Page 4,364«..1020..4,3634,3644,3654,366..4,3704,380..»

SMB Myth-busting 5 Misconceptions About The Cloud Bite The Dust – The Merkle

Almost 5 years after the business world was introduced to the cloud in the truest sense, most of the cloud-related knowledge floating around is still based on hearsay, and thus, inaccurate. It is imperative for businesses, especially the small and medium scale (SMEs) ones to understand all the aspects of the cloud before migrating their existing software or deploying new systems to cloud hosting.

In order to achieve the above, the following myths need to be busted immediately:

Well, even if it might seem to be the case on a superficial level, your small business should analyze the advantages of having a cloud infrastructure at the onset. It can be handy in the following cases:

Consider this: most of the on-premise systems are maintained by internal teams, which may or may not be suited to the job of maintaining the highest levels of security.Needless to say, cloud hosting is a better option for security of small businesses even if it may seem prone to data breaches because of its shared nature. If the paranoia over confidential data persists, the small businesses can opt for a hybrid infrastructure that stores non-important customer and employee data on the cloud, and confidential profile information and documents on-premises.

Legacy on-premise systems need regular maintenance and constant monitoring for identifying system attacks and unforeseen downtimes. Cloud hosting eliminates the need for having a full-fledged in-house operations team, and cuts down on the human resource costs. Also, cloud hosting charges are mostly subscription based with the service provider taking care of the security factors. As the cloud capacity need increases, the charges levied decrease. Hence, cloud hosting is the exact opposite of extravagant!

As mentioned above, the need for resources is minimized in a cloud infrastructure. Furthermore, the suite required for cloud management is available on nominal subscription charges from the cloud services provider. It allows data analytics dashboard, cloud scaling tools, virtual machine deployment, and application development IDEs. Hence, this is perhaps the most unfounded myth about cloud management services that is prevalent among small businesses.

As per the second point, if the small businesses are unnecessarily worried about confidentiality, they can opt for hybrid infrastructure. However, methods like two-factor authentication, in addition to mobile device management options like BYOD services, small businesses can effectively control who has access to the confidential data files. Also, geographical access limitations can be levied, if the data is such that it should not be accessed beyond office premises.

Chirag Thumar is a developer working at Technoligent. You can contact her in order to network engineer to avail the highly Cloud Management Services and other web service. He has several years of experience in the field of web development.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

Read the original post:
SMB Myth-busting 5 Misconceptions About The Cloud Bite The Dust - The Merkle

Read More..

"Improving the World" through Internet Security: Chatting with David Gorodyansky, CEO of AnchorFree – Huffington Post

The story of a Silicon Valley entrepreneur who achieved success at 23 might not raise eyebrows in 2017, but is impressive nonetheless. This is certainly the case when you consider how many companies have crashed and burned and the respective founders whove bounced around since the Internets inception. When you create a company to meet a global need, as David Gorodyansky did, and are recognized as one of Americas most promising CEOs under 35 (https://www.forbes.com/pictures/elld45jgdk/david-gorodyansky-30-anchorfree/#4ae1a8ee337a), your accomplishments are to be lauded, your persistence praised and your mission magnified. The notion that securing your Internet privacy is improving the world may be a debatable one for some, but its what Gorodyanksy set out to do when he founded AnchorFree. The software company provides Hotspot Shield, https://www.hotspotshield.com/, a downloadable free virtual private network (VPN) ensuring that web surfing data is in no way accessible to hackers. To hear him discuss his objectives you might think hes offering unlimited purified air and filtered drinking water to the world. In todays day and age however, its nearly impossible to say his passion is misdirected. Online privacy can improve your life, or at the very least...the next presidential election?

Following is my email interview with Gorodyanksy about achieving success at an early age, founding a company that meets a global need and what hes learned from meetings with Henry Kissinger and Justice Ruth Bader Ginsburg.

SHW: You began your journey knowing that a certain technology needed to be developed to combat a real problem. Tell us about identifying the unmet need, the passion that drove you and how your company stands out in the Internet privacy arena.

DG: Ever since I was really young, I wanted to create an impact and use my energy to help advance the world forward. There are so many start-up ideas that are not important. I wanted to do something that was truly valuable and focus on solving problems that impact at least a billion people. Ive always felt that we are an inherent part of the world. We cannot stand on the sidelines. We need to be involved in building the world we live in and the future we want to see.

I was 23 when I started AnchorFree to provide secure access to the worlds information for every person on the planet. Seeing how quickly our lives were becoming digital, it was clear at the time that online privacy and global connectivity to all of the worlds information would be vital. We built AnchorFrees Hotspot Shield application as a simple way for every person to protect their personal data, i.e. search history and web browsing, and to connect to global content securely without any borders or restrictions. We become the worlds largest Internet Privacy Platform, securely connecting users to friends, family, and information.

The technology we use to power Hotspot Shield is a proprietary VPN (virtual private network) since we saw that only businesses were using VPNs for secure access to their corporate environments. Hotspot Shield was created from scratch specifically to be used by the masses. In the years since, weve responded to those who tried to replicate our technology by welcoming them into our industry. We offer many competitors the opportunity to create competing VPN products using our technology. Today, many large security companies use our technology to provide VPN services to their customers. We have surpassed 500M installs of our Hotspot Shield application and are on track to reach 1B by year end 2018. We are successful because we know what were doing is right and important to the world.

Given that AnchorFree is a mission-driven company, we never log or store user data. Our perspective is to protect the users not only from the bad guys like hackers, identity thieves, websites and ISPs, but to also protect the users from their (/our) selves. We believe the best way to protect user data is to not collect it.

SW: Now that AnchorFree has taken off, what is the biggest challenge you face and how do you overcome it?

DG: There are different challenges at different stages of the companys life. At the beginning, our challenges included finding the product market fit, building the product, getting users, proving the revenue model, assembling a world class board of directors. At later stages, there are operational challenges around hiring and scale and strategic challenges around understanding the next big trends, staying relevant, and continuing to innovate.

I remember raising the first $6M in funding as a 23 year old and it felt great. At that time, I thought funding could solve all challenges but thats not the case. Weve raised $63M in total funding to date and still have challenges like hiring the right people and making sure that everybody at AnchorFree understands goals, expected results and mission. Money doesnt solve all problems. We overcome our challenges by ensuring that everybody in the company understands why they do what they do. Although were inspired by our mission, were measured on our results and the specific numbers we need to achieve. Getting the whole company to understand the WHY behind what we do really helps drive operational results. At the same time, it is important to continue to innovate and look into the future.

I once asked Henry Kissinger over dinner what his advice is for young people wanting to change the world. He answered, Dont get bogged down with what is happening now, focus on what you think will happen in the next 10 years. Every CEO is thinking of how to deliver operation results now as well as how to stay relevant in the coming years. We built a separate team at AnchorFree to focus on new products and innovations only. That team is not involved in operational aspects of the day to day business. They are creating new concepts and filing new patents. The life of a CEO is about balance and priorities and balancing operational goals with future aspirations is key.

SHW: You are 35 now, but you were 23 when this journey began and took off. Did you ever encounter difficulties or resentment due to your youth?

DG: I always felt that being a young CEO was a strength, not a weakness. When starting a company in your 20s you lack the experience, but you have a tremendous amount of energy and inspiration. When I started AnchorFree, I knew that there was a lot that I didnt know. So I put together a Board of Directors and Advisers that helped me in areas where I needed advice and guidance.

It feels great being a young CEO. There is a clear match between zest, inspiration and desire to change the world. Its great to know that youre spending your youth in a way thats important and matters. At the same time, there are challenges such as balancing work and a personal life. Any young CEO should be ready to make their start-up the key thing they do in life. This can, unfortunately, harm other aspects of life that require attention. Over the years, you get better at finding that balance, but it is harder to understand when you are in your 20s.

SHW: Are there challenges with managing older employees and coworkers or has that really been eradicated in 2017? Very often companies talk about old school methods versus new school, but with Silicon Valley and a rising number of Millennial tech geniuses in this country, is that a non-issue today?

DG: You get used to managing people of all ages and realize that just because somebody has more experience than you do, it doesnt mean they know better. I found that there are people of all ages, including older people, that have the same enthusiasm, energy and drive as people in their 20s. The personality of the individual is more important than their age. The new age of the technology industry is making people from all over the world and of all age groups more equal. Suit and tie days are dead. You have 50 year olds and 20 year olds wearing hoodies to work and instead of arguing over who has more experience or a C-level title, decisions are made based on data. Ive been proven wrong enough times by 20-year-old interns to know that it doesnt matter how old you are or what your title is. What matters is how hard you are willing to drive towards your goals, persistence, the ability to prioritize, and being both tactical /detail oriented and strategic. The best employees remember why they do what they do. Theyre also willing to devote the time towards achieving the goals and moving the Company forward.

SHW: You mentioned Henry Kissinger earlier. Can you give me some more details on the feedback you've gotten from other prestigious/famous people about your work?

DG: Ive met with three former Secretaries of State and with the US Supreme Court Justices. Im always intrigued by the wisdom that young people can gain from world leaders. Over dinner with Justice Ginsburg, I asked her what advice she would give young people. She answered, Try the door. If you get to a locked door, keep trying to open it. I asked what she thought was a key lesson she learned from being a Supreme Court Justice and she said the ability to listen. Most people are not good listeners, she explained, but lives depend on how well Supreme Court Justices listen. I found that all the world leaders and icons that Ive met had a real interest in the future and all remained young at heart. The Secretaries of State and Supreme Court Justices alike were obsessed with ideas, not things, specifically ideas about the world and the future.

SHW: Is there a motto you live by or a particular thought that inspires you?

DG: I want to solve real challenges that have the potential to impact a billion people. I want to look back at my life and see I built something that was important and mattered. I want to take part in moving the world forward. We are entering a new era where resources will no longer be limited, they will be abundant. I see the biggest challenges in the world right now around accessibility for people who cant get certain resources. AnchorFree provides access to information and privacy. Others may provide access to clean drinking water, to health care, to education, to global markets. I think providing access to important resources for citizens of the world at large is incredibly worthwhile.

SHW: Where do you see yourself in 10 years? What do you envision with AnchorFree 10 years from now?

DG: I see myself at the intersection of technology and foreign policy. I want to continue to combine idealism and pragmatic solutions to solve many of the worlds challenges. I have a huge amount of respect for projects like the XPrize and would like to see similar initiatives in more countries. I would like to help young people and entrepreneurs focus on what is important. Ideally, Ill be able to play a role in advancing the world forward and will inspire others to do the same.

I think AnchorFree is positioned to address several very big challenges over the coming years. The first is providing security and privacy for 25 billion connected devices. Everything from our refrigerators to our mattresses will become connected to the Internet. Security and privacy will extend to how we eat, sleep, exercise and will be extremely important. The second is providing secure and private connectivity to global content for the next 5 billion users that will move from feature phones to smartphones. Many of these users will need Internet Freedom and Privacy and our company is best positioned to provide these basic human rights to the next 5 billion people. I see AnchorFree as a global force that will give control over personal privacy as well as access to information back to the people.

Read the rest here:
"Improving the World" through Internet Security: Chatting with David Gorodyansky, CEO of AnchorFree - Huffington Post

Read More..

Don’t Fall For This Tech Support Scam Targeting PC Users – KTLA


KTLA
Don't Fall For This Tech Support Scam Targeting PC Users
KTLA
You can make sure your settings are up to date on that. Alternatively, you can pay for a program like Norton Internet Security. If your subscription has lapsed, that means the program can't catch the latest bugs running around the internet and that ...

and more »

Originally posted here:
Don't Fall For This Tech Support Scam Targeting PC Users - KTLA

Read More..

Yikes! Antivirus Software Fails Basic Security Tests – Tom’s Guide

Suppose that you're a feudal lord, riding high on the hog of exploiting your multitudinous peasants. Youve done so well that youve built a castle, piled high with food and wine and riches. To fend off the barbarian hordes, you invest in a drawbridge with a stout, wrought-iron portcullis.

Sounds reasonable, right? Theres only one problem: Upon further inspection, the portcullis is spotted with rust. It sticks when you try to pull it up. It's framed with rotting wood.

Credit: Serhii Kalaba/Shutterstock

The castle is your computer. The portcullis is your antivirus suite. And, according to a study released today (May 2) by Madgeburg, Germany-based firm AV-TEST, your AV software may be even more vulnerable to attack than the files it purports to protect. The company put 19 consumer antivirus suites to the test and found that only three of them seemed to be well protected from savvy potential hackers.

MORE: Best Antivirus Software and Apps

AV-TEST evaluated each program in three categories. The first measured how well each program uses address space layout randomization (ASLR) and data execution prevention (DEP). Briefly, ASLR randomizes a computer's memory allocation, making it harder for an attacker to target a particular process in a program; DEP is a Windows protocol that designates some memory as non-executable space (other operating systems do this under different names), making it harder (or impossible) for unauthorized programs to run in that space.

The second test measured whether the AV programs digitally signed their software-update files. Signing is a way of determining a files origin and authenticity; unsigned files could be more easily substituted with malicious ones.

The final test was the simplest, and determined whether an AV manufacturers delivered its software updates via the encrypted HTTPS web protocol or the unencrypted HTTP one. Lack of encryption makes it easy for an attacker to stage a man-in-the-middle attack by intercepting the data transmission, altering the data and then sending the data back on its way.

Of the 19 programs tested, three succeeded on all counts: Bitdefender Internet Security 2017, ESET Internet Security 10 and Kaspersky Internet Security 17.0. Its difficult to rank the rest of the programs, as each one succeeded and failed to varying degrees.

For example: Quick Heal Total Security 17.0, K7 Computing Total Security 15.1 and AhnLab V3 Internet Security 9.0 all did relatively poorly on ASLR and DEP protection, scoring between 76 and 36 percent of files properly protected. Avast Free AntiVirus 17.1, ThreatTrack VIPRE Internet Security Pro 2016 and Quick Heal Total Security 17.0 scored poorly on signed files, each containing between 1 and 29 unsigned files, depending on whether users installed the 32- or 64-bit version of the program.

Perhaps the most troubling results came from the HTTP vs. HTTPS results. Only six programs used a secure HTTPS server: Avira Antivirus Pro 17.1, Bitdefender Internet Security 2017, ESET Internet Security 10, F-Secure SAFE 14.1, G Data Internet Security 25.3 and Kaspersky Internet Security 17.0.

This underscores how difficult it is to rank the programs overall; a program like Symantec Norton Security 22.8 performed beautifully in two categories, but that wouldnt do you any good if you suffered a man-in-the-middle attack while trying to download or update it, as it doesn't encrypt its transmissions.

While attacking antivirus software isnt that common, and has been practiced more in theory than in fact, its effects could be disastrous. A compromised antivirus program could let malware through, sure, but whats more disconcerting is that antivirus programs require top-level privileges in the machines they protect.

A hacker who exploits an antivirus program could effectively take over a computer and, in turn, often an entire network. From there, you can kiss all of your email, social media, and financial security goodbye to say nothing of your private Internet history.

Still, AV-TEST pointed out that using an AV program, even one that has security holes, is a much better idea than using none at all. Between malvertising, phishing and good old-fashioned shady links, the internet can be a dangerous place, and everyday malware attacks are much more common than antivirus exploits. That portcullis may be rickety, but its still going to repel more invaders than an open drawbridge.

Here is the original post:
Yikes! Antivirus Software Fails Basic Security Tests - Tom's Guide

Read More..

Watch Hackers Sabotage an Industrial Robot Arm – WIRED


WIRED
Watch Hackers Sabotage an Industrial Robot Arm
WIRED
Researchers at the security firm Trend Micro and Italy's Politecnico Milano have spent the last year and a half exploring that risk of a networked and internet-connected industrial robot. At the IEEE Security & Privacy conference later this month, they ...

and more »

Read the original:
Watch Hackers Sabotage an Industrial Robot Arm - WIRED

Read More..

The FBI Director Thinks a Law Against Encryption Is Possible Under Trump – Motherboard

In the a year after the heated battle between Apple and the FBI over the iPhone of a dead alleged terrorist, the US government war on encryption has been lying somewhat dormant. But that's not because the FBI has given up on trying to change the status quo.

On Wednesday, FBI Director James Comey left the door open for a law that would require tech manufacturers like Apple or Google to come up with a way to decrypt data for the feds.

Read more: How the Government Is Waging Crypto War 2.0

"I could imagine a world that ends up with legislation saying if you are going to make devices in the United States you figure out how to comply with court orders," Comey said during a Senate hearing. "Or maybe we don't go there."

Comey's comment came after Sen. Chuck Grassley (R-IA) asked whether the FBI director still believed that it wasn't necessary to push for a law to solve the so-called "Going Dark" probleman FBI expression that refers to the rise of unbreakable encryption and how that is stumping legitimate investigations.

"It may require a legislative solution at some point."

During his prepared statements, Comey complained that the FBI has been unable to unlock and access data on more than 3,000, or 46 percent, of all the cellphones or mobile devices they had lawful authority to search during the first half of this year.

"The shadow created by the problem called going dark continues to fall across more and more of our work," Comey said, blaming the "ubiquitous default full disk encryption on devices," while at the same time saying he doesn't want backdoors.

Full disk encryption is a technology that makes it theoretically impossible to access data stored inside cellphones like newer Android phones or iPhones unless one has the decryption key or passcode. Sometimes, like in the case of the iPhone used by the alleged terrorist who killed 14 people in San Bernardino, it's possible to get around this by hacking into the phone.

"I could imagine a world that ends up with legislation saying if you are going to make devices in the United States you figure out how to comply with court orders."

In 2014, Apple made full disk encryption on iPhones a default setting, making it virtually impossible for anyone, including the company itself, to unlock or decrypt the user's data.

So is the FBI going to push for a law to solve this "big problem" as Comey put it? Maybe.

"I don't know the answer yet. I think I saidI hope I saidlast time we talked about this, it may require a legislative solution at some point," Comey said. "The Obama administration was not in a position where they were seeking legislation. I don't know yet how President Trump intends to approach this. I know he spoke about it during the campaign, I know he cares about it, but it's premature for me to say."

Some legislators didn't seem too keen on going down that road. After Comey's remarks, Sen. Orrin Hatch (R-UT) said he was convinced there was no need for a "one-size-fits-all" legislative fix, and that it'd be better for the FBI to figure things out directly with tech companies.

While Comey's remarks areas usualsomewhat vague, they once again show that the FBI considers encryption a serious problem that's preventing agents to get access to more and more devices every day. For Comey, that needs to change somehow.

Subscribe to Science Solved It , Motherboard's new show about the greatest mysteries that were solved by science.

More here:
The FBI Director Thinks a Law Against Encryption Is Possible Under Trump - Motherboard

Read More..

Want to recover a FileVault-encrypted drive without a recovery key? You’re out of luck – Macworld

One of the downsides of protecting your data from others is how easy it is to lose it all. Thank you

Your message has been sent.

There was an error emailing this page.

David S. writes asks about recovering a FileVault-encrypted drive. He says it was encrypted and then reformatted.

Is it possible to recover any data from this drive since it was previously encrypted with FileVault 2 and the keys were unfortunately wiped? Do you have any recommendations or suggestions how to decrypt the drive and recover the data?

I'll answer this in reverse order.

FileVault 2 (commonly called just FileVault) can be enabled via the Security & Privacy system preference pane, and uses a boot process that keeps the drive locked until you log in with an account allowed to unlock the drive.

Apple was clever in how this is set up. Instead of having you create an encryption key (or a passphrase thats cryptographically transformed into the actual key), macOS generates the actual key used. This is then wrapped into a protective envelope that can only be unlocked by users on the system that have been authorized to boot up the computer from a powered-off state (cold start).

The Recovery Disk, a special partition that first appeared with OS X Lion, manages this initial boot up. When you log into a FileVault-enabled account, the Recovery Disk OS takes your account password and uses that to unlock the encryption key that protects the startup volume. Its loaded into memory to decrypt and encrypt data on the fly. (You can also encrypt other attached drives via the Finder or through the Terminal, but that encryption key is derived from the password you set directly for the drive.)

The recovery key offers a last-resort method of decrypting a FileVault drive. and you can opt to store it in iCloud.

Apple creates a recovery key for your startup disk that you can use as a last resort, such as forgetting all the passwords for all the authorized accounts, or conceivably if the Recovery Disk partition were damaged or removed. You can opt to store the recovery key in iCloud protected with your iCloud account password. If you dont store it there, and you cant find the recovery key nor can you log in through the startup process, the data is truly gone forever. Apple employs a very strong encryption algorithm that stands no chance at being broken in the lifetime of our planet at current estimates, even by an owner who has full rights for everything on the drive.

Now, as for recovering a FileVault-encrypted drive thats been reformatted so that you could, say, use a recovery key, the odds seem to be me about zero. Disk Drill 3, software Macworld awarded 4 1/2 mice to last October, notes that it only has the potential to recover an encrypted drive if you can mount a partition so that it can scan the file system.

I know this last paragraph might sound like I told you so, but you should always have complete backupspreferably two different kindsof all your data, especially data on encrypted drives that are effectively impossible to recover. The backups should be encrypted, as well, but again using different means. I recommend performing routine incremental local backups cloud-based backups using software and services that allow control of encryption with keys or passphrases you specify.

Weve compiled a list of the questions we get asked most frequently along with answers and links to columns: read our super FAQ to see if your question is covered. If not, were always looking for new problems to solve! Email yours to mac911@macworld.com including screen captures as appropriate. Mac 911 cant reply tonor publish an answer toevery question, and we dont provide direct troubleshooting advice.

See the article here:
Want to recover a FileVault-encrypted drive without a recovery key? You're out of luck - Macworld

Read More..

The future of the free press is at risk: encryption is part of the solution – Huffington Post

As media leaders gather at World Press Freedom Day (WPFD), in Jakarta, Indonesia, they embark on the difficult journey of safeguarding journalists mission in an era where their freedom is increasingly at risk.

The surveillance of journalists, in particular, has profound implications for democratic institutions, including freedom of the press; it threatens their ability to confidently and confidentially collect information and opinions about important societal issues such as politics, the environment, governmental decisions, etc. Today, more than ever, journalists need to be able to research and report the news without fear of interference or surveillance.

Encryption offers a vital defense for such intrusions. All journalists, from professionals uncovering the latest national security stories to citizen reporters documenting a protest with their mobile phone, need to be aware of the risk of unencrypted communications.

Based on input by the Internet Society, the WPFD Declaration to be adopted this week should encourage the deployment of encryption to ensure trust online and to support the safety of online journalists and the confidentiality of their sources. This is an important and positive signal to the international community.

The free press is under pressure

According to Reporters Without Boarders, the overall level of media freedom constraints and violations worldwide has risen 14% in the span of five years. Just in the past year, nearly two-thirds (62.2%) of the countries measured have registered a deterioration in their situation (including in democracies), while the number of countries where the media freedom situation was good or fairly good fell by 2.3%.

This happens in a context where reporters can be victims of government orders to shut down media websites or blogs in the name of national security or public order. But the pressure on journalists can be even higher. In some countries, using encryption is a risk in itself. For example, in 2015, three journalists from Vice Magazine were imprisoned for the reported use of encryption software.

Surveillance and violations of the confidentiality of sources have contributed to the decline of media freedom worldwide. The consequences are profound, including selfcensorship in democratic societies. In the United States, a study by Pen America showed that 16 per cent of writers avoided talking about certain topics as a result of government surveillance.

Encryption is the solution

Reporters often have multiple assignments and little time. When faced with choice, they may choose convenience over investing time in technical skills to secure their communications.

Yet, the consequences for a journalist to be under surveillance or hacked can be disastrous: losing years of research; sources whose online identity got compromised; and reporters who were physically attacked because an adversary intercepted their communications and discovered the subject of their investigations.

Tech-savvy, investigative reporters or those who focus on national security stories routinely use end-to-end encryption to protect the confidentiality of their communications so that not even the company that delivers the messages can read them. Many use tools like Signal on their smart phones and/or encrypt their email. They are careful about restricting app access to geolocation data, ensuring their devices are encrypted, and deploying a whole host of tools and techniques for better security and privacy in both their professional and personal lives.

But the need for better security doesnt just apply to investigative reporters. All journalists have a responsibility to protect themselves and their sources. Even run-of-the-mill reporting could make journalists a target.

There is support out there

Organisations like the Committee for the Protection of Journalists, Reporters Without Borders and the Electronic Frontier Foundation offer security toolkits and guidance on how to encrypt devices and communications.

Furthermore, following the Snowden revelations, some major Internet companies stepped up and offered encrypted services. As a result today, more than half the web is now encrypted over HTTPS, many suppliers offer device encryption, and some messaging services such as Whatsapp have adopted end-to-end encryption.

The Internet technical community is also playing an essential role in supporting encryption on the Internet for everyone. The World Wide Web Consortium (WC3) and the Internet Engineering Task Force (IETF) are working hard to make encryption the norm for web communications and for the protocols that enable information to flow on the Internet.

Some recent developments include:

Governments have a role too. We invite them to adopt the SecureTheInternet principles and to support strong encryption, not only to ensure the safety of journalists, but also as a technology that already allows us to do our banking, conduct local and global business, run our power grids, operate communications networks, and do almost everything else.

As we celebrate World Press Freedom Day, we must remember that journalists and their sources are taking enormous risks right now in making sure crucial stories get told.

In today's environment, where trust in online information is at an all-time low, we need free, safe and independent journalists more than ever. We all have a role to play, and encryption is one step to take us there.

Visit link:
The future of the free press is at risk: encryption is part of the solution - Huffington Post

Read More..

Danalock V3 adds military-grade AES256 encryption – SlashGear

As homes start to get smarter, the need to protect the people and hi-tech devices inside also gets stronger. When it comes to smart home security, however, there is almost always a compromise between ease of use and strength of security. Danalock, who has been making smart locks for years now, offers a solution. The third version of its smart lock product, the Danalock V3 offers the same ease of installation, speed of reaction, and remote convenience while, at the same time, utilizing the same level of encryption used by government.

Its a fact of life that almost any device these days can be hacked. From computers to phones to even cars, nothing is sacred to less scrupulous elements of society. That fact perhaps makes having a smart door lock even more frightening. That is, unless you use the right tools for the job, as Danalock seems to suggest.

Danalock V3 uses the 256-bAdvanced Encryption Standard, more popularly known in the industry as AES256. This is the same encryption technology used by government and military to keep documents secret. Of course, AES256 is also used by many security and privacy software. In the Danalock, the AES256-protected lock code is stored in a TPM chip, ensuring that it cannot be hacked.

Despite being super hardened, the V3 still offers the conveniences of a hi-tech security system, particularly with remote access. Using Bluetooth, it can detect if the owner is approaching and can be set to automatically unlock the door. A time saver when your hands are rendered useless by groceries. In addition to Bluetooth, the new Danalock also supports Apple HomeKit, Zigbee, and Z-Wave wireless connectivity.

The Danalock V3 is now available directly from the companys website for $149 a piece. Buyers can choose from a variety of locks to match common door locks in their particular market but, other than that, the Danalock V3 installation is the same, regardless of your location.

Read the original here:
Danalock V3 adds military-grade AES256 encryption - SlashGear

Read More..

Doing The Math For Better Encryption – Signal Magazine


Signal Magazine
Doing The Math For Better Encryption
Signal Magazine
Scientists at the University of Texas at Austin have delivered a mathematical revelation that could bring a number of benefits, but improved encryption tops the list. Cybersecurity, of course, depends on encryption, which relies on random data ...

Here is the original post:
Doing The Math For Better Encryption - Signal Magazine

Read More..