Vulnerabilities were found in pre-installed software updaters present in consumer and business laptops from vendors such as Dell, HP, Lenovo, Asus and Acer.
Source: OEM Bloatware Security Vulnerabilities Found | Threatpost | The first stop for security news
How much would a cybercriminal, nation state or organized crime group pay for blueprints on how to exploit a serious, currently undocumented, unpatched vulnerability in all versions of Microsoft Windows? That price probably depends on the power of the exploit and what the market will bear at the time, but here’s a look at one convincing recent exploit sales thread from the cybercrime underworld where the current asking price for a Windows-wide bug that allegedly defeats all of Microsoft’s current security defenses is USD $90,000.
Source: Got $90,000? A Windows 0-Day Could Be Yours — Krebs on Security
Evidence against a Vancouver teacher charged with possession of child pornography has been tossed after the FBI refuses to share its Tor exploit.
Source: Judge Tosses Evidence Gathered by FBI’s Tor Exploit | Threatpost | The first stop for security news
Security researcher Troy Hunt questions timing of attempts to sell huge datasets
Source: Up to 65 million Tumblr account details on sale as ‘mega-breaches’ come to light | V3
Businesses were hit hardest by inbox-based scams in 2015 that robbed U.S. companies of $263 million. The numbers come from the FBI’s recently released 2015 Internet Crime Report that tallies the types
Source: Cybercrime Hit Businesses Hardest in 2015, says IC3 Report | Threatpost | The first stop for security news
At this week’s AusCERT 2016 conference, an embedded device security specialist proposed a ‘Security Star’ rating for consumer IoT devices. It’s a great idea, but it’ll never happen.
Source: No stars for Internet of Things security | ZDNet
Address the human element of cybersecurity by learning how to recognize and protect against social engineering attacks
Source: Your biggest security vulnerability might not be technology-related
It’s only fair…
The FBI has been taught a lesson: if you won’t reveal your method, don’t expect the court to consider your evidence.
Source: FBI refuses to release Tor exploit details, evidence thrown out of court | ZDNet
The introduction of a new distributed random number generator should enhance the Tor network’s security.
Source: Tor Project works on boosting encryption for next release | ZDNet
Three-quarters of the government’s IT budget goes to supporting legacy systems, some of which date back to the 1970s.
Source: US government is spending billions on old tech that barely works, says watchdog | ZDNet