Page 3,637«..1020..3,6363,6373,6383,639..3,6503,660..»

Wifi/ Internet/ IoT Testing and Security Solutions Market 2020 by Company, Regions, Type and Application, Forecast to 2024 – Cole of Duty

The report on Wifi/ Internet/ IoT Testing and Security Solutions, gives an in-depth analysis of Global Wifi/ Internet/ IoT Testing and Security Solutions Market based on aspects that are very important for the market study. Factors like production, market share, revenue rate, regions and key players define a market study start to end. Wifi/ Internet/ IoT Testing and Security Solutions report gives an overview of market valued in the year 2020 and its growth in the coming years till 2024. It also predicts the CAGR.

Get Sample Copy of This Report at https://www.orbisresearch.com/contacts/request-sample/4431229

Wifi/ Internet/ IoT Testing and Security Solutions market research report follows a robust methodology to define its market value. This report on Wifi/ Internet/ IoT Testing and Security Solutions has been very well drafted to benefit anyone studying it. One of the most important aspects focused in this study is the regional analysis. Thus, a market research report can be called a comprehensive guide that helps in better marketing and management of businesses. The report on Global Wifi/ Internet/ IoT Testing and Security Solutions Market studies and analyses, how well a market has survived and how well it can cope up with challenges that the forecast period can throw at it. It needs to cover all factors right from political, to social to environmental.

Top Key Companies:

Keysight (Ixia)MatriumIrisnetworksGiamonSpirentNetscoutATIOGCH ServiceThe Missing LinkForescoutParasoftAukuaBynet Electronics

Browse Full Report with TOC: https://www.orbisresearch.com/reports/index/global-wifi-internet-iot-testing-and-security-solutions-market-report-2020

Region segmentation of markets helps in detailed analysis of the market in terms of business opportunities, revenue generation potential and future predictions of the market. Making right business decisions is an undeniable measure that needs to be taken for market growth. Wifi/ Internet/ IoT Testing and Security Solutions market has a set of manufacturers, vendors and consumers that define that market and their every move and achievements becomes a subject of studying for market researchers and other stakeholders.

Major Industry Type:

Self-useCommercial-use

Major Industry Application:

GovernmentCommercial EnterpriseFinancial IndustryEducation Industry

This report on Wifi/ Internet/ IoT Testing and Security Solutions, also has the market analyzed on the basis of end user applications and type. End user application analysis can also help understand consumer behavior. Its important to study product application to predict a products life cycle. Segment type is also an important aspect of any market research study. Reports are product based, they also includes information on sales channel, distributors, traders and dealers. This helps in efficient planning and execution of supply chain management as it drastically affects the overall operations of any business. Another important aspect of every market research report is the study of the key players or manufacturers driving the market forward. This can also be termed as competitor analysis. This study can benefit investors and business owners in many ways. It studies the business models, strategies, growth, innovations and every information about manufacturers that can help make business predictions and fetch good results.

Enquire before Buying at https://www.orbisresearch.com/contacts/enquiry-before-buying/4431229

About Us :

Orbis Research (orbisresearch.com) is a single point aid for all your market research requirements. We have vast database of reports from the leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required market research study for our clients.

Contact Us :

Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: +1 (972)-362-8199; +91 895 659 5155

See more here:
Wifi/ Internet/ IoT Testing and Security Solutions Market 2020 by Company, Regions, Type and Application, Forecast to 2024 - Cole of Duty

Read More..

More Salt in their wounds: DigiCert hit as hackers wriggle through (patched) holes in buggy config tool – The Register

DigiCert, slinger of SSL/TLS certificates, has warned that it too has suffered at the hands of Salty miscreants as a key used for Signed Certificate Timestamps (SCT) was potentially compromised.

The company joins Ghost.org and LineageOS in being the target of ne'er do wells as attackers exploited a disclosed (and patched) vulnerability in the Salt configuration tool over the weekend, spraying exposed infrastructure with cryptocurrency mining software.

Salt, which as we reported, disclosed the bugs (CVE-2020-11651 and CVE-2020-11652) on Friday, is a system that allows a single host server to manage a cluster of other client servers, such as within a database or, in this case, a distributed log system.

In the case of DigiCert, it appears that attackers using the exploits could have gained access to a Certificate Transparency (CT) server's signing key - had they not been so concerned with getting the mining software running. However, since the DigiCert team could not prove that keys had not been requested, the prudent decision was taken to assume that nefarious activities had occurred and act accordingly.

Writing in a forum for Certificate Transparency, DigitCert veep of business development, Jeremy Rowley assured users that "all other DigiCert CT logs are uneffected [sic] as they run on separate infrastructure."

"The attacker," said Rowley, "doesn't seem to realize that they gained access to the keys and were running other services on the [infrastructure]."

He said "any SCTs provided from that log after 7pm Mountain Standard Time yesterday (Saturday, May 2) are suspect."

Rowley added that "Digicert's CT logs are operated in a separate environment than CA operations. In fact, unique CT logs are operated [separately] from other CT logs so the event really is limited to CT2."

Still not great though, eh?

For its part, SaltStack SVP Alex Peay was keen to remind users that: "We must reinforce how critical it is that all Salt users patch their systems and follow the guidance we have provided outlining steps for remediation and best practices for Salt environment security."

The company added: "Clients who have followed fundamental internet security guidelines and best practices are not affected by this vulnerability."

Ouch.

Designed to help admins verify server certificates and spot fakes, the CT system keeps an ongoing log of timestamps for all signed SSL/TLS certs. The idea is that if a new certificate is spotted, someone can look it up and see exactly when it was created. DigiCert maintains several such logs, each on different infrastructures.

DigiCert told The Reg it was deactivating the Certificate Transparency (CT) 2 log server "after determining that the key used to sign SCTs may have been exposed via critical SALT vulnerabilities."

"We do not believe the key was used to sign SCTs outside of the CT logs normal operation, though as a precaution, CAs that received SCTs from the CT2 log after May 2 at 5 p.m. U.S. Mountain Daylight Time (MDT) should receive an SCT from another trusted log."

Three other DigiCert CT logs - CT1, Yeti and Nessie - run on different infrastructures and were not affected, the company said.

"DigiCert has been planning for some time to shut down CT2, in order to move the industry toward our newer and more robust CT logs, Yeti and Nessie. We notified the industry of our intention to terminate signing operations of CT2 on May 1 but pushed back the date based on industry feedback. This timeline has now been moved up, with the CT2 log in read-only mode effective May 3," the company added.

Fortunately, due to the redundancy from the other lists, admins will still have plenty of options to check certs, and at least thus far it seems that there was nothing malicious done with the lifted keys. It should also be noted that no other part of DigiCert's business (such as the CA) was affected by this attack.

Sponsored: Practical tips for Office 365 tenant-to-tenant migration

Read the rest here:
More Salt in their wounds: DigiCert hit as hackers wriggle through (patched) holes in buggy config tool - The Register

Read More..

The Pleasures and Pitfalls of Motherhood on Instagram – ELLE.com

The biggest day on the internet ever, at least according to Jumperoo62, a commenter on the British gossip forum Tattle.life, took place last November. The rabbit hole of a site where 53,000-plus members dissect the lives of influencers with the meticulous if selective attention of Renaissance cartographers was consistently critical and often cruel.

The Tattle Lifers were never disinterested. They were always distant observers. Until last November, when the site went from being a lesser moon in the influencer solar system to playing a central role in a rapidly unraveling series of events one commenter dubbed Instamumistan. Inject this shit into my veins, wrote Swipe Up! Better than a soap opera, wrote Plinkplonk. It was also, quite possibly, one of the worst days of Clemmie Hoopers life.

At the time, Hooper, a 35-year-old midwife and mother of four with blunt bangs and attractive features, had around 660,000 followers on Instagram, where she posted as @mother_of_ daughters (or MOD).

David M. Benett

Her husband, Simon, a sometimes goofy, scruffily handsome operations director for a consultancy firm, drew around a million followers to his own account, @father_ of_daughters. Clemmie also had a birth-focused podcast, a best-selling book called How to Grow a Baby and Push It Out, and a blog, Gas & Air, where she shared birth stories, promoted body positivity, and offered honest-sounding tidbits of her own life as a mom (like admitting in one vacation blog post Id rather be at work).

On Gas & Airs About page, she can still be found exuding the trademark mumfluencer blend of aspirational and approachable, seated at an uncluttered desk amid a palette of millennial pink and plants. On the wall behind her is a framed drawing of a woman with similar bangs and the scrawled words Be Kind.

Tattle.life, though, presented an inverse reality. On threads with titles like Part time parents full time grifters, commenters took issue with Clemmies mothering, her outfits, her weight, the decor of her home, her recipe for avocado toast, even her spelling (Chest of draws? wrote Breakdance Badass. Thats not dyslexia its is [sic] stupidity. Utter laziness, agreed Mustard). According to the TL commenters, Clemmies husband, Simon (whom they often referred to as Slymon), was an unfunny fool whose bath-time pics and oversharing about potty-training travails were ruining his childrens lives.

Then there was AliceinWanderlust: I agree her passion shines through when she talks about her work, she wrote about MOD in February of last year. I for one found her menstrual cup post really insightful and learnt loads, she wrote a few days later.

A commenter eventually asked outright what others had danced around: Was AliceinWanderlust Clemmie? Alice vehemently denied the accusationthe idea was so absurd she posted a ROTFL emoji. But in March of last year, a Tattle.life moderator posted to announce Alice had been banned, citing suspect things logged on the back end. A few months later, the same moderator explained that site administrators had noticed AliceinWanderlust, whod once claimed all her family could afford was camping in Devon, logging in to Tattle.life from a tropical island Clemmie was also Instagramming from at the time.

"Was AliceinWanderlust Clemmie?"

The problem was that on top of creating an account to defend herself, Clemmie was also using it to put down other influencers, even ones she knew personally. Smug as fuck that #gifted ski trip made me want to stick frozen icicles in my eyes, she wrote about a post from interior design blogger @pinkhouseliving, whom shed previously collaborated with on a post.

Candice is often really aggressive and always brings it back to race, priveldge [sic] and class because she knows no one will argue with that, shed posted about Candice Brathwaite, an influencer Clemmie had invited onto her podcast to discuss the high death rate of pregnant black women.

It took a while for all this information to reach Clemmies fellow mumfluencers, but once it did, they took to Instagram en masse to denounce her. Dear Alice, wrote blogger Laura Rutherford. Youve looked me in the eye and asked me how Im doing when Ive been at my lowest. How dare you?

She got sucked in, but I think she started to enjoy it.

This, then, was Instamumistan. Sure, the commenter who likened the endless scroll of melodramatic gossip to a protracted war was participating in a particularly internet-y form of hyperbole. But it was a virtual explosion few could look away from.

The story spread from Tattle.life to Instagram to mainstream newspapers and back again. Clemmie did post a brief apology in her Instagram Story, explaining that after coming across threads about her family on Tattle.life, shed become extremely paranoid and had opened an anonymous account. When the users started to suspect it was me, I made the mistake of commenting about others, she wrote. I am just so sorry.

This did nothing to stem the outrage. Its a classic case of someone whos been victimized turning perpetrator, an insider told Grazia Daily. She got sucked in, but I think she started to enjoy it. The day after the news broke, two people on Tattle.life wrote that theyd dreamed about it.

The timeline Clemmie offered in her apology didnt entirely add up. Shed joined shortly before a thread about MOD and FOD even existed, and her first comments were exclusively about another influencer, Cash Carraway. But undoubtedly, as she admitted in her apology, she got lost in this online world. Her sock puppet account had gone so far as to describe Simon as a class A twat, I cant believe she puts up with his nonsense.

Amid the chaos, Simon put up a post of his own: Ive seen firsthand what three years of being attacked online can do to a person and the dark places it can drive you toI guess whereas I can happily ignore it all, she couldnt.... This has impacted our family and it will take some time to recover. Two days later, he returned to social media with a video titled Hairbands: Where the Hell Do They All Go?! Clemmies account has been inactive ever since.

