Page 2,903«..1020..2,9022,9032,9042,905..2,9102,920..»

Bitcoin flash crash amplified by leverage and systemic issues – Financial Times

The bitcoin flash crash has exposed how systemic issues under the surface of the cryptocurrency market, combined with leverage offered by many leading exchanges, exacerbate episodes of volatility.

Bitcoin prices plunged $10,000 in less than an hour on Wednesday from $40,000 in one of the most severe drops since the worlds most actively traded digital coin began its meteoric ascent to record peaks last autumn. It rebounded almost as spectacularly as it fell later in the day, and continued its rebound on Thursday, climbing above $42,300.

The scale of the losses and recovery in such a short time, coupled with the frenetic nature of the trading, illustrate how even as the digital asset industry has grown rapidly, many systems underlying the market remain fragile and stutter during unusually busy periods.

Coinbase and Binance, two of the highest-profile digital currency exchanges, were among the venues that suffered technical issues during the shake-up on Wednesday.

At the same time, analysts said some retail and institutional traders use of leverage borrowing to amplify potential returns also heightened the velocity and magnitude of the fall in prices as bets rapidly unwound.

When the price is crashing, everyone that leveraged and [bet on rising prices] sees their leverage ratio blow up, said David Fauchier, a fund manager at crypto specialist Nickel Digital, noting that the market went through two so-called liquidity cascades in less than an hour when bitcoin crashed.

In established asset markets, traders use cash as collateral to finance leveraged bets. In cryptocurrencies, however, they often use bitcoin. That meant that when bitcoin fell heavily, leveraged bets were quick to fold.

This created a self-reinforcing cycle, which prompted widespread selling and highlighted a number of systemic issues, according to Michael Bucella, a partner at crypto hedge fund BlockTower Capital.

Sentiment in the market had been fragile for several weeks, but the trigger for the collapse was a warning from Chinese authorities not to accept cryptocurrency as payment, or to sell services on it.

There were probably about $20bn of [bets that bitcoin will rise] liquidated yesterday, which was a large part of the price drop. It was an initial unrelated spark which grew because of the leverage, said Sam Bankman-Fried, chief executive of FTX, the Hong Kong exchange.

The turmoil left retail and professional traders counting their losses, especially those who borrowed to maximise their potential gains.

One 21-year-old, who asked not to be named, said that looking at his trading screen flashing red brought back unwanted memories. Its like looking at my [school exam results], he wrote in a message.

Read more from the original source:
Bitcoin flash crash amplified by leverage and systemic issues - Financial Times

Read More..

Some old investing lessons from the Bitcoin crash – Mint

Bitcoin and other cryptocurrencies saw extreme volatility on Wednesday. Bitcoin, for instance, started trading at $42,945. It reached a high of $43,546 during the day, dropped to a low of $30,681, and finally closed the day at $37,002.

Personal finance and investing mean different things to different people, but a few broad principles make sense for all of us to follow. And some investors learnt these old lessons of investing for the first time on Wednesday. Lets take a look at this pointwise.

1) Bitcoin and cryptocurrencies are known to be highly volatile. They go up too fast, and they fall quickly as well. On 14 April, bitcoin touched an all-time high of $64,863. From that high, it fell by 52% to the recent low of $30,681.

A 50% fall wipes out a 100% gain. Hence, investors, and there must have been many who bought bitcoin at all-time high levels, need to wait for the cryptocurrency to rally by 100% or more to recoup their losses.

2) One reason that gets offered for investing in bitcoin is that every time the price has fallen, it has gone on to newer highs in the time to come. The trouble with this argument is that just because something has happened in the past doesnt mean it will continue to occur in the future as well. As an investor, one needs to prepare for the possibility that bitcoin prices may not repeat the same behaviour.

Nassim Nicholas Taleb calls this the turkey problem. As he writes in Anti Fragile: A turkey is fed for a thousand days by a butcher; every day confirms to its staff of analysts that butchers love turkeys with increased statistical confidence." The butcher will keep feeding the turkey until a few days before thanksgiving. Then comes that day when it is really not a very good idea to be a turkey. So, with the butcher surprising it, the turkey will have a revision of beliefright when its confidence in the statement that the butcher loves turkeys is maximal."

This is a point that needs to be kept in mind while investing.

3) The price of bitcoin closed at $30,433 on 27 January. On 13 March, it closed at $61,243, a return of a little over 100% in just one and a half months. Anyone who had invested on 27 January would have been sitting on a high profit on 13 March. But what about investors who invested on 13 March? Theyd currently be sitting on huge losses.

The moral of the story being that high risk doesnt always mean high return. It can also mean huge losses. This is another factor that needs to be kept in mind while investing.

4) Of course, believers can argue that one needs to ignore this volatility. But that is only possible if an investor has followed the oldest clich in investing, which is, dont put all your eggs in one basket or what experts like to call diversification. Dont invest all your money in a single asset class. Spread it out between different asset classes and even within an asset class.

As of yesterday, many people in their 20s and 30s, learnt this investment lesson, like every generation of investors. The last generation learnt it by betting big on real estate in the noughties and then spent the teens realizing that all their money was stuck in an asset class that was not easy to sell in case of an emergency.

Investors who had bet their life on bitcoin when it was around its all-time high levels, and god forbid they are facing a money emergency now, must be in a spot of bother.

The point is that if you are investing in a cryptocurrency, given its volatility, it shouldnt be your principal investment. It should be limited to 5-10% of your portfolio so that it provides the icing on the cake if prices go up and one is not ruined if prices crash.

5) While cryptocurrency believers might believe that prices will continue going up and reach astronomical levels, there are solid reasons that this may not continue forever. Also, remember that random comments from influencers--those who invested in it and even those who havent--can affect the price of this asset class.

The investing principle here is that it is important not to get emotionally attached to any investment like many investors do, which leads to an escalation of commitment. The idea behind all investing should be not just return on capital" but also return of capital".

6) Finally, if you invest in cryptocurrencies and dont believe in spreading your investments, ensure that you have a strong heart.

Whether you believe in cryptocurrencies or not, following these principles will ensure that your investments move in the right direction in the long term, simply because investment fads are exciting but temporary; the principles are boring but timeless.

Vivek Kaul is the author of Bad Money.

Subscribe to Mint Newsletters

* Enter a valid email

* Thank you for subscribing to our newsletter.

Never miss a story! Stay connected and informed with Mint. Download our App Now!!

The rest is here:
Some old investing lessons from the Bitcoin crash - Mint

Read More..

PrivacySharks Stuns The Internet Security Industry With Their Groundbreaking Revelations – TechBullion

Share

Share

Share

Email

PrivacySharks has grown over the years to become one of the most sought-after VPN services resources, thanks to a variety of solutions carefully designed to meet the growing and diverse needs of clients. The companys solutions have become popular in recent times due to the increasing rate of cyber-attacks and censorship, as PrivacySharks proves to be the go-to source for unbiased assessment of VPN companies and their services.

Internet security has remained a popular topic of discussion in recent times. The internet has been described by many as the best thing since sliced bread. However, staying online can be sometimes stressful, especially in an environment with strict monitoring and restriction as well as increasing privacy risk. Such measures are often put in place for several reasons, such as data protection and security of information from hackers and other unauthorized parties. However, cyber restrictions have made it difficult for people to access some beneficial sites freely. Despite the emergence of a plethora of software companies and VPN solutions to ease the process of navigating through otherwise restricted pages, the problem continues to linger. However, the team atPrivacySharkshas dedicated their resources to ease the process of getting the most suitable VPN and online security solutions by assessing different services and detailing their features, pros, and cons.

Recent trends, side effects of a global pandemic, and cybersecurity statistics have revealed a huge increase in the incidence of cyber hacking and data breach from sources that are increasingly common in the workplace, such as mobile and IoT devices. The COVID-19, which has led to an increase in remote workforces, has paved the way for more cyber attacks.

According to a recent report published by Cybint, 95% of cybersecurity breaches are caused by human error, with Proofpoint stating that 88% of businesses across the globe experienced spear-phishing attempts in 2019. Other recent trends and statistics as regards internet security are highlighted as follows:

Considering the growing internet security market and the increasing number of service providers, getting the right solution can be a daunting task. It gets even more interesting with the services either exorbitantly priced or failing to deliver as claimed, which is where PrivacySharks has been of immense help in recent times.

For more information about PrivacySharks and the solutions offered, visit https://www.privacysharks.com/. PrivacySharks can also be found across several social media platforms, includingFacebookandTwitter.

PrivacySharks is an online resource designed to provide internet users with reviews about the most popular VPN, antivirus, email protection, and password managers. The user-friendliness of the platform and the comprehensiveness of the content have endeared PrivacySharks to millions of internet users worldwide.

Read more:
PrivacySharks Stuns The Internet Security Industry With Their Groundbreaking Revelations - TechBullion

Read More..

