Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, Office Web Apps 2010 SP2, and Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka “Microsoft Office Memory Corruption Vulnerability.”
Monthly Archives: March 2016
CVE-2016-0954
Adobe Digital Editions before 4.5.1 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
CVE-2016-1007
Adobe Reader and Acrobat before 11.0.15, Acrobat and Acrobat Reader DC Classic before 15.006.30121, and Acrobat and Acrobat Reader DC Continuous before 15.010.20060 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1009.
CVE-2016-1008
Untrusted search path vulnerability in Adobe Reader and Acrobat before 11.0.15, Acrobat and Acrobat Reader DC Classic before 15.006.30121, and Acrobat and Acrobat Reader DC Continuous before 15.010.20060 on Windows and OS X allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2016-1009
Adobe Reader and Acrobat before 11.0.15, Acrobat and Acrobat Reader DC Classic before 15.006.30121, and Acrobat and Acrobat Reader DC Continuous before 15.010.20060 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1007.
Panda Security presents the Security Guide for Small Businesses and Freelancers

We could give you a lot of reasons to elaborate this guide, but we think that one should be enough: 91% of small businesses and freelancers
suffer daily IT attacks.
Yes, every day nearly 100% of small businesses or freelancers suffer some type of cyberattack that compromises the security of their
businesses, data, and income.
Do you still think that it isn’t necessary to protect your business on the Internet?
Take a look and we are sure that you will change your mind…
The post Panda Security presents the Security Guide for Small Businesses and Freelancers appeared first on MediaCenter Panda Security.
Avast at Mobile World Congress 2016
Avast went to Barcelona to participate in the Mobile World Congress, the world’s largest exhibition for the mobile industry.
This year we made a few changes and added new apps to show. Our main change was the Avast Mobile Security booth. Last year we were in Hall 5, but this year we were located in the App Planet, Hall 8.1, and we had a bigger booth! It’s a beautiful one, right? 🙂
More than 95,000 people attend the MWC and a lot of them visited our booth to discover our new apps, like Avast WiFi Finder, Avast Passwords and Avast Virtual Mobile Platform.
Avast WiFi Finder helps you connect to a widespread collection of reliable, fast, safe hotspots which are crowd-sourced by people just like you – all around the world, so you can save on monthly bills and roaming fees.
Avast Passwords helps you create strong, unique passwords for each of your accounts and save and store all your login details in a secure place. Now you don’t need to memorize or write down a bunch of different passwords.
Avast Virtual Mobile Platform lets businesses create a virtual mobile infrastructure (VMI) that streams standard mobile apps to any device. Since apps run on corporate servers, your data can’t be lost or stolen – even if your device is.
Of course, we were not only showing our new apps, everybody who came to our booth was able to see a demo of all our popular apps Avast Mobile Security and Avast SecureLine VPN.
![]()
LSE Leading Security Experts GmbH – LSE-2016-01-01 – WordPress ProjectTheme – Multiple Vulnerabilities
Posted by LSE-Advisories on Mar 08
=== LSE Leading Security Experts GmbH – Security Advisory 2016-01-01 ===
WordPress ProjectTheme Multiple Vulnerabilities
– ————————————————————
Affected Version
================
Project Theme: 2.0.9.5
Problem Overview
================
Technical Risk: high
Likelihood of Exploitation: low
Vendor: http://sitemile.com/
Credits: LSE Leading Security Experts GmbH employee Tim Herres
Advisory:…
Triada Trojan Most Advanced Mobile Malware Yet: Kaspersky – SecurityWeek
Triada Trojan Most Advanced Mobile Malware Yet: Kaspersky – SecurityWeek
CESA-2016:0373 Critical CentOS 7 firefox SecurityUpdate
CentOS Errata and Security Advisory 2016:0373 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0373.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 453d22536d760a1eb33009f8c3972459dbf91d29dd42d6d573f1b7897a15b2f0 firefox-38.7.0-1.el7.centos.i686.rpm 42805c6f4469938b7dd190f884cfff05e9036b3f3222c0a175da07ad05f740c4 firefox-38.7.0-1.el7.centos.x86_64.rpm Source: 8c19c6462ba1d76392018c709fdc9e70794fcb2de1aea11fb4e96c918daa275b firefox-38.7.0-1.el7.centos.src.rpm