaced GameOver bot is back with a vengeance, having infected 12,000 computers after the network was taken down in June, according to Arbor Networks. The bot was taken out in June in a coordinated and high-profile crackdown by security companies and the FBI and Europol. Servers and domains w... Read more

Source: go.theregister.com

Top found tags: government(2),United States(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Onderzoek: Password1 populairste wachtwoord bij bedrijvenLocation: Trustwave - Chicago, United States
Date published: 15-08-2014

Het wachtwoord "Password1" was het afgelopen jaar het populairste wachtwoord bij bedrijven, zo stelt beveiligingsbedrijf Trustwave aan de hand van eigen onderzoek. Het bedrijf verzamelde bij penetratietests meer dan 626.000 gehashte wachtwoorden, die het vervolgens probeerde te kraken. De meeste wac... Read more

Source: www.security.nl

Top found tags: Trustwave(1),Windows(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

IBM ontwikkelt surveillancesysteem dat huidskleur herkentLocation: Boston, United States
Date published: 15-08-2014

De Amerikaanse stad Boston heeft vorig jaar een surveillancesysteem van IBM ingezet dat in staat was om mensen aan de hand van hun huidskleur, lengte en kleding te monitoren. De camera's en bijbehorende surveillancesoftware werden tijdens twee concerten in Boston ingezet. De camera's werden bediend ... Read more

Source: www.security.nl

Top found tags: NL(1),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft overwoog naamswijziging Internet ExplorerLocation: Microsoft HQ - Redmond, United States
Date published: 15-08-2014

Binnen Microsoft is nagedacht over een naamswijziging van Internet Explorer, zo hebben de ontwikkelaars van de browser laten weten. Vanwege de gebrekkige ondersteuning van webstandaarden in oude versies en vele veiligheidsproblemen heeft IE bij veel mensen nog altijd een negatief imago. Tijdens een ... Read more

Source: www.security.nl

Top found tags: Internet Explorer(2),Microsoft(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Chrome gaat misleidende software blokkerenLocation: Google HQ - Mountain View, United States
Date published: 15-08-2014

Google heeft aanpassingen aan de Safe Browsing service doorgevoerd waardoor Google Chrome vanaf volgende week naast malware ook misleidende software gaat blokkeren. Op dit moment worden Chrome-gebruikers al 3 miljoen keer per voor kwaadaardige downloads gewaarschuwd. Naast malware is er ook nog soft... Read more

Source: www.security.nl

Top found tags: Chrome(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Daimler wist alle mails in vakantie medewerkersLocation: Berlin, Germany
Date published: 15-08-2014

Het Duitse automerk Daimler heeft een onorthodoxe oplossing voor e-mailstress na de vakantie: alle mails worden gewoon verwijderd. De 100.000 werknemers kunnen hun e-mail in de vakantie stand zetten. Wie hen mailt krijgt de mededeling dat de ze vrij zijn en dat de mail daarom wordt verwijderd.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: e-mail(1),Germany(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Chrome gaat misleidende software blokkerenLocation: Google HQ - Mountain View, United States
Date published: 15-08-2014

Google heeft aanpassingen aan de Safe Browsing service doorgevoerd waardoor Google Chrome vanaf volgende week naast malware ook misleidende software gaat blokkeren. Op dit moment worden Chrome-gebruikers al 3 miljoen keer per voor kwaadaardige downloads gewaarschuwd.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Chrome(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers luisteren gesprek af via gyroscoop smartphoneLocation: Google HQ - Mountain View, United States
Date published: 15-08-2014

Onderzoekers van de Amerikaanse Stanford University en het Isralische National Research & Simulation Center zijn erin geslaagd om gesprekken via de gyroscoop van een smartphone deels af te luisteren. Een gyroscoop is een bewegingsmeter die de bewegingen en positie van de telefoon meet. De gyroscop... Read more

Source: www.security.nl

Top found tags: research(2),United States(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Diverse kwetsbaarheden verholpen in Kerberos 5Location: Ubuntu - London, United Kingdom
Date published: 15-08-2014

Samenvatting: MIT heeft diverse updates uitgebracht om verschillende kwetsbaarheden in Kerberos 5 te verhelpen. Zie paragraaf "Mogelijke oplossingen" voor meer informatie. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: - C... Read more

Source: www.ncsc.nl

Top found tags: Fedora(2),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in Apache SubversionLocation: Ubuntu - London, United Kingdom
Date published: 15-08-2014

Samenvatting: Apache heeft verschillende kwetsbaarheden verholpen in Subversion. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende toegang verkrijgen tot gevoelige gegevens. Beschrijving: - CVE-2014-3522: Door het onvoldoende valideren van SSL certificaten kan een kwaadwillende ... Read more

Source: www.ncsc.nl

Top found tags: SSL(2),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish