Page 1,003«..1020..1,0021,0031,0041,005..1,0101,020..»

Tackling Cyber Threats with Advanced Encryption: The Role of … – Fagen wasanni

Unveiling the Power of Advanced Encryption: Tackling Cyber Threats through Global Network Encryption

In the digital age, the security of data has become a paramount concern for businesses, governments, and individuals alike. Cyber threats are evolving at an alarming rate, with hackers and cybercriminals constantly devising new ways to infiltrate networks and steal sensitive information. As such, the need for robust and advanced encryption methods to safeguard data has never been more critical. This is where the role of global network encryption comes into play, offering a powerful solution to tackle these cyber threats.

Global network encryption, also known as end-to-end encryption, is a method of securing data by encoding it in such a way that only authorized parties can access it. This advanced encryption technique ensures that data remains secure as it travels across networks, from its point of origin to its intended destination. It is a vital tool in the fight against cyber threats, providing a robust line of defense against unauthorized access and data breaches.

The power of advanced encryption lies in its ability to transform data into a format that is unreadable without the correct decryption key. This means that even if a cybercriminal were to intercept the data, they would be unable to decipher its contents without this key. This level of security is particularly crucial in an era where data breaches are becoming increasingly common and the consequences of such breaches can be devastating.

Moreover, global network encryption is not just about protecting data in transit. It also plays a crucial role in safeguarding data at rest. Whether stored on a server, in a cloud storage system, or on a personal device, encrypted data remains secure and inaccessible to unauthorized users. This comprehensive protection is essential in a world where data is often stored and accessed across multiple devices and locations.

The implementation of advanced encryption techniques is not without its challenges. It requires a deep understanding of encryption algorithms and key management, as well as the ability to navigate the complex regulatory landscape surrounding data protection. However, the benefits of global network encryption far outweigh these challenges. By ensuring the confidentiality, integrity, and availability of data, it provides a strong foundation for secure communication and data storage in the digital age.

In addition to its security benefits, global network encryption also offers significant business advantages. It can help organizations build trust with their customers by demonstrating a commitment to data security. It can also protect businesses from the financial and reputational damage associated with data breaches.

In conclusion, as cyber threats continue to evolve and grow in sophistication, the need for advanced encryption techniques to safeguard data becomes increasingly important. Global network encryption offers a powerful solution, providing robust protection for data in transit and at rest. By implementing this advanced encryption technique, businesses, governments, and individuals can significantly enhance their data security, protect their sensitive information, and mitigate the risk of cyber threats. As we continue to navigate the digital landscape, the role of global network encryption in tackling cyber threats will undoubtedly continue to grow in importance.

Read the original here:
Tackling Cyber Threats with Advanced Encryption: The Role of ... - Fagen wasanni

Read More..

Why Slack’s privacy settings are a part of the abortion conversation – Employee Benefit News

In the wake of the overturning of Roe v. Wade, many employees are seeking discreet access to reproductive care, often turning to employers for help. But if those conversations take place on workplace chat platforms, they could end up being used against employees in a court of law.

Earlier this year, as an increasing number of states cut access to reproductive care or even criminalized it, nonprofit advocacy group Fight for the Future published an open letter to Slack, calling on the workplace communication platform to implement end-to-end encryption. End-to-end encryption is a private communication system in which only users participating in the conversation can access its contents; the hope is that this would better protect abortion seekers who may be communicating with each other, colleagues or employers about company-provided resources and support.

The letter to Slack is part of the nonprofit's larger effort called Make DMs Safe, which is calling on Google, Apple, Twitter, Meta, Discord and Slack to make end-to-end encrypted messaging the tech industry the default.

Read more: The fight for abortion rights

"We've seen so many of these big tech companies make statements supporting abortion access while taking minor, symbolic action," says Leila Nashashibi, a campaigner at Fight for the Future. "But when it comes down to the actions that would really make a difference like protecting people's data and protecting people's privacy they are failing."

Currently, Slack which is used by more than 200,000 organizations, according to Statista only uses symmetric or single encryption, which uses a backend "public key" to encrypt and decrypt data across the organization. While it offers a basic level of security, it doesn't do much to protect the individual users within an employer's digital community.

End-to-end encryption, however, creates a single personalized key between both participants of a unique conversation, rendering the communication inaccessible to any other party, including the platform hosting the conversation, like Slack, a manager or employer, or even law enforcement.

