Page 4,400«..1020..4,3994,4004,4014,402..4,4104,420..»

4 Stocks Set to Trump Earnings in the Technology Space – Investorplace.com

Technology has been one of the best-performing sectors in 2017. The Technology SPDR(NYSEARCA:XLK) has returned 9.1% as compared with S&P 500s gain of 5.2% on a year-to-date basis. (Read More: 5 Hottest Tech ETFs of 2017)

The sector is well poised to flourish driven by improving macro-economic conditions in the U.S and global markets. The rebound in U.S. economy, as evident from an improvement in GDP numbers, the Consumer Confidence Index, unemployment rate and factory activity data presents significant growth opportunity for Technology stocks.

Moreover, sector-specific factors like rapid adoption of cloud computing, growing demand for Artificial Intelligence (AI) applications and expanding usage of Internet of Things (IoT) at home, office and car are key catalysts.

The rapid evolution of hybrid cloud (combination of on-premise servers and public cloud servers) is an important factor behind the adoption of cloud computing among enterprises, primarily due to faster data transfer and heightened privacy. Per Gartner Organizations that adopt hybrid infrastructure will optimize costs and increase efficiency.

Per MarketsAndMarkets projections, the hybrid cloud market is estimated to grow at CAGR of 22.5% over 2016-2021 time frame. In dollar terms, the market will grow from $33.28 billion in 2016 to $91.74 billion by 2021.

Meanwhile, demand for AI-based applications has gained immense popularity among enterprises owing to its positive effects on operations. According to Accenture (ACN) AI-based technologies is projected to boost labor productivity by up to 40% by fundamentally changing the way work is done and reinforcing the role of people to drive growth in business.

The advancement in AI tools and related applications like Big Data analytics, Natural Language Processing (NLP), Machine Learning and Deep Learning are primarily responsible for AIs massive growth projections. Per MarketsAndMarkets data, the overall AI market is anticipated to be worth $16.06 Billion by 2022, growing at a CAGR of 62.9% within the 2016- 2022 time frame.

Projections for IoT are also significantly bullish. According to Forbes, which quoted BCG data, spending on IoT technologies, apps and solutions will reach almost $267 billion by 2020.

The technology space continues to be investors favorite owing to its dynamic nature. The improving macro-environment, solid underlying fundamentals and impressive growth opportunities have been primarily responsible for the sectors earnings momentum, which is expected to persist in the first quarter.

According to the latest Earnings Preview, the sectors total earnings are expected to grow 10.7% from the same period last year on 6.2% higher revenues. This is higher than 9.2% earnings growth witnessed in fourth-quarter 2016 on a 5.6% increase in the top line.

With the existence of a number of industry players, finding the right stocks that have the potential to beat earnings could be a daunting task. Our proprietary methodology, however, makes it fairly simple for you. You could narrow down the list of choices by looking at stocks that have the combination of a favorable Zacks Rank #1 (Strong Buy), 2 (Buy) or 3 (Hold) and a positive Earnings ESP.

Earnings ESP is our proprietary methodology for determining stocks that have the best chance to surprise with their next earnings announcement. It provides the percentage difference between the Most Accurate estimate and the Zacks Consensus Estimate.

Our research shows that for stocks with this combination, the chance of a positive earnings surprise is as high as 70%.

Lets take a look atfour technology providers that have the right combination of elements to post an earnings beat this quarter:

Next Page

Read this article:
4 Stocks Set to Trump Earnings in the Technology Space - Investorplace.com

Read More..

How much cloud computing are consumers going for? – Jordan Times

How much cloud computing are consumers going for?
Jordan Times
It is worth stopping, thinking and taking stock of the current cloud computing situation, mainly among consumers. If pundits estimate that the phenomenon as it is known today was launched circa 2006, it is only since 2011 that the wide public has ...

See the original post:
How much cloud computing are consumers going for? - Jordan Times

Read More..

