Under construction

New design coming soon!

CIC News engine statistics

CIC News for 19-08-2014 contains 84 articles: cybercrime(25),cyber security(23),data breach(9),other(27)

CIC News update contains 64 English and 20 Dutch articles for today.
There are 6 published advisories, 0 are English and 6 are Dutch.
In today's English news articles:
- 16 related to cybercrime
- 21 related to cyber security
- 9 related to data breach and identity theft
- 18 for the category other news

In today's Dutch news articles:
- 9 related to cybercrime
- 2 related to cyber security
- 9 for the category other news

Have fun reading.

English cybercrime related news

Microsoft Yet to Deliver Fix for Faulty Patch Tuesday UpdateLocation: Microsoft HQ - Redmond, United States
Date published: 18-08-2014

Microsoft is still hammering away at a fix for a security update released last week that caused a small number of computers to crash and blue screen. We are aware of some issues related to the recent updates and we are working on a fix, a Microsoft representative today told Threatpost. MS14-04... Read more

Source: threatpost.com

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attackers leverage Ebola virus fear to spread malwareLocation: New York, United States
Date published: 18-08-2014

Cyber criminals are exploiting the Ebola virus' recent notoriety to bait and infect victims with malware via phishing campaigns. The new attacks are leveraging interest around the virus and possible cures to gather victims' email account logins and install trojans that can log keystrokes and record ... Read more

Source: www.scmagazine.com

Top found tags: social media(2),trojan(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Community Health Systems breach may impact more than four million patientsLocation: Whiteside, United States
Date published: 18-08-2014

Texas health system attacked, data on more than 400K compromised The attackers were said to be Chinese and used malware that has since been removed, according to an Associated Press report. The personal information of more than four million patients may be at risk after an attacker hacked into the c... Read more

Source: www.scmagazine.com

Top found tags: health sector(4),medical sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Four-Year Old Flaw Exploited by Stuxnet Still TargetedLocation: Kaspersky HQ - Moscow, Russia
Date published: 19-08-2014

It was 2010 when the Stuxnet malware first appeared in the public consciousness. Though the years have passed however, there is no shortage of machines still vulnerable to attacks on one of the vulnerabilities the malware exploited as it trotted across the globe. According to a paper released by Kas... Read more

Source: securityweek.com

Top found tags: malware(3),vulnerability(3),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Albertsons, SuperValu Latest Stores to Fall to Point of Sale HackLocation: Target HQ - Minneapolis, United States
Date published: 19-08-2014

Hackers have compromised the credit and debit card payment networks of Albertsons and SuperValu, two of the nations most popular supermarket store chains. It appears the breachcaused by malicious software installed onto the companys point-of-sale network by hackerstook place in late J... Read more

Source: blogs.mcafee.com

Top found tags: United States(2),financial sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nuclear regulator hacked 3 times in 3 yearsLocation: New York, United States
Date published: 19-08-2014

Unspecified foreigners and a third unknown person or group are to blame for three computer hacks over the past three years at the US Nuclear Regulatory Commission, according to a new report. The body that governs America's nuclear power providers said in an internal investigation that two of the hac... Read more

Source: cnet.com.ortal.com

Top found tags: report(1),government(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nuke regulator hacked three times in three yearsLocation: Microsoft HQ - Redmond, United States
Date published: 19-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines The US Nuclear Regulator Commission (NRC) has been hacked three times in as many years, according to documents obtained under freedom of information requests. Unnamed foreign hackers sent hundreds of phishing emails - targeting 215 staff in ... Read more

Source: go.theregister.com

Top found tags: website(1),Black Hat(2),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The future of cybercrimeLocation: Google HQ - Mountain View, United States
Date published: 19-08-2014

'IT security experts will have to contend with more diverse threats than ever before' A constant battle of cat and mouse between vendors, their customers and the attackers, the sheer rate of change in the security industry means that predicting the future is difficult. On the other hand, it is possi... Read more

Source: www.information-age.com

Top found tags: government(2),telecom sector(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to Save the Net: Break Up the NSALocation: National Security Agency - Fort Meade, United States
Date published: 19-08-2014

By treating the Internet as a giant surveillance platform, the NSA has betrayed the Internet and the world. It has subverted the products, protocols, and standards that we use to protect ourselves. It has left us all vulnerableto foreign governments, to cybercriminals, to hackers. And it has tran... Read more

Source: wired.com

Top found tags: Bruce Schneier(4),cybercrime(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How To Save The NetLocation: National Security Agency - Fort Meade, United States
Date published: 19-08-2014

[savethenet] Its impossible to overstate how much the Internet matters. It has forever altered how we share information and store it for safekeeping, how we communicate with political leaders, how we document atrocities and hold wrongdoers accountable, how we consume entertainment and create it, ... Read more

