Page 1,513«..1020..1,5121,5131,5141,515..1,5201,530..»

A Brief History of Windows Vulnerabilities: The Evolution of Threats … – Infosecurity Magazine

Buffer overflow vulnerabilities are a significant threat to computer security and have caused some of the most high-profile security incidents in recent years. The aim of this article is to provide readers with a comprehensive understanding of what buffer overflow vulnerabilities are, how they occur, and the potential impact of exploitation.

Microsoft has taken several measures to enhance the security of Windows over the years. To combat the ever-increasing dangers of cybercrime, the tech giant has implemented new security features to the operating system and introduced patches and updates to fix vulnerabilities and reduce security risks.

On top of that, Microsoft has also developed various security tools and software, including Windows Defender, Microsoft Security Essentials, and Microsoft Safety Scanner, to help users protect their devices from potential threats. In fact, Microsoft subsequently released a patch that removes a security vulnerability found in an optional service that comes with Microsoft Windows NT 4.0 and Windows 2000 Servers. This vulnerability, if left unaddressed, could allow a malicious user to execute malicious code on a server running the service remotely.

These security measures can help prevent data breaches, identity theft, and other malicious activities. However, despite these efforts, Windows vulnerabilities and security threats remain significant. Hackers always discover novel methods to exploit system vulnerabilities and bypass security measures. That's why staying informed and regularly updating your device with the latest security patches and updates is crucial to safeguarding against new threats and vulnerabilities constantly emerging from cybercriminals.

The following are the most significant vulnerabilities that plagued the early versions of Windows:

When you transfer data from one location to another, you use temporary storage regions called buffers. But when the data you're transferring exceeds the buffer's capacity, the program writing the data to the buffer can overwrite adjacent memory locations, resulting in a buffer overflow. This issue is not limited to specific software types and often occurs due to malformed inputs or inadequate buffer allocation.

The Phone Buffer Service vulnerability, discovered by security research firms CORE-SDI and Stake back in 2000, is an excellent example of the buffer overflow vulnerability. This type of vulnerability occurs when attackers can exploit an unchecked buffer in a program by introducing malformed inputs. This was the case with the Phone Buffer Service, an optional component included with Microsoft Windows NT 4.0 and Windows 2000 Servers that could be used with Dial-Up Networking clients to provide a pre-populated list of dial-up networking servers. However, a particular type of malformed URL could trigger an unchecked buffer and allow attackers to gain unauthorized access to the system.

Several recent examples of buffer overflow vulnerabilities have demonstrated the ongoing threat they pose. The Phone Buffer Service vulnerability discovered in 2000 is just one of them. Other examples include Heartbleed, which allowed attackers to read sensitive information from affected systems; Shellshock, which allowed arbitrary code execution; Dirty COW (Copy-On-Write), which allowed attackers to gain root access; Struts2, which allowed arbitrary code execution; and EternalBlue, which allowed malware propagation. These vulnerabilities emphasize the significance of addressing buffer overflow vulnerabilities as soon as they are discovered.

One of Windows's most notable early vulnerabilities was the 'Ping of Death' attack, which emerged in the early 1990s. This attack exploited a flaw in how the Windows operating system handled large ICMP (Internet Control Message Protocol) packets. Hackers could send oversized ICMP packets to a target system, causing it to crash or freeze.

The 'Ping of Death' attack was particularly effective because it could be carried out remotely without physical access to the target system. In some cases, a single 'Ping of Death' packet could bring down an entire network. This vulnerability affected various versions of Windows, including Windows 95 and Windows NT.

Microsoft eventually addressed the 'Ping of Death' vulnerability by releasing a patch that fixed the issue. However, this attack served as a wake-up call for more robust security measures in the Windows operating system. It highlighted the potential risks of remote attacks and the importance of regularly updating systems with the latest security patches and updates.

Despite the patch, some hackers exploited the 'Ping of Death' vulnerability for years. It remained a significant threat to Windows systems until the early 2000s, when new security measures, such as firewalls and network intrusion detection systems, became more widely used.

Another notable early vulnerability that affected Windows was the 'Back Orifice' trojan. Developed by the hacker group Cult of the Dead Cow, this trojan was first released in 1998 and was designed to give hackers remote access to Windows systems. The trojan could be hidden within other files, making it difficult to detect and remove.

Once installed on a system, the 'Back Orifice' trojan could allow a hacker to access and control the system remotely. The trojan could perform various malicious activities, including stealing data, modifying files, and launching denial-of-service attacks. This vulnerability was particularly concerning because it was difficult to detect and allowed hackers to bypass traditional security measures, such as firewalls and antivirus software. The trojan could target Windows systems running various operating system versions, including Windows 95, 98, and NT.

Microsoft responded to the 'Back Orifice' trojan by releasing several security patches and updates to address its exploited vulnerability. The company also introduced new security measures in later versions of Windows, such as improved firewall protection and enhanced user account control. The exposure highlighted the growing sophistication of cyber-attacks and the need for stronger security measures in the Windows operating system.

