Page 1,746«..1020..1,7451,7461,7471,748..1,7601,770..»

How is NFT different from cryptocurrency and fiat currencies – The Financial Express

The value of NFTs revolves around the nonfungible nature of digital assets which is the feature that sets them apart from cryptocurrencies, as NFTs and cryptocurrencies are not the same things. NFT has its own unique set of attributes including creator, size, and scarcity, among others, and therefore can not be interchanged with another asset. Bitcoin (BTC) is a fungible asset, on the other hand. The French startup Sorare, which sells NFTs of football trading cards, has raised $680 million (498 million), as reported by Cointelegraph.

What are NFTs used for?

Art

Programmable art, which uniquely combines creativity and technology, is the most common NFT crypto application. There are currently a number of limited edition works of art in existence. Surprisingly, they make it possible for programmability to alter behaviour in many circumstances. For instance, using oracles and smart contracts, designers may produce artwork that responds to changes in the value of digital assets based on blockchain technology.

Fashion

Blockchain has seamlessly merged into the world of fashion with the promise of advantages for all supply chain participants. The risk of counterfeiting is eliminated since consumers can easily check the ownership information of their goods and accessories online. Users might, for instance, just scan an NFT QR code on a price tag for clothing or accessories.

Gaming

In 2017, CryptoKitties was the first company to release virtual cats on the blockchain and allow users to communicate and conduct transactions with them. The model was so effective that it briefly overloaded the Ethereum network with a large number of transactions.

Sports

The counterfeiting of goods and tickets is among the most important issues affecting the sports sector. Blockchain is the best option for efficiently addressing such issues. The immutability of blockchain technology helps to prohibit the sale of fake tickets and memorabilia.

Continued here:
How is NFT different from cryptocurrency and fiat currencies - The Financial Express

Read More..

It’s Not Just Ring. Google, SimpliSafe, and Others Could Share Video Footage With Police Without Consent. – Consumer Reports

A SimpliSafe spokeswoman, Amy Nagy, said: In our privacy policy we do reserve the right to share customer videos with law enforcement in times of extreme emergencies. Having this in our privacy policy does not change our practice of not sharing this data with law enforcement unless required to do so by law, or with user consent in most cases.

Googles policies similarly allow it to share video with law enforcement where there is user consent or a legal order, while D-Links and TP-Links policies will do so under legal orders. (Their documentation doesnt mention user consent.)

Nobody is telling Amazon, Google, Eufy, and others that theyre required to share user video with law enforcement, said Anna Bonesteel, strategic response manager for the privacy advocacy group Fight for the Future. The federal law cited by Google states that companies may disclose customer records without permission. It doesnt say they must.

But these companies are giving up private video to the police anywaywithout a warrant, without permission, and without notification," she added. Amazon Ring created the market for these every-household surveillance devices, so they arguably deserve the most blame for establishing industry-standard policies that circumvent our individual rights.

Greg Nojeim, senior counsel at the Center for Democracy and Technology, said the emergency exception outlined by ECPA isnt necessarily a bad thing, because there are noncriminal emergencies that could benefit from these disclosures.

Asked to describe a real-life scenario where these disclosures can be helpful, Nojeim said to imagine its 2 am and an elderly grandmother has wandered off. Her daughter calls the police, who want to check the homes security cameras to know when she might have left and which direction she headed. Theres no suspicion of crime, so it is not possible to get a warrant, and the camera account owner, the daughters husband, is out of town and cant be reached. In this case, the police would contact the camera maker, describe the emergency, and get disclosure of the footage under the emergency exception.

The trick is for providers to get it right and make sure the emergency exception in ECPA isnt being abused by law enforcement and used to circumvent the warrant requirements, Nojeim said.

Read the original here:
It's Not Just Ring. Google, SimpliSafe, and Others Could Share Video Footage With Police Without Consent. - Consumer Reports

Read More..

Get a grip on the biggest data challenges, and the technologies that will solve them – The Register

Sponsored Post Modern business has an unquenchable thirst for data infrastructure, whether it's to feed AI and advanced analytics, enable cloud-storage, or support decentralized workforces.

This has driven a stream of innovations in data storage, and its application in the data center, such as ultra-high performance all-flash hot-tiers, large scale object storage, and innovative software defined solutions.

So how do you ensure that you're keeping abreast of the latest storage techniques and the disruptive advances in technology that are enabling them? And how do you work out which of them are the best fit for your own operation now and in the future?

By joining the third annual Open Storage Summit, that's how. Supermicro will bring together data specialists, and data center application professionals, as well as partners including Intel, Nvidia, Nutanix, AMD and Kioxia, in a series of sessions from August 17 to September 7.

Proceedings kick off on August 17 at 6pm, with a roundtable keynote session to set the scene. Subsequent spotlight sessions will take you deep into key storage challenges and highlight the technologies and techniques to solve them.

These include hyperconverged infrastructure, on August 23, and scale out storage for enterprise for enterprise applications on August 25. On August 30, you can take a deep dive into Redis Enterprise Cluster for Real Time Applications.

Supermicro and friends will dive into HPC parallel file systems for GPU workloads on September 1, while the series wraps up with a look at open-source storage technology for the masses on September 7.

To sign up, all you need to do is head here and register. You'll be heading into autumn better informed about the storage landscape now and in the future. And that could make all the difference to own organization's prospects.

Sponsored by Supermicro.

See original here:
Get a grip on the biggest data challenges, and the technologies that will solve them - The Register

Read More..

Utilising Technology To Help Improve The Education Industry – MinuteHack

Today, the education industry is growing rapidly in terms of both student enrollment and job opportunities. Recent statistics show that the global education market will be worth $2.19 trillion by 2021, with projected annual growth rates of 5% for the next five years. The demand for well-educated workers is increasing across all industries.

As such, several companies have begun utilising technology to streamline processes and improve customer experiences related to education. Whether you're currently working in this field or looking to break into it, here are some ways that technology is improving the education sector as a whole:

Employee and Student Wellbeing

Health and wellbeing are becoming increasingly important issues in the workplace. In this line, many companies are now implementing programs to help increase productivity, reduce stress, and improve employee relationships. An example of this is the implementation of mindfulness programs, which have been shown to reduce employee burnout by an average of 43% while increasing productivity by 25%. Utilising school wellbeing software can help you improve staff and student wellbeing in real-time by collecting data regularly, allowing you to act upon the feedback.

Virtual and Augmented Reality for Education

VR and AR have been used in education for several years, with many institutions adopting the technologies for use in reception age classes and higher education settings. It has been shown that VR and AR are practical teaching tools, with most users reporting positive experiences. In addition, VR and AR have been shown to improve user retention rates, particularly among visual learners. Moreover, VR and AR are also ideal for students with disabilities, as they allow for novel experiences that may otherwise be unavailable to these individuals.

Cloud Storage

Cloud storage has proven to be a valuable tool in various industries. With this in mind, it's not surprising to see it being used in the education sector. Cloud storage can store digital content, like videos and documents, in a centralised location. This makes it easier for users to access these files across different devices while protecting against data loss. Cloud storage allows users to share and easily access files, regardless of location. In addition, cloud storage can help improve collaboration among employees and learners by facilitating easy access to shared files. This can be particularly useful in education, where students often work in groups.

Collaboration Tools

Collaboration tools allow employees to easily communicate and work together across different locations and time zones. Several tools are commonly used in the education industry. Some of these tools include:

AI-Based E-Learning Platforms

As technology advances, many companies are beginning to implement AI-based e-learning platforms. These platforms allow users to create and manage online courses using AI, making it easier for organisations to manage their educational content. AI-based e-learning platforms can also be used to facilitate online courses.

This makes it easier for companies to provide online courses to learners while increasing the overall quality of these courses. AI-based e-learning platforms can be particularly beneficial to education. This is because they allow educators to create more engaging content while providing learners with a personalised experience.

Conclusion

The education industry is increasing, and all institutions are adopting new technologies. This has led to various benefits for students, educators, and employers. Technology is revolutionising the education sector from improving employee and student wellbeing to enhancing the quality and accessibility of educational content.

See the rest here:
Utilising Technology To Help Improve The Education Industry - MinuteHack

Read More..

Internet Security Software Market Is Growing With the Increase in Number of Malware Attacks Worldwide | IBM Corporation, Kaspersky Lab, McAfee Inc. -…

Global Internet Security Software Market, by Software (Encryption, Network Security Software & Database Security Software, and Cloud Access and Identity Management), By Technology Type (Cryptography, Authentication, Access Control Technology, and Content Filtering), and By Region (North America, Latin America, Europe, Asia Pacific, Middle East, and Africa) Global Industry Insights, Trends, Outlook, and Opportunity Analysis

The global internet security software market is estimated to be valued at US$ XX million in XXX and is expected to exhibit a CAGR of XX% over the forecast period (XXX-XXX), as highlighted in a new report published by Coherent Market Insights.

:

Network security has become a more pressing issue for small and medium-sized enterprises (SMEs) or small and medium-sized businesses (SMBs) as more processes become digital or cloud-based. Internet security helps secure transactions over the internet, as well as secure web with the help of internet protocols. Network security software is a tool used to track and prevent unauthorized access or denial of network resources through phishing, worms, spyware, Trojan horses, and other vendor-specific vulnerabilities.

Internet security consists of a range of security tactics for protecting activities and transactions conducted online over the internet. The software helps enhance the overall security of a system, computer, or network. Moreover, Internet security software helps protect computer systems against intrusion, hacker attacks, unauthorized access, etc. Its objective is to establish rules and measures to use against attacks over the Internet.

:Juniper Networks, Inc., Trend Micro Inc., Symantec Corporation, IBM Corporation, Kaspersky Lab, McAfee Inc., Cipher Cloud, CA Technologies, Cisco system Inc., Websense, Inc.( Forcepoint), Fortinet, Inc., Sophos Ltd., Dell, Check Point Software Technologies Ltd., SafeNet, Inc., and Cyren Ltd

https://www.coherentmarketinsights.com/insight/request-sample/1469

Key Market Drivers:

Increasing demand for security software solutions due to rise in the number of malware attacks worldwide is expected to boost the growth of the internet security software market during the forecast period. For instance, in September 2020, Nozomi Networks Inc. and Cervello teamed up to provide the rail industry with comprehensive, end-to-end cybersecurity. They will deliver superior visualization of entire railway networks, management of cybersecurity compliance, early cyber threat detection, and efficient remediation to ensure operational continuity.

Moreover, integration of advanced technologies, such as artificial intelligence, deep learning, and machine learning is expected to aid in the growth of the internet security software market. Such technologies add value to network security offerings. For instance, in June 2019, Cisco launched new artificial intelligence (AI) and machine learning (ML) capabilities to allow IT teams to function at machine speed and scale through personalized network insights. As part of its broadened capabilities offering. Cisco has also unveiled innovations to more effectively manage users and applications across the entire enterprise network from campus networks and wide-area networks, to data centers and the IoT edge.

:

North America: United States,Mexico and Canada

South & Central America: Argentina, Chile, Brazil and Others

Middle East & Africa: Saudi Arabia, UAE, Israel, Turkey, Egypt, South Africa & Rest of MEA.

Europe: UK, France, Italy, Germany, Spain, BeNeLux, Russia, NORDIC Nations and Rest of Europe.

Asia-Pacific: India, China, Japan, South Korea, Indonesia, Thailand, Singapore, Australia and Rest of APAC.

, https://www.coherentmarketinsights.com/insight/request-pdf/1469

COVID-19 Impact Analysis:

Internet security software are playing an important role in survival during the pandemic and will play a role again in case of any future crisis. Before the global pandemic, most employees were working from secure office networks. But the pandemic has forced organizations all over the world to adopt remote working (such as work from home policies to curb the spread of the virus) or e-learning. This in turn has increased or is expected to increase the chances or risk of cyber or malware attacks. The pandemic has caused a surge in ransomware attacks worldwide across various industries. There is also evidence that remote working increases the risk of a successful ransomware attack significantly. The aforementioned factors are expected to propel the growth of the internet security software market.

Global Internet Security Software Market Segmentation:

The global internet security market is segmented by:

By Software:

By Technologies:

By Applications:

:

What is the estimated growth rate of the market for the forecast period of 2022-2028?

What will the market size be in the anticipated time frame?

What are the primary aspects that will determine the Internet Security Software Markets fate over the forecast period?

What are the major market players winning strategies for building a strong presence in the Internet Security Software Market industry?

What are the primary market trends influencing the Internet Security Software Markets growth in various regions?

What are the biggest dangers and difficulties that are likely to stymie the Internet Security Software Markets growth?

What are the most critical opportunities for market leaders to succeed and profit?

:

1. Market Overview

2. Market Preview

Report Description

Market Definition and Scope

Executive Summary

Market Snippet, By Function

Market Snippet, By Application

Market Snippet, By Region

Coherent Opportunity Map (COM)

3.Market Dynamics, Regulations, and Trends Analysis

Market Dynamics

Drivers

Restraints

Market Opportunities

Regulatory Scenario

Industry Trend

Merger and Acquisitions

New system Launch/Approvals

Value Chain Analysis

Porters Analysis

PEST Analysis

Continue

Key Takeaways:

The internet security software market is expected to exhibit a CAGR of XX % during the forecast period owing to the increasing number of smartphone and Internet users all over the world. For instance, in according to India Brand Equity Foundation (IBEF), with the growing internet penetration, internet users in India are expected to increase from 429.23 million as of September 2017 to 829 million by 2021.

Among regions, North America, Europe, and Asia Pacific are expected to witness a strong growth in the internet security software market, owing to the rise in the number of malware attacks, increasing adoption of internet security software solutions, and increase in adoption of cloud-based security technologies, in these regions. For instance, in June 2021, The U.S. and British governments announced Russian General Staff Main Intelligence Directorate (GRU) used a series of brute force access attempts against hundreds of government and private sector targets around the world from 2019 to 2021, targeting organizations using Microsoft Office 365 cloud services.

Click Here To Buy Comprehensive Internet Security Software Market Report https://www.coherentmarketinsights.com/insight/buy-now/1469

Thank you for taking the time to read the research report. Kindly inform us for additional information about the customized report and customization plan, and we will provide you the most appropriate customized report.

Coherent Market Insights is a global market intelligence and consulting organization that provides syndicated research reports, customized research reports, and consulting services. We are known for our actionable insights and authentic reports in various domains including aerospace and defense, agriculture, food and beverages, automotive, chemicals and materials, and virtually all domains and an exhaustive list of sub-domains under the sun. We create value for clients through our highly reliable and accurate reports. We are also committed in playing a leading role in offering insights in various sectors post-COVID-19 and continue to deliver measurable, sustainable results for our clients.

Mr. ShahCoherent Market Insights1001 4th Ave, #3200 Seattle, WA 98154, U.S.Email: [emailprotected]United States of America: +1-206-701-6702United Kingdom: +44-020-8133-4027Japan: +050-5539-1737India: +91-848-285-0837

Link:
Internet Security Software Market Is Growing With the Increase in Number of Malware Attacks Worldwide | IBM Corporation, Kaspersky Lab, McAfee Inc. -...

Read More..

Cryptojacking Cases Are Rising Globally, Why So And Should This Worry You? – Outlook India

According to the internet security company Kaspersky, cryptojacking is an act of mining cryptocurrency by hacking into someone elses computer, smartphone, and other electronic devices. It is typically done by gaining unauthorised access to the hosts computer and using its resources to mine cryptocurrency without the host noticing it or before it is too late.

Since the Proof-of-Work consensus using coins like Bitcoin (BTC) requires extensive computational power to generate new coins and mining rigs consume heavy electricity besides their high cost and maintenance expenses, hackers use the cryptojacking method to mine Bitcoin and other Proof-of-Work cryptocurrencies using the hosts resources.

Researchers at the Kaspersky Labs further explain that cryptojacking can infect even Android devices even though phones have low processing power than computers. In this type of attack, hackers pool the processing power of a large number of phones to mine Proof-of-Work cryptocurrencies.

According to a report titled 2022 SonicWall Cyber Threat Report by cybersecurity firm SonicWall, cryptojacking attacks in the financial sector has risen by 269 per cent year to date, about five times more than the cyber attacks targeting the retail industry.

The report noted that the finance industry has witnessed significantly higher cryptojacking incidences than any other sector. Overall, crypto-jacking cases went up by 30 per cent to 66.7 million in the first half of 2022, SonicWall said in the report.

Despite a precipitous drop in the price of cryptocurrency, global cryptojacking volume rose to 66.7 million in the first half of 2022, up 30% over the first half of 2021. The number of attacks on the finance industry is five times greater than the second highest industry retail, which used to be at the very bottom of the list, the report noted.

SonicWall researchers noted that despite a sharp drop in Bitcoin prices since January 2022, cryptojacking cases kept increasing, showing that such cases continue irrespective of price fluctuations. Moreover, changing careers is tough even for cybercriminals; hence, they continue to illegally mine Proof-of-Work cryptocurrencies like Bitcoin. The researchers also attributed the rise to the crackdown on ransomware attacks, making cryptojacking their preferred tool for illegal mining. Bitcoin prices fell by 74 per cent from its all-time high of $68,990 last year.

After governments stepped up ransomware awareness and enforcement efforts, and ransomware attacks such as those against Colonial Pipeline and Kaseya led to high-profile busts, some ransomware operators have decided theyre ready for a quieter life, the researchers noted.

In a ransomware-type attack, they said, the attacker has to announce their presence and demand ransom by way of communicating with the victim. But in cryptojacking, the entire attack relies on discretion and without the victim ever being aware of it. And for some cybercriminals feeling the heat, the lower risk is worth sacrificing a potentially higher payday, they said.

Incidents of Attacks: SonicWall researchers observed that cryptojacking incidents rose by 30 per cent to 66.7 million attacks in the first half of 2022, compared to the same period in 2021. The researchers also spotted a trend wherein they observed that cryptojacking attack volumes were often higher in Q1 than in Q2, and it has been the case since SonicWall started tracking cryptojacking.

SonicWall researchers recorded 45.1 million cryptojacking attacks in Q1 2022, but by April, 2022, the incidents were down by half from its peak, and in May, it was even lower, resulting in a second-quarter attack volume of just 21.6 million, less than half the amount seen in the preceding three months.

While falling cryptocurrency prices may have a lot to do with this, keep in mind that what were seeing follows a well-established pattern, the researchers said.

On January 1, 2022, the price of Bitcoin (BTC) was $47,219.03, and on July 30, 2022, it fell to $23,797.00, as per Coinmarketcap data.

Most Attacked Sectors: SonicWall researchers noticed that while the overall cryptojacking incidents increased, the previously most affected sectors like the government, healthcare and education, saw cryptojacking attack volumes dropped in the first half of 2022.

This represents a long-awaited reprieve for education customers, who have gone from seeing the most cryptojacking of any industry on our list, to seeing the least.

While the cryptojacking cases rose by 269 per cent in the finance industry, the retail sector witnessed a 63 per cent rise.

Read more:
Cryptojacking Cases Are Rising Globally, Why So And Should This Worry You? - Outlook India

Read More..

Global Healthcare Cyber Security Market To Be Driven By Increasing Cases Of Internet Frauds In The Healthcare Sector During The Forecast Period Of…

The new report by Expert Market Research titled, GlobalHealthcare Cyber Security Market Size, Share, Growth, Analysis Report and Forecast 2022-2027, gives an in-depth analysis of the healthcare cyber security market, assessing the market based on its segments like type, security type, and major regions among others.

The report tracks the latest trends in the industry and studies their impact on the overall market. It also assesses the market dynamics, covering the key demand and price indicators, along with analysing the market based on the SWOT and Porters Five Forces models.

Get a Free Sample Report with Table of [emailprotected]https://bit.ly/3b4VNK9

The key highlights of the report include:

Market Overview (2017-2027)

Historical Market Size (2021):USD 9395.86 million

Forecast CAGR (2022-2027):15.40%

Forecast Market Size (2027):USD 22190.71 million

The widespread usage of digital services in the healthcare industry is what is driving the worldwide market for healthcare cyber security. This has led to a significant increase in cyber dangers including phishing scams, ransomware attacks, and other sorts of data breach attacks.

Thus, the market expansion is being driven by the increasing usage of healthcare cyber security to stop healthcare fraud. Additionally, the number of linked devices in the healthcare industry has increased because of the Internet of Things (IoT) market penetration, this provides unethical hackers more opportunities to exercise frauds hence furthering the market growth of healthcare cyber security systems.

Healthcare cyber security aids in keeping electronic data and assets from being accessed and used without authorization in the healthcare sector like clinics and hospitals.

Additionally, they help to retain health records, lower the risk of medical mistakes, increase diagnostic accuracy, and safeguard patient privacy. As a result, hospitals, ambulatory services, and surgical centres all often utilise cyber security in healthcare.

Read Full Report with Table of [emailprotected]https://bit.ly/3vf75lB

Based on type, the market can be divided into:

Service Solution

On the basis of security type, the market can be segmented into:

Application Security Cloud Security Content Security Endpoint Security Network Security Wireless Security Others

The major regional markets of the healthcare cyber security market are:

North America Asia Pacific Latin America Europe Middle East and Africa

The increasing government funding for the creation of cyber security solutions for the healthcare sector is expected to fuel growth in the global market for healthcare cyber security. Due to this, top industry players are constantly developing and updating cutting-edge solutions to reduce the risk of cyberattacks in hospitals, clinics, and other healthcare facilities, which is anticipated to fuel market expansion in the upcoming years.

Additionally, it is anticipated that the use of advanced security systems, including authentication options like two-factor and multi-factor authentication, biometric solutions like fingerprint scanners, and others, powered by advanced digital technologies like Artificial Intelligence (AI), Machine Learning (ML), and the Internet of Things (IoT), will accelerate the market growth of healthcare cyber security.

The major players in the market are:

The report covers the market shares, capacities, plant turnarounds, expansions, investments and mergers and acquisitions, among other latest developments of these market players.

About Us:

Expert Market Research(EMR) is leading market research company with clients across the globe. Through comprehensive data collection and skilful analysis and interpretation of data, the company offers its clients extensive, latest and actionable market intelligence which enables them to make informed and intelligent decisions and strengthen their position in the market. The clientele ranges from Fortune 1000 companies to small and medium scale enterprises.

EMR customises syndicated reports according to clients requirements and expectations. The company is active across over 15 prominent industry domains, including food and beverages, chemicals and materials, technology and media, consumer goods, packaging, agriculture, and pharmaceuticals, among others.

Over 3000 EMR consultants and more than 100 analysts work very hard to ensure that clients get only the most updated, relevant, accurate and actionable industry intelligence so that they may formulate informed, effective and intelligent business strategies and ensure their leadership in the market.

Media Contact:

Company Name: Claight CorporationContact Person:- Shira Ellis, Business ConsultantEmail: [emailprotected]Toll Free Number: US +1-415-325-5166 | UK +44-702-402-5790Address: 30 North Gould Street, Sheridan, WY 82801, USAWebsite: http://www.expertmarketresearch.com

Also Read:

ISO Tank Container Market: https://mbutimeline.com/news/336077/global-iso-tank-container-market-to-be-driven-by-expansion-of-maritime-trading-in-the-forecast-period-of-2021-2026/

Precision Medicine Market: https://mbutimeline.com/news/335985/global-precision-medicine-market-to-be-driven-by-growing-cases-of-cancer-in-the-forecast-period-of-2021-2026/

Empty Capsules Market: https://mbutimeline.com/news/336105/global-empty-capsules-market-is-projected-to-reach-usd-2-97-billion-in-the-forecast-period-of-2021-2026/

Point-of-Care (POC) Diagnostic Market: https://mbutimeline.com/news/336104/global-point-of-care-poc-diagnostic-market-to-be-driven-by-rising-prevalence-of-diseases-in-the-forecast-period-of-2021-2026/

Content Source @https://takeitcool.com/healthcare-cyber-security-market-size-share-trends-industry-report-key-player-major-segments-and-forecast/

Read the original:
Global Healthcare Cyber Security Market To Be Driven By Increasing Cases Of Internet Frauds In The Healthcare Sector During The Forecast Period Of...

Read More..

Cyber Week in Review: July 29, 2022 – Council on Foreign Relations

The Transportation Security Administration Issues Revised Cybersecurity Requirements for Natural Gas Pipelines

The Transportation Security Administration (TSA) revised its cybersecurity standards for owners and operators of TSA-designated critical pipelines that transport natural gas or hazardous liquids. The security requirements were revised following feedback from the private sector and focus on performance-based measures to achieve cybersecurity resiliency. The new directive outlines four areas of future action. Operators and owners should: develop network segmentation policies to ensure safe operation during an attack, create access control measures to prevent unauthorized access to cyber systems, build detection policies to search for cybersecurity threats, and reduce the exploitation of unpatched systems by applying a series of security patches and updates for critical software. The natural gas industry has faced several major cybersecurity incidents in the last year that have raised alarm, including a ransomware attack on Colonial Pipeline in May 2021 that crippled gas flows for a week on the U.S. east coast and led to the first security directive issued by TSA and a piece of malware, dubbed PIPEDREAM, designed to destroy parts of natural gas plants, likely circulated by Russian threat actors in the wake of Russias invasion of Ukraine.

The United States and Saudi Arabia Sign Bilateral Cybersecurity Agreements

Officials from Saudi Arabia and the United States signed two bilateral agreements on cybersecurity cooperation during President Bidens trip to Riyadh last week. The first agreement was between Saudi Arabias National Cybersecurity Authority and the FBI, the second one with the Cybersecurity Infrastructure Security Agency (CISA). In part. the agreements are targeted at Iran, which has launched a range of cyberattacks from website defacement and distributed denial-of-service attacks to espionage and ransomware against the two countries. Cyber agreements are being used to shore up a newly emerging regional architecture to deter and contain Iran The United States, for example, recently announcing a collaboration with Israel to combat cybercrime, and Israel and the United Arab Emirates have discussed shared cyber threats and exchanged threat intelligence on Hezbollah cyber operations.

Chinas Cybersecurity Agency Fines Didi $1.2 Billion Over Data Privacy Concerns

More on:

Technology and Innovation

Cybersecurity

China

Chinas internet regulator, the Cyberspace Administration of China, announced it had fined ride-hailing company Didi $1.2 billion over the companys data collection and security protections. The fine is the final outcome of a probe which came about after Didi pushed to list its stock on the New York Stock Exchange (NYSE) over the objections of Chinese regulators. The probe eventually led Didi to delist from the New York Stock Exchange less than a year after its debut and forced it to stop adding new users in China for over a year. Didi issued a statement apologizing for the violations and promised to improve its data collection and retention practices in the future. Didis is not alone among large Chinese technology firms in facing an investigation, as the Chinese government has flexed its regulatory muscle to crack down on technology firms over the past year.

FBI Investigation into Huawei Publicized

Net Politics

CFR experts investigate the impact of information and communication technologies on security, privacy, and international affairs.2-4 times weekly.

Digital and Cyberspace Policy program updates on cybersecurity, digital trade, internet governance, and online privacy.Bimonthly.

A summary of global news developments with CFR analysis delivered to your inbox each morning.Most weekdays.

A weekly digest of the latestfrom CFR on the biggest foreign policy stories of the week, featuring briefs, opinions, and explainers. Every Friday.

The results of 2019 FBI investigation into Huawei equipment were publicized earlier this week. Counterintelligence officials reportedly found significant concerns around Huawei equipment, including the installation of unnecessary, unprofitable cell tower equipment in areas near U.S. military bases. The equipment could possibly have been used to spy on restricted Department of Defense communications. The investigation reportedly played a direct role in the Federal Communication Commissions (FCC) 2019 decision to blacklist Huawei and another Chinese firm, ZTE, to prevent them from receiving federal subsidies or being used in federal networks. The FCC has since allocated nearly $6 billion to remove and replace Huawei and ZTE equipment in the United States, although critics have argued that the program will likely take years and run over budget.

CHIPS Act Passed by the Senate and House of Representatives

The U.S. Senate and House of Representatives passed the Creating Helpful Incentives to Produce Semiconductors for AmericaPlus(CHIPS+) Act this week, a $280 billion bill aimed at strengthening Americas manufacturing and technological capacities to compete with China. The bill will provide $52 billion in subsidies to domestic semiconductor manufacturers, $200 billion for scientific research for emerging technologies, and $10 billion for the Department of Commerce to create twenty regional technology hubs across the country. These hubs would link research universities with private industry to create centers for innovation in places where such funding is lacking. The National Science Foundation will receive new funding to accelerate the development of technologies critical to U.S. security and $61 billion to fund researchers at universities. Furthermore, the Energy Departments Office of Sciences five-year authorization will increase to $50 billion to focus on clean energy, nuclear physics, and high-intensity lasers. The bill will likely be signed into law next week by President Biden, who hailed it in a statement as an historic bill.

More on:

Technology and Innovation

Cybersecurity

China

Continue reading here:
Cyber Week in Review: July 29, 2022 - Council on Foreign Relations

Read More..

India’s 5G auction kicks off today. These are the companies in the race – CNBC

The number of 5G subscribers in India is expected to grow to 500 million by 2027, according to a report. Mobile phones in the vast country have become almost indispensable even among rural Indians, with a farmer here seen taking a selfie during a protest in stock photo from 2019.

Vishal Bhatnagar | Afp | Getty Images

India's 5G auction kicks off on Tuesday and four local companies will be in the race to bid for the country's first 5G spectrum ahead of a planned rollout in 2023.

Bidders will include all the three major mobile operators in India: Reliance Jio, the market leader, Bharti Airtel and Vodafone Idea.

The surprise entry of Indian billionaire Gautam Adani as the fourth contender could still rock the boat.

5G refers tothe fifth generation of high-speed mobile internet which promises super-fast download speeds that can support technologies like driverless cars and virtual reality.

A total of 72 gigahertz of 5G spectrum will be on the block, for which winning bids will retain the rights for 20 years.

In total, the four bidders have put up $2.7 billion (218 billion Indian rupees) in earnest money, the mandatory sum required to confirm a contract. The amount of earnest money deposited provides an indication ofthe amount of spectrum a company wishes to buy.

The auction will see aggressive bidding by Reliance Industries' Jio, which has deposited 140 billion rupees of earnest money with the government the largest amount among the contenders.

Other major mobile operators include Bharti Airtel which put 55 billion rupees and Vodafone Idea which deposited 22 billion rupees of earnest money.

The Adani Group conglomerate, which operates mainly in infrastructure, put in only 1 billion Indian rupees as earnest money, which entitles it to bid for only a limited amount of spectrum.

Before the fourth bidder's identity was disclosed, there was speculation of a new competitor in the mobile network and data space, which drove up expectations of higher bidding.

However, the company moved to douse the speculation. When contacted by CNBC, the Adani Group denied plans to enter the mobile phone space.

"We are participating in the 5G spectrum auction to provide private network solutions along with enhanced cyber security in the airport, ports & logistics, power generation, transmission, distribution, and various manufacturing operations," the group said in a statement.

While the small amount of earnest money rules out a nationwide entry into the mobile space by Adani, it still leaves room to acquire enough spectrum to provide coverage in large cities such as Mumbai and New Delhi, a significant market.

In India, "5G is projected to account for almost 40 percent of mobile subscriptions 500 million by the end of 2027," according to a recent report by Ericsson, one of the leading providers of 5G equipment in the U.S.

"By then, smartphone users in the region are forecast to consume 50GB of data per month on average," the report said, adding that "there is already a good foundation for 5G uptake" in the country.

There is significant consumer interest in adopting 5G, the report said citing a recent study. It estimated that about 40 million smartphone users could take up 5G in the initial year of its availability.

See the article here:
India's 5G auction kicks off today. These are the companies in the race - CNBC

Read More..

Microsoft Warns of Internet Information Services (IIS) Malware Increase – WinBuzzer

Microsoft has issued a warning to customers over a rise in malware the company is finding in its Internet Information Services (IIS) server. Specifically, the company is seeing malware that can create backdoors in IIS and help attackers steal credentials.

According to Microsoft, the malware is hard to detect but can be found and removed:

Malicious IIS extensions are less frequently encountered in attacks against servers, with attackers often only using script web shells as the first stage payload. This leads to a relatively lower detection rate for malicious IIS extensions compared to script web shells. IIS backdoors are also harder to detect since they mostly reside in the same directories as legitimate modules used by target applications, and they follow the same code structure as clean modules.

Advertisement

The issue was first spotted by security research firm ESET. In 2021, the company found 80 unique malicious IIS modules for a group of 14 malware types. While these were previously known malware families, they were successfully being used to target Microsoft Internet Information Services.

Specifically, threat actors were creating IIS backdoors and installing injectors, info stealers, and proxies.

From March to June 2021, ESET tracked IIS backdoors that were using the Exchange ProxyLogon pre-authentication to remove code execution vulnerabilities (CVE-2021-26855,CVE-2021-26857,CVE-2021-26858, andCVE-2021-27065).

Microsoft points out that IIS extension attacks usually begin with the attacker targeting a critical flaw in hosted applications and exploiting it. They will then add the web shell before next adding the backdoor.

Once registered with the target application, the backdoor can monitor incoming and outgoing requests and perform additional tasks, such as running remote commands or dumping credentials in the background as the user authenticates to the web application, Microsoft explains.

Tip of the day: Is your system drive constantly full and you need to free up space regularly? Try Windows Disk Cleanup in extended mode which goes far beyond the standard procedure. Our tutorial also shows you how to create a desktop shortcut to run this advanced method right from the desktop.

Advertisement

Read more:
Microsoft Warns of Internet Information Services (IIS) Malware Increase - WinBuzzer

Read More..