Monthly Archives: August 2015
Samsung Smart Fridge Leaves Gmail Logins Open To Attack
Pro-Government Twitter Bots Try To Hush Mexican Activists
Ashley Madison: Boss's Emails Examined After Leak
Double Trouble: Businesses Pay More to Recover from a Security Breach if Virtual Infrastructure is Affected
Make password into a story and more parental hacks
It’s important to ensure your child’s data and devices are secure at school and at home. Check out our to back to school digital security guide.
The post Make password into a story and more parental hacks appeared first on We Live Security.
![]()
How does facial recognition technology work?
In this hi-tech age, your face is increasingly becoming a digital ID for authenticating who you are online. We look at how facial recognition works.
The post How does facial recognition technology work? appeared first on We Live Security.
![]()
Ashley Madison members ‘easy target for extortion’
There is the very real possibility that members of the infidelity website Ashley Madison may be subject to extortion threats.
The post Ashley Madison members ‘easy target for extortion’ appeared first on We Live Security.
![]()
CVE-2015-5566 (air, air_sdk, air_sdk_&_compiler, flash_player)
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
Everything that could go wrong when you send an unencrypted email (and how to avoid it!)

Everything that you send in an email, from the attachments to the text, goes on a dangerous journey every time that you click send. Its path is filled with traps that cybercriminals can use to steal your information.
One of the tips that you should follow to protect the content of your emails is to encrypt them. This way, even if someone is able to access your emails, they won’t be able to read the content.
Although it might surprise you, the journey that your emails take isn’t as straightforward as you might think. It isn’t a simple matter of going from A to B, but rather the emails pass through different routes which put them at risk of attack from cybercriminals:
- Step 1: The email that you send from your device to your company’s server. Larger companies generally make sure that this is a safe route and look after it. If you see a green icon or a lock icon in the address bar then you can relax it’s secure. The journey, however, continues…

- Step 2: Next you email needs to pass through different serves until it reaches its destination. This part of the journey is the most dangerous as the email can be intercepted at any time, especially if the server used by the receiver isn’t protected correctly. The worst thing about this stage is that users are completely blind – there is no way of knowing how secure the connection is between the two servers. The only way to be sure is to encrypt your messages.
- Step 3: Not only is it going between two servers, but the email still has to travel to the computer or the mobile device. This stage can also be complicated and, furthermore, once it arrives at the other device it can still be under threat. You have to remember that computers are always at risk if the correct security procedures aren’t followed.
With so many different ways to steal information from emails, it is vital to protect the content and attachments that you send.

There are many ways to encrypt your emails and some messaging services offer it as an option. There are other options to ensure increased protection for your emails, such as the one offered by Panda, which encrypt your attachments to make sure that the content is secure. It isn’t necessary to be an expert to protect your online security, but it is better to behave like one.
The post Everything that could go wrong when you send an unencrypted email (and how to avoid it!) appeared first on MediaCenter Panda Security.