Page 1,556«..1020..1,5551,5561,5571,558..1,5701,580..»

Data backup, security alerts, and encryption viewed as top security … – Help Net Security

Half of U.S. businesses say that security is the most influential factor when buying software, according to Capterras Security Features Survey. In fact, 45% have stopped using a specific type of software due to security concerns. Businesses are willing to pay a premium for intuitive and well-designed secure software.

Digging further, businesses share the types of security features they consider to be must-haves. 76% cite data backups as a dealbreaker when choosing software. This can be expected as growing ransomware attacks make it critical for businesses to have data backups. The second most important security feature is the ability to receive security notifications (72%), followed by encryption in transit (68%) and at rest (67%).

Prompted by federal government mandates, the availability of a software bill of materials (SBOM) is emerging as a required security feature among businesses buying software. An SBOM is a list of the components used to build a software package and is meant to inform organizations of related security and compliance risks. Its cited by 55% of businesses as a must-have feature.

Businesses should continue to place a premium on security as a key differentiator when buying software, recommends Zach Capers, senior security analyst at Capterra. While organizations should focus on key features such as data backups, security notifications, and encryption, dont overlook lesser-known, but equally important, features such as the availability of an SBOM.

Organizations are also boosting security by focusing on robust authentication measures. While 59% of businesses still look for relatively insecure password authentication, 52% want software tokens (e.g., DUO, Google Authenticator), 40% pursue hardware tokens (e.g., USB key), and 39% look for biometrics, all of which are much stronger than passwords. More intriguingly, a third are interested in passwordless authentication.

Businesses look for security certifications and attestations provided by software vendors to see how the tools theyre buying adhere to specific protections. According to 59% of businesses, a Cloud Security Alliance certification makes the software more appealing, followed by 47% that are interested in the Cybersecurity Maturity Model Certification (CMMC).

Security is a critical factor for most companies when buying software, but its essential to know which features to focus on that make a product fit business needs.

More here:
Data backup, security alerts, and encryption viewed as top security ... - Help Net Security

Read More..

[E-book] Encrypted Traffic Visibility For Modern Networks – The Fast Mode

This special edition e-book features the views of 25 leading IP networking solution vendors on the benefits and impact of encryption, and the approaches for addressing visibility loss from emerging encryption protocols.

Over the last decade, there has been a sharp growth in the use of encryption, driven by the need for user and data privacy, increasing concerns over cyberattacks such as breaches and ransomware, and the overall ease of implementing encryption technologies. In March 2023, 93% of pages loaded on a Chrome browser on Windows were encrypted, according to Googles Transparency Report. Seven years ago, this figure was only 39%.

At the same time, advancements in encryption methodologies have led to stronger and more secure encryption protocols, such as TLS 1.3, ECH and QUIC. As these protocols evolve, we expect to see technologies such as post-quantum cryptography and homomorphic encryption emerge, which will lead to encrypted traffic being nearly impossible to decipher or crack.

These two trends in combination pose an enormous challenge to network operators as they can no longer inspect or analyze encrypted traffic using traditional network visibility tools, resulting in the inability to identify and classify the traffic traversing their networks.

This visibility gap leads to the inability to correctly execute network policies, route and optimize traffic, detect threats, generate insights and analytics, troubleshoot network issues and more. As a result, network costs increase, user experience takes a hit and ironically, network security deteriorates.

To address this lack of visibility, operators and enterprises are adopting a number of technologies, including SSL / TLS inspection, behavioral / statistical / heuristic analysis, machine learning and deep learning.

The Fast Mode spoke to 25 leading IP networking solution vendors that offer policy control, traffic management, network security, analytics and network performance management solutions, on their thoughts on:

Vendors featured in the e-book include:

Get your free copy today by filling in the download form to the right.

3d ago / Telecom White Papers / By Ray Sharma

Read more:
[E-book] Encrypted Traffic Visibility For Modern Networks - The Fast Mode

Read More..

Zama Selected as Finalist for RSA Conference 2023 Innovation … – PR Newswire

French Startup is Recognized for Groundbreaking Work on Homomorphic Encryption

PARIS, March 23, 2023 /PRNewswire/ --Zama has been named one of 10 finalists for the RSA Conference 2023 Innovation Sandbox contest for its work on Fully Homomorphic Encryption (FHE). Zama will present its technology and solution to a panel of renowned industry judges and a live in-person audience on Monday, April 24 at RSA Conference 2023 in San Francisco.

Since 2005, the RSAC Innovation Sandboxhas served as a platform for the most promising young cybersecurity companies to showcase their groundbreaking technologies and compete for the title of "Most Innovative Startup." The competition is widely recognized as a catapult for success and the top 10 finalists have collectively celebrated 75 acquisitions and received $12.5 billion in investments over the last 18 years. Zama will have three minutes to pitch the panel of judges before a question-and-answer round.

"The RSA Conference Innovation Sandbox contest is one of the most exciting highlights of the week as we get to watch 10 of the cybersecurity industry's best and brightest up and coming stars shine on stage with provocative and cutting-edge ideas," said Linda Gray Martin, Senior Vice President, RSA Conference. "The demanding challenges and threats we face are only getting more complex in both size and severity and we need smart, determined and skilled individuals and companies to make an impact and help tackle what lies ahead."

Zama is a cryptography company building open-source homomorphic encryption tools for developers, enabling them to build solutions that keep data private. FHE enables processing data without decrypting it; this means companies and organizations can offer their services without seeing their users' data and users will never notice a difference in functionality. With data encrypted both while in transit and during processing, everything we do online could now be encrypted end-to-end.

Dr Pascal Paillier, Chief Technology Officer at Zama said: "The amount of private data we generate increases every day, and with it the risk of data breaches and surveillance. Privacy is not about data ownership or security, it's about being able to selectively disclose what we want, to whom we want. Zama makes protecting privacy easy, creating tools that can be used even by someone who is not a cryptographer."

The RSAC Innovation Sandbox contest kicks off at 12:00 p.m. PT on April 24 and winners will be announced at 3:00 p.m. the same day. The panel of renowned expert judges includes Niloofar Howe, Sr. Operating Partner at Energy Impact Partners; Paul Kocher, Independent Researcher; Shlomo Kramer, Co-founder and CEO, Cato Networks; Barmak Meftah, Co-Founder & General Partner at Ballistic Ventures; and Christopher Young, Executive Vice President of Business Development Strategy and Ventures at Microsoft. Hugh Thompson, Program Committee Chair of RSA Conference, will return to host the contest.

For more information regarding RSA Conference 2023, taking place at the Moscone Center in San Francisco from April 24-27, please visit https://www.rsaconference.com/usa.

About Zama

Zama is a cryptography company building open-source homomorphic encryption tools for developers. Their technology enables a broad range of privacy-preserving use cases, from confidential smart contracts to encrypted machine learning and privacy-preserving cloud applications. Zama was founded by Pascal Paillier and Rand Hindi, and has more than 60 researchers and engineers in its team from a broad range of backgrounds.

About RSA Conference

RSA Conference is the premier series of global events and year-round learning for the cybersecurity community. RSAC is where the security industry converges to discuss current and future topics and gain access to the experts, unbiased content and ideas that enable individuals and companies to advance their cybersecurity posture and build stronger and smarter teams. Both in-person and online, RSAC brings the cybersecurity industry together and empowers the collective "we" to stand against cyberthreats around the world. RSAC is the ultimate marketplace for the latest technologies and hands-on educational opportunities that help industry professionals discover how to make their companies more secure while showcasing the most enterprising, influential and thought-provoking visionaries and leaders in cybersecurity today. For the most up-to-date news pertaining to the cybersecurity industry, visit http://www.rsaconference.com. Where the world talks security.

Media Contact:

Fabiana Forni

[emailprotected]

Logo - https://mma.prnewswire.com/media/2039130/3952824/Zama_Logo.jpg

SOURCE Zama

Visit link:
Zama Selected as Finalist for RSA Conference 2023 Innovation ... - PR Newswire

Read More..

A 2023 Guide to Secure Cloud Deployment for Improved Application … – Infosecurity Magazine

Authentication/authorization, data integrity and storage protection; these three pillars correspond to the current majorchallenges in application securityand are essential to ensure the confidentiality, integrity and availability of data stored in the cloud.

Through the strategies and best practices outlined in this guide, organizations can safeguard their cloud deployments against potential security breaches and protect their applications from unauthorized access and data theft.

Cloud deployment of applications introduces unique challenges to security since the infrastructure is shared among multiple tenants and accessible over the internet.