Source: wired.com

Top found tags: government(3),Bruce Schneier(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"TorrentLocker" Malware Combines Elements From CryptoLocker, CryptoWallLocation: New York, United States
Date published: 19-08-2014

A new piece of ransomware analyzed by researchers from iSIGHT Partners uses visual components borrowed from CryptoLocker and CryptoWall. Dubbed TorrentLocker, the malware is not different from other file encryptors. Once it infects a computer, it encrypts the victim's most valuable files using the R... Read more

Source: securityweek.com

Top found tags: financial sector(2),malware(3),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UK Ministry of Defence launches 2 million cyber defence competitionLocation: Woodward, United States
Date published: 19-08-2014

The British government has kicked-off a 2 million contest to find new ways to protect the Ministry of Defence (MoD) computer systems from cyber-attacks using automated threat response. UK Ministry of Defence launches 2 million cyber defence competition UK Ministry of Defence launches 2 million... Read more

Source: www.scmagazineuk.com

Top found tags: Europe(2),United Kingdom(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New TorrentLocker ransomware trades on fear of CryptoLockerLocation: Cass, United States
Date published: 19-08-2014

A new breed of ransomware called TorrentLocker that mimics more feared versions like CryptoLocker and CryptoWall has been discovered targeting users in Australia. CryptoLocker victims can recover encrypted files CryptoLocker victims can recover encrypted files US cyber threat intelligence firm iS... Read more

Source: www.scmagazineuk.com

Top found tags: financial sector(4),malware(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nuclear Regulatory Commission's computers hacked three times in three yearsLocation: New York, United States
Date published: 19-08-2014

Nuclear Regulatory Commission (NRC) computers were hacked twice by foreigners and once by an unidentifiable individual in the last three years, according to a recently obtained inspector general report. The commission, which handles licensing, inspection and enforcement of nuclear requirements, migh... Read more

Source: www.scmagazine.com

Top found tags: cybercrime(2),malware(2),phishing(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Pro-Syrian Malware Increasing in Number, ComplexityLocation: Damascus, Damascus Governorate, Syria
Date published: 18-08-2014

As the civil war in Syria continues, malware targeting those who oppose the embattled regime of Bashar al Assad is increasing in number, organization and sophistication according to a new report from Kaspersky Labs Global Research and Analysis Team. Most of the malware samples related to the Syri... Read more

Source: threatpost.com

Top found tags: cybercrime(5),cyber security(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Symantec to slim Norton line to single security suiteLocation: Norton, United States
Date published: 18-08-2014

complicated Norton line of security suites into one. Symantec For the first time since 1991, there won't be a new version of Norton Antivirus on the shelves this fall. Symantec will rebrand its consumer security suites next month by eliminating several similarly named products. The new Norton Securi... Read more

Source: cnet.com.ortal.com

Top found tags: cybercrime(3),antivirus(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Senator questions airlines' data privacy practicesLocation: Rock, United States
Date published: 18-08-2014

A senior U.S. senator is asking airlines about their data privacy practices, saying hes concerned about what information the companies are collecting and sharing with third parties. Some consumer advocates have raised concerns that airline privacy policies can contain substantial caveats and t... Read more

Source: www.pcworld.com

Top found tags: security measures(2),United States(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New powers could give ASIO a warrant for the entire internetLocation: Williams, United States
Date published: 19-08-2014

and third-party computers and networks is so broad that it could in effect give ASIO access to every computer on the internet, according to legal experts. Attorney-General George Brandis introduced legislation into the parliament last month that would expand the powers of ASIO, and its ability to ac... Read more

Source: www.zdnet.com

Top found tags: cyber security(2),government(2),legislation(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Linux kernel devs made to finger their dongles before contributing codeLocation: Kern, United States
Date published: 18-08-2014

Implementing global e-invoicing with guaranteed legal certainty Beginning on Monday, the security of the Linux kernel source code has become a little bit tighter with the addition of two-factor authentication for the kernel's Git code repositories. Contributing code changes to the Linux kernel sourc... Read more

Source: go.theregister.com

Top found tags: cyber security(2),United States(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSW to build federated ID management rig for staff, puntersLocation: Oracle - Redwood City, United States
Date published: 19-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines The Australian State of New South Wales (NSW) will build a federated identity system or Identity Hub - for its many thousands of staff and also for the State's citizens. Oracle, NTT and consultancies Qubit and Dataweave and will wo... Read more

Source: go.theregister.com

Top found tags: Australia(2),government(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NSW government appoints consortium for 'identity hub'Location: Norman, United States
Date published: 19-08-2014

responsible for deploying a new identity management solution. The "identity hub" will be delivered via a software-as-a-service architecture to remove the complexities associated with user account administration and password management for NSW government agencies. It will manage the end-to-end lifecy... Read more

