Category Archives: Encryption
Encryption A.l Developer Rug Pulls $2 Million To Repay A $300,000 Crypto Gambling Debt – Bitcoinist
A 22-year developer behind Encryption A.l, a cryptocurrency project, hasrug-pulled users of roughly $2 million ahead of the platforms liquidity migration. In a screenshot shared on July 3 and posted on Twitter, the developer apologized, saying that while he deeply regretted his actions and impact on users, he was battling a crypto-gambling addiction that has seen him lose over $300,000 in the past few months.
The decision to rug-pull user funds and make away with $2 million was, it appears, a way of recouping his crypto gambling losses.
According todatafrom DEXTools, the prices of OxEncrypt slumped by over 95% following this decision, crashing from over $3.25 to as low as $0.02 by the time the screenshot was shared. The token was only available for trading on Uniswap, the worlds largest decentralized cryptocurrency exchange.
OxEncrypt was the native token of Encryption A.l, a cryptocurrency project that claimed to be building an arsenal of tools to empower traders and developers.
Among some of the tools, the platformallowed the creation of Telegram bots which the developer said would instead allow the owner to trade decentralized finance (DeFi) instruments much more efficiently.
The team added that their bots use different algorithms to encrypt smart contract addresses so they arent detectable to sniper bots and Telegram bots. Among these tools include a Wallet Analysis Tool that gives a detailed report about a wallets balance; and a Fresh Wallet Detective tool for picking out the first 100 contract buyers.
In a post on Twitter, the platform was supposed to migrate on July 3 but added another 48 hours extension for users to migrate via DEXTools. The purpose of the migration was to, among other enhancements, improve the platforms functionality and address other concerns raised by community members.
Going by the timing of the rug pull, it appears the developer took advantage of the increased tokens locked in the projects liquidity pools on Uniswap to steal user funds. Typically, a hard rug pull executed by the developer means the project has been effectively abandoned unless it is revived by the community who saw value in the platform.
On the other hand, investors who had committed to the project have been left holding worthless OxEncrypt tokens. Moreover, unless the developer is sued, victims could have no recourse. This reality is considering the trustless, global, and immutable nature of Ethereum smart contracts enabling token locking and trading on Uniswap.
Feature image from Canva, chart from TradingView
Read the rest here:
Encryption A.l Developer Rug Pulls $2 Million To Repay A $300,000 Crypto Gambling Debt - Bitcoinist
Encryption Software Market Size, Global Insights and Trends … – Digital Journal
PRESS RELEASE
Published July 6, 2023
Report Ocean recently released a comprehensive report on theglobal Encryption Software market, offering valuable insights into various factors impacting the markets growth. The report covers crucial information on market restraints, drivers, and opportunities, enabling readers to understand the market dynamics. It also provides a detailed analysis of industry developments and trends that are shaping theglobal Encryption Software market. Furthermore, the report includes a thorough assessment of the market at both global and regional levels, providing comprehensive insights for businesses and stakeholders.
The global encryption software market size was US$ 9.7 billion in 2021. The global encryption software market size is forecast to reach US$ 47.51 billion by 2030, growing at a compound annual growth rate (CAGR) of 19.3% during the forecast period from 2022 to 2030.
Request To Download Sample of This Strategic Report @https://reportocean.com/industry-verticals/sample-request?report_id=BWCC931
The primary purpose of the encryption software is to protect the confidentiality of data stored in files, folders, and disks and data traveling over wireless networks or data in transit, depending on an organizations security and compliance requirements. It involves converting a message or plain text into a coded message called an encrypted message so that only authorized parties can read it. Software encryption uses software to encrypt and decrypt resting and transiting data. Thus, by making the data unreadable by unauthorized people, encryption software ensures the security of confidential data.
Factors Influencing Market Growth
Impact Analysis of COVID-19
The adoption of encryption software increased during the COVID-19 pandemic. In addition, organizations globally were working remotely as governments worldwide imposed lockdowns in order to combat the spread of the virus. Thus, an increase in the quantity of data stored in the clouds was followed by other problems such as performance, availability, security, and encryption software solutions and services. In addition, the threat of data theft has increased the demand for this software. Thus, the COVID-19 pandemic has positively impacted the global encryption software market growth.