Reading through AliceinWanderlusts posts now feels like watching the part of the horror movie where the woman starts down the basement stairs. There arent any good excuses for what she did, but its easy to imagine how it happened. How a cloak of anonymity might seem particularly appealing to someone whos made her real life public, and how attacks about your parenting could be particularly hard to slough off. How youd scramble to slip back into invisibility after being discovered, feeling a vertiginous dread that aspects youd rather keep hiddenyour spitefulness, perhaps, or the person you are late at night after the kids are asleep, your face lit only by the blue light of your phonemight be revealed.

But I dont actually know if this was the case for Clemmie. When I reached out to her PR person, whom she shares with her husband, I was told they werent doing any press. None of the other influencers involved would speak to me, either.

What I do know is that while the generally accepted story line has been that what happened with Clemmie was an aberration, its actually quite common. In the last couple of years, Ive given interviews regarding this exact situation, says Crystal Abidin, PhD, a digital anthropologist and ethnographer of internet cultures at Curtin University in Australia. Alice Wright, who runs GOMI, a U.S.-based equivalent to Tattle.life, told me the same thing has happened more than once on her site.

"I mean, I'm 38 years old, and I put sparkle filter on my face."

The more I scrolled through Clemmies digital detritus, in fact, the more her story seemed to represent not only the pressures experienced by influencers, but the insecurities, incentives, and impulses all parents must navigate as they engage with platforms that have the ability to make otherwise mature adults act like teenagers. Writer and influencer Jordan Reid, also known as @ramshackleglam, laughed when I asked her about this, as if it were so self-evident it hardly bore discussing. I mean, Im 38 years old and I put sparkle filter on my face, she says.

By 2010, almost a quarter of children worldwide had begun their digital lives via sonograms their parents posted online, according to a survey conducted by the internet security firm AVG. By the time the average child turned five, a more recent British study found, nearly 1,500 images of them had been shared. The content we post of our kids is the kind wed never post of a friend without asking. We show them on the floor crying or dancing by themselves, unaware theyre being photographed. We show them smiling in the bath, a peach emoji over their butts. We do this to build community, to show off, to allay boredom, to build our brand. But we also do this because our norms have been shaped by parent influencers, who post photos of their kids for the same reasons the rest of us do, along with one additional incentive: money.

Baby pics drive clicks, a recent New York Times opinion piece quipped. Or as Clemmie told a reporter in 2018, regarding her two youngest children and social media engagement numbers: Anything with the twins is amazing.

There are now 4.5 million mom influencers in the U.S. according to Mom 2.0 Summit, a professional conference for parenting influencers, and their impact is like word of mouth on steroids, the president and founder of a creative agency told Money magazine in 2018. Two years ago, when I posted the first photo of my then one-month-old son on Facebook, it felt almost obligatory. Id written it on my to-do list, in between figuring out some details of my maternity leave and buying a breast pump. It got twice as many likes as anything else Id ever put up.

Among the people I know, finding a parent who doesnt put images of his or her child on social media feels as surprising as finding someone who doesnt use social media at all. But it doesnt take much digging to discover why one might abstain. Leah Plunkett, the author of Sharenthood: Why We Should Think Before We Talk About Our Kids Online, told me her concerns fall into three categories: The first involves putting your child at risk of criminal acts like kidnapping or identity theft. (Studies estimate that by 2030, sharenting will be responsible for almost two-thirds of identity fraud against todays children.)

The second issue is potentially subjecting kids to actions that are legal but invasive. Baby role-playing, for example, involves people reposting photos of children theyve found online and offering them up for virtual adoption, pretending to be them, or passing them off as their own kids; there are over 37,000 Instagram posts tagged #babyrp. And the third is that creating a digital presence for children before theyve had a chance to form their own sense of self can impede their ability to figure out who they are, embarrass them, or worse.

A 2019 Microsoft survey reported that 42 percent of teens in 25 countries have been bothered by something their parents posted about them. (This includes Gwyneth Paltrows daughter, Apple, who once commented, after Paltrow posted a snap of the two of them, Mom, we have discussed this. You may not post anything without my consent.) Plunkett, who works as an associate professor at the University of New Hampshire Franklin Pierce School of Law and as a faculty associate at the Berkman Klein Center for Internet and Society at Harvard University, recently heard about a mom whose child, now in middle school, was bullied via printouts of a story the mom had long ago published on her blog.

Its a bit chilling, but the concept of a child being a brand extension does come into play.

For influencers whose livelihoods are tied to the way they package their family online, even thornier issues arise. Its a bit chilling, but the concept of a child being a brand extension does come into play, says Catherine Archer, PhD, a communications researcher at Australias Murdoch University. There are also privacy concerns, as well as ethical and financial questions. Do you pay your child? Do children have rights to images of themselves?

Legislation like Californias Coogan Law, passed in 1939, stipulated that 15 percent of a child performers earnings be deposited into a trust, and codified issues like schooling, work hours, and time off for young entertainers, but theres no current analogue for child social media stars. Even if they are performing their everyday tasks, they really are stepping into a role thats the equivalent of Shirley Temple on a movie set, with huge money attached, Plunkett says. Weve always had kids performing labor in America. Whats new is that its harder to draw the line between whats labor and whats family life.

Some parents have responded by trying to keep their children unidentifiable online. Sara Gaynes Levy, a journalist and mother of a two-year-old, rarely shares photos of her daughter; when she does, her face isnt visible. At first, this was at her husbands request, but shes come to share his worries about privacy. I probably think more than the average parent about the longevity of this stuff, she says. I have an alarmist brain. (Their decision to buy a baby monitor without Wi-Fi seemed less alarmist after videos emerged last December of people hacking into Amazons Ring home-security cameras and taunting children.)

Levy believes keeping her daughter out of her feed has also helped her maintain a broader sense of her own identity. [Instagram] is like this safe space where I still get to be Sara, who does things not related to my child, she says.

But the impact all this might have on kids later in life is still unclear. An article in the Atlantic about kids discovering their digital presence reported one 11-year-olds takeaway: Everyones always watching, and nothing is ever forgotten. Another girl said she and her friends were excited to find photos of themselves on the internetWe were like, Whoa, were real people. (Admittedly, I found both statements kind of haunting.) Its also not certain whether social media is causing new problems, or if were just seeing the same old problems playing out in new, more widespread ways.

I hate the narrative that the internet is bad for you, says author and pundit Molly Jong-Fast. Id reached out to her because long before the internet existed, shed grown up with a mother, novelist Erica Jong, who was such a prototypical sharenter shed written about the first time Molly got her period. I hate it because its easy.

It also, obviously, offers all sorts of benefits. When Laurel Pantin, the fashion features director for InStyle magazine, experienced postpartum anxiety and depression, she used the platform like Tinder, almost, she says. I was reaching out to random people whod recently had babies. It connected me to the outside world at [a point] when in reality I was very isolated and vulnerable. Her feed currently broadcasts pics of her now two-year-old son, selfies, and occasional paid posts to over 39,000 followers, but she follows a set of self-imposed rules. I just try to not embarrass my son or my husband, and to be as honest as possible, she says.

An odd thing I noticed as I worked on this piece was that the closer a persons presentation of her parenthood hewed to my own aspirations, the less I was able to notice the artifice. One woman, an influencer with more than 18,000 followers who seemed to have experienced new motherhood as a time of gauzy, earthy ease, often posted photos of herself doing things like breastfeeding while leaning against a table full of vegetables at a natural food store, or cradling her infant in a camper van while on a presumably sponsored road trip. To me, a road trip with a newborn sounded both emotionally draining and logistically confounding. Where was the car seat? How did they do the laundry? Yet looking at her photos, I still believed them.

Even some influencers, intimately familiar with the curation that goes on behind the scenes, arent immune to such feelings. Reid, aka @ramshackleglam, a mother of two, tells me that since her marriage ended in 2018, shes started using Instagram more, and while Im not proud to say it, she says, she now finds photos of happy-seeming families irritating. It makes me think that maybe if I had just tried harder, I could have had that, too, she says. A friend eventually pointed out that her feed likely used to make other people feel the same way. That really struck methat I could have created those emotions in people without meaning to, or believing I had the ability to.

Reid, who has 100,000 Instagram followers, has never been comfortable with the platform. I want it to die, she says. In part, her antipathy stems from her belief that it shapes peoples interactions with their kids. She recently watched a mother notice her children doing something cute, take out her phone, and ask them to do it again, but in front of a prettier wall. Im sure I have done the same thing, but seeing it from the outside was a little watershed moment, she says.

Reid recently coauthored The Big Activity Book for Digital Detox, though she admits, Im better at writing about it than doing it. She lives in Malibu, a walking, talking Kodak moment all the time, and often takes her kids to the beach. The other day, as they arrived, Reid realized shed forgotten her phone. She was about to turn around but changed her mind. Instead, her kids made castles out of sticks, and nobody saw them but her. She hadnt played with them like that in a long time.

*This article has been updated from a previous version and appears in the May 2020 issue of ELLE.

GET THE LATEST ISSUE OF ELLE

Read the original:
The Pleasures and Pitfalls of Motherhood on Instagram - ELLE.com

Read More..

Zoom’s Rise, Reign and Era of Reform at the Top of the Teleconferencing Throne – BroadbandBreakfast.com

May 8, 2020 - Eric Yuan came up with the idea for Zoom as a student while taking 10-hour train rides to visit his girlfriend in China.

In 2011 he left Cisco Webex to found Zoom in San Jose, California, with the mission to make video communications frictionless. Zoom earned a billion-dollar valuation by 2017 and went public in 2019 in one of the most successful IPOs of that year.

And then the coronavirus appeared in Zooms waiting room, and it was not to be ejected from the chat.

As Americans have entered a world riddled with tele-prefixes, Zoom, whether it has wanted to or not, has entered the pantheon of Tide and Alexa to become a household name. By April 1, the number of Zooms daily participants skyrocketed from 10 million in 2019 to 200 million.

Indeed, Zoom became overnight king of a increasingly-important industry thrust into new prominence by the pandemic: Videoconferencing.

As hundreds of millions of Americans and billions of global citizens adjust to new norms for work, medicine, and education, Zoom has emerged as the go-to application, cutting commute times to zero.

The most likely answer to what propelled Zoom to prominence comes from its mission statement to make video communications frictionless.

Rachna Sizemore Heizer, a member at large of the Fairfax County Public Schools Board, highlighted simplicity as an advantage in her initial decision to use Zoom for her school board meetings. Its easier to understand if youre new to the stuff, Heizer said.

Zoom also offers the option to easily customize ones background without a green screen, adding a touch of personalization that is reminiscent of social media.

Cynthia Jelke, 18, a sophomore at Tufts University, found Zoom essential to her success. I genuinely wouldnt be able to do my education without it, Jelke said.

Even the Federal Communications Commission, the agency tasked with improving communications, drew criticism on Tuesday for using Cisco Webex video conferencing technology to launch its Rural Digital Opportunity Fund auction webinar.

The web seminar designed to teach applicants how to apply for for more than $20 billion worth of funds ended up turning away business and media leaders due to a clunky audio-capacity limitations.

Commentators in the chat box complained in real time of the frustrations they faced. User Natee chirped at 4:10 p.m. on that webinar: "Webex is no good. That is why the original Webex developer created Zoom."

The workforce has also taken quickly to the interface. Patrick McGrath, a software engineer from Chicago, praised Zoom for its Whiteboarding feature, which allows users to sketch concepts in a creative and expressive way. It allows for collaboration, McGrath said in an interview with Broadband Breakfast.

Then there are the memes. Perhaps because Zoom resonated with teenagers, many of whom have had to use Zoom for school, it has become an endless generator for viral content and a hub for consolidating a shared experience.

Students from different colleges started saying that they all attend Zoom University. Zoom University T-shirt vendors began popping up online.

Zoom has been an endless source of inspiration for meme artists

Zoom has a hotter brand than other teleconferencing companies, Rishi Jaluria, a senior research analyst at D.A. Davidson told The New York Times. Younger people dont want to use the older technology.

Joshua Rush, 18, a high school senior in Los Angeles, told said The Times: Out of nowhere, I feel like Zoom has clout.

The memes help lighten to mood of being kicked out of your school, Tufts sophomore Cynthia Jelke told Broadband Breakfast.

If there was any doubt that Zoom had chiseled a frieze in the pantheon of pop culture, Saturday Night Lives first virtual episode put that skepticism to rest.

Live from Zoom, itsSaturday Night Live, announced the cast of SNL, who used Zoom for large swaths of its episode on April 11.

Tom Hanks, the host of the episode and a popular coronavirus survivor, had fun with the monologue, using video cuts and costumes to play different characters. The episode featured many playful jabs at the ubiquitous platform, and one sketch dedicated to Zoom profiled common videoconferencing personalities.

Zoom Sales Leader Colby Nish with company logo in the back: Delivering happiness

Almost as quickly as Zoom has become a verb, Zoombombing has entered the national lexicon. Zoombombing occurs when a Zoom meeting host or attendee leaves the join URL unattended, which, in the world of the internet, can happen many different ways.

A prankster can then use this neglected link to crash a meeting and broadcast improper material, such as pornography or racist content. The FBI has issued a warning about Zoombombing on March 30 but that hasnt curbed the rise of this new breed of troll.

The Anti-Defamation League has already documented 21 instances (as of April 6) of anti-Semitic Zoombombing at the levels of government, school, and worship.

Journalists Kara Swisher of The New York Times and Jessica Lenin of The Information were forced to shut down their Zoom webinar about feminism in tech on March 15, when trolls broke into their meeting and began broadcasting a shock video. A meeting of the Indiana Election Commission was interrupted by a video of a man masturbating.

The graphic examples dont stop there:

When McGrath, the software engineer from Chicago, discussed the issue of security, he responded we have a definite team to take care of that Its totally because of the security concerns that have been going around.

Then theres the issue of privacy.

As early as March 26, Vice reported that it had uncovered that Zoom had been sharing its users data with Facebook without their knowledge.

Data being shared included when the user opens the app, details on the user's device such as the model, the time zone and city the user is connecting from, which phone carrier the user is using, and information that allows third-party companies totarget a user with advertisements.

"That's shocking. There is nothing in the privacy policy that addresses that," Pat Walshe, an activist from Privacy Matters who has analyzed Zoom's privacy policy, said in a Twitter direct message with Vice.

And then theres the issue of the Chinese server.

The University of Torontos Citizen Lab published a report showing that some Zoom user data is accessible by the companys server in China, even when all meeting participants, and the Zoom subscribers company, are outside of China, the authors of the report wrote.

The Toronto lab also noted that Zooms arrangement of owning three Chinese-based companies and employing 700 Chinese mainland software developers may make Zoom responsive to pressure from Chinese authorities. These vulnerabilities give the Chinese government a way to tap in to Zoom phone calls said Bill Marczak, a research fellow at Citizen Lab.

Zoom claim to offer end-to-end encryption was scrutinized by The Interceptand found to be wrong. The company was forced to backtrack and apologize in a blog post by Oded Gal, Zooms chief product officer:

In light of recent interest in our encryption practices, we want to start by apologizing for the confusion we have caused by incorrectly suggesting that Zoom meetings were capable of using end-to-end encryption. While we never intended to deceive any of our customers,we recognize that there is a discrepancy between the commonly accepted definition of end-to-end encryption and how we were using it. This blog is intended to rectify that discrepancy and clarify exactly how we encrypt the content that moves across our network.

The Attorney General of New York sent a letter to the company asking questions regarding its privacy shortcomings that allow Zoombombing and questioned its murky agreement with Facebook. That was just one of 26 letters the Zoom office has received from state attorney generals.

The problems keep coming. Some entities are dropping Zoom. Elon Musk banned SpaceX from using Zoom. Taiwan has banned it. Germany has restricted its usage.

A shareholder for Zoom is suing the company for overstating its encryption capabilities. Even local school districts, such as the Fairfax County Public Schools, have deeming the technology unsafe, and experimenting with alternatives.

The deceptively named Ask Eric Anything weekly webinar is more of a corporate team effort that resembles The Brady Bunch

Days after Vice's report, Zoom changed codes that had shared user data with Facebook.

Zoom began allowing users to deactivate the Chinese server. By April 25, any user that had not expressly kept their data on the Chinese server was to be automatically removed from its data route.

Such an opt-in approach to data sharing is rare in the world of privacy.

And Zoom has been highly communicative about its blunders. Yuan has posted blogs repeatedly on his website updating users about security and new, common-sense features such as making security settings more prominent and reporting users.

He has also used his blogs to draw attention to the tools that have always existed for dealing with trolls, such as good cyber hygiene and tutorials for using the Zoom Waiting Room to vet join requests.

Most notably, Zoom is hosting a series of weekly webinars since April 8 with Yuan himself, called "Ask Eric Anything." Hes made himself as available as a CEO can be.

These are deceptively named events. They are more of a corporate team effort that resembles The Brady Bunch, or Hollywood Squares.

At one of the first of these webcasts, the majority of questions revolved around interface and troubleshooting, but some addressed security concerns.

For the next 90 days, Zoom will be incredibly focused on enhancing our privacy and security, promised Yuan.

See "Zoom CEO Eric Yuan Pledges to Address Security Shortcomings in The Next 90 Days,"Broadband Breakfast, April 20, 2020.

In fact, Zoom has branded itself around The Next 90 Days, where Zoom has committed to focusing itself on solely privacy-related challenges.

Asked about the specifics of its efforts by Broadband Breakfast, a Zoom spokesperson said, Together, I have no doubt we will make Zoom synonymous with safety and security.

Zooms has also had a slew of conspicuous hires: Katie Moussouris, a cybersecurity expert who debugged Microsoft and the Pentagon; Leah Kissner, Googles former head of privacy; and Alex Stamos, director of the Stanford Internet Observatory and Facebooks former chief security officer.

During Stamos time at Facebook, he advocated greater disclosure around Russian interference on Facebook during the 2016 election. His insistence that Facebook do more created internal disagreements that eventually led to his departure.

To successfully scale a video-heavy platform to such a size, with no appreciable downtime and in the space of weeks, Stamos said in a blog post explaining his decision to temporarily leave Stanford and join Zoom, is literally unprecedented in the history of the internet.

He described the challenge as too interesting to pass up.

In the end, the problem that Zoom has faced isnt specific to Zoom, but a human problem. The real challenge, as Stamos said, is how to empower ones customers without empowering those who wish to abuse them.

Continue reading here:
Zoom's Rise, Reign and Era of Reform at the Top of the Teleconferencing Throne - BroadbandBreakfast.com

Read More..

Global IT Security Spending in Government Market Expected to reach highest CAGR by 2025: Check Point Software Technologies, Cisco Systems, Fortinet,…

The main purpose of this report is to provide an in depth analysis of the global IT Security Spending in Government market including all the stakeholders in the industry. The research report presents forecasted market size and trends on the basis of past and present status of the industry. Also to understand, the analysis of complicated data is presented in simple language. Report gives in depth analysis of all the aspects of the market industry. The report includes the study of major players that includes market followers, leaders and new entrants by regions and countries. Furthermore, report offers the current technological innovations affecting the growth of the market in the long term.

In addition, report covers all challenges for the players and risk factor which ae responsible for restraining the growth of the market over the forecast period. Some essential tools for the market movements such as PORTER, PESTEL and SVOR analysis have been presented in this report with potential impact of economic factors by regions on the market. Also in terms of revenue, report helps to estimate the CAGR of the market size of upcoming five years on the basis of historic data study.

This study covers following key players:Check Point Software TechnologiesCisco SystemsFortinetJuniper NetworksArbor NetworksBarracuda NetworksDell SonicWallF5 NetworksFireEyePalo Alto NetworksSophosTrend Micro

Request a sample of this report @ https://www.orbismarketreports.com/sample-request/85386?utm_source=Pooja

Furthermore, report helps to analyse internal as well as external factors that might affect the global IT Security Spending in Government market business positively or negatively. Therefore report offers a clear revolutionary view of the industry in advance. Report also helps users to understand the various dynamics of the global IT Security Spending in Government market. In addition, report provides structure of the market by analysing the segments such as product type, application, end users, key regions and key companies. Also report projects the market size of IT Security Spending in Government. In addition, research report on global IT Security Spending in Government market offers clear representation of the key players which are functioning in the industry.

Access Complete Report @ https://www.orbismarketreports.com/global-it-security-spending-in-government-market-growth-analysis-by-trends-and-forecast-2019-2025?utm_source=Pooja

Market segment by Type, the product can be split into Internet securityEndpoint securityWireless securityNetwork securityCloud security

Market segment by Application, split into GovernmentMilitaryFinancial AuthorityPolice

Report provides competitive analysis of the small and large players. Also report gives in detailed information about the players on the basis of type, financial position, price, growth strategies, product portfolio and regional presence of the players in the global IT Security Spending in Government market. Report also covers the key regions which are likely to have great market growth over the forecast period. The major regions are North America, South America, Europe, Asia-pacific and Middle East Africa. The initiatives taken by the government, universities and policy makers to promote the global IT Security Spending in Government market in the form of grants, funds and investments into the development of the market are commendable. This initiatives are expected to boost the growth of the global IT Security Spending in Government market.

Some Major TOC Points:1 Report Overview2 Global Growth Trends3 Market Share by Key Players4 Breakdown Data by Type and ApplicationContinued

For Enquiry before buying report @ https://www.orbismarketreports.com/enquiry-before-buying/85386?utm_source=Pooja

About Us : With unfailing market gauging skills, has been excelling in curating tailored business intelligence data across industry verticals. Constantly thriving to expand our skill development, our strength lies in dedicated intellectuals with dynamic problem solving intent, ever willing to mold boundaries to scale heights in market interpretation.

Contact Us : Hector Costello

Senior Manager Client Engagements

4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.

Phone No.: USA: +1 (972)-362-8199 | IND: +91 895 659 5155

View original post here:
Global IT Security Spending in Government Market Expected to reach highest CAGR by 2025: Check Point Software Technologies, Cisco Systems, Fortinet,...

Read More..

Millions of Android users need to update, or risk having attackers take over their phone – Express

Androidusers have just seen a brand new update get rolled out from Google, and the latest security patch is a hugely important one. The Android security patch which has been released this week fixes 39 vulnerabilities - but one in particular is especially concerning. The flaw, known as CVE-2020-0103, lets hackers completely take over an Android device to install programmes, steal data or create fresh accounts with full privileges.

The vulnerability was highlighted by the Center for Internet Security (CIS) who said the flaw affects Android devices running a security patch released before May 5 2020.

In a postonline they said: "Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution."

CIS added: "Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution within the context of a privileged process.

"Depending on the privileges associated with this application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

READ MORE:Android users should delete these apps right now or pay the ultimate price

"If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights."

CIS added that this vulnerability poses a high risk to business, government and home Android users.

They explained the flaw could be exploited in a number of ways, such as via emails, web browsing or when processing media files.

Google rated this flaw as a "critical" vulnerability which has been patched in the security update released on May 5.

Outlining the flaw, and other such issues addressed in the recent download, Google said: "The most severe of these issues is a critical security vulnerability in the System component that could enable a remote attacker using a specially crafted transmission to execute arbitrary code within the context of a privileged process.

"The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed."

The post from the Android makers added that service protections such as Google Play Protect "reduce the likelihood that security vulnerabilities could be successfully exploited on Android".

The news comes as this week Android users were also issued another alert, this time warning about malware that targets extremely sensitive apps.

The EventBot malware is designed to steal crucial details from financial apps such as PayPal, Barclays, CapitalOne UK, Coinbase, TransferWise, and Revolut.

Researchers from Cybereason Nocturnus unearthed the new malware, which first surfaced last month.

