Home Authors Posts by cyberparse

cyberparse

33637 POSTS 0 COMMENTS
Our purpose is to provide the right information to our readers. For obvious reasons, our information journey will of couse be ever changing, but from the outset we plan on the following: Break down and communicate knowledge relating to Cyber Crime, Cyber Security, Information Security and Computer Security. Use Risk Management practices to help in translating the technical aspects of the Risks, Threats and Vulnerabilities into business language. Communicate the appropriate Controls necessary to reduce the Impact and Probability. We will do this by: Identifying, collating and providing relevant information. Highlighting relevant News articles. Investigating trends and providing Analysis. Providing How-to tips and tricks to reduce the Threats and Vulnerabilities. Offering Products and Solutions designed to mitigate or defend against the risks. ------ Joe Woods, Editor and CTO

RHBA-2014:1152-1: vdsm 3.4.2 bug fix and enhancement update

Updated vdsm packages that fix several bugs and add various enhancements are nowavailable. VDSM is a management module that serves as a Red Hat Enterprise VirtualizationManager agent on Red Hat Enterprise Virtualization Hypervisor or Red HatEnterprise Linux hosts.Changes to the vdsm component:* Previously, when attempting to add a Red Hat Enterprise Linux 7 host to theManager for the first time following clean RHEL 7 installation, Vdsm failed tostart on the host, and thus the host failed to add. This happened because themultipathd service behaves differently in RHEL 7 from how it behaves in RHEL6.5. In RHEL 6.5, the multipathd service disables all devices when starting ifthe multipath configuration file does not exist. Creating a new multipath.conffile and reloading the multipathd service causes multipathd to reload the newconfiguration, and installation can continue. In RHEL 7, under the samecircumstances, the multipathd service behaved differently, and would stopsilently, without any error. Reloading the multipathd service failed, becausethe service was not running. Now, the behavior in RHEL 7 has been modified tosimulate that of multipathd on RHEL 6.5 hosts; if the multipath configurationfile is missing, the install script creates a new multipath configuration file,and Vdsm successfully reloads the multipathd service during startup.(BZ#1125178)* Previously, duplicate entries were being created in /etc/logroate.d/libvirtd,because the logs were not being rotated correctly. Now, previous content isbacked up prior to a new entry being added, and libvirt logs are rotatedsuccessfully. (BZ#1115997)* When a Red Hat Enterprise Virtualization Hypervisor is disconnected from thenetwork, resources become unavailable, virtual machines lose connectivity, andin some cases, the host is fenced and data is lost. Previously, there was no wayto track when and why this happened. Now, a new log at/var/log/vdsm/connectivity.log allows administrators to track networkconnectivity. The log tracks the reported speed and duplex of host networkinterfaces, and when Vdsm's client (most commonly, Engine) has contacted Vdsm.(BZ#1122010)* Previously, if sanlock was present on a system during upgrade from version 3.3to 3.4, the system attempted to stop and restart sanlock. The update processwould finish, but with vdsm-tool exceptions. Now, sanlock restart is requestedby vdsm-tool only if there is a relevant change. (BZ#1088805)All users managing Red Hat Enterprise Linux Virtualization hosts using Red HatEnterprise Virtualization Manager are advised to install these updated packages. Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Virtualization 3 SRPMS: vdsm-4.14.13-2.el6ev.src.rpm     MD5: 28c2e5262fc3bc9cc52087cc8fc67bf1SHA-256: 7786f8ff85bf319fe35319574fd1baf77cf609c8bed1f5e9a6440af34ce14256 vdsm-4.14.13-2.el7ev.src.rpm     MD5: 1662d15f996b8d50e2e6859c950e774dSHA-256: de18ed6f80b201a84c219d2a9600052df4863f15c3dd8a0a664a5487a5e23d81   x86_64: vdsm-4.14.13-2.el6ev.x86_64.rpm     MD5: ecf5c1c4446777330a7ecccac1015e0dSHA-256: b9773989a240c1a7164c49093f7479be0d48efaa8a9a6a7e86d625505e4ef7ae vdsm-4.14.13-2.el7ev.x86_64.rpm     MD5: 1a87f7846ee25d776fe97fa349a0a7dcSHA-256: b3761720c02a0c48178f118fda0ceacd5cbfed197fffd94dae2e9b1e27d1cdfc vdsm-cli-4.14.13-2.el6ev.noarch.rpm     MD5: 89e96caf6b6d80db4487178f6d231f92SHA-256: c7a33be1702890d46c9ad83fb161ab4af6ce6b49a69a6579ba0c996c8a26a5f9 vdsm-cli-4.14.13-2.el7ev.noarch.rpm     MD5: 2bcb740b8c534a3100529893c71a7bdbSHA-256: d3e0fa0e4129c58f77baca39914eded6fd935f5dd38e8c9742be059ccafcd685 vdsm-debug-plugin-4.14.13-2.el7ev.noarch.rpm     MD5: 6ad2d0a6ffdd687f87e3bc0e1fd52341SHA-256: 86ad2fa5fcdf0a088898fc959643787b927170a617f77c9d871f4d2bc5c4bf27 vdsm-debuginfo-4.14.13-2.el6ev.x86_64.rpm     MD5: 1bcb51b9f56b3a88c90446cba6395a0fSHA-256: 112c6f75ccc5c3a134d5e6dfab3274199793c49e9b7f6d0533ebe5f58fc58039 vdsm-hook-vhostmd-4.14.13-2.el6ev.noarch.rpm     MD5: 00ccd9ccc0d0c0eb4160068d0ef74458SHA-256: d81f84aba9d8b8803591b9d522c6456dca37f2170ffa5e9178f52298d5d6fc92 vdsm-hook-vhostmd-4.14.13-2.el7ev.noarch.rpm     MD5: dfb067292f3b93f49107c8bc42c60ed0SHA-256: c1461f13cf5c941c40676ab5ce40b293d02f3a229ebf50067268e1fb9bafbfd3 vdsm-python-4.14.13-2.el6ev.x86_64.rpm     MD5: f285217e2e2d1960d09c07eebc13b6d1SHA-256: 1d04f70e34aff198a7f950172ed827981171eb8e3d1dfefd43d2e3bfbb799f83 vdsm-python-4.14.13-2.el7ev.x86_64.rpm     MD5: 282bf83222797bb73c195f6e1c3da79cSHA-256: f35652598c1a4ac19f154c300bfb4a37481af513a7b0202dff10817c1dcda40d vdsm-python-zombiereaper-4.14.13-2.el6ev.noarch.rpm     MD5: ffbc9fb587e90bdefe7cb8930a7263acSHA-256: a26078736e33875d7e5e426611273aa5be6be95d30b25f6dc0d614d82fcaad2e vdsm-python-zombiereaper-4.14.13-2.el7ev.noarch.rpm     MD5: b3ba8071f4b1aa59f73033685f33dd45SHA-256: a1ed5b2b17fa7198cd2ab703a92ce02ae63ab231be97c365bce86c8186bbf938 vdsm-reg-4.14.13-2.el6ev.noarch.rpm     MD5: da09cfe2b1dfcdbcbbb3f784cfe77782SHA-256: 2faccab5bf7ba26771779bc60ea615344bb68891f73e1fa3fb68416dea2ae8f4 vdsm-reg-4.14.13-2.el7ev.noarch.rpm     MD5: f354c8779f554826538317f0213d3dd4SHA-256: 4c7a3b4131cfd0965dd195f8b65fcf4519c7b9ea895e8c1fd1a3d20b862d4864 vdsm-xmlrpc-4.14.13-2.el6ev.noarch.rpm     MD5: 91600c67a3e0ea4ec81e2bf6cc754bf0SHA-256: 2973982cff19b4db490b4ef3db30f5abe2e5781772c233956d26fe782641d424 vdsm-xmlrpc-4.14.13-2.el7ev.noarch.rpm     MD5: a1a8c7b5e1bb7757ceb0ae080f5c4bdeSHA-256: 8f6a322573c47b80f0f0d0b7a946b815453746186c15142053565fac9f38dfe6   Red Hat Enterprise Virtualization 3.4 SRPMS: vdsm-4.14.13-2.el6ev.src.rpm     MD5: 28c2e5262fc3bc9cc52087cc8fc67bf1SHA-256: 7786f8ff85bf319fe35319574fd1baf77cf609c8bed1f5e9a6440af34ce14256   x86_64: vdsm-bootstrap-4.14.13-2.el6ev.noarch.rpm     MD5: b883fe34e1d7e87dfd35004ee09b618eSHA-256: 1e9cc57fa0b25621138cbd8f216b92091cead13dfad4316c60a0214e4bfcccbf   (The unlinked packages above are only available from the Red Hat Network) 1088805 - Appear vdsm-tool exception in time of vdsm package upgrade from 3.3 to 3.41115997 - "/etc/logrotate.d/libvirtd" file is having multiple entries of "/var/log/libvirt/libvirtd.log" after upgrading the host to "rhev-hypervisor6-6.5-20140603.2" version.1119060 - Pthreading is imported too late1122010 - [RFE] Host Self-Health Log: network connectivity information1123842 - Can't login the hypervisor with correct password after upgrading the RHEV-H from "rhevh-6.5-20140603.2.el6ev.iso" to "rhevh-6.5-20140618.0.el6ev.iso"1125178 - multipathd reload fails when installing running vdsm in the first time on a fresh install where multipath.conf is missing These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2014:1151-1: rhevm-reports 3.4.2 bug fix update

An updated rhevm-reports package that fixes two bugs is now available. The Red Hat Enterprise Virtualization reports package provides a suite ofpre-configured reports and dashboards that enable you to monitor the system. Thereports module is based on...

Celeb nude photos now being used as bait by Internet criminals

Tweets with fake links to #JLaw photos revive oldest trick in Web malware book.

FBI offers help to game developers suffering harassment, death threats

There's been a swell of online harassment, and the authorities have noticed.

Smartphone users unaware of hacking risks

More than half of mobile users are unaware that hackers can take control of their smartphones, according to research by Kaspersky. The survey found that 62% of users did not know hackers could access smartphone cameras, with 30% admitting to leaving confidential documents within the sight of personal devices. Just the 20% of smartphone users claimed to be aware of the risk of hacking. Earlier this week, Apple and the FBI launched an investigation after iCloud account hacks led to nude photos of celebrities appearing online. But, despite high-profile cases such as these, 40% of the users who claimed to be aware of hacking said they try to combat these issues using measures that will not protect them, such closing their camera application. Kaspersky’s survey found over 80% of people claimed they never turned their phone off, and many were unaware that hackers could gain access to personal files and photos stored on mobile devices. As more employees take their own devices to work, the importance of understanding these risks increases. A survey by Ovum found 29% of employees will use their personal devices in the office for work-related tasks without knowing whether this is part of their employer's workplace policy. David Emm, senior security researcher for Kaspersky, said: "We think of our mobile devices as our window on the world, not realising that for cyber criminals it could be their window into ours. Hacking into a device’s camera offers those with malicious intent access to our images, our most intimate moments, our identities – and the people we want most to protect.” Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com RELATED CONTENT FROM THE TECHTARGET NETWORK

Secucloud to showcase secure smart home solutions at Security 2014 in...