Cloud computing is bigger than AWS and Azure – The Register

Research To some, cloud computing is synonymous with so-called public cloud services such as AWS and Azure, but this isnt the view of Reg readers. When 668 of you provided feedback during a recent survey on meeting infrastructure-level needs, the adoption of private cloud (defined as cloudy architecture running in your own datacentre) was what came through most prominently:

Whats also clear from this picture is that evangelical claims of everyone now having a cloud first strategy greatly overstate the level of commitment out there. Many organisations are still in the investigation or planning stage in relation to different types of cloud and use cases, and while most of the remainder are open-minded in each area, a significant level of scepticism persists.

Looking at adoption in a different way, we see that all those phrases suggesting a rapid market shift cloud explosion, stampede to the cloud, etc. are also considerably overstated. The reality is that adoption over the last five years or so would be better characterised as a slow burn:

The other key observation is that even when you look across all the use cases listed above (as that last chart does), there are still quite a few organisations yet to do anything meaningful with infrastructure-level cloud, particularly in relation to public cloud services.

Implicit in the data presented is the notion that most organisations active with cloud are mixing and matching solutions and services: generally speaking, the requirement to support hybrid environments came through very strongly. This leads to the need for a range of capabilities that enable harmonious and efficient coexistence of different cloud flavours. An example that clearly illustrates this is workload migration:

The same principle of aiming for coherency across all the internal and external clouds you use applies to management and monitoring, access security, data protection, application integration, and all of the other things that are important for maintaining integrity and flexibility, and preventing runaway costs and risks.

And as illustrated on the chart, when thinking about this we need to interpret the word hybrid in its broadest sense. Its not just about getting on-premise systems working together with hosted services, its about acknowledging the reality of dealing with multiple cloud environments and instances running in your own datacentre, while simultaneously exploiting multiple public cloud services, and even those more traditional forms of infrastructure and hosting.

This is where the latest generation of private/hybrid cloud solutions come into play. The idea of these is to create a platform or framework that provides on-premise cloud capability in its own right, but also represents a single point of coordination for effective management and operation of the various clouds you adopt. Get it right, and the result is freedom and flexibility, e.g. to move workloads around freely and make sure a given application is always running in the most appropriate cloud, based on its performance characteristics, compliance requirements, economics, and so on.

Of course, this is easier said than done, particularly in a larger and more complex environment where you will generally end up with more than one hybrid cloud platform. Even then, however, its better to have a discrete number of properly managed hybrid setups than a sprawling, disjointed mishmash of private and public cloud instances, which is the obvious danger, given the way many organisations are headed.

The good news and the bad news is that the IT vendor community have pretty much all gone hybrid cloud crazy at the moment, which means lots of choices, but also lots of hype and spin to work through. At the 40,000 feet level, one of the big debates is whether you should take a pure software-based approach to building your hybrid environment, or take advantage of the growing range of pre-integrated hardware/software stacks or appliances. When considering this question, Reg readers who have a firm preference tend to lean towards the software-based approach, though the most common view is that you should keep your options open because requirements will vary:

The other big question is whether you should turn to virtualisation platform incumbents such as VMware and Microsoft, or give a chance to newer players, who claim to approach the problem with a fresh mindset and no baggage. This isnt an easy decision as there are pros and cons in each direction:

What most readers agree on, however, is that whichever way you go, it makes sense to structure and pace your hybrid-cloud activity in a proactive but considered manner:

And so the slow burn of cloud computing adoption continues, though we hope in a more joined up and organised way.

If you are interested in seeing the complete set of findings from the study, and reading a more in-depth discussion of hybrid-cloud practicalities, you can download the full research report here.

Read more:
Cloud computing is bigger than AWS and Azure - The Register

Read More..

Hacked Dallas sirens get extra encryption to fend off future attacks – Computerworld

Thank you

Your message has been sent.

There was an error emailing this page.

By Matt Hamblen

Senior Editor, Computerworld | Apr 11, 2017 2:37 PM PT

Dallas city officials have added extra encryption and other security measures to the outdoor warning sirens hacked early Saturday.

The hack also prompted the city to evaluate critical systems for potential vulnerabilities, City Manager T.C. Broadnax said in a statement late Monday. City officials are reviewing security for financial systems, a flood warning system, police-fire dispatch and the 911/311 system.

Broadnax told reporters separately on Monday that the hack came over a radio frequency and not over a wired computer network. The attack was "not a system software issue; it was a radio issue," he told the Dallas Observer and others.

The city believes the hack came from the Dallas area, but officials haven't detailed how it occurred. Dallas police are working with the FBI and the Federal Communications Commission (FCC) to validate what they think happened and find the source. The hack caused all 156 emergency sirens to activate for about 90 minutes, scaring some residents and doubling the number of calls to 911.

Radio security experts theorized the incident may have been a simple "replay attack" where the hacker recorded the radio signal sent out on April 5 at noon as part of a monthly test of the emergency siren system. Then, the hacker could have played that signal back repeatedly early Saturday. It would take a hacker with a software defined radio (SDR) or other off-the-shelf radio frequency test equipment to pull off the attack, said Chris Risley, CEO of Bastille Networks, a company that remediates radio frequency vulnerabilities.

Frequencies used for outdoor sirens are public and are managed by the FCC. Various security techniques, including encryption, are used to protect signals sent by radio.

Even if a "replay attack" was not used, the regularly scheduled siren test would allow an attacker to make multiple recordings of the "activate sirens" radio stream over several months and then analyze it for specific commands to trigger the alert, he added. SDRs are becoming cheaper and more capable and there is an abundance of open source software that can decode activation protocols.

Risley said other cities are probably just as vulnerable as Dallas.

The Dallas incident highlights how vulnerable and unprotected U.S. enterprises and government authorities are, said Matt Little, chief product officer for encryption provider PKWare. "Traditional security perimeters are breaking down. This attack reaffirms how necessary encryption is," he said.

Many siren systems are decades old and Dallas may have been relying on low-level encryption, perhaps even 64-bit encryption based on the Data Encryption Standard (DES) from the late 1970s, he said.

"Sirens are analogous to a lot of aging critical infrastructure that was built for high availability, and always has to be online, so security took a back seat to that," Little said.

Dallas may have decided after the hack to upgrade encryption or improve the authentication system regarding who gets access to encryption keys, Little said.

In the Dallas case, a hacker could have listened to the low-level encrypted activation signal sent to sirens for some time, then used a brute force attack to figure out the encryption key needed. "It seems to be a large brute force effort to compromise a signal tower," Little said.

In some ways, radio-controlled systems like a siren warning system with even weak encryption could actually be more secure than some Internet-connected devices with no encryption, he said. For example, unprotected cameras connected to the Internet that were attacked by the Mirai botnet were used in a coordinated D-DOS attack on Dyn servers last October. The result: widespread Internet outages.

Senior Editor Matt Hamblen covers mobile and wireless, smartphones and other handhelds, and wireless networking for Computerworld.

Sponsored Links

More:
Hacked Dallas sirens get extra encryption to fend off future attacks - Computerworld

Read More..

Why we need to encrypt everything – InfoWorld

If you've been paying attention lately, you've likely noticed that more of your everyday websites are going HTTPS by default: Twitter, Facebook, LinkedIn, and even your favorite search engine.

This is a good development. For years, critics have derided default, widespread HTTPS encryption and authentication as unnecessary and performance-wasting. But now that we've seen most of the biggest websites go HTTPS, led by Google, the world is finding out it isn't such a bad idea.

In fact, it's great. It's time for us to go all the way and encrypt and authenticate everything!

At a time where the U.S. Congress is allowing ISPs to continue spying on users' private sessions, we need default HTTPS to protect our privacy. We need to incorporate security and privacy protections in all our communications, whether over the internet, telephone, cable, mobile phones, instant messaging -- any form of networked communications. We should demand constant protection of all that. It's the only way to make the internet truly more secure and private.

Computer security students use the acronym of CIA -- aka "confidential, integrity, availability" -- to describe why computer security is needed.

Confidentiality refers to keeping information from being seen by unauthorized parties. Integrity means making sure a person or computer is who they say they are (or that content has been unmodified since it's intended distribution). Availability is ensuring that a computer asset is accessible to authorized parties, thanks to such practices as preventing denial-of-service attacks.

We should apply the security CIA triad to all computing and network communications. That doesn't mean we have to apply the strongest and most expensive security to everything; security measures should be commensurate with data they protect. You wouldn't protect a website containing public information as strenuously as you'd protect weapon systems or classified information. But in general, all websites and services should have some basic level of encryption and integrity.

Conventional wisdom dictates that protecting assets and content that don't seem to demand strong computer security is wasteful, unnecessary, and performance-killing. As a result, only content that supposedly needs better protecting receives it. What we end up with is a hodgepodge of protection, often within the same site or service.

We're all accustomed to connecting to banking websites that start off unprotected, then switch to protected for a logon or transaction, often with single pages that contain a mix of protected and unprotected content. Sometimes it's hard to determine which is which. The complexity of sustaining differing levels of protection on the same site is confusing to us and our browsers.

As it turns out, it's simply easier for developers, browsers, and users to protect everything all the time.

I liken it to file-based encryption. With file-based encryption, either you or the system encrypts files on a file-by-file or folder-by-folder basis. This supports the idea that only certain items need to be protected. But file-based encryption almost always fails as true protection over the long run. Objects that should be protected don't get protected. Sensitive data leaks out. A simple application crash can leave confidential data exposed. Moreover, it's difficult to remove all confidential data even if you try, especially in today's growing world of memory storage media (which doesn't even let the operating system choose what data to delete or encrypt).

Volume- and disk-based encryption is becoming the norm. You turn it on, and every file, every data bit remnant is protected by default. This approach makes an unintended data reveal much less likely, and usually the protection is invisible to the user. We need to take lessons learned in the storage arena and apply them to the rest of the world. Widespread, default, pervasive protection works best.

Getting rid of all HTTP connections and moving to (or even requiring) HTTPS is a good way to start. HTTPS gives us encryption and integrity during network transmission. We need to require default, total media encryption on all disks and storage media. No USB key or camera memory card should be without it.

We also need to move from one-factor authentication to two-factor (or greater) authentication. Stronger authentication doesn't prevent all attacks, but it stops the phishing of credentials, which is very prevalent right now.

It's also important to authenticate all content to protect its integrity, although this flies in the face of conventional thinking. Why protect content anyone can acquire? Mainly because it's easier to encrypt everything, but also because all content needs integrity protection.

Suppose a government agency offers public documents that anyone can have, use, and share. It's important that what users download and share is authentic. You don't want someone changing a public document to say something else and disseminate it as if it were the genuine article.

You might argue that many documents, where the original author or distributor doesn't mind any modification, shouldn't be integrity-protected. Again I'll argue that it's easier, more accurate, and cheaper to protect everything than singling out winners and losers.

Even availability issues need to be worldwide. You might think it's OK for your site or service to go down, but in today's world, you never know what upstream or downstream entity is integrating with your offering. Besides, almost everything in the cloud is redundant already, and it's cheaper to protect everything rather than a few bits.

It's inevitable that enabling security universally, such as HTTPS or default encryption, will break some objects, especially those that were built before these security options were available or pervasive. So what? Welcome to the real world. If something breaks, it's time to fix it or forget it. Pervasive computer security shouldn't be held back by dinosaur apps and services.

All spies dislike the idea of pervasive encryption and other security protections. Again, so what? The ability to protect our personal privacy should trump any other societal need.

I and millions of others don't buy that government must be able to infiltrate every digital transaction to protect society from criminals and terrorists. Let me be clear: We are willing to put up with the idea that pervasive security makes it harder for law enforcement to do its job.

That said, I'm not suggesting that default, pervasive security is a panacea. If a bad group successfully breaks into your computer or into a website, it can pretty much do anything it wants, including disabling default security.

But having good security always turned on as default means even those events are less likely to happen. Requiring seat belts in cars and helmets on motorcycle riders doesn't stop car or motorcycle deaths. But it absolutely, significantly reduces the number of deaths and horrible, disabling injuries.

The internet and every device connected to it will one day have built-in, pervasive security, turned on by default. It's already happening. I want us all to recognize it, hop on the bandwagon, and get it done. It's the only way the internet has a chance to be significantly more secure.

Read more here:
Why we need to encrypt everything - InfoWorld

Read More..

Can we encrypt the web while giving governments a backdoor to snoop? – SC Magazine UK

It's a choice between privacy and law enforcement

As SC Media reported yesterday the Internet Society has called upon G20 nations to ensure ubiquitous encryption of the web.

The president and CEO of the Internet Society, Kathryn Brown, has gone on record to state that encryption should be made stronger and universal, not weaker.

Some have taken this as a call to encrypt everything online, however in her Securing our Digital Economy' statement Brown says, Strong encryption is an essential piece to the future of the world's economy and the Internet Society believes it should be the norm for all online transactions.

Brown also mentions how rather than being recognised as a way to secure online transactions, or conversations, the debate too often focuses on the use of encryption as a way to thwart law enforcement.

Which got us thinking here at SC Media UK, would it actually be technically possible to encrypt the entire web and perhaps a little more controversially could this be achieved in a way that enabled decryption to facilitate criminal and national security investigations?

Yes, we know, one country's terrorist is another's journalist, but considering the ongoing global clamour for encryption backdoors we wondered how technically feasible it might be at an internet-wide scale?

As always, we turned to the cybersecurity industry itself for some answers:

Neil Cook, chief security architect at Open-Xchange, welcomed the Internet Society comments and reckons that universal encryption should not only be possible, but mandatory for web traffic, communications and data at rest. We cannot let the actions of a small minority of people compromise the security and privacy of everyone else by weakening the encryption we all rely on to keep us safe and our data private, he says.

Which, while admirable, doesn't get us any closer to the technical feasibility point. Dan Panesar from Certes Networks ponders whether that's because it's not actually possible. In practical terms, it would need to focus on utilising secure connections to everything, rather than blanket encryption of the entire web, Panesar says. Blanket web encryption would almost create more problems than it solves, slowing the internet and causing serious functionality problems.

Chris Hodson, EMEA CISO at Zscaler, is more positive about whether it can be achieved technically. In a word, yes, he told SC Media. Though encryption remains only part of the security puzzle. Front loading the internet with the silver bullet' of encryption only serves to protect information in transit between two parties and does not maintain security hygiene overall.

As Hodson adds, encryption is only actually valid against those who shouldn't have access to data. Encrypted information is still accessible if a hack is undertaken via legit' means such as the spear-phishing of an admin account.

Mark James, security specialist at ESET, agrees that it's a nice thought but says that while in theory it would enable private communication of all personal data, in practise with so many parts operated, owned and channelled through so many gateways it's a job that's seems highly unrealistic to achieve.

Javvad Malik, security advocate at AlienVault, prefers to try and break the problem down into component parts of which, he told us, there are primarily three:

Areas of the web that absolutely should be encrypted and active efforts should be made to increase the security. For example, with it comes to online banking transactions there should be no margin for doubt.

Areas of the web that need privacy and security, but could co-operate with law enforcement without undermining the security model. For example, a cloud provider that holds the encryption keys, or that can create additional access accounts can provide access. This is more common in SaaS type scenarios.

The real pain points which involves all those apps that need to be secured and have no easy way to intercept. This is where apps like WhatsApp sit which offer end-to-end encryption and even the service provider should not be able to access the data.

Lee Munson, security researcher at Comparitech, moved on to our secondary question, that of law enforcement access to encrypted communications.

For them to gain access to encrypted traffic there would be a need to share keys which, by definition, removes the encryption, Munson explains. While this could be controlled in such a manner that no third-party gains access to those keys, experience has told us that as soon as you slip a backdoor of any kind into an encrypted medium, some unauthorised person or group will find a way to leverage it for their own purposes.

High-Tech Bridge's CEO, Ilia Kolochenko, was equally perplexed by this at a technical level. It's technically impossible to design an encryption that good guys could break, while bad guys could not, he says. Even if we do develop such an algorithm one day, the bad guys will hack the good guys and decrypt all your data.

His answer then? That we need to make a choice between privacy and law enforcement. But then again, as Javvad Malik pointed out, the way currently encryption works, I'm not aware of a way that the communication can be kept secure but access allowed; not unless the laws of mathematics can be changed

We will leave it to the Venafi chief cyber-security strategist, Kevin Bocek, to swing the debate back around to commerce and the digital economy.

Encryption is key (no pun intended) to the system of trust which underlies the security of every machine on the Internet, of that there's no doubt. There is no replacement so we really need to continue to make this system work, Bocek told SC Media.

Machines have to be able to know which machine they are taking to, they need privacy, he explained. This goes beyond enabling ecommerce and online banking all machine identities need to be protected and to do this we need encrypted and private communications.

This, argues Bocek, is why our IoT-driven future, where decisions are made and business is conducted in the cloud through machines, needs encryption. If government wants to have an e-enabled, information society of the future, he concludes, encryption is a required ingredient, not an optional one that can be picked up or put down at will.

Visit link:
Can we encrypt the web while giving governments a backdoor to snoop? - SC Magazine UK

Read More..

Make Encryption Ubiquitous, Says Internet Society – Infosecurity … – Infosecurity Magazine

The Internet Society has urged the G20 not to undermine the positive role of encryption in the name of security, claiming it should provide the foundation of all online transactions.

As the worlds leading economies met in Hamburg late last week, president and CEO of the non-profit, Kathryn Brown, called for ubiquitous encryption for the internet.

That comes amid a resurgence in encryption-bashing from some senior politicians, which have portrayed it as enabling terrorism in the wake of recent attacks in London and elsewhere.

Most notably, UK home secretary Amber Rudd went on the offensive, naming and shaming Facebooks WhatsApp for its use of end-to-end encryption.

Rudd and others around the world want to force tech firms to effectively create backdoors for law enforcers, so they can be used to intercept communications of suspects under investigation.

Even the historically more liberal European Commission recently claimed it was considering such a strategy.

However, the Internet Societys Brown argued that encryption should be made stronger and universal, not weaker.

Strong encryption is an essential piece to the future of the worlds economy and the Internet Society believes it should be the norm for all online transactions. It allows us to do our banking, conduct local and global business, run our power grids, operate, communications networks, and do almost everything else, she wrote.

However, rather than being recognized as the way to secure our online transactions or our conversations, all too often the debate focuses on the use of encryption as a way to thwart law enforcement. To undermine the positive role of encryption in the name of security could have devastating consequences.

Kevin Bocek, chief cybersecurity strategist for Venafi, agreed with the Internet Society, adding encryption was particularly important as we move to a world dominated by AI.

Machines have to be able to know which machine they are taking to they need privacy. This goes beyond enabling ecommerce and online banking all machine identities need to be protected and to do this we need encrypted and private communications, he added.

This is why our IoT-driven future, where decisions are made and business is conducted in the cloud through machines, needs encryption. If government wants to have an e-enabled, information society of the future, encryption is a required ingredient, not an optional one that can be picked up or put down at will.

The G20 has for the first time decided to hold ministerial meetings focused specifically on digital policy areas, and is also inviting non-governmental stakeholders to contribute, offering a great opportunity for a more balanced debate, Brown argued.

However, it remains to be seen whether Browns words will be heeded, especially as voters, politicians and headline writers appear to have little appetite to grasp the nuances of the argument for encryption.

A survey by Cable.co.uk last week revealed that most of the British public would feel safer without encryption.

A meeting of digital ministers in Dsseldorf last week appeared to focus mainly on global internet speeds and accessibility.

Visit link:
Make Encryption Ubiquitous, Says Internet Society - Infosecurity ... - Infosecurity Magazine

Read More..

Internet Society tells G20 nations: The web must be fully encrypted – The Register

The Internet Society has called for the full encryption of the internet, decrying the fact that securing the digital world has increasingly become associated with restricting access to law enforcement.

In a blog post aimed at the leaders of the G20 economies, ISOC CEO Kathryn Brown argues that the digital economy "will only continue to thrive and generate opportunities for citizens if the Internet is strong, secure, and trusted," adding: "Without this foundation, the global digital economy is at risk."

The G20 will meet in Hamburg in July and one of the main agenda topics is the "spread of digital technology" and its impact on economic growth. Notably, there will be a "digital affairs ministers conference" for the first time at the summit, and the importance of the topic was highlighted with a special two-day preparatory meeting last week attended by "ministers in charge of digitalization."

"Germany wants them to agree to a concrete plan one that includes affordable Internet access across the world by 2025, common technical standards and a focus on digital learning," wrote Brown at the conclusion of that prep meeting, presumably having been briefed on discussions.

The post gives some figures on the digital economy 360 million people; 28 per cent of output is digital; the internet contributes $6.6tn a year before getting to the point: interconnection and security.

"The truth is that economies can only function within a secure and trusted environment," Brown notes, "which brings us to encryption."

Internet engineers have long been strong advocates of increased online security (something that has been difficult since the internet's earliest building blocks largely ignored the idea of malicious activity), and the Internet Society reflects that belief back: "Strong encryption is an essential piece to the future of the world's economy and the Internet Society believes it should be the norm for all online transactions. It allows us to do our banking, conduct local and global business, run our power grids, operate communications networks, and do almost everything else."

Brown goes on: "Encryption is a technical building block for securing infrastructure, communications and information. It should be made stronger and universal, not weaker."

But then she also notes that in the past year, the issue of encryption has become intricately tied up with the issue of law enforcement trying to gain access to people's communications and being unable to do so.

In the lead-up to the US presidential election, the fight between the FBI and Apple over the phone of San Bernardino shooter Syed Farook became a hot topic. Politicians and law enforcement called for a backdoor (or even a frontdoor) to the latest encryption efforts, and tech companies, security bods, civil society and some federal agencies called that notion "magical thinking" because any hole introduced into encryption software is an exploitable hole that anyone can use and abuse.

Last month, the issue re-emerged following an attack in London, when the UK home secretary Amber Rudd specifically criticized Facebook-owned WhatsApp for not providing access to the app-based conversations of attacker Khalid Masood.

Just days later, EU Justice Commissioner Vra Jourov said she would introduce legislation to make it easier for law enforcement to gain access to encrypted apps' data. That followed calls from French and German ministers for ways to access encrypted comms.

However, following a now-familiar backlash to such calls from cybersecurity experts, Rudd then downplayed her call for access to encrypted communications. Jourov's department insisted she did not mean to imply the legislation would cover encryption only access to data stored in the cloud by encrypted apps (which presumably she expects to be unencrypted).

ISOC CEO Brown is not happy about how this conversation is defining the debate around encryption. "Rather than being recognized as the way to secure our online transactions or our conversations, all too often the debate focuses on the use of encryption as a way to thwart law enforcement," she complains, arguing: "To undermine the positive role of encryption in the name of security could have devastating consequences."

The Internet Society is usually diplomatic to the point of saying nothing, so when its CEO says, "we should recognize that encryption is key to the future digital economy and stop treating it as simply an obstacle to law enforcement," it is clear that the level of frustration among internet engineers is high.

Hammering the point home, she adds: "We need to deconstruct the issues faced by law enforcement and policy makers and agree together how we can achieve a trusted digital economy underpinned by encryption."

ISOC clearly sees July's G20 Summit as the best opportunity to address that concern, with Brown calling it a "turning point that should not be missed." And its position is stated simply: "The Internet Society calls for ubiquitous encryption for the Internet. We strongly believe that this is the best foundation for trust in the digital economy, and we urge the G20 nations to stand behind encryption."

Whether that technical message makes it past the politics of terrorism is going to be hard to discern, but there is little doubt that a more secure online environment is going to be a healthier one financially and ISOC and others will be hoping that money talks louder than fear.

Read this article:
Internet Society tells G20 nations: The web must be fully encrypted - The Register

Read More..

Lack of encryption led to Dallas siren hack – WFAA

Dallas sirens hacked through radio frequencies

Landon Haaf and David Goins , WFAA 7:19 PM. CDT April 10, 2017

DALLAS - The city of Dallas confirmed Monday that a lack of encryption of the signal transmitted to 156 sirens led to the hack that kept Dallas residents awake late Friday and early Saturday.

City spokesperson SanaSyed confirmed to News 8 that city personnel had not set the system to use an encrypted signal before the sirens were activated for nearly 90 minutes.

Dallas City Manager T.C. Broadnaxtold reporters earlier Monday that the hack was accessed through the use of radio frequencies, and not remotely through computer software.

"The issue was with how we transmitted our information and weve worked to close those gaps,Broadnaxsaid.

All of the 156 outdoor warning sirens went off, starting at 11:42 p.m. Friday and lasting more than 90 minutes. City officials said Saturday that an apparent hack caused the sirens to go off, after first saying it was simply a system malfunction.

"The issue was with how we transmitted our information and weve worked to close those gaps, Broadnax said.

UPDATE: #Dallas sirens were not hacked via "computer software. This was a radio issue" says Broadnax. @wfaachannel8 pic.twitter.com/gXjS0kEBjV

On Monday, the Dallas office of emergency management said in a YouTube video that the system was fully operational.

If we had to activate the system at any point in time, we safely could do that to alert our residents and guests of any severe weather or impending hazard, Dallas OEM staff member Kevin Oden said in the video.

Severe storms with the threat of hail and damaging winds are expected in the area Monday afternoon and evening.

Broadnax made his statement at the start of the Public Safety Committee meeting Monday.

Council member Philip Kingston made a motion to enter executive session -- a closed meeting -- to discuss the siren hack, and despite a unanimous vote in support, committee chair Adam Medrano opted not to after advice from the city attorney.

"I'm advising you not to do that" - #Dallas city atty on going into closed session on siren malfunction - says item hasn't been posted

InsteadBroadnaxwill present more information on the hack to the full council onWednesday, but confirmed DPD and the FBI are leading the investigation.

We need to improve but someone intruded in our system," Broadnax said. "So had they not done something that is illegal, then in fact the notification and the issues wouldnt have occurred. Well own what we need to own and that is well work to improve our system. Weve already done that over this weekend.

2017 WFAA-TV

WFAA

Council member wants update on Dallas siren hacking

WFAA

Hackers prompted sirens to go off across Dallas area

View original post here:
Lack of encryption led to Dallas siren hack - WFAA

Read More..

The Sublime Moves Of America’s New Chess Champion – FiveThirtyEight


FiveThirtyEight
The Sublime Moves Of America's New Chess Champion
FiveThirtyEight
So found the best move, according to the computer chess engine Stockfish: sacrificing his knight on the f2 square. It's far from obvious to a human sitting alone without technological aid, however. Commentators called the gambit very beautiful ...

and more »

Read the original:
The Sublime Moves Of America's New Chess Champion - FiveThirtyEight

Read More..