CentOS Errata and Security Advisory 2016:0726 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0726.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 9927fd325b74569be047a6764c1d7cf869b3d1025d23a457359e6e717aca7f7f ImageMagick-6.7.2.7-4.el6_7.i686.rpm 8a047d350978287a19487f84f2957e234acb90c2f848ea7f501f06b622ed3490 ImageMagick-c++-6.7.2.7-4.el6_7.i686.rpm 3bbf614460cf0b3d5aba00d191c3dec52e739a4435652f4a2bd73d205a2017bf ImageMagick-c++-devel-6.7.2.7-4.el6_7.i686.rpm a10d5765d6dd94177fb308c647b4450b3e8ec798a3a9128e29b22f49242486d7 ImageMagick-devel-6.7.2.7-4.el6_7.i686.rpm fb886cacd41e0148a70c76a8777f825928418a257295b235120f10c59838096b ImageMagick-doc-6.7.2.7-4.el6_7.i686.rpm 832476e5b7b7e05727bd0985d5c9712fb7b8a4971fd74ee7b04a880e64f81891 ImageMagick-perl-6.7.2.7-4.el6_7.i686.rpm x86_64: 9927fd325b74569be047a6764c1d7cf869b3d1025d23a457359e6e717aca7f7f ImageMagick-6.7.2.7-4.el6_7.i686.rpm 369a736262ae06bb836fe5c5969f8f54b7617b360671daf8754328fb2a9ca232 ImageMagick-6.7.2.7-4.el6_7.x86_64.rpm 8a047d350978287a19487f84f2957e234acb90c2f848ea7f501f06b622ed3490 ImageMagick-c++-6.7.2.7-4.el6_7.i686.rpm 4acc2bc7ec94428a27d4bd8e90eb30992dcdacf442832a94900fafdee2bba161 ImageMagick-c++-6.7.2.7-4.el6_7.x86_64.rpm 3bbf614460cf0b3d5aba00d191c3dec52e739a4435652f4a2bd73d205a2017bf ImageMagick-c++-devel-6.7.2.7-4.el6_7.i686.rpm a03fe5caeda8b2b3fac19f667c7e8350c02254ec87348ef1a151e849ae089fee ImageMagick-c++-devel-6.7.2.7-4.el6_7.x86_64.rpm a10d5765d6dd94177fb308c647b4450b3e8ec798a3a9128e29b22f49242486d7 ImageMagick-devel-6.7.2.7-4.el6_7.i686.rpm 8e0fbfe3affcc5f17ecb3073fca57f983b8ea2c2743adcdad384bba29928924b ImageMagick-devel-6.7.2.7-4.el6_7.x86_64.rpm 190d9f774cec3c009c6d3951e4994e593d923c4f016651a5330f42dc2c0a1657 ImageMagick-doc-6.7.2.7-4.el6_7.x86_64.rpm 6a965e6643de5e0c94036383af7901290fa2734308e9772eed371ca5bb160207 ImageMagick-perl-6.7.2.7-4.el6_7.x86_64.rpm Source: c4aebf2997a43af87c792a7face16c8f259a251394d7738193a2f4151ea542ec ImageMagick-6.7.2.7-4.el6_7.src.rpm
Monthly Archives: May 2016
WordPress Releases Security Update
Original release date: May 09, 2016
WordPress 4.5.1 and prior versions are affected by two vulnerabilities. Exploitation of one of these vulnerabilities could allow a remote attacker to take control of an affected system.
US-CERT encourages users and administrators to review the WordPress Security Release and upgrade to WordPress 4.5.2.
This product is provided subject to this Notification and this Privacy & Use policy.
CESA-2016:0724 Important CentOS 7 qemu-kvmSecurity Update
CentOS Errata and Security Advisory 2016:0724 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0724.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 846cfb9241de92a0e5b9d97817ad29c8bb9f3c9aa1353cc1ce1b30585c5ef8f1 libcacard-1.5.3-105.el7_2.4.i686.rpm 0a8b2b9f8e975d4ef114b32604570ed39eb90121d46ae4693ed1562044f5826a libcacard-1.5.3-105.el7_2.4.x86_64.rpm 9c64d1ae730de8ea9767833b6e4a7923a87118166160a5a7dbe5fb06a87c756a libcacard-devel-1.5.3-105.el7_2.4.i686.rpm efa6701e687a74376e0dea22d9078e8347df8d9b494270175cc1633b6a8884aa libcacard-devel-1.5.3-105.el7_2.4.x86_64.rpm b55a00ab999512102c5a8b37a61662df10b5c0ba2482705f462a92b1af6089a2 libcacard-tools-1.5.3-105.el7_2.4.x86_64.rpm 03acd54102faeabfb7821fb476617f94a818c84fb59d0ea16ecdbe53ced52b8e qemu-img-1.5.3-105.el7_2.4.x86_64.rpm 069a89fe852b1416b715c296b24b38d349b62128076497564bbcf12cb100a203 qemu-kvm-1.5.3-105.el7_2.4.x86_64.rpm 5bddf9f748929676bf2b502e0813e084e20b799474558dad24d522c4e4ef32d8 qemu-kvm-common-1.5.3-105.el7_2.4.x86_64.rpm 7e798ebafcea63fafed77f595505e4de46d93a15fe51f825c395a56728e02fb7 qemu-kvm-tools-1.5.3-105.el7_2.4.x86_64.rpm Source: 387ca0a04bd3b4e8f81ed89b4a95e783007ce862576ba0203c2662c487e58a41 qemu-kvm-1.5.3-105.el7_2.4.src.rpm
CESA-2016:0723 Critical CentOS 7java-1.6.0-openjdk Security Update
CentOS Errata and Security Advisory 2016:0723 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0723.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: baaf85167e613fa3911ce72d225d0d4d72b28966f30032002e57770dc79a90c7 java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm 635335b8441e99ff63d2e2830b109c554bee21559e930cc2ab13c4f33c36420d java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm 3779025d57099237b1230b303dd857fee2a58f1c166a02dea4686037b8b45a6a java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm 91c5950396900fa3c4fcb83abdcb558ab401da7a9df428583b4b9e5811eb5d81 java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm a197021122b770710aa518ed1cfe65db24450ba9beb05ca1519a59320081931e java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm Source: e0220b0ccf31771e35847ddb92070cb972d6d4658b51ce48d76881d72ae0aa76 java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2.src.rpm
Panda Security, the tested anti-virus
Be careful! Not all anti-virus systems are what they seem and many are more hazardous than helpful for your cyber security, so was said in a recent investigation. The investigation concluded that, today, most anti-virus’ tend to lower the threshold of Internet browser security. Can they protect us against external threats? How effective are they?
Traditionally, browsers incorporate tools to check certificates issued by websites to ensure that it has been issued by an appropriate entity. Panda Security’s products do not use interception techniques like intrusive man-in-the-middle through TLS proxies, to analyze our customers’ communications. Our solutions are completely transparent and do not install any type of certificate for this function. Thanks to this we can avoid these type of vulnerabilities, while minimizing the impact on the communication performance for our users’ devices. For this reason, Panda solutions are not included in the study.
Panda Antivirus, the “nonvulnerable”
Panda’s products are mentioned as those not affected by this vulnerability in Concordia University’s report.
The affected anti-virus systems in the study trick browsers, causing them to relax and trust any certificate, even though they shouldn´t. On the contrary, Panda Security solutions appears in this report because of its transparency and reliability for its users.
The post Panda Security, the tested anti-virus appeared first on Panda Security Mediacenter.
Big businesses in the UK ‘experience regular data breaches’
Data breaches are widespread among large businesses in the UK, according to a new report. The Cyber Security Breaches Survey found that two-thirds of the biggest firms have experienced an attack of some kind over the past 12 months.
The post Big businesses in the UK ‘experience regular data breaches’ appeared first on We Live Security.
![]()
CESA-2016:0723 Critical CentOS 6java-1.6.0-openjdk Security Update
CentOS Errata and Security Advisory 2016:0723 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0723.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 0c6fe06779a1d4d859ebdb30ed512fd057a502fb78449e4955e8e2414868159a java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el6_7.i686.rpm 0c8ac26c02b3543e4198b1da0879b7102d4f85e4ba8dc075631d056908a7c262 java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el6_7.i686.rpm 2e4b7a98603e139a0b56013225b59a73c82084648b43e5a46e89eaaa342cb276 java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el6_7.i686.rpm dedfe6741e0c5c613de3262d2f0ed8a54ddc9e73ae655a454810a962cf8e4511 java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el6_7.i686.rpm 9d639666508200cecd87544bd5d5423bc2521e9ff5fe9144eaa3a347e08203f9 java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el6_7.i686.rpm x86_64: 3b44a05ecc8050d3b820ea9b7dd994fe2c4a130566a8fb9899091a62ecac47ee java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm 93b4ad4e1f2c8ea60df8d051d00e2f8d1ecbf564bd61433461ea951ae4a61ee8 java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm c1b3018264498d8473fd72d9ef40508d6a50b028d515cd05a09b1f6b32902e03 java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm 06fb01d701b208562762f42ed91a377b647f5299b0433d0a9296491e49078959 java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm e69695441facf02fcc2ed64c7dbc85c0b26dc202b4a63a01905b4ff4d4cd0c1a java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm Source: 994496b319bb30306845bcc36c3657c602a01e0dab2cb029dec8b6d6528b3d56 java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el6_7.src.rpm
CESA-2016:0723 Critical CentOS 5java-1.6.0-openjdk Security Update
CentOS Errata and Security Advisory 2016:0723 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0723.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 36e25b70ced8e7761fb2c8a54780bbe65df642bb06e29ff366e48cfe4e18ecb0 java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el5_11.i386.rpm ca430885b7b50d5ee059e078dc87b356b4be076502a5a14a9700c7252ac369df java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el5_11.i386.rpm d0b6acf2e1a3e8e8fa4f304058aeff951ee5012e92c526b0443a3faa256640f1 java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el5_11.i386.rpm c0f638d1d21ed240a1db1f3245e98c79d719a6f37be977c72fe6f8f45cec02a0 java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el5_11.i386.rpm 3abc1bf9db9f917ebfff5bcece0794e48eafa977b5ef009a94a34abe646a1e29 java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el5_11.i386.rpm x86_64: baad834955029d7ea3829e3ea1f5b3ecf9a2e56b71cbb8d6f972dcbadcf960ee java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el5_11.x86_64.rpm d717997de759ef40154352f200ca1bb593fb031217b326b738f77004b32bf47d java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el5_11.x86_64.rpm 0cc759a6a4ca4aad7614b825ffccde9a02784ac7537ad54f7a44490cb44f5382 java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el5_11.x86_64.rpm d8c6d345a2c73c7d055f6833244599b48d932407cb748151ac5a9b52f7a071b1 java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el5_11.x86_64.rpm ee11396c168b9a47028eaeaba5842be9837261c2731efbf8b3d7f43c74270a1f java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el5_11.x86_64.rpm Source: 38436a18238d6215be1e3a204404d9e297a59250dfdd7b8150de657a233f37ec java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el5_11.src.rpm
