OEM PCs Pose Security Risk – Threat Wire

OEM Computers pose some pretty serious security risks, more passwords have been pwned than ever before, have 100 grand to spend? There’s a zero-day for that, and more.
——————————-
VOTE FOR HAK5 and FRIENDS at http://hat.t2t2.eu for the podcast awards!!
——————————-
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
——————————

Links:
Vote for Hak5 at the Podcast Awards!
http://hat.t2t2.eu/

https://www.wired.com/2016/05/2036876/#slide-2
http://arstechnica.com/security/2016/06/how-pc-makers-make-you-vulnerable-to-man-in-the-middle-attacks-out-of-the-box/
https://duo.com/assets/pdf/out-of-box-exploitation_oem-updaters.pdf

http://arstechnica.com/security/2016/05/cluster-of-megabreaches-compromise-a-whopping-642-million-passwords/
https://www.troyhunt.com/the-emergence-of-historical-mega-breaches/

https://threatpost.com/windows-zero-day-selling-for-90000/118380/
http://krebsonsecurity.com/2016/05/got-90000-a-windows-0-day-could-be-yours/
https://www.trustwave.com/Resources/SpiderLabs-Blog/Zero-Day-Auction-for-the-Masses/

Youtube Thumbnail credit:
http://www.thoughtsoncloud.com/wp-content/uploads/2016/01/wpid-thumbnail-ec4c1e0ed7d3cd7ad004d071591eb322.jpeg

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>