The majority of Android apps that were targeted are from the UK, as well as Italy, Germany, and France.

Cybereason believes EventBot has the potential to become a serious threat for Android users in the near future.

This is because "it is under constant iterative improvements, abuses a critical operating system feature, and targets financial applications."

See the rest here:
Millions of Android users need to update, or risk having attackers take over their phone - Express

Read More..

Wife hopes for ‘stranded’ Anand’s early return from Germany – Times of India

CHENNAI: The last couple of months have been most challenging for Viswanathan Anand and his family here. While the five-time former world champion has been stranded in Germany since the end of February, when he went to feature in the Bundesliga chess tournament, his wife and son have had to deal with his absence.With the government of India planning to facilitate the return of Indians stuck abroad in a phased manner, Aruna is hopeful that Anand will return soon. "Anand is in touch with the Indian embassy in Frankfurt, but at present they don't have any concrete instruction as to when flights from Germany will be arranged. The embassy is aware that Anand is stranded there. I guess the evacuation is happening in a phased manner. It is a very large operation and you just have to wait for your turn. We hope to see him back soon," she told TOI on Wednesday.'; var randomNumber = Math.random(); var isIndia = (window.geoinfo && window.geoinfo.CountryCode === 'IN') && (window.location.href.indexOf('outsideindia') === -1 ); //console.log(isIndia && randomNumber The MHA had said earlier in a statement: "Indian Embassies and High Commissions are preparing a list of distressed Indian citizens. The travel would begin in a phased manner from May 7." Aruna believes Anand's absence has been felt most by their son Akhil. "It has been a tough time for the family. With Anand not there, Akhil has found it difficult to manage. They both spend quality time whenever Anand is home. They stay in touch via video calls but Akhil misses his father's physical presence. The lockdown restrictions mean he can't even go out and it makes it doubly hard for Akhil," revealed Aruna. a { color: #000; display: block; border-bottom:0; padding: 0 0 18px; box-shadow: 0 1px 3px 0 rgba(0, 0, 0, 0.25); border-radius:4px; height:100%; box-sizing:border-box; } .brief_wrapper .brief > a img { margin:0 0 10px; width: 100%; border-radius: 4px 4px 0 0; } .brief_wrapper .brief h2 { font: bold 16px/21px proximanova, Montserrat, Verdana, arial, sans-serif; margin: 5px 16px 7px; display: -webkit-box; -webkit-line-clamp: 3; -webkit-box-orient: vertical; overflow: hidden; } .brief_wrapper .brief p { font: normal 14px/20px proximanova, Montserrat, Verdana, arial, sans-serif; display: -webkit-box; -webkit-line-clamp: 8; -webkit-box-orient: vertical; overflow: hidden; margin:5px 16px; } .brief_wrapper .videoBtn { position: relative; } .brief_wrapper .videoBtn:before, .brief_wrapper .videoBtn:after { content: ''; position: absolute; z-index: 1; cursor: pointer; } .brief_wrapper .videoBtn:before { background: rgba(0, 0, 0, 0.8); box-shadow: 0 0 15px 0 rgba(0, 0, 0, 0.4); border: 1px solid rgba(255, 255, 255, 0.8); border-radius: 50%; top: -70px; right: 10px; width: 38px; height: 38px; } .brief_wrapper .videoBtn:after { border-top: 8px solid transparent; border-bottom: 8px solid transparent; border-left: 12px solid #fff; right: 22px; top: -59px; } .brief_wrapper .brief.viewmore { height: 410px; top: 0; position: relative; } .brief_wrapper .brief.viewmore .videoBtn:before { top: 10px; } .brief_wrapper .brief.viewmore a img { margin: 0; position: relative; } .brief_wrapper .brief.viewmore .videoBtn:after { top: 21px; } .brief_wrapper .brief.viewmore:after { position: absolute; content: ''; background: rgba(0, 0, 0, 0.8); border-radius:4px; width: 100%; height: 100%; left: 0; top: 0; z-index: 1; } .brief_wrapper .brief.viewmore span { font-family: proximanova, Montserrat, Verdana, arial, sans-serif; font-size: 20px; font-weight: 600; color: #fff; text-transform: uppercase; position: absolute; width: 100%; top: 50%; left: 0; text-align: center; z-index: 2; -webkit-transform: translate(0, -50%); transform: translate(0, -50%); } .brief_wrapper .brief.viewmore span svg { display: block; margin: 10px auto; } .brief_wrapper .brief.getAdwidth{ width: 312px !important; height: 445px; margin-top: -59px; padding: 0px; } .brief_wrapper .brief.getAdwidth > div { width: 300px; transform: translate(-50%, -50%); position: absolute; left: 50%; top: 50%; } ]]>The time away from family hasn't stopped Anand from doing his bit for the Covid-19 victims. He raised money for the PM Cares Fund and is currently leading the Indian team in the FIDE Online Nations Cup.

Link:
Wife hopes for 'stranded' Anand's early return from Germany - Times of India

Read More..

The TD Show Episode 2 – Illegal Moves – uschess.org

The TD Show

This weeks The TD Show topic will be Illegal Moves and will air at 9pm Eastern/6pm Pacific on Thursday, May 7 on the US Chess Twitch channel at twitch.tv/uschess.

The show will be hosted by NTD Chris Bird and this weeks guest will be NTD Ken Ballou, Chair of the US Chess Rules Committee. We will discuss illegal moves, predominantly Chapter 1, Section 11 of the US Chess Rules, when TDs should and should not get involved in claiming them, and what the actions to take and applicable penalties are. Well also touch on the slight wording revision to Rule 11D that came into effect on January 1, 2020.

For folks tuning in live, Twitch will provide some interaction between the show and the audience, allowing you to ask questions in real-time and well also finish each episode with some light-hearted fun in the form of trivia based on the topic discussed. However, if you cannot tune in live, each episode will be archived in the TD Videos playlist at the US Chess YouTube Channel.

Replay Episode 1 here:

Original post:
The TD Show Episode 2 - Illegal Moves - uschess.org

Read More..

