Category Archives: Encryption

Twitter Urged To Beef Up Encryption 07/20/2020 – MediaPost Communications

Twitter is facing new calls to beef up itssecurity practices, following a widely publicized hack that resulted in account hijackings.

Details about how the hackers gained access to the accounts -- including those of Elon Musk, Jeff Bezos and President BarackObama -- are still emerging. But at least one potential avenue of attack -- direct messages -- would be more secure if Twitter protected them with end-to-end encryption, according to the digitalrights group Electronic Frontier Foundation.

End-to-end encryption provides the robust internal safeguard that Twitter needs, the group writes in a post urging Twitter toimplement the security protocol.

Earlier this week, Twitter fell victim to what it describes as a coordinated social engineering attack by people who successfully targeted some of ouremployees with access to internal systems and tools.



Twitter says it believes that around 130 accounts weretargeted, and that hackers were able to gain control of a small subset of those accounts. The hackers, who asked people to send bitcoin to an anonymous address, reportedly received more than 400 payments, totaling around $121,000.

Direct messagesare vulnerable to this weeks kind of internal compromise, the Electronic Frontier Foundationsays. Thats because they arenotend-to-end encrypted, soTwitter itself has access to them.

The group adds that Twitter wouldnt have to worry about whether or not this weeks attackers read or exfiltrated DMs if it hadend-to-end encrypted them.

Sen. Ron Wyden (D-Oregon) also urged Twitter to encrypt direct messages.

While its still not clear if the hackers gained access toTwitter DMs, this is a vulnerability that has lasted for far too long, Wyden tweeted this week. If hackers gainedaccess to users' DMs, this breach could have a breathtaking impact for years to come.

Separately, New York Attorney General Attorney General Letitia James launched aninvestigation into the hack, which she stated raises serious concerns about datasecurity and how platforms like Twitter could be used to harm public debate.

See more here:
Twitter Urged To Beef Up Encryption 07/20/2020 - MediaPost Communications

Thoughts on encryption legislation – and the real ‘link’ between 5G and coronavirus – Cloud Tech

Opinion Conspiracy theories are nothing new, but the recent one that blamed the rollout of 5G networks for the spread of Covid-19 is one of the more bizarre examples in recent memory. Not only is it very obviously untrue to anyone that understands either the technology or virology, but there is also little real correlation. New Zealand which was one of the first countries to declare itself virus-free is accelerating its current 5G rollout while Brazil and the USA which have seen the highest death rates are not among the leaders in 5G adoption.

However, there are other parallels and lessons that could be learned here. Firstly, around following the science rather than political agendas and secondly around protection not only from radiation, but also from malware and snooping.

Many political leaders across the globe have claimed that their response to the pandemic has been led by the science. Unfortunately, there are many different ways of interpreting the science and also still many unknowns. Consequently, politicians have used the science to back their own agendas, at times arguing either in favour or against the use of face masks, lockdowns and testing depending on how well prepared they were or how much they were willing to admit to earlier mistakes. Populist leaders in particular have not fared well during the pandemic, being more prone to grandstanding than accepting the best scientific advice.

Similarly, with 5G, there are undeniable technological and economic advantages from having collaboration in the market to drive innovation and interoperability, as well as from having a level competitive playing field to ensure choice and value for money. Unfortunately, a populist agenda in the US to scapegoat certain Chinese players as part of a trade war has had a massively negative impact on the entire 5G rollout. The irony is that while nobody has yet found any backdoors in the Chinese equipment, the US Congress is currently seeking to pass a bill that would force companies to include backdoors in all encryption, showing that the US is actually doing what it want us to believe that the Chinese might be doing. The US arsonist is too busy shouting at the Chinese to stop playing with matches to spot the irony here.

The issue of PPE (masks, gowns, gloves) during the pandemic has shown us how important protection is. Firstly, it can be shown beyond doubt that in radiation terms 5G is far safer than previous generations of mobile communications, just as 4G was safer than 3G. Our ability to communicate more efficiently, increasing performance as we reducing power consumption, has been as effective for mobile communications as it has been for microprocessors (see Moores Law) and many other areas of technology.

Secondly, if encryption can be maintained then 5G is also more secure than previous generations of mobile technology. 5G uses encryption to provide anti-tracking and spoofing features that make it harder to track and manipulate individual device connections. 5G is also a much more software and cloud-based than previous wireless network technologies, which will allow for better monitoring to spot potential threats. It also allows operators to use network slicing to segment the system in numerous virtual networks, each of which can be managed and customized separately. This means that different slices can have different protections set up for specific types of devices.

At a time when the variety and sophistication of cyber threats is not only at an all-time high, but is also on the increase, we cannot afford either to drop our level of vigilance or to create any unnecessary vulnerabilities.

Patching vulnerabilities is a fulltime job for all technology vendors, the race to find and patch flaws is one that we need to win every time, while the cybercriminals only need to win occasionally. Independent scrutiny can be of benefit here. Many vendors offer bug bounties and Huawei has put its equipment forward for additional testing by labs based in the UK and elsewhere.

Almost all the 5G security is built on encryption. The problem about creating backdoors in this encryption is that you create additional associated vulnerabilities as well as governance issues. It is a bit like having a particularly virulent strain of smallpox held in a secure lab that if it escaped would instantly infect everyone. You would want to be sure that the lab was really secure and that those that held it were trustworthy.

Unfortunately, the proposed congressional bill would put the keys to the encryption backdoors in the hands of an administration that is unashamedly America First and does not feel obliged either to abide by international treaties or to cooperate with global institutions (such as the WHO) and an intelligence community that has already allowed its own hacking tools to be stolen and that has also already shown that it is neither open or honest about its use of encryption backdoors. Not only would governance issues be of concern to almost all other nations, but it would also be probably only a matter of time before criminals obtained access to the backdoors, thereby undermining everyones security.

The congressional encryption bill, while a well-intentioned initiative by politicians who do not understand the technological consequences, is a far greater threat to our collective security (over 5G and all other technologies) than the vendor that the US administration is currently seeking to scapegoat.

We need to be focusing on bug bounties and enhanced testing of equipment from all vendors, as well as global collaboration to patch vulnerabilities and counter the real threats, rather than creating back doors that would open up what could be calamitous new vulnerabilities.

After all, if you are not confident in the security of Huawei equipment then in a competitive market you have alternative vendors to choose from. However, if the back doors mandated by congress are universal then you may not have another choice and you certainly dont have any choice in terms governance keys to the backdoors are controlled by the US government and its intelligence services alone (not the UN or your own government), until that is they fall into the hands of cybercriminals.

Given the mess that the current US administration has made over coronavirus, are we confident that they can be trusted with the keys to encryption backdoors for all our data either to use them responsibly or to keep them safe?

I am not in favour of backdoors at all, as they create new vulnerabilities. If, however, they are a political necessity, then maybe every member of the UN should nominate a country CTO and this group should be collectively responsible not only for holding the encryption keys, but also for collaborating on an international basis to address the growing cyber threat (especially from rogue nations).

Editors note: Bill works with a number of global vendors and accepts paid commissions from them, including Huawei; however, he has requested for us to point out that he is paid for his time and not his opinions therefore the opinions expressed in this and other articles are entirely his own.

Interested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases? Attend theCyber Security & Cloud Expo World Serieswith upcoming events in Silicon Valley, London and Amsterdam to learn more.

See more here:
Thoughts on encryption legislation - and the real 'link' between 5G and coronavirus - Cloud Tech

Encryption Software – Market Share Analysis and Research Report by 2025 – CueReport

A detailed overview of Encryption Software market with respect to the pivotal drivers influencing the revenue graph of this business sphere. The current trends of Encryption Software market in conjunction with the geographical landscape, demand spectrum, remuneration scale, and growth graph of this vertical have also been included in this report.

Some major findings of the encryption software market report include:

- The industrial verticals including healthcare, retail, and BFSI witnessed the heavy adoption of data protection solutions to protect sensitive/non-sensitive data and applications

Request Sample Copy of this Report @

Encryption Software Market is expected to exceed USD 21 billion by 2026. The market growth is attributed to supportive government initiatives to combat cybercrimes and the rising instances of data breaches globally. For example, in November 2019, China's State Cryptography Administration (SCA) published a draft of an encryption law, which will regulate encryption in the private & public sectors. The draft also set guidelines on the usage of cryptography to safeguard national security. The growing implementation of disk, email, and mobile encryption capabilities in security suites provided by the cybersecurity vendors to address the evolving threats will augment market growth.

Request Sample Copy of this Report @

- The cloud-based encryption software is gaining immense popularity as enterprises are migrating toward cloud platforms to store massively growing enterprise data and to leverage benefits in the form of on-demand scalability and reduced operational expenses

- Various small cybersecurity vendors and emerging startups are emerging in the market, offering a wide range of solutions to cater to the security needs of enterprises, expanding their customer base

- According to the HIPPA Journal, globally, the healthcare sector witnessed the highest breach costs, accounting for an average mitigation cost of USD 6.45 million

- The emerging startups, including Enveil (U.S.), Cosmian (Paris), Duality (U.S.), PreVeil LLC (U.S.) are focusing on fund-raising activities to develop new offerings and support business expansion. For instance, in September 2019, PreVeil raised USD 7 million in a Series B funding round led by Presidio Ventures to expand its business in the Japanese market.

The email encryption software market is expected to hold a share of over 25% in 2026 due to the rising uptake of security software to protect data from malware, identity thefts, and phishing. As email is one of the widely used communication methods used by enterprises, the demand for email data protection software to secure various aspects of email systems including content, media attachments or email access increases. The software encrypts data in transit and at rest and also supports multi-factor authentication for additional security, ensuring that sensitive information is always protected in line with regulatory compliance.

The on-premise deployment model segment held over 70% of the market share in 2019 and is projected to maintain a dominant position over the forecast timeline. The enterprises prefer an on-premise deployment model approach due to the high security associated with managing sensitive data in-house and gain access to cryptography keys for enhanced security. However, with the growing popularity of cloud platforms to store enterprise data due to high scalability and cost benefits, the demand for cloud-based encryption software is expected to accelerate over the forecast timeline.

The retail sector will also observe the heavy uptake of encryption over the projected timeframe owing to the need to protect customer data throughout a retailer's operations. The sector is witnessing a huge usage of third-party services to support online transactions, optimizing customer experience on their websites. This has led to a rise in the number of data breaches, exploiting sensitive customer information such as credit card & bank account details and personal credentials. According to a report published by Thales eSecurity, a cybersecurity provider, around 75% of the U.S. retailers have experienced a breach in 2018 as compared to 52% in 2017, exceeding the global average. The demand for cybersecurity solutions will rise significantly from 2020 to 2026, preventing theft & customer information compromise.

Latin America encryption software market is expected to grow at a CAGR of over 18% from 2020 to 2026 due to the rising number of cyberattacks on the business-critical infrastructure, growing usage of digital platforms among enterprises to conduct business transactions, and supportive government initiatives to promote cybersecurity. For instance, since December 2019, the Mexican institutions including Mexico Central Bank, the National Defense Ministry (Sedena), Mexico Supreme Court, and the House of Representatives recorded more than 45 million attempted attacks to access databases and steal information. The rapidly evolving threat landscape has compelled public & private enterprises to promote digital security to safeguard sensitive business information. The government agencies in the countries including Mexico, Brazil, and Argentina are introducing cybersecurity strategies to respond to a wide array of cyberattacks. For instance, in November 2017, the Mexican government presented the National Cyber Security Strategy in collaboration with the Inter-American Committee against Terrorism (CICTE). The strategy aims at establishing best practices to fight against cybercrimes.

The competition in the encryption software market is characterized by strategic partnerships, new product launches, and geographic expansion. For instance, in November 2019, Sophos partnered with Telefonica UK (O2) to provide its products & services to Telefonica's customers in the UK. The partnership enables the customers to gain access to Sophos Central cloud-based security platform to secure their organizations. The company's products & services also enable customers to minimize cybersecurity risks by using behavioral analytics and machine learning to identify known & unknown threats. In August 2018, Kapalya, a Hawaii-based cybersecurity startup, introduced a data protection solution to secure data at rest and data in transit on private & public clouds and mobiles. The platform allows users to work on any device, ensuring end-to-end encrypted file sharing.

Major Highlights from Table of contents are listed below for quick lookup into Encryption Software Market report

Chapter 1. Competitive Landscape

Chapter 2. Company Profiles

Chapter 3. Methodology & Scope

Chapter 4. Executive Summary

Chapter 5. Encryption Software industryInsights

Request Customization on This Report @

See the original post:
Encryption Software - Market Share Analysis and Research Report by 2025 - CueReport

Encryption Management Solutions Market 2020 Global Share, Growth, Size, Opportunities, Trends, Regional Overview, Leading Company Analysis And…

Encryption Management Solutions Market Forecast 2020-2026

The Global Encryption Management Solutions Market research report provides and in-depth analysis on industry- and economy-wide database for business management that could potentially offer development and profitability for players in this market. This is a latest report, covering the current COVID-19 impact on the market. The pandemic of Coronavirus (COVID-19) has affected every aspect of life globally. This has brought along several changes in market conditions. The rapidly changing market scenario and initial and future assessment of the impact is covered in the report. It offers critical information pertaining to the current and future growth of the market. It focuses on technologies, volume, and materials in, and in-depth analysis of the market. The study has a section dedicated for profiling key companies in the market along with the market shares they hold.

The report consists of trends that are anticipated to impact the growth of the Encryption Management Solutions Market during the forecast period between 2020 and 2026. Evaluation of these trends is included in the report, along with their product innovations.

Get a PDF Copy of the Sample Report for free @

The Report Covers the Following Companies:Check Point Software TechnologiesCisco SystemsIBMMicrosoftOracleSymantec

By Types:Disk EncryptionFolder Encryption Communication EncryptionCloud Encryption

By Applications:BFSIHealthcareGovernmentRetailIT and telecom

Furthermore, the report includes growth rate of the global market, consumption tables, facts, figures, and statistics of key segments.

By Regions:

Grab Your Report at an Impressive Discount! Please visit

Years Considered to Estimate the Market Size:History Year: 2015-2019Base Year: 2019Estimated Year: 2020Forecast Year: 2020-2026

Important Facts about Encryption Management Solutions Market Report:

What Our Report Offers:

Make an Inquiry of This Report @

About DataIntelo:DATAINTELO has set its benchmark in the market research industry by providing syndicated and customized research report to the clients. The database of the company is updated on a daily basis to prompt the clients with the latest trends and in-depth analysis of the industry. Our pool of database contains various industry verticals that include: IT & Telecom, Food Beverage, Automotive, Healthcare, Chemicals and Energy, Consumer foods, Food and beverages, and many more. Each and every report goes through the proper research methodology, validated from the professionals and analysts to ensure the eminent quality reports.

Contact Info:Name: Alex MathewsAddress: 500 East E Street, Ontario,CA 91764, United States.Phone No: USA: +1 909 545 6473 | IND: +91-7000061386Email: [emailprotected]Website:

Read more from the original source:
Encryption Management Solutions Market 2020 Global Share, Growth, Size, Opportunities, Trends, Regional Overview, Leading Company Analysis And...

Bill That Mandates Cyber Backdoors Will Leave Front Doors Wide Open – CPO Magazine

A few weeks ago a group of U.S. Republican senators introduced the Lawful Access to Encrypted Data Act, a bill that would compel American tech companies to put backdoors in their products to give law enforcement access to customers data with a warrant.

If passed, the Act will put everyones data at risk, while reversing decades of work to make encryption stronger and personal data more secure.

Even for purposes of lawful access, no company wants government pressure to insert vulnerabilities in their products. Adding any sort of hidden backdoor access or decryption capability potentially jeopardizes a companys reputation and its business prospects.

Yet such pressure is reality in the tech industry. In 2016, for example, Apple famously refused an FBI request to unlock an iPhone linked to a shooting in California.

But its not just the U.S. government pushing companies to install backdoors. In 2018, a letter was issued by the Five Eyes intelligence-sharing alliance, consisting of the U.S., U.K., Canada, Australia and New Zealand. The letter warned that if private companies refused to help authorities de-code encrypted emails, text messages, and voice communications, the Five Eyes governments might pursue technological, enforcement, legislative or other measures to achieve lawful access solutions.

Tech companies have faced such pressure to compromise privacy for decades. In the 1990s, the FBI floated the concept of key escrow, whereby software developers would copy the keys to every algorithm and give them to authorities upon request. In 2017, thenU.S. Deputy Attorney General Rod Rosenstein claimed that encrypted apps were protecting criminals like terrorists and drug dealers. Rosenstein acknowledged that the approach taken in the recent past negotiating with technology companies and hoping that they eventually will assist law enforcement out of a sense of civic duty is unlikely to work.

Why would that be? Do technology companies lack a sense of civic duty? A more likely explanation is that they know vulnerabilities are inevitably discovered and exploited. This turns their products into the cyber-equivalent of a suitcase lock made for the Transportation Security Administration. TSA authorities have master keys that can open any TSA-approved lock, allowing the agency to open your luggage without breaking the lock and damaging your suitcase.

As many people predicted when the program was rolled out, this vulnerability was soon exploited by hackers, allowing anyone with a 3D printer copy of the master keys and sell them on the black market. The same thing could easily happen with data networks.

As the Internet of Things ushers in an era of cyber-physical systems, network security is becoming a matter of life and death: instead of just disclosing your credit card information, a system breach could highjack the car youre driving or stop the pacemaker that controls your heart.

Think about the legal liability, reputational damage, and potential loss of life. What company wants any part of that?

Its sponsors in Congress will argue that the Lawful Access to Encrypted Data Act will keep Americas networks safe. Sadly, the effect will be the exact opposite. And tech companies know it.

Just as no organization wants to get hacked, no company in the world wants to install backdoors in their technology. Its just bad for business, as products are compromised, customers angered, and corporate reputations tarnished or destroyed.

Building a backdoor access that may be exploited by #hackers is a risk that no technology company is willing to take. #cybersecurity #respectdata Click to Tweet

Any backdoor makes us all less secure. As cyber security expert Bruce Schneier points out, you cant build a backdoor that only works with proper legal authorization, or only for people with a particular citizenship or the proper morality. If a backdoor exists, it can be exploited. Thats a risk no company is willing to take.

Read the original:
Bill That Mandates Cyber Backdoors Will Leave Front Doors Wide Open - CPO Magazine

Research Report on Data Encryption Service Market by Current Industry Status, Growth Opportunities, Top Key Players, and Forecast to 2025 -…

Global Data Encryption Service Market Report added by Market Study report scrutinizes the overall market synopsis globally, their restraining factors, drivers, major challenges, opportunities, latest trends to stabilize the global Data Encryption Service industry situation, future developmental plans, and values pertaining to various marketing states. This global Data Encryption Service market report also enables users to make a decision and considering the overall market feasibility. It also offers thorough information on market size, product, key players, various application and major geographical regions.

The Data Encryption Service market report offers an in-depth study of this business sphere which involves key insights pertaining to industry deliverables, particularly market trends, market share, market size, current valuation, and revenue estimations for the forecast period. The summary of the industry also identifies the Data Encryption Service market growth rate during the forecast timeline, spurred by certain catalysts, an idea of which has been explained in this research report, in tandem with the foremost challenges and growth opportunities present in the industry.

Request a sample Report of Data Encryption Service Market at:

Important components highlighted in the Data Encryption Service market report:

Illuminating the regional spectrum of the Data Encryption Service market:

Data Encryption Service Market Segmentation: USA, Europe, Japan, China, India, South East Asia.

Understandings incorporated in the market study have been framed with respect to the industry indicators:

A comprehensive guideline of the Data Encryption Service market with regards to product & application spectrum:

Product landscape:

Product types:

Key understandings contained within the report:

Application landscape:

Application bifurcation:

Particulars highlighted in the report:

Ask for Discount on Data Encryption Service Market Report at:

Other important pointers included in the report:

What does the competitive terrain of the Data Encryption Service market indicate?

Manufacturer base of the industry:

Competitive analysis outlined in the report includes:

In addition to the aforementioned pointers, the Data Encryption Service market study also delivers vital information referring to the industrys concentration ratio, that would likely aid active competitors in defining their business strategy to outdo other prominent players participating in the business sphere.

For More Details On this Report:

Related Reports:

1. Global WiFi Hotspot Software Market Growth (Status and Outlook) 2020-2025Read More:

2. Global Consumer Ratings & Reviews Software Market Growth (Status and Outlook) 2020-2025Read More:

Related Report :

Contact Us:Corporate Sales,Market Study Report LLCPhone: 1-302-273-0910Toll Free: 1-866-764-2150 Email: [emailprotected]

Visit link:
Research Report on Data Encryption Service Market by Current Industry Status, Growth Opportunities, Top Key Players, and Forecast to 2025 -...

These encrypted iStorage hard drives and flash drives are the ultimate peace of mind for your data – Boing Boing

If data is worth saving to an external drive, shouldnt it also be important enough to protect?

Since setting up shop in the UK over a decade ago, iStorage has become one of the top makers of encrypted, easy to use and affordable portable data storage devices. And while not everyone needs multi-level security in place before someone accesses their files, iStorage products make steel-trap protection a standard feature in all of their flash drives, hard drives and even cloud services options.

Flash drives usually live up to their name, used for quick data transportation and transfers. But that pocket-sized convenience has its security downsides as well, including vulnerability to malware, tampering, hacking or just outright theft. With the datAshur PRO and PRO, you get an assortment of protection measures to make sure no one compromises or steals your data ever.

In addition to built-in full disk AES-XTS 256-bit hardware encryption, both models also feature keypad protection. Set a unique PIN of up to 15 digits and without that PIN, no one gets to your information. The stick auto-locks the moment you unplug and with the brute force hack defense mechanism, all data permanently deletes with 10 incorrect login attempts. Better to be gone than fall into the wrong hands!

The PRO is available in sizes from 8GB to 128GB, while the PRO with faster read and write speeds is available from 16GB to 512GB.

When it absolutely must be protected...and its big, the diskAshur range of solid-state drives is ready to assist. Its got the same military-grade AES-XTS 256-bit encryption and coded keypad to shield all your data as the datAshur drives, plus truly spacious storage to accommodate virtually any files you need protected, regardless of size.

As with the datAshur models, data transfer speeds are the main differentiator here, with the HDD offering spaces up to a whopping 5TB, while the faster SSD version sports more limited capacity, but logs much faster transfers up to 361 MB/s read speed and up to 358 MB/s write speed.

With a lofty 4.5 out of 5 star rating among Amazon reviewers as well as the experts at PCMag saying these drives could be the ultimate in secure storage, you can feel confident that iStorage has your back.

