Page 4,230«..1020..4,2294,2304,2314,232..4,2404,250..»

What Cryptocurrency Can Teach Us About Political Governance …

Popular Posts:Recent Posts:

Its a marvel to me to witness what is happening on planetEarth as it regardscryptocurrencies. Satoshi Nakamoto, whoever or whatever he/she/zhe is, began a revolution as big as the wheel and the printing press and the Internet that came before it, or so it seems to me.

With cryptocurrency, nobody can implement their preferred change arbitrarily.

MichaelWuensch / Pixabay

Over $93 billion dollars, and counting,have poured into the cryptocurrency market since Bitcoin wasreleased in 2009. Millions of individuals have come together without central direction to build this worldwide phenomenon.

Changes are happening every day that have global ramifications, all of which are happening without permission by governments, and often in spite of governments supposed authority to control other people. That is trulyawesome.

There is governance, to be sure, as it regards cryptocurrencies, but such governance is without centralized structure. Cryptocurrency manipulation must follow specific rules, and changing those rules requires popular acceptance by users and stakeholders of each given cryptocurrency. Nobody can implement their preferred change arbitrarily. The only thing arbitrary about cryptocurrencies is ones desire to get involved in the hundreds of different systems, and once involved, they must follow the rules.

Nobody can implement their preferred change arbitrarily. The only thing arbitrary about cryptocurrencies is ones desire to get involved in the hundreds of different systems, and once involved, they must follow the rules.

I think theres a model here for political governance, or in others words, governance around the idea that people have rights, and those rights should be protected, with physical violence if necessary. While people mostly agree that behaviors such as murder, rape, robbery, assault, and battery are undesirable and we all should be protected from them, theres a lot of disagreement on the smaller stuff, like whos entitled to what, provided by others that havent themselves committing any of the foregoing behaviors (ie. crimes). Thats not to say that people dont disagree on the big stuff, but the disagreement is morea matter of definition than of undesirability.

The only thing arbitraryabout cryptocurrencies is once involved, one must follow the rules.

Who should decide which entitlements should be enforced? The current model says that for a givenarbitrarily-derivedgeographical area, one entity should decide, even when a party to thedispute and that entity may be influenced in any number of ways. In other words,one size fits all, like it, leave it, or hope you get enough popular support to change it.

Next Page

Read more:
What Cryptocurrency Can Teach Us About Political Governance ...

Read More..

Cryptocurrency skeptics warn of another dot-com bubble, but remember: That’s where Amazon and Google started – CNBC

Oaktree's Howard Marks sounded a general alarm last week about the state of stock markets, private equity, credit markets and for good measure new digital currencies like bitcoin and ethereum. Essentially, he wrote in his letter to investors that everything is overvalued.

On the cryptocurrencies, he went further. He stated several times that they're "not real." Furthermore, he said, they are "nothing but an unfounded fad (or perhaps even a pyramid scheme)."

Cryptocurrencies may indeed be in the biggest valuation bubble since the dot-com era.

At the same time, there is undeniable excitement about their potential today among the top tier of venture capital investors.

Former PayPal COO David Sacks, who was also an early investor in Airbnb, Facebook, Palantir, SpaceX and Uber, tweeted last week that cryptos are the best candidate we've had for the next big thing in Silicon Valley (Web 3.0):

When I read Marks' comments about bitcoin not being real, I thought back to an interview I did with the CEO of McEwen Mining four years ago:

Any currency exists only because at least two parties (a buyer and a seller) agree that it represents value. So, what constitutes money? On a South Pacific island, we might agree that chicken bones are a currency. In prison, we might agree that cigarettes are a currency. Today, while we all use fiat or paper currencies as money, a medium of exchange, there is a growing concern about the value of these pieces of paper.

I don't see why Bitcoin can't also grow and become another viable currency, an internet based currency. If enough people accept it, it will be used. It seems to have momentum behind it and it's intriguing how it's truly separate from any country or central banks' manipulation and control.

There will be growing pains, like the guy who lost money out of his electronic wallet because he left his computer on all night. Also, Bitcoin will spawn competitors, alternative digital currencies. I think it's a mistake to write off this currency as a bubble or fad.

Will it threaten gold? I don't think so. I think the two will grow in tandem as alternative currencies to fiat currencies.

In the dot-com era of the late '90s, there were many warning signs of a huge bubble that was about to pop including:

By contrast, few people are quitting their jobs to start cryptocurrency companies (yet). Day trading is rare. Taxi drivers aren't asking about bitcoin.

If cryptocurrencies are a bubble, we're still in the early innings.

But there are signs of frothiness:

Bitcoin in 2017 is as real as Amazon or Priceline was in 1999.

Both those great companies had their stocks get killed when the dot-com bubble burst, but they used the nuclear winter they faced in the next few years to make themselves more profitable and take market share that they would never give back.

Amazon dropped from $76 per share (in today's post-split share value) at the end of 1999 to less than $6 after the Sept. 11, 2001, attacks. Amazon trades now over $1,000/share.

Priceline went from $283 a share at the end of 1999 to less than $8 three years later. Today, it trades above $2,000.

No doubt many of this year's batch of ICOs, as well as dozens of other existing cryptocurrencies, will disappear in the coming years as things settle out.

But if you listen to Marks' advice and tune out the crypto space, you'll miss the ICO equivalents of Amazon and Priceline. Will ethereum be the next Google? Or the next Lycos?

