Page 1,262«..1020..1,2611,2621,2631,264..1,2701,280..»

Proton users can now secure all their family members with one … – TechRadar

New and existing Proton users can now secure the digital life of all their family members with just one subscription.

Proton Family is an all-in-one plan that gives access to its premium VPN service, secure email, encrypted cloud storage and calendar to up to six users.

The Swiss-based privacy company seeks to fight back today's growing cyber threats, making it easier to protect the most vulnerable members of the household.

"As a parent, I am eager to teach my children the proper ways to approach email, cloud storage, and internet security from the beginning. I know I am not alone in this," said Proton's Product Lead David Dudok de Wit.

Recent data shows, in fact, that about 7 out of 10 families have experienced cyber threats in some forms. The great majority of parents (90%) are worried for the safety of their children's online identity, too. Such concerns are understandable being that kids are increasingly surfing the web from a very young age nowadays.

Downloading and correctly using a virtual private network or any other security tools is something that might be tricky also for the eldest of the family who may not fully understand the risks of such an ever-changing online world.

"The Proton Family plan takes us one step closer to our mission of making privacy the default for everyone,"said Dudok de Wit.

An all-in-one plan to protect all your loved ones, Proton Family gives premium access to all the products and features under the company's belt for up to six members of your family.

At the time of writing, this includes its Proton VPN, Proton Mail, Proton Calendar and Proton Drive coming with a 3TB of shared storage space and a 20GB bonus to be added every year. Proton Pass, the provider's very own password manager now available in beta, will also be included once made available to all users.

Starting from what works out to be a monthly fee of $19.99, users can sign up directly or simply upgrade their existing subscription.

Dudok de Wit said: "A family plan has been among our most sought-after services, and I am delighted to announce its launch today."

Compare today's best overall VPNs

Originally posted here:
Proton users can now secure all their family members with one ... - TechRadar

Read More..

AI could be ‘more important development’ than internet – RTE.ie

The Director of the National Cyber Security Centre (NCSC) has warned that artificial intelligence could prove to be a more important development than the internet.

Appearing before the Oireachtas Foreign Affairs and Defence Committee, the director of the NCSC, Dr Richard Browne, said that a year ago he would likely have been warning the committee about the challenges posed by cryptography and the shift to cloud computing.

"All of these are still factors today but are entirely overshadowed by the first public outings of generally available Artificial Intelligence", he told members.

Separately the committee was told of the "largely inconsequential" impact of cyber-attacks in terms of the overall Russian military effort.

Whilst telling TDs and Senators that cyber remains a "key tool in the armoury of any state", Dr Browne added that Ukraine had been prepared for such attacks due to years of "similar offensive actions" and because of "massive external support from public and private sector organisations".

Dr Browne also updated members of the committee on efforts to expand the NCSC.

Following the cyber-attack on the Health Service Executive, a capacity review of the NCSC was launched.

Dr Browne said that the organisation has increased its staff numbers from 25 staff to 52 today, adding that there is scope to grow to 62 this year.

Matt Carthy, Sinn Fin's Foreign Affairs and Defence spokesperson, asked if the NCSC would have concerns about other public bodies that could be vulnerable to cyber-attack.

Dr Browne told members that there were always risks, but that the NCSC acts quickly when issues arise, so at this point he did not have such concerns.

Separately, the committee was told that Government employees are generally advised not to have any applications on their phone that they do not need for business.

"Simply because every single application has some degree of risk", Dr Browne explained.

Following an assessment by the NCSC earlier this year, Government workers were asked to remove the TikTok app from official devices.

Dr Browne told members that the risks posed by different apps are kept under constant review.

More here:
AI could be 'more important development' than internet - RTE.ie

Read More..

Radiation from the cell phone devices has been linked to cancer – Daily Mail

The FCC says the radiation coming from your cellphone is no big deal. A cancer surgeon friend told me he begs to differ.

While public health experts continue to debate the issue and the public's own worries may be overblown, perhaps the best approach is 'better safe than sorry.'

That's certainly been the approach of the attorneys for the manufacturers, who have helped craft their mobile phone's manuals and legal notices.

Modern iPhones, including the 14 Pro Max and the iPhone SE, recommendthat their customers 'use a hands-free option, such as the built-in speakerphone, headphones or other similar accessories' to 'reduce exposure to RF [radio frequency] energy.'

These radio frequency exposures, according toGermany's Federal Office for Radiation, can be exceptionally high from some mobile devices with a few energetic Android phones topping the list.

You have to wonder: What do the manufacturers know that we don't?

'People are addicted to their smartphones,' according toJoel Moskowitz, a researcher in the University of California Berkeley's School of Public Health.

'We use them for everything now, and, in many ways, we need them to function in our daily lives,' Moskowitz said. 'I think the idea that they're potentially harming our health is too much for some people.'

As the director of Berkeley's Center for Family and Community Health, Moskowitz has made studying the biological effects of the radio frequency energy on the human body a research priority since 2009.

