RabbitMQ before 3.4.0 allows remote attackers to bypass the loopback_users restriction via a crafted X-Forwareded-For header.
Monthly Archives: January 2015
CVE-2015-1030
Memory leak in the rfc2553_connect_to function in jbsocket.c in Privoxy before 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of requests that are rejected because the socket limit is reached.
CVE-2015-1201
Privoxy before 3.0.22 allows remote attackers to cause a denial of service (file descriptor consumption) via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Nasty Oracle Vulnerability Leaves Researcher ‘Gobsmacked’
Oracle on Tuesday will release a huge number of security fixes as part of its quarterly critical patch update, and one of them is a patch for a vulnerability that a well-known security researcher said looks a lot like a back door but was likely just a terrible mistake. The flaw is found in Oracle’s […]
CSRF Vulnerability Patched in GoDaddy Domain Settings
A cross site request forgery vulnerability in GoDaddy domain settings has been patched two days after it was reported to the domain registrar.
1800 Minecraft logins leak online
More than 1,800 Minecraft login details have been leaked online, German news site Heise.de has revealed.
The post 1800 Minecraft logins leak online appeared first on We Live Security.
Report: Companies Still Not Patching Security Vulnerabilities
The Cisco 2015 Annual Security report shows that CISOs and other security personnel are confident about their strategies despite that they are not patching.
Remote Desktop 0.9.4 Android CSRF / Command Injection
Remote Desktop version 0.9.4 Android suffers from local command injection and cross site request forgery vulnerabilities.
10 Tips for protecting your company’s email
Practically all important information that we work with nowadays reaches us via corporate email. That’s why email security is so important for companies. Here we offer some advice to bear in mind to prevent unauthorized people from accessing your email – and the information it contains.

10 Tips for protecting your company’s email
Many of the cyber-attacks that target large companies can be traced back to email. When all’s said and done, this is the place where a company’s most useful information can be found; where employees chat; where credit card details -even passwords- are sent. Read on if you want to know how to look after this information.
- The first thing you should be thinking about as a company owner is training your staff in IT security, to eliminate dangerous behavior when using company email.
- Employees can counter risks by deleting old emails. You accumulate hundreds (even thousands) of messages in the belief that the information is really important (it could be for a cyber-criminal!). If you genuinely regard the information as vital, you could always save it to an external hard drive or data base and then delete the original emails.

- Encrypt your email. One of the main features of corporate email is that it gives companies control over sensitive information, and prevents it from being circulated through employees’ personal email accounts. The best way to ensure such control and keep it from falling into the wrong hands is to encrypt it.
- When you have to create a password make sure it’s complex and that nobody could guess it. That said, make sure you can easily remember it too.
- You should also be careful when starting a corporate email session from public computers in libraries, Internet cafes and the like. Make sure you close the session before leaving the computer, though even then you can leave traces of your activity that are easily detected by cyber-criminals. Better only to access your company email on trusted networks.
- Don’t give your email address to everyone, and don’t post it on public Internet sites, remember that scammers are always on the lookout for new victims.

- Careful with fake emails that try to trick you into resetting passwords as part of a supposed security check. These are normally scams designed to steal your passwords and access your email account. If you really need to change your password, go to your email provider’s website and make any changes from there, but don’t click on links sent to you via email.
- On a similar note: don’t even open emails sent from unknown sources.
- And of course don’t forget that company email is a working tool, it’s not for exchanging messages with friends and family. Remembering this will also help keep information from falling into the wrong hands.
- Last but not least, a good tool for protecting email from malware and other dangerous content is Panda GateDefender, which can prevent unwanted files from entering into contact with your company’s most sensitive data. This software filters spam to safeguard employee productivity, and also enables the secure and centralized storage and administration of your network’s users’ messages, ensuring flexibility and complete connectivity.
The post 10 Tips for protecting your company’s email appeared first on MediaCenter Panda Security.
Remote Web Desktop Full 5.9.5 Cross Site Request Forgery / Cross Site Scripting
Remote Web Desktop Full version 5.9.5 suffers from cross site request forgery and cross site scripting vulnerabilities.