Source: www.zdnet.com

Top found tags: password(1),government(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Linux kernel source code repositories get better securityLocation: RSA HQ - Bedford, United States
Date published: 19-08-2014

most important site. While no damage was done, it was still worrisome. So, at the Linux Kernel Summit, the Linux Foundation announced that it was securing Linux's Git source code repositories with two-factor authentication. yubicoSome Linux kernel developers will be using YubiKeys to secure their lo... Read more

Source: www.zdnet.com

Top found tags: government(3),social media(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ferguson: Another case for public security camerasLocation: Fergus, United States
Date published: 19-08-2014

Much of what passes for privacy concern strikes me as overwrought reaction to minor problems, and completely dismissive of the other side of the story. There's no better example than public security cameras and police-officer body-mounted cameras. The disturbances in Ferguson, MO are a great example... Read more

Source: www.zdnet.com

Top found tags: airport sector(2),cyber security(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
This Android Shield Could Encrypt Apps So Invisibly You Forget Its ThereLocation: Georgia Institute of Technology - Atlanta, United States
Date published: 19-08-2014

overlay An illustration of Georgia Techs Mimesis Aegis encryption software. [gallery-il] Georgia Tech In the post-Snowden era, everyone wants to make encryption easier. Now, one group of researchers has created a tool intended to make it invisible. A team from Georgia Tech has designed software t... Read more

Source: wired.com

Top found tags: social media(2),update(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oberthur Technologies Acquiring Smart Card Maker NagraIDLocation: New York, United States
Date published: 19-08-2014

France-based digital security solutions provider Oberthur Technologies announced on Tuesday that it would acquire smart card maker NagraID Security SA for an undisclosed sum. Based in Cheseaux, Switzerland, NagraID is a subsidiary of the Kudelski Group and produces multi-component and other smart ca... Read more

Source: securityweek.com

Top found tags: password(1),cyber security(2),ISP(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook Flaw Enabled Users to Launch Powerful DDoS AttacksLocation: Facebook - Menlo Park, United States
Date published: 19-08-2014

Facebook Patched Flaw That Could Be Exploited for DDoS Attacks Facebook has fixed a vulnerability that could have been leveraged to amplify distributed denial-of-service (DDoS) attacks by using the company's own datacenters. The issue was introduced in May when Facebook started allowing administrato... Read more

Source: securityweek.com

Top found tags: social media(2),cyber security(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
APT Gang Branches Out to Medical Espionage in Community Health BreachLocation: Beijing, China
Date published: 19-08-2014

seems to be an anomaly. State-sponsored attackers generally target intellectual property for the purposes of military or economic gain; stealing healthcare credentials and personal patient records seems incongruous. But experts say the breach is a perfect storm of poorly secured health systems, desp... Read more

Source: threatpost.com

Top found tags: cyber security(6),health sector(6),medical sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What You Think You Know About SaaS Security Is WrongLocation: Wall Street, New York City, New York, United States
Date published: 19-08-2014

Over the last year or so, the Cloud Access Security Broker market, as defined by Gartner, has exploded (451 Research calls it the Cloud Application Control market). Cloud Access Security Brokers sit between users and cloud service providers to interject enterprise security policies as cl... Read more

Source: securityweek.com

Top found tags: ISP(1),research(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Symantec Consolidates Nine Norton Products Into OneLocation: Norton, United States
Date published: 19-08-2014

Symantec Streamlines Norton Portfolio With Introduction of Norton Security Symantec announced on Monday its intention to replace its nine Norton products with one flagship solution: Norton Security. According to the company, stand-alone legacy products like Norton Internet Security, Norton AntiVirus... Read more

Source: securityweek.com

Top found tags: cyber security(2),social engineering(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dropbox pushes more security controls to all Business customersLocation: Dropbox - San Francisco, United States
Date published: 19-08-2014

Dropbox is cutting down some of the velvet ropes around some of the privacy and security features previously only available for select beta testers. The cloud storage provider is extending view-only permissions for shared folders, passwords for shared links, and expirations for shared links to all D... Read more

Source: www.zdnet.com

Top found tags: mobile device(2),telecom sector(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Linux Foundation Protects Kernel Git Repositories With 2FALocation: Kern, United States
Date published: 19-08-2014

The Linux Foundation announced on Monday that it has added a two-factor authentication (2FA) mechanism to the source code repositories housing the Linux kernel in an effort to improve access security for developers. Up until now, kernel developers have been provided with their own SSH private keys w... Read more

Source: securityweek.com

Top found tags: USB (1),cyber security(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Systems at Nuclear Regulatory Commission Hacked Multiple Times: ReportLocation: New York, United States
Date published: 19-08-2014

The computers of the United States Nuclear Regulatory Commission (NRC), the organization responsible for protecting public health and safety related to nuclear energy, have been targeted by malicious actors on several occasions over the past three years, a report shows. Information on the attacks, o... Read more

Source: securityweek.com

Top found tags: cybercrime(4),United States(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Privacy rights group files complaint over Adobe, AOL Safe Harbor complianceLocation: New York, United States
Date published: 19-08-2014

