chafa-1.2.1-7.fc34

Read Time:6 Second

FEDORA-2022-4bdf35a1b5

Packages in this update:

chafa-1.2.1-7.fc34

Update description:

Security fix for CVE-2022-1507

Read More

chafa-1.10.3-1.fc37

Read Time:19 Second

FEDORA-2022-a6b383aab1

Packages in this update:

chafa-1.10.3-1.fc37

Update description:

Automatic update for chafa-1.10.3-1.fc37.

Changelog

* Fri May 6 2022 Miro Hrončok <mhroncok@redhat.com> – 1.10.3-1
– Update to 1.10.3
– Fixes: rhbz#1809122
– Contains security fix for CVE-2022-1507
– Fixes: rhbz#2080294
– Provide bundled libnsgif and lodepng

Read More

Are You Playing A Role In Protecting Your Online Privacy?

Read Time:4 Minute, 27 Second

Like most things in life, online privacy is a 2-way street. As consumers, we expect the companies we deal with online to manage and safeguard our data to a super professional level however we also have a role to play here too. So, this Privacy Awareness Week (PAW), let’s focus on what we can do to ensure our personal information is kept as secure, and private as possible. 

Privacy Awareness Week 

There’s nothing like a dedicated ‘week’ to renew our focus and in my opinion, this year’s PAW does just that. This year’s theme is – The Foundation of Trust – we all have a role to play, a great reminder of how it’s up to all of us to ensure we manage online privacy. There’s no doubt that managing our privacy is low on the to-do list for many. And I get it – we’re all strapped for time, and we don’t ever think privacy breaches will affect us. Well, my friends, I’m here to tell you that privacy breaches do happen. Identity theft is a reality of living life online. In fact, in 2020/21, nearly 155,000 Aussies had their identities stolen and they were the cases that were reported. But the good news is that if you take a proactive approach, you can minimise the risk of this ever happening. 

What You Can Do to Protect Your Online Privacy 

Believe it or not, most of your privacy action plan involves small steps that are, I promise, relatively painless. The most important thing here is that you need to commit to doing them. The last thing you want is to spend months dealing with the fallout from having your identity stolen. It’s exhausting, stressful, and absolutely worth avoiding. 

Without further ado, here’s your action plan: 

1. Passwords 

Strong and complex passwords are essential to keeping your online information tight. Ideally, a password should have between 8-10 characters and be a combination of letters – both lower and uppercase, numbers and symbols. Each online account should also have its own password too – which is a very overwhelming concept! Consider using a password manager such as McAfee’s TrueKey to help generate and manage passwords.   

2. Conduct An Audit of Your (and Your Kids’) Privacy Settings 

Ensure all the family checks their social media accounts to ensure they are set to private. This will mean that only their chosen friends can see their private information. Each social media platform will have its own ‘help’ page which provides specific steps on how to do this.  

3. Use Public Wi-Fi With Caution 

If you are serious about your online privacy, then you need to use public Wi-Fi sparingly. Unsecured public Wi-Fi is a very risky business. Anything you share could easily find its way into the hands of cybercriminals. So, avoid sharing any sensitive or personal information while using public Wi-Fi. If you travel regularly, consider investing in a VPN. A VPN (Virtual Private Network) encrypts your activity which means your login details and other sensitive information is protected. A great insurance policy!  

4. Use 2-Factor Authentication 

Adding an additional layer of security to protect yourself when accessing your online accounts is another great way of guarding your online privacy. Turn on two-factor authentication for Google, Dropbox, Facebook and whatever other site offers it. For those new to this option, this means that in addition to your password, you will need to provide another form of identification to ensure you are who you say you are. Most commonly, this is a code sent to your mobile phone or generated by a smartphone app. 

5. Consider a Search Engine that Doesn’t Track Your Every Move Online 

Most web surfers rely on Google for their searching but why not use a search engine that doesn’t collect and store the information? And there are loads of more ‘privacy focussed’ options to choose from. Check out DuckDuckGo, that doesn’t profile users or track or sell your information to third parties. 

6. Protect Your Digital Life 

Comprehensive security protection software is an easy way to help firm up your online privacy too as it does a great job of keeping malicious software (malware) at bay. Malware can wreak absolute havoc: from installing pop ups to scanning for personal information. And if you’re likely to click dodgy links (we’re all human after all), then this is a no brainer! Super-duper security software will also guard you against viruses and online threats, direct you away from risky websites and dangerous downloads and protect your smartphones and tablets too, it can also back up your files. McAfee’s LiveSafe protection software comes with a 100% guarantee to protect you against viruses. 

So, this Privacy Awareness week, please take the time to ensure you are doing all you can to nail your online privacy. And of course, please get your kids involved too. Do your research and find some stories of ‘real life’ people who have had their identity stolen to share around the dinner table because identity theft can absolutely happen to anyone! 

Till next time, 

Stay Safe! 

Alex   

The post Are You Playing A Role In Protecting Your Online Privacy? appeared first on McAfee Blog.

Read More

Do Macs Need Antivirus Software?

Read Time:8 Minute, 37 Second

Mac computers have long enjoyed a well-earned reputation for having robust security. Apple’s closed ecosystem, coupled with the built-in security features found on Macs and iPhones, has led many users to believe that Apple products are immune to viruses. And while MacBooks are arguably more secure than Microsoft Windows PCs, they aren’t without vulnerabilities. 

This article goes over some of the known malware threats that can affect Macs and explores some security measures you can take to help safeguard your Apple devices. 

6 types of malware that can affect Macs

There are a lot of benefits to being a Mac user, including built-in security features that allow you to enjoy the Apple ecosystem without too much worry. However, if your Mac has a security flaw or you’ve experienced a social engineering attack, like phishing, it could put the device at risk. 

It’s a good idea to be aware of the different types of malware that can affect Mac security and functionality 

Adware

Adware is software that displays several types of online advertising, with pop-up ads being the most common. Adware infects computer systems when users download programs that are loaded with it or when hackers take advantage of a security vulnerability to insert it. 

Potentially unwanted programs

Potentially unwanted programs (PUPs) are software applications that most users would deem unnecessary. These programs are often bundled with wanted programs installed by the user. The unwanted program might be malicious software that displays intrusive advertising, tracks the user’s activity, or compromises personal data. 

Ransomware

Ransomware is any malware that threatens to leak the user’s data if a ransom isn’t paid. To achieve this, ransomware renders files unusable by encrypting them. The user is then pressured into paying the ransom in exchange for decryption.  

Spyware

Spyware is any program that collects a user’s data and forwards it to a third party without authorization. Keep in mind that any software — including legitimate ones — can be classified as spyware if it’s downloaded to the user’s device without permission. 

Phishing 

Phishing is an umbrella term for various scams involving sending a fraudulent message designed to mislead a user into exposing personal data or to embed a malicious program into their system. As of 2021, phishing was the most common form of cyberattack. 

Trojans

Trojans refer to a type of malware that tricks users into downloading it by masquerading as a legitimate program. These malicious programs spread by misleading users into doing simple tasks, such as completing a fill-in form or clicking on fake ads. 

How do viruses affect Macs?

Viruses can affect Macs in a variety of ways. Depending on the type of malware that infects the Mac, symptoms might range from mild ones that could go undetected for weeks to ones that are instantly noticeable.  

Here are some signs that you might see if your Mac is infected with a virus:  

The operating system is running slower than usual. 
Pop-up ads are frequently appearing. 
Website pages aren’t displaying properly.  
New extensions are added to your browser without your permission.  
You can’t access personal files.  

A Mac that’s been infected with a virus puts your personal data at risk. Among these risks is the possibility of passwords being compromised and personal files being deleted from the hard drive. 

How to check your Mac for viruses

Apple’s built-in security system makes checking for viruses a relatively simple process. Follow these steps to make sure all bases are covered: 

Checking for Mac malware

To check if your Mac is infected with a virus, start by monitoring your system’s memory usage. To access the Activity Monitor, go to Applications > Utilities > Activity Monitor > CPU. 

 Sort the CPU percentage from high to low and look for unusually high CPU use. If a particular process stands out, do a quick search to determine whether it’s malicious. 

Checking for suspicious applications

While viruses are rarely found in the Applications folder, it’s still a good idea to check since Trojans can be embedded in a wide range of apps. Go to your Applications folder and look for any you don’t remember installing.  

If a search reveals illegitimate apps, delete them from the folder and empty your trash. 

Checking your login items

Since malware tends to load automatically when you start your Mac, there’s a good chance it will show up in your macOS login items list. To check the list, go to Users & Groups in System Preferences and go through the list after clicking on the Login Items tab.  

Select any item that stands out as suspicious and remove it by clicking the minus (-) button. 

Do Macs have built-in antivirus protection?

While Macs don’t come with conventional antivirus protection, they do boast several internet security features. Here are the main ones:  

XProtect

XProtect is an anti-malware system built into Mac OS X. XProtect stores all known malware definitions in a file and prevents any application with these definitions from being installed on the system. If you try to open an infected file, XProtect will display a warning message and tell you what type of malware it is. 

Gatekeeper

As the name implies, Gatekeeper is a macOS built-in security feature that verifies all downloaded apps before allowing them to be installed. In essence, Gatekeeper prevents unrecognized third-party applications from running on the system, reducing the possibility of malware infiltration. 

Sandboxing

Sandboxing is a mechanism that restricts third-party apps from making changes to the system or accessing files stored by other apps. This helps limit damage to the device and protects the user’s data in case an app is compromised. 