Global Healthcare Cloud Computing Market Analysis and Industry Forecasts to 2028 – ResearchAndMarkets.com – Business Wire

DUBLIN--(BUSINESS WIRE)--The "Global Healthcare Cloud Computing Market Analysis & Trends - Industry Forecast to 2028" report has been added to ResearchAndMarkets.com's offering.

The Global Healthcare Cloud Computing Market is poised to experience strong growth during the forecast period 2018 to 2028. Some of the prominent trends that the market is witnessing include the advent of blockchain technology in cloud computing, the rising trend of opting for advanced technology for decision-making & forecasting and increased use of cloud computing solutions for telemedicine.

Based on the deployment model, the market is segregated into public cloud, private cloud, hybrid cloud, and virtual private cloud. By product, the market is fragmented into healthcare payer solutions, and healthcare provider solutions. Healthcare payer solutions segment is sub-segmented into fraud management, payment management, provider network management, claims management, and customer relationship management. Healthcare provider solutions segment is subdivided into clinical information systems, and non-clinical information systems.

This industry report analyzes the market estimates and forecasts of all the given segments on a global as well as regional levels. The study provides historical market data for 2015, 2016 revenue estimations are presented for 2017 and forecasts from 2018 till 2028. The study focuses on market trends, leading players, supply chain trends, technological innovations, key developments, and future strategies. With comprehensive market assessment across the major geographies such as North America, Europe, Asia Pacific, Middle East, Latin America and Rest of the world the report is a valuable asset for the existing players, new entrants and the future investors.

The study presents detailed market analysis with inputs derived from industry professionals across the value chain. A special focus has been made on key countries such as U.S., Canada, Mexico, U.K., Germany, Spain, France, Italy, China, Brazil, Saudi Arabia, and South Africa. The market data is gathered from extensive primary interviews and secondary research. The market size is calculated based on the revenue generated through sales from all the given segments and sub segments in the research scope. The market sizing analysis includes both top-down and bottom-up approaches for data validation and accuracy measures.

Report Highlights:

Key Topics Covered:

1. Market Outline

1.1 Research Methodology

1.1.1 Research Approach & Sources

1.2 Market Trends

1.3 Regulatory Factors

1.4 Product Analysis

1.5 End User Analysis

1.6 Strategic Benchmarking

1.7 Opportunity Analysis

2 Executive Summary

3 Market Overview

3.1 Current Trends

3.2 Drivers

3.3 Constraints

3.4 Industry Attractiveness

4 Healthcare Cloud Computing Market, By Deployment Model

4.1 Public Cloud

4.2 Private Cloud

4.3 Hybrid Cloud

4.4 Virtual Private Cloud

5 Healthcare Cloud Computing Market, By Product

5.1 Healthcare Payer Solutions

5.2 Healthcare Provider Solutions

6 Healthcare Cloud Computing Market, By Service Model

6.1 Infrastructure-As-A-Service (IaaS)

6.2 Software-As-A-Service (SaaS)

6.3 Platform-As-A-Service (PaaS)

7 Healthcare Cloud Computing Market, By Pricing Model

7.1 Spot Pricing Model

7.2 Pay-As-You-Go Pricing Model

8 Healthcare Cloud Computing Market, By Component

8.1 Software

8.2 Services

8.2.1 Training & Education

8.2.2 Implementation Services

8.2.3 Consulting

8.2.4 Post-Sales & Maintenance

9 Healthcare Cloud Computing Market, By End User

9.1 Public Payers

9.2 Diagnostic and Imaging Centers

9.3 Hospitals

9.4 Private payers

9.5 Pharmacies

9.6 Ambulatory Centers

10 Healthcare Cloud Computing Market, By Geography

10.1 North America

10.2 Europe

10.3 Asia Pacific

10.4 Middle East

10.5 Latin America

10.6 Rest of the World (RoW)

11 Key Player Activities

11.1 Acquisitions & Mergers

11.2 Agreements, Partnerships, Collaborations and Joint Ventures

11.3 Product Launch & Expansions

11.4 Other Activities

12 Leading Companies

For more information about this report visit https://www.researchandmarkets.com/r/3dapxu

About ResearchAndMarkets.com

ResearchAndMarkets.com is the world's leading source for international market research reports and market data. We provide you with the latest data on international and regional markets, key industries, the top companies, new products and the latest trends.

Go here to read the rest:
Global Healthcare Cloud Computing Market Analysis and Industry Forecasts to 2028 - ResearchAndMarkets.com - Business Wire

Read More..

Microsoft to invest $1.5 billion in Italian cloud business – Midwest Communication

Friday, May 08, 2020 10:42 a.m. EDT by Thomson Reuters

MILAN (Reuters) - Microsoft Corp. said on Friday it would create its first datacentre region in Italy under a $1.5 billion investment plan as the U.S. company expands its cloud computing services to more locations across the world.

Microsoft's rival Amazon Web Services last week opened a datacentre region in Milan, while in March Google's Inc sealed a partnership with former phone monopoly Telecom Italia to expand cloud business operations in Italy.

Analysts expect the Italian cloud market to grow at a double digit pace in the next few years as companies, which have embraced smartworking during the coronavirus crisis, will increasingly rely on digital processes for their business.

Jean-Philippe Courtois, Microsoft's head of global sales, marketing and operations, said the company saw enormous potential to accelerate innovation through cloud services.

The new datacentre region will be based in the Milan area, joining Microsoft's other 60 regions announced globally.

In February, Microsoft announced plans to open a new datacentre region in Spain and earlier this week the company said it would invest $1 billion in Poland as part of plans to open a data centre to provide cloud services to businesses and institutions.

Also in Italy, Microsoft, under a five-year plan, will provide access to local cloud services and launch digital skilling and smart-working and artificial intelligence programs for small and medium enterprises.

The company will also expand its technology partnership with state-controlled postal operator Poste Italiane, helping the company to accelerate its digital transformation.

(Reporting by Elvira Pollina. Editing by Jane Merriman)

Read the original:
Microsoft to invest $1.5 billion in Italian cloud business - Midwest Communication

Read More..