But what if your data is in the cloud and out of your direct control? Most cloud providers actually hold the key to your encrypted data, but with cloudAshure, you can safely secure data yourself virtually anywhere you want to put it, from encrypting data locally on a Windows PC or Mac, on any portable data storage device, or even encrypting files shared via email or file-sharing software services. The key stays with you, making it virtually impossible for crooks to steal your data, even if they could access your cloud storage provider.

Prices are subject to change.

Do you have your stay-at-home essentials? Here are some you may have missed.

In this footage, a supercomputers CPU cores nearly 900 of them are neatly lined up in the Task Manager. The Doom logo appears, generated by code that targets each core. Then Doom itself plays, each pixel generated by thrashing a core with just the right amount of busy work. Max Holt: Finally got []

The UK government today ordered domestic companies to stop buying equipment from Chinese vendor Huawei and to stop using its kit entirely by 2027. Huawei is suspected to be an arm of the Chinese government, breaking into western markets (and maybe its networks) by selling impossibly cheap equipment. The UK only recently approved more Huawei []

Amazons new Chinese thermal spycam vendor was blacklisted by U.S. over allegations it helped China detain and monitor Uighurs and other Muslim minorities

Were a latest and greatest kind of culture. We want the newest, shiniest, fastest piece of tech in existence and many are willing to pay top dollar for the privilege of saying no one owns one better. The reality is that life at the tech pinnacle is incredibly fleeting. Within months, sometimes weeks, even []

If you want an easy, on-the-go listening option, you can always just make the simplest move, join the herd and pick up the latest AirPods Pro. Its only $250, right? While AirPods are great, they arent perfect. Once you shop around a bit, youll find there are loads of quality earbuds out there that are []

Going to the grocery store used to just be a daily chore you had to fit into your schedule. But now, a trip to the grocery store can actually be dangerous, especially for the elderly or those with compromised immune systems. Which is why Sams Club has started an actual concierge service, allowing members on []

Original post:
These encrypted iStorage hard drives and flash drives are the ultimate peace of mind for your data - Boing Boing

Facebook’s Rolling Out Touch ID and Face ID Lock Options for Messenger – Social Media Today

Let's admit it - part of the reason why messaging apps are seeing such a significant rise in usage is because we can say whether we want in a message thread, without fear of offending people or causing relationship rifts, upsetting relatives, etc.

That's why this is probably a good addition - as shared by social media expert Matt Navarra, Facebook is now rolling out Touch ID and Face ID lock options for Messenger on iOS.

That will stop people from additionally snooping on your Messenger chats.

Once enabled, you can choose how long it takes before your Messenger needs to be unlocked again with Face/Touch ID.

So for those overly paranoid about people checking their phone, they can lock it as soon as they've finished using the app.

Social media advisor Jeff Higgins also shared this video of the process in action on opening the app.

Facebook's been working on the option over the last few months, with Engadget sharing screenshots of the in-development tool early last month.

The addition is in line with Facebook's gradual shift towards improving messaging security, which includes its plan to eventually enable end-to-end encryption as the default setting for all messages. That plan has come under intense scrutiny by several government agencies, who believe that a move to full encryption will facilitate increased criminal activity in Facebook's apps. Already, various authorities have raised concerns about encryption in WhatsApp.

However, Facebook is determined to push ahead with its plan, and while locking your Messenger app is a smaller element in this broader process, it's another indicator of user demand for more privacy, and security, with their personal interactions. And worth noting, Messenger already has an optional 'Secret' chat modewhich is fully encrypted.

Now to see if it enables the same in WhatsApp and Instagram. Eventually, Facebook plans to merge the messaging functionality of the three apps, which also means that any functionality added to one is likely on its way for the others. It doesn't seem to make much sense that they would add additional security for Messenger if the other two are not protected, so it won't be any surprise to see Facebook launch the same for each app in due course.

Facebook told Engadget that it also plans to port the same option to Android in the near future.

The rest is here:
Facebook's Rolling Out Touch ID and Face ID Lock Options for Messenger - Social Media Today

Virtual and face-to-face connect to coexist: Zoom COO – Fortune India

What do you think of competition? What sets you apart? What do you have to say about competition from India, more specifically JioMeet?

We have been dealing with competition since 2011, when the company was founded. We have had to deal with very large incumbents in the marketplace from an early timeframe. We view competition as a good thing. It only spurs us to focus on what we can controlour innovation and our ability to deliver happiness to our customers.

It takes a lot for us to deliver Zoom in the way it is: a very easy to use, high quality, video collaboration service. And as I mentioned, the architecture is very important. The know-how around the globally distributed network that we have, even the user interface, the simplicity, the feature set, etc. These are all things that we agonise over and have agonised over in our development. And really take feedback from our customers to heartboth our free customers all the way to our paid customers.

I would say there is no one thing that makes Zoom special. I think it is a combination of all of that and an intensely focussed and driven employee base that really cares for its customer and its community. And I think that has helped us up to this point address competitive threats, and it will help us going forward.

About JioMeet, to be honest, I havent looked at the product. But I will say the factors that help us compete, you know, historically are going to be the factors that help us compete going forward, we are focussed on delivering a very secure, very reliable, and very easy to use product. And that we are going to focus on what we can control.

Having said that competition just makes you more hungry. There should be no difference to how that impacts Zoom today as it has impacted Zoom years before as well and all along.

There is speculation about Zoom being a Chinese company. Could you tell us something about its origins?

I will just say that Zoom is not a Chinese company. We are listed on the Nasdaq and our headquarters are here in San Jose. Our founder [Yuan] may be ethnically Chinese, but hes an American citizen. He's been in this country since 1997. His three kids go to the local schools. His life has largely been American by choice.

We were set up with the intention to provide workplace collaboration services, for businesses, and with the view that, if we can provide video conferencing or video collaboration services to enterprises. That would be sort of the holy grail for us. At the end of December, we had around 10 million daily meeting participants. And by the end of April we had 300 million daily meeting participants, and that has been the significant shift during the pandemic.

A lot of it are schools. Education has always had a big value for our company. Erics core passion in education, but it's also our employees core passion. We did a ground-up survey of our employees and education was one of the top three initiatives. So, it made sense when the pandemic hit, to offer countries across the world, the opportunity to have free service for schools.

I think I noticed the difference when we offered K through 12 services for free in the U.S. Suddenly everybody knew about Zoom. We started to get a lot of different use-cases that we had probably not anticipated, because largely we are focussed on enterprises. And the challenge we face going forward is how do we embrace and continue to allow to flourish these various use-cases.

Zoom was made for the enterprise, but individuals took to it in droves. Did problems such as Zoombombing and the like crop up because it wasnt being used the way it was envisaged to be?

Zoom was originally developed for enterprise use and has been confidently selected for complete deployment by a large number of institutions globally, following security reviews of our user, network, and datacentre layers. However, we saw more participation from standalone users, who have been using the platform to connect to their family, friends, and colleagues; increased usage by schools to continue the education processes, etc. A lot of such users are unaware of various security measures one should adopt while on a virtual platform, leading to issues like meeting bombing.

Zoom has recently launched the latest version, Zoom 5.0, that delivers one of our most advanced security enhancements to date with support for AES 256-bit GCM encryption, which provides added protection for meeting data and greater resistance to tampering. The version provides users with features like reporting a user, new encryption icon, and enhanced data centre information which allows more flexibility and security to users.

Let us talk about end-to-end encryption (E2EE) and endless speculation about whether it would be offered to free users. How do you end the speculation?

Well, let me end it right now. We are in the development process for end-to-end encryption. We have already announced that were going to have a limited beta. And then we are going to continue working on rolling out this product through the end of the year. It will be the first end-to-end encryption feature available on video collaboration. Its very hard to do and then it will be the first. What were trying to accomplish is to have in Zoom formats or Zoom scale I want to be very clear that it will be available for all customers across the platform, both paid and free. Were still working out the details, but we will probably deploy some sort of a one-time risk-based authentication for free users that use E2EE.

But at the end of the day, it is extremely important that we provide an opportunity for our customers to have communications that they believe are private and secure. I want to just make sure that youre aware that today even without E2EE, when our customers are using the application and are on the parts of the application that are controlled by Zoom, they have AES 256-bit GCM encryption, which is industry leading today.

All Zoom users will continue to use AES 256 GCM transport encryption as the default encryption, while E2EE will be an optional feature. This is because it limits some meeting functionality, such as the ability to include traditional PSTN phone lines or SIP/H.323 hardware conference room systems. Hosts will toggle E2EE on or off on a per-meeting basis. And account administrators can enable and disable E2EE at the account and group level.

Virtual and face-to-face connect to coexist: Zoom COO - Fortune India

Global Cloud Encryption Technology Market Expeted To Reach xx.xx mn USD With growth Rate of xx by 2025| Pandamic Impact Analysis : Gemalto, Sophos,…

A new market intelligence report documentation has been added with extensive research elements, evaluating the diverse growth propellants in the Global Cloud Encryption Technology Market. The report is a mindful representation of robust research activities undertaken by in-house research experts who have critically imbibed the output of various primary and secondary research endeavors in a bid to comprehend the impact of COVID-19 reflected upon the growth trajectory of the Cloud Encryption Technology market.

