Page 11234..1020..»

The view of quantum threats from the front lines – JAXenter

The future is here. Or just about. After a number of discoveries, researchers have proven that quantum computing is possible and on its way. The wider world did not pause long on this discovery: Goldman Sachs, Amazon, Google, and IBM have just announced their own intentions to embark on their own quantum developments.

Now that its within our reach we have to start seriously considering what that means in the real world. Certainly, we all stand to gain from the massive benefits that quantum capabilities can bring, but so do cybercriminals.

Scalable quantum computing will defeat much of modern-day encryption, such as the RSA 2048 bit keys, which secure computer networks everywhere. The U.S. National Institute of Standards and Technology says as much, projecting that quantum in this decade will be able to break the protocols on which the modern internet relies.

The security profession hasnt taken the news lying down either. Preparations have begun in earnest. The DigiCert 2019 Post Quantum Cryptography (PQC) Survey aimed to examine exactly how companies were doing. Researchers surveyed 400 enterprises, each with 1,000 or more employees, across the US, Germany and Japan to get answers. They also conducted a focus group of nine different IT managers to further reveal those preparations.

SEE ALSO:DevSecOps Panel Best DevOps Security Practices & Best Tools

An encouraging development is that 35 percent of respondents already have a PQC budget, and a further 56 percent are discussing one in their organisations. Yet, many are still very early in the process of PQC planning. An IT manager within a manufacturing company said, We have a budget for security overall. Theres a segment allotted to this, but its not to the level or expense that is appropriate and should be there yet.

The time to start preparing, including inquiring of your vendors readiness for quantum computing threats, is now. One of the respondents, an IT Security manager at a financial services company, told surveyors, Were still in the early discussion phases because were not the only ones who are affected. There are third party partners and vendors that were in early discussions with on how we can be proactive and beef up our security. And quantum cryptology is one of the topics that we are looking at.

Others expanded upon that, noting that their early preparations heavily involve discussing the matter with third parties and vendors. Another focus group member, an IT manager at an industrial construction company, told the group, We have third party security companies that are working with us to come up with solutions to be proactive. So obviously, knock on wood, nothing has happened yet. But we are definitely always proactive from a security standpoint and were definitely trying to make sure that were ready once a solution is available.

Talking to your vendors and third parties should be a key part of any organisations planning process. To that end, organisations should be checking whether their partners will keep supporting and securing customers operations into the age of quantum.

The data itself was still at the centre of respondents minds when it came to protection from quantum threats, and when asked what they were focusing on in their preparations, respondents said that above all they were monitoring their own data. One respondent told us, The data is everything for anybody thats involved in protecting it. And so you just have to stay on top of it along with your vendors and continue to communicate.

One of the prime preparatory best practices that respondents called upon was monitoring. Knowing what kind of data flows within your environment, how its used and how its currently protected are all things that an enterprise has to find out as they prepare.

SEE ALSO:As quantum computing draws near, cryptography security concerns grow

To be sure, overhauling an enterprises cryptographic infrastructure is no small feat, but respondents listed understanding their organisations level of crypto agility as a priority. Quantum might be a few years off, but becoming crypto agile may take just as long.

Organisations will have to plan for a system which can easily swap out, integrate and change cryptographic algorithms within an organisation. Moreover, it must be able to do so quickly, cheaply and without any significant changes to the broader system. Practically, this means installing automated platforms which follow your cryptographic deployments so that you can remediate, revoke, renew, reissue or otherwise control any and all of your certificates at scale.

Many organisations are still taking their first tentative steps, and others have yet to take any. Now is the time for organisations to be assessing their deployments of crypto and digital certificates so they have proper crypto-agility and are ready to deploy quantum-resistant algorithms soon rather than being caught lacking when it finally arrives.

View post:
The view of quantum threats from the front lines - JAXenter

Read More..

U.S. Progress on AI and Quantum Computing Will Best China, Says CTO Michael Kratsios – BroadbandBreakfast.com

WASHINGTON, February 21, 2020 - U.S. Chief Technology Officer Michael Kratsios expressed confidence in the supremacy of the U.S.s artificial intelligence and quantum computing programs over Chinas, in a talk at the Hudson Institute on Thursday.

United States research on AI and quantum computing features the most highly cited papers, most investment by the private sector, and greatest government funding, he said.

This assertion challenges the Made in China 2025 Initiative, a 10-year plan that China issued in 2015, and which outlined 10 key tech industries in which China hopes to become a world leader.

Recent progress by the Chinese government in the field of high-speed fiber-optic broadband, AI and surveillance have fueled some analysts fears that the Chinese will hit their targets.

Kratsios laid out four key components of a winning tech strategy in which the U.S. excels: Leadership development, a low-regulatory environment, a belief in the power of the citizen workforce, and international engagement with allies.

Kratsios referenced two specific examples to bolster his argument. He mentioned how Trump committed to at least $200 million for STEM education last year, and how American corporations came more than matched that figure by donating $300 million.He also recounted the story that he said put America at the head of the pack in the quantum supremacy race. The story bears upon the uniting of resources invested by the U.S. government in the Quantum Lab at UC Santa Barbara with Googles subsequent acquisition of the lab and connection of that research team to its treasure trove of resources.

Its not a James Bond/Jason Borne crossover, but the concept of quantum supremacy is vital for national security, Kratsios said. America has only achieved it through a free market of ideas involving prudent government investing and private sector intervention.

Governmental funding and R&D are unique in that they fill the gaps that the private sector doesnt focus on.

Kratsios elaborated that the government tends to invest in early-stage, pre-competitive R&D which it expects the private sector to nurture and raise into a mature industry, such as in the case of the UCSB Quantum Lab.

Kratsios also gave made some comments on the proposals that the EU released Wednesday regarding AI and data. He characterized their approach to AI as values-based, and worried that they do not prioritize implementation.

Kratsios also found fault with the documents binary approach to classifying AI as high risk or not high risk, saying the report clumsily attempts to bucket AI-powered technology into two camps when there should be more spectrum and flexibility in the model.

The rest is here:
U.S. Progress on AI and Quantum Computing Will Best China, Says CTO Michael Kratsios - BroadbandBreakfast.com

Read More..

Scientists Have Discovered a Brand New Electronic State of Matter – ScienceAlert

Scientists have observed a new state of electronic matter on the quantum scale, one that forms when electrons clump together in transit, and it could advance our understanding and application of quantum physics.

Movement is key to this new quantum state. When electric current is applied to semiconductors or metals, the electrons inside usually travel slowly and somewhat haphazardly in one direction.

Not so in a special type of medium known as aballistic conductor, where the movement is faster and more uniform.

The new study shows how in very thin ballistic conducting wires, electrons can gang up creating a whole new quantum state of matter made solely from speeding electrons.

"Normally, electrons in semiconductors or metals move and scatter, and eventually drift in one direction if you apply a voltage," says physicist Jeremy Levy, from the University of Pittsburgh. "But in ballistic conductors the electrons move more like cars on a highway."

"The discovery we made shows that when electrons can be made to attract one another, they can form bunches of two, three, four and five electrons that literally behave like new types of particles, new forms of electronic matter."

Ballistic conductors can be used for stretching the boundaries of what's possible in electronics and classical physics, and the one used in this particular experiment was made from lanthanum aluminate and strontium titanate.

Interestingly, when the researchers measured the levels of conductance they found they followed one of the most well-known patterns in mathematics Pascal's triangle. Asconductanceincreased, it stepped up in a pattern that matches one of the rows of Pascal's triangle, following the order 1, 3, 6, 10 and so on.

"The discovery took us some time to understand but it was because we initially did not realise we were looking at particles made up of one electron, two electrons, three electrons and so forth," says Levy.

This clumping of electrons is similar to the way that quarks bind together to form neutrons and protons, according to the researchers. Electrons in superconductors can team up like this too, joining together in pairs to coordinate movement.

The findings may have something to teach us about quantum entanglement, which in turn is key to making progress with quantum computing and a super-secure, super-fast quantum internet.

