Under construction

New design coming soon!

CIC News engine statistics

CIC News for 20-08-2014 contains 88 articles: cybercrime(22),cyber security(34),data breach(10),other(22)

CIC News update contains 67 English and 21 Dutch articles for today.
There are 7 published advisories, 0 are English and 7 are Dutch.
In today's English news articles:
- 13 related to cybercrime
- 32 related to cyber security
- 10 related to data breach and identity theft
- 12 for the category other news

In today's Dutch news articles:
- 9 related to cybercrime
- 2 related to cyber security
- 10 for the category other news

Have fun reading.

English cybercrime related news

Malware married to software in undetectable attackLocation: Berlin, Germany
Date published: 20-08-2014

Implementing global e-invoicing with guaranteed legal certainty Be thankful it's only a proof-of-concept of a hack: German researchers have shown that Internet software distribution mechanisms can be turned into virus vectors, without modifying the original code. The Ruhr University boffins Feli... Read more

Source: go.theregister.com

Top found tags: SMS(1),cybercrime(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New ZeroLocker crypto-ransomware offers discount for paying up quickly - or $1,000 in BitcoinLocation: Kaspersky HQ - Moscow, Russia
Date published: 20-08-2014

The recent arrests of criminals behind the GameOver Zeus botnet may have disrupted the CryptoLocker ransomware earlier this year, but it's left an endless stream of copycats in its wake. Researchers this week identified yet another piece of crypto-ransomware for Windows machines called ZeroLocker. L... Read more

Source: www.zdnet.com

Top found tags: malware(3),financial sector(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware Developers Port Linux DDoS Trojan to WindowsLocation: Microsoft HQ - Redmond, United States
Date published: 20-08-2014

Researchers at Russia-based security company Doctor Web have noticed that a piece of malware designed to run on Linux computers has been ported by its creators to Windows. In May, Doctor Web uncovered several Linux Trojan variants that appeared to have been created by the same individual or group lo... Read more

Source: securityweek.com

Top found tags: United States(2),malware(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Should you use cyber insurance to mitigate risk?Location: Brussels,Belgium
Date published: 20-08-2014

While still a relatively immature industry, cyber insurance can reduce the costs of recovering from a breach, and, as Tony Morbin reports, it can also play a role in driving adoption of best practice, including de-facto standards in critical infrastructure. Should you use cyber insurance to mitigate... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New ZeroLocker crypto-ransomware offers discount for paying up quickly - or $1,000 in BitcoinLocation: Kaspersky HQ - Moscow, Russia
Date published: 20-08-2014

The recent arrests of criminals behind the GameOver Zeus botnet may have disrupted the CryptoLocker ransomware earlier this year, but it's left an endless stream of copycats in its wake. Researchers this week identified yet another piece of crypto-ransomware for Windows machines called ZeroLocker. L... Read more

Source: www.zdnet.com

Top found tags: malware(3),financial sector(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware Developers Port Linux DDoS Trojan to WindowsLocation: Microsoft HQ - Redmond, United States
Date published: 20-08-2014

Researchers at Russia-based security company Doctor Web have noticed that a piece of malware designed to run on Linux computers has been ported by its creators to Windows. In May, Doctor Web uncovered several Linux Trojan variants that appeared to have been created by the same individual or group lo... Read more

Source: securityweek.com

Top found tags: United States(2),malware(3),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nuclear Regulatory Commission Hacked Three TimesLocation: New York, United States
Date published: 20-08-2014

Nextgov reports that computers at the Nuclear Regulatory Commssion (NRC) were successfully breached twice by foreigners and once by unidentified attackers, all within the past three years. The news was contained in an Inspector General report that Nextgov obtained through an open records request. On... Read more

Source: www.esecurityplanet.com

Top found tags: social engineering(2),United States(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Should you use cyber insurance to mitigate risk?Location: Brussels,Belgium
Date published: 20-08-2014

While still a relatively immature industry, cyber insurance can reduce the costs of recovering from a breach, and, as Tony Morbin reports, it can also play a role in driving adoption of best practice, including de-facto standards in critical infrastructure. Should you use cyber insurance to mitigate... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Machete' Cyber Espionage Attacks Target Spanish-Speaking CountriesLocation: Kaspersky HQ - Moscow, Russia
Date published: 20-08-2014

Researchers have identified a cyber-espionage campaign focused on Spanish-speaking countries. Researchers at Kaspersky Lab have dubbed the attack 'Machete.' It is believed the attack campaign started in 2010 and was renewed in 2012 with an improved infrastructure. "Some time ago, a Kaspersky Lab cus... Read more

Source: securityweek.com

Top found tags: cyber espionage(4),Kaspersky Lab(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Targeted spear phishing campaign targets governments, law enforcementLocation: Kaspersky HQ - Moscow, Russia
Date published: 20-08-2014

Kaspersky Lab claims to have identified a highly targeted spear phishing campaign that picks on high profile victims - including government, military, law enforcement agencies and embassies. Targeted spear phishing campaign targets governments, law enforcement Targeted spear phishing campaign target... Read more

Source: www.scmagazineuk.com

Top found tags: Kaspersky Lab(4),telecom sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malaysian investigators 'hacked' for confidential MH370 recordsLocation: Beijing, China
Date published: 20-08-2014

Around 30 computers at Malaysian law enforcement agencies looking into the disappearance of the MH370 airplane have reportedly been hacked, with perpetrators making off with confidential data on the aircraft. Malaysian investigators 'hacked' for confidential MH370 records Malaysian investigators 'ha... Read more

Source: www.scmagazineuk.com

Top found tags: phishing(2),telecom sector(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI begins investigation into 1.2 billion stolen credentialsLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 20-08-2014

