Monthly Archives: September 2014
VMware Security Advisory 2014-0008
VMware Security Advisory 2014-0008 – VMware has updated vSphere third party libraries.
Cisco Security Advisory 20140908-ucse
Cisco Security Advisory – A vulnerability in the Cisco Integrated Management Controller (Cisco IMC) SSH module of the Cisco Unified Computing System E-Series Blade servers could allow an unauthenticated, remote attacker to cause a denial of service condition. The vulnerability is due to a failure to properly handle a crafted SSH packet. An attacker could exploit this vulnerability by sending a crafted packet to the SSH server running on the Cisco IMC of an affected device, which could result in the Cisco IMC becoming unresponsive. The operating system running on the blade will be unaffected. Cisco has released free software updates that address this vulnerability.
HP Security Bulletin HPSBMU03075
HP Security Bulletin HPSBMU03075 – A potential security vulnerability has been identified with HP Network Node Manager I (NNMi) on Windows and Linux. This vulnerability could be exploited remotely to allow arbitrary code execution. Revision 1 of this advisory.
Debian Security Advisory 3021-1
Debian Linux Security Advisory 3021-1 – Multiple security issues have been found in file, a tool to determine a file type. These vulnerabilities allow remote attackers to cause a denial of service, via resource consumption or application crash.
HP Security Bulletin HPSBST03106
HP Security Bulletin HPSBST03106 – A potential security vulnerability has been identified in HP P2000 G3 MSA Array System running OpenSSL. This vulnerability could be exploited remotely resulting in unauthorized access or disclosure of information. Revision 1 of this advisory.
Leave your credit cards at home; Apple Pay lets you buy things with your phone
In the wake of the Target, and now Home Depot, security breaches, Apple Pay wants to provide a safer way to make a purchase.
Nestled in-between this weekâs announcements of the iPhone 6 and the Apple Watch, Apple CEO Tim Cook announced a new mobile payment system called Apple Pay. New iPhone and Apple Watch owners can leave their credit and debit cards at home because the devices come with a chip that lets them tap-to-pay at major retailers.
When you are in one of 220,000 participating stores, like McDonaldâs, Walgreens, Disney, or Macyâs, you use the magic of near-field communication (NFC) to hold your phone by a terminal to pay. It also requires that you place your finger over a sensor to verify your fingerprint. The Apple Watch works the same way, without the added security of the fingerprint, and syncs to your iPhone 5, iPhone 5c, and iPhone 5s. The payment system will work with American Express, Mastercard, and Visa.
Sounds pretty good. But, Google Wallet, PayPal and other NFC systems have failed to really take off; will Apple give us a better way? I asked mobile malware analyst Filip Chytrý to share his thoughts about the security of Apple Pay.
Deborah: From a security perspective, what do you think about Apple Pay?
Filip: I have some concerns. Communications between your device or watch is through Bluetooth, and we have already seen many incidences of intercepted communication between two devices using a man-in-the-middle attack. Generally, anytime you use a pay system there is communication between the phone or watch over Bluetooth. This communication works over a much longer distance than NFC, so payment interception would be easier.
Deborah: I understand the convenience of paying with Apple Pay, but how is this more secure than paying with a credit card?
Filip: Apple says, that âEach transaction is authorized with a one-time unique number, and instead of using the security code from the back of your card, Apple Pay creates a âdynamic security codeâ to securely validate each transaction.â It really depends on the type of encryption which is used, but I have to admit this sounds pretty cool, but who knows how long it’s going to take to decrypt this system.
Deborah: It has to be better than the magnetic stripe cards that are still widely used in the USA. Credit card companies have given their customers until 2015 to make the transition to EMV cards using smartchip technology. These cards are supposed to help increase security and reduce fraud. Isn’t that good enough?
Filip: Generally, Apple Pay sounds like it is better secured than the current magnetic stripe cards. NFC payments are just tags which can be easily copied, but magnetic stripes are even worse. A PIN number adds an extra layer which is good, but Apple Pay might provide an even better way in future.
Deborah: Other than the basic security concerns, what happens when your phone battery dies (this will happen to me when I am on a deserted rural highway and need to fill up with gas) or you spill your coffee on it before you can pay, or you break your finger and itâs in a cast?
Filip: Those are real world problems that can’t be solved by Apple. But you’re an Android user, right? Didn’t you have a Nexus 4?
Deborah: Yes, I did. Until I accidentally went in the swimming pool with it.
Filip: Not even avast! Mobile Security can protect you from that! But still, you will find this hilarious.
Thank you for using avast! Antivirus and recommending us to your friends and family. For all the latest news, fun and contest information, please follow us on Facebook, Twitter, Google+ and Instagram. Business owners â check out our business products.
Cisco Integrated Management Controller Vulnerability
Original release date: September 11, 2014
Cisco has released an advisory to address a vulnerability in the Cisco Integrated Management Controller (Cisco IMC) SSH module of the Cisco Unified Computing System E-Series Blade servers that could allow an unauthenticated, remote attacker to cause a denial of service condition. Migration to release 2.3.1 is available for Cisco IMC Software versions 1.0.1, 1.0.2, 2.1.0, and 2.2.0.
Users and administrators are encouraged to review the Cisco Advisory and apply the necessary updates.
This product is provided subject to this Notification and this Privacy & Use policy.
Key Flaw Enables Recovery of Files Encrypted by TorrentLocker
Crypto ransomware, a relatively unknown phenomenon a couple of years ago, has exploded into one of the nastier malware problems for Internet users. Variants such as CryptoLocker and CryptoWall have been siphoning money from victims for some time, and now researchers have dissected a newer variant known as TorrentLocker and found that the creators made […]
Winners of the ‘Betatester 2015′ competition
At last we can announce the names of the winners of the Panda Global Protection 2015 beta competition!
Our Betatester of the Year and winner of â¬600 is:
- Saravana Kumar S., India
The winners of â¬200 are:
- Anil Kumar E.S, India
- Jayakrishnan P., India
- Alex Molina, Spain
- Binshad Shahul, India
- HUANGÂ JING-KAI, Taiwan
- Andreas Ntonas, de Greece
- Kevin Appel, Switzerland
- Lauri Säde, Estonia
- Saqiya Maghisla, India
We have also awarded another 250 prizes of a one-year Panda Global Protection 2015 licence for three devices.
Thank you very much to all those who entered for your comments and suggestions!
More | Maximum protection with Panda Securityâs new 2015 consumer solutions
The post Winners of the âBetatester 2015â² competition appeared first on MediaCenter Panda Security.