Moreover,applications are the weakest security link, so it is crucial to establish strict controls over who can access the system and how they access it. This is where identity and access management (IAM) comes in, as it allows you to manage user identities, control access to resources and enforce security policies across the entire infrastructure.

The following are some best practices to follow:

In any case, IAM cannot be viewed as a standalone security measure, as it needs to be integrated with other enterprise security processes to be effective.

For one, IAM can beintegrated with security information and event management(SIEM) systems to provide real-time monitoring and alerting of security events across the entire infrastructure. This helps identify and respond to potential security incidents before they can cause harm.

According toa report released last yearby Tripwire, 44% of organizations reported their biggest application security concern as protecting data. One of the ways breaches happen in application security is through data leakage, which can happen in a number of ways.

For example, an attacker could access the API endpoint and extract sensitive information. Alternatively, an attacker could intercept network traffic and capture sensitive data in transit.

Cloud deployments are often subject to constant change, with new services and APIs being frequently added or modified. This can make it difficult to maintain security controls and ensure all APIs are properly secured. In 2022,a report by Salt identified a 117% risein malicious API traffic over the previous year.

In addition, regarding data integrity,according to IBM, WS-Security can protect against tampering or unauthorized modification of SOAP messages transmitted between web service providers and consumers. It achieves this through digital signatures, which are created using cryptographic algorithms that ensure the authenticity and integrity of the message.

There are various ways of protecting data storage platforms.

To start with,by using homomorphic encryption, cloud applications can ensure that sensitive data is protected at all times, including when it is being processed or analyzed in the cloud.

As such, it helps to reduce the risk of data breaches and other security incidents that can occur when sensitive data is stored in the cloud. This is because homomorphic encryption allows computations to be performed on the encrypted data without revealing the underlying plaintext, which prevents tampering with the data.

In addition, when it comes to cloud deployments, secure enclaves protect the storage of critical data, such as encryption keys, digital certificates and other sensitive information that unauthorized users can access and manipulate. Notably,Apples latest devices use secure enclavesintegrated into their system on chips (SoCs).

By isolating the storage and execution of such data and operations within a secure enclave, the risk of exposure to external threats is significantly reduced, making it much harder for attackers to access and compromise the data.

Secure cloud deployment is critical to protect applications and data stored in the cloud. By following the best practices outlined in this guide, businesses can mitigate security risks and safeguard against threats such as data breaches, unauthorized access and cyber-attacks.

See the rest here:
A 2023 Guide to Secure Cloud Deployment for Improved Application ... - Infosecurity Magazine

Read More..

Getting Ahead of the Ransomware Epidemic: CISAs Pre … – CISA

Over the past several years, ransomware attacks have caused extraordinary harm to American organizations: schools forced to close, hospitals required to divert patients, companies across all sectors facing operational disruption and expending untold sums on mitigation and recovery. At CISA, we are working with partners to take every possible step to reduce the prevalence and impact of ransomware attacks. We recently announced an important initiative to help organizations more quickly fix vulnerabilities that are targeted by ransomware actors. Today, were excited to announce a related effort that is already showing impact in actually reducing the harm from ransomware intrusions: our Pre-Ransomware Notification Initiative. Like our work to reduce the prevalence of vulnerabilities, this effort is coordinated as part of our interagency Joint Ransomware Task Force.

Report Ransomware

We urge organizations to report observed activity, including ransomware indicators of compromise and tactics, techniques, and procedures, to CISA or our federal law enforcement partners. You can find information on reporting at stopransomware.gov.

We know that ransomware actors often take some time after gaining initial access to a target before encrypting or stealing information, a window of time that often lasts from hours to days. This window gives us time to warn organizations that ransomware actors have gained initial access to their networks. These early warnings can enable victims to safely evict the ransomware actors from their networks before the actors have a chance to encrypt and hold critical data and systems at ransom. Early warning notifications can significantly reduce potential loss of data, impact on operations, financial ramifications, and other detrimental consequences of ransomware deployment.

This remarkable effort relies on two key elements. First, our Joint Cyber Defense Collaborative (JCDC) gets tips from the cybersecurity research community, infrastructure providers, and cyber threat intelligence companies about potential early-stage ransomware activity. Without these tips, there are no notifications! Any organization or individual with information about early-stage ransomware activity is urged to contact us at Report@cisa.dhs.gov. Once we receive a notification, our field personnel across the country get to work notifying the victim organization and providing specific mitigation guidance. Where a tip relates to a company outside of the United States, we work with our international CERT partners to enable a timely notification.