The U.S. Federal Bureau of Investigation (FBI) has begun looking into the 1.2 billion stolen logins that were discovered earlier this month. Hold Security, a Wisconsin-based security firm, uncovered the massive credentials cache through months of research. The Russian group, CyberVor allegedly... Read more

Source: www.scmagazine.com

Top found tags: FBI(2),government(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CryptoLocker copycat, TorrentLocker, discovered by researchersLocation: Sydney, Australia
Date published: 20-08-2014

Yet another clone of the nefarious ransomware CryptoLocker has been detected by security experts. Researchers at iSIGHT Partners have discovered a new strain of ransomware they've dubbed TorrentLocker, that borrows some components from other ransomware, like CryptoLocker and CryptoWall, but is... Read more

Source: www.scmagazine.com

Top found tags: spam(1),financial sector(2),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

U.S. government's nuclear watchdog victim of cyber attacks: reportLocation: Department of Homeland Security - Washington, United States
Date published: 19-08-2014

BOSTON (Reuters) - The U.S. Nuclear Regulatory Commission was "successfully hacked" three times in recent years in attacks involving tainted emails, according to an internal investigation on cyber attacks at the agency, Nextgov.com reported on Tuesday. At least two of the attacks originated overseas... Read more

Source: reuters.com

Top found tags: government(5),cybercrime(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Anonymous' hackers plead guilty to minor charge in U.S. for cyberattacksLocation: New York, United States
Date published: 19-08-2014

ALEXANDRIA Va. (Reuters) - Four members of the hacking group Anonymous pleaded guilty to a misdemeanor charge on Tuesday after a judge had earlier questioned whether prosecutors had treated the defendants too harshly for their crimes. The hackers, part of a group that gained notoriety for frequent c... Read more

Source: reuters.com

Top found tags: financial sector(4),telecom sector(8),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. Nuclear Regulator Hacked Three Times in Three YearsLocation: Black Hat - Las Vegas, United States
Date published: 19-08-2014

Podcasts Latest Podcasts All 14666090570_72a1b4cce7_k Black Hat and DEF CON Wrap Black Hat News Wrap Podcast Podcast: Black Hat News Wrap, Day BlackHat keynote_Geer Podcast: Black Hat News Wrap [Wendy-Nather-Bla] Podcast: Wendy Nather on the Black MSFT-takedown Threatpost News Wrap, Jul... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),Black Hat(6),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Close to All Facebook Notification Emails EncryptedLocation: Black Hat - Las Vegas, United States
Date published: 19-08-2014

Podcasts Latest Podcasts All 14666090570_72a1b4cce7_k Black Hat and DEF CON Wrap Black Hat News Wrap Podcast Podcast: Black Hat News Wrap, Day BlackHat keynote_Geer Podcast: Black Hat News Wrap [Wendy-Nather-Bla] Podcast: Wendy Nather on the Black MSFT-takedown Threatpost News Wrap, Jul... Read more

Source: threatpost.com

Top found tags: United Kingdom(4),Black Hat(6),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Administrator of Things (AoT) A Side Effect of SmartificationLocation: New York, United States
Date published: 19-08-2014

In an earlier article, we talked about the ongoing smartification of the home the natural tendency of households to accumulate more intelligent devices over time. While this has its benefits, the residents of smart homes also need to invest their time and energy to maintain these devices. These ... Read more

Source: trendmicro.com

Top found tags: cyber security(2),United States(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime Exposed Part 2: When Adware Goes Bad A Closer Look at AdwareLocation: National Crime Agency - London, United Kingdom
Date published: 19-08-2014

With the ostensibly harmless nature of adware, we are constantly tricked into believing that they are nothing but online nuisances. But underneath, they are marketing-engineered software that could potentially carry malicious programs to target your browsing behavior and spy on your other online act... Read more

Source: trendmicro.com

Top found tags: financial sector(2),cyber security(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AP denied security docs on HealthCare.gov, a risk to private informationLocation: Microsoft HQ - Redmond, United States
Date published: 19-08-2014

Facebook users locked out if credentials are shared with Adobe account The Associated Press wants the government to reconsider its decision to not publicly disclose federal documents related to HealthCare.gov security. The Associated Press (AP) has made a call to the government, asking it to reconsi... Read more

Source: www.scmagazine.com

Top found tags: Electronic Frontier Foundation(3),cyber security(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hospitals Increasingly Targets of Malicious Activity: WebsenseLocation: Rapid7 HQ - Boston, United States
Date published: 20-08-2014

When Community Health Systems revealed it had been breached, it joined a growing list of healthcare organizations and hospitals that have been hit by attackers. According to Websense, there has been a significant global spike in malicious activity attempted against hospitals beginning in October 201... Read more

Source: securityweek.com

Top found tags: financial sector(4),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cryptolocker flogged on YouTubeLocation: YouTube HQ - San Bruno, United States
Date published: 20-08-2014

Implementing global e-invoicing with guaranteed legal certainty Cryptolocker is being flogged over YouTube by vxers who have bought advertising space, researchers Vadim Kotov and Rahul Kashyap have found. The researchers made the discovery while monitoring YouTube and website banners for instances w... Read more

Source: go.theregister.com

Top found tags: exploit kit(4),financial sector(4),malware(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers Exploited Heartbleed Bug to Steal 4.5 Million Patient Records: ReportLocation: TrustedSec - Strongsville, United States
Date published: 19-08-2014

Earlier this week, Community Health Systems, one of the largest hospital operators in the United States, announced that hackers managed to steal the records of 4.5 million patients. FireEye-owned Mandiant, known for investigating high-profile breaches, was hired to investigate the incident and belie... Read more