"What's really important about end-to-end encryption is it brings us back to the protections of the warrant requirement, which limits indiscriminate searches and mass surveillance," says Jake Weiner, a lawyer at the Electronic Privacy Information Center (EPIC), which specializes in state and local policing as well as immigration surveillance. (EPIC has worked with Fight for the Future on past projects, but is not actively involved in its Make DMs Safe project.) "It basically keeps the police doing the things that they're supposed to be doing more than the subpoena process, which has no legal protections functionally."

When a police officer issues a warrant, they have to physically go to a judge and present probable cause as to why they think a crime has been committed, which includes putting forward substantial evidence upfront. Warrants also have to be particularized, according to Weiner, which means it has to be about a specific person or a specific investigation. Subpoenas, in comparison, can be issued for most types of data without the need for specification. In theory, law enforcement could subpoena Slack for all of their messages about abortion and it would be up to the platform to challenge it or not.

Read more: Republicans are testing abortion restrictions to see what sticks

All of Slack's available employer plans offer customizable retention settings, where customers can automatically delete messages and files after set periods of time as well as enterprise key management, a security add-on that allows organizations to manage their own encryption keys. In addition, Slack's policy is to not share customer data with any third-party or government entity unless legally required to do so including subpoenas. According to a spokesperson from Slack, the platform has committed to challenge any subpoena, unclear request or any ask deemed inappropriate.

But that kind of promise doesn't hold any legal weight, according to Sarah Geoghan, a lawyer with EPIC specialized in abortion surveillance, and still puts users in a vulnerable position.

"We cannot trust a large company's pinky-promise to protect abortion," she says. "For example, Google said that they would stop collecting location data, which could reveal whether someone was attending an abortion clinic, and that was not true. They're still collecting and retaining that information for longer than they had promised. So the reality is, abortion surveillance is happening and as of right now, companies have a lot of discretion on just how much they could comply with law enforcement requests for information."

Geoghan referenced the recent case of a 19-year-old Nebraska woman and her mother, who were accused of performing an illegal pregnancy termination after obtaining abortion pills when the daughter was 17. (Nebraska prohibits abortions after 20 weeks and the teenager was around 28 weeks pregnant when her pregnancy ended.) Authorities accessed Facebook messages between the mother and daughter through a subpoena to establish that the two discussed obtaining abortion pills. In July, the 19-year-old was sentenced to 90 days in jail and two years of probation.

"They looked through her Facebook messages, which are not end-to-end encrypted," Geoghan says. "Once they had those messages they were able to subpoena her full communications on Facebook Messenger and had access to all of it. If those messages had been end-to-end encrypted in the first place, they wouldn't have had a subpoena. And if those communications hadn't been subpoenaed, they wouldn't have been able to access what was encrypted."

Read more: 4 questions employers have about abortion care and coverage

End-to-end encryption would not make the information completely unattainable. If law enforcement were to present a suspect with a viable warrant, the employer would be forced to disclose the conversation regardless of whether it was single or end-to-end encrypted.

What can, however, prevent law enforcement from accessing messages is if they're deleted entirely, making Slack's auto-deletion settings effective in that way. Once a message is deleted from a server, it is impossible for any third party regardless of warrants or subpoenas to access that information because it is unrecoverable.

"I would never recommend anyone discuss abortion activity on a workplace app not even over text message," Geoghan says. "That being said, a person's privacy and autonomy should not depend on their employer and it shouldn't be up to the employer to decide what their policy is about abortion so that someone has protections. They should do the bare minimum to protect communications."

Read more: Hundreds of drugmakers condemn Texas judge's abortion pill order

If employers want to actively share resources on abortion or offer their support, Geoghan suggests they use apps like Signal, an end-to-end encrypted messaging service for instant messaging, voice and video calls.

And while end-to-end encryption may not be a foolproof privacy protection, Nashashibi argues that adding any additional obstacle to platforms like Slack is still critical, and can give employees the time and space to make whatever arrangements they need to access the care they are seeking.

"It extends far beyond abortion seekers and providers in terms of safety we have to think about people all over the world working under different political contexts and how the lack of encryption affects their safety," she says. "We know that there's a history of law enforcement, gathering and acquiring online communications from companies and as long as these companies own the communications, they're putting people at risk."

Continue reading here:
Why Slack's privacy settings are a part of the abortion conversation - Employee Benefit News

Read More..

Safeguarding Data Privacy: How France is Leading the Way in … – Fagen wasanni

Safeguarding Data Privacy: How France is Leading the Way in Optical Encryption Technology

In the digital age, data privacy has become a paramount concern for individuals, corporations, and governments alike. As cyber threats continue to evolve, so too must the methods used to safeguard sensitive information. France is leading the way in this regard, pioneering advancements in optical encryption technology that promise to revolutionize the way we protect our data.

Optical encryption, a cutting-edge technology, uses the properties of light to encode and decode data, providing an additional layer of security that is virtually impossible to breach. This technology is not only more secure but also faster and more efficient than traditional encryption methods. France, with its rich history of innovation and technological advancement, is at the forefront of this exciting development.

French researchers and tech companies have been making significant strides in the field of optical encryption. For instance, the French National Centre for Scientific Research (CNRS) has been conducting extensive research into quantum cryptography, a form of optical encryption that uses the principles of quantum mechanics to secure data. This technology is so secure that any attempt to intercept the data changes its state, alerting the intended recipient to the breach.

Moreover, French tech start-up, Cryptosense, has developed an innovative software that uses optical encryption to secure cloud-based data. This is particularly significant given the increasing reliance on cloud storage in both the corporate world and private sphere. The software not only encrypts data but also monitors for any potential breaches, providing an unparalleled level of security.

The French government has also recognized the importance of data privacy and the potential of optical encryption technology. It has implemented policies to support research and development in this field, and to encourage the adoption of these technologies by French businesses. This proactive approach has helped to establish France as a global leader in data privacy.

However, the development and implementation of optical encryption technology are not without challenges. One of the main hurdles is the need for specialized hardware to support the technology. This can be costly and may deter some businesses from adopting it. Additionally, as with any new technology, there is a learning curve involved in understanding and effectively utilizing optical encryption.

Despite these challenges, the potential benefits of optical encryption are immense. It offers a level of security that is currently unmatched by any other technology. Furthermore, as cyber threats become increasingly sophisticated, the need for such advanced security measures will only grow.

In conclusion, Frances commitment to safeguarding data privacy through the development and implementation of optical encryption technology is commendable. The countrys researchers, tech companies, and government are working in tandem to push the boundaries of what is possible in data security. While there are challenges to overcome, the potential benefits of this technology are undeniable. As we continue to navigate the digital age, it is clear that optical encryption will play a crucial role in protecting our data and, by extension, our privacy. France, with its innovative spirit and commitment to data privacy, is leading the way in this important field.

Read the rest here:
Safeguarding Data Privacy: How France is Leading the Way in ... - Fagen wasanni

Read More..

YouTubers Reveal Encryption Tactics of Just Stop Oil Protesters – EnergyPortal.eu

YouTube influencers Josh Pieters and Archie Manners, popularly known as Josh & Archie, have shed light on the secret communication methods used by the activist group, Just Stop Oil. The duo discovered that the protesters employ an encrypted messaging service, specifically the Signal app, to ensure the confidentiality of their activities and prevent police intervention.

In a recent interview on Good Morning Britain, Pieters and Manners disclosed that they had a mole within the ranks of Just Stop Oil for approximately a week. This insider informed them about the groups use of Signal app, highlighting its effectiveness in preserving the element of surprise and secrecy.

The YouTubers decided to prank Just Stop Oil as part of their series of stunts, setting off alarms and attaching them to balloons during a meeting in London held on July 23rd. Reflecting on the prank, Manners characterized it as essentially very childish.

The revelation of Just Stop Oils use of encrypted messaging services raises questions about the groups intentions and methods. While activism can take various forms, the reliance on such technologies suggests a concerted effort to remain covert and avoid potential legal consequences.

By highlighting this aspect of the protesters behavior, Pieters and Manners provide insight into the steps taken by activist groups to evade detection and maintain privacy. As the prevalence of encrypted messaging services continues to grow, it becomes increasingly crucial for authorities to adapt their strategies to effectively monitor and respond to unlawful activities conducted through these platforms.

While the pranks orchestrated by Josh & Archie may be considered light-hearted entertainment, their discovery lends a deeper understanding of the tactics employed by Just Stop Oil and sheds light on the pervasive influence of encrypted messaging services in contemporary activism.

See the original post here:
YouTubers Reveal Encryption Tactics of Just Stop Oil Protesters - EnergyPortal.eu

Read More..