Regional Insights
North America held dominance in the encryption software market in 2021 and is forecast to continue dominating during the forecast period. As a result of the growing adoption and development of encryption software. In addition, the increasing demand to comply with stringent regulations, the increased presence of encryption software vendors, and the growth of government support are fueling the market growth in the region.
The Asia Pacific region is forecast to have lucrative growth in the market during the forecast period. As a result of the existing leading companies in the region. In addition, the rising investments by private and public sectors in order to secure sensitive data results in an increase in the demand for this software used to protect and ensure the privacy of data.
Leading Competitors
The leading prominent companies profiled in the global encryption software market are:
Scope of the Report
The global encryption software market segmentation focuses on Organization Size, Component, Deployment Model, Industry Vertical, Function, and Region.
Segmentation based on Organization Size
Segmentation based on Component
Segmentation based on Deployment Model
Segmentation based on Industry Vertical
Segmentation based on Function
Download Sample Report, SPECIAL OFFER (Avail an Up-to 30% discount on this report ): https://reportocean.com/industry-verticals/sample-request?report_id=BWCC931
Segmentation based on Region
Table of Content
Chapter 1: Global Encryption Software Industry Overview
Chapter 3: Market Dynamics
Chapter 4: Top Company Profiles
Chapter 5: Global Encryption Software market Competition, by Players
Chapter 6: Global Market Size by Regions
Chapter 7: Global Market Segment by Application
Chapter 8: Global Encryption Software Industry Segment by Type
Chapter 9: Market Chain, Sourcing Strategy, and Downstream Buyers
Chapter 10: Strategies and key policies by Distributors/Suppliers/Traders
Chapter 11: Key Marketing Strategy Analysis, by Market Vendors
Chapter 12: Market Effect Factors Analysis
Chapter 13: Global Encryption Software market Size Forecast (2023-2031).
Encryption Software Market Research Report Scenario includes:
>The report provides qualitative and quantitative trends of global Encryption Software Market across type, type of products, service, and geography.
>The report starts with the key takeaways, highlighting the key trends and outlook of the global Encryption Software Market.
>Provides the research methodology of the study.
>Further provides PEST analysis for each region.
>Highlights the key industry dynamics in the Encryption Software Market, including factors that are driving the market, prevailing deterrent, potential opportunities as well as future trends. Impact analysis of these drivers and restraints is also covered in this section.
>Discusses the global Encryption Software Market scenario, in terms of historical market revenues, and forecast till the year 2031.
Full Report Description, TOC, Table of Figure, Chart, etc.-https://reportocean.com/industry-verticals/sample-request?report_id=BWCC931
About Report Ocean:
We are the best market research reports provider in the industry. Report Ocean believes in providing quality reports to clients to meet the top line and bottom line goals which will boost your market share in todays competitive environment. Report Ocean is a one-stop solution for individuals, organizations, and industries that are looking for innovative market research reports.
Get in Touch with Us:Report Ocean:Email:[emailprotected]Address: 500 N Michigan Ave, Suite 600, Chicago, Illinois 60611 UNITED STATES Tel: +1 888 212 3539 (US TOLL FREE)Website:https://www.reportocean.com/
See the original post:
Encryption Software Market Size, Global Insights and Trends ... - Digital Journal
Cisco warns of a security flaw in Nexus 9000 series switch – Computing
Cisco has released an advisory about a security vulnerability in the Nexus 9000 series switches that could enable an unauthorised remote attacker to read or alter encrypted traffic exchanged between different sites.
The vulnerability, assigned the identifier CVE-2023-20185, impacts Cisco Nexus 9000 Series Fabric Switches operating in ACI mode with releases 14.0 and beyond if they are part of a multi-site topology and have the CloudSec encryption feature activated.
CloudSec encryption is a feature of Cisco Nexus 9332C, Cisco Nexus 9364C Fixed Spine Switches and the Cisco Nexus 9500 Spine Switches equipped with a Cisco Nexus N9K-X9736C-FX Line Card.
