Page 1,055«..1020..1,0541,0551,0561,057..1,0601,070..»

Why India needs a skills-based approach to build workspaces of the future – India Today

By India Today Education Desk: In today's rapidly evolving global landscape, the digital economy is reshaping how businesses operate and the skills required to succeed. As one of the world's fastest-growing economies, India is witnessing massive changes in how businesses work.

As we step into the super intelligence era and to keep pace with the rapid changes in demands of the future, it is crucial for India to adopt a skills-based approach to building its workplaces and equipping its workforce with the necessary competencies.

Read More

With a growing young population, India's demand for quality education and training is also expanding at a significant rate. The country has more young adults aged 18-22 than anywhere in the world, which is projected to peak at 126 million in 2026.

As the economy grows at nearly 7 percent, the need to skill and upskill India's workforce of the future has never been more pressing than it is now.

To better understand the importance of why India needs a skill-based approach to build workspaces of the future, Sunil Dahiya, Executive Vice President, Wadhwani Foundation.

One of the main reasons India needs a skills-based approach is the rapid pace of technological advancement. Industry 4.0, characterised by integrating cyber-physical systems, AI, the Internet of Things (IoT), and data analytics, is transforming industries across the globe.

To leverage these emerging technologies, businesses require a workforce proficient in data analysis, artificial intelligence, machine learning, and cybersecurity. Interestingly, the industry has also started giving more weight to skills over qualifications.

One important transformation in India is how digital connectivity is growing, particularly in rural areas. By 2025, India is projected to have 850 million online users. Half of these users, or 425 million people, will be in rural areas.

As a result of this rising digital connectivity, the number of students enrolled in online programs was 2.2 million in 2022, up from 1.6 million in 2016.

The digital revolution has ushered in an era of automation, artificial intelligence, and advanced technologies. Traditional job roles are being disrupted, and new opportunities are emerging.

India must embrace a skills-based approach that equips individuals with relevant and adaptable capabilities to thrive in this environment. This shift departs from the traditional emphasis on degrees and qualifications toward a greater focus on skills acquisition and development.

Moreover, a skills-based approach promotes inclusivity and empowers individuals from diverse backgrounds.

It provides an opportunity to bridge the existing skill gaps and create social and economic mobility pathways by focusing on skills rather than traditional credentials.

In the age of the digital economy, several key skills are essential for success. First and foremost is digital literacy. Individuals must possess basic computer literacy and be comfortable using digital tools and platforms.

This includes proficiency in using productivity software, navigating the internet, and leveraging online communication tools. Digital literacy is the foundation upon which more advanced skills can be built.

Additionally, adaptability and agility are vital skills in a rapidly changing environment. Learning new technologies and adapting to evolving job roles is crucial. Individuals must be open to continuous learning and upskilling to stay relevant in their careers.

Communication and collaboration skills are also important. Effective communication and collaboration across virtual teams are essential, with remote work becoming more prevalent.

Individuals who can communicate clearly, collaborate with colleagues from diverse backgrounds, and leverage digital collaboration tools will be highly valued.

Lastly, a strong understanding of cyber security is becoming increasingly critical. As businesses digitise their operations, protecting sensitive data and maintaining online security are top priorities.

Continue reading here:

Why India needs a skills-based approach to build workspaces of the future - India Today

Read More..

What to read: Beguiling stories and a memoir of cultural complexity – Sydney Morning Herald

Birth CanalDias Novita Wuri, Scribe, $24.99

Indonesian author Dias Novita Wuri is a rising literary star. Her novella Birth Canal writhes with talent compressed into a forceful and beguiling suite of interconnected stories. Id read anything by a writer who can describe the sky above Jakarta like this: [It] had a rosy nuance that somehow seemed both warm and sad, like a freshly slapped cheek. Wuris gift for metaphor is matched by a supple and sidewinding narrative construction that follows women across time and place. An unnamed narrator tells of his unrequited love for Nastiti, who suddenly disappears in present-day Indonesia. An Indo-Dutch girl is forced to become a comfort woman for the Japanese. Another strand emerges that takes us from US-occupied Japan post-WWII to a young Indonesian woman who becomes obsessed by a porn actor while living in contemporary Osaka.

The Ghost ShipKate Mosse, Mantle, $34.99

The history of piracy is epic and cruel and full of legends. Bestselling author Kate Mosse, co-founder of Britains Womens Prize for Fiction, sets her sails into it with a buccaneering novel of love and revenge. The Ghost Ship is the third book in The Joubert Family Chronicles series, and though it can be read as a standalone, its better not to miss the full backstory. In the opening decades of the 17th century, Louise Reydon-Joubert has escaped the gallows with her lover Gilles. Fleeing a fatal injustice, the pair head into the world of Barbary corsairs and their enemies. It is not for the faint of heart: slavers and privateers infest the waters off northern Africa, but not all beyond the reach of laws and convention are black-hearted, and among one crew, the bravest of men turn out to be women in disguise. The Ghost Ship rewrites nautical adventure fiction with a strong female protagonist and contains a spicy mix of intrigue, romance and daring on the high seas.

A Better PlaceStephen Daisley, Text, $32.99

New Zealander Stephen Daisley won the 2011 Prime Ministers Literary Award for Traitor, an elegiac novel about an Anzac soldier and a Turkish doctor wounded at Gallipoli. In A Better Place, another war looms large. Twin brothers Roy and Tony Mitchell fought in World War II. Only Roy returned. Tony was killed in action on Crete, his death recounted in visceral detail, and Roy came back to New Zealand forever changed. He built a lone hut near a creek, the broad verandah for his dogs an after-echo of a private pilgrimage undertaken years before in the North African desert. Daisley writes fiction with the economy and clarity of a poet and with deep empathy for the impact of violence. A Better Place contrasts brisk and often confronting accounts of military action and experience during wartime with elegy for a personal aftermath ghosted by trauma and loss.

The Art of Breaking IceRachael Mead, Affirm, $34.99

Snuck on to an Antarctic expedition led by her husband Phillip in 1961, Nel Law became the first Australian woman to set foot on Antarctica. Women were not allowed to do this at the time, and this historical novel imagines Nels pioneering journey, sharply capturing the misogyny of the male-dominated enterprise, as well as the scope of Nels achievement. Nel wasnt content with being relegated to or defined as an explorers wife.

She was an artist and the trip to Antarctica liberated her to paint more than 100 oils and watercolours of the icebound continent.

The plot has some pacing issues, but its great to read fiction based on polar expeditions (another male-dominated field) told from a different vantage. Its clear, too, from her vivid descriptions of its inhospitable beauty that Rachael Mead has made her own voyage to Antarctica.

NON-FICTION PICK OF THE WEEKBorder CrossingsMohammad Chowdhury, NewSouth, $34.99

Mohammad Chowdhury is being grilled at a border crossing between Jordan and the West Bank. Since the September 11 terrorist attacks, he has become all too familiar with this kind of prolonged interrogation. His subtle account of the 10 hours spent in this Israeli immigration hall is as tense as any thriller, encapsulating the many ironies of his status as both global citizen and perennial outsider.

Born in Britain to Bangladeshi parents and educated at Oxford, Chowdhury grew up caught between cultures.

For all the trials of being treated as a foreigner in his own country, it is apparent from this searching memoir covering decades of living and working in 85 countries, that outsiderdom has granted him enormous adaptability, tolerance and a deep understanding of cultural and religious complexity. A tale that is cosmopolitan yet down to earth, poignant yet comic, and above all, humane.

What An Owl KnowsJennifer Ackerman, Scribe, $35

If anyone knows anything about anything, says Winnie-the-Pooh, its Owl who knows something about something. Sadly, Owl cant tell us directly. But as scientists become more adept at interpreting owl behaviour, their unique evolutionary characteristics and habitats, the inner life of these haunting creatures is revealing itself.

As nocturnal predators, owls are known for their keen vision, but equally vital is their silent flight and acute hearing. Owls flat faces operate as feathered satellite dishs, enabling them to hunt hidden prey by homing in on their aural traces.

Scientists are also learning more about owl psychology, their subtle emotions, sensitivity, and stoicism. This enchanting exploration of the only bird with front facing eyes like our own is as much about ancient human fears, fascinations and desire to know, as it is about the birds themselves.

Rental Person Who Does NothingShoji Morimoto, Picador, $29.99

There is something very culturally specific about the concept behind this book. A Japanese man decides to rent himself out to people who want a neutral presence to accompany them somewhere, watch them do something or just listen to them. He refuses, however, to do anything that violates his do-nothing ethos. As Shoji Morimoto conceives it, this is his dream job because it involves no stress or obligation.

Its not until more than halfway through the book that we learn he does not take payment, as this would create expectation and therefore stress.

This is when Rental Person emerges as a quietly intriguing, egoless disruptor of the capitalist contract although he would probably contest this description. Much could be written about why he is in demand, but Morimoto is not interested in such reflection. He is not-doing what he pleases and he wishes everyone else could, too.

Living With AICampbell Wilson, Monash University Publishing, $19.95

If you are looking for a way to get your brain around the vast and bewildering field of artificial intelligence, this punchy essay is a good place to start. The engine of AI is the supercharged neural networks that enable deep learning: the solving of problems through computer analysis of vast amounts of data. While Campbell Wilson is upfront about the destructive potential of AI the most apocalyptic scenario being an artificial super intelligence that renders humans superfluous he puts the scaremongering in perspective. For the most part, these tools will be beneficial, he says, adding the proviso that this assumes developers, the public and governments are vigilant in monitoring how risks can be mitigated. But even the most constructive uses of AI, such as identifying illegal online imagery, exposing deep fakes, chatbots and so on, will invariably raise complex ethical dilemmas.

The Booklist is a weekly newsletter for book lovers from books editor Jason Steger. .

See the article here:

What to read: Beguiling stories and a memoir of cultural complexity - Sydney Morning Herald

Read More..

The Future of Mobile Applications: Trends to Watch in 2022 – Fagen wasanni

Emerging Trends in Mobile Applications: What to Expect in 2022

As we step into 2022, the future of mobile applications is set to be shaped by a host of emerging trends. The mobile app industry, which has been on a steady growth trajectory for the past decade, is poised to continue its upward trend, driven by advancements in technology and changing consumer behaviors.

One of the most significant trends to watch in 2022 is the rise of augmented reality (AR) and virtual reality (VR) in mobile applications. These technologies, which were once considered the stuff of science fiction, are now becoming mainstream, thanks to the proliferation of powerful smartphones capable of supporting AR and VR experiences. From gaming and entertainment to shopping and education, AR and VR are set to revolutionize the way we interact with mobile applications, offering immersive experiences that blur the line between the digital and physical worlds.

Another trend that is expected to shape the future of mobile applications is the growing importance of artificial intelligence (AI) and machine learning (ML). These technologies are increasingly being integrated into mobile apps, enabling them to deliver personalized experiences based on user behavior and preferences. For instance, AI-powered recommendation engines can suggest products or content that users might like, while ML algorithms can learn from user interactions to improve app performance and usability over time.

The rise of 5G is another trend that cannot be ignored. With its promise of ultra-fast speeds and low latency, 5G is set to unlock new possibilities for mobile applications. For instance, it could enable real-time multiplayer gaming on mobile devices, or allow for the streaming of high-quality video content without buffering. Moreover, 5G could also pave the way for the development of new types of apps that leverage its unique capabilities, such as those involving real-time data analysis or remote control of devices.

In addition to these technological trends, changes in consumer behavior are also set to influence the future of mobile applications. One such change is the growing demand for privacy and security. As consumers become more aware of the risks associated with data breaches and privacy violations, they are demanding that mobile apps take stronger measures to protect their personal information. This is leading to the development of new security features and protocols, as well as a greater emphasis on transparency and user control over data.

Finally, the trend towards app consolidation is expected to continue in 2022. Instead of having multiple apps for different tasks, consumers are increasingly favoring super apps that offer a range of services within a single platform. This trend is particularly prevalent in Asia, where apps like WeChat and Grab have become one-stop solutions for everything from messaging and social media to shopping and payments.

In conclusion, the future of mobile applications in 2022 is set to be shaped by a combination of technological advancements and changing consumer behaviors. From AR and VR to AI and ML, from 5G to privacy concerns, and from app consolidation to the rise of super apps, these trends are set to redefine the mobile app landscape in the coming year. As such, businesses and developers need to stay abreast of these trends to ensure that their apps remain relevant and competitive in this rapidly evolving market.

See the rest here:

The Future of Mobile Applications: Trends to Watch in 2022 - Fagen wasanni

Read More..

Researchers Find ‘Backdoor’ in Encrypted Police and Military Radios – VICE

Hacking. Disinformation. Surveillance. CYBER is Motherboard's podcast and reporting on the dark underbelly of the internet.

A group of cybersecurity researchers has uncovered what they believe is an intentional backdoor in encrypted radios used by police, military, and critical infrastructure entities around the world. The backdoor may have existed for decades, potentially exposing a wealth of sensitive information transmitted across them, according to the researchers.

While the researchers frame their discovery as a backdoor, the organization responsible for maintaining the standard pushes back against that specific term, and says the standard was designed for export controls which determine the strength of encryption. The end result, however, are radios with traffic that can be decrypted using consumer hardware like an ordinary laptop in under a minute.

There's no other way in which this can function than that this is an intentional backdoor, Jos Wetzels, one of the researchers from cybersecurity firm Midnight Blue, told Motherboard in a phone call.

Do you know about other vulnerabilities in communications networks? We'd love to hear from you. Using a non-work phone or computer, you can contact Joseph Cox securely on Signal on +44 20 8133 5190, Wickr on josephcox, or emailjoseph.cox@vice.com.

The research is the first public and in-depth analysis of the TErrestrial Trunked RAdio (TETRA) standard in the more than 20 years the standard has existed. Not all users of TETRA-powered radios use the specific encryption algorithim called TEA1 which is impacted by the backdoor. TEA1 is part of the TETRA standard approved for export to other countries. But the researchers also found other, multiple vulnerabilities across TETRA that could allow historical decryption of communications and deanonymization. TETRA-radio users in general include national police forces and emergency services in Europe; military organizations in Africa; and train operators in North America and critical infrastructure providers elsewhere.

Midnight Blue will be presenting their findings at the upcoming Black Hat cybersecurity conference in August. The details of the talk have been closely under wraps, with the Black Hat website simply describing the briefing as a Redacted Telecom Talk. That reason for secrecy was in large part due to the unusually long disclosure process. Wetzels told Motherboard the team has been disclosing these vulnerabilities to impacted parties so they can be fixed for more than a year and a half. That included an initial meeting with Dutch police in January 2022, a meeting with the intelligence community later that month, and then the main bulk of providing information and mitigations being distributed to stakeholders. NLnet Foundation, an organization which funds those with ideas to fix the internet, financed the research.

The European Telecommunications Standards Institute (ETSI), an organization that standardizes technologies across the industry, first created TETRA in 1995. Since then, TETRA has been used in products, including radios, sold by Motorola, Airbus, and more. Crucially, TETRA is not open-source. Instead, it relies on what the researchers describe in their presentation slides as secret, proprietary cryptography, meaning it is typically difficult for outside experts to verify how secure the standard really is.

The researchers said they worked around this limitation by purchasing a TETRA-powered radio from eBay. In order to then access the cryptographic component of the radio itself, Wetzels said the team found a vulnerability in an interface of the radio. From there, they achieved code execution on the main application processor; they then jumped to the signals processor, which Wetzels described as something equivalent to a wifi or 3G chip, which handles the radios signals. On that chip, a secure enclave held the cryptographic ciphers themselves. The team finally found vulnerabilities in that which allowed them to extract the cryptography and perform their analysis. The team then reverse-engineered how TETRA implemented its cryptography, which led to the series of vulnerabilities that they have called TETRA:BURST. It took less time than we initially expected, Wetzels said.

Most interestingly is the researchers findings of what they describe as the backdoor in TEA1. Ordinarily, radios using TEA1 used a key of 80-bits. But Wetzels said the team found a secret reduction step which dramatically lowers the amount of entropy the initial key offered. An attacker who followed this step would then be able to decrypt intercepted traffic with consumer-level hardware and a cheap software defined radio dongle.

This is a trivial type of attack that fully breaks the algorithm. That means an attacker can passively decrypt everything in almost real time. And it's undetectable, if you do it passively, because you don't need to do any weird interference stuff, Wetzels said.

Not all current TETRA-radio customers will use TEA1, and some may have since moved onto TETRAs other encryption algorithms. But given TETRAs long life span, its existence still means there may have been room for exploitation if another party was aware of this issue.

There's bigger fish who likely found this much earlier, Wetzels said, referring to other third parties who may have discovered the issue.

The researchers say they identified multiple entities that they believe may have used TEA1 products at some point. They include U.S. Africom, a part of the U.S. military which focuses on the continent. Multiple military agencies did not respond to Motherboards request for comment.

In the interest of public safety, we do not share detailed information on our cybersecurity infrastructure, Lenis Valens, a spokesperson for PANYNJ which manages JFK airport, said in a statement when asked if the organization used TETRA radios when contacted by Motherboard. The agency has robust protocols in place and employs the latest technologies and best practices. Safety for our passengers and customers always comes first, the statement said.

Most law enforcement agencies contacted by Motherboard did not respond to a request for comment. Swedish authorities declined to comment.

Several radio manufacturers directed Motherboard to ETSI for comment. Claire Boyer, press and media officer for ETSI, told Motherboard in an email that As the authority on the ETSI TETRA technology standard, we welcome research efforts that help us further develop and strengthen the security of the standard so that it remains safe and resilient for decades to come. We will respond to the report when it has been published.

Specifically on the researchers claims of a backdoor in TEA1, Boyer added At this time, we would like to point out that the research findings do not relate to any backdoors. The TETRA security standards have been specified together with national security agencies and are designed for and subject to export control regulations which determine the strength of the encryption.

The researchers stressed that the key reduction step they discovered is not advertised publicly.

Intentional weakening without informing the public seems like the definition of a backdoor, Wouter Bokslag from Midnight Blue told Motherboard in an email.

In ETSIs statement to Motherboard, Boyer said there have not been any known exploitations on operational networks of the vulnerabilities the researchers disclosed.

Bokslag from Midnight Blue said in response that There is no reason ETSI would be aware of exploitations in the wild, unless customers reach out to ETSI after detecting anomalies in their network traffic. Then with the TEA1 issues specifically, since it can be passively intercepted and decrypted, there is no detectable interference, and ETSI not knowing any concrete cases seems like a bit of a meaningless statement with this regard.

In response to some of the researchers findings, radio manufacturers have developed firmware updates for their products. For TEA1, however, the researchers recommend users migrate to another TEA cipher or apply additional end-to-end encryption to their communications. Wetzels said that such an add-on does exist, but that hasnt been vetted by outside experts at this time.

Bart Jacobs, a professor of security, privacy and identity, who did not work on the research itself but says he was briefed on it, said he hopes this really is the end of closed, proprietary crypto, not based on open, publicly scrutinised standards.

Subscribe to our cybersecurity podcast,CYBER. Subscribe toour Twitch channel.

Read more from the original source:
Researchers Find 'Backdoor' in Encrypted Police and Military Radios - VICE

Read More..

Implementing Application Level Encryption at Scale: Insights from Atlassian’s Use of AWS and Cryptor – InfoQ.com

Atlassian recently published how it performs Application Level Encryption at scale on AWS while utilising high cache hit rates and maintaining low costs. Atlassian's solution runs over 12,500 instances and manages over 1,540 KMS keys. It performs over 11 billion decryptions and 811 million encryptions daily, costing $2,500 per month versus a potential $1,000,000 per month using a naive solution.

Cryptor is an encryption library developed by Atlassian to suit their specific Application Level Encryption (ALE) needs at scale in multi-region environments. It is a thin wrapper over the AWS Encryption SDK. Atlassian engineers designed it to offer automated key management, high availability (similar to Atlassian's Tenant Context Service), distributed caching, and the enforcement of soft limits to enable high-scale operations. Developers can integrate Cryptor as a library or a sidecar, exposing its functionality as HTTP and gRPC APIs.

David Connard, Principal Developer at Atlassian, explains why Atlassian chose to implement ALE wherever possible:

With ALE, sensitive data is encrypted before storage and only decrypted when required (i.e. at the point of use, in the application code). An attacker who gains access to the datastore (or, more commonly, who gains access to a historic replica of it, for example, a backup stored in a less secure location) does not automatically gain access to your sensitive data.

Connard explains that implementing ALE creates significant operational concerns. Implementors should never lose the ability to decrypt the data, encryption key integration should always be protected, and engineers should consider the performance impacts of adding encryption, as ALE adds significant computational effort to the application.

At the heart of Atlassian's ALE is Envelope Encryption. Envelope Encryption is a cryptographic technique used to secure data. It works by encrypting the data with a unique key called a "data key". Engineers then encrypt it with another key, the "root key". Then they bundle the encrypted ciphertext and the encrypted data key in an "envelope encrypted payload" and persist this payload to the data store.

The benefits of using envelope encryption over direct encryption with the root key are that each data key is only used for a small subset of your data, the encryption materials can be cached and re-used across multiple encryption requests, and it allows for fast symmetric encryption algorithms.

Envelope Encryption is well-supported by the AWS Encryption SDK. However, the SDK is mainly designed for single-region scenarios, whereas Atlassian has a heavily multi-region use case, with KMS keys stored and service running in multiple regions. Also, AWS' SDK enforces strict correctness, which makes sense at lower performance scales. However, Atlassian had to loosen some restrictions and enforce them softly to handle its high-scale operations.

Atlassian also encrypts all of its data at rest. However, encryption at rest provides no defence against many types of data exfiltration possibilities, such as a failure to restrict access to the data store, an authorised application doing something unsafe with restricted data at runtime, or legitimate access to data stores by staff for debugging purposes, or to resolve incidents.

Atlassian intended to open source the library one day. However, it currently needs to be added to their internal roadmaps. According to Connard, "It is certainly something we would consider if the demand and interest exist."

View original post here:
Implementing Application Level Encryption at Scale: Insights from Atlassian's Use of AWS and Cryptor - InfoQ.com

Read More..

Google Messages Getting Cross-Platform End-to-End Encryption with MLS Protocol – The Hacker News

Jul 24, 2023THNMobile Security / Privacy

Google has announced that it intends to add support for Message Layer Security (MLS) to its Messages service for Android and open source implementation of the specification.

"Most modern consumer messaging platforms (including Google Messages) support end-to-end encryption, but users today are limited to communicating with contacts who use the same platform," Giles Hogben, privacy engineering director at Google, said. "This is why Google is strongly supportive of regulatory efforts that require interoperability for large end-to-end messaging platforms."

The development comes as the Internet Engineering Task Force (IETF) released the core specification of the Messaging Layer Security (MLS) protocol as a Request for Comments (RFC 9420).

Some of the other major companies that have thrown their weight behind the protocol are Amazon Web Services (AWS) Wickr, Cisco, Cloudflare, The Matrix.org Foundation, Mozilla, Phoenix R&D, and Wire. Notably missing from the list is Apple, which offers iMessage.

MLS, as the name implies, is a security layer for end-to-end encryption that facilitates interoperability across messaging services and platforms. It was approved for publication as a standard by IETF in March 2023.

"MLS builds on the best lessons of the current generation of security protocols," IETF noted at the time. "Like the widely used Double Ratchet protocol, MLS allows for asynchronous operation and provides advanced security features such as post-compromise security. And, like TLS 1.3, MLS provides robust authentication."

Central to MLS is an approach known as Continuous Group Key Agreement (CGKA) that allows multiple messaging clients to agree on a shared key that caters to groups in size ranging from two to thousands in a manner that offers forward secrecy guarantees regardless of the individuals who join and leave the group conversation.

"The core functionality of MLS is continuous group authenticated key exchange (AKE)," the standard document reads. "As with other authenticated key exchange protocols (such as TLS), the participants in the protocol agree on a common secret value, and each participant can verify the identity of the other participants."

"That secret can then be used to protect messages sent from one participant in the group to the other participants using the MLS framing layer or can be exported for use with other protocols. MLS provides group AKE in the sense that there can be more than two participants in the protocol, and continuous group AKE in the sense that the set of participants in the protocol can change over time."

This evolving membership is realized by means of a data structure called an asynchronous ratcheting tree, which is used to derive shared secrets among a group of clients. The goal is to be able to efficiently remove any member, achieving post-compromise security by preventing group messages from being intercepted even if one member was breached at some point in the past.

On the other hand, forward secrecy, which enables messages sent at a certain point in time to be secured in the face of later compromise of a group member, is provided by deleting private keys from past versions of the ratchet tree, thereby averting old group secrets from being re-derived.

Mozilla, which is hoping to see a standardization of a Web API to leverage the protocol directly via web browsers, said MLS is designed such that "the legitimacy of new members entering a group is checked by everyone: there is nowhere to hide."

See more here:
Google Messages Getting Cross-Platform End-to-End Encryption with MLS Protocol - The Hacker News

Read More..

Nubevas Ransomware Key Interception and Decryption Technology Validated in Third-Party Lab – SecurityWeek

NuRR is a product that claims to intercept and capture the encryption keys at the start of a ransomwares encryption process. With the keys caught, any successful encryption can be rapidly decrypted without paying a ransom.

These claims were tested at MISIs DreamPort facility in Columbia, MD. MISI is a non-profit organization purposed with driving discovery, education, collaboration, and innovation in cybersecurity. The DreamPort facility was created in partnership with US Cyber Command (USCYBERCOM) but is neither owned nor operated by the government. One of the key pillars of MiSis operation is to provide independent validation of product claims for government.

NuRR (Nubeva Ransomware Reversal) was developed by San Jose, California-based Nubeva. The technology involves a small agent operating in the background on each endpoint. It is automatically activated by the first signs of anomalous or mass encryption. It listens to the process and captures and extracts the encryption keys. These keys can be used to decrypt any files successfully encrypted by the ransomware.

It is worth noting that NuRR is not a ransomware prevention system. Companies still require ransomware prevention; but NuRR can be considered a fail-safe solution for when prevention fails.

The claims were tested at DreamPort over a four week period. Popular ransomware variants were detonated on Windows endpoints with NuRR installed (99% of ransomware is performed on a Windows OS). Nubeva had no relationship or connection with MiSi during this process.

The primary purpose of the testing was to analyze NuRRs ability to capture ransomware cryptographic keys, and to test whether Nubevas decryptors could then restore the encrypted data. The ransomware variants used in this testing included Lockbit 3, Blackcat/ALPHV, CL0P, PLAY, Black Basta, Ragnar Locker, Conti, REvil, and others amounting to a high percentage of real attacks over the last year.

The results of the testing were made available in July 2023 (summary). NuRR succeeded in all 17 of MISIs tests, with zero failures. It demonstrated 100% success in capturing keys. MISI also noted that the product is simple and secure: it is trivial to implement and use for a junior engineer, and did not introduce observed system instabilities during test. NURR does not open network ports or introduce vulnerabilities into an endpoint as measured by Nmap and BitDefender Total Security.

The MISI report concludes, MISI is excited about this product and believes it shows real promise. Decryption is arguably one of the fastest and lowest data-loss means to recover data from a ransomware attack and, as such, represents a new potential layer of defense. Given these testing results and the simplicity of the NuRR decryption solution, we feel NuRR represents a very real potential safety-net for organizations to consider.

We knew obtaining third-party validation was crucial to prove the viability of our technology for the broader audience. With this validation, we have proof to support our claims, Steve Perkins, CMO and head of product at Nubeva told SecurityWeek. We can help organizations. We can help people. We can decrypt ransomware.

Related: Can Encryption Key Intercepts Solve The Ransomware Epidemic?

Related: New Ransomware With RAT Capabilities Impersonating Sophos

Related: Recycling Giant Tomra Takes Systems Offline Following Cyberattack

See the original post:
Nubevas Ransomware Key Interception and Decryption Technology Validated in Third-Party Lab - SecurityWeek

Read More..

Hacking police radios: 30-year-old crypto flaws in the spotlight – Naked Security

If youd been quietly chasing down cryptographic bugs in a proprietary police radio system since 2021, but youd had to wait until the second half of 2023 to go public with your research, how would you deal with the reveal?

Youd probably do what researchers at boutique Dutch cybersecurity consultancy Midnight Blue did: line up a world tour of conference appearances in the US, Germany and Denmark (Black Hat, Usenix, DEF CON, CCC and ISC), and turn your findings into a BWAIN.

The word BWAIN, if you havent seen it before, is our very own jocular acronym thats short for Bug With An Impressive Name, typically with its own logo, PR-friendly website and custom domain name.

(One notorious BWAIN, named after a legendary musical instrument, Orpheuss Lyre, even had a theme tune, albeit played on a ukulele.)

This research is dubbed TETRA:BURST, with the letter A stylised to look like a shattered radio transmission mast.

TETRA, if youve never heard of it before, is short for Terrestrial Trunked Radio, originally Trans-European Trunked Radio, and is widely used (outside North America, at least) by law enforcement, emergency services and some commercial organisations.

TETRA has featured on Naked Security before, when a Slovenian student received a criminal conviction for hacking the TETRA network in his own country after deciding that his vulnerability reports hadnt been taken seriously enough:

Trunked radio needs fewer base stations and has a longer range than mobile phone networks, which helps in remote areas, and it supports both point-to-point and broadcast communications, desirable when co-ordinating law enforcement or rescue efforts.

The TETRA system, indeed, was standardised back in 1995, when the cryptographic world was very different.

Back then, cryptographic tools including the DES and RC4 ciphers, and the MD5 message digest algorithm, were still in widespread use, though all of them are now considered dangerously unsafe.

DES was superseded at the start of the 2000s because it uses encryption keys just 56 bits long.

Modern computers are sufficiently fast and cheap that determined cryptocrackers can fairly easily try out all possible 256 different keys (whats known as a brute-force attack, for obvious reasons) against intercepted messages.

RC4, which is supposed to turn input data with recognisable patterns (even a text string of the same character repeated over and over) into random digital shredded cabbage, was found to have signficant imperfections.

These could be used to used to winkle out plaintext input by performing statistical analysis of ciphertext output.

MD5, which is supposed to produce a pseudorandom 16-byte message digest from any input file, thus generating unforgeable fingerprints for files of any size, turned out to be flawed, too.

Attackers can easily trick the algorithm into churning out the same fingerprint for two different files, annihilating its value as a tamper-detection tool.

End-to-end encryption for individual online transactions, which we now take for granted on the web thanks to secure HTTP (HTTPS, based on TLS, short for transport layer security), was both new and unusual back in 1995.

Transaction-based protection relied on the brand-new-at-the-time network-leve protocol known as SSL (secure sockets layer), now considered sufficiently insecure that youll struggle to find it in use anywhere online.

Unlike DES, RC4, MD5, SSL and friends, TETRAs 1995-era encryption remains in widespread use to this day, but hasnt received much research attention, apparently for two main reasons.

Firstly, even though its used around the world, its not an everyday service that pops up in all our lives in the way that mobile telephones and web commerce do.

Secondly, the underlying encryption algorithms are proprietary, guarded as trade secrets under strict non-disclosure agreements (NDAs), so it simply hasnt had the levels of public mathematical scrutiny as unpatented, open-source encryption algorithms.

In contrast, cryptosystems such as AES (which replaced DES), SHA-256 (which replaced MD5), ChaCha20 (which replaced RC4), and various iterations of TLS (which replaced SSL) have all been analysed, dissected, discussed, hacked, attacked and critiqued in public for years, following whats known in the trade as Kerckhoffs Principle.

Auguste Kerckhoff was a Dutch-born linguist who ended up as a professor of the German language in Paris.

He published a pair of seminal papers in the 1880s under the title Military Cryptography, in which he proposed that no cryptographic system should ever rely on what we now refer to as security through obscurity.

Simply put, if you need to keep the algorithm secret, as well as the decryption key for each message, youre in deep trouble..

Your enemies will ultimately, and inevitably, get hold of that algorithm

and, unlike decryption keys, which can be changed at will, youre stuck with the algorithm that uses those keys.

Commercial NDAs are peculiarly purposeless for keeping cryptographic secrets, especially for successful products that end up with ever more partners signed up under NDA.

There are four obvious problems here, namely:

The Dutch researchers in this story took the last approach, legally acquiring a bunch of compliant TETRA devices and figuring out how they worked without using any information covered by NDA.

Apparently, they discovered five vulnerabilities that ended up with CVE numbers, dating back to 2022 because of the time involved in liaising with TETRA vendors on how to fix the issues: CVE-2022-24400 to CVE-2022-24404 inclusive.

Obviously, theyre now holding out on full details for maximum PR effect, with their first public paper scheduled for 2023-08-09 at the Black Hat 2023 conference in Las Vegas, USA.

Advance information provided by the researchers is enough to remind us of three cryptographic must-follow rules right away:

Fortunately, it looks as though CVE-2022-24401 has already been quashed with firmware updates (assuming users have applied them).

As for the rest of the vulnerabilities

well have to wait until the TETRA:BURST tour kicks off for fuill details and mitigations.

Read the original:
Hacking police radios: 30-year-old crypto flaws in the spotlight - Naked Security

Read More..

Apple Threatens to Pull iMessage and FaceTime from U.K. Amid Surveillance Demands – The Hacker News

Jul 22, 2023THNEncryption / Privacy

Apple has warned that it would rather stop offering iMessage and FaceTime services in the U.K. than bowing down to government pressure in response to new proposals that seek to expand digital surveillance powers available to state intelligence agencies.

The development, first reported by BBC News, makes the iPhone maker the latest to join the chorus of voices protesting against forthcoming legislative changes to the Investigatory Powers Act (IPA) 2016 in a manner that would effectively render encryption protections ineffective.

Specifically, the Online Safety Bill requires companies to install technology to scan for child sex exploitation and abuse (CSEA) material and terrorism content in encrypted messaging apps and other services. It also mandates that messaging services clear security features with the Home Office before releasing them and take immediate action to disable them if required without informing the public.

While the fact does not explicitly call out for the removal of end-to-end encryption, it would de facto amount to weakening it as the companies offering the services would have to scan all messages to flag and take them down. This has been viewed as a disproportionate step that allows the government to enforce bulk interception and surveillance.

Apple told the British broadcaster that such a provision would "constitute a serious and direct threat to data security and information privacy."

Earlier this April, a number of messaging apps that currently offer encrypted chats, such as Element, Signal, Threema, Viber, Meta-owned WhatsApp, and Wire, published an open letter, urging the U.K. government to rethink its approach and "encourage companies to offer more privacy and security to its residents."

"The Bill provides no explicit protection for encryption, and if implemented as written, could empower OFCOM to try to force the proactive scanning of private messages on end-to-end encrypted communication services nullifying the purpose of end-to-end encryption as a result and compromising the privacy of all users," the letter read.

Apple, which previously announced its own plans to flag potentially problematic and abusive content in iCloud Photos, abandoned it last year after receiving pushback from digital rights groups over worries that the capability could be abused to undermine users' privacy and security.

Shield Against Insider Threats: Master SaaS Security Posture Management

Worried about insider threats? We've got you covered! Join this webinar to explore practical strategies and the secrets of proactive security with SaaS Security Posture Management.

This is not the first time the tussle between end-to-end encryption vis--vis the need to tackle serious crimes online has cropped up.

In May 2021, WhatsApp sued the Indian government to block internet regulations that would compel the messaging app to break encryption by incorporating a traceability mechanism to identify the "first originator of information" or risk facing criminal penalties. The case is still pending.

Apple's refusal to play ball is in line with its public stance on privacy, one that allows it to position itself as a "privacy hero" among other companies that thrive on collecting user data to serve targeted ads.

But it also rings hollow when considering the fact that every message sent to or received from a non-Apple device is unencrypted SMS does not support end-to-end encryption and could potentially open the door for government surveillance.

Read the original here:
Apple Threatens to Pull iMessage and FaceTime from U.K. Amid Surveillance Demands - The Hacker News

Read More..

Almost 50 Years Into the Crypto Wars, Encryption’s Opponents Are … – WIRED

When I contemplate the return of the crypto warsattempts to block citizens use of encryption by officials who want unfettered spying powersI look back with dread on the late Middle Ages. I wasnt alive back then, but one feature of those times lingers in my consciousness. Starting around 1337 and all the way until 1453, England and France fought a series of bloody battles. The conflict went on so long it was immortalized by its centenarian length: We know it as the Hundred Years War.

The crypto wars havent yet reached that mark. (In this column I will be reclaiming the term crypto from its more recent and debased usage by blockchain enthusiasts, too many of whom havent read my 2001 book called, um, Crypto.) Dating from the publication of the groundbreaking 1976 paper that introduced public key cryptographya means of widening access to encryption that was developed just in time for the internetthe skirmish between encryption advocates and their foes in officialdom is only just approaching 50 years.

From the start, government efforts to constrain or outlaw secure encrypted communications were vigorous and persistent. But by the turn of the millennium it appeared the fight was over. Encryption was so obviously critical to the internet that it was built into every browser and increasingly included in messaging systems. Government snooping didnt endcheck out Edward Snowdens revelationsbut certain government elements around the world never got comfortable with the idea that citizens, including the most rotten among us, could share secrets safe from the eyes of surveillants. Every few years, theres a flareup with proposed new regulations, accompanied by scary scenarios from the likes of FBI directors about going dark.

The arguments of the anti-crypto faction are always the same. If we allow encryption to flourish, they plead, were protecting terrorists, child pornographers, and drug dealers. But the more compelling counterarguments havent changed, either. If we dont have encryption, no one can communicate securely. Everyone becomes vulnerable to blackmail, theft, and corporate espionage. And the last vestiges of privacy are gone. Building a back door to allow authorities to peek into our secrets will only make those secrets more accessible to dark-side hackers, thieves, and government agencies operating off the books. And even if you try to outlaw encryption, nefarious people will use it anyway, since the technology is well known. Crypto is toothpaste that cant go back in the tube.

The good news is that so far encryption is winning. After a long period where crypto was too hard for most of us to use, some extremely popular services and tools have end-to-end encryption built in as a default. Apple is the most notable adopter, but theres also Metas WhatsApp and the well-respected standalone system Signal.

Still, the foes of encryption keep fighting. In 2023, new battlefronts have emerged. The UK is proposing to amend its Investigatory Powers Act with a provision demanding that companies provide government with plaintext versions of communications on demand. Thats impossible without disabling end-to-end encryption. Apple has already threatened to pull iMessage and FaceTime out of the UK if the regulation passes, and other end-to-end providers may well follow, or find an alternative means to keep going. Im never going to willingly abandon the people in the UK who deserve privacy, says Signal president Meredith Whittaker. If the government blocks Signal, then we will set up proxy servers, like we did in Iran.

Originally posted here:
Almost 50 Years Into the Crypto Wars, Encryption's Opponents Are ... - WIRED

Read More..