Page 4,323«..1020..4,3224,3234,3244,325..4,3304,340..»

Artificial intelligence and quantum computing aid cyber crime fight – Financial Times

You enter your password incorrectly too many times and get locked out of your account; your colleague sets up access to her work email on a new device; someone in your company clicks on an emailed Google Doc that is actually aphishing link initially thought to be how the recent spread of the WannaCry computer worm began.

Each of these events leaves a trace in the form of information flowing through a computer network. But which ones should the security systems protecting your business against cyber attacks pay attention to and which should they ignore? And how do analysts tell the difference in a world that is awash with digital information?

The answer could lie in human researchers tapping into artificial intelligence and machine learning, harnessing both the cognitive power of the human mind and the tireless capacity of a machine. Not only will the combination of person and device build stronger defences, their ability to protect networks should also improve over time.

A large company sifts through 200,000 so-called security events every day to figure out which present real threats, according to Caleb Barlow, vice-president of threat intelligence for IBM Security. These include anything from staff forgetting their passwords and being locked out of the system, to the signatures of devices used to access networks changing, to malware attempting to gain entry to corporate infrastructure. A level of rapid-fire triage is desperately needed in the security industry, Mr Barlow says.

The stakes for businesses are high. Last year, 4.2bn records were reported to have been exposed globally in more than 4,000 security breaches, revealing email addresses, passwords, social security numbers, credit card and bank accounts, and medical data, according to analysis by Risk Based Security, a consultancy.

International Data Corporation, a US market research company, forecasts businesses will spend more than $100bn by 2020 protecting themselves from hacking, up from about $74bn in 2016.

Artificial intelligence can improve threat detection, shorten defence response times and refine techniques for differentiating between real efforts to breach security and incidents that can safely be ignored.

Speed matters a lot. [Executing an attack] is an investment for the bad guys, Mr Barlow says. Theyre spending money. If your system is harder to get into than someone elses, they are going to move on to something thats easier.

Daniel Driver of Chemring Technology Solutions, part of the UK defence group, says: Before artificial intelligence, wed have to assume that a lot of the data say 90 per cent is fine. We only would have bandwidth to analyse this 10 per cent.

The AI mimics what an analyst would do, how they look at data, how and why they make decisions...Its doing a huge amount of legwork upfront, which means we can focus our analysts time. That saves human labour, which is far more expensive than computing time.

IBM is also applying AI to security in the form of its Watson cognitive computing platform. The company has taught Watson to read through vast quantities of security research. Some 60,000 security-related blog posts are published every month and 10,000 reports come out every year, IBM estimates. The juicy information is in human-readable form, not machine data, Mr Barlow says.

The company has about 50 customers using Watson as part of its security intelligence and analytics platform. The program learns from every piece of information it takes in.

Read more

What to expect, who to tell and how to limit the damage

Thursday, 25 May, 2017

It went from literally being a grade-school kid. We had to teach it that a bug is not an insect, its a software defect. A back door doesnt go into a house, it's a vulnerability. Now its providing really detailed insights on particular [threats] and how their campaigns are evolving. And thats just in a matter of months, Mr Barlow says. The more it learns, the faster it gets smarter.

IBM says Watson performs 60 times faster than a human investigator and can reduce the time spent on complex analysis of an incident from an hour to less than a minute.

Another even more futuristic technology could make Watson look as slow as humans: quantum computing. While machine learning and AI speed up the laborious process of sorting through data, the aim is that quantum computing will eventually be able to look at every data permutation simultaneously. Computers represent data as ones or zeros. But Mr Driver says that in a quantum computer these can be: both [zeros and ones] and neither at the same time. It can have super positions. It means we can look through everything and get information back incredibly quickly.

The analogy we like to use is that of a needle in a haystack. A machine can be specially made to look for a needle in a haystack, but it still has to look under every piece of hay. Quantum computing means, Im going to look under every piece of hay simultaneously and find the needle immediately.

