Page 4,053«..1020..4,0524,0534,0544,055..4,0604,070..»

Larry, Sergey, and the Mixed Legacy of Google-Turned-Alphabet – WIRED

On August 10, 2015, Google CEO Larry Page shocked the business world by announcing he was restructuring the company he cofounded into a holding company called Alphabet. Page would head the new entity, and Google itself would be one of a number of companies under Alphabets controllike Google X, Google Fiber, Google Ventures, and Nesteach with a separate CEO reporting to him. The idea was to make The Company Formerly Known As Google more clean and accountable.

Now Page and Brin are gone, kind of. In a letter they released on Tuesday, they explained that while they will continue to advise and stay on the board, they are removing themselves from day to day responsibilities. Thats an interesting claim, because the Alphabet structure had freed them of a lot of those responsibilities already, allowing them to pursue the bigger, moonshot-y ideas they preferred to corporate wranglings. Brin embedded himself in X, Alphabets long-range research division. Page also pursued his passions, while doing a disappearing act that didnt live up to the more accountable part of the bargain. He gave no press interviews, stopped participating in earnings calls, and didnt even go to the last shareholders meeting.

Now Sundar Pichai, while still running Google, will add CEO of Alphabet to his chores, with oversight from the board. Hes inheriting a sprawling entity thats more determined by the ambitions and fever dreams of the cofounders than what necessarily makes sense for the worlds most important search, video, and artificial intelligence company. So maybe its time to assess how well the Alphabet move worked out.

The Alphabet structure seemed motivated by two factors. The first was to allow Page to remove himself from the rigmarole of running the Google business. I used to half-joke that he did it so hed never have to talk to a reporter again. Now Im down to 30 percent joke. (Oddly, in interviewsmy last with him was in 2013Page can be fascinating, candid enough to provide an illuminating view of his innovation-obsessed mindset.)

The second was to become more friendly to Wall Street, a factor usually attributed to Alphabets canny CFO Ruth Porat. Breaking out Google from the as-yet-unprofitable Other Bets, like the capital intensive health-care division Verily or new spin-offs like Loon, makes the companys financial reporting more palatable to bankers and analysts. Also, by making the individual CEOs responsible for the performance of their domains, they might find themselves more compelled to make their divisions profitable.

In one sense this seems to have worked brilliantly. Alphabets share price has skyrocketed, roughly doubling since the announcement. Could a non-alphabetized Google have performed better? That depends on whether you think the move made the pieces more valuable, or whether it created a mlange of companies worth less than the sum of its parts. In the original Google structure, the point of those other ventures was to bolster the mothership itself. In an Alphabetized world, the focus is on incubating companies that will one day become big businesses themselves. Its the Berkshire Hathaway model, a corporate Gladstone bag where Geico and NetJets and Sees Candies are happily stuffed inside. But Warren Buffet doesnt have a flagship to nurture.

Consider the VC firm Google Ventures. It originally made its investments with a strong eye towards companies that might enhance Googles business. But by running Ventures as an independent entity, the incentive shifts naturally to wagers that pay off, as opposed to financially less promising bets that would nonetheless make Google more valuable to users. Some might counter that Ventures has reaped hundreds of millions with big wins like Uber; but that haul is relatively insignificant compared with the billions Google brings in every quarter. Starting a great VC firm is nice, but an investment arm that could accelerate the mature search business might be even better.

Go here to see the original:

Larry, Sergey, and the Mixed Legacy of Google-Turned-Alphabet - WIRED

Read More..

Bitrefill and Bitfinex Are Now "Partners in Crime" – Business Partnerships – Altcoin Buzz

The Bitfinex cryptocurrency exchange has partnered with Bitrefill, a service for topping upmobile accounts and purchasing gift certificates.

Bitfinex users can now buy over 2000 gift cards and voucher codes from the Bitrefill catalog. The exchange announced the partnership on Twitter. The B2B procedure will be happening on the Lightning Network. Furthermore, users can also pay for entertainment, dining, traveling, shopping services.

Commenting on the partnership, CEO of Bitrefill, Sergej Kotliar said, If all goes as planned, this should become the new standard for doing integrations. No custody of coins is happening. User is actually withdrawing from their Bitfinex account over LN to pay us directly. And the payment is settled securely and instantly.

Bitrefill started its operation in 2014. This platform is a great example of how to use cryptocurrencies in everyday life. Thus, it offers the opportunity to top up your mobile phone account with more than 600 operators in 143 countries.

Besides, you can easily top up your family or friends accounts, even if they live in another country. And you can use Bitrefill to buy gift cards and vouchers. Currently, the company received 130,000 positive reviews from the users.

Bitrefills CCO,John Carvalho, says: We believe that getting bitcoin exchanges on to the Lightning Network early is integral to preparing for the next wave of adoption and building out a parallel economy for bitcoin. This collaboration signals a new era for bitcoin commerce. We will continue to work closely with Bitfinex and other businesses to develop Lightning solutions and products that make living on crypto a reality.

Earlier, Altcoin Buzz reported about the Bitfinexs partnership with the Lightning Network. The companys CEO, Paolo Ardoino is advising that over 400 deposits and withdrawals processed via LN.

Besides, in November, the exchange launched a special Bitfinex program. Its goal is to reward users for likes.

Read more:
Bitrefill and Bitfinex Are Now "Partners in Crime" - Business Partnerships - Altcoin Buzz

Read More..

Global Internet Security Market Growth Opportunities & Factors and Profit Margin | Size, Share, Trends and CAGR Up To 2028 – The State News -…

New York City, NY: December, 2019 Published via (WiredRelease) The complete study of Global Internet Security market report provides new insights and clarification on the Internet Security market and help you to refine and polish your business strategies. The market categorized into Product Type And Service, Technology, Applications, And Region so that users could save time. The key market players are evaluated on various parameters such as company overview, product portfolio, Internet Security developed by the companies and recent development trends of the Internet Security market.

Internet Security Market research report provides the details about Market Competition, Size & Share, Industry Chain structure, Technological developments, Raw Materials, Consumer Preference, Development & Trends, Regional Forecast, Company Profile & Service.It studies global as well as the regional presence of the market. Information on major players of the market, their market position, revenue study, and growth tactics have been included. Growth rate and market value are also examined for global as well as region. It highlights the competitive territory of the business place that involves the key companies in the market. For the examination, market information, development possibilities, and market patterns are taken into consideration. Based year in this report is 2019; the historical data is from 2014-2019 and the forecast year is from 2019 to 2028.

Internet Security market research report also gives information on the Trade Overview, Policy, Regional Market, Business Operation Data, Market Features, Regional Trade, Investment Opportunity, Investment Calculation and other important aspect of the industry.

Click Here, And Download Free Sample Copy In Just One Single Step At:https://marketresearch.biz/report/internet-security-market/request-sample

Key Segments Covered Within This Report:

The key regions are extensively analyzed with respect to every parameter of the geographies in question, comprising, Europe (Germany, France, UK, Russia and Italy), North America (United States, Canada and Mexico), Asia-Pacific (China, Japan, Korea, India and Southeast Asia), South America (Brazil, Argentina, Colombia etc.), Middle East and Africa (Saudi Arabia, UAE, Egypt, Nigeria and South Africa).

Market segment

By product type and service:

Hardware serviceSoftware serviceBy technology:

Authentication technologyAccess control technologyContent filteringCryptography

Top players inInternet Securitymarket: Kaspersky Lab, Cyber Ark Software Ltd., Microsoft Corp., Hewlett Packard Company, Qualys Inc, Cisco Systems Inc, International Business Machine (IBM) Corp., Symantec Corporation, Trend Micro Inc. and Webroot Inc..

What Makes The Report Excellent?

The market review for the global market is done in context to region, share, and size.

The report offers a competitive market scenario among major players of the industry, a proper understanding of the growth opportunities.

The important strategies of top players in the market.

The study on to major players in the market with their both sales volume and size

Categorized and summarized data based on types, regions, companies, and applications of the product.

Data of the Wastewater Treatment Antifoam Agents insights, consumption, market share, and convictions over the globe.

The report offers complete guidance to provide in-depth market insights across all the industry verticals

WHO SHOULD BUY THE Internet Security REPORT?

People looking to enrich the decision-making capability by following points must buy the report:

1. Breakdown of the market share of the top industry players

2. Evaluations of market share for the regional and country-level sectors

3. Estimation of market for the forecast period of all the aforementioned classes, subclasses, and the domestic markets

4. Tactical recommendation for the newbies

5. Tactical recommendation in primary business industries based on the market forecast

Customize Report AndInquiry For The Internet Security Market Report:https://marketresearch.biz/report/internet-security-market/#inquiry

Who we are and what we do:

MarketResearch.biz is a pioneering company in the fields of market research and analytical reporting. Our services enable clients to enhance business efficiency and focus on other core aspects of operations, while we take care of market research and reporting needs. MarketResearch.biz conducts and executes detailed and in-depth research and analysis across all relevant domains and offers accurate and insightful estimations and forecasts to enable clients to take well-informed and crucial decisions in their respective industries, sectors, or companies.

Contact Us At

Mr. Benni Johnson

MarketResearch.Biz (Powered By Prudour Pvt. Ltd.)

420 Lexington Avenue, Suite 300

New York City, NY 10170,

United States

Tel: +1 347 826 1876

Website:https://marketresearch.biz

Email ID:[emailprotected]

This content has been distributed via WiredRelease press release distribution service. For press release service enquiry, please reach us at[emailprotected].

Go here to read the rest:
Global Internet Security Market Growth Opportunities & Factors and Profit Margin | Size, Share, Trends and CAGR Up To 2028 - The State News -...

Read More..

NATO Should Count Spending on Secure 5G Towards Its 2% Goals – Defense One

Getting internet security right is key to the alliances very future.

The agenda at NATOs London summit reportedly includes talk about the future of internet security that is, establishing rules and roles for next-generation 5G gear. This is both a vital issue and a bellwether. If done right, moving to secure 5G systems can rejuvenate the alliance around its central mission: protecting democratic states from authoritarian incursion. Botch it, and the rift will onlyincrease.

Whether NATO comes together or falls apart over 5G presents an initial test of how it will handle Chinas rise. For Beijing, leapfrogging Western telecommunications firms is part and parcel of a vision to spread norms of authoritarian internet governance, promote surveillance technologies, build global dependencies, and undermine the liberal democratic order NATO anchors. U.S. officials can take several steps to help move the debate from admonition toaction.

First, NATO should allow members to count a portion of outlays on secure 5G systems towards national 2-percent defense spending goals. There are a number of ways 5G-inclusive targets could be defined, including one-time commitments or line-item funds, but if investing in technology built by trustworthy vendors is a priority for the United Statesand it should bethe alliances cost-sharing structure should reflectit.

Second, NATO should conduct thorough technical and political risk assessments on 5G networks and build shared cybersecurity standards. Last month,NATO announcedplans to update rules for civilian 5G. The United States should use this process to push for transparency requirements on the companies that build 5G networks, including disclosures on corporate ownership structures, direct government funding, and state influence and control. Whether an authoritarian government subsidizes telecommunications equipment to undercut local competitorsor controls a company to steal military, commercial, or personal datais relevant when considering allowing it to build the foundations of economic opportunity for NATO member states.

Subscribe

Receive daily email updates:

Subscribe to the Defense One daily.

Be the first to receive updates.

Put simply, NATO should require participating suppliers to show credible independence from foreign governments. In addition to helping secure networks, such a requirement fosters internet governance that resists authoritarian surveillance and erects barriers to the unfettered access of private citizendata.

Third, the United States should urge its allies to consider cooperative business models and infrastructure sharing arrangements that would help member countries choose trusted-yet-costlier systems over cheaper alternatives. Some creativity may be in order here, but NATO partnerships with the EU, Finland, and Sweden could build joint funding and research models for secure 5G and even 6Gsystems.

Proposing these initiatives would add constructive action to the U.S. governmentssteadydrumbeatagainst Huawei. Concerns over Chinese-made 5G have centered on espionage, but extend to amassing sensitive personal and corporate information and leveraging internet dependence for geopolitical control. In capital after capital, U.S. diplomats have warned allies and called for outrightbans.

For the rest of NATO, these concrete steps are also more politically viable. Amid divisions within allied nations over 5G and ample pressure from China, a tenuous plausible deniability consensus may emerge: to ratchet up requirements without singling out one country or company. A recentEuropean Union risk assessment on 5G, for example, notably cautioned against threats from state actors, but stopped short of naming Chinaexplicitly.

Disunity here has real consequences. A split over cybersecurity and the varying presence of untrusted suppliers from China in member countries 5G networks threatens vital NATO military and intelligence cooperation. The United States hasalready warnedthat it will limit intelligence sharing if allies build 5G networks with Chinese equipment. In the words ofone official, the Americans will assume that everything we share with Germany will end up with theChinese.

Such an outcome would be disastrous for the alliance. A NATO intelligence-sharing rift would open the door to greater authoritarian interference in Western democracies, and not just from China. NATOs intelligence sharing and threat analysis cell is a central tenet of itsplan to combat hybrid threatsfrom Russia and others: disinformation campaigns, malign financial flows, the annexation of Crimea, and more. Given Russias long-standing goal of fracturing NATO, its no coincidence that Russian state media championsHuawei.

Democracies need a competitive offer and a competitive vision for the future internet that starts with counting trusted 5G spending towards 2-percent targets, conducting joint risk assessments, and pursuing cooperative businessmodels.

Aligning on 5G wont solve all of NATOs problems. It wont stop Chinas economic coercion of NATO members or its human rights abuses in Xinjiang, and it wont stop Russias influence operations in Europe. But a failure to get 5G right most certainly will exacerbate them and bode ill for the future unity of thealliance.

The rest is here:
NATO Should Count Spending on Secure 5G Towards Its 2% Goals - Defense One

Read More..

Research center planned to help companies protect the Internet of Things more effectively – KU Today

LAWRENCE More and more, the internet connects to devices in our homes, our offices and even to critical infrastructure that supports the American way of life.

Yet, this snowballing interconnectivity of devices and systems dubbed the Internet of Things or IoT suffers from security vulnerabilities that leave people, companies and governments open to cyberattack from bad actors. Some liken the IoT tech frontier to a Wild West.

Now, a new planning grant from the National Science Foundation is enabling researchers from the University of Kansas School of Engineering to design a multi-institutional Center for High-Assurance Secure Systems and IoT (CHASSI) that would partner with private firms in the Kansas City area and across the United States to boost security of IoT products and systems ranging from medical devices to energy grids, real-time financial markets and national-defense infrastructure.

The center would be built around this notion of cybersecurity for high-assurance systems and the Internet of Things, said Michael Branicky, professor of electrical engineering & computer science at KU. We mean mission-critical items so we're not talking about using cryptography to secure cat videos. Well be working with people who manufacture things like medical devices, where it's critical to a company's business that these be secured. We've got five university partners, and KU is the overall lead institution.

Under the NSF grant, KUs partners in the CHASSI include the University of Minnesota, Syracuse University, Case Western Reserve University and Indiana University, each of which brings a distinct set of expertise, potential industry members and regional industrial strengths to the CHASSI partnership.

These are institutions that we have research relationships with or that have key expertise related to this area, Branicky said. Case Western Reserve University has expertise in the manufacturing and energy applications and industrial controls. Indiana University has done a lot in privacy and usability of IoT devices on the consumer side for instance, they have a lab where they tested a toy bear that has a camera connected to the internet. You know, parents might want to know if somebody would be seeing where their child is in the house and what they're doing. Syracuse University has a lot of expertise on certified security by design, where you formally construct proofs of the performance of the systems, and they've mainly done this for the military and the government, but they want to branch out to also doing this for companies. And then the University of Minnesota has expertise in the medical device area.

The five partnering institutions on the CHASSI planning grant would form a virtual center and work with tech companies in their geographic regions to develop more secure products and practices for cybersecurity. Multiple industry partners have signed letters of interest in hopes of coordinating with the prospective center.

We're trying to answer slightly broader hypotheticals that would give companies frameworks for IoT cybersecurity, offering them a toolbox for approaching these types of problems, Branicky said. This would work in the evaluation of not one particular product but maybe a family of products that would be applicable to more than one industry partner. But eventually centers like this could lead to proprietary research for partners. Once we understand a general framework, or general rules or tools that you could use to design these products, six months later a partner might have a new product and might want help that would be separate follow-on research we would also anticipate as an outcome of the center.

Branickys co-investigators on the planning grant from the KU School of Engineering are Perry Alexander, AT&T Foundation Distinguished Professor of Electrical Engineering and Computer Science and director of the Information and Telecommunication Technology Center; Victor Frost, the Dan F. Servey Distinguished Professor of Electrical Engineering and Computer Science; and Bo Luo, professor of electrical engineering & computer science.

At KU, the IoT cybersecurity researchers will leverage strengths in cybersecurity within the School of Engineering. For instance, the NSF CyberCorps Scholarship for Service program; students working toward undergraduate and graduate certificates in cybersecurity; the KU student cybersecurity group, the JayHackers (advised by Luo); and joint cybersecurity exercises of KU students with soldiers from Fort Riley and local high school students. Further, the researchers will tap diversity programs collected under IHAWKe (Indigenous, Hispanic, African-American, Women KU Engineering) to advance diversity and outreach and also join with KUs Women in Computing group to identify student researchers.

Branicky said researchers would conduct a planning workshop and submit a final proposal to NSF in 2020.

Photo: Pexels.com.

See the original post here:
Research center planned to help companies protect the Internet of Things more effectively - KU Today

Read More..

Internet freedom and security challenges: notes from the IGF 2019 – Democracy Without Borders

The Internet Governance Forum (IGF) was launched by the Secretary-General of the United Nations in 2006 and since then annual meetings have been held across the world. This year, Germany for the first time was the host country and organized the IGF in cooperation with the United Nations from 25-29 November in Berlin.

At the IGF 2019, I attended various sessions of different formats, mainly around the issues of digital democracy and identity. Here are my main learnings in short:

Blockchain technology (BC) is neither the solution to privacy nor to authentification issues: Public BCs seem to have their main advantage in providing for a high level of protection against fraud; and if they are used to serve as identity proof (e.g., for world citizens), there seems to be no way of avoiding a trusted authority, e.g. a public registry office, as a starting point. But there is obviously no privacy in a public BC, although there seem to be several ways of using a public BC with non-disclosed data, e.g. personal data that have been translated into hashes. The BC hype meanwhile seems to have been replaced by a more realistic approach in which BC offers interesting options in various software environments and for different purposes.

Democratic political regulation of the internet has become essential, and several speakers said that a global regulation frame was required. To me this is very convincing and it is also an issue for Democracy Without Borders: inclusive and participatory global democracy will require global digital communication but this can only work with internet platforms that are protected against misuse and domination. A bottom-up approach that takes a free global internet for granted is apparently no longer realistic.

Taking a free global internet for granted is no longer realistic

Maybe the European General Data Protection Regulation is a good first step in the direction of supranational data protection regulation and a good example for others; at least this view was shared by several speakers. And there seem to be plans for an European AI regulation as well. Regarding supranational regulation, however, there is a time issue: Referring to the issue of AI regulation it was said that the UN is too slow, so multilateral agreements would be a more promising approach. This will also be true for any form of internet regulation. Even more important, however, every global approach to internet regulation will also bear the risk that governments with an anti-freedom and anti-democracy agenda will try to exert their influence on this. So, democratic political regulation of the internet is by any means a difficult task and every step in this direction needs to be considered very carefully.

The internet gets nationally or regionally fragmented. In addition, in 2019 alone there apparently have already been 35 internet shutdowns (and counting). In Iran for instance, there has apparently been an internet shutdown by the government for five days in a row and it was said that due to effective preparations by the government the national/regional internet during this shutdown was working just fine (and even faster sometimes). Controlling and restricting the internet has become an attractive model for dictatorships all over the world and this is a real threat to global democracy. And there seems to be no technical way to circumvent such shutdowns. When discussing satellite technology options, a speaker from Iran commented sarcastically that even if this was feasible, it would certainly come under US sanctions as well.

There is a lot of influencing elections nowadays, and it is getting more. This has nothing to do with the way an election itself is being held (paper & pencil, electronic voting, etc.) but is all about fake news, targeted influencing and the like that is primarily done via online platforms and social media. It was said that maybe fact checking does not really help here when influencing works with identity issues and thereby addresses emotions that even may ignore opposing facts. However, empirical proof of the effects of influencing seems difficult or even impossible.

What are the conclusions for Democracy Without Borders, particularly the Global Voting Platform (GVP) initiative? In my view, the GVPs bottom-up approach of direct world citizen participation will have to be linked stronger with a regulatory top-down-approach of enabling and securing a free global internet by supranational regulation. Initiatives such as Contract for the Web should be supported. This, however, does not mean that authentification and security issues will be less important; and the potential use of BC technology is worth a more detailed consideration. Beside its still enormous potential for free global communication the internet obviously has also developed into a means of political control, manipulation and surveillance. It is no longer a neutral platform but has become a field of global politics and internet freedom is more and more under pressure from autocratic regimes.

Original post:
Internet freedom and security challenges: notes from the IGF 2019 - Democracy Without Borders

Read More..

A Sprint contractor left thousands of US cell phone bills on the internet by mistake – TechCrunch

A contractor working for cell giant Sprint stored on an unprotected cloud server hundreds of thousands of cell phone bills of AT&T, Verizon and T-Mobile subscribers.

The storage bucket had more than 261,300 documents, the vast majority of which were phone bills belonging to cell subscribers dating as far back as 2015. But the bucket, hosted on Amazon Web Services (AWS), was not protected with a password, allowing anyone to access the data inside.

Its not known how long the bucket was exposed.

The bills which contained names, addresses and phone numbers, and many included call histories were collected as part of an offer to allow cell subscribers to switch to Sprint, according to Sprint-branded documents found on the server. The documents explained how the cell giant would pay for the subscribers early termination fee to break their current cell service contract, a common sales tactic used by cell providers.

In some cases we found other sensitive documents, such as a bank statement, and a screenshot of a web page that had subscribers online usernames, passwords and account PINs which in combination could allow access to a customers account.

U.K.-based penetration testing company Fidus Information Security found the exposed data, but it wasnt immediately clear who owned the bucket. Fidus disclosed the security lapse to Amazon, which informed the customer of the exposure without naming them. The bucket was subsequently shut down.

A Verizon and AT&T phone bill from two customers. (Image: supplied)

A T-Mobile bill found on the exposed servers. A handful of Sprint bills were also found. (Image: supplied)

After a brief review of the cache, we found one document that said, simply, TEST. When we ran the file through a metadata checker, it revealed the name of the person who created the document an account executive at Deardorff Communications, the marketing agency tasked with the Sprint promotion.

When reached, Jeff Deardorff, president of Deardorff Communications, confirmed his company owned the bucket and that access was restricted earlier on Wednesday.

I have launched an internal investigation to determine the root cause of this issue, and we are also reviewing our policies and procedures to make sure something like this doesnt happen again, he told TechCrunch in an email.

Given the exposed information involved customers of the big four cell giants, we contacted each company. AT&T did not comment, and T-Mobile did not respond to a request for comment. Verizon spokesperson Richard Young said the company was currently reviewing the matter and would have details as soon as its available. (TechCrunch is owned by Verizon.)

Sprint spokesperson Lisa Belot would not disclose the nature of its relationship with Deardorff but said it was assured that the error has been corrected.

Its not known why the data was exposed in the first place. Its not uncommon for AWS storage buckets to be misconfigured by being set to public and not private.

The uptrend were seeing in sensitive data being publicly accessible is concerning, despite Amazon releasing tools to help combat this, said Harriet Lester, director of research and development at Fidus. This scenario was slightly different to usual as it was tricky to identify the owner of the bucket, but thankfully the security team at AWS were able to pass the report on to the owner within hours and public access was shut down soon after.

We asked Deardorff if his company plans to inform those whose information was exposed by the security lapse. We did not immediately receive a response.

Updated with Sprint comment.