Zero-trust security: Assume everyone, everything on the internet is out to get you and maybe already has – The Current GA

President Joe Bidens cybersecurity executive order, signed May 12, 2021, calls for the federal government to adopt a zero-trust architecture.

This story also appeared in The Conversation

This raises a couple of questions. What is zero-trust security? And, if trust is bad for cybersecurity, why do most organizations in government and the private sector do it?

One consequence of too much trust online is the ransomware epidemic, a growing global problem that affects organizations large and small. High-profile breaches such as the one experienced by the Colonial Pipeline are merely the tip of the iceberg.

There were at least 2,354 ransomware attacks on local governments, health care facilities and schools in the U.S. last year. Although estimates vary, losses to ransomware seem to have tripled in 2020 to more than $300,000 per incident. And ransomware attacks are growing more sophisticated.

A recurring theme in many of these breaches is misplaced trust in vendors, employees, software and hardware. As a scholar of cybersecurity policy with a recent report on this topic, I have been interested in questions of trust. Im also the executive director of the Ostrom Workshop. The Workshops Program on Cybersecurity and Internet Governance focuses on many of the tenets of zero-trust security by looking to analogies including public health and sustainable development to build resilience in distributed systems.

Trust in the context of computer networks refers to systems that allow people or other computers access with little or no verification of who they are and whether they are authorized to have access. Zero Trust is a security model that takes for granted that threats are omnipresent inside and outside networks. Zero trust instead relies on continuous verification via information from multiple sources. In doing so, this approach assumes the inevitability of a data breach. Instead of focusing exclusively on preventing breaches, zero-trust security ensures instead that damage is limited, and that the system is resilient and can quickly recover.

Using the public health analogy, a zero-trust approach to cybersecurity assumes that an infection is only a cough or, in this case, a click away, and focuses on building an immune system capable of dealing with whatever novel virus may come along. Put another way, instead of defending a castle, this model assumes that the invaders are already inside the walls.

Its not hard to see the benefits of the zero-trust model. If the Colonial Pipeline company had adopted it, for example, the ransomware attack would likely have failed and people wouldnt have been panic-buying gasoline in recent days. And if zero-trust security were widespread, the ransomware epidemic would be a lot less biting.

But there are at least four main barriers to achieving zero trust in government and private computer systems.

First, legacy systems and infrastructure are often impossible to upgrade to become zero-trust. Achieving zero-trust security requires a layered defense, which involves building multiple layers of security, not unlike a stack of Swiss cheese. But this is challenging in systems that were not built with this goal in mind, because it requires independent verification at every layer.

Second, even if its possible to upgrade, its going to cost you. It is costly, time-consuming and potentially disruptive to redesign and redeploy systems, especially if they are custom-made. The U.S. Department of Defense alone operates more than 15,000 networks in 4,000 installations spread across 88 countries.

Third, peer-to-peer technologies, like computers running Windows 10 on a local network, run counter to zero trust because they rely mostly on passwords, not real-time, multifactor authentication. Passwords can be cracked by computers rapidly checking many possible passwords brute-force attacks whereas real-time, multifactor authentication requires passwords and one or more additional forms of verification, typically a code sent by email or text. Google recently announced its decision to mandate multifactor authentication for all its users.

Fourth, migrating an organizations information systems from in-house computers to cloud services can boost zero trust, but only if its done right. This calls for creating new applications in the cloud rather than simply moving existing applications into the cloud. But organizations have to know to plan for zero-trust security when moving to the cloud. The 2018 DoD Cloud Strategy, for example, does not even reference zero trust.

The Biden administrations executive order attempts to foster a layered defense to address the nations cybersecurity woes. The executive order followed several recommendations from the 2020 Cyberspace Solarium Commission, a commission formed by Congress to develop a strategic approach to defending the U.S. in cyberspace.

Among other things, it builds from zero-trust frameworks propounded by the National Institute for Standards and Technology. It also taps the Department of Homeland Security to take the lead on implementing these zero-trust techniques, including in its cloud-based programs.

I believe that when coupled with other initiatives spelled out in the executive order such as creating a Cybersecurity Safety Board and imposing new requirements for software supply chain security for federal vendors zero-trust security takes the U.S. in the right direction.

However, the executive order applies only to government systems. It wouldnt have stopped the Colonial Pipeline ransomware attack, for instance. Getting the country as a whole on a more secure footing requires helping the private sector adopt these security practices, and that will require action from Congress.