More importantly, what will be the magnitude of growth from here? Bitcoin has grown from nothing to nearly $3,000 today (after a big pullback when it first hit $1,000 a few years ago). But where will it be in five, 10 or 15 years from now? And will it pull back to below $1,000 again before it breaks out to new highs?

To discard all cryptocurrencies as Marks did in his letter would be a big mistake. There is real value in these digital currencies.

Commentary by Eric Jackson, sign up for Eric's monthly Tech & Media Email. You can follow Eric on Twitter @ericjackson .

Visit link:
Cryptocurrency skeptics warn of another dot-com bubble, but remember: That's where Amazon and Google started - CNBC

Read More..

Controversial US Sanctions Bill Calls for Cryptocurrency Research – CoinDesk

A foreign sanctions bill signed into law by U.S. President Donald Trump included a little-noticed provision on cryptocurrencies.

The U.S. Congress cleared thebill late last month imposing sanctions on Russia, Iran and North Korea. It was a politically controversial development, given ongoing investigations into Russian interference in the 2016 presidential election, and the stated opposition of the Trump administration to the legislation.

Trump ultimately signed the bill into law last week, though he sharply criticized the measure in an accompanying signing statement.

Notably for the blockchainindustry, however, is that the billincludes a mandate for the development of a national security strategy aimed at "combating the financing of terrorism and related forms of illicit finance."

One provision, which focuses on research into "illicit finance trends," mentions cryptocurrencies asan area of study.

The textcalls for:

"[A] discussion of and data regarding trends in illicit finance, including evolving forms of value transfer such as so-called cryptocurrencies, other methods that are computer, telecommunications, or internet-based, cybercrime, or any other threats that the Secretary may choose to identify."

The initial draft strategy is due to Congress within the next year, according to the bill's text, and is set to include input from US financial regulators, the State Department and the Department of Homeland Security, among others.

In some ways, the new billechoes anothersubmitted in May as part of a wider Department of Homeland Security legislative package.

That measure, as CoinDesk reported at the time, calls for research into the potential use of cryptocurrenciesby terrorists. Like the DHS bill, the new sanctions law doesn't constitute a shift in policy, but rather indicates that Congress is taking steps to explore the issue more closely.

Donald Trump imagevia Shutterstock

The leader in blockchain news, CoinDesk is an independent media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. Have breaking news or a story tip to send to our journalists? Contact us at [emailprotected].

See the article here:
Controversial US Sanctions Bill Calls for Cryptocurrency Research - CoinDesk

Read More..

Hedge Funds Investing in Cryptocurrencies ‘Exploding’ 62 in Pipeline – Bitcoin News (press release)

With this years incredible gains in the price of bitcoin, the number of hedge funds with exposure to cryptocurrencies is exploding. Fund administrator MG Stover & Co, accounting firm Auther Bell, and law firm Cole-Frieman & Mallon alone have62 in the pipeline.

Also read:Hedge Funds Are Quietly Investing in Bitcoin

As the prices of bitcoin and other cryptocurrencies skyrocket, a large number of traders are seeking to launch hedge funds investing in them. Hedge Fund Alert recently reported that the number of hedge funds investing in digital currencies is exploding. The publication quoted CPA Corey Mclaughlin, managing member at Auther Bell, who said:

Ive been in the hedge fund space since 1998, and Ive never seen anything like it in volume of launches in a particular area. Its just crazy.

Matt Stover, founder of MG Stover & Co,shared the sentiment. This is the first time I can remember where we have had a hard time keeping up with the sales calls, he said.

Institutional investors are surprisingly interested in cryptocurrencies, according to hedge fund lawyer Karl Cole-Frieman. I wasnt expecting so many institutional players to be interested in the asset class, he was quoted saying. Recently, news.Bitcoin.com reported that hedge funds are quietly investing in bitcoin. With this years explosive gains in the price of bitcoin, Hedge funds that offer cryptocurrency exposure are seeing windfall gains.

Among client funds administered by MG Stover & Co., 12 of them are running digital-currency strategies. The firm has also made agreements to service 25 more, the publication detailed. Arthur Bell is working with about 15 fund managers on cryptocurrency funds and expects to take on 20 more in the near future. Meanwhile, Cole-Frieman & Mallon has helped set up 7 cryptocurrency funds this year and has 17 more in the pipeline. Altogether, 62 new cryptocurrency hedge funds will be brought the market by these three firms alone.

Among the new entrants, there are both those simply taking long bets on bitcoinas well as those devising hedge fund-like strategies, such as capturing the arbitrage among various currencies, the publication conveyed. Bitcoins value has risen over 200% this year.

I think the majority of these cryptocurrency [funds] are trying to ride the opportunity du jour, noted Neal Berger, founder of investment advisory firm Eagles View Capital. Its an access point for people who cant buy it themselves or dont want to learn how to do it.Former Goldman Sachs executive Matthew Goetz, co-founder at Blocktower Capital, described:

Its a wildly inefficient market where alpha potential is abundant more than anything weve seen in our careers. We think its a rare opportunity for investors. Its not often theres a new capital market being born in front of you.

How do you think the many hedge funds entering the space will affect the price of bitcoin? Let us know in the comments section below.

Images courtesy of Shutterstock

Need to calculate your bitcoin holdings? Check our tools section.

Continued here:
Hedge Funds Investing in Cryptocurrencies 'Exploding' 62 in Pipeline - Bitcoin News (press release)

Read More..

Bitdefender Internet Security 2016 – PCMag India

When a security company like Bitdefender packs its antivirus utility with so many features that it starts to resemble a suite, you have to wonder what else it'll find to add in its actual security suite. Never fear: In addition to the cornucopia of features offered by Bitdefender's standalone antivirus, Bitdefender Internet Security adds a spam filter, a two-way firewall, a file encryption utility, and more. It's an excellent full security suite, and it remains an Editors' Choice.

At first glance, the only way to tell this suite from the company's standalone antivirus software is by reading its title bar. Its main window has the same big status indicator, the same Autopilot indicator, and the same buttons to launch scans and dig in to various protection components. The color scheme is likewise the same, with light-colored text on a background decorated in shades of gray.

The difference becomes evident when you click for a deeper view of the program's features. On the Protection Features page, the antivirus advises you to upgrade if you want firewall and spam filtering. File encryption, webcam protection, and parental control display a similar message on the Privacy Features page. These features are fully available in this product, Bitdefender's entry-level security suite.

You will still find a page of tools not offered in this suite: OneClick Optimizer, Startup Optimizer, Anti-Theft, and Disk Cleanup. To get those goodies, you must upgrade to Bitdefender's feature-packed mega-suite, Bitdefender Total Security.

At $59.99 per year for a single license and $79.99 for three licenses, Bitdefender costs about the same as Kaspersky and ESET. Suites can be had for less, but few deliver the wealth of features found in Bitdefender. McAfee Internet Security deserves special mention. For the same price as a Bitdefender three-license subscription, McAfee lets you install protection on every Windows, macOS, Android, and iOS device you own.

Naturally, every security feature found in Bitdefender Antivirus Plus also comes with Bitdefender Internet Security. I'll summarize my findings here, but for a full understanding of those shared features, you should read my review of the antivirus.

I follow regular test reports from five antivirus labs around the world. All five include Bitdefender in their testing, and it scores at or near the top in almost all of them. For example, Advanced+ is the best rating available from AV-Comparatives, and Bitdefender received that rating in all four of the tests that I follow. It also took an AAA certification, the best of five possible certification levels, from SE Labs in England.

Also from England, MRG-Effitas tests products against banking malware and against a broad-spectrum malware collection. Rather than reporting grades or percentages, this lab's tests are more like pass/fail, with many products failing. Bitdefender passed both tests.

Test experts at AV-Test Institute evaluate antivirus products and assign up to six points for Protection, Performance, and Usability. A tiny slip in Usability brought Bitdefender's total score to a still-excellent 17.5, rather than the perfect 18 points achieved by Avira, Kaspersky, and Trend Micro.

Bitdefender's aggregate score, based on tests from all of the labs, is 9.8 of 10 possible points. Kaspersky's score came out the same. Avira Total Security Suite managed a perfect 10, based on results from just three labs.

Bitdefender didn't do as well in my hands-on malware protection test, taking 7.1 of 10 possible points. Tested with the same samples, Emsisoft managed 9.4 points. However, when my tests don't jibe with the lab results, I defer to the labs. Bitdefender did successfully protect against 91 percent of the malware-hosting URLs I threw at it.

Cyber crooks who create phishing websites avoid the tedious task of coding up malware, choosing instead to attack the user's gullibility with fraudulent websites that resemble secure login pages. In my antiphishing test, Bitdefender earned a new high score, with a detection rate 12 percent higher than that of long-time phishing protector Norton. Kaspersky and Webroot are the only other recent products that have outscored Norton. Bitdefender Antivirus for Mac also beat Norton, but only by 5 percentage points.

Bitdefender's web protection also extends to marking up dangerous links in search results. As with Norton's similar feature, you can click through to get more detail. Where Symantec Norton Security Deluxe presents specific threats found on the page, Bitdefender identifies it as a malware-hosting page, a phishing fraud, or any of a dozen-odd other types of online fakery.

In addition to the expected quick and full malware scans, Bitdefender offers a Rescue Mode that reboots your PC into an alternate operating system, allowing it to remove even the most resistant malware. It also scans the system for security vulnerabilities, including such things as weak passwords and missing security patches.

The suite offers some key bonus features as well. Bitdefender's Wi-Fi security advisor pops up a warning when you connect to an unsecured hotspot. Bitdefender Home Scanner isn't actually part of the antivirus, but you can install it for free and run it to check the security of every device connected to your network.

If you read the news, you know there's a growing need for ransomware protection, above and beyond basic malware scanning. Bitdefender's Safe Files feature keeps ransomware at bay by forbidding unauthorized access to your important documents. This feature also appears in Bitdefender Antivirus for Mac.

Other bonus features shared by the antivirus and this security suite include: Wallet, a simple password manager; Safepay, a hardened browser for your sensitive transactions; and File Shredder, for permanently deleting sensitive documents. File Shredder becomes even more useful in this suite, as I'll explain below, the File Encryption section of this review.

See How We Test Security Software

The idea that some internet creep could connect to your webcam and spy on you is enough to give anyone the shivers. In a nod to the need for spyware protection, Bitdefender now includes a webcam protection component. Like the similar feature in Kaspersky, it limits webcam access to trusted programs, either programs like Skype that are already on its list or ones that you've approved. When a new program attempts webcam access, you choose whether to allow that access or not.

Bitdefender's Mac antivirus doesn't offer this feature, which makes senseneither does the Windows antivirus. Webcam protection exists in Kaspersky Internet Security for Mac, but it's a simple on-off switch, without the system of trusted applications found in the Windows product.

Bitdefender's firewall correctly blocked the web-based attack tests I threw at it, and put all of the test system's ports in stealth mode. I should point out that if your computers are behind a home router, the built-in Network Address Translation already gives them a similar degree of protection. In order to even test network attacks, I have to use a test system that's configured to go through the router's DMZ port, with no protection from NAT.

The flip side of firewall protection involves controlling how programs on your system make use of your internet and network connection. In Autopilot mode, Bitdefender's firewall configures access permissions for known programs and monitors unknowns for any signs of network chicanery. Norton works in much the same way, and the levels-of-trust system in Kaspersky Internet Security is also similar.

Early personal firewalls used to rely on the user to make a security decision every time an unknown program attempted internet access. Few users relished the resulting blizzard of popup queries, and even fewer were actually qualified to make an informed choice. Bitdefender does let you enable this level of control, but the name of the feature suggests a certain bias by the designersParanoid Mode. The non-paranoid majority can let the firewall simply take care of business.

Bitdefender doesn't attempt to block exploit attacks at the network level, but the same webpage protection that detects and averts malware-hosting URLs and phishing URLs also handles some exploit attacks. To test this feature, I hit the test system with about 30 exploits generated by the CORE Impact penetration tool. It successfully detected and blocked 41 percent of them, and in almost every case identified the attack by its official CVE number. That's a better detection rate than most products. Norton holds the best score among current products, with 63 percent detection. Because the test system is fully patched, even attacks not blocked by the firewall didn't actually penetrate security.

Self-defense isn't precisely a firewall featureit affects the entire security suite. But historically it showed up first as a feature of personal firewalls, and certainly a security product that can be disabled, crashed, or otherwise defeated by malware is not doing well. I couldn't find any way to disable Bitdefender by tweaking Registry settings; that trick hardly ever works. Trying to kill its two core processes just got me the peremptory message, "Access denied."

When I tried to disable it by attacking its Windows services, results were slightly different from my last attempt. I did successfully stop two helper services, but doing so had no effect on protection. As for the three essential services, I couldn't stop them, and I couldn't change their status so they'd be disabled on reboot. This firewall is as durable as ever.

If you get your email through a web-based service like Gmail or Yahoo, you don't see a lot of spam, because the provider filters it out. The same is probably true if you have Exchange-based email from your workplace. But if you don't have that upstream filtering, you need a local spam filter to avoid having your inbox overwhelmed by spam and scams. Bitdefender's spam filter does the job, provided that your email account uses the standard POP3 protocol.

The spam filter integrates with Microsoft Outlook and Mozilla Thunderbird. From its toolbar, you can mark spam messages that got past the filter, or valid messages that were filtered in error. You can also click to put a sender on the Friends or Spammers list. Those using a different email client must create an email rule to route marked spam messages into their own folder, and manage the Friends and Spammers lists from within Bitdefender itself.

If you do use the toolbar to mark a missed spam message, Bitdefender asks for permission to send that message in for analysis in the cloud, thereby improving the filter. I suggest tweaking the settings so it always sends missed spam messages for analysis. It also asks for permission to send valid messages that were mismarked as spam, but that seems like a bad idea. Do you really want Bitdefender sending your personal email for analysis?

ZoneAlarm's spam filter features many pages of configuration choices. Avast Premier and Quick Heal let you determine how aggressively the filter acts. With Bitdefender, there are next to no settings. You might consider setting it to block emails using Cyrillic or Asian character sets, if you don't expect to get legitimate mail using those character sets.

Do you have any documents on your computer that you wouldn't like anyone else to see? Yeah, you probably do. A data-stealing Trojan that somehow got past Bitdefender's defenses could hoover them up and transmit them to its master. If you step away from the computer without locking the desktop, a nosy relative or co-worker could view your secrets with impunity. If you'd rather not take that risk, protect your sensitive data using encryption.

As with ESET Internet Security, AVG, and others, Bitdefender's encryption system works by creating encrypted storage volumes. These volumes, called vaults, look like any other disk drive once opened with a password. You can freely move files into and out of the vault, create new files, edit files, anything you could do in a physical drive. But once you lock the vault, its contents become completely inaccessible.

You can create as many vaults as you think you'll need. For each vault, you define a name, accept or change the location for the file representing the vault, and set the vault's size100MB is the minimum. You can assign the vault a specific drive letter or just let Bitdefender pick a letter, starting at Z: and working down. Don't forget the password. Without it, your files become so secret that not even you can access them.

As I mentioned earlier, the File Shredder component becomes even more useful in this suite. Hiding your secret files in encrypted storage is pointless if you leave the unsecured originals out in the open. And deleting those files, even if you bypass the Recycle Bin, still allows the possibility of forensic recovery. For maximum security, then, you should copy sensitive files into a vault and then shred the originals.

Kaspersky's similar feature makes shredding the originals part of the process. Note, though, that this feature doesn't appear in Kaspersky's entry-level suite, only in Kaspersky Total Security.

There's a panel for Parental Advisor in the main window's Privacy Features page, but when you click to configure this feature, it takes you to your Bitdefender Central account online. Online configuration makes sense, because the parental control system works on all the Windows, Android, iOS, and (new this year) macOS devices your child uses. There's no limit on the number of children, or the number of devices per child, though you can't assign a single device to more than one child. Note, too, that iOS support is limited to location-related tracking.

To start, you enter the child's name and birthdate and choose a photo. Next, you identify which devices this child uses. For Windows and macOS devices, you can also choose the user account. Installing on a Mac is a simple matter of installing Bitdefender Antivirus for Mac (either directly or by sending an email with installation details) and associating that Mac with the child's account. On an Android or iOS device, you download the parental component from the appropriate app store, log in with your Bitdefender account, and associate the device with a child profile.

Bitdefender names this feature an advisor rather than calling it parental control. In the same vein, instead of talking about blocking content categories, it refers to "interests monitoring." However, the effect is much the same. If you choose to block any of the 42 interests, Bitdefender blocks sites that match. It pre-configures which to block based on the birthdate you entered for each child, but you can freely change those settings. This feature affects Windows, macOS, and Android devices.

When Bitdefender blocks access to a site in a Windows or Android browser, it displays a page with a very simple message, stating that the page "has been blocked by your parents." On the Apple MacBook Air 13-Inch that I use for testing, I observed that the message comes as a slide-in notification.

In testing with popular browsers, I found that Bitdefender also blocked secure anonymizing proxy websites. That's important, because access to a secure anonymizing proxy would let a clever teen totally evade content filtering. I also found that Bitdefender blocked unwanted sites in an unknown browser, one that I coded myself. However, using the combination of an unknown browser and a secure anonymizing proxy, I managed to slip the bonds of parental control. Admittedly, this is a scenario that few kids could manage.

The Parental Advisor monitors applications that your child uses on each Windows, macOS, or Android device. On the Activity page, you can view which apps the child used, with a link that jumps to the Applications page. Preventing use of an application is a simple matter of clicking it from On to Off on that page. Note, though, that only apps used within the last 48 hours (and apps already blocked) appear in the list. If you encounter a situation where your teen is evading the content filter as just described, all you need do is block use of the unknown browser. Don't worry; your child can't hoodwink this feature by copying or renaming the blocked application.

Managing when the kids go online can be as important as managing what they do on the web. In the previous edition, Bitdefender allowed parents to define a device-free bedtime time span, separately for weekdays and weekends. This edition adds a full-week scheduler for device access, with the option to set a device-use cap for weekdays and weekends. I found that during a scheduled no-device time, I could log in to Windows with a child's account, but couldn't run any programs. On Android, Bitdefender just prevents online access, since the child might need to phone home. The daily cap works across devices, so a child who runs out of time on an Android tablet can't just log in on a Windows box to get back online. The time scheduling feature doesn't apply to iOS devices or Macs.

Social media tracking specifically keeps an eye on your child's Facebook account. You can log in to the child's account and install it, if you know the password. Otherwise, you can send an email asking the child to install it. Clearly, you need cooperation to use this feature, though you do get a warning if the child uninstalls it. From Bitdefender Central you can view info, likes, and photos, or open the child's account directly.

If you've associated a mobile device with a child profile, you can define geographic areas as safe or restricted, and get a notification when your child enters or leaves one of these areas. The child can also tap a button in the app to report safe arrivalthis check-in feature is new with the current edition. Parents can also check the location of a child's Android device independently of defined locations. I installed the parental app on a Nexus 9, defined safe and restricted zones, and toodled around town to see this feature in action. It worked just fine.

One final feature works very specifically with Android phones. Parents can monitor the child's phone-call or text contacts, and can block any contacts they deem undesirable. There's also an option to refuse connection to calls that have caller ID suppressed. The Android device I used for testing is a tablet, not a phone, so I couldn't actively put this feature to the test. However, I did observe that Bitdefender imports the child's contact list so parents can view the list and preemptively block undesirables.

You may have noticed that I didn't mention iOS much in the feature descriptions above. Indeed, the iOS app does very little. It reports when your child passes the border of a defined area, and it receives the child's safe arrival notification. That's about all. To be fair, parental control is tough to implement on iOS, but other vendors, including Kaspersky, have managed to do quite a bit more.

If you need parental control as part of your security suite, and your kids don't use iOS devices, Bitdefender most definitely delivers. This edition is even better than the last, with useful additions like full-week scheduling of device use, support for macOS, and the mobile feature that lets your child check in on arriving safely. Norton and Kaspersky are among the few that do even more than Bitdefender, and Check Point ZoneAlarm Extreme Security licenses the well-known Net Nanny. All too many suites include parental control that's limited, porous, or both.

The days of resource-gobbling security suites that dragged down computer performance are over. I hardly ever see any serious slowdowns in my simple performance tests. Bitdefender's effects were measurable in some of the tests, but not hugely so.

Getting security up and running when the system boots can take time. My boot time test measures how long it takes from the start of the boot process (as reported by Windows) until the system is ready to use. My metric for readiness is 10 seconds in a row with no more than five percent CPU usage. I run the test dozens of times on a clean, physical computer, then install the security suite and again run multiple tests. Comparing the before and after averages, I come up with a performance-hit value.

The boot process took 44 percent longer with Bitdefender installed. That might sound like a lot, but the actual time difference was just a bit over 30 seconds. Given that many of us never reboot except when forced to, that's not so bad.

Performance Results Chart

A drag on ordinary file manipulation activities could be more significant than a boot-time slowdown, so I test those as well. One test times a script that moves and copies an eclectic collection of files between drives. The other times a script that zips and unzips that same collection. Bitdefender had no measurable effect on the zip/unzip test, and the file move and copy test ran just one percent slower with Bitdefender active.

Bitdefender's average for the three tests came in at 15 percent, which is not bad. However, many suites have done even better. Coming in with the very lightest touch, Webroot SecureAnywhere Internet Security Plus and adaware antivirus total didn't produce a measurable slowdown in any of my tests.

At the core of Bitdefender Internet Security, you find an award-winning antivirus and a strong, silent firewall, but these two are supported by an amazing cast of characters. In addition to the simple spam filter, enhanced parental control, and top-notch phishing protection, you get webcam safety, ransomware protection, file encryption, and much more.

Bitdefender Internet Security is a PCMag Editors' Choice for entry-level security suites. It shares that honor with Kaspersky Internet Security. With either of these suites, you can count on excellent, comprehensive security.

Sub-Ratings:Note: These sub-ratings contribute to a product's overall star rating, as do other factors, including ease of use in real-world testing, bonus features, and overall integration of features.Firewall: Antivirus: Performance: Privacy: Parental Control:

See original here:
Bitdefender Internet Security 2016 - PCMag India

Read More..

Project Manager – Amazon, Google, Microsoft Cloud Hosting – Dorking and Leatherhead Advertiser

Project Manager - Amazon, Google, Microsoft Cloud HostingFarnboroughCirca 35,000 + Perks + Fun Workplace

We're seeking a talented individual to Project Manage cloud hosted technology solutions serving the needs of our partners and clients - modern, creative digital agencies and their brands.

This newly created role will take responsibility for the successful oversight and delivery of all client web technology projects and consultancy Amazon, Microsoft, Google Cloud and dedicated hardware.

We're looking for a true team collaborator that:-

+ Thrives on being client facing and working across the business+ Relishes orchestrating a diverse range projects from contract to go live+ Has agency/brand side knowledge of web infrastructure and related technologies+ Knows how to manage key dependencies in the lifecycle of a project+ Is familiar with swift planning and management of commercial resources

You'll possess a winning personality, be grounded in practical common sense, and be the solid enabler with the ability to bridge communications effortlessly across Tech, Service, Clients and Suppliers.

You'll have a strong desire to progress your professional career in project management, perhaps transitioning from a software/hardware role, having found your passion for empowering tech teams to succeed.

We are rich in technology leadership to support your development, with super engaged tech founders who empower the whole organisation to stay ahead of the curve in today's digital landscape. Most importantly there's plenty of scope for a talented individual to grow in this role.

Our office overlooks the private jet runway at Farnborough airport, and we have great benefits including free parking, mid-week team lunches plus a great social environment with film nights, drone club and team nights out organised by our very own Ministry of Fun.

Why not reach out and explore with us?

As a minimum we're looking for:-

+ 2 years diverse technology project experience in a customer facing role+ Knowledge & understanding of web-related technology services+ Proven ability to build and manage flexible project frameworks free of bureaucracy+ Confident & neutral project management outlook

We are an equal opportunities employer and welcome individuals who are in possession of the appropriate requirements to work within the UK/EU.

You may have worked in the following capacities:Technology Project Manager, Managed Services Project Manager, IT Services Project Manager, Hosting Project Manager, Cloud Services Project Manager, Project Coordinator.

Interested? Just Apply Below...

In 2005 we ripped up the rule book to deliver a recruitment agency experience that makes everyone feel just that little bit happier. By applying you consent to us processing & passing your application to our client for review for this vacancy only. If your skills match the role you will hear back from us within 2 business days. Good luck, Team RR.

See more here:
Project Manager - Amazon, Google, Microsoft Cloud Hosting - Dorking and Leatherhead Advertiser

Read More..

From Public Cloud to Hybrid IT Straight From the Horse’s Mouth – InfoWorld

By Gary Thome, VP and Chief Engineer, HPE Software-Defined and Cloud Group

People who bet on horse races know that the most reliable information about a horse will come from those who are closest to that horse -- a trainer or someone working in the stable. The idiom, straight from the horses mouth, implies that someone has gotten even better information a tip from the horse itself!

Over the past two months, Ive been writing articles about common public cloud concerns and why hybrid IT gives you the right mix of public cloud, private cloud, and on-premises solutions. Of course, I dont expect you to take my word for it. But maybe you will take advice from those who tried public cloud and have since moved to hybrid IT.

In this article, Ive complied a few quotes from a variety of organizations of all sizes and industries. Each has experienced public cloud and now has moved to hybrid IT. So here you go advice that is straight from the horses mouth:

Public cloud performance issues

Were moving some of our web infrastructure workloads back to our own data center. Performance was the big issue. Lack of communication from our public cloud provider led to a customer-facing outage we could not have prevented. Now were seriously rethinking our entire cloud strategy and are moving more workloads back on-prem. Social media company

Were bringing back apps that we had put on the public cloud and didnt go as planned because of reduced performance when compared to when they were on-prem. That said, there are other apps we feel are truly more cloud-ready, and were trying those out in the cloud so we can have what we deem to be a truly hybrid solution. Financial Services company

Public cloud cost concerns

We opted to be bleeding-edge and move to cloud when storage and hypervisor license costs were on the climb. It seemed to be a better way to keep costs in an opex mode and know what they were. That worked slightly at first. We used a lot of IaaS and SaaS within AWS. As we grew, the usage did too and the bills grew far faster. We honestly reached a tipping point when billing started to approach $100,000 per month. We had good financial outcomes moving on-prem with a hybrid solution so we can access cloud when we choose. We now have two times the horsepower on-prem for half the cost. Social Media company

One of the biggest issues driving declouding for us is that, to be honest, the initial move to the public cloud was done willy-nilly. We moved the workloads and then we moved the apps to run off those workloads. But we didnt really think about how to stage properly, how to control usage costs, and how to design an exit strategy. We quickly learned that cloud costs were far higher than we expected. Retail company

Public cloud control concerns

Flexibility is important. With a private cloud, we get the control and flexibility of a dedicated environment thats tailor-made to address our specific IT needs. For fast-growing companies like ours with constantly changing requirements, a private cloud offers more flexibility to adapt and evolve as the company changes. Social Media company

The data we hosted on AWS was growing exponentially, as all data does, and that increased costs. Public cloud hosting served its purpose when we entered the all-cloud (for the most part) approach, but then you hit this point where it doesnt make financial or operational sense any longer, when the same thing can be accomplished on-prem for less money and less hassle. Having the workloads back on-site gave us better control over usage, and we could better see spikes in activity. Public Sector company

The benefits of Hybrid IT

Many businesses have already started to move beyond the public cloud into a new era of hybrid IT that combines public cloud, private cloud and traditional IT. New offerings such as hyperconverged and composable infrastructure offer cloud-like capabilities on-premises solutions that can provide businesses more control, greater performance, less cost, and less risk than many public cloud options. A combination of on-premises, software-defined options within a private cloud seamlessly combined with public cloud lets businesses build the best possible infrastructure for their individual workloads.

The lower cost of storage, servers, and even better servers that require less hypervisor licenses made it less costly than it once was to scale out a data center or private cloud on-site. Energy company

Organizations all over the world are taking a closer look at their applications and deciding which ones should be in the public cloud and which ones should remain on traditional IT or a private cloud. Although performance, cost and control issues are all relevant, you should also consider the business model of each workload in your decision.

HPE has assembled an array of resources to help you transition to a brand-new hybrid IT world. You can learn more about HPE composable infrastructure powered by Intel by reading the e-book,HPE Synergy for Dummies, or learn about HPEs approach to hybrid cloud by checking out the HPE website,Project New Hybrid IT Stack. And to find out how HPE can help you determine a workload placement strategy that meets your service level agreements, visitHPE Pointnext.

The rest is here:
From Public Cloud to Hybrid IT Straight From the Horse's Mouth - InfoWorld

Read More..

Australia: Shelve Proposed Law to Weaken Encryption – Human Rights Watch (press release)

(Sydney, August 7, 2017) The Australian government should not force technology companies to weaken the security of their products or to subvert encryption, Human Rights Watch said last week in a letter to Prime Minister Malcolm Turnbull. That strategy would undermine cybersecurity for all users and would not stop determined criminals from using encryption.

On July 14, 2017, Turnbull announced new legislation to require device manufacturers and internet companies to provide appropriate assistance to intelligence and law enforcement agencies to access encrypted communications. Turnbull, along with Attorney General George Brandis and the acting commissioner of the Australian Federal Police, Michael Phelan, stated that encryption was thwarting the governments ability to monitor and investigate serious crime.

Governments are obliged to investigate and prosecute serious crimes, but any policy response should not do more harm than good, and needs to be effective, said Elaine Pearson, Australia director at Human Rights Watch. Unfortunately, Prime Minister Turnbulls proposal may fail on both counts and could undermine cybersecurity and human rights worldwide.

Governments have many ways to sharpen investigatory capability without undercutting the security of ordinary users, Human Rights Watch said. They could invest in modernizing investigation techniques and increasing resources and training in tools already at their disposal, consistent with human rights requirements. Any limitations encryption poses to police capabilities are greatly offset by the explosion of new kinds of investigatory material enabled by the digital world, including location information and vast stores of metadata that are not encrypted.

The Australian government previously proposed a coordinated approach to encryption at a June 26 meeting of the Five Eyes intelligence partnership, which also includes the United States, United Kingdom, Canada, and New Zealand, and the July 5 G20 summit. The prime minister provided few new details about the proposed legislation in the news conference to announce the legislation. When asked what kind of assistance companies would be required to provide, Turnbull said that he did not seek a back door into encrypted services, but nonetheless expected companies to ensure access to all data in unencrypted form.

However, for end-to-end encrypted applications like WhatsApp or iMessage or data stored on iPhones, companies cannot turn over unscrambled data nor the encryption keys, even with a court order, because they do not retain the keys. Only the sender and recipient can unscramble the information. The only way for companies to access unencrypted data is to introduce a deliberate vulnerability into their design that is, a back door or remove end-to-end encryption altogether.

The overwhelming consensus of information security experts and even some high-ranking former intelligence officials is that no technical solution would allow law enforcement agencies to decrypt communications without creating vulnerabilities that would expose all users to harm. Once back doors are introduced, malicious hackers and cybercriminals will seek them out, sell them on private grey markets, or exploit them for abuse or profit. Europol has also warned that solutions that intentionally weaken technical protection mechanisms to support law enforcement will intrinsically weaken the protection against criminals as well.

Companies are incorporating strong encryption into products in response to a range of threats from cybercriminals, data thieves, and malicious hackers. Encryption is a critical tool in their fight to secure users from these threats. Any requirement to weaken encryption flies in the face of global efforts to shore up cybersecurity, Human Rights Watch said.

Limiting strong encryption in Australia, or even across Australias closest allies like the Five Eyes alliance, is also unlikely to prevent bad actors from using it. A recent global survey of encryption confirms that determined criminals could easily shift to many available foreign alternatives that would not be subject to Australian law. Those most harmed by anti-encryption legislation are the millions of ordinary users with no connection to wrongdoing whose cybersecurity would be compromised. The harm may be even more serious for journalists and activists who regularly use encrypted applications to protect sources and victims from reprisals.

Turnbull stated that the bill would be modeled after the UKs 2016 Investigatory Powers Act (IP Act). The UK legislation allows authorities to serve technical capability notices on a broad range of internet companies. These notices will require firms to provide and maintain the capability to disclose, where reasonably practicable, the content of communications or secondary data in an intelligible form and to remove electronic protection applied by or on behalf of the operator. These notices can be used to facilitate not only targeted surveillance, but also mass surveillance, collection of metadata, and government hacking.

The precise scope of what these notices may require remains unclear, especially for operators who do not retain encryption keys. The draft implementing regulations do not clarify whether these companies will be required to alter the design of their products or build a back door into encryption. Contradictory statements from UK officials have not clarified the matter, nor shed light on how this approach would avoid undermining cybersecurity or prevent bad actors from using non-UK alternatives.

Just as troubling, the UK Investigatory Powers Act can also require some tech companies to notify authorities of new products or services before they are introduced so that authorities can assess whether new technical capabilities may be required. This potentially provides the government the ability to influence product design to facilitate surveillance, including whether and how encryption can be used.

The UK Investigatory Powers Act is no model for any government that cares about protecting the security of online communications, Pearson said. If other governments follow this example, no one could trust the security of the mobile phones and applications we use every day.

The UK parliament still needs to approve the implementing regulations before government officials can issue the new technical capability notices. However, once regulations are in place, the public may know very little about how they are used, since notices will be served and negotiated with companies secretly.

These overreaching provisions are among the reasons why whistleblower Edward Snowden described the IP Act as legalizing the most extreme surveillance in the history of Western democracy.

Australias approach to encryption will most likely be emulated by other countries in the region, Pearson said. If Turnbull wants to show true leadership, Australia should become a model for how countries can investigate effectively in a world with strong encryption, not endorse policies that would undermine cybersecurity and human rights.

Here is the original post:
Australia: Shelve Proposed Law to Weaken Encryption - Human Rights Watch (press release)

Read More..

IBM India Helps Create Breakthrough Encryption Technology That’s Completely Hacker Proof – Indiatimes.com

An increasing danger of our connected, digital world is the rise of hackers, and their potential to inflict serious damage with real-world consequences.

REUTERS

Nothing is precious for us than our data, and protecting that data at all costs is going to be paramount going forward. Good thing IBM has already perfected a full-proof system to foil the attempts of 21st century hackers!

IBM just released its latest Z series mainframe last month, the z14. What's a mainframe I hear you ask? Well, it's a very powerful computer which is used to handle huge volumes of data transactions -- for e.g. in a bank scenario, or for a flight booking website, or an ecommerce platform, among other things.

This is what the new IBM Z14 mainframe looks like

IBM's mainframes are widely used in the tech industry for delivery of critical services, but what the company has done for the first time ever with the newly released z14 mainframe is to allowdata encryption at every level of the system, and then storing everything inside encrypted containers. Multiple levels of encryption to hoodwink even the most diligent hackers out there.

And on top of that, if the system detects an attack like malware or other intrusion, the z14 mainframe has been designed to shut itself down automatically, as per an IBM statement on Techcrunch. Even if hackers could somehow get through all of these defenses, which is highly unlikely, the multiple levels of encryption would still render the data useless.

According to a report published in The Hindu, IBM's India engineering team had a crucial role in the successful development of the z14 mainframe's "pervasive encryption" technology.

The report quoted Gururaj S Rao, IBM Fellow & VP of System Integration, IBM zSystems as suggesting that a key z14 mainframe component designed by the India team was the encryption unit, which gives the z14 mainframe its unparalleled level of security. More than 100 engineers from IBM's India business unit contributed towards the development of the z14 mainframe.

Hopefully, the adoption and deployment of z14's pervasive encryption technology will cause a major dent in the exploits of hackers in the coming months and years. And we'll know that India had an important role in the scheme of things!

Follow this link:
IBM India Helps Create Breakthrough Encryption Technology That's Completely Hacker Proof - Indiatimes.com

Read More..

Here’s one good reason to not rely on cloud storage – Business Insider Australia

You cant always trust your local hard drive to preserve your precious data. Thats why many of us look to cloud storage to keep our files secure. With Zoolz Dual Cloud Storage, you can safeguard your personal information with a whole terabyte of military-grade cloud storage.

Featuring 256-AES encryption, Zoolz locks down your files before they even leave your machine, shutting down a hackers window of opportunity to peek in. A lifetime subscription to Zoolz allows you to store your files in Instant or Cold storage, depending on your storage needs. Instant storage is ideal for protecting those files you come back to often, while Cold storage is better for tucking away data you wont need for a while.

You can upgrade your cloud storage potential with a lifetime subscription to Zoolz Dual Cloud Storage, now on sale for $37 AUD [$29.99 USD].

Please note that all deals in the deal store are in US dollars. Additional shipping costs may apply for physical items.

Get this deal

Insider Picks are independent of Allure Medias editorial and advertising teams. Click here to learn more.

Site highlights each day to your inbox.

Follow Business Insider Australia on Facebook, Twitter, LinkedIn, and Instagram.

Read more:
Here's one good reason to not rely on cloud storage - Business Insider Australia

Read More..