He estimates that quantum computing for specific tasks will be more widely available over the next three to five years. On this scale, the technology is still a way off, but there are companies that are developing it.

One company pushing to make quantum computing commercially viable is Canada-based D-Wave, whose customers include Nasa, Lockheed Martin and Google. In January the company sold its newest, most powerful machine to a cyber security company called Temporal Defense Systems, which is using it to work on complex cyber security problems.

But there are risks to using AI technology in security systems. After all, machines that can be taught to think like humans can also be tricked.

Live event

Join us on June 19th for a conversation about automation and what it means for the future world of work.

Thursday, 25 May, 2017

The AI itself is now becoming a target, says Roman Yampolskiy, a professor of computer engineering and computer science at the University of Louisville in the US, who studies artificial intelligence and security.

Hackers may exploit machine learning by gradually teaching a security system that unusual behaviour is normal, known as behavioural drift, he says.

AI can also be used by attackers to fake human voices and create video images that could let criminals into your network. If you get a call from someone whose voice you recognise and they say, I dont have time to talk, give me your password, you will give it to them, Prof Yampolskiy says.

Despite these advances in technology, the core challenge of providing security has not changed, says Mr Driver of Chemring. Its always a cat-and-mouse thing. As soon as you put the gate up higher, then the people will jump higher to get over it."

1. On Friday May 12 2017, mobile operator Telefnica was among the first large organisations to report infection by WannaCry

2. By late morning, hospitals and clinics across the UK began reporting problems to the national cyber incident response centre

3. In Europe, French carmaker Renault was hit; in Germany, Deutsche Bahn became another high-profile victim

4. In Russia, the ministry of the interior, mobile phone provider MegaFon, and Sberbank became infected.

5. Although WannaCrys spread had already been checked, the US was not entirely spared, with FedEx being the highest-profile victim

Visit link:
Artificial intelligence and quantum computing aid cyber crime fight - Financial Times

Read More..

Is the US falling behind in the race for quantum computing? – AroundtheO

The invention of the computer drove an explosion of technological innovation like the world has never seen. Now scientists are closing in on creating a new type of computer the quantum computer.

But according to Michael Raymer, a professor of physics at the UO, the United States is lagging behind China and many European countries in theamount of money invested in this new technology, something he sees as a huge mistake. He recently wrote about the problem in The Register-Guard.

A quantum computer is a new kind of computer that could theoretically do things that modern-day computers would be stumped by, such as design new industrial materials or find the ideal molecular structure for a new medicine.

It would be nice if we could leave it up to the private sector to create the first quantum computer, but there are limits to what industry can achieve on its own, he said. Its easy to say that taxpayers shouldnt have to foot the bill for science and engineering, but in many cases, these investments provide exponential returns to the people who pay for them.

He compares this to the Human Genome Project, where scientists were tasked with mapping every bit of human DNA, which led to countless medical breakthroughs.

For more, see his op-ed piece in The Register-Guard, U.S. playing catch-up in quantum computing.

Raymer has been at the UO since 1988. He served as the founding director of the Oregon Center for Optics. His research looks at the quantum mechanics of light and its interaction with atoms and molecules.

Follow this link:
Is the US falling behind in the race for quantum computing? - AroundtheO

Read More..

Graphene Just Brought Us One Step Closer to Practical Quantum Computers – Futurism

In Brief Researchers are working on creating a quantum capacitor using graphene that is more resistant to electromagnetic interference. This brings us closer to a practical quantum computer. Wonder Material Meets Supercomputer

Right now, graphene and quantumcomputers bothstand out as symbols of the next steps in human technological innovation. Each represents a paradigm shift both in their respective originating fields (materials and computing) as well as in the fields to which they are applied. But perhaps the most exciting developments for these two technologies will come as they combined.

Researchers at EPFLs Laboratory of Photonics and Quantum Measurements have been working to build a quantum capacitor that can create stable qubits (the units of information storage in quantum computers) that are also resistant to common electromagnetic interference. Such a capacitor is easier to produce usinga two dimensionalmaterial such as graphene. Their research was published in2D Materials and Applications.

Quantum computers work by taking advantage of special rules reserved for sub-atomic particles in order to perform the most complex tasks at currently impossible speeds. While theyarent likely to replace our home computers as their capabilities are well beyond our daily needs, what they are capable of will revolutionize whats possible for high-tech applications such as running quantum simulations which can unlock previously impossible to access information.

Taking advantage of graphenes special properties in the designs of quantum capacitors will move us closer to figuring out how to create a practical quantum computer. And this is just one example of graphenes many uses. From the understatedly important capability toturn sea water into drinking water, to the ability to becomezero-resistance superconductors, graphene has the potential to lead us into a new era of science.

Were likelyfar from a functioning practical quantum computer, but watching the beginnings of what might be one of the most significant human technological achievements in our age is quite exciting. Were standing on the precipiceof the next step in our tech evolution.

Link:
Graphene Just Brought Us One Step Closer to Practical Quantum Computers - Futurism

Read More..

IBM Q Offers Quantum Computing as a Service The Merkle – The Merkle

Quantum computing has always sparked the imagination of technology enthusiasts and scientists. Until now, the process to gain access to a supercomputer remains quite expensive. IBM hopes to change all that by launching the Q service, which provides quantum computing as a service. An intriguing development that will potentially spur a new race to build the worlds fastest supercomputer.

On paper, it sounds rather crazy to think anyone in the world could get access to a supercomputer. Most consumers and small businesses do not have any use for this technology whatsoever. Computers and even smartphones are more than powerful enough for consumers looking to complete basic tasks. However, IBM Q is not necessarily designed for the average person on the street.

More specifically, IBM Q is a commercially available universal quantum computer for both businesses and scientists. It is widely believed quantum computing would provide solutions to important problems otherwise too complex to solve through traditional means. It is quite an intriguing project that can currently be accessed free of charge upon providing academic credentials. Do keep in mind users will be somewhat limited as to what they can do during the early stages of IBM Q availability, though.

Under the hood, IBM Q makes use of two universal quantum computing processors. The project provides 16 qubits of computing power for public use and 17 qubits of computing power for commercial use. This first processor can be accessed through the IBM Cloud service at no additional cost, which is a nice gesture. The commercial processor, on the other hand, is twice as powerful as the free version. It is unclear how much access to this resource will cost, though.

Even though this is a major breakthrough in the world of quantum computing, this hardware will not solve every problem in the world. It will also pose no threat to the Bitcoin ecosystem whatsoever, as the computing resources made available both free of charge and in exchange for a payment are not powerful enough to threaten Bitcoins cryptography. Should the available resources be increased in quantity and capacity, that could change in the future. Even then, it seems highly unlikely someone would deliberately try to break Bitcoin and other cryptocurrencies.

It is quite impressive to see how far we have come in the world of quantum computing. Access to such powerful resources seemed to be strictly off-limits for multiple decades. Yet here we are in the year 2017, a time during which quantum computing as a service became an official service. It is a bit unclear who will use IBM Q the free tier, that is but it is a more than welcome development regardless.

The bigger question is whether or not IBM Q offers an intuitive graphical user interface for people to enjoy. Having access to more powerful computing resources is one thing, but if it is difficult to make sense of it all, IBM Q will only be half as appealing. It will be interesting to see how the general public responds to this development. Rest assured this will generate a buzz of excitement in academic circles, though.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

Read more here:
IBM Q Offers Quantum Computing as a Service The Merkle - The Merkle

Read More..

How quantum computing increases cybersecurity risks | Network … – Network World

By Scott Totzke, Network World | May 23, 2017 9:00 AM PT

Opinions expressed by ICN authors are their own.

Your message has been sent.

There was an error emailing this page.

Imagine you wake up one morning, assuming everything is as you left it the night before. But overnight, attackers with a quantum computer capable of breaking current cryptography standards have targeted millions of people and stolen their personal data.

Experts have estimated that a commercial quantum computer capable of breaking the cryptography we rely on today will be available by 2026. In fact, IEEE Spectrum reported last year that a quantum computer is close to cracking RSA encryption.

To many people, a nine-year timeline doesnt sound alarming, and the consequences of not updating our security technology with quantum-safe solutions may not be clear. Heres why the work to upgrade to quantum-safe security needs to start now to keep our data safe once quantum computers arrive.

On any given day, you might engage in any of the following common activities as a typical technology user, and if attackers with a quantum computer break the cryptography these transactions rely on, your sensitive data could be leaked, leading to serious consequences for you and the institutions responsible for safeguarding that data:

1. Sending email: You log in to your laptop and send a few personal emails. Your messages can now be read by the attackers and posted publicly for anyone to read.

2. Checking an online bank account: You log in to your bank account and transfer money. Your financial data is now accessible by the attackers who can use it to drain your accounts.

3. Updating your social media accounts: You log in to Facebook and post a personal update about your upcoming vacation and some pictures of your family, assuming you are sharing only with your friends. All photos and personal information are now publicly visible and can be modified by people other than you.

4. Updating software on a smartphone: You get a software update to your smartphone and accept it, not realizing that the authentication process that assures the update comes from a trusted source (i.e. Google or Apple) is now broken. Malware can now be pushed to your smartphone in the guise of a trusted update, giving the attackers further access to any login credentials for apps you have stored, as well as your data.

5. Driving your connected car: You get into your car to drive to work. Your cars computer accepts software updates automatically. Those updates could now come from the attackers, without your knowledge, allowing a third party to take control of the embedded systems in your car and override your navigation, cut power to your vehicle, and more.

Many other daily transactions we take for granted could immediately become vulnerable. For example, using a formerly secure IoT-connected device, such as a thermostat, home security system, or baby monitor; transferring funds to a pre-loaded payment for a public transportation system; or using a VPN to log in to a corporate network. Many public safety risks that are also introduced when public transport vehicles, safety systems, and physical access systems can be compromised.

We already see rapidly increasing numbers of data breaches as more connected devices make more attack surfaces available. As companies and governments work continually to protect against cybersecurity attacks through advances in technology, the advent of quantum computing could create a free for all for cybercriminals.

But there is a solution in the form of quantum-safe cryptography. The key will be updating quantum-vulnerable solutions in time, and that means understanding now which systems will be affected by quantum risk and planning a migration to potential quantum-safe security solutions that includes appropriate testing and piloting.

The transition can begin with hybrid solutions that allow for agile cryptography implementations designed to augment the classical cryptography we use today.

This article is published as part of the IDG Contributor Network. Want to Join?

Sponsored Links

Read the original here:
How quantum computing increases cybersecurity risks | Network ... - Network World

Read More..

Best Mac antivirus 2017 – Macworld UK

8 of the best antivirus options to protect your Mac Share This Your guide to the best antivirus and security software for Mac 2017, offering good system performance and peace of mind

If you've got a Mac and are wondering whether you need an antivirus, and which Mac antivirus you should choose, you've come to the right place. Here, we reveal the 8 best AVprograms for macOS and Mac OS X in 2017.

You can skip ahead to see our pick of the 8 best Mac antivirus options, or continue reading for more general buying advice, explanation of how we test and answers to all of your Mac security questions.

A hoary old question; for more discussion of this topic, read Do get Macs get viruses?

Plenty of Mac aficionados will tell you that Apple computers are inherently secure and don't require protection. We'd argue that they are wrong - or a bit overconfident, at least.

Macs are generally more secure than their Windows brethren for two reasons. On the technical side, macOS is a Unix-based operating system. As a Unix-based operating system macOS is sandboxed.

It's like having a series of fire doors: even if malware gains access to your Mac, it is unable to spread to the heart of the machine. Macs are not unhackable, but they are more difficult to exploit than Windows PCs.

The second reason is that, right now, there are far fewer Macs than there are Windows PCs. Fewer targets, and these are harder to hack. Is it any wonder that cybercriminals focus on the Windows world?

All malware these days exists to make money, and the criminals who create and share itare not doing so because they want to work hard. They pick off the lowest-hanging fruit, and that is unprotected Windows PCs.

However, Macs are not entirely safe either; in fact, reports from early in 2017suggest that Macs are becoming less secure.

Business Insider even argues, rather contentiously, that Macs are now more vulnerable to viruses and attack than Windows PCs, although you'll note that the sitebases this on a chart that groups all versions of Mac OS X together (215 vulnerabilities in 2016) but separatesWindows 10 (172 vulnerabilities) and Windows 8.1 (154). So make of that what you will.

Additionally, threats such asransomwareare on the rise, and have recently hit huge organisations including the NHS. Cyber security is more important than ever, and a good antivirus is the best place to start if you want to stay safe. Read next: How to remove Mac antivirus software

For any security software to be effective and worth the install it has to be able to prevent malware from infecting your computer. Mac antivirus is no different. We look for anti-malware properties that prevent known and unknown threats from having their way with your Mac. We use AV-Test.org's own testing data to ascertain the effectiveness of each antivirus in this respect.

But security is only half the story. In order for an antivirus to work effectively it also needs to be unobtrusive. AV-Test also looks at the impact of these pieces of software on your system: in layman's terms, how much the antivirus slows down your Mac, if at all.

For each of the security solutions we outline over the following slides, we have tested their ability to keep your Mac safe, and balanced that against the impact on your Mac's performance.

You'll see that even though the best free antivirus programs are good at protection, they tend tohurt your Mac's speed much more than paid-for software. So you need to balance cost against performance impact when selecting a product.

This is one of several in-depth Macworld articles dealing with Mac security. General advice can be found in our Mac security tips; and those who have been hit by a malware attack should try How to remove Mac viruses.

Our number-one best antivirus for Mac is Bitdefender Antivirus for Mac. In AV-Test's lab, Bitdefender Antivirus for Mac blocked 100 percent of the threats thrown at it. Even more impressively, it had a lower than 10 percent system impact, meaning that you won't even know it's protecting you (but believe us, it definitely is). You can read more about Bitdefender Antivirus for Mac here.

Here are Bitdefender's UK prices:

UK Mac owners can buy Bitdefender Antivirus for Mac here. There is also a free 30-day trial if you want to try before you buy.

In the US, Bitdefender Antivirus for Mac costs:

US Mac owners can buy Bitdefender Antivirus for Mac here.

Another paid-for Mac antivirus:say hello tothe excellent ESET. This 29 tool offers 100 percent threat detection, and scores reasonably highly in speed tests. You can save up to 25 percent by going for a two-year licence, and there are various cost-saving options for multiple Mac households up to 59 for a four-Mac licence. And there is a 30-day trial.

To find out more about ESET Antivirus for Mac, click here.

In AV Test's most recent research, only four of theantivirus packages tested managed to detect 100percent of the malware thrown at it. AVG is one of those(as are Bitdefender and ESET, numbers one and twoin this chart). AVG has a bigger impact on performance than our two front-runners, though, which is why it's down in third place.

There's a free version available with limited capabilities; the Pro version, which includes full protection, costs 49.99. Confusingly, there is also a free trial of Pro, which is well worth trying.

To find out more about AVG for Mac, click here.

Symantec's Norton Security didn't perform as well in AV Test's recent tests as it did back in December, so we've had to bump it back from its number-two position. It offered 99.17% detection - which is still great - but when there are threealternatives that scored 100% it makes it more difficult to recommend. It's also not the fastest option available.

Norton Security retails for 49.99 for a single Mac. Step up to 59.99 and you can protect up to five devices, which can include Windows PCs and smartphones as well as Macs, which is pretty cool... albeit arguably a little pointless on the smartphone front. You can get further discounts by buying a two-year licence.

To find out more about Norton Security, click here.

Kaspersky will set you back 39 a year for the full internet security suite for Macs. In return you get 99.17% percent threat detection from the antivirus, as well as anti-spyware, safer banking software and the rest. Oh, and there is a 30-day trial.

The catch? Greater impact on system performance than some of the better products we list in this story, although not by much.

To find out more about Kaspersky Internet Security for Mac, click here.

This is our pick of the free Mac antivirus offerings.

Sophos Anti-Virus requires of you only that you cough up some personal details. And even though itcosts you nothing, the software detects 99.17% percent of threats.

It does have a minor impact on performance, however. That may be enough for you to notice the difference, depending on what spec machine you have. The paid products above it in our chartare better, but Sophos is a compelling product.

To find out more about Sophos, click here.

Another free antivirus for Mac, and another that successfully protected its test Mac, Avira Free Antivirus 3.2 is in at number sevenonly because it had more of a system overhead than productsabove.

According to AV-Test's lab Avira will keep your Mac safe, for free, but you may pay for it in terms of system performance.

To find out more about Avira Free Antivirus, click here.

A Mac security freebie, Avast detects 100 percent of threats. But this tool had a significant performance impact during tests. If you can stand that, it is a good free option. But there are better.

To find out more about Avast Mac Security - Free, click here. See also:best Mac antivirus.

Gear VR vs. Daydream: Which delivers the best VR experience?

See original here:
Best Mac antivirus 2017 - Macworld UK

Read More..

Avira, Kaspersky Top Windows 10 Antivirus Tests – Tom’s Guide

It's "good news, better news" time. The good news is that no matter which antivirus program you use to protect Windows 10, the odds are pretty good that it will keep you safe. The better news is that if you have Avira or Kaspersky antivirus software, they'll protect you with intuitive software that doesn't put undue stress on the rest of your PC.

Credit: Rawpixel.com/Shutterstock

AV-Test, a Madgeburg, Germany-based security firm, periodically evaluates all sorts of antivirus software, and its latest round of testing zeroed in on Windows 10.

As usual, the company evaluated a variety of programs in three categories: Protection (how well a program stood up to both known and zero-day malware threats), Performance (how it affected a PC's overall performance) and Usability (how easy the program is to operate). Each category was worth six points, for a potential total of 18.

MORE:Best Antivirus Software and Apps

Only Avira Antivirus Pro and Kaspersky Internet Security received perfect scores, but they were not the only programs to earn AV-Test's highest recommendation. Bitdefender Internet Security, Symantec Norton Security and Trend Micro Internet Security received 17.5 points apiece. All five programs received a "Top Product" nod from AV-Test, meaning that they struck an almost perfect balance between protection, performance and usability. (All the Window antivirus products from a given brand should protect a computer equally well.)

Those who follow AV-Test's evaluations every few months will recognize these programs as the usual suspects that almost always earn top marks. Bitdefender and Kaspersky Lab in particular take home top honors again and again, so their accolades here are not surprising.

At the other end of the spectrum were Comodo Internet Security Premium, K7 Computing TotalSecurity and Microsoft Windows Defender, with 15 points apiece. Thats not exactly an ignominious low, though. Even the low-scoring programs blocked at least 95 percent of incoming threats, and AV-Test recommends any program that scores at least a 10 on its three-faceted evaluation score.

AV-Test evaluated 18 programs altogether. The remaining 10 scored between 15.5 and 17 points: AhnLab V3 Internet Security, Avast Free Antivirus, AVG Internet Security, BullGuard Internet Security, ESET Internet Security, F-Secure Safe, G Data InternetSecurity, McAfee Internet Security, Microworld eScan internet security suite and ThreatTrack VIPRE Internet Security Pro. If you have one of these programs, youre probably pretty well-protected, in the grand scheme of things.

On the other hand, fi you don't have any of these programs installed, you should probably get one ASAP. While even the best AV programs have an impact on system resources (and a lot of them are easy to compromise, as AV-Test itself pointed out), theyre often the only thing standing between you and a devious hyperlink or phishing scheme.

Here is the original post:
Avira, Kaspersky Top Windows 10 Antivirus Tests - Tom's Guide

Read More..

Cyber encryption is out of sight for camera makers – Financial Times

Image aware: encryption of pictures in cameras is becoming a hot topic for photo journalists Bloomberg

When a group of more than 150 filmmakers and photojournalists last December called on Canon, Nikon and other well-known camera manufacturers to add encryption features to their products, the campaign exposed a sore spot for the camera industry.

The arrival of billions of devices connected to the internet has left everything from the television in your living room to the printer in your office and soon the car in your garage vulnerable to cyber attacks. Cameras that link to the internet are no exception.

Phonemakers and technology companies including Apple, Samsung and Google have battled to protect user information from being hacked by installing encryption technology into products and operating systems. In the world of photography, however, pictures and footage have frequently been seized by authoritarian governments or stolen by criminals. Yet cameras do not have built-in encryption to protect their contents.

Because the contents of the cameras are not and cannot be encrypted, there is no way to protect any footage once it has been taken. This puts ourselves, our sources, and our work at risk, said the US-based Freedom of the Press Foundation in an open letter in December.

We face a critical gap between the moment we shoot our footage and the first opportunity to get that footage on to more secure devices, added the letter, which was sent to companies including Sony and Olympus.

Analysts say the lack of security measures underscores a deeper struggle for the traditional camera industry, which has wrestled for years to adapt its products to the digital age.

The market, particularly for low-cost point and shoot cameras, has suffered a big downturn as consumers have turned to the convenience of smartphone cameras that allow them to take photos that can be instantly shared on social networking sites such as Facebook and Instagram.

In 2016, global shipments of digital cameras declined 32 per cent from a year earlier to 24.2m units, according to the Camera and Imaging Products Association, a Tokyo-based industry group. This compared with a peak of 121.5m units in 2010.

Companies have tried to adapt to shrinking sales and consumer trends by shifting their focus to more expensive products with internet connectivity through WiFi-equipped cameras. Sonys latest mirrorless digital camera, the Alpha 9 boasts a 24.2-megapixel image sensor and retails for about $4,500. It allows image files to be encrypted while being transferred to an online server, but only when using a wired connection over a home or work local area network internet connection. This does not, however, address the problem the Freedom of the Press Foundation complained about, which is the lack of built-in encryption to protect images if a camera is stolen or confiscated.

The industrys slow response is partly down to cost and battery matters. This has led to a lack of interest in security measures among manufacturers and consumers, although more WiFi cameras are becoming available.

Since security awareness for digital cameras among consumers is not that high, the issue is inevitably a lower priority in terms of camera development, says Hiromi Yamaguchi, senior research analyst at Euromonitor, the business intelligence group. Still, consumers are becoming more sensitive to [the protection of their] personal information so we can expect demand for security measures to increase in the future.

Japans biggest camera makers including Canon, Nikon, Sony and Olympus all declined to provide details on what security measures they were studying following the calls from filmmakers and photojournalists to add encryption features to their products.

We will consider responding if the market and user needs for security increase in the future, says Canon, the worlds biggest maker of digital single-lens-reflex cameras, the preferred choice for professional and dedicated amateur photographers. Canon added, however, that it did not yet consider the overall market demand for security measures to be high.

Other companies point to security measures that are already built into image storing devices, although such safeguards are of little use if cameras are stolen or confiscated.

Experts say it would be a challenge to implement encryption features such as the inclusion of a four-digit security code without compromising convenience and user experience. This would be the case especially for professional photographers that are working under stress in combat zones and fighting against deadlines.

Critics say the lack of attention given to security measures by the most established manufacturers of cameras is testimony to the industry being hesitant to address the disruption caused by the rise of online platforms such as Instagram and smartphone photography.

Japanese camera makers have been globally successful but that historical success is now a drag, hampering the transition to a new business model, says Mr Yamaguchi. Thats one of the reasons why security measures have been slow to advance.

New industry players may fill that void for consumers who want the sophisticated imaging quality of top-quality photography, and solid security measures, combined with the convenience of compact smartphones.

Light, a Silicon Valley start-up, plans shortly to launch its first product, the L16, which claims to replace a professional digital single-reflex camera with a compact $1,700 device that fits in the palm of your hand. It can create pictures of up to 52 megapixels by computationally merging images from the cameras 16 lenses. On the security side, the camera uses the Android operating system, which comes with inbuilt encryption as standard.

There is nothing that has ever stopped any of the big legacy camera companies from innovating, says Dave Grannan, Lights co-founder and chief executive. They have been stuck in the past literally at every level, he adds. Encryption is like an insurance package for a car. You never think about it until you have a car crash. But it only helps the consumer.

See the rest here:
Cyber encryption is out of sight for camera makers - Financial Times

Read More..

UK ministers to push anti-encryption laws after election – The Register

The UK government will push through orders next month to force all communications companies including Google and Facebook to break data encryption.

That's according to the Sun newspaper, which quotes a government minister as saying "we will do this as soon as we can after the election, as long as we get back in. The level of threat clearly proves there is no more time to waste now."

The same minister is also quoted as saying: "The social media companies have been laughing in our faces for too long."

The defiant response comes the day after the latest bombing atrocity in Manchester that saw 22 people killed outside a pop concert. Although there is currently no reason to believe that unencrypted data would have made a difference in that incident, the issue has become a touch point for law enforcement and government officials, particularly in the face of defiant tech companies based in the United States.

After the other recent attack in Westminster, Home Secretary Amber Rudd said it was "completely unacceptable" that the authorities were unable to look at the encrypted WhatsApp messages of the attacker Khalid Masood, arguing that there should be "no place for terrorists to hide."

The requirement for companies to remove "electronic protection applied to ... any communications or data" was written into the Investigatory Powers Act last year, but it requires the formal approval of a "technical capacity notice" by both houses of Parliament before it takes effect.

Earlier this month, a draft version of that notice was leaked after it had been supplied in secret to telecoms companies on a short four-week comment period. No mention of the paper was made on the Home Office website or on the Gov.uk consultation website.

That draft includes the anti-encryption wording as well as the insistence that communications companies in the UK provide real-time access to the full content of any named individuals.

It was suspected that the government intended to rush the paper past Parliament in order to get it enacted, but widespread public debate over the matter made that approach increasing untenable.

Unfortunately the tragedy in Manchester may yet provide the means by which the government can force the issue into law. Despite widespread anger and frustration with the Conservative government over its approach to Brexit, as well as a raft of unpopular measures included in its manifesto, the party is still expected to win a majority in the House of Commons and so be in a position to push the anti-encryption laws forward.

There is significant opposition to the idea of breaking encryption, however, from technologists, some in law enforcement, and within the government itself.

Even if the rules do pass, there is still the not-insignificant issue that some of the most frequently used comms services are based in the United States and have made it plain that they are opposed to putting backdoors into their products.

Although Europe is producing legislation that will fine Facebook, Google, Twitter and others if they do not remove illegal content from their services in a specified timeframe, it has been careful not to push the encryption issue.

In March, the European Commission insisted it had been misunderstood when it said it would pass new laws to access data stored in the cloud. It was not asking for encryption backdoors, a spokesperson insisted, but wouldn't clarify how that would occur if the data was itself encrypted.

And despite Amber Rudd's public demands that the UK government be given access to encrypted data when a meeting was held between herself and social media giants, the issue was not broached.

As such, it's not clear whether the rules breaking encryption will get past the comms companies and then past Parliament. But clearly some who agree with the proposal see the Manchester atrocity as an argument in their favour. And one of them spoke to the Sun.

Read the rest here:
UK ministers to push anti-encryption laws after election - The Register

Read More..