This article is republished from The Conversation under a Creative Commons license. Read the original article.

See the original post here:
Zero-trust security: Assume everyone, everything on the internet is out to get you and maybe already has - The Current GA

Read More..

Despite industry best practices, there will always be security breaches | TheHill – The Hill

Therecent article by Allen Gwinn demonstrates a gross lack of understanding of the fundamentals of cybersecurity.

The title specifically refers to industry best practices which Gwinn defines with a link not to a cybersecurity company but to an article on a random computer services providers website not written by an expert. If Gwinn has the 40 years of expertise that he claims in all things cyber, he would be aware of the most commonly accepted cybersecurity industry best practices, which include minimallythe Center for Internet Security Controls (CIS) and theNational Institute of Standards and Technology Cybersecurity Framework (CSF). These, and many others created around the world by respected bodies, are peer reviewed and well accepted.

The reason I highlight these actual industry best practices, versus the articles example, is that they all include an acknowledgement that there will be failures even in the best programs. The CSF, for example, defines a cybersecurity framework as Identify, Protect, Detect, Respond, Recover. In short, actual industry best practice is that you accept that even the best programs will experience an incident and proactively plan for it. Cybersecurity is not about perfection but, like all business functions, about risk management.

Cybersecurity programs have to balance providing the required services to potentially billions of people while protecting the systems and data in the process. While we dont know yet what were the enablers of the Colonial Pipeline incident, you have to accept that the business had to connect control systems to the business network minimally so that it could bill its clients. This is not a trivial balance.

Many statements in Gwinns article are utterly nonsense for example, saying that industry best practices box in administrators from seeing what is happening on the network, workstations and other systems. Again, detection is a critical control in all best practices. Crowdstrike, an internationally prominent company, literally does nothing but monitor systems and respond to incidents like those which Gwinn contends are not allowed. There are hundreds of managed detection and response products and services providers (here is a list of just 40) that do exactly what Gwinn contends that those supposed best practices prevent.

Regarding Gwinns contention that companies should never hire cybersecurity professionals from organizations that have been victims of data breaches, I would challenge him to point to any business or industry that hasn't had business management failings. In 2019,banks lost $28 billion to credit card fraud. Financial organizationsset aside $120 billion per year to cover bad loans. Yet, Gwinn does not address this concept and tell people not to hire some of the most prominent financial executives in the world.

Admittedly, there are many poor cybersecurity programs. However, unlike the ivory tower view that Gwinn has of these programs, poor cybersecurity programs are poor because they do not implement industry best practices like the CIS Controls and CSF.

The reality is that there is a continuum in the quality of cybersecurity programs. However, the most critical factor in that quality is the level of management support and financing that cybersecurity programs receive. In all but a few organizations, in all industries, security executives often have countermeasures they know they critically need but cannot get the budgets to implement, because chief financial officers want to save money, and disasters frequently result.

The CEOs of several large companies have been removed after previous data breaches because they oversaw and ignored critically flawed cybersecurity programs; often, those companies had not followed industry best practices. Other business leaders hamper their cybersecurity executives because they dont want to spend money or interrupt business practices.

Although Gwinn subsequently tried to backtrack on his statements that companies should never hire a cybersecurity professional who worked for an organization that experiences an incident, his limiting of that statement to cybersecurity leaders does not take into account all the dynamics impacting a cybersecurity program in a large organization.

Most people do not understand what it takes to implement a complex cybersecurity program that must simultaneously provide countless people with access and functionality while limiting that ability as little as possible much as they do not understand what it is like to write trillions of dollars of loans while acknowledging there will be billions of dollars of bad debt in the process.

In my opinion, The Hill should not allow the limiting of a statement never to hire people but, frankly, should reconsider the publishing of Gwinns article as a whole.

Yes, everything in the article sounded intuitively obvious and provided an obscure reference to a self-proclaimed industry best practice, but that is the definition of specious. Gwinns article is inaccurate on all of its critical assertions while grossly misinforming people who are not familiar with the topic. It needs to be represented as such.

Ira Winkler, CISSP, is chief information security officer at Skyline Technology Solutions and the author of six books, including, Advanced Persistent Security. He is a former National Security Agency (NSA) intelligence and computer systems analyst and is on the adjunct faculty for the University of Maryland Baltimore County Center for Cybersecurity, which has been recognized by the NSA as a Center of Academic Excellence for cybersecurity.

