Kim Dotcom loses Fight Against Extradition to the US

Internet millionaire and Megaupload founder Kim Dotcom and his three associates are eligible for extradition to the US to face criminal charges over massive copyright infringement on Megaupload (now-shuttered), the court has ruled citing “overwhelming” evidence.

On Tuesday afternoon, New Zealand District Court Judge Nevin Dawson told the court that the United States had presented enough

6 simple steps for safely using mobile bank applications

money

The way that we carry out our banking operations has changed dramatically over the years. With the increase in Internet use a decade ago, it helped to remove the need to go to our banks or ATMs to manage transactions or to move money around. In the past couple of years the landscape has changed even further, with the advent of smartphones meaning we can also look after our finances on the go.

Thus, if you have a smartphone then it is likely that you will also have downloaded the official app of your bank. Most banks have invested greatly in ensuring the security of these apps, as any potential problems could be devastating for the reputation of the bank. These apps often have limits set on the amount of money they can transfer to minimize the risks and some demand a code from a token or card reader to authorize any transaction.

However, as with all apps, it pays to be safe and take precautions when using your banking application, just as you would with your credit cards, especially with Christmas just around the corner – a time when we are usually busy transferring money and checking our statements more than usual.

To help you stay safe, here are a few easy tips to help you bank safely from the comfort of your smartphone.

  1. Only use official apps

This may seem slightly silly, but you need to make sure that you’ve downloaded the official app from your bank.

  1. Keep the app updated

This piece of advice goes for all applications that you install, but with banking apps it is even more important. With each update, the developer may have included increased security defenses, which if you haven’t updated to, could leave you exposed.

  1. Select the SMS authorization option

Search for this option in the app, which means your bank will send you an SMS every time money has been lodged or removed from the account. This will allow you to spot any discrepancies before it’s too late.

  1. Log out when not in use

When you have finished using the app, it is very important that you log out of the app. This will help protect you in the event of your phone ending up the hands of the wrong person.

  1. Use a phone tracker

Getting a phone tracking app is an efficient way of remotely deleting information from your device in case you lose it or it is stolen.

  1. Install a trusted antivirus

A good antivirus will protect you from any suspicious activity or malicious apps. Panda offers solutions for both Android and iOS users in the form of Panda Mobile Security for Android and Panda Antivirus for Mac, which also scans iPhones for malware.

Finally, if you suspect that you have been the target of banking fraud, contact your bank immediately.

The post 6 simple steps for safely using mobile bank applications appeared first on MediaCenter Panda Security.

CVE-2015-6431

Cisco IOS XE 16.1.1 allows remote attackers to cause a denial of service (device reload) via a packet with the 00-00-00-00-00-00 source MAC address, aka Bug ID CSCux48405.

CVE-2015-6471

Eaton Cooper Power Systems ProView 4.x and 5.x before 5.1 on Form 6 controls and Idea and IdeaPLUS relays does not properly initialize padding fields in Ethernet packets, which allows remote attackers to obtain sensitive information by reading packet data.

CVE-2015-6851

EMC RSA SecurID Web Agent before 8.0 allows physically proximate attackers to bypass the privacy-screen protection mechanism by leveraging an unattended workstation and running DOM Inspector.

CVE-2015-7911

Saia Burgess PCD1.M0xx0, PCD1.M2xx0, PCD2.M5xx0, PCD3.Mxx60, PCD3.Mxxx0, PCD7.D4xxD, PCD7.D4xxV, PCD7.D4xxWTPF, and PCD7.D4xxxT5F devices before 1.24.50 and PCD3.T665 and PCD3.T666 devices before 1.24.41 have hardcoded credentials, which allows remote attackers to obtain administrative access via an FTP session.

CVE-2015-7917

Untrusted search path vulnerability in Open Automation OPC Systems.NET 8.00.0023 and earlier allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.

CVE-2015-7936

Cross-site request forgery (CSRF) vulnerability in Motorola Solutions MOSCAD IP Gateway allows remote attackers to hijack the authentication of administrators for requests that modify a password.