Category Archives: Encryption

‘ShrinkLocker’ ransomware uses BitLocker against you encryption-craving malware has already been used against … – Tom’s Hardware

BitLocker has been weaponized again by the new "ShrinkLocker" ransomware attack. The attack uses novel methods to make a classic BitLocker attack more pervasive and dangerous than ever before, and it has already been used against governments and manufacturing industries.

Kaspersky, known for its Kaspersky Anti-Virus and class-leading malware research, identified the new strain in Mexico, Indonesia, and Jordan, so far only against enterprise PCs. Attacks using BitLocker, an optional Windows feature that encrypts PC hard drives commonly used in the enterprise world, are not new. But ShrinkLocker is unique thanks to new innovations.

ShrinkLocker uses VBScript, an old Windows programming script set to deprecate starting with Windows 11 24H2, to identify the specific Windows OS used by the host PC. A malicious script then runs through BitLocker setup specific to the operating system, and enables BitLocker accordingly on any PC running Vista or Windows Server 2008 or newer. If the OS is too old, ShrinkLocker deletes itself without a trace.

ShrinkLocker then shrinks all drive partitions by 100MB and uses the stolen space to create a new boot partition, hence "Shrink" Locker. ShrinkLocker also deletes all protectors used to secure the encryption key, making it unrecoverable by the victim later. The script creates a new random 64-character encryption key, sends it and other information about the computer to the attacker, deletes the logs that stored ShrinkLocker's activity, and finally forces a shut-down of the PC, using the newly created boot partition to fully lock and encrypt all drives on the PC. The PC and every byte of data on it is now fully unusable.

The attack leaves its targets floundering, with bricks for hard drives. The creator of the ShrinkLocker attack must have had an "extensive understanding" of a variety of obscure Windows internals and utilities to craft the attack, which left almost no trace. Kaspersky's experts could not find any way to identify the source of the attack or the source where information was sent, but they did find the ShrinkLocker script left behind on the single drive of one affected PC that did not have BitLocker configured.

For a ransomware attack, the attacker also did not make it easy to find where to send the ransom in question. The script changes the name of the new boot partitions to the attacker's email, but this requires more digging to spot than simply editing the BitLocker recovery screen, an easy enough task for a hacker of this caliber. This makes it likely that the attack is focused more on disruption and data destruction than ransom.

IT professionals will already be familiar with mitigation steps for these attacks: Make frequent backups, restrict users' editing privileges so they cannot edit their BitLocker settings or registries, and seek out high-level EPP or MDR solutions to track and secure your network. Kaspersky obviously suggests their own products for this in their technical report on the attack.

Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.

For the full details of the attack and the ShrinkLocker script, Kaspersky has a full technical analysis. While BitLocker is currently only a feature of "Pro" or enterprise Windows releases, Microsoft will enable BitLocker for all users starting with Windows 11 24H2, and automatically activate it on reinstallation, so beware of BitLocker attacks making a move to the individual PC world.

Go here to read the rest:
'ShrinkLocker' ransomware uses BitLocker against you encryption-craving malware has already been used against ... - Tom's Hardware

How FHE Technology Is Making End-to-End Encryption a Reality – HackRead

Is End-to-End Encryption (E2EE) a Myth? Traditional encryption has vulnerabilities. Fully Homomorphic Encryption (FHE) offers a new hope for truly secure messaging, cloud storage, and data analysis.

Encryption is like waterproofing: it needs to be all or not at all. Just as it makes no sense to waterproof a left shoe and leave the right unprotected, encrypting the consumer component of a messaging app is pointless if content can later be decrypted on cloud servers.

Its called end-to-end encryption (E2EE) for a reason, but up until now many services claiming to utilize this technology have fallen woefully short. From an architectural perspective, E2EE is difficult to implement, particularly in applications that serve millions of users.

However, the emergence of a relatively new encryption technology is raising hope that E2EE may become a reality rather than an aspiration. Its name is Fully Homomorphic Encryption (FHE) and its unique design makes it ideally suited to services that are reliant on true end-to-end encryption.

End-to-end encryption is a technology thats meant to ensure that only users communicating with one another can read the messages. This could be two individuals chatting via a messaging application or it could be a business exchanging payment data with another entity such as a bank. Data is encrypted on the senders device and decrypted on the recipients device, preventing intermediaries, including service providers, from accessing the content.

This is achieved by using cryptographic keys that encode the message before transmitting it in encrypted form. The counterparty then decodes the message using its own cryptographic key in order to read its content. In addition to messaging apps such as Signal and Telegram, the technology is used by email providers, cloud storage services, and file-sharing platforms. Its no exaggeration to say that E2EE is the backbone of the internet.

While E2EE can prove very effective at preventing third parties from intercepting messages, it is by no means bulletproof. Concerted attempts by adversaries, ranging from governments to state-sponsored hackers, to weaken encryption and introduce backdoors have resulted in many services that purport to use E2EE being vulnerable.

Critically, from the users perspective, there is no easy means of verifying whether encryption has been maintained throughout. As a result, individuals are compelled to take service providers at their word when they promise that messages are fully encrypted.

When a service claims to be end-to-end encrypted, it should be just that. In reality, implementations can differ wildly in terms of encryption strength. While its theoretically possible for users to check that the service theyre using is implementing robust encryption, its technically complex to do so, placing this ability beyond the reach of most users.

Telegram, for instance, allows users to verify that its open-source code is the same as that being used within its mobile applications and on desktop. However, this requires running a series of Terminal commands.

Telegram founder Pavel Durov has previously taken aim at other messaging applications, questioning the integrity of their E2EE. In his personal Telegram channel, hes claimed: An alarming number of important people Ive spoken to remarked that their private Signal messages had been exploited against them in US courts or media. But whenever somebody raises doubt about their encryption, Signals typical response is we are open source so anyone can verify that everything is all right. That, however, is a trick.

He then elaborates on the inability for users to verify that Signals Github code is the same as that running in the app. It should be noted that despite its claims to offer superior encryption, Telegram has also fielded accusations of weaknesses in its own E2EE implementation.

One of the challenges is that even when a service provider has implemented robust encryption, there is still the potential for messages to be deciphered. From weak key management to compromised devices due to malware, theres a multitude of ways in which content can be accessed by adversaries. And when a key is compromised, unless the provider generates new keys for every session, its possible to decrypt the entire messaging history.

Finally, even when E2EE is working optimally, its implementation places additional computational demands on networks, resulting in increased latency and reduced performance, especially on devices with limited processing power or on blockchains where resources are capped. For this reason, E2EE is by no means impregnable. Can FHE solve some of these challenges, or will it run into the same problems that have weakened existing encryption protocols?

One of the weak points with traditional E2EE is when it comes to decrypting the data: its here that theres potential for a third party to gain access to it. FHE, in comparison, allows computation to be performed directly on encrypted data without decryption, ensuring that data remains protected throughout the entire process. This is its greatest attribute and the one that differentiates it from other encryption technologies.

It may be hard to visualize the benefit FHE brings to bear in this respect when considering a messaging application, in which the data must be decrypted before it can be read by the recipient. But consider another instance in which FHE proves superior at safeguarding data within E2EE systems: email. Here, FHE makes it possible for an email provider or cloud service to return results from an encrypted database without actually seeing the data.

This capability can also be extended to numerous other use cases in which data can be analyzed without disclosing its contents: analysts can run algorithms on encrypted datasets, with the results only decryptable by the intended recipient. Or machine learning models can be trained using encrypted data. This allows organizations to leverage powerful AI tools without compromising the privacy of the underlying data.

Within a blockchain context, fully homomorphic encryption also has significant potential, particularly in the construction of end-to-end encrypted applications for messaging or transmitting financial data. Fhenix, for example, is powered by fhEVM, a variation of the Ethereum Virtual Machine, that supports confidential smart contracts. As a result, confidential data can be analyzed and transmitted without its contents being disclosed.

Given that data remains encrypted at all stages with FHE in transit, at rest, and during processing its easy to see why developers are so excited about its potential for strengthening E2EE systems.

FHE can reduce the attack surface and ensure that sensitive data is never exposed to unauthorized parties, even during processing. This eliminates the need to trust service providers since they only handle encrypted data and mitigates the risks associated with data breaches.

If FHE can achieve wider adoption, both in blockchain and traditional systems, end-to-end encryption may soon live up to its name, providing truly unbreakable data protection.

See original here:
How FHE Technology Is Making End-to-End Encryption a Reality - HackRead

Zoom Introduces Post-Quantum End-to-End Encryption for Workplace – HPCwire

SAN JOSE, Calif., May 21, 2024 Zoom Video Communications, Inc. today announced that post-quantum end-to-end encryption (E2EE) is now globally available for Zoom Workplace, specifically Zoom Meetings, with Zoom Phone and Zoom Rooms coming soon. The launch of the new security enhancement makes Zoom the first UCaaS company to offer a post-quantum E2EE solution for video conferencing.

As adversarial threats become more sophisticated, so does the need to safeguard user data. In certain circumstances, attackers may have the ability to capture encrypted network traffic now, with the intent to decrypt it later when quantum computers become more advanced a scenario often referred to as harvest now, decrypt later.

While powerful quantum computers with this capability are not yet generally available, Zoom has taken a proactive stance by upgrading the algorithms designed to be able to withstand these potential future threats.

Since we launched end-to-end encryption for Zoom Meetings in 2020 and Zoom Phone in 2022, we have seen customers increasingly use the feature, which demonstrates how important it is for us to offer our customers a secure platform that meets their unique needs, said Michael Adams, chief information security officer at Zoom. With the launch of post-quantum E2EE, we are doubling down on security and providing leading-edge features for users to help protect their data. At Zoom, we continuously adapt as the security threat landscape evolves, with the goal of keeping our users protected.

How Post-Quantum E2E Encryption Works

When users enable E2EE for their meetings, Zooms system is designed to provide only the participants with access to the encryption keys that are used to encrypt the meeting. This is the behavior for both post-quantum E2EE and standard E2EE.

Because Zooms servers do not have the necessary decryption key, encrypted data relayed through Zooms servers is indecipherable. In addition, to defend against harvest now, decrypt later attacks, Zooms post-quantum E2E encryption uses Kyber 768, an algorithm being standardized by the National Institute of Standards and Technology (NIST) as the Module Lattice-based Key Encapsulation Mechanism, or ML-KEM, in FIPS 203.

Read Zooms support article to understand which versions and platforms of Zoom Workplace support using post-quantum E2EE.

About Zoom

Zooms mission is to provide one platform that delivers limitless human connection. Zoom Workplace our AI-powered, open collaboration platform built for modern work streamlines communications, improves productivity, increases employee engagement, optimizes in-person time, and offers customer choice with third-party apps and integrations. Zoom Workplace, powered by Zoom AI Companion, includes collaboration solutions like meetings, team chat, phone, scheduler, whiteboard, spaces, Workvivo, and more. Together with Zoom Workplace, Zooms Business Services for sales, marketing, and customer care teams, including Zoom Contact Center, strengthen customer relationships throughout the customer lifecycle. Founded in 2011, Zoom is publicly traded (NASDAQ:ZM) and headquartered in San Jose, California.

Source: Zoom

The rest is here:
Zoom Introduces Post-Quantum End-to-End Encryption for Workplace - HPCwire

Zoom Announces Advanced Encryption for Increased Meeting Security – HackRead

Zoom Meetings now offer post-quantum end-to-end encryption, safeguarding your confidential conversations even from the potential threat of quantum computers. This technology ensures your data stays encrypted and inaccessible, keeping your meetings private and secure.

Zoom Video Communications has announced a significant upgrade to its security features, rolling out post-quantum end-to-end encryption (E2EE) for Zoom Meetings globally. This new layer of protection is designed to safeguard user data even from the potential threat of powerful quantum computers.

As adversarial threats become more sophisticated, so does the need to safeguard user data, Zoom said in a statement. With the launch of post-quantum E2EE, we are doubling down on security and providing leading-edge features for users to help protect their data.

Traditional encryption methods rely on complex mathematical problems that are difficult to solve with todays computers. However, the development of quantum computers poses a potential challenge as they may be able to crack these codes much faster. Post-quantum cryptography utilizes algorithms specifically designed to remain secure even in the age of quantum computing.

Zooms post-quantum E2EE leverages the Kyber 768 algorithm, chosen by the National Institute of Standards and Technology (NIST) for its quantum-resistant properties. This ensures that the encryption keys used to scramble meeting content are resistant to decryption attempts, both now and in the foreseeable future.

When E2EE is enabled for a Zoom meeting, the meeting content, including audio, video, and screen sharing, is encrypted using the Kyber 768 algorithm. The encryption keys are generated and distributed solely amongst the meeting participants devices. This means that Zooms servers, or any third party for that matter, cannot access the decrypted content of the meeting.

Post-quantum E2EE offers enhanced security for highly confidential meetings. However, there are a few things to keep in mind:

Nevertheless, Zooms implementation of post-quantum E2EE represents a significant step forward in securing online communication. By adopting quantum-resistant cryptography, Zoom is ensuring its users have access to a future-proof level of data protection.

Read more:
Zoom Announces Advanced Encryption for Increased Meeting Security - HackRead

How to open Encryption Block chests in Wuthering Waves – Destructoid

Wuthering Waves treasure chests feature all kinds of puzzles for unlocking them, from peculiar training dummy pillars to moving around mysterious repeaters to activate light block mechanisms. The Encryption Block puzzle is an example, requiring you to unlock a specific ability.

Solving the Encryption Block puzzle requires using the Levitator ability to move the Key Repeater pillars onto the blocks surrounding the treasure chest. Doing this causes the blocks to light up, and your objective is to get every block to emit light. Once each Encryption Block emits light, the chest will unlock, allowing you to claim its rewards.

Youll know youre looking at an Encryption Block puzzle when you see spiked pillars and chiseled stone panels on the ground surrounding a locked chest. Unlike other puzzles, you can levitate the pillars and move them onto the blocks, allowing you to see which panels will emit light when you place the pillar.

Once you place each pillar on the Encryption Blocks, youll unlock the chest and claim its reward. Typically, locked treasure chest rewards include Astrite, EXP potions, or character ascension materials.

If you encounter one of these puzzles before unlocking levitation, youll first have to progress far enough into the main story to visit the Jinzhou city hall. Here, youll meet with Sanhua and learn more about your current situation before venturing off to the next area. Before leaving, though, Sanhua will provide you with multiple character abilities, including levitation.

Go here to see the original:
How to open Encryption Block chests in Wuthering Waves - Destructoid

Bluesky finally has DMs, with encrypted messaging coming ‘down the line’ – Engadget

Bluesky, the open source social media service that began as an internal Twitter project, has gained a key feature as it looks to compete with X and Threads. The service has finally added direct messaging capabilities more than a year after it started onboarding new users.

Direct messages are now available on both Blueskys app and website, the company announced in a blog post. The default setting allows users to receive messages from people they follow, though settings can be adjusted to receive messages from everyone or no one. For now, it sounds like DMs on Bluesky are fairly basic and only support person-to-person text chats, but the company says it plans to add support for media and group messaging, as well as end-to-end encryption down the line.

Until then, the company notes that it will be able to access users messages in some situations when its absolutely necessary, such as an investigation into spam or harassment. In rare cases, the Bluesky moderation team may need to open your DMs to investigate broader patterns of abuse, such as spam or coordinated harassment, Bluesky says in a blog post. This would only be done when absolutely necessary to keep Bluesky safe. Access is extremely limited and tracked internally.

So, like most other social platforms, Bluesky DMs are probably not an ideal space for sharing sensitive information. But the addition of messaging will likely be welcome news from users hoping to make more connections on the service and have conversations out of public view.

Read the rest here:
Bluesky finally has DMs, with encrypted messaging coming 'down the line' - Engadget

Zoom Rolls Out Post-Quantum End-to-End Encryption – WebProNews

Zoom has rolled out a major upgrade, improving end-to-end encryption (E2EE) to protect users in a post-quantum computing world.

Quantum computing is a revolutionary leap in computing power, with ramifications across industries. One of the biggest concerns is that quantum computing will make much of the existing security and encryption protocols obsolete, making it possible to crack modern encryption in a fraction of the time as traditional computers.

Zoom is already taking steps to prepare for that future, rolling out post-quantum E2EE. The company announced the news in a post on its site.

Since we launched end-to-end encryption for Zoom Meetings in 2020 and Zoom Phone in 2022, we have seen customers increasingly use the feature, which demonstrates how important it is for us to offer our customers a secure platform that meets their unique needs, said Michael Adams, chief information security officer at Zoom. With the launch of post-quantum E2EE, we are doubling down on security and providing leading-edge features for users to help protect their data. At Zoom, we continuously adapt as the security threat landscape evolves, with the goal of keeping our users protected.

As Zoom points out, while quantum computing is not a threat yet, there is concern regarding the harvest now, decrypt later approach, in which traditional E2EE communications are collected and saved until quantum computing allows for their decryption.

The company outlines how its post-quantum E2EE works:

When users enable E2EE for their meetings, Zooms system is designed to provide only the participants with access to the encryption keys that are used to encrypt the meeting; this is the behavior for both post-quantum E2EE and standard E2EE. Because Zooms servers do not have the necessary decryption key, encrypted data relayed through Zooms servers is indecipherable. In addition, to defend against harvest now, decrypt later attacks, Zooms post-quantum E2E encryption uses Kyber 768, an algorithm being standardized by the National Institute of Standards and Technology (NIST) as the Module Lattice-based Key Encapsulation Mechanism, or ML-KEM, in FIPS 203.

The feature must be enabled in the Zoom web portal, and requires users to join via the desktop app, mobile app, or Zoom Rooms.

More here:
Zoom Rolls Out Post-Quantum End-to-End Encryption - WebProNews

Cloud Encryption Market is Rising in Upcoming Years | 2024-2031 – openPR

, - The global Cloud Encryption Market is expected to record a CAGR of XX.X% from 2024 to 2031 In 2024, the market size is projected to reach a valuation of USD XX.X Billion. By 2031 the valuation is anticipated to reach USD XX.X Billion.

The cloud encryption market refers to the segment of the cybersecurity industry that focuses on the encryption of data stored and processed in cloud environments. Encryption is a critical security measure that transforms readable data into an encoded format, which can only be decrypted by authorized users with the correct key. The market encompasses various encryption solutions, including software, hardware, and cloud service provider-based offerings, designed to protect sensitive information from unauthorized access and cyber threats. Market size refers to the total revenue generated by these encryption solutions, typically measured in terms of millions or billions of dollars annually. The forecast aspect of the market involves predicting future growth trends, considering factors such as technological advancements, regulatory changes, and evolving cybersecurity threats. This predictive analysis helps stakeholders, including businesses, investors, and policymakers, to make informed decisions regarding investments and strategic planning in the cloud encryption sector.

: ( , & , ) @ https://www.verifiedmarketreports.com/download-sample/?rid=33568&utm_source=Openpr&utm_medium=025

What Are The Overview And Market Opportunity For Cloud Encryption Market Size and Forecast?