Encrypted Hard Drive Market to Eyewitness Massive Growth | SanDisk, LaCie, Apricorn – openPR

Encrypted Hard Drive Market

Get Free Exclusive PDF Sample Copy of This Research @ https://www.advancemarketanalytics.com/sample-report/62913-global-encrypted-hard-drive-market#utm_source=OpenPRShraddha

Scope of the Report of Encrypted Hard Drive:Encrypted Hard Drive uses rapid encryption to enhance data security and management. It is a new class of hard drives that are self-encrypting at a hardware level and allow for full disk hardware encryption. Encrypted hard drive market is expected to grow in the future due to rising demand for strong security of data and lower cost of the drive.

Opportunities: Upsurging Demand for Integrated Data Protection Solutions from SME'sTechnology Advancement in Encrypted Hard Drive

Market Trends:Adoption of Encryption Software

Challenges:Lack of Awareness in Developing countries

Market Drivers: Expansion of Digital ContentRising Data Security Concerns among Enterprises

Have Any Questions Regarding Global Encrypted Hard Drive Market Report, Ask Our Experts@ https://www.advancemarketanalytics.com/enquiry-before-buy/62913-global-encrypted-hard-drive-market#utm_source=OpenPRShraddha

The titled segments and sub-section of the market are illuminated below:by Application (Government/Military, Finance, Enterprises, Individual), Capacity (500GB, 1T, 2T, 3T, 4T, 5T, Over 5T), Hard Drive Type (Internal, External)

Region Included are: North America, Europe, Asia Pacific, Oceania, South America, Middle East & Africa

Country Level Break-Up: United States, Canada, Mexico, Brazil, Argentina, Colombia, Chile, South Africa, Nigeria, Tunisia, Morocco, Germany, United Kingdom (UK), the Netherlands, Spain, Italy, Belgium, Austria, Turkey, Russia, France, Poland, Israel, United Arab Emirates, Qatar, Saudi Arabia, China, Japan, Taiwan, South Korea, Singapore, India, Australia and New Zealand etc.

Strategic Points Covered in Table of Content of Global Encrypted Hard Drive Market:Chapter 1: Introduction, market driving force product Objective of Study and Research Scope the Encrypted Hard Drive marketChapter 2: Exclusive Summary - the basic information of the Encrypted Hard Drive Market. Chapter 3: Displaying the Market Dynamics- Drivers, Trends and Challenges & Opportunities of the Encrypted Hard DriveChapter 4: Presenting the Encrypted Hard Drive Market Factor Analysis, Porters Five Forces, Supply/Value Chain, PESTEL analysis, Market Entropy, Patent/Trademark Analysis.Chapter 5: Displaying the by Type, End User and Region/Country 2015-2020Chapter 6: Evaluating the leading manufacturers of the Encrypted Hard Drive market which consists of its Competitive Landscape, Peer Group Analysis, BCG Matrix & Company ProfileChapter 7: To evaluate the market by segments, by countries and by Manufacturers/Company with revenue share and sales by key countries in these various regions (2023-2028)Chapter 8 & 9: Displaying the Appendix, Methodology and Data Source

finally, Encrypted Hard Drive Market is a valuable source of guidance for individuals and companies.

Read Detailed Index of full Research Study at @ https://www.advancemarketanalytics.com/reports/62913-global-encrypted-hard-drive-market#utm_source=OpenPRShraddha

Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, Middle East, Africa, Europe or LATAM, Southeast Asia.

Contact Us: Craig Francis (PR & Marketing Manager) AMA Research & Media LLPUnit No. 429, Parsonage Road Edison, NJ New Jersey USA - 08837 Phone: +1(201) 7937323, +1(201) 7937193sales@advancemarketanalytics.com

About Author: Advance Market Analytics is Global leaders of Market Research Industry provides the quantified B2B research to Fortune 500 companies on high growth emerging opportunities which will impact more than 80% of worldwide companies' revenues.Our Analyst is tracking high growth study with detailed statistical and in-depth analysis of market trends & dynamics that provide a complete overview of the industry. We follow an extensive research methodology coupled with critical insights related industry factors and market forces to generate the best value for our clients. We Provides reliable primary and secondary data sources, our analysts and consultants derive informative and usable data suited for our clients business needs. The research study enable clients to meet varied market objectives a from global footprint expansion to supply chain optimization and from competitor profiling to M&As.

This release was published on openPR.

