Page 3,721«..1020..3,7203,7213,7223,723..3,7303,740..»

Artificial Intelligence in Retail Market Projected to Grow with a CAGR of 35.9% Over the Forecast Period, 2019-2025 – ResearchAndMarkets.com – Yahoo…

The "Artificial Intelligence in Retail Market by Product (Chatbot, Customer Relationship Management), Application (Programmatic Advertising), Technology (Machine Learning, Natural Language Processing), Retail (E-commerce and Direct Retail)- Forecast to 2025" report has been added to ResearchAndMarkets.com's offering.

The artificial intelligence in retail market is expected to grow at a CAGR of 35.9% from 2019 to 2025 to reach $15.3 billion by 2025.

The growth in the artificial intelligence in retail market is driven by several factors such as the rising number of internet users, increasing adoption of smart devices, rapid adoption of advances in technology across retail chain, and increasing adoption of the multi-channel or omnichannel retailing strategy. Besides, the factors such as increasing awareness about AI and big data & analytics, consistent proliferation of Internet of Things, and enhanced end-user experience is also contributing to the market growth. However, high cost of transformation and lack of infrastructure are the major factors hindering the market growth during the forecast period.

The study offers a comprehensive analysis of the global artificial intelligence in retail market with respect to various types.

The global artificial intelligence in retail market is segmented on the basis of product (chatbot, customer relationship management, inventory management), application (programmatic advertising, market forecasting), technology (machine learning, natural language processing, computer vision), retail (e-commerce and direct retail), and geography

The predictive merchandising segment accounted for the largest share of the overall artificial intelligence in retail market in 2019, mainly due to growing demand for the customer behavior tracking solutions among the retailers. However, the in-store visual monitoring and surveillance segment is expected to witness rapid growth during the forecast period, as it helps in plummeting the issue of shoplifting in retail, which is one of the major reasons to incur financial loss in the stores.

An in-depth analysis of the geographical scenario of the market provides detailed qualitative and quantitative insights about the five regions including North America, Europe, Asia Pacific, Latin America, and the Middle East and Africa. In 2019, North America commanded the largest share of the global artificial intelligence in retail market, followed by Europe and Asia Pacific. The large share of this region is mainly attributed to its open-minded approach towards smart technologies and high technology adoption rate, presence of key players & start-ups, and increased internet access. However, the factors such as speedy growth in spending power, presence of young population, and government initiatives supporting digitalization is helping Asia Pacific to register the fastest growth in the global artificial intelligence in retail market.

Key Topics Covered:

1. Introduction

1.1. Market Definition

1.2. Market Ecosystem

1.3. Currency and Limitations

1.3.1. Currency

1.3.2. Limitations

1.4. Key Stakeholders

2. Research Methodology

2.1. Research Approach

2.2. Data Collection & Validation

2.2.1. Secondary Research

2.2.2. Primary Research

2.3. Market Assessment

2.3.1. Market Size Estimation

2.3.2. Bottom-Up Approach

2.3.3. Top-Down Approach

2.3.4. Growth Forecast

2.4. Assumptions for the Study

3. Executive Summary

3.1. Overview

3.2. Market Analysis, by Product Offering

3.3. Market Analysis, by Application

3.4. Market Analysis, by Learning Technology

3.5. Market Analysis, by Type

3.6. Market Analysis, by End-User

3.7. Market Analysis, by Deployment Type

3.8. Market Analysis, by Geography

3.9. Competitive Analysis

4. Market insights

4.1. Introduction

4.2. Market Dynamics

4.2.1. Drivers

4.2.2. Restraints

4.2.3. Opportunities

4.2.4. Challenges

4.2.5. Trends

5. Artificial Intelligence in Retail Market, by Product Type

5.1. Introduction

5.2. Solutions

5.2.1. Chatbot

5.2.2. Recommendation Engines

5.2.3. Customer Behaviour Tracking

5.2.4. Visual Search

5.2.5. Customer Relationship Management

5.2.6. Price Optimization

5.2.7. Supply Chain Management

5.2.8. inventory Management

5.3. Services

5.3.1. Managed Services

5.3.2. Professional Services

6. Artificial Intelligence in Retail Market, by Application

Story continues

6.1. Introduction

6.2. Predictive Merchandising

6.3. Programmatic Advertising

6.4. In-Store Visual Monitoring & Surveillance

6.5. Market Forecasting

6.6. Location-Based Marketing

7. Artificial Intelligence in Retail Market, by Learning Technology

7.1. Introduction

7.2. Machine Learning

7.3. Natural Language Processing

7.4. Computer Vision

8. Artificial Intelligence in Retail Market, by Type

8.1. Introduction

8.2. Offline Retail

8.2.1. Brick & Mortar Stores

8.2.2. Supermarkets & Hypermarket

8.2.3. Specialty Stores

8.3. Online Retail

9. Artificial Intelligence in Retail Market, by End-User

9.1. Introduction

9.2. Food & Groceries

9.3. Health & Wellness

9.4. Automotive

9.5. Electronics & White Goods

9.6. Fashion & Clothing

9.7. Other

10. Artificial Intelligence in Retail Market, by Deployment Type

10.1. Introduction

10.2. Cloud

10.3. On-Premise

11. Global Artificial Intelligence in Retail Market, by Geography

11.1. Introduction

11.2. North America

11.3. Europe

11.4. Asia-Pacific

11.5. Latin America

11.6. Middle East & Africa

12. Competitive Landscape

12.1. Competitive Growth Strategies

12.1.1. New Product Launches

Read more:
Artificial Intelligence in Retail Market Projected to Grow with a CAGR of 35.9% Over the Forecast Period, 2019-2025 - ResearchAndMarkets.com - Yahoo...