German security event from 26-29 September sees secucloud exhibit jointly with Nixdorf SmartSystems and Fraunhofer InHaus on the North Rhine Westphalia Criminal Investigation Bureau stand Hamburg, Germany, 4 September 2014 - Software is increasingly becoming a part of our lives, with compact and practical devices facilitating our everyday tasks. The mass media often talks about technologies for smart homes, smart metering and the internet of things- and they are beginning to find their way into our conversations. But one thing is lacking: the awareness that threats like Trojans, worms, ransomware and digital spies are not limited to PCs. Cybercriminals and spies are already rubbing their hands with glee at the increasing digitalization of our day-to-day activities. Their next target will be the smart home. That makes it even more important that simple, easy-to-understand security solutions are available that protect our homes from digital break-ins. And this is the goal of secucloud. The German company will be exhibiting its solutions to protect tomorrow's homes from eavesdropping at the Security 2014 show in Essen, on the North Rhine Westphalia Criminal Investigation Bureau booth (Hall 4, Stand 124). Secucloud's participation at Security 2014 from 26-29 September in Essen is part of a collaboration between the SmartHome Initiative Deutschland association and the North Rhine Westphalia Criminal Investigation Bureau, which is heading up a program known as ProPK (state and federal crime prevention). "The increasing digitalization and interconnection of home and household technologies is wonderful in some ways," notes Dennis Monner, founder and CEO of secucloud. "But it can be frightening too, because it brings with it a dramatic increase in things that cybercriminals and spies can attack. Security isn't just a question of software any more - those days are gone. There are just too many devices and device manufacturers involved. We need far greater awareness in the industry that security has to be designed in to devices and solutions right at the beginning - at the development stage. This is why we're a member of SmartHome Initiative Deutschland, work closely with other members, and are looking forward to our participation on the joint stand with the North Rhine Westphalia Criminal Investigation Bureau at Security 2014." Secucloud will be showcasing its solutions together with two other members of the initiative: Nixdorf SmartSystems and Fraunhofer InHaus.Security: simple and affordableMore and more devices are connected to the internet. The associated dangers - such as fraud, sabotage or spying - demand comprehensive security mechanisms that can be used by anyone, not just specialists and technophiles. But even that will not be enough to ensure they are accepted by the citizens of today. Security in the era of the internet of things must also be so inexpensive that nobody needs to do without protection for financial reasons. Secucloud has achieved both of these goals: technical simplicity and an attractive price. The secucloud security mechanisms, which defend users against cybercrime and spying attempts, are located in a private cloud for each individual customer and protect all the connected devices, whether they belong to private households or companies. As a cloud solution, no software installation or configuration is required and everything - including updates - runs automatically in the background. Whatever their device - desktop computers, smartphones, tablets, smart meters or smart fridges - users benefit from security technologies that, until now, have only been available to large enterprises with plenty of financial muscle. Users also benefit from secucloud's extremely attractive subscription prices. Further information:phronesis PR GmbH Marcus Ehrenwirth Ulmer Strasse 160 D-86156 Augsburg, Germany Tel.: +49 (0) 821 444 800 Fax: +49 (0) 821 444 80 22 E-Mail: info@phronesis.de Internet: www.phronesis.desecucloud GmbHAleksander GroshevGroße Bleichen 21D-20354 Hamburg, GermanyTel.: +49 (0) 180 5 015 437Fax: +49 (0) 180 5 015 438E-Mail: aleksander.groshev@secucloud.comInternet: http://secucloud.com/de SecucloudSecucloud, based in Hamburg, Germany, provides security for the internet of things. The secucloud security mechanisms, which defend users against cybercrime and spying attempts, are located in a private cloud for each individual customer and protect all the connected devices, whether they belong to private households or companies. As a cloud solution, no software installation or configuration is required. Whatever their device - desktop computers, smartphones, tablets, smart meters or smart fridges - users benefit from security technologies that, until now, have only been available to large enterprises with plenty of financial muscle. Users also benefit from secucloud's extremely attractive subscription prices. Further information about the company and its solutions is available at www.secucloud.com. Source: RealWire

VU#855836: Arris Touchstone cable modem information leakage vulnerabiliity

Arris Touchstone DG950A cable modem enables SNMP public access by default.

