Page 3,570«..1020..3,5693,5703,5713,572..3,5803,590..»

The impact of spycraft on how we secure our data – ComputerWeekly.com

The cyber security industry has come a long way since its inception. The ancestors of cyber were the men and women working at Bletchley Park during the Second World War, long before the introduction of what we would consider modern cyber security practices but even before then, humans used codes and ciphers to keep information safe for millennia. Even Julius Caesar popularised a cipher which was named after him.

More recently, developments have been driven by the intelligence and defence sectors, which have a real need to uncover as well as keep sensitive intelligence safe. Some of these innovations were showcased recently at the Science Museums Top Secret exhibition, which ran from July 2019 to February 2020 to coincide with the 100th anniversary of GCHQ, the UKs intelligence, security and cyber agency.

It also gives us the context as to where developments have originated, and the ways in which they will subsequently impact how businesses keep their data safe from cyber criminals in the future.

The threats organisations face today are varied from organised crime groups to nation-state hackers, as well as individual hackers. One of the ways organisations try to defend themselves is through encryption.

Ciphers have been around for centuries in one form or another from non-standard hieroglyphs in the walls of tombs built in ancient Egypt almost 4,000 years ago, to substitution ciphers developed 1,200 years ago by Arab mathematician Al-Kindi. The rise of electronic communications during the Cold War led to monumental developments in ciphers and encryption technology, which were used to keep phone conversations secure.

Today, the focus for many organisations and businesses is the use of encryption on mobile devices, enterprise networks and cloud services. Given the impact of mobile devices and digital communication on how organisations conduct their business with partners and customers globally, this has been a key development ensuring conversations remain private while enabling fast and secure communication.

Today, encryption is used in all sectors for medical data in healthcare, customer information in banking, and much more. This highlights the importance of all areas of industry, outside of tech and IT, learning from the intelligence communitys experience developing advanced solutions to secure communications and data.

Many technologies initially developed by the intelligence community have become commonplace in keeping our everyday communications secure, according to Elizabeth Bruton, curator of the Science Museums Top Secret exhibition.

Randomness has always been used to disguise messages, she said. Though the technology today is radically different, the basic principles of encryption using long strings of random characters letters and numbers have changed very little over the past 100 years. The Top Secret exhibition features letter tiles used by the Government Code and Cypher School staff at Mansfield College, Oxford, during the Second World War.

GC&CS staff pulled these tiles out of a bag to create long strings of random numbers or letters, she said. They were used to make encryption keys and one-time pads to keep British wartime messages secure. Today, randomness underpins some of the encryption systems we use to keep our communications secure.

Also featured in the Top Secret exhibition is a chaotic pendulum used by the internet security company Cloudflare to help keep online messages secret. Cloudflare uses readings from devices such as this pendulum and a wall of lava lamps to make long strings of random numbers, said Bruton. These random numbers help create keys that encrypt the traffic that flows through Cloudflares network.

Although its interesting to see how todays cyber security solutions have been influenced by the past, emerging technologies can also help us gaze into the future. One of the exhibits in the Top Secret exhibition consists of parts from a quantum computer. This new computing paradigm has the potential to rewrite how we use technology.

Quantum computers could significantly weaken our cyber defences by processing information in a manner completely different to that of traditional computers. Work is already underway to develop quantum-resistant encryption that is likely to become a common business practice in the next decade.

Breakthroughs such as quantum computing are a reminder that organisations should constantly be thinking about how the threats they face evolve. After all, cyber crime is set to cost businesses over $2tn this year alone. Todays new tech could be tomorrows threat, and bad actors such as organised cybercriminals and nation-state attackers will always look to exploit the latest and greatest tech.

Cyber criminals are often quick to use new technologies. Since they dont operate in regulated industries or need to consider customers and users, they can be more efficient at harnessing these technologies for harm than organisations are at harnessing them for good.

The cyber security sector is experiencing tremendous growth, driven by our dependence on technology. Global cyber security spending is expected to reach $248bn by 2026.

As such, its prudent for all organisations to look at both the past and the future if they want to remain safe from cyber criminals and invest wisely. The crossover between what technologies the intelligence sector has developed and how these have been adopted into mainstream cyber security solutions highlights the many years of research it takes to keep data safe.

As organisations face ever more threats, they should look to learn as much as they can from every sector and be open to sharing best practices to ensure robust defences.

Subject to the anticipated reopening of the UKs museums as Covid-19 pandemic restrictions ease, the Top Secret exhibition is scheduled to open at Manchesters Science and Industry Museum in October 2020.

Mark Hughes is senior vice-president of security at DXC Technology

Continued here:
The impact of spycraft on how we secure our data - ComputerWeekly.com

Read More..

4 Common Online Frauds That You Need to Know – Techjaja

The Internet has become a necessity for us today. Its made our lives easier and opened opportunities for earning a living, connecting with people across the globe, and more. Unfortunately, its also drawn the attention of unsocial elements in society which is why there are all kinds of online frauds that we face today. The following are some of them that you need to know:

- Advertisement -

1. Phishing Emails

Phishing is one of the most common online frauds that we know of and its also one of the online scams you should avoid in lockdown. In this, a scamster tries to trick an email user into believing that they, the scamster, is actually a representative of a bank or a government office. They usually send an email to create a panic situation. For instance, you may receive an email from a particular bank and the message may say that your online bank account has been compromised and you have to change your password to secure it immediately. If you click the link shared in the email, then it may take you to a fake website that looks identical to the banks original website. Once you share your current password with this website, then its shared with the scamster and they can use it to transfer your money to their account.

Phishing attacks are rampant. However, if you are careful and check the authenticity of suspicious emails before you take action, then you can prevent becoming a victim in most cases.

2. Ransomware

Stay Updated

Ransomware programs are an advanced family of viruses that when active, can gain administrative rights to your computer system and lock you out. You usually get a warning from the attacker that if you have important files and documents on the device and you want to access them again, then you have to pay a ransom to the attack.

Ransomware are quite dangerous. You can prevent them from infecting your computer by using the best antivirus for Windows, downloading software from trusted sites only, and avoiding downloading attachments that are sent in suspicious emails.

3. Fake Shopping Websites

We all love shopping online. Its convenient, offers great discounts, and you get to choose from a wide range of products from the comfort of your home. However, if you arent careful, then you can fall for a fake shopping website scam.

There are thousands of online shopping websites. However, not all of them can be trusted. There are many websites that look legitimate, but they may steal your banking information or accept your payment and not deliver the products. The good news is that you can easily identify them if you are using Internet security solutions from trusted brands like Bitdefender. These companies offer Internet security software that can block malicious shopping websites for your protection.

4. Job Offer Scam

Fraud entities have not spared even the employment domain. These people send emails with lucrative job opportunities that are fake. The messages typically start with claims that the recruiter saw your resume on LinkedIn or some other job portal and you are selected for a particular job profile. They mention that you can expect to earn a monthly salary of a particular amount which is quite high. The job is in a different country and you are required to pay a certain amount as a fee for legal work. Thats the trap. If you pay this amount for the seeming dream job thats offered, then you will never see it. So, make sure that you verify the details of such emails and also do some background checking before you take any step. A rule of thumb is- if a job is offered which is too good to be true, then it probably is.

Your Safety is in Your Hands

The Internet is a wonderful place, but its also a scary place. If you are not careful, then you can easily become a victim or a fraud or even identity theft. So, make sure you stay up to date with the emerging risks on the Internet. Also, set up comprehensive online security programs on all your devices- mobiles and computers, as soon as possible. If you are looking for a recommendation, then Bitdefender is a good one. They are even running a 90-day free trial currently. So, what are you waiting for?

- Advertisement -

Read more:
4 Common Online Frauds That You Need to Know - Techjaja

Read More..

This $350 "Anti-5G" Device Is Apparently Just a USB Stick – WIRED

As the Covid-19 pandemic rages on, states around the US are starting to debut contact-tracing apps built on a Bluetooth-based system engineered by Apple and Google. But a coordinated national effort is noticeably missing, creating the potential for an opaque patchwork of state-specific apps that don't work well together.

At the same time, states are also rolling out manual contact-tracing programs using trained volunteers, but scammers are piggybacking on these urgent public health efforts to send bogus SMS text messages that claim to be related to contact tracing and lure victims to click malicious links. If you don't already use a password manager, now is an excellent time to start in many ways.

On Thursday, the National Security Agency put out a warning that the notorious Russian hacking group Sandworm has been exploiting a known vulnerability in certain popular mail servers. Meanwhile, the confirmation of John Ratcliffe as director of national intelligence is problematic, given his lack of relevant experience and Trump sycophancy. And a jailbreak for the current version of iOS came out this week, delighting security researchers and hobbyists. It's one of the first of its kind in years, raising questions about whether iOS is entering a new era of jailbreaking thanks to more plentiful vulnerabilities.

In good news, the beleaguered internet security guardian Shadowserver is no longer on the brink of collapse after raising enough money to establish a new data center and sustain itself in the near term.

But wait, there's more! Every Saturday we round up the security and privacy stories that we didnt break or report on in depth but think you should know about. Click on the headlines to read them, and stay safe out there.

As 5G wireless data networks roll out around the world, conspiracy theories have exploded about their alleged deleterious health effects. One product that has emerged from the paranoia is the "5GBioShield USB Key," which claims to be a "quantum holographic catalyzer technology for the balance and harmonisation of the harmful effects of imbalanced electric radiation." The pitch is that the device creates a protective bubble around its owners at all times; you can purportedly boost the range by plugging it into a laptop or other device. The 5GBioShield claims not to block Wi-Fi, though, only 5G. One shield sells for about $350. Researchers who analyzed the device, though, say that it appears to be a simple flash drive, with no extra components and only 128MB of storage. UK Trading Standards officers are investigating the product after the Glastonbury town council's 5G advisory committee recommended it.

Years-old rumors that the social blogging platform LiveJournal had at some point suffered a breach seemed to be confirmed this week. A trove of 26 million usernames, email addresses, and plaintext passwords for the site leaked on the dark web after apparently being traded privately among hackers for years. A ZDNet analysis of the data seems to indicate that it was stolen from LiveJournal in 2014.

Amidst the Covid-19 pandemic, the Qatari government has mandated that all residents download its EHTERAZ contact-tracing app or face extremely steep fines. But researchers from Amnesty International found that the app had a major configuration flaw that exposed data of more than a million users who have downloaded the app. Amnesty reported the vulnerability and Qatari officials quickly patched it, but the bug exposed sensitive details like names, national ID numbers, location data, and information about users' health. Amnesty researchers also point out that while it's positive that the issue was fixed quickly, the app still has problematic, privacy-infringing features like GPS and Bluetooth location trackers. It is also set up to store all user data in a central repository.

A botnet for distributing malware has become so large within China that the antivirus firm Qihoo 360 and search giant Baidu have banded together to attempt to take it down. Known as DoubleGuns, the botnet has been around for more than three years and is thought to currently be infecting hundreds of thousands of victim devices. The botnet targets victims with a Windows trojan and is used for spam campaigns and to distribute malicious apps and adware. Qihoo 360 and Baidu have succeeded at temporarily disrupting the botnet, an important step in itself, but are still working to more permanently dismantle its infrastructure.

More Great WIRED Stories

See the article here:
This $350 "Anti-5G" Device Is Apparently Just a USB Stick - WIRED

Read More..

Cloud DDoS Mitigation Software Market Potential Growth, Share, Demand And Analysis Of Key Players- Analysis Forecasts To 2026 – Cole of Duty

The Cloud DDoS Mitigation Software Market research report enhanced worldwide Coronavirus COVID19 impact analysis on the market size (Value, Production and Consumption), splits the breakdown (Data Status 2014-2020 and 6 Year Forecast From 2020 to 2026), by region, manufacturers, type and End User/application. This Cloud DDoS Mitigation Software market report covers the worldwide top manufacturers like (Amazon Web Services, Microsoft, Webroot, Google, Akamai Technologies, Alibaba, AT&T, CenturyLink, Imperva, Cloudflare, Cloudbric, SiteLock, StackPath, Check Point Software Technologies, DOSarrest Internet Security) which including information such as: Capacity, Production, Price, Sales, Revenue, Shipment, Gross, Gross Profit, Import, Export, Interview Record, Business Distribution etc., these data help the consumer know about the Cloud DDoS Mitigation Software market competitors better. It covers Regional Segment Analysis, Type, Application, Major Manufactures, Cloud DDoS Mitigation Software Industry Chain Analysis, Competitive Insights and Macroeconomic Analysis.

Get Free Sample PDF (including COVID19 Impact Analysis, full TOC, Tables and Figures)of Cloud DDoS Mitigation Software[emailprotected]https://www.researchmoz.us/enquiry.php?type=S&repid=2524471

Cloud DDoS Mitigation Software Market report offers comprehensive assessment of 1) Executive Summary, 2) Market Overview, 3) Key Market Trends, 4) Key Success Factors, 5) Cloud DDoS Mitigation Software Market Demand/Consumption (Value or Size in US$ Mn) Analysis, 6) Cloud DDoS Mitigation Software Market Background, 7) Cloud DDoS Mitigation Software industry Analysis & Forecast 20202026 by Type, Application and Region, 8) Cloud DDoS Mitigation Software Market Structure Analysis, 9) Competition Landscape, 10) Company Share and Company Profiles, 11) Assumptions and Acronyms and, 12) Research Methodology etc.

Scope of Cloud DDoS Mitigation Software Market:Cloud DDoS mitigation software is used to provide global protection against distributed denial of service (DDoS) attacks.

On the basis on the end users/applications,this report focuses on the status and outlook for major applications/end users, shipments, revenue (Million USD), price, and market share and growth rate foreach application.

Individual Enterprise Others

On the basis of product type, this report displays the shipments, revenue (Million USD), price, and market share and growth rate of each type.

On-premise Cloud-based

Do You Have Any Query Or Specific Requirement? Ask to Our Industry[emailprotected]https://www.researchmoz.us/enquiry.php?type=E&repid=2524471

Geographically, the report includes the research on production, consumption, revenue, Cloud DDoS Mitigation Software market share and growth rate, and forecast (2020-2026) of the following regions:

Important Cloud DDoS Mitigation Software Market Data Available In This Report:

Strategic Recommendations, Forecast Growth Areasof the Cloud DDoS Mitigation Software Market.

Challengesfor the New Entrants,TrendsMarketDrivers.

Emerging Opportunities,Competitive Landscape,Revenue Shareof Main Manufacturers.

This Report Discusses the Cloud DDoS Mitigation Software MarketSummary; MarketScopeGives A BriefOutlineof theCloud DDoS Mitigation Software Market.

Key Performing Regions (APAC, EMEA, Americas) Along With Their Major Countries Are Detailed In This Report.

Company Profiles, Product Analysis,Marketing Strategies, Emerging Market Segments and Comprehensive Analysis of Cloud DDoS Mitigation Software Market.

Cloud DDoS Mitigation Software Market ShareYear-Over-Year Growthof Key Players in Promising Regions.

What is the (North America, South America, Europe, Africa, Middle East, Asia, China, Japan)production, production value, consumption, consumption value, import and exportof Cloud DDoS Mitigation Software market?

To Get Discount of Cloud DDoS Mitigation Software Market:https://www.researchmoz.us/enquiry.php?type=D&repid=2524471

Contact:

ResearchMozMr. Rohit Bhisey,Tel: +1-518-621-2074USA-Canada Toll Free: 866-997-4948Email:[emailprotected]

Browse More Reports Visit @https://www.mytradeinsight.blogspot.com/

See the original post:
Cloud DDoS Mitigation Software Market Potential Growth, Share, Demand And Analysis Of Key Players- Analysis Forecasts To 2026 - Cole of Duty

Read More..

India wants to be a ‘partner of the global economy’ in its manufacturing push, minister says – CNBC

India has the resources it needs to become a global electronics manufacturing hub and a competitive partner to the world economy, the country's technology minister said.

The government on Tuesday introduced a $6.6 billion incentive scheme for international companies to ramp up their electronics manufacturing production in India.

"This whole scheme is industry specific, to make India a big hub of electronic manufacturing," Ravi Shankar Prasad, minister for communications, electronics and information technology, told CNBC's Tanvir Gill.

Electronics manufacturing particularly the production and assembly of smartphones is a cornerstone of Prime Minister Narendra Modi's"Make In India" campaign. In recent years, that's become more prominent as global tech companies are moving out of China to diversify their supply chain, going into places like Vietnam or India.

"When we talk of 'Make In India,' it does not mean India in isolation. It means an India, which is globally becoming competitive, as a partner of the global economy India's asset in service of the global assets," he added.

Last month, Modi gave a speech underscoring the need for India to become self-reliant as the economy struggles to bounce back from the coronavirus pandemic. Some took that to mean a more protectionist India in the future.

India is one of the world's fastest-growing smartphone markets and Modi's government provided incentives for smartphone companies to set up factories in the country. Top smartphone makers including Samsung, Appleand Xiaomi have production centers and assembly lines in India for some of their handsets.

The government says India had two mobile phone factories in 2014 the year Modi's government came into power and now it is the second-largest mobile phone producer in the world.

A man talks on a mobile phone outside a medical supply store during a curfew in response to the outbreak of the Coronavirus (COVID-19) pandemic on March 27, 2020 in Mumbai, India.

Himanshu Bhatt | NurPhoto | Getty Images

According to Prasad, manufacturers can tap into a gamut of India's "IT power, the soft power, the start-up power, the human resource" that is available in abundance. That includes the relative ease of doing business in the country which has improved in recent years a competitive corporate tax rate and an "enormous" talent pool, he added.

"'Make In India' is not against any country, it's only India positive, Prasad said.

One of the initiatives announced Tuesday said the government will provide production-linked cash incentives to companies, worth 4% to 6% of incremental sales over five years, on goods manufactured locally. Up to five international smartphone makers would be selected for the scheme. The rest of the schemes were aimed at stepping up electronic components production and improving the infrastructure available to companies.

"Many of the global brands are already inIndia, making large number of mobile phones. Therefore, they've seen the work of India," Prasad said.

Prasad said the coronavirus has interrupted plans for 5G testing, whichrefers to the fifth generation of high-speed mobile internet that aims to provide faster data speeds and more bandwidth to carry growing levels of web traffic. The pandemic has affected more than 6 million people around the world and forced countries, including India, to shut down their economies temporarily.

"India is a huge market for 5G," Prasad said, explaining that the country will resume experimenting with the technology once the virus outbreak is brought under control. "We have also to address (the technology's) security concerns."

Chinese telecommunication equipment supplier Huawei, which has a presence in India, is facing pressure from countries like the U.S., which banned the firm from participating in its 5G rollout due to security concerns. Huawei has denied its products pose any security risks.

When asked what India's stance is on Huawei, Prasad said no company would be stopped from running 5G trials.

"The larger issueof who will be allowed or who will not be allowed is a question of policy and also our auction purposes. A call will have to be taken by India, consistent with our security perspective also," he said.

See the original post:
India wants to be a 'partner of the global economy' in its manufacturing push, minister says - CNBC

Read More..

Amid the COVID-19 crisis and the looming economic recession, the Web Content Filtering market worldwide will grow by a projected US$3 Billion, during…

New York, June 04, 2020 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Global Web Content Filtering Industry" - https://www.reportlinker.com/p03646047/?utm_source=GNW 7 Billion by the end of the analysis period. An unusual period in history, the coronavirus pandemic has unleashed a series of unprecedented events affecting every industry. The Web Content Filtering market will be reset to a new normal which going forwards in a post COVID-19 era will be continuously redefined and redesigned. Staying on top of trends and accurate analysis is paramount now more than ever to manage uncertainty, change and continuously adapt to new and evolving market conditions.

As part of the new emerging geographic scenario, the United States is forecast to readjust to a 9.9% CAGR. Within Europe, the region worst hit by the pandemic, Germany will add over US$111.7 Million to the regions size over the next 7 to 8 years. In addition, over US$97.7 Million worth of projected demand in the region will come from Rest of European markets. In Japan, the Web Content Filtering segment will reach a market size of US$267 Million by the close of the analysis period. Blamed for the pandemic, significant political and economic challenges confront China. Amid the growing push for decoupling and economic distancing, the changing relationship between China and the rest of the world will influence competition and opportunities in the Web Content Filtering market. Against this backdrop and the changing geopolitical, business and consumer sentiments, the worlds second largest economy will grow at 15.9% over the next couple of years and add approximately US$612.5 Million in terms of addressable market opportunity. Continuous monitoring for emerging signs of a possible new world order post-COVID-19 crisis is a must for aspiring businesses and their astute leaders seeking to find success in the now changing Web Content Filtering market landscape. All research viewpoints presented are based on validated engagements from influencers in the market, whose opinions supersede all other research methodologies.

Competitors identified in this market include, among others, Alps System Integration Co., Ltd.; Barracuda Networks, Inc.; Cisco Systems, Inc.; ContentKeeper Technologies Pty. Ltd.; Digital Arts Inc.; Forcepoint LLC; Fortinet, Inc.; Kaspersky Lab; McAfee, LLC; Palo Alto Networks, Inc.; Sangfor Technologies Co., Ltd.; Sophos Ltd.; Symantec Corporation; Zscaler, Inc.

Read the full report: https://www.reportlinker.com/p03646047/?utm_source=GNW

WEB CONTENT FILTERING MCP-7MARKET ANALYSIS, TRENDS, AND FORECASTS, JUNE 2CONTENTS

I. INTRODUCTION, METHODOLOGY & REPORT SCOPE

II. EXECUTIVE SUMMARY

1. MARKET OVERVIEW The Internet Connected World and its Share of Challenges Recent Market Activity Cyber Security Tools Gain Prominence Amid Growing Online Security Issues Web Content Filtering - A Growing Segment in Cyber Security Market Market Outlook Web Filtering Solutions Find Steady Growth Prospects Amid Surging Cyberattacks Developed Markets Lead while Developing Regions to Lend Traction Corporate Information Assets - Vulnerable as Ever Ranking as per Frequency of Data Breaches by Industry Increasing Web 2.0 & E-Mail Threats Boost Demand for Content Filtering Products Industry Moves to New Approaches in Web-traffic Filtering and Categorization Content Filtering Functionality Sees Paradigm Shift Static Website Blacklists No Longer Solve the Purpose Upgradeability Capabilities Come to the Fore with Growing Bandwidth Usage Web & Spam Filtering Solutions to Prevent Ransomware Attacks Integration of Multiple Functions in Content Filtering Solutions - The Present Trend, Advantages and Issues Content Filtering an Integral Part of Unified Threat Management (UTM) XTMs Emerge as More Potential Tool Disaggregation of Filtering Administration Gains Importance Email Filtering - Largely Focused on Incoming Emails Messaging Security - A Growing Secure Content Management Solution Increasing IMing Drives Need for IM Filtering VoIP Filtering Gains Popularity Inherent Inefficiencies in On-Premise Implementations Drives Demand for Cloud Solutions Key Disadvantages of On-site Security Implementations Web Content Filtering - Concerns and Challenges Risks of Latency - A Major Challenge Ahead Global Competitor Market Shares Web Content Filtering Competitor Market Share Scenario Worldwide (in %): 2020 & 2029 Impact of Covid-19 and a Looming Global Recession 2. FOCUS ON SELECT PLAYERS Alps System Integration Co., Ltd. (Japan) Barracuda Networks, Inc. (USA) Cisco Systems, Inc. (USA) ContentKeeper Technologies Pty. Ltd. (Australia) Digital Arts Inc. (Japan) Forcepoint LLC (USA) Fortinet, Inc. (USA) Kaspersky Lab (Russia) McAfee, LLC (USA) Palo Alto Networks, Inc. (USA) Sangfor Technologies Co., Ltd. (China) Sophos Ltd. (UK) Symantec Corporation (USA) TitanHQ (Ireland) Trend Micro Incorporated (Japan) Zscaler, Inc. (USA) 3. MARKET TRENDS & DRIVERS Expanding Internet User Base Generates Significant Market Opportunities Rise in Magnitude of Cyber Crime to Drive Adoption of Web Content Filtering Increasing Prevalence of Malware to Drive Robust Demand for Web Filtering Trojan: Fastest Growing Data-Stealing Malware APTs Emerge as a New Sophisticated Threat - Create Business Case for Web Content Filtering Hactivism on the Prowl - Creates Need for Efficient Cyber Security Solutions Conflicting Web Needs Drive Need for Flexible Solutions Individual Filtering Solutions See Changes in Functionality in Response to Evolving Needs Complimentary Endpoint Web Filtering Technique Gains Favor Endpoint Web Filtering Extends Infection Risk Control Beyond Organizational Networks Growing Use of Advanced Digital Platforms Make Enterprises Highly Vulnerable to Security Threats Growing BYOD Phenomenon Drives Adoption of Web Content Filtering Solutions Growth in Adoption of Mobile End-Points in Enterprises Make Enterprise Endpoint Security a Major Necessity Security Solutions Focusing on Smartphone Security Gains Rapid Adoption Industry Still Underprepared to Tackle Mobile Security Concerns Threat from Social Networking Sites Drives Demand for Information Security Solutions Avoiding Unnecessary Costs - Key Rationale for Adoption of IT Security Solutions Small and Mid-Sized Businesses - A Lucrative Market Segment Regulatory Compliance Requirements Continue to Drive Demand for Web Filtering Solutions 4. GLOBAL MARKET PERSPECTIVE Table 1: Web Content Filtering Global Market Estimates and Forecasts in US$ Thousand by Region/Country: 2020-2027 Table 2: Web Content Filtering Global Retrospective Market Scenario in US$ Thousand by Region/Country: 2012-2019 Table 3: Web Content Filtering Market Share Shift across Key Geographies Worldwide: 2012 VS 2020 VS 2027 III. MARKET ANALYSIS GEOGRAPHIC MARKET ANALYSIS UNITED STATES Table 4: United States Web Content Filtering Market Estimates and Projections in US$ Thousand: 2020 to 2027 Table 5: Web Content Filtering Market in the United States: A Historic Review in US$ Thousand for 2012-2019 CANADA Table 6: Canadian Web Content Filtering Market Estimates and Forecasts in US$ Thousand: 2020 to 2027 Table 7: Canadian Web Content Filtering Historic Market Review in US$ Thousand: 2012-2019 JAPAN Table 8: Japanese Market for Web Content Filtering: Annual Sales Estimates and Projections in US$ Thousand for the Period 2020-2027 Table 9: Web Content Filtering Market in Japan: Historic Sales Analysis in US$ Thousand for the Period 2012-2019 CHINA Table 10: Chinese Web Content Filtering Market Growth Prospects in US$ Thousand for the Period 2020-2027 Table 11: Web Content Filtering Historic Market Analysis in China in US$ Thousand: 2012-2019 EUROPE Table 12: European Web Content Filtering Market Demand Scenario in US$ Thousand by Region/Country: 2020-2027 Table 13: Web Content Filtering Market in Europe: A Historic Market Perspective in US$ Thousand by Region/Country for the Period 2012-2019 Table 14: European Web Content Filtering Market Share Shift by Region/Country: 2012 VS 2020 VS 2027 FRANCE Table 15: Web Content Filtering Market in France: Estimates and Projections in US$ Thousand for the Period 2020-2027 Table 16: French Web Content Filtering Historic Market Scenario in US$ Thousand: 2012-2019 GERMANY Table 17: Web Content Filtering Market in Germany: Recent Past, Current and Future Analysis in US$ Thousand for the Period 2020-2027 Table 18: German Web Content Filtering Historic Market Analysis in US$ Thousand: 2012-2019 ITALY Table 19: Italian Web Content Filtering Market Growth Prospects in US$ Thousand for the Period 2020-2027 Table 20: Web Content Filtering Historic Market Analysis in Italy in US$ Thousand: 2012-2019 UNITED KINGDOM Table 21: United Kingdom Market for Web Content Filtering: Annual Sales Estimates and Projections in US$ Thousand for the Period 2020-2027 Table 22: Web Content Filtering Market in the United Kingdom: Historic Sales Analysis in US$ Thousand for the Period 2012-2019 SPAIN Table 23: Spanish Web Content Filtering Market Estimates and Forecasts in US$ Thousand: 2020 to 2027 Table 24: Spanish Web Content Filtering Historic Market Review in US$ Thousand: 2012-2019 RUSSIA Table 25: Russian Web Content Filtering Market Estimates and Projections in US$ Thousand: 2020 to 2027 Table 26: Web Content Filtering Market in Russia: A Historic Review in US$ Thousand for 2012-2019 REST OF EUROPE Table 27: Rest of Europe Web Content Filtering Market Estimates and Forecasts in US$ Thousand: 2020-2027 Table 28: Web Content Filtering Market in Rest of Europe in US$ Thousand: A Historic Review for the Period 2012-2019 ASIA-PACIFIC Table 29: Asia-Pacific Web Content Filtering Market Estimates and Forecasts in US$ Thousand by Region/Country: 2020-2027 Table 30: Web Content Filtering Market in Asia-Pacific: Historic Market Analysis in US$ Thousand by Region/Country for the Period 2012-2019 Table 31: Asia-Pacific Web Content Filtering Market Share Analysis by Region/Country: 2012 VS 2020 VS 2027 AUSTRALIA Table 32: Web Content Filtering Market in Australia: Recent Past, Current and Future Analysis in US$ Thousand for the Period 2020-2027 Table 33: Australian Web Content Filtering Historic Market Analysis in US$ Thousand: 2012-2019 INDIA Table 34: Indian Web Content Filtering Market Estimates and Forecasts in US$ Thousand: 2020 to 2027 Table 35: Indian Web Content Filtering Historic Market Review in US$ Thousand: 2012-2019 SOUTH KOREA Table 36: Web Content Filtering Market in South Korea: Recent Past, Current and Future Analysis in US$ Thousand for the Period 2020-2027 Table 37: South Korean Web Content Filtering Historic Market Analysis in US$ Thousand: 2012-2019 REST OF ASIA-PACIFIC Table 38: Rest of Asia-Pacific Market for Web Content Filtering: Annual Sales Estimates and Projections in US$ Thousand for the Period 2020-2027 Table 39: Web Content Filtering Market in Rest of Asia-Pacific: Historic Sales Analysis in US$ Thousand for the Period 2012-2019 LATIN AMERICA Table 40: Latin American Web Content Filtering Market Trends by Region/Country in US$ Thousand: 2020-2027 Table 41: Web Content Filtering Market in Latin America in US$ Thousand by Region/Country: A Historic Perspective for the Period 2012-2019 Table 42: Latin American Web Content Filtering Market Percentage Breakdown of Sales by Region/Country: 2012, 2020, and 2027 ARGENTINA Table 43: Argentinean Web Content Filtering Market Estimates and Forecasts in US$ Thousand: 2020-2027 Table 44: Web Content Filtering Market in Argentina in US$ Thousand: A Historic Review for the Period 2012-2019 BRAZIL Table 45: Web Content Filtering Market in Brazil: Estimates and Projections in US$ Thousand for the Period 2020-2027 Table 46: Brazilian Web Content Filtering Historic Market Scenario in US$ Thousand: 2012-2019 MEXICO Table 47: Web Content Filtering Market in Mexico: Recent Past, Current and Future Analysis in US$ Thousand for the Period 2020-2027 Table 48: Mexican Web Content Filtering Historic Market Analysis in US$ Thousand: 2012-2019 REST OF LATIN AMERICA Table 49: Rest of Latin America Web Content Filtering Market Estimates and Projections in US$ Thousand: 2020 to 2027 Table 50: Web Content Filtering Market in Rest of Latin America: A Historic Review in US$ Thousand for 2012-2019 MIDDLE EAST Table 51: The Middle East Web Content Filtering Market Estimates and Forecasts in US$ Thousand by Region/Country: 2020-2027 Table 52: Web Content Filtering Market in the Middle East by Region/Country in US$ Thousand: 2012-2019 Table 53: The Middle East Web Content Filtering Market Share Breakdown by Region/Country: 2012, 2020, and 2027 IRAN Table 54: Iranian Market for Web Content Filtering: Annual Sales Estimates and Projections in US$ Thousand for the Period 2020-2027 Table 55: Web Content Filtering Market in Iran: Historic Sales Analysis in US$ Thousand for the Period 2012-2019 ISRAEL Table 56: Israeli Web Content Filtering Market Estimates and Forecasts in US$ Thousand: 2020-2027 Table 57: Web Content Filtering Market in Israel in US$ Thousand: A Historic Review for the Period 2012-2019 SAUDI ARABIA Table 58: Saudi Arabian Web Content Filtering Market Growth Prospects in US$ Thousand for the Period 2020-2027 Table 59: Web Content Filtering Historic Market Analysis in Saudi Arabia in US$ Thousand: 2012-2019 UNITED ARAB EMIRATES Table 60: Web Content Filtering Market in the United Arab Emirates: Recent Past, Current and Future Analysis in US$ Thousand for the Period 2020-2027 Table 61: United Arab Emirates Web Content Filtering Historic Market Analysis in US$ Thousand: 2012-2019 REST OF MIDDLE EAST Table 62: Web Content Filtering Market in Rest of Middle East: Recent Past, Current and Future Analysis in US$ Thousand for the Period 2020-2027 Table 63: Rest of Middle East Web Content Filtering Historic Market Analysis in US$ Thousand: 2012-2019 AFRICA Table 64: African Web Content Filtering Market Estimates and Projections in US$ Thousand: 2020 to 2027 Table 65: Web Content Filtering Market in Africa: A Historic Review in US$ Thousand for 2012-2019 IV. COMPETITION

Total Companies Profiled: 65 Read the full report: https://www.reportlinker.com/p03646047/?utm_source=GNW

About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________

Read the original:
Amid the COVID-19 crisis and the looming economic recession, the Web Content Filtering market worldwide will grow by a projected US$3 Billion, during...

Read More..

6 ways to delete yourself from the internet – CNET

If you're reading this, it's highly likely your personal information is available to the public. And by "public" I mean everyone everywhere. So, how can deleting yourself from the internet prevent companies from acquiring your info? Short answer: it can't. Unfortunately, you can never remove yourself completely from the internet, but there are ways to minimize your online footprint, which would lower the chances of your data getting out there. Here are some ways to do just that.

Be warned, however: removing your information from the internet, as I've laid it out below, may adversely affect your ability to communicate with potential employers.

Think about which social networks you have profiles on. Aside from the big ones, such as Facebook, Twitter, LinkedIn and Instagram, do you still have public accounts on sites like Tumblr, Google+ or even MySpace? What about your Reddit account? Which shopping sites have you registered on? Common ones might include information stored on Amazon, Gap.com, Macys.com and others.

Using a service like DeleteMe can make removing yourself from the internet less of a headache.

To get rid of these accounts, go to your account settings and just look for an option to either deactivate, remove or close your account. Depending on the account, you may find it under Security or Privacy, or something similar.

If you're having trouble with a particular account, try searching online for "How to delete," followed by the name of the account you wish to delete. You should be able to find some instruction on how to delete that particular account.

If for some reason you can't delete an account, change the info in the account to something other than your actual info. Something fake or completely random.

Now playing: Watch this: Get off the grid

3:43

There are companies out there that collect your information. They're called data brokers, and they have names like Spokeo, Whitepages.com, PeopleFinder, as well as plenty of others. They collect data from everything you do online and then sell that data to interested parties, mostly in order to more specifically advertise to you and sell you more stuff.

Now you could search for yourself on these sites and then deal with each site individually to get your name removed. Problem is, the procedure for opting out from each site is different and sometimes involves sending faxes and filling out actual physical paperwork. Physical. Paperwork. What year is this, again?

Anyway, an easier way to do it is to use a service like DeleteMe atjoindeletme.com. For just $129/year, the service will jump through all those monotonous hoops for you. It'll even check back every few months to make sure your name hasn't been re-added to these sites.

Be warned: If you remove yourself from these data broker sites, you'll also mostly remove yourself from Google search results, therefore making it much harder for people to find you. DeleteMe also gives you a set of DIY guides on how to remove yourself from each individual data broker if you'd like to do the process yourself.

First, check with your phone company or cell provider to make sure you aren't listed online and have them remove your name if you are.

If you want to remove an old forum post or an old embarrassing blog you wrote back in the day, you'll have to contact the webmaster of those sites individually. You can either look at the About us or Contacts section of the site to find the right person to contact or go to http://www.whois.com and search for the domain name you wish to contact. There you should find information on who exactly to contact.