Cisco says it currently has no knowledge of any public disclosures or instances of malicious exploitation related to the mentioned vulnerability.
The flaw in the ACI Multi-Site CloudSec encryption feature was discovered during an internal security testing of datacentre Cisco Nexus 9000 Series Fabric Switches.
The vulnerability arises from an implementation issue with the ciphers used by the CloudSec encryption feature on the affected switches, according to the company.
"An attacker with an on-path position between the ACI sites could exploit this vulnerability by intercepting intersite encrypted traffic and using cryptanalytic techniques to break the encryption," Cisco said.
Cisco has confirmed that CVE-2023-20185 does not impact Cisco Nexus 9000 Series Switches operating in standalone NX-OS mode.
Cisco has not yet issued any software updates to address the vulnerability. Additionally, there are no known workarounds available to mitigate or resolve the bug.
To address this vulnerability, Cisco suggests that customers utilising vulnerable switches should disable the ACI multi-site CloudSec encryption feature.
In addition, they are also advised to consult their support organisation for further guidance on exploring alternative solutions.
To verify whether CloudSec encryption is being used in an ACI site, users can follow these steps:
Cisco is also engaged in the process of addressing a vulnerability found in its Prime Collaboration Deployment (PCD) software. The bug, identified as CVE-2023-20060, was discovered in the web-based management interface of Cisco PCD versions 14 and earlier.
If successfully exploited, this vulnerability could enable a remote unauthenticated attacker to execute cross-site scripting attacks, albeit with the prerequisite of user interaction.
In May, Cisco released security updates to address four critical RCE vulnerabilities that affected multiple Small Business Series Switches. These vulnerabilities were deemed critical due to the potential for attackers to execute malicious code remotely, with root privileges on affected devices.
Each of these vulnerabilities was assigned a CVSS severity score of 9.8 out of 10, indicating their critical nature and the urgent need for remediation to prevent potential exploitation.
This year, Cisco has patched other Small Business products, notably the RV Series routers in February. Attackers could use those vulnerabilities to carry out actions including RCE and unauthorised access to corporate networks, often without requiring authentication.
View post:
Cisco warns of a security flaw in Nexus 9000 series switch - Computing
DDoSia Attack Tool Evolves with Encryption, Targeting Multiple … – The Hacker News
The threat actors behind the DDoSia attack tool have come up with a new version that incorporates a new mechanism to retrieve the list of targets to be bombarded with junk HTTP requests in an attempt to bring them down.
The updated variant, written in Golang, "implements an additional security mechanism to conceal the list of targets, which is transmitted from the [command-and-control] to the users," cybersecurity company Sekoia said in a technical write-up.
DDoSia is attributed to a pro-Russian hacker group called NoName(057)16. Launched in 2022 and a successor of the Bobik botnet, the attack tool is designed for staging distributed denial-of-service (DDoS) attacks against targets primarily located in Europe as well as Australia, Canada, and Japan.
Lithuania, Ukraine, Poland, Italy, Czechia, Denmark, Latvia, France, the U.K., and Switzerland have emerged as the most targeted countries over a period ranging from May 8 to June 26, 2023. A total of 486 different websites were impacted.
Python and Go-based implementations of DDoSia have been unearthed to date, making it a cross-platform program capable of being used across Windows, Linux, and macOS systems.
"DDoSia is a multi-threaded application that conducts denial-of-service attacks against target sites by repeatedly issuing network requests," SentinelOne explained in an analysis published in January 2023. "DDoSia issues requests as instructed by a configuration file that the malware receives from a C2 server when started."
DDoSia is distributed through a fully-automated process on Telegram that allows individuals to register for the crowdsourced initiative in exchange for a cryptocurrency payment and a ZIP archive containing the attack toolkit.
What's noteworthy about the new version is the use of encryption to mask the list of targets to be attacked, indicating that the tool is being actively maintained by the operators.
"NoName057(16) is making efforts to make their malware compatible with multiple operating systems, almost certainly reflecting their intent to make their malware available to a large number of users, resulting in the targeting of a broader set of victims," Sekoia said.
