Resolved Bugs
1227243 – CVE-2015-0848 libwmf: heap overflow when decoding BMP images
1227244 – CVE-2015-0848 libwmf: heap overflow when decoding BMP images [fedora-all]<br
CVE-2015-0848 heap overflow when decoding BMP images
CVE-2015-0848 heap overflow when decoding BMP images
Monthly Archives: June 2015
US blames China for massive data breach
The OPM is responsible for human resources for the federal government which means they are the collectors and holders of personal data on all federal employees.
Law enforcement sources close to the breach stated that a “foreign entity or government” possibly Chinese was believed to be behind the attack, according to an article published in The Guardian.
It should be noted that the Chinese government stated that it was ‘not responsible’ and this conclusion was ‘counterproductive’.
The OPM carries out background checks on employees and holds data dating back to 1985. A successful attacker could gain access to records of past and present employees, with data that could even refer to retired employees and what they are doing now.
Regardless of whether you believe the continual finger pointing by one government at another, there are real people that are effected and protecting them and their identity should be the priority.
Alarmingly, an official said to Reuters that “Access to data from OPM’s computers, such as birth dates, Social Security numbers and bank information, could help hackers test potential passwords to other sites, including those with information about weapons systems”.
How to stay safe
While those of us who do not work for the government won’t have been affected by this breach, what can we do to protect ourselves identity theft?
- Ensure your online accounts are not using the email address and a password that could be guessed from personal information, if you are then change the password.
- Keep a close watch on your credit reports. This will help you identify if someone is using your identity to take a line of credit in your name. Most credit scoring agencies allow you to run a report for free at least once.
- Spammers may send emails that look like they are coming from valid sources. Make sure to carefully scrutinize these emails – don’t click on links that look suspicious – and if in doubt contact the sending organization directly to ensure it’s an official communication.
- Avoid using the same email address or identity across multiple online accounts. For example, have a primarily email address used for recovery of forgotten passwords and account information. Have a secondary email address for offline and online retail transactions. Have a third for financial accounts and sensitive information.
- Avoid Cold Calls: If you don’t know the person calling then do not hand over payment or personal details. If in doubt, hang up and call the organization directly to establish you are talking to legitimate operators.
- Set privacy Settings: Lock down access to your personal data on social media sites, these are commonly used by cybercriminals to socially engineer passwords. Try AVG PrivacyFix, it’s a great tool that will assist you with this.
- Destroy documents: Make sure you shred documents before disposing of them as they can contain a lot of personal information.
- Check statements and correspondence: Receipts for transactions that you don’t recognize could show up in your mail.
- Use strong passwords and two factor authentication: See my previous blog post on this, complex passwords can be remembered simply!
- Check that sites are secure: When you are sending personal data online, check that the site is secure – there should be a padlock in the address or status bar or the address should have a ‘https’ at the start. The ‘s’ stands for secure.
- Updated security software: Always have updated antivirus software as it will block access to many phishing sites that will ask you for your personal data.
Also consider enlisting an identity monitoring service, commercial companies that have been breached often offer this reactively to the victims. Understanding where or if your identity is being abused in real time will give you the ability to manage issues as they happen.
![]()
![]()
Monitor e PC Economici per Lavoro e Casa
Non vedi il contenuto di questa email? Clicca qui http://campaign.r20.constantcontact.com/render?ca=f4ced216-75bd-4337-bce1-ed5ca229e983&c=cd9eceb0-be9c-11e4-8f99-d4ae528eb986&ch=ce81b4a0-be9c-11e4-90fa-d4ae528eb986 Greetings! Inotra questa email http://ui.constantcontact.com/sa/fwtf.jsp?llr=9qmh7qdab&m=1103299326490&ea=broadcast%40simpaticotech.it&a=1121325544714 Questa mail è stata inviata a [email protected], da parte di [email protected] Aggiorna profilo/indirizzo e-mail http://visitor.constantcontact.com/do?p=oo&m=001ppwvHtrFNf1h59YxsVHM6Q%3D%3D&ch=ce81b4a0-be9c-11e4-90fa-d4ae528eb986&ca=f4ced216-75bd-4337-bce1-ed5ca229e983 Rimozione istantanea con SafeUnsubscribe(TM) http://visitor.constantcontact.com/do?p=un&m=001ppwvHtrFNf1h59YxsVHM6Q%3D%3D&ch=ce81b4a0-be9c-11e4-90fa-d4ae528eb986&ca=f4ced216-75bd-4337-bce1-ed5ca229e983 Informativa sulla privacy: http://ui.constantcontact.com/roving/it/CCPrivacyPolicy.jsp Online Marketing by Constant Contact(R) www.constantcontact.com Simpatico Network srl | Via Volta 7 | BUCCINASCO | 20090 | Italy
MS15-JUN – Microsoft Security Bulletin Summary for June 2015 – Version: 1.0
Revision Note: V1.0 (June 9, 2015): Bulletin Summary published.
Summary: This bulletin summary lists security bulletins released for June 2015.
2962393 – Update for Vulnerability in Juniper Networks Windows In-Box Junos Pulse Client – Version: 2.0
Revision Note: V2.0 (June 9, 2015): Added the 3062760 update to the Juniper VPN Client Update section.
Summary: Microsoft is announcing the availability of an update for the Juniper Networks Windows In-Box Junos Pulse Client for Windows 8.1 and Windows RT 8.1. The update addresses a vulnerability in the Juniper VPN client by updating the affected Juniper VPN client libraries contained in affected versions of Microsoft Windows.
MS15-059 – Important: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3064949) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (June 9, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
MS15-056 – Critical: Cumulative Security Update for Internet Explorer (3058515) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (June 9, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
MS15-063 – Important: Vulnerability in Windows Kernel Could Allow Elevation of Privilege (3063858) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (June 9, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker places a malicious .dll file in a local directory on the machine or on a network share. An attacker would then have to wait for a user to run a program that can load a malicious .dll file, resulting in elevation of privilege. However, in all cases an attacker would have no way to force a user to visit such a network share or website.
MS15-060 – Important: Vulnerability in Microsoft Common Controls Could Allow Remote Code Execution (3059317) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (June 9, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user clicks a specially crafted link, or a link to specially crafted content, and then invokes F12 Developer Tools in Internet Explorer.
MS15-057 – Critical: Vulnerability in Windows Media Player Could Allow Remote Code Execution (3033890) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (June 9, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if Windows Media Player opens specially crafted media content that is hosted on a malicious website. An attacker who successfully exploited this vulnerability could take complete control of an affected system remotely. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.