Under construction

New design coming soon!

CIC News engine statistics

CIC News for 21-08-2014 contains 167 articles: cybercrime(51),cyber security(56),data breach(31),other(29)

CIC News update contains 151 English and 16 Dutch articles for today.
There are 6 published advisories, 0 are English and 6 are Dutch.
In today's English news articles:
- 45 related to cybercrime
- 54 related to cyber security
- 31 related to data breach and identity theft
- 21 for the category other news

In today's Dutch news articles:
- 6 related to cybercrime
- 2 related to cyber security
- 8 for the category other news

Have fun reading.

English cybercrime related news

FBI warns healthcare firms they are targeted by hackersLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 20-08-2014

BOSTON (Reuters) - The FBI has warned that healthcare industry companies are being targeted by hackers, publicizing the issue following an attack on U.S. hospital group Community Health Systems Inc that resulted in the theft of millions of patient records. "The FBI has observed malicious actors targ... Read more

Source: reuters.com

Top found tags: health sector(4),medical sector(4),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Incapsula mitigates multi-vector DDoS attack lasting longer than a monthLocation: Incapsula HQ - Redwood Shores, United States
Date published: 20-08-2014

DDoS attacks remain up, stronger in Q2, report says The DDoS attack, which began on June 21 and did not subside until July 27, never let up for a second. From the middle of June to nearing the end of July, security company Incapsula helped a targeted video game company withstand a nonstop distribute... Read more

Source: www.scmagazine.com

Top found tags: DoS(2),telecom sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Machete' espionage campaign targets orgs in Venezuela, EcuadorLocation: Kaspersky HQ - Moscow, Russia
Date published: 20-08-2014

An attack campaign, dubbed Machete, has primarily targeted Spanish speaking victims in Venezuela, Ecuador and Colombia, security firm Kaspersky revealed. In a Wednesday blog post, researchers said they discovered the threat when a client found unknown malware on their machine after a trip. Kas... Read more

Source: www.scmagazine.com

Top found tags: phishing(2),trojan(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Latest Gameover botnet lays low, looking to resist takedownLocation: Arbor Networks - Burlington, United States
Date published: 20-08-2014

But the same technique has made it easier for researchers to track the botnet's activity, and they watched as it quickly grew from infecting hundreds of initial systems to 10,000 systems in two weeks. Then a funny thing happened: Gameover ZeuS stopped growing. Now, almost six weeks after researchers... Read more

Source: arstechnica.com

Top found tags: government(3),cybercrime(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Did you swipe your card through one of these UPS Store tills? You may have been pwnedLocation: US-CERT - Alexandria, United States
Date published: 20-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines UPS has discovered an outbreak of debit and credit-card-reading malware in 51 of its branches in the US. Exactly which strain of malware was involved is not known; a spokesperson told The Register today: "We're still investigating the infect... Read more

Source: go.theregister.com

Top found tags: cybercrime(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Oi! Rip Van Winkle: PATCH, alreadyLocation: Microsoft HQ - Redmond, United States
Date published: 20-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Nearly 20 million computers remain infected with malware targeting a vulnerability first targeted four years ago by the Stuxnet worm. The flaw (CVE-2010-2568) was a Windows operating system bug in the way shortcuts worked allowing quiet down... Read more

Source: go.theregister.com

Top found tags: government(3),Kaspersky Lab(4),malware(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook Awards 'Internet Defense Prize'Location: Facebook - Menlo Park, United States
Date published: 21-08-2014

SAN FRANCISCO - Facebook on Wednesday awarded a $50,000 Internet Defense Prize to a pair of German researchers with a seemingly viable approach to detecting vulnerabilities in Web applications. Johannes Dahse and Thorsten Holz from Ruhr-Universitt Bochum in Germany won the new cash award for a pap... Read more

Source: securityweek.com

Top found tags: vulnerability(1),Germany(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How Hackers Could Mess With 911 Systems and Put You at RiskLocation: Las Vegas, Nevada, United States
Date published: 21-08-2014

Emergency Communications Technician, Mike Salazar takes 911 calls at the Emergency Communications Center in Arlington, VA on Monday 03/28/2011. Emergency Communications Technician, Mike Salazar takes 911 calls at the Emergency Communications Center in Arlington, VA on Monday 03/28/2011. [gallery-ca]... Read more

Source: wired.com

Top found tags: medical sector(4),government(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spear Phishing: Do You Know Your Risks?Location: Anti-Phishing Working Group - San Francisco, United States
Date published: 19-08-2014

The widespread use of mobile devices and social media has fueled spear phishing by further eroding the so-called perimeter that once shielded corporate networks, giving hackers more opportunity to wage successful campaigns, says a panel of three financial fraud experts.Today's cyber-attacks are almo... Read more

Source: www.bankinfosecurity.com

Top found tags: social media(2),telecom sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UPS Store Acknowledges Credit Card BreachLocation: New York, United States
Date published: 21-08-2014

The UPS Store recently announced that hackers may have accessed the credit card information of customers to made purchases at any of 51 UPS Store locations in 24 U.S. states between January 20, 2014 and August 11, 2014. The affected stores make up approximately one percent of the 4,470 franchised UP... Read more

Source: www.esecurityplanet.com

Top found tags: medical sector(2),Black Hat(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Video games company hit by 38-day DDoS attackLocation: Incapsula HQ - Redwood Shores, United States
Date published: 21-08-2014

51,000-plus terabits of data thrown against client, says IP security firm Video games company hit by 38-day DDoS attack Video games company hit by 38-day DDoS attack Incapsula has revealed that one of its clients - a video games company - was recently hit by a 38-day DDoS attack involving a hefty 51... Read more

Source: www.scmagazineuk.com

Top found tags: ISP(2),website(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook awards $50,000 Internet Defense Prize for security researchLocation: Facebook - Menlo Park, United States
Date published: 21-08-2014

Facebook awards $50,000 Internet Defense Prize for security research. Facebook has awarded $50,000 (30,000) to a pair of German researchers, who have developed a new approach to detecting vulnerabilities in online applications. The Internet Defense Prize was presented to Johannes Dahse and Thorste... Read more

Source: itproportal.com

Top found tags: vulnerability(1),Germany(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese Linux Trojan makes the jump to WindowsLocation: Microsoft HQ - Redmond, United States
Date published: 20-08-2014

A CHINESE TROJAN, one of the few to be written for the Linux operating system, has seemingly made the jump to Windows.First reported in May by Russian anti-malware software house Dr Web, the original malware known as \"Linux.Dnsamp\" is a Distributed Denial of Service (DDoS) Trojan, which, according... Read more

Source: www.theinquirer.net

Top found tags: DoS(2),trojan(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyberattackers Revert To Old Methods: Rate Of SYN Flood Attacks IncreasesLocation: New York, United States
Date published: 19-08-2014

Black Lotus, a provider of distributed denial of service (DDoS) protection, has issued a warning that despite a significant drop in network time protocol distributed reflection denial-of-service (NTP DrDoS) attacks in 2014, traditional, tried-and-true multi-vector attacks against servers and website... Read more

Source: www.bsminfo.com

Top found tags: threat(2),trend(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nigeria: Verisign Says DDOs Average Attack Size Exceeds 200 PercentLocation: Lagos, Nigeria
Date published: 18-08-2014

Latest report from Verisign indicates that the average size of Distributed Denial of Service (DDoS) attacks in the last quarter grew a staggering 216 per cent from Q1 2014, with nearly two-thirds coming in at over 1Gbps.The Firm, in its Q2 Distributed Denial of Service Trends Report said that there ... Read more

Source: allafrica.com

Top found tags: trend(1),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
DDoS extortion attacks on the riseLocation: Arbor Networks - Burlington, United States
Date published: 18-08-2014

While digital ransom attacks come in various types and forms, Distributed Denial of Service (DDoS) attacks are top of the list of methods used by attackers to force money from targeted companies.So says Bryan Hamman, territory manager of Arbor Networks, who points out that in recent weeks, well-know... Read more

Source: www.itweb.co.za

Top found tags: report(1),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminals using Ebola as bait to infect PCs: SymantecLocation: Symantec HQ - Mountain View, United States
Date published: 18-08-2014

Apart from humans, Ebola virus has computers as casualty too as cybercriminals are now leveraging the fear of the disease to infect PCs with malware, security solutions provider Symantec said on Monday.The recent Ebola outbreak in West Africa is being considered as the world's deadliest to date.The ... Read more

Source: www.dnaindia.com

Top found tags: trojan(2),telecom sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A New Attack Secretly Binds Malware to Legitimate Software DownloadsLocation: Berlin, Germany
Date published: 21-08-2014

A team of researchers from Ruhr University in Bochum, Germany, has created a new kind of cyber attack where malicious code is able to be sent in parallel with a legitimate software download without modifying any code.The new attack binds the malware to free and open source software, because there ar... Read more

Source: gizmodo.com

Top found tags: cybercrime(2),Germany(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. hospital breach biggest yet to exploit Heartbleed bug: expertLocation: Community Health Systems HQ - Franklin, United States
Date published: 20-08-2014

(Reuters) - Hackers who stole the personal data of about 4.5 million patients of hospital group Community Health Systems Inc broke into the company's computer system by exploiting the \"Heartbleed\" internet bug, making it the first known large-scale cyber attack using the flaw, according to a secur... Read more

Source: www.reuters.com

Top found tags: health sector(6),medical sector(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A great hacker will find HIT system flaws, exploit themLocation: Community Health Systems HQ - Franklin, United States
Date published: 19-08-2014

When you think about how an advanced persistent threat, i.e., a hacker, works, think of a professional quarterback like the Green Bay Packers' Aaron Rodgers.Smart, capable and most of all flexible, a pro QB will read a defense and exploit whatever weakness it offers. He might look first for a ... Read more

Source: www.modernhealthcare.com

Top found tags: cybercrime(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kicking the stool out from under the cybercrime economyLocation: Williamson, United States
Date published: 19-08-2014

CSO Online spoke with Shape Security's Wade Williamson at this year's Black Hat USA conference about the economy of cybercrime and how it can be weakened.Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have th... Read more

Source: www.csoonline.com

Top found tags: malware(2),cybercrime(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Free Porn and Malware When Pleasure turns to PainLocation: London, United Kingdom
Date published: 18-08-2014

August isnt a good time to be thinking about January even if the beginning of the Christmas sales in Londons main shopping streets make you wish that the whole thing was over already. Yet in the online industry it is always worth looking ahead and to do that, sometimes you need to look bac... Read more

Source: blog.check-and-secure.com

Top found tags: EN(1),pornography(1),website(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
VXer fighters get new stealth weapon in war of the (mal)waresLocation: University of California - San Diego, United States
Date published: 18-08-2014

A bare-metal analysis tool developed by University of California researchers promises to help tip the battle between virus writers and black hats by cloaking malware investigation efforts.The tool is the latest weapon in the war between the diaspora of independent and vendor malware researchers and ... Read more

Source: www.theregister.co.uk

Top found tags: research(1),Black Hat(2),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
75,000 Jailbroken iOS Devices Infected by AdThief MalwareLocation: Apple HQ - Cupertino, United States
Date published: 17-08-2014

Think your iOS device is immune to malware? Think again. If you jailbreak, your iPhone, iPad, or iPod touch could be infected by AdThief malware, a money-making machine that is now installed on an estimated 75,000 devices.First discovered back in March and also known as Spat, AdThief was... Read more

Source: www.technobuffalo.com

Top found tags: smartphone(2),mobile device(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Latest Gameover botnet lays low, looking to resist takedownLocation: Seculert - Petah Tikva, Israel
Date published: 20-08-2014

The botnet that the government shut down is back, with some changes.In early July, a group of cyber criminals released a modified version of the Gameover ZeuS banking trojan, using a technique known as a domain generation algorithm (DGA) to make disrupting the botnet more difficult.But the same tech... Read more

Source: arstechnica.com

Top found tags: government(3),cybercrime(5),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police concerned over surge in banking fraudsLocation: New York, United States
Date published: 21-08-2014

Once again, the UT cyber cell is witnessing a rise in online banking frauds. The frauds had taken a surge in 2011 and 2012 and after a slowdown for a year, such complaints have again gone up. This was shared during a workshop organised by UT cyber crime cell to guide police staff on how to go about ... Read more

Source: www.hindustantimes.com

Top found tags: police(1),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber cell sleuths to help nab train stunt youthLocation: New York, United States
Date published: 21-08-2014

MUMBAI: The Railway Protection Force has sought the help of the cyber crime cell of the Mumbai Police to trace the youth who had uploaded a video of him performing a train stunt, on YouTube. The 0.22-seconds-long video had garnered nearly 1.4 lakh views after it was uploaded on the video-sharing n A... Read more

Source: timesofindia.indiatimes.com

Top found tags: EN(1),education(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Crime: Law Enforcement Fights BackLocation: New York, United States
Date published: 20-08-2014

While cyber crime continued to dominate headlines and wreak havoc on organizations of all sizes across nearly every industry in the first half of 2014, it's refreshing to note law enforcement also stepped it up. A surge of activity against individuals and criminal organizations occurred, resulting i... Read more

Source: www.itbusinessedge.com

Top found tags: United States(2),government(3),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Come together against cyber crimeLocation: Midland, United States
Date published: 19-08-2014

A regional scheme that aims to bring businesses, police and government together to combat cyber-crime has been launched across the East Midlands.The Cyber-security Information Sharing Partnership, part of Cert-UK, has worked in partnership with law enforcement to create an online area soley for firm... Read more

Source: www.eastwoodadvertiser.co.uk

Top found tags: information sharing(2),government(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Seller beware: A new kind of cybercrime brings robbers to your doorstepLocation: New York, United States
Date published: 19-08-2014

KARACHI: Placing an online ad on websites like OLX or Facebook to sell items is a good way to attract buyers, but it may also attract robbers and gangs.A worrying crime trend has emerged in the city; criminals and gangs involved in muggings and street crimes are now scouring such websites in search ... Read more

Source: tribune.com.pk

Top found tags: government(2),social media(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
A Good Defence is about Understanding Cyber ThreatsLocation: New York, United States
Date published: 19-08-2014

In the era of the Internet and emerging technologies, we are supposed to deal with different sorts of cyber threats, risks and attacks. This modern time brought a lot of advantages to the Human Kind, but also some fast-spreading and increasing security issues. It seems we are connected with the risk... Read more

Source: www.australianscience.com.au

Top found tags: mobile device(2),telecom sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pranksters Circulate News of Ebola Outbreak on Social MediaLocation: New York, United States
Date published: 18-08-2014

MANGALORE: National Institute of Technology Karnataka (NITK) is planning to lodge a complaint under cyber crimes at Suratkal police station following false reports on social media about the death of a student.M Tech student Sreejith had died nearly a month ago and though the doctor who treated him h... Read more

Source: www.newindianexpress.com

Top found tags: social media(2),telecom sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rutland and Leicestershire PCC looks to tackle cybercrimeLocation: Rutland, United States
Date published: 21-08-2014

It comes as part of a youth strategyPolice and Crime Commissioner Sir Clive Loader has told Rutland Radio that cyber crime will be his next target when it comes to young people.A four year scheme looking at the relationship between the Police and youngsters was launched last year.Sir Clive says youn... Read more

Source: www.rutlandradio.co.uk

Top found tags: EN(1),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Symantec opens $12m cybercrime centre in SydneyLocation: Sydney, Australia
Date published: 21-08-2014

The parliamentary secretary to the Federal minister for communications, Paul Fletcher, today opened Symantec's new expanded and unified Sydney office and security operations centre.\"I remember in the 1980s we were all worried about putting the floppy disk near the microwave oven,\" said Fletcher, t... Read more

Source: www.crn.com.au

Top found tags: Symantec(1),Australia(2),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RAND report takes you on a trip to dark side (of cybercrime)Location: Community Health Systems HQ - Franklin, United States
Date published: 20-08-2014

It's not Elmore Leonard, but for the average health information technology reader, a new RAND report, Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar, is still a gripper.The report pulls back the curtain on the underworld of data theft, looking at it in its entirety, as a fully functio... Read more

Source: www.modernhealthcare.com

Top found tags: medical sector(2),exploit kit(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
War on cybercrimes priority for FBILocation: Salt Lake City, United States
Date published: 19-08-2014

SALT LAKE CITY At any moment all around the world, a crime is being committed online. A map by cyber security group, Norse, shows it happening in real time, pinpointing where the attack is coming from and who its against.Were facing criminals who are sitting in their basements halfway a... Read more

Source: fox13now.com

Top found tags: FBI(2),United States(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US firm creates 94 new jobs to fight cybercrimeLocation: Steele, United States
Date published: 19-08-2014

Over 90 new workers are being recruited in Belfast to assist the global fight against cybercrime in a 6m investment by NASDAQ-listed Proofpoint.The California-based company, which makes security products to detect malware and other malicious software, is creating 94 IT jobs with an average salary ... Read more

Source: www.belfasttelegraph.co.uk

Top found tags: social media(2),financial sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese Hackers Nab Info on Millions of U.S. PatientsLocation: Community Health Systems HQ - Franklin, United States
Date published: 18-08-2014

A group of Chinese hackers has stolen the personal information of about 4.5 million patients at hospitals operated by Tennessee-based Community Health Systems, according to a filing with the U.S. Securities and Exchange Commission. The data Relevant Products/Services, which was stolen in April and J... Read more

Source: www.toptechnews.com

Top found tags: medical sector(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Five Questions for Facebook's Security ChiefLocation: Sullivan, United States
Date published: 18-08-2014

Joe Sullivan sat in a suite atop the Rio Hotel, with his iPhone's Bluetooth and WiFi capabilities shut off. Eighteen floors below Sullivan, who is the chief security Relevant Products/Services officer at Facebook, were thousands of hackers who had descended on Las Vegas for their annual DEF CON gath... Read more

Source: www.mobile-tech-today.com

Top found tags: mobile device(2),social media(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Augmented Reality Opens New Possibilities for Cybercrime with Joe Rampolla of ARDirtLocation: Real, United States
Date published: 18-08-2014

Joe Rampolla was like any other police officer assigned to a cybercrime unit. But after seeing the posibilities for extreme good and potential abuse with VR and AR technologies, he wanted to go deeper. Hes not one of the most connected people in the Augmented Reality community, and in this interv... Read more

Source: techemergence.com

Top found tags: government(1),police(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile Messaging And Kids: How Aware Are Parents?Location: WhatsApp - Mountain View, United States
Date published: 21-08-2014

Messaging apps are the in thing today. Right from a collegian to the 40-something mother of two; from the local electrician trying to increase client base to the highly popular movie actor; everyone is part of some or the other chat group. Naturally then can children be far behind? They are th... Read more

Source: blogs.mcafee.com

Top found tags: mobile device(2),social media(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber Security Challenge joins with GCHQ for security development programmeLocation: GCHQ - Cheltenham, United Kingdom
Date published: 21-08-2014

The Cyber Security Challenge is linking with GCHQ to develop counter-espionage and cyber security skills for the real world. Cyber Security Challenge joins with GCHQ for security development programme Cyber Security Challenge joins with GCHQ for security development programme The Cyber Security Chal... Read more

Source: www.scmagazineuk.com

Top found tags: government(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
City of London police to get cybercrime trainingLocation: Londen, United Kingdom
Date published: 21-08-2014

With cybercrime responsible for seven out of ten fraud offences, according to data from the National Fraud Intelligence Bureau, the City of London police force is enlisting Russia-based security vendor Kaspersky Lab to bolster its cyber-crime-fighting prowess. Both businesses and the police have his... Read more

Source: www.scmagazineuk.com

Top found tags: malware(2),Kaspersky Lab(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Experts discover history of malware infections on network of Community Health SystemsLocation: Community Health Systems HQ - Franklin, United States
Date published: 21-08-2014

Following a major breach at Community Health Systems, security experts analyzed the hospital operator's network and discovered it had been plagued by malware infections for months. Of the 12,500 IP addresses associated with the CHS network, 10 were linked to malicious bots, such as Kelihos, Asprox, ... Read more

Source: www.scmagazine.com

Top found tags: Zeus(1),malware(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Bitcoin Phishing Campaign Targets 400 OrganizationsLocation: Proofpoint - Sunnyvale, United States
Date published: 20-08-2014

More than 400 organizations were recently targeted by a Bitcoin phishing campaign that intended to con users into disclosingtheir wallet passwords. According to Proofpoint, aCalifornia-based email security firm that recapped the campaign Wednesday, 12,000 messages were recently sent in two waves... Read more

Source: threatpost.com

Top found tags: cybercrime(2),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Reveton Ransomware Upgraded to Steal PasswordsLocation: Federal Bureau of Investigation - Washington D.C., United States
Date published: 20-08-2014

The notorious Reveton ransomware has been updated to steal passwords and credentials, according to researchers with security firm Avast. This latest edition affects more than 110 applications and turns the victim's computer into a botnet client. The malware also steals passwords from five crypto cur... Read more

Source: securityweek.com

Top found tags: child pornography(4),exploit kit(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Need a green traffic light all the way home? Easy with insecure street signals, say researchersLocation: University of Michigan - Ann Arbor, United States
Date published: 20-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Criminals monkeying with traffic lights are a staple of cinema: the 1969 Italian Job and Luc Besson's Taxi are particularly fine examples. Now researchers have demonstrated that fact is much less glamorous and simpler than fiction. Y... Read more

Source: go.theregister.com

Top found tags: patch(1),research(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UPS says 51 stores infected with credit card stealing malwareLocation: Lee, United States
Date published: 21-08-2014

Further Reading Grocery shoppers nationwide probably had credit card data stolen Coast-to-coast: Albertsons, Acme Markets, Jewel-Osco and more were hit. Dozens of UPS stores across 24 states, including California, Georgia, New York, and Nebraska, have been hit by malware designed to suck up credit c... Read more

Source: arstechnica.com

Top found tags: financial sector(2),government(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New twist as rogue antivirus enters death throesLocation: Microsoft HQ - Redmond, United States
Date published: 21-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Rogue and fake anti-virus has taken to the browser to find a smarter way of infecting users, Microsoft antivirus researcher Daniel Chipiristeanu says. The Defru malware blocked users from visiting certain websites and instead displayed warni... Read more

Source: go.theregister.com

Top found tags: malware(2),Microsoft(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Boffins propose security shim for AndroidLocation: Google HQ - Mountain View, United States
Date published: 21-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines An international group of researchers believes Android needs more extensible security, and is offering up a framework they hope either Google or mobe-makers will take for a spin. The project is described in this paper slated for the Usenix S... Read more

Source: go.theregister.com

Top found tags: cyber security(2),Germany(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US, German researchers create framework for core Android security modulesLocation: Google HQ - Mountain View, United States
Date published: 21-08-2014

International security researchers have offered up a framework for Google's Android operating system that allows users and developers to plug in extra security enhancements. The researchers, from North Carolina State University and Technische Universitat Darmstadt/CASED in Germany, have developed a ... Read more

Source: www.zdnet.com

Top found tags: Germany(2),cyber security(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bitcoin phishing campaign targets media, tech, education industriesLocation: Proofpoint - Sunnyvale, United States
Date published: 21-08-2014

A Bitcoin-based phishing campaign has targeted over 400 organizations with the intention of stealing cryptocurrency wallet passwords. California-based security company Proofpoint discussed the campaign on Wednesday. In a blog post, the security team said that due to its unregulated nature -- and the... Read more

Source: www.zdnet.com

Top found tags: trojan(2),financial sector(4),cybercrime(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
2014 ICS Cyber Security Conference: Register Today and Save $300Location: Georgia Institute of Technology - Atlanta, United States
Date published: 21-08-2014

2014 ICS Cyber Security Conference Discount Code Atlanta Oct. 20-23, 2014 - Georgia Tech Hotel and Conference Center Following a sold out event in 2013, the 2014 ICS Cyber Security Conference is expected to attract more than 250 professionals from around the world and again sell out. Attendees who r... Read more

Source: securityweek.com

Top found tags: ICS(2),cyber security(4),critical infrastructure(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NIST Developing Guide for Vetting Mobile AppsLocation: National Institute of Standards - Gaithersburg, United States
Date published: 21-08-2014

The National Institute of Standards and Technology (NIST) is requesting public comments on a guide designed to help organizations determine potential security and privacy risks posed by third-party mobile applications before putting them to use. Third-party mobile apps are often leveraged to increas... Read more

Source: securityweek.com

Top found tags: United States(2),cyber security(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Fake AV Attacks Decline as Cybercriminals Shift TacticsLocation: Microsoft HQ - Redmond, United States
Date published: 21-08-2014

Cybercrooks are not ready to give up on fake anti-virus attacks just yet and they're even coming up with new methods to trick victims into paying up. These rogue anti-virus camapigns display numerous virus warnings on infected machines in an effort to trick users into paying a fee to have the so-cal... Read more

Source: securityweek.com

Top found tags: social engineering(2),United States(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminals Embark on Bitcoin Phishing ExpeditionLocation: Proofpoint - Sunnyvale, United States
Date published: 21-08-2014

Attackers are playing on the hype around the crypto-currency Bitcoin to cast a wider phishing net looking for victims. It's not just bank credentials cyber-criminals are looking for. Enterprise information security firm Proofpoint detected 12,000 messages sent in two separate waves trying to trick v... Read more

Source: securityweek.com

Top found tags: cyber security(4),financial sector(4),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese hackers spied on investigators of Flight MH370 - reportLocation: Beijing, China
Date published: 21-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Malaysian officials investigating the disappearance of flight MH370 have been targeted in a hacking attack that resulted in the theft of classified material. The malware-based hacking attack hit around 30 PCs assigned to officials in the Mal... Read more

Source: go.theregister.com Ipswich man jailed over $500k \'card-skimming\' scam | A Springfield Lakes man will spend the best part of the next five years behind bars for his role in a sophisticated card-skimming operation that netted an international crime syndicate in Romania more than $553,000 in cash.Paul Owen Tovt, 38, pleaded guilty on Wednesday in the Brisbane District Court to one count of dealing in the proceeds of crime over a six-week period between February and April 2012 - just nine weeks after being released from jail on unrelated matters.Crown Prosecutor Anna Cunningham told the court Tovt recruited vulnerable people in Ipswich, Sunshine Coast, Gold Coast and Brisbane to withdraw cash from ATMs across southeast Queensland using cards that had been loaded up with stolen money.She said Tovt, along with a co-accused, obtained stolen Dutch bank account details and PIN numbers from the European-based crime syndicate and then scanned those details on to the magnetic strips of further stolen cards to access the cash.\"They used those people to withdraw money from ATMs using the cashed-up cards before making them send the money overseas via Western Union transfers,\" she said. | http://www.brisbanetimes.com.au/queensland/ipswich-man-jailed-over-500k-cardskimming-scam-20140821-106i0n.html | 21-08-2014 | www.brisbanetimes.com.au

Top found tags: government(3),cybercrime(5),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Nuclear Regulatory Commission successfully hacked three timesLocation: New York, United States
Date published: 20-08-2014

The US Nuclear Regulatory Commission (NRC), which houses detailed classified records about nuclear reactors, radioactive material storage and uranium processing plants, has been hacked three times over the past three years, according to a new report. US Nuclear Regulatory Commission successfully hac... Read more

Source: www.scmagazineuk.com

Top found tags: telecom sector(2),update(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hackers breach social network MeetMeLocation: New York, United States
Date published: 21-08-2014

Anyone who logged into social network MeetMe between Aug. 5 and Aug. 7 is being asked to change their password because hackers breached the MeetMe network and compromised certain user information. How many victims? Undisclosed. What type of personal information? Usernames, email addresses and encryp... Read more

Source: www.scmagazine.com

Top found tags: password(1),vulnerability(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Large number of Play Store apps vulnerable to Man-In-The-Middle attacksLocation: Google HQ - Mountain View, United States
Date published: 21-08-2014

Large number of Play Store apps vulnerable to Man-In-The-Middle attacks. A significant proportion of Google Play's most downloaded Android applications are susceptible to Man-In-The-Middle (MITM) attacks, according to the latest research. The FireEye Mobile Security Team revealed that a large number... Read more

Source: itproportal.com

Top found tags: Google(3),Google Play(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
RealVNC distances itself from factories, power plants, PCs hooked up to password-less VNCLocation: Las Vegas, Nevada, United States
Date published: 21-08-2014

A scan of the public internet by security researchers has seemingly revealed thousands upon thousands of computers fully accessible via VNC with no password required.Worryingly, the unsecured systems from PCs and shopping tills to terminals controlling factories and heating systems are a... Read more

Source: www.theregister.co.uk

Top found tags: VNC(1),cyber security(2),DEF CON(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacks of Smart Meters, Mobile Devices, Industrial Control Systems and ATMs Headline the Black Hat Europe 2014 LineupLocation: Black Hat - Las Vegas, United States
Date published: 20-08-2014

SAN FRANCISCO, Aug. 20, 2014 /PRNewswire/ -- Today, Black Hat [https://www.blackhat.com/], the world's leading family of information security events, highlights some of the nearly 50 high-intensity Briefings selected for Black Hat Europe 2014. Returning for its 14(th) year, Black Hat Europe will wel... Read more

Source: www.perssupport.nl

Top found tags: Black Hat(4),cyber security(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Smart city control networks being architected more securely than SCADALocation: New York, United States
Date published: 20-08-2014

Advocates of heavily instrumented 'smart city' infrastructure are acutely aware of the legacy left by insecure SCADA control systems and are instrumenting modern industrial-control networks with a higher degree of security, according to smart-cities architect Silver Spring Networks.Having seen a ... Read more

Source: www.cso.com.au

Top found tags: cyber security(2),vulnerability(2),critical infrastructure(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Survey Points to Security Concerns over SCADA/Industrial Control SystemsLocation: Microsoft HQ - Redmond, United States
Date published: 19-08-2014

Over the last decade, the various financial crises have pushed companies in every industry to improve efficiency and cut costs wherever they can. The recent ability to attach just about anything to the global Internet has enticed some critical infrastructure companies to interconnect their Superviso... Read more

Source: blogs.unisys.com

Top found tags: Ponemon Institute(2),critical infrastructure(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cracking smart house devices & pwning thousands of PCs via VNC remote accessLocation: NCC Group - Manchester, United Kingdom
Date published: 18-08-2014

The BBC had seven hackers in the form of penetration testers test out the security of a smart house full of smart devices connected to the Internet of Things; devices like a net-connected oven, a Blu-ray DVD player, a wireless electrical outlet plug, a baby monitor, an Internet-viewable ... Read more

Source: blogs.computerworld.com

Top found tags: vulnerability(1),cyber security(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Defru Malware Disguised as Anti-Virus Software Targets Windows Users in RussiaLocation: Microsoft HQ - Redmond, United States
Date published: 21-08-2014

Researchers at Microsoft have detected a new, relatively simple rogue anti-virus variant called Defru that attacks Windows users, and blocks them from accessing popular websites on the internet.The malware, detected as Rogue:Win32/Defru, masquerades as a genuine anti-virus program, and initiates fak... Read more

Source: www.ibtimes.co.uk

Top found tags: cyber security(2),Microsoft(2),social engineering(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google Voice Search On Android Smartphones Could be Exploited by MalwareLocation: Google HQ - Mountain View, United States
Date published: 20-08-2014

Researchers at the Chinese University of Hong Kong have developed a new malware application called VoicEmployer to show how criminals could use Android's voice search capabilities to steal sensitive information without needing explicit permissions from users.VoicEmployer exploits Google's Voice Sear... Read more

Source: uk.news.yahoo.com

Top found tags: Hong Kong(2),United States(2),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminals using Ebola outbreak to spread malware: SymantecLocation: Symantec HQ - Mountain View, United States
Date published: 20-08-2014

As the lethal Ebola outbreak continues to ravage West Africa, cybercriminals are exploiting the fear of epidemic by spreading malware.According to a blog post by security solutions provider Symantec, cybercriminals are \"using the latest headlines to bait victims\"\"Symantec has observed three malwa... Read more

Source: www.techtimes.com

Top found tags: trojan(2),United Arab Emirates(3),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Syrian malware is lurking, is dangerousLocation: Damascus, Damascus Governorate, Syria
Date published: 20-08-2014

The geopolitical conflicts of the Middle East have deepened in the last few years, particularly in Syria. The cyberspace conflict there is intensifying as sides try to tip the struggle in their favor by exploiting cyber intelligence and making use of obfuscation. Kaspersky Labs latest threat rese... Read more

Source: www.deccanchronicle.com

Top found tags: Syrian Electronic Army(3),Kaspersky Lab(4),cybercrime(11)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
'Reveton' ransomware upgraded with powerful password stealerLocation: Moscow, Russia
Date published: 19-08-2014

A type of malware called Reveton, which falsely warns users theyve broken the law and demands payment of a fine, has been upgraded with powerful password stealing functions, according to Avast.Reveton is in a class of nasty programs known as ransomware, which includes the notorious Cryptolo... Read more

Source: www.pcworld.com

Top found tags: malware(3),United Arab Emirates(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Pro-Syrian hackers using malware to launch attacks against rivalsLocation: Damascus, Damascus Governorate, Syria
Date published: 20-08-2014

Pro-Syrian hackers are compromising Internet users in numerous countries, with remote access tools (RATs) and other malware attacks aimed at users. Pro-Syrian hackers are using WhatsApp, Facebook, YouTube and Viber to share malware that is aimed at activists fighting for a regime change in Syria. In... Read more

Source: www.tweaktown.com

Top found tags: United Arab Emirates(3),Kaspersky Lab(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bugat Malware Adds GameOver FunctionalityLocation: IBM HQ - Armonk, United States
Date published: 18-08-2014

The GameOver Zeus botnet, disrupted only two months ago by an international joint operation, continues to echo throughout the cybercrime landscape. For instance, IBM X-Forces advanced malware researchers have detected a new variant of the Bugat malware that uses almost identical (and somewhat upg... Read more

Source: www.infosecurity-magazine.com

Top found tags: cybercrime(3),cyber security(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rise of the Super-Malware: why it matters to every professionalLocation: New York, United States
Date published: 18-08-2014

You already know about malware and youve learned not to click stupid links, but your company is vulnerable in more ways than just simple viruses sent over emails, with threats coming from new and increasingly intelligent sources.To help us better navigate these vulnerabilities for every company (... Read more

Source: agbeat.com

Top found tags: financial sector(2),exploit kit(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GCN Award winners, online privacy, Syrian malware and moreLocation: National Institute of Standards - Gaithersburg, United States
Date published: 18-08-2014

Six federal teams win 2014 GCN AwardsTen public-sector IT projects have earned a 2014 GCN Award, including six at the federal level.Each year, GCN -- an FCW sister publication -- honors projects where \"technical ingenuity, resourcefulness in the use of IT and tactics in managing projects have had a... Read more

Source: fcw.com

Top found tags: telecom sector(4),government(6),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Syrian Hackers Use WhatsApp, Viber, Facebook and YouTube to Spread Malware Aimed at ActivistsLocation: Damascus, Damascus Governorate, Syria
Date published: 18-08-2014

A group of pro-Assad hackers in Syria are using activist websites, WhatsApp, Viber, YouTube and social media to spread malware which claims to help protect privacy.The group of hackers has infected more than 10,000 victims using sophisticated techniques to hide the malware they are sharing on websit... Read more

Source: www.ibtimes.co.uk

Top found tags: cybercrime(3),social media(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cisco Brings Out Midyear Security ReportLocation: Cisco HQ - San Jose, United States
Date published: 18-08-2014

The Cisco 2014 Midyear Security Report was released at Black Hat U.S.According to a company release, the Cisco 2014 Midyear Security Report examines threat intelligence and cybersecurity trends for the first half of 2014.John Stewart, senior vice president, chief security officer, Cisco, said: \"Man... Read more

Source: insurancenewsnet.com

Top found tags: United States(2),Black Hat(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Energy companies slow to buy cyberdamage insuranceLocation: New York, United States
Date published: 18-08-2014

The U.S. oil industry will spend $1.87 billion on cybersecurity defense systems by 2018, but less than 20 percent of U.S. companies overall are covered for cyberdamages. Imagine what could happen if a large refinery or petrochemical facilitys safety monitoring systems were hijacked near an urb... Read more

Source: www.homelandsecuritynewswire.com

Top found tags: government(2),United States(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crime Watch: Nosy parents can prevent cyber-bullyingLocation: New York, United States
Date published: 20-08-2014

Many of you emailed me regarding last week article on cyber-bullying as to what you can do as parents. You can start by talking to your kids about the issue and teaching them the rules below, which will help prevent cyber-bullying from happening to them or someone they know.One of the biggest challe... Read more

Source: www.miamiherald.com

Top found tags: smartphone(2),mobile device(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US Nuclear Regulator Hit by Foreign Cyber AttacksLocation: Microsoft HQ - Redmond, United States
Date published: 19-08-2014

US nuclear regulator the Nuclear Regulatory Commission has been hit by at least three major cyber attacks over the past three years designed to steal user log-in credentials and infect machines, according to a new report.An Inspector General report obtained by Nextgov and covering the period 2010 to... Read more

Source: www.infosecurity-magazine.com

Top found tags: scam(1),cyber security(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber security and policing meet in KochiLocation: Kochi, India
Date published: 19-08-2014

Thiruvananthapuram: New methods to tackle cyber crimes will be discussed at a two-day conference on cyber security and policing at Kochi from August 22. The conference, hosted by state police in association with Kerala IT Mission, Information Security Research Association and Society for the Policin... Read more

Source: zeenews.india.com

Top found tags: cyber security(2),information security(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Premier FBI Cyber-Squad in US Rewarded With More ManpowerLocation: Pittsburgh, United States
Date published: 18-08-2014

The FBI's premier cyber-squad has focused attention on computer-based crime in recent months by helping prosecutors charge five Chinese army intelligence officials with stealing trade secrets from major companies and by snaring a Russian-led hacking ring that pilfered $100 million from bank accounts... Read more

Source: gadgets.ndtv.com

Top found tags: financial sector(2),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brunei needs cyber security personnelLocation: National Security Agency - Fort Meade, United States
Date published: 18-08-2014

CYBER threats and cyber security were the main topics of discussion this week in Las Vegas at Black Hat and Def Con, two of the world's largest gatherings for security professionals and hackers. Dan Geer, who works for In-Q-Tel, a venture capital firm serving US intelligence agencies, was of the vie... Read more

Source: www.bt.com.bn

Top found tags: government(5),United States(6),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rwanda: Soaring Cybercrime Calls for Cyber InsuranceLocation: New York, United States
Date published: 18-08-2014