The development comes as the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of targeted denial-of-service (DoS) and DDoS attacks against multiple organizations in multiple sectors.
"These attacks can cost an organization time and money and may impose reputational costs while resources and services are inaccessible," the agency said in a bulletin.
Although CISA did not provide any additional specifics, the warning overlaps with claims by Anonymous Sudan on its Telegram channel that it had taken down the websites of the Department of Commerce, Social Security Administration (SSA), and the Treasury Department's Electronic Federal Tax Payment System (EFTPS).
Anonymous Sudan attracted attention last month for carrying Layer 7 DDoS attacks against various Microsoft services, including OneDrive, Outlook, and Azure web portals. The tech giant is tracking the cluster under the name Storm-1359.
Privileged Access Management: Learn How to Conquer Key Challenges
Discover different approaches to conquer Privileged Account Management (PAM) challenges and level up your privileged access security strategy.
The hacking crew has asserted it's conducting cyber strikes out of Africa on behalf of oppressed Muslims across the world. But cybersecurity researchers believe it to be a pro-Kremlin operation with no ties to Sudan and a member of the KillNet hacktivist collective.
In an analysis released on June 19, 2023, Australian cybersecurity vendor CyberCX characterized the entity as a "smokescreen for Russian interests." The company's website has since become inaccessible, greeting visitors with a "403 Forbidden" message. The threat actor claimed responsibility for the cyber attack.
"The reason for the attack: stop spreading rumors about us, and you must tell the truth and stop the investigations that we call the investigations of a dog," Anonymous Sudan said in a message posted on June 22, 2023.
Anonymous Sudan, in a Bloomberg report last week, further denied it was connected to Russia but acknowledged they share similar interests, and that it goes after "everything that is hostile to Islam."
CISA's latest advisory has also not gone unnoticed, for the group posted a response on June 30, 2023, stating: "A small Sudanese group with limited capabilities forced 'the most powerful government' in the world to publish articles and tweets about our attacks."
Read more here:
DDoSia Attack Tool Evolves with Encryption, Targeting Multiple ... - The Hacker News
Braverman writes to Zuckerberg expressing concerns over Meta’s … – The Independent
Sign up for the View from Westminster email for expert analysis straight to your inboxGet our free View from Westminster email
Suella Braverman has said she has written a letter to Meta boss Mark Zuckerberg, expressing her concerns over the companys plans to introduce end-to-end encryption without appropriate safeguards for children.
The Home Secretary told the Commons about the critical role that tech companies such as Meta play in supporting UK law enforcement agencies, revealing that the information provided by these platforms helps to protect approximately 1,200 children each month.
However, she insisted that Metas plans may hinder efforts to proactively detect and report instances of child grooming and abuse material on Facebook Messenger and Instagram Direct, saying: This will be a huge boon to anyone who wants to hurt a child.
Meta-owned messaging app WhatsApp already offers end-to-end encryption by default, which prevents anyone other than the sender and recipient of a message from accessing its contents.
The Online Safety Bill will hold tech firms to account, but indifference to abuse is intolerable
Home Secretary Suella Braverman
The social media giant is planning to add the feature to both Facebook Messenger and Instagram Direct chats later this year.
Speaking at Home Office questions, Ms Braverman said: The information that Meta and other tech companies give to UK law enforcement helps to protect around 1,200 children and leads to over 100 arrests of suspected child abusers every month.
But Meta plans to roll out end-to-end encryption soon without safeguards.
They will no longer proactively detect and alert authorities to child grooming and abuse material on Facebook Messenger and Instagram Direct.
This will be a huge boon to anyone who wants to hurt a child.
We remain committed to working with law enforcement and child safety experts as we roll out end-to-end encryption
Meta
The Online Safety Bill will hold tech firms to account, but indifference to abuse is intolerable.
I have written to Mark Zuckerberg, along with the security minister (Tom Tugendhat), childrens charities, campaign groups to outline our profound concerns.
And last week I was in New Zealand at the Five Eyes security conference where there was widespread support for working together to ensure social media companies put child safety first.
A Meta company spokesperson said: The overwhelming majority of Brits already rely on apps that use encryption to keep them safe from hackers, fraudsters and criminals.
We dont think people want us reading their private messages so have developed safety measures that prevent, detect and allow us to take action against this heinous abuse, while maintaining online privacy and security.
We remain committed to working with law enforcement and child safety experts as we roll out end-to-end encryption.
Read the original post:
Braverman writes to Zuckerberg expressing concerns over Meta's ... - The Independent
RedEnergy Stealer-as-a-Ransomware Threat Targeting Energy and … – The Hacker News
Jul 05, 2023Ravie LakshmananCritical Infrastructure Security
A sophisticated stealer-as-a-ransomware threat dubbed RedEnergy has been spotted in the wild targeting energy utilities, oil, gas, telecom, and machinery sectors in Brazil and the Philippines through their LinkedIn pages.
The .NET malware "possesses the ability to steal information from various browsers, enabling the exfiltration of sensitive data, while also incorporating different modules for carrying out ransomware activities," Zscaler researchers Shatak Jain and Gurkirat Singh said in a recent analysis.
The objective, the researchers noted, is to couple data theft with encryption with the goal of inflicting maximum damage to the victims.
The starting point for the multi-stage attack is a FakeUpdates (aka SocGholish) campaign that tricks users into downloading JavaScript-based malware under the guise of web browser updates.
What makes it novel is the use of reputable LinkedIn pages to target victims, redirecting users clicking on the website URLs to a bogus landing page that prompts them to update their web browsers by clicking on the appropriate icon (Google Chrome, Microsoft Edge, Mozilla Firefox, or Opera), doing so which results in the download a malicious executable.
Following a successful breach, the malicious binary is used as a conduit to set up persistence, perform the actual browser update, and also drop a stealer capable of covertly harvesting sensitive information and encrypting the stolen files, leaving the victims at risk of potential data loss, exposure, or even the sale of their valuable data.
Zscaler said it discovered suspicious interactions taking place over a File Transfer Protocol (FTP) connection, raising the possibility that valuable data is being exfiltrated to actor-controlled infrastructure.
In the final stage, RedEnergy's ransomware component proceeds to encrypt the user's data, suffixing the ".FACKOFF!" extension to each encrypted file, deleting existing backups, and dropping a ransom note in each folder.
Privileged Access Management: Learn How to Conquer Key Challenges
Discover different approaches to conquer Privileged Account Management (PAM) challenges and level up your privileged access security strategy.
Victims are expected to make a payment of 0.005 BTC (about $151) to a cryptocurrency wallet mentioned in the note to regain access to the files. RedEnergy's dual functions as a stealer and ransomware represent an evolution of the cybercrime landscape.
The development also follows the emergence of a new RAT-as-a-ransomware threat category in which remote access trojans such as Venom RAT and Anarchy Panel RAT have been equipped with ransomware modules to lock various file extensions behind encryption barriers.
"It is crucial for individuals and organizations to exercise utmost caution when accessing websites, especially those linked from LinkedIn profiles," the researchers said. "Vigilance in verifying the authenticity of browser updates and being wary of unexpected file downloads is paramount to protect against such malicious campaigns."
See the rest here:
RedEnergy Stealer-as-a-Ransomware Threat Targeting Energy and ... - The Hacker News
Now Apple takes a bite out of encryption-bypassing ‘spy clause’ in UK internet law – The Register
Apple has joined the rapidly growing chorus of tech organizations calling on British lawmakers to revise the nation's Online Safety Bill which for now is in the hands of the House of Lords so that it safeguards strong end-to-end encryption.
"End-to-end encryption is a critical capability that protects the privacy of journalists, human rights activists, and diplomats," Apple argued in a statement to the media.
"It also helps everyday citizens defend themselves from surveillance, identity theft, fraud, and data breaches. The Online Safety Bill poses a serious threat to this protection, and could put UK citizens at greater risk."
Apple, you may remember, announced in December 2022 that it will provide end-to-end encryption (E2EE) for most iCloud services.
"Apple urges the government to amend the bill to protect strong end-to-end encryption for the benefit of all," the iGiant's statement on the internet bill continued.
The iGiant declined to address The Register's specific inquiries about what, if anything, the American titan will do should Parliament adopt the bill.
As the draft law is currently written, the UK's communications watchdog Ofcom will have the power to instruct chat app makers and other tech companies to monitor conversations and posts for child sexual abuse material and terrorism content. Such data should be blocked or deleted when found, and potentially even reported to the cops, the government hopes.
If that doesn't lead to apps watering down or backdooring their E2EE so that data can be inspected in transit, it may bring about automated on-device scanning, which could end up censoring people's private chats or leaking them to the authorities whether illegal activity was correctly or incorrectly detected. Such technology would be government-accredited, which means the app makers may have little choice over its eventual implementation.
Under that regime, an app or platform can't really say it offers truly strong E2EE on all messages if there's a chance those messages can be silently inspected by someone or some system outside the private conversation. There's a concern this all starts with tackling child abuse and terrorists something with which the population won't generally have a problem but will later lead to broader surveillance and censorship. It smacks of a government fed up with not being able to peer into private chatter whenever it feels necessary.
The Open Rights Group has a paper on the proposals here [PDF] if you want to read more about it. "According to an expert legal opinion, this bill would create the power to mandate some of broadest surveillance powers in any Western democracy," the body wrote in that document.
In February, encrypted chat service Signal said it will stop operating in the UK if the British government goes ahead with its Online Safety Bill as it stands.
And in April, other E2EE comms platforms Element, Session, Threema, Viber, WhatsApp, and Wire urged UK lawmakers to rethink the bill instead of "weakening encryption, undermining privacy, and introducing the mass surveillance of people's private communications."
Wikipedia, meanwhile, has called out another piece of the proposal that would require verification of visitors' ages, and said if the Online Safety Bill passes with the age-gating requirement, its site may no longer be available in the UK.
The controversial draft law, which the government claims will make the UK "the safest place in the world to be online," continues to face backlash because of its so-called "spy clause" [PDF].
This provision requires companies to intercept and block child sexual exploitation and abuse (CSEA) material and terror content "whether communicated publicly or privately." That means encryption applied to messages and anything else shared must be bypassed to allow scanning or scanning must occur prior to encryption or after decryption.
Those in favor of this E2EE workaround, as always, say it's to protect the children as Meta recently found out when an international group of law enforcement agencies urged the social media giant not to standardize strong E2EE on Facebook Messenger and Instagram. E2EE, according to the Virtual Global Taskforce, willprevent cops from fighting wait for it CSEA.
Apple is no stranger to this argument. In 2021, the fruiterer floated a plan to scan photos on people's iPhones for CSEA automatically as they uploaded stuff to iCloud.
The information security community and civil rights groups strongly opposed turning punters' own devices against them, and Apple ultimately ditched the plan. Instead it deployed communication safety tools in iOS 15.2.
Follow this link:
Now Apple takes a bite out of encryption-bypassing 'spy clause' in UK internet law - The Register
Proton officially launches password manager with end-to-end encryption – ZDNet
Proton
The company behind the secure email service Proton Mail has officially released its own password manager that promises not just to protect your passwords but to also protect your email address. Unveiled on Wednesday following a beta launched in April,Proton Pass is accessible as an extension for all the major browsers and as an app for iOS/iPadOS and Android.
Also: The best password managers right now
To start, Proton Pass works like any other password manager. It can generate and save unique and complex passwords (or passphrases) for each of your website account logins. Securely storing the password along with your username, the site's URL, and other info, the program applies your credentials at each website, automatically logging you in.
But Proton boasts that its password manager kicks in end-to-end encryption across the board. Some password managers encrypt only the password for each saved account and not necessarily the username, URL, or other information. This pitfall means that a hacker or attacker who gains access to your account data can easily see the sites you visit and the usernames you create.
Also: These are the most hacked passwords. Is yours on the list?
To better safeguard your accounts against compromise, Proton Pass promises to encrypt every field in each saved login, not just the password but your username, the website URL, and any other data. To protect all your login data, Proton says that its open-source password manager uses a strong bcrypt password hashing technique and a hardened implementation of Secure Remote Password (SRP) to authenticate access.
Further, Proton Pass syncs your account data across all your devices and runs automatic end-to-end encrypted backups of your data. So if you lose or upgrade from one device, you can still access your saved logins from the online backups to use on a different device. Plus, Proton adds two-factor authentication, so that accessing your account on a new device or in a new location requires a second form of verification.
Also: Flipper Zero hacking tool is a big hit
Proton Pass also aims to protect your email address by letting you create an alias. If someone tries to use one of your passwords for identity theft or another type of attack, you can always change it. But if that person attempts to use your email address as part of the identity theft scheme, you can't easily change that. Your email address can also be used for sending you spam and phishing messages.
To help you better protect your identity, the Proton Pass hide-my-email alias feature will create a random address that links between your actual address and the website. The site sees just your alias address so that your real address is kept private. If a particular site is hacked, only your alias address is exposed, which you can easily change.
And what's the price tag for Proton Pass? In a bid to get people to sign up, Proton is offering the basic version for free. This free flavor offers unlimited logins, unlimited encrypted notes, and a limited number of hide-my-email aliases and two-factor authentication logins.
Also: Do RFID blocking cards actually work? My Flipper Zero revealed the truth
To grab an unlimited number of hide-my-email aliases and two-factor authentication logins, you'll need a paid account called Proton Pass Plus. People with Proton Unlimited, Business, Visionary, or Family plans automatically get the paid edition of Proton Pass for free. For others, Proton is currently offering the Plus version for $1 a month for lifetime. But this offer lasts only until the end of July, after which the price goes up to $3.99 a month.
Proton Pass supports Chrome, Firefox, Edge, Brave, and other browsers as well as iPhones, iPads, and Android devices. To learn more about Proton Pass or take it for a spin, check out the program's website.
See the original post:
Proton officially launches password manager with end-to-end encryption - ZDNet
Apple’s Dynamic Week: Musk’s Praise, Watch Heroics And A Stand For Encryption – Apple (NASDAQ:AAPL) – Benzinga
July 1, 2023 7:11 AM | 2 min read
The past week has been a rollercoaster for Apple Inc. (NASDAQ:AAPL), with a series of events that have kept the tech giant in the headlines. From innovative promotional tactics to life-saving technology, new product rumors, and a stance on encrypted messaging, Apple has been making waves. Additionally, the company has made changes to its iCloud storage pricing, affecting users in the UK and several other countries.
Apples Twitter Experiment Impresses Elon Musk and MrBeast. In a bold move, Apple shared the complete debut episode of the popular science fiction series Silo on Twitter, impressing none other than Elon Musk and MrBeast. The promotional tactic leverages Twitters long-format video capability, allowing non-subscribers to enjoy the initial episode directly on the microblogging site. Musk, who bought Twitter for $44 billion in October 2022, called Apples decision a great first move. Read the full article here.
Ontario Man Credits Apple Watch for Saving His Life. The Fall Detection feature of the Apple Watch dialed emergency services and the wife of an Ontario man, Alexander Laserson, after he fell from a ladder. Laserson credits the Apple Watch for saving his life, stating, Without the Apple Watch, it is possible I would be dead by now. The technology works. Read the full article here.
Enter your email and you'll also get Benzinga's ultimate morning update AND a free $30 gift card and more!
New Apple Watch Ultra, 30-inch iMac, and Other Hardware on the Way, says report. Apple is reportedly set to launch a refreshed version of the Apple Watch Ultra alongside the iPhone 15 series and other hardware this September. The company is also said to be working on a large iMac with a 30-inch plus screen and MacBooks with third-generation Apple silicon. Read the full article here.
Apple Joins the Fight Against the War on Encrypted Messaging. Apple has opposed the Online Safety Bill under consideration in the UK Parliament, joining 80 organizations and technology experts who believe the bill would put people at greater risk from data breaches and surveillance. The company defended the need for encrypted messaging, citing the need for privacy. Read the full article here.
Massive returns are possible within this market! For a limited time, get access to the Benzinga Insider Report, usually $47/month, for just $0.99! Discover extremely undervalued stock picks before they skyrocket! Time is running out! Act fast and secure your future wealth at this unbelievable discount! Claim Your $0.99 Offer NOW!
Advertorial
Apple Raises iCloud Storage Prices by Up to 28% in the UK and Other Countries. Apple has increased iCloud storage prices across all three storage tiers 50GB, 200GB, and 2TB in the UK and several other countries. The price hike affects iCloud+ users, who will now have to pay up to 28% more for storage. Read the full article here.
Hi, I am the Benzinga Newsbot! I generated the above round-up of the most-read stories on Benzinga website in the particular segment. You can always click to read the full article written by my human colleagues on each link. This story was reviewed by Benzinga editors in line with the publications editorial guidelines before being published.
2023 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.
Follow this link:
Apple's Dynamic Week: Musk's Praise, Watch Heroics And A Stand For Encryption - Apple (NASDAQ:AAPL) - Benzinga
Signal talks privacy, encryption, AI and more at TechCrunch Disrupt 2023s Security Stage – TechCrunch
In our tech-driven world, the right to privacy once the cornerstone of democracy is disappearing at an alarming rate. But not everyone is keen on having Big Tech companies and nation-states surveilling every digital communication. This may be one reason why Signal, the end-to-end encrypted messaging app, has been downloaded more than 100 million times to date.
Signal Foundation, the apps nonprofit developer, is a staunch defender of privacy and security. Indeed, it said it would leave the United Kingdom rather than weaken its encryption. The organizations principles based on retaining as little user data as possible are a real rarity in security.
This is why were thrilled that Meredith Whittaker, president of the Signal Foundation, will join us for a session called Signal and the Future of Encrypted Messaging. Youll find it on the Security Stage at TechCrunch Disrupt 2023, which takes place on September 1921 in San Francisco.
We cant wait to talk with Whittaker about what it takes to run one of the worlds most ubiquitous security startups. Well focus on Signal both the organization and the product and how its become trusted and widely seen as the gold standard of end-to-end encrypted messaging apps.
Can Signals stellar reputation spur other startups to follow a similar path? If not, how do we protect that data so it cant be stolen or misused? Well also circle back to how governments justify their attempts to backdoor encryption and why fighting to protect encryption, and thus privacy, is essential.
Well also discuss Whittakers take on the harmful social consequences of artificial intelligence. At a recent conference in San Francisco, Whittaker spoke about the way big corporations use AI to wield technological power, and how these huge datasets can be used to surveil populations, calling AI a surveillance technology.
Join us for whats sure to be a reality check from an acclaimed expert who understands the real-world issues of privacy, security and AI.
Learn more about our speaker and her extensive qualifications for tackling these challenging topics below.
Meredith Whittaker, president of Signal, has more than 17 years of tech experience across industry, academia and government. Before joining Signal, she was the Minderoo Research Professor at NYU and served as the faculty director of the AI Now Institute, which she co-founded.
Whittakers research and scholarly work helped shape global AI policy and shift the public narrative on AI to better recognize the surveillance business practices and the concentration of industrial resources that modern AI requires. Prior to NYU, she worked at Google for over a decade, where she led product and engineering teams and founded Googles Open Research Group. She also co-founded M-Lab, a globally distributed network measurement platform that now provides the worlds largest source of open data on internet performance.
Whittaker was one of the core organizers pushing back against Googles insufficient response to concerns about AI and its dangers, and she was a central organizer of the Google Walkout. Whittaker has advised the White House, the FCC, the city of New York, the European Parliament and many other governments and civil society organizations on privacy, security, artificial intelligence, internet policy and measurement. She recently completed a term as senior advisor on AI to the chair of the U.S. Federal Trade Commission.
Hear more conversations with leading experts on the Security Stage, which features topics like data protection, privacy regulations, information sharing, risk management and more. Its just one of the six new stages for six breakthrough sectors at Disrupt. Book your pass today!
Is your company interested in sponsoring or exhibiting at TechCrunch Disrupt 2023? Contact our sponsorship sales team by filling out this form.