Page 3,916«..1020..3,9153,9163,9173,918..3,9303,940..»

Options to End the End to End Encryption Debate – Infosecurity Magazine

Its a long-simmering disagreement that shows no sign of reaching a conclusion: law enforcement wants access to encrypted devices and messaging apps to fight crime. Tech companies say any system that allows for lawful access would instantly be attacked and put legitimate users in danger.

The latest spat between the FBI and Apple was over the locked devices of Mohammed Saeed Alshamrani, who was suspected of killing three people and injuring eight in a shooting spree on a Navy base in Pensacola, Florida on December 6, may have escalated the conflict, but it's unlikely to break the deadlock.

While the debate has been framed as a battle between privacy and security, the reason for the stalemate is that the conversation between law enforcement and tech firms has largely focused on one solution. With tech firms moving to stronger security and end-to-end encryption across messaging apps, the US Justice Department along with the UK and Australia - has asked companies to create a key or backdoor into the design of their products that would allow law enforcement to unlock the phones of criminal suspects and access data a move that Facebook says is impossible without weakening the strength of its encryption.

Surprisingly little thought, however, has been given to alternative ways of handling the challenge of thwarting criminals who hide behind encryption, while also preserving the privacy of legitimate users. So what are the alternatives, and is there a possibility that both sides could agree a middle ground?

Facebook has offered its own solution. Anxious to avoida scenario where unbreakable encryption would effectively become illegal,Facebook says it should still be able to provide some critical location and account information.

This is because end-to-end encryption hides all content, but not all metadata of the conversation taking place.We are building tools to look for signals and patterns of suspicious activity so that we can stop abusers from reaching potential victims, Facebooks Jay Sullivan told the Judiciary Committee last month.

The big fear, however, is that 12 million referrals of child sexual abuse - currently flagged by tech giants - would be lost annually if Facebook implements its plans. Stronger encryption would limit the chances of identifying the abusers and rescuing the victims.

Then there is the argument that Facebook cannot be trusted, with critics pointing to numerous security breaches and the mass collection of users personal data for financial gain.

Anotheroption, put forward by the Carnegie Endowment for International Peace in a new paper calledMoving the Encryption Policy Conversation Forward, attempts to find some middle ground by separating data at rest and data in motion. It would prevent police from being able to carry out live surveillance of discussions that are in progress, but allow them with a court-ordered search warrant to see data at rest on mobile phones.This would include photos and messages that are already held on suspects mobile phones, laptops and in cloud storage.

Exploring mobile phone data at rest seems to be an area most likely to kick start the debate.New York County District Attorney Cyrus Vance is among supporters of this approach and wants federal legislative action to push it through.His frustration stems from Apples refusal to provide access to the phone of the San Bernardino shooter following the 2015 massacre.

Even so,many in the computer security community are skeptical, and the approach rigorous testing and debate to see if its viable.

A third option isnt so much a backdoor, more an emergency entrance. Here the government, the tech company and a neutral third party, such as a court, would each keep a fragment of a cryptographic key. Authorities would get sanctioned and pre-agreed access to messaging data a bit like a bank safe deposit box which can only be opened if the bank and the customer are present.

According to Andersen Cheng, CEO of Post-Quantum, this scenario option would significantly limit the ability of rogue actors to get access because it means no one authority has a master key to unlock millions of accounts. Any concerns over government control can be allayed because the key management could be hosted by the social media companies, he says.

The only problem and its a big one - is that no one appears to have any idea how to create such a thing at scale that will remain secret. Tech companies are likely to rail against any technical steps that would fundamentally weaken communications.

Then, theres the current solution. Each year,US police districts give millions of dollars to third-party commercial developers to access data saved to the cloud. As we know from recent scandals, undetectable spyware exploits vulnerabilities in software, allowing the buyer to access a device to read texts, pilfer address books, remotely switch on microphones and track the location of their target. There is no shortage of commercial surveillance companies that offer these services, and police reportedly used similar tools to access the phone of the San Bernardino shooter when Apple wouldnt help.

This kind of technology is playing an increasing part in helping government agencies all over the world prevent and investigate terrorism and crime and save lives: almost 50% of police investigations now involve cloud data.

Controversial Israeli firm NSO Group was involved in the capture notorious drug lord El Chapo, and recently police in Western Europe said that NSO spyware was helping them track a terror suspect they feared was plotting an attack during Christmas.

Despite this, encrypted devices and messaging platforms continue to complicate crime investigations, not least becausecritical evidence is often only available on the device itself, not in the cloud. The tools provided by commercial companies can also be expensive, with police claiming that justice is sometimes unattainable for crime victims in areas where police departments do not have the means to decrypt phones.

Campaigners also point to potential abuses and a lack of transparency over new forms of surveillance being used, and a more widespread adoption of this approach will mean that governments will have to impose careful controls to prevent misuse and enforce oversight.

Whatever the solution to the current debate over encryption, its unlikely to perfectly suit everyone. As the Carnegie Endowment report points out,cybersecurity advocates may have to accept some level of increased security risk, just as law enforcement advocates may not be able to access all the data they seek.

The first step, however, is recognizing that, with the lives and safety of so many at stake, lawmakers and tech firms should investigate every option.

Read the original post:
Options to End the End to End Encryption Debate - Infosecurity Magazine

Read More..

Remember the Clipper chip? NSA’s botched backdoor-for-Feds from 1993 still influences today’s encryption debates – The Register

Enigma More than a quarter century after its introduction, the failed rollout of hardware deliberately backdoored by the NSA is still having an impact on the modern encryption debate.

Known as Clipper, the encryption chipset developed and championed by the US government only lasted a few years, from 1993 to 1996. However, the project remains a cautionary tale for security professionals and some policy-makers. In the latter case, however, the lessons appear to have been forgotten, Matt Blaze, McDevitt Professor of Computer Science and Law at Georgetown University in the US, told the USENIX Enigma security conference today in San Francisco.

In short, Clipper was an effort by the NSA to create a secure encryption system, aimed at telephones and other gear, that could be cracked by investigators if needed. It boiled down to a microchip that contained an 80-bit key burned in during fabrication, with a copy of the key held in escrow for g-men to use with proper clearance. Thus, any data encrypted by the chip could be decrypted as needed by the government. The Diffie-Hellman key exchange algorithm was used to exchange data securely between devices.

Any key escrow mechanism is going to be designed from the same position of ignorance that Clipper was designed with in the 1990s

Not surprisingly, the project met stiff resistance from security and privacy advocates who, even in the early days of the worldwide web, saw the massive risk posed by the chipset: for one thing, if someone outside the US government was able to get hold of the keys or deduce them, Clipper-secured devices would be vulnerable to eavesdropping. The implementation was also buggy and lacking. Some of the people on the Clipper team were so alarmed they secretly briefed opponents of the project, alerting them to insecurities in the design, The Register understands.

Blaze, meanwhile, recounted how Clipper was doomed from the start, in part because of a hardware-based approach that was expensive and inconvenient to implement, and because technical vulnerabilities in the encryption and escrow method would be difficult to fix. Each chip cost about $30 when programmed, we note, and the relatively short keys could be broken by future computers.

In the years following Clipper's unveiling, a period dubbed the "first crypto wars," Blaze said, the chipset was snubbed and faded into obscurity while software-based encryption rose and led to the loosening of government restrictions on its sale and use. It helped that Blaze revealed in 1994 a major vulnerability [PDF] in the design of Clipper's escrow design, sealing its fate.

It is important to note, said Blaze, that the pace of innovation and unpredictability of how technologies will develop makes it incredibly difficult to legislate an approach to encryption and backdoors. In other words, security mechanisms made mandatory today, such as another escrow system, could be broken within a few years, by force or by exploiting flaws, leading to disaster.

This unpredictability in technological development, said Blaze, thus undercuts the entire concept of backdoors and key escrow. The FBI and Trump administration (and the Obama one before that) pushed hard for such a system but need to learn the lessons of history, Blaze opined.

"The FBI is the only organization on Earth complaining that computer security is too good," the Georgetown prof quipped.

"Any key escrow mechanism is going to be designed from the same position of ignorance that Clipper was designed with in the 1990s. We are going to be looking back at those engineering decisions ten years from now as being equally laughably wrong."

Daniel Weitzner, founding director of the MIT Internet Policy Research Initiative, said this problem is not lost on all governments trying to work out new encryption laws and policies in the 21st century. He sees a number of administrations trying to address the issue by bringing developers and telcos in on the process.

"What the legislators hear is a complicated problem that they don't know how to resolve," Weitzner noted. "Moving the debate to experts on one hand gets you down to details, but it is not necessarily easy."

Sponsored: Detecting cyber attacks as a small to medium business

View original post here:
Remember the Clipper chip? NSA's botched backdoor-for-Feds from 1993 still influences today's encryption debates - The Register

Read More..

Why Public Wi-Fi is a Lot Safer Than You Think – EFF

If you follow security on the Internet, you may have seen articles warning you to beware of public Wi-Fi networks" in cafes, airports, hotels, and other public places. But now, due to the widespread deployment of HTTPS encryption on most popular websites, advice to avoid public Wi-Fi is mostly out of date and applicable to a lot fewer people than it once was.

The advice stems from the early days of the Internet, when most communication was not encrypted. At that time, if someone could snoop on your network communicationsfor instance by sniffing packets from unencrypted Wi-Fi or by being the NSAthey could read your email. They could also steal your passwords or your login cookies and impersonate you on your favorite sites. This was widely accepted as a risk of using the Internet. Sites that used HTTPS on all pages were safe, but such sites were vanishingly rare.However, starting in 2010 that all changed. Eric Butler released Firesheep, an easy-to-use demonstration of sniffing insecure HTTP to take over peoples accounts. Site owners started to take note and realized they needed to implement HTTPS (the more secure, encrypted version of HTTP) for every page on their site. The timing was good: earlier that year, Google had turned on HTTPS by default for all Gmail users and reported that the costs to do so were quite low. Hardware and software had advanced to the point where encrypting web browsing was easy and cheap.

However, practical deployment of HTTPS across the whole web took a long time. One big obstacle was the difficulty for webmasters and site administrators of buying and installing a certificate (a small file required in order to set up HTTPS). EFF helped launch Lets Encrypt, which makes certificates available for free, and we wrote Certbot, the easiest way to get a free certificate from Lets Encrypt and install it.

Meanwhile, lots of site owners were changing their software and HTML in order to make the switch to HTTPS. Theres been tremendous progress, and now 92% of web page loads from the United States use HTTPS. In other countries the percentage is somewhat lower80% in India, for examplebut HTTPS still protects the large majority of pages visited. Sites with logins or sensitive data have been among the first to upgrade, so the vast majority of commercial, social networking, and other popular websites are now protected with HTTPS.

There are still a few small information leaks: HTTPS protects the content of your communications, but not the metadata. So when you visit HTTPS sites, anyone along the communication pathfrom your ISP to the Internet backbone provider to the sites hosting providercan see their domain names (e.g. wikipedia.org) and when you visit them. But these parties cant see the pages you visit on those sites (e.g. wikipedia.org/controversial-topic), your login name, or messages you send. They can see the sizes of pages you visit and the sizes of files you download or upload. When you use a public Wi-Fi network, people within range of it could choose to listen in. Theyd be able to see that metadata, just as your ISP could see when you browse at home. If this is an acceptable risk for you, then you shouldnt worry about using public Wi-Fi.

Similarly, if there is software with known security bugs on your computer or phone, and those bugs are specifically exploitable only on the local network, you might be at somewhat increased risk. The best defense is to always keep your software up-to-date so it has the latest bug fixes.

What about the risk of governments scooping up signals from open public Wi-Fi that has no password? Governments that surveill people on the Internet often do it by listening in on upstream data, at the core routers of broadband providers and mobile phone companies. If thats the case, it means the same information is commonly visible to the government whether they sniff it from the air or from the wires.

In general, using public Wi-Fi is a lot safer than it was in the early days of the Internet. With the widespread adoption of HTTPS, most major websites will be protected by the same encryption regardless of how you connect to them.

There are plenty of things in life to worry about. You can cross public Wi-Fi off your list.

Read the original here:
Why Public Wi-Fi is a Lot Safer Than You Think - EFF

Read More..

There is no legislation mandating encryption of private information – Kamloops This Week

While the fallout from the LifeLabs privacy breach continues to reverberate in the form of proposed class action lawsuits and patients still trying to determine if their personal medical information was accessed, the Office of the Information and Privacy Commissioner of B.C. has confirmed there is no legislation that mandates private information held by a company be encrypted.

Neither the Freedom of Information and Protection of Personal Information Act (FIPPA), which applies to public bodies, nor the Personal Information Protection Act, (PIPA), which applies to private organizations, specifically mention encryption, the office confirmed in an email response to a query from KTW.

Personal information of up to 15-million LifeLabs patients, primarily in B.C. and Ontario, may have been accessed during a cyberattack on the companys computer systems in October. LifeLabs reported it to authorities on Nov. 1, but the breach was not made public until mid-December.

LifeLabs said it retained outside cybersecurity consultants to investigate and assist with restoring the security of its data.

While LifeLabs states on its website that its patient information is encrypted, company CEO Charles Brown told the CBCs Early Edition on Dec. 18 that he did not know if the information hacked was, indeed, encrypted.

Here is the text that can be found on the Life Labs website: Our security practices are designed to protect your personal information and prevent unauthorized access. Only authorized employees are permitted to access personal information and only when the access is necessary. Your information is protected using industry best practices, and all information is transmitted over secure, encrypted channels.

Section 30 of the Freedom of Information and Protection of Personal Information Act states: A public body must protect personal information in its custody or under its control by making reasonable security arrangements against such risks as unauthorized access, collection, use, disclosure or disposal.

Section S.34 of the Personal Information Protection Act states: An organization must protect personal information in its custody or under its control by making reasonable security arrangements to prevent unauthorized access, collection, use, disclosure, copying, modification or disposal or similar risks.

Noel Boivin, senior communications officer for the Office of the Information and Privacy Commissioner of B.C., said the department has the authority to issue legally binding orders to ensure organizations comply with those requirements.

Decisions such as these are made based on the unique facts of each case, Boivin said. Based on these requirements in both pieces of legislation, our office recommends encryption as a best practice.

The Office of the Information and Privacy Commissioner recommends organizations implement technical safeguards, including ensuring computers and networks are secure from intrusion by using firewalls, intrusion-detection software and antivirus software and by encrypting personal information.

Boivin noted findings from previous investigation reports call for organizations to encrypt data on personal storage devices.

Our guidance is that personal information should be encrypted in transit and at rest in order to protect against unauthorized access, said Caitlin Lemiski, the Office of the Information and Privacy Commissioner's director of policy. The encryption, and key management, should be based on current industry-accepted standards for protecting data and should be reviewed regularly.

LifeLabs has four clinics in Kamloops two downtown, one in Aberdeen and one in North Kamloops.

According to the company, hackers gained access to the computer system that held customer information from 2016 and earlier that could include names, addresses, email addresses, login user names and passwords, dates of birth, health card numbers and lab test results. The access was accompanied by a ransom demand, which LifeLabs paid.

LifeLabs set up a dedicated phone line and information on its website for those affected by the breach. To find out more, the public should go online tocustomernotice.lifelabs.comor contact LifeLabs at 1-888-918-0467.

In January 2013, patient information for 16,100 Kamloops-area residents was on a computer hard drive that went missing as it was being transferred by LifeLabs to Burnaby from Kamloops.

See the rest here:
There is no legislation mandating encryption of private information - Kamloops This Week

Read More..

Apple Watch rewards, iCloud encryption, and WhatsApp hacks on the AppleInsider Podcast – AppleInsider

Feature

By Lester Victor MarksFriday, January 24, 2020, 05:49 am PT (08:49 am ET)

AppleInsider editor Victor Marks and writer William Gallagher discuss:

We like reader email send us your comments and concerns!

The show is available on iTunes and your favorite podcast apps by searching for "AppleInsider." Click here to listen, subscribe, and don't forget to rate our show.

Listen to the embedded SoundCloud feed below:

Sponsors:

Masterclass - Get unlimited access to EVERY MasterClass, and as an AppleInsider listener, you get 15% off the Annual All-Access Pass! Go to masterclass.com/appleinsider.

CLEAR is the absolute best way to get through airport security. It works great with Pre-Check too! Right now, listeners of our show can get their first two months of CLEAR for FREE. Go to clearme.com/appleinsider and use code appleinsider.

Show notes:

Follow our hosts on Twitter: @vmarks and @wgallagher

Feedback and comments are always appreciated. Please contact the AppleInsider podcast at [emailprotected] and follow us on Twitter @appleinsider, plus Facebook and Instagram.

Those interested in sponsoring the show can reach out to us at [emailprotected].

See the rest here:
Apple Watch rewards, iCloud encryption, and WhatsApp hacks on the AppleInsider Podcast - AppleInsider

Read More..

eScan Internet Security Suite – Download

eScan Internet Security Suite is a home security center, designed to protect your PC from all kinds of internet attacks.

Viruses, spyware, adware, keyloggers and hacks: all of these PC threats are what eScan Internet Security Suite searches out and alerts you of every time you run a scan. It offers a high level of protection, which has both advantages and disadvantages.

