Take control of your antivirus for Android from your Smartwatch with Panda Mobile Security!

Did you know that the new version of Panda Mobile Security, our antivirus for Android, is now available in the Google Play store?

The main difference with this version is that you can access the features directly from your Android Wear Smartwatch. That means, that if you have a smartwatch, you can control the antivirus from your wrist.

New Panda Mobile Security

This is what you can do:

  • Analyze your telephone / tablet from the smartwatch.
  • Antitheft and locking of device.

But that’s not all, if you have the PRO version, Panda Mobile Security allows you to:

  • Connect your watch to your device; an alarm will ring if they are too far apart.
  • Remotely activate an alarm on your device.
  • You can get a picture remotely on your Android device from your Smartwatch.

Panda Mobile Security, protects your smartphone or tablet against viruses, malware and spyware. In addition, it protects user privacy by blocking those applications that access confidential data without permission. And now, you can use it from your Android Wear™ smartwatch as well!

The post Take control of your antivirus for Android from your Smartwatch with Panda Mobile Security! appeared first on MediaCenter Panda Security.

Carphone Warehouse reports massive data breach

Bad news if you are a customer of Carphone Warehouse, a leading UK retailer for mobile phones and call plans. Late last week, the company announced that it had suffered a large data breach affecting as many as 2.4 million customers.

The information leaked includes names, addresses, dates of birth and bank details. While as many as 90,000 encrypted credit card details were also stolen.

In a statement, Sebastian James, group chief executive of Dixons Carphone, said:

“We take the security of customer data extremely seriously, and we are very sorry that people have been affected by this attack on our systems.

“We are, of course, informing anyone that may have been affected, and have put in place additional security measures.”

“We took immediate action to secure these systems and launched an investigation with a leading cyber security firm to determine exactly what data was affected.”

If you think that you are potentially affected by this hack, here are two things that you should do as soon as possible to help mitigate any risk posed by unauthorized access to your bank accounts or credit cards.

Suspend your credit card

Naturally, one of the first things you should do is contact your credit card issuer and suspend your card. This means that you’re no longer vulnerable to credit card fraud if the card number has been stolen.

Your bank will issue a new credit card with a new number that wasn’t compromised in a breach.

Set up ID monitoring

I also highly recommend registering with an ID monitoring service. These scour the web searching for your credentials whenever and wherever they pop up. This allows you to take preemptive action against potential scammers.

There are instances of this being offered to data breach victims for free. Target did just that last year after their large hack. Should Carphone Warehouse contact you to say you’re information has been leaked, you should ask them about a similar service.

Beware of more scams

A word of caution, we’re likely to see some phishing attempts from fraudsters offering remedial services for data breach victims. Be very cautious about any email that arrives talking about compensation or other enticing services. Double check that any correspondence you receive is directly from Carphone Warehouse. If in doubt, contact them directly yourself rather than opening a suspicious email.

 

MS15-079 – Critical: Cumulative Security Update for Internet Explorer (3082442) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (August 11, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

MS15-080 – Critical: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution (3078662) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (August 11, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType fonts.

MS15-091 – Critical: Cumulative Security Update for Microsoft Edge (3084525) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (August 11, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

MS15-081 – Critical: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3080790) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (August 11, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

MS15-090 – Important: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege (3060716) – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (August 11, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox.

MS15-084 – Important: Vulnerabilities in XML Core Services Could Allow Information Disclosure (3080129) – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (August 11, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link; an attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message.