Privacy rights group files complaint over Adobe, AOL Safe Harbor compliance The Center for Digital Democracy has asked the FTC to investigate 30 U.S. firms' data collection practices, including Adobe, AOL and Datalogix. The Federal Trade Commission (FTC) has been tapped to investigate 30 U.S. compan... Read more

Source: www.scmagazine.com

Top found tags: Department of Commerce(3),government(3),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Symantec rolls Norton solutions into single suiteLocation: Norton, United States
Date published: 19-08-2014

In a move aimed to keep up with the evolution of connected devices, Symantec has announced that its Norton security software will be rolled into one suite. The new line, called Norton Security, is scheduled to go on sale on September 23 and will be available for a $80 a year subscription, according ... Read more

Source: www.scmagazine.com

Top found tags: antivirus(2),cyber security(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New website calls out sites, apps, lacking securityLocation: Webster, United States
Date published: 19-08-2014

A new website created by a security consultant aims to embarass apps and web services that put user information at risk in hopes of having them migrate to HTTPs. Tony Webster's site, HTTP Shaming, is intended to call out websites and apps like MeetUp and Amtrak that use unencrypted communica... Read more

Source: www.scmagazine.com

Top found tags: cyber security(2),social media(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

The Sweet Sixteen RuleLocation: McAfee - Santa Clara, United States
Date published: 18-08-2014

Your child is turning 16! As a parent in the US, your mind is occupied with planning the big sweet 16 party and preparing for a new driver on the road (and the crazy high insurance that goes with it). During this exciting time, theres something else you should be thinking aboutyour childs c... Read more

Source: blogs.mcafee.com

Top found tags: medical sector(2),social media(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese crims snatch 4.5 MILLION patient files from US hospitalsLocation: Beijing, China
Date published: 18-08-2014

One of the largest healthcare providers in the US has said Chinese hackers ran riot through its systems between April and June this year accessing names, addresses and social security numbers of millions of patients. But Community Health Systems (CHS) claims no medical records nor any financial ... Read more

Source: go.theregister.com

Top found tags: cyber security(6),health sector(6),medical sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hack of hospital chain leads to theft of up to 4.5M users' dataLocation: Beijing, China
Date published: 19-08-2014

hospitals in 29 states. Community Health Systems One of the biggest hospital groups in the US revealed Monday that it suffered a monumental security breach, which possibly led to 4.5 million patients' data being stolen, according to Reuters. Community Health Systems, which oversees 206 hospitals in ... Read more

Source: cnet.com.ortal.com

Top found tags: government(4),telecom sector(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: 23% of consumers save banking details on multiple mobile devices to leave hackers salivatingLocation: PayPal HQ - San Jose, United States
Date published: 19-08-2014

Report: 23% of consumers save banking details on multiple mobile devices to. leave hackers salivating Almost half of consumers are risking leaking confidential personal data and valuable banking details to hackers by remaining logged in across multiple mobile devices. Related: Google reveals top 10 ... Read more

Source: itproportal.com

Top found tags: telecom sector(2),financial sector(4),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to Save the Net: A CDC for CybercrimeLocation: National Security Agency - Fort Meade, United States
Date published: 19-08-2014

The Internet may be made up of software and hardware, but it is an ecosystem that depends on a key human value: trust. The networks and systems must be able to trust the information we are sending, and in turn we have to be able to trust the information we receive. This system of trust has allowed b... Read more

Source: wired.com

Top found tags: cyber security(4),government(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese Hackers Breach Community Health Systems, 4.5 Million AffectedLocation: Department of Homeland Security - Washington, United States
Date published: 19-08-2014

Tennessee-based Community Health Systems, which runs 206 affiliated hospitals in 29 U.S. states, yesterday stated in an SEC filing that its computer network "was the target of an external, criminal cyber attack" that took place in April and June of 2014. While security company Mandiant believes the ... Read more

Source: www.esecurityplanet.com

Top found tags: medical sector(4),telecom sector(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Another breach involving Onsite Health Diagnostics, Kansas City hospital impactedLocation: Kansas, United States
Date published: 19-08-2014

Children's Mercy Hospital in Kansas City is notifying 4,076 individuals that Onsite Health Diagnostics, a vendor used by wellness program provider StayWell Health Management, experienced a breach that affected their personal information. How many victims? 4,076. What type of personal information? Na... Read more

Source: www.scmagazine.com

Top found tags: data breach(2),identity theft(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers steal records on 4.5 million patients from healthcare systemLocation: Beijing, China
Date published: 19-08-2014

A healthcare system spanning 29 states announced on Monday that cybercriminals operating from China stole information on approximately 4.5 million patients, including names, birth dates, and Social Security numbers. Community Health Systems, which comprises 206 facilities in the southern and western... Read more

Source: arstechnica.com

Top found tags: medical sector(4),telecom sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