Source: securityweek.com

Top found tags: health sector(4),medical sector(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
All your vulnerabilities belong to us: The rise of the exploitLocation: Adobe HQ - San Jose, United States
Date published: 20-08-2014

The growing impact of web exploits isn't just limited to the enterprise market and must be countered on an industry-scale, says Pedro Bustamante. All your vulnerabilities belong to us: The rise of the exploit All your vulnerabilities belong to us: The rise of the exploit In January 2010, the western... Read more

Source: www.scmagazineuk.com

Top found tags: telecom sector(6),cybercrime(9),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brother, can you spare a DIME for holy grail of secure webmail?Location: Berlin, Germany
Date published: 20-08-2014

Implementing global e-invoicing with guaranteed legal certainty Feature Lavabit founder Ladar Levison promised attendees at security conference DefCon that he'd carve out a secure messaging service from the wreckage of the email service favoured by rogue NSA sysadmin Edward Snowden within six months... Read more

Source: go.theregister.com

Top found tags: cyber security(4),United States(4),government(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Assange blabbers, IBM/Lenovo is approved, and some Apple data goes to China [Government IT Week]Location: Australian Communications and Media Authority - Pyrmont, Australia
Date published: 20-08-2014

addition to my own coverage analysis here in the ZDNet Government column and on ZDNet's DIY-IT, every week I'll bring you a selection of the best government-related articles posted by our intrepid reporters and analysts. Here are some of the most interesting from the last week. Top stories this week... Read more

Source: www.zdnet.com

Top found tags: Google(4),government(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stealth Security Startup vArmour Secretly Raised $42 MillionLocation: Palo Alto, United States
Date published: 20-08-2014

Its rare to hear about a startup that has been able to secure its Series A, B and C rounds while operating in stealth mode, but one Silicon Valley security startup has managed to raise a total of $42 million since it was founded in 2011, all without coming public and saying what they actually do.... Read more

Source: securityweek.com

Top found tags: NTP(1),research(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Source Code of Android RAT Dendroid Leaked OnlineLocation: Google HQ - Mountain View, United States
Date published: 20-08-2014

The complete source code for the Android remote access Trojan (RAT) called Dendroid has been leaked online, which researchers have found contains several vulnerabilities. The existence of Dendroid (Android.Dendoroid) was first reported by Symantec in March when the threat was causing a buzz on under... Read more

Source: securityweek.com

Top found tags: cybercrime(6),financial sector(6),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Yale profs propose openness, crypto for disciplined surveillanceLocation: Ford, United States
Date published: 20-08-2014

while preventing innocent by-standers from being snared in the nets of zealous lawmen in an age of big data collection and technology-savvy surveillance. The plan would alter the current data collection model of intelligence agencies and law-enforcement, but still allow relevant information collecti... Read more

Source: www.zdnet.com

Top found tags: cyber security(4),government(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Assange blabbers, IBM/Lenovo is approved, and some Apple data goes to China [Government IT Week]Location: Australian Communications and Media Authority - Pyrmont, Australia
Date published: 20-08-2014

addition to my own coverage analysis here in the ZDNet Government column and on ZDNet's DIY-IT, every week I'll bring you a selection of the best government-related articles posted by our intrepid reporters and analysts. Here are some of the most interesting from the last week. Top stories this week... Read more

Source: www.zdnet.com

Top found tags: Google(4),government(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers Easily Slipped Weapons Past TSAs X-Ray Body ScannersLocation: University of Michigan - Ann Arbor, United States
Date published: 20-08-2014

tsa-scans-lead Hovav Shacham, one of the security researchers who found a collection of gaping vulnerabilities in the Rapiscan X-ray machines, poses for a full-body scan in one of the systems. Two years ago, a blogger named Jonathan Corbett published a YouTube video that seemed to show a facepalm-wo... Read more

Source: wired.com

Top found tags: security measures(2),vulnerability(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Heartbleed may be culprit in hospital chain hackLocation: New York, United States
Date published: 20-08-2014

Chinese hackers used the widespread Heartbleed security vulnerability to steal the personal information on 4.5 million patients of Community Health Systems, reported Bloomberg on Wednesday. Community Health Systems, the second-largest for-profit hospital chain in the US, announced Tuesday that hacke... Read more

Source: cnet.com.ortal.com

Top found tags: update(2),cybercrime(3),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vulnerability in WordPress Mobile Pack Exposes Password-Protected PostsLocation: WordPress - San Francisco, United States
Date published: 20-08-2014

Researchers at dxw Security have discovered a flaw in the WordPress Mobile Pack plugin that can be exploited to access password-protected posts. dxw creates and hosts WordPress websites for the public sector. The company's Security department reviews WordPress and WordPress plugins to ensure that th... Read more

Source: securityweek.com

Top found tags: update(2),vulnerability(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stealth Security Startup vArmour Secretly Raised $42 MillionLocation: Palo Alto, United States
Date published: 20-08-2014

Its rare to hear about a startup that has been able to secure its Series A, B and C rounds while operating in stealth mode, but one Silicon Valley security startup has managed to raise a total of $42 million since it was founded in 2011, all without coming public and saying what they actually do.... Read more

Source: securityweek.com

Top found tags: NTP(1),research(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Source Code of Android RAT Dendroid Leaked OnlineLocation: Google HQ - Mountain View, United States
Date published: 20-08-2014

The complete source code for the Android remote access Trojan (RAT) called Dendroid has been leaked online, which researchers have found contains several vulnerabilities. The existence of Dendroid (Android.Dendoroid) was first reported by Symantec in March when the threat was causing a buzz on under... Read more