Follow this link:
Encrypted Hard Drive Market to Eyewitness Massive Growth | SanDisk, LaCie, Apricorn - openPR

Read More..

NextGen TV’s DRM puts future of the over-the-air DVR in doubt – TechHive

Its been more than five years since I first asked whether ATSC 3.0, aka NextGen TV, would spell doom for over-the-air DVR. The answers are coming in now, and theyre not encouraging.

The latest television broadcasting standard, also called NextGen TV, is supposed to introduce new features such as 4K HDR video and dialog enhancement. But it also gives broadcasters the ultimate say over where and how you watch free local channels. With new encryption measures that many stations are now adopting, ATSC 3.0 can limit recording capabilities, block out-of-home viewing, and restrict the use of certain video player apps. Even basic playback requires seemingly endless certification hoops, potentially driving up the cost of ATSC 3.0 converter boxes.

Broadcasters say theyre trying to protect against media piracy, and that they might address some of these complaints in the future, but encryption still leaves them, rather than audiences, in control of whats possible. Over-the-air DVR has been one of the last great ways to watch TV on your own terms. NextGen TV could stop that from happening.

This story is part of TechHives in-depth coverage of the best over-the-air DVRs.

Although broadcasters downplayed ATSC 3.0s DRM (digital rights management) features in the standards early years, theyre starting to lock things down with encryption as more stations come online, and the issue has gained wider attention thanks to recent coverage by Tyler Antenna Man Kleinle and Lon Seidman.

Users can see which ATSC 3.0 stations are encrypted on the RabbitEars website, which has been tracking the NextGen TV rollout. Out of more than 400 NextGen TV channels in the United States, roughly 16 percent of them are now encrypted.

None of this should be noticeable if you have a smart TV with an ATSC 3.0 tuner, as it should already have the necessary keys to decrypt these locked-down channels. It also doesnt affect channels that use the current ATSC 1.0 standard, which broadcasters are required to support for at least another four years.

But if you were an early adopter of external ATSC 3.0 tuners such as the HDHomeRun Flex 4K or Bitrouter ZapperBox, you wont be able to watch any encrypted channels. These devices launched without DRM support before broadcasters started encrypting their channels, and while they plan to support DRM in the near future, the complications of doing so has led to numerous delays.

DRM isnt just a temporary inconvenience. It will also introduce new restrictions on your ability to access free, over-the-air channels through external tuners. Here are some examples that Ive confirmed with device makers:

DVR solutions such as Channels will need their own DRM certification, and its unclear if that will happen.

FancyBits

Pearl TV spokesman Dave Arland said future updates to ATSC 3.0s copy-protection system, called A3SA, could address these issues. (Pearl TV is the broadcaster consortium thats backing ATSC 3.0, and is a part-owner of A3SA.)

Remote viewing, for instance, is on the A3SA development roadmap, Arland said, and Pearl TV has proof-of-concept proposals that would allow external tuners to work without even occasional internet connectivity. While there are considerable technical challenges to letting users transfer recordings across devices, Arland said Pearl TV believes these are surmountable as well.

Arland did not deny that A3SA allows broadcasters to set expiration dates on recordings or block them outright, but said hes not aware of any broadcasters that are doing so. He also noted that A3SAs current rules prohibit restrictions on recordings for ATSC 1.0 channels that are simulcast in ATSC 3.0.

Content protection is designed to prevent piracy, not stop home recording, Arland said.

Well-intentioned or not, A3SA in its current form still serves to lock down over-the-air DVR and make it more like what you get with live TV streaming services. Instead of being free to watch local broadcasts on any device, using whichever app you prefer, youll be at the whims of the broadcasters and TV networks.

If youre not an over-the-air DVR user and only use an antenna for live TV, you might shrug off issues Ive raised above. But heres another reason to be concerned: DRM could make external tuner boxes more expensive.

Most existing TVs can only pick up broadcasts in the older ATSC 1.0 standard, and even some new TVs continue to ship without ATSC 3.0 tuners onboard. For viewers who dont want to replace their entire televisions, ATSC 3.0 will require an external converter box.

The HDHomeRun Flex 4K is one of only two ATSC 3.0 tuner boxes on the market right now.

SiliconDust

But one device maker, who asked not to be named in this story, said that ATSC 3.0 DRM has both up-front and ongoing costs, both for licensing and certification testing. For the small vendors that are currently building ATSC 3.0 tuner boxes, these costs can be significant, and like other licensing fees they inevitably get passed onto users. (Pearl TVs Dave Arland said A3SA provides significant per-model discounts to smaller manufacturers.)

