Targeted attacks using multiple attack vectors including email and watering hole sides has been discovered. The state-sponsored attacks targeted Indian diplomatic and military personnel originating from that Pakistan region, researchers said.
Monthly Archives: March 2016
How to have the safest phone in the world
Free Wi-Fi is great. It’s convenient when you are away from your home network and want to connect to the Internet using your mobile phone, and it saves money and data. But there is a dark side.
Unsecured networks can expose you to a hacker who can easily read your messages, steal your logins, passwords, and credit card details. The danger is that you never know when it could happen, or where, so having a way to secure your device when connected to an unsecured Wi-Fi hotspot is the best protection.
How to avoid the dangers of open Wi-Fi
To avoid the potential of a snoop stealing your private information, you basically have two choices: Stop using unsecured Wi-Fi hotspots or make sure you always have a secure connection by using a VPN (virtual private network), like Avast SecureLine VPN.
A VPN sounds extremely techie, and it is, under the hood. Avast mobile security developers created SecureLine to give you a secure and reliable private connection for your data between computer networks over the Internet. Your outgoing and incoming data is encrypted and it travels in its own private “tunnel” and is decrypted at the other end.
When you use Avast SecureLine VPN, everything you do is anonymous. We don’t keep logs of your online activity, and thanks to SecureLine, no one else will either.
Get a 7-day free trial of Avast SecureLine VPN
Avast SecureLine VPN for Android and iOS takes all that tech goodness and puts it in a simple-to-use app. All you do is tap a connect button, and the app does the rest.
Install Avast SecureLine VPN on your iPhone or iPad and try it free for 7 days.
Install Avast SecureLine VPN on your Android smartphone or tablet and try it free for 7 days.
After you install Secureline, click connect and choose a server from 27 locations in 19 countries, or let SecureLine choose the closest one. You can turn the secure connection on and off with one click.
Bypass geo-restrictions
One of the benefits of connecting with a VPN, especially if you are travelling overseas, is that you can connect to a server back home. This way you can access your favorite entertainment portals without getting that annoying “content blocked” message.
Avast SecureLine is also available for PC and Mac. Visit the Avast Store for pricing information.
![]()
Hospitals and healthcare providers under cyberattack

Hospitals are vulnerable to cyberattacks
The recent ransomware attack on the Hollywood Presbyterian Medical Center in Los Angeles has spooked the healthcare community. Hackers installed *ransomware in the hospital computer system and held patient records hostage while demanding payment. The hospital eventually paid $17,000 to have their files unlocked.
Attacks on major insurance and healthcare systems last year including Excellus BlueCross BlueShield and Anthem Inc. resulted in 100 million individual records being stolen.
Electronic medical records are a treasure trove of data and fetch a price 20 times more than that a stolen credit card numbers. The cost for the U.S. healthcare industry is $6 billion dollars annually, with the average data breach costing a hospital $2.1 million.
![]()
McAfee VirusScan Enterprise security restrictions bypass
Posted by Agazzini Maurizio on Mar 04
Security Advisory @ Mediaservice.net Srl
(#01, 13/04/2016) Data Security Division
Title: McAfee VirusScan Enterprise security restrictions bypass
Application: McAfee VirusScan Enterprise 8.8 and prior versions
Platform: Microsoft Windows
Description: A local Windows administrator is able to bypass the
security restrictions and disable the antivirus engine…
Re: Netgear GS105Ev2 – Multiple Vulnerabilities
Posted by Nick Boyce on Mar 04
JFTR, on 10th.Feb Benedikt replied to me off-list as follows:
Thanks Benedikt.
Now that end hosts have been thoroughly analysed by vendors and
researchers alike, perhaps networking equipment is the new frontier
(cf: operating systems vs applications). The dire state of the
quality of the software embedded in comms hardware, for both home and
business use, is emerging from the fog to become the elephant in the
room. We seem to be caught…
Executable installers are vulnerable^WEVIL (case 29): putty-0.66-installer.exe allowa arbitrary (remote) code execution WITH escalation of privilege
Posted by Stefan Kanthak on Mar 04
Hi,
putty-0.66-installer.exe loads and executes DWMAPI.dll or
UXTheme.dll from its “application directory”.
For software downloaded with a web browser the application
directory is typically the user’s “Downloads” directory: see
<https://insights.sei.cmu.edu/cert/2008/09/carpet-bombing-and-directory-poisoning.html>,
<http://blog.acrossecurity.com/2012/02/downloads-folder-binary-planting.html>
and <…
What's A 'Cyber Pathogen'? San Bernardino DA Baffles Security Community
How to Steal Secret Encryption Keys from Android and iOS SmartPhones
Unlike desktops, your mobile devices carry all sorts of information from your personal emails to your sensitive financial details. And due to this, the hackers have shifted their interest to the mobile platform.
Every week new exploits are discovered for iOS and Android platform, most of the times separately, but the recently discovered exploit targets both Android as well as iOS devices.
![]()
VPN – The Virtual Private Network
VPN … You’ve heard the word but aren’t quite sure what to do with it. Your friends and maybe even kids are using it and you hear them going on about how useful it is and you just feel left out. So – what is a VPN and what can it do for you?
The post VPN – The Virtual Private Network appeared first on Avira Blog.
Debian Security Advisory 3503-1
Debian Linux Security Advisory 3503-1 – Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service, information leak or data loss.