VU#259548: Netmaster cable modem information leakage vulnerability

The Netmaster CBW700N wireless cable modem enables remote SNMP public access by default

Hacked JPMorgan data rerouted to Russia through network of computers

Cyber criminals could be using 'bulletproof' hosting platform, US bank investigators have suggested

In case of cyber attack: NATO members ready to pledge mutual...

More cooperation on cyber defense among members of North Atlantic alliance.

RHBA-2014:1150-1: cpio bug fix update

Updated cpio packages that fix one bug are now available for Red HatEnterprise Linux 6. The cpio packages provide the GNU cpio utility for creating and extractingarchives, or copying files from one place to another.This update fixes the following bug:* Previously, during archive creation, cpio internals did not detect a read()system call failure. Based on the premise that the call succeeded, cpioterminated unexpectedly with a segmentation fault without processing furtherfiles. The underlying source code has been patched, and an archive is nowcreated successfully. (BZ#1135423)Users of cpio are advised to upgrade to these updated packages, which fix thisbug. Before applying this update, make sure all previously-released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/knowledge/articles/11258Red Hat Enterprise Linux Desktop (v. 6) SRPMS: cpio-2.10-12.el6_5.src.rpm     MD5: 48fe69102531fde73b9c6429b8b4849dSHA-256: 0d3a6d5423bb767a3e5086929a490cba32a57292976f61b268b30a8e1ce8fa78   IA-32: cpio-2.10-12.el6_5.i686.rpm     MD5: 3bc7df9fdef9c1c1d9f40afd7ac0b3cfSHA-256: a538d5b5fc4124a874a3e6c82b62346bca90d14c974cdcd926057af92f47bd35 cpio-debuginfo-2.10-12.el6_5.i686.rpm     MD5: d83441fac13ce151bd448f1fadf585e2SHA-256: a25ef424ec82b043e3737759ca67e3a31a9cd194098b72ae9169154247255037   x86_64: cpio-2.10-12.el6_5.x86_64.rpm     MD5: a0d0e92666ca228680ec121113b8fdbeSHA-256: 06316538b90d3aab20f4787132307f6d330da9a48bab11a13e0a616fcf622ce5 cpio-debuginfo-2.10-12.el6_5.x86_64.rpm     MD5: 2a9e5d07b1eb34934a7b2eee353cddf1SHA-256: 2f3205e70cff4e08f76461d417b4eb1cba4daabda0f4cd0dc7e9ed023a5865d4   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: cpio-2.10-12.el6_5.src.rpm     MD5: 48fe69102531fde73b9c6429b8b4849dSHA-256: 0d3a6d5423bb767a3e5086929a490cba32a57292976f61b268b30a8e1ce8fa78   x86_64: cpio-2.10-12.el6_5.x86_64.rpm     MD5: a0d0e92666ca228680ec121113b8fdbeSHA-256: 06316538b90d3aab20f4787132307f6d330da9a48bab11a13e0a616fcf622ce5 cpio-debuginfo-2.10-12.el6_5.x86_64.rpm     MD5: 2a9e5d07b1eb34934a7b2eee353cddf1SHA-256: 2f3205e70cff4e08f76461d417b4eb1cba4daabda0f4cd0dc7e9ed023a5865d4   Red Hat Enterprise Linux Server (v. 6) SRPMS: cpio-2.10-12.el6_5.src.rpm     MD5: 48fe69102531fde73b9c6429b8b4849dSHA-256: 0d3a6d5423bb767a3e5086929a490cba32a57292976f61b268b30a8e1ce8fa78   IA-32: cpio-2.10-12.el6_5.i686.rpm     MD5: 3bc7df9fdef9c1c1d9f40afd7ac0b3cfSHA-256: a538d5b5fc4124a874a3e6c82b62346bca90d14c974cdcd926057af92f47bd35 cpio-debuginfo-2.10-12.el6_5.i686.rpm     MD5: d83441fac13ce151bd448f1fadf585e2SHA-256: a25ef424ec82b043e3737759ca67e3a31a9cd194098b72ae9169154247255037   PPC: cpio-2.10-12.el6_5.ppc64.rpm     MD5: e2e9e1c7965d850ed446fd07fbab60ffSHA-256: 3c8db42ae725c2e9699a2ed6b9783c2a6ff7f0509f6c32b4b473181a8cf6b4f5 cpio-debuginfo-2.10-12.el6_5.ppc64.rpm     MD5: 2700d35433fd341d354bfdfd4a69faf7SHA-256: 125a28cfeee5ed1db33b68f25ef00c7db2c95721ebad44f7ea969a346db8f6fc   s390x: cpio-2.10-12.el6_5.s390x.rpm     MD5: 434bbf5df5fb6653b7a22e0cf6f0e1a9SHA-256: 8b98a0a4d2b6d52ac36d7584d5689b374b96b58df225cf841a7e3a678cc2134e cpio-debuginfo-2.10-12.el6_5.s390x.rpm     MD5: d7501485d956bb2fa22233d59c603908SHA-256: c86686279a78efd0f17c3c3a41c6b500f7ac47ce21d50e3a7cf900748beedcca   x86_64: cpio-2.10-12.el6_5.x86_64.rpm     MD5: a0d0e92666ca228680ec121113b8fdbeSHA-256: 06316538b90d3aab20f4787132307f6d330da9a48bab11a13e0a616fcf622ce5 cpio-debuginfo-2.10-12.el6_5.x86_64.rpm     MD5: 2a9e5d07b1eb34934a7b2eee353cddf1SHA-256: 2f3205e70cff4e08f76461d417b4eb1cba4daabda0f4cd0dc7e9ed023a5865d4   Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: cpio-2.10-12.el6_5.src.rpm     MD5: 48fe69102531fde73b9c6429b8b4849dSHA-256: 0d3a6d5423bb767a3e5086929a490cba32a57292976f61b268b30a8e1ce8fa78   x86_64: cpio-2.10-12.el6_5.x86_64.rpm     MD5: a0d0e92666ca228680ec121113b8fdbeSHA-256: 06316538b90d3aab20f4787132307f6d330da9a48bab11a13e0a616fcf622ce5 cpio-debuginfo-2.10-12.el6_5.x86_64.rpm     MD5: 2a9e5d07b1eb34934a7b2eee353cddf1SHA-256: 2f3205e70cff4e08f76461d417b4eb1cba4daabda0f4cd0dc7e9ed023a5865d4   Red Hat Enterprise Linux Server EUS (v. 6.5.z) SRPMS: cpio-2.10-12.el6_5.src.rpm     MD5: 48fe69102531fde73b9c6429b8b4849dSHA-256: 0d3a6d5423bb767a3e5086929a490cba32a57292976f61b268b30a8e1ce8fa78   IA-32: cpio-2.10-12.el6_5.i686.rpm     MD5: 3bc7df9fdef9c1c1d9f40afd7ac0b3cfSHA-256: a538d5b5fc4124a874a3e6c82b62346bca90d14c974cdcd926057af92f47bd35 cpio-debuginfo-2.10-12.el6_5.i686.rpm     MD5: d83441fac13ce151bd448f1fadf585e2SHA-256: a25ef424ec82b043e3737759ca67e3a31a9cd194098b72ae9169154247255037   PPC: cpio-2.10-12.el6_5.ppc64.rpm     MD5: e2e9e1c7965d850ed446fd07fbab60ffSHA-256: 3c8db42ae725c2e9699a2ed6b9783c2a6ff7f0509f6c32b4b473181a8cf6b4f5 cpio-debuginfo-2.10-12.el6_5.ppc64.rpm     MD5: 2700d35433fd341d354bfdfd4a69faf7SHA-256: 125a28cfeee5ed1db33b68f25ef00c7db2c95721ebad44f7ea969a346db8f6fc   s390x: cpio-2.10-12.el6_5.s390x.rpm     MD5: 434bbf5df5fb6653b7a22e0cf6f0e1a9SHA-256: 8b98a0a4d2b6d52ac36d7584d5689b374b96b58df225cf841a7e3a678cc2134e cpio-debuginfo-2.10-12.el6_5.s390x.rpm     MD5: d7501485d956bb2fa22233d59c603908SHA-256: c86686279a78efd0f17c3c3a41c6b500f7ac47ce21d50e3a7cf900748beedcca   x86_64: cpio-2.10-12.el6_5.x86_64.rpm     MD5: a0d0e92666ca228680ec121113b8fdbeSHA-256: 06316538b90d3aab20f4787132307f6d330da9a48bab11a13e0a616fcf622ce5 cpio-debuginfo-2.10-12.el6_5.x86_64.rpm     MD5: 2a9e5d07b1eb34934a7b2eee353cddf1SHA-256: 2f3205e70cff4e08f76461d417b4eb1cba4daabda0f4cd0dc7e9ed023a5865d4   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: cpio-2.10-12.el6_5.src.rpm     MD5: 48fe69102531fde73b9c6429b8b4849dSHA-256: 0d3a6d5423bb767a3e5086929a490cba32a57292976f61b268b30a8e1ce8fa78   IA-32: cpio-2.10-12.el6_5.i686.rpm     MD5: 3bc7df9fdef9c1c1d9f40afd7ac0b3cfSHA-256: a538d5b5fc4124a874a3e6c82b62346bca90d14c974cdcd926057af92f47bd35 cpio-debuginfo-2.10-12.el6_5.i686.rpm     MD5: d83441fac13ce151bd448f1fadf585e2SHA-256: a25ef424ec82b043e3737759ca67e3a31a9cd194098b72ae9169154247255037   x86_64: cpio-2.10-12.el6_5.x86_64.rpm     MD5: a0d0e92666ca228680ec121113b8fdbeSHA-256: 06316538b90d3aab20f4787132307f6d330da9a48bab11a13e0a616fcf622ce5 cpio-debuginfo-2.10-12.el6_5.x86_64.rpm     MD5: 2a9e5d07b1eb34934a7b2eee353cddf1SHA-256: 2f3205e70cff4e08f76461d417b4eb1cba4daabda0f4cd0dc7e9ed023a5865d4   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

