ENISA published a good practice guide on vulnerability disclosure, aiming to provide a picture of the challenges the security researchers, the vendors and other involved stakeholders are confronted wi...
http://www.net-security.org/secworld.php?id=19342
Microsoft asks: We've taken down botnets for you. How about a kill switch?
Its like pulling a smoking car off the road... Oh, hang on Last December, Microsoft intercepted traffic on users' PCs and helped break up a botnet. And nobody complained. So the company very tentatively asked at a session on ethics and policy in Brussels this week whether it should do more.
http://go.theregister.com/feed/www.theregister.co.uk/2016/01/19/microsoft_botnets_kill_switch/
Since last year, we've been monitoring various redirectors which lead to exploit kits (EK). One of the redirectors in question routes to either Angler EK or Neutrino EK. SANS ISC has also observed this particular redirector switching between these two kits. At the beginning of this year, we noticed a sudden significant drop in our...
https://labsblog.f-secure.com/2016/01/19/angler-exploit-kits-january-vacation/
Root-Exploit: Android und Linux anfällig für Rechte-Trickserei
Der Schlüsselbund des Kernels stattet mit einem Trick seit 2012 jeden Nutzer mit Root-Rechten aus. Allerdings muss der Nutzer dafür bereits angemeldet sein.
http://heise.de/-3076663