Page 3,892«..1020..3,8913,8923,8933,894..3,9003,910..»

Infrastructure-as-code templates are source of cloud infrastructure weaknesses – TechCentral.ie

(Image: Stockfresh)

High percentage of IaC template misconfigurations in cloud deployments vulnerable to attack

Print

Read More: GitHub Infrastructure infrastructure as code Palo Alto Networks security

In the age of cloud computing where infrastructure needs to be extended or deployed rapidly to meet ever-changing organisational needs, the configuration of new servers and nodes is completely automated. This is done using machine-readable definition files, or templates, as part of a process known as infrastructure as code (IaC) or continuous configuration automation (CCA).

A newanalysis by researchers from Palo Alto Networksof IaC templates collected from GitHub repositories and other places identified almost 200,000 such files that contained insecure configuration options. Using those templates can lead to serious vulnerabilities that put IaC-deployed cloud infrastructure and the data it holds at risk.

Just as when you forget to lock your car or leave a window open, an attacker can use these misconfigurations to weave around defences, the researchers said. This high number explains why, in a previous report, we found that 65% of cloud incidents were due to customer misconfigurations. Without secure IaC templates from the start, cloud environments are ripe for attack.

There are multiple IaC frameworks and technologies, the most common based on Palo Altos collection effort being Kubernetes YAML (39%), Terraform by HashiCorp (37%) and AWS CloudFormation (24%). Of these, 42% of identified CloudFormation templates, 22% of Terraform templates and 9% of Kubernetes YAML configuration files had a vulnerability.

Palo Altos analysis suggests that half the infrastructure deployments using AWS CloudFormation templates will have an insecure configuration. The report breaks this down further by type of impacted AWS service Amazon Elastic Compute Cloud (Amazon EC2), Amazon Relational Database Service (RDS), Amazon Simple Storage Service (Amazon S3) or Amazon Elastic Container Service (Amazon ECS).

For example, over 10% of S3 storage buckets defined in templates were publicly exposed. Improperly secured S3 buckets has been the source of many publicly reported data breaches in the past.

The absence of database encryption and logging, which is important to protect data and investigate potential unauthorised access, was also a commonly observed issue in CloudFormation templates. Half of them did not enable S3 logging and another half did not enable S3 server-side encryption.

A similar situation was observed with Amazons Redshift data warehouse service. Eleven percent of configuration files produced Redshift instances that were publicly exposed, 43% did not have encryption enabled, and 45% had no logging turned on.

Terraform templates, which support multiple cloud providers and technologies, did not fare any better. Around 66% of Terraform-configured S3 buckets did not have logging enabled, 26% of AWS EC2 instances had SSH (port 22) exposed to the internet and 17% template-defined AWS Security Groups allowed all inbound traffic by default.

Other common misconfigurations found in Terraform templates include:

Kubernetes YAML files had the smallest incidence of insecure configurations, but those that did were significant. Of the insecure YAML files found, 26% had Kubernetes configurations that ran as root or with privileged accounts.

Configurations allowing containers as root provide attackers with an opportunity to own virtually any aspect of that container, the Palo Alto researchers said. This also makes the process of performing container escape attacks easier, thus opening the host system to other potential threats. Security and DevOps teams should ensure that containers do not run with root or privileged accounts.

The types of IaC template misconfigurations and their prevalence the absence of database encryption and logging or publicly exposed services is in line with the type of issues detected by Palo Alto Networks in real-world cloud infrastructure deployments in and covered in past reports:

This suggests that the use of IaC templates in automated infrastructure deployment processes without first checking them for insecure configurations or other vulnerabilities is a big contributing factor to the cloud weaknesses observed in the wild.

Cybercriminal groups often target cloud infrastructure to deploy cryptomining malware that takes advantage of the processing power paid for by the victims. However, some of these groupsare also venturing beyond cryptomininganduse hacked cloud nodes for other malicious purposes.

It is readily apparent that attackers are using the default configuration mistakes implemented by weak or insecure IaC configuration templates, bypassing firewalls, security groups, or VPC policies and unnecessarily exposing an organisations cloud environment to attackers, the Palo Alto researchers said. Shift-left security is about moving security to the earliest possible point in the development process. Organisations that consistently implement shift-left practices and procedures within cloud deployments can quickly outpace competitors. Work with DevOps teams to get your security standards embedded in IaC templates. This is a win-win for DevOps and security.

IDG News Service

Read More: GitHub Infrastructure infrastructure as code Palo Alto Networks security

Originally posted here:
Infrastructure-as-code templates are source of cloud infrastructure weaknesses - TechCentral.ie

Read More..

Well-meaning charities urge Facebook to halt encryption plan to protect kids – 9to5Mac

Well-intentioned charities and academics have urged Facebook to halt encryption plans for its messaging apps, citing concerns about child exploitation.

The call was made in a letter to Facebook CEO Mark Zuckerberg in response to the companys intention to adopt end-to-end encryption to protect user privacy

TheFinancial Times reports.

The chief executive of the social media network last year announced a move to integrate the messaging services of Facebook, WhatsApp and Instagram into one encrypted system, cast as a pivot to privacy in the wake of the Cambridge Analytica data leak.

Encryption would mean that only people sending and receiving messages would be able to view them; third parties such as Facebook itself or law enforcement could not access the content.

But in a letter signed by 129 non-profit organisations, think tanks and academics across 102 countries, child safety experts warned that Facebook had not yet satisfied...deeply held concerns that the move could enable more child sexual abuse on the platform.

The letter said the shift would mean sex offenders who typically groom children on Facebook before moving their conversations on to other less scrupulous apps would be emboldened to initiate and rapidly escalate directly on Facebooks services.

Its not the first time this argument has been made. Indeed, protecting children seems to be the new fighting terrorism when it comes to arguing against strong encryption.

But children of course already use other end-to-end encrypted chat apps, like iMessage and WhatsApp. Even the letter itself acknowledges that the only impact would be that chat initiated on Facebook might remain there rather than simply switching to other platforms.

Facebook said that moving to end-to-end encryption was critically important and repeated that there are ways to detect inappropriate contact without being able to read the content.

David Miles, Facebooks head of safety for Europe, Middle East and Africa, on Wednesday said: Strong encryption is critically important to keep everyone safe from hackers and criminals. The rollout of end-to-end encryption is a long-term project. Protecting children online is critically important to this effort and we are committed to building strong safety measures into our plans. He added that the company was working closely with experts.

The company has previously explained some of the signals that can be used.

Facebook could look at user profiles and flag someone making a series of requests to minors they do not know, or people who are part of suspicious groups []

Other alerts could include large age gaps between people communicating privately on Messenger or Instagram Direct Messages, frequency of messaging, and people that lots of users are blocking or deleting.

Another possibility would be for Facebook to switch to end-to-end encryption for its main apps, while retaining standard encryption for Messenger Kids. The social network this week announced additional parental monitoring tools for this.

Facebook is not the only company coming under fire for the use of strong encryption. The FBI is still pressing Apple on the Pensacola iPhones despite the fact that there are commercially-available tools to crack both of the models in that case. Calls to halt encryption are unlikely to go away anytime soon.

FTC: We use income earning auto affiliate links. More.

Check out 9to5Mac on YouTube for more Apple news:

Visit link:
Well-meaning charities urge Facebook to halt encryption plan to protect kids - 9to5Mac

Read More..

How the B-Team watches over Australia’s encryption laws and cybersecurity – ZDNet

The cybersecurity of the Attorney-General's Department (AGD) has not been independently assessed by the Australian Signals Directorate (ASD) despite it being made an action item nearly four years ago.

The nation's Cyber Security Strategy of April 2016 said that government agencies "at higher risk of malicious cyber activity" would receive "independent cybersecurity assessments".

Adiscussion paper[PDF] for the 2020 strategy,releasedin September 2019, reported that "ASD has conducted active vulnerability assessments of a number of key government agencies".

But in written evidence given to the Senate Standing Committee on Legal and Constitutional Affairs this week, AGD revealed it wasn't one of them.

"ASD has not conducted an independent security assessment against Attorney-General's Department networks," it wrote.

"No additional funding has been provided to AGD for cybersecurity remediation activity."

AGD has vastly increased its spend on cybersecurity across the last four years, however.

From a base of AU$47,197 in 2015-2016, when they began tracking the annual operational spending of the IT Security Section, it rose to AU$225,826 in 2016-2017, then to AU$641,985 in 2017-2018. In 2018-2019, it declined slightly to AU$562,222.

"Other sections, projects, and activities make a substantial contribution to improving the overall cybersecurity posture, but are associated to other cost centres," AGD wrote.

But the department declined to answer specific questions about its compliance with theASD Essential Eightcybersecurity controls, citing security concerns.

"Publicly identifying details of any briefings provided to the Attorney-General on cybersecurity vulnerabilities on departmental networks would provide an individualised snapshot in time and may provide a heat map of vulnerabilities for departmental networks, which malicious actors may exploit and thus increase the agency's risk of cyber incidents," it wrote.

It's bad enough that most telecommunications interception warrants arenot approved by judgesbut by members of the Administrative Appeals Tribunal (AAT).

What's worse is that these less-qualified officials can spend mere minutes making their decision with no legal support from AAT staff.

After so little thought, and without further independent oversight, law enforcement agencies are free to use theircontroversial new powersunder the controversialTelecommunications and Other Legislation Amendment (Assistance and Access) Act 2018.

They can issue a "voluntary" Technical Assistance Request (TAR) to get a communications provider to help access the contents of an encrypted communication. Or they can issue a compulsory Technical Assistance Notice (TAN) to the same end.

Someseven TARs or TANs were issuedby law enforcement in the first seven months of the Act's operations. The number issued by the spooky agencies, meanwhile, is unknown.

The concern, first raised byThe Saturday Papera year ago, is that AAT members mightmore readily approve warrantsthan judges, although there's no data on this one way or the other.

There have been concerns that many AAT members are political appointees with no legal qualifications. More than 60% of members appointed since 1 July 2015 are not legally trained, according to further AGD evidence to the Legal and Constitutional Affairs Committee.

And whilesection 5DAof theTelecommunications (Interception and Access) Act 1979states that only AAT members who are "enrolled as a legal practitioner of the High Court, of another federal court, or of the Supreme Court of a State or of the Australian Capital Territory" for at least five years are approved to issue warrants -- a lawyer with five years experience is not a judge.

"Some legal experts argue that judges are more experienced and therefore more qualified to assess warrant applications than a lawyer with five years' practising experience,"The Saturday Paperwrote.

"Key to this is the fact that during these warrant proceedings, there is no party making an opposing argument."

Judges are experienced in weighing up the pros and cons of a case to ensure fairness. Lawyers are experienced at arguing for their client's position. They're not the same.

Also concerning is the amount of support given to AAT members in this role: None.

The Senate was told that "members undertake these functions in a personal capacity (as apersona designata) and not as part of their duties as a member of the AAT".

"AAT staff do not provide any legal support in respect of applications considered by an AAT member under the Act," AGD wrote.

"The AAT and AAT staff provide limited assistance to facilitate the performance of these functions, particularly scheduling appointments."

Those appointments can be very brief indeed.

"Since 1 July 2015 the average (mean) length of all appointments with AAT members for warrant-related purposes is just 18 minutes," AGD wrote.

"The shortest amount of time recorded for an appointment that proceeded is 1 minute. The data is not subject to auditing."

Maybe the members spend hours of their own time wrestling over whether to approve each warrant. On that matter, your writer has a simple response: Prove it.

Either way, it might well be argued that one minute doesn't allow for a serious challenge to a warrant application's claimed merits.

Australia's health sector continues to be the most affected by data breaches, according to the Office of the Australian Information Commissioner (OAIC).

Some58 notifiable data breaches(NDBs) were received by the OAIC between 1 January 2019 and 31 March 2019.

"The OAIC's 2019-20 corporate plan includes a continued focus on the health sector, particularly centred on uplifting the health sector's security posture," it told the Senate this week.

In September 2019, the OAIC released aGuide to Health Privacy.

"[The OAIC] is currently undertaking an associated outreach and social media campaign. This campaign includes the development of a toolkit to assist health service providers improve their information handling practices," it said.

Also during Estimates in November, the OAIC was asked if it was conducting an investigation into an alleged AU$10 million international identity theft scam that had affected several of Australia's largest super funds, including REST Super, AustralianSuper, and HESTA.

"The Information Commissioner has not opened an investigation into the named organisations in relation to the media report of an alleged identity theft scam," the OAIC said.

It did add, however, that the maximum current penalty that the Federal Court can impose for a serious or repeated interference with privacy is AU$2.1 million for a body corporate.

In recent years, the OAIC has found it difficult to process Freedom of Information (FOI) requests promptly. A substantial increase in all types of requests has since widened the gap, resulting inincreased delays and backlogs.

This week the OAIC revealed that meeting the demand for FOI regulatory work would require nine more staff at a cost A$1.65 million a year, plus A$300,000 in the first year for accommodation.

Your writer is of the view that this is back-of-the-couch money, given that it would deliver a significant increase in government transparency.

Read the rest here:
How the B-Team watches over Australia's encryption laws and cybersecurity - ZDNet

Read More..

Kids Need End-to-End Encryption for Protection Against Corporations – The Mac Observer

In areport from theFinancial Times (paywall), a letter signed by 129 non-profits, think tanks, and academics urge Facebook to reconsider encrypting its apps. They use the think of the children argument because encryption could enable more child sexual abuse. But Justin Myles Holmes says weshould think of the children andenable end-to-end encryption for them, so their data isnt used and abused by corporations precisely like Facebook.

If we fail to take action now, we risk a world in which unsavory actors domestic and foreign have built rich, comprehensive profiles for every one of our children, following the trajectories of their education, home life, consumer habits, health, and on and on. These profiles will then be used to manipulate their behavior not only as consumers, but as voters and participants in all those corners of society which, in order for freedom and justice to prevail, require instead that these kids mature into functional, free-thinking adults.

Check It Out: Kids Need End-to-End Encryption for Protection Against Corporations

View post:
Kids Need End-to-End Encryption for Protection Against Corporations - The Mac Observer

Read More..

Encryption Backdoors: The Achilles Heel to Cybersecurity? – Techopedia

The war against cybercrime is ongoing and should not be halted or terminated because cybercriminals are not on the verge of giving up any time soon. Rather, they seem to be getting tech savvier on a daily basis. (Read How Cybercriminals Use GDPR as Leverage to Extort Companies.)

Taking a look at the IC3 Complaint Statistics 2014-2018, it becomes very glaring that we are really facing a cyberwar across the globe.

Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.

IC3 statistics showing a significant increase in total losses during 2018 (source: FBI IC3)

Different technological and non-technological measures such as weak and strong passwords, single, double, and multi-factor authentication are being fashioned out to arrest the menace caused by hackers but due to the fact that technology itself is advancing rapidly, it will still take some level of work to be able to have full control of the situation. (Read Is Security Research Actually Helping Hackers?)

Some of the measures that have been posited to use in tackling cybercrime include:

While the zero-trust strategy is not technologically based, both VPN and blockchain are based on technology. Despite the fact that they may have their different shortcomings especially as even renowned VPN providers can have privacy issues the good news is that both have encryption as a feature.

Its rather unfortunate that despite all the effort being put in place to ensure that organizations, governments, and individuals are secured, it is the government that may be constituted a stumbling block in checkmating the activities of cybercriminals.

Get insights into data center priorities and IT trends.

Governments and law enforcement agents around the globe, especially in the Five Eyes (FVEY) intelligence alliance, are not relaxing in their efforts to ensure that there are encryption backdoors.

They claim this is necessary for the interests of national safety and security as criminals and terrorists increasingly use encrypted messages to communicate online.

The FVEY governments believe that there is a widening gap between the ability of law enforcement to lawfully access data and their ability to acquire and use the content of that data, which they term "a pressing international concern." In their opinions, this clearly demands "urgent, sustained attention and informed discussion."

Encryption is the method by which your data is converted into a secret code that conceals the information's true meaning. (Read Trusting Encryption Just Got a Lot Harder.)

It's based on the science known as cryptography. Any data that is not encrypted in computing, unencrypted data is referred to as plaintext, while the encrypted data is called ciphertext.

You make use of encryption algorithms or ciphers to encode or decode messages. If an unauthorized party manages to intercept your encrypted data, the only way such data can be meaningful to the intruder is by haphazardly guessing which cipher was used to encrypt the message and also what keys were used as variables.

The best way to crack any encryption key is a brute-force attack. For example, AES with 256-bit keys has a key length that is 256-bit.

The possible number of combinations that can be used to crack this type of encryption can keep a hacker working throughout life without success. This makes encryption a very valuable asset and security tool.

Encryption can be said to be the basic block on which information technology (IT) assets are built and without it, cybercriminals will be having a field day as things are currently. Before going through the tunnel, your data gets encrypted with a special pre-configured algorithm.

Then going out of your device, the encrypted traffic goes via the tunnel to a blockchain or VPN server. The server contacts the requested Internet resource, traffic is decrypted and reaches the resource in an unencrypted way.

The process is the same backward: your data from the website is unencrypted, then it becomes encrypted and conveyed through the tunnel to you where it is finally decrypted.

The Federal Bureau of Investigation (FBI), are brimming hell on technology companies that offer end-to-end encryption (E2EE). Their argument is that such encryption restricts law enforcement from accessing data and communications even with a warrant.

The FBI described this issue as "going dark," and the U.S. Department of Justice (DOJ) is not taking it with a pinch of salt either. The DOJ is calling for what they termed "responsible encryption" that can be unbarred by technology companies under a court order.

Taking it to the extreme, Australia enacted a law that made it compulsory for visitors to render passwords for all digital devices when before entering the country. A five-year jail term is a punishment for failure to comply.

Even when you fail to have security behind your mind, the fact that you must meet up with the worlds best standards makes it mandatory for you to encrypt your data since you must meet compliance regulations.

Quite a number of organizations and standard bodies recommend or mandate that sensitive data must be encrypted in order to prevent unauthorized third parties or hackers from accessing the data.

A case in point is that of the Payment Card Industry Data Security Standard (PCI DSS) where it is absolutely necessary that merchants must encrypt customers' payment card data when it is both stored at rest and broadcasted over unrestricted channels.

Making use of link-level encryption, you have your data encrypted data when it leaves your network, decrypted at the next link, which may be a host or a relay point, and then its re-encrypted before it is sent to the next link. You have the advantage of using a different key or even a different algorithm for data encryption by each link.

This process keeps on repeating until your data gets to its destination.

The world is talking Cloud storage and hence the encryption of data in the cloud cannot be overemphasized. Cloud storage providers are able to encrypt data using encryption algorithms and the data is then placed in cloud storage.

The fundamental difference between cloud encryption and in-house encryption is that cloud customers must take time to learn about the provider's policies and procedures for encryption and encryption key management in order to ensure that encryption is in league with the level of sensitivity of the data being stored.

With Network-level encryption you are able to apply crypto services at the network transfer layer above the data link level but below the application level. The implementation of network encryption is facilitated through Internet Protocol Security (IPsec) as a set of protocols and authentication methods developed for data protection just at the dawn of the Internet, which is a set of open Internet Engineering Task Force (IETF) standards that, when used in conjunction, design a structure for private transmission over IP systems.

This is based on the quantum mechanical properties of particles to protect data. Going by the Heisenberg uncertainty principle which posits that the two identifying properties of a particle its location and its momentum cannot be measured without changing the values of those properties, quantum cryptography is strongly positioned to ensure the security of your data.

For this reason, its practically impossible to copy any quantum-encoded data since any attempt to access the encoded data will change the data. This will raise a red flag and the authorized parties to the encryption will be notified of the attempted breach.

E2EE ensures that any data being sent between two parties cannot be viewed by an attacker who may have one way or the other intercepted the communication channel. However, the use of an encrypted communication circuit, as provided by Transport Layer Security (TLS) between web client and web server software, is not always enough to ensure E2EE.

You should ensure that the actual content you are transmitting is encrypted by client software before being passed to a web client and decrypted only by the recipient. Examples of messaging apps that provide E2EE include Facebook's WhatsApp and Open Whisper Systems' Signal.

Its also possible for Facebook Messenger users to get E2EE messaging with the Secret Conversations option.

Looking at this succinctly from all angles, what the government is trying to do maybe for the intended good of the populace with encryption backdoors will clearly and overwhelmingly jeopardize the privacy and security of everyone. They should ponder on the gravity of cybercriminals exploiting these same backdoors they are clamoring for.

Without encryption backdoors, the cybercrime situation is barely containable as it stands. What will the scenario look like if we open up our last line of defense to them?

And this is exactly what we shall obtain. The risks are of mammoth proportions.

See the article here:
Encryption Backdoors: The Achilles Heel to Cybersecurity? - Techopedia

Read More..

US Lawmakers Seeking to Ban Companies From Using End-to-End Encryption With a New Draft Bill – Bitcoin Exchange Guide

US lawmakers and the Department of Justice are looking to ban end-to-end encryption, making Internet users vulnerable to a host of attacks on their privacy from both malicious hackers and from the government.

Attorney General William Barr along with Sen. Senator Richard Blumenthal (D-CT) and Sen. Lindsey Graham (R-SC) seeking to ban companies from using end-to-end encryption with a new draft bill called Eliminating Abusive and Rampant Neglect of Interactive Technologies (or EARN IT) Act.

If companies do not follow the practices set by a national commission, that would be comprised of 15 people and led by Barr himself, the act would make them liable in state criminal cases and civil lawsuits over child abuse and exploitation.

The ban, however, is potentially unconstitutional under the First, Fourth, and Fifth Amendments, said Riana Pfefferkorn, a member of the Stanford Law Schools Center for Internet and Society.

If passed, the law would also require companies like Telegram to allow backdoor government access to encrypted information.

Bitcoin bull and Fundstrats Tom Lee also said it would have some negative impact on crypto and digital assets which are grounded by cryptography.

Barr claimed to want to protect the children by this move. Last week, at the White House Summit on Human Trafficking, Barr said encryption was aiding human traffickers.

We live in a digital age, and like everyone else, human traffickers are relying increasingly on digital communication and the Internet and more and more, the evidence we rely on to detect and to deal with these predators is digital evidence.

However, increasingly, this evidence is being encrypted.

