How to solve your problems with your computer or smartphone

premium assistance

Do you have a virus in your computer and don’t know how to remove it? Don’t know how to set your Wi-Fi connection? You have a new smartphone and need to set it up?

Don’t worry! Ask for our remote assistance and enjoy a hassle-free digital life.

We have three different plans for you to choose from. Which meets you needs:

Fix&Protect Plan

Keep your computer virus-free.

  • Basic TuneUp/Optimization of Windows on 1 computer.
  • Disinfection of viruses and spyware.
  • Resolving any technical or IT security queries.
  • Installation and configuration of Panda Antivirus PRO (3 months of service).

Family Plan

Configure your home Wi-Fi network, as well as your PC, Mac or smartphone.

  • All options included in the Fix&Protect Plan.
  • Technical assistance for up to 5 devices.
  • Setting up your home Wi-Fi connection.
  • Setting up privacy settings on social networks.
  • Setting up your smartphone or tablet.
  • TuneUp/Optimization of your PC, Mac or smartphone.
  • Installation and configuration of Global Protectio on 5 devices (3 months service).

Complete Plan

A security expert will assist you anytime, anywhere.

  • All the options included in the Digital Home Plan.
  • Technical assistance for up to 10 devices.
  • Configuration of security on Web browsers and email accounts.
  • Troubleshooting of problems on your operating system or any other app or software.
  • Assistance with peripherals such as printers, cameras, scanners, etc.
  • Installation and setup of Global Protection on up to 10 devices (3 months service).

Try our remote assistance and forget about your problems. Call us free of charge and we will inform you about how it works!

The post How to solve your problems with your computer or smartphone appeared first on MediaCenter Panda Security.

Webs ID Reflected XSS (Cross-site Scripting) Security Vulnerabilities

Posted by Jing Wang on Apr 15

*Webs ID Reflected XSS (Cross-site Scripting) Security Vulnerabilities*

Exploit Title: Webs ID /login.jsp &error Parameter Reflected XSS
(Cross-site Scripting) Security Vulnerabilities
Vendor: Webs, Inc
Product: Webs ID
Vulnerable Versions:
Tested Version:
Advisory Publication: April 02, 2015
Latest Update: April 02, 2015
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: *
Impact CVSS Severity (version 2.0):
CVSS v2 Base…

Comsenz SupeSite CMS 7.0 Stored XSS (Cross-site Scripting) Security Vulnerabilities

Posted by Jing Wang on Apr 15

*Comsenz SupeSite CMS 7.0 Stored XSS (Cross-site Scripting) Security
Vulnerabilities*

Exploit Title: Comsenz SupeSite CMS 7.0 Stored XSS Security Vulnerabilities
Product: Supesite CMS (Content Management System)
Vendor: ComSenz
Vulnerable Versions: 6.0.1UC 7.0
Tested Version: 7.0
Advisory Publication: April 15, 2015
Latest Update: April 15, 2015
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: *
Impact CVSS Severity (version…

Opoint Media Intelligence Unvalidated Redirects and Forwards (URL Redirection) Security Vulnerabilities

Posted by Jing Wang on Apr 15

*Opoint Media Intelligence Unvalidated Redirects and Forwards (URL
Redirection) Security Vulnerabilities*

Exploit Title: Opoint Media Intelligence click.php? &noblink parameter URL
Redirection Security Vulnerabilities
Vendor: Opoint
Product: Opoint Media Intelligence
Vulnerable Versions:
Tested Version:
Advisory Publication: April 14, 2015
Latest Update: April 14, 2015
Vulnerability Type: URL Redirection to Untrusted Site (‘Open…

NetCat CMS 3.12 Multiple Directory Traversal Security Vulnerabilities

Posted by Jing Wang on Apr 15

*NetCat CMS 3.12 Multiple Directory Traversal Security Vulnerabilities*

Exploit Title: NetCat CMS 3.12 Multiple Directory Traversal Security
Vulnerabilities
Product: NetCat CMS (Content Management System)
Vendor: NetCat
Vulnerable Versions: 3.12 3.0 2.4 2.3 2.2 2.1 2.0 1.1
Tested Version: 3.12
Advisory Publication: April 14, 2015
Latest Update: April 14, 2015
Vulnerability Type: Improper Limitation of a Pathname to a Restricted…

NetCat CMS 3.12 HTML Injection Security Vulnerabilities

Posted by Jing Wang on Apr 15

*NetCat CMS 3.12 HTML Injection Security Vulnerabilities*

Exploit Title: NetCat CMS 3.12 /catalog/search.php? q Parameter HTML
Injection Security Vulnerabilities
Product: NetCat CMS (Content Management System)
Vendor: NetCat
Vulnerable Versions: 3.12 3.0 2.4 2.3 2.2 2.1 2.0 1.1
Tested Version: 3.12
Advisory Publication: April 15, 2015
Latest Update: April 15, 2015
Vulnerability Type: Improper Input Validation [CWE-20]
CVE…

Zed Attack Proxy 2.4.0 Windows Installer

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Windows installer.

Zed Attack Proxy 2.4.0 Linux Release

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Linux release.

Zed Attack Proxy 2.4.0 Mac OS X Release

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Mac OS X release.

I2P 0.9.19

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.