Unfortunately, private website operators are under no obligation to remove your posts. So, when contacting these sites be polite and clearly state why you want the post removed. Hopefully they'll actually follow through and remove it.

If they don't, tip no. 4 is a less effective, but still viable option.

If someone's posted sensitive information of yours such as a Social Security number or a bank account number and the webmaster of the site where it was posted won't remove it, you can send a legal request to Google to have it removed.

You may have to exercise Google's legal powers to get your personal information removed from a stubborn site.

The removal process could take some time, and there's no guarantee it'll be successful, but it's also your best recourse if you find yourself in such a vulnerable situation.

Google's URL removal tool is handy for erasing evidence of past mistakes from the internet.

Let's say there's a webpage with information about you on it you'd like to get rid of. Like your former employer's staff page, months after you've changed jobs. You reach out to get them to update the page. They do, but when you Google your name, the page still shows up in your search results -- even though your name isn't anywhere to be found when you click the link. This means the old version of the page is cached on Google's servers.

Here's where this tool comes in. Submit the URL to Google in hopes it'll update its servers deleting the cached search result so you're no longer associated with the page. There's no guarantee Google will remove the cached info for reasons, but it's worth a try to exorcise as much of your presence as possible from the internet.

Depending on the type of email account you have, the amount of steps this will take will vary.

You'll have to sign into your account and then find the option to delete or close the account. Some accounts will stay open for a certain amount of time, so if you want to reactivate them you can.

An email address is necessary to complete the previous steps, so make sure this one is your last.

Remember to be patient when going through this process, and don't expect to complete it in one day. You may also have to accept that there are some things you won't be able permanently delete from the internet.

Editors' note:This article was originally published in December 2014. It is periodically updated.

CNET may get a share of revenue from the sale of services featured on this page.

View original post here:
6 ways to delete yourself from the internet - CNET

Read More..

Mozilla VP of IT: How to stay secure while remote working – BusinessCloud

The world is currently undertaking the largest remote working experiment in history, and the UK is no exception. Large corporates such as Facebook and Google have already extended their telecommuting policy through to 2021.

While manufacturing and service industries focus on how to get employees to work on site safely, many businesses are implementing work-from-home policies that will be in place long after the crisis is resolved. Nine out of ten Brits now want the option to work from home at least once a week, largely driven by the desire to cut out their commutes.

Making sure employees stay connected, productive and socially distant are clear priorities, but businesses must not forget this new organisational shift poses serious privacy risks.

Without the right processes and infrastructure in place, the risk of unauthorised data transfers and sharing grows. User privacy is also under threat as employees adapt to new and unfamiliar tools needed to do their job from home. All of this is exacerbated by the simple fact that home networks are hardly ever as secure as corporate networks.

At Mozilla, weve been focusing on home office security for some time. Half of our global workforce, and 69% in the UK, were working permanently from home long before the crisis prompted this shift. Weve learnt that employers need to actively support their employees in creating a secure office environment, particularly given the shift has been sudden and without warning for many.

There are three main areas that must be prioritised when designing a home office: connection security, IT security, and data security.

Most company devices and associated software are overseen by an in-house IT expert or a specialised contractor. This means they have the right antivirus software and firewall protections set up, and these are updated regularly. Nearly every company aims to enforce strict rules around the use of private hardware such as laptops or storage devices for work because they are far less secure. However, when working from home, employees are less likely to follow guidelines particularly if theyre not set out clearly.

Thats why business devices should ideally only be used when working, and employees should avoid the temptation to plug in private USBs or visit suspicious websites; while your companys common protection software can safeguard against many threats, its not completely immune.

Moreover, be careful of checking your work and private emails as many criminals try to spread malware in inboxes. Malevolent hackers are impersonating Zoom, Microsoft Teams, and Google Meet for phishing scams, and some are even sending out emails posing as the World Health Organisation.

As we access more business resources remotely, its important to be aware of the datas location, especially given many companies expect to have access to employee's data at all times.

As peoples work and home lives increasingly blur, its imperative to create a strict separation between private devices and home devices. This includes laptops, smartphones and tablets. Sometimes this simply isnt possible, so separating where the data is stored is equally important. Most companies use cloud solutions such as Dropbox or One Drive to store their assets and have internal regulations around use - these should always be observed, especially when using a private device.

You should also only use secure, business appropriate platforms when sending data to third parties such as customers, clients or service providers. There are multiple solutions available such as Firefox Send, Smash or Google Drive to make sure data isnt leaked inadvertently.

More sensitive data is being shared from the home than ever before between colleagues. This means making sure data is transferred safely and securely is critical.

A great deal of companies use a virtual private network (VPN) which creates a private network from a public internet connection, ensuring online privacy and anonymity. This is important when accessing documents stored in the internal company network, particularly from home, as it safeguards against anyone intercepting data.

When people access the internet via their private home Wi-Fi they are vulnerable as the network is oftentimes less resilient and able to weather attacks. Many people just use the simple password provided with their modem as well as a weak Wi-Fi key - this isnt ideal for private use but becomes even more problematic in a professional setting.

There are a few ways employees can safeguard against attacks here. Making sure all firmware and software is up to date is a good first step. You should also use a WPA2 encryption for your Wi-Fi router or WPA3 if its available on your device. Remain vigilant and only access company documents and data via a VPN and never do so when connected to free, public networks in cafes and train stations; these are even more vulnerable than home networks.

While there isnt necessarily a one size fits all approach to designing a secure home office, there are multiple steps you can take to make sure you mitigate as many risks as possible. Businesses are under more pressure than ever, and dealing with online threats may not be top of their agenda, but by focusing on the above you can ensure you have the best practices in place to protect your companys data.

Read the rest here:
Mozilla VP of IT: How to stay secure while remote working - BusinessCloud

Read More..

Preparing for the Jobs of the Future: The Coding School and MIT Physicists Are Making Quantum Computing Accessible to High School Students This Summer…

MIT physicists have come up with a solution to prepare students with the necessary skills for the next technological revolution: teach them quantum computing.LOS ANGELES-June 4, 2020- (Newswire.com)

Quantum computing has the potential to change the world, transforming fields such as artificial intelligence, medicine, and cybersecurity. Despite its growing importance, quantum is rarely taught to university students, let alone high school students. MIT researchers and The Coding School are changing that by offering a first-of-its-kind virtual quantum computing camp this summer to high school and first-year university students.

The goal of the camp is for students to develop foundational knowledge of quantum physics and practical skills in quantum computation. By the end of the camp, students learn how to program a quantum computer and run quantum circuits such as teleporting quantum information. Students globally can apply here.

The camp is led by Amir Karamlou, a graduate research fellow and instructor for MIT's Introduction to Quantum Computing. His research focuses on experimental quantum computation using superconducting qubits. Other instructors include Bharath Kannan, a PhD student researching microwave quantum optics, and Grecia Castelazo, studying Physics and Math at MIT.

"Today, we're at the dawn of a new era in computing technology. You don't need an advanced degree in physics to explore quantum computing. Over the next decade, quantum is likely to revolutionize the world in the same way the modern computer did in the mid-20th century. Students who develop knowledge in quantum now will be prepared for this world-altering technological movement," explained Karamlou.

The camp is part of a larger quantum initiative by The Coding School's codeConnects program, a leading tech education nonprofit. Fall 2020, The Coding School will offer an unprecedented year-long quantum course for high school students. The virtual course is being led by Francisca Vasconcelos, a Rhodes Scholar and MIT graduate.

The Coding School is dedicated to ensuring computer science education is accessible, supportive, and empowering. Pioneering high-quality online, live coding education since 2017, they've taught over 70,000 hours of coding instruction to students nationwide and across 40 countries.

"To ensure long-term employability and social mobility, it's critical to look forward to the tech skills of the future and prepare students with those now. Quantum computation is one of those skills. We're proud at The Coding School to be paving the way in equipping the next generation by making quantum education accessible for all," remarked Kiera Peltz, founder of The Coding School.

To ensure accessibility, scholarships are available to students with financial need and who have been significantly affected by COVID-19, including if a parent has lost a job or is an essential worker.

Besides quantum computing, The Coding School offers other virtual camps for students grades 3-12 including a TechTaster, Music+Tech, and CreativeTech. For more personalized instruction, they offer one-on-one coding lessons in 18 specialized curriculums, including AI and Cybersecurity.

Learn more: http://www.codeconnects.org/summercamps + [emailprotected].

Media Contact: Abeer Dhanani(323) [emailprotected]

Read more:
Preparing for the Jobs of the Future: The Coding School and MIT Physicists Are Making Quantum Computing Accessible to High School Students This Summer...

Read More..

QCI Achieves Best-in-Class Performance with its Mukai Quantum-Ready Application Platform – Quantaneo, the Quantum Computing Source

These performance benefits eliminate one of the greatest obstacles to the development and adoption of quantum-ready applications, since up until now they have been slower than traditional methods running classically. The results show that Mukai provides better results than currently used software to solve complex optimization problems faced by nearly every major company and government agency worldwide.

While future quantum computers are expected to deliver even greater performance benefits, Mukai delivers today the best-known quality of results, time-to-solution, and diversity of solutions in a commercially available service. This superior capability enables business and government organizations to become quantum-ready today and realize immediate benefits from improved performance.

Optimization problems can occur in logistics routing, where timely delivery, reduced fuel consumption, and driver safety all come into play. Optimization solutions can significantly mitigate the impact to revenue or business operations posed by events such as flooding or power outages. Companies can leverage the robust and diverse solutions offered by Mukai to minimize disruptive high-impact events in real-time.

Optimization can also be achieved in R&D contexts like drug design, where better predicted protein folding can speed the design process, increase the efficacy of drugs, and guide the search for patient cohorts who might benefit. Optimization of business processes generated by solvers like Mukai can result in savings of hundreds of billions of dollars annually.

The technical study used MITs MQlib, a well-established combinatorial optimization benchmark, to compare QCI qbsolv performance with those of a variety of solvers. QCI qbsolv delivered better quality or energy of results for most problems (27 of 45) and often ran more than four times faster than the best MQlib solver (21 of 45 problems).

In terms of diversity of resultsfinding, for example, logistics routes that are quite different from each otherQCI qbsolv often found dozens of binary results that were different in more than 350 different positions (i.e., route segments). Known also to researchers as Hamming distance, diversity of results is another important advantage expected of quantum computing.

The paper, QCI Qbsolv Delivers Strong Classical Performance for Quantum-Ready Formulation, describes the full results and discusses their impact, and is available at arxiv.org/abs/2005.11294

These results demonstrate that Mukai-powered applications can exploit quantum computing concepts to solve real-world problems effectively using classical computers, noted QCI CTO, Mike Booth. More importantly, the quality, speed, and diversity of solutions offered by Mukai means government and corporate organizations can use Mukai to adopt quantum-ready approaches today without sacrificing performance. Mukai is also hardware-agnostic, enabling adopters to exploit whichever hardware delivers the quantum advantage. Were confident that leading companies can leverage Mukai today to achieve a competitive advantage.

To be sure, we are very early in the quantum computing and software era, continued Booth. Just as the vectorizing compilers for Crays processors improved radically over time, we are planning to introduce further performance improvements to Mukai over the coming months. Some of these advancements will benefit application performance using classical computers as well as hybrid quantum-classical scenarios, but all will be essential to delivering the quantum advantage. We expect Mukai to play an integral role in the quantum computing landscape by enabling organizations to tap into quantum-inspired insights today to better answer their high-value problems.

The Mukai software execution platform for quantum computers enables users and application developers to solve complex discrete constrained-optimization problems that are at the heart of some of the most difficult computing challenges in industry, government and academia. This includes, for example, scheduling technicians, parts and tools for aircraft engine repair, or designing proteins for coronavirus vaccines and therapies.

QCI recently announced version 1.1 of Mukai, which introduced higher performance and greater ease-of-use for subject-matter experts who develop quantum-ready applications and need superior performance today. Local software connects users to the Mukai cloud service for solving extremely complex optimization problems. It enables developers to create and execute quantum-ready applications on classical computers today that are ready to run on the quantum computers of tomorrow when these systems achieve performance superiority.

Read the original:
QCI Achieves Best-in-Class Performance with its Mukai Quantum-Ready Application Platform - Quantaneo, the Quantum Computing Source

Read More..