U.S. to review rates for telecom special access linesLocation: Federal Communications Commission - Washington, United States
Date published: 18-08-2014

WASHINGTON (Reuters) - U.S. telecommunications regulators will review rates at which telecommunications providers sell high-capacity data and voice connections, known as special access lines, to businesses, the Federal Communications Commission said on Monday. Many businesses rely on special-access ... Read more

Source: reuters.com

Top found tags: financial sector(4),telecom sector(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft removes Windows 8.1 Patch Tuesday update linkLocation: Microsoft HQ - Redmond, United States
Date published: 18-08-2014

Microsoft has retracted its August Windows 8.1 Patch Tuesday update after users reported crashes and problems restarting their systems. One reported bug impacted fonts and where they are installed, as well as how they are rendered, according to Microsoft. Another caused systems to crash with a 0x... Read more

Source: www.scmagazine.com

Top found tags: Microsoft(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New website aims to publicly shame apps with lax securityLocation: Webster, United States
Date published: 18-08-2014

Tony Webster, HTTP Shaming The amount of personal data traveling to and from the Internet has exploded, yet many applications and services continue to put user information at risk by not encrypting data sent over wireless networks. Software engineer Tony Webster hasa classic solutionshame. We... Read more

Source: arstechnica.com

Top found tags: social media(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor-rorists get sneaky Aphex Twin album peek in dance guru hypegasmLocation: New York Times - New York, United States
Date published: 18-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Richard James, aka electronic music composer Aphex Twin, has been using the power of Tor to hype his new album and to remind computer users about their own system's security. http://syro2eznzea2xbpi.onion Aphex Twin (@AphexTwin) Augu... Read more

Source: go.theregister.com

Top found tags: report(1),Twitter(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Think crypto hides you from spooks on Facebook? THINK AGAINLocation: Twitter - San Francisco, United States
Date published: 19-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Activists just got another reason to worry about what spooks might be able to learn about them, with boffins demonstrating that a decent traffic fingerprint can tell an attacker what's going on, even if an app is defended by encryption. The ... Read more

Source: go.theregister.com

Top found tags: e-mail(2),social media(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
e-Borders fiasco: Brits stung for 224m after US IT giant sues UK govtLocation: Home Affairs Select Committee - London, United Kingdom
Date published: 19-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Brit taxpayers face a 224m bill in cancellation fees after the UK government scrapped a 750m contract for a passenger-checking computer system for its borders. The contract for the e-Borders IT project, which is supposed to scrutinize th... Read more

Source: go.theregister.com

Top found tags: Home Affairs Select Committee(4),United Kingdom(4),government(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google to offer special accounts for kids: reportLocation: Google HQ - Mountain View, United States
Date published: 19-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Google is reportedly investigating how it can offer accounts to children. The Information reports that The Chocolate Factory is considering a regime whereby parents can set up accounts for kids and control the Google services they are permit... Read more

Source: go.theregister.com

Top found tags: Google(1),Linux(1),report(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to Save the Net: Dont Give In to Big ISPsLocation: Federal Communications Commission - Washington, United States
Date published: 19-08-2014

[ff_savenet] The next Netflix wont stand a chance if the largest Internet service providers in the US are allowed to merge. [gallery-il] The Heads Of State The Internet has already changed how we live and work, and we're only just getting started. Who'd have thought even five years ago that pe... Read more

Source: wired.com

Top found tags: government(3),Bruce Schneier(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to Save the Net: Keep It OpenLocation: Berlin, Germany
Date published: 19-08-2014

[ff_savenet] The premise of opennessthat information and data should be freely exchangeableis at risk. [gallery-il] The Heads Of State For all of its history, the Internet has enjoyed the fruits of an openness principle: the idea that anyone can reach any site online and that information and d... Read more

Source: wired.com

Top found tags: telecom sector(2),Bruce Schneier(4),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to Save the Net: Build a BackupLocation: Beijing, China
Date published: 19-08-2014

backup [gallery-il] Getty You may have had the bad luck of being stuck on a runway when a router failure in Utah grounded commercial flights around the country for several hours. Or maybe you were frustrated by not being able to access government websites the day the .gov domain administration had a... Read more

Source: wired.com

Top found tags: government(3),Bruce Schneier(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to Save the Net: Take OwnershipLocation: Union, United States
Date published: 19-08-2014

[ff_savenet] A global community of digital citizens will be more able and motivated to tackle threats. [gallery-il] The Heads Of State The Internet offers untold potential for humanity. To make the most of it, we need to think of the Internet as ours. Yes, part of it belongs to commercial enti... Read more

Source: wired.com

Top found tags: education(2),government(3),Bruce Schneier(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Imperva Names Former Coverity Chief as New CEOLocation: Redwood, United States
Date published: 19-08-2014