DRM can also complicate the process of bringing new products to market in the first place. Nuvyyo, makers of the Tablo over-the-air DVR line, specifically pointed to DRM as the reason for delaying its first ATSC 3.0 tuner. The status of that product remains uncertain, as Nuvyyo has since been acquired by The E.W. Scripps Company, a major broadcaster.

So far, weve yet to see an external tuner ship for less than $200, and even ADTHs upcoming tuner box has a price of around $100. While DRM might not be solely to blame, it is a factor in limiting options and keeping prices high.

While the rise of on-demand streaming has made DVR less relevant, in a way its more important than ever. As streaming services raise prices for ad-free viewing and trim their catalogs, being able to record TV programming on a device of your choosing is one of the last ways for viewers to exercise some control.

ATSC 3.0 DRM threatens to take that away. Combined with the dismantling of CableCARD, it ensures that users will be funneled into apps in which the content providers call the shotseven for free, over-the-air TV.

What can you do about it? Lon Seidman has encouraged users to complain to the FCC, which is seeking public feedback about the future of over-the-air TV. Broadcasters want the ability to turn off ATSC 1.0 as soon as its feasible, but they need the FCCs permission to do it, and a loud and sustained consumer outcry could force some concessions on the encryption front.

Alternatively, you can just ride out ATSC 1.0 until the bitter end. As of now, thatll be at least until July 2027, as the FCC is requiring broadcasters to support the old standard until then. If you buy an over-the-air DVR todayeven one without ATSC 3.0 supportyoull get at least four years of life out of it, and in a sense youll be voting against the new standard.

Either way, enjoy the unfettered state of over-the-air DVR while it lasts, because its future looks very cloudy.

Sign up for Jareds Cord Cutter Weekly newsletter to get columns like this in your inbox every Friday.

Continued here:
NextGen TV's DRM puts future of the over-the-air DVR in doubt - TechHive

Read More..

A Global Race to Harness the Power of Atoms for Navigation … – Fagen wasanni

A global race is underway to harness the power of atoms for navigation, computing, and encryption. Governments are investing heavily, and scientists are making rapid advances in quantum technologies. However, concerns over protectionism and the need for cooperation are creating challenges.

Quantum sensors are being developed to create super-accurate navigation systems that can operate even when satellite GPS networks are jammed. These systems offer significant improvements over current technology, with minimal directional errors and robust portability. Start-up company Q-CTRL recently signed a deal with Australias Department of Defense to develop and field-test their quantum sensor technology.

The United States, in particular, is considering tougher export controls for quantum technologies to maintain an edge over China. However, allies argue that more limitations could stifle momentum and hinder the American model of tech development, which relies on openness and international collaboration.

The challenge for the United States and its allies is how to balance protectionism and cooperation in a field where talent is scarce and less concentrated in the U.S. Maintaining interdependence will be crucial for progress in quantum technologies.

China has taken a centralized approach to quantum technology development and has produced results that rival or exceed the American approach. Recent advances include the construction of a large national laboratory for quantum science and the establishment of a space-to-ground quantum communication network. Chinas investments in quantum technology were triggered, in part, by revelations of U.S. and British intelligence agencies cracking encrypted internet traffic.

While China appears to be lagging in quantum computers, progress in quantum sensing for navigation, mapping, and detection is narrowing the gap. However, some of Chinas quantum claims have been questioned by experts outside of the country.

Companies like Q-CTRL, with offices in Sydney, Los Angeles, Berlin, and Oxford, are among the leaders in global quantum technology. They see technology-sharing partnerships, like the AUKUS security agreement, as opportunities to capitalize on their capabilities.

The global race to harness the power of atoms for navigation, computing, and encryption is intensifying. Achieving a balance between protectionism and cooperation will be crucial to ensure progress in this transformative field.

Excerpt from:
A Global Race to Harness the Power of Atoms for Navigation ... - Fagen wasanni

Read More..

Enclave Markets, The CeFi, DeFi Focused Encrypted Exchange, Teams Up With Hidden Road Partners | Crowdfund – Crowdfund Insider

Enclave Markets, which claims to be the worlds first fully encrypted exchange (FEX) that combines the best parts of centralized and decentralized finance, announced that it has entered into a strategic partnership with Hidden Road Partners, the global credit network for institutions.

As a result of the partnership, Hidden Road counterparties will now be able to trade digital assets through Enclave Markets fully confidential and secure exchange.

Enclave Markets FEX provides an anonymous trading environment where counterparties can transact with minimal slippage, negligible market impact and decentralized custody, without a single controlling entity.

Enclaves encryption protects counterparties from front-running and information leakage.

This confidentiality greatly expands the number of viable counterparties, as no information regarding participants or their positions can escape the trading platform.

Furthermore, Hidden Road will act as a prime broker for its counterparties who elect to trade via Enclave Markets, greatly increasing capital efficiency and ensuring that client assets never leave their prime broker of choice from order creation through settlement.

This initiative from Enclave Markets further demonstrates the demand for secure, confidential trading platforms that improve capital efficiency and liquidity while empowering counterparties to custody and settle assets with their partner of choice.

David Wells, CEO of Enclave Markets, commented:

Typically, traders at competing firms avoid trading with one another to prevent potential front-running, exposure of trading strategies and general market impact. By integrating with Hidden Road, one of the worlds most esteemed liquidity and credit providers, its institutional clients using our FEX gain access to completely anonymous trading, which allows them to mitigate risk and get the most out of any investment opportunity. To increase the adoption of digital assets, it is important that institutions have access to trading venues that they can trust, and this endorsement from Hidden Road demonstrates that Enclave does just that. Were excited to work with Hidden Road to mature the trading landscape, something thats been part of Enclaves mission from the start.

Hidden Road facilitates trading bilaterally between market participants while giving counterparties full ownership over trading technology, liquidity and custody.

At launch, the strategic partnership will allow counterparties that use Hidden Road as their prime broker to conduct OTC trading via Enclave Markets crossing network, Enclave Cross, with additional trading capabilities at a later date.

All trading activity and settlements made by Hidden Road as a prime broker over Enclave Cross are executed via direct transactions, ensuring assets are held by one of Enclaves many trusted custodians.

Michael Higgins, Global Head of Business Development at Hidden Road, added:

Institutions expect robust, predictable trading experiences in any asset class, be it traditional or digital. Enclaves novel, albeit familiar, approach offers Hidden Road counterparties a secure, anonymous and streamlined option for trading digital assets. Adding Enclave to the roster of venues and partners available to Hidden Roads counterparties further enhances both firms offerings to the market.

See the original post here:
Enclave Markets, The CeFi, DeFi Focused Encrypted Exchange, Teams Up With Hidden Road Partners | Crowdfund - Crowdfund Insider

Read More..

Form a strategy to mitigate cybersecurity risks in AI – Grant Thornton

Conduct threat modeling exercises to help identify potential security threats to AI systems and assess their impact. Some common threats to model include data breaches, unauthorized access to systems and data, adversarial attacks and AI model bias. When you model threats and impacts, you can identify a structured approach with proactive measures to mitigate risks

Consider the following activities as part of your threat modeling:

1.Criticality

Document the business functions and objectives of each AI-driven solution, and how they relate to the criticality of your organizations operations. This helps you establish a baseline for criticality, making controls commensurate with the criticality of the AI application and determining the thoroughness of the threat model.

2.Connections

Identify the AI platforms, solutions, components, technologies and hardware, including the data inputs, processing algorithms, and output results. This will assist in identifying the logic, critical processing paths and core execution flow of the AI that will feed into the threat model and help edify the organization on the AI application.

3.Boundaries

Define system boundaries by creating a high-level architecture diagram, including components like data storage, processing, user access and communication channels. This will help you understand the AI applications data and activity footprint, threat actors and dependencies.

4.Data characteristics

Define the flows, classifications and sensitivity for the data that the AI technology will use and output. This will help determine the controls and restrictions that will apply to data flows, as you might need to pseudonymize, anonymize or prohibit certain types of data.

5.Threats

Identify potential threats for your business and technologies, like data breaches, adversarial attacks and model manipulation.

6.Impacts

Assess the potential impacts of identified threats, and assign a risk level based on vulnerability, exploitability and potential damage.

7.Mitigation

Develop and implement mitigation strategies and countermeasures to combat the identified threats, including technical measures like encryption, access controls or robustness testing, along with non-technical measures like employee training, policies or third-party audits.

8.Adaptation

Review and update the threat model on an ongoing basis as new threats emerge or as the system evolves.

Read more from the original source:
Form a strategy to mitigate cybersecurity risks in AI - Grant Thornton

Read More..

What is the Akira ransomware, and why has the government issued a warning against it? – The Hindu

The story so far: The Computer Emergency Response Team of India issued an alert for ransomware dubbed Akira. The ransomware, found to target both Windows and Linux devices, steals and encrypts data, forcing victims to pay double ransom for decryption and recovery. The group behind the ransomware has already targeted multiple victims, mainly those located in the U.S., and has an active Akira ransomware leak site with information, including their most recent data leaks.

The Akira ransomware is designed to encrypt data, create a ransomware note and delete Windows Shadow Volume copies on affected devices. The ransomware gets its name due to its ability to modify filenames of all encrypted files by appending them with the .akira extension. The ransomware is designed to close processes or shut down Windows services that may keep it from encrypting files on the affected system. It uses VPN services, especially when users have not enabled two-factor authentication, to trick users into downloading malicious files.

Once the ransomware infects a device and steals/encrypts sensitive data, the group behind the attack extorts the victims into paying a ransom, threatening to release the data on their dark web blog if their demands are not met.

As mentioned above, the ransomware deletes the Windows Shadow Volume copies on the affected device. These files are instrumental in ensuring that organisations can back up data used in their applications for day-to-day functioning. VSS services facilitate communication between different components without the need to take them offline, thereby ensuring data is backed up while it is also available for other functions. Once the ransomware deletes the VSS files it proceeds to encrypt files with the pre-defined the .akira extension.

The ransomware also terminates active Windows services using the Windows Restart Manager API, preventing any interference with the encryption process. It is designed to not encrypt Program Data, Recycle Bin, Boot, System Volume information, and other folders instrumental in system stability. It also avoids modifying Windows system files with extensions like .syn. .msl and .exe.

Once sensitive data is stolen and encrypted, the ransomware leaves behind a note named akira_readme.txt which includes information about the attack and the link to Akiras leak and negotiation site.

Each victim is given a unique negotiation password to be entered into the threat actors Tor site. Unlike other ransomware operations, this negotiation site just includes a chat system that the victim can use to communicate with the ransomware gang, a report from The Bleeping Computer shares.

(For top technology news of the day, subscribeto our tech newsletter Todays Cache)

Ransomware is typically spread through spear phishing emails that contain malicious attachments in the form of archived content (zip/rar) files. Other methods used to infect devices include drive-by-download, a cyber-attack that unintentionally downloads malicious code onto a device, and specially crafted web links in emails, clicking on which downloads malicious code. The ransomware reportedly also spreads through insecure Remote Desktop connections.

Maintain up-to-date offline backups

Ensure OS and networks are updated regularly, with virtual patching for legacy systems

Establish Domain-based Message Authentication, Reporting, and Conformance, Domain Keys Identified Mail (DKIM), and Sender policy for organizational email validation

Strong password policies

Strong Multi-Factor Authentication

Strict external device usage policy

Data-at-rest and data-in-transit encryption

Blocking attachment file types with .exe,.pif, .url, or other such extensions

Avoid clicking on suspicious links to avoid downloads of malicious code

Conduct regular security audits of systems, especially database servers

In use since March 2023, the ransomware has steadily built up a list of victims, targetting corporate networks in various domains including education, finance, real estate, manufacturing, and consulting. Once it breaches a corporate network, the ransomware spreads laterally to other devices after gaining Windows domain admin credentials. The threat actors also steal sensitive corporate data for leverage in their extortion attempts.

CERT-In has advised users to follow basic internet hygiene and protection protocols to ensure their security against ransomware. These include maintaining up to date offline backups of critical data, to prevent data loss in the event of an attack.

Additionally, users are advised to ensure all operating systems and networks are updated regularly, with virtual patching for legacy systems and networks. Companies must also establish Domain-based Message Authentication, Reporting, and Conformance, Domain Keys Identified Mail (DKIM), and Sender policy for organizational email validation, which prevents spam by detecting email spoofing. Strong password policies and multi-factor authentication (MFA) must be enforced. There should also be a strict external device usage policy in place and data-at-rest and data-in-transit encryption along with blocking attachment file types like .exe, .pif, or .url to avoid downloading malicious code. The agency has also advised periodic security audits of critical networks/systems, especially database servers.

View original post here:
What is the Akira ransomware, and why has the government issued a warning against it? - The Hindu

Read More..