View original post here:
Despite industry best practices, there will always be security breaches | TheHill - The Hill

Read More..

[PDF] Internet Security Software Market : How The Things Will Change When You Will Know More About It. The Courier – The Courier

Global information and communication technology (ICT) industry can be broadly segmented into IT equipment, software, IT & business services, telecommunication equipment, and carrier services. Widening business operations and rising demand for high-speed connectivity throughout the business value chain have led to vast integral applications of ICT. ICT finds application in every industry ranging from oil & gas, healthcare, banking, financial services and insurance (BFSI), to transportation & transit industries.

What IsInternet Security Software?

Internet security is security related to the Internet and computer systems. The internet is an insecure platform for exchanging data that is highly susceptible to threats, thus internet security software are integrated with internet-connected devices. The internet is used for several activities, including various forms of communication, financial services, and entertainment, on a daily basis, due to which the demand for internet security is increasing.

Key players profiled in the report on the global Internet Security Software market includes :Juniper Networks, Inc., Trend Micro Inc., Symantec Corporation, IBM Corporation, Kaspersky Lab, McAfee Inc., Cipher Cloud, CA Technologies, Cisco system Inc., Websense, Inc.( Forcepoint), Fortinet, Inc., Sophos Ltd., Dell, Check Point Software Technologies Ltd., SafeNet, Inc., and Cyren Ltd

Request For PDF Brochure:https://www.coherentmarketinsights.com/insight/request-pdf/1469

Internet Security Software Market Taxonomy:

By Software:

By Technologies:

By Applications:

Frequently Asked Questions (FAQ) :

Is Internet Security Software Market Booming In Near Future?

Yes, Market Is Booming In Near Future..

Which are the prominent Internet Security Software market players across the globe? Can i Add Specific Company?

Yes, You can addSpecific Companyupto 3 Companies.

Companies Covered as part of this study include: Juniper Networks, Inc., Trend Micro Inc., Symantec Corporation, IBM Corporation, Kaspersky Lab, McAfee Inc., Cipher Cloud, CA Technologies, Cisco system Inc., Websense, Inc.( Forcepoint), Fortinet, Inc., Sophos Ltd., Dell, Check Point Software Technologies Ltd., SafeNet, Inc., and Cyren Ltd,

Can iAskFor Customizationas per My Requirement?

Yes, You canCustomise This Report as per YourRequirement Such asRegion Wise or Country Wise Data.

ForCustomizationYou Can JustClick Here and Tell Us about YourRequirement.

Which Geographic Segmentation Covered In The Market Report?

Go Through Our Trusted Clients List:https://www.coherentmarketinsights.com/trusted-by

About Coherent Market Insights:

Coherent Market Insights is a prominent market research and consulting firm offering action-ready syndicated research reports, custom market analysis, consulting services, and competitive analysis through various recommendations related to emerging market trends, technologies, and potential absolute dollar opportunity.

Continued here:
[PDF] Internet Security Software Market : How The Things Will Change When You Will Know More About It. The Courier - The Courier

Read More..

How Remote Work Changes Where we Work and Live – Security Boulevard

Many crises have caused societies to explore new opportunities, and the pandemic-induced switch to remote work is certainly an example. It is likely to accelerate underlying trends in urban living and enhance the quality of life for city dwellers. Even though the pandemic isnt over and no one really knows for sure what will come next, were already seeing some new trends that are changing our living environments, based on the influence of teleworking. But as the physical world interacts more with the virtual, there will be technology that empowers these shifts that well need to make sure doesnt threaten our digital safety.

The pandemic experience is truly global. Never before have so many people found themselves in such similar conditions at the same time. For the second year running, people everywhere are working from home and different sectors of the economy have actually been boosted by the change. One obvious example is e-commerce, with traditional shopping suddenly posing a risk. Pandemic measures worldwide have led to more online shopping and driven growth for delivery services. People are getting used to spending more time at home, so the overall digitalization of the commerce experience will likely continue to grow, making contactless payments the new norm.

Urban life varies greatly depending on the work, leisure and consumption patterns of citizens. So, with most of us living and working at home, COVID-19 has become a catalyst for the acceleration of intelligent buildings and smart home technologies that were already being implemented in the real estate industry, albeit at a slower pace. Today, things like keyless entry, voice-activated elevators, digital room service, remote notarizations and valet parking are getting even more common, as consumers embrace the trend toward hands-off technology. This seamless fusion of the digital and physical worlds will need to be built with the concept of cyber immunity in mind, so the technology is capable of performing even in an aggressive environment, without the need for additional security features.

When it comes to securing smart homes, certain elements are essential, like correctly configuring home Wi-Fi networks and protecting devices and control panels with a strong unique password. That way, an attacker will not be able to simply use brute force to enter users homes.

Fortunately, people are becoming more careful. According to recent research, 48% of online users protect their Wi-Fi network with a password, 58% are currently using internet security software and most are at least familiar with the concept of good digital hygiene.

Millions of white-collar employees who have been enjoying the opportunity to work from anywhere have encountered the need to create a virtual office at home, where they can fully concentrate. And, as the world starts to consider the hybrid work model, most workers will be likely heading to the office just two or three days a week. This all affects commercial real estate, with new open office layouts built around meeting rooms, small private offices, hot desks and co-working spaces.

Workers and their employers can gain a number of benefits from the hybrid work concept, like rent savings, lower overheads, a made-to-order work environment and less time spent on a long daily commute. With this pop-up workspace paradigm, virtual work will be available to anyone who wants it. However, the necessity of organizing IT support adds a burden on employees, as well. One simple piece of advice is to use a VPN whether youre working at home or on a public Wi-Fi network to protect data, hide your IP address and ensure online actions arent intercepted.

The death of the suburbs narrative has been trotted out many times by demographers and sociologists, but due to COVID-19, we are now observing a return to suburban life, as millions of people have left their apartments in dense downtown neighborhoods in favor of more socially distanced homes. Meanwhile, Zoom towns are gaining attention in the media, with vacation destinations turning into real estate hot spots as workers escape densely packed cities to work from their ideal location.

However, the other lesson this pandemic has taught us is that we often still want to meet face-to-face, because its human nature to communicate and live together. People want to go to bars and restaurants, they need eye contact at meetings and to feel connected to other teammates to be productive and thats why big cities will always be desirable.

Some signs of what our future cities might look like emerged last year, with the concept of 15 minute cities becoming more of a reality. Many citizens can now access most of their daily needs within a short walk or get fresh air in the context of teleworking. Huge malls are making way for local grocery stores, only a bike ride away. People can spend more time in their neighborhoods and prioritize their lifestyle needs based on affordability, commercial infrastructure, leisure capacity, parks or whatever else they value most.

Post-pandemic habits will shape the look of future neighborhoods to provide for people who enjoy city-living but in a more family-friendly environment. This could include more mixed-use real estate developments that pair residential housing with offices, green roofs and balconies, large courtyards and playgrounds, restaurants, and retail.

When planning a living environment, developers need to provide people with infrastructure, create opportunities for communication and leisure, enhance a sense of community and invest in human development and health. The technologies that sanitize public spaces, make contactless entry possible, or even those that transform tourism during stay-at-home orders with the help of VR and AR tours, will help bring us closer to a future of smarter homes and cities. Well just need to be careful to make sure that digital security comes built-in.

Recent Articles By Author

Read the original:
How Remote Work Changes Where we Work and Live - Security Boulevard

Read More..

How can you find out if you’re getting the internet speeds you pay for? – CBS17.com

RALEIGH, N.C. (WNCN) How can you know if youre getting the internet speeds youre paying for?

It was announced Wednesday that the Federal Trade Commission and six states, including NorthCarolina, fileda civillawsuit alleginginternet service provider Frontier Communications misled consumers by providing slower internet speeds thanpromised.

Everybody who uses the internet has complained at one time or another about the speed of their service,but not everyone knows how to improve it.

For most people, the internet is just a thing thats there and we dont know how it does what it does.

Elle Ferebee said she didnt know how to test her internet speed or if she was getting the internet speed she pays for. She also said she notices sometimes her internet is slow.

During the pandemic, everybody was together andall using the internet from home at the same time.What speeds do people need?

Speed on the internet depends on what they do, said Craig Petronella, an internet security specialist with the Petronella Technology Group. A lot of people work from home, so the demands are greater than ever.

He said many speed issued could come from the router.

I recommend investing in your own equipment because often the wireless transmitter that comes with a providers router often isnt powerful enough, Petronella said.

Internet speeds should be tested, too. Fast.com offers an easy click-and-go speed check.

Download speeds of 100 megabytes or higher are considered fast because theyll handle multiple online activities for multiple userssimultaneouslywithout major interruptions in service.

When testing speed, connect directly to the modem or router to get the most accurate speed, Petronella said.

