Page 20«..10..19202122..3040..»

Jimmy Nguyen discusses future of sports with Bitcoin SV – CoinGeek

The founding president of the Bitcoin Association Jimmy Nguyen has been discussing the future of sports, and the role Bitcoin SV (BSV) can play in transforming the sports industry, both now and in future.

In an interview with CoinGeek at the Future of Sports event in Moscow, Nguyen said that Bitcoin was the only blockchain ready to handle the needs of the sports industry right now, with the capacity to scale as necessary to respond to demand.

Bitcoin SV is the only blockchain capable of supporting microtransactions at the scale required of the sports industry, which tends to have significant peaks in interest around key global sporting events.

Fixtures like the soccer World Cup, the Olympics and the Super Bowl tend to lead to huge spikes in traffic in concentrated periods of time. According to Nguyen, the scalability of BSV means its the only blockchain ready to respond to these demands today.

Nguyen also spelled out the benefits of an honest public ledger in the sports sector, particularly applicable in sports betting as one obvious use case.

With provably fair records on the blockchain, BSV can deliver honest wins, honest transactions, and provably fair, honest sports betting, improving trust in the betting sector as well as delivering better value for players.

Beyond sports betting, the event also saw topics such as the use of BSV as a platform for anti-doping technology targeting amateur sports, with records recorded and written to the blockchain for independently verifiable, immutable record keeping.

The event also saw discussions on tokenization on BSV, with a number of commercial applications for sports fans.

Nguyen hailed the event as a success, with developers and stakeholders from across Russia and the wider region heading to Moscow in support of BSV.

The event comes at a time of growing interest in BSV globally, with more developers choosing bitcoin for developing blockchain apps.

The Future of Sports conference took place on February 14, with speakers including Toli Makris from Ex Sports, Joachim Thumfahrt on behalf of the UAE government, and representatives from global soccer team Tottenham Hotspur FC.

New to Bitcoin? Check out CoinGeeks Bitcoin for Beginners section, the ultimate resource guide to learn more about Bitcoinas originally envisioned by Satoshi Nakamotoand blockchain.

To receive the latest CoinGeek.com news, special discounts on CoinGeek Conferences and other inside information direct to your inbox, pleasesign upfor our mailing list.

Visit link:
Jimmy Nguyen discusses future of sports with Bitcoin SV - CoinGeek

Read More..

How Bitcoin is coming to Ethereum, again – Decrypt

Bitcoin has been tokenized on the Ethereum blockchain again. This time its interoperability solutions provider Summa and the Keep Network, a privacy layer for Ethereum (ETH), building the token, called tBTC.

On Thursday, it debuted on Ethereums testnet, and amainnet launch is planned in March. The project hopes to bring Bitcoin (BTC) into the Decentralized Finance (DeFi) industry. Could this be the most important project to launch on Ethereum in 2020?

The launch is big news especially for DeFi; tBTC means that Bitcoin holders can now earn interest on lending dapp Compound; get a loan from MakerDAO or a non-collateralized one from Aave; trade or lend on Fulcrum or dYdX; save with Dharma Network or Pool Together, and much more.

Up to now its been a pipe dream, despite several attempts to recreate a trustless way to bring Bitcoin to Ethereum. But tBTC creates a workaround: essentially, a decentralized issuance mechanism between two parties.

This isnt the first version of Bitcoin on Ethereum. But it offers several benefits.

Synthetixs sBTC, a synthetic asset which gives investors exposure to Bitcoins price movements, doesnt allow it to be used in DeFi applications. So, this new token has more potential there.

And a solution such as Wrapped Bitcoin, or wBTC, mandates a user to undergo know-your-customer (KYC) procedures, mint the token from a third party, and doesnt let them hold their own tokens. Instead, tBTC allows users to mint and hold the token themselves, suiting the Ethereum ethos.

tBTC is not the only project working on a solution, others such as Ren Protocol, are also striving to bring Bitcoin to Ethereum in a decentralized way.

But theyll need to be quick. tBTC contracts are currently being audited, leading up to the mainet launch, and there are plans to integrate it into lending platforms like Compound, immediately after. The race is on.

Read the original:
How Bitcoin is coming to Ethereum, again - Decrypt

Read More..

How Bitcoin Optech Is Connecting the Open-Source and Corporate Worlds – Bitcoin Magazine

Bitcoin Core and other open-source projects have, over the years, built a range of technologies to improve Bitcoin scaling and the general Bitcoin user experience. With examples including Segregated Witness (SegWit), Replace-By-Fee and the Lightning Network, Bitcoin users have a number of tools at their disposal to utilize the Bitcoin blockchain as best and efficiently as possible.

Yet, bigger companies in particular have historically been slow to adopt such tools. Segregated Witness is a prime example: Several of the largest Bitcoin businesses hadnt adopted the upgrade for over a year after it was activated on the Bitcoin network in August 2017. The total share of SegWit transactions even remained below 50 percent until the second half of 2019.

This was also noticed by John Newbery, engineer at Chaincode Labs; Steve Lee, former Google product director turned product manager at Square Crypto; and James OBeirne, former Chaincode engineer who recently joined DG Lab. Seeing this and other discrepancies, they wanted to help resolve the apparent disconnect. In mid-2018, the trio founded an initiative to bridge the gap: Bitcoin Optech.

Bitcoin is the most mature blockchain, and even though its been around the longest, theres still a lot of inefficiencies with the usage of the blockchain, and it is a scarce resource, Lee explained, as he announced the project at the Distributed 2018 conference in July 2018. Thats really what were focused on, helping various actors in the ecosystem to figure out how to best do that.

The initiative would consist of several projects united under the Bitcoin Optech umbrella.

The first of these projects is a series of workshops, bringing open-source developers and engineers at Bitcoin companies together to discuss relevant technologies in person. These workshops offer technical knowledge to all the participants, while also bringing together different parts of the Bitcoin ecosystem to hopefully help further cooperation parts that sometimes have different perspectives on the industry, with open-source developers and Bitcoin companies occasionally finding themselves in conflict with one another.

Bringing people together and having face-to-face meetings is really beneficial, it helps foster a more collaborative ecosystem, Newbery explained during the same Distributed 2018 announcement. On a purely technical level, having that experience feedback from engineers actually doing work on the ground, back to the open-source community makes those open-source projects better, and having information going from the open-source community into these companies lets those companies use better technology.

The first Bitcoin Optech workshop took place in San Francisco in July 2018. Fourteen engineers from Square, Coinbase, BitGo, Purse, Xapo and Ledger discussed topics including coin selection, fee estimation and Replace-By-Fee, as well more general topics like establishment of the Bitcoin Optech initiative itself and communication between the different parts of the Bitcoin ecosystem.

The initiative has grown significantly since then. A second workshop was organized in Paris (November 2018), followed by another event in San Francisco and one in New York (both in September 2019). The fifth and most recent workshop took place in London on February 5, 2020. Bitcoin Optech today counts 24 member companies who support the initiative financially, including the likes of Bitstamp, Kraken, Casa, OKcoin, Bitrefill and others. The vast majority of member companies also participated in at least one of the workshops.

The Bitcoin Optech team itself has grown as well. Although OBeirne stopped contributing after 2018, Blockstreams product manager Mike Schmidt, Chaincode Labs associate Adam Jonas and Chaincode Labs engineer Carl Dong have been taking on various organizational roles within the initiative.

I think Bitcoin Optech has grown to be a trusted voice on technical Bitcoin matters and continues to highlight ways in which users and businesses can make more efficient use of the blockchain, Newbery told Bitcoin Magazine, reflecting on the 20 months since the initiative got off the ground.

The Bitcoin Optech newsletter is the second big project under the Bitcoin Optech umbrella. Produced by technical writer David Harding and counting 84 editions at the time of writing, the newsletter continues to accumulate a wealth of information, containing high-quality technical documentation and offering an ongoing overview of developments across Bitcoin and Lightning implementations.

Among the more notable efforts carried out through the newsletter, Harding wrote a 24(!)-part series on bech32 sending support, encouraging wallet providers and companies to implement the option to send funds to bech32 addresses, the address format introduced in Bitcoin Core 0.16.0. With bech32, users can fully utilize the extra blockspace offered by SegWit and enjoy a number of other benefits. Nineteen of the 23 popular wallets integrated this option, while four of them even generated bech32 receiving addresses by default though it is, of course, hard to say how much of this was due to the series specifically.

Other projects under the Bitcoin Optech umbrella include a dashboard with detailed statistics and adoption metrics on a range of technologies; compatibility matrices with overviews of SegWit and Replace-By-Fee support across different wallets; and the Scaling Cookbook, a technical document for scaling technologies for engineers and businesses. Bitcoin Optech also offers a broad overview on Bitcoin-related technical topics, which has grown to become a go-to resource for many.

Perhaps at least as important, Bitcoin Optech has probably helped heal a rift caused by the years-long scaling dispute. Having started with nothing but an idea midway through 2018, and helped by seed money from Xapo founder Wences Casares, venture capitalist John Pfeffer and Chaincode Labs co-founder Alex Morcos, Bitcoin Optechs focus on technical solutions may well have been instrumental in aligning different parts of the Bitcoin ecosystem.

I think it is going very well and exceeding our expectations in terms of company engagement and impact the workshop content and newsletter has, Lee told Bitcoin Magazine. It is hard to say how much actual adoption of various optimizations is due to Optech, but at minimum I think Optech has helped the post-SegWit2X healing process, and given businesses better insight into how the open source developers and process work.

The rest is here:
How Bitcoin Optech Is Connecting the Open-Source and Corporate Worlds - Bitcoin Magazine

Read More..

Cyber Security & Network Security Services – Internet …

Defend your digital landscape

The Digital Transformation is bringing new opportunities to your company, but it is also exposing you to new security risks. There are new vulnerabilities, new regulations, new tools appearing every day. Many worries about the inevitable attack they have yet to discover. What will they do when the company is breached? Is the organization ready? How bad will it be? This is why we adopt an assume breach mindset. Organizations must prevent and be able to recover from as many attacks as they can, but they also must be able to detect when a bad actor has made it past their defenses and be ready to act. Internet Security Consulting can guide your company through all of it.

Think you dont have anything of value to protect? Think again. The key asset that a security program helps to protect is your data and the value of your business is in its data. You already know this if your company is one of many whose data management is dictated by governmental and other regulations for example, how you manage customer credit card data. If your data management practices are not already covered by regulations, consider the value of the following:

Streamline your IT security operations

Save time and money with Internet Security Consulting cloud-based solutions. No hardware to install or software to maintain. Avoid the gaps that come with trying to glue together different security solutions.

Simplify your IT security and lower the cost of compliance

Respond to auditors and regulations in a timely and accurate manner. We help you show that the required controls are in place and your environment is continually compliant.

A flexible approach

Our Cyber Security strategy offers you protection from malware, unethical hacking, ransomware attacks and natural disasters. If your organization network security system does not have adequate protection you may lose valuable information and data. Our flexible approach to cyber security services enables us to work according to our client's needs, offering you the best value for your money.

Original post:
Cyber Security & Network Security Services - Internet ...

Read More..

Internet security Market Analysis With Key Players, Applications, Trends and Forecast To 2026 – Instant Tech News

Internet security Market Overview:

Verified Market Research adds new research report Internet security Market Development Overview 2020, The report includes an in-depth analysis of the toggle switch market, taking into account market dynamics, segmentation, geographic expansion, competitive landscape and some other key issues. The market analysts who prepared the report have thoroughly examined the toggle switch market and provided reliable and accurate data. They understand the needs of the industry and customers, which makes it easier for them to focus on the problems that end users have been looking for. The research report provides an analysis of an assessment of existing and future trends in which players can invest. It also includes an assessment of the players financial perspectives and the nature of the competition.

Global Internet security Market was valued at USD 32.67 Billion in 2017 and is projected to reach USD 61.42 Billion by 2025, growing at a CAGR of 8.2% from 2018 to 2025.

Request a Report Brochure @ https://www.verifiedmarketresearch.com/download-sample/?rid=5846&utm_source=ITN&utm_medium=005

Top 10 Companies in the Internet security Market Research Report:

Competitive Landscape

The competitive landscape is a must-have information for the marketplayersto withstand the competition present in theglobal Internet security market. This further helps the market participants to develop effective strategies to optimize their market positions. Moreover, the competitive analysis helps them to determine potential advantages as well as barriers within the global Internet security market. This way, they can monitor how their competitors are implementing various strategies including pricing, marketing, and distribution.

The report analyses thecurrent trends, growth opportunities, competitive pricing, restraining factors, and boosters that may have an impact on the overall dynamics of the global Internet security market. The report analytically studies the microeconomic and macroeconomic factors affecting the global Internet security market growth. New and emerging technologies that may influence the global Internet security market growth are also being studied in the report.

Global Internet security Market: Regional Segmentation

For a deeper understanding, the research report includes geographical segmentation of the global Internet security market. It provides an evaluation of the volatility of the political scenarios and amends likely to be made to the regulatory structures. This assessment gives an accurate analysis of the regional-wise growth of the global Internet security market.

Regions Covered by the global market for Internet security :

Middle East and Africa (GCC countries and Egypt)North America (USA, Mexico and Canada)South America (Brazil, etc.)Europe (Turkey, Germany, Russia, Great Britain, Italy, France etc.)Asia Pacific (Vietnam, China, Malaysia, Japan, Philippines, Korea, Thailand, India, Indonesia and Australia)

Ask for Discount @ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=5846&utm_source=ITN&utm_medium=005

The study objectives are:

Important Questions Answered in this Report:-

Get a Complete Market Report in your Inbox within 24 hours @ https://www.verifiedmarketresearch.com/product/global-internet-security-market-size-and-forecast-to-2025/?utm_source=ITN&utm_medium=005

About Us:

Verified market research partners with clients to provide insight into strategic and growth analytics; data that help achieve business goals and targets. Our core values include trust, integrity, and authenticity for our clients.

Analysts with high expertise in data gathering and governance utilize industry techniques to collate and examine data at all stages. Our analysts are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research reports.

Contact Us:

Mr. Edwyne FernandesCall: +1 (650) 781 4080Email: [emailprotected]

TAGS: Internet security Market Size, Internet security Market Growth, Internet security Market Forecast, Internet security Market Analysis, Internet security Market Trends, Internet security Market

See more here:
Internet security Market Analysis With Key Players, Applications, Trends and Forecast To 2026 - Instant Tech News

Read More..

Google Announced US$1 Million for its Be Internet Awesome Initiative – CISO MAG

Google recently announced that its going to spend US$1 million to bring awareness on data privacy and internet security across the sub-Saharan Africa region. The search engine giant also launched its child online safety program Be Internet Awesome in South Africa, the Netherlands, and Nigeria.

Be Internet Awesome initiative helps minors explore the internet confidently and securely. The initiative teaches kids and minor students skills for surfing the internet, how to recognize potential online scams, secure valuable information, how to identify and refrain from cyberbullying. Google stated that it partnered with the South African Film and Publications Board (FPB) to implement the program locally.

Commenting on the initiative, Abongile Mashele, acting Chief Executive Officer at FPB, said, The FPB has a responsibility to protect children from exposure to harmful content, thus the organization needs to play a leading role in creating awareness around the dangers of the internet, as much as it is incumbent on us to also encourage the use of the digital space as an empowering tool.

Fortune Mgwili-Sibanda, Head of Public Policy and Government Relations at Google Africa, said, Google is committed to a safe internet for children. We are also passionate about the empowerment of organizations that share this commitment. The fund will be administered by a third-party partner on behalf of Google.org, and we will be sharing details on application criteria and deadlines soon.

Mgwili-Sibanda also highlighted that Children are being exposed to the internet at their most vulnerable age so its important for us, at Google, to ensure that they do so as safely as possible. At the same time, teachers and parents can use these resources in order to support and guide children as they navigate the Web.

A research report from the information security firm Dataprotect revealed that the estimated cost of cybercrimes in Africa is 3.5 billion (approximately US$3.87 billion), compared to 528 billion (US$585 billion) worldwide. However, Africa still falls short in handling cybersecurity challenges. The analysis highlighted that the lack of skilled and qualified workforce and lesser investments in cybersecurity made West African banks vulnerable to cyberattacks including bank card fraud, phishing, and intrusions, etc.

See the rest here:
Google Announced US$1 Million for its Be Internet Awesome Initiative - CISO MAG

Read More..

Cybersecurity Level in the Middle East: An Overview of the Cybersecurity Market State – SCOOP EMPIRE

Recently,in the countries of the Middle East, there has been a progressive success indigitization. This, in turn, leads to an increase in the risks ofcyber-attacks, which can come from both other countries and criminal hackergroups. In this region, the government of each country seeks to provide asecure digital environment using new modern measures.

Forsecurity, the use of reliable antivirus software both at the government leveland for ordinary users plays an important role. In the countries of the MiddleEast, an active policy is being directed to develop the antivirus softwaremarket, which also includes the distribution and support of the best internet security software.

Thesecurity market in the Middle East and Africa at the end of 2019 was estimatedat more than 7 billion US dollars, and according to forecasts for the period2020-2025, CAGR will reach 14.97%. In connection with the rapid growth of thedigital system, new gateways for cyber-attacks have opened.

Themain factor that influences the existence of cyberattacks is a constantincrease in vulnerabilities in supply chains and digital communicationnetworks, an increase in the online consumer base, and, unfortunately,vulnerable cybersecurity infrastructure.

Mostof the social infrastructure and public services have increasingly begun to payattention to ensuring interconnection while bypassing the security of thesedevelopments.

Accordingto Kaspersky Lab reports, about 43% of organizations in the region haveinsufficient cybersecurity infrastructure, and 72% of companies have web-basedapplications vulnerable to attacks.

Thelink between business-critical data and applications, devices, and users is abase of the digital infrastructure. To penetrate the digital system and getinformation, cybercriminals use a variety of methods ranging from theintroduction of malware and phishing to various types of DDoS attacks. Suchforms of threats can lead not only to information leakage but also tosignificant financial losses.

Accordingto statistics, about 50% of all threats are directed against oil and gascompanies. In this regard, the government and organizations of the countries ofthe Middle East are making every effort to protect their networks, user data,and endpoints. Here are some measures:

Firstof all, the government of the countries is, of course, increasing investmentsin the communication and information fields. For example, one of the UAE banksinvested about 1 billion AED in digital transformation.

Itis crucial to increase the base of skilled workers in the digital field.Developing opportunities and encouraging career professionals in cybersecurity,developing training programs and providers. Kuwait has developed specifice-health and government policies. A policy of educating citizens about possiblecyber threats and active promotion so-called cyber hygiene.

Awardsand incentives for achievements in the field of cybersecurity, the governmentof the countries of the Middle East region contributes to the development ofinnovation and research in this field, motivating young scientists and studentsto a cyber-worker career. An excellent indicator is that Saudi Arabia receivedthe World Banks vocation through the development of new secure payment systemsand electronic filing of documents.

Expandingthe market for antivirus software and promoting the use of antivirus software amongall Internet users.

Cybersecurityis also developing through the improvement and development of the ecosystem ofthe cybersecurity market. It includes such significant security supplierssoftware as Intel Security (USA) McAfee Antivirus, Software Technologies Ltd(Israel), Cisco Systems, Inc. (USA) Immunet Antivirus, IBM Corporation (USA) Powertech Antivirus, Symantec Corporation (USA) e.g. Norton Antivirus,Computer Sciences Corporation (USA) and others. According to statistics, thetop-5 most common antivirus solutions include:

1.Cisco Systems, Inc.

2.Dell Technologies.

3.Kaspersky Lab.

4.IBM Corporation.

5.Check Point Software Technologies Ltd.

Inaddition to antivirus solutions, the listed companies supply the market withIAM, Encryption, DLP, UTM, Firewall, IDS / IPS, Disaster Recovery securitysoftware.

Thedefinition of cybersecurity implies the achievement and preservation of thesecurity properties of the resources of organizations or users against varioustypes of cyber threats arising on the Internet.

Themain objectives of securing a network are accessibility, integrity, andconfidentiality.

Therefore, cybersecurity is the most important condition for the development of the information society in the countries of the Middle East at the present stage and requires close attention from international organizations, representatives of academic and analytical centers, government officials, and media representatives. As you can see, attention to cybersecurity is growing, and governments are making significant efforts to achieve a secure digital society.

Original post:
Cybersecurity Level in the Middle East: An Overview of the Cybersecurity Market State - SCOOP EMPIRE

Read More..

IC3.gov 2019 Internet Crime Report: Its All About that BEC – Security Boulevard

For years I have been encouraging people to report their instances of Cybercrime to the FBIs Internet Crime & Complaint Center, IC3.gov. Based on the number of reports, people are finally doing just that. The growth in reporting over the last two years is remarkable driven in part by the desperation people are facing regarding two major cybercrime trends: Ransomware and Business Email Compromise. State and local authorities seem powerless to do anything about either of these, so finally they are encouraging (and in many cases helping) to get these crimes reported to the IC3, where we can use pattern matching to identify trends that reveal top criminals.

Comparing 2015 to 2019, cybercrime reports are up 61% with 467,361 complaints received just in calendar 2019. An average of 1280 complaints per day! But while the NUMBER of complaints has gone up by 61%, the dollars lost in those complaints has more than tripled! While Ransomware is certainly an important topic, the key difference in the financial impact has been Business Email Compromise. During calendar 2019, BEC complaints only accounted for 5% of the complaint volume (23,775 out of 467,361) that 5% of complaints accounted for 48.5% of all financial losses experienced by the victims ($1.7 Billion of 3.5 Billion!)

The good news on the BEC front is that the FBI has a stream-lined internationally successful process for recovering funds. Started in February 2018, the FBIs Recovery Asset Team has been getting better and better at their process. In Calendar 2019, the RAT was invoked on 1,307 cases, and were successful at recovering funds 79% of the time. Out of $384,237,651 stolen, they recovered $304,930,696! That is an amazing improvement over times past!

While Phishing, a crime that Ive been personally invested in chasing for at least 15 years, remains the most commonly experienced crime, with 114,702 cases reported to the ic3.gov in 2019, from a financial perspective, it just isnt even close to BEC and Romance Scams, the two categories we also called out as most important in our review of the 2018 IC3.gov Report. (See our blog post:IC3.gov: BEC Compromises and Romance Fraud 2018from last April.)

By victim count, BEC came in as the #6 category, while Romance Scams came in at #7.But by dollars lost, BEC is clearly #1 and Romance Scams are clearly #2.

While these losses seem staggering, please remember that these are ONLY THE REPORTED losses. Especially in the area of Romance Scams, we believe the number is dramatically under-reported. Often this is because the victim is an elderly person who either hides their victimization because they are embarrassed by the loss, or perhaps never realizes that theyve been scammed, especially in the case of a person who may be experiencing mental decline, but has no caretaker.

The Financial Crimes Enforcement Network, FinCEN, used a far different approach to trying to identify the scale of BEC attacks, as we reported last year in our blog article:FinCEN: BEC far worse than previously believed. FinCEN performed analysis on the Suspicious Activity Reports that are required of financial institutions in the United States and looked for tell-tale signs that the activity may have been a Business Email Compromise instance, whether reported to IC3 or not. Based on FinCENs numbers, we estimated the amount of money stolen by BEC criminals to be $8.7 Million per day JUST IN THE United States!

Our friends at Agari, (Hi John! Hi Crane! Hi Ronnie! Hi Patrick!), do a great deal of work in the BEC space, including running the Business Email Compromise Working Group. Ronnie shared some stats in his blog last fall about how long it would take BEC crime to surpass each of several other crime types. I encourage the interested reader to check it out here: Business Email Compromise (BEC): Putting $26 Billion in Known Losses into Context.

The 2019 Annual IC3.gov report also has a break-down of state losses. As we did last year (see:http://garwarner.blogspot.com/2019/04/ic3gov-bec-compromises-and-romance.html) , weve tried to normalize these numbers by allowing you to compare the number of BEC victims and losses per state, but also expressing those as an average loss per victim and the number of victims per 100,000 population in that state.

To allow the reader to easily see if their state number of victims or their average victims per loss is far above or below the average, well share that information here.

The national average was $71,569 loss per BEC victim.The average state had 6.8 victims per 100,000 population.

So, for example, my state, Alabama, has far less than the average loss, and also fewer victims per 100,000 than the national average.

The ten states (or territories) with the highest average BEC loss per victim were:

And the states (or territories) with the highest rate of victimization per 100,000 population were:

Here is the BEC data for each state from IC3.gov (plus the population and average that we calculated here:) click for BEC Data by State in a sortable Excel spreadsheet

For Confidence/Romance Scamsthe national average loss was $25,911 per victim.the average number of victims per 100,000 population was 4.9.

In my state, we were about normal for victimization rate, with a slightly lower 4.1 victims per 100,000. We were also slightly below the national average loss per victim, with $21,166 lost per victim or Romance Scams.

The ten states that the highest average losses per victim for Romance Scams were:

While the states with the highest number of romance scam victims per 100,000 population were:

Read more:
IC3.gov 2019 Internet Crime Report: Its All About that BEC - Security Boulevard

Read More..

Quantum internet: the next global network is already being laid – The Conversation UK

Google reported a remarkable breakthrough towards the end of 2019. The company claimed to have achieved something called quantum supremacy, using a new type of quantum computer to perform a benchmark test in 200 seconds. This was in stark contrast to the 10,000 years that would supposedly have been needed by a state-of-the-art conventional supercomputer to complete the same test.

Despite IBMs claim that its supercomputer, with a little optimisation, could solve the task in a matter of days, Googles announcement made it clear that we are entering a new era of incredible computational power.

Yet with much less fanfare, there has also been rapid progress in the development of quantum communication networks, and a master network to unite them all called the quantum internet. Just as the internet as we know it followed the development of computers, we can expect the quantum computer to be accompanied by the safer, better synchronised quantum internet.

Like quantum computing, quantum communication records information in what are known as qubits, similar to the way digital systems use bits and bytes. Whereas a bit can only take the value of zero or one, a qubit can also use the principles of quantum physics to take the value of zero and one at the same time. This is what allows quantum computers to perform certain computations very quickly. Instead of solving several variants of a problem one by one, the quantum computer can handle them all at the same time.

These qubits are central to the quantum internet because of a property called entanglement. If two entangled qubits are geographically separated (for instance, one qubit in Dublin and the other in New York), measurements of both would yield the same result. This would enable the ultimate in secret communications, a shared knowledge between two parties that cannot be discovered by a third. The resulting ability to code and decode messages would be one of the most powerful features of the quantum internet.

There will be no shortage of commercial applications for these advanced cryptographic mechanisms. The world of finance, in particular, looks set to benefit as the quantum internet will lead to enhanced privacy for online transactions and stronger proof of the funds used in the transaction.

Recently, at the CONNECT Centre in Trinity College Dublin, we successfully implemented an algorithm that could achieve this level of security. That this took place during a hackathon a sort of competition for computer programmers shows that even enthusiasts without detailed knowledge of quantum physics can create some of the building blocks that will be needed for the quantum internet. This technology wont be confined to specialist university departments, just as the original internet soon outgrew its origins as a way to connect academics around the world.

But how could this quantum internet be built anytime soon when we currently can only build very limited quantum computers? Well, the devices in the quantum internet dont have to be completely quantum in nature, and the network wont require massive quantum machines to handle the communication protocols.

One qubit here and there is all a quantum communication network needs to function. Instead of replacing the current infrastructure of optical fibres, data centres and base stations, the quantum internet will build on top of and make maximum use of the existing, classical internet.

With such rapid progress being made, quantum internet technology is set to shape the business plans of telecom companies in the near future. Financial institutions are already using quantum communication networks to make inter-bank transactions safer. And quantum communication satellites are up and running as the first step to extending these networks to a global scale.

The pipes of the quantum internet are effectively being laid as you read this. When a big quantum computer is finally built, it can be plugged into this network and accessed on the cloud, with all the privacy guarantees of quantum cryptography.

What will the ordinary user notice when the enhanced cryptography of the quantum internet becomes available? Very little, in all likelihood. Cryptography is like waste management: if everything works well, the customer doesnt even notice.

In the constant race of the codemakers and codebreakers, the quantum internet wont just prevent the codebreakers taking the lead. It will move the race track into another world altogether, with a significant head start for the codemakers. With data becoming the currency of our times, the quantum internet will provide stronger security for a new valuable commodity.

Read more here:
Quantum internet: the next global network is already being laid - The Conversation UK

Read More..

Sophos Cloud Optix breakthrough IAM visualization is here – Naked Security

Today is a great day. Huge, in fact. Today we have improved security for everyone running workloads on public cloud environments.

Managing user roles, permissions, and role-based access to AWS services is an enormous challenge.

The scale and interwoven nature of individual and group access to services means that organizations often a) cant accurately see how their services can be accessed, and b) dont proactively manage it, thus creating an endless loop back to a).

And heres the obvious punch line attackers will exploit that gap in security. We saw this happen in a recent high-profile public cloud attack that exploited overprivileged user access to obtain 40,000 Social Security numbers and 80,000 bank account numbers.

We werent recognized as a winner among the most advanced cloud technology players for nothing.

Cloud Optix IAM Visualization is a breakthrough for organizations that manage infrastructure on AWS. It enables customers to easily visualize the relationships between IAM roles, IAM users, and services.

This innovative and differentiated new feature will allow security teams to identify high risk users who have access to multiple services that they rarely or never need.

It helps answer questions like: Which IAM users in my AWS account have access to the S3 service, which might contain sensitive data? Which EC2 server instances can access the RDS service your customer database? And much more. This helps organizations reduce their attack surface in the cloud dramatically.

The latest security enhancements to Sophos Cloud Optix go even further to provide more depth than ever.

Sophos Cloud Optix security-focused spend monitoring now makes daily and monthly cloud spend monitoring a breeze by identifying unusual activity that could indicate abuse, such as cryptojacking in AWS, Azure, and GCP cloud accounts.

It highlights top services contributing to spend, allowing for faster decisions on whether increased spend equals malicious activity, and provides customizable spend threshold alerts for visibility.

As organizations look to expand in the cloud and take advantage of cloud-native workloads, such as containers, they should be aware of the techniques that cybercriminals use to target hidden gaps in security responsibilities and misconfigurations.

Cloud Optix has provided automatic discovery of an organizations assets across AWS, Microsoft Azure and Google Cloud Platform, and Infrastructure as Code environments for some time and added support for Native Kubernetes and Googles managed Kubernetes Engine (GKE) in late 2019.

And now, support for Amazons managed Elastic Kubernetes Service (EKS) has landed. Azure AKS managed Kubernetes service is hot on its heels and on its way soon.

Amazon EKS nodes are now included in the topology visualization, as well as real-time inventory views of clusters, node groups, nodes, pods, containers, services, and more, while also enabling organizations to perform additional security benchmark checks on these container environments.

Todays Cloud Optix release is also packed with several new features to increase security and compliance of customer environments:

1. Sophos Cloud Optix has been certified by the Center for Internet Security (CIS)

Weve been given this certification to accurately assess AWS and GCP system conformance with the security recommendations of the CIS Benchmark profile.

By certifying Cloud Optix with CIS, were demonstrating our commitment to actively solving the foundational problem of ensuring secure standard configurations are used by customers.

CIS Certified Security Software Products demonstrate a strong commitment to provide customers with the ability to ensure their assets are secured according to consensus-based best practice standards:

2. Superior public cloud traffic analysis

This helps organizations to analyze outbound traffic anomalies with visibility of destination IP addresses including ISP, organization, country, and region.

Watch the Superior public cloud traffic analysis video.

3. Azure VM Scale Sets inventory

Youll be able to see that hosts are part of Scale Sets, and filter to see hosts within a specific VM Scale Set.

4. Add AWS environments using AWS CloudFormation (in preview) as an alternative to running a script using the AWS CLI, or Terraform.

Sophos Cloud Optix is the ideal solution for organizations using or moving to the public cloud. It provides organizations with the continuous analysis and visibility needed to detect, respond, and prevent security and compliance risks that could leave them exposed.

But, we get it, building the business case for a CSPM solution like Cloud Optix can be a challenge.

So, checkout out the Sophos ROI calculator. It gives you a helping hand to solve that challenge.

Use it to calculate the saving in time and energy costs that your organization could make with Cloud Optix, and get our handy business case whitepaper.

Read more here:
Sophos Cloud Optix breakthrough IAM visualization is here - Naked Security

Read More..