Read More..

Artificial Intelligence turns a persons thoughts into text – Times of India

Scientists have developed an artificial intelligence system that can translate a persons thoughts into text by analysing their brain activity. Researchers at the University of California developed the AI to decipher up to 250 words in real-time from a set of between 30 and 50 sentences.The algorithm was trained using the neural signals of four women with electrodes implanted in their brains, which were already in place to monitor epileptic seizures. The volunteers repeatedly read sentences aloud while the researchers fed the brain data to the AI to unpick patterns that could be associated with individual words. The average word error rate across a repeated set was as low as 3%.'; var randomNumber = Math.random(); var isIndia = (window.geoinfo && window.geoinfo.CountryCode === 'IN') && (window.location.href.indexOf('outsideindia') === -1 ); console.log(isIndia && randomNumber A decade after speech was first decoded from human brain signals, accuracy and speed remain far below that of natural speech, states a paper detailing the research, published in the journal Nature Neuroscience. We trained a recurrent neural network to encode each sentence-length sequence of neural activity into an abstract representation, and then to decode this representation, word by word, into an English sentence, the report states.The system is, however, still a long way off being able to understand regular speech. People could become telepathic to some degree, able to converse not only without speaking but without words, the report stated.

View original post here:
Artificial Intelligence turns a persons thoughts into text - Times of India

Read More..

Russian Security Hacking the ‘Internet of Things’ – Byline Times

Stephen Komarnyckyj reports on documents revealed by Russian hackers that claim that their countrys security service has commissioned a programme which exploits smart appliances.

Russias security service, the FSB, have commissioned a programme which uses the Internet of Things (IoT) for espionage, according to a hacking group Digital Revolution. The group published what they claim are images of the documentation for the project on 18 March 2020.

The programme known as Fronton accesses devices linked to the web through the Internet of Things. Any smart appliance ranging from a washing machine to a camera in a shopping mall is potentially vulnerable. The programme uses these devices to attack web services. Social media sites could be blocked or the internet services of a small country could be paralysed swiftly.

The hackers have released images of code snippets which show that the programme was being developed as long ago as 2017 to 2018. There is also a technical specification for the programme purportedly issued by military unit No 64829, which is the FSBs information security centre.

The specification was purportedly used to commission the development of the programme from the Russian firm InformInvestGrupp. According to its website, the company, which was established in 1998, is licensed by the FSB to carry out confidential government projects.

The Moscow based firm Oday is also allegedly involved in developing the cyberweaponry, according to the documents. Oday has previously worked with Russias interior ministry on programmes for collecting information on internet users. Its CEO, Ruslan Gilyazov, is an IT specialist who also heads an IT security laboratory at Moscows Lomonosov University where he often recruits staff for the firm. He specialises in the mathematics of internet security and would have the skills necessary to develop some elements of the programme.

Digital Revolution claimed to have hacked Odays servers in April 2019 but the company refused to confirm or deny this allegation. However, the quantity of documents published then, the wealth of information they contained and the level of detail makes it hard to believe that they were forged.

The Internet of Things is particularly vulnerable to CyberAttack. Many users simply unpack their products and use them without modifying the default passwords installed by the manufacturer making them vulnerable to hackers.

The FSB was partly inspired to develop the programme after witnessing the 2016 success of a malicious programme called Mirai. Mirai targeted consumer goods such as cameras linked to the Internet of Things. On 21 October 2016, the programme was used to attack Dyn, a web service provider, resulting in dozens of sites being blocked in some areas of North America and Europe. The sites affected included The New York Times, Twitter and amazon.com.

Fronton would draw mainly on video cameras and recorders because they have a sufficient communication channel to launch attacks. A special search server would be used to spot devices that could be targeted. The server would use the TOR browser a free software which hides a web users identity so that tracing the source of any attack is almost impossible.

The documents published by Digital Revolution raise serious concerns over the security of any gadget linked to the web and the new arms race for supremacy in the cyber world.

See the original post:
Russian Security Hacking the 'Internet of Things' - Byline Times

Read More..

Unpacking TikTok, Mobile Apps and National Security Risks – Lawfare

On March 12, Sen. Josh Hawley introduced a bill into the Senate to ban the downloading and use of TikTok, the Chinese social media app, on federal government devices. Hawleys bill carves out exceptions for such activities as law enforcement investigations and intelligence collection, but holds that

no employee of the United States, officer of the United States, Member of Congress, congressional employee, or officer or employee of a government corporation may download or use TikTok or any successor application developed by ByteDance or any entity owned by ByteDance on any device issued by the United States or a government corporation.

Currently, the Transportation Security Administration and the U.S. Army have also banned the app on employee phones.

But whats Hawleys objection to an app used widely for dance challenges and lip-syncing?

The narrative goes something like this: TikTok is a company incorporated within China; the Chinese government pervasively surveils within its borders and can get access to company-held data on a whim; thus, TikToks potential collection of information on U.S. citizens is a security risk. Yet also thrown into the discussion are other allegationsTikTok removes political content at Beijings behest, for example. The failure to decouple these risks only muddies the waters and makes it harder for policymakers and the general public to understand the threats at play.

In reality, TikTok carries five clear risks. Two pertain directly to national security, and three perhaps relate to it, though not as clearly. All have been conflated or blurred together, at one point or another, by pundits and others commenting on TikToks risks. Policymakers and analysts would be wise to make meaningful distinctions among these risks and provide more nuance and detail around each specific threat.

Policymakers may clearly have many different interpretations of each of these risks likelihood and severity. Theres also no clear answer on what policymakers should do about the app. And, in reality, the problems raised by TikTok are much bigger than the app itselfrepresentative of larger questions that must be answered around U.S. data security policy.

Risk 1: TikTok Collecting Data on U.S. Government Employees

The first risk posed by TikTok is the collection of data on U.S. government employees (including those working as contractors). These are people who either have security clearances or could have clearances in the future or at the very least perform tasks that, if not classified, may still be considered sensitive in an unofficial sense. Data collection on these individuals and their activities can therefore reveal important national security information or be used in a coercive manner (that is, blackmail) to target those individuals.

There are two considerations with this type of data collection risk: the kinds of data that are being or might be collected; and Beijings ability to access that data.

The data collected by TikTok, at least on the surface, might seem relatively benign; after all, the app is a social media platform for sharing videos. Even if a U.S. federal government employee has the app, one could argue, that doesnt mean theyre sharing any videos that somehow compromise their personal or professional activities. And they can use the app without jeopardizing sensitive information.

But where the risk gets more complicated is the reality that most phone apps collect far more information than what the average user would suspect they are handing over to the app. (This might even go beyond that single firm: Charlie Warzel at the New York Times, for example, has a great explanation of how just by downloading an app, youre potentially exposing sensitive data to dozens of technology companies, ad networks, data brokers and aggregators.)

TikTok is reasonably upfront about the high volume of data it collects: its privacy policy for U.S. residents states,

We automatically collect certain information from you when you use the Platform, including internet or other network activity information such as your IP address, geolocation-related data (as described below), unique device identifiers, browsing and search history (including content you have viewed in the Platform), and Cookies (as defined below).

It notes further that [w]e also collect information you share with us from third-party social network providers, and technical and behavioral information about your use of the Platform, such as, potentially, contact lists on other social media services. This type of data collection can especially implicate national securitygeolocations or internet search histories of federal employees can reveal quite sensitive information, such as the location of secret government facilities, details about events relevant to the government about which those employees are seeking publicly available information, and personal activities that could potentially be used to build files for blackmail.

TikTok is hardly alone in this kind of collectiongo read the privacy policy of most major social media platforms and youll find similar if not more encompassing language.

But TikTok has a unique challenge: There are real questions about who beyond TikTok might have access to the collected data. This risk likely exists whether the app is downloaded on a government-owned device used by an employee, or on a personal device used by the employee.

So can the Chinese government compel the company to turn over data?

As Samm Sacks recently wrote, Nothing is black and white, particularly when it comes to government access to data. Ultimately the Chinese government can compel companies to turn over their data, but this does not always happen. In some cases, companies can and do push back against government requests, as they have their own commercial interests to protect. There are real risks of government access to data, and this does happen, but its not as clear-cut in practice as many might assume.

There are also real fears among some U.S. policymakers that data from a company like TikTok could be added into an enormous dataset Beijing continues to compile from incidents such as the Equifax breach and the hack of the Office of Personnel Management. The product of such data-hoarding, in this view, is a massive dossier on U.S. persons that the Chinese government can use for intelligence and security purposesconsisting of everything from communications to credit scores to travel histories.

It is clear that there are national security risks with TikToks collection of data on U.S. federal government employees. The question for policymakers comes down to ones perceived likelihood of the risk, the severity of the risk and what to do about it.

Risk 2: TikTok Collecting Data on U.S. Persons Not Employed by the Government

Second is the risk that TikTok collects data on U.S. persons not working for the federal government in ways that still potentially impact national security. The considerations here mirror those of TikToks data collection on federal employees.

Yes, the link between data collection on federal personnel and national security threats (that is, counterintelligence operations) is clearer. One could imagine how a clearance-holding federal employee with an embarrassing internet search history could be blackmailed, or how the GPS movements of a clearance-holding federal employee would likewise be valuable to a foreign intelligence service.

Here, one danger is merely the potential for U.S. persons not currently employed by the government to have clearances or perform other sensitive government tasks in the future. There could also be the potential for collection to target individuals in the private sector working on proprietary and national security-related technologies.

The collection of this data could therefore have potential impacts on U.S. national security in ways that may give policymakers reason to consider wider action against TikTok. Policymakers decisions to take wider action would depend on where and how they interpret specific risk cases. For instance, one could perceive a risk of higher severity for an engineer working on tightly held and cutting-edge satellite imaging technology than for your average person.

It is also possible, in a Cambridge Analytica-style fashion, that such information could be used to develop profiles on Americans in ways that lend themselves to enhanced microtargeting on social media and other platforms.

In terms of the kinds of data being collected, TikTok, like most social media companies, very likely just collects the same types of information on all of its users. So collection on federal employees is likely the same as for non-federal employees.

The same goes for the legal authorities governing Beijings access to TikTok data: The risk remains largely similar to the risk for federal employees. Maybe Beijing has greater incentive to request access to certain kinds of information when data is on U.S. government employees than when its not. That said, this may also not be the case. TikTok might collect information from private citizens that exposes security-sensitive corporate activities. And what about the microtargetingcould Beijing have an incentive to access the data if it lent itself to, say, pushing advertisements for Chinese Communist Party (CCP)-preferred candidates in a U.S. election?

Risk 3: TikTok Censoring Information in China at Beijings Behest

The third risk pertains to Beijing ordering, forcing, coercing or otherwise leading TikTok to remove information on the platform in China. (This could include TikTok preemptively self-censoring content out of concern over possible retribution from the Chinese government.) This is not directly a U.S. national security issue, but it merits attention because of the way it has been roped into conversations about TikToks risks.

The Washington Post reported last fall, for example, on the ways in which certain content that the CCP dislikessuch as information on the Hong Kong pro-democracy protestswas strangely absent from TikTok.

Subsequently, amid this and other reports in the media about alleged TikTok censorship, Sens. Chuck Schumer and Tom Cotton sent a letter to the acting director of national intelligence, stating that

TikTok reportedly censors materials deemed politically sensitive to the Chinese Communist Party, including content related to the recent Hong Kong protests, as well as references to Tiananmen Square, Tibetan and Taiwanese independence, and the treatment of Uighurs. The platform is also a potential target of foreign influence campaigns like those carried out during the 2016 election on U.S.-based social media platforms.

In addition to raising concerns about the aforementioned risks of data collection on U.S. persons, the senators requested the intelligence community to investigate allegations that TikTok engages in political censorship at the direction of the Chinese government.

But many of the conversations about this political censorship do not distinguish between TikTok removing content within Chinas borders and TikTok removing that same content globally. This might seem like a trivial distinction, but its not. In the former case, content would be removed (or perhaps algorithmically downplayed) for those accessing the mobile application from within Chinas geographic borders. Thus, this geoblocking would affect those physically located within China. If TikTok was censoring content globally, by contrast, once flagged, the offending content would be deleted from anyones and everyones TikTok feed.

The former issue of geoblocked content within China (that is, this third risk) is mostly a domestic issue in China. It is an issue of free speech and human rights, certainly, but it doesnt directly impact U.S. national security in the ways that it potentially would if content was removed globally at one governments behest.

Risk 4: TikTok Censoring Information Beyond China at Beijings Behest

So what is the national security risk if TikTok did not limit its content takedowns to within China?

There is no clear evidence that Beijing has directly told TikTok to remove content around the world. TikToks parent company responded to the Post investigation from last September by asserting that the platforms content moderation policies in the U.S. are handled by an American team and are not influenced by the Chinese government. But policymakers have expressed worries, in light of such observations as the aforementioned lack of Hong Kong protest videos on the platform, that TikTok is in fact (at Beijings direct behest or not) removing those kinds of content globally. This risk centers on whether and how TikTok could remove, for anyone using the app, a video critical of the CCP or that talks about concentration camps in Xinjiang, for example. In this case, nobody in the world would be able to access the content on TikTok once removed; the takedowns would be global.

Again, the national security risks here are not as direct as with data collection. Yet there are genuine concerns about the Chinese government exporting its censorship through platforms like TikTok. The worry is that Beijing compels high-demand Chinese-incorporated internet platforms to remove content worldwide. Beijings internet censorship practices, otherwise confined within Chinese borders, could hypothetically spread through this tactic.

This certainly presents risks to democracy and free speech. More teenagers in the United States are using TikTok to share political content. Political censorship is therefore not an insignificant issue. The takedown of certain critical videos could, for one thing, subtly influence platform users views of Beijing. And there are real concerns, especially in light of such investigations as the Washington Posts report last November that former U.S. [TikTok] employees said moderators based in Beijing had the final call on whether flagged videos were approved.

Risk 5: Disinformation on TikTok

Fifth and finally, there is concern among U.S. policymakers about potential disinformation on TikTok. Tons of U.S. teenagers use TikTok and consume political content through the application, so there is a concern that the users could amplify disinformation on the platform. This incursion of disinformation into U.S. public discourse is no doubt corrosive to the democratic process. Yet this is not a national security risk that is necessarily specific to TikTok.

Virtually every internet platform deals with disinformation; thus, that TikTok is Chinese incorporated in and of itself has nothing to do with it. But U.S. officials have expressed concern about the potential for disinformation on the platform. (These concerns arent unfounded: See the false information that circulated on TikTok about the coronavirus.) One could certainly make the argument that the platform responses to disinformationin light of political censorship concernsmight impact U.S. interests in undesirable ways. But the presence of disinformation on the platform is in many ways a distinct risk from the preceding four.

Looking Beyond TikTok

These questions, and the policy responses to them, have implications well beyond TikTok. And they have become increasingly urgent, as these questions about mobile apps, data collection and national security grow more frequent and as more bills like Sen. Hawleys are introduced into Congress.

The issues here are complex. If the view is that any data collected by a Chinese internet company is a national security riskbecause of Beijings purportedly easy access to that data, and the ways it could be potentially combined with other datasets (for example, from the Office of Personnel Management hack)then many applications fall into the bucket of risk. The widely used application WeChat, for example, could certainly be banned under that view.

But the problem is even more complicated. After all, China isnt the only country about which policymakers are or might be concerned.

Last fall, for example, Sen. Schumer sent a letter to the FBI requesting they investigate the security risks of Russian mobile apps. The letter cited the legal mechanisms available to the Government of Russia that permit access to data as reason for concern.

If Russian-made apps are also considered an unacceptable data collection risk for U.S. government employees, then how should the U.S. approach and maintain a list of countries that fit into that category?

The United States isnt alone in confronting these questions. And these arent entirely novel problems. Indias military, for example, has prohibited personnel from installing Chinese social platform WeChat due to security concerns. The Australian armed forces have also banned WeChat. The Pentagon banned the militarys use of geolocating fitness trackers in August 2018 after live GPS data was found on the public internet: Researchers were able to track the location of troops on military bases and spies in safe houses.

This all raises challenging questions about where to draw the line: Is an app that, hypothetically, makes custom emojis and collects only a users phone number more of a security risk than one that provides the weather based on current geographic location?

Meanwhile, its worth remembering that apps are only one potential way for a government to get access to information on individuals: The highly unregulated data brokerage industry, which sells incredibly intimate information on all kinds of people to whomever is buying, could easily be exploited by foreign governments. Governments could buy information from brokerage firms and ascertain sensitive activities of, say, a U.S. federal employee with a security clearance or a non-government employee who happens to be running for Congress in the next election.

Policymakers might consider crafting legislation based on the people on whom data is being collectedthat is, focusing on data collection of government employees, which presents immediate national security concerns, rather than about data collection on all Americans. Targeted bans on app downloads on government phones could be a solution, as Sen. Hawley proposed in his bill.

More broadly, one could imagine developing a framework of criteria to answer these questions that will arise again and again. This framework would function in the same way as would objective criteria by which to routinely evaluate other elements of digital supply chain security, another much-needed national security tool. For instance, the Committee on Foreign Investment in the United States could explicitly make data privacy and security a more central component of its investment screening process. Agencies like the Cybersecurity and Infrastructure Security Agency could lead an interagency process to determine government recommendations for baseline corporate cybersecurity standards writ large that, like with encryption, could be used subsequently by policymakers to evaluate protections implemented by firms like TikTok. Federal departments such as the Department of Defense could develop clear and at least semipublic frameworks by which they decide to prohibit employee use of mobile apps.

Again, though, even this route leads to more questions. What about American- or European-incorporated companies that collect disturbing amounts of sensitive personal information on U.S. government employees? Do they not fit these categories too? Policymakers need to consider these questions.

Policymakers also must consider whether these mobile app and data security decisions should depend less on the kinds of data collected and on whom, and more on the legal structures in the countries in which these companies are incorporated. Beijing, for instance, engages in unchecked surveillance. While the actual practice of Beijing getting data from private companies isnt as straightforward as some might imagine, its certainly far easier than the U.S. government getting access to American company data. For some policymakers, that difference might be the end-all-be-all to allowing Chinese apps on U.S. government employee phonesforget about details like the kinds of data in question.

And this is all without even getting into the risks of content censorship in China, content censorship globally and disinformationwhich pertain more to content management on an app like TikTok than they do directly to national security. This isnt to say (as clarified above) that no national security linkages exist or could exist to, say, TikTok removing political content worldwide at Beijings behest. But, rather, I suggest that the links to a U.S. national security threat from censorship and disinformation are generally not as pronounced as those from the collection of geolocation data on a U.S. federal employee with an active security clearance, for example.

This isnt just a laundry list of academic questions.

Some observers might find a TikTok ban to be a relatively narrowly targeted and sensible policy response to a perceived threat of Chinese state access to data. But the reality is that decisions in this sphere of data security and U.S. data protection are not made in a vacuum. They have broader implicationsfirst-order, second-order, and even third- or fourth-order effects. Many countries develop mobile apps, and many of them could be perceived as posing security risks in various ways. They, too, must be considered as part of the picture. A cohesive and repeatable strategy for making these decisions is far superiorfrom economic, national security and rights-protection perspectivesthan a whack-a-mole-style approach that might yield a sensible policy but not with a sensible process.

All the while, it is important not to blur and conflate these risks. The national security risks of mobile apps made and managed by foreign-incorporated companies may take different forms and may differ in likelihood, severity and desired response. Blurring the lines makes it hard to develop targeted policies that address actual risks in ways that fully consider costs and benefits.

Many countries worldwide are grappling with these same questions. Many governments, like Washington, are also considering if, where and how they want to decouple elements of their technology systems from other countries. Here, Washington should tread very carefully because these broader and global implications demand much more thought.

Go here to see the original:
Unpacking TikTok, Mobile Apps and National Security Risks - Lawfare

Read More..

CDN and cloud suppliers join routing security initiative – ComputerWeekly.com

Major cloud suppliers and content delivery network (CDN) providers have joined a global initiative supported by the Internet Society to address security threats to internet routing systems.

Dubbed Mutually Agreed Norms for Routing Security (Manrs), the initiative calls for participants to take six specific actions to improve the resiliency and security of the routing infrastructure.

These actions, of which five are mandatory, include stopping incorrect routing from being propagated, preventing traffic of illegitimate source IP addresses and validating routing information on a global scale, among others.

The latest Manrs participants include Akamai, Amazon Web Services, Azion, Cloudflare, Google and Microsoft. The Internet Society said a number of other companies will also be joining the initiative soon.

CDNs and cloud providers help companies serve content and access online services by delivering it in a distributed manner, often from locations close to users.

They typically exchange traffic in what is known as peering with thousands of other networks to enable traffic to flow more efficiently around the world, making them key participants in the internets interconnection infrastructure.

But cyber criminals have found ways to manipulate how internet traffic is routed to launch attacks, such as a distributed denial of service (DDoS), by violating the underlying assumptions related to identity that are implicit in the routing, naming and addressing systems.

The participation of cloud and CDN suppliers in Manrs follows a World Economic Forum report released in January 2020 that called for internet service providers (ISPs) to join the initiative.

The Manrs community can leverage the new participants unique roles in the internet routing system, in particular their vast peering value, for the benefit of a more secure internet, said Andrei Robachevsky, the Internet Societys senior director for technology programmes.

The CDN and cloud community is integral to the internet ecosystem, and by joining Manrs, they are joining a community of ISPs and internet exchange points committed to making the global routing infrastructure more secure, he added.

Christian Kaufmann, Akamais vice-president for network technology, said being Manrs compliant improves the companys routing security capabilities while potentially helping other networks to improve theirs, too.

Cloudflare, a long-time proponent of better internet routing security, has been campaigning for the industry to adopt Manrs.

Route leaks have a cascading negative impact on businesses, and coordinated action is needed by the internet infrastructure community to improve the security, resilience, and reliability of networks, said John Graham-Cumming, chief technology officer at Cloudflare.

More here:
CDN and cloud suppliers join routing security initiative - ComputerWeekly.com

Read More..

Setting up home-based office solutions busy business for Cape Breton company – The Telegram

SYDNEY, N.S.

An information technology department is a valuable tool these days for companies looking to set up work from home environments as efforts to limit face-to-face contact continue during the ongoing COVID-19 pandemic.

A local internet security firm has found itself working night and day setting up home offices for Cape Breton companies that haven't budgeted for their own ongoing IT departments.

"They are pieces we have always done," said Mark Patterson, CEO of Devantec IT and Security Services, in references to in-demand services of his company. "They are just a little more relevant today than they may have been a couple of months ago to some businesses."

The most popular of a variety of technology solutions that are helping business owners transition their employers to a home office is a virtual private network.

"The VPN would allow their workers to securely remote into their server from home and access all of their files just as they would if they were sitting in their office," he said. "That is the main solution we are using to help businesses."

For security reasons, specific names of clients could not be made available, however, Patterson said they are from all areas of industry, including telecommunications, power utilities, home heating and government.

Another popular service these days is one geared at companies who want to limit the control of traffic into offices where employees are still working.

"We are installing a lot of the video door systems so that when somebody comes up to the door, they buzz in and the person inside the business can communicate back and forth through the video system, versus letting them into the office and talking to them face-to-face."

He said these alarm and camera systems can be tailored to any business where they don't have anybody to "keep an eye on" things.

"We are a technology company, essentially, although we break it down into IT, security and communications," he said. "We can basically implement any type of technology that limits face-to-face interaction and help people abide by the current government guidelines."

Patterson said the company currently has seven employees who are putting in long hours as area businesses and individuals seek out their services to deal with the expectations and realities of the current business and social climate.

Devantec was established in 2016 by Patterson and James MacKinnon and provides high quality on-site and remote services including computer services, network security, business phone systems and security systems for businesses and homes of any size.

RELATED:

Read more:
Setting up home-based office solutions busy business for Cape Breton company - The Telegram

Read More..

Society’s Dependence on the Internet: 5 Cyber Issues the Coronavirus Lays Bare – Nextgov

As more and more U.S. schools and businesses shutter their doors, the rapidly evolving coronavirus pandemic is helping to expose societys dependencegood and badon the digital world.

Entire swaths of society, including classes we teach at American University, have moved online until the coast is clear. As vast segments of society are temporarily forced into isolation to achieve social distancing, the internet is their window into the world. Online social events like virtual happy hours foster a sense of connectedness amid social distancing. While the online world is often portrayed as a societal ill, this pandemic is a reminder of how much the digital world has to offer.

The pandemic also lays bare the many vulnerabilities created by societys dependence on the internet. These include the dangerous consequences of censorship, the constantly morphing spread of disinformation, supply chain vulnerabilities and the risks of weak cybersecurity.

1. Chinas censorship affects us all.

The global pandemic reminds us that even local censorship can have global ramifications. Chinas early suppression of coronavirus information likely contributed to what is now a worldwide pandemic. Had the doctor in Wuhan who spotted the outbreak been able to speak freely, public health authorities might have been able to do more to contain it early.

China is not alone. Much of the world lives in countries that impose controls on what can and cannot be said about their governments online. Such censorship is not just a free speech issue, but a public health issue as well. Technologies that circumvent censorship are increasingly a matter of life and death.

2. Disinformation online isnt just speechits also a matter of health and safety.

During a public health emergency, sharing accurate information rapidly is critical. Social media can be an effective tool for doing just that. But its also a source of disinformation and manipulation in ways that can threaten global health and personal safety something tech companies are desperately, yet imperfectly, trying to combat.

Facebook, for example, has banned ads selling face masks or promising false preventions or cures, while giving the World Health Organization unlimited ad space. Twitter is placing links to the Centers for Disease Control and Prevention and other reliable information sources atop search returns. Meanwhile, Russia and others reportedly are spreading rumors about the coronaviruss origins. Others are using the coronavirus to spread racist vitriol, in ways that put individuals at risk.

Not only does COVID-19 warn us of the costs and geopolitics of disinformation, it highlights the roles and responsibilities of the private sector in confronting these risks. Figuring out how to do so effectively, without suppressing legitimate critics, is one of the greatest challenges for the next decade.

3. Cyber resiliency and security matter more than ever.

Our university has moved our work online. We are holding meetings by video chat and conducting virtual courses. While many dont have this luxury, including those on the front lines of health and public safety or newly unemployed, thousands of other universities, businesses and other institutions also moved online a testament to the benefits of technological innovation.

At the same time, these moves remind us of the importance of strong encryption, reliable networks and effective cyber defenses. Today network outages are not just about losing access to Netflix but about losing livelihoods. Cyber insecurity is also a threat to public health, such as when ransomware attacks disrupt entire medical facilities.

4. Smart technologies as a lifeline.

The virus also exposes the promise and risks of the internet of things, the globe-spanning web of always-on, always-connected cameras, thermostats, alarm systems and other physical objects. Smart thermometers, blood pressure monitors and other medical devices are increasingly connected to the web. This makes it easier for people with pre-existing conditions to manage their health at home, rather than having to seek treatment in a medical facility where they are at much greater risk of exposure to the disease.

Yet this reliance on the internet of things carries risks. Insecure smart devices can be co-opted to disrupt democracy and society, such as when the Mirai botnet hijacked home appliances to disrupt critical news and information sites in the fall of 2016. When digitally interconnected devices are attacked, their benefits suddenly disappear adding to the sense of crisis and sending those dependent on connected home diagnostic tools into already overcrowded hospitals.

5. Tech supply chain is a point of vulnerability.

The shutdown of Chinese factories in the wake of the pandemic interrupted the supply of critical parts to many industries, including the U.S. tech sector. Even Apple had to temporarily halt production of the iPhone. Had China not begun to recover, the toll on the global economy could have been even greater than it is now.

This interdependence of our supply chain is neither new nor tech-specific. Manufacturing medical and otherwise has long depended on parts from all over the world. The crisis serves as a reminder of the global, complex interactions of the many companies that produce gadgets, phones, computers and many other products on which the economy and society as a whole depend. Even if the virus had never traveled outside of China, the effects would have reverberated highlighting ways in which even local crises have global ramifications.

Cyber Policy in Everything

As the next phase of the pandemic response unfolds, society will be grappling with more and more difficult questions. Among the many challenges are complex choices about how to curb the spread of the disease while preserving core freedoms. How much tracking and surveillance are people willing to accept as a means of protecting public health?

As Laura explains in The Internet in Everything, cyber policy is now entangled with everything, including health, the environment and consumer safety. Choices that we make now, about cybersecurity, speech online, encryption policies and product design will have dramatic ramifications for health, security and basic human flourishing.

Laura DeNardis is a professor of communication studies at American University School of Communication and Jennifer Daskal is a professor of law and faculty director of the Technology, Law & Security Program at American University.

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Excerpt from:
Society's Dependence on the Internet: 5 Cyber Issues the Coronavirus Lays Bare - Nextgov

Read More..

Open Source Code – The Future of User Privacy – Privacy News Online

Will we see more and more open source software in the future, or is this a passing trend that will die off eventually?

According to survey data, open source is definitely here to stay. Right now, around 78% of companies actually run open source software, and that trend will likely continue to grow. Open source code benefits businesses a lot, after all, since they get to enjoy better security, scalability, and much easier deployment as ProPrivacy discusses in their guide: Why is open source important?

But what does that mean for you, the end user? Will you enjoy better privacy? Short answer yes. But if youre looking for more detail, keep reading.

Heres why open source code is the only way to enjoy true privacy, and why you should use an open source VPN client if you want to secure your online data.

Open source code is something thats open to the public. Basically, anyone can inspect, copy, learn from, and sometimes even edit it without fear of legal repercussions. To truly be open source, the software must also have an open source license that meets all the standards of the Open Source Definition.

Nowadays, most developers publish their open source code on GitHub.

Comparatively, closed source code only belongs to the company, team, or person who created it. Nobody else can use or inspect it, unless they want to meet the long arm of the law.

Yes. There are no ifs or buts here.

If you are extremely focused on privacy, open source is the only way to go especially when using a VPN.

Were not saying a closed source VPN client cant be trusted at all. But if youre the kind of person who needs to have full control over their Internet privacy, open source options are simply better for your sanity.

Well, OpenVPN, SoftEther, and WireGuard for starters. OpenVPN is the most popular, but SoftEther and WireGuard are much more lightweight (meaning you get good security and smooth speeds).

But using either of those options isnt as simple as just installing a client on your device. You need a bit of technical know-how to set everything up. Maybe WireGuard might go smoother since its more user-friendly. But youll still have to buy and set up your own server which can cost you anywhere between $15 and $100 per month.

Besides those options, you might see some articles recommending a few other open source solutions. But theyre not too popular or user-friendly, and most of them only run on Linux.

Luckily, at PIA we have also started embracing open source announcing a shift towards open source back in 2018, and recently offering our Android code open for inspection meaning all PIA VPN clients are now open source VPN clients.

Whats more, we have even started reaching out to external auditors. And, also recently launched a closed Beta for the WireGuard protocol.

So at PIA were definitely committed to full transparency and user privacy. If youd like to learn more about the pros of using PIA, check out this in-depth review (dont worry, you can easily scan through it).

The future is open source. The stats prove it, and its really the only way to go when it comes to guaranteeing user privacy and helping people trust brands (especially VPNs).

Why else do you think people should use an open source VPN client? Or do you believe closed source options are better for privacy? Share your thoughts with us in the comments below.

WireGuard is a registered trademark of Jason A. Donenfeld.

Read this article:
Open Source Code - The Future of User Privacy - Privacy News Online

Read More..

When Is The Altcoin Season Kicking Into Gear? – KryptoMoney

This has been the biggest and most awaited question by any of them in the market. As cryptocurrencies are becoming increasing in number, so is the volatility and price factor in it. However, Bitcoin is still the most popular cryptocurrency which is ruling the technology industry right now. So what about Altcoin? Can they make any change? Is the Altcoin Season much near? This blog is set to answer all your queries with the desired answers and statistics.

The cryptocurrency market is going through a tremendous change right from the month of September 2019. For the fourth quarter of the year 2019, both Bitcoins, as well as Altcoins, made huge profits. However, popular altcoins such as Ethereum (ETH) and Ripple (XRP) were experiencing losses, some small value altcoins such as XTZ, LINK, performed well.

So what to expect for the year 2020 with Altcoin? When can we expect the Altcoin Season to be?

Initially, let me explain to you for the month of January. Here are the top currencies which performed well:

All these currencies were having a very good month similar to Bitcoin but not parallel to Bitcoin, however! For the previous month, most of the altcoins doubled their prices when compared to Altcoins.

Let me brief you on the Top Altcoins which can change the year 2020.

The Basic Attention Token (BAT) makes use of the Ethereum Blockchain platform and Brave web browser. The major motto of this currency is to exchange between the users where advertisers and publishers allow advertising companies to commoditize user attention.

The Brave Browser aims in bringing in a decentralized ecosystem that brings publishers, users, and advertisers together. This project has a great list of investors who are more prestigious.

Current Price of today: $0.259318

Cardano Cryptocurrency is created by Charles Hoskinson who is also the founder of penny coins. Cardano is the currency that was launched 2 years before it is launched to the public community.

This year will be great for Cardano and can reach up to the mark of $1. It is also expected that Cardano can climb more than $5 in the upcoming years. I would say this can be one of the perfect cryptocurrency for Altcoin Season.

Current Price of today: $0.067738

This cryptocurrency is aimed at resolving the problems of scalability and interoperability. Polkadot makes use of the Proof of Stake mechanism to provide economic incentives to secure the system completely.

But the thing is, these tokens are not available in the market. The assets are available here in the form of promises of future tokens. Hence, when it comes to predictions, it is difficult to predict the value of the asset.

Current Price of today: $ 178.28

ETHLend is one of the cryptos which managed to raise $18million for the year 2017. This project is a decentralized peer to peer lending system. Though it was a great success, it lacked traction too early in the market.

Following this, the company is now working on a completely decentralized strategy to bring in new functionalities into the system. One can buy and sell LEND tokens with a popular exchange like Coinbase if you are a premium member.

Current Price of today: $ 0.032793

This is an open-source project which was launched in the year 2017. It creates a new privacy-centered blockchain platform to facilitate the concept of the Internet of Things. It is expected that IoTeX will surpass more than $50 million by 2022.

It makes use of Blockchain technology which adds security to the network while on the other hand also offers governance and performs different functions.

Current Price of today: $ 0.00643414

NPXS is a coin created by Pundi X to be used for a Blockchain project. The major motto of NPXS is to facilitate cashless payment globally. Pundi X differs from other platforms since it has a Blockchain-enabled platform to facilitate instant cryptocurrency transactions.

This Pundi X coin has supplied around 12 countries with more than 100,000- 700,000 devices being distributed. The success of this project has given a prediction that NPXS can be one of the future Altcoins to be considered for 2020.

Current Price of today: $ 58.90M

Having a great glimpse of all these Altcoins, I would say Altcoin season is near. However, Bitcoin still takes the stage of making the year 2020 fruitful. In addition to this, markets may still change and can surprise you with something new! Lets wait and watch!

Robert Kroos

Hi, Im Robert Kroos, Crypto Writer at a leading blockchain development company. I love to share my ideas & thoughts on Blockchain & Cryptocurrency in a simple & readable manner.

Continued here:
When Is The Altcoin Season Kicking Into Gear? - KryptoMoney

Read More..

Bitcoin Diamond, QTUM, Binance Coin Price: Altcoins inverted flags fly aloft – AMBCrypto

As the collective cryptocurrency market settles into the second quarter of the year, altcoins are undoing the wrongs of March by inverting their positions on the charts. Binance Coin, Qtum, and Bitcoin Gold, all recorded inverted mildly bullish flags, with all these altcoins working towards undoing the losses of the past quarter.

Binance Coin

Binances exchange token and the newest member of the top-10 was hit by the drop on 12 March, a drop that shaved over 56 percent of its value, a value that the token had been regaining steadily over the past two weeks. In that time, the token has been trading in a strict upward channel, brushing against the rising top twice, and was locked in the middle at press time, trading at $12.53.

Binance Coins struggle with the top of the channel has created a resistance level at $12.61, which it bounced off of on 18 and 23 March, briefly breaking it on the 27th, but dipping below it the very next day.

The Bollinger Bands for the altcoin suggested a decrease in daily volatility as the bands were contracting. Further, the average line was trending below the coins press time price, indicating a bullish position.

QTUM

Unlike Binance Coin, QTUMs flag, though inverted, was quite parallel and not trending upwards as the exchange tokens. The flag pole for the altcoin began well before its bearish drop on 12 March, and was in fact, forming a long-term resistance level at $2.31.

Since the 12 March drop, QTUM has been trending with the aforementioned channel which has formed support at $1.14 and resistance at $1.29. On three occasions, the altcoin bounced off of the resistance level on 13, 24 and 26 March, respectively.

The MACD indicator suggested an overtake of the MACD line over the Signal line, indicating a bullish switch, which if widens its gap, could break the parallel channel.

Bitcoin Gold

If Binance Coins flag presented a mild case and QTUMs presented an uninitiated case, Bitcoins copycat, Bitcoin Gold, presents a rare bullish case and bullish flag, Its press time price of $7.18 has already recovered half the value since the 12 March price drop, rising by 40 percent since hitting the support at $4.91.

The upward channel was littered with higher highs as the same seems to have hit the resistance at $7.76 and was, at the time of writing, nearing the base of the channel at $6.65. While the press time price was still above the base, another rebound could threaten a break.

The Relative Strength Index for BTG was trading relatively flat between 43-47, despite the price bouncing off the resistance and testing the lower band of the channel.

Read the original here:
Bitcoin Diamond, QTUM, Binance Coin Price: Altcoins inverted flags fly aloft - AMBCrypto

Read More..