Page 2,263«..1020..2,2622,2632,2642,265..2,2702,280..»

Against The Cloud – Hackaday

One of our writers is working on an article about hosting your own (project) website on your own iron, instead of doing it the modern, cloudy-servicey way. Already, this has caused quite a bit of hubbub in the Hackaday Headquarters. Who would run their own server in 2022, and why?

The arguments against DIY are all strong. If you just want to spin up a static website, you can do it for free in a bazillion different places. GitHubs Pages is super convenient, and your content is version controlled as a side benefit. If you want an IoT-type data-logging and presentation service, there are tons of those as well I dont have a favorite. If you want e-mail, well, I dont have to tell you that a large American search monopoly offers free accounts, for the low price of slurping up all of your behavioral data. Whatever your need, chances are very good that theres a service for you out there somewhere in the cloud.

And thats awesome if you only want the service provided. But what if you want to play around? Or learn how it all works under the hood? This is Hackaday!

For instance, you could run your own mail server just for your friends and family. The aforementioned search monopolist will probably flag all of your e-mail as spam, partly because they dont trust small e-mail providers, and partly because thats the m in monopoly. But if you can get folks to whitelist the addresses, youll be in business. And then you open up a world of fun and foolery. You can write hooks to automatically handle mail, or you can create an infinite number of mail accounts, even on the fly as per Spamgourmet, the most awesome anti-spam tool of the last 30 years. Or you can invent your own. Run a mailing list for your relatives. Or do something stupid.

I used to run a service where, when a particular account received an e-mail, the attached photo was pushed up to a website with the subject line as the caption. Instant photo-blog, of the strangest and least secure sort. Getting it running was a few lines of Bash scripting, and an afternoon of fun. Is there a service that does this, already existing in the cloud? Probably. One that allows you a little privacy and doesnt track your every move? Maybe. But even if there is, would I have learned about sendmail by using this service? Nope!

I hear you saying security under your breath, and youre right. This system was secured by lock made of purest obscurity. But still, in seven years of running the service, nobody guessed the magic e-mail address, not once. Knowledge of the e-mail address was essentially a password, but if I needed extra security I probably could have implemented it in a few lines of Bash anyway. The webpage itself was static HTML, so good luck with that, Hackerman! (The sites been down for a while now, so you missed your chance.)

If you just want a service, you can be served. But if you want to be a server, a first-class Internet citizen, with your own cloud in the sky, nothings stopping you either. And in contrast to using someone elses computers, running your own is an invitation to play. Its a big, Internet-connected sandbox. There are an infinity of funny ideas out there that you can implement on your own box, and a lot to learn. If you hack on someone elses box, its a crime. If you hack on your own, its a pleasure.

I know its anachronistic, but give it a try. (PDF, obscenity, uncorrected typos.) Be your own cloud.

Originally posted here:
Against The Cloud - Hackaday

Read More..

Qatar Managed Services Industry to 2027 – Managed Cloud Services Are Expected to Drive the Market – ResearchAndMarkets.com – Business Wire

DUBLIN--(BUSINESS WIRE)--The "Qatar Managed Services Market - Growth, Trends, COVID-19 Impact, and Forecasts (2022 - 2027)" report has been added to ResearchAndMarkets.com's offering.

The Qatar managed services market was valued at USD 467.04 million in 2021, and it is expected to reach USD 871.02 million by 2027, registering a CAGR of approximately 12.15% during the period of 2022-2027.

The rapid adoption of cloud-based solutions by enterprises, increasing investment in information technology, growing adoption of Bring Your Own Device (BYOD) culture are expected to create ample opportunities for major vendors in Qatar.

Key Market Trends

Managed Cloud Services is Expected to Drive the Market

Government Sector is Expected to hold the majority share

Market Dynamics

Drivers

Challenges

Opportunities

Companies Mentioned

For more information about this report visit https://www.researchandmarkets.com/r/ujm3na

View original post here:
Qatar Managed Services Industry to 2027 - Managed Cloud Services Are Expected to Drive the Market - ResearchAndMarkets.com - Business Wire

Read More..

Pluralsight and Go1 bring top tech education to more – IT Brief Australia

Pluralsight has partnered with Go1, one of the worlds largest corporate education content hubs. Together, the companies state they will deliver a curated content experience to help Go1 customers learn in-demand technology skills, including those featured in the Pluralsight Technology Index.

Premium Go1 subscribers can now access custom content from Pluralsight Skills, enabling them to build skills in specialised technology roles including IT/DevOps, Data Analytics, and Machine Learning.

With this partnership, Pluralsight and Go1 will deliver solutions that help L&D leaders manage the necessary training and development needs of their diverse teams, according to a statement.

Go1 customers in any role, including non-technical roles, are now able to access a selection of high-quality technical content on Pluralsight Skills to upskill or reskill their workforce.

The partnership also enables joint customers to access the full Pluralsight Skills library through Go1's platform.

According to the companies, Pluralsight and Go1 designed the offer with the aim to address the global tech skills shortage, which continues to expand.

Pluralsight SVP of global ecosystem solutions Ken Leonard says, We are excited to offer our expert-led content within the Go1 eLearning platform to help everyone develop the critical tech skills that are in-demand today.

"With access to on-demand video courses from Pluralsight Skills, Go1 customers will be able to establish foundational technology competencies across their organisations while enabling those in technical roles to deepen their understanding of todays latest tech.

"Pluralsight Skills gives people and teams the necessary tools to develop technology skills more effectively and at scale.

This partnership further strengthens the Go1 corporate eLearning platform, adding courses critical for tech upskilling and reskilling.

Through Go1s centralised content library, more than 3.5 million corporate learners will have access to custom learning paths from Pluralsight Skills for roles such as Software Developer, Security Professionals, and Agile leaders.

Additionally, Pluralsight Skills provides content on technology skills such as security, cloud concepts for cloud hosting platforms such as AWS and Azure, and coding languages such as JavaScript and Python.

Go1 VP of partnerships and alliances Basem Emera says, Our partnership with Pluralsight creates a critical tech-skilling pathway for Go1 customers to experience the industrys leading tech courses to join a future-ready workforce.

As a specialist in online learning, Go1.com has raised more than $280 million in total funding. The company has built one of the worlds most comprehensive online libraries and learning resources, pulling together top online learning providers into one place.

Pluralsight is a technology workforce development organisation focused on helping companies and teams build better products by developing critical skills, improving processes and gaining insights through data, and providing strategic skills consulting.

Pluralsight Skills helps enterprises build technology skills at scale with expert-authored courses on important technologies, including cloud, artificial intelligence and machine learning, data science, and security, among others.

Skills also includes tools to align skill development with business objectives, virtual instructor-led training, hands-on labs, skill assessments and one-of-a-kind analytics.

Flow complements Skills by providing engineering teams with actionable data and visibility into workflow patterns to accelerate the delivery of products and services.

Read the rest here:
Pluralsight and Go1 bring top tech education to more - IT Brief Australia

Read More..

Radware Extends its Cloud Application Security with API Discovery and Threat Protection – GlobeNewswire

MAHWAH, N.J., Feb. 23, 2022 (GLOBE NEWSWIRE) -- Radware (NASDAQ: RDWR), a leading provider of cyber security and application delivery solutions, today announced that it has extended its state-of-the-art cloud application security offering, adding fully automated API Discovery capabilities. These capabilities, combined with newly automated security policy optimization, are part of Radwares integrated Application-Protection-as-a-Service solution, which includes cloud-based web application firewall (WAF), bot management, API security, and DDoS protection.

Delivering on the companys recently announced cloud services initiative, Radwares latest innovations offer security teams comprehensive and frictionless API protection. The API Discovery capabilities enable security teams to automatically identify and secure undocumented APIs without relying on human intervention or application and security expertise. Using advanced machine-learning algorithms, Radwares API protection works in real time to detect and block a broad range of threats. This includes defense against access violations, data leakage, automated bot-based threats, as well as DDoS and embedded attacks.

Many organizations are facing aknowledge gap on how to protect their APIs or incorrectly assume an API gateway can provide comprehensive protection. Frequent application changes and faster release cycles are only making this difficult situation worse, said Gabi Malka, Radwares chief operations officer and head of products and services. With our frictionless technology, we take human intervention and error out of the security equation. By automatically discovering undocumented APIs and applying a tailored security policy, we can accurately and effectively protect those APIs and keep them up to date.

Radware delivers state-of-the-art API protection through an innovative combination of capabilities. The solution:

Radware was included in Gartners 2021 Critical Capabilities for Cloud Web Application and API Protection report, ranking second among 11 vendors for API security and high security use cases. In addition to the industry, customers acknowledge Radwares technology expertise. Radware was recognized as a Customers Choice in the 2021 Gartner Peer Insights Voice of the Customer: Web Application Firewall Report.

About RadwareRadware (NASDAQ: RDWR) is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. Its award-winning solutions portfolio secures the digital experience by providing infrastructure, application, and corporate IT protection, and availability services to enterprises globally. Radwares solutions empower enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity, and achieve maximum productivity while keeping costs down. For more information, please visit the Radware website.

Radware encourages you to join our community and follow us on: Facebook, LinkedIn, Radware Blog, Twitter, YouTube, and Radware Mobile for iOS and Android.

2022 Radware Ltd. All rights reserved. Any Radware products and solutions mentioned in this press release are protected by trademarks, patents, and pending patent applications of Radware in the U.S. and other countries. For more details, please see:https://www.radware.com/LegalNotice/. All other trademarks and names are property of their respective owners.

Radware believes the information in this document is accurate in all material respects as of its publication date. However, the information is provided without any express, statutory, or implied warranties and is subject to change without notice.

The contents of any website or hyperlinks mentioned in this press release are for informational purposes and the contents thereof are not part of this press release.

Safe Harbor Statement This press release includes forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Any statements made herein that are not statements of historical fact, including statements about Radwares plans, outlook, beliefs, or opinions, are forward-looking statements. Generally, forward-looking statements may be identified by words such as believes, expects, anticipates, intends, estimates, plans, and similar expressions or future or conditional verbs such as will, should, would, may, and could. For example, when we say that by automatically discovering undocumented APIs and applying a tailored security policy, we can accurately and effectively protect those APIs and keep them up to date, we are using a forward-looking statement. Because such statements deal with future events, they are subject to various risks and uncertainties, and actual results, expressed or implied by such forward-looking statements, could differ materially from Radwares current forecasts and estimates. Factors that could cause or contribute to such differences include, but are not limited to: the impact of global economic conditions and volatility of the market for our products; natural disasters and public health crises, such as the coronavirus disease 2019 (COVID-19) pandemic; our ability to successfully implement our strategic initiative to accelerate our cloud business; our ability to expand our operations effectively; timely availability and customer acceptance of our new and existing solutions; risks and uncertainties relating to acquisitions or other investments; the impact of economic and political uncertainties and weaknesses in various regions of the world, including the commencement or escalation of hostilities or acts of terrorism; intense competition in the market for cyber security and application delivery solutions and in our industry in general, and changes in the competitive landscape; changes in government regulation; outages, interruptions, or delays in hosting services or our internal network system; compliance with open source and third-party licenses; the risk that our intangible assets or goodwill may become impaired; our dependence on independent distributors to sell our products; long sales cycles for our solutions; changes in foreign currency exchange rates; undetected defects or errors in our products or a failure of our products to protect against malicious attacks; the availability of components and manufacturing capacity; the ability of vendors to provide our hardware platforms and components for our main accessories; our ability to protect our proprietary technology; intellectual property infringement claims made by third parties; changes in tax laws; our ability to realize our investment objectives for our cash and liquid investments; our ability to attract, train, and retain highly qualified personnel; and other factors and risks over which we may have little or no control. This list is intended to identify only certain of the principal factors that could cause actual results to differ. For a more detailed description of the risks and uncertainties affecting Radware, refer to Radwares Annual Report on Form 20-F, filed with the Securities and Exchange Commission (SEC) and the other risk factors discussed from time to time by Radware in reports filed with, or furnished to, the SEC. Forward-looking statements speak only as of the date on which they are made and, except as required by applicable law, Radware undertakes no commitment to revise or update any forward-looking statement in order to reflect events or circumstances after the date any such statement is made. Radwares public filings are available from the SECs website at http://www.sec.gov or may be obtained on Radwares website at http://www.radware.com.

Media Contacts:Gerri DyrekRadwareGerri.Dyrek@radware.com

Excerpt from:
Radware Extends its Cloud Application Security with API Discovery and Threat Protection - GlobeNewswire

Read More..

SPS COMMERCE INC Management’s Discussion and Analysis of Financial Condition and Results of Operations (form 10-K) – marketscreener.com

The following discussion and analysis of our financial condition and results ofoperations should be read together with our audited financial statements andrelated notes which are included in Part II, Item 8, "Financial Statements andSupplementary Data" of this Annual Report on Form 10-K. Our actual results coulddiffer materially from those anticipated in the forward-looking statementsincluded in this discussion as a result of certain factors, including, but notlimited to, those discussed in Part I, Item 1A, " Risk Factors " of thisAnnual Report on Form 10-K.

Overview

Key Financial Terms and Metrics

Sources of Revenues

Fulfillment - Our Fulfillment product provides fulfillment automation andreplaces or augments an organization's existing staff and trading partnerelectronic communication infrastructure by enabling easy compliance withretailers' rulebooks, automatic, digital exchange of information among numeroustrading partners through various protocols, and greater visibility into thejourney of an order.

Cost of Revenues and Operating Expenses

Cost of Revenues - Cost of revenues consist primarily of personnel costs for ourcustomer success and implementation teams, customer support personnel, andapplication support personnel as well as network services costs.

Sales and Marketing Expenses - Sales and marketing expenses consist primarily ofpersonnel costs for our sales, marketing and product management teams,commissions earned by our sales personnel and marketing costs.

--------------------------------------------------------------------------------

Overhead Allocation - We allocate overhead expenses such as rent, certainemployee benefit costs, office supplies and depreciation of general officeassets to cost of revenues and operating expenses categories based on headcount.

Metrics and Non-GAAP Measures

Critical Accounting Policies and Estimates

--------------------------------------------------------------------------------

Internal-Use Software

Business Combinations

Results of Operations

Year Ended December 31, 2021 Compared to Year Ended December 31, 2020

Revenues - The increase in revenues resulted from two primary factors: theincrease in recurring revenue customers, which is driven by continued businessgrowth and by business acquisitions, and the increase in average recurringrevenues per recurring revenue customer, which we also refer to as wallet share.

The number of recurring revenue customers increased 13% to 37,500 at

December 31, 2021 from 33,150 at December 31, 2020 due to sales and

marketing efforts to acquire new customers and due to new acquisitions.

Wallet share increased 9% to $10,050 at December 31, 2021 from $9,250 at

December 31, 2020. This was primarily attributable to increased usage of

our products by our recurring revenue customers.

--------------------------------------------------------------------------------

Cost of Revenues - The increase in cost of revenues was primarily due toincreased headcount which resulted in an increase of $26.3 million inpersonnel-related costs and an increase of $2.8 million in stock-basedcompensation. Additionally, as we continued to invest in the infrastructuresupporting our platform, depreciation expense increased by $1.7 million.

Other Income (Expense) - The change was primarily due to unfavorable foreigncurrency exchange rate changes and decreased investment income.

13,127

5,538

18,936

--------------------------------------------------------------------------------

The following table provides a reconciliation of net income to non-GAAP incomeper share:

2020

18,936

5,538

Realized (gain) loss from foreign currency on cashand investments held

Year Ended December 31, 2020 Compared to Year Ended December 31, 2019

Liquidity and Capital Resources

--------------------------------------------------------------------------------

88,562

(120,469 )Net cash provided by (used in) financing activities $ (8,361 ) $ 2,328

Net Cash Flows from Operating Activities

Net Cash Flows from Investing Activities

The decrease in net cash used in investing activities was primarily due todecreased cash used for acquisitions of business and intangible assets, drivenby the larger acquisition in 2020 as compared to 2021.

Net Cash Flows from Financing Activities

The change in net cash flows from financing activities was primarily due to thedecrease in net proceeds from stock option exercises.

Contractual and Commercial Commitment Summary

Future Capital Requirements

Our future capital requirements may vary significantly from those now plannedand will depend on many factors, including:

costs to develop and implement new products and applications, if any;

sales and marketing resources needed to further penetrate our market and

gain acceptance of new products and applications that we may develop;

Historically, we have experienced increases in our expenditures consistent withthe growth in our operations and personnel, and we anticipate that ourexpenditures will continue to increase as we expand our business.

We believe our cash, cash equivalents, investments, and cash flows from ouroperations will be sufficient to meet our working capital and capitalexpenditure requirements for at least the next twelve months.

Off-Balance Sheet Arrangements

--------------------------------------------------------------------------------

We do not have any off-balance sheet arrangements, investments in specialpurpose entities or undisclosed borrowings or debt. Additionally, we are not aparty to any derivative contracts or synthetic leases.

Foreign Currency Exchange and Inflation Rate Changes

During the last three years, inflation and changing prices have not had amaterial effect on our business and we do not expect that inflation or changingprices will materially affect our business in the foreseeable future.

Recent Accounting Pronouncements

--------------------------------------------------------------------------------

Edgar Online, source Glimpses

See the article here:
SPS COMMERCE INC Management's Discussion and Analysis of Financial Condition and Results of Operations (form 10-K) - marketscreener.com

Read More..

ManageEngine to host 10th Middle East User Conference in Dubai – Khaleej Times

Rajesh Ganesan, Vice President, ManageEngine

Published: Wed 23 Feb 2022, 1:22 PM

ManageEngine, the enterprise IT management division of Zoho Corporation, announced that it will be hosting its 10th Middle East User Conference in Dubai on March 1 and 2 at the Ritz-Carlton, Dubai. The company will celebrate its 20th anniversary during the event as part of its Pillars of Support: Customers campaign, showcasing its long-standing customers, employees and partners at the user conference.

Utico, a major utility infrastructure developer and investor in the Middle East, is a longtime customer of ManageEngine. Joel Fernandes, deputy IT manager, Utico, said: Utico is proud of its association with ManageEngine for almost a decade now. In today's competitive business environment, any company, startup or enterprise, needs solutions that enhance operational efficiency and effectiveness. ManageEngine solutions have helped us achieve this over the years, and continues to do so in the area of service management, security, compliance and governance. We would especially like to thank ManageEngine's support and back-end team for their unwavering support and for promptly offering us the best resolutions."

ManageEngine's leading technology and domain experts will deliver keynote speeches at the conference on topics ranging from the evolving IT and cybersecurity landscape to how businesses can leverage new technology to stay ahead of the competition.

Rajesh Ganesan, vice president at ManageEngine, will highlight the evolving role of IT departments in the post-pandemic era, which has been dominated by remote-first work culture and a digital-first customer mindset. Prior to 2020, remote work was a perk, but today it has become the norm for many organisations. The global pandemic has led many organisations to rethink their work models and modify their work styles with the help of technology. This brings IT teams to the front line for business continuity, said Ganesan. "Irrespective of the pandemic, businesses have been undergoing significant changes over the last few years. In an increasingly tech-savvy world, customers expect digital-first experiences. At our conference, we aim to speak to our customers about this inevitable change and how empowering their employees is key to ensure business survival."

With the global pandemic redefining the parameters of work environments, organisations have increased their focus on online productivity systems and collaboration platforms. This has led to cloud security becoming an essential element in enterprise security, with businesses implementing cloud access security brokers (CASBs) so they can use cloud technology while protecting sensitive corporate data. ManageEngine will also highlight the recently launched CASB component of its SIEM solution, Log360, at the user conference.

Nirmal Manoharan, Regional Director of Sales, ManageEngine

ManageEngine presents yearly user conferences for its customers in the Middle East to discuss the companys roadmap and share knowledge and IT best practices. "This year's user conference is special for us as we mark the 20th anniversary of ManageEngine," said Nirmal Kumar Manoharan, regional sales director at ManageEngine. "We are excited to meet our customers and partners and celebrate this great milestone with them. In the last few months, there have been unprecedented changes globally due to the pandemic, and we have seen the commitment that our customers have mustered to drive their businesses forward. This year, we plan to utilise the user conference as a platform to share the latest technology trends, discover best practices to overcome challenges, and build a stronger, more vibrant customer ecosystem."

The two-day conference will offer detailed walk-throughs and live demonstrations of all major ManageEngine solutions, including ServiceDesk Plus, OpManager Plus, Applications Manager, Desktop Central, Mobile Device Manager Plus, Log360, Site24x7, and the entire suite of AD management products.

One-on-one sessions with product experts will also be available to ensure customers have the opportunity to receive answers to their questions. Participants can also take part in training sessions to increase their knowledge of the products, and they can take a test conducted by ManageEngine to become a certified product associate.

Read more:
ManageEngine to host 10th Middle East User Conference in Dubai - Khaleej Times

Read More..

Samsung shipped ‘100 million’ phones with flawed encryption – The Register

Academics at Tel Aviv University in Israel have found that recent Android-based Samsung phones shipped with design flaws that allow the extraction of secret cryptographic keys.

The researchers Alon Shakevsky, Eyal Ronen, and Avishai Wool describe their work in a paper titled, "Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design," which is scheduled for presentation at Real World Crypto and USENIX Security, 2022.

Android smartphones, which pretty much all use Arm-compatible silicon, rely on a Trusted Execution Environment (TEE) supported by Arm's TrustZone technology to keep sensitive security functions isolated from normal applications. These TEEs run their own operating system, TrustZone Operating System (TZOS), and it's up to vendors to implement the cryptographic functions within TZOS.

The Android Keystore, the researchers explain, offers hardware-backed cryptographic key management via the Keymaster Hardware Abstraction Layer (HAL). Samsung implemented the HAL through a Trusted Application running in the TrustZone called Keymaster TA, to carry out cryptographic operations like key generation, encryption, attestation, and signature creation in a secure environment. The results of these TEE crypto calculations can then be used in apps operating in the less secure Android environment.

The Keymaster TA stores cryptographic keys as blobs the keys are wrapped (encrypted via AES-GCM) so they can be stored in the file system of the Android environment. In theory, they should only be readable within the TEE.

However, Samsung failed to implement Keymaster TA properly in its Galaxy S8, S9, S10, S20, and S21 phones. The researchers reverse engineered the Keymaster app and showed they could conduct an Initialization Vector (IV) reuse attack to obtain the keys from the hardware-protected key blobs.

The IV is supposed to be a unique number each time, which ensures the AES-GCM encryption operation produces a different result even when the same plain text is encrypted. But when the IV referred to by the researchers as "salt" and encryption key remain the same, the same output gets generated. And that sort of predictability is the bane of encryption.

"So they could have derived a different key-wrapping key for each key they protect," observed Matthew Green, associate professor of computer science at the Johns Hopkins Information Security Institute in the US, via Twitter. "But instead Samsung basically doesnt. Then they allow the app-layer code to pick encryption IVs. This allows trivial decryption."

Our Tel Aviv University boffins found three blob formats used among the Samsung phones v15, v20-s9, and v20-s10. The first, v15, is the default in the Galaxy S8; v20-s9 corresponds to the Galaxy S9; and v20-s10 was found in the S10, S20, and S21.

In the v15 and v20-s9 blobs, the researchers say, the salt is a deterministic function that relies on the application ID, application data, and constant strings from the Android environment. So for any given application, corresponding key blobs will be protected by the same key-wrapping key.

"Surprisingly, we discovered that the Android client is allowed to set the IV when generating or importing a key," the paper stated. "All that is necessary is to place an attacker-chosen IV as part of the key parameters, and it is used by the Keymaster TA instead of a random IV.

"As the [Android environment] also controls the application ID and application data, this means that an attacker can force the Keymaster TA to reuse the same key and IV that were previously used to encrypt some other v15 or v20-s9 blobs. Since AES-GCM is a stream cipher, the attacker can now recover hardware-protected keys from key blobs."

More recent model Samsung devices with v20-s10 blobs are not normally vulnerable to IV reuse attacks, though the researchers found a way to conduct a downgrade attack by having the Android environment pass an "encryption version" parameter telling the device to use the vulnerable v15 blob format.

The weak crypto was also used by the researchers to bypass FIDO2 WebAuthn, a way to use public-key cryptography, instead of passwords, to register for and authenticate to websites. Their proof-of-concept attack allowed the researchers to authenticate themselves to a website protected by the Android StrongKey application. What's more, they also managed to bypass Google's Secure Key Import, designed to let servers share keys securely with Android devices.

In all, the researchers estimate 100 million Samsung devices were vulnerable when they identified the encryption flaw last year. However, they responsibly disclosed their findings to Samsung in May 2021, which led to the August 2021 assignment of CVE-2021-25444 to the vulnerability, and a patch for affected devices. In July 2021, they revealed their downgrade attack, which led in October 2021 to CVE-2021-25490 and a patch that removed the legacy blob implementation (v15) from devices including the S10, S20, and S21.

Looking ahead, the boffins argue that an encryption scheme other than AES-GCM, or an IV reuse resistant version like AES-GCM-SIV, should be considered.

Samsung did not immediately respond to a request to confirm the researchers' estimate of affected devices and to estimate how many affected devices, if any, remain unpatched.

See the original post here:
Samsung shipped '100 million' phones with flawed encryption - The Register

Read More..

VeraCrypt 1.25.9 Encryption Software fixes BSOD on Windows – Ghacks Technology News

VeraCrypt is a popular open source encryption software that is based on the abandoned TrueCrypt application. VeraCrypt 1.25.9 was released on February 19, 2022 to the public.

The new version of the encryption software is already available. New and existing users may download the latest version from the official website for all supported operating systems. Select Help > About in the application interface to find out which version of VeraCrypt is installed.

VeraCrypt 1.25.9 includes fixes for the three supported operating systems Windows, Mac OS and Linux. Most changes apply only to the Windows version, including a fix for a BSOD that could happen on shutdown.

VeraCrypt erases the system encryption keys on shutdown by default; this procedure caused Blue Screens of Death on some Windows devices. The developers have created a new Registry key that toggles the erasing of the encryption keys on Windows devices.

The workaround is only required on systems that are affected by BSOD errors during shutdown. The Windows version of VeraCrypt includes several other changes:

Linux and Mac OS builds of VeraCrypt share a fix, which is also the only fix for Mac OS. Both address a hidden volume settings display issue when enabling hidden volume protection in the mount options window.

The Linux version has three additional fixes and improvements, including one crash fix. You can check out the entire changelog here.

Now You: do you use encryption software?

Summary

Article Name

VeraCrypt 1.25.9 Encryption Software fixes BSOD on Windows

Description

VeraCrypt is a popular open source encryption software that is based on the abandoned TrueCrypt application. VeraCrypt 1.25.9 was released on February 19, 2022 to the public.

Author

Martin Brinkmann

Publisher

Ghacks Technology News

Logo

Continued here:
VeraCrypt 1.25.9 Encryption Software fixes BSOD on Windows - Ghacks Technology News

Read More..

How to lock a hard drive with a password in Windows 11 – St. George Daily Spectrum

George Cox| PC Periodicals

In this article, I will tell you how to lock your hard drive with a password using windows in-built feature BitLocker. This is a great way to protect your files from prying eyes and keep your system secure.

There are many benefits to locking your hard drive with a password. Some of these benefits include:

BitLocker is free software from Microsoft that allows you to encrypt your entire hard drive. It does this by creating a virtual encrypted disk within the physical disk. This is done in such a way that all data stored on the drive can only be accessed when using an authorized password. It is a good idea to use BitLocker with a password you have never used elsewhere.

When a drive is locked through BitLocker, it is not possible to access the data on the drive without the correct password. Even if the hard drive is removed from the computer and attached to another machine, it will be inaccessible.

BitLocker uses the advanced encryption standard (AES) with 128-bit or 256-bit keys to protect your data. AES is a very strong encryption algorithm that is used by the US government to protect classified information.

BitLocker can utilize two types of encryption, 128-bit or 256-bit, depending on the operating system you are using. The different levels of encryption protect your data with different strengths of security. For example, a lower level would be fine for protecting the information you do not need very securely. However, if you are storing classified government information, you would want to use a higher level of encryption.

On Windows 11, there are two types of BitLocker Encryption you can utilize:

In order to use BitLocker, your computer must meet the following system requirements:

To lock your hard drive with BitLocker in Windows 11:

Though BitLocker is an excellent feature to password lock your hard drive, it has some limitations:

BitLocker encryption is an excellent way to password protect your hard drive. It has many benefits, such as preventing access to data by unauthorized users, preventing the installation of malware, and preventing the copying of files to USB flash drives or external hard drives. Though it has some limitations, such as not being available on all versions of Windows and only being compatible with TPM version 1.2 or higher, the benefits of BitLocker encryption far outweigh these limitations.

If you are using BitLocker Drive Encryption on Windows 11, the unlocking process is pretty straightforward. Just type in your password and click unlock. Unfortunately, if you are using BitLocker To Go on another OS like Windows XP or Vista, unlocking drives can be a little more difficult. You will need to type in the Recovery Key Code that you created when you set up BitLocker. If you have lost or forgotten your Recovery Key Code, you can use the Find my recovery key feature on the BitLocker website to unlock your drive.

You should encrypt as much of your hard drive as possible for total protection and privacy.

Stay protected!

George Cox is the owner of Computer Diagnostics and Repair. He can be reached at 346-4217.

Read this article:
How to lock a hard drive with a password in Windows 11 - St. George Daily Spectrum

Read More..

Global Hardware-based Full Disk Encryption Market Outlook by Types, Applications, End Users and Opportunities 2021 to 2027 ZNews Africa – ZNews…

Global Hardware-based Full Disk Encryption Market from 2021 to 2027 is the title of a major market research study performed by MarketsandResearch.biz that examines market growth prospects and opportunities. The research includes an industry summary, requirements, product description, and goals, as well as an industry analysis. The major goal of the research is to give broad information about the industrys competitors, market trends, market potential, growth rate, and other important statistics.

It focuses on market features such as main drivers, opportunities, limiting factors, and challenges in the global market. This research will aid business strategists since it will enable them to expand effectively in both global and regional markets.

DOWNLOAD FREE SAMPLE REPORT: https://www.marketsandresearch.biz/sample-request/164377

The research investigates the key roadblocks to market development, such as how global Hardware-based Full Disk Encryption marketplaces provide new opportunities. The expansion techniques and procedures, growth forecasts, manufacturing plans, and cost structures are all explained in this report. The report will include detailed consumption information, as well as import and export statistics from regional and global markets, as well as revenue and gross margin analyses.

The following manufacturers are included prominently in the market report:

This report focuses on many major regions on a regional level:

The following product kinds are highlighted in the report:

The following are the top applications highlighted in the report:

ACCESS FULL REPORT: https://www.marketsandresearch.biz/report/164377/global-hardware-based-full-disk-encryption-market-2021-by-manufacturers-regions-type-and-application-forecast-to-2026

The research investigates the major roadblocks to market growth as well as the worldwide Hardware-based Full Disk Encryption overall market development possibilities. The expansion aims and methods, as well as growth numbers, manufacturing methodologies, and cost structures, are all explained in this document. The study might include detailed consumption information, regional and worldwide market import and export, revenue, and gross margin analyses.

Customization of the Report:

This report can be customized to meet the clients requirements. Please connect with our sales team ([emailprotected]), who will ensure that you get a report that suits your needs. You can also get in touch with our executives on +1-201-465-4211 to share your research requirements.

Contact UsMark StoneHead of Business DevelopmentPhone: +1-201-465-4211Email: [emailprotected]Web: http://www.marketsandresearch.biz

See the original post:
Global Hardware-based Full Disk Encryption Market Outlook by Types, Applications, End Users and Opportunities 2021 to 2027 ZNews Africa - ZNews...

Read More..