Redwood Shores, California-based Imperva announced on Monday that it has appointed Anthony J. Bettencourt as the companys new president and chief executive officer. Bettencourt replaces Shlomo Kramer, Imperva founder and CEO, who will continue to serve as chairman of the companys board and ser... Read more

Source: securityweek.com

Top found tags: EN(1),ISP(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Physical is the New Digital for RetailersLocation: San Francisco, United States
Date published: 19-08-2014

In a recent study conducted by Harris Interactive on how companies can encourage consumers to spend more, 66% of consumers stated they wanted improved customer service and 23% were looking for a tailored shopping experience. [Bicycle] One of the biggest challenges facing brick-and-mortar retailers o... Read more

Source: blog.fortinet.com

Top found tags: research(1),social media(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers Reveal Return-Oriented Programming Tactics for Breaking Security DefensesLocation: University of California - San Diego, United States
Date published: 19-08-2014

Two researchers from the University of California, Berkeley, released a paper introducing new attack techniques they contend break existing defenses against return-oriented programming (ROP). The researchers, Nicholas Carlini and David Wagner, are slated to present their research this week at the 23... Read more

Source: securityweek.com

Top found tags: vulnerability(1),mobile device(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
7 Creative Ways to Get Your Teen TalkingLocation: Colbert, United States
Date published: 19-08-2014

shutterstock_59635060Yeah. No. Nothing. Good. Okay. Whatever. Do you recognize that notorious bit of prose? Its the six-word vocabulary list teens have conspired to use exclusively when talking to their parents. Add a mobile phone to that equation and that six-... Read more

Source: blogs.mcafee.com

Top found tags: EN(1),MBR(1),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

'Chinese hackers stelen 4,5 miljoen patintdata Amerikaanse zorggigant'Location: Beijing, China
Date published: 19-08-2014

Chinese hackers zouden achter een cyberaanval zitten waarbij de gegevens van 4,5 miljoen patinten van Community Health Systems zijn bloot gegeven. CHS heeft 206 ziekenhuizen in de VS in zijn beheer en is aan de beurs genoteerd. Deze zomer werden de systemen van de zorgorganisatie aangevallen met e... Read more

Source: www.automatiseringgids.nl

Top found tags: report(2),cybercrime(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amerikaanse spammer krijgt 350.000 dollar boeteLocation: New York, United States
Date published: 19-08-2014

Een Amerikaanse spammer en zijn bedrijf hebben een boete van 350.000 dollar gekregen wegens het versturen van misleidende e-mails. In de berichten werd gesteld dat consumenten in overtreding waren als ze niet direct op de link in de e-mail klikten om een zorgverzekering af te sluiten. Volgens de Ame... Read more

Source: www.security.nl

Top found tags: spam(1),government(3),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor Browser gaat Firefox niet voor Chrome inruilenLocation: Mozilla - Mountain View, United States
Date published: 19-08-2014

Het Tor Project is niet van plan om Mozilla Firefox als basis voor Tor Browser door Google Chrome te vervangen, ook al wordt dat wel door een beveiligingsbedrijf aangeraden. Tor Browser bestaat uit Firefox en software om verbinding met het Tor-netwerk te maken. Via het Tor-netwerk kunnen gebruikers ... Read more

Source: www.security.nl

Top found tags: OS X(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Virusscanners laten bijna kwart malware doorLocation: Amsterdam, The Netherlands
Date published: 19-08-2014

In het tweede kwartaal van dit jaar hebben virusscanners bijna een kwart van de malware doorgelaten, zo blijkt uit onderzoek van het Nederlandse beveiligingsbedrijf RedSocks. Het bedrijf verzamelde 21 miljoen malware-exemplaren, die vervolgens werden geanalyseerd.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: threat(1),trend(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Toezichthouder kernindustrie VS zeker twee keer gehacktLocation: Google HQ - Mountain View, United States
Date published: 19-08-2014

Hackers hebben de afgelopen 3 jaar minstens 2 keer ingebroken in computers van de US Nuclear Regulatory Commission. Hoe ver de aanvallers darbij zijn gekomen, is niet duidelijk. De aanvallen zijn gemeld in rapporten van de Inspector Generals Cyber Crime Unit, zo meldt NextGov. De Nuclear Regulato... Read more

Source: www.automatiseringgids.nl

Top found tags: report(1),United States(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Personeel nucleaire waakhond VS slachtoffer phishingLocation: Person, United States
Date published: 19-08-2014

Personeel van de Nuclear Regulatory Commission (NRC), de Amerikaanse overheidsinstantie die de veiligheid in de kerncentrales moet controleren, is de afgelopen 3 jaar het doelwit van phishing- en spear phishingaanvallen geworden, waarbij werknemers kwaadaardige bijlagen en links openden. Bij n i... Read more

Source: www.security.nl

Top found tags: phishing(2),government(3),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers ontwikkelen betere CAPTCHA-variantLocation: Amsterdam, The Netherlands
Date published: 19-08-2014

