CentOS Errata and Security Advisory 2015:1185 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1185.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: a74da22a4f4859a8a476af17f4f871901bb90da15afcf16665a66f0b6c71afdb nss-3.19.1-3.el6_6.i686.rpm 5386cf07a44380ffb202ba7e82f10220d36abc97478b49993b7a95690d085c9d nss-devel-3.19.1-3.el6_6.i686.rpm d3da3f8d93cf5505d4d3c83a1f4cf610ffccf96f6dae68e18d9ec0befea03198 nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm 66ae3f655a0f04df9a4ab92a744a3754c5634097e305692a71908a2b26e99f85 nss-sysinit-3.19.1-3.el6_6.i686.rpm f95028d6f4dab7cac8b000a6d5edc8ad50b4c51fa9098a11bd1537278c589d65 nss-tools-3.19.1-3.el6_6.i686.rpm x86_64: a74da22a4f4859a8a476af17f4f871901bb90da15afcf16665a66f0b6c71afdb nss-3.19.1-3.el6_6.i686.rpm 527b9685f9466312d5dc12fd5c95a17eaca308b93cb6e6e2b6e90f67b6199839 nss-3.19.1-3.el6_6.x86_64.rpm 5386cf07a44380ffb202ba7e82f10220d36abc97478b49993b7a95690d085c9d nss-devel-3.19.1-3.el6_6.i686.rpm 3e9aad3ff99d1c8dd83246b5182715bcf6b3fa7b3ac8d185aa39808c5365b3eb nss-devel-3.19.1-3.el6_6.x86_64.rpm d3da3f8d93cf5505d4d3c83a1f4cf610ffccf96f6dae68e18d9ec0befea03198 nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm d43230dd26cd5d746e578f2b8dd45dde8b9db72810bcdc43aa1675c5d8138832 nss-pkcs11-devel-3.19.1-3.el6_6.x86_64.rpm 5544ff6bb87c77715fa11ad9ad61941f57dffdfde8427129c75090ae0f1851da nss-sysinit-3.19.1-3.el6_6.x86_64.rpm d682e4187fda2f1b2222ea70fb7795887bdb7fc6168167fb51fc58bacd87b90c nss-tools-3.19.1-3.el6_6.x86_64.rpm Source: b30fb858dcec5a154713cfd27386aa48def4cf819f2ed39f586c513f8eb1d209 nss-3.19.1-3.el6_6.src.rpm
Monthly Archives: June 2015
CESA-2015:1185 Moderate CentOS 6 nss-utilSecurity Update
CentOS Errata and Security Advisory 2015:1185 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1185.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 07b2323f67221bfa440bcbf79d099b401f0b05539d5c7c6054682eea1a054043 nss-util-3.19.1-1.el6_6.i686.rpm 3a33c0c12ce812e18d86d1ba0601546ba645babb4b129f5318472180ddfb3ccb nss-util-devel-3.19.1-1.el6_6.i686.rpm x86_64: 07b2323f67221bfa440bcbf79d099b401f0b05539d5c7c6054682eea1a054043 nss-util-3.19.1-1.el6_6.i686.rpm 6d18c09300d59c832734701ff7403398a46ef2faa8897ae52f88d204a2d610a2 nss-util-3.19.1-1.el6_6.x86_64.rpm 3a33c0c12ce812e18d86d1ba0601546ba645babb4b129f5318472180ddfb3ccb nss-util-devel-3.19.1-1.el6_6.i686.rpm abceb0b92d73c562720382d69b6e9af3d72f85257fb66dbad9de07652e68e844 nss-util-devel-3.19.1-1.el6_6.x86_64.rpm Source: 8b4f5d17d8260f788fc58e0d22bc4f6d79481822be4218403e3d8dfc7f92229b nss-util-3.19.1-1.el6_6.src.rpm
Samsung’s SW Update Says “NO†To Windows Update
Yup, I get annoyed by the Windows Update popup reminders as well. Still – updating is important and at the end of the day I am quite happy that there actually are updates to patch vulnerabilities and fix issues. Which is why it is so shocking to find out that this time it’s not actual malware that is trying to disable it but a well know company: Samsung.
Microsoft MVP Patrick Barker discovered the issue when assisting a user with a Windows Update issue. According to him “it was figured out eventually after using auditpol.exe and registry security auditing (shown below later) that the program that was responsible for disabling Windows Update was Disable_Windowsupdate.exe, which is part of Samsung’s SW Update software.”
Luckily the Samsung SW Update tool does not come with PCs by default: Users have to download it from Samsung’s website and install it. But let’s be honest: If you buy a new laptop you often download available tools in order to keep the system up to date as easy as possible. According to VentureBeat doing so is a common practice since there were people complaining about having an update problem before.
Now, Baker even got in touch with Samsung, whose support team had to say the following: “When you enable Windows updates, it will install the Default Drivers for all the hardware no laptop which may or may not work. For example if there is USB 3.0 on laptop, the ports may not work with the installation of updates. So to prevent this, SW Update tool will prevent the Windows updates.”
Well. Disabling the Windows Update does seem a very crass solution when it comes to making sure your updates and drivers will not break with new Windows updates …
The post Samsung’s SW Update Says “NO” To Windows Update appeared first on Avira Blog.
Bugtraq: [SECURITY] [DSA 3294-1] wireshark security update
[SECURITY] [DSA 3294-1] wireshark security update
Bugtraq: CVE-2015-3443 XSS in Thycotic Secret Server version 8.6.000000 to 8.8.000004
CVE-2015-3443 XSS in Thycotic Secret Server version 8.6.000000 to 8.8.000004
Bugtraq: CVE-2015-4464 Insufficient Authorization Checks Request Handling Remote Authentication Bypass for Kguard Digital Video Recorders
CVE-2015-4464 Insufficient Authorization Checks Request Handling Remote Authentication Bypass for Kguard Digital Video Recorders
Bugtraq: [SECURITY] [DSA 3295-1] cacti security update
[SECURITY] [DSA 3295-1] cacti security update
Panda Security continues to expand internationally through organic growth and innovation as it celebrates its 25th anniversary #Panda25years
Panda Security has reason to celebrate. Today the multinational developer of security solutions designed to protect the digital lives of individuals and organizations alike is celebrating 25 years in the vanguard of IT security, not just in its native Spain, but all around the globe. Panda Security, with a direct presence in more than 80 countries and products distributed in around 200, has announced that Italy and Denmark are set to join its network of subsidiaries, as two important markets for the company’s European business. With these latest additions, the company now has 16 subsidiaries: Austria, Belgium, Brazil, Canada, Denmark, Finland, France, Germany, Holland, Italy, Mexico, Portugal, Spain, Sweden, United Kingdom, and the U.S.A.
This internationalization process, which represents one of the pillars of the company’s four-year strategic plan, is further bolstered by the consolidation of its presence in markets where it is already strong, -Western Europe, the USA, Latin America-, for example with the recent inclusion of Panama in its ‘Country Partner’ model.
Moreover, in the coming months, Panda’s international expansion plan will also see it strengthen its position in emerging markets such as China, Russia and India.
New strategy for the 25th anniversary
In the year of its 25th anniversary the company has adopted a new corporate identity that reflects Panda’s commitment to simplifying the apparently complex, through the concept of ‘Simplexity’. This concept underpins the company’s effort to provide new and improved solutions to safeguard users’ digital lives.
“Our mission is to offer users a simple, fast and effective solution, which is always the product of our innovation. Throughout these 25 years, Panda has never ceased to innovate and to be in the vanguard of technology. We are positioned as visionaries with the implementation of technologies like Cloud Computing or Big Data Analytics which were totally disruptive some years ago. Now we are looking ahead to another 25 years with energy and enthusiasm, and with the certainty that we have all the resources we need to continue leading the way”, explains Diego Navarrete, CEO of Panda Security.
Diego Navarrete, CEO of Panda Security
The company is set to embark on a four-year strategic plan, centered on internationalization, on maintaining the pace of growth –both of sales and product portfolio–, and on driving forward new technologies and strategic alliances that respond to market trends such as the Internet of things, Big Data, Cloud Computing or mobility.
To celebrate its 25th anniversary, Panda Security has prepared an infographic outlining the major milestones from the company’s history, which you can download here.
The post Panda Security continues to expand internationally through organic growth and innovation as it celebrates its 25th anniversary #Panda25years appeared first on MediaCenter Panda Security.
RHSA-2015:1184-1: Critical: flash-plugin security update
Red Hat Enterprise Linux: An updated Adobe Flash Player package that fixes one security issue is now
available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
CVE-2015-3113
RHBA-2015:1182-1: spamassassin bug fix update
Red Hat Enterprise Linux: Updated spamassassin packages that fix one bug are now available for Red Hat
Enterprise Linux 7.