AVG to buy MDM provider Location Labs in $220m deal

Internet security firm AVG has agreed to buy mobile device management (MDM) provider Location Labs in a deal worth up to $220m (£134m). Emeryville-based Location Labs' services include Family Locator, Drive Safe and Account Analytics & Controls – all security-based controls for consumers. It provides a pre-installed service on Android smartphones and holds deals with mobile operators, including AT&T, Sprint, T-Mobile, Telefonica and Verizon Wireless. The company had raised nearly $26m since it was founded in 2002 and was backed by the likes of BT, Intel Capital and Qualcomm Ventures. Location Labs claims that its services are distributed to more than 50 million users, although it has a smaller figure - one million - of monthly paying subscribers. AVG claims that with the acquisition and organic growth combined it will create a global business generating between $60m and $70m in mobile bookings in 2015, and anticipates this to increase to around $100m in 2016.  "Location Labs has effectively cracked the code for mobile monetisation through its highly successful business model with industry partners. This acquisition significantly accelerates AVG's mobile strategy in this area," said Gary Kovacs, CEO of AVG. "According to industry estimates, the number of mobile-connected devices will exceed the world's population by the end of this year alone. The combined existing mobile user base of both companies gives us the unprecedented opportunity to deliver online security to approximately a quarter of a billion devices as we see more people go mobile to get online," he added. Under the terms of the agreement, AVG will pay about $140m initially, with an additional $80m in cash to be paid over the next two years depending on the achievement of certain performance metrics and milestones. The transaction is expected to close during the fourth quarter of 2014, subject to shareholder approval and other closing conditions. Following the close of the acquisition, Location Labs CEO Tasso Roumeliotis will continue to lead the Location Labs unit of AVG. There has been no announcement on whether the company's 214 employees will be affected by the impending acquisition.