ISIS "hacking" raises hackles in the US and (more so) in Australia, as the soi-disant Caliphate's sympathizers dox military members and others. US Defense sources think the personal information released — email addresses, passwords, etc. — is out-of-date and unlikely to be useful, but authorities in both countries are watching the situation. ISIS-watchers note the significance of October 15, the date of ISIS's supersession of al Qaeda in Iraq, for possible attack planning. (French security services also warn of a heightened ISIS threat this weekend — Saturday's Feast of the Assumption, a Christian holy day, is occasioning some jihadist chatter.)
US-CERT warns of a Lenovo Service Engine bios vulnerability and urges mitigation; observers see the issue arising from bloatware. Salesforce, Cisco, SAP, and Docker also address potential security issues. One of Microsoft's patches this month addresses a USB infection vector.
Oracle's recent invective against reverse engineering (quickly taken down, but the Internet remembers) receives the sort of industry response one would expect.
Those of you whose interactions with the criminal justice system have been less than fully successful will find news you can use in the proof-of-concept disabling and removal of a court-ordered tracking bracelet.
Industry observers look at threat intelligence and find it wanting: too much glare of war. TruSTAR gives Dark Reading its take on the operational, regulatory, and technical implications of intelligence sharing.
US companies tell the President they want him to do something about Chinese industrial espionage. The US Congress plans a cyber legislative push upon returning from recess.