Veel mensen hebben een hekel aan het oplossen van de CAPTCHA-puzzels die bij het aanmaken van online accounts of het plaatsen van berichten op websites moeten worden ingevuld, maar onderzoekers hebben mogelijk een oplossing gevonden die de CAPTCHA een stuk aantrekkelijker moet maken. CAPTCHA's worde... Read more

Source: www.security.nl

Top found tags: information security(2),security measures(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Beveiligingslekken plagen Trojaans paard voor AndroidLocation: Google HQ - Mountain View, United States
Date published: 19-08-2014

Afgelopen vrijdag is de volledige broncode van een Trojaans voor Android op internet gelekt, alsmede de code voor het beheerderspaneel, waardoor experts die konden analyseren en tal van beveiligingslekken ontdekten. Het gaat om de Dendroid Trojan, waar normaal zo'n 300 dollar voor wordt gevraagd. De... Read more

Source: www.security.nl

Top found tags: trojan(2),malware(3),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Symantec mindert vooraf genstalleerde anti-virus op pc'sLocation: Norton, United States
Date published: 19-08-2014

Symantec zal volgende maand een nieuwe abonnementsdienst lanceren die negen andere producten gaat vervangen en wat tevens de aanleiding is om voortaan minder anti-virussoftware op nieuwe computers te laten installeren. Het gaat hierbij om software die een aantal maanden kan worden gebruikt. Na de pr... Read more

Source: www.security.nl

Top found tags: cyber security(2),OS X(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Website maakt onversleutelde apps en sites te schandeLocation: Webster, United States
Date published: 19-08-2014

Een programmeur die dit weekend tijdens de herinstallatie van Mac OS X schrok van het grote aantal apps dat onversleuteld verbinding over het internet maakt is een nieuwe website gestart waarbij hij allerlei apps en websites die HTTP gebruiken te schande maakt. Software-ingenieur en zelfverklaarde "... Read more

Source: www.security.nl

Top found tags: information security(2),OS X(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Apple slaat Chinese gebruikersgegevens op in ChinaLocation: Beijing, China
Date published: 19-08-2014

Apple is voor de eerste keer begonnen om gegevens van Chinese Apple-gebruikers ook in China op te slaan, waarmee het recente zorgen over de privacy wil wegnemen. De data zullen worden opgeslagen op servers van China Telecom, zo meldt de Wall Street Journal. "Apple neemt de veiligheid en privacy van ... Read more

Source: www.security.nl

Top found tags: cyber security(2),government(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Google-diensten krijgen toezicht voor kinderenLocation: Google HQ - Mountain View, United States
Date published: 18-08-2014

Google zou het voor ouders makkelijker willen maken om hun kinderen onder de dertien jaar verschillende Google-diensten te laten gebruiken. De kindvriendelijke diensten zouden onder andere voorzien worden van een dashboard waarmee ouders inzicht krijgen in activiteiten.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: Google(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
App dwingt kinderen hun ouders te bellenLocation: Amsterdam, The Netherlands
Date published: 18-08-2014

Kinderen die hun telefoontjes of tekstberichten negeren, zijn een grote bron van ergernis voor veel ouders. Een innovatieve moeder bedacht een app om dit probleem te verhelpen. Het lijkt tiener-eigen om telefoontjes van hun ouders te negeren, zeker in het bijzijn van vrienden. Sharon Standifird besl... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),smartphone(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chip in bepaalde Android-tablets bevat security-bugLocation: Rock, United States
Date published: 19-08-2014

Bepaalde Android-tablets die een chip van fabrikant Rockchip gebruiken bevatten een bug waardoor een aanvaller die fysieke toegang heeft informatie uit het geheugen kan lezen, zoals wachtwoorden en wifi-sleutels. Dat ontdekte onderzoeker Ken Munro van beveiligingsbedrijf Pen Test Partners. Het probl... Read more

Source: www.security.nl

Top found tags: vulnerability(1),website(1),wireless(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gegevens 4,5 miljoen patinten in VS gestolenLocation: Amsterdam, The Netherlands
Date published: 19-08-2014

Aanvallers hebben in de VS de gegevens van 4,5 miljoen patinten gestolen, zo heeft de organisatie die de gegevens had opgeslagen laten weten. Community Health Systems, dat 206 ziekenhuizen beheert, kondigde gisteren aan dat aanvallers onlangs toegang tot het netwerk hebben gehad. Daarbij werden pa... Read more

Source: www.security.nl

Top found tags: research(1),government(3),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Britse vrouw verliest 17.000 euro door datingscamLocation: London,United Kingdom
Date published: 19-08-2014

Een Britse vrouw is zo'n 17.000 euro verloren door een datingscam waarbij ze dacht een VN-dokter in Syri te daten. De 56-jarige vrouw, die anoniem wil blijven, ontmoette de man op een online datingsite. In maart van dit jaar vertelde hij de vrouw dat hij een pakket van een Syrische sjeik naar haar... Read more