Malware Removal Tool

Apple’s Malware Removal Tool (MRT) is a built-in malware removal software that removes any malicious software that manages to infiltrate your system. This process occurs automatically whenever XProtect detects malware on a file or app. 

6 tips to keep your Mac safe from viruses

Now that you’re familiar with the security threats that Macs can experience, the next step is prevention. Here are some best practices to keep your Mac safe from viruses. 

Keep your operating system updated 

Using an outdated version of the operating system (OS) can pose a risk to your Mac, as hackers may exploit a known vulnerability in the system. Getting a software update allows you to benefit from the latest security updates that help mitigate these vulnerabilities. 

The good news is that Apple makes it easy to keep your OS in working order with automatic updates. Simply open System Preferences > Software Update. Then, check the Automatically keep my Mac up to date box.  

You can also do manual updates by clicking Advanced in the Software Update section and choosing: 

Check for updates 
Download new updates when available 
Install macOS updates 
Install app updates from the Mac App Store 

Double-check your privacy and security settings

Staying on top of your privacy and security settings can go a long way in protecting your Mac from viruses. To make sure that no suspicious apps can be installed on your system, head over to the preference pane in the Security & Privacy section in System Preferences and select App Store and App Store and Identified Developers as the only sources from which software can be installed. 

Consider using a VPN on public Wi-Fi networks

Many Wi-Fi hot spots don’t require authentication to establish a network connection. This can make them vulnerable to hackers looking to infiltrate unsecured devices.  

To secure your connection when using public Wi-Fi, be sure to use a virtual private network (VPN) like McAfee’s Secure VPN. Our VPN technology allows you to connect safely to public Wi-Fi by encrypting (in other words, scrambling) your data. You’ll stay anonymous and secure from advertisers and prying eyes, and the VPN will turn on automatically when you connect to an unsecured network. 

Install antivirus software

As effective as some of Apple’s built-in security features are, the ever-changing landscape of cybersecurity threats may require the use of an antivirus program like the award-winning antivirus software included in McAfee Total Protection. 

This program was designed with Mac-specific vulnerabilities in mind and offers three different ways to scan your system:  

Real-time scanning 
On-demand scanning 
Scheduled scanning 

It also comes with customizable firewall protection and a wide range of privacy and identity tools and features. While the antivirus software protects your Mac from online threats, you can enjoy enhanced peace of mind. 

Ensure your firewall is turned on

A firewall is a built-in security system that protects your Mac by blocking suspicious internet traffic. Keep your firewall enabled at all times to benefit from this protection.  

McAfee’s robust firewall protection that comes with our antivirus software puts you in control of the data that comes in and goes out through your network. 

Back up your Mac regularly

Backing up files is a simple yet effective way to protect you from data loss in case your system is compromised. You can use the Time Machine feature to back up your Mac to an external hard drive and restore it when the need arises.  

To back up your Mac, follow these steps: 

Plug an external hard drive into your Mac. 
Click the Apple icon in the upper-left menu. 
Select System Preferences. 
Click Time Machine. 
Click Select Backup Disk. 
Pick the drive and select Use Disk. 
Check the Back Up Automatically box. 

Add additional protection to your Mac with McAfee

As cybersecurity threats continue to grow in scale and complexity, Apple’s built-in security features are a good place to start. For comprehensive protection against these threats, though, consider adding another layer of defense with McAfee Total Protection. 

Our all-in-one protection suite helps keep your personal information and privacy safe with a secure VPN, premium antivirus software, identity monitoring, and other top-of-the-line features. Malware doesn’t have to be a concern when you’ve got McAfee in your corner.  

See the difference McAfee Total Protection can make when it comes to living your best life online.  

The post Do Macs Need Antivirus Software? appeared first on McAfee Blog.

Read More

CVE-2021-23792

Read Time:22 Second

The package com.twelvemonkeys.imageio:imageio-metadata before 3.7.1 are vulnerable to XML External Entity (XXE) Injection due to an insecurely initialized XML parser for reading XMP Metadata. An attacker can exploit this vulnerability if they are able to supply a file (e.g. when an online profile picture is processed) with a malicious XMP segment. If the XMP metadata of the uploaded image is parsed, then the XXE vulnerability is triggered.

Read More

CVE-2021-23592

Read Time:7 Second

The package topthink/framework before 6.0.12 are vulnerable to Deserialization of Untrusted Data due to insecure unserialize method in the Driver class.

Read More

CVE-2019-12254

Read Time:23 Second

In multiple Tecson Tankspion and GOKs SmartBox 4 products the affected application doesn’t properly restrict access to an endpoint that is responsible for saving settings, to a unauthenticated user with limited access rights. Based on the lack of adequately implemented access-control rules, by accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to change the application settings without authenticating at all, which violates originally laid ACL rules.

Read More