Although were in the early days, were already seeing material results: since the start of 2023, weve notified over 60 entities across the energy, healthcare, water/wastewater, education, and other sectors about potential pre-ransomware intrusions, and weve confirmed that many of them identified and remediated the intrusion before encryption or exfiltration occurred.

In cases where ransomware actors have already encrypted a network and are holding data and systems for ransom, JCDC works closely with the victim organizations to provide threat actor tactics, techniques, and procedures (TTPs) as well as guidance to help reduce the impact of an attack. For example, we have provided information to help identify the data that may have been exfiltrated from an affected entitys network as well as details of the intrusion to support investigative and remediation efforts. JCDC also works with the cybersecurity research community and others to develop cybersecurity advisories on ransomware actors and variants to enable improved network defense at scale as part of our ongoing #StopRansomware campaign.

Continuing to enhance our collective cyber defense is contingent upon persistent collaboration and information sharing between partners across government and the private sector. To enable the broader cyber community to benefit from valuable threat intelligence, we urge organizations to report observed activity, including ransomware indicators of compromise and TTPs, to CISA or our federal law enforcement partners, including the FBI and the U.S. Secret Service. You can find information on ransomware reporting and view additional resources to manage ransomware risk at stopransomware.gov.

JCDC is a public-private cybersecurity collaborative that leverages new authorities granted by Congress in the 2021 National Defense Authorization Act to unite the global cyber community in the collective defense of cyberspace. CISA welcomes all critical infrastructure organizations and entities with cybersecurity expertise and visibility to participate in our collaboration efforts. If your organization is interested in participating in collaborative efforts to stop ransomware, please visit cisa.gov/JCDC-FAQs or email cisa.jcdc@cisa.dhs.gov.

Here is the original post:
Getting Ahead of the Ransomware Epidemic: CISAs Pre ... - CISA

Read More..

Now you can link 4 accounts on WhatsApp & use it even when you’re offline, easily discover common groups w – The Economic Times

Meta-owned WhatsApp is often working on new updates to roll out to make user experience on the platform smoother and secure. While WhatsApp rolled out the feature to link your account on more than one device ages ago, a new update makes it possible for users to stay connected to their WhatsApp account on four different devices and one smartphone simultaneously. The instant-messaging platform will now allow users to link their WhatsApp account on four devices and a phone, making it easier to stay connected on web and desktop.

All your personal messages, media, calls will stay secure with end-to-end encryption that will work on all your linked devices. "Your personal messages, media, and calls are end-to-end encrypted. Each linked device connects to WhatsApp independently while maintaining the same level of privacy and security through end-to-end encryption that people who use WhatsApp have come to expect," WhatsApp said.

If you do not know where all you have linked your WhatsApp on, then go to your WhatsApp Settings, click on Linked Devices and then review all the devices where you have linked your WhatsApp account. In case you want to remove an account, click on the device mentioned in the list and tap on 'Log Out' option.

The new features related to Group which will start rolling out on WhatsApp globally over the coming weeks.

Read the original post:
Now you can link 4 accounts on WhatsApp & use it even when you're offline, easily discover common groups w - The Economic Times

Read More..

How to Deal with Security Vulnerabilities – PIA VPN – Privacy News Online

Security breaches have become increasingly common, with businesses and individuals alike falling victim to cybercriminals. In 2022, there were 1802 data compromises in the US, affecting 422 million individuals through data breaches, leakage, and exposure, all resulting in unauthorized access to sensitive data by threat actors.

Third-party audits have revealed that many of these breaches are the result of common security vulnerabilities that could have been prevented with proper security controls and testing. These vulnerabilities include outdated software, weak passwords, and misconfigured servers, among others.

With so much of our sensitive data being stored and transmitted online, its crucial to follow proper cyber hygiene to minimize the risk of data breaches and cyber attacks.

In this article, well explore some practical tips for dealing with security exploits and vulnerabilities, as well as ways to verify that the services and apps we use are secure.

A security vulnerability refers to a software or system flaw that attackers can exploit for various reasons to gain unauthorized access, disrupt operations, steal data, or inflict other forms of harm. These vulnerabilities can occur at any level of a system, from the operating system and network protocols to individual applications.

Exploits are attacks that take advantage of security vulnerabilities to gain unauthorized access or perform other malicious actions. An exploit is a specific technique or method that an attacker uses to take advantage of a vulnerability.

Exploits can be created for known vulnerabilities, but they can also be zero-day exploits, which are exploits that take advantage of vulnerabilities that are not yet known to the vendor or the public. Zero-day exploits are particularly dangerous because there is no patch or fix available to prevent the attack.

Some of the most dangerous vulnerabilities in companies and organizations that operate in the US include:

Overall, security vulnerabilities represent a significant menace to individuals, organizations, and society at large. It is vital to keep an eye out for possible vulnerabilities and to take proactive measures to prevent their exploitation.

The known vulnerabilities catalog is a comprehensive database with all the known flaws of various software and hardware products. It serves as a critical tool for cybersecurity professionals because it helps them identify, assess, and mitigate vulnerabilities in their organizations.

By referencing the catalog, cybersecurity professionals can identify potential security weaknesses in their organizations software and hardware products.

The catalog is developed and maintained by the Cybersecurity and Infrastructure Security Agency (CISA), a government agency responsible for safeguarding the nations critical infrastructure against cyber threats.

It provides details such as vulnerability descriptions, CVSS scores, and the impact of the vulnerabilities. Finally, the catalog is updated as new vulnerabilities are discovered.

Organizations can utilize third-party audits to identify security vulnerabilities in their systems. Some of the most common security vulnerabilities found by third-party audits include:

Regarding VPN audits, some of the most common security vulnerabilities found by third-party audits include:

Overall, it is important for organizations to conduct regular third-party audits to identify and mitigate security vulnerabilities and to ensure that their systems and applications are secure.

Security vulnerabilities can be spotted through a variety of methods.

Penetration testing, which involves hiring ethical hackers to try and exploit vulnerabilities in a system is one of the best ways to spot security flaws. The results of the testing can reveal any weaknesses in the system.

Vulnerability scanning relies on software to check the system for known vulnerabilities, but its not always as reliable as an expert, so its often used in conjunction with pen testing.

Next up we have code reviews, which just means examining the source code of a system to identify any potential vulnerabilities that could be exploited. This can help identify areas of the system that need to be hardened to prevent attacks.

Bug bounty programs are incentivized programs that reward researchers for finding and reporting security vulnerabilities in a system.

User reports can also report security vulnerabilities they come across while using a system. This can be done through support channels or dedicated security reporting mechanisms.

In general, a combination of these methods is often used to ensure that vulnerabilities are identified and addressed before they can be exploited by attackers.

Disclosure of cybersecurity vulnerabilities is a complex issue and requires a careful consideration of various factors. Here are some general guidelines on when security vulnerabilities should be disclosed:

In general, disclosure of cybersecurity vulnerabilities can help improve the security of the affected software or system, but it should be done in a responsible and coordinated manner to avoid exposing users to unnecessary risks.

Yes, Private Internet Access (PIA) has undergone a third-party audit by Deloitte, one of the Big Four accounting firms. The audit was conducted in 2022 and included a review of PIAs infrastructure, policies, and procedures.

Deloittes audit found that PIAs security controls were suitably designed and implemented to protect user data and maintain the confidentiality, integrity, and availability of its services. The audit also found that PIA had implemented appropriate measures to prevent unauthorized access to user data, such as multi-factor authentication and strong encryption.

Overall, the audit by Deloitte demonstrates our commitment to transparency and accountability of our security practices.

Here are some reasons why a security audit is crucial for a VPN, and for service that handles personal information, for that matter:

A security audit can demonstrate to customers that the service provider takes security seriously and has implemented appropriate security measures to protect their personal information. This can help build trust and confidence in the service.

Security vulnerabilities are a serious threat to individuals, businesses, and society as a whole. With the increasing number of data breaches and cyber attacks, it is crucial to identify and address security vulnerabilities to prevent them from being exploited by attackers.

Using strong passwords, updating software regularly, properly configuring servers, and conducting regular security audits are best practices for cyber hygiene.

Always use services from reputable vendors who prioritize security and are transparent about their security practices. Regular security audits and compliance with industry standards, such as ISO 27001, can also provide assurance that a service provider is committed to security best practices.

A security vulnerability refers to a weakness or flaw in a computer network, application, or system that can be utilized by attackers to gain access without authorization, steal confidential information, or cause damage.

Vulnerabilities may arise due to various factors such as software code errors, incorrect configurations, or inadequate security practices.

There are several factors that can cause security vulnerabilities, including:

Programming errors or bugs in software code Misconfigured or poorly secured systems Failure to apply software patches or updates Human error or negligence Malicious software, such as viruses or malware Weak or easily guessable passwords Lack of security awareness and training

Security vulnerabilities can come in many different forms and their prevalence may depend on the specific situation. Some examples of commonly occurring security vulnerabilities include:

Cross-site scripting (XSS) SQL injection Misconfigured or unsecured servers Insecure passwords or authentication mechanisms Buffer overflows Missing security patches or updates

Managing security vulnerabilities involves a proactive approach to identify, prioritize, and address vulnerabilities in a timely and effective manner.

There are several recommended best practices for managing security vulnerabilities, such as conducting regular vulnerability assessments,penetration testing and monitoring system logs and network traffic for any signs of suspicious activity.

Yes, PIA has undergone a security audit by Deloitte, which reviewed its infrastructure, policies, and procedures to ensure compliance with industry standards for security and privacy.

Deloittes report found that PIAs security controls were appropriately designed and implemented, and that it had measures in place to prevent unauthorized access to user data.

This independent audit demonstrates PIAs commitment to transparency and accountability in its security practices, and its dedication to protecting user privacy and security online.

Read the original post:
How to Deal with Security Vulnerabilities - PIA VPN - Privacy News Online

Read More..

Violation of norms on unsolicited commercial communication led to 32,032 disconnections in 2022: Ashwini V – The Economic Times

Telecom operators disconnected 15,382 and 32,032 connections during 2021 and 2022, respectively over violation of regulations, meant to curb Unsolicited Commercial Communication or pesky marketing calls and messages, Parliament was informed on Friday. Till date, TRAI has imposed financial disincentives of Rs 34.9 crore on the access service providers for failing to curb unsolicited commercial communications in their networks from Registered Telemarketers, Telecom Minister Ashwini Vaishnaw said in a written reply in Rajya Sabha. Telecom Regulatory Authority of India (TRAI) has issued Telecom Commercial Communication Customer Preference Regulation - 2018 to curb the Unsolicited Commercial Communication (UCC).

"The Access Service Providers have disconnected 15,382 and 32,032 connections during the calendar year - 2021 and 2022, respectively for violating TCCCPR-2018," Vaishnaw said.

To a separate question in Rajya Sabha, on whether 5G technology increases the risk of hacking due to lack of encryption during the connection process, making such devices easy targets for cyber-attacks, Chauhan replied in negative.

Also, as per the license conditions, the licensee is completely responsible for the security of its network, Chauhan added.

"BSNL sold one land of area 1.48 acres to Directorate General of Lighthouses and Lightships in Goa. Further, BSNL has leased out two properties that is a land of area 0.56 acres in Patna to Gas Authority of India Ltd (GAIL) and a land of area 24.29 acres at Gopalpur, West Bengal to Rail Vikas Nigam Limited (RVNL). MTNL has not sold or leased out any property till date," Chauhan said.

Continue reading here:
Violation of norms on unsolicited commercial communication led to 32,032 disconnections in 2022: Ashwini V - The Economic Times

Read More..

Fog Data Science and Law Enforcement Are Buying Your Data: What Can You Do? – MUO – MakeUseOf

When government agencies violate the law they are meant to uphold, this raises serious concerns about the safety of the people they are supposed to protect. This is the case with Fog Data Science and its data-selling business with law enforcement agencies.

Some people might be tracking you and making money off of your location data. More interestingly, government agencies are in on it. What is Fog Data Science, how are they violating your privacy, and how can you stop them?

Fog Data Science (FDS) is a US-based organization that buys the location data of Americans and sells this information to law enforcement agencies at all levels. As people go about their daily businesses, the various applications on their smartphones and other mobile devices collect geolocation data. Fog Data Science retrieves this data and sells it to interested parties without the consent or permission of the owners.

Mobile technology applications have geolocation trackers that can identify users locations. These applications leverage geofencing to generate real-time data about your whereabouts. Such information is usually available to data brokers and advertising companies who want to tailor their marketing campaigns to people based on their locations. This explains why you receive promotions about goods and services in your area.

But the dynamics are different with Fog Data Science. The company doesnt retrieve users geolocation data for marketing or advertising purposes, but to sell it to law enforcement agencies, US intelligence bodies, and corporate security departments who use it for their work. These organizations use the data they collect from FDS to conduct investigations and solve criminal cases.

Documents published by the Electronic Frontier Foundation (EFF) reveal that Fog Data Science has access to billions of user data points they retrieve from millions of active devices in the US. The company has a data-processing system that collects 15 billion location signals of 250 million devices daily. It uses a series of technology devices to organize, analyze and validate the data for meaningful interpretations and then offer it to law enforcement agencies at a subscription fee.

Ever since the activities of Fog Data Science's services came to light, there have been conversations about their legal and ethical implications. The Privacy Act of 1974 upholds the confidentiality of U.S. citizens' data. It prohibits government agencies from sharing people's data without their consent. Law enforcement using data collected without users content raises concerns about privacy violations.

According to the Fourth Amendment of the United States Constitution, law enforcement officers dont have the right to search people indiscriminately or seize their property without a warrant, especially when such activities violate the individuals reasonable expectation of privacy.

The Fourth Amendment was enacted before the advent of digital technology. With digital technology being a major player in how people generate and share data nowadays, there are questions about how the Fourth Amendment applies to it.

During the Riley versus California case in 2014, the Supreme Court while interpreting the Fourth Amendment stated that the search-incident-to-arrest did not apply to people's cell phones. In a traditional search-incident-to-arrest situation, law enforcement personnel dont need a warrant to search items on a person they are arresting. And thats because these officers need to protect themselves. Part of doing that is to ascertain that the person they are arresting doesnt have any weapons or harmful objects they could use to harm them.

But the search-incident-to-arrest doesnt apply to cell phones and other digital devices because any information on these devices doesn't pose any harm to law enforcement officers during an arrest. So, they have no right to check people's devices during arrests without a warrant.

During the Carpenter versus United States case in 2018, the Supreme Court established that law enforcement had no right to track or retrieve users location data on their digital devices from their network providers or any other parties without a warrant. Doing that violates people's privacy because the places they visit are a part of their personal lives.

Some law enforcement agencies who patronize Fog Data Science argue that they obtain a warrant before accessing people's location data on their mobile devices. But the Fourth Amendment kicks against any general and non-specific search covering multiple people in a particular area to retrieve their location data. Even when law enforcement has a warrant, such a warrant is void because it violates the privacy of the people in that location.

From the courts' standing, its clear that the activities of Fog Data Science and the law enforcement agencies who use their services are suspect.

If you are a resident in the US, theres no particular way for you to know if Fog Data Science is retrieving your data and selling it to law enforcement, especially as they dont ask you for your data directly. Nonetheless, there are measures you can take to stop your phone from being tracked and prevent Fog Data Science from accessing your location data.

Fog Data Science collects user data from third-party applications on mobile devices, especially smartphones. The more applications you use on your device, the more you allow them to collect your data.

Apps can enhance the user experience, so maybe you don't want to stop using them completely. However, you can minimize app usage by installing only the ones you really need and deleting non-active ones. For every non-active app you delete, you close a window a third party could use to retrieve your data.

Location-based services refer to digital platforms that use people's real-time location data to render various kinds of services. They operate on the Global Positioning System (GPS), a satellite-based technology that transmits signals to identify the location of people and things. When you activate location-based services, you give the service providers the right to track your location. And in turn, they could sell your location data to companies like Fog Data Science. Turning off these services restricts them from collecting your data.

Mobile applications have ad trackers that trail your online interactions to serve you custom ads. You may have noticed that, when you look for certain information or item on search engines, you begin to receive adverts about it shortly after. The same thing happens when you engage with a particular post on social media.

The activities of Fog Data Science have shown that ad trackers dont use the data they collect for only advertising purposes. These agencies avail your data to the likes of Fog Data Science who process and sell it to law enforcement. You can stop advertisers from tracking you by disabling ad-tracking on your smartphone and other mobile devices to deny them access to your data.

Despite the privacy regulations in place to stop the collection and use of people's data without their consent, some people and organizations still do it illegitimately. Instead of completely relying on the authorities to secure your data, secure it by utilizing the controls on your devices.

Check your mobile devices regularly to ensure that you activate the right privacy settings. Always turn off strange or suspicious controls to be on the safer side.

The rest is here:

Fog Data Science and Law Enforcement Are Buying Your Data: What Can You Do? - MUO - MakeUseOf

Read More..

Best Data Science Courses And Colleges In The US – CEOWORLD magazine

Data Science is a multidisciplinary approach to analyzing a large amount of data. It is the study of insights into an organization or body with the help of mathematics, statistics, specialized programming, advanced analytics, artificial intelligence (AI), machine learning, etc. Data Science is greatly in demand these days; its a high-paying job with an abundance of positions due to the less availability of skilled persons. As its a versatile job, people often seek data science courses from good universities for better opportunities. Here are some of the best colleges of Data Science in the US.

University of California, BerkeleyThis University is among the most reputed universities and ranked 20 among national universities. The tuition fees of this Institution for data science courses are $43,980 and $14,226 for out-of-state and in-state students, respectively. A total of 31,143 students enrolled in the 2021 fall in its undergraduate course. It doesnt require standardized tests, for example, SAT or ACT. It also does not require any separate application form for international students. The average alumni starting salary at this Institution is $66,800.This University offers both a Major and Minor program. The major requires the applicant to achieve a minimum prerequisite grade point average (GPA), whereas the UC Berkeley minor program provides practical data science knowledge. Berkeley gives access to students its Art Museum and Pacific film archive. Another attraction is the stadium. UC Berkeley has recently renovated its historic stadium.

Massachusetts Institute of TechnologyThis private institute, founded in 1861, ranks 2nd among the National universities; the Statistics and Data Science center were created in 2015, though. The fees for this Institution are $40,960 and $14,570 for out-of-state and in-state students, respectively. Common applications are gladly accepted at this University. No standardized tests like SAT and ACT are required. The application fee is $70. The average Alumnis starting salary at this University is estimated at $48,600.This Institution offers students opportunities for higher studies. It provides a minor to a Ph.D. in Data science. Activities like Ring events, brass Rat, and Smoots of MIT have always been very famous. Besides, MIT offers several opportunities to perform Art, for example Musical Theatre guild, Resonance, Shakespeare Ensemble, etc. LMC of MIT provides a venue for artists to play on campus.

Georgia Institute of TechnologyGeorgia Institute of Technology is a public university that ranks 44 among the national universities. Founded in 1885, its one of the oldest universities. A total 17,447 number of students have enrolled in the undergraduate program of 2021. Tuition fees for this Institution are $32,876 and $11,764 for out-of-state and in-state students, respectively. At the same time, the application fee is $75.This University requires standardized tests, either SAT or ACT. The average alumni starting salary at this Institution is $70,700. Its also open to International students. More than 130 majors and minors are available. The college also has Intramural teams and club sports.

Carnegie Mellon UniversityThis Institution was founded in 1900 and ranks 22nd among national universities. Its a private University. The fee of this Institution for the data science course is $61,344. The average Alumnis starting salary at this Institution is $74,600, and common applications are accepted. No standardized tests like SAT or ACT are required. This Institution offers both majors and minors. Its especially known for its faculty and small class sizes. The University provides an exclusive campus and has several summer programs. It has clubs and organizations for students and offers service and civic engagement.

Stanford UniversityThis University ranks 3rd among National universities. The average Alumnis starting salary at this Institution is $73,900. This is a private University that charges $56,169 as its tuition fees. The application fee for the required course is $90. Neither SAT nor ACT is required. For international students, no separate application form is required. This Institution prepares students for career placement following degree completion. It also allows students to complete their courses in a shorter period. Students enjoy concerts in fall, winter, and spring. Also, they can get free membership to Cantor arts center. Stanford is very famous for its wide range of finest performances.

References: The data is taken from the respective official websites.

Have you read?Why Employers Should Grant More Flexibility to Increase Quality of Work by Joe Mull.Becoming an Expert Trust Builder by Larry Jacobson.How your money story impacts the way you treat your finances by Clare Wood.The Human Factor: The Post Covid Era of Leadership & Employee Loyalty by Deepak Ohri.THE ROLE OF MINDFULNESS AND HOW IT PREVENTS BURNOUT by Melo Calarco.

See the rest here:

Best Data Science Courses And Colleges In The US - CEOWORLD magazine

Read More..