The recent hacking of twitter accounts of high profile government institutions in Kenya brings to mind the significant changes in the level of sophistication of cyber-security threats since 1986 when the first known case of a computer virus was reported.A few years ago, the development and dissemina... Read more

Source: allafrica.com

Top found tags: financial sector(4),telecom sector(4),cybercrime(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
High cybercrime calls for insuranceLocation: Bogota, Colombia
Date published: 20-08-2014

THE recent hacking of twitter accounts of high-profile government institutions in Kenya brings to mind the significant changes in the level of sophistication of cyber-security threats since 1986 when the first known case of a computer virus was reported. A few years ago, the development and dissemin... Read more

Source: www.daily-mail.co.zm

Top found tags: cyber security(4),telecom sector(4),cybercrime(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime: Is it Worth Eradicating the Humble Password?Location: Center for Strategic and International Studies - Washington, United States
Date published: 19-08-2014

The impact of cybercrime has rocked companies' systems over the last two decades and has cost firms billions of dollars in losses after being hacked.So, IBTimes UK caught up with tech group Nuance's director product management, Seb Reeve, at Nuance Communications who believes that now is the time to... Read more

Source: www.ibtimes.co.uk

Top found tags: cyber security(2),financial sector(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime wave whacks European banksLocation: Trend Micro - Cupertino, United States
Date published: 18-08-2014

Banks across Europe are now coping with a wave of cybercrime in which crooks are transferring funds out of customer accounts through a scam involving bypassing some two-factor authentication systems to steal large sums, according to a security firm assisting in the investigation.The funds transfers ... Read more

Source: www.networksasia.net

Top found tags: Germany(2),Trend Micro(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Chinese man indicted over theft of Boeing C-17 secretsLocation: Beijing, China
Date published: 18-08-2014

A Chinese man has been indicted for allegedly directing two China-based hackers to infiltrate Boeing and other defense contractors to steal gigabytes of documents describing U.S. military aircraft.Su Bin, a Chinese national in his late 40s, was indicted in the U.S. District Court for the Central Dis... Read more

Source: www.computerworld.com

Top found tags: e-mail(2),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
US universities at greater risk for security breaches than retail and healthcare: BitSightLocation: Lea, United States
Date published: 21-08-2014

The back-to-school season is a busy time for many, even hackers. According to a new report by the security rankings provider BitSight Technologies, higher education institutions experience an influx in malicious cyberattacks during the school year. But what's worse is that most of those universities... Read more

Source: www.zdnet.com

Top found tags: cybercrime(3),education(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UPS Admits 51 Stores Hit With Malware For Five MonthsLocation: UPS HQ - Atlanta, United States
Date published: 21-08-2014

The list of corporations that have been victimized by credit card stealing malware in 2014 grew a little longer this week as UPS announced that 51 of its stores suffered a broad-based malware intrusion earlier this spring. The company disclosed the breach which affected franchised location... Read more

Source: threatpost.com

Top found tags: cyber security(2),financial sector(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
SSL Vulnerabilities in Google Android Apps Left Many Users Open to MITMLocation: Google HQ - Mountain View, United States
Date published: 21-08-2014

An analysis of free applications in the Google Play app store found many popular Android apps had SSL vulnerabilities that left them susceptible to man-in-the-middle attacks (MITM). FireEye's Mobile Security Team examined the 1,000 most-downloaded free applications in the Google Play app store and f... Read more

Source: securityweek.com

Top found tags: Google(2),Google Play(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Developers Get Advice on Hardening Tor Browser BundleLocation: Mozilla - Mountain View, United States
Date published: 21-08-2014

A recent study conducted by iSEC Partners provided the developers of the Tor Browser Bundle with several long and short-term recommendations on how to make the application more secure. The study, commissioned by the Open Technology Fund, the primary funder of the Tor Browser, focused on reviewing cu... Read more

Source: securityweek.com

Top found tags: vulnerability(2),Google(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vulnerability in In-App Payment SDKs May Lead to PhishingLocation: Google HQ - Mountain View, United States
Date published: 21-08-2014

Vulnerabilities in apps are always a cause for concern, especially when said apps handle sensitive information, particularly financial. We examined two popular in-app payment (IAP) SDKsGoogle Wallet and the Chinese payment platform Alipayand discovered that these contain a vulnerability that c... Read more

Source: trendmicro.com

Top found tags: cybercrime(4),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AOL announces that it does not follow 'Do Not Track' requestsLocation: New York, United States
Date published: 21-08-2014

AOL amended its privacy policy this past week and elaborated on its decision not to respond to web browsers' Do Not Track (DNT) signals. Similarly to Yahoo's recent decision, AOL noted that the lack of a standard on DNT requests allows companies to interpret them as they want, and AOL has opte... Read more

Source: www.scmagazine.com

Top found tags: privacy(1),website(1),cyber security(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Todays tech: Vulnerability in Google Play apps, Copyright holders hate piracy, graduates pay for a job in a startupLocation: Google HQ - Mountain View, United States
Date published: 21-08-2014

ITProNate. Todays tech: Vulnerability in Google Play apps, Copyright holders hate piracy, graduates pay for a job in a startup I'm looking for the Man-In-The-Middle Large number of Play Store apps vulnerable to Man-In-The-Middle attacks According to FireEye Mobile Security, 68 per cent of the 100... Read more

Source: itproportal.com

Top found tags: Google(3),Google Play(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

UPS Store hit with malware attack in 51 franchised locationsLocation: New York, United States
Date published: 20-08-2014

attack that put customer credit and debit card data at risk from Jan. 20 to August 11. In a statement, UPS Store said that it was hit with a broad malware attack that anti-virus software didn't pick up. UPS Store was notified by federal investigators and then reviewed its systems. upsstore The compa... Read more

Source: www.zdnet.com

Top found tags: fraud(1),cybercrime(2),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Big Data Overwhelms Security TeamsLocation: Arbor Networks - Burlington, United States
Date published: 20-08-2014

A major contributing factor in many recent data breaches has been the fact that many IT security teams are simply overwhelmed by the volume of data they're handling. During last fall's massive Target breach, for example, the company's intrusion detection software triggered several alerts, but Target... Read more

Source: www.esecurityplanet.com

Top found tags: data breach(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercriminals Deliver Point-of-Sale Malware to 51 UPS Store LocationsLocation: New York, United States
Date published: 21-08-2014

UPS Store Data Breach The UPS Store said on Wednesday that computer systems at several of its franchised center locations had been infected with stealthy malware that went undetected by its anti-virus software and put customer credit and debit card information at risk. The shipping giant said that i... Read more

Source: securityweek.com

Top found tags: cybercrime(6),government(6),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UPS Store hacked, possibly compromising user dataLocation: New York, United States
Date published: 21-08-2014

The UPS Store is the latest retail chain to be targeted in a data breach leading to the theft of customers' credit card information. The shipping and business services store announced Wednesday that 51 US stores in 24 states had been hacked via a malware intrusion on the store's computer systems. Th... Read more

Source: cnet.com.ortal.com

Top found tags: data breach(2),financial sector(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UPS Store hacked, possibly compromising user dataLocation: New York, United States
Date published: 21-08-2014

The UPS Store is the latest retail chain to be targeted in a data breach leading to the theft of customers' credit card information. The shipping and business services store announced Wednesday that 51 US stores in 24 states had been hacked via a malware intrusion on the store's computer systems. Th... Read more

Source: cnet.com.ortal.com

Top found tags: data breach(2),financial sector(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The week in security: Old malware continues onslaught as new devices found vulnerableLocation: Kaseya HQ - Lausanne, Switzerland
Date published: 20-08-2014

A broad study of equipment firmware found poor security practices are rife, with weaknesses presenting new opportunities for hackers to exploit the emerging 'Internet of Things'. Seemingly confirming their fears, a hacking contest found 15 new router vulnerabilities while others warned that the emer... Read more

Source: www.cso.com.au

Top found tags: malware(3),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to survive data breachesLocation: New York, United States
Date published: 18-08-2014

Data breaches are fast becoming a fact of digital life. The WEF offers a way to recover if one happens to hit. While reading Cisco's 2014 Midyear Security Report, I learned about an organization called World Economic Forum (WEF): an international nonprofit foundation committed to improving the state... Read more

Source: www.techrepublic.com

Top found tags: cyber resilience(2),data breach(2),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
News junkies make great targetsLocation: Verizon HQ - New York, United States
Date published: 19-08-2014

As Internet users become more attuned to well-known spamming and phishing attacks, cyber criminals have to invent new ways to lure them into opening a malware-laden email or clicking on a link that goes to a malicious website.As an avid news reader, I know I'd be much more likely to click on one of ... Read more

Source: www.nationmultimedia.com

Top found tags: cybercrime(2),data breach(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
IT Security Stories to Watch: Albertsons Data Breach, Ebola MalwareLocation: Supervalu HQ - Eden Prairie, United States
Date published: 18-08-2014

This week's IT security stories to watch looks at recent hacker attacks on several U.S. grocery store chains, including Albertsons, ACME Markets and Supervalu (SVU). Details about the cyber attacks against these supermarkets are still being released, but the news shows just how important IT security... Read more

Source: mspmentor.net

Top found tags: United States(2),cyber security(4),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Major supermarket chains experience data breachLocation: Supervalu HQ - Eden Prairie, United States
Date published: 20-08-2014

Supervalu, one of the countrys largest grocery retailers, announced a criminal intrusion into the payment processing systems for many of its supermarket and liquor stores and franchises, resulting in the potential theft of payment card information for customers at least 200 stores and possi... Read more

Source: www.cyberrisknetwork.com

Top found tags: legislation(1),report(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
UPS becomes latest data breach victimLocation: UPS HQ - Atlanta, United States
Date published: 21-08-2014

Package delivery giant UPS has become the latest company to admit that customer payment card details may be at risk after it discovered malware at 51 of its US stores. UPS says that customers who used credit and debit cards at 51 of its 4,470 franchised sites between 20 January and 11 August are at ... Read more

Source: www.paymentscardsandmobile.com

Top found tags: cybercrime(2),data breach(2),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Heartbleed behind massive healthcare data breachLocation: Community Health Systems HQ - Franklin, United States
Date published: 21-08-2014

Further details are emerging on the massive data breach at US hospital operator Community Health Systems (CHS) that saw around 4.5 million patient records leaked.Security vendor TrustedSec claimed yesterday that the \"Heartbleed\" in the open source OpenSSL cryptographic library was to blame for the... Read more

Source: www.itnews.com.au

Top found tags: OpenSSL(2),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kirkland police searching for dangerous identity theft fugitiveLocation: New York, United States
Date published: 20-08-2014

KIRKLAND Kirkland Police are asking for the publics help in tracking down Jocelyn Ruiz.Investigators say Ruiz not only stole a womans identity, but also conspired with two associates to rob her in retaliation for filing an identity theft report.Shes able to change the group of people... Read more

Source: q13fox.com

Top found tags: credit card(2),financial sector(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Attorney General Patrick Morrisey Warns Consumers About Data Breach at West Virginia HospitalsLocation: Community Health Systems HQ - Franklin, United States
Date published: 18-08-2014

CHARLESTON, W.Va., Aug. 18 -- The West Virginia Attorney General issued the following news release:Attorney General Patrick Morrisey is warning consumers about a data breach reported by Community Health Systems Inc., the parent company of four hospitals in southern West Virginia: Bluefield Regional ... Read more

Source: insurancenewsnet.com

Top found tags: health sector(4),medical sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mesa View Medical Patients Affected By Major Data BreachLocation: Mesa, United States
Date published: 20-08-2014

Community Health Systems (CHS), the second biggest for-profit U.S. hospital chain and the company that owns Mesa View Regional Hospital in Mesquite, was the target of a criminal cyber-attack in recent months, according to the company.In a recent statement, the company said that Chinese hackers had s... Read more

Source: mvprogress.com

Top found tags: medical sector(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
What to do When a Data Breach OccursLocation: New York, United States
Date published: 20-08-2014

While information security risks have existed for a long timeseveral U.S. Civil War battles, for instance, were decided by military details secretly obtained by the opposing sidetoday they bring with them challenging complexities and costly ramifications for businesses. U.S. consumer cyber-att... Read more

Source: www.cioinsight.com

Top found tags: information security(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Breach Alert at 180 Albertsons Stores in Southern CaliforniaLocation: California, United States
Date published: 19-08-2014

The parent company of Albertsons said Friday that hackers breached data security at the grocery chain, including Southern California stores, and attempted to steal debit and credit card information.Boise, Idaho-based AB Acquisition LLC said more than 700 Albertsons stores nationwide are affected, in... Read more

Source: www.allgov.com

Top found tags: credit card(2),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Millions of card numbers likely stolen during Supervalu data breach, security expert saysLocation: Supervalu HQ - Eden Prairie, United States
Date published: 19-08-2014

Supervalu has not said how many consumers were affected by its data breach, but one security expert believes that the number of credit card accounts involved could be \"in the millions.\"The Eden Prairie-based grocery retailer and wholesaler disclosed the data breach last week, saying hackers infilt... Read more

Source: www.bizjournals.com

Top found tags: security management(2),United States(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Breach Compromises Community Health System Patient DataLocation: Community Health Systems HQ - Franklin, United States
Date published: 18-08-2014

A cyberattack by computer hackers has compromised personal data on 4.5 million patients seen by doctors affiliated with Community Health Systems, the nationwide hospital system that owns three of Polk County's five hospitals.Those hospitals are Lake Wales Medical Center, Heart of Florida Regional Me... Read more

Source: www.theledger.com

Top found tags: health sector(4),medical sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Local hospitals affected in Massive Data BreachLocation: Community Health Systems HQ - Franklin, United States
Date published: 19-08-2014

In the wake of the announcement that the parent company of Northwest Medical Center and Oro Valley Hospital was the victim of a massive data-breach, Better Business Bureau Serving Southern Arizona is urging consumers to take steps to safeguard their identities.Community Health Systems (CHS), which o... Read more

Source: explorernews.com

Top found tags: identity theft(2),medical sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lisa Madigan: Identity theft a problem for IllinoisansLocation: Illinois, United States
Date published: 19-08-2014

Identity theft continues to be a pervasive problem for the state's consumers, Illinois Attorney General Lisa Madigan told business and government leaders during a visit to Belleville on Tuesday.Madigan held a consumer fraud seminar at Southwestern Illinois College and then spoke at a meeting of the ... Read more

Source: www.bnd.com

Top found tags: data breach(2),government(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Crestwood Medical Center to send letters to patients affected by hack, offer free identity theft protectionLocation: Community Health Systems HQ - Franklin, United States
Date published: 18-08-2014

HUNTSVILLE, Ala. (WHNT) Crestwood Medical Center, owned by Community Health Systems, released a statement Monday following news CHS hospitals had fallen victim to computer hackers.The news means data was stolen on 4.5 million patients, including patients who were seen at Crestwood in recent year... Read more

Source: whnt.com

Top found tags: medical sector(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Patient info, Social Security numbers leaked in CHS data breachLocation: Community Health Systems HQ - Franklin, United States
Date published: 18-08-2014

YOUNGSTOWN, Ohio (WKBN) Community Health Systems, the operator of three area hospitals, revealed in a government report Monday that a July security breach compromised patient information, including names, phone numbers and Social Security numbers.CHS said they believed the attacker to be a group... Read more

Source: wkbn.com

Top found tags: United States(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
4.5 million patients info stolen from Community Health in hospital data breachLocation: Community Health Systems HQ - Franklin, United States
Date published: 18-08-2014

(Reuters) - U.S. hospital operator Community Health Systems Inc said it suspected personal data, including patient names and addresses, of about 4.5 million people were stolen by Chinese hackers from its computer network during April and June.The company said the data, considered protected under the... Read more

Source: medcitynews.com

Top found tags: health sector(4),medical sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Supervalu says 180 stores affected in data breachLocation: Supervalu HQ - Eden Prairie, United States
Date published: 18-08-2014

Aug. 18, 2014 Nationwide supermarket chain Supervalu Inc. alerted its customers Thursday to a potential data breach on its point-of-sales network sometime between June 22 through July 17 at 180 of its stores and stand-alone liquor stores.The companys statement said the investigation is ongoin... Read more

Source: nafcu.org

Top found tags: United States(2),telecom sector(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach in Jewel-Osco Stores DiscoveredLocation:
Date published: 18-08-2014

Once again, yet another store falls prey to hackers and this time it is Jewel-Osco which has suffered a massive data-breach. The company's system was hacked and the thieves stole data of the customers which could number in millions. Their personal information can be compromised and misused.A spokesm... Read more

Source: topnews.us

Top found tags: hacked(1),hackers(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Is ID Theft Worse If Youre In the Military?Location: New York, United States
Date published: 18-08-2014

Identity theft can wreak havoc on a persons life impacting their finances, health and good standing in the community. This growing crime poses an even greater threat for military personnel who require security clearance to do their jobs.Security clearance gives military personnel, as well as ... Read more

Source: blog.credit.com

Top found tags: financial sector(2),government(2),identity theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
14 Charged in Puerto Rico in U.S. Identity Theft SchemeLocation: San Juan, Puerto Rico
Date published: 18-08-2014

SAN JUAN -- Fourteen individuals were charged in three indictments in Puerto Rico with conspiracy to commit identification fraud, money laundering, aggravated identity theft and passport fraud in connection with their alleged roles in a scheme to traffic the identities and corresponding identity doc... Read more

Source: www.laht.com

Top found tags: government(1),identity theft(2),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cost of Target Data Breach: $148 Million Plus Loss of TrustLocation: Target HQ - Minneapolis, United States
Date published: 20-08-2014

The now infamous Target data Relevant Products/Services breach is still costing the company -- and its shareholders -- plenty. In fact, the retailing giant forecast the December 2013 incident cost shareholders $148 million. The company also lowered its full-year earnings forecast in the wake of the ... Read more

Source: www.cio-today.com

Top found tags: report(1),data breach(2),data theft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Digital Forensics Program Prepares Students to Tackle CybercrimeLocation: Albany, United States
Date published: 18-08-2014

ALBANY, N.Y. (August 18, 2014) The new digital forensics program at the University at Albany is designed to educate and prepare students to work in a fast-growing, billion-dollar market with high, long-term projected demand for trained professionals.Similar to DNA forensic scientists in the phys... Read more

Source: www.albany.edu

Top found tags: financial sector(4),cybercrime(5),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Facebook Internet Defense Prize Pays Out $50,000 AwardLocation: Facebook - Menlo Park, United States
Date published: 21-08-2014

Large technology companies may already have bug bounty programs in place that reward researchers who attack and find holes in software or web platforms. Slowly, some are also starting to institute programs that pay for defensive measures. Facebook is the latest to do so with the implementation of it... Read more

Source: threatpost.com

Top found tags: Microsoft(2),social media(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

UPS announces breach impacting 51 U.S. locationsLocation: New York, United States
Date published: 20-08-2014

More than 50 of The UPS Store's U.S. locations were found to have malware on their computer systems, and in some cases, it's been present since mid-January. Following an investigation by the company and an unnamed IT security firm, the majority of the affected shipping and printing stores were expos... Read more

Source: www.scmagazine.com

Top found tags: EN(1),government(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Community Health Systems attackers exploited Heartbleed bug for access, firm saysLocation: TrustedSec - Strongsville, United States
Date published: 20-08-2014

Community Health Systems attackers exploited Heartbleed bug for access, firm says Sources close to the breach investigation tipped off TrustedSec CEO David Kennedy. The CEO of a security firm believes that the major Community Health Systems (CHS) breach impacting four million patients started with t... Read more

Source: www.scmagazine.com

Top found tags: Juniper Networks(2),medical sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Symantec pumps $12m into Sydney security centreLocation: Sydney, Australia
Date published: 21-08-2014

Symantec senior vice president for Asia Pacific and Japan Adrian Brenton said the office will enable the company to improve the company's "advance capability for customers and governments alike in Asia Pacific and globally". Moving from its previous location in North Sydney, the new Kent Street offi... Read more

Source: www.zdnet.com

Top found tags: Australia(2),government(2),New Zealand(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amazon flicks switch on CloudFront security featuresLocation: New York, United States
Date published: 21-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Amazon has beefed up security on its CloudFront services, adding Perfect Forward Secrecy, OCSP stapling and session tickets to its SSL support. The company describes the new AWS features in full in this blog post. Session tickets are designe... Read more

Source: go.theregister.com

Top found tags: Linux(1),RSA(1),SSL (1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Slapdash SSL code puts tons of top Android Play Store apps in hack perilLocation: Google HQ - Mountain View, United States
Date published: 21-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Sloppy programming, poor patching, and unreliable trust engines are rife within Android apps, according to a new study. In short, millions smartphone users are potentially wide open to man-in-the-middle attacks, it's claimed. Researchers at ... Read more

Source: go.theregister.com

Top found tags: Google(3),Google Play(4),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hear ye, young cyber warriors of the realm: GCHQ wants youLocation: GCHQ - Cheltenham, United Kingdom
Date published: 21-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Spooks have called upon the good people of Blighty to help protect an airline from attack by a vicious group of nerdy cyber-terrorists. That might sound like the secret services are getting a bit desperate, but don't worry kids: it's only a ... Read more

Source: go.theregister.com

Top found tags: airport(2),airport sector(2),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Skimming device found at Sunderland ATMLocation: Green, United States
Date published: 21-08-2014

TWO people have been arrested after a skimming device was recovered from a cash machine at a Sunderland bank.The item, which is used to read peoples card details and can then be used to be obtain cash illegally, was found at a machine at Barclays, in The Green, Southwick.An eagle-eyed member of t... Read more

Source: www.sunderlandecho.com

Top found tags: report(1),skimming(1),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why was this Sainsbury's Bank credit card fraud so easy to commit?Location: Warwick, United Kingdom
Date published: 15-08-2014

The thieves took 9,000 and even requested an increase in my credit limit.My wife and I have Sainsbury's Bank credit cards which we use for all our shopping, and typically pay between 700 and 900 a month to service the account. At the end of June the debit balance was just over 1,000. When I ... Read more

Source: www.theguardian.com

Top found tags: credit card(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New Orleans restaurant warns customers of credit card fraudLocation: Orleans, United States
Date published: 19-08-2014

NEW ORLEANS, LA (WVUE) -A New Orleans restaurant warns its customers to be on the lookout for credit card fraud.Mizado Cocina on Pontchartrain Blvd. says someone installed malicious malware on its point of sale system, compromising some customers card data.A statement from the restaurant says earlie... Read more

Source: www.fox8live.com

Top found tags: fraud(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Man arrested on credit card fraud, theft chargesLocation: Target HQ - Minneapolis, United States
Date published: 19-08-2014

GLEN BURNIE, Md. Anne Arundel County police have arrested a man who they said bought almost $17,000 worth of gift cards using more than 100 suspected cloned credit cards, and investigators said there may be more victims.County police said officers were called around 5 p.m. Thursday to the Target ... Read more

Source: www.wbaltv.com

Top found tags: police(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Twitter tells tale of LinkedIn outageLocation: New York, United States
Date published: 20-08-2014

From Friday, Aug. 15 until the morning of Aug. 18, Linkedin was not available to some of its wired Internet users; though the outage didnt affect Android and iOS mobile users. The analysis of the GEO tags of about a 100 English language tweets revealed the locations of users who experienced the o... Read more

Source: www.networkworld.com

Top found tags: report(1),Twitter(1),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Black Hat 2014 Advanced Malware Survey ResultsLocation: Black Hat - Las Vegas, United States
Date published: 21-08-2014

Where certain flamboyant IPOs and mergers might lead one to think advanced malware was a solved problem, Black Hat demonstrated just the opposite. This year, we uncovered that security experts are still spending days and weeks of each month dealing with advanced malware. In response to this realizat... Read more

Source: blogs.mcafee.com

Top found tags: threat(1),conference(2),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft: We plan to CLEAN UP this here Windows Store townLocation: Microsoft HQ - Redmond, United States
Date published: 21-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Microsoft has promised to crack down on rogue apps in its Windows Store following criticisms that the marketplace is littered with "scam" software. Windows Store which debuted with Windows 8 is littered with misleading apps. Typical ... Read more

Source: go.theregister.com

Top found tags: Microsoft(2),Google(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft Recalls Security Patch That Crashes PCsLocation: Microsoft HQ - Redmond, United States
Date published: 18-08-2014

One of Microsoft's recent security patches has created an even worse bug than it patched: Under certain circumstances, the faulty patch causes Windows computers to crash, reboot and then get stuck in an infinite rebooting loop.Microsoft has since recalled the patch. For people already caught in the ... Read more

Source: www.tomsguide.com

Top found tags: USB (1),Windows(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Hacker targets info on MH370 probeLocation: Kuala Lumpur, Malaysia
Date published: 20-08-2014

EXCLUSIVE: KUALA LUMPUR: The computers of high-ranking officials in agencies involved in the MH370 investigation were hacked and classified information was stolen.The stolen information was allegedly being sent to a computer in China before CyberSecurity Malaysia a Ministry of Science, Technolog... Read more

Source: www.thestar.com.my

Top found tags: airport(2),airport sector(2),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The USB malware vectorLocation: New York, United States
Date published: 19-08-2014

Summary: You're having a coffee and surfing when an apologetic stranger asks if she can charge her Android phone on your USB port. But she's installing malware on your PC. Here's how to stop it.Ease of use trumped security in the USB design. Devices don't need a unique serial number. There's no way ... Read more

Source: www.zdnet.com

Top found tags: webcam(1),update(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
German bank adds protection against ATM malware uploadLocation: Berlin, Germany
Date published: 18-08-2014

ING-DiBa, Germany's third largest private consumer bank with more than eight million customers, has installed the NCR Solidcore Suite for APTRA security software on its 1,300 ATMs, according to a company press release.NCR Solidcore Suite for APTRA proactively allows only authorized code to run, rath... Read more

Source: www.atmmarketplace.com

Top found tags: EN(1),Germany(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
GCHQ Scans Entire Countries for Flaws to Exploit ReportLocation: GCHQ - Cheltenham, United Kingdom
Date published: 18-08-2014

British spy agency GCHQ has since 2009 been port scanning every available IP address in 27 countries across the globe for vulnerable systems to exploit, according to a new report.The HACIENDA program was exposed in secret documents obtained by reporters writing for German publisher Heise.Its purpose... Read more

Source: www.infosecurity-magazine.com

Top found tags: threat(1),United Kingdom(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Amazon CloudFront Turns on Perfect Forward SecrecyLocation: Microsoft HQ - Redmond, United States
Date published: 21-08-2014

Add Amazon to the growing list of technology providers ensuring that its encryption capabilities exceed a minimum standard. Yesterday, the company announced that its web content delivery platform Amazon CloudFront had turned on Perfect Forward Secrecy, in addition to a number of changes designed to ... Read more

Source: threatpost.com

Top found tags: SSL (1),Twitter(1),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
With Black Hat and DefCon comes spike in Vegas-based attacksLocation: Black Hat - Las Vegas, United States
Date published: 21-08-2014

When security professionals flood Las Vegas for Black Hat and DefCon, they bring more than just their bags. An Imperva study found that during the conferences, attack traffic spiked to 130 times the usual amount, as compared to typical days in the city. About 20 attacks normally originate from Las V... Read more

Source: www.scmagazine.com

Top found tags: DEF CON(2),conference(3),Black Hat(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

No advisories for today, maybe tomorrow!

Dutch cybercrime related news

Creditcardstelende malware in 51 UPS-winkels aangetroffenLocation: New York, United States
Date published: 21-08-2014

Transportbedrijf UPS heeft klanten gewaarschuwd dat er in 51 Amerikaanse winkels in 24 staten malware is aangetroffen die mogelijk creditcardgegevens van klanten heeft gestolen. De malware in de UPS Stores was tussen 20 januari en 11 augustus van dit jaar actief op de kassasystemen van de vervoerder... Read more

Source: www.security.nl

Top found tags: cybercrime(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Britse politie wil verplicht wachtwoord op elke telefoonLocation: London,United Kingdom
Date published: 21-08-2014

De Britse Metropolitan Police is al meer dan twee jaar aan het lobbyen bij telefoonfabrikanten en de overheid om ervoor te zorgen dat elke nieuw verkochte telefoon in Groot-Brittanni van een wachtwoord is voorzien. Agenten zouden zowel met Apple als Samsung over de maatregelen hebben gesproken. Op... Read more

Source: www.security.nl

Top found tags: identity theft(2),government(3),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
China may be targeting medical firms for IP dataLocation: Beijing, China
Date published: 21-08-2014

Very little companies can do to defend themselves against state-sponsored attacks, says Storm Guidance director Sarb Sembhi. China may be targeting medical firms for IP data China may be targeting medical firms for IP data Bloomberg has an interesting analysis on the reported theft of personal data ... Read more

Source: www.scmagazineuk.com

Top found tags: medical sector(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber spies whip out 'Machete', stride towards Latin AmericaLocation: Kaspersky HQ - Moscow, Russia
Date published: 21-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Security watchers are tracking a new cyber-espionage campaign that appears to be targetting Latin American countries including Venezuela, Colombia and Ecuador. The so-called "Machete" campaign has been zoning in on governments, military and ... Read more

Source: go.theregister.com

Top found tags: Kaspersky Lab(4),telecom sector(4),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Germany unveils draft cyber security law to protect critical infrastructureLocation: Berlin, Germany
Date published: 21-08-2014

Draft legislation that would pave the way for the introduction of tough new cyber security measures to protect critical infrastructure in Germany has been unveiled by the countrys federal interior ministry.The ministry said the draft IT security requirements would apply to telecommunication... Read more

Source: www.out-law.com

Top found tags: cyber security(4),telecom sector(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
OM eist celstraf en TBS tegen man die 2.000 pc's besmetteLocation: Openbaar Ministerie - Den Haag, The Netherlands
Date published: 21-08-2014

Het Openbaar Ministerie heeft vandaag een celstraf van 4,5 maanden en TBS met voorwaarden geist tegen de 19-jarige Rotterdammer die 2.000 computers met malware infecteerde en vervolgens zijn slachtoffers via hun eigen webcam bekeek en filmde. De man werd vorig jaar december gearresteerd. De Rotter... Read more

Source: www.security.nl

Top found tags: cybercrime(3),government(3),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

Onderzoekers vinden kwetsbaarheden in verkeerslichtenLocation: San Diego, United States
Date published: 21-08-2014

Onderzoekers hebben deze week laten zien dat de verkeerslichten die in de VS worden gebruikt kwetsbaarheden bevatten waardoor het mogelijk is om de lichten te manipuleren. Met toestemming wisten de onderzoekers van de Universiteit van Michigan op bijna 100 verkeerslichten in te breken. In totaal ont... Read more

Source: www.security.nl

Top found tags: cyber security(2),information security(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers smokkelen wapens langs bodyscanners TSALocation: New York, United States
Date published: 21-08-2014

Een team van onderzoekers aan drie Amerikaanse universiteiten is erin geslaagd om wapens en explosieven langs de bodyscanners te smokkelen die de Transport Security Administration (TSA) op Amerikaanse vliegvelden gebruikt. Ook bevestigden ze een eerdere manier om de scanners te omzeilen. Deze method... Read more

Source: www.security.nl

Top found tags: financial sector(2),government(3),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other Dutch news

Facebook reikt prijs uit voor bescherming van internetLocation: Facebook - Menlo Park, United States
Date published: 21-08-2014

Tijdens het USENIX Security Symposium in San Diego heeft Facebook aan twee Duitse onderzoekers een prijs ter waarde van 50.000 dollar uitgereikt voor hun inzet om het internet te beschermen. De "Internet Defense" prijs ging naar Johannes Dahse en Thorsten Holz van de Ruhr-Universitt Bochum. Facebo... Read more

Source: www.security.nl

Top found tags: vulnerability(1),webserver(1),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diefstal gegevens 4,5 miljoen patinten via lek in Juniper VPNLocation: TrustedSec - Strongsville, United States
Date published: 21-08-2014

De aanvallers die de gegevens van 4,5 miljoen patinten in de Verenigde Staten wisten te stelen en de Heartbleed-bug hiervoor gebruikten, hadden hun aanval op een Juniper VPN gericht. Dat meldt beveiligingsbedrijf TrustedSec, dat details over de aanval wist te verkrijgen. De aanval was gericht tege... Read more

Source: www.security.nl

Top found tags: OpenSSL(1),patch(1),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoeker vindt ruim duizend paspoorten op P2P-netwerkenLocation: Beek, Montferland, Gelderland, The Netherlands
Date published: 21-08-2014

De Nederlandse beveiligingsonderzoeker Jeroen van Beek heeft de afgelopen jaren zo'n 3900 vertrouwelijke documenten op P2P-netwerken gevonden die van het Edonkey2000-protocol gebruik maken, waaronder ruim duizend paspoorten. Dat laat Van Beek tegenover De Correspondent weten. Het Edonkey2000-protoco... Read more

Source: www.security.nl

Top found tags: research(1),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bank app verifieert klanten aan hand van typegedragLocation: Amsterdam, The Netherlands
Date published: 21-08-2014

Scandinavische banken doen proeven met een methode om een gebruiker te herkennen op een smartphone aan de manier waarop hij of zij typt. Op die manier kan de bank kwaadwillenden stoppen, ook als die de beveiligingscode juist intypt.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: smartphone(1),financial sector(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Zullen we vandaag eens een stoplicht hacken?Location: Michigan, United States
Date published: 21-08-2014

Het hacken van stoplichten blijkt ontstellend simpel, tenminste die in de Verenigde Staten, zo is de ervaring van de Universiteit van Michigan. Meer over het hacken van stoplichten 'Stoplichten wereldsteden simpel te hacken' De proef werd uitgevoerd op een willekeurig gekozen set stoplichten op een ... Read more

Source: www.automatiseringgids.nl

Top found tags: NL(1),research(1),conference(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nieuwe certificaatcontrole aan Mozilla Firefox toegevoegdLocation: Mozilla - Mountain View, United States
Date published: 21-08-2014

Een aantal weken geleden heeft Mozilla aan Firefox een nieuwe controle van SSL-certificaten toegevoegd, die daarmee het vorige mechanisme vervangt dat jaren werd gebruikt. De nieuwe "certificate verification library" is van de grond af opgebouwd en heet "mozilla::pkix". Naast het gebruik van veilige... Read more

Source: www.security.nl

Top found tags: Firefox(1),NL(1),SSL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Ongeveer kwart Nederlanders doet aan mobiel bankieren"Location: Amsterdam, The Netherlands
Date published: 21-08-2014

Ongeveer een kwart van de Nederlandse consumenten zou aan mobiel bankieren doen en gebruikt de mobiel bankieren app minimaal n keer per week, zo claimt de Nederlandsche Bank (DNB). Volgens DNB biedt mobiel bankieren een balans tussen gebruiksgemak en veiligheid. "Net als bij het internetbankiere... Read more

Source: www.security.nl

Top found tags: online banking(2),financial sector(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Microsoft ontwikkelt dashboard voor ouderlijk toezichtLocation: Microsoft HQ - Redmond, United States
Date published: 21-08-2014

Microsoft heeft onlangs een hackathon georganiseerd waar meer dan 40 mensen brainstormden over de ontwikkeling van een "dashboard" waarmee ouders de activiteiten van hun kinderen op drie schermen, de pc/laptop/tablet, spelcomputer en mobiele telefoon, kunnen monitoren. Uiteindelijk werd er ook een f... Read more

Source: www.security.nl

Top found tags: NL(1),website(1),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Meerdere kwetsbaarheden in Cacti verholpenLocation: Cross, United States
Date published: 21-08-2014

Samenvatting: Debian heeft updates uitgebracht die meerdere kwetsbaarheden voor Cacti verhelpen. Gevolgen: Een aanvaller kan de kwetsbaarheden misbruiken voor het uitvoeren van een Cross-Site Scripting (XSS) aanval of om willekeurige code uit te voeren met de privileges waarmee Cacti op de server dr... Read more

Source: www.ncsc.nl

Top found tags: Debian(2),update(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Wordpress verholpenLocation: WordPress - San Francisco, United States
Date published: 21-08-2014

Samenvatting: Er is een nieuwe versie van Wordpress uitgebracht waarin meerdere kwetsbaarheden worden verholpen. Gevolgen: Een kwaadwillende kan een van de kwetsbaarheden mogelijk misbruiken om een Denial-of-Service van het webserver proces te veroorzaken. Voor deze kwetsbaarheid is exploit code pub... Read more

Source: www.ncsc.nl

Top found tags: Debian(2),Fedora(2),vulnerability(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden in Drupal verholpenLocation: Amsterdam, The Netherlands
Date published: 21-08-2014

Samenvatting: Er zijn nieuwe versies van Drupal uitgebracht waarin diverse kwetsbaarheden wordt verholpen. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende een Denial-of-Service van het webserver proces veroorzaken. Beschrijving: - CVE-2014-5265, CVE-2014-5266, CVE-2014-5267 De... Read more

Source: www.ncsc.nl

Top found tags: webserver(1),Debian(2),Fedora(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in Wireshark verholpenLocation: Amsterdam, The Netherlands
Date published: 21-08-2014

Samenvatting: Er zijn meerdere kwetsbaarheden verholpen in Wireshark. Gevolgen: Een kwaadwillende kan de kwetsbaarheden mogelijk misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: - CVE-2014-5161, CVE-2014-5162: De Catapult DCT2000 en IrDA dissectors bevatten een "buffer underrun" kwe... Read more

Source: www.ncsc.nl

Top found tags: Debian(2),Fedora(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kwetsbaarheden verholpen in Puppet EnterpriseLocation: Amsterdam, The Netherlands
Date published: 21-08-2014

Samenvatting: Er is een update uitgebracht die kwetsbaarheden verhelpt in puppetlabs Puppet Enterprise. Gevolgen: Een kwaadwillende met lokale toegang tot een server kan een ongeautoriseerde client verbinding met de server opzetten. Ook kan een kwaadwillende op afstand gevoelige informatie ontsleute... Read more

Source: www.ncsc.nl

Top found tags: The Netherlands(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Diverse kwetsbaarheden verholpen in de Red Hat kernelLocation: Amsterdam, The Netherlands
Date published: 21-08-2014

Samenvatting: Red Hat heeft updates beschikbaar gemaakt die kwetsbaarheden verhelpen in de kernel van Red Hat Enterprise Linux. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende toegang krijgen tot gevoelige informatie of een Denial of Service veroorzaken. Beschrijving: - CVE-20... Read more

Source: www.ncsc.nl

Top found tags: DoS(2),Red Hat(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish