Page 1,071«..1020..1,0701,0711,0721,073..1,0801,090..»

Districts, Take Note: Privacy Is Rare in Apps Used in Schools – Education Week

Schools are falling short on vetting the apps and internet services they require or recommend that students use.

Thats among the findings of a comprehensive analysis of school technology practices by Internet Safety Labs, a nonprofit group that researchers tech product safety.

Researchers analyzed more than 1,300 apps used in 600 schools across the country looking at what information the appsand the browser versions of those appsare collecting on students and who that information is shared with or sold to.

Not protecting students personal information in the digital space can cause real-world harms, said Lisa LeVasseur, the founder and executive director of Internet Safety Labs and one of the co-authors of the report. Strangers can glean a lot of sensitive information about individuals, she said, from even just their location and calendar data.

Its like pulling a thread, LeVassuer said. Even data that may seem innocuous can be used maliciously, potentiallycertainly in ways unanticipated and undesired. These kids are not signing up for data broker profiles. None of us are, actually.

(Data brokers are companies that collect peoples personal data from various sources, package it together into profiles, and sell it to other companies for marketing purposes.)

Only 29 percent of schools appear to be vetting all apps used by students, the analysis found. Schools that systematically vet all apps were less likely to recommend or require students use apps that feature ads.

But in an unusual twist, those schools that vet their tech were actually more likely to require students use apps with poor safety ratings from the Internet Research Labs. Although LeVassuer said shes not sure why that is the case, it might be because schools with systematic vetting procedures wound up requiring that students use more apps, giving schools a false sense of security that the apps they approved were safe to use.

Its also hard for families to find information online about the technology their children are required to use for school and difficult to opt out of using that tech, according to the report.

Less than half of schools45 percentprovide a technology notice that clearly lists all of the technology products students must use, the researchers found. While not required under federal or most state laws, it is considered a best practice, the report said.

Only 14 percent of schools gave parents and students older than 18 years of age the opportunity to consent to technology use.

Researchers for the Internet Safety Lab also found that apps with the third-party COPA certification called Safe Harborwhich indicates that an app follows federal privacy-protection laws for childrenare frequently sharing student data with the likes of Facebook and Twitter. Safe Harbor certified apps also have more advertising than the overall sample of apps the report examined.

The certification verifies that the apps abstain from some important data privacy practices, like behavioral advertising, said LeVasseur. But school leaders may not be getting the data privacy protection for students that they believe they are.

Third-party certifications may not be doing what you think they are, said LeVassuer.

But overall, apps with third-party certifications, such as 1EdTech, and pledges or promises, such as the Student Privacy Pledge or the Student Data Privacy Consortium, received better data privacy safety ratings under the rubric developed by the Internet Safety Labs.

In all, the Internet Safety Labs examined and tested 1,357 apps that schools across the country either recommend or require students and families to use. It created its sample of apps by assessing the apps recommended or required in a random sample of 13 schools from each of the 50 states and the District of Columbia, totaling 663 schools serving 456,000 students.

While researchers for Internet Safety Labs were only able to analyze the off-the-shelf versions of the apps schools used (they did not have access to school versions of these apps), the group estimates that 8 out of every 10 apps recommended by schools to students are of the off-the-shelf variety.

This is the second report from an ambitious evaluation of the technology used in schools by Internet Safety Labs. The first report, released in December, labeled the vast majority of those apps96 percentas not safe for children to use because they share information with third parties or contain ads.

That report also flagged that the custom-built apps some districts use to communicate with families often have more privacy issues than regular apps.

The big takeaway for school and district leaders? LeVasseur said its to be on high alert.

While new technology can be exciting, and schools might be eager to adopt it, education leaders should be picky about what apps students are required or recommended to use. Less is more should be a guiding star for schools, LeVasseur said.

I really have a lot of sympathy for schools because they need probably a lot more support than they have, given the risks of technology and the confusing nature of the laws at both the state and federal level, she said. I think theyre struggling. I dont think they know what best practices are.

Read this article:
Districts, Take Note: Privacy Is Rare in Apps Used in Schools - Education Week

Read More..

Two Indictments Charge International Travel to Engage in Illicit … – Department of Justice

SACRAMENTO, Calif. U.S. Attorney Phillip A. Talbert joins with Homeland Security Investigations Special Agent in Charge Tatum King, FBI Special Agent in Charge Sean Ragan, and Kathleen Nicholls, Chief of the Department of Consumer Affairs Division of Investigation to announce indictments charging sexual exploitation of children, a global problem demanding a global response.

The indictments are part of an initiative known as Project Safe Childhood that seeks to prevent the sexual exploitation of children and achieve justice for the victims of such crimes.

To vindicate victims of child exploitation and bring criminals to justice, our law enforcement and our communities must work together in partnership across county, state, and national borders, U.S. Attorney Talbert said. Our office is committed to protect our children and hold offenders accountable.

Homeland Security Investigations SanFrancisco/NorCal and FBI, in partnership with the California Dept of Consumer Affairs and the U.S. Attorneys Office are seeking information on any individuals that may have been victimized by Mr. Reger, said HSISpecial Agent in Charge Tatum King. Of importance, HSI and Law Enforcement partners are focused on providing victim support and holding the alleged violator accountable for his actions in a court of law. We ask the community and media to help magnify this request so that victims, regardless of their current location around the world can be aware of the latest developments in this case.

Child predators prey upon the innocence and naivete of their victims, damaging trust and forever changing the course of their lives. The FBI Sacramento Field Office is determined to thoroughly investigate allegations like these to seek justice and connect identified victims with vital services that can help heal the trauma they have experienced, said Special Agent in Charge Sean Ragan of the FBI Sacramento Field Office. We are grateful for our continued partnership with the Lassen County Sheriffs Office, Lassen County District Attorneys Office, and Homeland Security Investigations. Trust and collaboration are essential to ensuring the safety and security of the communities we serve. We also thank the Church of the Nazarene and California Department of Consumer Affairs for their efforts to aid this investigation.

The California Department of Consumer Affairs is committed to protecting California consumers, said Kathleen Nicholls, Chief of the Department of Consumer Affairs Division of Investigation. We are grateful for our law enforcement partners who share the common goal of taking action against those who violate the law.

Danish Man Alleged to Have Traveled from Denmark to Fresno to Exploit a Minor

A federal grand jury returned a two-count indictment today against Claus Svelmo Marcuslund, 58, of Denmark, charging him with distribution of child pornography and attempted coercion or enticement of a minor to engage in illicit sexual activity.

According to court documents, in January 2023, Marcuslund contacted an undercover agent who had created the profile of a mother with a seven-year-old daughter, on a dark web website dedicated to persons interested in pedophilia. Marcuslund told the agent that Im Scandinavian, professional music producer/songwriter and lyricist and yeah, Im also a pedophile. He also stated that Im divorced and now searching [for] a nice woman/mom to get to know better, hopefully with the potential of getting together in real life one day. Obviously, she must be 100% supportive of pedophilia and incest. During the next several months Marcuslund sent messages to the agent through the websites messaging feature, as well as the fully encrypted Telegram application, that explained in graphic detail the sexual acts in which he hoped to engage with the mother and child. As part of those communications, he sent images of adults sexually abusing young children. He also discussed having another child with the mother and molesting the newborn.

Marcuslund boarded a flight from Copenhagen to the Los Angeles International Airport and then boarded a flight to Fresno. On July 11, 2023, Marcuslund was arrested upon arrival at the Fresno International Airport and has been ordered detained as a risk of flight and danger to the community.

This case is the product of an investigation by Homeland Security Investigations with assistance from the Central Valley Internet Crimes Against Children Task Force. Assistant U.S. Attorney David Gappa is prosecuting the case.

Susanville Man Charged with Multiple Crimes Involving Sexual Abuse of Minors

A federal grand jury returned a five-count indictment today against Bradley Earl Reger, 67, of Susanville, charging him with: engaging in illicit sexual activity abroad, transportation of a minor with intent to engage in criminal sexual activity, and coercion and enticement.

According to court documents, Reger sexually abused more than a dozen patients between the ages of 12 and 22 under the guise of conducting purported medical examinations at his medical clinic in Susanville, and in hotel rooms and camp sites all over the world. Reger is a licensed Nurse Practitioner with the California Board of Registered Nursing and has been since at least 2003. Since at least 1986, Reger has been heavily involved in various Christian schools, summer camps, youth groups, and church missions. He has held positions as a teacher, camp counselor, church deacon, youth group leader, and owner of affiliated nonprofit organizations.

The indictment alleges that Reger sexually abused three different minor victims, in locations such as: Susanville, Nevada, Virginia, and Poland. These offenses allegedly took place between 2006 and 2014.

This case is the product of an investigation by the Federal Bureau of Investigation, Homeland Security Investigations, and the California Department of Consumer Affairs with assistance from the Lassen County Sheriffs Office and the Lassen County District Attorneys Office. Assistant U.S. Attorneys Christina McCall and Roger Yang are prosecuting the case.

The FBI and HSI are seeking to identify potential victims of Bradley Reger. If you believe that you and/or your minor dependent(s) were victimized by Reger at any time, in the United States or abroad, or have information relevant to this investigation, please complete the online form available at: http://www.fbi.gov/RegerVictims. Additionally, if you know of someone else who may have been victimized by Bradley Reger, please encourage them to complete the form.

If convicted, Reger faces a maximum statutory penalty of 30 years in prison and a $250,000 fine for the counts of engaging in illicit sexual conduct abroad, up to life in prison and a fine of $250,000 for transportation with intent to engage in criminal sexual activity, and up to 20 years in prison and a fine of up to $250,000 for coercion and enticement. If convicted, Marcuslund faces a maximum statutory penalty of life in prison and a $250,000 fine.

Any sentence, however, would be determined at the discretion of the court after consideration of any applicable statutory factors and the Federal Sentencing Guidelines, which take into account a number of variables. The charges are only allegations; the defendants are presumed innocent until and unless proven guilty beyond a reasonable doubt.

These cases are brought as part of Project Safe Childhood, a nationwide initiative launched in May2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys Offices and the Criminal Divisions Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute those who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit http://www.usdoj.gov/psc. Click on the resources tab for information about internet-safety education.

Read more:
Two Indictments Charge International Travel to Engage in Illicit ... - Department of Justice

Read More..

Building Trust in the Digital Age: The Role of Global Digital Identity … – Fagen wasanni

Building Trust in the Digital Age: The Role of Global Digital Identity Management in Telecommunications and Internet Security

In the digital age, trust has become a paramount concern for individuals and businesses alike. As we increasingly rely on digital platforms for communication, commerce, and entertainment, the need for robust security measures has never been more critical. One of the key components in this digital security landscape is the concept of global digital identity management, particularly in the realms of telecommunications and internet security.

Global digital identity management refers to the process of creating, managing, and securing digital identities. A digital identity is essentially a collection of data attributes that uniquely identify an individual, device, or entity in the digital world. This can include everything from usernames and passwords to biometric data and behavioral patterns. In the context of telecommunications and internet security, digital identity management plays a crucial role in verifying the identities of users, ensuring the integrity of communications, and protecting against fraud and cyber threats.

The importance of digital identity management in telecommunications cannot be overstated. With the advent of 5G technology and the Internet of Things (IoT), the number of connected devices is set to explode, each requiring a unique digital identity. Managing these identities securely is crucial to prevent unauthorized access and ensure the privacy and integrity of communications. Moreover, as telecommunications companies move towards more personalized services, the ability to accurately identify and authenticate users becomes even more critical.

In the realm of internet security, digital identity management is equally vital. As we spend more of our lives online, our digital identities become targets for cybercriminals. Identity theft, phishing attacks, and data breaches are just some of the threats that individuals and businesses face. By implementing robust digital identity management systems, we can better protect ourselves against these threats. These systems can help verify the identities of users, authenticate transactions, and secure personal data, thereby building trust in the digital environment.

However, building trust in the digital age is not without its challenges. One of the main hurdles is the issue of privacy. While digital identity management can enhance security, it also involves the collection and processing of personal data, raising concerns about data privacy and protection. To address this, it is essential to adopt privacy-by-design principles, ensuring that privacy is built into digital identity systems from the outset.

Another challenge is interoperability. With a multitude of digital identity systems in use around the world, ensuring that these systems can work together seamlessly is crucial. This requires global standards and protocols, as well as cooperation between different stakeholders, including governments, businesses, and civil society.

In conclusion, global digital identity management plays a pivotal role in telecommunications and internet security in the digital age. By securely managing digital identities, we can enhance security, protect against cyber threats, and build trust in the digital environment. However, to fully realize these benefits, we must address the challenges of privacy and interoperability. As we navigate the digital age, the importance of trust cannot be underestimated, and digital identity management will be at the forefront of building this trust.

Continued here:
Building Trust in the Digital Age: The Role of Global Digital Identity ... - Fagen wasanni

Read More..

As Many As 700,000 Turkish TikTok Accounts Were Hacked Before … – Forbes

Illustration by Angelica Alzona for ForbesBy Emily Baker-White, Forbes Staff

Weeks before Turkeys authoritarian president, Recep Tayyip Erdoan, eked out a narrow reelection in May, TikToks acting security chief, Kim Albarella, received a piece of bad news: As many as 700,000 TikTok accounts in Turkey had been compromised by a hack that allowed attackers to access users private information and control their accounts.

Internal emails, chat logs, documents, and other sourcing from inside and outside of TikTok reveal that the company was made aware of the vulnerability, which stemmed from its so called greyrouting of SMS messages through insecure channels, more than a year earlier: In April 2022, TikToks security chief Roland Cloutier received an email from the U.K.s National Cyber Security Centre, a division of the nations top intelligence agency, GCHQ, warning that this practice could allow SIM farms in Russia and other countries to request and intercept one-time passwords to gain access to TikTok users accounts.

In laymans terms, greyrouting means sending SMS text messages through unsecured channels in order to bypass fees established by international telecommunications agreements. Using greyroutes can save companies money and help them avoid guardrails like rate limits and anti-spam detection, but doing so can compromise messages security, making them vulnerable to interception.

Cloutiers team internally investigated the GCHQ tip, and learned that ByteDance was indeed using greyrouting to keep costs down. The company then considered changing its SMS message providers, but decided against the change, apparently because the fix would have cost the company millions of dollars each month.

Alex Stamos, director of the Stanford Internet Observatory and former security chief for Facebook, cautioned that without more information, its hard to know how significant the breach was. This could range from a super advanced spam attack to a state actor, he said. If youd just told me 700,000 accounts, Id tell you thats a Wednesday. But he noted that SMS hijacking attacks are often more targeted than random takeovers, and authoritarian states almost always have control of telecom companies.

This exploit is the largest known compromise of TikTok accounts that has been acknowledged as genuine by the company. (TikTok denied reports of another alleged attack in September 2022.) In response to a detailed list of bullet points and questions about the attack, TikTok spokesperson Alex Haurek wrote in an email, TikTok became aware of unusual activity in April that affected the number of likes and accounts being followed on some user accounts. We immediately took steps to reverse and terminate this activity, notified affected users, and helped them secure their accounts.

Haurek continued, TikTok was not hacked. None of our internal systems were compromised and no company data was exfiltrated. When TikTok became aware of the incident in question, we immediately ramped up monitoring for inauthentic behavior, while working to mitigate the issue, which has since been resolved. He said TikTok did not find any evidence that unauthorized content was posted or used in direct messages."

This security breach emphasizes the power and responsibility that TikTok now holds as one of the most popular apps in the world.

TikTok and its parent company, ByteDance, have faced harsh scrutiny in recent months for misleading lawmakers about their data security practices. In April, Forbes revealed that the company had stored sensitive financial information from thousands of U.S. vendors and creators in China, despite testimony from TikTok CEO Shou Zi Chew at a recent hearing that American data has always been stored in Virginia and Singapore. Meanwhile, ByteDance is under federal criminal investigation for using the TikTok app to spy on journalists, including this reporter. (Disclosure: in a former life, I held policy positions at Facebook and Spotify.)

It is also not clear who exploited the vulnerability. Under Erdogan, the Turkish government has a history of using state-sponsored troll networks to hack and intimidate journalists and other critics. In the run-up to the May election, Erdogan relied on deepfakes and censorship to help swing voters his way. His main opponent in the election, Kemal Kilicdaroglu, also accused Russias government of distributing false information during the days before the election. Haurek said an internal TikTok investigation found no evidence that the activity was related to the Turkish elections.

This security breach emphasizes the power and responsibility that TikTok now holds as one of the most popular apps in the world. Like tech giants Meta, Twitter, and Google, its endless feed of personalized recommendations has the power to move markets, change culture and swing elections. This power has alarmed regulators concerned about the companys ties to the Chinese state, but has also made its app a prime target for hackers, bot armies, scammers and others seeking to exploit its billions of users.

The risk of exploitation is heightened in states with records of human rights violations, and also in the periods leading up to major elections. TikTok has repeatedly deemphasized the role of politics on its platform, differentiating itself from Facebook, which previously encouraged politicians to use its platform for advocacy. Its lobbyists have told politicians and reporters that TikTok is not the go-to place for politics, while also assuring them that political speech on the app will not be censored. But with Twitters rightward shift and Metas 180-degree turn away from political content (a decision the company made after election deniers on its platforms helped incite the January 6, 2021 attack on the U.S. Capitol), TikTok may be the next natural place for political discourse.

This week, TikTok published a blog post announcing that the app is introducing passkeys a way for users to log into their accounts without using SMS codes and that it had joined a security trade group called the FIDO Alliance. A tweet from the FIDO Alliance shows that TikTok first joined the group in April, and the new passkeys feature rolled out in late-June.

When asked whether any TikTok or ByteDance SMS vendors were still engaged in greyrouting today, Haurek said, Like many global companies, we have multiple partners in the telecommunications sector and, while we do not disclose those partners by geography, we continuously work to keep our community secure.

Read this article:
As Many As 700,000 Turkish TikTok Accounts Were Hacked Before ... - Forbes

Read More..

Cyber Security Market: Trends and Future Growth Projections by … – Chatfield News-Record

A progressive report titled Cyber Security Market 2023 launched by Fior Markets contains extensive genuine information on the market which connects with the clients to plan the future interest and perform the right implementation. The report extensively researches global Cyber Security market insights, dynamics, trends, and future opportunities. It presents an in-depth analysis that has been projected to assemble substantial returns by the end of the forecasted timeline from 2023 to 2032. The report has extensively investigated and statistically analyzed vital market elements.

The report guides every businessman for their future innovation and moves the business forward by providing all market data, insight, and expert analysis with easily digestible information. The report comprises an in-depth analysis of the global Cyber Security industry which aims to deliver a comprehensive market intelligence study associated with major market components. Our dedicated team of experts has delivered this report with accurate data extracted from trusted sources. The market report delivers detailed information about the alterations in the types of product, its innovation, and its advancements.

(An In-Depth TOC, List of Tables & Figures, Chart), Download Sample Report: https://www.fiormarkets.com/report-detail/419950/request-sample

In the segmentation analysis, the report provides an assessment of all the segments such as the type of product, application, and region. The segments are studied with regard to their market share, turnover, growth rate, and other vital factors. The global Cyber Security market report further offers a dashboard overview of leading companies encompassing their successful marketing strategies, market contribution, and recent developments in both historic and present contexts. The research comprises primary information about the products.

The prominent players of the market are:

IBM Corporation, Schneider Electric, ABB Ltd., Mcafee LLC, Cisco Systems Inc., Microsoft Corporation, Honeywell International Inc., Siemens AG, Splunk Inc., Trend Micro Inc., Dell Inc., etc.

Cyber Security Market Analysis and Forecast, Security Type: Cloud application security, Network security, Internet security, End-point security

Cyber Security Market Analysis and Forecast, End-use: IT & Telecom, BSFI, Manufacturing, Retail, Healthcare, Defence & Government, Energy

The countries covered in the global Cyber Security market report are:

North America (U.S. , Canada, Mexico), Europe (Germany, France, U.K., Italy, Spain, Rest of the Europe), Asia-Pacific (China, Japan India, Rest of APAC), South America (Brazil and Rest of South America), Middle East and Africa (UAE, South Africa, Rest of MEA).

The report covers the dominating players along with their market share in the global Cyber Security market. This section of the study document reveals a complete profile of the companies with capacity, production, price, revenue, cost, gross, gross margin, sales volume, sales revenue, consumption, growth rate, import, export, supply, future strategies, and technological developments. It contains an analysis of competitive developments such as expansions, agreements, new product launches, and acquisitions in the market.

To Know More, View the Complete Research Report: https://www.fiormarkets.com/report/cyber-security-market-by-component-software-product-service-419950.html

Reasons To Buy The Report:-

Then, it includes supply-demand statistics and segments that constrain the growth of an industry. Additionally, the report provides market drivers and challenges & opportunities for the overall global Cyber Security market in the particular provincial sections. The industry intelligence study of the global Cyber Security market covers the estimation size of the market each in phrases of value and volume. The report explains country-wise consumption and market size of the market. This study covers the inside and out factual examination and the market elements and requests which give an entire situation of the business.

For any Queries or Customization: https://www.fiormarkets.com/enquiry/request-customization/419950

About Fior Markets:

Fior Markets is a futuristic market intelligence company, helping customers flourish their business strategies and make better decisions using actionable intelligence. With transparent information pool, we meet clients objectives, commitments on high standard and targeting possible prospects for SWOT analysis and market research reports. Fior Markets deploys a wide range of regional and global market intelligence research reports including industries like technology, pharmaceutical, consumer goods, food and beverages, chemicals, media, materials and many others.

Contact UsPhone: +1-201-465-4211Email: sales@fiormarkets.comWeb: http://www.fiormarkets.com

TRENDING REPORTS:

Insurance Telematics Market https://www.fiormarkets.com/report/insurance-telematics-market-by-deployment-mode-cloud-and-420280.html

Interventional Neuroradiology Market https://www.fiormarkets.com/report/interventional-neuroradiology-market-by-product-neurothrombectomy-support-devices-420281.html

Jacking Systems Market https://www.fiormarkets.com/report/jacking-systems-market-by-type-single-acting-jacking-420282.html

Ciprofloxacin HCI Market https://www.fiormarkets.com/report/ciprofloxacin-hci-market-by-product-type-0-1-g-pcs-420283.html

Dental Implants Market https://www.fiormarkets.com/report/dental-implants-market-by-material-type-titanium-zirconium-420284.html

See the article here:
Cyber Security Market: Trends and Future Growth Projections by ... - Chatfield News-Record

Read More..

DFINITY working on passwordless authentication alternative for … – Biometric Update

Developers are working on a way for people to access online accounts and applications that they say could have a major impact on internet security. Internet Identity (IID) is proposed as an important aspect for online authentication with the emerging concept of Web3.

Internet Identity is a decentralized blockchain-based form of online identity which proponents say makes it possible for users of Web3 services and decentralized applications to enjoy ample security and convenience while carrying out authentication on the internet computer.

According to an explainer by Android Police, work is ongoing by developers at DFINITY Foundation, a public blockchain technology outfit, to make Internet Identity a secure alternative for passwordless authentication on Web3.

IID, the explainer notes, is a way through which users can securely sign into their devices, not with passwords but rather with the Trusted Platform Module (TPM) chip found on most new mobile devices and computers, which create automatic and hidden one-use TPM passkeys enabled via biometric authentication. Authentication can be carried out with native device biometrics, or other authenticators that work with passkeys, like Yubikeys.

Internet Identity is said to have many benefits including protection to users from identity theft, online profiling by big tech companies such as Google as well as its ability to keep users anonymous by preventing their online activities from being trailed. It is an open-source software which comes at no cost and which requires a new login for each online session.

On how IID works, Android Police explains that the sign-in system is similar to that of other passkey technologies and that with it, users can sign into compatible devices automatically thanks to a public key cryptography protocol.

Data security and privacy has been underlined as one of the key advantages of Internet Identity as there is no room for password hacking or access to the disposable passkeys, which are visible to no one else other than the user.

Although Internet Identity is believed to have great potential for enhancing online data security and privacy, it also has its downside, writes Android police. The first one is that it only works with supported services like decentralized applications compatible with Web3, such as OpenChat, a messaging app.

The explainer says just like Web3, there is no certainty yet about the future of Internet Identity.

biometrics | blockchain | DFINITY Foundation | Internet Identity | passkeys | passwordless authentication | web3

More here:
DFINITY working on passwordless authentication alternative for ... - Biometric Update

Read More..

Wizz offered a safe space for teens sextortion soon followed – NBC News

A Tinder-like app popular among teenagers and young adults has allegedly been used to extort users by tricking them into sending sexually explicit photos, a problem that internet safety watchdogs say is indicative of the challenges of keeping young people safe on social media.

The app, Wizz, allows users to scroll through profiles that show a persons picture, first name, age, state and zodiac sign. Wizz advertises the app as a safe space to meet new friends and allows users as young as 13 to join and connect with users of a similar age.

Its basic functionality resembles popular dating apps. When users open the app, they are presented with another persons profile. They can then choose to send that person a message in the apps chat function or swipe left to see a new profile.

Child safety watchdogs have questioned whether the apps safety system is effective.

The app, which is based in France, has been downloaded more than 14 million times worldwide since it launched in 2019 and more than doubled its monthly active users in the last year, according to Sensor Tower, a company that tracks apps. Its at times ranked in the top 10 social networking apps on the Apple App Store.

That makes Wizz a relatively successful but still niche social network the kind that can avoid the scrutiny heaped on bigger tech platforms. And since Wizz is a French app, it does not have to report child safety issues to U.S. authorities, experts told NBC News. The app also has no parental controls, according to Bark, a company that makes parental control products.

John Shehan, senior vice president of the exploited children division and international engagement for the National Center for Missing and Exploited Children (NCMEC), a nonprofit group tasked by the U.S. government with tracking reports of child sexual abuse material online, said his organization has received more than 100 reports from members of the public about minors allegedly sextorted on Wizz this year, putting the app behind only Snapchat and Instagram for such reports.

Sextortion is an increasingly common online crime in which people are enticed into sending sexually explicit photos. Once the photos are sent, the receiver of the images threatens to share them online or with family or friends unless the victim sends money.

Thats just people knowing to report to the cyber tipline, so the incident rate could be much much higher, Shehan said.

According to the Canadian Centre for Child Protection (C3P), a national charity focused on child safety, Wizz was the seventh-most mentioned platform in sextortion reports to its tip line between June 2022 and last month.

Stephen Sauer, director of the C3Ps tip line, said they received 75 reports in relation to Wizz since Jan. 1, compared to 15 reports in the six months prior. He said he could not speak to the reasons for the uptick.

In the last six months, around 90% of C3Ps reports involving Wizz were related to the alleged sextortion of young people, he said. He added that some young users in these cases, ranging from 13 to 17 years old, viewed or talked about Wizz as a dating app.

They are often looking to connect with other similar-aged peers through the app and thats how they get extorted, Sauer said.

Its unclear who was behind the sextortion or if the sextortion efforts were part of a larger pattern of online criminality.

The app has become popular enough to spawn its own genre of online content in which people post videos of themselves using the app and attempting to woo people they find attractive. In many TikTok videos, users have shown screenshots of their chats on Wizz, where they test their rizz, a slang term used by young people to describe someones level of charisma or attractiveness. It rhymes with the apps name Wizz, which teens picked up on and turned into rizz challenges on Wizz.

When contacted about alleged safety issues on the app, Wizz provided a press release in which CEO Aymeric Roff said: Wizz understands parents concerns about their teenagers online safety. We are committed to providing a safe platform for everyone, including young adults and teenagers.

Abuse of the app by predators fits in with what authorities and experts say is a broader rise in sextortion schemes targeting minors online. Recent studies have linked harmful content and predatory activity to teen social apps.

Social apps geared toward connecting teens such as Yubo, Wizz and Wink have been released in the last decade to varying levels of popularity. Experts say platforms with a chat feature and young user base inherently come with risks, including popular platforms where adults and minors can interact.

Its an issue that has been the subject of a growing body of research.

Teen dating and social apps are among the online venues used by adults to meet and communicate with minors, according to a research paper published last year by Brian Neil Levine, director of the University of Massachusetts Amherst Cybersecurity Institute, on the efficacy of investigations of online child exploitation material.

A study published in the American Academy of Pediatrics journal last year analyzed Apple App Store reviews on friendship apps marketed toward teens, including Wizz. Its findings point to an alarming presence of predatory and fraudulent content in apps marketed towards young adolescents.

In February, the FBI warned that the financial sextortion of minors online has become a global crisis, based on thousands of such reports it received last year.

Wizz does make some efforts to prevent adults from interacting with minors. The app uses third-party services to moderate complaints made by users through the app, according to its press release. Wizz matches users with individuals in their age range to ensure user safety and estimates users ages when they upload a selfie through an artificial intelligence tool provided by Yoti, an identity technology company. According to Wizzs privacy policy, if Yoti cannot provide an accurate enough age estimation, the app uses AI data company Hive to manually attempt to validate a users age.

The use of AI to determine ages has been scrutinized, as such systems can perpetuate and even exaggerate human biases.

As we want to make sure that our community members can only connect with people that are in the same age range, we are verifying every users age via our trusted partner Yoti, Wizz says on a part of its website dedicated to questions about safety. It added that the company manually reviews pictures of people who claim the system made a mistake while identifying their age.

Wizz also says in its rules of acceptable use that users who break its rules can have their accounts suspended, and that the company may report illegal activity to law enforcement.

Hive did not respond to a request for comment. A spokesperson for Yoti directed NBC News to Wizz.

Some child safety experts have questioned the effectiveness of that system. Most social media apps have a form of age verification, with some using AI like Wizz and others going as far as to require users to upload pictures of their government ID. But few rely on it to ensure safety in relation to the core function of their app.

Detective Sgt. Katie Feehan of the New Jersey State Polices Internet Crimes Against Children Unit said Wizzs age verification process gives young users a false sense of security that they are talking to users their age.

Any app that has a chat feature and kids are on is potentially dangerous, she added. And if these sextortion bad actors are on the Wizz app, its something that parents need to know about and kids need to know, you know, the dangers of using it.

Shehan of the NCMEC said its common for people in sextortion schemes to create fictitious accounts posing as typically an attractive young female. And theyre specifically enticing young boys to produce a sexually-explicit image of themselves.

Sauer said that some of C3Ps reports indicated that online predators were able to lie about their age on Wizz to target minors.

The bigger concern is that theres a mix of adults and youth on the platform and that the distinction between those two groups doesnt seem to be restricted based on what were seeing, he said.

Bark, the parental control company, criticized the apps age verification system in a review on its website, which said the risk of predation is huge on Wizz.

Kelly Newcom, a parent and founder of Brave Parenting, a Texas-based online safety education group for parents, said in an interview that she thinks Wizz has way more dangers than it has actual benefits to make real friends.

In lieu of controls for parents, some schools have started to step in to warn parents about the potential uses of Wizz. In the last four months, five schools in the U.S. and the United Kingdom shared online safety infographics and guides about Wizz with parents.

Khadijah Khogeer is an intern on NBC News' tech desk.

See more here:
Wizz offered a safe space for teens sextortion soon followed - NBC News

Read More..

Trusted Internet of Things (IoT) Device Network-Layer Onboarding … – Computer Security Resource Center

Date Published: September 8, 2020 Comments Due: Email Questions to:

Susan Symington (MITRE), W. Polk (NIST), Murugiah Souppaya (NIST)

This paper provides background information on trusted IoT device network-layer onboarding and lifecycle management. It defines a taxonomy of onboarding characteristics that will enable stakeholders to have a common language to describe and express their onboarding capabilities and fully capture the elements required to characterize potential onboarding solutions in protocol and product-agnostic terms. It also presents a proposed set of security considerations for network-layer onboarding.

We define network-layer onboarding of an IoT device as the provisioning of network credentials to that device at the time of the devices deployment on a network. The trusted aspect of network-layer onboarding indicates that the device is provided with unique network credentials after the device and the network have had the opportunity to authenticate each other and establish an encrypted channel without user knowledge of the credentials, thereby mitigating unauthorized credential disclosure.

The benefits of a using a trusted network-layer onboarding mechanism are that it helps:

Internet of Things (IoT) devices are typically connected to a network. The steps performed to provision a device with its network credentials are referred to as network-layer onboarding (or simply, onboarding). This paper proposes a taxonomy for IoT device onboarding that can clearly express the capabilities of any particular onboarding solution. By providing a common language that describes and clarifies various onboarding characteristics, this taxonomy assists with discussion, characterization, and development of trusted onboarding solutions that can be adopted broadly. To provide context for the proposed onboarding taxonomy and to try to ensure its comprehensiveness, this paper also describes a generic trusted onboarding process, defines onboarding functional roles, discusses onboarding-related aspects of IoT lifecycle management, presents onboarding use cases, and proposes recommended security capabilities for onboarding.

None selected

Visit link:
Trusted Internet of Things (IoT) Device Network-Layer Onboarding ... - Computer Security Resource Center

Read More..

Why Business Leaders Plan to Invest Heavily in Automation – Kyndryl

Benefits of automation in business

Kyndryls Advanced Delivery approach is designed to help our clients meet these goals. Advanced Delivery enables our clients to be automated, orchestrated and intelligent. It combines our key technologies, Kyndryl Bridge and Intelligent Automation, with dedicated and focused delivery teams that integrate with our customers application teams.

This two-pronged approach of technology and people-based support gets the most out of knowledge already embedded in the massive scale of operations and maintains our intimate customer connections. Today, we manage millions of applications and IT components, many exabytes of storage, perform tens of millions of automated Day 0, 1, and 2 operations every month, and much more. Operating at this scale provides the learnings that feed critical information into our AIOps technology, giving us the insights needed to automatically take necessary actions.

We want to be proactive ideally, we want to fix it before it breaks. The advanced capabilities of Kyndryl Bridge can help pinpoint and anticipate what and where incidents will happen in an IT environment and do whats necessary to take preventive actions. Since itslaunch last September, early customers of Kyndryl Bridge have already achieved up to 75% reduction in incident volume.

Additionally, our experience shows us that end-of-life and end-of-service devices in an IT estate are risky and often big contributors to problems in IT environments. Kyndryl Bridge AIOps technology provides real-time reporting and forecasting for hardware and software approaching end-of-life. This proactive identification supports better capital allocation, prioritizes cloud migration projects and identifies investment targets for additional resiliency expenses.

Another at-risk area in IT is best practice alignment. Microsoft, VMWare, SAP and others constantly publish new best practice configurations for their hardware, operating systems and software. With additional challenges like security and compliance recommendations from organizations such as the Center for Internet Security (CIS), it can be overwhelming to keep up with the latest changes.

Drifting from these configurations happens over time. So, our objective is to keep a best practices alignment of 90% or better. We use policy-based automation technology to ensure that deviations from these settings are automatically fixed when detected.

Kyndryl has a simple goal: ensure at least 95% of the interactions with an IT environment are driven through automation. Whether its use cases like fulfilling a service request, implementing a change or responding to an incident, or automatically initiating resiliency protocols when seismic events happen we believe our automation can deliver the best outcome.

Only 20% of companies identify themselves as mature in automation, according to recent studies. Within this group, 70% indicated they could not achieve that status without a third party. Partnership is the most important factor for success providing implementation and additional managed services for automation after implementation.

Thats where Kyndryl excels. Kyndryls Advanced Delivery with automation and Kyndryl Bridge AIOps technology can proactively identify issues, automatically fix problems and implement policy-based guardrails that ensure your critical IT and application environment.

We know things happen. When they do, we are prepared to quickly offer quality responses, which is critical. It can be the difference between a transitory and momentary blip in service or a business disaster that puts customers in the news for the wrong reasons.

View post:
Why Business Leaders Plan to Invest Heavily in Automation - Kyndryl

Read More..

Global DDoS Protection Market Size and Forecast | Nexusguard Ltd … – Chatfield News-Record

New Jersey, United States The Global DDoS Protection Market Report is a comprehensive analysis of the sector, aimed at providing organizations and stakeholders with valuable insights to make informed decisions. The report delves into significant market trends, growth catalysts, challenges, and opportunities. It begins with an in-depth analysis of the market, defining its scope and segmentation. The study explores the markets characteristics, including the factors that drive growth, present challenges, and potential opportunities, enabling businesses to anticipate market developments and gain a competitive edge by understanding current and upcoming trends.

Geographic regions such as North America, Europe, the Asia-Pacific region, South America, the Middle East, and Africa are thoroughly analyzed in the reports regional section. Market trends, key players, and expansion prospects in each region are assessed. Additionally, the research considers economic conditions, governmental policies, and consumer preferences that influence market growth in these areas. The regional analysis provides a comprehensive view of the Global DDoS Protection market, empowering companies to tailor their strategies according to specific regional characteristics.

Get Full PDF Sample Copy of Report: (Including Full TOC, List of Tables & Figures, Chart) @https://www.verifiedmarketresearch.com/download-sample/?rid=2762

Key Players Mentioned in the Global DDoS Protection Market Research Report:

Nexusguard Ltd, Dosarrest Internet Security Ltd, Imperva, Arbor Networks Corero Network Security Radware Ltd., Neustar Akamai Technologies Cloudflare F5 Networks, Inc.

The growth of the Global DDoS Protection market is significantly shaped by key vendors. The report highlights their market share, product portfolio, strategic objectives, and financial performance, underscoring their importance. Notably, important suppliers are acknowledged for fostering innovation, investing in research and development, and forming strategic partnerships with other businesses to enhance their market position. The competitive landscape is thoroughly evaluated, shedding light on major vendors tactics to gain a competitive edge. Businesses aiming to enter or strengthen their position in the global Global DDoS Protection market must fully comprehend the roles played by these significant providers.

The Global DDoS Protection Market Report is recommended for several reasons. Firstly, it offers a detailed examination of the market, considering critical factors such as market size, growth drivers, challenges, and opportunities. This research provides insightful information that aids organizations in formulating effective action plans and making informed decisions. Additionally, the study presents a comprehensive competitive landscape, allowing customers to benchmark their performance against major competitors and identify potential alliances. The reports geographical analysis helps businesses grasp market dynamics in different regions, enabling them to adapt their strategies accordingly. For companies seeking to understand and thrive in the Global DDoS Protection industry, this report proves to be an invaluable resource.

Global DDoS ProtectionMarket Segmentation:

DDOS PROTECTION MARKET, BY ORGANIZATION SIZE

Large Companies Small and Medium Businesses

DDOS PROTECTION MARKET, BY APPLICATION AREA

Endpoint Application Network Database

DDOS PROTECTION MARKET, BY DEPLOYMENT MODEL

Cloud-based On-premise Hybrid

DDOS PROTECTION MARKET, BY COMPONENT

Solution

Service

Managed Service

Professional Service

Training and education

DDOS PROTECTION MARKET, BY VERTICAL

Government and Defense

IT and Telecommunications

Banking, Financial Services, and Insurance (BFSI)

Retail

Healthcare

Energy and Utilities

Others

Inquire for a Discount on this Premium Report@ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=2762

What to Expect in Our Report?

(1) A complete section of the Global DDoS Protection market report is dedicated for market dynamics, which include influence factors, market drivers, challenges, opportunities, and trends.

(2) Another broad section of the research study is reserved for regional analysis of the Global DDoS Protection market where important regions and countries are assessed for their growth potential, consumption, market share, and other vital factors indicating their market growth.

(3) Players can use the competitive analysis provided in the report to build new strategies or fine-tune their existing ones to rise above market challenges and increase their share of the Global DDoS Protection market.

(4) The report also discusses competitive situation and trends and sheds light on company expansions and merger and acquisition taking place in the Global DDoS Protection market. Moreover, it brings to light the market concentration rate and market shares of top three and five players.

(5) Readers are provided with findings and conclusion of the research study provided in the Global DDoS Protection Market report.

Key Questions Answered in the Report:

(1) What are the growth opportunities for the new entrants in the Global DDoS Protection industry?

(2) Who are the leading players functioning in the Global DDoS Protection marketplace?

(3) What are the key strategies participants are likely to adopt to increase their share in the Global DDoS Protection industry?

(4) What is the competitive situation in the Global DDoS Protection market?

(5) What are the emerging trends that may influence the Global DDoS Protection market growth?

(6) Which product type segment will exhibit high CAGR in future?

(7) Which application segment will grab a handsome share in the Global DDoS Protection industry?

(8) Which region is lucrative for the manufacturers?

For More Information or Query or Customization Before Buying, Visit @ https://www.verifiedmarketresearch.com/product/global-ddos-protection-market-size-and-forecast-to-2025/

About Us: Verified Market Research

Verified Market Research is a leading Global Research and Consulting firm that has been providing advanced analytical research solutions, custom consulting and in-depth data analysis for 10+ years to individuals and companies alike that are looking for accurate, reliable and up to date research data and technical consulting. We offer insights into strategic and growth analyses, Data necessary to achieve corporate goals and help make critical revenue decisions.

Our research studies help our clients make superior data-driven decisions, understand market forecast, capitalize on future opportunities and optimize efficiency by working as their partner to deliver accurate and valuable information. The industries we cover span over a large spectrum including Technology, Chemicals, Manufacturing, Energy, Food and Beverages, Automotive, Robotics, Packaging, Construction, Mining & Gas. Etc.

We, at Verified Market Research, assist in understanding holistic market indicating factors and most current and future market trends. Our analysts, with their high expertise in data gathering and governance, utilize industry techniques to collate and examine data at all stages. They are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research.

Having serviced over 5000+ clients, we have provided reliable market research services to more than 100 Global Fortune 500 companies such as Amazon, Dell, IBM, Shell, Exxon Mobil, General Electric, Siemens, Microsoft, Sony and Hitachi. We have co-consulted with some of the worlds leading consulting firms like McKinsey & Company, Boston Consulting Group, Bain and Company for custom research and consulting projects for businesses worldwide.

Contact us:

Mr. Edwyne Fernandes

Verified Market Research

US: +1 (650)-781-4080US Toll-Free: +1 (800)-782-1768

Email: sales@verifiedmarketresearch.com

Website:- https://www.verifiedmarketresearch.com/

Read the original here:
Global DDoS Protection Market Size and Forecast | Nexusguard Ltd ... - Chatfield News-Record

Read More..