Read more:

See the rest here:
A Sprint contractor left thousands of US cell phone bills on the internet by mistake - TechCrunch

Read More..

Most recent Internet Security Threats of 2019 – OBN

Hackers are getting smarter and superior over time. In order to deal with the new technologies, hackers are learning new abilities and they are finding new ways approach beat the systems. Therefore , you have to increase your security that will go without question. Here are some of the elements which are changing.

Supply: Phishing Protection

Phishing attacks means delivering fake emails or digital communications to target people, once they click on the hyperlink in the messages a malware will get installed into the user s program which can steal all kind private and financial information of the consumer.

While there has been improved awareness among users to identify this kind of threats, the hacking community has additionally changed their phishing methods. By making use of advanced machine learning techniques, cyber criminals can now draft and send extremely convincing digital messages, which attract even the most cautious users in order to fall into their trap.

Once the hackers get the access they could steal all kinds of sensitive information from the person s or organization t database. Such data can include delicate personal information, images or videos; sign in details and credit card information plus passwords, etc .

Source: Security Magazine

Ransomware attacks are a huge headache for the tech industry, every year it costs its victims vast amounts of dollars because of such attacks. During these kinds of attacks, the hackers kidnap an user s or company s database and ask for big sums of money to release back the particular victim s information or data source.

The hackers will also be hard to track due to the rise in the usage of cryptocurrencies like Bitcoin , Ethereum plus Ripple. As the transactions remain private it is very hard to track the identification of the hackers.

Cybersecurity experts suggest that over time people will certainly high net worth will be focused more by such attacks. These folks won t even file the complaint and pay even a wide range of ransoms to save their social standing.

Source: CSO

The evolution of cryptocurrency has many adverse effects upon cybersecurity, nowadays, hackers hijack private or organizational computing and digesting capacity to mine for cryptocurrencies.

While there are simply no direct monetary losses, such episodes indirectly cost a lot of performance problems for the victims. They also result in machine breakdown and downtime for many institutions which can cost a lot of money and reliability.

Source: ET CIO

If terrorist groups or even activists with hacking ability may physically get access to high-security systems, they could cause damage beyond imagination.

Some of the most vulnerable and higher priority targets include traffic, transport, water treatment, and electric main grid systems. Some cybersecurity experts think that even the US military systems are in high-level risk from such assaults.

If something like that occurs, you can only imagine the damage.

Supply: Careers in Cybersecurity

Not just hackers, different countries are on the verge of internet warfare. There have been instances when the cyberattack on one country was pointed out in order to, sponsored by and originated from the rival country.

Because everything relies on the internet nowadays, by using better cyber teams even smaller sized and hostile countries can harm bigger and developed the nation ersus infrastructure.

Source: WhiteSource

IoT might appear like very innovative and useful technology, but if hackers can get entry to your devices like webcams, smartwatches, household items, medical equipment, self-driven cars, security systems, you can t even imagine what kind of chaos they can cause.

Source: FinancesOnline. com

As more are more private hospitals and clinics are moving their particular patient data and other information on the internet, it can be a serious threat if this kind of personal and sensitive information drops into wrong hands.

According to the Software Engineering Institute of Carnegie Mellon College, As more devices are linked to hospital and clinic networks, individual data and information will be more and more vulnerable. Even more concerning is the danger of remote compromise of a gadget directly connected to a patient. An opponent could theoretically increase or reduce dosages, send electrical signals to some patient or disable vital indication monitoring.

Supply: Connexas

Could seems like very innovative and soothing technology, in its background it contains severe safety and privacy concerns. Just for hackers, this technology will create as another weapon in their arsenal. When they have accessed a vehicle h system and take control they can quickly blackmail the passengers.

Source: Online Levels

Another severe issue is the shortage of qualified cybersecurity experts, according to reports the industry is certainly short of more than one million skilled experts in this sector.

If you are searching for more such technology tips plus news please don t miss to visit http://www.i4u.com .

Joel is a journalism major and worked with major publishing companies around the country before becoming a writer at OBN. He currently reports on everything from entertainment to business.

See the article here:
Most recent Internet Security Threats of 2019 - OBN

Read More..

5,183 breaches in first nine months of 2019 exposed 7.9b data records – TEISS

As many as 7.9 billion data records were leaked, stolen or exposed as a result of 5,183 data breaches that took place in the first nine months of 2019, making it the worst year ever for data breaches.

This alarming statistic was revealed by security firm Risk Based Security which observed that based on recent trends, the number of breached data records could touch 8.5 billion by the end of the year.

The firm also noted that the total number of data breaches worldwide rose by 33.3 percent compared to the mid-year of 2018 and the number of records breached also rose by 112 percent. As many as 3.1 million data records were breached as a result of six data breach incidents that took place between 1 July and 30 September.

"Whether its a phishing campaign that ultimately provides malicious actors with a toehold into systems or misconfigured databases and services that leave millions of sensitive records freely available on the internet, it seems to be human nature coupled with weak controls that contributed heavily to the number and severity of breaches weve seen this year," noted Inga Goddijn, executive vice president at the firm.

Goddijn added that a majority of data records were exposed or leaked as a result of accidental exposure of data on the internet by organisations. The fact that hackers are quite willing to take advantage of such data exposure has also led to a rise in the number of breached records.

"While malicious actors have been responsible for most incidents, it is accidental exposure of data on the internet that has put the most records at risk. This year over 6 billion records have been made freely accessible thanks to misconfigured databases, backups, end points, and services."

Internet security firm Norton also revealed earlier that the number of data records breached in the first six months of 2019 touched 4.1 billion and the number of reported data breaches in the period was 54 percent higher compared to the first six months of 2018.

According to insurance broking firm Gallagher, the first six months of 2019 also saw more than 500 million cyber attacks targeting local councils across the UK. Gallagher found that almost half of all local authorities had experienced an attempted cyber-attack on their IT systems since 2017 and 37% of them had experienced cyber-attacks in the first half of this year.

In the first quarter alone, an average UK business suffered as many as 119,659 internet-borne cyber attacks, noted cyber security analysts at Beaming who found that hackers used 442,091 unique IP addresses to target UK business, many of which were traced to other countries. While a little over 51,000 IP addresses were located in China, 32,386 were located in Brazil, and 31,131 were located in Russia.

See the original post:
5,183 breaches in first nine months of 2019 exposed 7.9b data records - TEISS

Read More..

Click Moment | ‘Weak internet signals showed us our strong impact’ – Livemint

While transitioning into civilian life after more than a decade in the Indian Air Force, I was struck by how the growing propensity to ask for goods and services to be home delivered was causing disruptions in traditional security processes at gated communities.Security guards were unable to deal with the increased traffic at the gate and the existing processes and technologies were proving inadequate. It became clear that the authentication process needed to be digitized. This was a weak signal, no doubt, but I was convinced that it warranted deeper analysis.

We built a strong solution for these problems, and, in doing so, we were not only able to ensure seamless verification of all visitors, but deliver a number of other conveniences to residents. We could help them manage their deliveries when they were away, inform them of the arrival of their maid, enhance the security of their children, notify guards if delivery executives overstayed their welcome, among much else. A business is always looking for ways to quantify the utility of its solution. You want to know that it is a painkiller (need to have), and not just a vitamin (good to have). It is difficult to be certain.

Then, for the second time in three years, rains hit Chennai in November 2017. Connectivity dropped all across Bengaluru, which receives internet from cables laid under the port city. Our services were hit. Gate notifications werent reaching our customers and there was nothing we could do about it. Every one of us had to drop what we were doing and answer the phone. Within eight hours, around 40% of our customer base had contacted us to complain. We were delighted! A day or two later, internet speeds went back to normal and we went back to work, buoyed by the knowledge that what we were building really was a painkiller. Fast forward two years and MyGate has seen phenomenal growth. Our security solution is now in 1.2 million homes across 5,000 gated premises in 11 Indian cities. Ironically, the strongest indicator of our impact was a weak (internet) signal.

There was one moment when fate turned their way, a moment that they can look back upon and say, that was when it started. Capturing click moments.

Here is the original post:
Click Moment | 'Weak internet signals showed us our strong impact' - Livemint

Read More..