Red Hat Enterprise Linux: Updated rhevm-sdk-java packages that fix several bugs and add various
enhancements are now available.
Monthly Archives: April 2016
RHBA-2016:0663-1: ovirt-engine-extension-aaa-ldap bug fix and enhancement update for 3.6.5
Red Hat Enterprise Linux: Updated ovirt-engine-extension-aaa-ldap packages that fix several bugs and add
various enhancements are now available.
RHBA-2016:0661-1: Red Hat Enterprise Virtualization Manager (rhevm) bug fix 3.6.5
Red Hat Enterprise Linux: Updated RFEs packages that fix several bugs and add various enhancements are now
available.
RHBA-2016:0659-1: [RHEVM-3.6.5] – rhevm-guest-agent bug fix update
Red Hat Enterprise Linux: Updated rhevm-guest-agent packages that fix several bugs are now available.
RHBA-2016:0658-1: rhev-hypervisor security, bug fix and enhancement update for RHEV 3.6.5
Red Hat Enterprise Linux: An updated rhev-hypervisor package that fixes several security issues, bugs, and
enhancements is now available.
RHBA-2016:0655-1: redhat-support-plugin-rhev restore engine-psql script for 3.6.5
Red Hat Enterprise Linux: Updated redhat-support-plugin-rhev packages that fix a bug are now available.
AVG Business Wins Security Vendor of the Year Award
At AVG, we believe our partners are truly an extension of our ever-growing team. Developing strong relationships with our partners is what keeps us on course to drive mutual growth.
AVG partner Gordon Montgomery, operations director at MCC Computers Ltd., recently shared some excellent feedback. Through the partnership with AVG, MCC has added new services, increased revenue and put new customer retentions strategies in place.
We were impressed by MCC’s results and we submitted these updates to award organizers at the European IT and Software Excellence Awards. AVG Business was selected as one of 86 finalists from an entry field of more than 400 companies in 31 countries. During the award ceremony on April 14, AVG Business was chosen as Security Vendor of the Year.
We now have another strong accolade that our AVG partners can share with their customers and prospects.
MCC is a perfect example of how partnership accelerates business. We’ve worked with MCC for several years. Using AVG CloudCare, the antivirus side of MCC’s business grew 96% year over year, and anti-spam 29%. Cloud backup, initially a very small part of its business, grew 156% in the first year.
MCC can deploy a range of cloud security solutions for multiple clients from AVG CloudCare’s cloud-based administration platform. AVG CloudCare’s central dashboard and built-in remote access are also key to MCC’s support capabilities.
Gordon shared, “We are revelling in the time AVG CloudCare is saving us. We’ve also reduced our onsite visits, allowing us to focus on productive client service and business growth.”
Gordon also put AVG CloudCare to the test with MCC’s renewal and retention efforts. Through AVG CloudCare’s platform, the MCC team can monitor customers’ systems and identify when renewals or service is needed. After the first year, MCC saw a 97% renewal rate and are now continuing this program each year.
As Gordon sums it up, “Our partnership with AVG Business and products like AVG CloudCare have given us the management control we need to effectively protect our customers and at the same time, build our own business make our customers successful.”
Thank you to MCC and all our partners for their continued support and our joint success.
Please share this award win with your clients. Thank you!
![]()
![]()
Researcher releases Free Ransomware Detection Tool for Mac OS X Users
In Brief:
Introducing RansomWhere, a free generic ransomware detection tool for Mac OS X users that can identify ransomware-like behavior by continually monitoring the file-system for the creation of encrypted files by suspicious processes.
This ransomware detection tool helps to block the suspicious processes and waits for the user to decide whether to allow or stop the process.
![]()
CVE-2016-0891
Multiple cross-site request forgery (CSRF) vulnerabilities in administrative pages in EMC ViPR SRM before 3.7 allow remote attackers to hijack the authentication of administrators.
CVE-2016-2002
The validateAdminConfig handler in the Analytics Management Console in HPE Vertica 7.0.x before 7.0.2.12, 7.1.x before 7.1.2-12, and 7.2.x before 7.2.2-1 allows remote attackers to execute arbitrary commands via the mcPort parameter, aka ZDI-CAN-3417.