The cloud encryption market is experiencing rapid growth due to the increasing adoption of cloud services across various industries, including finance, healthcare, retail, and government. The shift towards digital transformation and the need for secure data storage and transmission drive the demand for robust encryption solutions. Cloud encryption ensures that sensitive data remains protected from breaches, even if the cloud infrastructure is compromised. Key market opportunities lie in the integration of advanced technologies such as artificial intelligence and machine learning, which enhance encryption methods and automate threat detection. Additionally, the rise of remote work and the proliferation of Internet of Things (IoT) devices generate vast amounts of data, further amplifying the need for effective encryption solutions. Market players can capitalize on these opportunities by developing innovative products and expanding their service offerings to meet the evolving security requirements of cloud users. Strategic partnerships and acquisitions also present growth avenues by enabling companies to broaden their technological capabilities and customer base.

What Are The Growth Driver And Restraints For Cloud Encryption Market Size and Forecast? The growth of the cloud encryption market is primarily driven by the increasing incidence of data breaches and cyber-attacks, which heighten the awareness and necessity of robust data security measures. Regulatory requirements, such as GDPR and CCPA, mandate stringent data protection practices, thereby propelling the demand for encryption solutions. Additionally, the growing reliance on cloud-based applications and services, coupled with the advancement of encryption technologies, fuels market expansion. However, certain restraints may hinder this growth, including the high cost of encryption solutions and the complexity involved in implementing and managing these technologies. Small and medium-sized enterprises (SMEs) may find it challenging to adopt comprehensive encryption solutions due to budget constraints and a lack of technical expertise. Furthermore, concerns regarding performance issues, such as latency and processing overheads associated with encryption, can affect the user experience and slow down adoption rates. Despite these challenges, continuous innovation and the increasing adoption of cloud services are expected to sustain the growth trajectory of the cloud encryption market.

@ https://www.verifiedmarketreports.com/ask-for-discount/?rid=33568&utm_source=Openpr&utm_medium=025

Cloud Encryption Market Segmentaion Analysis, By Type

Infrastructure-as-a-Service (IaaS) Software-as-a-Service (SaaS) Platform-as-a-Service (PaaS)

Cloud Encryption Market Segmentaion Analysis, By Application

Banking Financial Services and Insurance (BFSI) Healthcare Telecom and IT Government and Public Utilities Aerospace and Defense Retail Others

in Cloud Encryption Market are:

Ciphercloud, Gemalto, Hytrust, IBM, Netskope, Secomba, Skyhigh Networks, Sophos, Symantec, Thales E-Security, Trend Micro, Vaultive, TWD Industries AG, Parablu

Global Cloud Encryption Market

:

North America is a significant player in the global Cloud Encryption , with the United States and Canada being major contributors. The region benefits from a robust economy, technological advancements, and a strong consumer base with high purchasing power.

:

Europe is another major region in the global Cloud Encryption , comprising countries such as the United Kingdom, Germany, France, and Italy. The region is characterized by a mature market with well-established infrastructure and consumer preferences.

-:

Asia-Pacific is a rapidly growing region in the global Cloud Encryption , driven by countries such as China, Japan, India, and South Korea. The region benefits from a large population, rising disposable income, and increasing urbanization, leading to greater demand for Cloud Encryption products and services.

:

Latin America presents opportunities and challenges for the Cloud Encryption , with countries like Brazil, Mexico, and Argentina being key players. Economic fluctuations and political instability in some countries can impact market dynamics and consumer behavior.

:

The Middle East and Africa represent emerging markets in the global Cloud Encryption , with countries like UAE, Saudi Arabia, South Africa, and Nigeria showing promising growth potential. Economic diversification efforts, urbanization, and a young population are driving demand for Okra Seeds products and services in the region.

()

1. What are the present scale and future growth prospects of the Cloud Encryption Market?

Answer: The Cloud Encryption Market is anticipated to witness a compound annual growth rate (CAGR) of XX% from 2024 to 2031, transitioning from a valuation of USD XX Billion in 2023 to USD XX billion by 2031.

2. What is the current state of the Cloud Encryption Market?

Answer: As of the latest data, the Cloud Encryption Market is experiencing growth, stability, and challenges.

3. Who are the key players in the Cloud Encryption Market?

Answer: Prominent players in the Cloud Encryption Market include key companies, known for their notable characteristics or strengths.

4. What factors are driving the growth of the Cloud Encryption Market?

Answer: The growth of the Cloud Encryption Market can be attributed to factors such as key drivers technological advancements, increasing demand, and regulatory support.

5. Are there any challenges affecting the Cloud Encryption Market?

Answer: The Cloud Encryption 's challenges include competition, regulatory hurdles, and economic factors.

6. How is the competitive landscape in the Cloud Encryption Market?

Answer: The competitive landscape is characterized by the competitive dynamics - key players, market share, and strategies.

7. What are the key trends shaping the Cloud Encryption Market?

Answer: Current trends in the Cloud Encryption Market include significant technological innovations and changing consumer preferences.

, @ https://www.verifiedmarketreports.com/product/global-cloud-encryption-market-size-and-forecast-to-2025/

More Links:

Medical Tourism Market Research Report 2024 https://www.linkedin.com/pulse/medical-tourism-market-research-report-2024-data-driven-growth-unolf/ Menomune A C Y W 135 Market Research Report 2024 https://www.linkedin.com/pulse/menomune-c-y-w-135-market-research-report-2024-data-driven-growth-ksvvf/ Anaesthetic Drugs and Pain Drugs Market Research Report 2024 https://www.linkedin.com/pulse/anaesthetic-drugs-pain-market-research-report-2024-bthzf/ Airport Lounge Service Market Research Report 2024 https://www.linkedin.com/pulse/airport-lounge-service-market-research-report-2024-ltjgf/ Histone Deacetylase Inhibitors Market Research Report 2024 https://www.linkedin.com/pulse/histone-deacetylase-inhibitors-market-research-report-o0waf/ Airport Flight Information Display System Market Research Report 2024 https://www.linkedin.com/pulse/airport-flight-information-display-system-market-research-nyrkf/ Airport Floodlights Market Research Report 2024 https://www.linkedin.com/pulse/airport-floodlights-market-research-report-2024-data-driven-growth-wbysf/ Airport Ground Lighting Cable Market Research Report 2024 https://www.linkedin.com/pulse/airport-ground-lighting-cable-market-research-report-hanaf/ Drugs for Warts Market Research Report 2024 https://www.linkedin.com/pulse/drugs-warts-market-research-report-2024-data-driven-growth-en4mf/ Airport Ground Support Cars Market Research Report 2024 https://www.linkedin.com/pulse/airport-ground-support-cars-market-research-report-a6fzf/ Direct Renin Inhibitors DRIs Market Research Report 2024 https://www.linkedin.com/pulse/direct-renin-inhibitors-dris-market-research-report-gnquf/ Airport Kiosk Market Research Report 2024 https://www.linkedin.com/pulse/airport-kiosk-market-research-report-2024-data-driven-growth-tjyqf/ Airport Lighting Control and Monitoring System Market Research Report 2024 https://www.linkedin.com/pulse/airport-lighting-control-monitoring-system-market-research-3lahf/ Oral Drug Delivery Market Research Report 2024 https://www.linkedin.com/pulse/oral-drug-delivery-market-research-report-2024-data-driven-growth-5lw0f/ Airport Friction Tester Market Research Report 2024 https://www.linkedin.com/pulse/airport-friction-tester-market-research-report-2024-euq9f/ Airport Fuel Hydrant Systems Market Research Report 2024 https://www.linkedin.com/pulse/airport-fuel-hydrant-systems-market-research-report-j8cxf/ Orthopedic Hyaluronic Acid Viscosupplementation Market Research Report 2024 https://www.linkedin.com/pulse/orthopedic-hyaluronic-acid-viscosupplementation-market-ylj1f/ Airport Ground Lighting Market Research Report 2024 https://www.linkedin.com/pulse/airport-ground-lighting-market-research-report-2024-gou2f/ Acute Myeloid Leukemia Drugs Market Research Report 2024 https://www.linkedin.com/pulse/acute-myeloid-leukemia-drugs-market-research-report-txtnf/ Airport GPU Market Research Report 2024 https://www.linkedin.com/pulse/airport-gpu-market-research-report-2024-data-driven-growth-fzrsf/ IVIg Powder Market Research Report 2024 https://www.linkedin.com/pulse/ivig-powder-market-research-report-2024-data-driven-growth-awn4f/ Airport Ground Distance Measuring Equipment Market Research Report 2024 https://www.linkedin.com/pulse/airport-ground-distance-measuring-equipment-market-bvwsf/ Airport Ground Handling Service Market Research Report 2024 https://www.linkedin.com/pulse/airport-ground-handling-service-market-research-report-5rfyf/ Airport Ground Power Unit Market Research Report 2024 https://www.linkedin.com/pulse/airport-ground-power-unit-market-research-report-2024-fmulf/ 10 Valent Pneumococcal Polysaccharide Vaccine Market Research Report 2024 https://www.linkedin.com/pulse/10-valent-pneumococcal-polysaccharide-vaccine-market-t3cjf/ Airport Handling System Market Research Report 2024 https://www.linkedin.com/pulse/airport-handling-system-market-research-report-2024-87e8f/ Airport Hub Network Communication Market Research Report 2024 https://www.linkedin.com/pulse/airport-hub-network-communication-market-research-report-ra7ff/ 7 Valent Pneumococcal Vaccine Market Research Report 2024 https://www.linkedin.com/pulse/7-valent-pneumococcal-vaccine-market-research-report-lbe3f/ Airport Information Display System Market Research Report 2024 https://www.linkedin.com/pulse/airport-information-display-system-market-research-8uppf/ Airport Integration Service Market Research Report 2024 https://www.linkedin.com/pulse/airport-integration-service-market-research-report-yb9xf/ Induced Myeloid Leukemia Cell Differentiation Protein Mcl 1 Market Research Report 2024 https://www.linkedin.com/pulse/induced-myeloid-leukemia-cell-differentiation-protein-mpqgf/ Pegvisomant Market Research Report 2024 https://www.linkedin.com/pulse/pegvisomant-market-research-report-2024-data-driven-growth-9vksf/ Airport Intelligent Robot Market Research Report 2024 https://www.linkedin.com/pulse/airport-intelligent-robot-market-research-report-2024-qycwf/ Airport LCD Monitor Market Research Report 2024 https://www.linkedin.com/pulse/airport-lcd-monitor-market-research-report-2024-data-driven-growth-dgtwf/ Animal Blood Plasma and Derivatives Market Research Report 2024 https://www.linkedin.com/pulse/animal-blood-plasma-derivatives-market-research-report-hme0f/ Meningitis Vaccine Market Research Report 2024 https://www.linkedin.com/pulse/meningitis-vaccine-market-research-report-2024-data-driven-growth-sorff/ Airport Logistics Baggage Handling System Market Research Report 2024 https://www.linkedin.com/pulse/airport-logistics-baggage-handling-system-market-research-y3xjf/ Airport Lounge Operation Services Market Research Report 2024 https://www.linkedin.com/pulse/airport-lounge-operation-services-market-research-report-ozvef/ Citrus Bioflavonoids Market Research Report 2024 https://www.linkedin.com/pulse/citrus-bioflavonoids-market-research-report-2024-data-driven-growth-geevf/ Airport Marking Machine Market Research Report 2024 https://www.linkedin.com/pulse/airport-marking-machine-market-research-report-2024-n2ogf/

