Category Archives: Encryption
Beyond Krk: Even more WiFi chips vulnerable to eavesdropping – We Live Security
At Black Hat USA 2020, ESET researchers delved into details about the Krk vulnerability in Wi-Fi chips and revealed that similar bugs affect more chip brands than previously thought
Krk (formally CVE-2019-15126) is a vulnerability in Broadcom and Cypress Wi-Fi chips that allows unauthorized decryption of some WPA2-encrypted traffic. Specifically, the bug has led to wireless network data being encrypted with a WPA2 pairwise session key that is all zeros instead of the proper session key that had previously been established in the 4-way handshake. This undesirable state occurs on vulnerable Broadcom and Cypress chips following a Wi-Fi disassociation.
Figure 1. Overview of Krk following a disassociation, data is transmitted encrypted with an all zero session key
Exploiting Krk allows adversaries to intercept and decrypt (potentially sensitive) data of interest and, when compared to other techniques commonly used against Wi-Fi, exploiting Krk has a significant advantage: while they need to be in range of the Wi-Fi signal, the attackers do not need to be authenticated and associated to the WLAN. In other words, they dont need to know the Wi-Fi password.
We worked with the affected vendors (as well as ICASI) through a responsible disclosure process before we first publicly disclosed the flaw at the RSA Conference in February 2020. The ensuing publicity brought the issue to the attention of many more chipset and device manufacturers, some of which discovered they also had vulnerable products and have since deployed patches. We are maintaining a list of related vendor advisories on this webpage[1].
While we did not observe CVE-2019-15126 in other Wi-Fi chips than Broadcom and Cypress, we did find that similar vulnerabilities affected chips by other vendors. These findings were first presented at Black Hat USA 2020 and were briefly outlining them below.
One of the chips we looked at, aside from those from Broadcom and Cypress, was by Qualcomm. The vulnerability we discovered (which was assigned CVE-2020-3702) was also triggerable by a disassociation and led to undesirable disclosure of data by transmitting unencrypted data in the place of encrypted data frames much like with Krk. The main difference is, however, that instead of being encrypted with an all-zero session key, the data is not encrypted at all (despite the encryption flags being set).
The devices we tested and found to have been vulnerable are the D-Link DCH-G020 Smart Home Hub and the Turris Omnia wireless router. Of course, any other unpatched devices using the vulnerable Qualcomm chipsets will also be vulnerable.
Following our disclosure, Qualcomm was very cooperative and in July released a fix to the proprietary driver used in their officially supported products. Not all devices with Qualcomm chips use this proprietary driver, however in some cases, open source Linux drivers are used such as the upstream ath9k driver, for example. As its not actively developed by Qualcomm, its not clear at the time of writing if it will receive a patch from Qualcomm or the open-source community.
We also observed the manifestation of a similar vulnerability (i.e. lack of encryption) on some Wi-Fi chips by MediaTek.
One of the affected devices is the ASUS RT-AC52U router. Another one is the Microsoft Azure Sphere development kit, which we looked into as part of our Azure Sphere Security Research Challenge partnership. Azure Sphere uses MediaTeks MT3620 microcontroller and targets a wide range of IoT applications, including smart home, commercial, industrial and many other domains.
According to MediaTek, software patches fixing the issue were released during March and April 2020. The fix for MT3620 was included in Azure Sphere OS version 20.07, released in July 2020.
As more than five months have passed since we publicly disclosed the Krk vulnerability and several proofs-of-concept have been published by independent researchers weve decided to release the script weve been using to test whether devices are vulnerable to Krk. We have also included tests for the newer variants described here. This script can be used by researchers or device manufacturers to verify that specific devices have been patched and are no longer vulnerable.
Special thanks to our colleague Martin Kalunk, who greatly contributed to this research.
[1] If you have an advisory you would like added to this list please contact us at threatintel[at]eset.com.
See the rest here:
Beyond Krk: Even more WiFi chips vulnerable to eavesdropping - We Live Security
Comprehensive Analysis on Endpoint Encryption Software Market based on types and application – The Daily Chronicle
The Endpoint Encryption Software market study Added by Market Study Report, LLC, provides an in-depth analysis pertaining to potential drivers fueling this industry. The study also encompasses valuable insights about profitability prospects, market size, growth dynamics, and revenue estimation of the business vertical. The study further draws attention to the competitive backdrop of renowned market contenders including their product offerings and business strategies.
The recent report on Endpoint Encryption Software market is an in-depth documentation of various dynamics at play in the industry space. As per the report, Endpoint Encryption Software market is poised to amass substantial revenues while growing with a y-o-y growth rate of XX% over the forecast period.
Request a sample Report of Endpoint Encryption Software Market at:https://www.marketstudyreport.com/request-a-sample/2829607?utm_source=thedailychronicle.in&utm_medium=Ram
Insights pertaining to growth drivers, challenges, restraints, and opportunities prevailing in the industry sphere are detailed in the report, alongside their impact on the overall market size. The report further analyzes the market based on different segmentations and highlights the aftermath of COVID-19 pandemic on the industry sphere.
Unveiling the topographical frame of Endpoint Encryption Software market:
Report Objectives:
Ask for Discount on Endpoint Encryption Software Market Report at:https://www.marketstudyreport.com/check-for-discount/2829607?utm_source=thedailychronicle.in&utm_medium=Ram
Other takeaways from Endpoint Encryption Software market report:
.
.
.
TOC of Endpoint Encryption Software Market Report Includes:
For More Details On this Report: https://www.marketstudyreport.com/reports/global-endpoint-encryption-software-market-2020-by-company-regions-type-and-application-forecast-to-2025
Read More Reports On: https://www.marketwatch.com/press-release/global-agricultural-inoculant-market-size-analytical-overview-growth-factors-demand-trends-and-forecast-to-2026-2020-08-05?tesla=y
Read More Reports On: https://www.marketwatch.com/press-release/multiphoton-microscopy-market-size-historical-growth-analysis-opportunities-and-forecast-to-2025-2020-08-04?tesla=y
Read More Reports On: https://www.marketwatch.com/press-release/machine-condition-monitoring-market-size-growth-rate-top-players-analysis-statistics-revenue-and-forecast-by-2027-2020-08-03?tesla=y
Read More Reports On: https://www.marketwatch.com/press-release/near-field-communication-chips-market-analysis-size-share-emerging-audience-business-opportunity-and-forecast-to-2027-2020-07-30
Contact Us:Corporate Sales,Market Study Report LLCPhone: 1-302-273-0910Toll Free: 1-866-764-2150 Email: [emailprotected]
Follow this link:
Comprehensive Analysis on Endpoint Encryption Software Market based on types and application - The Daily Chronicle
This hardware-encrypted USB-C drive is rugged, inexpensive, and can run Windows – TechRadar UK
Apricorn has released its new Aegis Secure Key 3NXC drive that features robust security, a rugged chassis, and a USB Type-C connector.
The ApricornAegis Secure Key 3NXCdrive, which is fast enough to run an operating system, features its own AES-XTS 256-bit encryption chip as well as a keypad to enter numerical PINs. At present, the storage device isFIPS 140-2 level 3 validation pending and the company expects to get it in Q3 2020.
The USB-C Aegis Secure Key 3NXC drive supports read-only mode for those who need to carry sensitive data and do not need to alter it anyhow as well as a read-write mode for those who may need to change the data on the drive or boot an operating system from it. Since encryption is hardware-based, it is seamless for OS and therefore the Aegis Secure Key 3NXC devices are compatible with virtually all operating systems available today, including Apples MacOS, Googles Android, Microsofts Windows, and even Symbian.
The firmware of the drive is locked down and cannot be altered by malware or exploits (e.g., BadUSB), which means that thedriveitself is secure. Furthermore, the drive has its own battery that charges when it is plugged to a host, so an unlock pin can be entered while the drive is not plugged.
The Aegis Secure Key 3NXC drive comes in an aluminum chassis and is IP68-rated against water and dust. It also comes in an enclosure for extra protection. Measuring 81mm x 18.4mm x 9.5mm, the device weighs 22 grams.
Apricorn, which specializes in hardware-encrypted storage devices, offers multiple versions of its Aegis Secure Key 3NXC drives featuring capacities ranging from 4GB to 128GB. The company does not disclose performance of the storage device and only mentions a 5Gbps theoretical throughput of a USB 3.2 Gen 1 interface, but higher-end Aegis Secure Key 3NXC are probably fast enough to boot an operating system in a reasonable amount of time.
There is one caveat with using Apricorns Aegis Secure Key 3NXC drive as a boot drive. Microsoft recentlycanned Windows To Goin Windows 10 Enterprise and Windows 10 Education (version 2004 and later) that enabled the creation of a Windows To Go workspace that could be booted from a USB drive. To that end, those who would like to use an Aegis Secure Key 3NXC to boot an OS will have to use an outdated version of Windows, or go with a Linux OS.
Apricorns Aegis Secure Key 3NXC drive are available directly from the company. A 4GB model costs $59 or 52.45, whereas a 128GB is priced at $179 or 159.13 depending where are you at. Considering the fact that the devices are aimed at various government and corporate personnel who have access to sensitive data as well as hardware encryption, metallic chassis, and other sophisticated features, prices of these drives look justified.
Source:Apricorn
Read more here:
This hardware-encrypted USB-C drive is rugged, inexpensive, and can run Windows - TechRadar UK
Zoom’s COO is not concerned by app bans in India, says end-to-end encryption for all by year end – Economic Times
Aparna Bawa, COO, Zoom Video Communications; courtesy of Zoom.
Video-communications platform Zoom has remained under scrutiny in some countries, including India, over privacy. In an exclusive chat with ET Prime from San Jose, COO Aparna Bawa tries to dispel security concerns, assuring geofencing around China and pointing out paid users can even choose from Zooms 17 data centres globally. India, she says, is an incredibly important market.
Nasdaq-listed Zoom Video Communications is the new sensation in virtual communication, emerging as a formidable rival to established competitors such as Ciscos Webex, Microsofts Skype and Teams, Facebooks WhatsApp, and Slack. In India, it may well go on to match the massive impact WhatsApp has made over the years.Still, the video-conferencing giant has been haunted by its China connection in many corners of the globe. Meanwhile, India has
BY
AbcSmall
AbcMedium
AbcLarge
Access the exclusive Economic Times stories, Editorial and Expert opinion
Already a Member? Sign In now
Sharp Insight-rich, Indepth stories across 20+ sectors
Access the exclusive Economic Times stories, Editorial and Expert opinion
Clean experience withMinimal Ads
Comment & Engage with ET Prime community
Exclusive invites to Virtual Events with Industry Leaders
A trusted team of Journalists & Analysts who can best filter signal from noise
Read more from the original source:
Zoom's COO is not concerned by app bans in India, says end-to-end encryption for all by year end - Economic Times
Jihadi Use Of Bots On The Encrypted Messaging Platform Telegram – Middle East Media Research Institute
Table of Contents
Introduction
A History Of Terrorist Bots On Twitter
The MEMRI JTTM Team: For Over Two Years, Monitoring Bots Spreading ISIS Content On Telegram
Creating Bots On Telegram
Jihadi Use Of Bots On The Encrypted Messaging Platform Telegram
Swearing Allegiance To ISIS
Discussing And Sharing Instructions For Online Security, Secure Communications, And Hacking
Sharing Information About Jihadi Channels, Archives, And Materials
Disseminating Warnings To Followers
Other Uses
Fundraising
Announcements Of New Bots And Requests For Distribution
Sharing Information About Jihadi Channels, Archives, And Materials
Sharing Information About Jihadi Channels, Archives, And Materials
Sharing Information On Training, Bombmaking, Weapons, And Recruiting
Introduction
Bots, or chatbots short for "chat robot" are computer programs that simulate human conversation "chat" through artificial intelligence.[1] They are typically created to carry out repetitive, pre-defined tasks more efficiently than humans.[2] They can be used for ecommerce, customer service, and content distribution; one common type, the chatbot, simulates conversation, while other types can schedule social media or other posts or create polls. Platforms such as Facebook Messenger,[3] Twitter,[4] and WhatsApp[5] offer bot integration. Botnets are connected computers performing monotonous tasks to keep websites going.[6] They are also becoming companions for people: In April 2020, half a million people downloaded an app called Replika that allows the user to converse with a human-like robot over text. While that app is not entirely convincing, some experts believe a completely convincing chatbot will exist in five to 10 years.[7]
Bot technology is also used for illegal purposes for example, sending spam and phishing emails containing malware, engaging in internet fraud, and trafficking in illegal goods and services. Illegal botnets gain control of computers through hacking or malicious coding and their owners can then use these computers to carry out DDoS attacks, email spam to many more millions of Internet users, generate fake Internet traffic, and extort ransom from users.[8]
To keep pace with China's ambitious artificial intelligence development, on February 11, 2019,[9] President Trump signed an executive order announcing the American Artificial Intelligence Initiative.[10] This strategy, according to the White House, is a concerted effort to promote and protect national AI technology and innovation, that "implements a whole-of-government strategy in collaboration and engagement with the private sector, academia, the public, and like-minded international partners." The move followed calls from AI experts[11] across industry, academia, and government to prioritize development of this area, including a May 2018 memo from then-defense secretary James Mattis asking the president to create a national strategy for AI. At the same time, however, there has so far been little research into how terrorist groups are already utilizing some of the basic forms of AI available to them, such as bots.
A History Of Terrorist Bots On Twitter
Every day, bots are being used by jihadis, especially on Telegram, for a wide variety of purposes. Highlighting these uses just recently was the pro-Al-Qaeda Jaysh Al-Malahim Al-Electroni Telegram channel that announced, on July 20, 2020, that it was recruiting supporters with expertise in programming, "media raids," film montage, hacking, translation, and graphic design. Those interested, it added, should make contact using its bots.[12] The same day, the pro-ISIS Basa'ir Da'wah Foundation, on Telegram, urged supporters, especially designers, poets, and religious students, to join the foundation's team by contacting its bot on the platform.[13]
Jaysh Al-Malahim recruitment notice; Basa'ir Da'wah Foundation recruitment notice
Also, on July 23, the pro-Al-Qaeda Jaysh Al-Malahim Al-Electroni announced that it was seeking a commentator with excellent Arabic for its videos and asked candidates to apply to its Telegram bot.[14]
The recruitment notice referring candidates to Jaysh Al-Malahim Al-Electroni's Telegram bot
A pro-ISIS Telegram bot warned, on August 3, that intelligence and "Rafidites" Shi'ites had infiltrated pro-ISIS groups on Telegram and were creating fake accounts under the names of genuine ISIS supporters. It named three specific Telegram accounts claiming to be pro-ISIS that it said were actually run by Shi'ites.[15]
Underlining how bots are energizing jihadis' daily social media efforts, on August 5, Jaysh Al-Malahem Al-Electroni released a poster titled "We Remain in the Media Battle, Victorious." It depicts an armed fighter with the logos of Telegram, Instagram, Facebook, Pinterest, LinkedIn, YouTube, and Twitter.[16]
As early as 2015, when it was estimated that bots made up over half of all Internet traffic, ISIS was already known to have created thousands of Twitter bots to disseminate violent content, raise funds, and recruit supporters, as well as jamming activist communication on the platform, silencing their opponents on Twitter.[17] The bots latched onto trending hashtags to send out a stream of pro-ISIS messages a tactic adopted by ISIS as early as 2014[18] with the aim of inserting ISIS into ongoing conversations on different topics. Following the November 2015 Paris ISIS attacks, the international hacktivist group Anonymous launched a campaign against ISIS bots across the Internet under the hashtag #opISIS, shutting down over 25,000 of them within a month.[19]
After ISIS leader Abu Bakr Al-Baghdadi was killed by U.S. forces in late October 2019, Mustafa Ayad, a terrorism researcher at the London-based Institute for Strategic Dialogue, noticed on Twitter that many ISIS tweets were being posted faster than humanly possible. Accounts posting them that were suspended quickly returned with slight changes in usernames to avoid detection, while other accounts posting the content appeared to have been hacked. Twitter said that between January and July 2019 it had suspended more than 115,000 accounts for terrorism-related violations.[20] Telegram CEO Pavel Durov has stated that he takes steps to remove jihadi accounts and content on the platform, and has on occasion taken limited action to do so, but the accounts generally return.
A May 20 virtual forum held by the House Homeland Security Committee tackled the question of whether the coronavirus pandemic is fueling extremism on social media. Session co-host Rep. Max Rose, chairman of the Intelligence and Counterterrorism Subcommittee, said: "Terrorists' use of the Internet has been magnified by this public health crisis, with social media and gaming platforms increasingly being used for recruitment and propaganda here and around the world particularly as people spend more and more time online at home."[21] Bots are one technology that makes spreading that misinformation and messaging easier for extremist groups.
The MEMRI JTTM Team: For Over Two Years, Monitoring Bots Spreading ISIS Content On Telegram
As part of the work of the Cyber Jihad Lab team, which studies terrorists' use of technology, and of the MEMRI Jihad and Terrorism Threat Monitor (JTTM) team, over the past two years both teams have documented and identified the accounts in this report on the encrypted messaging app Telegram that are using bots. In October 2019, Telegram's @ISISWatch channel claimed to have blocked 7,431 terrorist bots and channels, many of which were used to launch campaigns for fundraising using cryptocurrency.[22] @ISISWatch was created the day after MEMRI exposed Telegram as ISIS's and jihadis' "app of choice" in a report published December 23, 2016 a report that made the front page of The Washington Post.[23] At that time, ISISWatch stated that Telegram "actively bans ISIS content on Telegram," that it was shutting down "an average of 70 ISIS channels" each day, and that between September and December 2016 it had shut down nearly 8,000 "ISIS bots and channels."[24] Nevertheless, Telegram remains a haven for jihadi communications, outreach, recruiting, and other activity even though the ISISWatch channel continues to report daily on terrorist bot and channels it claims to have removed.
Creating Bots On Telegram
Telegram allows users to create bots for sending, responding to, and otherwise managing messages, news, and notifications. They can also be used to manage digital assets such as cryptocurrencies.[25] Telegram's @BotFather tool walks users through the process quickly and easily, and provides support for questions connected to the process.[26]
To create a bot, the user first searches for @BotFather on Telegram, and then clicks on it to begin the process:
The user is then asked to create a name and username for the new bot. Once this is done, Telegram generates a unique link to the bot where the user can add a description, about section, and profile picture, and directs the user to a list of commands that it can be programmed to carry out.
To view a video of the creation of a Telegram bot, click here or below:
JIHADI USE OF BOTS ON THE ENCRYPTED MESSAGING PLATFORM TELEGRAM
Telegram's popularity among jihadis over the past five years has been well documented; for example, since 2015,[27] the Islamic State (ISIS) has used it in an official capacity, to disseminate calls for violence and share detailed instructions on how to carry out terrorist attacks, and to coordinate attacks an early example being the 2015 Paris attacks.[28]
ISIS, Al-Qaeda, and other jihadi organizations as well as their supporters are using bots on Telegram to disseminate their messaging in a variety of languages. They can be created in a chat or channel to allow them to connect with users. The bots can handle messages, with group members conversing with the bot as with a human. The MEMRI JTTM has been monitoring jihadi bots on Telegram since 2015.[29]
The examples below show how jihadi organizations ISIS, Al-Qaeda, Hay'at Tahrir Al-Sham (HTS), the Somali Al-Qaeda affiliate Al-Shabab Al-Mujahideen, the Gaza-based Jaysh Al-Ummah, and Kashmiri jihadi groups and their supporters, and other jihadis, are using bots on Telegram for a wide range of purposes.
While one major use is for mass dissemination of official notifications, publications, and video productions, these groups also use bots designed to allow users to access archives of jihadi content produced by groups and media organizations. The archives were found to include content from Turkestan Islamic Party (TIP), Voice of Islam, Al-Qaeda in the Arabian Peninsula's (AQAP) Al-Malahem Foundation, Libyan Al-Rayah Foundation, Al-Shabab's Al-Kata'ib Foundation, Al-Qaeda In The Islamic Maghreb's (AQIM) Al-Andalus Foundation, Al-Qaeda media group Global Islamic Media Front (GIMF), Group for the Support of Islam and Muslims (GSIM) Al-Zalaqah Foundation, and Jabhat Al-Nusra's (JN) Al-Manarah Al-Bayda' Foundation.
Also found in the archives was content from jihadi factions in Syria, Iraq, Chechnya, Bosnia, Egypt, Tunisia, and Libya, and from jihadi leaders past and present, including Osama bin Laden, Al-Qaeda leader Ayman Al-Zawahiri, HTS leader Abu Muhammad Al-Joulani, and Syria-based cleric Abdullah Al-Muhaysini.
Bots used by jihadis also allow users to request information and publications and register for courses, for example for physical fitness and bombmaking; solicit documents for later publication; submit and answer questions about migrating to Syria or Iraq, about technology, and about other subjects; widely share links to new Telegram channels following shutdowns; share tutorials on cyber security; use and hack accounts on social media platforms; recruit volunteer translators, video editors, and others; request donations for poor families, including families of slain jihadis; announce new accounts in multiple languages; promote causes such as supporting or freeing women from Al-Hol camp in Syria; and even convey holiday wishes.
This report documents the past two years of the JTTM's monitoring of jihadi use of bots for recruiting, fundraising, plan hacking and terror attacks, and more. It includes their use by major terrorist groups ISIS, Al-Qaeda, and others and by the most influential hacking groups and cyber activists. This use of bots a sophisticated tool made readily available to the public of social media users is a sign of what is to come: Jihadi groups will be using them much more in the future, and the West needs to be prepared to stop this before it happens.
ISLAMIC STATE (ISIS)
Planning Attacks, Sharing Information On Training, Bombmaking, And Weapons, Disseminating News, And Recruiting
The pro-ISIS Nasr News launched a new Telegram bot distributing official ISIS news in the Indonesian language: @NN20id_bot.[30]
On March 18, 2020, pro-ISIS Al-Tamkin Box launched a new Telegram bot, @Nooooooooods_bot, which distributes official ISIS news reports, official and unofficial videos, the Al-Naba' weekly, and articles by Al-Tamkin.[31]
JTTM subscribers can click here to view the full report
*Steven Stalinsky is Executive Director of MEMRI; R. Sosnow is Head Editor at MEMRI.
[1] Voxprogroup.com/iot-and-ai/ai-machine-learning-and-bots-whats-it-all-about, May 2017.
[2] Cdn2.hubspot.net/hubfs/53/assets/hubspot.com/research/reports/What_is_a_bot_HubSpot_Research.pdf?t=1492209311951, accessed July 30, 2019.
[3] Blog.hootsuite.com/facebook-messenger-bots-guide, May 9, 2019.
[4] Chatbotslife.com/how-to-make-a-twitter-bot-841b20655328, January 9, 2018.
[5] chatbotsmagazine.com/a-step-by-step-guide-to-creating-whatsapp-chatbot-for-business-275dc3924b17, May 14, 2019.
[6] Us.norton.com/internetsecurity-malware-what-is-a-botnet.html.
[7] Nytimes.com/2020/06/16/technology/chatbots-quarantine-coronavirus.html, July 16, 2020.
[8] Us.norton.com/internetsecurity-malware-what-is-a-botnet.html.
[9] Nbcnews.com/tech/tech-news/trump-s-artificial-intelligence-order-lacks-funding-not-target-china-n970406, February 11, 2019.
[10] Whitehouse.gov/ai/executive-order-ai/.
[11] Nytimes.com/2018/08/26/technology/pentagon-artificial-intelligence.html, August 26, 2018.
[13] Telegram/ Ghiras11bot, July 20, 2020.
[14] Talk.gnews.bz/channel/news-akhbar?msg=2yweGevZj58h2gpci, July 23, 2020.
[15] Telegram/ UI_BXH_X_BOT, August 3, 2020
[16] Telegram/ Al_MalahemCyberArmybot, August 5, 2020.
[17] Imperva.com/blog/bot-traffic-report-2014/, December 18, 2014.
[19] Businessinsider.com/anonymous-battles-isis-political-bots-2015-12, December 14, 2015.
[20] Npr.org/2019/11/01/775509366/twitter-struggling-to-shut-down-bot-and-impersonation-accounts-created-by-isis, November 1, 2019.
[21] Homelandprepnews.com/stories/49829-social-media-companies-must-use-ai-to-thwart-extremist-content-experts-tell-congressmen, May 27, 2020.
[22] Decrypt.co/11229/us-and-australian-officials-concerned-over-terrorist-cryptocurrency-use,November 7, 2019.
[25] Core.telegram.org/bots, accessed July 30, 2019; Coinrivet.com/what-is-a-cryptocurrency-telegram-bot, June 20, 2019.
[26] Core.telegram.org/bots/api, accessed July 30, 2019.
[28] See MEMRI report Germany-Based Encrypted Messaging App Telegram Emerges As Jihadis' Preferred Communications Platform Part V Of MEMRI Series: Encryption Technology Embraced By ISIS, Al-Qaeda, Other Jihadis September 2015-September 2016, December 23, 2016; MEMRI Daily Brief No. 192, Fears About New Facebook Cryptocurrency Are Overblown While Main Threat Of Criminal Activity On Telegram App Is Being Criminally Ignored, July 16, 2019; MEMRI Daily Brief No. 161, As Momentum Builds To Solve Problem Of Encrypted Terrorist Communications, A Possible Third Way Emerges, May 24, 2019; MEMRI Daily Brief No. 174, The Cryptocurrency-Terrorism Connection Is Too Big To Ignore, January 3, 2019; MEMRI Inquiry and Analysis No. 1387, The Imminent Release Of Telegram's Cryptocurrency, ISIS's Encryption App Of Choice An International Security Catastrophe In The Making, March 30, 2018; Congressional letter to Telegram CEO Durov, Memri.org/pdf/20181025_Telegram_sherman-Poe.pdf.
[29] Rsis.edu.sg/rsis-publication/cens/co15256-telegram-and-is-a-potential-security-threat/#.XUCPdOhKiUk, November 25, 2015.
[31] Telegram/ Ma Lakum Kayfa Tahkumun, March 18, 2020.
Follow this link:
Jihadi Use Of Bots On The Encrypted Messaging Platform Telegram - Middle East Media Research Institute
Twitter Urged To Beef Up Encryption 07/20/2020 – MediaPost Communications
Twitter is facing new calls to beef up itssecurity practices, following a widely publicized hack that resulted in account hijackings.
Details about how the hackers gained access to the accounts -- including those of Elon Musk, Jeff Bezos and President BarackObama -- are still emerging. But at least one potential avenue of attack -- direct messages -- would be more secure if Twitter protected them with end-to-end encryption, according to the digitalrights group Electronic Frontier Foundation.
End-to-end encryption provides the robust internal safeguard that Twitter needs, the group writes in a post urging Twitter toimplement the security protocol.
Earlier this week, Twitter fell victim to what it describes as a coordinated social engineering attack by people who successfully targeted some of ouremployees with access to internal systems and tools.
advertisement
advertisement
Twitter says it believes that around 130 accounts weretargeted, and that hackers were able to gain control of a small subset of those accounts. The hackers, who asked people to send bitcoin to an anonymous address, reportedly received more than 400 payments, totaling around $121,000.
Direct messagesare vulnerable to this weeks kind of internal compromise, the Electronic Frontier Foundationsays. Thats because they arenotend-to-end encrypted, soTwitter itself has access to them.
The group adds that Twitter wouldnt have to worry about whether or not this weeks attackers read or exfiltrated DMs if it hadend-to-end encrypted them.
Sen. Ron Wyden (D-Oregon) also urged Twitter to encrypt direct messages.
While its still not clear if the hackers gained access toTwitter DMs, this is a vulnerability that has lasted for far too long, Wyden tweeted this week. If hackers gainedaccess to users' DMs, this breach could have a breathtaking impact for years to come.
