Page 2,626«..1020..2,6252,6262,6272,628..2,6402,650..»

London open: Stocks fall as investors digest jobs data; miners in the red – Vox Markets

(Sharecast News) - London stocks edged lower in early trade on Tuesday as investors digested the latest UK jobs data, weighed down by weakness in the mining sector and a disappointing update from Ocado.At 0840 BST, the FTSE 100 was down 0.3% at 7,046.51.

Figures released earlier by the Office for National Statistics showed worker numbers bounced back in August to pre-pandemic levels, while job vacancies hit a record high as the recovery from the Covid-19 crisis continues.

The number of workers on payrolls increased by 241,000 from August to 29.1m, while the number of job vacancies in the June to August period rose 35% to a new record high of 1.03m, with the biggest jump in hiring seen in hotels and restaurants.

Meanwhile, the unemployment rate fell to 4.6% in July from 4.7% the month before, in line with analysts' expectations.

In the three months to July, average earnings fell to 8.3% from 8.8% but were ahead of expectations of 8.2%.

ONS deputy national statistician Jonathan Athow said: "Early estimates from payroll data suggest that in August the total number of employees is around the same level as before the pandemic, though our surveys show well over a million are still on furlough.

"However, this recovery isn't even: in hard-hit areas such as London and sectors such as hospitality and arts and leisure, the numbers of workers remain well down on pre-pandemic levels.

"The overall employment rate continues to recover, particularly among groups such as young workers who were hard hit at the outset of the pandemic, while unemployment has fallen.

"Vacancies reached a new record high. Not surprisingly, this is driven above all by hospitality, the sector with the highest proportion of employers reporting their job openings are hard to fill."

In equity markets, Ocado slumped after the online supermarket said sales at Ocado Retail dropped by considerably more than expected over its third quarter, but only due to a conflagration at its customer fulfilment centre at Erith.

Miners were under the cosh as copper prices fell, with BHP, Glencore, Anglo American, Rio Tinto and Antofagasta all lower. Mining giant BHP was also hit by a downgrade to 'equalweight' at Barclays.

On the upside, JD Sports Fashion surged to the top of the FTSE 100 after it reported record first-half results, boosted by pent-up demand after UK stores reopened from lockdown and acquisitions in the US.

Pre-tax profit before exceptional items jumped to 439.5m in the six months to the end of July from 61.9m a year earlier as revenue rose to 3.89bn from 2.54bn. JD said it expected annual headline pre-tax profit for the full year to be at least 750m.

Trainline rallied as it predicted a return to profit in the first half of the year as ticket sales recovered from the damage inflicted early in the pandemic. Group net ticket sales were 666m in the three months to the end of August to stand at 71% of the total two years earlier. In the first half net ticket sales of 1bn were 54% of the level two years earlier.

Market Movers

FTSE 100 (UKX) 7,046.51 -0.31%FTSE 250 (MCX) 23,809.11 0.14%techMARK (TASX) 4,685.12 0.13%

FTSE 100 - Risers

JD Sports Fashion (JD.) 1,141.50p 8.82%Ashtead Group (AHT) 5,918.00p 1.44%Royal Mail (RMG) 493.60p 1.27%M&G (MNG) 207.10p 1.17%SSE (SSE) 1,650.00p 1.13%InterContinental Hotels Group (IHG) 4,663.00p 1.13%Bunzl (BNZL) 2,592.00p 0.97%Kingfisher (KGF) 358.80p 0.93%B&M European Value Retail S.A. (DI) (BME) 583.80p 0.86%Barratt Developments (BDEV) 701.80p 0.69%

FTSE 100 - Fallers

Ocado Group (OCDO) 1,795.50p -4.77%International Consolidated Airlines Group SA (CDI) (IAG) 145.40p -1.96%BHP Group (BHP) 2,040.50p -1.92%Glencore (GLEN) 333.60p -1.85%Anglo American (AAL) 3,037.50p -1.79%HSBC Holdings (HSBA) 374.40p -1.56%Rio Tinto (RIO) 5,211.00p -1.44%Antofagasta (ANTO) 1,438.50p -1.37%Melrose Industries (MRO) 177.50p -1.20%Rolls-Royce Holdings (RR.) 110.62p -1.18%

FTSE 250 - Risers

Trainline (TRN) 392.40p 3.81%Contour Global (GLO) 195.20p 2.31%Hammerson (HMSO) 34.03p 2.04%Future (FUTR) 3,746.00p 1.79%888 Holdings (888) 400.20p 1.68%WH Smith (SMWH) 1,590.00p 1.63%Frasers Group (FRAS) 673.50p 1.51%Countryside Properties (CSP) 531.50p 1.43%UK Commercial Property Reit Limited (UKCM) 77.30p 1.31%Cineworld Group (CINE) 64.08p 1.30%

FTSE 250 - Fallers

Ferrexpo (FXPO) 361.20p -4.80%Restaurant Group (RTN) 120.00p -3.54%Cairn Energy (CNE) 184.80p -2.17%Petropavlovsk (POG) 19.83p -1.54%PureTech Health (PRTC) 345.50p -1.29%Fidelity China Special Situations (FCSS) 347.50p -1.28%TP Icap Group (TCAP) 160.00p -1.26%Hill & Smith Holdings (HILS) 1,862.00p -0.85%Shaftesbury (SHB) 618.50p -0.80%Hochschild Mining (HOC) 153.90p -0.77%

View post:

London open: Stocks fall as investors digest jobs data; miners in the red - Vox Markets

Read More..

Korea ranks 4th in 2021 International Earth Science Olympiad – koreatimes

National 2021-09-1519:23 Korea ranks 4th in 2021 International Earth Science Olympiad By Kim Bo-eunKorea ranked fourth out of 32 countries in the 14th International Earth Science Olympiad (IESO) held last month, a government foundation said this week. The annual competition for secondary school students was resumed online from Aug. 25 to 30 after last year's event was cancelled due to the COVID-19 pandemic. A total of 206 students from 32 countries took part in this year's competition.The competition is comprised of a data mining test using big data and a national team field investigation involving a presentation. Along with the competition, the event also held projects where students took part in researching environmental problems and presenting solutions to them.Kim Keum-min, a third-year student at Incheon Science High School, received an "excellent" rating in the data mining test by making it into the top 15 percentile.The excellent rating is equivalent to a gold medal. The IESO usually awards medals, but provided "excellent," "very good" and "good" ratings this year as the competition was held online.Four Korean students received the "very good" rating and three received the "good" rating in the same category. The Korea team also received two "very good" ratings and two "good" ratings in the national team field investigation.This year's competition presented questions on climate change, the COVID-19 pandemic and exploring Mars, enabling students to come up with solutions to pending issues."We will continue to support the students after the competition so that they can become key figures in the field of future science," Korean Foundation for the Advancement of Science & Creativity (KOFAC) President Cho Yul-rae was quoted as saying in a press release.

Go here to see the original:

Korea ranks 4th in 2021 International Earth Science Olympiad - koreatimes

Read More..

Researchers Generate an Entire Virtual Universe and Make it Available for Download (if you Have 100 Terabyt… – Universe Today

Astronomy is a bit different from many sciences because you only have a sample size of 1. The cosmos contains everything we can observe, so astronomers cant study multiple universes to see how our universe ticks. But they can create computer simulations of our universe. By tweaking different aspects of their simulation, astronomers can see how things such as dark matter and dark energy play a role in our universe. Now, if you are willing to spring for a fancy hard drive, you can keep one of these simulations in your pocket.

The Uchuu simulation is the largest and most detailed simulation of the universe ever made. It contains 2.1 trillion particles in a space 9.6 billion light-years across. The simulation models the evolution of the universe across more than 13 billion years. It doesnt focus on the formation of stars and planets but instead looks at the behavior of dark matter within an expanding universe. The detail of Uchuu is high enough that the team can identify everything from galaxy clusters to the dark matter halos of individual galaxies. Since dark matter makes up most of the matter in the universe, it is the main driver of galaxy formation and clustering.

It takes a tremendous amount of computational power and storage to create such a detailed model. The team used over 40,000 computer cores and 20 million computer hours to generate their simulation, and it produced more than 3 Petabytes of data. Thats 3,000 Terabytes or 3 million Gigabytes for us mortals. Using high-density compression, however, the team was able to compress their results into a mere 100 Terabytes of storage.

Thats still a tremendous amount of data, but it can be stored on a single drive. For example, the Exadrive from Nimbus is a 100 Tb solid-state drive in a standard 3.5-inch form factor. Granted, it will set you back $40,000, but if you have that kind of change hiding between your couch cushions, why not use it to keep a universe in your pocket. Fortunately, if you dont have that much spare change, you can access the data online. The Uchuu team has their raw data on skiesanduniverses.org, so you can explore their virtual universe all you want.

In addition to being a detailed cosmic simulation, the Uchuu simulation can be used by researchers working on scientific data mining. As large sky surveys and more simulations are created, the data will become so large data mining will play a crucial role in astronomical research. Until that data becomes available, data miners can hone their skills on a pocket universe.

Reference: Ishiyama, Tomoaki, et al. The Uchuu simulations: Data Release 1 and dark matter halo concentrations. Monthly Notices of the Royal Astronomical Society 506.3 (2021): 4210-4231.

Like Loading...

Read the original post:

Researchers Generate an Entire Virtual Universe and Make it Available for Download (if you Have 100 Terabyt... - Universe Today

Read More..

Salesforce com : Dreamforce for Marketers Will Reveal New Innovations and Career Growth Tips – Marketscreener.com

Dreamforce 2021 will include many free resources for marketers.

Marketers are seeing their efforts in a new light as they keep pace with today's digital-first, work-from-anywhere world. In Salesforce's latest State of Marketing report, 77% of marketers reported feeling that their work provides greater value now than it did a year ago. But growing the skills to deliver that value is a work in progress. As we juggle major privacy changes, always-on holiday planning, customer data transformations, and more, it's clear that our profession isn't slowing down. And we can't, either.

The good news is there are plenty of tools to help you. Dreamforce - the global family reunion for the Salesforce community - kicks off Sept. 21, and it includes many free resources. Our Dreamforce for marketers experience will include interactive and on-demand sessions to help you understand your customers better, humanize every moment, and optimize your impact to build better relationships.

Experience marketing's biggest moments at our show-stopping community event of the year.

Register for free

Here's a look at highlights of live and on-demand Dreamforce sessions. Download our Dreamforce for Marketers guide for more details.

Big, bright, and bold ideas are coming to you through live, digital experiences Sept. 21-23. All of it will be hosted on Salesforce+, our new streaming service for live and on-demand content.

When work flows, relationships grow. Slack is changing the way that marketers engage with projects, connect with systems, and share information with internal and external partners. Learn about the latest Salesforce integrations and innovations for marketing workflows.

The shift is already on from cookies to new ways of targeting and measuring marketing. Consumers are changing, too, as they demand more value in exchange for their data. Find out how the rise of real-time unified profiles, artificial intelligence-driven measurement methods, changes in the IDs used for ads and marketing, and the privacy imperative will impact marketers - and what we can do to thrive moving forward.

Marketers can tap into the full power of Salesforce to launch and uplevel real-time personalization, analyze the impact of your campaigns, glean insights across the full customer journey to optimize your efforts, and more. Get inspired by stories from Trailblazers like Boston Scientific and check out demos to see how the Salesforce ecosystem can help you work smarter, not harder, for your customers.

When it comes to connecting your marketing data, having a customer relationship management solution isn't enough. Customer data platforms (CDPs) are the key to maintaining a single source of truth for your data so you can create the personalized experiences customers want. Learn more about the Salesforce CDP and its ability to supercharge customer interactions everywhere.

To succeed in today's digital-first world, you need to market, sell, and engage audiences from anywhere. Learn how Trailblazers from Casper and Kimberly-Clark are engaging their customers digitally and see Salesforce's latest innovations to help you innovate and get more from digital.

You've got questions? We've got experts - with answers! Schedule a 1:1 meeting at the virtual 'Ask the Experts' bar for marketers. Register today.

Unlock the best marketing content in the industry - including powerful stories and how-to advice from members of our Trailblazer community - on Salesforce+ starting Sept. 21.

The following is just a sample of what you'll find; download our Dreamforce for Marketers guide for the full list.

Neural networks, natural language processing, data mining, cognitive computing - there's a lot of mystery and jargon surrounding AI, but it's easier to grasp than you think. Get a simple understanding of AI and data principles and find tips for taking the next step.

Are you a B2B marketer ramping up your account-based marketing (ABM) approach? One Trailblazer from Valpak explains what it looks like to grow your ABM program using a 'crawl-walk-run' approach with Salesforce and the resources you have available today.

In today's digital-first world, customer expectations are changing just as fast as our tools. Are you using data and analytics to measure your impact? Learn three principles for creating a marketing analytics strategy, the role of first-party data in developing a data-driven culture, and PepsiCo's approach for using data to enhance customer interactions.

B2B companies need more meaningful ways to understand and engage their prospects, customers, and partners. Zebra Technologies reduced bounce rates and increased form fills by creating website content tailored to behavior, location, product interests, and other visitor attributes. Learn what Zebra did and why it worked.

Retail has quickly shifted from Cyber Monday to year-round holiday planning. Rack Room Shoes shares tips for using AI to personalize cross-channel messaging and turning data into action so you can gift your customers with personalized content whenever they're ready to buy.

Register for Dreamforce today and tag a friend or two.

Download the Dreamforce for Marketers guide to plan your schedule.

Take the Marketing Cloud Dreamforce 2021 companion trailmix in Trailhead to get a primer on some of the event's hottest marketing topics.

Read the original here:

Salesforce com : Dreamforce for Marketers Will Reveal New Innovations and Career Growth Tips - Marketscreener.com

Read More..

Ethereum, Cardano have ‘great use cases,’ but this altcoin might lead autumn – AMBCrypto News

Of late, especially after the market crash on 7 September, altcoins have been outperforming Bitcoin. The worlds largest cryptocurrencys market dominance, for instance, has taken a beating too, falling to just over 41.4% at press time. On the contrary, many of the markets opposing alts have seen their shares hike. Do these findings signify anything?

Well, according to BlockchainCentre, this might be an Altcoin month. This is a belief held by many in the crypto-community. Not just by proponents, but by ex-White House staffers as well. More specifically, a former White House Press Secretary is betting big on some altcoins.

During an interview with CNBC, SkyBridge Capital Chief Executive Anthony Scaramucci asserted that he is bullish on Ethereum, Cardano, and Algorand. The reason being Their great use cases.

According to the former White House staffer,

Theres a lot of great stuff happening in this space As more digital applications happen, some of those altcoins, stuff like Algorand or Cardano, or things like Ethereum, will continue to rise because there are actually great use cases for them.

Scaramucci, a long-time Bitcoin proponent, did however add that Ethereum could be on its way to becoming a store-of-value asset.

I think theres a very big market for Ethereum and I predict that Ethereum has good fundamentals and will grow.

That wasnt all, however. For months, despite ETHs price performance, there have been several concerns about the altcoins lack of institutional adoption. That could change soon though, with Scaramucci responding to a question by claiming,

Could we have an Ethereum fund in the future? Yes, we certainly could. Everything that youre saying is true with the non-fungible tokens, and the technology around Ethereum is going to make it a sticky cryptocurrency and a store of value and something that people will transact with.

Cardano, understandably, is another altcoin the exec is hyped about. With ADA hitting new ATHs recently and the network awaiting the Alonzo mainnet upgrade on the 12th, these expectations are warranted.

Its worth pointing out, however, that the exec seemed particularly optimistic about the crypto ranked 17th Algorand (ALGO).

At press time, it was trading well above the $2 mark following a weekly surge of over 70%. In fact, the SkyBridge Capital chief even tweeted about the alt, commenting,

He isnt the only one to share such sentiments, however.

Whats more, according to Spartan Groups Jason Choi,

ALGOs price has gone way ahead of fundamentals for now, with a dramatic increase in OI as mania kicked in.

Needless to say, if the aforementioned altcoins continue to tread their press time price trajectories, Altcoin month might well and truly be here.

View post:
Ethereum, Cardano have 'great use cases,' but this altcoin might lead autumn - AMBCrypto News

Read More..

Altcoin Spikes After Fake Press Release That Walmart Is Accepting It Immediately Crashes After Truth Is Discovered – Wonderful Engineering

You simply cant trust the news these days

Recently a fake press release started circulating on the internet which claimed a partnership between Walmart and the cryptocurrency Litecoin. When the fake news went as far as to state that Walmart will start accepting Litecoin as an authentic form of payment from its customers, it didnt take long for the prices of the cryptocurrency to sky-rocket before crashing back down again.

The news was later debunked by Walmart and confirmed that it was a fake announcement. Walmart even contacted the press release distribution service GlobeNewswire to find out the culprit behind posting such news and getting away with it. Whats more hilarious is that the fake release also included alleged quotes from Doug McMillion, Walmart CEO and Charlie Lee, Litecoin creator. The original press release has been taken down but an archived version of it can still be found online (the wonders of the internet where nothing is ever really lost) which states that Walmart would offer their shoppers [sic] to use Litecoin to benefit from the features of cryptocurrency.

As soon as the fake press release was released, the price of Litecoin quickly climbed about 20%, before it came crashing back down after finding the truth about the news. Maybe someone was filming a prank video and everyone buying Litecoin were the targets before they finally realized what was actually happening.

This wouldnt be the first time someone tried to manipulate crypto prices before everyone finally caught on to what was actually happening. Back in February, Elon Musk posted a cryptic tweet that led to an 11% decrease in bitcoin prices in a matter of minutes. In the world of cryptocurrency, where every second matters, some false claims can have drastic results.

Read more from the original source:
Altcoin Spikes After Fake Press Release That Walmart Is Accepting It Immediately Crashes After Truth Is Discovered - Wonderful Engineering

Read More..

Zoom unveils new security features including end-to-end encryption for Zoom Phone, verified identities and… – ZDNet

Zoom announced a slate of new security features users can take advantage of as the school year begins and millions continue to work and learn remotely.

At Zoomtopia, the company announced that end-to-end encryption, which they rolled out last October in Zoom Meetings, will now be available for Zoom Phone users.

Zoom Phone users can upgrade to end-to-end encryption "during one-on-one phone calls that occur via the Zoom client."

"During a call, users can click 'More' to find the option to enable end-to-end encryption. The upgrade takes under a second and helps users get security protection against server compromise," the company explained in a statement.

"Users can optionally exchange security codes over the voice channel to rule out the presence of a 'meddler in the middle.' E2EE for Zoom Phone will be available in the coming year."

Zoom also announced two other features designed to enhance the security of its platform: Bring Your Own Key (BYOK) and Verified Identity.

BYOK was designed to help customers who have to deal with stringent compliance requirements or data residency needs. The tool allows users to manage their own encryption keys, creating a system where people will own and manage a key management system in AWS. The system will contain a customer master key that Zoom cannot access or see.

"Zoom will interact with the customer's KMS to obtain data keys for encryption and decryption and will use these data keys to encrypt and decrypt customer assets before those assets are written to long-term storage. Zoom will not store plaintext data keys in long-term data storage," Zoom explained in a statement.

"BYOK is a separate offering from E2EE and is not designed for real-time use cases like streaming video. It's best used for the secure storage of larger assets, such as recording files. BYOK will roll out as a customer beta in the coming months for recordings for Zoom Meetings, recordings for Zoom Video Webinars, Zoom Phone voicemails and recordings, and calendar for Zoom Rooms."

Verified Identity was built to help address the growing sophistication of social engineering and phishing attacks. The Verified Identity feature allows users to determine if a meeting guest is actually who they say they are.

Zoom said the tool would helpusers who deal with classified information, specialized services and more. Multi-factor authentication is used to vet users entering a meeting. The tool asks you to identify your role in an organization, your credentials and the network you use. It also provides information about your device, authentication apps, codes, biometrics and email addresses.

It also uses passwords, security questions and profile information to verify users.

"To make attestation and authentication integral to the Zoom experience, we're working with Okta to help verify users as they join Zoom Meetings. Once they're in a meeting, a user will have a checkmark next to their name and can share their verified profile information -- including name, email address, and company domain -- with meeting participants," Zoom explained.

"Meeting hosts can use in-meeting security controls to remove a participant if for some reason they are not verified, or the displayed information seems incorrect. Displaying verified profile information via Okta will be available sometime next year and is the start of Zoom's long-term identity attestation and verification initiative strategy."

See more here:
Zoom unveils new security features including end-to-end encryption for Zoom Phone, verified identities and... - ZDNet

Read More..

Insights on the Hardware Encryption Global Market to 2026 – by Algorithm & Standard, Architecture, Product, Application and Region – PRNewswire

DUBLIN, Sept. 13, 2021 /PRNewswire/ -- The "Hardware Encryption Market: Global Industry Trends, Share, Size, Growth, Opportunity and Forecast 2021-2026" report has been added to ResearchAndMarkets.com's offering.

The global hardware encryption market exhibited strong growth during 2015-2020. Encryption refers to the process of utilizing an algorithm to convert information or data into codes to prevent any unauthorized access. It protects sensitive data by transforming it into an unreadable ciphertext which can be decrypted using an encryption key. These types of encryption utilize a dedicated processor, which aids in the tasks of authentication and encryption. This processor is physically located on the encrypted drive which often generates the encryption key that can be unlocked using the user's password. Since it protects the data against threats, such as cold boot, malicious code and brute force attacks, it is widely being adopted across diverse industry verticals, including banking, corporate, IT & Telecom, healthcare, etc.

Escalating adoption rates of portable storage devices which are used to transfer information between computers and create backup are one of the major factors contributing to the market growth. Hardware encryption devices offer efficient confidentiality of personal data from unauthorized access, which has positively influenced their sales globally. Furthermore, the rising cases of cyber-attacks have led private organizations as well as governments to make a shift toward hardware encryption as these systems are more resilient and deliver faster performance when compared with software encryptions. Moreover, the increasing sales of consumer electronics have led smartphone manufacturers to include fingerprint scanners in their devices. This protects the privacy of the users as well as makes the process of encryption and decryption faster. Looking forward, the publisher expects the global hardware encryption market to grow at a CAGR of around 30% during the forecast period (2021-2026).

Competitive Landscape:

The report has also analysed the competitive landscape of the market with some of the key players being Gemalto NV, IBM Corp., Imation Corp., Maxim Integrated Products, Micron Technology, Netapp, Samsung Electronics, SanDisk Corporation, Seagate Technology, Thales, Toshiba Corp., Western Digital Corp., Western Digital Technologies, Winmagic, etc.

Key Questions Answered in This Report:

Key Topics Covered:

1 Preface

2 Scope and Methodology

3 Executive Summary

4 Introduction4.1 Overview4.2 Key Industry Trends

5 Global Hardware Encryption Market5.1 Market Overview5.2 Market Performance5.3 Impact of COVID-195.4 Market Forecast

6 Market Breakup by Algorithm and Standard6.1 Advanced Encryption Standard (AES)6.1.1 Market Trends6.1.2 Market Forecast6.2 Rivest-Shamir-Adleman (RSA)6.2.1 Market Trends6.2.2 Market Forecast6.3 Others6.3.1 Market Trends6.3.2 Market Forecast

7 Market Breakup by Architecture7.1 Field-Programmable Gate Arrays (FPGA)7.1.1 Market Trends7.1.2 Market Forecast7.2 Application-Specific Integrated Circuits (ASIC)7.2.1 Market Trends7.2.2 Market Forecast

8 Market Breakup by Product8.1 External Hard Disk Drives8.1.1 Market Trends8.1.2 Market Forecast8.2 Internal Hard Disk Drives8.2.1 Market Trends8.2.2 Market Forecast8.3 lnline Network Encryptors8.3.1 Market Trends8.3.2 Market Forecast8.4 USB Flash Drives8.4.1 Market Trends8.4.2 Market Forecast8.5 Others8.5.1 Market Trends8.5.2 Market Forecast

9 Market Breakup by Application9.1 Consumer Electronics9.1.1 Market Trends9.1.2 Market Forecast9.2 IT & Telecom9.2.1 Market Trends9.2.2 Market Forecast9.3 Transportation9.3.1 Market Trends9.3.2 Market Forecast9.4 Aerospace and Defense9.4.1 Market Trends9.4.2 Market Forecast9.5 Healthcare9.5.1 Market Trends9.5.2 Market Forecast9.6 BFSI9.6.1 Market Trends9.6.2 Market Forecast9.7 Others9.7.1 Market Trends9.7.2 Market Forecast

10 Market Breakup by Region

11 SWOT Analysis

12 Value Chain Analysis

13 Porters Five Forces Analysis

14 Competitive Landscape14.1 Market Structure14.2 Key Players14.3 Profiles of Key Players14.3.1 Gemalto NV14.3.1.1 Company Overview14.3.1.2 Product Portfolio14.3.2 IBM Corp.14.3.2.1 Company Overview14.3.2.2 Product Portfolio14.3.3 Imation Corp.14.3.3.1 Company Overview14.3.3.2 Product Portfolio14.3.4 Maxim Integrated Products14.3.4.1 Company Overview14.3.4.2 Product Portfolio14.3.4.3 Financials14.3.4.4 SWOT Analysis14.3.5 Micron Technology14.3.5.1 Company Overview14.3.5.2 Product Portfolio14.3.5.3 Financials14.3.5.4 SWOT Analysis14.3.6 Netapp14.3.6.1 Company Overview14.3.6.2 Product Portfolio14.3.6.3 Financials14.3.6.4 SWOT Analysis14.3.7 Samsung Electronics14.3.7.1 Company Overview14.3.7.2 Product Portfolio14.3.7.3 Financials14.3.7.4 SWOT Analysis14.3.8 SanDisk Corporation14.3.8.1 Company Overview14.3.8.2 Product Portfolio14.3.9 Seagate Technology14.3.9.1 Company Overview14.3.9.2 Product Portfolio14.3.10 Thales14.3.10.1 Company Overview14.3.10.2 Product Portfolio14.3.11 Toshiba Corp.14.3.11.1 Company Overview14.3.11.2 Product Portfolio14.3.11.3 Financials14.3.11.4 SWOT Analysis14.3.12 Western Digital Corp.14.3.12.1 Company Overview14.3.12.2 Product Portfolio14.3.12.3 Financials14.3.12.4 SWOT Analysis14.3.13 Western Digital Technologies14.3.13.1 Company Overview14.3.13.2 Product Portfolio14.3.14 Winmagic14.3.14.1 Company Overview14.3.14.2 Product Portfolio

For more information about this report visit https://www.researchandmarkets.com/r/6v5kst

Media Contact:

Research and Markets Laura Wood, Senior Manager [emailprotected]

For E.S.T Office Hours Call +1-917-300-0470 For U.S./CAN Toll Free Call +1-800-526-8630 For GMT Office Hours Call +353-1-416-8900

U.S. Fax: 646-607-1904 Fax (outside U.S.): +353-1-481-1716

SOURCE Research and Markets

http://www.researchandmarkets.com

Read the original here:
Insights on the Hardware Encryption Global Market to 2026 - by Algorithm & Standard, Architecture, Product, Application and Region - PRNewswire

Read More..

Light Start: WhatsApp rolls out backup encryption, LG is more attractive, Google goes dark and iPhones only laak gud vaabs Stuff – Stuff Magazines

Google is the next to go dark

In case you havent noticed, and at the risk of sounding dramatic, the dark mode revolution is upon us and will consume everything given enough time. Dark mode users rejoice as Google.com will soon offer a dark mode. If all of that went over your head, allow us to change your life for the better.

If you didnt know, the advances in science and technology have allowed us to make our apps darker. Gone are the days of receiving a text a few minutes after turning out the light, going to read the text and your phone screen burning your retinas. You need not suffer anymore. Google.com is by no means the first implementation of a dark mode, but it is an indication that the practice is becoming more mainstream.

Google says the feature is rolling out from today. To check if you can enable it, head to the Google home page in our case google.co.za and look for the settings button in the bottom right corner. From the popup menu choose search settings. On the right, you should see a few options, one of which will be Appearance, you can enable dark mode in there. If you dont see it yet (like us) then youll need to wait a bit longer.

Source: ArsTechnica

Read the original:
Light Start: WhatsApp rolls out backup encryption, LG is more attractive, Google goes dark and iPhones only laak gud vaabs Stuff - Stuff Magazines

Read More..

Revenant REvil. WhatsApp offers encryption. Hortum spyware in Turkey. Update on the UN data breach. Healthcare breaches disclosed. – The CyberWire

At a glance.

Last week we noted the servers of recently folded ransomware gang REvil, known for attacks on companies like JBS, Kenneth Cole, and most recently Kaseya, had suddenly sprung to life. While it seemed too soon to say for sure REvil was back in business, it seems where theres smoke, theres fire. Bleeping Computer confirms that REvil has returned, and while some experts thought REvil might undergo a rebrand, instead it seems theyve simply restored their old servers and are operating under the same name. Victims listed on the gangs Tor-hosted negotiation site have had their ransom payment deadlines reset, and evidence of new attacks include a new REvil ransomware sample and screenshots of data stolen from a new victim. Flashpoint adds that REvils frontman, formerly known as Unknown or UNKN, has been replaced on underground Russian-language forum Exploit with a spokesman bearing the less creative alias REvil. Though some speculate that REvils reemergence could be connected to talks between US President Joe Biden and Russias Vladimir Putin and the lifting of sanctions on companies involved in the Nord Stream 2 pipeline, other experts say theres no evidence of a link.

Messaging giant WhatsApp has made the controversial move to allow users to backup their conversations in the cloud in an encrypted format, TechCrunch reports. WhatsApp has always employed end-to-end encryption, but until now users were only able to store their conversations unencrypted, meaning intruders or law enforcement could potentially access these messages. Though WhatsApp, which considers itself at the forefront of user privacy, has declined to say whether it discussed the change with government bodies, the change is revolutionary as the platform is the first to put the brakes on what some see as a privacy violation. The Wall Street Journal sees the move as the latest blow in the ongoing battle between platforms seeking to increase user privacy and authorities who want access to the treasure trove of potential evidence. Riana Pfefferkorn of the Stanford Internet Observatory notes that the new encryption feature is not the default, meaning there will likely be many users who do not opt to turn it on. That said, WhatsApp says the feature will allow users a way to save messages without the prying eyes of Apples new controversial scanning system.

Zero Day recounts the tale of how Turkish National Police (TNP) might have been involved in police-on-police surveillance using a spyware platform called Hortum (or hose in Turkish). To snoop on members of the influential Glenist movement. The religious-political organization led by Fethullah Glen, a Turkish imam and scholar based in the US, is considered a threat by those who fear the Glenists are plotting an uprising against the Turkish government. Leaked emails show evidence of communications between Italian tech firm Hacking Team, creator of the spyware, and a chief inspector in the IT department of the TNP Intelligence Division, where a police chief and superintendent were arrested in 2016 under suspicion of Glenist involvement. Though there are no clear answers, the story highlights how difficult it is to investigate the use of spyware when the authorities might be the perpetrators.

Digital Journal looks at the recent UN data breach and sees evidence, not of technically sophisticated threat operations, but rather of thoughtful use of social engineering and the resources available in the criminal-to-criminal market, particularly resources taking the form of stolen credential offered for sale.

We received comments on the incident from Neil Jones, Cybersecurity Evangelist, Egnyte, who sees a lamentable tendency on the part of potential victims to overlook reasonably prudent security measures:

"The cyberattack that breached the computer systems at the United Nations is concerning in that it hit so close to the center of global power -- but its a real disaster for the IT team responsible for UN's file security. This particular attack is especially concerning, because smaller nation-states have been looking to the UN for critical leadership, as they navigate the COVID-19 pandemic.

"Unfortunately, far too often methods and tools are being employed that dont meet the security and control needs of an organization, particularly a large Non-Government Organization like the UN. Security should be viewed as way more than a checklist. The best solutions fit in a broader sense of governance but still make it easy to share files with anyone, without compromising users' security and control.

"The reality is that all content and communications are vulnerable without proper data governance, and it is imperative that organizations protect the data itself. This type of security incident occurs regularly, particularly in decentralized settings like the United Nations and the mission-critical systems they use to communicate with hundreds of global nation-states on a daily basis. If secure file collaboration tools with suspicious log-in capabilities are implemented correctly, they can render cybercriminals attacks ineffective. Used in a case like this where adversaries were able to infiltrate the network and grind activities to a halt, the systems themselves would have been inaccessible to outsiders, and the valuable data would have remained protected."

Danny Lopez, CEO of Glasswall, draws lessons about the necessity for taking better care of employees, especially during on- and off-boarding:

Attacks like these demonstrate that a traditional castle-and-moat approach to network security leaves organisations exposed. Zero trust security sees the world differently. No one is trusted by default, regardless of whether they are inside or outside a network. In a world where data can be held amongst multiple cloud providers it is crucial to strengthen all processes relating to access verification. Without a zero trust approach organisations run the risk of attackers having a free reign across a network once they are inside.

"Reports of a data breach at the UN are troubling, given the importance of the work being done by this organisation. There is speculation that the breach occurred due to UN credentials being traded online. Forensic analysis will most likely reveal more details in the coming days, but for now it's worth underlining the importance of good security practice.

"Organisations like the UN need to adopt robust processes for onboarding and offboarding employees and affiliates that may receive access to key information systems. It's vital to control privileged access and to monitor those that enjoy that administrator privilege. Ensuring that multi-factor authentication is enforced wherever possible, is a vital defence where user credentials find their way into the public domain. This will help to limit the blast radius, and in most cases, defeat the data breach.

"Even if all procedures and policies are well executed, then there's no escaping the fact that adversaries are constantly looking to probe vulnerabilities and to insert malware into the environment, often using everyday business documents which we all use. It's vital that organisations like the UN invest in cyber protection services that stay ahead of attackersby eliminating the threats while still allowing employees to do their vital work."

And Steve Moore, chief security strategist at Exabeam, notes that compromised credentials have become a pervasive problem for organizations of all kinds and sizes:

The United Nations' networks are home to a breadth of sensitive international relations and security data that, in the wrong hands, could put global government officials, citizens and even peace between nations at risk. The intergovernmental organization confirmed this week that its systems were compromised following credentials for internal software being found in criminal marketplaces.

"The UN is not alone. Comprised credentials are the reason for 61% of breaches today. To remediate incidents involving user credentials and respond to adversaries, organizations must move fast and consider an approach that is closely aligned with monitoring user behavior - to provide the necessary context needed to restore trust, and react in real time, to protect user accounts. This should include the ability to understand normal in your network, to detect, using behavioral characteristics, to identify when abnormal events have occurred.

California-based LifeLong Medical Care hasbegun notifyingmore than 115,000 individuals that their personal data (names, Social Security numbers, dates of birth, patient cardholder numbers, and information concerning both treatment and diagnosis) have been compromised. Another healthcare provider, Arizona-based Desert Wells Family Medicine, has recentlyinformed35,000 patients that their EHR data were compromised in a ransomware attack.

Sascha Fahrbach, Cybersecurity Evangelist atFudo Security, commented that the PII held by healthcare providers continues to be valuable, and hence an attractive target for cybercriminals:

"These latest attacks show that the healthcare industry, with its valuable PII, continues to be a tempting and lucrative target for hackers and insiders.There were more than 600 healthcare data breaches last year, with more than 22 million people affected, and unfortunately this trend shows no sign of slowing down. Healthcare operators need to reassess their security posture, as well as shifting their mindset, when it comes to safeguarding their data.

"In particular, third parties remain a security liability which needs to be urgently addressed. Many in the healthcare industry are not taking the proper steps to mitigate third-party remote access and third-party vendor risk.As seen with LifeLong Medical Care, this could expose organizations to data breaches, and the risk of costly non-compliance penalties.

"One of the key steps IT teams should take to protect their data is to evaluate the privilege access they are granting to their employees, partners and vendors, as privileged users are one of the most sought after targets by attackers.Taking a holistic approach, which includes a zero trust strategy and tools for monitoring and managing access,will greatly help mitigate these threats."

Read the rest here:
Revenant REvil. WhatsApp offers encryption. Hortum spyware in Turkey. Update on the UN data breach. Healthcare breaches disclosed. - The CyberWire

Read More..