Owing to the sudden onset of dynamic macro-economic factors such as the outrage of COVID-19, the Cloud Encryption Technology market has been thoroughly affected by the current developments, thus manifesting in a myriad alterations and tangible deviations from the regular growth course of the Cloud Encryption Technology market. Our researchexperts and industry analysts.

The study encompasses profiles of major companies operating in the Cloud Encryption Technology Market. Key players profiled in the report includes:GemaltoSophosSymantecSkyHigh NetworksNetskope

Available Sample Report in PDF Version along with Graphs and [emailprotected]

The report is a holistic, ready-to-use compilation of all major events and developments that replicate growth in the Cloud Encryption Technology market.A thorough analytical review of the pertinent growth trends influencing the Cloud Encryption Technology market has been demonstrated in the report to affect unbiased and time-efficient business discretion amongst various leading players, seeking a strong footing in the competitive landscape of the Cloud Encryption Technology market, which regularly gets influenced in a major way by the ongoing micro and macro-economic factors having a lingering set of implications on the global growth trends of the aforementioned market.

Access Complete Report @

By the product type, the market is primarily split into SolutionServices

By the end-users/application, this report covers the following segments BFSIHealthcare and LifesciencesMedia and EntertainmentRetail and E commerceAutomotive and ManufacturingIT and Telecom

The following sections of this versatile report on Cloud Encryption Technology market specifically sheds light on popular industry trends encompassing both market drivers as well as dominant trends that systematically affect the growth trajectory visibly. The report also sheds substantial light on all major key producers dominant in the Cloud Encryption Technology market, encompassing versatile details on facets such as production and capacity deductions. Substantial light has also been shed upon other key elements such as overall production, activities practiced by key players, best of the industry practices.

Global Cloud Encryption Technology Geographical Segmentation Includes: North America (U.S., Canada, Mexico) Europe (U.K., France, Germany, Spain, Italy, Central & Eastern Europe, CIS) Asia Pacific (China, Japan, South Korea, ASEAN, India, Rest of Asia Pacific) Latin America (Brazil, Rest of L.A.) Middle East and Africa (Turkey, GCC, Rest of Middle East)

These details are indicated in the report to allow market players undertake a systematic analytical review of the Cloud Encryption Technology market to arrive at logical conclusions governing the growth trajectory of the Cloud Encryption Technology market and their subsequent implications on the growth of the aforementioned market.

Some Major TOC Points: Chapter 1. Report Overview Chapter 2. Global Growth Trends Chapter 3. Market Share by Key Players Chapter 4. Breakdown Data by Type and Application Chapter 5. Market by End Users/Application Chapter 6. COVID-19 Outbreak:Cloud Encryption Technology Industry Impact Chapter 7. Opportunity Analysis in Covid-19 Crisis Chapter 9. Market Driving ForceAnd Many More

In addition to all of these detailed Cloud Encryption Technology market specific developments, the report sheds light on components such as challenges, threats, drivers, as well as opportunities that collectively reflect a thorough growth trail. Details on product portfolios, user application as well as ongoing technical developments concerning the product line have also been touched upon, to derive accurate understanding about the market prognosis and their subsequent implications upon the Cloud Encryption Technology market.

Global Cloud Encryption Technology Market Report: Research Methodology

In this latest research publication on the Cloud Encryption Technology market, a thorough overview of the current market scenario has been portrayed, in a bid to aid market participants, stakeholders, research analysts, industry veterans and the like to borrow insightful cues from this ready-to-use market research report, thus influencing a definitive business discretion. The report in its subsequent sections also portrays a detailed overview of competition spectrum, profiling leading players and their mindful business decisions, influencing growth in the Cloud Encryption Technology market.

COVID 19 Impact study on Cloud Encryption Technology by our researchers.In the light of the lingering C OVID-19 pandemic , this mindfully drafted research offering is in complete sync with the current ongoing market developments as well as challenges that together render tangible influence upon the holistic growth trajectory of the Cloud Encryption Technology market.

Do You Have Any Query or Specific Requirement? Ask Our Industry [emailprotected]

About Us :

With unfailing market gauging skills, has been excelling in curating tailored business intelligence data across industry verticals. Constantly thriving to expand our skill development, our strength lies in dedicated intellectuals with dynamic problem solving intent, ever willing to mold boundaries to scale heights in market interpretation.

Contact Us :

Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: USA: +1 (972)-362-8199 | IND: +91 895 659 5155

Continue reading here:
Global Cloud Encryption Technology Market Expeted To Reach xx.xx mn USD With growth Rate of xx by 2025| Pandamic Impact Analysis : Gemalto, Sophos,...