How Just Opening an MS Word Doc Can Hijack Every File On Your System

If you receive a mail masquerading as a company’s invoice and containing a Microsoft Word file, think twice before clicking on it.

Doing so could cripple your system and could lead to a catastrophic destruction.

Hackers are believed to be carrying out social engineering hoaxes by adopting eye-catching subjects in the spam emails and compromised websites to lure the victims into

Honey, they’ve hacked the TV: The security callenges facing Smart TVs.

remote control

If Facebook and many more Internet platforms are capable of showing personalized ads on your computer according to your online behavior, why shouldn’t the same be true for our smart TVs? Paul McMillan, a German security expert, has proven that smart TVs are so smart that they can analyze the programs or films that you watch so as to be able to choose ads that might interest you.

McMillan realized this while watching the film Inglorious Basterds on his Samsung device. A few minutes after starting, a pop-up appeared which invited him to join the army.

It isn’t the first time that someone has reported that these intelligent devices display publicity adapted to each user. However, to know their preferences, they need to analyze videos that are watched every day. So will they install a system to recognize the different content being watched?

The German investigator wanted to check if the ad continued to be shown despite changing the origin of the video. He used the same platform (via Amazon), but connected his computer to the television and watched the film from there. The pop-up returned again, meaning that the process depending on Samsung and not on the content provider.

Consumer Reports, which tests and analyzes new products, has already warned that smart televisions use an automatic content recognition system, which monitors videos that are watched, be it from YouTube or on DVD.

The companies could be sending this information to third-parties, which could include consultancy and publicity firms, who are both very interested in creating personalized advertising.

In general, it’s not businesses such as Samsung or LG who do this sneaky surveillance. What they do with user information should appear in their use and privacy policy, although they know that not many people bother to read it, and those that do most likely won’t understand a lot of the jargon. With these documents, companies leave open the possibility to insert ads directed at every type of audience.

However, the audience doesn’t need to accept everything that is thrown at them. Samsung has already faced complaints over its supposed use of voice recognition systems on its TVs to spy on conversations. In its service conditions, it stated that user should be careful with their words, as this and other information was being shared with third-parties.

smart tv

At the start of 2015, Samsung began to show Pepsi pop-ups on applications for streaming videos. The company brushed this off by saying that the ads formed part of a collaboration with Yahoo and that they were optional. The customer could disable the ads in their settings, but Samsung had previously failed to advise anyone of this.

In the case of LG, a British developer discovered that its smart TV collected information about user habits via the “smart ad” function and saved this information on the company’s servers (something which also appears in its terms of use).

Vizio, a manufacturer what operates mainly in the USA, also admitted that its televisions can recognize the content of the screen, which in the future could be used to send “ads in line with your interests”.

All of these firms earn money in exchange for advertising, which in turn allows them to sell their products at a more competitive price. However, their practices have placed security experts around the world on alert.

Nobody has asked their customers, whose only option (until now) seems to be in looking through the TV’s settings to find how to disable the ads. Will there be an ad blocker for smart TVs in the future?

More | Smart TVs have become the new target for cyber criminals

The post Honey, they’ve hacked the TV: The security callenges facing Smart TVs. appeared first on MediaCenter Panda Security.

CEBA-2016:0268 CentOS 6 ptlib FASTTRACK BugFixUpdate

CentOS Errata and Bugfix Advisory 2016:0268 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-0268.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
0348146563840e96432128fce8893e5c1e052b8c7a04731580b71ef6ec88d928  ptlib-2.6.5-5.el6.i686.rpm
f15fb5b00ef80df31948e084c9746c4d38af9b8f6f17f435ee35a2a420a1805b  ptlib-devel-2.6.5-5.el6.i686.rpm

x86_64:
0348146563840e96432128fce8893e5c1e052b8c7a04731580b71ef6ec88d928  ptlib-2.6.5-5.el6.i686.rpm
9591b407f7f281255041138bea978c25fa450d4db068cc267396eef5f47e82d4  ptlib-2.6.5-5.el6.x86_64.rpm
f15fb5b00ef80df31948e084c9746c4d38af9b8f6f17f435ee35a2a420a1805b  ptlib-devel-2.6.5-5.el6.i686.rpm
16d22c5bd3e7e1f8c2030c3c9cfedbb8d8163bd079d91fa284e299ec4d2f9e77  ptlib-devel-2.6.5-5.el6.x86_64.rpm

Source:
77f35943cb9f218305dad4478269b10bc9b932a7376710c6a4ad147b6aeeab52  ptlib-2.6.5-5.el6.src.rpm



CESA-2016:0258 Important CentOS 5 thunderbirdSecurity Update

CentOS Errata and Security Advisory 2016:0258 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0258.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
fc47e7fd94bd3079266b27f1307d954fd5a9f9442a91c3a2cb6172e86faa9224  thunderbird-38.6.0-1.el5.centos.i386.rpm

x86_64:
ec8dcb696078c89e8aa535036e750f5e4e06e40dbcd883e255287ea6b69bd61e  thunderbird-38.6.0-1.el5.centos.x86_64.rpm

Source:
2e6c718b8d5ce3cf2919e8c44995d1048ae923f32159b06cfc6f0dd06caa2088  thunderbird-38.6.0-1.el5.centos.src.rpm



Google Releases Security Update for Chrome

Original release date: February 18, 2016

Google has released Chrome version 48.0.2564.116 to address a vulnerability for Windows, Mac, and Linux. Exploitation of this vulnerability may allow a remote attacker to take control of an affected system.

US-CERT encourages users and administrators to review the Chrome Releases page and apply the necessary update.


This product is provided subject to this Notification and this Privacy & Use policy.