Separately, New York Attorney General Attorney General Letitia James launched aninvestigation into the hack, which she stated raises serious concerns about datasecurity and how platforms like Twitter could be used to harm public debate.
See more here:
Twitter Urged To Beef Up Encryption 07/20/2020 - MediaPost Communications
Thoughts on encryption legislation – and the real ‘link’ between 5G and coronavirus – Cloud Tech
Opinion Conspiracy theories are nothing new, but the recent one that blamed the rollout of 5G networks for the spread of Covid-19 is one of the more bizarre examples in recent memory. Not only is it very obviously untrue to anyone that understands either the technology or virology, but there is also little real correlation. New Zealand which was one of the first countries to declare itself virus-free is accelerating its current 5G rollout while Brazil and the USA which have seen the highest death rates are not among the leaders in 5G adoption.
However, there are other parallels and lessons that could be learned here. Firstly, around following the science rather than political agendas and secondly around protection not only from radiation, but also from malware and snooping.
Many political leaders across the globe have claimed that their response to the pandemic has been led by the science. Unfortunately, there are many different ways of interpreting the science and also still many unknowns. Consequently, politicians have used the science to back their own agendas, at times arguing either in favour or against the use of face masks, lockdowns and testing depending on how well prepared they were or how much they were willing to admit to earlier mistakes. Populist leaders in particular have not fared well during the pandemic, being more prone to grandstanding than accepting the best scientific advice.
Similarly, with 5G, there are undeniable technological and economic advantages from having collaboration in the market to drive innovation and interoperability, as well as from having a level competitive playing field to ensure choice and value for money. Unfortunately, a populist agenda in the US to scapegoat certain Chinese players as part of a trade war has had a massively negative impact on the entire 5G rollout. The irony is that while nobody has yet found any backdoors in the Chinese equipment, the US Congress is currently seeking to pass a bill that would force companies to include backdoors in all encryption, showing that the US is actually doing what it want us to believe that the Chinese might be doing. The US arsonist is too busy shouting at the Chinese to stop playing with matches to spot the irony here.
The issue of PPE (masks, gowns, gloves) during the pandemic has shown us how important protection is. Firstly, it can be shown beyond doubt that in radiation terms 5G is far safer than previous generations of mobile communications, just as 4G was safer than 3G. Our ability to communicate more efficiently, increasing performance as we reducing power consumption, has been as effective for mobile communications as it has been for microprocessors (see Moores Law) and many other areas of technology.
Secondly, if encryption can be maintained then 5G is also more secure than previous generations of mobile technology. 5G uses encryption to provide anti-tracking and spoofing features that make it harder to track and manipulate individual device connections. 5G is also a much more software and cloud-based than previous wireless network technologies, which will allow for better monitoring to spot potential threats. It also allows operators to use network slicing to segment the system in numerous virtual networks, each of which can be managed and customized separately. This means that different slices can have different protections set up for specific types of devices.
At a time when the variety and sophistication of cyber threats is not only at an all-time high, but is also on the increase, we cannot afford either to drop our level of vigilance or to create any unnecessary vulnerabilities.
Patching vulnerabilities is a fulltime job for all technology vendors, the race to find and patch flaws is one that we need to win every time, while the cybercriminals only need to win occasionally. Independent scrutiny can be of benefit here. Many vendors offer bug bounties and Huawei has put its equipment forward for additional testing by labs based in the UK and elsewhere.
Almost all the 5G security is built on encryption. The problem about creating backdoors in this encryption is that you create additional associated vulnerabilities as well as governance issues. It is a bit like having a particularly virulent strain of smallpox held in a secure lab that if it escaped would instantly infect everyone. You would want to be sure that the lab was really secure and that those that held it were trustworthy.
Unfortunately, the proposed congressional bill would put the keys to the encryption backdoors in the hands of an administration that is unashamedly America First and does not feel obliged either to abide by international treaties or to cooperate with global institutions (such as the WHO) and an intelligence community that has already allowed its own hacking tools to be stolen and that has also already shown that it is neither open or honest about its use of encryption backdoors. Not only would governance issues be of concern to almost all other nations, but it would also be probably only a matter of time before criminals obtained access to the backdoors, thereby undermining everyones security.
The congressional encryption bill, while a well-intentioned initiative by politicians who do not understand the technological consequences, is a far greater threat to our collective security (over 5G and all other technologies) than the vendor that the US administration is currently seeking to scapegoat.
We need to be focusing on bug bounties and enhanced testing of equipment from all vendors, as well as global collaboration to patch vulnerabilities and counter the real threats, rather than creating back doors that would open up what could be calamitous new vulnerabilities.
After all, if you are not confident in the security of Huawei equipment then in a competitive market you have alternative vendors to choose from. However, if the back doors mandated by congress are universal then you may not have another choice and you certainly dont have any choice in terms governance keys to the backdoors are controlled by the US government and its intelligence services alone (not the UN or your own government), until that is they fall into the hands of cybercriminals.
Given the mess that the current US administration has made over coronavirus, are we confident that they can be trusted with the keys to encryption backdoors for all our data either to use them responsibly or to keep them safe?
I am not in favour of backdoors at all, as they create new vulnerabilities. If, however, they are a political necessity, then maybe every member of the UN should nominate a country CTO and this group should be collectively responsible not only for holding the encryption keys, but also for collaborating on an international basis to address the growing cyber threat (especially from rogue nations).
Editors note: Bill works with a number of global vendors and accepts paid commissions from them, including Huawei; however, he has requested for us to point out that he is paid for his time and not his opinions therefore the opinions expressed in this and other articles are entirely his own.
Interested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases? Attend theCyber Security & Cloud Expo World Serieswith upcoming events in Silicon Valley, London and Amsterdam to learn more.
See more here:
Thoughts on encryption legislation - and the real 'link' between 5G and coronavirus - Cloud Tech
Encryption Software – Market Share Analysis and Research Report by 2025 – CueReport
A detailed overview of Encryption Software market with respect to the pivotal drivers influencing the revenue graph of this business sphere. The current trends of Encryption Software market in conjunction with the geographical landscape, demand spectrum, remuneration scale, and growth graph of this vertical have also been included in this report.
Some major findings of the encryption software market report include:
- The industrial verticals including healthcare, retail, and BFSI witnessed the heavy adoption of data protection solutions to protect sensitive/non-sensitive data and applications
Request Sample Copy of this Report @ https://www.cuereport.com/request-sample/22992
Encryption Software Market is expected to exceed USD 21 billion by 2026. The market growth is attributed to supportive government initiatives to combat cybercrimes and the rising instances of data breaches globally. For example, in November 2019, China's State Cryptography Administration (SCA) published a draft of an encryption law, which will regulate encryption in the private & public sectors. The draft also set guidelines on the usage of cryptography to safeguard national security. The growing implementation of disk, email, and mobile encryption capabilities in security suites provided by the cybersecurity vendors to address the evolving threats will augment market growth.
Request Sample Copy of this Report @ https://www.cuereport.com/request-sample/22992
- The cloud-based encryption software is gaining immense popularity as enterprises are migrating toward cloud platforms to store massively growing enterprise data and to leverage benefits in the form of on-demand scalability and reduced operational expenses
- Various small cybersecurity vendors and emerging startups are emerging in the market, offering a wide range of solutions to cater to the security needs of enterprises, expanding their customer base
- According to the HIPPA Journal, globally, the healthcare sector witnessed the highest breach costs, accounting for an average mitigation cost of USD 6.45 million
- The emerging startups, including Enveil (U.S.), Cosmian (Paris), Duality (U.S.), PreVeil LLC (U.S.) are focusing on fund-raising activities to develop new offerings and support business expansion. For instance, in September 2019, PreVeil raised USD 7 million in a Series B funding round led by Presidio Ventures to expand its business in the Japanese market.
The email encryption software market is expected to hold a share of over 25% in 2026 due to the rising uptake of security software to protect data from malware, identity thefts, and phishing. As email is one of the widely used communication methods used by enterprises, the demand for email data protection software to secure various aspects of email systems including content, media attachments or email access increases. The software encrypts data in transit and at rest and also supports multi-factor authentication for additional security, ensuring that sensitive information is always protected in line with regulatory compliance.
The on-premise deployment model segment held over 70% of the market share in 2019 and is projected to maintain a dominant position over the forecast timeline. The enterprises prefer an on-premise deployment model approach due to the high security associated with managing sensitive data in-house and gain access to cryptography keys for enhanced security. However, with the growing popularity of cloud platforms to store enterprise data due to high scalability and cost benefits, the demand for cloud-based encryption software is expected to accelerate over the forecast timeline.
The retail sector will also observe the heavy uptake of encryption over the projected timeframe owing to the need to protect customer data throughout a retailer's operations. The sector is witnessing a huge usage of third-party services to support online transactions, optimizing customer experience on their websites. This has led to a rise in the number of data breaches, exploiting sensitive customer information such as credit card & bank account details and personal credentials. According to a report published by Thales eSecurity, a cybersecurity provider, around 75% of the U.S. retailers have experienced a breach in 2018 as compared to 52% in 2017, exceeding the global average. The demand for cybersecurity solutions will rise significantly from 2020 to 2026, preventing theft & customer information compromise.
Latin America encryption software market is expected to grow at a CAGR of over 18% from 2020 to 2026 due to the rising number of cyberattacks on the business-critical infrastructure, growing usage of digital platforms among enterprises to conduct business transactions, and supportive government initiatives to promote cybersecurity. For instance, since December 2019, the Mexican institutions including Mexico Central Bank, the National Defense Ministry (Sedena), Mexico Supreme Court, and the House of Representatives recorded more than 45 million attempted attacks to access databases and steal information. The rapidly evolving threat landscape has compelled public & private enterprises to promote digital security to safeguard sensitive business information. The government agencies in the countries including Mexico, Brazil, and Argentina are introducing cybersecurity strategies to respond to a wide array of cyberattacks. For instance, in November 2017, the Mexican government presented the National Cyber Security Strategy in collaboration with the Inter-American Committee against Terrorism (CICTE). The strategy aims at establishing best practices to fight against cybercrimes.
The competition in the encryption software market is characterized by strategic partnerships, new product launches, and geographic expansion. For instance, in November 2019, Sophos partnered with Telefonica UK (O2) to provide its products & services to Telefonica's customers in the UK. The partnership enables the customers to gain access to Sophos Central cloud-based security platform to secure their organizations. The company's products & services also enable customers to minimize cybersecurity risks by using behavioral analytics and machine learning to identify known & unknown threats. In August 2018, Kapalya, a Hawaii-based cybersecurity startup, introduced a data protection solution to secure data at rest and data in transit on private & public clouds and mobiles. The platform allows users to work on any device, ensuring end-to-end encrypted file sharing.
Major Highlights from Table of contents are listed below for quick lookup into Encryption Software Market report
Chapter 1. Competitive Landscape
Chapter 2. Company Profiles
Chapter 3. Methodology & Scope
Chapter 4. Executive Summary
Chapter 5. Encryption Software industryInsights
Request Customization on This Report @ https://www.cuereport.com/request-for-customization/22992
See the original post:
Encryption Software - Market Share Analysis and Research Report by 2025 - CueReport
Encryption Management Solutions Market 2020 Global Share, Growth, Size, Opportunities, Trends, Regional Overview, Leading Company Analysis And…
Encryption Management Solutions Market Forecast 2020-2026
The Global Encryption Management Solutions Market research report provides and in-depth analysis on industry- and economy-wide database for business management that could potentially offer development and profitability for players in this market. This is a latest report, covering the current COVID-19 impact on the market. The pandemic of Coronavirus (COVID-19) has affected every aspect of life globally. This has brought along several changes in market conditions. The rapidly changing market scenario and initial and future assessment of the impact is covered in the report. It offers critical information pertaining to the current and future growth of the market. It focuses on technologies, volume, and materials in, and in-depth analysis of the market. The study has a section dedicated for profiling key companies in the market along with the market shares they hold.
The report consists of trends that are anticipated to impact the growth of the Encryption Management Solutions Market during the forecast period between 2020 and 2026. Evaluation of these trends is included in the report, along with their product innovations.
Get a PDF Copy of the Sample Report for free @ https://dataintelo.com/request-sample/?reportId=92039
The Report Covers the Following Companies:Check Point Software TechnologiesCisco SystemsIBMMicrosoftOracleSymantec
By Types:Disk EncryptionFolder Encryption Communication EncryptionCloud Encryption
By Applications:BFSIHealthcareGovernmentRetailIT and telecom
Furthermore, the report includes growth rate of the global market, consumption tables, facts, figures, and statistics of key segments.
By Regions:
Grab Your Report at an Impressive Discount! Please visit https://dataintelo.com/ask-for-discount/?reportId=92039
Years Considered to Estimate the Market Size:History Year: 2015-2019Base Year: 2019Estimated Year: 2020Forecast Year: 2020-2026
Important Facts about Encryption Management Solutions Market Report:
What Our Report Offers:
Make an Inquiry of This Report @ https://dataintelo.com/enquiry-before-buying/?reportId=92039
About DataIntelo:DATAINTELO has set its benchmark in the market research industry by providing syndicated and customized research report to the clients. The database of the company is updated on a daily basis to prompt the clients with the latest trends and in-depth analysis of the industry. Our pool of database contains various industry verticals that include: IT & Telecom, Food Beverage, Automotive, Healthcare, Chemicals and Energy, Consumer foods, Food and beverages, and many more. Each and every report goes through the proper research methodology, validated from the professionals and analysts to ensure the eminent quality reports.
Contact Info:Name: Alex MathewsAddress: 500 East E Street, Ontario,CA 91764, United States.Phone No: USA: +1 909 545 6473 | IND: +91-7000061386Email: [emailprotected]Website: https://dataintelo.com
Read more from the original source:
Encryption Management Solutions Market 2020 Global Share, Growth, Size, Opportunities, Trends, Regional Overview, Leading Company Analysis And...
Research Report on Data Encryption Service Market by Current Industry Status, Growth Opportunities, Top Key Players, and Forecast to 2025 -…
Global Data Encryption Service Market Report added by Market Study report scrutinizes the overall market synopsis globally, their restraining factors, drivers, major challenges, opportunities, latest trends to stabilize the global Data Encryption Service industry situation, future developmental plans, and values pertaining to various marketing states. This global Data Encryption Service market report also enables users to make a decision and considering the overall market feasibility. It also offers thorough information on market size, product, key players, various application and major geographical regions.
The Data Encryption Service market report offers an in-depth study of this business sphere which involves key insights pertaining to industry deliverables, particularly market trends, market share, market size, current valuation, and revenue estimations for the forecast period. The summary of the industry also identifies the Data Encryption Service market growth rate during the forecast timeline, spurred by certain catalysts, an idea of which has been explained in this research report, in tandem with the foremost challenges and growth opportunities present in the industry.
Request a sample Report of Data Encryption Service Market at:https://www.marketstudyreport.com/request-a-sample/2563392?utm_source=algosonline.com&utm_medium=SK
Important components highlighted in the Data Encryption Service market report:
Illuminating the regional spectrum of the Data Encryption Service market:
Data Encryption Service Market Segmentation: USA, Europe, Japan, China, India, South East Asia.
Understandings incorporated in the market study have been framed with respect to the industry indicators:
A comprehensive guideline of the Data Encryption Service market with regards to product & application spectrum:
Product landscape:
Product types:
Key understandings contained within the report:
Application landscape:
Application bifurcation:
Particulars highlighted in the report:
Ask for Discount on Data Encryption Service Market Report at:https://www.marketstudyreport.com/check-for-discount/2563392?utm_source=algosonline.com&utm_medium=SK
Other important pointers included in the report:
What does the competitive terrain of the Data Encryption Service market indicate?
Manufacturer base of the industry:
Competitive analysis outlined in the report includes:
In addition to the aforementioned pointers, the Data Encryption Service market study also delivers vital information referring to the industrys concentration ratio, that would likely aid active competitors in defining their business strategy to outdo other prominent players participating in the business sphere.
For More Details On this Report: https://www.marketstudyreport.com/reports/global-data-encryption-service-market-growth-status-and-outlook-2020-2025
Related Reports:
1. Global WiFi Hotspot Software Market Growth (Status and Outlook) 2020-2025Read More: https://www.marketstudyreport.com/reports/global-wifi-hotspot-software-market-growth-status-and-outlook-2020-2025
2. Global Consumer Ratings & Reviews Software Market Growth (Status and Outlook) 2020-2025Read More: https://www.marketstudyreport.com/reports/global-consumer-ratings-reviews-software-market-growth-status-and-outlook-2020-2025
Related Report : https://www.marketwatch.com/press-release/at-1540-cagr-global-low-speed-vehicle-market-size-poised-to-cross-usd-319053-million-by-2025-2020-07-20
Contact Us:Corporate Sales,Market Study Report LLCPhone: 1-302-273-0910Toll Free: 1-866-764-2150 Email: [emailprotected]