Barr said that while encryption is important to protect consumers from cybercriminals, military-grade encryption means they cant get access to this data. He said,

We just cant have chat rooms and websites that are involved in grooming children victims or selling trafficked women sites that are impenetrable to law enforcementand we have to do something about this.

Previously Barr said that technology companies using end-to-end advanced encryption are effectively turning devices into law-free zones.

Brett Max Kaufman, a senior staff lawyer in the Center for Democracy at the American Civil Liberties Union is in opposition to this as he said,

Encryption reliably protects consumers sensitive data.

There is no way to give the F.B.I. access to encrypted communications without giving the same access to every government on the planet. Technology providers should continue to make their products as safe as possible and resist pressure from all governments to undermine the security of the tools they offer.

A similar Act was passed in Australia. The Assistance and Access Act in late 2018 was passed that gives Australian authorities and agencies the power to compel technology companies and their employees to provide access to encrypted data.

The Act was widely criticized for undermining the security of encryption and potential abuse of the new powers. During the second half of last year, 18 technical requests were issued. Assistant minister for cybersecurity Tim Watts said last year,

It was a failure of parliamentary process, a failure of bipartisanship on national security and a failure of the Morrison government to keep its word. Since then, Australias technology sector, particularly our cyber security sector, has been paying the price of these failures. Labor is acting to right these wrongs.

Now, the amendments to the Act are being debated in the Senate.

More here:
US Lawmakers Seeking to Ban Companies From Using End-to-End Encryption With a New Draft Bill - Bitcoin Exchange Guide

Read More..

United States: a invoice towards end-to-end encryption? – Sahiwal Tv

Representatives of the Senate and the Department of Justice from the United States seem like preventing head-to-head towards encryption messaging. Behind the noble trigger of kid safety, hides a large-scale liberticide threat, as solely the United States has the key.

According to the ZeroHedge web site, the legal professional common William Barr on the one hand, and the senator Lindsey Graham alternatively, each want prohibit full encryption from sender to recipient messages despatched through purposes comparable to WhatsApp, iCloud or Telegram.

"Although we use encryption to improve cybersecurity, we must ensure that we maintain the ability to legally access data and communications when necessary to respond to criminal activity. " William Barr

The drawback of making such again doorways, is that theyd contain a " grasp key " (or " golden key ") From decipherment. And who might guarantee us that this grasp key wont be used for dangerous actions, comparable to monitor conversations political dissidents, or leaders of huge overseas corporations? Not to say hackers who handle to get their fingers on it: it could give new that means to the expression "a treatment worse than the illness".

With the assist of senators Lindsey Graham and Richard Blumenthal, Barr needs to introduce a regulation known as EARN IT Act ".

Acronym for " An Act to get rid of extreme and common neglect of interactive applied sciences "(Just that!), It goals to make criminally accountable corporations in instances of kid abuse and exploitation, if these courier corporations dont transmit any proof associated to suspected customers.

A sneaky manner drive them to supply these well-known backdoors of their purposes (usable by all those that can have the gold key, whether or not theyre "good" or "bad"). And this might additionally, subsequently, additionally concern the case of nationwide safety pointsDo you see the wolf coming from afar?

In addition to the apparent threats to particular person freedoms, and the dangers of cybersecurity, such a regulation would even have implications eminently adverse for the cryptosphere.

Indeed, blockchain networks function on of the trade of worth and knowledge primarily based on encryption, carried out from begin to end.

Financial analyst Thomas Lee of Fundstrat, Explain in addition to :

"(If this bill) becomes reality, it would have a negative impact on cryptography and digital assets".

These needs for hypersurveillance, which all the time begin from "good intentions", additional scale back the freedoms and the safety of privateness of the overwhelming majority of harmless people. All that continues to be is to hope that this regulation which guarantees to be double-edged solely stays on the undertaking stage.

Continued here:
United States: a invoice towards end-to-end encryption? - Sahiwal Tv

Read More..

TLS 1.0/1.1 end-of-life countdown heads into the danger zone – The Daily Swig

Web admins have about one month to upgrade

Websites that support encryption protocols no higher than TLS 1.0 or 1.1 have only a few weeks to upgrade before major browsers start returning secure connection failed error pages.

Google, Apple, Microsoft, and Mozilla jointly agreed in October 2018 to deprecate the aging protocols by early 2020 a move likely to throttle the traffic flowing to laggard sites yet to upgrade to TLS 1.2 and above.

Mozilla will likely be first to jettison support for TLS 1.0 and 1.1 21 and 14 years old, respectively with the release of Firefox 74on March 10.

Google Chrome 81, slated for launch on March 17, will disable support too, while Apples next Safari update is expected to land, with support for older encryption suites removed, by the end of the month.

Microsoft is expected to remove support for the moribund protocols from Edge 82 in April and Internet Explorer at around the same time.

Webmasters have been notified about the upcoming switch, for instance by advice to migrate issued within developer tools in Firefox 68 and Chrome 72, which were launched last year.

In December, Firefox 71 arrived with support disabled in Nightly mode to uncover more sites that arent able to speak TLS 1.2.

SSL Pulses latest analysis of Alexas most popular websites, conducted in February, reveals that of nearly 140,000 websites, just 3.2% fail to support protocols higher than TLS 1.0, and less than 0.1% have a ceiling of TLS 1.1.

Some 71.7% support a maximum of TLS 1.2, while the remaining 25% support the latest version, TLS 1.3.

According to these figures, then, 3.3% of sites could soon be returning secure connection failed error pages to visiting surfers.

The Internet Engineering Task Force (IETF), the global guardian for internet standards, is formally deprecating both TLS 1.0 and 1.1.

The National Institute of Standards and Technology (NIST) says it is no longer practical to patch the protocols existing vulnerabilities, such as the POODLE and BEAST man-in-the-middle attacks.

The protocols neither support the latest cryptographic algorithms nor comply with todays PCI Data Security Standards (PCI DSS) for protecting payment data.

While TLS 1.3, launched in 2018, is now the gold standard, TLS 1.2 is PCI DSS-compliant and remains in good standing despite being more than a decade old.

Both TLS 1.2 and 1.3 are supported by all major browsers. Both support the latest cryptographic cipher suites and algorithms, remove mandatory, insecure SHA-1 and MD5 hash functions as part of peer authentication, and are resilient against downgrade-related attacks like LogJam and FREAK.

Michal paek, developer at Report URI and Password Storage Rating, urges webmasters to take action before it's too late.

If theyre unsure about their sites SSL configuration, he recommends using tools like SSL Labs Server Test and Mozilla Observatory.

If checks reveal that a websites fails to support at least TLS 1.2, how should webmasters proceed?

The short answer is to check with their vendors, paek told The Daily Swig. The slightly longer (and maybe better) answer is to run recent encryption libraries (like OpenSSL) and servers (like Apache or Nginx), all of which support TLS 1.2 and TLS 1.3 - and the latter might even be a one-line change in the supported protocols config option.

He added: You can also check what protocol is used to access the site in the browser devtools, Security tab.

In a recent blog post, security researcher Scott Helme points out that you don't necessarily have to remove support for these Legacy TLS versions, you simply have to make sure that you support at least TLSv1.2 for clients like Chrome/Firefox/Safari to be able to connect.

In a message addressed to developers in September 2019 Mozilla engineer Martin Thomson said: This is a potentially disruptive change, but we believe that this is good for the security and stability of the web, noting that the number of sites that will be affected is reducing steadily.

READ MORE Chrome SameSite cookie change expected to result in modest website breakage

Read this article:
TLS 1.0/1.1 end-of-life countdown heads into the danger zone - The Daily Swig

Read More..

WIPL enters into partnership with Plesk to offer fully integrated cloud hosting services in India – Web Hosting | Cloud Computing | Datacenter |…

WIPL, one of Asias fastest-growing cloud hosting companies headquartered in India, today announced that it has entered into an agreement with Plesk, the leading Server, Website and WordPress management platform, proven on servers, sites, apps, hosting and cloud businesses. With this deal, WIPL will empower its customers with high-quality, affordable Plesk powered hosting services.

In our quest to drive digital transformation, Plesk is delighted to have WIPL as a partner. We are certain that our platforms features and scalability will enable WIPL to deliver countless seamless customer experiences, said Nils Hueneke, Plesk CEO.

We are increasingly extending into adjacent areas. With the unique Plesk management platform, we will offer greater convenience to our customers with the ability to manage their web apps and technologies using a single and secure user interface in the most cost-appropriate setting, said Ravish Gupta, CEO, WIPL.

This partnership will be empowered by ZNet Technologies Pvt. Ltd. as ZNet is the distributor of Plesk licenses in India.

READ NEXT: Japans SBI Holdings Makes a $20m Strategic Investment in OpenLegacy

Follow this link:
WIPL enters into partnership with Plesk to offer fully integrated cloud hosting services in India - Web Hosting | Cloud Computing | Datacenter |...

Read More..

What Type of Server Provides the Highest ROI? – Techiexpert.com – TechiExpert.com

When was the last time you explored your hosting options to make sure you were getting the best service for your money? If its been a while, now may be a good time to revisit your companys web hosting plan.

For most businesses, there are two main types of hosting toconsider: cloud/shared hosting and dedicated hosting. Ultimately, the optionthat offers the best return on investment (ROI) is the one that meets yourbusinesss unique needs and specifications. By having a better understanding ofthe differences between cloud and dedicated hosting as well as the potentialadvantages and drawbacks of each you can make the most informed decision foryour company.

The main difference between cloud hosting and dedicatedhosting is how resources are allocated. With a cloud or shared hosting service,youre essentially paying for virtual server space that is shared with otherpaying users. For example, there may be several other business owners sharingyour cloud server and using it to run their websites; resources are drawn fromthat single server and allocated to each site as needs arise.

With dedicated hosting, on the other hand, you pay for yourown server that you do not have to share with any other users. Your dedicatedserver hardware is hosted in a data center, and you have complete access to allthe bandwidth, storage, and other included resources.

For most business owners, the price is the biggest advantageof choosing cloud hosting over dedicated hosting. Because youre sharing yourresources with other users, youre also sharing costs. This results in lowerprices that may be appealing, especially to small businesses or those ontighter budgets.

On the other hand, there are also some potential drawbacks to consider when it comes to cloud hosting. The biggest issue arises when traffic and bandwidth demands exceed the resources available by the cloud server itself. Often, this happens when one website on the hosting plan receives a sudden influx of traffic and thus requires more bandwidth. This can deplete resources for the other sites hosted on the same account, which may result in downtime, slow page-loading speeds, and other technical issues.

With a dedicated server, business owners never have to worryabout sharing their resources with other users. Instead, you can enjoy added peaceof mind knowing that you will always have access to the bandwidth, storage, andother resources youre paying for. Plus, because this hosting plan is dedicatedsolely to your business, you may also be able to avoid issues like downtime andslow speeds. The result is an improved user experience, which can reflect wellon your companys reputation.

As you can probably imagine, dedicated hosting comes at abit of a premium compared to cloud or shared hosting services. Depending on theprovider and plan you choose, you can expect to spend several times moreper-month on a dedicated hosting plan than you would on a cloud hosting plan. However, for many business owners, theadded security and reliability are more than worth the extra cost.

Ultimately, making smart business decisions often boils downto choosing services that provide the best return on investment for yourcompany. With this in mind, a dedicated server is the best choice for website,email, and other hosting needs. Yes, youll likely spend more each month on yourhosting services, but the ROI that a dedicated server can provide easilyjustifies the additional cost when compared to cloud hosting. Heres why:

When it comes to cybersecurity, a dedicated server is thesafest, most reliable option. This is because many of these hosting plans aredesigned with data protection in mind. The best dedicated servers come with avariety of security features, including DDoS protection, encryption options,and other security features that help reduce your risk of data breaches andother web-based attacks. You should have the ability to implement securitymeasures to your own standards, instead of relying on a cloud provider to do itfor you. And when you consider the financial toll a data breach can have on abusiness of any size, it becomes easier to see how spending a little more on adedicated hosting plan can pay off in the long run.

Because dedicated servers dont require you to shareresources with other users, you may also enjoy faster website speeds when youopt for this type of hosting plan. Think about the last time you encountered awebsite with slow page-loading times or other lag factors; theres a goodchance you became frustrated and left the site altogether. The same thing couldhappen with your sites visitors if youre using a cloud or shared hostingplan.

With a dedicated server, you can cut down on page-loadingspeeds and improve your users overall experience. This can result in a betterreputation for your business, which may have a direct impact on your bottomline.

How much would your business suffer if your company websiteor email went down for even a few hours? More than likely, this kind of eventwould be disastrous for both your bottom line and reputation. Unexpected serverdowntime is not something that most businesses can easily afford and with acloud hosting plan, you could be putting your company at risk.

Dedicated servers allow a high level of control and more direct contactwith the data center or host. Therefore, if you have an issue, it can beresolved to your satisfaction. On a cloud hosting account, you dont have thatkind of choice for equipment replacements or upgrading DDoS protection. With adedicated server, you can also expect around-the-clock technical support to getyou back online as soon as possible.

Some services are worth paying a little more for, anddedicated hosting is one of them, especially if youre a business owner. With adedicated hosting plan, your company can enjoy greater security, faster speeds,and improved reliability. And with an excellent web host in your corner, thesky is the limit for your growing business.

Read the rest here:
What Type of Server Provides the Highest ROI? - Techiexpert.com - TechiExpert.com

Read More..