Monthly Archives: July 2015
FreeBSD-SA-15:17.bind
FreeBSD-SA-15:15.tcp
Panda Security achieves the highest protection ratio for the fourth consecutive month
Panda Security achieved the highest protection ratios in the Real World-Protection Tests conducted by AV- Comparatives in March, April, May and June 2015. This test evaluates the real-life protection capabilities of antivirus software.

Panda Security took part in the review with Panda Free Antivirus, the company’s free solution, which detected and blocked 99.9% of all threats. In simple terms, the test framework replicates the scenario of an everyday user in an everyday online environment, testing antivirus software products against malicious Internet downloads or exploits designed to infect computers automatically by taking advantage of system vulnerabilities. The study, which analyzed more than 20 antivirus solutions, reinforce the great protection capabilities of Panda Security’s free product.
According to Luis Corrons, Technical Director of PandaLabs, Panda Security’s anti-malware laboratory, “We are especially proud of the excellent results obtained in the Real-World Protection Test, not only for taking first place in malware blocking and infection prevention, but because this is one of the most demanding tests when it comes to evaluating the real-life protection capabilities of antivirus software. Unlike other tests that use huge amounts of inactive malware, AV-Comparatives pits antivirus solutions against actual threats commonly found on the Web or on users’ computers. This way, the organization manages to reflect the real protection capabilities provided by the different security solutions”.
The efficiency of a smart engine
Panda Security has been 25 years at the vanguard of technological innovation, developing new technologies such as the XMT Smart Engineering engine, the basis of all of the company’s consumer solutions. With XMT, different technologies interact with each other to achieve new levels of efficiency and greater detection and disinfection power to eradicate all threats.
Year after year, and tests after test, the multinational security vendor keeps demonstrating the outstanding performance of its solutions, recognized by the industry for their superior protection and detection power. This efficiency level is at the heart of the company’s innovating, people-centric and unique service offering.
Click here to download an infographic.
The post Panda Security achieves the highest protection ratio for the fourth consecutive month appeared first on MediaCenter Panda Security.
Multiple unresolved vulnerabilities in Basware Banking/Maksuliikenne
Posted by Samuel Lavitt – CVE-2015-0942 on Jul 28
English: Multiple vulnerabilities in Basware Banking/Maksuliikenne software that were reported already 08/2012 may
still enable undetectable economic crimes against user organizations (companies)
Finnish: Basware Banking/Maksuliikenne -ohjelmiston haavoittuvuudet, joista raportoitiin jo 08/2012, saattavat edelleen
mahdollistaa käyttäjäyrityksiin kohdistuvia ”näkymättömiä” talousrikoksia
Swedish: Sårbarheter i Basware…
Another Snorby 2.6.2 – Stored Cross-site Scripting Vulnerability
Posted by Federico Fazzi on Jul 28
——————————————————–
Snorby 2.6.2 – Stored Cross-site Scripting Vulnerability
——————————————————–
Vendor
——
Version
——-
2.6.2
Description
———–
Found another Stored Cross-site Scripting (XSS) vulnerability in Snorby.
The vulnerability exists in the module for save a new search where the user
input is not correctly sanitized before…
Vuln: Debian OpenJDK CVE-2014-8873 Remote Code Execution Vulnerability
Debian OpenJDK CVE-2014-8873 Remote Code Execution Vulnerability
Vuln: Oracle Java SE CVE-2015-0488 Remote Security Vulnerability
Oracle Java SE CVE-2015-0488 Remote Security Vulnerability
DSA-3319 bind9 – security update
Jonathan Foote discovered that the BIND DNS server does not properly
handle TKEY queries. A remote attacker can take advantage of this flaw
to mount a denial of service via a specially crafted query triggering an
assertion failure and causing BIND to exit.
Vuln: WordPress Swim Team Plugin 'download.php' Arbitrary File Download Vulnerability
WordPress Swim Team Plugin ‘download.php’ Arbitrary File Download Vulnerability