Source: securityweek.com

Top found tags: cybercrime(6),financial sector(6),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
75,000 reasons not to jailbreak your iPhone or iPadLocation: Apple HQ - Cupertino, United States
Date published: 20-08-2014

Malicious AdThief malware replaces adverts appearing on Apple users screens 75,000 reasons not to jailbreak your iPhone or iPad 75,000 reasons not to jailbreak your iPhone or iPad The dangers of jailbreaking an iPhone have once again been highlighted, after an analyst with Fortinet revealed that mor... Read more

Source: www.scmagazineuk.com

Top found tags: mobile device(4),telecom sector(4),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Industry divided as Met Police recommends smartphone PINsLocation: Metropolitan Police - London, United Kingdom
Date published: 20-08-2014

After two years of quietly lobbying mobile phone manufacturers such as Apple and Samsung, the Metropolitan Police have gone public with its request for all mobile phone vendors to implement PIN protection as a default setting on a handset. Industry divided as Met Police recommends smartphone PINs In... Read more

Source: www.scmagazineuk.com

Top found tags: threat(1),cyber security(2),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Heartbleed implicated in US hospital megahackLocation: TrustedSec - Strongsville, United States
Date published: 20-08-2014

Implementing global e-invoicing with guaranteed legal certainty The Heartbleed flaw is responsible for the high-impact US hospital hacking attack disclosed this week, an unnamed investigator told Bloomberg. As many as 4.5 million patient records have been exposed in an attack against Community Healt... Read more

Source: go.theregister.com

Top found tags: government(6),health sector(6),medical sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A New Spin on Rogue AntivirusLocation: Black Hat - Las Vegas, United States
Date published: 20-08-2014

Podcasts Latest Podcasts All 14666090570_72a1b4cce7_k Black Hat and DEF CON Wrap Black Hat News Wrap Podcast Podcast: Black Hat News Wrap, Day BlackHat keynote_Geer Podcast: Black Hat News Wrap [Wendy-Nather-Bla] Podcast: Wendy Nather on the Black MSFT-takedown Threatpost News Wrap, Jul... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),Black Hat(6),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor Browser Hardening Features Under ScrutinyLocation: Black Hat - Las Vegas, United States
Date published: 20-08-2014

Podcasts Latest Podcasts All 14666090570_72a1b4cce7_k Black Hat and DEF CON Wrap Black Hat News Wrap Podcast Podcast: Black Hat News Wrap, Day BlackHat keynote_Geer Podcast: Black Hat News Wrap [Wendy-Nather-Bla] Podcast: Wendy Nather on the Black MSFT-takedown Threatpost News Wrap, Jul... Read more

Source: threatpost.com

Top found tags: telecom sector(4),Black Hat(6),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers find its terrifyingly easy to hack traffic lightsLocation: University of Michigan - Ann Arbor, United States
Date published: 20-08-2014

Taking over a citys intersections and making all the lights green to cause chaos is a pretty bog-standard Evil Techno Bad Guy tactic on TV and in movies, but according to a research team at the University of Michigan, doing it in real life is within the realm of anyone with a laptop and the right... Read more

Source: arstechnica.com

Top found tags: social engineering(2),cyber security(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

4.5 Million Patient Records Stolen in Hospital Data BreachLocation: New York, United States
Date published: 20-08-2014

Community Health Systems Inc., the second-largest for-profit hospital chain in the United States, said on Monday that hackers stole data on some 4.5 million patients in April and June of this year. If true, this could be one of the largest medical data thefts in U.S. history. The stolen data include... Read more

Source: blogs.mcafee.com

Top found tags: medical sector(4),United States(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Advanced Evasion Techniques (AETs): Why worry?Location: McAfee - Santa Clara, United States
Date published: 20-08-2014

Security professionals and hackers descended upon Las Vegas to take part in Black Hat USA 2014and DefCon conferences, recent news of the massive cybercrime operation that leached $3.75 billion over a two-year period from the Brazilian Boleto payment network is sure to enter the conversation. In his ... Read more

Source: blogs.mcafee.com

Top found tags: conference(3),Black Hat(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target Q2 2014: Fails to meet analyst expectations, cuts year outlookLocation: Target HQ - Minneapolis, United States
Date published: 20-08-2014

Target has failed to meet analyst expectations in Q2 2014 despite reporting an increase in sales within its second quarter financial report. Target reported on Wednesday Q2 net profit of $234 million with earnings of $.37 per share, a decrease of 61.6 percent from $.96 per share a year earlier. (sta... Read more

Source: www.zdnet.com

Top found tags: financial sector(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Today's Biggest Security Gap? Identity.Location: Martin, United States
Date published: 20-08-2014

Enterprise Security Gaps Identifying security gaps is a favorite pastime of security professionals. We lovingly spend time performing risk assessments, drafting and administering policies, implementing defensive technologies, and generally trying to figure out the angle of future attacks. As much fu... Read more

Source: securityweek.com

Top found tags: data breach(2),security management(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Target Q2 2014: Fails to meet analyst expectations, cuts year outlookLocation: Target HQ - Minneapolis, United States
Date published: 20-08-2014

Target has failed to meet analyst expectations in Q2 2014 despite reporting an increase in sales within its second quarter financial report. Target reported on Wednesday Q2 net profit of $234 million with earnings of $.37 per share, a decrease of 61.6 percent from $.96 per share a year earlier. (sta... Read more

Source: www.zdnet.com

Top found tags: financial sector(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Today's Biggest Security Gap? Identity.Location: Martin, United States
Date published: 20-08-2014

