Beware! Your iPhone Can Be Hacked Remotely With Just A Message

In Brief
Do you own an iPhone? Mac? Or any Apple device?

Just one specially-crafted message can expose your personal information, including your authentication credentials stored in your device’s memory, to a hacker.

The vulnerability is quite similar to the Stagefright vulnerabilities, discovered a year ago in Android, that allowed hackers to silently spy on almost a Billion phones with

Five Myths about Mobile Phone Security

iStock_50681792_XLARGE

Most of us carry a mobile phone with us at all times. It has become an essential part of our lives, both in our personal and professional day-to-day. Nevertheless, there are many false conceptions that accompany the security of our business smartphones and tablets.

Every business should have clear ideas before planning their cybersecurity strategy. Often, we overestimate or underestimate the risks that are associated with these kind of devices. No misunderstandings, no myths, this is what you need to know:

Official app stores are 100% secure

It is a fact that Apple and Google take a lot of precautions and the App Store and Google Play are usually trustworthy sources for downloading applications. Nevertheless, the malicious programs or apps can also creep onto these official sites, and they appear to be harmless but they aren’t. Even if you only install your apps off of these sites, which is recommended, IT security managers should still implement a clear policy and be completely aware of what each employee is executing on the company systems.

Mobile devices have more vulnerabilities

Increasingly, news about security flaws and threats to smartphones and tablets is coming to light. It may seem that mobile devices are predisposed to more vulnerabilities than traditional devices like computers or laptops, but that’s not necessarily true. The truth is, since smartphones are extremely popular, they are the number one goal for cyber attackers. Also, the fact that our phone accompanies us everywhere we go makes them even more interesting targets for cybercriminals.

…but, mobile phones don’t need antivirus software

Although they aren’t inherently more insecure than other devices, these mobile devices have moved into the line of fire because of their extreme popularity and users need dependable IT security solutions. It is a myth that phones don’t need antivirus solutions . There are many benefits to having a good antivirus on your mobile or tablet.

BYOD is incompatible with security

Employees using their personal device at work instead of a company phone doesn’t make them less secure. If they have a good security strategy and control the apps that they install, then it is perfectly fine to combine personal and professional use. Everything depends on the IT security strategy.

You don’t have to worry about “wearables”

Watches, bracelets and other intelligent accessories are beginning to find their place in the business environment and are helping employees complete work more efficiently. Wearable device are too new to be considered and included into an IT security strategy, right? Wrong! Precisely because they are so new, many security measures are flawed and should be compensated for with IT security supervision. These “wearables” could potentially open doors for cyber-attackers instead of doing what they are meant to do: increase work productivity.

 

 

The post Five Myths about Mobile Phone Security appeared first on Panda Security Mediacenter.

RHSA-2016:1458-1: Critical: java-1.8.0-openjdk security update

Red Hat Enterprise Linux: An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 6
and Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of
Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2016-3458, CVE-2016-3500, CVE-2016-3508, CVE-2016-3550, CVE-2016-3587, CVE-2016-3598, CVE-2016-3606, CVE-2016-3610

USN-3039-1: Django vulnerability

Ubuntu Security Notice USN-3039-1

19th July, 2016

python-django vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.04 LTS

Summary

A security issue was fixed in Django.

Software description

  • python-django
    – High-level Python web development framework

Details

It was discovered that Django incorrectly handled the admin’s add/change
related popup. A remote attacker could possibly use this issue to perform a
cross-site scripting attack.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.04 LTS:
python3-django

1.8.7-1ubuntu5.1
python-django

1.8.7-1ubuntu5.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-6186