Contact us:

Mr. Edwyne Fernandes

Verified Market Reports

US: +1 (650)-781-4080 UK: +44 (753)-715-0008 APAC: +61 (488)-85-9400 US Toll-Free: +1 (800)-782-1768

Email: sales@verifiedmarketreports.com

Website:- https://www.verifiedmarketreports.com

About Us: Verified Market Reports

Verified Market Reports is a leading Global Research and Consulting firm servicing over 5000+ global clients. We provide advanced analytical research solutions while offering information-enriched research studies.

We also offer insights into strategic and growth analyses and data necessary to achieve corporate goals and critical revenue decisions.

Our 250 Analysts and SMEs offer a high level of expertise in data collection and governance using industrial techniques to collect and analyze data on more than 25,000 high-impact and niche markets. Our analysts are trained to combine modern data collection techniques, superior research methodology, expertise, and years of collective experience to produce informative and accurate research.

This release was published on openPR.

See the original post here:
Cloud Encryption Market is Rising in Upcoming Years | 2024-2031 - openPR

Proton Mail provided user data that led to an arrest in Spain – TechSpot

Facepalm: Proton Mail is facing renewed accusations of handing user data over to law enforcement agencies. The Swiss company provides a secure email service with end-to-end encryption, ostensibly to protect its customers' identities from prying eyes. However, recent events suggest otherwise.

Proton Mail recently came under scrutiny for (indirectly) providing Spanish authorities with enough data to identify and arrest a member of the Catalan independence organization Democratic Tsunami. The company claimed it was compelled to cooperate with law enforcement due to Swiss laws. They asserted that the Spanish police's success in apprehending the individual was partly due to the person's lack of a proper Operational Security (OpSec) policy.

Update (May 14): Proton contacted us with some clarification about this story and the data they claim was shared and which wasn't. According to the company, they didn't share any data with a foreign government are bound by Swiss law to cooperate with them once a court order is issued. The below quote from Proton's PR department has been edited for brevity:

Proton responded to a request from the Swiss authorities. The way this (article) is written makes it seem like Proton cooperates or communicates directly with foreign law enforcement which we don't do. It would be illegal to do under Swiss law and the suggestion that we do could be concerning for many users.

Proton's robust encryption helps during these situations. This can be demonstrated by the fact that the Spanish authorities were unable to gather any information from Proton beyond the recovery email as even Proton cannot see files, email contents, or any other personal information related to users' accounts, this information cannot be shared with authorities on request.

The original story follows below:

Proton Mail's primary service is an end-to-end encrypted email platform established in 2013. The platform aims to ensure that email content remains unreadable to both third parties and the company itself. While Proton Mail asserts it cannot access message contents, some user-related data passing through its servers could potentially be used to identify individuals.

In a separate incident in 2021, Proton Mail was required to provide Swiss authorities with the IP address and device details of a French climate activist. This information was subsequently used by French authorities to apprehend the activist. Proton Mail clarified that while email content is encrypted, the company is obligated to comply with lawful access requests for any data passing through its servers in criminal prosecution cases.

In the recent case involving the Spanish police, Proton was seemingly compelled to provide the Apple recovery email address used by a client known as "Xuxo Rondinaire." The customer was suspected of collaborating with Catalonia's police force, the Mossos d'Esquadra, while covertly aiding the independence movement in the region.

Authorities requested additional data from Apple, enabling them to identify the individual behind the pseudonym. Proton CEO Andy Yen confirmed that the personal data used to apprehend the alleged "terrorist" was provided by Apple, not Proton. Yen emphasized that Proton cannot decrypt data, but Swiss courts can mandate the sharing of recovery email addresses in "terror cases."

In a written statement, Proton AG clarified that their email service stores "minimal user information" and does not guarantee complete anonymity. Customers seeking enhanced security should implement proper Operational Security (OpSec) measures, such as refraining from using their genuine Apple account as an optional recovery method. While a recovery address is not mandatory for using Proton Mail, the company could be compelled to disclose such information under a Swiss court order.

See more here:
Proton Mail provided user data that led to an arrest in Spain - TechSpot

A Cost-Effective Encryption Strategy Starts With Key Management – Dark Reading

Companies have a problem with encryption: While many businesses duly encrypt sensitive data, there is no standard strategy for deploying and managing a key-management infrastructure.

Every organization needs to make a large number of decisions in designing a key-management policy that works for their business, Karen Reinhardt, principal engineer for cryptographic services at Home Depot, told attendees at the RSA Conference in San Francisco last week.

"One size does not fit all," she said.

Some cloud-native startups can manage much, if not all, of their encryption keys in the cloud, while large enterprises with legacy technology likely need a locally hosted system and hybrid infrastructure. Some groups, such as developers, may be able to manage their own infrastructure, while general employees need their keys managed for them. Finally, every company needs to take into account the post-quantum future, Reinhardt said.

Encryption is a necessary technology for securing data and systems, but there is more to data security than just encrypting the data. Perhaps the most complex part of any encryption infrastructure is managing the keys needed to decrypt data. If the attacker has access to the keys, they have access to the encrypted data; defenders who lose access to the keys lose access to data.

Reinhardt outlined five points enterprise security teams should consider to "keep everybody from putting their proverbial key under their doormat, which is a problem I see all the time."

The first lesson for companies is that encryption keys are critical perhaps more critical than proper encryption. Data is unusable if you can't decrypt it, so knowing where the decryption keys are is often much more important than knowing the location of the encryption keys, said Reinhardt.

Organizations should always have a controlled archive of decryption keys, she said.

"The thing about identity is you can always replace it OK, you lost your driver's license. Let me get you a new one," Reinhardt said. "But if you have data that's encrypted with something, you can only decrypt it one way."

Security controls continue to be expensive to implement, and encryption is no exception. Companies need to measure the cost of creating and managing encryption infrastructure against the cost of a breach to find their "optimum security at minimum cost," Reinhardt said.

"Security does you no good if you bankrupt your company," she said. "Stronger controls almost always equal more money, so [while I'm] not actually against 'encrypt everything,' it's a lot of money, a lot of processing, a lot of extra memory so I'm more of a fan of focus on what really needs to be kept secret."

Companies moving more of their infrastructure to cloud services and platforms are already trying to control data sprawl;cloud-native key management adds key sprawl to the equation as well. Companies need to take stock of not only their critical data what needs to be encrypted but also how each cloud service manages its keys and other secrets and whether the company can centralize management to increase control.

"Where are the keys? Well, a lot of times, they're in a local key store sitting on a system. And in other cases, they can be in a remote store," Reinhardt said. "They could be anywhere these days on-prem, in the cloud, [hosted by] a vendor, or in your own managed cloud."

Smaller companies just starting out with key management can create greenfield key management and take advantage of the latest technologies to simplifying their infrastructure and strengthen control over their data. Yet large companies that already have a variety of key management technologies in place will have to support legacy applications and databases.

"If you're a fairly new company with a greenfield implementation, you might not have the same integration requirements of a company that's been around for 100 years," she said.

Cloud-based encryption infrastructure, such as hardware security modules secure storage for key data and operations can help make implementation simpler and make integration with legacy technology easier.

Finally, every company needs to consider the post-quantum future and make sure that their key infrastructure can generate quantum-safe keys. As quantum-computing technology advances, public-key encryption will need to evolve and use stronger keys generated by more modern algorithms.

"Post-quantum means every asymmetric key has to be replaced, so you need to know where they are," Reinhardt said. "And that is the big advantage of a key management system or any sort of centralized management system. It will make finding your keys, and rotating them, much easier."

Read the rest here:
A Cost-Effective Encryption Strategy Starts With Key Management - Dark Reading