According to Levy, it's another example of how we're reverse engineering the world based on what we've found from the discovery of the fundamentals of quantum physics building on important work done in the last few decades.

"Now in the 21st century, we're looking at all the strange predictions of quantum physics and turning them around and using them," says Levy.

"When you talk about applications, we're thinking about quantum computing, quantum teleportation, quantum communications, quantum sensing ideas that use the properties of the quantum nature of matter that were ignored before."

The research has been published in Science.

The rest is here:
Scientists Have Discovered a Brand New Electronic State of Matter - ScienceAlert

Read More..

Beware of a cyber attack – faribaultcountyregister.com | News, Sports, Information on the Blue Earth region – Faribault County Register

"There is a large effort to target county commissioners by hackers," Midwest IT Systems security specialist Ben Geddis told the Faribault County Board at their meeting on Feb. 18.

Geddis was in attendance at the board meeting to talk about Internet security matters with the board.

"The idea the hackers have is they can cash in on government officials and gain access to information," Geddis explained. "Counties are highly targeted. If they can get control of your account they can impersonate you and send out emails which appear to be from you."

Security specialist Ben Geddis of Midwest IT Systems, left, discusses a variety of Internet security matters with the Faribault County Board last week.

The problems are most commonly spread through phishing emails, according to Geddis.

"For instance, I received an email which appeared to be from Pizza Hut offering me a free pizza if I clicked on the link in the email," Geddis commented. "But when I used my mouse to hover over the hyperlink displayed in the email message, the link-to address was for a different website."

You need to be very careful what you click on, Geddis shared.

"Ransomware is on the rise," he stated. "If hackers can get into your system, they can encrypt your information and prevent you from accessing it unless you pay them a ransom to remove the encryption."

So, what can be done to lower the risks of a hacker getting hold of your data?

"Many people live by the rule, if I was not expecting it (email), I delete it," Geddis said. "Changing your passwords every year is also a good idea."

Another way your information can be safeguarded is by having multi-factor protection.

"Multi-factor protection is when you are required to enter a code you may receive through a text to be able to get into your data," Geddis explained. "For instance, if you are logging into one of your credit cards from a computer you do not normally use, the credit card company may require you to get a code, which they will send to your phone, you will then have to enter the code before you can proceed on their website."

He provided the board with a list of red flags to watch out for.

"Unknown email addresses, emails received from outside of your organization and emails with a suspicious domain name are all things to look out for," Geddis said. "Also, watch for bad grammar and spelling errors. Be aware of emails which try and scare you into clicking on a link without thinking about it."

Also at the meeting was Billeye Rabbe, the solid waste coordinator for the Prairieland Solid Waste Facility in Truman.

She brought a list of solid waste and recycling haulers who needed to have their license renewals approved by the board.

B and B Sanitation and Recycling, Hometown Sanitation, LIP Enterprises, Inc., Peterson Refuse and Demo, Thompson Sanitation and Waste Management were approved for both solid waste hauling and recycling licenses.

Minnesota Lake was approved for a solid waste hauling license and Mason City Recycling was approved for the recycling license.

Commissioner Greg Young mentioned the audit of Prairieland had gone well, morale at the plant is high and the board is very happy with the job Rabbe does.

In other business, it was also noted the Charles Carlson versus Faribault County Drainage Authority court trial will begin on March 18, at 9 a.m., in Martin County.

Originally posted here:
Beware of a cyber attack - faribaultcountyregister.com | News, Sports, Information on the Blue Earth region - Faribault County Register

Read More..

Internet security Market 2020 Global Analysis, Research, Applications and Forecast to 2026 – Jewish Life News

Internet security Market Overview:

Verified Market Research offers its latest report on the Internet security Market that includes a comprehensive analysis of a range of subjects such as market opportunities, competition, segmentation, regional expansion, and market dynamics. It prepares players also as investors to require competent decisions and plan for growth beforehand. This report is predicted to assist the reader understand the market with reference to its various drivers, restraints, trends, and opportunities to equip them in making careful business decisions.

Global Internet security Market was valued at USD 32.67 Billion in 2017 and is projected to reach USD 61.42 Billion by 2025, growing at a CAGR of 8.2% from 2018 to 2025.

Get More information about Internet security Market @ https://www.marketresearchblogs.com/internet-security-market-size-growth-analysis-opportunities-business-outlook-and-forecast-to-2026/

Top 10 Companies in the Internet security Market Research Report:

International Business Machine (IBM) Corp., Hewlett Packard, Microsoft Corp., Cisco System Intel Corporation (McAfee), Symantec Corporation, Trend Micro, Kaspersky Lab, Dell (SonicWall). Symantec and IBM

Competitive Landscape

The chapter on competitive landscape covers all the major manufacturers in the global Internet security market to study new trends and opportunities. In this section, the researchers have used SWOT analysis to study the various strengths, weaknesses, opportunities, and trends the manufacturers are using to expand their share. Furthermore, they have briefed about the trends that are expected to drive the market in the future and open more opportunities.

Global Internet security Market: Drivers and Restraints

The researchers have analyzed various factors that are necessary for the growth of the market in global terms. They have taken different perspectives for the market including technological, social, political, economic, environmental, and others. The drivers have been derived using PESTELs analysis to keep them accurate. Factors responsible for propelling the growth of the market and helping its growth in terms of market share are been studied objectively.

Furthermore, restraints present in the market have been put together using the same process. Analysts have provided a thorough assessment of factors likely to hold the market back and offered solutions for circumventing the same too.

Global Internet security Market: Segment Analysis

The researchers have segmented the market into various product types and their applications. This segmentation is expected to help the reader understand where the market is observing more growth and which product and application hold the largest share in the market. This will give them leverage over others and help them invest wisely.

Regions Covered by the global market for Internet security :

Middle East and Africa (GCC countries and Egypt)North America (USA, Mexico and Canada)South America (Brazil, etc.)Europe (Turkey, Germany, Russia, Great Britain, Italy, France etc.)Asia Pacific (Vietnam, China, Malaysia, Japan, Philippines, Korea, Thailand, India, Indonesia and Australia)

Table of Contents

Introduction: The report starts off with an executive summary, including top highlights of the research study on the Internet security industry.

Market Segmentation: This section provides detailed analysis of type and application segments of the Internet security industry and shows the progress of each segment with the help of easy-to-understand statistics and graphical presentations.

Regional Analysis: All major regions and countries are covered in the report on the Internet security industry.

Market Dynamics: The report offers deep insights into the dynamics of the Internet security industry, including challenges, restraints, trends, opportunities, and drivers.

Competition: Here, the report provides company profiling of leading players competing in the Internet security industry.

Forecasts: This section is filled with global and regional forecasts, CAGR and size estimations for the Internet security industry and its segments, and production, revenue, consumption, sales, and other forecasts.

Recommendations: The authors of the report have provided practical suggestions and reliable recommendations to help players to achieve a position of strength in the Internet security industry.

Research Methodology: The report provides clear information on the research approach, tools, and methodology and data sources used for the research study on the Internet security industry.

Get a Complete Market Research Report Information @ https://www.marketresearchblogs.com/internet-security-market-size-growth-analysis-opportunities-business-outlook-and-forecast-to-2026/

TAGS: Internet security Market Size, Internet security Market Growth, Internet security Market Forecast, Internet security Market Analysis, Internet security Market Trends, Internet security Market

References : https://www.marketresearchblogs.com/

Here is the original post:
Internet security Market 2020 Global Analysis, Research, Applications and Forecast to 2026 - Jewish Life News

Read More..

Letter: It’s an election year why isn’t cybercrime on voters’ minds? – Greenville News

Share This Story!

Let friends in your social network know what you are reading about

Letter writer says that in light of recent hacking into Greenville Water System computers, voters should be concerned about cybercrime.

A link has been sent to your friend's email address.

A link has been posted to your Facebook feed.

OPINION

Jim Clark, Letter to the Editor Published 9:11 a.m. ET Feb. 23, 2020

Now that the Greenville Water System has been hacked and the state IRS (SC Department of Revenue) years ago, it is time to get serious about fixing this problem.

It is almost certain that your personal Social Security number and birth date are in cyberspace.So bank accounts, 401Ks and even home equity is at risk for cybercrime.

It is obvious the internet needs to be re-engineered for security.I have read that internet security is an illusion.All a hacker has to do is insert a line or two of code into a computer program. But banks are advertising the convenience of accessing personal accounts on cell phones.Is this making hacking easier?

The FDIC (Federal Deposit Insurance Corp.) does not cover hacking losses. Wire fraud laws need to berewritten to determine who is responsible, or insure these losses.

Hacking and ID theft has become a lucrative profession.These criminals are a growing parasite on responsible and productive Americans.It is long past timeto demand an end to these crimes or go back to pre-internet banking.

This is an election year.One would think cybercrime would an issue.

Jim Clark

Easley

Read or Share this story: https://www.greenvilleonline.com/story/opinion/2020/02/23/letter-its-election-year-why-isnt-cybercrime-voters-minds/4806833002/

Feb. 23, 2020, 9:06 a.m.

Feb. 23, 2020, 9:01 a.m.

Feb. 22, 2020, 10:37 a.m.

Feb. 22, 2020, 10:24 a.m.

Feb. 22, 2020, 10:19 a.m.

Feb. 22, 2020, 9:54 a.m.

Go here to see the original:
Letter: It's an election year why isn't cybercrime on voters' minds? - Greenville News

Read More..

Vigilantes and private security are policing the internet where governments have failed – The South African

Every time we switch on a computer, open an email, view a website or make an online payment, there are multiple new opportunities for crimes to occur.

In fact,almost halfof all crimes against individuals in England and Wales now involve or are enabled by the internet.

These technological changes have fuelled a substantialnew private policing sectorthat includes commercial companies but also online vigilantes.

This change is comparable to the quiet revolution seen in the 1970s when conventional private policing, particularly the use of uniformed security officers, emerged on an industrial scale.

Despite its scale, online private policing activity has been largely ignored by researchers and politicians. Yet it is already creating somesignificant issuesthat need addressing.

This new online private policing sector exists most obviously in the numerous companies providing services.

These include designing, testing and maintaining security systems, responding to cyber-attacks and moderating websites for harmful or illegal content.

But many other organisations have also developed their own cybersecurity structures to better protect themselves from online crime.

In most large organisations, these structures are led by what are generally called chief information security officers (CISO) but there are also many other new cybersecurity roles such as security architects and ethical hackers.

Globally, this new sector is estimated to support around6 million jobsand is predicted to be worth$248 billion (R3.7 trillion) by 2023.

This is much more than the traditional private security industry, which is only predicted to be worth around$167 billion (R2.5 trillion) by 2025.

One of the most interesting roles to emerge in this new sector is that of the moderators who police the content published on the internet.

They play an important role in preventing thepublication of undesirable material, from hardcore pornography and footage from war zones through to abusive and inappropriate language.

There has been virtually no academic research of these important operatives. Butmedia reportshaveraised concernsover the welfare of these staff, who often have to view large amounts of distressing content, including images.

So their conditions of employment and capabilities should be more of a priority for researchers and regulators.

The internet hasnt just stimulated new forms of commercial private policing but has also enabled a new type of vigilantism to flourish.

For example, the limited law enforcement response to the masses of scam emails and bogus websites were at risk from everyday has led to the growth of scambaitors.

These are private individuals who try to engage with scammers andwaste their timeor simplyraise awarenessof their scams. One of the problems with scambaiting is thehumiliation and racismoften involved.

For example some scammers have been encouraged to do repetitive tasks such as draw street maps and rewrite books, paint themselves or pose naked in humiliating positions, all of which have then been publicised.

Sometimes this is done with explicit or implicit racist commentaries, relating to the fact that many of the scammers areblack West Africans.

Perhaps the most controversial area of online vigilantism that has emerged ispaedophile hunting. Organised groups of internet users pose as children in online chatrooms to lure and expose paedophiles.

The actions of these groups have clearly helped the police and led to the exposure of real paedophiles who have subsequently been charged and convicted.

In 2018,at least 150 peoplein England and Wales were charged using evidence provided by paedophile hunters. But some groups have made their exposures and confrontations public, in some cases even live-streaming them online.

This has ledto innocent people being falsely and publicly condemned, while others have killed themselves after the exposure.

It has also been revealed that some of the people enacting this justice arethemselves convicted criminals whereas police forces themselves often bar people with criminal records from joining.

The rapid growth of both commercial and amateur attempts at policing the internet shows there is a demand that is not being met by the traditional provider of law enforcement, the state.

But the problems that are emerging from this private security activity demonstrate why it isnt enough to leave such significant operations to the market or volunteers.

The first quiet revolution eventually resulted in many jurisdictions introducing regulations to better control the activities of private security.

This new shift at least warrants further research and investigation to determine if the controls are adequate. The suspicion is that they are not.

Mark Button, Professor of Security and Fraud, University of Portsmouth. This article is republished from The Conversation under a Creative Commons license. Read the original article.

See more here:
Vigilantes and private security are policing the internet where governments have failed - The South African

Read More..

Straight Talk: That voicemail from the boss might be fake – Canton Repository

Better Business Bureau serving Canton Region and Greater West Virginia offers tips and advice for consumers to avoid fraudulent practices.

THE CONCERN Everyone knows to be on the lookout for phony emails, especially at work. Scammers can easily make messages that appear to come from anywhere, from your bosss account to the office printer. But what about voicemail? New voice-mimicking software is now being used by scammers to create convincing voicemail messages.

HOW THE SCAM WORKS:

You get a voicemail from your boss. They are instructing you to wire thousands of dollars to a vendor for a rush project. The request is out of the blue. But its the bosss orders, so you make the transfer.

A few hours later, you see your boss and confirm that you sent the payment. But theres one big problem; your manager has no idea what you are talking about! It turns out that the message was a fake. Scammers used new technology to mimic your bosss voice and create the recording. This voice cloning technology has recently advanced to the place where anyone with the right software can clone a voice from a very small audio sample.

Businesses may be the first places to see this con, but it likely wont stop there. The technology could also be used for emergency scams, which prey on peoples willingness to send money to a friend or relative in need. Also, with the US now in the midst of the 2020 election season, scammers could use the technology to mimic candidates voices and drum up donations.

TIPS TO AVOID A THIS SCAM:

Secure accounts: Set up multifactor authentication for email logins and other changes in email settings. Be sure to verify changes in information about customers, employees, or vendors.

Train staff: Create a secure culture at your office by training employees on internet security. Make it a policy to confirm all change and payment requests before making a transfer. Dont rely on email or voicemail.

FOR MORE INFORMATION To learn about other kinds of scams, go to BBB.org/ScamTips. If you have been the victim of a scam, make others aware by filing a report on BBB.org/ScamTracker.

FOR BBB INFORMATION Visit bbb.org/canton or call 330-454-9401 to look up a business, file a complaint, write a customer review, read tips, follow us on social media, and more!

Read the original post:
Straight Talk: That voicemail from the boss might be fake - Canton Repository

Read More..

The cannabis industry’s next big threat: Hacks and fraud – WICZ

By Alicia Wallace, CNN Business

Cannabis is an emerging industry with stratospheric growth expectations. Like the California Gold Rush, the dot-com boom and every other new market with boundless potential, the cannabis industry also has the tendency to attract some sketchy characters with dubious motives.

Security experts have long warned that the cannabis industry is susceptible to both cybercriminal and fraudulent activities. It's not exactly the Wild West anymore: Businesses and state-legal markets have matured. But risks and concerns about criminal activity and fraud haven't waned.

Just weeks into 2020, the cannabis industry has been the subject of several high-profile incidents: a reported dispensary point-of-sale system hack that potentially exposed the data of 30,000 people; the US Securities and Exchange Commission charging two men who allegedly used a fake cannabis company as a front for a Ponzi scheme; and the conviction of a former Colorado cannabis entrepreneur in one of the state's largest fraud cases.

"These industries are targets just because they're new and there is lots of controversy -- whether it's political or social -- with some of the things they're doing," Michael Bruemmer, the vice president of data breach resolution and consumer protection for consumer credit reporting company Experian, told CNN Business.

Experts are cautioning companies to shore up their security practices and for consumers to be mindful of opportunities that seem too good to be true.

Cannabis' emerging market status makes it a prime target fraud, said Jodi Avergun, a former federal prosecutor and DEA chief who now heads law firm Cadwalader, Wickersham & Taft's white-collar defense and investigations group.

"Consumer and retail investors are not taking appropriate precautions," she said.

The cannabis industry is teeming with interest and speculation, she said. Most cases brought by the US Securities and Exchange Commission involve operations that purport to be cannabis businesses but instead are schemes -- typically of the Ponzi and pump-and-dump variety, she said.

The recent cannabis cases include allegations of a Ponzi scheme tied to a fictitious cannabis company and charges of securities fraud tied to an alleged criminal ring in Colorado.

"The unscrupulous people who have always existed -- the out-and-out fraudsters -- take advantage of investors who want to make a buck quickly," Avergun said.

Although cannabis remains illegal under federal law and largely unregulated, some federal agencies continue to keep a close watch for potential nefarious activity. The US Federal Bureau of Investigation last year warned that it saw a "public corruption threat emerge in the expanding cannabis industry," and agencies such as the SEC have sought criminal charges.

In 2014, when Colorado and Washington State started selling recreational cannabis, the SEC suspended several cannabis stocks and issued an investor alert to warn of questionable practices, alleged illegal stock sales and market manipulation. The agency issued yet another investor alert in 2018 highlighting past enforcement actions and continued warnings.

The SEC Office of Investor Education and Advocacy "regularly receives complaints about marijuana-related investments, and the SEC continues to bring enforcement actions in this area," the SEC warned then. "If you are thinking about investing in a marijuana-related company, you should beware of the risks of investment fraud and market manipulation."

The hype -- and potential for fraudulent investing schemes -- may have abated in recent months as valuations have sunk and companies have restructured to ensure near- and long-term stability.

"But as soon as demand returns, so will the opportunistic fraudsters who seek to take advantage of those who see dollar signs in the cannabis industry," Avergun said.

Experian's "Data Breach Industry Forecast" for 2020 predicted that emerging industries such as cannabis, green energy and cryptocurrency would be increasingly become targets for cyberattacks. In 2019, these industries accounted for fewer than 10% of the breaches tracked by Experian, but they remain vulnerable because they're emerging industries, Experian's Bruemmer said.

"These controversial industries make great targets because they're more focused on growing their business and starting up than they are necessarily putting the appropriate focus on cybersecurity," he said.

Three years ago, a leading seed-to-sale tracking software provider was hit with two cyberhacks in a six-month period. The incidents consisted of a "sophisticated sequence of malicious attacks directed against the company," an attorney for the targeted company MJ Freeway, now named Akerna, said at the time.

The company spent at least $200,000 to upgrade its cybersecurity and enterprise software capabilities following the 2017 breaches, according to financial filings made with the SEC.

Jessica Billingsley, chief executive officer of Akerna, told CNN Business in December that the company no longer uses the software targeted in the attack and the next generation program is far more robust.

In January, internet security researchers for vpnMentor reported a breach at THSuite, a cannabis point-of-sale provider. The vpnMentor researchers said that more than 30,000 individuals had their information exposed, including photo IDs, addresses and protected health information.

Officials for THSuite did not return multiple calls and emails for comment. Some of the dispensary clients identified in the vpnMentor report told CNN Business that they were quickly taking action to determine how much of their customers' information might have been affected.

RJ Starr, compliance director for Bloom Medicinals, said he was aware that his company's technology vendor experienced a data breach and was conducting a thorough investigation.

"Once we've identified any affected patients, we will notify each individual patient and follow HIPAA breach notification protocols," Starr said. "Bloom Medicinals serves tens of thousands of patients in multiple states, and we take patient privacy very seriously. Rest assured, we will implement any corrective action necessary to both remedy and ensure that this doesn't happen again."

Consumers and companies can be proactive in protecting themselves from fraud and cybercriminal activity, Avergun and Bruemmer said.

Avergun said that consumers should check the price history of companies' stocks and research the background of the advisers and executives who are selling shares and running the company.

"If it sounds too good to be true, it probably is -- as with any investment," she said.

As for business investors, it comes down to due diligence.

"There is nothing to substitute for adequate research into company financials, its state compliance policies and processes, and its management before investing in an emerging cannabis company," she said, noting to be aware of special state-specific risks. "If a manager or owner of a cannabis company was previously operating before cannabis was state legal, that causes problems with licensing in state and may raise the risk of federal prosecutions."

Bruemmer highlighted three key tips for companies to button-up their security: Ensure that everyone -- not just the information technology experts -- keeps data security in mind and not make simple mistakes such as clicking on a nefarious link; research and employ credible security technology but don't be reliant on solely the software; have a proactive plan in place if a security breach occurs.

"A lot of businesses think about it as an after-thought," he said. But they should pre-plan."

Go here to read the rest:
The cannabis industry's next big threat: Hacks and fraud - WICZ

Read More..

Best Protection Against File Less Malware and Advanced Threats: Kaspersky Scores Most Top Three Places in 2019 Test Results – Al-Bawaba

As competition intensifies, Kaspersky remains at the top of the TOP3 metric for consumer and corporate cybersecurity. In 2019, Kaspersky products helped the company to achieve podium places (first, second or third) in 70 of 86 different independent tests in which it took part.

The TOP3 metric represents the aggregate scores achieved by more than 80 well-known vendors in the most respected, independent tests and reviews in the cybersecurity industry. Each vendor receives a score based on the number of top three places its products achieved in independent testing, relative to the number of tests the products were examined in. Sustained performance across multiple tests and products provides customers, industry analysts and experts with a more comprehensive overview of the vendors capabilities than a one-off result in a single test.

As of 2019, Kaspersky gained a podium place in 70 of the tests that it entered, with first place finishes in 64 of them.

Kaspersky Anti Targeted Attack, the companys flagship offering against advanced threats, brought in some of the most remarkable results. It was the only solution in its class that demonstrated 100% detection and zero false positives in Advanced Threat Defense test run by ICSA Labs in Q3 2019.

Kaspersky Anti Targeted Attack also successfully passed the Breach Response Test by SE Labs, which emulated 85 various attacks in order to check whether the solution can prevent and remediate any real harm, not just detect them. As a result, Kaspersky scored a Total Accuracy Rating of 95% with zero false positives.

Probing real-life protection capabilities of security products have been the focus of testing approaches in 2019, as opposed to more formal and simpler detection tests. Last year, AV-Comparatives invited 16 anti-virus vendors to enter their new Enhanced Real-World Test. Kaspersky Internet Security was one of the two products among all six participants to achieve a perfect score in all 15 scenarios which involved exploits, fileless malware and other advanced cyberthreats while Kaspersky Endpoint Security for Business was one of the three corporate products with such a score.

Furthermore, Kaspersky once again proved its expertise in protecting against undetectable fileless malware in Advanced Endpoint Protection: Fileless Threat Protection Test by AV-TEST. As a result, Kaspersky Endpoint Security for Business scored detection rating of 100% (with 68% on average among competitors) and 94% for protection (with 59% on average among other vendors).

Were honored to continue setting the highest protection standards in the cybersecurity industry. Despite the growing competition in 2019, we were able to maintain the reputation of our technologies that help protect millions of our customers against the most complex and the most evasive cyberthreats, says Anton Ivanov, VP of Threat Research, Kaspersky.

To find out more about the methodology and testing process, and to see the full list of vendor participants, in the TOP3 rating please visit the website.

See original here:
Best Protection Against File Less Malware and Advanced Threats: Kaspersky Scores Most Top Three Places in 2019 Test Results - Al-Bawaba

Read More..