The FCC also wants to know about your internet speed. There is an app that can be downloaded onto phones and other devices. The app provides a way to test the performance of mobile and in-home broadband networks.

To protect your privacy and confidentiality, the app anonymously sends internet speed information to the FCC. The agency will use that information to help close the digital divide in the United States.

Meanwhile,more and more folks are keeping an eye on their internet speed.

I look for upload speed and download speed, said Chip Hessenflow, who checks his internet speed. Its pretty consistent for what Im paying for.

If you test repeatedly and find your internet speeds are way below what you are paying for,you can complain to your provider.

Theres also a legal avenue you can take. In North Carolina, you can report it to the attorney generals office.

Read more here:
How can you find out if you're getting the internet speeds you pay for? - CBS17.com

Read More..

The best antivirus apps for the iPhone – Digital Trends

Funny thing about iOS antivirus apps there really are no such explicitly labeled apps on the Apple App Store, and for good reason: iPhones, iPads, and iPod Touch devices that havent been jailbroken are not in any danger of getting infected with in-the-wild mobile viruses. With Apple in control of what gets installed on your iPhone via its App Store, you can rest assured that no app there has the ability to access the OS-level data required to infect your phone or kill viruses. Apples iOS doesnt allow security apps to perform traditional virus scans. You may notice as you scan our favorite apps below that all are labeled security apps, and none are called antivirus apps.

While your iPhone is generally protected from run-of-the-mill viruses, theres no such thing as 100% secure, especially in an era when cybercriminals are working overtime to create ingenious gateways into your system. Viruses are only one type of internet security threat. There are network hackers, fake websites, spyware, adware, phone theft, and so much more to watch out for. So, apps that focus on eliminating security threats are a great idea. There are many apps in this category, and we identify some high-profile user favorites below.

Avast shields your device from online threats and intruders, allowing you to browse safely on public Wi-Fi and control your online presence. Among the features available for free are the threats and vulnerabilities scan, malicious website blocker, Wi-Fi security tool, identity protection for the account owner, photo vault for 40 photos, and security and privacy tips. The premium version for $20 per year or $5 per month adds VPN protection, identity protection for all accounts, and an unlimited photo vault.

iOS

Bitdefender Mobile Security is a free app dedicated to keeping your sensitive data safe. It includes VPN, web protection, and account privacy. It protects your online presence by encrypting all internet traffic and securing your device while youre connected to public Wi-Fi hot spots, cellular data networks, and other public locations. The web protection feature blocks malicious pages targeting your personal information such as credit card details or Social Security number, and it will highlight if your email accounts have been leaked or your privacy has been breached. The free version offers 200MB of traffic per day, and youll need to upgrade if you want more. Premium web protection costs $15 per year or $1.49 per month.

iOS

Norton 360 for Mobile provides multiple layers of protection for your iPhone by monitoring for cyberattacks and automatically checking for the latest security patches and iOS updates. SMS security tools filter phishing spam text messages while Wi-Fi security alerts notify you of any networks attacked by cybercriminals who may eavesdrop on your connection. Device security protects against vulnerabilities that could be used to take control of your device or steal personal information. Secure VPN lets you encrypt connections to your favorite apps and websites when connecting to Wi-Fi. Web protection detects and steers you away from fraudulent and malicious websites. Dark web monitoring checks for leaked personal information. A 14-day free trial for $15 requires an annual subscription.

iOS

LogDog Mobile Security scans and monitors your accounts login locations and times and the number of messages and other data to detect unusual activity, such as attempted identity theft or account intrusion, changes in recovery data, and forwarding filters. If anything turns up, the app alerts immediately you so you can prevent or stop a hack. LogDog has recently added more security measures to protect your accounts by constantly scanning breached accounts lists, which appear on black market servers. LogDog offers monthly or yearly subscriptions for $9 or $60 respectively.

iOS

Avira Mobile Security can keep your data safe and your online activity anonymous with the apps encrypted VPN. An identity safeguard feature quickly reports whether your email has leaked to third parties, while anti-theft features help you recover a lost handset. If you do online shopping and banking or store your credit card details online, this app blocks phishing, malware, spam, and fraud for safer browsing. TheCall Blocker lets you create your own blacklist and block spam and other unwanted calls and texts.Easily back up and restore contacts from your phone and send them to your email, Dropbox, or Google Drive. Various premium subscription options range in price from $3.49 per month to $40 per year.

