Category Archives: Encryption

7 Ways To Ensure Your Business’ Website Is Properly Encrypted – The Realtime Report

Encryption is a process of transforming readable data into an unreadable format. This is done using an algorithm, a set of rules that can be applied to the data to change it. The purpose of secure encryption is to protect information from being accessed by unauthorized people.

For data to be encrypted, it must first be converted into a code. This code can then be decrypted or translated into its original form using the same algorithm. The strength of encryption lies in the fact that it would require considerable time and processing power for someone to decrypt the data without the key.

There are two main types of secure encryption: symmetric and asymmetric. Symmetric encryption uses the same key to encrypt and decrypt data. Asymmetric encryption uses two different keys: one to encrypt the data and one to translate it. The keys are mathematically related, but it is impossible to derive one from the other.

When transmitting sensitive information, such as credit card numbers or passwords, it is essential to use a secure connection. SSL (Secure Sockets Layer) is a protocol that provides a secure connection between two computers.

When you connect to a website using SSL, the information exchanged between your computer and the website is encrypted. This makes it difficult for anyone to intercept and use the information without your permission.

A strong password is a key that is difficult to guess and is not used for any other purpose. It should be at least eight characters long and include a mix of uppercase and lowercase letters, numbers, and symbols.

Never use the same password for more than one account. If someone manages to obtain your password, they will have access to all of your accounts.

You should also change your passwords regularly. This will help to ensure that even if someone does manage to obtain your password, they will not be able to use it for long.

Two-factor authentication is a security measure that requires you to provide two pieces of information to log in to an account. The first piece of information is something that you know, such as a password. The second piece of information is something that you have, such as a phone.

With two-factor authentication, even if someone manages to obtain your password, they will not be able to log in to your account unless they also have your phone.

One of the most important things you can do to keep your website secure is to keep your software up to date. This includes the operating system, web server software, and any other software used on the server.

Outdated software often has security vulnerabilities that attackers can exploit. By keeping your software up to date, you can help to ensure that these vulnerabilities are patched and your website remains secure.

If your website is hacked, it is vital to have a backup of your data. This will allow you to restore your website to its previous state.

You should encrypt your backups so that even if an attacker obtains them, they cannot access the data. This will help to ensure that your data is not lost if your website is hacked.

You can use a cryptographic key. This will allow you to encrypt your backups without needing a password. The key can be stored on a USB drive or other removable media and used to decrypt the backups when needed.

You can also use a third-party service to encrypt your backups. This will provide an added layer of security and help to ensure that your data is not compromised if your website is hacked.

A web application firewall (WAF) is a security measure that can help to protect your website from attacks. A WAF examines traffic and blocks requests that appear to be malicious.

You should consider using a WAF if your website is accessible to the public. This will help to ensure that attackers do not compromise your website.

You should encrypt the tables if your website uses a database like MySQL. This will help to ensure that the data is not compromised if the database is hacked.

You can use a tool such as phpMyAdmin to encrypt your database tables. This will provide an added layer of security and help to ensure that your data is not lost if your website is hacked.

You should also consider encrypting any sensitive data stored in the database. This includes passwords, credit card numbers, and other personal information.

These are just a few of the ways that you can help to ensure your website is properly secured. By taking these measures, you can help to protect your website from attacks and ensure that your data is not lost or compromised.

Go here to see the original:
7 Ways To Ensure Your Business' Website Is Properly Encrypted - The Realtime Report

Google To Enable ‘Client-Side Encryption’ In Gmail By 2023 | All You Need To Know – Jagran English

Google has revealed a new security feature for its Gmail in the companys annual cloud computing showcase Google Cloud Next. The new feature will help users all around the world to block the attackers who can get access to the data. The client-side encryption will be applied to Gmail by the start of next year.

Client-side encryption was previously only available for Google Meet and Docs data. The company is now extending this functionality to other tools in its Workspace productivity suite. Stores encrypted data on the end-user device before it is sent to our data center servers. This means that even Google doesn't have the encryption keys needed for access.

After Google enables client-side encryption next year, only the user who has sent the mail and the user who has received the mail can read it. This feature will also limit others to read messages that are going in the mail.

CSE allows every user including businesses to have direct control of the encryption keys. Google says it uses "modern encryption standards",to encrypt data sent to its servers, making it impossible for hackers to access sensitive information.

The tech giant aims to help users with enhanced data confidentiality while meeting data sovereignty and compliance requirements.

On the other hand, Google Chat is also expected to get this data loss prevention feature to protect the data from real-time leaks. Moreover, the tech giant also mentioned that it will look for data-sharing options for Google Drive that will let businesses decide how to share their files.

Read the original here:
Google To Enable 'Client-Side Encryption' In Gmail By 2023 | All You Need To Know - Jagran English

Ford Wont Give Unauthorized Tuners Access To The 2024 Mustang S650 – CarScoops

Muscle cars are as American as apple pie or road trips. Modifying and customizing ones muscle car is also a very traditional move but now were learning that such tweaking will be considerably harder on Americas newest muscle car, the S650 Ford Mustang. Heres why those who seek to pull more power out of the latest pony car will find it harder to do so.

Advancements in technology have made many tuning strategies safer and more powerful than ever before. Despite that, the chief engineer of the all-new Mustang, Ed Krenz, recently told Ford Authority that tuning the new pony car would be much more difficult. Ultimately, that result is more collateral than it is intentional.

More: 2024 Ford Mustang Lands With BMW-Style Digital Dash, Manual Box And A 5.0 V8 You Can Rev From The Keyfob

Encryption on the full stack or the complete package of electronic hardware and software in the S650 Mustang is the barrier. Ford claims that the encryption isnt the product of wanting to keep extra power from owners but rather the ongoing battle against the dangers of hacking. Hackers have already proven that vulnerabilities in software can be dangerous for owners. Now that the S650 uses Fords Fully-Networked Vehicle (FNV) electrical architecture, it says that the need for cybersecurity is paramount.

On top of that, Ford plans to offer the most tailored experience ever to new Mustang owners and it wants to ensure that any personal user data stored in the cars memory is kept safe and secure. The result of that intention is a car that could limit functions if it experiences what the software sees as a break in authentication from a third party.

NO To Unauthorized Tuners

At the same time, Ford has worked with aftermarket tuners in many different instances over the years. And while we expect that same spirit of collaboration to continue, when asked by Musclecarsandtrucks if just any 3rd party would be able to tune the S650s new engines, Krenz responded with a resounding NO.

There are new requirements within the software. Regulatory driven. That is going to restrict access to aftermarket tunes. This is cross OEM, which has to do with CAN message authentication, Krenz explained.

It is likely that we will continue to make available tunes for the ECUs, he added. There will be tunes, both Ford and outside of Ford. But youll probably see a reduced variety of them, based on constraints that cyber security, CAN message authentication, and all of that put into the software.

What that means is that youll only be able to get a performance upgrades for your new 5.0-liter Coyote V8 or revised 2.3-liter turbocharged four pot from the Blue Opels trusted tuners / partners and no one else. Its never fun to lose access to customization but theres no doubt that hacking of modern cars is a credible threat.

More:
Ford Wont Give Unauthorized Tuners Access To The 2024 Mustang S650 - CarScoops

Swisscom, NETSCOUT and Ericsson enabling 5G packet data processing in the cloud – Ericsson

Data-processing and network function monitoring can now be performed in the cloud, thanks to an industry first solution fromEricsson,Swisscom and NETSCOUT that providesautomatic access to packet data and the ability to analyze raw packet data.

With the established approach to data collection being unsustainable, the updated network solution will overhaul the traditional virtualised mobile network function (where data traffic is routed from the cloud and processed physically in a conventional manner). Instead, cloud-based packet data processing and network function monitoring are enabled dramatically increasing network service assurance, analytics and cybersecurity.

The solution has been introduced to Swisscoms newly deployed cloud-native, TLS-encrypted 5G network, and integratesEricssons dual-mode 5G Core with built-in software (SW) probes and NETSCOUTs vSTREAM.

Ericssons SW probe is a built-in virtual network probe solution for cloud native architecture thats specifically designed to enable the monitoring and troubleshooting of cloud native functions (CNFs) and provide data streams for analytics. It provides two data sources: virtual tapping (virtual terminal access points vTap) and event reporting. The vTAP makes packets available to third-party instrumentation like NETSCOUTs vSTREAM, which turns the packet data into smart data extensible to service assurance, analytics and cybersecurity providing actionable intelligence for operations and engineering. The event reporting provides metadata content on signaling procedures ready to be used for monitoring and troubleshooting purposes.

This groundbreaking solution gives Swisscom better visibility into their cloud network, and the ability to capture network packets from inside a network at strategic points.Continuous monitoring and deep analysis of networks are essential for guaranteeing network and subscriber assurance, troubleshooting and security monitoring.In turn, this will help Swisscom secure 5G customer experience, significantly reduce total cost of ownership (TCO), secure sensitive data, and deliver new and existing 5G mission-critical services within the cloud, including automatic access to packet data and RAW data in clear.

Michael Berger,Director of SRE & Tooling, Swisscom, says:To improve the user experience and offer new and enhanced services, we needed a network that offers faster and more reliable access. As part of our 5G journey, we chose to work with best-of-breed partners to future-proof our architecture, simplify our operations, and improve our ability to innovate.We have worked closely with our partnersEricssonand NETSCOUT to drive this solution forward. Swisscom is thus ensuring the quality of the network for Switzerland, which will optimise the network and, consequently, the performance of services.

Martin Brki, Managing Director Switzerland,Ericsson, says: Swisscom,Ericsson, and NETSCOUT have addressed the industry challenge of providing end-through-end visibility in 5G networks handling cloudification and encryption. With this visibility, Swisscom can now assure the delivery of new and existing innovative mission-critical services with 5G.

Here is the original post:
Swisscom, NETSCOUT and Ericsson enabling 5G packet data processing in the cloud - Ericsson

Fully Homomorphic Encryption Market Latest Innovation, Upcoming Trends, Top Companies, Growth, Regional Analysis and Forecast by 2028 – Digital…

A market research conducted in the significant Fully Homomorphic Encryption report aids in improving and modifying the products so that future products present more satisfaction to the valuable customers. A comprehensive discussion about numerous market related topics in the report is sure to assist the client in studying the market on competitive landscape. The data collected to structure this report is based on the data collection modules with large sample sizes. Fully Homomorphic Encryption market research report is prepared with detailed statistics and market research insights that results in sharp growth and thriving sustainability in the market for the businesses.

Fully Homomorphic Encryption Market is expected to reach USD 437.30 million by 2028 witnessing market growth at a rate of 7.50% in the forecast period of 2021 to 2028. Data Bridge Market Research report on fully homomorphic encryption market provides analysis and insights regarding the various factors expected to be prevalent throughout the forecasted period while providing their impacts on the markets growth.

Get Full PDF Sample Copy of Report: (Including Full TOC, List of Tables & Figures, Chart) @https://www.databridgemarketresearch.com/request-a-sample/?dbmr=global-fully-homomorphic-encryption-market

Increasing demand for secured data transmission, surging levels of investment for the growth of the cloud based industries, rising number of e-governance initiatives, increasing implementation of homomorphic encryption in the banking, finance, and insurance sectors, rising levels of disposable income of theconsumers, rising healthcare spending across the globe, rising usages of the technology to secure data stored in the cloud and enable data analytics are some of the major as well as vital factors which will likely to augment the growth of the fully homomorphic encryption market in the projected timeframe of 2021-2028. On the other hand, proliferation of hybrid cloud is likely to bolster sensitive data required to be stored, shared, and analysed across system along with growing number of research and development activities which will further contribute by generating massive opportunities that will lead to the growth of the fully homomorphic encryption market in the above mentioned projected timeframe.

This Fully Homomorphic Encryption Market report provides details of new recent developments, trade regulations, import export analysis, production However analysis, value chain optimization, market share, impact of domestic and localized market players, analyses opportunities in terms of emerging revenue pockets, changes in market regulations, strategic market growth analysis, market size, category market growths, application niches and dominance, product approvals, product launches, geographical expansions, technological innovations in the market. To gain more info on Fully Homomorphic Encryption market contact Data Bridge Market Research for an Analyst Brief, our team will help you take an informed market decision to achieve market growth.

Key Players Mentioned in the Fully Homomorphic Encryption Market Research Report:

Read Detailed Index of full Research Study @https://www.databridgemarketresearch.com/reports/global-fully-homomorphic-encryption-market

Fully Homomorphic Encryption Market Segmentations:

Geographic Segment Covered in the Report:

Major Points Covered in TOC:

Market Overview:It incorporates six sections, research scope, significant makers covered, market fragments by type, Fully Homomorphic Encryption market portions by application, study goals, and years considered.

Market Landscape:Here, the opposition in the Worldwide Fully Homomorphic Encryption Market is dissected, by value, income, deals, and piece of the pie by organization, market rate, cutthroat circumstances Landscape, and most recent patterns, consolidation, development, obtaining, and portions of the overall industry of top organizations.

Profiles of Manufacturers:Here, driving players of the worldwide Fully Homomorphic Encryption market are considered dependent on deals region, key items, net edge, income, cost, and creation.

Market Status and Outlook by Region:In this segment, the report examines about net edge, deals, income, creation, portion of the overall industry, CAGR, and market size by locale. Here, the worldwide Fully Homomorphic Encryption Market is profoundly examined based on areas and nations like North America, Europe, China, India, Japan, and the MEA.

Application or End User:This segment of the exploration study shows how extraordinary end-client/application sections add to the worldwide Fully Homomorphic Encryption Market.

Market Forecast: Production Side:In this piece of the report, the creators have zeroed in on creation and creation esteem conjecture, key makers gauge, and creation and creation esteem estimate by type.

Research Findings and Conclusion:This is one of the last segments of the report where the discoveries of the investigators and the finish of the exploration study are given.

New Business Strategies, Challenges & Policies are mentioned in Table of Content, Request TOC @https://www.databridgemarketresearch.com/toc/?dbmr=global-fully-homomorphic-encryption-market

Key Benefits of the report:

Fully Homomorphic Encryption Market Report Answers the Following Questions:

Make an Enquiry before[emailprotected]https://www.databridgemarketresearch.com/inquire-before-buying/?dbmr=global-fully-homomorphic-encryption-market

Top Trending Reports by DBMR:

https://www.marketwatch.com/press-release/near-infrared-nir-portable-spectrometer-market-growing-at-cagr-of-1010-with-industry-share-competitive-landscape-and-regional-outlook-by-2029-2022-09-27

https://www.marketwatch.com/press-release/infrared-temperature-detector-market-is-anticipated-to-undergo-a-cagr-of-1030-share-outlook-trends-size-demand-and-revenue-forecast-by-2029-2022-09-27

https://www.marketwatch.com/press-release/intelligent-occupancy-sensor-market-to-witness-promising-cagr-growth-of-3310-by-2029-size-share-trends-demand-revenue-and-segmentation-outlook-2022-09-27

https://www.marketwatch.com/press-release/liquid-crystal-display-lcd-digital-signage-market-to-receive-overwhelming-cagr-of-850-by-2029-size-share-global-industry-trends-and-revenue-outlook-2022-09-27

https://www.marketwatch.com/press-release/airbags-and-seatbelts-market-accelerating-with-a-cagr-of-770-by-2029-industry-trends-size-share-demand-and-key-player-analysis-2022-09-27

https://www.marketwatch.com/press-release/mobile-phone-accessories-market-to-exhibit-a-remarkable-cagr-of-750-by-2029-size-share-emerging-trends-key-player-analysis-and-industry-growth-factors-2022-09-27

https://www.marketwatch.com/press-release/antenna-market-to-observe-highest-cagr-of-990-by-2029-industry-size-share-development-trends-and-revenue-forecast-2022-09-27

About Data Bridge Market Research, Private Ltd

Data Bridge Market ResearchPvtLtdis a multinational managementconsultingfirm with offices in India and Canada. As an innovative and neoteric market analysis and advisory company with unmatched durability level and advanced approaches. We are committed to uncover the best consumer prospects and to foster useful knowledge for your company to succeed in the market.

Data Bridge Market Research is a result of sheer wisdom and practice that was conceived and built-in Pune in the year 2015. The company came into existence from the healthcare department with far fewer employees intending to cover the whole market while providing the best class analysis. Later, the company widened its departments, as well as expands their reach by opening a new office in Gurugram location in the year 2018, where a team of highly qualified personnel joins hands for the growth of the company. Even in the tough times of COVID-19 where the Virus slowed down everything around the world, the dedicated Team of Data Bridge Market Research worked round the clock to provide quality and support to our client base, which also tells about the excellence in our sleeve.

Data Bridge Market Research has over 500 analysts working in different industries. We have catered more than 40% of the fortune 500 companies globally and have a network of more than 5000+ clientele around the globe. Our coverage of industries includes

Contact Us

US: +1 888 387 2818UK: +44 208 089 1725Hong Kong: +852 8192 7475Email [emailprotected]

Continue reading here:
Fully Homomorphic Encryption Market Latest Innovation, Upcoming Trends, Top Companies, Growth, Regional Analysis and Forecast by 2028 - Digital...

10 Biggest Data Breaches Ever – And How to Prevent Them – Techopedia

Data breaches. The term itself can ring alarm bells in most organizations, and for good reason. A data breach usually means thousands spent on remedial measures, millions in regulatory fines and the invaluable loss of customers' trust and confidence. (Also read: Massive Data Breaches: The Truth You Might Not Know About.)

There have been numerous data breaches in modern times, forcing other organizations to undertake adequate data privacy and protection measures.

Here are the top 10 such breaches, and how to keep your organization from landing on a list like this:

There's really no other way to start a list of the biggest data breaches ever than with the 2013 Yahoo breach, which affected almost three billion users.

The breach's impact was a rapid $350 million reduction in Yahoo's market value -- while they were in the middle of a Verizon acquisition. The cyberattack's perpetrators were never identified, but Yahoo issued a statement asserting it believed "state-sponsored actors" may have been responsible.

Almost all Yahoo users' real names, email addresses, dates of birth, telephone numbers, authentication questions and other sensitive information was leaked in what is still considered the biggest data breach of all time.

Nearly a billion records were compromised when the First American Financial Corporation faced a data breach that led to bank account numbers, mortgage and tax records, social security numbers, wire transfer receipts and bond transaction receipts being compromised.

What sets this breach apart from the rest on this list is that it wasn't a breach in the traditional sense of the word. Rather than hackers breaking into the databases, the First American Financial Corporation failed to implement a secure authentication protocol which meant no one had to prove their identity to view the aforementioned documents. Once they accessed the documents, hackers used Advanced Persistent Bots (APBs) to collect, catalog and copy all data they had access to.

This glaring error went unnoticed for years. The New York State Department Financial Services (NYDFS) claimed the First American Financial Corporation did very little to ensure it had appropriate security measures to protect its critical data.

Marriott is not a typical digital service provider, which sets it apart from some of the other names on this list. However, the international hotel chain suffered a breach in 2018 that affected more than 500 million users.

The affected users' contact information, passport numbers, travel history, credit card information, social security details and Starwood Preferred Guest numbers were among the sensitive data that was breached.

Marriott faced a PR catastrophe, as it was slapped with a $24 million fine in the UK, hundreds of class action lawsuits and calls for its senior management to resign.

Following an internal audit, Marriott's use of outdated encryption protocols to store and secure its databases was the primary cause of the breach. The audit concluded the breach was carried out using a Remote Access Trojan (RAT) and Mimikatz. (Also read: Encryption Just Isn't Enough: Critical Truths About Data Security.)

MySpace may not have been as popular as some of the other social networking sites in 2016, but it wasn't any less shocking when the company announced to its users that their old information may be available for sale online -- or, more accurately, that it had been up for sale online for at least three months.

Time Inc., which acquired MySpace, reported a data breach had left 360 million accounts compromised, with their usernames and passwords available to be used to access users' information on other sites. The hackers behind the data breach were thought to be responsible for similar data breaches at Tumblr and LinkedIn.

When Adult FriendFinder suffered a data breach, there was absolute pandemonium all around. This was owed to the nature of the data breach, with information about users' casual hookups and other adult content being made public.

More than 400 users' the names, email addresses, passwords, pictures and other personal details were leaked online and freely available on leaksource.com. The databases compromised had 20 years' worth of information, with the users' credentials also available online. The site's use of SHA-1 hashing algorithm -- a fragile protocol by modern standards -- was the primary reason the database was so easily breached.

How a company the size of Twitter managed to commit such a gaffe will forever remain a mystery. In May 2018, the company sent an email to its 330 million users urging them to change their passwords, since some of them passwords had been stored on its internal computer system in readable text format.

Twitter reassured its users that the glitch had been identified before any data breach, so none of their information had been compromised. However, a 2010 Federal Trade Commission inquiry revealed that there had been at least two data breaches at Twitter where users' private data had been compromised due to lapses in Twitter's security protocols. (Also read: Uncovering Security Breaches.)

Compared to some others on this list, the Equifax data breach is fairly mild. However, the fact that the organization had to spend upwards of $700 million in remedial measures to help affected users made it a cautionary tale for other organizations.

Approximately 150 million users had their social security numbers, dates of birth, home addresses, driver's license numbers and credit card information stolen. The people responsible for the breach were never identified, even after lengthy congressional inquiries.

The inquiries did discover, however, that a vulnerability within the Equifax website had been exploited for months by those responsible for the breach. Other inadequate measures, such as the lack of database system segmentation, made the attacks even easier to carry out.

Facebook was already facing a public relations nightmare in 2019 over its less-than-adequate data protection practices when news of the 2019 breach broke. It was, and remains, the most significant breach in the company's history, affecting up to 540 million users globally. The perpetrators were never identified or caught, but it did reveal just how vulnerable Facebook's databases were.

How did it happen? Facebook had failed to adequately protect its global databases with the appropriate levels of encryption, and these databases were easily searchable online as a result. Users' phone numbers, genders and geolocation in the United Kingdom, United States and Vietnam databases were particularly vulnerable. This is precisely why it proved impossible to identify the perpetrators, since the databases were literally available via a simple Google search with no appropriate security measures to protect them.

The eBay breach came a few months after the Yahoo breach, with similar cases of compromised user data. While the 145 affected users (by some estimates) comes nowhere near Yahoo's numbers, the impact was not any less severe. Internal investigations revealed three of eBay's employees had been socially engineered, and their compromised credentials were used to gain access to the main eBay database. (Also read: Insider Threat Awareness: Avoiding Internal Security Breaches.)

The company informed all affected users and advised them to change their passwords, since attackers had accessed encrypted passwords as well. This led to New York's Attorney General calling on eBay to provide free credit monitoring services to users, which the company refused, citing a lack of financial fraud.

One of the most recent major data breaches, what makes the SolarWinds data breach so notorious is that there still isn't a reliable number of how many records may have been compromised. However, more than 18,000 organizations and government agencies globally are said to have been affected. The United States Attorney General at the time stated that the attack may have been Russian-backed.

The attackers got insider access to SolarWinds update packages and placed malware into the next scheduled update. These updates contained the necessary e-signatures, so whichever networks accepted the updates were compromised. The hidden malware spread throughout the entire SolarWinds supply chain, with at least 50 United States government agencies facing a "grave impact" since the attackers gained a foothold within their networks.

The aforementioned list should be reason enough for most organizations to consider a robust data protection and governance framework that can minimize the chance of a data breach occurring.

Here are five some steps most organizations can undertake to do so:

By far, the most fundamental measure an organization can take to minimize the risk of a data breach is to limit the number of people who have access to the data in the first place -- which is known as access governance. Theres no shortage of effective solutions that can help organizations address this issue.

For example, Securitis access intelligence via its Unified Data Controls allows organizations to identify which employees need access to what data and grant it to them on a strictly "needs-based" basis while also keeping detailed records to help with future assessments if necessary.

This may seem rather obvious, but many organizations make the mistake of not appropriately training their employees about just how easily hackers may gain access to the company's databases by exploiting careless employee behavior online.

Regular workshops and training can educate your team on best practices to ensure they follow adequate security protocols online. This could also include anti-phishing training on adequately securing their footprint online via cybersecurity tools such as anti-virus software, VPNs or proxies like IPRoyal and Avast. (Also read: VPNs vs Proxies: What's Best for Business.)

Yet another example of a relatively minor mistake that can lead to significant damage: Far too often, hackers exploit glitches in the software.

If an organization does not update its software regularly, the glitch will likely be present for that entire duration and can be exploited more easily.

Often, organizations are too rattled and disorganized if they do find themselves victims of a data breach. It's worth mentioning that, if proper measures are taken in the immediate aftermath of a data breach, the impact of the breach can be drastically reduced.

You should have protocols in place that can give real-time insights into exactly what data was compromised, how the damage can be limited and the remedial measures most necessary.

Last, but probably the most important, is to know precisely how to leverage encryption to your benefit. Organizations that have an old-fashioned approach to encryption fail to maximize the security encryption has to offer.

With lattice-based encryption and quantum computing now gathering steam, organizations can afford to ensure the best possible protection for all their data. Doing so guarantees that, if all else fails, your data is so well-protected that hackers gain nothing by breaking into the company's internal database.

Data breaches can happen to anyone -- even the largest, most well-established organizations. And often, they're the result of simple, easily solvable data management mistakes. By implementing proper data breach prevention practices beforehand, you can drastically reduce the likelihood of your organization suffering a data breach and recover more efficiently in the worst-case scenario. (Also read: What Is an Air Gap Backup and Why Do You Need One?)

Read the original:
10 Biggest Data Breaches Ever - And How to Prevent Them - Techopedia

Loads of PostgreSQL systems are sitting on the internet without SSL encryption – The Register

Only a third of PostgreSQL databases connected to the internet use SSL for encrypted messaging, according to a cloud database provider.

Bit.io, which offers a drag-and-drop database as a service based on PostgreSQL, searched shodan.io to create a sample of 820,000 PostgreSQL servers connected to the internet over September 1-29. Of this sample, more than 523,000 PostgreSQL servers did not use SSL (64 percent).

The company said this left open the possibility for outsiders to snoop on the data transmitted to and from the server. It also noted 41 online PostgreSQL servers did not even require a password.

"When you connect to a website through your web browser, data you send and receive is probably encrypted," bit.io CTO Jonathan Mortensen said in a blog post. "It's amazing, then, that data sent to and from Internet-connected PostgreSQL servers is very likely unencrypted. It's a problem."

The company also conducted an informal survey of 22 popular SQL clients. It found only two require encrypted connections by default, while six will ask for encryption but silently accept an unencrypted connection. The rest are unencrypted by default, and require opt-in to using SSL.

Also discovered was that more than 43 percent of those with SSL certificates were self-signed. This means that while they are encrypted, the certificates often do not confer trust as they may not be issued or validated by a certificate authority, the company said. Meanwhile, 4 percent of the certificates had expired.

EDB, a consultancy specialized in building and supporting PostgreSQL systems, pointed out that it was the minority of PostgreSQL databases that were connected to the internet, and that the open source system does not accept connections from the internet by default.

Marc Linster, EDB CTO, told The Register: "It seems that some database hosting providers are doing their customers a disservice by not giving them the ability to provide a restricted network access list."

The recommended approach was to give customers the option of an allow list to restrict network access, he said.

Linster pointed out that PostgreSQL has a built-in firewall of sorts called the pg_hba.conf. Since external connections are disallowed by default, if developers need to open up PostgreSQL to the internet, they should do it via an app server that sits within a corporate firewall.

He also said that production databases should have valid SSL certificates. The pg_hba.conf allows you to restrict traffic to only SSL connections by simply changing host to hostssl, as mentioned in the blog.

DBAs who manage PostgreSQL should review the firewall settings to ensure that connections are restricted to application servers and that the connection is hostssl, so only SSL connections can be made, Linster said.

For database-as-a-service (DBaaS), DBAs and developers (or any decision maker) should ensure the hosting provider allows the customer to provide an allow list and supports Bring Your Own Certificates (BYOC).

Read more from the original source:
Loads of PostgreSQL systems are sitting on the internet without SSL encryption - The Register

Virtru Named ‘Best Overall Encryption Solution’ in the 2022 – GlobeNewswire

WASHINGTON, Oct. 06, 2022 (GLOBE NEWSWIRE) -- Virtru, a global leader in data protection, has been selected as the winner of the Overall Encryption Solution of the Year'' award in the 2022 CyberSecurity Breakthrough Awards. The CyberSecurity Breakthrough Awards aim to perform the most comprehensive evaluation of cybersecurity companies and solutions on the market today.

Virtrus end-to-end encryption solutions span across Google Workspace, Google Cloud, Microsoft 365, and data flowing through SaaS apps like Salesforce and Zendesk. Virtrus easy-to-use data protection enables secure, compliant information sharing to unlock digital workflows and protect organizations most sensitive data at all times, even after it leaves their network. Virtru encryption holistically protects data of all kinds, wherever its stored and shared, with granular access controls, self-hosted key management options, data loss prevention, audit, and more.

The Virtru team is thrilled to be recognized for our versatile encryption solutions that help businesses work smarter and faster every day, said Virtru CEO John Ackerly. "Our end-to-end encryption technology safeguards essential data for more than 7,000 global organizations. By securing that vital data, we equip our customers to securely collaborate, innovate, and grow.

Judges for the CyberSecurity Breakthrough Awards are senior-level, experienced cybersecurity professionals, including journalists, analysts, and technology executives. Judges evaluated entrants based on product innovation, performance, ease of use and manageability, functionality, value, and impact.

About VirtruAt Virtru, we empower organizations to easily unlock the power of data while maintaining control everywhere its stored and shared. More than 7,000 global customers trust Virtru to power their Zero Trust strategies and safeguard their most sensitive data in accordance with the worlds strictest security standards. Creators of TDF (Trusted Data Format), the open industry standard for persistent data protection, Virtru provides encryption technology for data shared through email, collaboration tools, cloud environments, and enterprise SaaS applications. For more information, visit https://www.virtru.com or follow us on Twitter at @virtruprivacy.

Contact

Phil TortoraREQ on behalf of Virtruptortora@req.co

A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/28da3ffd-2b2f-4a28-a9e3-3c2a2d4e12a5

Go here to read the rest:
Virtru Named 'Best Overall Encryption Solution' in the 2022 - GlobeNewswire

Encrypted messaging app Signal might be next to have Stories-like feature – 9to5Mac

Snapchat certainly made photos and videos that disappear after 24 hours a popular feature. Instagram, TikTok, and many other platforms followed suit, and nowadays, Stories are everywhere. Now it seems that the popular encrypted messaging app Signal might be next to have a Stories-like feature.

The latest beta version of the Signal app, which was released this week, comes with Stories and they work the way you probably imagine. Stories let you create and share images, videos, and texts with your friends on Signal that will automatically disappear after 24 hours, said one of Signals developers in a blog post (via Engadget).

Reinforcing Signals commitment to end-to-end encryption, the developer says that the Stories feature also has the same technology in order to ensure users privacy. The app will provide options to let users decide who can see their Stories. It will also be possible to share Stories with a custom list of friends or with specific groups. Other people can see, react, and reply to a Story.

Stories are, of course, end-to-end encrypted, giving you a new way to communicate on Signal without compromising privacy. You are always fully in control of who you share your stories with.

You can share your stories with all of your Signal connections (Signal connections = your contacts + anyone youve had a 1:1 chat with), or with a custom list of friends, or with any of your Signal groups. When you share stories to groups, anyone else in that group can view, share, react, and reply to that group story.

But unlike platforms like Instagram, Signal will let users turn off Stories completely if theyre not a fan of the feature. Its worth noting that since this is a beta feature, only other users using the beta app will see Stories. There are no details on when the update will become available to the public.

Other social networks like Twitter have also tried to push their own Stories solution. However, in this case, Twitter later discontinued Fleets after confirming that the feature never had appeal among its users.

Read also:

FTC: We use income earning auto affiliate links. More.

Check out 9to5Mac on YouTube for more Apple news:

Read more from the original source:
Encrypted messaging app Signal might be next to have Stories-like feature - 9to5Mac

Nobel-winning quantum weirdness undergirds an emerging high-tech industry, promising better ways of encrypting communications and imaging your body -…

Unhackable communications devices, high-precision GPS and high-resolution medical imaging all have something in common. These technologies some under development and some already on the market all rely on the non-intuitive quantum phenomenon of entanglement.

Two quantum particles, like pairs of atoms or photons, can become entangled. That means a property of one particle is linked to a property of the other, and a change to one particle instantly affects the other particle, regardless of how far apart they are. This correlation is a key resource in quantum information technologies.

For the most part, quantum entanglement is still a subject of physics research, but its also a component of commercially available technologies, and it plays a starring role in the emerging quantum information processing industry.

The 2022 Nobel Prize in Physics recognized the profound legacy of Alain Aspect of France, John F. Clauser of the U.S. and Austrian Anton Zeilingers experimental work with quantum entanglement, which has personally touched me since the start of my graduate school career as a physicist. Anton Zeilinger was a mentor of my Ph.D. mentor, Paul Kwiat, which heavily influenced my dissertation on experimentally understanding decoherence in photonic entanglement.

Decoherence occurs when the environment interacts with a quantum object in this case a photon to knock it out of the quantum state of superposition. In superposition, a quantum object is isolated from the environment and exists in a strange blend of two opposite states at the same time, like a coin toss landing as both heads and tails. Superposition is necessary for two or more quantum objects to become entangled.

Quantum entanglement is a critical element of quantum information processing, and photonic entanglement of the type pioneered by the Nobel laureates is crucial for transmitting quantum information. Quantum entanglement can be used to build large-scale quantum communications networks.

Story continues

On a path toward long-distance quantum networks, Jian-Wei Pan, one of Zeilingers former students, and colleagues demonstrated entanglement distribution to two locations separated by 764 miles (1,203 km) on Earth via satellite transmission. However, direct transmission rates of quantum information are limited due to loss, meaning too many photons get absorbed by matter in transit so not enough reach the destination.

Entanglement is critical for solving this roadblock, through the nascent technology of quantum repeaters. An important milestone for early quantum repeaters, called entanglement swapping, was demonstrated by Zeilinger and colleagues in 1998. Entanglement swapping links one each of two pairs of entangled photons, thereby entangling the two initially independent photons, which can be far apart from each other.

Perhaps the most well known quantum communications application is Quantum Key Distribution (QKD), which allows someone to securely distribute encryption keys. If those keys are stored properly, they will be secure, even from future powerful, code-breaking quantum computers.

View post:
Nobel-winning quantum weirdness undergirds an emerging high-tech industry, promising better ways of encrypting communications and imaging your body -...