Kim Komando hosts a weekly call-in show where she provides advice about technology gadgets, websites, smartphone apps and internet security.

Listen on 425+ radio stations or get the podcast. And join over 400,000 people who get her free 5-minute daily email newsletter.

But he's picking up where US federal regulators, in his view, dropped the ball.

'Cellphones, cell towers and other wireless devices are regulated by most governments,' said Moskowitz, with one caveat. 'Our government, however, stopped funding research on the health effects of radiofrequency radiation in the 1990s.'

In 2020, Moskowitz and his colleagues published a review of 46 case-control health studies on the issue of cell phones and health, which they published in the International Journal of Environmental Research and Public Health.

'Our main takeaway,' Moskowitz says, 'is that approximately 1,000 hours of lifetime cellphone use, or about 17 minutes per day over a 10-year period, is associated with a statistically significant 60 percent increase in brain cancer.'

Not every researcher on the topic takes Moskowitz's grim view, of course. And the UN's World Health Organization currently maintains that, as yet, 'no adverse health effects have been established as being caused by mobile phone use.'

So, what do I do?

I play it safe and keep my phone away from my body and head as much as possible. (Yes, I'm that person taking calls on my AirPods or speakerphone.)

And I take my cues from overseas agencies, likeGermany's Federal Office for Radiation(Bundesamt fr Strahlenschutz) which lists data on each mobile phone'sspecific absorption rate (SAR).

Some phones, it turns out, emit more radiation than others. But what exactly are we measuring with the specific absorption rate?

SAR, which is calculated inwatts per kilogram of body weight, quantifies how muchenergy is absorbed per unit mass by the human body when it's exposed to a radio frequency.

Typically, it's based on an absorption value recorded when when you make a call with the phone up to your ear. In the US, theFederal Communications Commission (FCC) even uses a dummy head to calculate SAR values for cell phones.

But, really you don't need to know all the details, just that the legal limit is 1.6 watts/kg here in the US.

See where your cell phone falls on the list, compiled by Digital Information World.

These five models emit some of the strongest radiation on the market: Motorola Edge ( 1.79 w/kg); OnePlus 6T (1.55 w/kg); Sony Xperia XA2 Plus (1.41 w/kg) Google Pixel 3 XL (1.39w/kg); and the Google Pixel 4a (1.37w/kg) in a tie with theOppo Reno5 5G (1.37 w/kg).

Men, don't store your phone in your pant pockets. Ladies, keep it out of your bra.

Not far behind, were the Google Pixel 3 (1.33 w/kg), Huawei's P Smart (1.27 w/kg) and the OnePlus 9 (1.26 w/kg).

If you're concerned about your SAR risks, but don't feel like the hassle of keeping your phone at a distance all the time, these are the phones known to emit the least radiation: the Samsung Galaxy Note10+ 5G (0.19 w/kg); Samsung's Galaxy Note10 (0.21w/kg); the Samsung Galaxy A80 (0.22 w/kg); LG G7 ThinQ (0.24 w/kg); and the Motorola Razr 5G (0.27w/kg).

And given the warnings in the manuals, whatabout the iPhone?

Well, it falls somewhere in the middle. That iPhone SE with that warning gives off a SAR or 0.98w/kg.

It'scomparableto other popular models: iPhone 11 (0.95w/kg); iPhone 12 (0.98w/kg); iPhone 13 (0.99w/kg); and iPhone 14 (0.98w/kg).

Visit link:
Radiation from the cell phone devices has been linked to cancer - Daily Mail

Read More..

Interview With a Crypto Scam Investment Spammer Krebs on … – Krebs on Security

Social networks are constantly battling inauthentic bot accounts that send direct messages to users promoting scam cryptocurrency investment platforms. What follows is an interview with a Russian hacker responsible for a series of aggressive crypto spam campaigns that recently prompted several large Mastodon communities to temporarily halt new registrations. According to the hacker, their spam software has been in private use until the last few weeks, when it was released as open source code.

Renaud Chaput is a freelance programmer working on modernizing and scaling the Mastodon project infrastructure including joinmastodon.org, mastodon.online, and mastodon.social. Chaput said that on May 4, 2023, someone unleashed a spam torrent targeting users on these Mastodon communities via private mentions, a kind of direct messaging on the platform.

The messages said recipients had earned an investment credit at a cryptocurrency trading platform called moonxtrade[.]com. Chaput said the spammers used more than 1,500 Internet addresses across 400 providers to register new accounts, which then followed popular accounts on Mastodon and sent private mentions to the followers of those accounts.

Since then, the same spammers have used this method to advertise more than 100 different crypto investment-themed domains. Chaput said that at one point this month the volume of bot accounts being registered for the crypto spam campaign started overwhelming the servers that handle new signups at Mastodon.social.

We suddenly went from like three registrations per minute to 900 a minute, Chaput said. There was nothing in the Mastodon software to detect that activity, and the protocol is not designed to handle this.

One of the crypto investment scam messages promoted in the spam campaigns on Mastodon this month.

Seeking to gain a temporary handle on the spam wave, Chaput said he briefly disabled new account registrations on mastodon.social and mastondon.online. Shortly after that, those same servers came under a sustained distributed denial-of-service (DDoS) attack.

Chaput said whoever was behind the DDoS was definitely not using point-and-click DDoS tools, like a booter or stresser service.

This was three hours non-stop, 200,000 to 400,000 requests per second, Chaput said of the DDoS. At first, they were targeting one path, and when we blocked that they started to randomize things. Over three hours the attack evolved several times.

Chaput says the spam waves have died down since they retrofitted mastodon.social with a CAPTCHA, those squiggly letter and number combinations designed to stymie automated account creation tools. But hes worried that other Mastodon instances may not be as well-staffed and might be easy prey for these spammers.

We dont know if this is the work of one person, or if this is [related to] software or services being sold to others, Chaput told KrebsOnSecurity. Were really impressed by the scale of it using hundreds of domains and thousands of Microsoft email addresses.

Chaput said a review of their logs indicates many of the newly registered Mastodon spam accounts were registered using the same 0auth credentials, and that a domain common to those credentials was quot[.]pw.

The domain quot[.]pw has been registered and abandoned by several parties since 2014, but the most recent registration data available through DomainTools.com shows it was registered in March 2020 to someone in Krasnodar, Russia with the email address edgard011012@gmail.com.

This email address is also connected to accounts on several Russian cybercrime forums, including __edman__, who had a history of selling logs large amounts of data stolen from many bot-infected computers as well as giving away access to hacked Internet of Things (IoT) devices.

In September 2018, a user by the name (phonetically Zipper in Russian) registered on the Russian hacking forum Lolzteam using the edgard0111012@gmail.com address. In May 2020, Zipper told another Lolzteam member that quot[.]pw was their domain. That user advertised a service called Quot Project which said they could be hired to write programming scripts in Python and C++.

I make Telegram bots and other rubbish cheaply, reads one February 2020 sales thread from Zipper.

Quotpw/Ahick/Edgard/ advertising his coding services in this Google-translated forum posting.

Clicking the open chat in Telegram button on Zippers Lolzteam profile page launched a Telegram instant message chat window where the user Quotpw responded almost immediately. Asked if they were aware their domain was being used to manage a spam botnet that was pelting Mastodon instances with crypto scam spam, Quotpw confirmed the spam was powered by their software.

It was made for a limited circle of people, Quotpw said, noting that they recently released the bot software as open source on GitHub.

Quotpw went on to say the spam botnet was powered by well more than the hundreds of IP addresses tracked by Chaput, and that these systems were mostly residential proxies. A residential proxy generally refers to a computer or mobile device running some type of software that enables the system to be used as a pass-through for Internet traffic from others.

Very often, this proxy software is installed surreptitiously, such as through a Free VPN service or mobile app. Residential proxies also can refer to households protected by compromised home routers running factory-default credentials or outdated firmware.

Quotpw maintains they have earned more than $2,000 sending roughly 100,000 private mentions to users of different Mastodon communities over the past few weeks. Quotpw said their conversion rate for the same bot-powered direct message spam on Twitter is usually much higher and more profitable, although they conceded that recent adjustments to Twitters anti-bot CAPTCHA have put a crimp in their Twitter earnings.

My partners (Im programmer) lost time and money while ArkoseLabs (funcaptcha) introduced new precautions on Twitter, Quotpw wrote in a Telegram reply. On Twitter, more spam and crypto scam.

Asked whether they felt at all conflicted about spamming people with invitations to cryptocurrency scams, Quotpw said in their hometown they pay more for such work than in white jobs referring to legitimate programming jobs that dont involve malware, botnets, spams and scams.

Consider salaries in Russia, Quotpw said. Any spam is made for profit and brings illegal money to spammers.

Shortly after edgard011012@gmail.com registered quot[.]pw, the WHOIS registration records for the domain were changed again, to msr-sergey2015@yandex.ru, and to a phone number in Austria: +43.6607003748.

Constella Intelligence, a company that tracks breached data, finds that the address msr-sergey2015@yandex.ru has been associated with accounts at the mobile app site aptoide.com (user: CoolappsforAndroid) and vimeworld.ru that were created from different Internet addresses in Vienna, Austria.

A search in Skype on that Austrian phone number shows it belongs to a Sergey Proshutinskiy who lists his location as Vienna, Austria. The very first result that comes up when one searches that unusual name in Google is a LinkedIn profile for a Sergey Proshutinskiy from Vienna, Austria.

Proshutinskiys LinkedIn profile says he is a Class of 2024 student at TGM, which is a state-owned, technical and engineering school in Austria. His resume also says he is a data science intern at Mondi Group, an Austrian manufacturer of sustainable packaging and paper.

Mr. Proshutinskiy did not respond to requests for comment.

Quotpw denied being Sergey, and said Sergey was a friend who registered the domain as a birthday present and favor last year.

Initially, I bought it for 300 rubles, Quotpw explained. The extension cost 1300 rubles (expensive). I waited until it expired and forgot to buy it. After that, a friend (Sergey) bought [the] domain and transferred access rights to me.

Hes not even an information security specialist, Quotpw said of Sergey. My friends do not belong to this field. None of my friends are engaged in scams or other black [hat] activities.

It may seem unlikely that someone would go to all this trouble to spam Mastodon users over several weeks using an impressive number of resources all for just $2,000 in profit. But it is likely that whoever is actually running the various crypto scam platforms advertised by Quotpws spam messages pays handsomely for any investments generated by their spam.

According to the FBI, financial losses from cryptocurrency investment scams dwarfed losses for all other types of cybercrime in 2022, rising from $907 million in 2021 to $2.57 billion last year.

Update, May 25, 10:30 a.m.: Corrected attribution of the Austrian school TGM.

Read more here:
Interview With a Crypto Scam Investment Spammer Krebs on ... - Krebs on Security

Read More..

NordLayer’s new browser extension offers all its top VPN tools in … – TechRadar

NordLayer - one of our picks for the best business VPN - has launched a new browser extension that incorporates the features found in the desktop version of the network access security solution.

Formerly known as NordVPN Teams, NordLayer is part of the NordSec group, which includes among its products one of the best VPNs, NordVPN, and the best password manager for security, NordPass. NordLayer is B2B focused, providing a cybersecurity service that is scalable.

NordLayer claims that the extension, which is compatible with Google Chrome, Mozilla Firefox, and Microsoft Edge browsers, "introduces a new way of working for teams operating with hybrid-cloud resources while retaining stable and fast connection speeds and robust security."

The company also claims that it offers a lightweight alternative for firms to maintain the same security standards offered by the desktop app, as well as offering fast web browsing speeds. In addition, users can access multiple private gateways at the same time.

The NordLayer Browser Extension defines a simple, intuitive, and effective security approach developed by NordLayer. This add-on is an alternative solution for enriching existing ways to secure online activities, noted Artras Bubokas, a product manager atNordLayer.

The company claims access to web-based company resources if quick and easy with the new extension, as well as solving potential problems with OS compatibility that may occur using the NordLayer desktop app, as only the browser is used. Bubokas claims that "its a perfect solution for those who have devices without the usual operating systems, like ChromeOS."

It also only encrypts data at the browser level, which is something to take into consideration. However, this does mean that internet usage is reduced, which improves speeds and performance as compared to the desktop version.

Bubokas also adds that "the extension comes as a very handy and quick solution to provide secure internet access in a few clicks.

Read more here:
NordLayer's new browser extension offers all its top VPN tools in ... - TechRadar

Read More..

Data Protection Standards For Cross Border Data Transfers In India: Suggestive Approaches And Way Forward – Live Law – Indian Legal News

Global data flows have substantially risen in recent years, along with trade in digital services across borders. As per the Report published by the World Bank, in 2020, global internet traffic was estimated to be approximately three zettabytes which counts to one GB per day per person. This volume is expected to double fold itself in the coming years. Such a huge amount of data flow is pushing the growth of International trade. Cross-border data flows facilitate trade in goods, enhancing productivity and reducing costs; it also serves as the primary means of transacting in digital services. Cross-border data flows, and international trade are interdependent, and cross-border data transfer is one of the key contributors to the exponential growth of international trade. In todays world, electronic payment systems, internet-based advertising and retailing, and cloud computing have become integral parts of almost all businesses, irrespective of the sector they operate in. In fact, it is difficult to envision an international trade transaction that does not involve data transfer.

A well-formulated legal framework for cross-border data transfer is essential for the economic growth of any country and should be the top priority looking at the ever-increasing rate of global data flows and its potential misuse in terms of national security, data breaches, and privacy concerns. The aim of such a framework is to ensure that personal data is adequately protected during the transfer process and not subject to misuse or abuse.

Currently, there are several models for cross-border data transfers, including the European Unions General Data Protection Regulations (GDPR), the Asia-Pacific Economic Cooperation (APEC) Privacy Framework, and the United States (US) - European Union (EU) Privacy Shield Framework.

The GDPR is one of the most comprehensive frameworks for cross-border data transfers. It applies to all businesses that process the personal data of EU citizens, regardless of where the business is located. The GDPR requires businesses to obtain explicit consent from individuals before collecting their personal data and to provide clear information about how that data will be used. The APEC Privacy Framework is a voluntary framework that provides guidelines for protecting personal data in the Asia-Pacific region. It is based on nine privacy principles, including the collection limitation principle, the data quality principle, and the security safeguards principle. The US-EU Privacy Shield Framework is a framework that allows businesses to transfer personal data between the EU and the US. It is based on the principles of notice, choice, accountability for onward transfer, security, data integrity and purpose limitation, access, and recourse.

Despite these frameworks, there is still a need for a more comprehensive legislative framework for cross-border data transfers. This is because many countries do not have laws that adequately protect personal data, and there is a lack of consistency between different frameworks.

Such as in India, there is a lack of a comprehensive legislative framework for cross-border data transfer. The Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011, under the Information Technology Act, 2000, require companies to obtain the individuals consent before transferring their sensitive personal data. Additionally, the Reserve Bank of India has issued guidelines for the outsourcing of financial services that require companies to ensure that the outsourcing of services does not result in a compromise of customer data.

India will soon introduce the Digital Personal Data Protection Bill 2023 (DPDP Bill) before the parliament this year. Clause 17 of the DPDP Bill talks about the transfer of personal data outside India. It states that The Central Government may, after an assessment of such factors as it may consider necessary, notify such countries or territories outside India to which a Data Fiduciary may transfer personal data, in accordance with such terms and conditions as may be specified. It appears that Central Government. may come up with certain rules under Clause 17 of the DPDP Bill, which lays down data protection standards that must be maintained by any country that intends to indulge in data transfer with India.

While framing the data protection standards under the rules, the following approaches and suggestions may be taken into consideration

A mature approach to regulating the cross border data transfers:

Among the three models for regulating cross-border data transfers, namely, the open model, the conditional model, and the control model, India may consider adopting a mid-approach between the open model and the conditional model, which is neither too stringent nor too loose, aiming to build a maintain a balance between countries growth and data privacy. Efforts should be made to promote international trade while safeguarding data subjects rights and national security and not hindering innovations and the financial growth of the economy. The best example of a conditional model is the EUs GDPR which majorly focuses on data subjects rights and safeguarding the privacy of the data subjects and, side by side, keeping mediocre compliances for the businesses. A similar approach is opted for by South Africa, Singapore, Japan, and various other countries in framing their cross-border data transfer regulations. Indian Government may also form their baselines in line with GDPR especially adopting their principles such as data localization with regard to cross-border data transfers and providing a comprehensive set of rights to the data subjects where they have full ownership and access to their data in every situation whatsoever and whenever. As India is a developing country aiming to become a five trillion-dollar economy by 2025, it wont be possible without fostering international trade, so India must keep its cross-border data compliance requirements flexible and relaxed that prioritizing business needs over individual rights. The US has a slacken data privacy standards for cross borders data transfers and keeps its country more open for ease of doing business for the entities.

Collective actions by the stakeholders for developing a culture of Data Free Flow with Trust:

No matter how stringent or loose a regulatory framework may be for cross-border transfers, it is more dependent on the foreign countries involved in the transfer arrangements to make their responsibility and duty-bound themselves to take all relevant technical, administrative, or social measures that the data they collect from the other country is safe and protected, and they adhere to all the due diligence requirements of the other countries law. This responsible behavior of the foreign country may develop bricks of trust among the countries so that they can indulge in international trade more and more with each other without any fear of the data of their country being misused or compromised. For this, India may conduct engagement programmes with communities of stakeholders that may help in understanding their interests and the challenges they may face while cross-border data transfers. This approach will increase the potential of the other stakeholders while dealing with the protection of the data transferred and enable a broader, more open, and more inclusive environment for cross border data transfers between stakeholders.

A modern and updated consent mechanism in case of data transferred outside India:

The Rules must provide a stricter approach to the consent mechanism in case of cross-border data transfer rather than following the traditional method of taking consent from the data subjects. As India has a low digital literacy rate, it is a challenge to take the actual consent of such digitally illiterate citizens who do not understand the terms and conditions, purpose, and type of data for which their consent is taken. The rules must provide what explicit consent means, and additional and separate consent must be taken in case the data is transferred outside India. The consent taken must be explicit, such as while ticking the consent checkbox; the terms and conditions and other relevant information regarding the data transfer must be in a text-to-speech format where the data subject is given the option to listen to the relevant information in their chosen language.

Time period for data breach notification:

Entrusting the business entities engaged in the cross border data transfers with a higher level of due diligence with regard to notification in case of any data breach. Once a determination of a data breach has been made by the business entity, it should immediately inform the Governments of the respective countries whose citizens data has been targeted and the data subjects whose personal data has been compromised as well so that instant measures can be taken from both ends. The term immediately implies that once the business entity has verified the existence of the breach or has reasonable certainty that it has occurred. In compliance with this, an electronic notification may be sent to the aggrieved data subjects clearly stating that a data breach has occurred and the appropriate measures to be taken further to protect their personal data or any other information in their online accounts.

Right to data portability:

One of the significant data subject rights in case of data transferred abroad is the right to data portability that ensures that the data subject can obtain, reuse, move, copy, or transfer its personal data from one internet infrastructure to another hassle-free. Especially when the personal data of the data subjects are shared with a foreign entity, the data subject should have the right to data portability and receive its personal data in a machine-readable and structured manner and can further transmit to another entity. Take an instance where a data subject has taken consultation from a hospital in Germany, and he now wants to move to a hospital in Australia. In such cases, the personal data shared by the data subjects in Germany must be provided to the data subjects in a well-structured manner so that such data can be further used by the data subject without any hindrance and fear of losing the data.

Additional due diligence requirements on the entities involved in cross-border data transfers-

Foreign entities indulging in cross-border data transfers must be obliged to adopt best practices for safeguarding the personal data of the data subjects. For this, requirements such as enhanced cyber security measures and infrastructure that protects against the misuse of data, easy complaint and grievance redressal mechanisms for the data subjects, conducting regular cyber security audits and data privacy impact assessments and risk assessments, regular monitoring and tracking of the different modus operandi of the bad actors for hampering the data privacy and taking immediate steps in case of risk detected. Foreign entities must adopt data protection by design and by default.

The future of global trade is highly dependent on how a countrys domestic regulations are framed and whether these regulations provide a wide scope for ease of doing business and lesser compliance requirements on the part of foreign countries. It wont be a cakewalk for a country like India, which has the largest population in the world, to frame regulations for cross-border data transfers as they have to put at stake the data of such a huge population and simultaneously ensure the data subjects rights, protecting national security, and promoting the countrys economic growth. The above-laid-down suggestive approaches may help the central Government while framing the rules for cross-border data transfer under the DPDP Bill and act as a foundational guideline for the policymakers.

******************

Details of the Authors

Present Position Senior Legal Associate, Data Privacy and Cyber Security, PriceWaterhouseCooper Services Ltd.

Former Assistant Legal Manager, Cyberlaw Division, Ministry of Electronics & Information Technology, Govt. of India

Email bhavnadu2017@gmail.com

Contact - 9717490199

Present Position Director, Public Policy, Chase India

Former Scientist E, Cyberlaw Division, Ministry of Electronics & Information Technology, Govt. of India

Email dhawal.gupta@gmail.com

Present Position Assistant Section Officer, Policy & Administration, Department of Fertilizer, Ministry of Chemical and Fertilizers, Govt. of India

Email jaychauhan4444@gmail.com

Go here to read the rest:
Data Protection Standards For Cross Border Data Transfers In India: Suggestive Approaches And Way Forward - Live Law - Indian Legal News

Read More..

DataBank Celebrates the Opening of the New Jersey Institute of … – PR Newswire

DataBank is a leader in supporting High Performance Computing (HPC) environments, providing adequate power density and cooling requirements for college research institutions.

DALLAS, May 25, 2023 /PRNewswire/ --DataBank, a leading provider of enterprise-class colocation, connectivity, and managed services, congratulates the New Jersey Institute of Technology(NJIT) on the opening of its Wulver High Performance Computing environment, now live in DataBank's Piscataway, NJ EWR2 data center.

"Research has propelled NJIT's growth as a leading national university, and partnering with DataBank will dramatically improve the performance of our research computing environment," said Atam Dhawan, interim provost and senior executive vice president. "This partnership supports NJIT's research mission to advance the knowledge base through new discoveries, and basic, applied and translational research and technology development."

NJIT's steady rise in research activity and output has necessitated the upgrade. NJIT is one of only 146 universities nationwide to earn the R1 ranking by Carnegie Classification the highest research designation and one of just three R1 universities in New Jersey. Research expenditures have surpassed $160 million, up nearly $70 million since 2010. NJIT comprises 150 research institutes, centers, and laboratories, up from 31 in 2010.

The university aims for national and international prominence in research through new discoveries in areas ranging from medical sensors and devices to robotics, to nanotechnology, to cybersecurity, to next-generation materials, among other topics of vital importance in basic, applied, and translational research. Five research clusters exist within the research enterprise of NJIT: Bioscience and Bioengineering; Data Science and Management; Environment and Sustainability; Materials Science and Engineering; and Robotics and Machine Learning.

DataBank is also announcing the creation of a new higher education program and partnership with NJIT where DataBank will offer internships, co-op, and scholarships to students at NJIT and other higher education institutions. "Tailoring this HPC hosting environment was a complicated effort that required close collaboration between key stakeholders from NJIT and DataBank," said Paul Attallah, national account manager at DataBank. "This teamwork inspired us to develop this mutually beneficial program. DataBank will benefit from the contributions of NJIT's students, and NJIT will give its students a chance to advance their careers."

DataBank delivers High Performance Computing environments to NJIT and other higher education institutions in support of their research programs as well as other organizations with requirements for high powered compute and storage.

DataBank and NJIT will celebrate the opening of its HPC environment at the Databank campus on May 31 and will host a live symposium later in 2023.

For more information about available services at Databank's colocation facilities or to request a quote, visit databank.comor call 800-840-7533.

About DataBank

DataBank enables the world's largest enterprises, technology, and content providers to consistently deploy and manage their infrastructure, applications, and data on the right platform, at the right time, in the right place. Our colocation and edge infrastructure footprint consists of 60+ data centers and 20 interconnection hubs in 30+ markets, on-ramps to an ecosystem of cloud providers, and a modular edge data center platform with virtually unlimited reach.

We combine these platforms with contract portability, managed security, compliance enablement, hands-on support, and a guarantee of 100% uptime availability, to give our customers absolute confidence in their IT infrastructure and the power to create a limitless digital future for their business.

To learn more or tour a facility, visit databank.com or call 1 (800) 840-7533.

SOURCE DataBank

See the original post here:
DataBank Celebrates the Opening of the New Jersey Institute of ... - PR Newswire

Read More..

Charles Hoskinson touts Cardano decentralization as ‘wake-up call’ for other cryptos – Finbold – Finance in Bold

In his most recent Cardano (ADA) update, the blockchain companys founder Charles Hoskinson has informed the public about the networks progress so far and touted the efforts of its team toward decentralization as a future standard to be used in cryptocurrency sector regulation.

Indeed, Hoskinson stressed the platforms advancement in the face of criticism, as well as detailing the plans for this year, such as global workshops on Cardano Improvement Proposal CIP-1694, writing a ton of really great code, with a special emphasis on decentralization efforts, as he explained in a video shared on May 25.

My belief is that well actually be substantially more decentralized than all cryptocurrencies on the market, which is one of the primary goals of these types of protocols.

Specifically, he argued that criticism is always going to be there, but in the long run, I think were going to win because we are winning together as opposed to a particular company, a particular agenda, or particular person. In his view:

Theres no greater example for that than when we have our moment where we get to measure Cardanos decentralization against the rest of the cryptocurrency space, and I think its going to be a wake-up call for all of them.

In Hoskinsons words, while Bitcoin (BTC) maximalists and others might dismiss it at first as academic waste, the decentralization metrics will probably make their way into regulatory standards, and when people start saying things like sufficiently decentralized and () what regulations should apply to cryptos based on their decentralization level, it will have a significant impact:

Those who are more decentralized will be treated like commodities and like protocols like TCP, and those who are more centralized are going to be treated unfavorably from that perspective.

Finally, the Cardano co-founder highlighted the importance of self-sovereignty, as well as pushing power to the edges and putting you in control of everything () as opposed to some of us as the entire point of the crypto sphere, which has also been the main driver for progress behind the Cardano project.

Meanwhile, the price of Cardano at press time stood at $0.36, recording a slight decline of 0.07% on the day and dropping 3.30% across the previous week, adding up to the 13.78% losses on its monthly chart, as per data retrieved by Finbold on May 26.

Watch the entire video below:

Read the original here:

Charles Hoskinson touts Cardano decentralization as 'wake-up call' for other cryptos - Finbold - Finance in Bold

Read More..

Cardanos Decentralization Will Be Wake-Up Call for Other Coins, Hoskinson Says – U.Today

Alex Dovbnya

Charles Hoskinson, founder of Cardano, recently addressed the cryptocurrency community, predicting that Cardano's increasing decentralization will send a wake-up call to the entire industry

Read U.TODAY on

Google News

In a recent YouTube address from Colorado, Charles Hoskinson, the founder of Cardano (ADA), stated that Cardanos increasing decentralization will serve as a wake-up call for the entire cryptocurrency industry.

Hoskinson underscored the project's relentless commitment and progress despite criticism, emphasizing that Cardano is becoming more decentralized and impactful by the day. As an ecosystem built entirely from scratch, he touted the Cardano project as an entity that continues to grow and strengthen each month, a development that other cryptocurrencies should take note of.

Elaborating on the implications of Cardano's robust decentralization, Hoskinson speculated that this development could eventually be institutionalized within cryptocurrency regulation. Decentralization metrics, he suggested, could become a core component of regulatory standards, serving as a litmus test for assessing the legality and regulatory treatment of various digital assets.

He further warned of a potential regulatory divide, where more centralized digital assets could face unfavorable conditions under the law.

Cardano's founder concluded by emphasizing the importance of self-sovereignty in the cryptocurrency space. This principle, he insists, has been the driving force behind the Cardano project.

His statement stands as a stark warning against the potential centralized control that could come with central bank digital currencies (CBDCs), and reaffirms his commitment to the principles of sound money and liberty.

Originally posted here:

Cardanos Decentralization Will Be Wake-Up Call for Other Coins, Hoskinson Says - U.Today

Read More..

Decentralization Revolution: TMS Network (TMSN) Projected to Lead Over Litecoin (LTC) and Cardano (ADA) | – Bitcoinist

The dawn of blockchain technology has propelled cryptos to newer heights. Litecoin (LTC) and Cardano (ADA) have stood out due to their groundbreaking innovations. However, TMS Network has emerged as the next prominent opportunity with its innovative decentralized platform.

TMS Network (TMSN) has made exceptional progress, with its token value skyrocketing by an astounding 4300% in its public presale phase. With such remarkable progress, TMS offers more excellent prospects ahead.

TMS Network is a pioneering decentralized trading platform that seeks to redefine the traditional trading sector. The platform offers an all-in-one solution to derivatives trading, enabling users to connect their wallets and trade any asset class. Furthermore, TMS Network (TMSN) provides a price aggregation feature that seamlessly pairs the best prices at execution.

TMS Network (TMSN) offers standout features such as non-custodial portfolio management, granting traders unwavering authority over their assets. This negates the need to rely on a third party, establishing security. With TMS Networks copy trader, investors can eliminate uncertainty and capitalize on the expertise of professionals.

TMS Network (TMSN) also offers MT4 And MT5 Compatibility Bridge, enabling TMSN traders to enhance their trading experience by integrating expert advisors and trading robots. In addition, traders can amplify their profitability by leveraging the on-chain analysis.

Moreover, TMS Network offers distinctive features of straight-through processing (STP). With TMS Network (TMSN), the orders made by traders are transmitted directly to liquidity providers, bypassing any involvement of a dealing desk. STP also eliminates price manipulation while accelerating transaction speeds.

TMS Network (TMSN) also rewards its token holders through commission revenue sharing. Token holders earn a share of the earnings generated from any trading activity on the platform. Also, TMSN token holders have a direct say in the platforms development, creating a strong incentive to drive up trading volume.

In its public presale phase, TMS Network (TMSN) has witnessed a significant surge in trading price for its native token, skyrocketing by 4300% from its initial value. Analysts highlight a remarkable upswing for the TMSN token, now trading at a discounted price of $0.097, projecting a potential jump of up to 100 times its current value by the end of 2023.

Litecoin has witnessed a slight bearish momentum in the last 24 hours, with the LTC price dropping to $92.43. This could be linked to price correction and uncertainty in the financial market.

In recent weeks, however, there has been a significant upswing in the value of Litecoin (LTC) due to increased transaction volumes. Litecoin (LTC) has also made continuous strides in becoming a viable payment method, fostering increased adoption of its blockchain infrastructure by businesses.

A favorable shift in investor sentiment has also proved beneficial for Litecoin (LTC). Confident investors perceive cryptos as a speculative hedge against inflation. Moreover, the Federal Reserves measures to curb inflation could weigh on the broader crypto sector, further pumping the value of Litecoin. Recently, Litecoin (LTC) benefited from the network congestion on Bitcoin caused by a surge in Bitcoin requests for BRC-20 tokens.

Experts indicate that Litecoin (LTC) can experience a bullish sentiment in the coming months, rising to $98.54 by the end of 2023 and possibly $121.34 in 2024. Analysts have pointed out the optimism surrounding the upcoming halving of Litecoins issuance rate to miners as a primary catalyst for Litecoin (LTC) gains.

On the other hand, critics have pointed out that Litecoin (LTC) lags in scalability, privacy, and transaction speeds. Decentralized networks such as TMSN offer a more competitive edge, offering unique features such as faster execution and commission revenue sharing.

The price of Cardano (ADA) took a nosedive over the past 24 hours, dropping to $0.3714. The unexpected plunge could be understood as a market correction coupled with a low TVL.

On a more positive note, investors remain confident in Cardanos fundamentals. Cardano (ADA) recently unveiled Ouroboros, a groundbreaking PoS consensus protocol hailed as a significant advancement for the blockchain industry. Furthermore, Cardano (ADA) has integrated smart contracts into its blockchain, empowering developers to build many DApps on the platform.

Experts suggest that Cardano (ADA) is poised for bullish dominance, with its price surging to $0.5317 in the coming months and possibly $0.6925 by 2024. Reports indicate that ADAs development team remains focused on granting Cardano full autonomy by introducing Votaire, bolstering the networks functionalities.

ADA plans to introduce Hydra, a revolutionary feature that pushes the boundaries of scalability and efficacy. Furthermore, various institutions and partners extensive adoption of Cardano (ADA) adds to its allure.

Notably, consumers have voiced their discontent with ADAs absence of voting rights, opting to transition to TMS Network (TMSN) for a more inclusive experience.

Presale: https://presale.tmsnetwork.io/Website: https://tmsnetwork.io/Telegram: https://t.me/tmsnetworkioTwitter: https://twitter.com/tmsnetwork_io

Disclaimer:This is a paid release. The statements, views and opinions expressed in this column are solely those of the content provider and do not necessarily represent those of Bitcoinist. Bitcoinist does not guarantee the accuracy or timeliness of information available in such content. Do your research and invest at your own risk.

See the original post here:

Decentralization Revolution: TMS Network (TMSN) Projected to Lead Over Litecoin (LTC) and Cardano (ADA) | - Bitcoinist

Read More..