Enterprise Security Gaps Identifying security gaps is a favorite pastime of security professionals. We lovingly spend time performing risk assessments, drafting and administering policies, implementing defensive technologies, and generally trying to figure out the angle of future attacks. As much fu... Read more

Source: securityweek.com

Top found tags: data breach(2),security management(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Impact of Espionage: Business Confidential DataLocation: New York, United States
Date published: 20-08-2014

If the cyber theft of intellectual property attacks an organizations ability to innovate, theft of business confidential information attacks its ability to execute as a business. Verizons 2014 Data Breach Investigations Report (DBIR) found that 22 percent of breaches are the result of cyber es... Read more

Source: blogs.mcafee.com

Top found tags: financial sector(6),United Kingdom(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: 23% of consumers save banking details on multiple mobile devices to leave hackers salivatingLocation: PayPal HQ - San Jose, United States
Date published: 19-08-2014

Report: 23% of consumers save banking details on multiple mobile devices to. leave hackers salivating Almost half of consumers are risking leaking confidential personal data and valuable banking details to hackers by remaining logged in across multiple mobile devices. Related: Google reveals top 10 ... Read more

Source: itproportal.com

Top found tags: telecom sector(2),financial sector(4),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Heartbleed Exploit Linked to Community Health Data BreachLocation: Black Hat - Las Vegas, United States
Date published: 20-08-2014

Podcasts Latest Podcasts All 14666090570_72a1b4cce7_k Black Hat and DEF CON Wrap Black Hat News Wrap Podcast Podcast: Black Hat News Wrap, Day BlackHat keynote_Geer Podcast: Black Hat News Wrap [Wendy-Nather-Bla] Podcast: Wendy Nather on the Black MSFT-takedown Threatpost News Wrap, Jul... Read more

Source: threatpost.com

Top found tags: Kaspersky Lab(4),Black Hat(6),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Backoff' malware compromises POS devices in New Orleans restaurantLocation: Orleans, United States
Date published: 20-08-2014

Anyone who used payment cards at Mizado Cocina between May 9 and July 18 may have had their data compromised, the New Orleans restaurant announced on Tuesday, explaining that its point-of-sale (POS) devices had been compromised with Backoff malware. Information believed to be compromised includes na... Read more

Source: www.scmagazine.com

Top found tags: report(1),threat(1),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Russian hacker Seleznev ordered to remain in custodyLocation: Moscow, Russia
Date published: 19-08-2014

Roman Seleznev, a Russian man accused of hacking point-of-sale systems, was ordered to remain in federal custody this past week until his scheduled October trial. Seleznev's attorneys requested he be released on a $1 million bond secured by $100,000 in cash, but a U.S. judge rejected the plea after ... Read more

Source: www.scmagazine.com

Top found tags: Department of Justice(3),government(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bug in iOS Instagram app fixed, impacts Facebook accountsLocation: Facebook - Menlo Park, United States
Date published: 19-08-2014

A security firm is advising Instagram for iOS users to update to version 6.0.4 or later of the app to avoid leaving their Facebook accounts vulnerable to attack. IOActive revealed that a bug in the app could allow an attacker to steal Facebook access tokens and impersonate victims or access their pe... Read more

Source: www.scmagazine.com

Top found tags: social media(2),update(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Proofpoint announces plans to hire 94 IT professionals in Northern IrelandLocation: Dublin, Ireland
Date published: 19-08-2014

Data protection provider, Proofpoint, is creating 94 jobs in Northern Ireland, more than a year after acquiring Maildistiller, a Belfast-based SaaS email security provider. The new posts average a salary of about $50,000 and would support the 20 employees already in the company's Ireland office, acc... Read more

Source: www.scmagazine.com

Top found tags: ISP(1),research(1),threat(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The insane YouTube bike video that'll be viral by tomorrowLocation: New York, United States
Date published: 20-08-2014

Chris Matyszczyk/CNET Dashcam videos from the land of the dacha have their own otherworldly character. It's not that in the former USSR they drive as if they're all escaping from someone, even though they could be. It's that sometimes the creators of Grand Theft Auto would never quite conceive the a... Read more

Source: cnet.com.ortal.com

Top found tags: EN(1),Peru(1),Russia(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lazy sys admins rooted in looming Mozilla cert wipeoutLocation: Mozilla - Mountain View, United States
Date published: 20-08-2014

Implementing global e-invoicing with guaranteed legal certainty Mozilla is about to revoke some weak X.509 PKI certs, and has warned that system admins it'll affect the Firefox browser and they'll need to assess their infrastructure. The four affected root certificates from Entrust and ValiCert are ... Read more

Source: go.theregister.com

Top found tags: Linux(1),OpenSSL(1),Fedora(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Steve Ballmer Steps Down from Microsoft BoardLocation: Microsoft HQ - Redmond, United States
Date published: 19-08-2014

SAN FRANCISCO - Former Microsoft chief Steven Ballmer on Tuesday said he is stepping down as a member of the software giant's board of directors. Ballmer made his decision public a month after his successor, Satya Nadella, announced unprecedented job cuts at the US technology firm as it worked to ad... Read more

Source: securityweek.com

Top found tags: Google(1),Microsoft(1),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How McAfee SIEM Helped Cologne Bonn Airports Security Take FlightLocation: McAfee - Santa Clara, United States
Date published: 20-08-2014

Timing is everything in an airport and to handle the growth in travelers and airlines at Cologne Bonn, the IT infrastructure includes several large networks and various system architectures, which must be harmonized and centrally operated.Cologne Bonn is a thoroughly modern airport that has many a... Read more

