Under construction

New design coming soon!

CIC News engine statistics

CIC News for 22-08-2014 contains 97 articles: cybercrime(21),cyber security(31),data breach(8),other(37)

CIC News update contains 80 English and 17 Dutch articles for today.
There are 4 published advisories, 1 are English and 3 are Dutch.
In today's English news articles:
- 14 related to cybercrime
- 31 related to cyber security
- 8 related to data breach and identity theft
- 27 for the category other news

In today's Dutch news articles:
- 7 related to cybercrime
- 0 related to cyber security
- 10 for the category other news

Have fun reading.

English cybercrime related news

Cyber Attacks From Las Vegas Spiked During Black Hat, Defcon: ImpervaLocation: Las Vegas, Nevada, United States
Date published: 22-08-2014

The days when the Black Hat USA and Defcon conferences are ongoing are two times when surfing the Internet in Las Vegas can be a gamble all on its own. According to Imperva, there was a spike in malicious activity emanating from Sin City two weeks ago when the conferences were under way. "I decided ... Read more

Source: securityweek.com

Top found tags: DEF CON(2),conference(4),Black Hat(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Website Add-on Targets Japanese Users, Leads To Exploit KitLocation: Tokio, Japan
Date published: 22-08-2014

In the past few weeks, an exploit kit known as FlashPack has been hitting users in Japan. In order to affect users, this particular exploit kit does not rely on spammed messages or compromised websites: instead, it uses a compromised website add-on. This particular add-on isused by site owners who... Read more

Source: trendmicro.com

Top found tags: update(2),exploit kit(4),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How to hack Gmail 92 percent of the timeLocation: Google HQ - Mountain View, United States
Date published: 22-08-2014

US researchers have discovered a flaw which may exist across Android, Windows, and iOS operating systems, and could allow popular services such as Gmail to become compromised. Security experts from the University of California Riverside Bourns College of Engineering and the University of Michigan id... Read more

Source: www.zdnet.com

Top found tags: mobile device(2),financial sector(6),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rogue AV scammers find success with new taticsLocation: Microsoft HQ - Redmond, United States
Date published: 22-08-2014

Rogue anti-virus malware infections have decreased overall and are affecting fewer victims, but the threat still remains, according to researchers. New rogue anti-virus software, such as Rogue:Win31/Defru, is picking up in the absence of older, comparable threats, according to a Microsoft blog post.... Read more

Source: www.scmagazine.com

Top found tags: cybercrime(2),Microsoft(2),website(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook awards $50,000 Internet Defense Prize for security researchLocation: Facebook - Menlo Park, United States
Date published: 21-08-2014

Facebook awards $50,000 Internet Defense Prize for security research. Facebook has awarded $50,000 (30,000) to a pair of German researchers, who have developed a new approach to detecting vulnerabilities in online applications. The Internet Defense Prize was presented to Johannes Dahse and Thorste... Read more

Source: itproportal.com

Top found tags: vulnerability(1),Germany(2),social media(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Picayune man gets prison in child-porn caseLocation: Pearl River, United States
Date published: 21-08-2014

POPLARVILLE -- A judge has sentenced Edwin Dean Pauly, 59, of Picayune, to prison for exploitation of a child through pornographic pictures.Pearl River Circuit Judge Prentiss G. Harrell sentenced Pauly on Aug. 12 on a guilty plea to two counts of child exploitation, Attorney General Jim Hood said Th... Read more

Source: www.sunherald.com

Top found tags: EN(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The Evolution of CybercrimeLocation: New York, United States
Date published: 21-08-2014

How underground markets for stolen data and hacking tools are driving cybercrime today, and some of the possible security responses, defenses, and strategies... Read more

Source: www.slideshare.net

Top found tags: EN(1),hacking(1),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
10 Warning Signs Cyberattacks Will EscalateLocation: Will, United States
Date published: 21-08-2014

Organized Cybercriminals Recover Often To Setbacks.Financially motivated cybercriminals who steal account credentials and credit card data haven't had to spend a lot of time investing in sophisticated attack techniques and advanced malware. Instead, they have invested in stronger evasion tactics to ... Read more

Source: www.crn.com

Top found tags: credit card(2),financial sector(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Eve Online Servers Knocked Offline Due to DDoS AttacksLocation: Reykjavik, Iceland
Date published: 22-08-2014

Update (10am): The Eve Online Tranquility servers are not back online according to the Eve Online Status Twitter account.Original story:Eve Online, the space-based videogame with over half a million active players, has been forced offline for more than 12 hours due to a series of cyber attacks again... Read more

Source: www.ibtimes.co.uk

Top found tags: DoS(2),social media(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australian Crime Commission boss Chris Dawson faces battle on several fronts including the stock market rigging, terror, bikies, drugs and cybercrimeLocation: Sydney, Australia
Date published: 22-08-2014

AN international organised crime gang recently attempted to illegally manipulate the Australian stock market through companies worth $1 billion.The Australian Crime Commission foiled the sophisticated plot, which could have seen the syndicate escape with tens of millions of dollars of investors m... Read more

Source: www.perthnow.com.au

Top found tags: Syria(1),cybercrime(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
BotMaker Helps Twitter Reduce Spam by 40 PercentLocation: Twitter - San Francisco, United States
Date published: 22-08-2014

Spam is highly problematic on Twitter, which is why the social media network has developed a system that helps its efforts to keep users' feeds free of unsolicited or malicious posts. Dubbed "BotMaker," Twitter's anti-spam system is already being used in production, and the company claims to have ob... Read more

Source: securityweek.com

Top found tags: spam(1),Twitter(1),social media(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Vulnerability Found in Google Wallet, Alipay Payment SDKsLocation: Google HQ - Mountain View, United States
Date published: 22-08-2014

Researchers at Trend Micro have uncovered a security hole that can be exploited to launch phishing attacks against users who make payments from their Android mobile devices. According to the security firm, the vulnerability affects the in-app payment (IAP) SDKs for Google Wallet and Alibaba's Alipay... Read more

Source: securityweek.com

Top found tags: vulnerability(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Carbon Grabber crimeware kit being distributed in spam campaignLocation: Carbon, United States
Date published: 22-08-2014

The automotive industry in Europe is the primary target of an ongoing spam campaign involving the Carbon Grabber crimeware kit, but the public services, financial, charity and energy sectors are also being hit, according to Symantec. The campaign begins with a suspicious looking email from an allege... Read more

Source: www.scmagazine.com

Top found tags: Microsoft Outlook(2),telecom sector(2),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

IT Security Contributes to Record Volume of Tech M&A DealsLocation: Young, United States
Date published: 21-08-2014

Technology mergers and acquisitions (M&A) soared by 57% year-over-year in the second quarter of 2014 and IT security has played an important role in this trend, according to professional services firm Ernst & Young. The April-June 2014 issue of the company's global technology M&A update shows that c... Read more

Source: securityweek.com

Top found tags: information security(2),update(2),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Medical transcription provider settles data security chargesLocation: Federal Trade Commission - Washington, United States
Date published: 21-08-2014

The Federal Trade Commission (FTC) has finalized a settlement which resolves data security charges against a California provider of medical transcription services. GMR Transcription Services was accused of deceptive and unfair information security practices, when the FTC filed a complaint (PDF... Read more

Source: www.scmagazine.com

Top found tags: medical sector(2),cyber security(4),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researcher hacks network connected devices in own homeLocation: Kaspersky HQ - Moscow, Russia
Date published: 21-08-2014

Researcher hacks network connected devices in own home In his own home, a researcher hacked two NAS devices, a DSL router provided by his ISP, and his smart TV. The average home has about five network connected devices that are not computers and mobile phones, according to David Jacoby, a security a... Read more

Source: www.scmagazine.com

Top found tags: malware(3),Kaspersky Lab(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Study: Most higher ed malware infections attributed to 'Flashback'Location: Apple HQ - Cupertino, United States
Date published: 21-08-2014

Study: Among those interested in careers in IT security, far more were young men than women. Flashback caused a stir in 2012 when some 650,000 Macs were infected with the malware. A security ratings firm found that Flashback a trojan noted for infecting hundreds of thousands of Mac machines ... Read more

Source: www.scmagazine.com

Top found tags: trojan(2),cyber security(4),education(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Phishing campaign targeting users of Bitcoin wallet Blockchain.infoLocation: New York, United States
Date published: 21-08-2014

Security firm Proofpoint has identified a phishing campaign targeting users of popular Bitcoin wallet Blockchain.info, which has more than two million users. The phish begins with an authentic-looking email that notifies the recipient of possibly suspicious activity a potential hijacker at... Read more

Source: www.scmagazine.com

Top found tags: phishing(1),cyber security(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers create privacy wrapper for Android Web appsLocation: North Carolina, United States
Date published: 21-08-2014

The binary choice has left most users ignoring permission warnings and sacrificing personal data. Most applications aggressively eavesdrop on their users, from monitoring their online habits through the device identifier to tracking their movements in the real world via location information. Now, a ... Read more

Source: arstechnica.com

Top found tags: United Kingdom(2),United States(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. venture firm Kleiner Perkins suffers security breachLocation: Perkins, United States
Date published: 22-08-2014

SAN FRANCISCO (Reuters) - California detectives are investigating a July computer theft at storied venture capital-firm Kleiner Perkins Caufield & Byers, a spokeswoman for the Menlo Park police said on Thursday. The theft may put Kleiner in jeopardy of losing valuable financial data and making the f... Read more

Source: reuters.com

Top found tags: security measures(2),United States(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Australian infosec spend to hit $1.9B in 2014: GartnerLocation: Gartner - Stamford, United States
Date published: 22-08-2014

edge towards AU$2.1 billion in 2015. The Australian spending forecast comes as the IT research and advisory company predicts that worldwide information security spending will grow by almost 8 percent this year, as enterprises become more "threat-aware". Gartner estimates that worldwide spending on i... Read more

Source: www.zdnet.com

Top found tags: information security(2),legislation(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
68 percent of top free Android apps vulnerable to cyberattack, researchers claimLocation: Google HQ - Mountain View, United States
Date published: 22-08-2014

The majority of Android's most popular apps are susceptible to SSL vulnerabilities, according to new research. Google's Android operating system is an open-source, free framework which appeals to developers due to this unrestrictive nature. However, with such an open and free system, there is always... Read more

Source: www.zdnet.com

Top found tags: telecom sector(2),vulnerability(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Why Asia is the frontier of mobile securityLocation: Asia
Date published: 22-08-2014

Its crucial that US and European enterprise technology businesses pay close attention to the East Security professionals know that hackers are an invisible army with infinite patience, and a bottomless bag of tricks. Against these odds businesses are at a disadvantage, because the only surefire w... Read more

Source: www.information-age.com

Top found tags: United Kingdom(2),cybercrime(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Six Clicks: Two factors are better than oneLocation: MasterCard - Harrison, United States
Date published: 22-08-2014

There is a lot of two-factor authentication in the real world, even if most of the authentication in our computer lives relies only on a username and password. When you see news of a security breach or a list of passwords exposed, odds are that somewhere in the story of how it happened the attack wo... Read more

Source: www.zdnet.com

Top found tags: financial sector(2),NFC(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Your Anonymous Posts to Secret Arent Anonymous After AllLocation: Bryan, United States
Date published: 22-08-2014

secret-app [gallery-ca] Secret White hat hacker Ben Caudill is halfway through his sandwich when he casually reaches over to his iPhone, swipes the screen a few times, then holds it up to me. Is that you? he asks. It is, but nobody was supposed to know. Hes showing me one of my posts to Sec... Read more

Source: wired.com

Top found tags: United States(2),vulnerability(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Not so Secret? How a hack could have killed app's anonymityLocation: Google HQ - Mountain View, United States
Date published: 22-08-2014

Seth Rosenblatt/CNET Anonymity app Secret and an independent security consultant are coming clean about a hack that could have destroyed the entire point of the popular secret-sharing app. Bryan Seely, who made headlines earlier this year with a Google Maps hack that let him listen in on Federal Bur... Read more

Source: cnet.com.ortal.com

Top found tags: social media(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rogue UK and US spies 'help safeguard Tor network'Location: GCHQ - Cheltenham, United Kingdom
Date published: 22-08-2014

Extremists and paedophiles protected by 'white hat' hackers in GCHQ and NSA, says unconfirmed BBC report. Andrew Lewman Andrew Lewman A new report that rogue GCHQ and NSA agents are helping keep the Tor network safe from their own agencies has sent shock waves through the security community. The cla... Read more

Source: www.scmagazineuk.com

Top found tags: Bruce Schneier(4),United Kingdom(6),government(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
White House cybersecurity bigwig sees his IT security ignorance as an advantageLocation: White House - Washington D.C., United States
Date published: 22-08-2014

ITProNate. White House cybersecurity bigwig sees his IT security ignorance as an advantage A senior White House security officer has talked down the knowledge required to perform his job. Michael Daniel, the special assistant to US President Barack Obama and the White House's cybersecurity co-ordina... Read more

Source: itproportal.com

Top found tags: information security(2),government(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Todays tech: Vulnerability in Google Play apps, Copyright holders hate piracy, graduates pay for a job in a startupLocation: Google HQ - Mountain View, United States
Date published: 21-08-2014

ITProNate. Todays tech: Vulnerability in Google Play apps, Copyright holders hate piracy, graduates pay for a job in a startup I'm looking for the Man-In-The-Middle Large number of Play Store apps vulnerable to Man-In-The-Middle attacks According to FireEye Mobile Security, 68 per cent of the 100... Read more

Source: itproportal.com

Top found tags: Google(3),Google Play(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Large number of Play Store apps vulnerable to Man-In-The-Middle attacksLocation: Google HQ - Mountain View, United States
Date published: 21-08-2014

Large number of Play Store apps vulnerable to Man-In-The-Middle attacks. A significant proportion of Google Play's most downloaded Android applications are susceptible to Man-In-The-Middle (MITM) attacks, according to the latest research. The FireEye Mobile Security Team revealed that a large number... Read more

Source: itproportal.com

Top found tags: Google(3),Google Play(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brainboxes caught opening Bitcoin fraud emails. Seriously, guys?Location: Proofpoint - Sunnyvale, United States
Date published: 22-08-2014

Cybercrooks have launched a phishing campaign targeting Bitcoin users and it's enjoying high response rates despite the seemingly random spraying of corporate email addresses with the spam-based scam. Security-as-a-service provider Proofpoint has detected 12,000 messages sent in two separate wav... Read more

Source: go.theregister.com

Top found tags: trojan(2),financial sector(6),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
University of Alaska internet outage caused by denial of service attackLocation: Alaska, United States
Date published: 21-08-2014

FAIRBANKS The Internet went down for much of Wednesday at University of Alaska campuses statewide as hackers targeted the universitys servers with a distributed denial of service attack. The network outage began at about 9 a.m. and lasted into the early afternoon. It caused off-campus users t... Read more

Source: www.newsminer.com

Top found tags: cyber security(2),education(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
U.S. Colleges and Universities Are Failing at Cyber SecurityLocation: New York, United States
Date published: 22-08-2014

A recent report from BitSight Technologies entitled "Powerhouses and Benchwarmers: Assessing Cyber Security Performance of Collegiate Athletic Conferences" has found that leading colleges and universities across the U.S. are at even greater risk of security breaches than the retail and healthcare se... Read more

Source: www.esecurityplanet.com

Top found tags: medical sector(2),United States(2),education(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
CISOs offered new way to secure Android devicesLocation: Google HQ - Mountain View, United States
Date published: 22-08-2014

US and German researchers have come up with a novel way to secure the notoriously flaw-ridden Android - a framework that allows corporate and other users to rapidly add security enhancements to Android devices without having to touch the firmware or operating system itself. CISOs offered new way to ... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(2),government(3),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gmail smartphone app on Android hacked by US researchersLocation: Google HQ - Mountain View, United States
Date published: 22-08-2014

phelanto. Gmail smartphone app on Android hacked by US researchers Google's Gmail app on Android smartphones has fallen victim to the hacks of US researchers who managed to access Gmail accounts in 92 per cent of cases. The researchers were able to access several apps, including Google's popular ema... Read more

Source: itproportal.com

Top found tags: cyber security(6),financial sector(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
White House cybersecurity bigwig sees his IT security ignorance as an advantageLocation: White House - Washington D.C., United States
Date published: 22-08-2014

ITProNate. White House cybersecurity bigwig sees his IT security ignorance as an advantage A senior White House security officer has talked down the knowledge required to perform his job. Michael Daniel, the special assistant to US President Barack Obama and the White House's cybersecurity co-ordina... Read more

Source: itproportal.com

Top found tags: information security(2),government(3),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyberspies are HELPING devs plug Tor vulns, claims project chiefLocation: GCHQ - Cheltenham, United Kingdom
Date published: 22-08-2014

Cyberspies at GCHQ and the NSA regularly leak details of flaws in Tor, according to a leading developer of the anonymity-preserving technology. Andrew Lewman, the Tor Project's executive director, claimed that some spies place a higher priority on fixing flaws in the privacy-preserving technology th... Read more

Source: go.theregister.com

Top found tags: vulnerability(2),United States(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Akeeba Patches Bypass Vulnerability in JoomlaLocation: WordPress - San Francisco, United States
Date published: 22-08-2014

The developers behind Akeeba, an extension for content management systems that lets users backup their work, fixed an outstanding issue this week that couldve let anyone download site backups, passwords and user lists. Because of the sheer difficulty it takes to exploit the bug, the vulnerability... Read more

Source: threatpost.com

Top found tags: cyber security(2),patch(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor Exec: Intelligence Insiders Disclose Bug Information With Tor DevelopersLocation: National Security Agency - Fort Meade, United States
Date published: 22-08-2014

The executive director of the Tor Project told the BBC that U.S. and U.K. intelligence agencies are in an internal cat and mouse game, with one faction trying to break the anonymity network, and another one sharing bugs anonymously with Tor developers. Andrew Leman, in an extensive question-and-answ... Read more

Source: threatpost.com

Top found tags: United States(2),United Kingdom(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Mobile Device Management: The Buying BasicsLocation: Google HQ - Mountain View, United States
Date published: 22-08-2014

Sales of smartphones and tablet devices have exploded over the last five years or so. Increasingly these mobile devices are being used in the workplace. That's great news for businesses because these devices can make employees more productive, they cost less than laptops, and thanks to Bring Your Ow... Read more

Source: www.esecurityplanet.com

Top found tags: mobile device(2),United Kingdom(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ICYMI: NSA insiders, hacking living rooms & learning from TargetLocation: National Security Agency - Fort Meade, United States
Date published: 22-08-2014

This week's In Case You Missed It looks at rumours on a new NSA insider, hackable living rooms and if police are turning the tide on cyber-criminals. ICYMI: NSA insiders, hacking living rooms & learning from Target ICYMI: NSA insiders, hacking living rooms & learning from Target NSA insider rumours ... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(4),government(6),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The 5 most read articles this week: August 15 to 21Location: NCC Group - Manchester, United Kingdom
Date published: 22-08-2014

Here are the five most popular articles, as read by you the reader, in the week for August 15 to 21. The 5 most read articles this week: August 15 to 21 The 5 most read articles this week: August 15 to 21 50 percent of corporate passwords crackable within a few minutes New research from Trustwave, w... Read more

Source: www.scmagazineuk.com

Top found tags: United States(2),government(3),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

As security breach reports mount, experts fear alert fatigueLocation: New Jersey, United States
Date published: 22-08-2014

It's been a busy week for security specialists. First came word that supermarket chain Supervalu had been hacked. That was followed in short order by news of security breaches at a large American medical group, the Nuclear Regulatory Commission and the UPS Store. As large-scale security breaches car... Read more

Source: cnet.com.ortal.com

Top found tags: United States(4),government(5),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Identity Theft Causes Years of Financial DamageLocation: Cooper, United States
Date published: 21-08-2014

GOLDEN, Colo. (CBS4) Identity theft is the most common crime in America right now, and victims say it causes a web of finance trouble that takes years to resolve.I can say with confidence there is someone out there right now stealing someones identity, said Troy Cooper, a senior investi... Read more

Source: denver.cbslocal.com

Top found tags: fraud(1),identity theft(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Most Data-Breach Victims Take No ActionLocation: Target HQ - Minneapolis, United States
Date published: 21-08-2014

What do you do if you've been the victim of a data breach, and your personal or account information has fallen into the hands of criminals? That's not as theoretical a question as you might hope. Some 41% of American consumers have experienced just card fraud -- let alone other losses -- in the last... Read more

Source: www.foxbusiness.com

Top found tags: survey(1),data breach(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach at UPS Stores in 24 states, including OklahomaLocation: UPS HQ - Atlanta, United States
Date published: 21-08-2014

ATLANTA, Ga. (CNNMoney) United Parcel Service has discovered a computer breach at 51 stores, making Big Brown the latest retailer to lose customer data.UPS said that the hacking had escaped detection at stores in 24 states, or around 1% of its locations. At most stores, the malware attack occurr... Read more

Source: kfor.com

Top found tags: hackers(1),hacking(1),data breach(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime Has Intensified Throughout The Year, New Study FindsLocation: New York, United States
Date published: 21-08-2014

A new cybersecurity industry report has found that cybercrime was especially heavy in the first six months of 2014, with the financial, banking and retail sectors being targeted most strongly.The study revealed that, as of July 2014, attacks have exposed more than 10 million records, CBR reported. I... Read more

Source: www.entrust.com

Top found tags: data breach(2),financial sector(2),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware at Shipping Company Ships Credit, Debit Card Info Off to HackersLocation: New York Times - New York, United States
Date published: 22-08-2014

Modern technology has made it quick, easy and cheap to ship packages across the globe. Think about it: planes, trains, automobiles and even boats all work in tangent to traffic packaged goods. You can track said package throughout its journey thanks to barcodes and radio frequency identification (RF... Read more

Source: blogs.mcafee.com

Top found tags: telecom sector(2),United States(2),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
LinkedIn to pay 750,000 in security breach settlementLocation: LinkedIn HQ - Mountain View, United States
Date published: 22-08-2014

In a landmark court settlement, social networking service, LinkedIn, has agreed to pay just over 750,000 to resolve a class-action lawsuit spurred by a major data breach two years ago. Deemed the result of the company's obsolete security measures, the 2012 breach accessed and exposed 6.4 mil... Read more

Source: www.scmagazineuk.com

Top found tags: security measures(2),social media(2),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Report: UK police push for required mobile phone PWsLocation: Metropolitan Police - London, United Kingdom
Date published: 22-08-2014

In an effort to reduce identity theft cases, The Metropolitan Police is pushing to make passwords on cell phones a mandatory practice. According to The Register, which broke the story this week, Met's National Mobile Phone Crime Unit has been in talks with major manufacturers, like Apple and Samsung... Read more

Source: www.scmagazine.com

Top found tags: United States(2),government(5),telecom sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Flappy Bird follow-up Swing Copters will drive you to insanityLocation: Activision Inc. HQ - Santa Monica, United States
Date published: 21-08-2014

There's a certain type of video game genre called "masocore," in which players engage with Nintendo-inspired games like Super Meat Boy or 1001 Spikes specifically because of their difficulty and the love-hate relationship it fosters. One false step results in death or failure. Overcoming the challen... Read more

Source: cnet.com.ortal.com

Top found tags: social media(2),Google(3),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NIST Releases Draft Guidelines for SSH Access ControlLocation: National Institute of Standards - Gaithersburg, United States
Date published: 21-08-2014

The National Institute of Standards and Technology (NIST) released today draft guidelines for addressing the security risks posed by the use of Secure Shell (SSH) for automated access. SSH, the cryptographic network protocol used for secure data communication and other secure network services, is ut... Read more

Source: securityweek.com

Top found tags: United States(2),government(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Facebook slings $50k Internet Defense Prize at bug hunter duoLocation: Facebook - Menlo Park, United States
Date published: 21-08-2014

Adaptable System Recovery (ASR) for Linux virtual machines Facebook and Usenix have together created the Internet Defense Prize and awarded its first gong to security bods Johannes Dahse and Thorsten Holz. The pair, of Ruhr University Bochum in Germany, received $50,000 from Facebook's prize-... Read more

Source: go.theregister.com

Top found tags: Germany(2),social media(2),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malicious app can get past Android WITHOUT PERMISSIONSLocation: Google HQ - Mountain View, United States
Date published: 22-08-2014

Researchers presenting at Usenix have lifted the lid on yet another Android vulnerability: the way apps use memory can be exploited to leak private information with a success rate between 82 and 92 per cent of the time. Announced by the University of California, Riverside here, the researchers... Read more

Source: go.theregister.com

Top found tags: Windows(1),financial sector(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AWS levels up in game of government security and now one step below classified accessLocation: New York, United States
Date published: 21-08-2014

Implementing global e-invoicing with guaranteed legal certainty Amazon Web Services (AWS) has leveled up its US government security certification, winning the right to handle more sensitive work from the Department of Defense (DoD). The company has, of course, blogged the news that it has won provis... Read more

Source: go.theregister.com

Top found tags: EN(1),Linux(1),government(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Stealing encryption keys through the power of touchLocation: RSA HQ - Bedford, United States
Date published: 22-08-2014

Researchers from Tel Aviv University have demonstrated an attack against the GnuPG encryption software that enables them to retrieve decryption keys by touching exposed metal parts of laptop computers. There are several ways of attacking encryption systems. At one end of the spectrum, there are flaw... Read more

Source: arstechnica.com

Top found tags: USB (1),RSA(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Open source software: The question of securityLocation: New York, United States
Date published: 22-08-2014

easily be viewed, accessed and changed have even a modicum of security? opensource-security-questionOpen source software is safer than many believe. But with organizations around the globe deploying open source solutions in even some of the most mission-critical and security-sensitive environments, ... Read more

Source: www.zdnet.com

Top found tags: vulnerability(1),financial sector(2),Red Hat(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers find way to hack Gmail with 92 percent success rateLocation: University of Michigan - Ann Arbor, United States
Date published: 22-08-2014

Researchers at the University of California Riverside Bourns College of Engineering and the University of Michigan have identified a weakness they believe to exist across Android, Windows, and iOS operating systems that could allow malicious apps to obtain personal information. Although it was teste... Read more

Source: cnet.com.ortal.com

Top found tags: mobile device(2),financial sector(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ISIS terror fanatics invade Diaspora website after Twitter banLocation: Twitter - San Francisco, United States
Date published: 22-08-2014

Medieval terror bastards ISIS have moved from Twitter to the non-profit social network Diaspora to spew their cant and there's apparently nothing that can be done to stop them. "Diaspora is a completely decentralized network which, by its nature, consists of many small servers exchanging posts a... Read more

Source: go.theregister.com

Top found tags: Anonymous(2),telecom sector(4),social media(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rogue GCHQ and NSA agents intentionally leak information to help Tor users remain anonymousLocation: GCHQ - Cheltenham, United Kingdom
Date published: 22-08-2014

ITProNate. Rogue GCHQ and NSA agents intentionally leak information to help Tor users remain anonymous Andrew Lewman, the executive director of the Tor Project, has said that he believes GCHQ and NSA agents frequently - and intentionally - leak flaws in Tor's code. By revealing this information to t... Read more

Source: itproportal.com

Top found tags: Anonymous(2),United Kingdom(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Do you really need to pay $20 to delete your Ashley Madison profile?Location: Ashley, United States
Date published: 22-08-2014

what he saw. Earlier this week, Ars got an e-mail from a reader named Rob Plant.I think most right-thinking people have been dismayed by the tactics of charging for picture take downswhat is worrying to me is that these practices now seem to have been taken up by more legitimate websites.... Read more

Source: arstechnica.com Vuze, uTorrent Torrent Download Speed Slowed By Swarm-Killing Malware: Researchers | Cyber criminals have not only targeted American hospitals and UPS customers in recent weeks, but are now putting their focus on uTorrent and Vuze users who download music, movies and other media from the Internet for free.Content is downloaded every day in the form of torrent files, which make it possible for users to save a massive file (like a movie or software, for instance) by linking to other users and downloading. The idea has been largely successful in trying to make downloads faster, as users obtain chunks of the file from many different sources rather than a single source. The cadre of users who link together to download a single file make up whats known as a swarm, with peers uploading and downloading the file at the same time.Downloading torrents is not illegal, though the method of downloading is so associated with illegally downloading copyright material that torrenting is now equated with piracy in many instances. The most popular programs for downloading torrents is are Vuze and uTorrent, which between them are estimated to have more than 100 million users around the world. (Its possible that uTorrent alone has more than 100 million users, though the service does not provide official numbers.) Florian Adamsky, a research at the City University London, has published a new article in Computers and Security explaining that its now possible for hackers to subvert swarm downloads and almost all of the bandwidth power at work for their own gain, a process that essentially allows them to steal bandwidth. | http://www.ibtimes.com/vuze-utorrent-torrent-download-speed-slowed-swarm-killing-malware-researchers-1665828 | 21-08-2014 | www.ibtimes.com

Top found tags: United Kingdom(2),update(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers Show Malware Can Hack Gmail App With 92% Success RateLocation: Google HQ - Mountain View, United States
Date published: 21-08-2014

Researchers claims a new piece of malware can steal highly sensitive data from smartphone apps on Android, Windows Phone and iOS with up to a 92% success rate.The researchers have showcased the proof-of-concept malware running on an Android smartphone with the malicious software able to steal inform... Read more

Source: www.ibtimes.co.uk

Top found tags: malware(2),financial sector(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Digital transformation needs a modern, mission-critical infrastructureLocation: New York, United States
Date published: 21-08-2014

Digital transformation is about a lot more than your front-end digital customer experience. It requires a modern, mission-critical infrastructure on the back-end as well. If rogue IT is what happens when business doesnt speak to IT, then rogue digital may soon be what happens if the C... Read more

Source: blogs.computerworld.com

Top found tags: survey(1),threat(1),trend(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Another ATM Skimming Scam Hits Fairfax County, VirginiaLocation: Fairfax County, United States
Date published: 21-08-2014

Yet another high-tech ATM scam is underway in Fairfax County, Virginia -- and the thieves are more brazen than ever.Police said a slew of Navy Federal Credit Union branches had been hit by \"ATM skimming\" in the last month. Skimming is the process of attaching devices to an ATM that allow criminals... Read more

Source: www.csnwashington.com

Top found tags: skimming(1),credit card(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Lookout Opening Technology Development Center in BostonLocation: Boston, United States
Date published: 22-08-2014

San Francisco-based Mobile Security Firm Makes Commitment to Boston With an extra $150 million in its coffers as a result of a recent massive round of funding, mobile security firm Lookout, Inc. announced this week that it will open a new Technology Development Center located in Boston, Mass. Accord... Read more

Source: securityweek.com

Top found tags: health sector(2),medical sector(2),education(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Researchers Target Shared Memory to Hack Android AppsLocation: Google HQ - Mountain View, United States
Date published: 22-08-2014

Researchers at the University of Michigan and the University of California, Riverside have developed a new attack method that can be used to obtain sensitive information from applications running on Android and likely other operating systems. Dubbed "UI state interference attack," the method relies ... Read more

Source: securityweek.com

Top found tags: OS X(2),telecom sector(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brazilian PUP Campaign MegaRapido Shows Unwanted BehaviorLocation: Brasilia-Federal District, Brazil
Date published: 22-08-2014

Some applications go too far in their attempt to get installed on users systems. Many of these fall into the potential unwanted program (PUP) category. One of these is MegaRapido, which primarily targets Brazilians. A recent sample we tested tries to connect to protectmedia.net, which is already mar... Read more

Source: blogs.mcafee.com

Top found tags: SMS(1),Internet Explorer(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Errors in ZeroLocker means paying ransom may not decrypt filesLocation: Kaspersky HQ - Moscow, Russia
Date published: 22-08-2014

Researchers with Kaspersky have identified a piece of ransomware known as ZeroLocker that asks for $300 in Bitcoin followed by $500 and then $1,000 if the victim waits. The encryption key and other data sends through a GET request that results in a 404 error on the server, meaning that paying up... Read more

Source: www.scmagazine.com

Top found tags: Windows(1),financial sector(2),Kaspersky Lab(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rogue NSA and GCHQ agents intentionally leak information to help Tor users remain anonymousLocation: GCHQ - Cheltenham, United Kingdom
Date published: 22-08-2014

ITProNate. Rogue NSA and GCHQ agents intentionally leak information to help Tor users remain anonymous Andrew Lewman, the executive director of the Tor Project, has said that he believes GCHQ and NSA agents frequently - and intentionally - leak flaws in Tor's code. By revealing this information to t... Read more

Source: itproportal.com

Top found tags: Anonymous(2),United Kingdom(2),government(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
NIST Releases Secure Shell Guidance DocumentLocation: National Institute of Standards - Gaithersburg, United States
Date published: 22-08-2014

NIST released a report yesterday urging enterprises, government agencies and other IT shops that rely on Secure Shell implementations to re-assess their deployments and be wary of a number of weaknesses plaguing those systems. Interagency Report 7966 is a guidance document that falls in line with NI... Read more

Source: threatpost.com

Top found tags: backdoor(2),government(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Alleged Silk Road creator faces new chargesLocation: New York, United States
Date published: 22-08-2014

The man accused of creating Silk Road a black market existing on the Deep Web and accessible through the Tor network is facing new charges from federal prosecutors. A new indictment filed in Manhattan federal court charges 30-year-old Ross Ulbricht also known as Dread Pirate Robert, DPR ... Read more

Source: www.scmagazine.com

Top found tags: fraud(1),hacking(1),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
FireEye examines popular Google Play apps, 68 percent have SSL flawsLocation: Google HQ - Mountain View, United States
Date published: 22-08-2014

"Vulnerability impacting multiple versions of Android could enable device takeover" The firm analyzed 1,000 free apps in Google Play which were most downloaded by users. After analyzing the most downloaded free apps in Google Play, a security firm found that nearly 68 percent were impacted by secure... Read more

Source: www.scmagazine.com

Top found tags: telecom sector(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Todays Tech: Gmail hacked, Monkeys rights abused and Google self-driving cars hit road blockLocation: Google HQ - Mountain View, United States
Date published: 22-08-2014

ITProNate. Todays Tech: Gmail hacked, Monkeys rights abused and Google self-driving cars hit road block Gmail? More like See-though mail Gmail app on Android smartphone hacked by US researchers US researchers have managed to successfully hack into Gmail accounts in 92 per cent of cases. The re... Read more

Source: itproportal.com

Top found tags: Google(2),financial sector(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Three easy ways to separate work and play on the same PCLocation: Google HQ - Mountain View, United States
Date published: 22-08-2014

All of us lead double lives these days since we both work and play online. During the day you may be working on a company document in Google Drive, while at night you're kicking back and chatting with friends on Skype. Many of us also end up using our personal PCs to work on company projects from ho... Read more

Source: www.pcworld.com

Top found tags: Microsoft(3),Google(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English advisories

Siemens OpenSSL Vulnerabilities (Update C)Location: National Institute of Standards - Gaithersburg, United States
Date published: 21-08-2014

The National Institute of Standards and Technology (NIST) released today draft guidelines for addressing the security risks posed by the use of Secure Shell (SSH) for automated access. SSH, the cryptographic network protocol used for secure data communication and other secure network services, is ut... Read more

Source: ics-cert.us-cert.gov

Top found tags: United States(2),government(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Geraffineerde phishing-aanval op AndroidLocation: Google HQ - Mountain View, United States
Date published: 21-08-2014

Onderzoekers hebben een aanval opgezet waarbij ze met een nep-app een bestaande app kunnen overnemen. De aanval werkt in ieder geval op Android en mogelijk ook op andere os'en. De onderzoekers stellen dat ze Gmail-logingegevens in 92 procent van de gevallen kunnen buitmaken.... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1),phishing(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
"Flashback meest actieve malware bij universiteiten VS"Location: Apple HQ - Cupertino, United States
Date published: 22-08-2014

De Flashback-malware die Macs infecteert was het afgelopen jaar de meest actieve malware bij Amerikaanse universiteiten, zo beweert een Amerikaans onderzoeksbureau dat security ratings geeft. Met name bij gerenommeerde universiteiten als Harvard, Yale en Princeton was de Mac-malware actief en verant... Read more

Source: www.security.nl

Top found tags: update(2),cybercrime(3),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Onderzoekers onthullen slimme phishingaanval op AndroidLocation: Google HQ - Mountain View, United States
Date published: 22-08-2014

Onderzoekers hebben een een slimme manier onthuld om phishingaanvallen op verschillende populaire Android apps, zoals die van Gmail, Amazon en de Amerikaanse CHASE Bank, uit te voeren en vervolgens inloggegevens en andere informatie van gebruikers zo goed als onopgemerkt te stelen. De aanval is ontw... Read more

Source: www.security.nl

Top found tags: Windows(1),financial sector(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kaspersky geeft Britse agenten cybercrime-trainingLocation: Den Haag, The Netherlands
Date published: 22-08-2014

Het Russische anti-virusbedrijf Kaspersky Lab is door de politie van Londen ingeschakeld om agenten te trainen zodat die cybercrime kunnen herkennen en oplossen. Volgens de virusbestrijder zorgt de complexiteit en aard van cybercrime ervoor dat het lastig te detecteren en te begrijpen is. Door de tr... Read more

Source: www.security.nl

Top found tags: United Kingdom(2),cybercrime(4),Kaspersky Lab(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Rotterdammer downloadde miljoenen bestanden bij slachtoffersLocation: Rotterdam, Rotterdam, Zuid-Holland, The Netherlands
Date published: 22-08-2014

De Rotterdamse man tegen wie het Openbaar Ministerie (OM) gisteren 137 dagen cel eiste wegens het besmetten van zo'n 2.000 computers, downloadde 40 miljoen afbeeldingen en video's bij zijn slachtoffers, zo laat het OM weten. Ook werden bestanden verspreid en vernietigd. De 19-jarige man gebruikte ma... Read more

Source: www.security.nl

Top found tags: social media(4),The Netherlands(4),government(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nederlandse autobedrijven doelwit van malware-aanvalLocation: Amsterdam, The Netherlands
Date published: 22-08-2014

Autobedrijven in met name Nederland, Duitsland en Itali zijn het doelwit van een malware-aanval geworden waarbij wordt geprobeerd om via e-mail computersystemen met een Trojaans paard te infecteren dat allerlei gevoelige gegevens steelt, zoals gebruikersnamen en wachtwoorden. Dat meldt anti-virusb... Read more

Source: www.security.nl

Top found tags: trojan(2),cybercrime(3),Google(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tool helpt slachtoffers SynoLocker bij terugkrijgen bestandenLocation: F-Secure - Helsinki, Finland
Date published: 22-08-2014

Het Finse anti-virusbedrijf F-Secure heeft een gratis tool ontwikkeld waarmee slachtoffers van de SynoLocker-ransomware hun bestanden kunnen terugkrijgen als ze tenminste eerst de cybercriminelen achter de ransomware het gevraagde losgeld hebben betaald. SynoLocker is een vorm van ransomware die bes... Read more

Source: www.security.nl

Top found tags: patch(1),ransomware(1),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

Bank in Zuid-Europa ontdekt flinterdun skimapparaatLocation: Brussel, Belgium
Date published: 22-08-2014

Een bank in Zuid-Europa heeft een flinterdun skimapparaat ontdekt dat skimmers in de kaartlezer van een geldautomaat hadden verborgen. Het skimapparaat, dat na een waarschuwing van de automaat door een technicus werd ontdekt, kopieerde de magneetstrip die nog altijd op pinpassen aanwezig is. Volgens... Read more

Source: www.security.nl

Top found tags: NL(1),ATM(2),financial sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Xtreamer en Eminent komen met nieuwe ip-beveiligingscamera'sLocation: Google HQ - Mountain View, United States
Date published: 22-08-2014

Eminent heeft de Easy Pro View Outdoor HD-ip-camera aangekondigd. De buitencamera is voorzien van twee lenzen en hd-sensoren voor dag- en nachtgebruik. Ook Xtreamer komt met een ip-camera. Het gaat om een eenvoudige ip-camera en een basisstation voor het bekijken van beelden. De EM6260 Easy Pro View... Read more

Source: tweakers.net

Top found tags: smartphone(1),wireless(1),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Budgetten voor beveiliging 8 procent omhoogLocation: Gartner - Stamford, United States
Date published: 22-08-2014

Dit jaar zal er 8 procent meer worden besteed aan beveiliging dan in 2013, concludeert Gartner. Het bureau tekent aan dat dat komt doordat ondernemingen zich steeds meer bewust worden van de bedreigingen in de IT-wereld. In geld uitgedrukt gaat het om bestedingen van 71,1 miljard dollar. Vorig jaar ... Read more

Source: www.automatiseringgids.nl

Top found tags: BYOD(1),NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Defecte Windows-update zou 0,01% computers rakenLocation: Microsoft HQ - Redmond, United States
Date published: 22-08-2014

De defecte Windows-update die Microsoft vorige week terugtrok vanwege verschillende problemen bij Windows 7 en Windows 8 zou 0,01% van de Windowscomputers raken. Het gaat om Security Bulletin MS14-045, die drie lekken verhelpt. Bij sommige pc's zorgde de update voor een Blue Screen of Death. Daarnaa... Read more

Source: www.security.nl

Top found tags: patch(2),social media(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Misdaadsyndicaat chanteerde duizenden mensen via webcamLocation: Microsoft HQ - Redmond, United States
Date published: 22-08-2014

In de Filipijnen zijn acht mensen opgepakt die onderdeel van een misdaadsyndicaat zouden zijn dat duizenden mensen via het internet afperste. De arrestaties zijn een vervolg op een operatie van Interpol die in mei van dit jaar plaatsvond. Volgens Interpol opereerde de bende op een bijna industrile... Read more

Source: www.security.nl

Top found tags: Hong Kong(2),social media(2),telecom sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Tor-directeur: geheime diensten tippen ons over Tor-lekkenLocation: New York, United States
Date published: 22-08-2014

Volgens de directeur van het Tor Project, de organisatie die de Tor-software ontwikkelt en onderhoudt, komen er regelmatig anonieme bugmeldingen binnen van mensen die bij Amerikaanse en Britse geheime diensten werken. Dat vertelt Andrew Lewman in een interview met de BBC. Tor laat internetgebruikers... Read more

Source: www.security.nl

Top found tags: United Kingdom(4),government(5),United States(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Bedrijven geven 8% meer uit aan IT-beveiligingLocation: Amsterdam, The Netherlands
Date published: 22-08-2014

Bedrijven vergroten dit jaar hun investering in beveiliging. Gartner verwacht dat organisaties in 2014 8% meer geld uitgeven aan beveiliging dan in 2013. Vorig jaar gaven bedrijven wereldwijd nog zo'n 66 miljard dollar uit aan IT-security. Dit jaar groeien de uitgaven aan digitale beveiliging naar v... Read more

Source: www.beveiligingnieuws.nl

Top found tags: NL(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Technologie moet negatief effect hoge latency bij streaming games verminderenLocation: Microsoft HQ - Redmond, United States
Date published: 22-08-2014

Microsoft heeft een technologie ontwikkeld die de nadelige effecten van verbindingen met hoge latency moet verminderen. De r&d-afdeling van het Redmondse bedrijf claimt dat het werkt; in Doom 3 bleken spelers met de technologie ingeschakeld minder snel afgeschoten te worden. Microsoft heeft de besta... Read more

Source: tweakers.net

Top found tags: Microsoft(1),NL(1),research(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Filmpiraat opgepakt dankzij nickname op datingsiteLocation: Amsterdam, The Netherlands
Date published: 22-08-2014

In Groot-Brittanni is een 25-jarige filmpiraat, die kon worden opgepakt dankzij het gebruik van zijn nickname op een datingsite, veroordeeld tot een gevangenisstraf van 33 maanden. Programmeur Philip Danks had op de openingsdag van Fast & Furious 6 de film in een Britse bioscoop opgenomen. Hij moe... Read more

Source: www.security.nl

Top found tags: police(1),social media(2),United Kingdom(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Celstraf voor bende die 36.000 pinpassen in Engeland skimdeLocation: Den Haag, The Netherlands
Date published: 22-08-2014

In Engeland is een bende criminelen wegens het skimmen van 36.000 pinpassen tot een gevangenisstraf van bij elkaar 15 jaar veroordeeld. De bende kon worden opgerold na onderzoek van de Dedicated Cheque en Plastic Crime Unit (DCPCU), een door de banken gesponsorde politie-eenheid, en hulp van de Roem... Read more

Source: www.security.nl

Top found tags: research(1),United Kingdom(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch advisories

Kwetsbaarheden in Symantec Encryption Desktop verholpenLocation: Symantec HQ - Mountain View, United States
Date published: 22-08-2014

Samenvatting: Symantec heeft updates uitgebracht voor PGP Desktop en Encryption Desktop om een kwetsbaarheid te verhelpen. Gevolgen: Een kwaadwillende kan de kwetsbaarheid mogelijk misbruiken om een Denial-of-Service te veroorzaken. Beschrijving: Een kwaadwillende kan een speciaal versleutelde e-mai... Read more

Source: www.ncsc.nl

Top found tags: NL(1),Symantec(1),vulnerability(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in QEMU verholpenLocation: Amsterdam, The Netherlands
Date published: 22-08-2014

Samenvatting: Er zijn meerdere kwetsbaarheden verholpen in QEMU. Gevolgen: Door deze kwetsbaarheden te misbruiken kan een kwaadwillende een Denial-of-Service uitvoeren en mogelijk code uitvoeren op het host systeem met rechten van de gebruiker waaronder het QEMU proces draait. Beschrijving: Er bevin... Read more

Source: www.ncsc.nl

Top found tags: vulnerability(1),Fedora(2),Red Hat(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Meerdere kwetsbaarheden in file verholpenLocation: Ubuntu - London, United Kingdom
Date published: 22-08-2014

Samenvatting: Meerdere kwetsbaarheden in file kunnen leiden tot een Denial-of-Service op de file applicatie. Gevolgen: Een kwaadwillende kan de kwetsbaarheden misbruiken voor het laten crashen van de file applicatie. Beschrijving: - CVE-2012-1571, CVE-2014-0207, CVE-2014-3487, CVE-2014-3479, CVE-201... Read more

Source: www.ncsc.nl

Top found tags: Ubuntu(2),update(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish