Page 2,650«..1020..2,6492,6502,6512,652..2,6602,670..»

Connecticut Becomes Third State to Incentivize Cybersecurity Best Practices for Businesses – PRNewswire

HARTFORD, Conn., July 12, 2021 /PRNewswire/ -- Connecticut Governor, Ned Lamont signed HB 6607, "An Act Incentivizing the Adoption of Cybersecurity Standards for Businesses" into law last week. The bill, introduced by Representative Caroline Simmons, prohibits the Superior Court from assessing punitive damages against an organization that implements reasonable cybersecurity controls, including industry recognized cybersecurity frameworks such as the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) and the Center for Internet Security (CIS) Critical Security Controls (CIS Controls).

The Connecticut bill states that in the result of a data breach of personal and restricted information, the court may not assess punitive damages if the organization created, maintained, and complied with a written cybersecurity program containing administrative, technical, and physical safeguards for protecting PII and restricted information.

"It is critically important to do a better job of protecting businesses and consumers against cyber-attacks," said Representative Simmons. "In Connecticut, we took a step to accomplish this voluntarily without regulation by incentivizing organizations to adopt cyber best practices, like the NIST framework and the CIS Critical Security Controls."

Connecticut joins Ohio and Utah in legislative efforts to adopt an incentive-based approach for businesses to implement cybersecurity best practices.

"Cybersecurity is largely unregulated today; there is no national statutory minimum standard of information security, making it difficult to improve cybersecurity on a wholesale basis," said CIS Executive Vice President & General Manager, Security Best Practices, Curtis Dukes. "Connecticut's cybersecurity bill introduces a critical interim step: incentivizing the adoption of cyber best practices like the CIS Controls, to improve cybersecurity and protect citizen data."

The CIS Controls are a set of internationally-recognized, prioritized actions that form the foundation of basic cyber hygiene and essential cyber defense. Applying the CIS Controls provides a critical, measurable security value against a wide range of potential attacks. Analysis shows that implementing the CIS Controls mitigates the majority of cyber-attacks when evaluated against attack patterns in the widely referenced ATT&CK framework published by the MITRE Corporation. Specifically, the CIS Controls mitigate:

Further, Implementation Group 1 (IG1), a subset of the Controls that is considered basic cyber hygiene, is effective in mitigating:

Under the bill, organizations have to conform with revisions and amendments to identified industry-recognized cybersecurity frameworks (like the CIS Controls), laws, and regulations within six months after the revised document is published.

The bill becomes law on October 1, 2021.

About CIS:The Center for Internet Security, Inc. (CIS) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation. We are a community-driven nonprofit, responsible for the CIS Controls and CIS Benchmarks, globally recognized best practices for securing IT systems and data. We lead a global community of IT professionals to continuously refine these standards to proactively safeguard against emerging threats. Our CIS Hardened Images provide secure, on-demand, scalable computing environments in the cloud. CIS is home to the Multi-State Information Sharing and Analysis Center (MS-ISAC), the trusted resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities, and the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC), which supports the cybersecurity needs of U.S. elections offices. To learn more, visit CISecurity.org or follow us on Twitter: @CISecurity.

Media Contact: Autum Pylant [emailprotected]518-266-3495

SOURCE Center for Internet Security

Here is the original post:
Connecticut Becomes Third State to Incentivize Cybersecurity Best Practices for Businesses - PRNewswire

Read More..

Israeli company is behind malware that affected Windows PCs: Microsoft – WION

Microsoft believes malware used to infect PCs running its Windows operating system was created by an Israeli organisation.

Microsoft is taking a new effort to reduce internet security issues.

The company has also been looking for government-backed hackers, such as the Chinese organisation Hafnium, which it believes is responsible for attacks on its Exchange Server email software.

The problem was only recently rectified by Microsoft, and it took them a long time to resolve, with several people claiming that it was ineffective for their experience.

The threat actors were revealed to be from the private sector, and the company launched an inquiry to learn more about their genuine motives.

Microsoft's investigation into their latest breach and zero-day vulnerability came from an Israeli private sector business called "Sourgum," according to the company's blog post.

Watch: India rolls out new education policy, teams up with Microsoft

The company in question is a PSOA, or private sector offensive actor, intending to sell "cyberweapons" to its clients to hack them.

Another group discovered in the investigation is known as "Candiru," and they have been related to Sourgum with regards to the recent Microsoft attack.

While the motives of Candiru are unknown, it poses a direct threat to Microsoft and would be subject to an inquiry in the hopes of apprehending the perpetrator.

(With inputs from agencies)

Continued here:
Israeli company is behind malware that affected Windows PCs: Microsoft - WION

Read More..

In the News: Self-Employment is Best for Mental Health – Small Business Trends

To say the past 18 months with COVID-19 have been stressful for business owners is a huge understatement, which has shined the impact the pandemic has had on mental health. The 2021 Self-Employed Mental Health Report produced by Freshbooks in partnership with Mind Share Partners, sheds some light on the issue. And according to the report, people that are self-employed have experienced fewer mental health symptoms.

The data is in this weeks lead roundup up article,Self-employed Faring Better Mentally in Pandemic. The survey of 2,000 self-employed individuals also reveals72% say their mental health is either good or very good. And a total of 85% of small business owners say self-employment is the best form of employment for mental health. This is despite the many challenges brought on by the pandemic. Only 10% of the small business owners say their mental health was very poor.

In addition to this article, this week you can take a look at how to protect your business from cyber attacks by reading about the partnership between McAfee and Visa as well as how to sell your domain names with GoDaddys List for Sale service.

Take a look at the rest of the roundup.

As cybersecurity breaches continue to lead the news, McAfee and Visa have announced the formation of a new partnership. In this agreement, McAfee is going to offer internet security solutions to Visa Business cardholders. McAfee and Visa Partnership to Protect Small Businesses The goal of the partnership is to help protect Visa Business cardholders in North America and EMEA.

If you have domain names you are not using, GoDaddy is making it easy to sell them with List for Sale. This is a tool/service that lets you sell any unused domain names you have easily and quickly as a GoDaddy customer. GoDaddy Launches List for Sale to Sell Domains The goal of List for Sale is to simplify the cumbersome process of selling a domain name online.

If you run a handmade products business, one of the best ways to grow your business is to offer customers new and innovative products. By taking online craft classes, you can not only create more products for your business, but learn new skills that can help you come up with craft ideas to sell.

Have you ever come out of an important meeting feeling confused or frustrated? Was there ever an occasion where you found it difficult to explain yourself to a colleague or customer? When it comes to communication, theres no one-size-fits-all style. All of us communicate differently and sometimes this difference can make matters difficult for your business.

Internal customer service involves everything an organization can do to help their employees fulfill their duties, reach their goals and enjoy their work. It covers how different departments communicate with each other and how individuals interact with their colleagues, subordinates and superiors.

Have you ever wanted to create a captivating photo slideshow? A photo slideshow can be a useful tool to organize and engage with your audiences by letting you deliver compelling stories. Through the use of photo slideshows, you get to provide information via images about your products and services while expanding your brands reach.

You probably hate sales. You think its low or beneath you. Deep down you may believe if you have the best product or service in the marketplace, it will sell itself. More likely, you dont like sales because you have a fear of rejection. On The Small Business Radio Show this week, I talk with Tom Stern who says he was the black sheep in a family of lions.

Image: Depositphotos

See the original post:
In the News: Self-Employment is Best for Mental Health - Small Business Trends

Read More..

How accounting firms can protect against remote work security threats – Accounting Today

The COVID-19 pandemic has fundamentally changed the way people work. Millions of employees have been able to stay productive while working from home during the lockdowns thanks to remote collaboration technologies like Zoom, WebEx and Teams. Very quickly, virtual meetings became ever-present, and people could connect with their managers and clients or give presentations from any location with internet access, including other countries. Even as much of the country returns to business (mostly) as usual, firms instituting flexible or work-from-home policies may need to review their telecommuting policies and practices to help keep data safe.

While working from home has been key to business continuity over the last 15 months, it has also opened up some potentially major security issues for firms. In an office setting, there are multiple ways to secure data, including firewalls and physical security measures such as badges, doors, locks and keys. However, remote employees could be working from their homes, their cars, or at a local coffee shop. They have laptops, mobile phones, tablets and smartwatches all of which communicate with each other and could use several different services (Wi-Fi, Bluetooth, cellular data, RFID).

Being outside a secure office makes these employees, and their data that is, your data and your clients data vulnerable to data leaks and hacks. Even something like a chat or text message could contain confidential information, such as a Social Security number, birth date, tax information, or even medical information.

This is why robust data security is vital for any company. Data breaches that compromise client or employee data are notoriously costly, averaging over $3.9 million in 2020. They not only hurt a firm's reputation and bottom line but can also result in the theft of client information, proprietary information or intellectual property. Think of all the due diligence-related information your firm has on clients who might be preparing for an IPO or merging with another company.

It's these risks, by the way, that drove the American Institute of CPAs to add to its Code of Professional Conduct Confidential Client Information Rule 1.700.001, which deals with disclosure of confidential client information without the specific consent of the client. This rule goes hand in hand with Internal Revenue Code Sec. 7216, where failure to comply can lead to fines and other consequences.

It is against that background that all firms must make a concerted effort to be vigilant about protecting their data and their clients data. Accounting firm leaders must recognize the issues affecting their firms and take measures to educate their professionals. With that in mind, here are a few practical ways to help secure access to data, stay compliant, and mitigate the damage in the event of a breach.

Encryption is your friend

You may have outfitted all of your employees with laptops and a secure virtual private network. While a VPN might be enough protection when employees use their devices on a secure home network, what if theyre traveling or decide to work in a cafe? Many hotels, airports and cafes offer free Wi-Fi, but these unsecured networks can allow hackers to gain access to data that is supposed to be secure. A VPN may protect outbound data, but it still leaves the laptop or tablet itself vulnerable via other potentially active services such as Bluetooth, hotspots or RFID. Encrypting the device itself will make it much harder for criminals to access the data.

Encryption can also help protect a device if it is physically stolen. Unattended computers, tablets or mobile phones are tempting targets for thieves. With the device in their possession, the thief could have a treasure trove of confidential information they can sell or use to scam your clients. If a device is encrypted, the data is safe, and you only lose the device. It could mean the difference between $1,000 or $1,000,000.

Turn off services

Mobile devices are designed to make communication easy. This is a double-edged sword, however, unless there are security protections in place. For example, virtually all mobile devices have Bluetooth, and a growing number can be used as internet hotspots or have radio frequency identification (RFID) technology built right in. If these services are turned on, a hacker could potentially compromise the device. While these services can be beneficial, they do not need to be active 24/7. All employees should be instructed to turn them off until they are needed, especially while traveling.

Make sure to back up your data

With millions of Americans telecommuting, tens of millions of laptops and other devices are floating around filled with potentially sensitive data. This creates a greater chance that data could be lost if a device is lost, stolen or damaged. Employees should back up their devices daily, or at the very minimum, weekly, so the information will remain accessible if there is a catastrophic failure. Moreover, it is vital that employees restrict backups solely to company-approved destinations (e.g., cloud storage, on-premises servers, encrypted hard drives). If they make a backup to another location, it exposes their organizations to a potential data breach they have no control over.

As a firm leader, you should work with your IT team to ensure the mobile devices with access to firm information use properly containerized apps such that your firms data is automatically backed up, even if the rest of the devices data is not. Note that even email and everyday collaboration tools are loaded with documents and sensitive data that could be easily leaked. To reiterate, always (1) encrypt the devices and (2) back up important information.

A few decades ago, it was practically unthinkable that employees would have access to a secure server from their home, or for them to be a potential target for hackers. Accounting firm leaders must adapt their security practices to the time and, perhaps most importantly, educate employees about cybersecurity. Even with just these three relatively simple steps, firms can significantly reduce the chances of being subject to a costly data breach or cybercrime incident.

See more here:
How accounting firms can protect against remote work security threats - Accounting Today

Read More..

It started life behind the Iron Curtain – now UK-listed Avast could become the latest to succumb to a US takeover – Sky News

Another day and another leading UK company is in talks to be taken over.

This time, it is Avast, the cyber security provider and one of the biggest tech companies listed on the London Stock Exchange.

Avast, which floated on the stock market in May 2018 and which was promoted to the FTSE 100 in June last year, confirmed overnight it is in "advanced" talks to sell itself to its US rival Norton LifeLock.

Shares of the company, which have doubled in value since the flotation, have surged by 13% on the news.

Avast, whose stock market valuation at the close on Wednesday evening was 5.2bn, is expected to be taken out at a value close to 5.9bn.

That would represent a decent premium to the price at which the shares have changed hands during the last five months or so but would nonetheless still represent a modest discount to the price at which they were trading in July and August last year.

A deal, on top of swoops for UK-listed companies such as John Laing, St Modwen, Signature Aviation, Spire Healthcare, Aggreko and the recent deal agreed for Morrisons, is sure to provoke more anguished discussion.

There is a growing sense among some politicians and some in the media, as well as in fund management circles, that the boards of many UK-listed companies are agreeing too readily to takeovers by foreign buyers and, in particular, to takeovers by private equity firms.

It may be harder to build such a sense of outrage in the case of Avast, however, since it is not exactly a company that is draped in the Union Jack.

The company's global headquarters is in Prague, where the vast majority of its 1,700 employees worldwide are based, with just 100 or so in the UK.

Nonetheless, Avast's decision to list not in New York but in London was a welcome boost to the latter's tech credentials, while its takeover would reduce the ranks of "pure" tech companies in the FTSE to just two - the engineering software group Aveva and the accounting software group Sage.

It would also deprive the UK market of what has been an inspiring story.

Avast emerged from a workers co-operative called ALWIL which was founded in then-Communist Czechoslovakia in 1988 a year before the fall of the Berlin Wall.

After the collapse of Communism, the co-operative's founders, computer scientists Eduard Kucera and Pavel Baudis, set it up as a company, having already made their names defeating a computer virus called the Vienna bug.

The business had to fend off unwanted takeover approaches from rivals such as McAfee and at one point came close to collapse after struggling to conquer the United States.

The company's fortunes turned around when, in 2001, it adopted a freemium business model, making the most basic version of its anti-virus software free to download, but charging for premium services and selling corporate licences.

Less than three years later, its software had been downloaded by more than one million people.

It now boasts an estimated 435 million users around the world and more than 13 million of them are paying customers.

The company was a beneficiary of the pandemic, putting on more than one million such paying customers during 2020, partly because of a rise in demand from people working from home and seeking extra security for their phone or telephone.

It is also a business that values continuity in more ways than one: the current chief executive, Ondrej Vlcek, joined the business as an 18-year old intern more than 25 years ago and has remained there ever since.

A takeover is not yet a done deal.

While there has been an increase in competition in the cyber security sector in recent years, with Microsoft in particular taking market share, competition regulators around the world may take a dim view of two such well-known players in the anti-virus space getting together and particularly as both have strong positions in the consumer market.

Some investors may also demand more of a premium: analysts at Berenberg bank told clients this morning that "nothing short of a $10bn (7.2bn) valuation is fair to Avast's shareholders".

That may ultimately come down to Mr Baudis and Mr Kucera who, respectively, have 25% and 10% stakes in the business.

Mr Vlcek owns a further 2.3% stake.

Norton's approach is also likely to spark interest from private equity companies.

Avast could probably live with such an ownership structure as it has experience of it.

When it came to market it was 23% owned by CVC Capital Partners.

But management would be justified in pushing for a higher price.

Avast is already growing strongly in a lot of markets around the world.

Mr Vlcek noted in March, at the company's results presentation, that it had, in the previous 12 months, enjoyed a 33% rise in customers in Mexico, 19% growth in Brazil, 17% growth in Argentina and 16% growth in Ukraine.

That growth is only going to accelerate as the 'Internet of Things' (IoT) takes off and everyday items like fridges and cookers become potentially more susceptible to hacking attacks.

Avast may not be one of the best-known companies in the FTSE 100.

But it will be missed if it is taken over.

Read this article:
It started life behind the Iron Curtain - now UK-listed Avast could become the latest to succumb to a US takeover - Sky News

Read More..

How the internet censorship world turned on NetBlocks | WIRED UK – Wired.co.uk

WHO DO YOU ask to find out if the government of Ethiopia has really shut down the internet? If Facebook is blocked in India? Or if Wikipedia is unreachable from Venezuela? For the past few years, the answer to all those questions has been NetBlocks.

Since its launch in 2016, the London-based outfit has alerted the world to all and every internet incident. Whenever a ruler, junta or strongman tampers with a countrys connectivity, NetBlocks will be tweeting about it, publishing graphs and reports showing how the disruption unfolded. Day after day, crisis after crisis, NetBlockss alerts pour in, almost a fixture of the age of internet censorship.

The groups rise has been unstoppable. It has over 125,000 followers on Twitter and its posts can rake in thousands of retweets and tens of thousands of likes. Articles citing NetBlocks have appeared in The New York Times (at least 15 articles), CNN (over 150 times), BBC (over 100), and WIRED (at least ten stories). United Nations documents about the scourge of internet censorship include links to NetBlocks, as do working papers by the governments of the UK and the US. Yet, as NetBlocks has attained stardom among internet-watchers, a question has rumbled on: how does it know that the internet is down?

Its a seemingly simple question with a complex answer. Several experts in the internet measurement sector have spent years scratching their heads at the vagueness of the organisations explanations of its methods and have continually called for more transparency. To those pleas, NetBlocks and its firebrand British-Turkish founder, Alp Toker, have replied with defensiveness and accusations of unfair competition.

But, even as other specialists worry about NetBlockss lack of transparency, attention-seeking, and potentially unethical practices, the companysmedia cachet has never been stronger. Governments across the globe are increasingly turning to internet shutdowns and censorship to oppress their citizens. In parallel, the internet measurement community is engaged in a battle, unevenly fought, to discover, document, and report the truth with accuracy and prudence. For this community, the behaviour of a fast-moving, fiercely competitive startup like NetBlocks raises questions not just about the truth but also who gets to tell it and how. And, at the centre of this row is a crisis that affects us all: who monitors the internet monitors?

ON DECEMBER 15, 2019, Collin Anderson an American researcher with a decade of experience investigating internet censorship fired off a fusillade of tweets revealing a security flaw that he believed posed a risk to internet users in repressive countries. In this case, he claimed, the danger did not come from state-backed snoopers or ruthless security services: Anderson was pointing the finger at NetBlocks, the self-styled internet observatory. And he had a stark warning: NetBlockss website could be dangerous.

[NetBlocks] is running undisclosed experiments that could endanger people, Andersons tweet read. Without their permission, visitors to [NetBlocks] are forced to conduct censorship measurements. When a user opened netblocks.org, a series of inconspicuous scripts in the pages source code would hijack his or her browser and have it connect to dozens of websites, including social media, news outlets, internet forums, and websites selling VPNs, among others.

NetBlockss script could gauge what was blocked and where: if the browser of someone in, say, France, reported back that it could not connect to Twitter, that would provide NetBlocks with useful data. Andersons view was that it was unethical. Not only were these tests conducted without the users express consent; worse, Anderson thought they could put people in danger. If someone whose internet traffic was already being monitored by an oppressive government were to access netblocks.org, Anderson argued, their unwitting connection to certain websites for instance US-backed Voice of America, or the controversial imageboard 4Chan, both among the checked websites might put a target on their backs. That was not just a speculative scenario: in 2016, Turkey jailed 150 teachers who had been reportedly tracked down because they used a texting app linked to president Recep Tayyip Erdogans arch-rival Fethullah Gulen. Anderson was categorical. [NetBlocks] should stop immediately, he signed off his thread.

View post:
How the internet censorship world turned on NetBlocks | WIRED UK - Wired.co.uk

Read More..

Fastly Announces Two New Appointments to Board of Directors – Business Wire

SAN FRANCISCO--(BUSINESS WIRE)--Fastly, Inc. (NYSE: FSLY), provider of an edge cloud platform, today announced that it has appointed Paula Loop, previously an assurance partner at PwC and the leader of PwCs Governance Insights Center and Charles Meyers, President and Chief Executive Officer of Equinix, to its board of directors effective July 8, 2021. These independent director appointments increase Fastlys Board of Directors to nine members.

I am thrilled to welcome Paula and Charles to the Fastly Board as we continue building and delivering a more trustworthy and secure Internet for all, said Artur Bergman, Executive Chairperson of Fastly. Their expansive experience across consumer, retail, and internet, paired with their deep commitment to Fastlys values, make them exceptionally qualified to serve and further advance our vision of combining edge computing and security together to create the best of the Internet.

Paula Loop said, I am delighted to be joining the outstanding Fastly team. With Fastlys focus on growth and on supporting businesses through their digital transformation journeys, Im looking forward to leveraging my background in corporate governance on the Board.

Charles Meyers said, Fastlys leadership position in the market and strong focus on combining edge computing with security makes it an exciting time to help steward the company towards continued growth and further success. I look forward to bringing my experience in scaling high-growth technology companies to the Fastly Board.

After conducting an extensive search, our Committee unanimously recommended Charles and Paula to the Fastly board. We're confident that they will be outstanding independent directors, making the interests of our shareholders and stakeholders a priority," said Aida Alvarez, Chair, Nominating and Corporate Governance Committee.

Paula Loop joined PwC in 1983 and most recently served as the Leader of PwCs Governance Insights Center, where she provided guidance to numerous boards. She previously served as PwCs New York Metro Assurance Leader and prior to that as the US and Global Talent Leader. Paula brings expertise in corporate governance, technical accounting, and SEC and financial reporting matters. She currently serves on the board of Robinhood Markets Inc. and is a member of the Value Reporting Foundation Board.

Charles Meyers is the President and Chief Executive Officer of Equinix, the worlds digital infrastructure companyTM. He previously served as President, Strategy, Services & Innovation, as well as Chief Operating Officer, after joining Equinix in 2010 as President, Americas Region. Meyers also previously held senior operating roles at Level 3 Communications and Verisign and was a member of the pre-IPO executive team at Internet Security Systems.

About Fastly

Fastly helps people stay better connected with the things they love. Fastlys edge cloud platform enables customers to create great digital experiences quickly, securely, and reliably by processing, serving, and securing our customers applications as close to their end-users as possible at the edge of the internet. Fastlys platform is designed to take advantage of the modern internet, to be programmable, and to support agile software development with unmatched visibility and minimal latency, empowering developers to innovate with both performance and security. Fastlys customers include many of the worlds most prominent companies, including Pinterest, The New York Times, and GitHub.

This press release contains forward-looking statements that are based on our beliefs and assumptions and on information currently available to us on the date of this press release. Forward-looking statements may involve known and unknown risks, uncertainties, and other factors that may cause our actual results, performance, or achievements to be materially different from those expressed or implied by the forward-looking statements. These statements include, but are not limited to, statements regarding our ability to develop edge computing and security products, our ability to invest in our platform for future growth, and our ability to deliver on our long-term strategy. Except as required by law, we assume no obligation to update these forward-looking statements publicly or to update the reasons actual results could differ materially from those anticipated in the forward-looking statements, even if new information becomes available in the future. Important factors that could cause our actual results to differ materially are detailed from time to time in the reports Fastly files with the Securities and Exchange Commission (SEC), including in our Quarterly Report on Form 10-Q for the fiscal quarter ended March 31, 2021. Copies of reports filed with the SEC are posted on Fastlys website and are available from Fastly without charge.

Source: Fastly, Inc.

Read the original here:
Fastly Announces Two New Appointments to Board of Directors - Business Wire

Read More..

