ISC StormCast for Tuesday, August 9th 2016

By Johannes B. Ullrich, Ph.D. Using File Entropy to Identify “Ransomwared” Files
https://isc.sans.edu/forums/diary/Using+File+Entropy+to+Identify+Ransomwared+Files/21351/
Bypassing Windows Digital Signatures
https://www.blackhat.com/docs/us-16/materials/us-16-Nipravsky-Certificate-Bypass-Hiding-And-Executing-Malware-From-A-Digitally-Signed-Executable-wp.pdf
Quadrooter Android Vulnerability
http://blog.checkpoint.com/2016/08/07/quadrooter/
Defcon Slides Online
https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/
Philips Hue Exploit (Video)
http://colinoflynn.com/wp-content/uploads/2016/08/us-16-OFlynn-A-Lightbulb-Worm-wp.pdf
More Here