iOS

McAfee Mobile Security is designed to keep your smartphone protected from hackers and intruders and to maintain the privacy of your online data. The free version of the suite halts incoming threats, secures your Wi-Fi, and backs up important content. It features a system security scan that detects insecure hot spots and attacks and anti-theft protection to find lost phones, provides secure Wi-Fi scanner analysis, and shields content on stolen phones. It even provides an encrypted vault for media and photos and backs up contacts via the McAfee Cloud. The premium version for $30 or $80 per year goes further with VPN, alerts for suspicious websites, and a secure Wi-Fi hot spot.

iOS

Unless you jailbreak your iPhone, you do not need specific antivirus software to protect it from malware. Thats because the iOS platform sandboxes apps inside a user partition that prohibits access to your iPhones operating system. This prevents apps from changing other apps, files, or processes. Viruses cant infect iOS devices because they are powerless to act on an iOS device. While there have been reports of iPhone security and privacy issues, such as a backdoor flaw in its Wi-Fi chip or an errant iCloud account, third-party antivirus apps will not help you out of that kind of jam. The best solution for avoiding malware is to install all iOS updates, which almost always include security fixes.

Antivirus apps for iOS are actually advanced internet security tools, which include a wide range of safety features to protect against threats like phishing links, insecurepublic Wi-Fi networks, data-stealing apps, browser trackers, and device theft.

No, not specifically. Apple has built iOS and iPadOS as self-contained secure systems. With its method of sandboxing, iOS doesnt let antivirus apps work because that software needs to hook into the operating system, which iOS doesnt allow. Sandboxing separates each app from all other apps and from the system.

The best iPhone antivirus apps will identify a broad range of security risks, alert you to them, let you secure the contents of your device, find a lost or stolen device and lock it down, are easy to use, and reasonably priced.

Most security software designed for the iPhone will also work on the iPad and the iPod touch because they are all based on the current iOS. That said, you should check with each product to make sure that the app offers the protection you seek. There may be certain features that only work on iPhones. All the apps mentioned in this roundup also work on the iPad.

Originally posted here:
The best antivirus apps for the iPhone - Digital Trends

Read More..

Industry coalition asks appropriators to boost CISA funding – FCW.com

Cybersecurity

An industry coalition focused on cybersecurity is urging top congressional appropriators to give the Cybersecurity and Infrastructure Security Agency a $750 million boost in the fiscal year 2022 budget, citing the various attacks on federal agencies and the private sector in the past year.

"The recent SolarWinds, Colonial Pipeline, and Pulse Connect Secure attacks have shown just how vulnerable our public and private sector information technology (IT) systems are to these nation state actors and cyber criminals," according to the letter.

The letter was sent by the Alliance for Digital Innovation, CompTIA, Cybersecurity Coalition, ITI and the Internet Association. It was addressed to chairmen and ranking members of both the House and Senate Appropriations Committees.

The Office of Management and Budget recently announced the administration would publish its full fiscal year 2022 budget on May 27. Congressional committees until now have been reviewing top-level overviews of the upcoming budget, a practice usually done while a new administration reviews the budget proposal of its predecessor.

There have been multiple efforts to expand CISA's budget and authorities in the wake of the attack against SolarWinds. The agency received $650 million from the American Rescue Plan Act, but top agency officials, such as Brandon Wales, the acting chief, told lawmakers earlier this year that funding was essentially a "down payment" on strengthening the federal government's cybersecurity enough to detect and stop another espionage campaign.

Separately, the House Homeland Security Committee on Tuesday advanced a bill that would allow CISA to work directly with critical infrastructure owners and operators on risk mitigation strategies. Prior to the SolarWinds intrusion being discovered, lawmakers had already considered and were moving to provide CISA with administrative subpoena authorities through the FY-21 National Defense Authorization Act

The industry letter recommends the $750 million be spent on accelerating the Continuous Diagnostics and Mitigation program, expanding the national cybersecurity assessments and technical services program, promoting zero trust architectures and expanding the federal cybersecurity workforce.

The groups also say the money should be used to expand CISA's outreach services to state and local governments as well as modernize the National Cybersecurity Protection System.

About the Author

Justin Katz covers cybersecurity for FCW. Previously he covered the Navy and Marine Corps for Inside Defense, focusing on weapons, vehicle acquisition and congressional oversight of the Pentagon. Prior to reporting for Inside Defense, Katz covered community news in the Baltimore and Washington D.C. areas. Connect with him on Twitter at @JustinSKatz.

Read more from the original source:
Industry coalition asks appropriators to boost CISA funding - FCW.com

Read More..