Once installed, eScan Internet Security Suite has an easy to understand interface that is clear and simple to navigate. There is a protection section, where the file and mail antivirus tools are located, along with antispam, web protection, firewall tools and more. Unfortunately, the process just to install the program tends to be arduous, requiring a restart and often interacting negatively with any other antivirus or computer scanning programs already on your computer.

eScan Internet Security Suite's scan section allows you to search your various drives for viruses and other threats. There is also a tool button that includes system information, restore and a button to download a program called "Hotfix." This is actually a download button that updates eScan Internet Security Suite, if necessary. In fact, it's actually a little unnecessary, as there is another update button on the interface too.

On our system, we encountered problems with the eScan firewall, which were eventually fixed but an irritation. It appears the eScan firewall software is too strong! Otherwise, eScan Internet Security Suite is a very average security app. It doesn't do anything not offered by competing apps, and is quite heavy on system resources. For slower computers, eScan Internet Security Suite also has a tendency to freeze up or crash from time to time.

eScan Internet Security Suite is a comprehensive application that will keep your PC clean and safe.

More here:
eScan Internet Security Suite - Download

Read More..

Internet Security

Some people may say it is overkill but I always switch and move my Bitcoin around. When I buy Bitcoin I usually do it in a lump sum. A littler more or less than $1000 is the usual amount I try to buy as regular as possible. I know I will eventually need it and over the years I am in the green with buying and holding. I am a cost average buyer and holder.

At any one time I always have a lot of wallets to split up my Bitcoin. When I get Bitcoin I always like to take the step to anonymize it. The first thing I do is send some money to an exchange. I always leave my money wherever I send it at least a day. After I move it I will send it to another wallet. What you want to send though is not the exact same amount. Time to start breaking it up. Then you get the Bitcoin exchanged to Monero. After that I send it to another Monero wallet to make sure the path is killed and nobody can track it anymore.

Being safe and moving the coin around isn't a bad thing. Moving it between a few bigger wallets like exchanges or casinos before eventually sending. You can stitch up the routes and do Monero after before or the middle. I like to use a different altcoin one in a while too. Just mix up the coins yourself by selling and exchanging them to different websites and wallets.

You should just remember and mark which wallet is which from the name. Always have a few end wallets for the larger amounts to store them but don't put it all together in the same one. It ends up with a lot of entry and exit wallets with burners in between for one or a few time use. There is no way possible to track and say it is still your coins after that.

You can say it is over kill and you lose some money in fees but for me you don't need to be some big time drug dealer to be paranoid. I am buying drugs and also avoiding taxes with my coin. Why should anyone know what I own. That is my business and nobody else's.

See original here:
Internet Security

Read More..

Best malware removal software of 2020: free and paid anti-malware tools and services – TechRadar

Unless you're already running the best antivirus software then there's always the danger of getting a malware infection.

It doesn't matter whether you're using a PC, Mac, Android phone, or even an iPhone - a vulnerability in your browser and/or or its plugins can serve as an attack root for malware into other parts of your system, even if those parts are not normally vulnerable to attack.

While using a Virtual Private Network (VPN) can help reduce the chances of malware infection, ultimately it is up to you as an internet user to ensure your device or machine - whatever it is - is already secured against a wide range of different malware attacks.

Luckily there are a lot of different vendors out there who can provide the security you need to defend against malware, and even better many of these provide both free and paid-for versions of their anti-malware software.

While the free versions will get the job done, paid versions offer more options for protection and are often worth the nominal fee that they cost. General internet security suites will commonly not just provide a shield against viruses and other malware but will also have malware removal options available in the event of an infection.

Here we'll list the best of both, starting with the best overall paid-for security suites for malware protection, even if a free version is also available - then we'll list the best free anti-malware software if you just want something to get by with.

Jump straight to:

The best malware removal software available right now is: Malwarebytes PremiumIf you're suffering from a malware infection and free software isn't getting the job done, Malwarebytes Premium could be the silver bullet you need. It uses heuristic analysis to identify new strains of malware, cleans up existing infections, helps protect you from phishing scams, and helps stop you downloading further malicious software in the future, including ransomware.

The most effective free malware remover, with deep scans and daily updates

Established solution

Deals with all malware

Deep scanning

If you suspect a malware infection, Malwarebytes Anti-Malware should be your first port of call. Its updated daily, so you can trust it to identify and remove new threats the minute they appear.

The first time you install Malwarebytes Anti-Malware, youre given a 14-day trial of the premium edition, which includes preventative tools like real-time scanning and specific protection from ransomware. After two weeks, it reverts to the basic free version. This has to be activated manually, but is still a top-notch security tool. We recommend running it at least once a week to check or any nasties that you haven't noticed, or if you notice that your web browser has suddenly started acting strangely (likely a result of adware).

Last year, Malwarebytes bought Adwcleaner, which as its name suggests targets and removes annoying programs that hijack your browser by changing your homepage, resetting your default search engine, or adding unwanted toolbars. Its also available free, and along with Anti-Malware, is a great addition to your security toolkit.

Anti-malware protection and removal

Anti-virus and anti-malware

Excellent detection rates

Worthwhile upgrades

Advertising prompts

Avast offers one of the most competent internet protection suites out there. While the company is famous for providing free anti-virus software, it's worth noting that this now comes bundled with an anti-malware feature that uses behavioral monitoring to spot rogue programs.

What's even better is that not only are Avast's basic products free, but they are also available for mobile devices as well as for desktops, which makes Avast a particular ideal choice if you have multiple devices you need to check.

While the basic Avast service is second-to-none, the company also provides paid-for anti-malware software that takes this things, such as fine-tuning your PC to run better, to anti-ransomware software and secure file shredding.

For business users, there are paid-for internet security options to cover a range of needs and options.

For home users, though, the Avast free anti-virus should keep your PC very well protected, though do note you'll be periodically prompted to update for one of Avast's other services.

Solid malware protection for beginners and experts alike

One of the best performing security packages

Supremely easy to use

Kaspersky's full suites are better value

Kaspersky Anti-Virus is a stripped-back security package that focuses on the core security essentials: its web filtering blocks dangerous URLs, an accurate engine detects and removes threats, smart monitoring technologies track and reverse malicious actions, and that's pretty much it.

Fortunately, what you do get works well. Incredibly well. We've consistently found Kaspersky to be one of the best at blocking malware, and removing it from an infected system. Thats without mentioning that this anti-virus tool has regularly received top marks at sites like AV-Comparatives.

The program is easy to use, as well. An impeccably-designed interface has just the right number of buttons and options not too basic, but not complicated or intimidating either and there are plenty of on-screen instructions to explain how everything works. Even a beginner will be at home right away.

Standout features include automatic scans, drive-by cryptomining infection prevention, and simplified security management.

If you just need accurate, reliable and consistent malware protection, Kaspersky Anti-Virus will serve you well.

Very user-friendly

Good value

Prone to false positives

F-Secure Antivirus SAFE is a great collection of antivirus tools, and while it's a bit pricier than some of the other antivirus software on this best of list, the number of features you get certainly makes that high price tag worthwhile.

With F-Secure Antivirus SAFE, you get the brilliant antivirus software from F-Secure, alongside banking protection for safe online shopping, family safety tools and a device finder that lets you track your lost Android or iOS device, and if needs be, remotely lock or delete it as well.

The package typically receives maximum marks for protection from AV-Test, and generally scores highly with AV-Comparatives. They also say it can generate significantly more false positives than most of the competition, but how that affects you will vary depending on how you use your computer.

The interface is a major advantage, as it's extremely easy to use, lightweight, and for the most part, you can just leave the app to work alone looking after your PC. The program has minimal effect on your system performance, and if you do need to intervene, you can generally solve any issues in a couple of clicks.

Available for Windows, Mac, and Android, F-Secure Anti-Virus SAFE remains an appealing package: fast, lightweight, and able to run alongside many other security tools without conflict. Standout features include banking protection, Family Rules, and ransomware protection.

Strong malware protection software

Affordable pricing

Easy to use

Strong protection

Might slow you down

Sightly limiting options

Trend Micro Antivirus+ Security is a very capable package that's easy to use with above average anti-spam and an effective Folder Shield module to block ransomware. And, it seems to get better as time goes on.

How good is it exactly? The top testing labs all rate it highly for protection, even though theres a bit of disagreement on the details. In particular, AV-Comparatives says it gives a high number of false positives, which could be a real nuisance. On the other hand, AV-Test reports high levels of accuracy and no issues with false positives at all.

If there's a problem here, it's likely to be performance impact. PassMark's March 2019 Performance report assessed 14 security products on various performance-related benchmarks, and Trend Micro came towards the bottom part of the list.

Our experiences with the product are a little more reassuring: protection levels look similar to Bitdefender, false positives are only marginally higher, and the system itself doesn't slow down our system noticeably more than anything else.

Standout features include ransomware protection, advanced AI learning, email scam safeguarding, and Pay Guard.

We'd recommend running the trial for its full 30 days before you buy, then, to see if you notice any problems. But if you're unaffected, its high levels of detection and excellent bonus features make Trend Micro a good choice.

Best free anti-malware for your PC

User-friendly

Clean and simple interface

No options or settings

Bitdefender Antivirus Free Edition is the strong, silent type. This anti-malware software doesn't even ask questions when you install it it just quietly gets on with the job of identifying and eliminating anything that poses a risk to your safety and security.

It watches out for apps behaving badly, scans links on the web to identify scams, and has proactive malware and spyware scanning that can detect threats nobody has encountered before. Plus the app boasts boot scanning every time you start your PC.

Ad-free, nag-free and hassle-free, Bitdefender Antivirus Free Edition is a great product that runs quickly and silently while you get on with something more interesting.

Its comprehensive suite of tools to protect your PC makes Bitdefender the best free anti-malware software you can download today. It's all the protection you need in one handy package.

Powerful protection against malware

Software updater

PC optimizer

VPN Included

Free

No anti-ransomware

The Avira Free Security Suite provides one of the most comprehensive free security packages available on the internet.

As well as providing the standard anti-virus protection, the Avira Free security suite also provides a software updater, as well as scanning your network for vulnerabilities and helps you fix them.

There are also safe browsing and safe shopping options, as well as a system optimizer to speed up your PC which is normally charged for in other packages.

If that's not enough there's also a free VPN included for up to 500MB per month, as well as a password manager and privacy settings manager.

However, you actually have a choice of which features you want to install. This is a great plus as while the Avira suite is generous some users may want to run one or more features through a different suite.

There is an upgrade option, of course, but this is priced toward installation across 5, or 25 devices, and involves such features such as removing the VPN limit.

If there's one negative, it's that there's no anti-ransomware protection, but aside from that the Avira Free Security Suite is a very generous package indeed.

Another good defense against malware

Quite configurable

Great track record of malware protection

Scans can be rather slow

Not the best phishing protection

If you're looking for anti-malware software that keeps quiet and won't disturb your work, be warned AVG Antivirus Free is quite vocal with its notifications, and irks us from time to time with pop-ups telling us we've done something fantastic with regard to our online safety.

As an anti-malware app, though, it's very good. The dashboard is user-friendly, there's protection not just from downloadable threats, but from dodgy links too, and you can use your mobile to scan your PC remotely, which is pretty clever.

The paid-for Pro model has more security options - it has more robust download protection, offers data encryption includes a firewall - but the free version offers decent protection for most PC users.

An established tool against malware infection

Easy to use

Immunization tools

Limited information about threats

SpyBot Search & Destroy is a veteran of the malware wars, dating back to the first adware in 2000, and while it doesn't scan for viruses that's in the Home version, which is $13.99 (about 10, AU$20) the free software does a decent job of finding and fixing adware, malware and spyware.

See more here:
Best malware removal software of 2020: free and paid anti-malware tools and services - TechRadar

Read More..

IoT security: Your smart devices must have these three features to be secure – ZDNet

All Internet of Things and consumer smart devices will need to adhere to specific security requirements, under new government proposals.

The aim of the legislation is to help protect UK citizens and businesses from the threats posed by cyber criminals increasingly targeting Internet of Thingsdevices.

By hacking IoT devices, cyber criminals can build an army of devices that can be used to conduct DDoS attacks to take down online services, while poorly-secured IoT devices can also serve as an easy way for hackers to get into networks and other systems across a network.

SEE:A winning strategy for cybersecurity(ZDNet special report) |Download the report as a PDF(TechRepublic)

The proposed measures from the Department for Culture, Media and Sport (DCMS) have been developed in conjunction with the UK's National Cyber Security Centre (NCSC) and come following a consultation period with information security experts, product manufacturers and retailers and others.

"Our new law will hold firms manufacturing and selling internet-connected devices to account and stop hackers threatening people's privacy and safety," said Matt Warman, minister for digital and broadband at DCMS.

They also follow on from the previously suggested voluntary best practice requirements, but the legislation would require that IoT devices sold in the UK must follow three particular rules to be allowed to sell products in the UK. They are:

It is currently unclear how these rules will be enforced under any future law. While the government has said that its "ambition" is to introduce legislation in this area, and said this would be done "as soon as possible", there is no detail on when this would take place. A DCMS spokesperson told ZDNet that the department will be working with retailers and manufacturers as the proposals move forward.

Many connected devices are shipped with simple, default passwords that in many cases can't be changed, while some IoT product manufacturers often lack a means of being contacted to report vulnerabilities especially if that device is produced on the other side of the world.

In addition to this, it's been known for IoT products to suddenly stop receiving support from manufacturers, and providing an exact length of time that devices will be supported will allow users to think about how secure the product will be in the long term.

If products don't follow these rules, the new law proposes that these devices could potentially be banned from sale in the UK.

"Whilst the UK Government has previously encouraged industry to adopt a voluntary approach, it is now clear that decisive action is needed to ensure that strong cybersecurity is built into these products by design," said Warman.

SEE: AI and disinformation join nukes in the race for armageddon

"Our new law will hold firms manufacturing and selling internet-connected devices to account and stop hackers threatening people's privacy and safety. It will mean robust security standards are built in from the design stage and not bolted on as an afterthought," he added.

"Smart technology is increasingly central to the way we live our lives, so the development of this legislation to ensure that we are better protected is hugely welcomed," said Nicola Hudson, policy and communications director at the NCSC.

"It will give shoppers increased peace of mind that the technology they are bringing into their homes is safe, and that issues such as pre-set passwords and sudden discontinuation of security updates are a thing of the past."

The UK isn't alone in attempting to secure the Internet of Things -- ENISA, the European Union's cybersecurity agency,is also working towards legislationin this area, whilethe US government is also looking to regulate IoT in an effort to protect against cyberattacks.

Visit link:
IoT security: Your smart devices must have these three features to be secure - ZDNet

Read More..

Government to strengthen security of internet-connected products – SecurityNewsDesk

Anew lawwill protect millions of users of internet-connected household items from the threat of cyber hacks, Digital Minister Matt Warman announced recently.

The plans, drawn up by the Department for Digital, Culture, Media and Sport (DCMS), will make sure all consumer smart devices sold in the UK adhere to the three rigorous security requirements for the Internet of Things (IoT).

These are:

The sale of connected devices is on the rise. Research suggests there will be 75 billion internet connected devices, such as televisions, cameras, home assistants and their associated services, in homes around the world by the end of 2025.

Digital Minister Matt Warman said: We want to make the UK the safest place to be online with pro-innovation regulation that breeds confidence in modern technology.

Our new law will hold firms manufacturing and selling internet-connected devices to account and stop hackers threatening peoples privacy and safety. It will mean robust security standards are built in from the design stage and not bolted on as an afterthought.

The measures were developed in conjunction with the business industry and the National Cyber Security Centre and set a new standard for best practice requirements for companies that manufacture and sell consumer smart devices or products.

Following on from the consultation, Governments ambition is to further develop legislation that effectively protects consumers, is implementable by industry and supports the long-term growth of the IoT. Government aims to deliver this legislation as soon as possible.

Nicola Hudson, Policy and Communications Director at the NCSC, said: Smart technology is increasingly central to the way we live our lives, so the development of this legislation to ensure that we are better protected is hugely welcomed.

It will give shoppers increased peace of mind that the technology they are bringing into their homes is safe, and that issues such as pre-set passwords and sudden discontinuation of security updates are a thing of the past.

This follows the governments voluntary Secure by Design Code of Practice for consumer IoT security launched in 2018. The Code advocates for stronger cyber security measures to be built into smart products at the design stage, and has already been backed by Centrica Hive, HP Inc Geo and more recently Panasonic.

The Government is working with international partners to ensure that the guidelines drive a consistent, global approach to IoT security. This includes a partnership with standards bodies. In February 2019 ETSI, a global standards organisation published the first globally-applicable industry standard on consumer IoT security, which is based on the UK Governments Code of Practice.

Matthew Evans, director of markets, techUK said: Consumer IoT devices can deliver real benefits to individuals and society but techUKs research shows that concerns over poor security practices act as a significant barrier to their take-up. techUK is therefore supportive of the Governments commitment to legislate for cyber security to be built into consumer IoT products from the design stage.

techUK has been working on these three principles for the past four years. We support the work to ensure that they are consistent and are influencing international standards.

We look forward to working closely with Government and industry to ensure the implementation of the legislation provides protection for consumers whilst continuing to promote innovation within the IoT sector.

John Moor, Managing Director, IoT Security Foundation said: Over the past five years, there has been a great deal of concern expressed toward vulnerable consumers and inadequate cybersecurity protection. Understanding the complex nature of IoT security and determining the minimum requirements has been a challenge, yet, after a thorough and robust consultation, those baseline requirements have now been universally agreed.

The IoT Security Foundation welcomes the results of the consultation as it not only provides clarity for industry, it is great news for consumers and bad news for hackers.

For more security news visit here.

Visit link:
Government to strengthen security of internet-connected products - SecurityNewsDesk

Read More..