MAGA-Branded ‘Freedom Phone’ Is a Black Box That Should Be Avoided at All Costs – Gizmodo

Screenshot: YouTube/YourVoice Network, Inc

Be it Parler, Gab, or GETTR, recent times have seen no shortage of dollar-sign-eyed entrepreneurs looking to capitalize on conservative Americas disdain for liberal Silicon Valley. It was only a matter of time before someone tried to invent the MAGA phone.

Er, make that...the Freedom Phone. The device, which launched Thursday, is the product of Erik Finman, a 22-year-old crypto-millionaire who says that he wants Americas patriots to take back control of their lives from the tech oligarchy. Finmans phone, which costs $499, claims to offer conservatives a way to be free of Big Techs spying and censorshipthough it is radically vague on the details. Like a random handgun, the phone should be treated as if it were loaded and dangerous because we simply dont know whats under the hood.

Freedom Phone claims that it can protect users from the data collection that comes with an iOS or Android operating system (it has something called a FreedomOSwhich, ironically, just appears to be a modified version go Googles Android OS). The phone is also meant to liberate users from Big Techs alleged ideological preferences: it has an uncensorable app store (called the PatriApp, lol), where it is apparently impossible for apps to get booted no matter how unsafe or horrendous they are.

The device also comes pre-loaded with a host of privacy features (Signal, DuckDuckGo, Brave), as well as a suite of apps that seem tailor-made for Trump voters: Parler, One America News Network, Newsmax, and Rumble are all included.

This is the first major pushback on the Big Tech companies that attacked us - for just thinking different, Finman tweeted Thursday morning. Were finally taking back control. Other right-wing influencers and commentators could also be seen promoting the product on their channels.

G/O Media may get a commission

Yet while the product is being sold as an escape from Big Techs nefarious oversight, in reality, it appears to be a budget phone from Asia that may end up compromising buyers autonomy rather than protecting it.

Before we get into the specifics of why this device probably sucks, let me just say that the desire to have a phone that is dedicated to protecting your autonomy and privacy is a reasonable oneand should be encouraged. That said, I dont think the Freedom Phone provides that. Actually, aside from its overt partisan bent, its impossible to tell what kind of device this is because Finman and his acolytes havent provided any information about it.

Lets start with the website (freedomphone.com). Hilariously, it provides literally zero specs about the actual device. There is no information about the phones operating system, storage, camera, CPU, or RAM capabilities. It has a list of features, but there are no actual details about them. Instead, under each feature, theres merely a Buy it now button which redirects you to the sites shopping cart. The phones hefty price, combined with the companys total lack of transparency, is ridiculousessentially asking the buyer to cough up half a grand in exchange for, uh, something! We sent an email to Freedom Phone to ask for further information and will update this story if they ever respond.

The fact that the device is essentially a black box also makes it a potential security (and thus also privacy) nightmareand once again, it should be treated that way until proven otherwise. In fact, based on the assessment of some security professionals who have scoped it out, the Freedom Phone should be avoided at all costs.

Matthew Hickey, the co-founder of Hacker House and longtime cyber professional, said that, while it hasnt been confirmed, the Freedom Phone would appear to be a cheap Android device sourced from Asiathe likes of which could be vulnerable to all assortment of supply chain risks and other issues.

Based on photographs from the company website a number of Internet sleuths identified that the device has the same form-factor, shape, and appearance of a Umidigi A9 Pro, said Hickey, via email. This device is a drop-shipped customizable Android-based phone that can be ordered from ASIAPAC region and customized to a projects requirements, he said, clarifying that such devices can be bought and shipped in bulk with custom logos and branding so as to give the appearance of a phone that has been designed for a unique purpose but is actually just a common cheap Android-based smartphone with core components produced in Taiwan and the surrounding areas. Its also very cheap: the A9 Pro is currently available for about $120, much less than the Freedom Phones $500.

According to The Daily Beast, Finman confirmed that the device he was selling was made by Umidigi but couldnt say what specific model it was.

On top of everything, Freedom would also appear to be using a CPU from Taiwan produced by Mediatek, the likes of which is popular in low-end Android-based devices and is known to be buggy, said Hickey.

Historically Mediatek devices have shipped with a wide number of insecure configurations and are prone to trivial vulnerabilities that allows anyone with physical possession of such a device to read/write the data on the phone through its early bootloader, Hickey said. They make phones specifically to permit high customization and as such many of the vendors own software [that] can be used to manipulate the devices, which is why such hardware is popular in countries like North Korea as often the security enabled by a user can simply be circumvented by a state operative, he added.

Nothing screams freedom like products popular in the DPRK.

The funny thing is, if Trump voters are looking for a way to get off the Big Tech grid, theres no need for them to buy this sketchy shit. There are actually entire subcultures within the phone industry dedicated to escaping the Android/iOS paradigm. You can wade into the de-Googled phone sector, for instancewhere Android phones are sold that have ostensibly been refurbished to rid the devices of code that will send your personal data back to the tech giant. Theres also the Linux-based Pinephone, which sells at a fraction of the Freedom Phones cost (between $150 and $200), and is a favorite of those in the privacy community. All of these come with caveats, obviously, but the point is that there are much more transparent and affordable options than the Freedom Phone.

Of course, total security and privacy arent really what the Freedom Phone is about. For Finman and his company, its just a cash-in on the growing conservative demand for products that are brand MAGA. For the customers, meanwhile, buying a phone like this is a statement of identitya consumer choice that brings with it a sense of community, as well as a chance to give a big middle finger to the commercial and cultural establishment that they feel has repudiated them.

Itd be nice if Americans could actually come together around the issue of privacy since its an area whereregardless of political partywere all collectively getting screwed. However, something tells me the Freedom Phone isnt exactly a harbinger of thatmore the opposite.

Read the original here:
MAGA-Branded 'Freedom Phone' Is a Black Box That Should Be Avoided at All Costs - Gizmodo

Read More..

Ransomware as a Service is becoming a trend. Heres what these ASX cyber stocks do to … – Stockhead

Malware attacks and ransoms are becoming even more of a concerning trend lately.

The latest high profile attack was on Florida-based Kaseya, which was delivered a ransom demand of US$70 million by a purported hacker group from Russia calling itself REvil.

Although the ransom has not been paid, what made this attack particularly troubling is that Kaseya provides managed services to smaller clients that might not be so well resourced with tech departments of their own.

The company admitted that up to 2,000 of its clients computers might have been compromised in the attack.

But how do these threat actors gain access, and who are they?

According to experts, REvil actors can target a network via a number of potential entry point.

They could use a previously compromised login credentials to gain remote access, or a malicious email attachment that a user downloads.

In recent attacks however, REvil was able to bypass the networks security by targeting the very systems used to protect customers from malicious software, such as system update files.

The hackers success has given rise to a new industry and criminal networks that essentially take a percentage of the ransom price in return for whats called Ransomware as a Service (RaaS).

Essentially, RaaS is a subscription-based model that enables affiliates to use already-developed ransomware tools to execute ransomware attacks, who then earn a percentage of each successful ransom payment.

This year alone, REvil has been able to extort millions of dollars from its nefarious activities, with the last ransom of US$11 million being paid to the group by the worlds largest meat processing company, JBS.

The group has now grown to become a big operation, and is said to be working out of an unknown base in Russia.

The most recent high-profile cyber attack to hit our shores was one committed on ASX-listed aged care provider, Regis (ASX:REG).

In August last year, Regis announced that it had lost data to an overseas actor which had also started leaking it.

Regis said it was hit using the Windows Maze ransomware, but had apparently refused to pay the undisclosed ransom demanded.

In January this year, corporate regulator ASIC said its systems were breached by an external actor who stole data containing attachments to Australian credit licence applications.

No ransom demand was made in that incident.

Following the attacks, the Australian government set up a website and advised companies not to pay the ransoms, explaining there was no guarantee that paying it will fix devices or prevent future attacks from the same group.

Speaking in parliament this year, Home Affairs Minister Karen Andrews said she was considering forcing businesses to report ransomware attacks.

Many businesses who have been subject to a ransomware attack are not necessarily forthcoming in providing that information, Andrews said.

That could be for a number of reasons theyre concerned about the implications of it being well known that they have been subject to attack, that some of the data has been lost, and that theyre unable to recover that data.

To address these attacks, the Morrison government has announced the nations largest ever investment in cyber security promising $1.35 billion in funding over the next decade to enhance our cyber security capabilities, and assistance provided to Australian companies.

Although each of these ASX-listed companies has a different focus and tech capabilities, they are allset to benefit from the new government funding:

Senetas (ASX:SEN)

The companys subsidiary Votiro owns the software tools that protect against malware and ransomware attacks.

Founded in Israel, Votiro has developed the technology that has the ability to proactively eliminate all known and unknown threats hidden in files.

According to Senetas, Votiros secure file gateway is the only SaaS-based file security solution that ensures all files coming into an enterprise are safe from malware threats and particularly ransomware.

Tesserent (ASX:TNT)

Tesserent is a pure-play cyber-security stock, providing Internet Security-as-a-Service for a customers computer infrastructure.

Its currently the largest provider of cybersecurity services to the Australian Federal government.

The company provides a one-stop shop for a full, end-to-end cybersecurity solution which includes cyber strategy consulting and digital forensics.

archTIS (ASX:AR9)

This data-centric security technology company will prevent malicious and accidental loss of information for its clients.

archTIS products include Kojensi, a multi-government certified platform for the secure access, sharing and collaboration of sensitive and classified information.

Whitehawk (ASX:WHK)

Whitehawk is thefirst global online cyber security exchange marketplace.

The company offers an online toolthat enables small and midsize businesses to take immediate action against cybercrime, fraud, and disruption.

Hubify (ASX:HUB)

Hubify specialises in business connectivity across mobile, data, voice, cloud solutions, and of course, cyber security.

Its other offerings include managed networks, global wi-fi, and hosted voice.

At Stockhead, we tell it like it is. While archTIS is a Stockhead advertiser, it did not sponsor this article.

Get the latest Stockhead news delivered free to your inbox.

It's free. Unsubscribe whenever you want.

You might be interested in

Read the original:
Ransomware as a Service is becoming a trend. Heres what these ASX cyber stocks do to ... - Stockhead

Read More..

Startup hopes the world is ready to buy quantum processors – Ars Technica

Early in its history, computing was dominated by time-sharing systems. These systems were powerful machines (for their time, at least) that multiple users connected to in order to perform computing tasks. To an extent, quantum computing has repeated this history, with companies like Honeywell, IBM, and Rigetti making their machines available to users via cloud services. Companies pay based on the amount of time they spend executing algorithms on the hardware.

For the most part, time-sharing works out well, saving companies the expenses involved in maintaining the machine and its associated hardware, which often includes a system that chills the processor down to nearly absolute zero. But there are several customerscompanies developing support hardware, academic researchers, etc.for whom access to the actual hardware could be essential.

The fact that companies aren't shipping out processors suggests that the market isn't big enough to make production worthwhile. But a startup from the Netherlands is betting that the size of the market is about to change. On Monday, a company called QuantWare announced that it will start selling quantum processors based on transmons, superconducting loops of wire that form the basis of similar machines used by Google, IBM, and Rigetti.

Transmon-based qubits are popular because they're compatible with the standard fabrication techniques used for more traditional processors; they can also be controlled using microwave-frequency signals. Their big downside is that they operate only at temperatures that require liquid helium and specialized refrigeration hardware. These requirements complicate the hardware needed to exchange signals between the very cold processor and the room-temperature hardware that controls it.

Startup companies like D-Wave and Rigetti have set up their own fabrication facilities, but MatthijsRijlaarsdam, one of QuantWare's founders, told Ars that his company is taking advantage of an association with TU Delft, the host of the Kavli Nanolab. This partnership lets QuantWare do the fabrication without investing in its own facility. Rijlaarsdam said the situation shouldn't be a limiting factor, since he expects that the total market likely won't exceed tens of thousands of processors over the entirety of the next decade. Production volumes don't have to scale dramatically.

The initial processor the company will be shipping contains only five transmon qubits. Although this is well below anything on offer via one of the cloud services, Rijlaarsdam told Ars that the fidelities of each qubit will be 99.9 percent, which should keep the error rate manageable. He argued that, for now, a low qubit count should be sufficient based on the types of customers QuantWare expects to attract.

These customers include universities interested in studying new ways of using the processor and companies that might be interested in developing support hardware needed to turn a chip full of transmons into a functional system. Intel, for example, has been developing transmon hardware control chips that can tolerate the low temperatures required (although the semiconductor giant can also easily make its own transmons as needed).

That last aspectdeveloping a chip around which others could build a platformfeatures heavily in the press release that QuantWare shared with Ars. The announcement makes frequent mention of the Intel 4004, an early general-purpose microprocessor that found a home in a variety of computers.

Rijlaarsdam told Ars that he expects the company to increase its qubit count by two- to four-fold each year for the next few years. That's good progress, but it will still leave the company well behind the roadmap of competitors like IBM for the foreseeable future.

Rijlaarsdam also suggested that quantum computing will reach what he called "an inflection point" before 2025. Once this point is reached, quantum computers will regularly provide answers to problems that can't be practically calculated using classical hardware. Once that point is reached, "the market will be a multibillion-dollar market," Rijlaarsdam told Ars. "It will also grow rapidly, as the availability of large quantum computers will accelerateapplication development."

But if that point is reached before 2025, it will arrive at a time when QuantWare's qubit count is suited for the current market, which he accurately described as "an R&D market." QuantWare's solution to the awkward timing will be to develop quantum processors specialized for specific algorithms, which can presumably be done using fewer qubits. But those won't be aren't available for the company's launch.

Obviously, it's debatable whether there's a large market of companies anxiously awaiting the opportunity to install liquid helium dilution refrigerators in their office/lab/garage. But the reality is that there is almost certainly some market for an off-the-shelf quantum processorat least partly composed of other quantum computing startups.

That's not quite equivalent to the situation that greeted the Intel 4004. But it may be significant in that we seem to be getting close to the point where some of Ars' quantum-computing coverage will need to move out of the science section and over to IT, marking a clear shift in how the field is developing.

Listing image by QuantWare

See more here:
Startup hopes the world is ready to buy quantum processors - Ars Technica

Read More..