Backdoor hidden by hackers discovered in CCleaner security app with 2 billion downloads

News broke this morning that users of Avast-owned security application CCleaner for Windows have been advised to update their software immediately, after researchers discovered criminal hackers had installed a backdoor in the tool. The tainted application allows for download of further malware, be it ransomware or keyloggers, with fears millions are affected.

http://brn.firetrench.com

Continue reading

164% increase in the number of stolen, lost or compromised records

News broke yesterday that there has been a marked increase in the amount of stolen, lost or compromised records since the second half of 2016, with a 164% increase seen in the first six months of 2017. A large portion came from the 22 largest data breaches, each involving more than one million compromised records. Of the 918 data breaches more than 500 (59% of all breaches) had an unknown or unaccounted number of compromised data records.

http://brn.firetrench.com

Continue reading

BSIMM8 Study Reinforces Benchmarking as a Critical Exercise in Early Stages of Software Security Initiatives

Latest Iteration of the Building Security in Maturity Model Shows More Organisations Jumpstarting their Software Security Initiatives with Assessments and Improving Over Time

LONDON, UK. Sept. 20, 2017 Synopsys, Inc. (Nasdaq: SNPS) today released BSIMM8, the latest version of one of the industry’s leading descriptive software security maturity models, which is based on real-world data and helps organisations plan, execute, and measure their software security initiatives (SSIs). This latest iteration of the Building Security in Maturity Model (BSIMM) study is based on data collected from the largest community to date. BSIMM8 shows that software security is becoming a critical business priority with more organisations benchmarking their efforts early in their SSI lifecycle and using the results strategically to improve their risk posture over time. To download the report, visit https://www.bsimm.com/download.html.

http://brn.firetrench.com

Continue reading

Arthur D. Little urges network operators to prepare for next-generation internet of the GigaWorld

New applications could fuel global market of up to €3.5 trillion per year

Amsterdam, 20 September 2017 – In its new report, “Unlocking GigaWorld Innovation: GigaApps in a GigaWorld,” Arthur D. Little (ADL) outlines the investment and monetization opportunities available to network operators ready to embrace the “GigaWorld”, the emerging third cycle of the internet. Defined by continuous and intelligent collaboration between individuals, devices and the built environment – and driven by applications in the areas of augmented reality, virtual telepresence and automated living – the GigaWorld has the potential to both power our economy and change the way we live. However, for it to be fully realized, network operators need to deliver improved Quality of Experience (QoE) for consumers and new Quality of Service (QoS) features for content and service providers.

http://brn.firetrench.com

Continue reading

Backdoor hidden by hackers discovered in CCleaner security app with 2 billion downloads

News broke this morning that users of Avast-owned security application CCleaner for Windows have been advised to update their software immediately, after researchers discovered criminal hackers had installed a backdoor in the tool. The tainted application allows for download of further malware, be it ransomware or keyloggers, with fears millions are affected.

http://brn.firetrench.com

Continue reading

Is Ykcol a new Locky ransomware variant

A new Locky ransomware variant was discovered by Stormshield malware analyst coldshell that switches to the .ykcol extension for encrypted files.The variant is currently being distributed via span emails that have a subject line of Status of Invoice, which containt a 7zip, or 7z, attachment. This attachment contains a VBS file, which when executed will download the Locky executable from a remote site and execute it.

http://brn.firetrench.com

Continue reading

New Technology is FIRST to Decipher ‘Deeper’ Human Personality Traits in Real Time via Subliminal Facial Expressions

Sophisticated technology can tell LIVE, if people are lying, disagreeing, curious, judgmental, passionate or nervous with high levels of accuracy

19 September 2017 – Human, pioneer in Artificial Emotional Intelligence (AEI), has developed new ground breaking software that has the ability to read subliminal facial expressions and convert these into a range of emotions and specific characteristic traits in real time.  The software is the first of its kind taking AEI and facial recognition a step further into the dynamic realms of characteristic detection.

http://brn.firetrench.com

Continue reading

Privacy concerns surrounding Apple’s facial recognition technology – comment from digital forensics lawyer at Seyfarth Shaw

Apple’s new iPhone X, to be released next month, will sport cutting-edge facial recognition technology. While its Face ID technology may attract consumers, some observers have expressed concerns about the brave new world such an offering would usher in. Last Wednesday, Sen. Al Franken in a letter to Apple CEO Tim Cook raised questions about how Face ID will impact consumers’ privacy and security. RT noted last week that Face ID “could spell disaster for those wanting to keep their private data from the prying eyes of law enforcement.” 

http://brn.firetrench.com
Continue reading