Source: www.security.nl

Top found tags: police(1),scam(1),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Valse Bitcoin-website probeert adverteerder op te lichtenLocation: Amsterdam, The Netherlands
Date published: 19-08-2014

Regelmatig verschijnen er berichten over valse en nagemaakte sites die mensen proberen op te lichten, maar een recent nagemaakte Bitcoin-website had het op adverteerders voorzien. Criminelen hadden de website cryptocoinznews.com geregistreerd, een verkeerde gespelde versie van cryptocoinsnews.com. D... Read more

Source: www.security.nl

Top found tags: scam(1),website(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
WikiLeaks' Assange sets sights on leaving embassy: Now what?Location: Stockholm, Sweden
Date published: 19-08-2014

Locked inside a small apartment in central London, the only reason Julian Assange has avoided arrest is that his dimly lit ground-floor bedroom also happens to be de facto Ecuadorian soil. Marking almost exactly two years after the WikiLeaks founder gave a similar soundbite-laden speech on the balco... Read more

Source: www.zdnet.com

Top found tags: Supreme Court(2),United Kingdom(4),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Snowden-onthullingen leiden tot meer spionageLocation: Amsterdam, The Netherlands
Date published: 19-08-2014

De onthullingen op basis van documenten van klokkenluider Edward Snowden leiden juist tot meer spionage. Andere landen kunnen massaspionage nu verdedigen door naar de NSA te wijzen, zegt Bob de Graaff, hoogleraar Intelligence en security studies.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NSA (1),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Politie haalt 15 tot 20 valse webwinkels per maand offlineLocation: Amsterdam, The Netherlands
Date published: 19-08-2014

Valse webwinkels zijn nauwelijks van echt te onderscheiden en zijn voornamelijk gericht om malware te verspreiden. Per maand worden er door de nationale politie vijftien tot twintig valse webwinkels van het web gehaald. Dit jaar zijn er al 124 meldingen binnengekomen over frauduleuze webwinkels.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: government(1),NL(1),police(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Ernstige kwetsbaarheid in Samba verholpenLocation: Ubuntu - London, United Kingdom
Date published: 19-08-2014

Samenvatting: Een is een ernstige kwetsbaarheid in Samba verholpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om willekeurige code uit te voeren onder root rechten. Beschrijving: Een kwaadwillende kan via het netwerk packets sturen naar de NetBIOS name services daemon (nmb... Read more

Source: www.ncsc.nl

Top found tags: Red Hat(2),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in QEMU verholpenLocation: Amsterdam, The Netherlands
Date published: 19-08-2014

Samenvatting: Er zijn meerdere kwetsbaarheden verholpen in QEMU. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende een Denial-of-Service uitvoeren en mogelijk code uitvoeren op het host systeem met rechten van de gebruiker waaronder het QEMU proces draait. Beschrijving: Er bevin... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Fedora(2),Red Hat(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in Ruby on Rails: ActiveRecordLocation: Amsterdam, The Netherlands
Date published: 19-08-2014

Samenvatting: Er is een kwetsbaarheid verholpen in Ruby on Rails. Gevolgen: Door deze kwetsbaarheid te misbruiken kan een kwaadwillende gegevens manipuleren. Beschrijving: Er is een kwetsbaarheid gevonden in de create_with functie binnen de ActiveRecord gem van Ruby on Rails. Door deze kwetsbaarheid... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Ruby(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden verholpen in Network Security Services (NSS)Location: Amsterdam, The Netherlands
Date published: 19-08-2014

Samenvatting: Voor meerdere Linux distributies zijn updates uitgebracht die diverse kwetsbaarheden verhelpen in de Network Security Services (NSS). Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om de applicatie te laten crashen of om willekeurige code uit te voeren onder de re... Read more

Source: www.ncsc.nl

Top found tags: information security(2),Red Hat(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden verholpen in PHP 5.3Location: Hewlett-Packard - Palo Alto, United States
Date published: 19-08-2014

Samenvatting: De makers van PHP hebben updates uitgebracht voor PHP 5.3 waarin diverse kwetsbaarheden verholpen worden. Dit is de laatste update voor PHP 5.3, aangezien deze versie van PHP end of life is. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om willekeurige code uit t... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Adobe verhelpt kwetsbaarheden in Adobe Flash PlayerLocation: Adobe HQ - San Jose, United States
Date published: 19-08-2014

Samenvatting: Adobe heeft meerdere kwetsbaarheden verholpen in Flash Player. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende willekeurige code uitvoeren en beveiligingsmaatregelen omzeilen. Beschrijving: - CVE-2014-0540, CVE-2014-0542, CVE-2014-0543, CVE-2014-0544, CVE-2014-05... Read more

Source: www.ncsc.nl

Top found tags: telecom sector(2),vulnerability(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish