Category Archives: Encryption
Researchers reviewed recent progress of organic room-temperature … – EurekAlert
image:A summary of recent progress aims at application of room temperature phosphorescent materials in luminescence and display, environmental detections and bioimaging. view more
Credit: Xiang Ma, East China University of Science and Technology
Organic materials with room-temperature phosphorescence (RTP) emission have attracted extensive attention due to extraordinary properties including long lifetime, large Stokes shift, stimuli-responsiveness, and so on, and show bright prospects in broad fields. However, the energy of the excited state of organic phosphors is easily consumed through thermal radiation and collision deactivation. Therefore, numerous design strategies such as creating a rigid environment through crystallization and supramolecular assembly are employed to improve the luminescent characteristics of RTP materials by restricting nonradiative transition, enhancing intersystem crossing, and so forth. A team of scientists summarizes the recent progress of organic RTP materials from the perspective of practical applications including luminescence and display, environmental detection, and bioimaging. Based on their works, the requirements of organic RTP materials for different applications are summarized, which may bring enlightenment to the future application research of RTP materials. This review was published in the journal Industrial Chemistry & Materials in Mar. 2023.
Organic light-emitting diodes (OLEDs) have shown excellent performance on display screens recently, while only 25% of singlet excitons in fluorescent materials can be utilized to emit light. Therefore, the harvesting of singlet excitons and triplex excitons to achieve 100% theoretical internal quantum efficiency makes phosphorescent materials attractive. "Relevant scientific researchers have designed many organic light-emitting diodes based on RTP with high external quantum efficiency by using different strategies, which far exceeds the 5% theoretical limit for typical fluorescent materials", said Ma, a professor at East China University of Science and Technology, China.
Due to UV irradiation and the different lifetime of RTP emission, anti-counterfeiting or data encryption based on RTP materials has become a common and popular application. In addition to simple anti-counterfeiting and data encryption based on the on-off of UV light, the different lifetimes of RTP materials provide a feasible way to realize multiple anti-counterfeiting or data encryption by using time resolution techniques. Besides, the chemical-responsive RTP is also a potential means to realize multiple anti-counterfeiting. In addition to the applications above, RTP materials have also been studied for two rare but meaningful applications, printing, and visualization of latent fingerprints, due to their unique luminous properties.
"As we all know, many factors affect the luminescence properties of RTP materials, such as oxygen, temperature, and so on", Ma said. "So chemical sensors based on RTP are also an indispensable research direction, which can produce practical applications in environmental detection". The spin triplet property of ground state oxygen makes it easy for O2 to quench the triplet excitons of RTP materials, which makes RTP materials ideal candidates for O2 detection. Generally, the decreasing phosphorescent intensity and lifetime can both be utilized to realize quantitative detection of oxygen. Temperature is also a significant external environmental factor to affect RTP emission because the high temperature will enhance nonradiative transition, and thus the corresponding RTP materials are developed for temperature sensing. In addition, the quenching effect of small organic molecules on RTP emission makes chemical sensors based on RTP materials possible.
Optical imaging plays an important role in biomedical and clinical research. Compared with fluorescence, RTP has a longer lifetime at a longer wavelength which is beneficial to eliminate fluorescence background interference and scattered light and gain a higher signal-to-noise ratio (SBR). Although RTP materials have many advantages in bioimaging, non-radiative decay and quenchers in aqueous solutions seriously hinder their practical application. Researchers innovatively proposed a supramolecular self-assembly strategy and top-down nanoparticle formulation to achieve stable phosphorescence at room temperature in an aqueous solution. Therefore, the researchers not only successfully constructed near-infrared phosphorescent materials with high resolution and deep penetration, but also developed RTP materials with long-wavelength excitation and phosphorescent emission simultaneously, effectively avoiding the damage of ultraviolet light to organisms. These works show huge potential application value in biological imaging.
Although organic room temperature phosphorescent materials constructed by different strategies are widely used in various fields due to different luminescence properties, there is still huge research space to fabricate more excellent applied RTP materials. Therefore, the team also discusses how to overcome the challenges and the prospect of phosphorescent materials. To obtain efficient organic light-emitting diodes, phosphorescent materials need to meet the characteristics of high quantum yield and short lifetime, while RTP materials for anti-counterfeiting and encryption often require rich luminous colors and perform differently with UV excitation. And the application in biological imaging demands RTP materials to have longer wavelengths and lifetime to eliminate fluorescence background interference and gain a higher signal-to-noise ratio. Moreover, the application scope should be broadened due to the extraordinary optical properties of RTP materials. Further exploration of RTP materials will not only contribute to a deeper understanding of photoluminescence but promote the practical application of photoelectric functional materials in our life.
Industrial Chemistry & Materialsis a peer-reviewed interdisciplinary academic journal published by Royal Society of Chemistry (RSC) with APCs currently waived. Icm publishes significant innovative research and major technological breakthroughs in all aspects of industrial chemistry and materials, especially the important innovation of the low-carbon chemical industry, energy, and functional materials.
Industrial Chemistry and Materials
Literature review
Not applicable
Recent progress with the application of organic room-temperature phosphorescent materials
3-Mar-2023
Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.
Read the original here:
Researchers reviewed recent progress of organic room-temperature ... - EurekAlert
How Cloudflare’s wall of lava lamps helps keep the internet safe – XDA Developers
The internet is a vast place made up of near-limitless servers, and some of the biggest websites need to rely on Content Distribution Networks (CDN) to ensure their sites are available to the masses. These servers are spread out across the globe to serve versions of a website in a locality, meaning that users experience reduced latency while also spreading out the requests of a global user base across multiple servers. Cloudflare is one of the largest providers of CDNs in the world, so companies and people alike rely on it.
Giving control of huge portions of your website to a third party requires a lot of trust, and Cloudflare has a number of novel solutions to modern-day problems. One of the most interesting is the company's wall of lava lamps, which serves as a way to guarantee the strength of the encryption that it employs for delivering pages to users. While it sounds crazy at first, its importance is due to a cryptographic concept called entropy.
Computers, being logical devices, struggle with generating randomness. They need some data to base the creation of "random" off of, and if you can predict the original data it uses, it's not actually random anymore. That's how the real world can help by generating entropy. Entropy in the real world typically refers to disorder, but in cryptography, it refers to unpredictability. This is better for encryption because a higher level of entropy in data means little to no meaningful patterns can be found.
Encryption is a predictable process, in the sense that the encrypted data plus the right key will give you access to the decrypted data, but encryption keys need to be unpredictable, or else an attacker can try to detect patterns. If the key used isn't random enough, then the data is at risk of being compromised by an attacker. That's where lava lamps come in. They're an inherently random variable that will always change.
Generating randomness is important to create entropy, and it doesn't get a lot more random than a picture taken of 100 lava lamps at any time of the day in different lighting conditions, in different positions, and even with people occasionally crossing in front of the camera. That's why Cloudflare dubs it the "Wall of Entropy."
Images stored as data on a computer are just a string of 1s and 0s at the end of the day, and minor changes in a photo can mean those strings massively change. As a result, each image becomes a random cryptographic "seed" that can be used for generating secure encryption keys.
These encryption keys are generated using a pseudorandom number generator that takes this seed as input. If you've ever played Minecraft and used a custom seed to generate a world, then you have experience with these. The seed is seemingly random to you, but if you create a world with the same seed every time you'll end up with the same world every time, too. The same applies in cryptography, and the same input to create encryption keys will give the same encryption keys every time. That's why the changing input value of an image taken of lava lamps offers that additional layer of security.
Lava lamps are an inherently random variable that will always change.
However, there's nothing particularly special about lava lamps, and it's why Cloudflare has two other projects to achieve a similar goal. I reached out to the company, and a spokesperson told me about two other similar projects, one of which is currently being built.
The first, in the company's London office, is known as the "Chaotic Pendulums." The movements are chaotic and "practically impossible" to predict, and Cloudflare uses readings from those devices to make long strings of numbers for key generation.
The second, which is currently under construction in the company's Austin office, is called "Suspended Rainbows." How it works is pretty cool, too. Entropy is generated via patterns projected on walls, the ceiling, and the floor, and mobiles with various shapes and colors are suspended in the air. The company also says that "as the mobiles rotate and the light sources fluctuate during the day, unique arrangements of the light spectrum and reflections create a colorful display in the room."
If the camera turns off and the company has to fall back on a different process for key generation, there are alternatives. The company has other sources of randomization, including the above pendulums, the upcoming suspended rainbows system, and previously, uranium decay measurements that were taken at the company's Singapore office.
Not only that, but given that the camera is in a Cloudflare-owned building filled with employees, it's a quick and painless process to quickly fix the camera, turn it back on, or replace it if needs be.
Given that computers cannot inherently generate true randomness, the Wall of Entropy is a novel solution to a problem that has plagued computers since their inception. A "random" function that you can call in a programming language isn't truly random, and for example, in C, you might use the current Unix epoch as your seed for "random" generation. That poses its own problems, and for a company of Cloudflare's scale, isn't the safest.
As you browse the internet and navigate a swathe of content distribution networks operated by the likes of Cloudflare, rest assured that a wall of lava lamps in San Francisco is part of the security system that keeps your browsing safe.
See the article here:
How Cloudflare's wall of lava lamps helps keep the internet safe - XDA Developers
6 Tricks That Wont Secure Your Wi-Fi (And 6 That Will) – How-To Geek
Jordan Gloor / How-To Geek
There are a lot of Wi-Fi security tips that sound great on paper, but don't secure your Wi-Fi network against intrusion. Skip them and focus on these security-enhancing tips and tricks.
Like anything related to computer and network security, quite a few oft-repeated Wi-Fi security tricks dont help at all. Here are the tips and tricks you should avoid and an equal number you should be sure to use.
Lets start by looking at the tips and tricks that dont do much (or anything) to secure your home Wi-Fi network.
One thing worth noting before we dig in is that not only do these tips do little-to-nothing to make your network more secure, they can make it a hassle for you and everyone else in your household to use the network. So its best just outright to skip them instead of trying them out with a Well, it cant hurt, right? attitude.
If there were an award ceremony for bad security tips, the advice to hide your Wi-Fi networks name (the SSID, or Service Set Identifier) would surely be the lifetime achievement award winner.
The popularity of the tip hinges on how cool it seems, not how effective it is in the real world. At first glance, turning off the SSID broadcast for your router seems like it would put your Wi-Fi router into some sort of stealth mode, like donning an invisibility cloak.
But in reality, turning off the SSID doesnt do anythingand only hides your network from people who wouldnt have the skill set to break into your network in the first place. And, worse yet, it just makes it inconvenient to use your own home network.
While theres nothing wrong with changing your Wi-Fis SSID as part of a general refresh of your setup and security settings, just changing it from SomeWirelessNetwork to SomeOtherWirelessNetwork wont do much.
Its about as effective, security-wise, as taking off a name tag at a social mixer and putting a new name tag on. Anybody paying attention wont be fooled.
MAC (Media Access Control) addresses are unique addresses assigned to network interface controllers. The MAC address has been around since the early days of Ethernetit was part of the Xerox Network Systems networking protocol suite back in the 1970s.
Many routers support a MAC address whitelist (only addresses you add can connect) and blacklist (these devices can never connect). MAC address filtering was never a great security measure in the first place because its easy to spoof MAC addresses. Its an even less useful tool now that so many devices, like phones and laptops, automatically randomize their MAC addresses to increase user privacy.
The Best Tech Newsletter Anywhere
Join 425,000 subscribers and get a daily digest of features, articles, news, and trivia.
By submitting your email, you agree to the Terms of Use and Privacy Policy.
So theres no point in using MAC address filtering to secure your home network. Youll waste a bunch of time managing the lists and anyone trying to gain access to your network will just spoof an approved device or bypass your security another way.
Your router has a function called Dynamic Host Configuration Protocol (DHCP). Every device that connects to the wireless network and the physical Ethernet ports on the router or connected network switches automatically gets a network address assigned with no effort on your behalf.
For as long as there have been DHCP servers, there has been a persistent old wives tale about how disabling the DHCP server makes your network more secure. At best, it might slow an attacker down by a few minutes. But the trade-off is that you slow down a theoretical attacker by a few minutes in exchange for slowing down your workflow for many, many minutes over the networks lifetime.
Do you know who becomes the DHCP server when there is no DHCP server? You do. Its a huge waste of time to turn off your DHCP server and manually manage every assignment.
There is a time and place for manually assigning a static IP address to devices on your network. If youre self-hosting services, it just makes sense to give your home backup server or a Minecraft server a static IP address so that whatever port forwarding rules you have in place for that service always point to the right thing.
But using static IP address assignments for every single device on your network to increase security is just a hassle with no real benefit. Save the static IP address assignments for the times static IP addresses make sense, like assigning a static IP to a server or to a particular device that inexplicably wont play nice with your routers DHCP server.
By all means, use a good password for your Wi-Fi router. Dont use your name, your dogs name, password, qwerty1234, or other easily guessed or weak passwords.
But barring using a password so short and weak that a child could guess it, your Wi-Fi network likely will not be compromised because of the length of your password (but instead because of vulnerabilities in the hardware, firmware, or encryption standard used).
Wi-Fi passwords can be up to 63 characters long, but practically speaking, theres not much difference between a passphrase like WiFi Is Awesome! and FrK4QgJ#RDnw0e1c3v7F4$8K0%Rf0j except how much it frustrates you to type the latter into your smart TV using the remote. Whether your Wi-Fi password has enough entropy to require decades of brute-force computation to crack or billions of years of brute-force computation to crack just doesnt matter.
If the tips in the last section do little-to-nothing to secure your Wi-Fi network, what will? Fortunately, for all the Wi-Fi security tricks of dubious usefulness, there are tips that will actually improve your Wi-Fi security.
Better yet, unlike the pseudo-tips in the last section that make it a hassle to use your Wi-Fi network, these tips will lock things down without giving you (and everyone else in your household) a headache.
Hands down, the biggest home network vulnerability is using ancient hardware. If your Wi-Fi router was released over five years ago, its time to replace it. It takes about five years or so for Wi-Fi technology to refresh significantly and for manufacturers to stop releasing updates for routers.
If your Wi-Fi router is a mid-2010s model, an update is long overdue. It doesnt support current Wi-Fi standards, it doesnt support the best Wi-Fi encryption, and it likely has permanent vulnerabilities that will never be patched via updates because it hit its end-of-life date years ago.
Security concerns aside, the quality of life improvements that come with updating your router to current Wi-Fi tech is so great we recommend people update their routers even if they dont have super fast broadband and consider an up-to-date router more important than gigabit internet.
We get wanting to save money, but if you want to save money on tech, then do so by using your old iPad for as long as it gets updates or keeping your smartphone for an extra year before upgrading. Dont skimp on your router. The role it plays in managing and securing your network is too important.
If youre anything like the average person, there is a good chance youve been using the same network name and password for your Wi-Fi router for ages, even carrying it forward to new routers. We get itif you do that, then you dont have to worry about resetting the Wi-Fi settings on dozens of devices around your home.
But if youre getting serious about Wi-Fi security after a long stretch of not really giving it a second thought, one of the best ways to do that is to start fresh. Setting up your network from scratch is the surest way to kick everyone that doesnt belong off your network and ensure only the devices and people you want have access.
Its a hassle, sure, but if youre taking the time to overhaul the security of your Wi-Fi network, then its worth doing it right.
Updating your routers firmware is one of the simplest ways to ensure your Wi-Fi network is secure, yet most people buy a router, plug it in, and never update the firmware.
If youve never done so, take a moment to search for your routers model number and see what the firmware update process is. If the manufacturer has current firmware updates, install them. And if the last update was years ago, you should consider upgrading your router.
At this point, in early 2023, there is no good reason to use deprecated Wi-Fi security standards. WEP, WPA, and WPA2-TKIP are all insecure and should no longer be used. Using older Wi-Fi security standards that can be easily cracked with readily available tools is just asking for trouble.
You should instead use WPA2-AES, which has not yet been deprecated, or, better yet, WPA3 if all the devices on your home network support it.
If youre not already using the guest network function on your Wi-Fi router, you should start doing so immediately. Guest networks used to be a fairly uncommon router feature, but now are found on everything from premium to budget models.
Guest networks solve a variety of problems but, most importantly, make it easy to keep your main network secure by handing out what amounts to a temporary password to visitors. When youre setting yours up, be sure to follow this checklist to avoid common issues.
As a general rule, you should disable any features on your Wi-Fi router you are not actively using, especially if those features have known vulnerabilities. Such is the case with both Wi-Fi Protected Setup (WPS) and Universal Plug and Play (UPnP). While they can make setting up devices and services on your home network more convenient, both have known vulnerabilities.
Youll have to log into your router to disable WPS and UPnP (as well as follow the tips above), so while youre in there is a perfect time to review our list of dangerous Wi-Fi router settings and make even more adjustments to lock down your router and home network security.
And remember, you can make choices to better secure an old router, but its far better to recycle your old router, replace it with something new, and lock down a current router with update-to-date firmware instead.
Best Wi-Fi Router Overall
$260.54 $349.99 Save 26%
$53.99 $79.99 Save 33%
$341.99 $449.99 Save 24%
$349.99 $399.99 Save 13%
$129.99 $179.99 Save 28%
$442.00 $499.99 Save 12%
$38.00 $39.99 Save 5%
Read this article:
6 Tricks That Wont Secure Your Wi-Fi (And 6 That Will) - How-To Geek
Texas Man Sentenced to 97 Months in Federal Prison for … – Department of Justice
United States Attorney Ronald C. Gathe, Jr. announced that Chief Judge Shelly D. Dick sentenced James Martin, age 51, of Beckville, Texas, to 97 months in federal prison following his conviction for distribution of child pornography. Martin must serve five years of supervised release upon completing his term of imprisonment, and he must complete sex offender treatment. The Court also ordered Martin to pay $248,000 in restitution. As a result of this conviction, Martin will be required to register as a sex offender.
Throughout July and August 2022, Martin used an instant messaging mobile application and a smartphone to distribute files of child pornography via the internet to an undercover agent in the Middle District of Louisiana. Martin distributed the videos and images of minors, knowing they were under 18 years of age. The child pornography files included a video link to a cloud storage application.
Martin distributed the video link to an undercover agent with a password and instructions to download the videos and images to confirm that the link was working and sellable when the time [i]s right Throughout his conversations with undercover law enforcement, Martin described a scheme to sell child pornography online. Martin bragged about his ability to: (1) sell child pornography online for a profit; and (2) use encryption software to avoid law enforcement detection.
Martins video link contained approximately 245 videos and 108 images of child pornography, including toddlers. Martin also possessed at least 130 total videos and approximately 7,250 images of child pornography, which were accessible through his laptop, smartphone, and a central processing unit tower, among other devices.
This matter was investigated by the Federal Bureau of Investigation, the Louisiana Bureau of Investigation, and the Panola County, Texas Sheriffs Office, and was prosecuted by Assistant United States Attorney Edward H. Warner.
This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse, launched in May 2006 by the Department of Justice. Led by U.S. Attorneys Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit http://www.justice.gov/psc.
See the rest here:
Texas Man Sentenced to 97 Months in Federal Prison for ... - Department of Justice
Top malware trends and security threats revealed in new WatchGuard report – SecurityBrief Australia
WatchGuard Technologies has released findings from its most recent Internet Security Report, detailing the top malware trends and network and endpoint security threats analysed by WatchGuard Threat Lab researchers in Q4 2022.
While key findings from the data showed declines in network-detected malware, endpoint ransomware increased 627%, and malware associated with phishing campaigns continued to be a persistent threat.
Despite seeing an overall decline in malware, further analysis from WatchGuard Threat Lab researchers looking at Fireboxes that decrypt HTTPS (TLS/SSL) traffic found a higher incidence of malware, indicating malware activity has shifted to encrypted traffic.
Since just ~20% of Fireboxes that provide data for this report have decryption enabled, this indicates that the vast majority of malware is going undetected, the researchers state. Encrypted malware activity has been a recurring theme in recent Threat Lab reports.
Corey Nachreiner, Chief Security Officer at WatchGuard, comments, A continuing and concerning trend in our data and research shows that encryption - or, more accurately, the lack of decryption at the network perimeter - is hiding the full picture of malware attack trends.
It is critical for security professionals to enable HTTPS inspection to ensure these threats are identified and addressed before they can do damage.
Other key findings from the Q4 Internet Security Report include:
Endpoint ransomware detections rose 627%. This spike highlights the need for ransomware defences such as modern security controls for proactive prevention, as well as good disaster recovery and business continuity (backup) plans, the researchers state.
93% of malware hides behind encryption. Threat Lab research continues to indicate that most malware hides in the SSL/TLS encryption used by secured websites. Q4 continues that trend with a rise from 82% to 93%.
Network-based malware detections dropped approximately 9.2% percent quarter over quarter during Q4. This continues a general decline in malware detections over the last two quarters. But as mentioned, when considering encrypted web traffic, malware is up. The Threat Lab team believes this decline trend may not illustrate the full picture and needs more data that leverages HTTPS inspection to confirm this contention.
Endpoint malware detections increased 22%. While network malware detections fell, endpoint detection rose in Q4. This supports the Threat Lab teams hypothesis of malware shifting to encrypted channels. At the endpoint, TLS encryption is less of a factor, as a browser decrypts it for Threat Labs endpoint software to see. Among the leading attack vectors, most detections were associated with Scripts, which constituted 90% of all detections. In browser malware detections, threat actors targeted Internet Explorer the most with 42% of the detections, followed by Firefox with 38%.
Zero day or evasive malware has dropped to 43% in unencrypted traffic. Though still a significant percentage of overall malware detections, its the lowest the Threat Lab team has seen in years. That said, the story changes completely when looking at TLS connections. 70% of malware over encrypted connections evades signatures, WatchGuard finds.
Phishing campaigns have increased. Three of the malware variants seen in the reports top 10 list (some also showing on the widespread list) assist in various phishing campaigns. The most-detected malware family, JS.A gent.UNS, contains malicious HTML that directs users to legitimate-sounding domains that masquerade as well-known websites. Another variant, Agent.GBPM, creates a SharePoint phishing page titled PDF Salary_Increase, which attempts to access account information from users. The last new variant in the top 10, HTML.Agent.WR, opens a fake DHL notification page in French with a login link that leads to a known phishing domain.
ProxyLogin exploits continue to grow. An exploit for this well-known, critical Exchange issue rose from eighth place in Q3 to fourth place last quarter. Old vulnerabilities can be as useful to attackers as new ones if theyre able to achieve a compromise, WatchGuard states. Additionally, many attackers continue to target Microsoft Exchange Servers or management systems. Organisations must be aware and know where to put their efforts into defending these areas.
Network attack volume is flat quarter over quarter. Technically, it increased by 35 hits, which is just a 0.0015% increase. The slight change is remarkable, as the next smallest change was 91,885 from Q1 to Q2 2020.
LockBit remains a prevalent ransomware group and malware variant. The Threat Lab team continues to see LockBit variants often, as this group appears to have the most success breaching companies (through their affiliates) with ransomware. While down from the previous quarter, LockBit again had the most public extortion victims, with 149 tracked by the WatchGuard Threat Lab (compared to 200 in Q3). Also in Q4, the Threat Lab team detected 31 new ransomware and extortion groups.
WatchGuards quarterly research reports are based on anonymised Firebox Feed data from active WatchGuard Fireboxes whose owners have opted to share data in direct support of the Threat Labs research efforts. The full report includes details on additional malware and network trends from Q4 2022, recommended security strategies, critical defence tips for businesses of all sizes and in any sector, and more.
Excerpt from:
Top malware trends and security threats revealed in new WatchGuard report - SecurityBrief Australia
Missing in action: Why do government bodies lose so many devices? – Open Access Government
Government bodies have strengthened their defences in recent years, in line with the policies and investments set out in the Government Cyber Security Strategy 2022-2030. However, security teams mustnt underestimate the ever-increasing internal threat posed by employees who store, process and transport data on mobile devices.
Each year, Apricorn issues Freedom of Information (FoI) requests to several UK government departments to examine the security of devices held by public sector employees. This time, HMRC disclosed that 635 devices had been lost or stolen over the last year, including 387 mobiles, 244 tablets and four USB drives, a 45% increase in the same period in 2020-2021 (346). The Department of Business, Energy and Industrial Strategy admitted to 204 lost and stolen devices almost double the 107 declared the previous year.
The Home Office had 469 devices lost and stolen in the year to September 2022
The Home Office had 469 devices lost and stolen in the year to September 2022. The Ministry of Defence (MoD) was not far behind, with 467 mobiles, tablets and USB devices unaccounted for. The Prime Ministers Office reported 203 misplaced devices, while the Department for Education (DfE) confirmed the loss or theft of 356 devices, including 296 USB drives.
While people will lose devices, we would hope to have seen the numbers decline over time as cybersecurity becomes more established within the public sector.
Security teams need to rethink their cyber strategy in terms of the nebulous new perimeter that has been created as employees work on a more flexible and peripatetic basis.
Each day, networks, databases and systems are being accessed from myriad locations and myriad devices. In parallel, as in other industries, the IT environment in government bodies is becoming more decentralised. The more that people work out of the office, the less they want to have to depend on IT to get tasks completed. The resulting reduction in contact with the IT team will lead to lower visibility and control over what users do.
The individual employee, and the devices and data they use to carry out their work, are now the edge. Its these endpoints that cyber-attackers will have in their sights and which need to be protected.
The foundation of this protection must be a set of security policies and procedures that are robust, regularly reviewed and well-rehearsed. These should cover the types and models of devices that are approved by the organisation for work purposes and set out precisely how they are to be used by employees.
Best practice security measures should be laid out step by step including the basic security hygiene that can easily be skipped or forgotten about when someone is distracted or lets their guard down. Policies need to be user-friendly and avoid slowing people down to avoid the likelihood that theyll find a workaround to win back their productivity.
A comprehensive and ongoing awareness programme will maximise understanding among employees of the risks
A comprehensive and ongoing awareness programme will maximise understanding among employees of the risks associated with the devices they use and the data, applications, tools and systems they access from them. All training should be contextual tailored specifically to the organisation, its activities, and the threats it faces. Spelling out the consequences of failing to adhere to the policy will help to secure user engagement.
Security policies should be enforced through technology at the endpoint wherever possible to remove the need for the employee to decide; for example, by locking down USB ports so that only those devices approved by policy can be used.
Humans will always be susceptible to slips in concentration, which could easily result in a smartphone or USB being dropped in the street, for example. This is why the automated encryption of data on all devices as standard is an essential component of security ensuring that any information held on them will be unintelligible to anyone without the decryption key. All the government bodies questioned by Apricorn confirmed that their missing devices had all been encrypted, which is really positive news.
Hardware encryption generally provides better protection than software encryption, as the keys are held safely in a crypto module that blocks brute-force attacks. At the same time, all cryptographic operations take place on the device itself.
Many public sector organisations rely on a vast and complex ecosystem of third-party providers and contractors to carry out their services. This expands the number of endpoints that are accessing sensitive and confidential data, creating significant risk.
Organisations must work with all of their partners and suppliers to identify and assess these risks and extend device security policies, controls and training to the relevant external teams. Writing requirements into contracts is a good way of making sure third parties are held to account.
The loss or theft of a device that stores or connects to government data could have a devastating impact on any public body and the communities, businesses and individuals it serves. Its concerning to think that entities which hold so much responsibility, and retain so much confidential and personal information, are still so vulnerable to this kind of event.
Building resilience into the new perimeter created by a disparate workforce and their devices must incorporate policy and best practices, be reinforced with appropriate technology, and be supported by comprehensive education.
Written by Jon Fielding, Managing Director EMEA, Apricorn
Editor's Recommended Articles
See the article here:
Missing in action: Why do government bodies lose so many devices? - Open Access Government
EU countries in search of ‘solutions’ over data retention, encryption – EURACTIV
Data retention and encryption emerged as the most pressing issues for law enforcement in the EU governments comments on theestablishment of a High-Level Expert Group on police access to digital data.
Data retention is a long-standing issue in Europe, as governments have sought to give their law enforcement agencies to hold onto electronic data that might be relevant for investigations.
Meanwhile, EU and national courts have repeatedly struck down disproportionate data harvesting practices.
The capacity of police forces to obtain and retain electronic communications data has caused the stalling of the ePrivacy Regulation, a legislative proposal that an increasing number of countries think will never see the end of the legislative process.
In this context, European governments are discussing establishing an expert group to discuss storing and accessing data from law enforcement agencies. According to a document dated 20 March and leaked by Contexte, data retention is set to take centre stage.
The subject of data must be approached in a global and coherent manner, and not be limited to questions of access, but also preservation and exploitation, Frances commentary reads.
Estonia puts it more bluntly, stating that data retention is the basis of this whole topic. Simply put: if there is no data retained, there is no point in talking about access to data.
Lithuania and Poland both reiterated this point, calling for the group to be co-chaired by the Commission and the rotating presidency of the EU Council of Ministers.
France adds that there should be regular monitoring by the Standing Committee on Operational Cooperation on Internal Security (COSI), which ensures the cooperation on EU internal security matters, in conjunction with the justice sector.
Moreover, Warsaw also wants sub-groups dedicated to encryption and data localisation. Indeed, Paris sees both issues as playing a pivotal role in fighting criminal organisations and terrorist networks.
In addition, the French government said that rather than taking stock of existing legal cases on the issue of data retention, the new body should propose concrete guidelines to address the challenges security forces face in this area.
France also wants to define a clear mandate and precise methodology for the group to develop a common framework for data retention and access that is balanced with regard to the preventive and law enforcement needs of the member states.
Paris pointed to its attempt to establish an open dialogue with judicial authorities, civil society, data protection, national lawmakers and industry players, an example the Swedish presidency is invited to follow.
Regarding participation, several countries supported the idea of including technical experts in the group. Still, Belgium said that to do that, you have to have a profound knowledge of the involved digital technologies.
As for who should be part of this group of experts, Greece and the EU Fundamental Rights Agency (FRA) mentioned the involvement of non-constitutional actors as appropriate, but according to Greece, this should be more clearly detailed and agreed upon.
While most countries thanked the Swedish presidency for including this topic among its priorities, Warsaw mentioned that the presidencys identified areas and challenges should not be considered exhaustive.
In this regard, Slovenia pointed to the need to find practical solutions for the legal basis necessary to access to data, especially in connection to data retention and encrypted information.
The Czech Republic also emphasised that a clear legal framework is needed, for example, to distinguish legitimate calls from fakes using a combination of contact number spoofing with AI voice manipulation.
Besides data retention, the EU countries other most emphasised aspect is end-to-end encryption.
However, according to Estonia, data retention should be dealt with first, before encryption, or in parallel since it doesnt matter much if the content is encrypted if the data simply isnt there.
While they think that end-to-end (E2E) encryption should not be weakened, Tallinn admitted that it is unclear what this means.
If the service provider, court or some other institution has the key, is the E2E weaker? Perhaps we are talking about the reluctance to technical weakening of the system? In other sense, is the door weaker if someone has the key? the Estonian commentary reads.
Encryption can still pose challenges, even if the information was not subject to lawfully intercepted communication and was found using other lawful measures (e.g. house search) stored on data carrier (eg. data stored on HDD encrypted with TPM chip), said the Czech Republic.
France raised the point that access to digital evidence might become even more challenging if stored in IT infrastructure outside the EU. Sill, access to data can cause problems also in the EU, as past legal cases have shown.
Even though the European Court of Justice ruled against data retention a few weeks ago, in Germany, the debate on the topic does not seem to end. The government is still not in agreement on whether to follow a quick
[Edited by Luca Bertuzzi/Nathalie Weatherald]
Visit link:
EU countries in search of 'solutions' over data retention, encryption - EURACTIV
Data backup, security alerts, and encryption viewed as top security … – Help Net Security
Half of U.S. businesses say that security is the most influential factor when buying software, according to Capterras Security Features Survey. In fact, 45% have stopped using a specific type of software due to security concerns. Businesses are willing to pay a premium for intuitive and well-designed secure software.
Digging further, businesses share the types of security features they consider to be must-haves. 76% cite data backups as a dealbreaker when choosing software. This can be expected as growing ransomware attacks make it critical for businesses to have data backups. The second most important security feature is the ability to receive security notifications (72%), followed by encryption in transit (68%) and at rest (67%).
Prompted by federal government mandates, the availability of a software bill of materials (SBOM) is emerging as a required security feature among businesses buying software. An SBOM is a list of the components used to build a software package and is meant to inform organizations of related security and compliance risks. Its cited by 55% of businesses as a must-have feature.
Businesses should continue to place a premium on security as a key differentiator when buying software, recommends Zach Capers, senior security analyst at Capterra. While organizations should focus on key features such as data backups, security notifications, and encryption, dont overlook lesser-known, but equally important, features such as the availability of an SBOM.
Organizations are also boosting security by focusing on robust authentication measures. While 59% of businesses still look for relatively insecure password authentication, 52% want software tokens (e.g., DUO, Google Authenticator), 40% pursue hardware tokens (e.g., USB key), and 39% look for biometrics, all of which are much stronger than passwords. More intriguingly, a third are interested in passwordless authentication.
Businesses look for security certifications and attestations provided by software vendors to see how the tools theyre buying adhere to specific protections. According to 59% of businesses, a Cloud Security Alliance certification makes the software more appealing, followed by 47% that are interested in the Cybersecurity Maturity Model Certification (CMMC).
Security is a critical factor for most companies when buying software, but its essential to know which features to focus on that make a product fit business needs.
More here:
Data backup, security alerts, and encryption viewed as top security ... - Help Net Security
[E-book] Encrypted Traffic Visibility For Modern Networks – The Fast Mode
This special edition e-book features the views of 25 leading IP networking solution vendors on the benefits and impact of encryption, and the approaches for addressing visibility loss from emerging encryption protocols.
Over the last decade, there has been a sharp growth in the use of encryption, driven by the need for user and data privacy, increasing concerns over cyberattacks such as breaches and ransomware, and the overall ease of implementing encryption technologies. In March 2023, 93% of pages loaded on a Chrome browser on Windows were encrypted, according to Googles Transparency Report. Seven years ago, this figure was only 39%.
At the same time, advancements in encryption methodologies have led to stronger and more secure encryption protocols, such as TLS 1.3, ECH and QUIC. As these protocols evolve, we expect to see technologies such as post-quantum cryptography and homomorphic encryption emerge, which will lead to encrypted traffic being nearly impossible to decipher or crack.
These two trends in combination pose an enormous challenge to network operators as they can no longer inspect or analyze encrypted traffic using traditional network visibility tools, resulting in the inability to identify and classify the traffic traversing their networks.
This visibility gap leads to the inability to correctly execute network policies, route and optimize traffic, detect threats, generate insights and analytics, troubleshoot network issues and more. As a result, network costs increase, user experience takes a hit and ironically, network security deteriorates.
To address this lack of visibility, operators and enterprises are adopting a number of technologies, including SSL / TLS inspection, behavioral / statistical / heuristic analysis, machine learning and deep learning.
The Fast Mode spoke to 25 leading IP networking solution vendors that offer policy control, traffic management, network security, analytics and network performance management solutions, on their thoughts on:
Vendors featured in the e-book include:
Get your free copy today by filling in the download form to the right.
3d ago / Telecom White Papers / By Ray Sharma
Read more:
[E-book] Encrypted Traffic Visibility For Modern Networks - The Fast Mode
Zama Selected as Finalist for RSA Conference 2023 Innovation … – PR Newswire
French Startup is Recognized for Groundbreaking Work on Homomorphic Encryption
PARIS, March 23, 2023 /PRNewswire/ --Zama has been named one of 10 finalists for the RSA Conference 2023 Innovation Sandbox contest for its work on Fully Homomorphic Encryption (FHE). Zama will present its technology and solution to a panel of renowned industry judges and a live in-person audience on Monday, April 24 at RSA Conference 2023 in San Francisco.
Since 2005, the RSAC Innovation Sandboxhas served as a platform for the most promising young cybersecurity companies to showcase their groundbreaking technologies and compete for the title of "Most Innovative Startup." The competition is widely recognized as a catapult for success and the top 10 finalists have collectively celebrated 75 acquisitions and received $12.5 billion in investments over the last 18 years. Zama will have three minutes to pitch the panel of judges before a question-and-answer round.
"The RSA Conference Innovation Sandbox contest is one of the most exciting highlights of the week as we get to watch 10 of the cybersecurity industry's best and brightest up and coming stars shine on stage with provocative and cutting-edge ideas," said Linda Gray Martin, Senior Vice President, RSA Conference. "The demanding challenges and threats we face are only getting more complex in both size and severity and we need smart, determined and skilled individuals and companies to make an impact and help tackle what lies ahead."
Zama is a cryptography company building open-source homomorphic encryption tools for developers, enabling them to build solutions that keep data private. FHE enables processing data without decrypting it; this means companies and organizations can offer their services without seeing their users' data and users will never notice a difference in functionality. With data encrypted both while in transit and during processing, everything we do online could now be encrypted end-to-end.
Dr Pascal Paillier, Chief Technology Officer at Zama said: "The amount of private data we generate increases every day, and with it the risk of data breaches and surveillance. Privacy is not about data ownership or security, it's about being able to selectively disclose what we want, to whom we want. Zama makes protecting privacy easy, creating tools that can be used even by someone who is not a cryptographer."
The RSAC Innovation Sandbox contest kicks off at 12:00 p.m. PT on April 24 and winners will be announced at 3:00 p.m. the same day. The panel of renowned expert judges includes Niloofar Howe, Sr. Operating Partner at Energy Impact Partners; Paul Kocher, Independent Researcher; Shlomo Kramer, Co-founder and CEO, Cato Networks; Barmak Meftah, Co-Founder & General Partner at Ballistic Ventures; and Christopher Young, Executive Vice President of Business Development Strategy and Ventures at Microsoft. Hugh Thompson, Program Committee Chair of RSA Conference, will return to host the contest.
For more information regarding RSA Conference 2023, taking place at the Moscone Center in San Francisco from April 24-27, please visit https://www.rsaconference.com/usa.
About Zama
Zama is a cryptography company building open-source homomorphic encryption tools for developers. Their technology enables a broad range of privacy-preserving use cases, from confidential smart contracts to encrypted machine learning and privacy-preserving cloud applications. Zama was founded by Pascal Paillier and Rand Hindi, and has more than 60 researchers and engineers in its team from a broad range of backgrounds.
About RSA Conference
RSA Conference is the premier series of global events and year-round learning for the cybersecurity community. RSAC is where the security industry converges to discuss current and future topics and gain access to the experts, unbiased content and ideas that enable individuals and companies to advance their cybersecurity posture and build stronger and smarter teams. Both in-person and online, RSAC brings the cybersecurity industry together and empowers the collective "we" to stand against cyberthreats around the world. RSAC is the ultimate marketplace for the latest technologies and hands-on educational opportunities that help industry professionals discover how to make their companies more secure while showcasing the most enterprising, influential and thought-provoking visionaries and leaders in cybersecurity today. For the most up-to-date news pertaining to the cybersecurity industry, visit http://www.rsaconference.com. Where the world talks security.
Media Contact:
Fabiana Forni
[emailprotected]
Logo - https://mma.prnewswire.com/media/2039130/3952824/Zama_Logo.jpg
SOURCE Zama
Visit link:
Zama Selected as Finalist for RSA Conference 2023 Innovation ... - PR Newswire