Source: blogs.mcafee.com

Top found tags: vulnerability(2),airport(4),airport sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Professor hacks University Health Conway in demonstration for classLocation: Conway, United States
Date published: 20-08-2014

Louisiana-based University Health Conway is notifying more than 6,000 patients that a computer science professor from the City College of San Francisco gained access to a server with their personal information while demonstrating computer system vulnerabilities to a class. How many victims? 6,073. W... Read more

Source: www.scmagazine.com

Top found tags: vulnerability(1),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GCHQ exposed mining entire nations for hacking vulnerabilitiesLocation: GCHQ - Cheltenham, United Kingdom
Date published: 18-08-2014

PaulMCCooper. GCHQ exposed mining entire nations for hacking vulnerabilities The UK's Government Communications Headquarters (GCHQ) spy agency has been exposed scanning entire countries for server weaknesses that allow it to exploit vulnerable ports. According to reports, it does this using a tool c... Read more

Source: itproportal.com

Top found tags: United Kingdom(2),United States(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Graphic Library Flaw Exposes Apps Created With Delphi, C++ BuilderLocation: Microsoft HQ - Redmond, United States
Date published: 20-08-2014

Library Source Code Vulnerabilties Researchers at Core Security say they have identified a security vulnerability in the Visual Component Library (VLC) that affects apps developed with Delphi and C++ Builder. In an advisory released today, the security firm revealed that an attacker is able to trigg... Read more

Source: securityweek.com

Top found tags: medical sector(2),vulnerability(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Health care breaches continue to rise, over 30M affectedLocation: The Washington Post - Washington, D.C., United States
Date published: 20-08-2014

As breaches hitting the health care industry continue to ramp up, more than 30 million individuals have been affected by these incidents. An analysis by the Washington Post on data provided by the U.S. Department of Health and Human Services, indicates that 944 incidents have been reported to the ag... Read more

Source: www.scmagazine.com

Top found tags: health sector(2),medical sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Microsoft: nep-virusscanners bijna uitgestorvenLocation: Microsoft HQ - Redmond, United States
Date published: 20-08-2014

Nep-virusscanners, ook bekend als scareware, zijn al sinds 2007 een plaag voor internetgebruikers, maar uit cijfers van Microsoft blijkt dat deze dreiging bijna is uitgestorven. De nep-virusscanner verspreidde zich via pop-ups en andere malware. Gebruikers kregen dan een scherm te zien dat hun pc be... Read more

Source: www.security.nl

Top found tags: NL(1),cybercrime(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FBI onderzoekt diefstal van 1,2 miljard wachtwoordenLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 20-08-2014

De FBI heeft een onderzoek ingesteld naar de diefstal van 1,2 miljard wachtwoorden door een groep cybercriminelen, zoals onlangs door het Amerikaanse beveiligingsbedrijf Hold Security werd gemeld. De gegevens zouden via zo'n 420.000 websites zijn gestolen en gekocht van andere cybercriminelen. Sinds... Read more

Source: www.security.nl

Top found tags: cybercrime(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Linux Foundation gaat broncode kernel beveiligen met two-factor-authenticatieLocation: Kern, United States
Date published: 20-08-2014

De Linux Foundation gaat two-factor-authenticatie invoeren voor developers die toegang hebben tot de broncode van de Linux-kernel. Daarvoor wordt onder andere het zogeheten YubiKey-token ingezet. De maatregel volgt drie jaar na een inbraak op Kernel.org. In september 2011 werd Kernel.org, de website... Read more

Source: tweakers.net

Top found tags: website(1),cyber security(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spionagecampagne lokt slachtoffers met Sun Tzu en pornoLocation: Kaspersky HQ - Moscow, Russia
Date published: 20-08-2014

Een digitale spionagecampagne die in 2010 begon en mogelijk nog steeds actief is gebruikt Sun Tzu en porno om doelwitten met malware te infecteren. De campagne werd door het Russische anti-virusbedrijf Kaspersky ontdekt en zou alleen social engineering toepassen om zich te verspreiden. Het gaat dan ... Read more

Source: www.security.nl

Top found tags: cybercrime(2),Kaspersky Lab(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ransomware steelt nu ook wachtwoorden van computersLocation: Berlin, Germany
Date published: 20-08-2014

De Reveton-ransomware die voorheen alleen computers vergrendelde is van een upgrade voorzien, zodat die ook allerlei wachtwoorden op besmette computers kan stelen en klanten van Duitse banken kan aanvallen. Reveton staat vanwege de waarschuwing die het laat zien ook bekend als het "politievirus". Vo... Read more

Source: www.security.nl

Top found tags: government(2),The Netherlands(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Maleisische onderzoekers MH370 doelwit e-mailaanvalLocation: Amsterdam, The Netherlands
Date published: 20-08-2014

Verschillende hooggeplaatste Maleisische overheidsfunctionarissen die de verdwijning van vlucht MH370 onderzoeken alsmede personen binnen Malaysia Airlines zijn een dag nadat het vliegtuig van de radar verdween het doelwit geweest van een e-mailaanval, zo laat de Maleisische krant The Star weten. Aa... Read more

Source: www.security.nl

Top found tags: research(1),cybercrime(2),government(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spionagecampagne lokt slachtoffers met Sun Tzu en pornoLocation: Kaspersky HQ - Moscow, Russia
Date published: 20-08-2014

Een digitale spionagecampagne die in 2010 begon en mogelijk nog steeds actief is gebruikt Sun Tzu en porno om doelwitten met malware te infecteren. De campagne werd door het Russische anti-virusbedrijf Kaspersky ontdekt en zou alleen social engineering toepassen om zich te verspreiden. Het gaat dan ... Read more