As the number of Windows vulnerabilities increased, Microsoft began to take security more seriously. In 2002, Microsoft released Windows XP, which included several new security features, including the following:

Firewall: Windows XP included a built-in firewall that could help protect against network-based attacks. The firewall was turned on by default and could be configured to block incoming traffic from the internet or other networks.

Automatic updates: Windows XP introduced automatic updates, which allowed users to receive security patches and updates automatically. This feature helped ensure that systems were always up-to-date with the latest security fixes.

User Account Control: Windows XP introduced user account control (UAC), designed to prevent unauthorized changes to the system. UAC would prompt the user for permission before allowing changes that could affect the system.

Since then, Microsoft has continued improving Windows security with each new operating system version. Windows Vista, released in 2006, introduced the User Account Control (UAC) feature, which prompts users for permission before allowing applications to make system changes. Windows 7, released in 2009, included improvements to the built-in firewall and introduced a new feature called Action Center, which provides users with alerts and notifications about potential security issues.

Windows has come a long way since its early days when security was not a top priority. Today, its one of the most secure operating systems available, thanks to Microsoft's many security improvements over the years. While Windows vulnerabilities and malware attacks are still a concern, Microsoft's ongoing commitment to security means that users can feel confident that their devices are protected against the latest threats.

Read this article:
A Brief History of Windows Vulnerabilities: The Evolution of Threats ... - Infosecurity Magazine

Read More..

Latitude criticised for length of time they held onto data – 9News

Latitude Financial Services has been criticised for holding on to historic data of New Zealanders and a "she'll be right" attitude after the company was hit by a major data breach.

Latitude reported last week 7.9 million Australian and New Zealand driver's licence numbers were stolen in its cyberattack - 3.2 million of these were from the last 10 years.

A further 6.1 million customer records including some but not all of the Australian and New Zealand customers' names, addresses, phone numbers and dates of birth were stolen in the attack.

READ MORE: Popular Russian military blogger killed in bomb blast

New Zealand's deputy privacy commissioner Liz MacPherson claimed some of the records taken from the country's residents are up to 18 years old which "isn't okay" and reveals the broader issue of data retention.

"Data retention is the sleeping giant of data security. There are consequences for holding onto data you no longer need," she said.

"All businesses and organisations can learn from this: don't collect or hold onto information you don't need. The risk is simply too high for your customers and your organisation.

"Don't risk being a hostage to people who make it their day job to illegally extract data."

READ MORE: Property prices rise for first time in 10 months

MacPherson said there is no place for a "she'll be right" attitude to cyber security.

"People make their fortunes from hacking the security of agencies," she said.

"Having sea borders does not protect your very internet-connected agency from being hacked."

She said companies should not be collecting or retaining personal information for so long unless it is for a lawful process.

"The simple discipline of deciding how long information will be retained as you collect it and acting on these decisions will save you and your customers a lot of pain," she added.

New Zealand's privacy laws say that companies cannot retain personal information "for longer than is necessary for the purposes for which it may lawfully be use".

If there is a legal reason for keeping the data, the company can continue to do so otherwise it must be erased but there is no explicit timeline of what "longer than is necessary" means.

In Australia, the Telecommunications Act says companies can keep information for identification purposes for at least two years.

And the Privacy Act says personal information should be destroyed when the company no longer needs it for "any purpose" however there is no timeframe for how long a company can keep data.

READ MORE: War-crimes warrant for Putin could complicate Ukraine peace

As Latitude and Australian and New Zealand authorities investigate the extent of the hack, MacPherson said some key questions need to be answered by the financial company.

"These include how the cyber-criminal got in, how they managed to penetrate so far and why so many records have been retained for so long," she said.

Latitude is in the process of contacting all affected customers about what was stolen and how they will be assisted.

The company announced it will pay for customers who need to replace their driver's licence.

"It is Latitude Financial's responsibility to put things right," MacPherson said.

"It is important that affected customers give Latitude a chance to make good on their commitments to provide support.

"However, if after people have worked with Latitude their privacy harms have not been resolved to their satisfaction, we encourage them people to make a complaint."

Sign up here to receive our daily newsletters and breaking news alerts, sent straight to your inbox.

Read more:
Latitude criticised for length of time they held onto data - 9News

Read More..

Researchers warn of Wi-Fi security flaw affecting iOS, Android, Linux – Computerworld

Apples decision to support MAC Address Randomization across its platforms may provide some degree of protection against a newly-identified Wi-Fi flaw researchers saycould let attackers hijack network traffic. iOS, Linux, and Android devices may be vulnerable.

The researchers have identified a fundamental flaw in the design of the IEEE 802.11 Wi-Fi standard attackers could exploit to trick access points (Wi-Fi base stations) into leaking information. The researchers do not claim the vulnerability is being actively exploited, but warn that it might enable the interception of network traffic.

The attack exploits an inherent vulnerability in the data containers (network frames) routers rely on to move information across the network and how access points handle devices that enter power-saving mode.

To achieve the attack, miscreants must forcibly disconnect the victim device before it properly connects to the network, spoof the MAC address of the device to connect to the network using the attackers credentials, then grab the response. The vulnerability exploits on-device power-save behavior within the Wi-Fi standard to force data to be shared in unencrypted form.

The researchers have published an open source tool calledMacStealerto test Wi-Fi networks for the vulnerability.

Cisco downplayed the report, saying information gained by the attacker would be of minimal value in a securely configured network."

The company does, however, recommend that network admins take action: To reduce the probability that the attacks that are outlined in the paper will succeed, Cisco recommends using policy enforcement mechanisms through a system like Cisco Identity Services Engine (ISE), which can restrict network access by implementing Cisco TrustSec or Software Defined Access (SDA) technologies.

"Cisco also recommends implementing transport layer security to encrypt data in transit whenever possible because it would render the acquired data unusable by the attacker, the company said.

The security researchers point out that denial-of-service attacks against Wi-Fi access points have been around forever, arguing that the 802.11 standard needs to be upgraded to meet new security threats. Altogether, our work highlights the need for the standard to consider queuing mechanisms under a changing security context,they wrote.

Apple recently extended its MAC Address Randomization feature across iPhones, iPads, Macs, and the Apple Watch. This additional layer of security helps mask devices by using randomly generated MAC addresses to connect to networks.

The MAC address is a device specific 12-character number that can reveal information concerning the device and is used as an intrinsic part of the Wi-Fi standard. The router will use this to ensure requested data goes to the correct machine, as without that address it would not recognize which machine to send information to.

As explained here, MAC Address Randomization helps mask the exact device on the network in a way that also makes data transmitted over that network a little more complex to decode. Security experts agree that, in a broad sense, it might help make the form of attack identified by the researchers a little harder to pull off. It isnt foolproof protection, in part because it can be disabled by network providers who might insist on an actual address for use of the service.

MAC Address Randomization is also not enforced when a device connects to a preferred wireless network, and if an attacker is able to identify the random address and connect it to the device they could still mount an attack.

Every step you take to protect your devices, particularly when using Wi-Fi hotspots, is becoming more essential, rather than less.

Watchguards latest Internet Security Report confirms that while there has been some decline in the frequency of network-based attacks, many Wi-Fi networks might be vulnerable to the exploit.The report also reveals that endpointransomware increaseda startling627%,whilemalware associated with phishing campaignscontinues to bea persistent threat.

A continuingand concerningtrend in ourdata andresearch showsthatencryption or, more accurately, the lack of decryption at the network perimeter is hiding the full picture ofmalwareattack trends,said Corey Nachreiner,chiefsecurityofficer at WatchGuard.It is critical for security professionals to enableHTTPS inspectionto ensure these threats areidentified and addressed before they can do damage.

Please follow me onMastodon, or join me in theAppleHolics bar & grillandAppleDiscussionsgroups on MeWe.

Follow this link:
Researchers warn of Wi-Fi security flaw affecting iOS, Android, Linux - Computerworld

Read More..

Why cyber and physical security is becoming mobile-centric in 2023 – iTWire

GUEST OPINION: Mobile devices, whether smartphones or tablets are now used for audio and video entertainment, heating or air conditioning homes, and operating numerous home appliances like dishwashers and washing machines. These new technologies improve energy efficiency and offer lots of conveniences if youre not home but need to prepare something while away.

Physical security presents various challenges. A principal inconvenience is that someone usually needs to grant access to a site, office, or home. But now, thanks to cloud-based security systems, the management of physical locations can be accomplished remotely using mobile applications. This technology permits administrators to:

With any access procedure, credentials can be stolen or lost. Remote video identification can be an essential part of multi-factor authentication.

Physical access generally requires on-premises manpower that could be more profitably employed elsewhere for a company. Traditional physical access can also result in waiting lines and traffic flow obstacles.

Using keypad access control systems or mobile access credentials can speed things along, providing contactless entry and preventing unauthorized entrances. Entrance credentials can be sent to the devices of guests and visitors shortly before arrival to mitigate risks. Unlocking doors for authorized employees or law enforcement will no longer require an on-site physical presence.

Security issues require immediate responses, and how quickly those responses arrive can mean the difference between fatalities and serious injuries taking place. Smoke, fire, carbon monoxide, gunshot, or even broken glass alerts can save lives. Not only will management and security personnel receive alerts, but local authorities and emergency service personnel can receive these too.

If company areas become overcrowded, mobile systems can integrate traffic management software to alert administrators, and appropriate actions can be introduced.

COVID-19 taught us about the risks involved in direct contact and overcrowding. Mobile-based physical security provides an option for avoiding both.

The advantages to using mobile security strategies are numerous and benefit both physical and cyber security operations. The principal advantages include:

With cloud-based security systems, mobile technology can be integrated quickly and easily. This option eliminates eventual installation expenses.

The greatest advantage of mobile technology is that it immediately provides alerts, communications, and information in real-time. Often senior managers or business owners may not be on-site in the event of an emergency. Mobile technology can speed up executive decision-making and interventions by law enforcement or service personnel, evacuations, and lockdowns when necessary. Records of mobile access control can make auditing easier and compliance necessities.

Using a mobile-friendly video feed for access control makes proper identification rapid and guarantees only authorized entrances and visits. Mobile credentials are difficult to duplicate or falsify. MFA is already commonly used on smart devices, adding an extra layer of protection.

Managing from a distance is easy and efficient with mobile technology. If managers or business owners are out of town or unable to visit a property physically, security can be managed from anywhere with an internet connection.

Using key cards, keys, or fobs requires money and time. If employees are fired or resign, traditional access cards or keys must be collected. When keys, cards, or fobs are stolen or lost, they must be replaced. Mobile technology facilitates the BYOD (Bring Your OwnDevice) practice with employees using their smartphones or tablets. Credentials can be revoked immediately at no cost if need be.

Personnel is no longer required for access management, and subscription cloud-based services replace the need for on-site hardware and maintenance.

While the benefits far outweigh any disadvantages, there are always occasional vulnerabilities with any security strategy. Mobile security technology requires strong passwords and multi-factor authentication, without which mobile security will be at risk. Lost or stolen mobile devices are always a concern, but with MFA and well-selected passwords, risks can be mitigated.

Although mobile technology brings multiple opportunities, it also brings increased risks. Wherever data is stored, there will be a risk of cyber vulnerability. Both devices used and stored data present significant vulnerabilities for businesses. The loss of a device with stored data creates an opportunity for cybercriminals to do untold damage to your company and customers.

Third parties must not gain access to company systems or data, nor should they be able to launch attacks or create breaches in security protocols. Cybersecurity software, therefore, becomes essential when opting for mobile technology.

Undoubtedly, physical security can be increased using mobile technology, but when physical security is mobile, cybersecurity can no longer be viewed separately. Physical security systems can improve and be remotely managed thanks to smart locks, video feeds, and identity credentials verification that are all convenient and contactless. Cybersecurity must protect these physical security opportunities from becoming liabilities.

See more here:
Why cyber and physical security is becoming mobile-centric in 2023 - iTWire

Read More..

German Police Raid DDoS-Friendly Host ‘FlyHosting’ Krebs on … – Krebs on Security

Authorities in Germany this week seized Internet servers that powered FlyHosting, a dark web offering that catered to cybercriminals operating DDoS-for-hire services, KrebsOnSecurity has learned. FlyHosting first advertised on cybercrime forums in November 2022, saying it was a Germany-based hosting firm that was open for business to anyone looking for a reliable place to host malware, botnet controllers, or DDoS-for-hire infrastructure.

A seizure notice left on the FlyHosting domains.

A statement released today by the German Federal Criminal Police Office says they served eight search warrants on March 30, and identified five individuals aged 16-24 suspected of operating an internet service since mid-2021. The German authorities did not name the suspects or the Internet service in question.

Previously unknown perpetrators used the Internet service provided by the suspects in particular for so-called DDoS attacks, i.e. the simultaneous sending of a large number of data packets via the Internet for the purpose of disrupting other data processing systems, the statement reads.

News of a raid on FlyHosting first surfaced Thursday in a Telegram chat channel that is frequented by people interested or involved in the DDoS-for-hire industry, where a user by the name Dstatcc broke the news to FlyHosting customers:

So Flyhosting made a migration with it[s] systems to new rooms of the police ;), the warning read. Police says: They support ddos attacks, C&C/C2 and stresser a bit too much. We expect the police will take a deeper look into the files, payment logs and IPs. If you had a server from them and they could find bad things connected with you (payed with private paypal) you may ask a lawyer.

An ad for FlyHosting posted by the the user bnt on the now-defunct cybercrime forum BreachForums. Image: Ke-la.com.

The German authorities said that as a result of the DDoS attacks facilitated by the defendants, the websites of various companies as well as those of the Hesse police have been overloaded in several cases since mid-2021, so that they could only be operated to a limited extent or no longer at times.

The statement says police seized mobile phones, laptops, tablets, storage media and handwritten notes from the unnamed defendants, and confiscated servers operated by the suspects in Germany, Finland and the Netherlands.

In response to questions from KrebsOnSecurity, Germanys Hessen Police confirmed that the seizures were executed against FlyHosting.

The apparent raids on FlyHosting come amid a broader law enforcement crackdown on DDoS-for-hire services internationally. The U.K.s National Crime Agency announced last week that its been busy setting up phony DDoS-for-hire websites that seek to collect information on users, remind them that launching DDoS attacks is illegal, and generally increase the level of paranoia for people looking to hire such services.

In mid-December 2022, the U.S. Department of Justice (DOJ) announced Operation Power Off, which seized four-dozen DDoS-for-hire domains responsible for more than 30 million DDoS attacks, and charged six U.S. men with computer crimes related to their alleged ownership of popular DDoS-for-hire services.

Update, April 3, 9:30 a.m. ET: Added confirmation from Hesse Police.

More here:
German Police Raid DDoS-Friendly Host 'FlyHosting' Krebs on ... - Krebs on Security

Read More..

Cyber Security Software Market Next Big Thing | Major Giants ThreatLocker, Exabeam, CyberSaint Security – openPR

Cyber Security Software Market

Get Free Exclusive PDF Sample Copy of This Research @ https://www.advancemarketanalytics.com/sample-report/66837-global-cyber-security-software-market-1

Scope of the Report of Cyber Security SoftwareThe cyber security is also referred to as information technology security. Cyber security software is a computer program which is designed to enhance the information security. It is also designed to protect the networks, devices, programs, and data from an attack or unauthorized access. There are various types of cyber security software which includes anti-virus software, internet security software, malware/spam ware removal, firewall software, network security software and protection software. Therefore, there is increasing demand of cyber security software for the protection from cyber-attacks.

The titled segments and sub-section of the market are illuminated below:by Platform (Android, IOS, Windows), Industry Verticals (Aerospace and Defense, BFSI, Public sector, Retail, Healthcare, IT and Telecom, Energy and Utilities, Manufacturing, Others), Features (Machine learning, Behavioral analytics, IOC verification, Tokenization, Blacklisting), Subscription (Monthly, Annually, One time license)

Market Drivers:Growing Popularity and Digitization is Fueling the Market GrowthIncreasing Cyber Threats and Terrorism

Opportunities:Increasing Usage of Cyber Security Software in Various Industries Such as Government, IT and Telecom, and OthersEmergence of Digital Technologies Such as Internet of Things

Market Trends:Increasing Demand of Cloud Based Cyber Security Solutions

May 2022 - Cisco Systems Inc. announced that it had released the Cisco Cloud Controls Framework (CCF) to the public. Cisco CCF is a comprehensive set of national and international security compliance and certification requirements aggregated in one framework.

Region Included are: North America, Europe, Asia Pacific, Oceania, South America, Middle East & Africa

Country Level Break-Up: United States, Canada, Mexico, Brazil, Argentina, Colombia, Chile, South Africa, Nigeria, Tunisia, Morocco, Germany, United Kingdom (UK), the Netherlands, Spain, Italy, Belgium, Austria, Turkey, Russia, France, Poland, Israel, United Arab Emirates, Qatar, Saudi Arabia, China, Japan, Taiwan, South Korea, Singapore, India, Australia and New Zealand etc.

In April 2020, Patchwork Health partnered with Truu which is a digital passports provider. It enables the rapid deployment of workers across NHS Trusts during the COVID-19 outbreak. Truu's digital staff passports allow healthcare workers to accumulate credentials issued from their home hospitals. These are then shared securely with new hospitals.

Have Any Questions Regarding Global Cyber Security Software Market Report, Ask Our Experts@ https://www.advancemarketanalytics.com/enquiry-before-buy/66837-global-cyber-security-software-market-1

Strategic Points Covered in Table of Content of Global Cyber Security Software Market:Chapter 1: Introduction, market driving force product Objective of Study and Research Scope the Cyber Security Software marketChapter 2: Exclusive Summary - the basic information of the Cyber Security Software Market. Chapter 3: Displaying the Market Dynamics- Drivers, Trends and Challenges & Opportunities of the Cyber Security SoftwareChapter 4: Presenting the Cyber Security Software Market Factor Analysis, Porters Five Forces, Supply/Value Chain, PESTEL analysis, Market Entropy, Patent/Trademark Analysis.Chapter 5: Displaying the by Type, End User and Region/Country 2016-2021Chapter 6: Evaluating the leading manufacturers of the Cyber Security Software market which consists of its Competitive Landscape, Peer Group Analysis, BCG Matrix & Company ProfileChapter 7: To evaluate the market by segments, by countries and by Manufacturers/Company with revenue share and sales by key countries in these various regions (2022-2028)Chapter 8 & 9: Displaying the Appendix, Methodology and Data Source

finally, Cyber Security Software Market is a valuable source of guidance for individuals and companies.

Read Detailed Index of full Research Study at @ https://www.advancemarketanalytics.com/reports/66837-global-cyber-security-software-market-1

Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, Middle East, Africa, Europe or LATAM, Southeast Asia.

Contact Us: Craig Francis (PR & Marketing Manager) AMA Research & Media LLPUnit No. 429, Parsonage Road Edison, NJ New Jersey USA - 08837 Phone: +1(201) 7937323, +1(201) 7937193sales@advancemarketanalytics.com

About Author: Advance Market Analytics is Global leaders of Market Research Industry provides the quantified B2B research to Fortune 500 companies on high growth emerging opportunities which will impact more than 80% of worldwide companies' revenues.Our Analyst is tracking high growth study with detailed statistical and in-depth analysis of market trends & dynamics that provide a complete overview of the industry. We follow an extensive research methodology coupled with critical insights related industry factors and market forces to generate the best value for our clients. We Provides reliable primary and secondary data sources, our analysts and consultants derive informative and usable data suited for our clients business needs. The research study enable clients to meet varied market objectives a from global footprint expansion to supply chain optimization and from competitor profiling to M&As.

This release was published on openPR.

See the original post here:
Cyber Security Software Market Next Big Thing | Major Giants ThreatLocker, Exabeam, CyberSaint Security - openPR

Read More..

2023-03-28 | OTCPK:EBZT | Press Release | Everything Blockchain … – Stockhouse

Jacksonville, Florida, March 28, 2023 (GLOBE NEWSWIRE) -- Everything Blockchain Inc., (OTCMKTS: EBZT), a technology company that is blending blockchain, DBMS and Zero Trust to deliver disruptive new ways to store, manage and protect data, today announced a partnership with the Center for Internet Security, Inc. (CIS®) in the CIS CyberMarket®. CIS is a non-profit cybersecurity organization committed to keeping the connected world a safer place.

Everything Blockchain, Inc. delivers novel solutions to the market that protect and securely store intellectual property. The company’s EB Control application safeguards data on the owner's local device by creating a secure vault which can be stored, transported or shared; allowing the owner to maintain complete control for the life of the data. With EB Control, data and files can be geo-fenced, time-fenced and data rights management invoked so that data can be confidently shared and controlled outside of your secure domain.

We are excited to be working with CIS and proud to be recognized by them for inclusion into the CyberMarket,” said Toney Jennings, CEO, EBI. By making our solutions available through the CyberMarket, important and critical State, Local, Tribal and Territorial organizations will have easy access to tools that will protect them and their communities. We look forward to a productive partnership.”

CIS CyberMarket is a collaborative purchasing program that serves U.S. State, Local, Tribal and Territorial (SLTT) government organizations, nonprofit entities, and public health and education institutions to improve cybersecurity through cost-effective group procurement. By leveraging the collective purchasing power of participating public and nonprofit organizations, CIS CyberMarket works with industry-leading cybersecurity providers to secure significant group purchasing opportunities to meet the ever-evolving cybersecurity needs of customer organizations.

It is a distinct pleasure to welcome EBI to the CIS CyberMarket community,” said Cat Werbeck-Marczan, CIS VP of Cybersecurity Services Program Office. This partnership will provide U.S. State, Local, Tribal, and Territorial government organizations with access to EBI’s innovative cybersecurity solutions to protect their digital assets against a constantly evolving cyber threat landscape.”

For more information about the Center for Internet Security and CIS CyberMarket, contact CIS Media Relations Manager Kelly Wyland at kelly.wyland@cisecurity.org or 518-256-6978.

For more information about EBI, visit everything blockchain.io.

About CIS:

The Center for Internet Security, Inc. (CIS®) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation. We are a community-driven nonprofit, responsible for the CIS Critical Security Controls® and CIS Benchmarks, globally recognized best practices for securing IT systems and data. We lead a global community of IT professionals to continuously evolve these standards and provide products and services to proactively safeguard against emerging threats. Our CIS Hardened Images® provide secure, on-demand, scalable computing environments in the cloud. CIS is home to the Multi-State Information Sharing and Analysis Center® (MS-ISAC®), the trusted resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial government entities, and the Elections Infrastructure Information Sharing and Analysis Center® (EI-ISAC®), which supports the rapidly changing cybersecurity needs of U.S. election offices. To learn more, visit CIS or follow us on Twitter: @CISecurity.

About Everything Blockchain Inc. Everything Blockchain, Inc. (OTCMKTS: EBZT) envisions a future where every transaction is trusted and blockchain is used to meet ESG goals, support cities of the future, build and control the transparency of supply chains and ensure the rights of data ownership sustain forever. The company’s patent-pending advances in blockchain engineering deliver the essential elements needed for real-world business use: speed, security, and energy efficiency. Current sub-brands include: EB Advise, EB Build and EB Control. For more information, please visit https://www.everythingblockchain.io/

Forward Looking Statements This news release contains forward-looking statements” which are not purely historical and may include any statements regarding beliefs, plans, expectations or intentions regarding the future. Such forward-looking statements include, among other things, the development, costs and results of new business opportunities and words such as anticipate”, seek”, intend”, believe”, estimate”, expect”, project”, plan” or similar phrases may be deemed forward-looking statements” within the meaning of the Private Securities Litigation Reform Act of 1995. Actual results could differ from those projected in any forward-looking statements due to numerous factors. Such factors include, among others, the inherent uncertainties associated with new projects, the future U.S. and global economies, the impact of competition, and the Company’s reliance on existing regulations regarding the use and development of blockchain and zero trust- based products. These forward-looking statements are made as of the date of this news release, and we assume no obligation to update the forward-looking statements, or to update the reasons why actual results could differ from those projected in the forward-looking statements. Although we believe that any beliefs, plans, expectations and intentions contained in this press release are reasonable, there can be no assurance that any such beliefs, plans, expectations or intentions will prove to be accurate.

Continued here:
2023-03-28 | OTCPK:EBZT | Press Release | Everything Blockchain ... - Stockhouse

Read More..

How cyber lessons learned in warfare can be applied to business … – BCS

The war in Ukraine has caused the suffering of millions and the loss of tens of thousands of lives, and is undoubtedly one of the greatest human tragedies of the 21st century. In these times of peril, people reveal their true colours, and blue and yellow have shown to represent tremendous bravery and determination despite all the odds being stacked against them. Whilst many have been devastated by the conflict, the awe inspiring collective rise of Ukrainians everywhere has demonstrated what a truly special people they are.

This bravery has also led others to step up their support, whether it be other nations, billionaires such as Elon Musk, or simply ordinary people donating to initiatives such as President Zelenskys United 24 fund. As we have seen during the COVID-19 pandemic, great tragedies have the power to unite us and to inspire us to use our innovation and creativity to find solutions. Throughout history, war has been no different - whether it be the First World war leading to the development of novel plastic surgery techniques, or the Cold War resulting in the space race and putting the first man on the moon.

The Ukraine war is a modern-day war, and as a result we have seen modern-day technological innovation. I hope to unpack some of this and reveal how the lessons we have learned in wartime might be used by business es in peacetime, once the dust finally settles on this dreadful human tragedy.

Clear communication is vital during a war, and it has been a key factor in differentiating between Russia and Ukraine in this conflict. Effective military-grade encrypted communication is difficult to implement, and the technology that Ukraine has been using has allowed them to communicate essential information between their troops.

Perhaps as a side effect of not readying for a prolonged assault, some Russians were forced to communicate using regular mobile phones, allowing Ukraine to block their numbers. When they resorted to stealing Ukrainian phones, lists of stolen numbers were compiled, allowing calls to be intercepted. It is rumoured that due to the expectation of a swift victory, Russia didnt wish to sabotage Ukrainian communications and other infrastructure as they were planning on using it once they had seized the territory.

Communication, notably phishing and social engineering, is a hot topic in cyber security. Businesses should always ensure that sensitive communication, particularly when containing personally identifiable information (PII) and customer data, is kept encrypted. Internal communication should use tools such as Slack or Microsoft Teams as they offer a higher level of trust than email. This is largely due to their ability to segregate internal communications into their platform, which allows external email communications to be scrutinised more effectively.

One of the most notable things about the start of the invasion in Donbas is that satellite imagery showed the presence of Russian tanks on the border with Ukraine. There have been several subsequent news stories showing how pictures uploaded to public social media accounts by Russian soldiers have revealed key tactical insights such as their numbers and location.

Open source intelligence is becoming more common, with information becoming more freely accessible. Both the military and businesses alike should note that their presence on social media and elsewhere on the internet is key to their security. Monitoring what information about your organisation is available in the public domain is vital to understanding an attacker's mindset, and this is often a starting point from which penetration test audits will begin.

Drones are not a fresh concept in modern conflict, and in the past have been used as weapons that can launch strikes against remote targets without endangering allied soldiers. Facing limited supplies of armed military-grade drones, Ukraine has creatively used commercial drones, such as the DJI Mavic 3, for reconnaissance in order to locate targets for artillery units.

Somewhat contrary to traditional military strategy of involving a chain of command, they have empowered frontline soldiers to call in missile strikes in a just-in-time manner, which allows them to respond quickly to rapid change. Often these troops have a clearer picture of the present situation, and allowing them to make these calls has been a key strategic advantage.

Original post:
How cyber lessons learned in warfare can be applied to business ... - BCS

Read More..

Binance Resumes Deposits, Withdrawals After 5hrs Of BNB Network Issue – CoinGape

The worlds largest crypto exchange Binance suffered issues after the wallet maintenance for BNB Smart Chain (BEP20). The exchange temporarily suspended deposits and withdrawals on the BNB Smart Chain as the team worked to resolve the issue.

The withdrawals and deposits have resumed after 4-5 hours of fixing the node issue after the Binance Smart Chain (BEP20) network upgrade.

According to an official announcement on March 30, Binance revealed it has temporarily suspended BSC deposits and withdrawals due to a node issue after the Binance Smart Chain (BEP20) network upgrade.

Due to a node issue following the Binance Smart Chain (BEP20) network upgrade, we have temporarily closed BSC deposits and withdrawals. Our team is working to fixing the issue, with an estimated completion time of 1-hour.

The wallet maintenance for BNB Smart Chain (BEP20) is expected to be completed by 11:00 UTC on March 30. Binance team is actively working to complete the maintenance as quickly as possible.

The scheduled wallet maintenance for the chain was announced on Tuesday, with investors aware of exchange suspending deposits and withdrawals on the BNB Smart Chain for two hours. However, users are impacted due to the extension of the wallet maintenance to another two hours.

This is the second time Binance has suffered issues in a week. On March 24, the exchange suspended all spot trading after the matching engine encountered a bug on the trailing stop order. Bitcoin and Ethereum prices fell after the announcement as the exchange remained offline on the trading part.

Bitcoin price fell over 0.50% during the scheduled Binance Smart Chain (BEP20) network upgrade. The BTC price is trading above $28,500 at the press time.

Ethereum price also fluctuated during the node issue, with the price currently trading at $1,805 at the press time.

Also Read: Binances Bitcoin, Ethereum, Stablecoins Netflow Reveals Stability Despite US CFTC Suit

Varinder is a Technical Writer and Editor, Technology Enthusiast, and Analytical Thinker. Fascinated by Disruptive Technologies, he has shared his knowledge about Blockchain, Cryptocurrencies, Artificial Intelligence, and the Internet of Things. He has been associated with the blockchain and cryptocurrency industry for a substantial period and is currently covering all the latest updates and developments in the crypto industry.

More here:

Binance Resumes Deposits, Withdrawals After 5hrs Of BNB Network Issue - CoinGape

Read More..

What Coinbase’s Layer 2 Says About Where We’re Headed – Crypto News Flash

Courtesy: https://www.coinbase.com/

Coinbase recently announced Base, its own Ethereum Layer 2 solution that offers a safe, low cost, developer friendly alternative to the Ethereum mainnet.

Through the prior bull market, we saw alternative Layer 1 blockchains arise with Binance Smart Chain being among the most prominent. Thanks to Binances 90 million users, Binance Smart Chain saw incredible growth through 2020 and 2021.

With direct access to Coinbases 110 million users, Base has the potential to capture an even larger market than Binance Smart Chain. At its peak, Binance Smart Chain attracted tens of billions of dollars in digital assets. Importantly, Coinbase has the ability to take learnings from other layer 1 blockchains and apply them to Base.

Heres what Base says about where the cryptoeconomy is headed.

Coinbases Base is an Ethereum optimistic rollup that runs computations off-chain and posts transaction results onto mainnet. By reducing the amount of data that needs to be processed on-chain, optimistic rollups can reduce fees by over 100x. Besides reducing gas fees, the rollup increases transaction speeds and maintains the decentralization and security of Ethereum blockchain.

Base is built via Optimisms open source OP stack, which means it is fully EVM compatible, allowing Ethereum applications to be directly imported onto Base. The network announced dozens of applications that Base will launch with, including Aave, Infura, and Chainlink. EVM-compatibility is critical to add utility to a networkBase can rely on established teams, applications, and users that already exist within Ethereums ecosystem.

Coinbase will be empowering DeFi applications with access to their products, users, and tools. Users can easily onramp their fiat to use DeFi applications, while Coinbase could have direct integrations with applications via their wallet.

Coinbase is also joining Optimism as a core developer on the OP stack, which is aiming to create a modular Superchain that connects all OP Layer 2 networks together, improving on user experience and the current set of scaling solutions.

Instead of relying on issuing network tokens as incentives, Pollak from Coinbase feels that the Bases access to large-scale consumer distribution and EVM compatibility would achieve product market fit. By driving down fees, building better wallets and infrastructure, Base would naturally achieve growth.

To quote Pollak, Coinbases goal is to make on-chain the next online and onboard one billion users into the cryptoeconomy. In pursuit of this goal, Base will serve as both a home for Coinbases on-chain products and an open ecosystem where anyone can build.

Bases improvements on gas fees drastically improves feasibility for users to use EVM-based decentralized apps. A single transaction on Ethereum, like minting an NFT or swapping tokens, could cost users hundreds of dollars during peak usage. Though gas fees are lower now due to reduced user activity, basic functions like swapping tokens on Ethereum still cost around $10. The barrier to entry is enormously high for normal users, stifling the adoption of Web3.

Follow us for the latest crypto news!

If similar to Optimisms network, normal transactions would cost cents instead of dollars. Users would be able to access applications like Aave and Balancer at a fraction of the usual transaction fees, creating a truly accessible Web3 experience.

Users will be able to create, buy, or sell any token on decentralized crypto exchanges without waiting for centralized exchange listings and access high yield strategies without paying prohibitive transaction fees. Instead of storing income as cash in the bank earning low rates, savers could easily deposit into safe high-yielding stablecoin strategies.

The accessibility of Ethereums applications to the masses cannot be understated. Right now, many users are unable to use Ethereum due to its high network fees. As seen through 2022, DeFi applications have weathered the turbulent markets and have provided more robust infrastructure than its centralized counterparts. With new access to layer 2 solutions, these applications will become more accessible than ever before.

At Origin Protocol, the team is excited to explore layer 2 solutions to make their products more accessible to the everyday user. By integrating applications like Aave, Compound, Curve, and Convex, OUSD deploys assets into non-speculative stablecoin strategies to earn yields above 5% for users holding OUSD. With so many retail users burned from centralized interest-bearing products, theres a clear need for transparent, safe yields through DeFi.

Since OUSD holders do not have to lock up or stake capital to earn yield that is directly sent to their wallet daily, users remain fully liquid. If the user needs their dollars to pay bills, they can swap out their OUSD for USDC and easily offramp via Coinbase. Yield earned in DeFi is completely transparent, as opposed to centralized platforms that often engage in opaque and risky behavior. As OUSD explores layer 2 scaling solutions, Base is an important consideration to explore.

No spam, no lies, only insights. You can unsubscribe at any time.

Both crypto-natives and Coinbase users are excited for the launch of Base, due to the amount of features and synergies it unlocks for DeFi. Users would have access to an Internet of finance, a financial system that is truly fit for the Internet age.

Base has been in testnet since February 23, 2023, opening the platform for developers to test their applications on the network. Coinbase has not confirmed a launch date for Bases mainnet yet.

Crypto News Flash does not endorse and is not responsible for or liable for any content, accuracy, quality, advertising, products, or other materials on this page. Readers should do their own research before taking any actions related to cryptocurrencies. Crypto News Flash is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods, or services mentioned.

Read more:

What Coinbase's Layer 2 Says About Where We're Headed - Crypto News Flash

Read More..