Non vedi il contenuto di questa Email? Clicca Quì http://campaign.r20.constantcontact.com/render?m=1103299326490&ca=e4d21e47-a301-41ec-8ce9-21a5c451a6f4 Greetings! Inotra questa email http://ui.constantcontact.com/sa/fwtf.jsp?llr=9qmh7qdab&m=1103299326490&ea=broadcast%40simpaticotech.it&a=1126219626739 Questa mail è stata inviata a [email protected], da parte di [email protected] Aggiorna profilo/indirizzo e-mail https://visitor.constantcontact.com/do?p=oo&m=001ppwvHtrFNf1h59YxsVHM6Q%3D%3D&ch=ce81b4a0-be9c-11e4-90fa-d4ae528eb986&ca=e4d21e47-a301-41ec-8ce9-21a5c451a6f4 Rimozione istantanea con SafeUnsubscribe(TM) https://visitor.constantcontact.com/do?p=un&m=001ppwvHtrFNf1h59YxsVHM6Q%3D%3D&ch=ce81b4a0-be9c-11e4-90fa-d4ae528eb986&ca=e4d21e47-a301-41ec-8ce9-21a5c451a6f4 Informativa sulla privacy: http://ui.constantcontact.com/roving/it/CCPrivacyPolicy.jsp Online Marketing by Constant Contact(R) www.constantcontact.com Simpatico Network srl | Via Volta 7 | BUCCINASCO | 20090 | Italy
Monthly Archives: October 2016
Warning! Your iPhone Can Get Hacked Just by Opening a JPEG Image, PDF or Font File
What’s worse than knowing that innocent looking JPEGs, PDFs and font files can hijack your iPhone, iPad, and iPod.
Yes, attackers can take over your vulnerable Apple’s iOS device remotely – all they have to do is trick you to view a maliciously-crafted JPEG graphic or PDF file through a website or an email, which could allow them to execute malicious code on your system.
That’s a terrible
![]()
The Antifraud Card of the Future!

Whether you usually use a personal or corporate credit card, anyone can be the victim of a data breach. Criminals can easily use a phishing attack to take your card number, PIN and even the security code on the back of your card. What’s worse is that they’re so quick! By the time you’ve discovered the theft, it will be too late. Even if your company quickly cancels the card, you will already have some serious problems… the thief will have already spent your hard earned cash.
These kind of attacks happen more often than you think. In the first half of 2016 there were more than a million cases of financial fraud with the objective of robbing credit card data. This statistic is worrisome, without a doubt, especially considering that this number doubled the results from 2015.
This is where Motion Code steps in. This new technology was developed by the French company Oberthur and will revolutionize the way we make purchases. Its goal is pretty simple: to preserve your security by changing the security code on the back of your credit card, constantly.
How will they do this exactly? Well, unlike the cards we use now that have a tiny rectangle on the back with three secret numbers, Oberthur has proposed a solution: they want to substitute this rectangle with a small screen that changes the numbers every hour. At first glance, the credit cards are exactly the same, but instead of the security code changing every three years, the numbers change every hour.
This means that the cybercriminal won’t be able to steal a dime: by the time a phishing attack is completed and the data is stolen, the screen will have changed and the whole scheme will be a complete waste of time for the criminal.
It may be inconvenient for your employees to use these cards because they will no longer be able to memorize the security code on the back. But really, who cares? They will have to check the security code every time they use it, but this smallest effort could also bring them the most security benefits in your company.
The post The Antifraud Card of the Future! appeared first on Panda Security Mediacenter.
Avira Free Security Suite – The first free security suite ever!

Avira redefines digital safety with the Free Security Suite: digital lives made safer, faster, and more private than ever before.
The post Avira Free Security Suite – The first free security suite ever! appeared first on Avira Blog.
FreeBSD-SA-16:32.bhyve
APPLE-SA-2016-10-24-1 iOS 10.1
From: Apple Product Security
Reply to list
APPLE-SA-2016-10-24-1 iOS 10.1 iOS 10.1 is now available and addresses the following: CFNetwork Proxies Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later Impact: An attacker in a privileged network position may be able to [...]
APPLE-SA-2016-10-24-2 macOS Sierra 10.12.1
From: Apple Product Security
Reply to list
APPLE-SA-2016-10-24-2 macOS Sierra 10.12.1 macOS Sierra 10.12.1 is now available and addresses the following: AppleGraphicsControl Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6 Impact: An application may be able to execute arbitrary code with kernel privileges [...]
APPLE-SA-2016-10-24-3 Safari 10.0.1
From: Apple Product Security
Reply to list
APPLE-SA-2016-10-24-3 Safari 10.0.1 Safari 10.0.1 is now available and addresses the following: WebKit Available for: OS X Yosemite v10.10.5, OS X El Capitan v10.11.6, and macOS Sierra 10.12 Impact: Processing maliciously crafted web content may lead to arbitrary code execution [...]
APPLE-SA-2016-10-24-4 tvOS 10.0.1
From: Apple Product Security
Reply to list
APPLE-SA-2016-10-24-4 tvOS 10.0.1 tvOS 10.0.1 is now available and addresses the following: CFNetwork Proxies Available for: Apple TV (4th generation) Impact: An attacker in a privileged network position may be able to leak sensitive user information [...]
APPLE-SA-2016-10-24-5 watchOS 3.1
From: Apple Product Security
Reply to list
APPLE-SA-2016-10-24-5 watchOS 3.1 watchOS 3.1 is now available and addresses the following: CoreGraphics Available for: All Apple Watch models Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved [...]