Source: www.security.nl

Top found tags: cybercrime(2),Kaspersky Lab(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ransomware steelt nu ook wachtwoorden van computersLocation: Berlin, Germany
Date published: 20-08-2014

De Reveton-ransomware die voorheen alleen computers vergrendelde is van een upgrade voorzien, zodat die ook allerlei wachtwoorden op besmette computers kan stelen en klanten van Duitse banken kan aanvallen. Reveton staat vanwege de waarschuwing die het laat zien ook bekend als het "politievirus". Vo... Read more

Source: www.security.nl

Top found tags: government(2),The Netherlands(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Linux Foundation gaat kernel-repository beveiligen met two-factor-authenticatieLocation: Kern, United States
Date published: 20-08-2014

De Linux Foundation gaat two-factor-authenticatie invoeren voor developers die toegang hebben tot de broncode van de Linux-kernel. Daarvoor wordt onder andere het zogeheten YubiKey-token ingezet. De maatregel volgt drie jaar na een inbraak op Kernel.org. In september 2011 werd Kernel.org, de website... Read more

Source: tweakers.net

Top found tags: website(1),cyber security(2),trojan(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Bijna alle uitgaande e-mail van Facebook versleuteldLocation: Facebook - Menlo Park, United States
Date published: 20-08-2014

Bijna alle uitgaande e-mail van Facebook is tegenwoordig via STARTTLS versleuteld, zo meldt de sociale netwerksite. 95% van de notificatiemails is nu versleuteld met zowel Perfect Forward Secrecy als "strict" certificaat validatie. Bij "strict" certificaat validatie is het certificaat niet verlopen,... Read more

Source: www.security.nl

Top found tags: information security(2),social media(2),SSL(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Afstaan parkeergegevens aan fiscus is onbegrijpelijk"Location: Amsterdam, The Netherlands
Date published: 20-08-2014

Het vonnis van de rechter die gisteren oordeelde dat het bedrijf SMS Parking de parkeergegevens van klanten aan de Belastingdienst moet afstaan is onbegrijpelijk, omdat het in strijd met de Wet bescherming persoonsgegevens (Wbp) is, zo stelt Anke Verhoeven van advocatenkantoor SOLV. Gisteren draaide... Read more

Source: www.security.nl

Top found tags: cyber security(2),telecom sector(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

2-factor authenticatie voor ontwikkelaars Linux-kernelLocation: Amsterdam, The Netherlands
Date published: 20-08-2014

De Linux Foundation, die toeziet op de ontwikkeling van de Linux-kernel, heeft 2-factor authenticatie als beveiligingsmaatregel toegevoegd wat het lastiger voor aanvallers moet maken om met de gegevens van ontwikkelaars in te loggen, zo heeft de stichting in een blogposting laten weten. Op dit momen... Read more

Source: www.security.nl

Top found tags: NL(1),smartphone(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Gegevens 4,5 miljoen patinten gestolen via Heartbleed"Location: Toronto, Canada
Date published: 20-08-2014

De aanvallers die de gegevens van 4,5 miljoen patinten wisten te stelen zouden de Heartbleed-bug in OpenSSL hebben gebruikt, zo laat iemand die bij het onderzoek betrokken is tegenover Bloomberg weten. Het is niet de eerste keer dat Heartbleed door aanvallers is ingezet om organisaties aan te vall... Read more

Source: www.security.nl

Top found tags: research(1),webserver(1),OpenSSL(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Veel Chrome-extensies vertonen gevaarlijk gedragLocation: San Diego, United States
Date published: 20-08-2014

Veel Chrome-extensies vertonen gevaarlijk gedrag, zo blijkt uit onderzoek van onderzoekers aan verschillende Amerikaanse universiteiten die meer dan 48.000 Chrome-extensies analyseerden. De onderzoekers ontdekten 130 kwaadaardige extensies en 4712 extensies die verdacht gedrag vertoonden. De meeste ... Read more

Source: www.security.nl

Top found tags: telecom sector(2),Google(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Veel gratis Android apps controleerden SSL-certificaten nietLocation: Google HQ - Mountain View, United States
Date published: 20-08-2014

Veel gratis Android apps controleerden bij het opzetten van een versleutelde verbinding de gebruikte SSL-certificaten niet, waardoor gebruikers kwetsbaar voor Man-in-the-Middle-aanvallen waren. Dat stelt IT-beveiliger FireEye aan de hand van de 1.000 meest gedownloade gratis Android apps op Google P... Read more

Source: www.security.nl

Top found tags: Google(2),Google Play(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bank app verifieert klanten aan hand van typegedragLocation: Amsterdam, The Netherlands
Date published: 20-08-2014

Een Zweeds beveiligingsbedrijf heeft technologie voor mobiel bankieren apps ontwikkeld waarmee bankklanten aan de hand van hun typegedrag kunnen worden herkend. De technologie kan de druk op het scherm meten alsmede de snelheid waarmee de pincode op de smartphone wordt ingetypt. "We letten op de kle... Read more

Source: www.security.nl

Top found tags: financial sector(2),United States(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nieuwe Tor-versie gebruikt Amazon en Google als dekmantelLocation: Google HQ - Mountain View, United States
Date published: 20-08-2014

Deze week is er een vroege testversie van Tor Browser verschenen die Amazon en Google als dekmantel gebruikt om internetcensuur te omzeilen. Tor Browser laat gebruikers verbinding met het Tor-netwerk maken, dat het IP-adres verbergt en het mogelijk maakt om gecensureerde sites te bezoeken. In sommig... Read more

Source: www.security.nl

Top found tags: Google(1),ISP(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2-factor authenticatie voor ontwikkelaars Linux-kernelLocation: Amsterdam, The Netherlands
Date published: 20-08-2014

De Linux Foundation, die toeziet op de ontwikkeling van de Linux-kernel, heeft 2-factor authenticatie als beveiligingsmaatregel toegevoegd wat het lastiger voor aanvallers moet maken om met de gegevens van ontwikkelaars in te loggen, zo heeft de stichting in een blogposting laten weten. Op dit momen... Read more

Source: www.security.nl

Top found tags: NL(1),smartphone(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Gegevens 4,5 miljoen patinten gestolen via Heartbleed"Location: Toronto, Canada
Date published: 20-08-2014

De aanvallers die de gegevens van 4,5 miljoen patinten wisten te stelen zouden de Heartbleed-bug in OpenSSL hebben gebruikt, zo laat iemand die bij het onderzoek betrokken is tegenover Bloomberg weten. Het is niet de eerste keer dat Heartbleed door aanvallers is ingezet om organisaties aan te vall... Read more

Source: www.security.nl

Top found tags: research(1),webserver(1),OpenSSL(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Veel Chrome-extensies vertonen gevaarlijk gedragLocation: San Diego, United States
Date published: 20-08-2014

Veel Chrome-extensies vertonen gevaarlijk gedrag, zo blijkt uit onderzoek van onderzoekers aan verschillende Amerikaanse universiteiten die meer dan 48.000 Chrome-extensies analyseerden. De onderzoekers ontdekten 130 kwaadaardige extensies en 4712 extensies die verdacht gedrag vertoonden. De meeste ... Read more

Source: www.security.nl

Top found tags: telecom sector(2),Google(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ransomware steelt ook wachtwoorden van computersLocation: Berlin, Germany
Date published: 20-08-2014

De Reveton-ransomware die voorheen alleen computers vergrendelde is van een upgrade voorzien, zodat die ook allerlei wachtwoorden op besmette computers kan stelen en klanten van Duitse banken kan aanvallen. Het gaat om wachtwoorden in browsers, e-mailclients, FTP-programma's en RDP/VPN-clients.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),ransomware(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheden verholpen in SambaLocation: Ubuntu - London, United Kingdom
Date published: 20-08-2014

Samenvatting: Er is een update uitgebracht voor Samba die de kwetsbaarheden verhelpt. Gevolgen: Een kwaadwillende kan toegang krijgen tot gevoelige informatie en kan mogelijk een Denial-of-Service veroorzaken van de Netbios name service daemon en van de smbd file server daemon. Beschrijving: Door ee... Read more

Source: www.ncsc.nl

Top found tags: Ubuntu(2),update(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM verhelpt kwetsbaarheid in AIX BINDLocation: IBM HQ - Armonk, United States
Date published: 20-08-2014

Samenvatting: IBM heeft updates uitgebracht die een kwetsbaarheid in BIND verhelpen voor AIX. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: Er bevind zich een kwetsbaarheid in ISC BIND eerder dan 9.4.1-P1. Recursieve DNS queries va... Read more

Source: www.ncsc.nl

Top found tags: DoS(1),NL(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden in de Linux kernel verholpenLocation: Ubuntu - London, United Kingdom
Date published: 20-08-2014

Samenvatting: Er zijn updates beschikbaar gemaakt voor de Linux kernel. Deze verhelpen kwetsbaarheden in het bind mount mechanisme. Gevolgen: Een kwaadwillende kan mount opties zoals read-only, nosuid, nodev en noexec van een bind mount resetten en zo ongeoorloofde toegang krijgen tot devices, besta... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Fedora(2),Ubuntu(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid verholpen in WiresharkLocation: Oracle - Redwood City, United States
Date published: 20-08-2014

Samenvatting: Er is een kwetsbaarheid verholpen in Wireshark. Een kwaadwillende kan deze kwetsbaarheid misbruiken om een Denial-of-Service te veroorzaken. Gevolgen: De kwetsbaarheid kan misbruikt worden voor het uitvoeren van een Denial-of-Service. Beschrijving: - CVE-2014-2282 Er bestaat een kwetsb... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),website(1),Fedora(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheid in libxml verholpenLocation: Ubuntu - London, United Kingdom
Date published: 20-08-2014

Samenvatting: De makers van libxml hebben updates uitgebracht om een Denial-of-Service kwetsbaarheid te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: Een kwaadwillende kan op afstand de kwetsbaarheid misbruiken door een ... Read more

Source: www.ncsc.nl

Top found tags: Debian(2),Ubuntu(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IBM verhelpt groot aantal kwetsbaarheden in WebSphereLocation: IBM HQ - Armonk, United States
Date published: 20-08-2014

Samenvatting: IBM heeft een aantal kwetsbaarheden verholpen in IBM WebSpere Application Server (WAS). Gevolgen: Kwaadwillenden kunnen de gevonden kwetsbaarheden misbruiken voor het verkrijgen van informatie van het systeem, het uitvoeren van willekeurige script code en het uitvoeren van een Denial o... Read more

Source: www.ncsc.nl

Top found tags: OpenSSL(1),The Netherlands(2),vulnerability(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in SambaLocation: Ubuntu - London, United Kingdom
Date published: 20-08-2014

Samenvatting: Er is een update uitgebracht voor Samba die de kwetsbaarheden verhelpt. Gevolgen: Een kwaadwillende kan toegang krijgen tot gevoelige informatie en kan mogelijk een Denial-of-Service veroorzaken van de Netbios name service daemon en van de smbd file server daemon. Beschrijving: Door ee... Read more

Source: www.ncsc.nl

Top found tags: Ubuntu(2),update(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish