Page 4,461«..1020..4,4604,4614,4624,463..4,4704,480..»

Fat finger: Typo caused Amazon’s big cloud-computing outage – Phys.Org

March 2, 2017 by Mae Anderson This Sept. 6, 2012, file photo, shows the Amazon logo in Santa Monica, Calif. Amazon's cloud-computing service Amazon Web Services experienced problems in its eastern U.S. region, Tuesday, Feb. 28, 2017, causing widespread problems for thousands of websites and apps. (AP Photo/Reed Saxon, File)

Amazon says an incorrectly typed command during a routine debugging of its billing system caused the five-hour outage of some Amazon Web Services servers on Tuesday.

In a summary posted online, the Seattle company says a command meant to remove a small number of servers for one of its S3 subsystems was entered incorrectly and a larger set of servers was removed. A full restart was required, which took longer than expected due to how fast Amazon Web Services has grown over the past few years.

Amazon says it is making changes to its system to make sure incorrect commands won't trigger an outage of its web services in the future.

Amazon is the world's largest provider of cloud services, which entails hosting companies' computing functions on remote servers.

Explore further: When Amazon's cloud storage fails, lots of people get wet

2017 The Associated Press. All rights reserved.

Usually people don't notice the "cloud"unless, that is, it turns into a massive storm. Which was the case Tuesday when Amazon's huge cloud-computing service suffered a major outage.

US online giant Amazon on Tuesday announced the launch of a "unified communications service" which offers video and audio conferencing through its cloud computing service.

Can Amazon's Echo speaker really be a witness to a murder?

Amazon on Monday said it was sorry for a Web Services mishap that put online film streaming service Netflix out of commission on Christmas Eve.

Amazon.com is still trying to restore computers used by other websites as an outage stretched into a third day.

(Phys.org) Computer services company Cycle Computing has announced that it has used Amazon's servers to run software for a client that simulated the properties of 205,000 molecules over an 18 hour period using 156,000 ...

A team from the University of Leicester's Department of Engineering has, for the first time ever, vibration-mapped the famous London bell Big Ben in order to reveal why it produces its distinct harmonious tone.

Despite advancements in fuel-saving technologies over the last 25 years, on-road fuel economy for all vehicles is up only one mile per gallon during that time.

Amazon says an incorrectly typed command during a routine debugging of its billing system caused the five-hour outage of some Amazon Web Services servers on Tuesday.

The car of the future will let you pay for petrol or parking directly from your vehicle and receive traffic alerts and restaurant recommendations from your onboard digital assistant.

For 2017, Toyota has added its most fuel-efficient Prius ever: a plug-in gasoline-electric hybrid called Prius Prime that can travel up to 640 miles on a full electric charge and a single tank of fuel.

Imagine you're waiting in your car and a poster for a concert from a local band catches your eye. What if you could just tune your car to a radio station and actually listen to that band's music? Or perhaps you see the poster ...

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

See more here:
Fat finger: Typo caused Amazon's big cloud-computing outage - Phys.Org

Read More..

Typo caused Amazon’s big cloud-computing outage – WHSV

NEW YORK (FOX, AP) UPDATE (Mar. 2):

Amazon says an incorrectly typed command during a routine debugging of its billing system caused the five-hour outage of some Amazon Web Services servers on Tuesday.

In a summary posted online, the Seattle company says a command meant to remove a small number of servers for one of its S3 subsystems was entered incorrectly and a larger set of servers was removed. A full restart was required, which took longer than expected due to how fast Amazon Web Services has grown over the past few years.

Amazon says it is making changes to its system to make sure incorrect commands won't trigger an outage of its web services in the future.

Amazon is the world's largest provider of cloud services, which entails hosting companies' computing functions on remote servers.

_____

ORIGINAL STORY (Feb. 28):

If you experienced a sluggish web browser or problems with some of your most-used websites and apps on Tuesday, then it was likely the result of an Amazon web service outage.

An outage hit Amazon Web Services Tuesday, reportedly impacting lots of web pages. Specifically, the cloud giant is experiencing problems with its Simple Storage Service (S3) on the East Coast. Widely used for backup and archive, S3 is harnessed by a host of companies.

We continue to experience high error rates with S3 in US-EAST-1, which is impacting various AWS services, wrote Amazon Web Services, on its service health dashboard. We are working hard at repairing S3, believe we understand root cause, and are working on implementing what we believe will remediate the issue.

Users took to social media to discuss the outage.

BGR reports that when S3 goes down or experiences any type of latency or errors, it can prevent content from loading on web pages or cause requests to fail.

Sites like Imgur, Medium, Expedia, Mailchimp, Buffer and even the U.S. Securities and Exchange Commission were all impacted, as were communication services like Slack. Also ironically impacted, DownDetector.com, which is a website that tracks when other websites are down.

As of 1:49 PST, all service was restored.

Update at 2:08 PM PST: As of 1:49 PM PST, we are fully recovered for operations for adding new objects in S3, which was our last operation showing a high error rate. The Amazon S3 service is operating normally.

Update at 12:52 PM PST: We are seeing recovery for S3 object retrievals, listing and deletions. We continue to work on recovery for adding new objects to S3 and expect to start seeing improved error rates within the hour.

Update at 11:35 AM PST: We have now repaired the ability to update the service health dashboard. The service updates are below. We continue to experience high error rates with S3 in US-EAST-1, which is impacting various AWS services. We are working hard at repairing S3, believe we understand root cause, and are working on implementing what we believe will remediate the issue.

View original post here:
Typo caused Amazon's big cloud-computing outage - WHSV

Read More..

Report: Many Federal Government Employees Oblivious of Cloud Computing Impact – Web Host Industry Review

Nearly half (40 percent)of federal government employees dont know if cloud computing has had a positive or a negative impact on their department or agency, according to new research from Deloitte, highlighting a major issue as government agencies continue in their push to cloud adoption and data center consolidation.

Less than one in four respondents (24 percent) say cloud computing has had a positive impact on their organization, according to Deloittes Mastering the Migrationreport, which surveyed328 federal government employees from over 30 departments and agencies.

Fortypercent of respondents do not know if cloud adoption has helped or hindered their organization, and a further 31 percent say it has had neither positive or negative impact. Almost every category in which dont know was an available response, it was the most common.

The survey also found that lift and shift strategies have been the primary method of meeting the federal governments Cloud First policy. Only one in five respondents said their organization is extensively using cloud native applications (5 percent), or even piloting applications developed for the cloud (14 percent).

The promise of the cloud is huge, but the journey isnt easy, Doug Bourgeois, managing director, Deloitte Consulting LLP said in a statement. Cloud value cannot be achieved through technology aloneits about governance, security, people, and processes. This report validates that support for cloud in federal agencies is growing, but perceptions of its impact vary significantly. Agencies need to rethink their core development principles and strategy for going cloud native.

Nine percent of those surveyed say their cloud migration has been successful, while 41 percent characterize it as mixed, problematic, or non-existent. As usual, security was identified as the greatest concern and challenge of cloud adoption, followed by skills and budget limitations.

A survey last year by MeriTalk found that 82 percent of public sector cloud adopters say their agency will increase spending on cloud computing in 2017.

Limited migrations and incomplete migration plans identified three years after the 2011 adoption of the Cloud First policy were largely attributed to staffing and procurement challenges by an Accenture report.

Read this article:
Report: Many Federal Government Employees Oblivious of Cloud Computing Impact - Web Host Industry Review

Read More..

Andreas Antonopoulos: Bitcoin’s Design Can Withstand Quantum Computer Attack – CryptoCoinsNews

Could the NSA build a quantum computer that could break bitcoin? Bitcoin visionary Andreas Antonopoulos addressed this question in an audiotaped presentation posted on SoundCloud.

It is certain that the NSA has already built quantum computers because Google has one at their data center, and if they have one, the NSA has one thats ten times better, that costs as much as a moon mission, and can break encryption systems at a much better rate and with much more efficiency, he said.

The interesting question is: willthey use it to break bitcoin? The answer to this question is no, Antonopoulos said. The most important well-guarded secret among encryption scientists is that if you use a technology to break encryption, you will have to explainto the world how you broke it.

In World War II, when the British captured Enigma (cipher machines developed by the Germans to protect military intelligence), the government allowed cities to be bombed since they didnt have a good enough story for how they knew they would be bombed.

The last thing theyre going to use that on is bitcoin, because the moment you use it on bitcoin and you announce to the world we have quantum cryptography that can build elliptic curves, guess what happens? Your rivals try to implement quantum resistance. You just blew all of your advancements in that technology, he stated.

No, the NSA is not going to hack us with their quantum computer, Antonopoulossaid. But what happens when the technology becomes commercially viable and more broadly available?

Nothing to fear, according to Antonopoulos, thanks to bitcoins design. Thats where you see two Satoshis initial design choices in retrospect are absolutely genius, he said.

Bitcoin uses two fundamental cryptographic systems to achieve its security.

One is elliptic curve multiplication on a prime field which is a one-way function. This depends on prime function factorization mathematics that is vulnerable to quantum technology.

The other is hash algorithms, and hash algorithms are not actually factorizable with quantum technology, he said. We dont have very good algorithms for breaking hashes with Quantum computing.

Satoshi didnt put the elliptic curve public keys in the transactions until after theyve been spent. A bitcoin address is a double-hashed version of a public key, meaning the public key is never seen by anyone until the user claims it by spending the transaction.

Also read: Quantum computers will destroy bitcoin, scientists warn

Therefore, if one follows the fundamental best practice in spending bitcoin which is to only use an address once, use a different address for every transaction and spend it completely every time the first time the public key is advertised on the network is the moment it no longer contains any money.

Go ahead and crack it; youve got an empty address, he said. And that means you cant go back and look at keys that were addresses three years ago and simply crack them because you dont have the public keys.

This little genius of a design element is not an accident, he said. It allows the user to do future upgrades.

He called it a brilliant design element that most people have missed.

Every cryptographic algorithm ever invented has a shelf life between 20 and 30 years before becoming vulnerable to broadly available commercial technology that can crack it, he said.

Its a continuous arms race, he said. The good news is we can upgrade.

Featured image from Shutterstock.

View original post here:

Andreas Antonopoulos: Bitcoin's Design Can Withstand Quantum Computer Attack - CryptoCoinsNews

Read More..

Scientists reveal new super-fast form of computer that ‘grows as it … – Phys.Org

March 1, 2017 DNA double helix. Credit: public domain

Researchers from The University of Manchester have shown it is possible to build a new super-fast form of computer that "grows as it computes".

Professor Ross D King and his team have demonstrated for the first time the feasibility of engineering a nondeterministic universal Turing machine (NUTM), and their research is to be published in the prestigious Journal of the Royal Society Interface.

The theoretical properties of such a computing machine, including its exponential boost in speed over electronic and quantum computers, have been well understood for many years but the Manchester breakthrough demonstrates that it is actually possible to physically create a NUTM using DNA molecules.

"Imagine a computer is searching a maze and comes to a choice point, one path leading left, the other right," explained Professor King, from Manchester's School of Computer Science. "Electronic computers need to choose which path to follow first.

"But our new computer doesn't need to choose, for it can replicate itself and follow both paths at the same time, thus finding the answer faster.

"This 'magical' property is possible because the computer's processors are made of DNA rather than silicon chips. All electronic computers have a fixed number of chips.

"Our computer's ability to grow as it computes makes it faster than any other form of computer, and enables the solution of many computational problems previously considered impossible.

"Quantum computers are an exciting other form of computer, and they can also follow both paths in a maze, but only if the maze has certain symmetries, which greatly limits their use.

"As DNA molecules are very small a desktop computer could potentially utilize more processors than all the electronic computers in the world combined - and therefore outperform the world's current fastest supercomputer, while consuming a tiny fraction of its energy."

The University of Manchester is famous for its connection with Alan Turing - the founder of computer science - and for creating the first stored memory electronic computer.

"This new research builds on both these pioneering foundations," added Professor King.

Alan Turing's greatest achievement was inventing the concept of a universal Turing machine (UTM) - a computer that can be programmed to compute anything any other computer can compute. Electronic computers are a form of UTM, but no quantum UTM has yet been built.

DNA computing is the performing of computations using biological molecules rather than traditional silicon chips. In DNA computing, information is represented using the four-character genetic alphabet - A [adenine], G [guanine], C [cytosine], and T [thymine] - rather than the binary alphabet, which is a series of 1s and 0s used by traditional computers.

Explore further: Researchers restore first ever computer music recording

More information: Currin, A., Korovin, K., Ababi, M., Roper, K., Kell, D.B., Day, P.J., King, R.D. (2017) Computing exponentially faster: Implementing a nondeterministic universal Turing machine using DNA. Journal of the Royal Society Interface. (in press). On Arxiv: arxiv.org/abs/1607.08078

New Zealand researchers said Monday they have restored the first recording of computer-generated music, created in 1951 on a gigantic contraption built by British genius Alan Turing.

"Siri, will it rain today?", "Facebook, tag my friend in this photo." These are just two examples of the incredible things that we ask computers to do for us. But, have you ever asked yourself how computers know how to do ...

(Phys.org)A team of researchers made up of representatives from Google, Lawrence Berkeley National Labs, Tufts University, UC Santa Barbara, University College London and Harvard University reports that they have successfully ...

An international team, led by a scientist from the University of Sussex, have today unveiled the first practical blueprint for how to build a quantum computer, the most powerful computer on Earth.

Scientists at the University of Sussex have invented a ground-breaking new method that puts the construction of large-scale quantum computers within reach of current technology.

IBM on Wednesday opened its quantum computer processor to anyone who wants to try what is expected to be a new kind of computing with enormously improved power and speed.

(Phys.org)Dynamic holograms allow three-dimensional images to change over time like a movie, but so far these holograms are still being developed. The development of dynamic holograms may now get a boost from recent research ...

Controlled nuclear fusion has been a holy grail for physicists who seek an endless supply of clean energy. Scientists at Rice University, the University of Illinois at Urbana-Champaign and the University of Chile offered ...

Today's society is growing in population and productivity puts ever higher demands on the Internet, and without scientific developments to provide ways meeting our traffic needs, it will begin to clog. Mapping photons to ...

Some insect bodies have evolved the abilities to repel water and oil, adhere to different surfaces, and eliminate light reflections. Scientists have been studying the physical mechanisms underlying these remarkable properties ...

When matter is cooled to near absolute zero, intriguing phenomena emerge. These include supersolidity, where crystalline structure and frictionless flow occur together. ETH researchers have succeeded in realising this strange ...

Researchers at Karolinska Institutet and KTH Royal Institute of Technology in Sweden have contributed to a recent discovery that the heart is filled with the aid of hydraulic forces, the same as those involved in hydraulic ...

Adjust slider to filter visible comments by rank

Display comments: newest first

Just another form of efficient parallel processing

In wikipedia, you can look at "Biological computing" and "Amorphous Computing"

One can also look at the work of Pr. Andrew Adamatzky in reaction-diffusion computing & massive parallel computation

And at the work of MIT Amorphous Computing

And many others in the field of "Unconventional Computing" or "Unconventional Programming Paradigms"

Seems like we are just determined to create an all-powerful AI that sees us as either a nuisance or food.

What I get from this article is that I no longer need to tack on additional memory when the program needs more: it will do that on its own. This is absolutely wonderful!

A system like this could, theoretically, turn the entire cosmos into memory for certain algorithms and inputs, and still be nowhere near finished, but I assume we'd cut the machine's power supply long before that happened (that's also a solution to the all-powerful AI monster; Asimov's Three Laws of Robotics is another)...

Seems to me, implementing this won't be so easy, either in building the DNA or in creating an interface to it. And trying to simulate it with software using conventional computers means that you'll have to add processors and memory as it "grows".

Do they have any wetwear that can actually do this or is it just speculation on what one might be able to do if they did?

Our real universe with quantum mechanics replicating parallel universes is already such a growing endless computer experimenting all the possibilities with sosies of us living all the possibles lifes with the same past. DNA is not necessary, it is useful and easy because life use it to keep past memory.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Read the original:

Scientists reveal new super-fast form of computer that 'grows as it ... - Phys.Org

Read More..

BullGuard | Internet Security and Antivirus protection …

About BullGuard

Consumers deserve more when it comes to security. At BullGuard, we make it simple to protect everything in your digital lifefrom your data, to your identity, to your Smart Home. As the only security company whose sole focus is on the consumer, BullGuard combines technical expertise with a genuine understanding of your needs to deliver complete protection across all your connected devices. Consumers deserve more when it comes to security. At BullGuard, we make it simple to protect everything in your digital lifefrom your data, to your identity, to your Smart Home. As the only security company whose sole focus is on the consumer, BullGuard combines technical expertise with a genuine understanding of your needs to deliver complete protection across all your connected devices. Were your own private bodyguardtracking and tackling security threats so you can connect confidently, control easily, and travel freely throughout your digital world.

As part of our ongoing promise to be champion of todays digital consumer, weve added Dojo by BullGuard to our multi-award winning product portfolio. Its the best custom-built solution to protect Wi-Fi enabled devices in the home. Dojo gives customers the freedom to add as many Smart Home devices as they want without compromising privacy or security. Dojo by BullGuard is the cornerstone of a Smart Home, ensuring a connected world where every consumer, in every home, is smart, safe and protected.

See the original post:

BullGuard | Internet Security and Antivirus protection ...

Read More..

Internet Storm Center – SANS Internet Storm Center

I recently had a client get an interesting phishing message. They had received a fake message from their CEO to their Controller - a "start the conversation" email to end up with a wire transfer. This sort of email is not common, but is frequent enough in Sr Management circles, especially if you are in the middle of merger or acquisition discussions with another company.

Some technical warning signs in that note were:

So the discussion quickly moved from "I'm glad our execs came to us, we really dodged a bullet there" to "just how did this get in the door past our spam filter anyway?"

This is where things got interesting. Their SPAM filter does use the SPF (Sender Policy Framework) DNS TXT record, and a quick check on the SPF indicated that things looked in order there. However, after a second look, the problem jumped right out. A properly formed SPF will end with a "-", which essentially means "mail senders in this SPF record are valid for this domain, and no others". However, their SPF had a typo - their record ended in a "~" instead. What the tilde character means to this spam filter is "the mail senders in this SPF record are valid for this domain, but YOLO, so is any other mail sender".

From the RFC (RFC7208), the ~ means "softfail", "A "softfail" result is a weak statement by the publishing ADMD that the host is probably not authorized". More detail appears later in the RFC: "A "softfail" result ought to be treated as somewhere between "fail" and "neutral"/"none". The ADMD believes the host is not authorized but is not willing to make a strong policy statement. Receiving software SHOULD NOT reject the message based solely on this result, but MAY subject the message to closer scrutiny than normal." This same reasoning applies to the ~all and -all directives in the SPF (which I see more often).

You'd think that a lot has changed since 2006 (the date of the original SPF spec, RFC4408), that in 2017 a spam filter should fail on that result, but apparently not (sad panda). Kinda makes you wonder what the actual use case is for that tilde character in the definition - I can't think of a good reason to list permitted mail senders, then allow any and every other server too.

That being said, their filter *should* still have caught the mismatch between the "from" and "reply-to" fields, especially since it involved an external source and internal domains. Or at least paired that up with the domain mismatch to weight this email towards a SPAM decision. But that's another rant altogether.

Long story short - this type of attack was pretty popular (and widely reported) about a year ago, but successful methods never (never ever) go away. A little bit of research can make for a really well-formed phish, right down to using the right people in the conversation, good grammar, and phrasing appropriate to the people involved. So a bit of homework can get an attacker a really nice payday, especially if their campaign targets a few hundred companies at a time (and they put more work into their email than the example above)

So in this case, a typo in a DNS record could have cost millions of dollars. Good security training for the end users and vigilant people made all the difference - a phone call to confirm is a "must-do" step before doing something irrevocable like a wire transfer.

=============== Rob VandenBrink Compugen

Xavier pointed me towards a new issue posted on Palo Alto's Unit 42 blog - the folks at PA found apps in the Google Play store infected with hidden-iframe type malware. 132 apps (so far) are affected, with the most popular one seeing roughly 10,000 downloads. But we're not at the end of the trail of breadcrumbs yet .. these apps were traced back to just 7 developers, who aren't in the same company, but all have a connection to Indonesia (the smoking gun here was the code signing certificate). But wait, we're *still* not at the punchline.

Two more facts to throw into the pot - the malware that the app downloads is a windows executable, so this is unintentional - the developers in question would know that a windows PE won't run on their android platform. The malicious apps also point to sinkholed domains, so they are doubley ineffective. The theory so far is that these 7 developers have all downloaded an infected IDE (Integrated Development Environment) or APK packager, which then infects all of their subsequent android apps.

If this sounds like last year's XCodeGhost issue to you (where Apple devs pulled unsanctioned, infected code libraries), you are not alone. Because of their position in the food chain, developers especially need to be careful about what they download, and what ingredients go into making their apps. This means libraries, compilers, IDEs - everything that goes into the pot to make the soup that becomes their app. One infected tool or library can easily affect thousands or millions of end users. Luckily today's issue ends up being a bit of a non-issue - - the malware simply is not effective on the platform it's being delivered to. However, if it had been written a bit more cleverly, or been more targetted, it could have become a decent android worm, or the android app could have become a "carrier" for a plague on windows or OSX hosts. Hopefully it's a wake-up call for folks to build their apps using libraries and code directly from the source - a free download generally means that you've just become the product (or the vector to get to the end product).

Kudos to Xiao Zhang, Wenjun Hu and Shawn Jin from Palo Alto Networks for their excellent sleuthing and write-up. They in turn acknowledge Zhi Xu and Claud Xiao from Palo Alto Networks as well as the Google Security team for their help in piecing this together. Full details here: http://researchcenter.paloaltonetworks.com/2017/03/unit42-google-play-apps-infected-malicious-iframes/

=============== Rob VandenBrink Compugen

Keywords:

If you have more information or corrections regarding our diary, please share.

More:

Internet Storm Center - SANS Internet Storm Center

Read More..

The Best Email Encryption Software of 2017 | Top Ten Reviews

Our editorial staff evaluates products and services independently, but Top Ten Reviews may earn money when you click on links. Learn More

Email security and encryption software does more than just encrypt emails. Depending on the solution, you can send compliant email transmissions, thwart data loss, secure proprietary information and instill client confidence. In addition, imposed encryption points range from one-click options to enforced policy-based encryption methods. Although many industries in the past required faxing of sensitive information, nowadays many email encryption services provide compliant encrypted email options that are even more secure than traditional faxing and much more convenient.

Beyond email security, secure email software also provides tools to help with compliance, legal inquiries and tracking. The best email security software provides an administration console, compliance reports, sortable email logs, email trackers, email expiration dating, and archiving technology. Many are also compatible with all email types, DLP filters, security software and mobile email.

To learn more about what email security services can offer check out our top rated products. See HP SecureMail, if you are looking to integrate email encryption with your established business applications. For exceptional ease of use from admin to recipient, see DataMotion. If you are looking for DLP tools combined with email encryption, see Proofpoint. To learn more about email encryption, see our articles on email encryption software.

The first consideration with email security software is the encryption point. Small businesses may trust employees to decide which emails need to be encrypted. In this situation, a desktop or cloud-based solution will work. Other companies may benefit from removing the decision from the employee by using policy-based filters. This encrypts emails after they leave the employee's desktop at the point where they pass through the mail server, gateway, appliance or web portal, based on your company's policy filters.

Other considerations include the integrations and compatibilities you require, such as Outlook plugins, mobile phone emailing, email protocols and archiving methods. You will also want to select a solution that provides the encryption methods your business and clients require. Most services support OpenPGP and S/MIME encryption methods and provide access to other types of email security, such as AES and certificates if requested. Another consideration is the recipient experience. You want to look for a secure email solution that provides a simple and quick way for your customers and recipients to access secure messages.

Here are the criteria we used to compare email encryption software:

Security If your company is bound by compliance or regulatory requirements, you need to ensure that the email encryption service you use can satisfy your security standards. All email encryption software secures emails. However, most secure email services offer a range of security options, such as user-initiated and policy-based encryption. Some will even block email from sending messages that contain non-sharable information. If the service stores your email data and interactions for your company, they should take precautions to secure their data center(s). We compared a wide range of security features and rated highest those that not only encrypt email, but also those that provide additional layers of security.

Recipient Experience While security is critical, you do not want it to inconvenience your customers. We looked for encryption software with features that make the recipients' experience hassle free. The encryption programs that are simplest to use do not require your customers to download software or maneuver through a complicated process to receive secure messages. We rated highest the software that also allows recipients to send secure return emails and easily request passwords without your administrator having to manage the request.

Administration Tools Competitive email encryption software for small businesses and larger companies should supply a powerful, simple to use administration console. We compared services and the tools they offer for managing emails, creating reports, sorting emails, deploying software and configuring policies. The best software provides simple or even automatic deployment options and preconfigured policies that support common regulatory constraints.

Integrations & Compatibility Most companies do not run email encryption software independently. To be truly useful and efficient, it should function alongside popular business solutions such as Salesforce, GroupWise and security software. It also ought to work across platforms with all email types, regardless of the device type (PC, mobile phone or tablet). Top encryption tools also work in conjunction with content and internet filters, as well as eDiscovery and archiving methods. We rated highest the encryption software that is compatible with all popular platforms and commonly used business applications.

Unless you only need encryption software for one seat, you will want to do your share of research before contracting with an email encryption service. We suggest that you peruse our reviews, identify your top three candidates and then contact those companies for a customized quote. Their sales teams and account managers should be able to help you identify the best method for providing the type of email security that would work best for your company and its regulatory requirements.

Continued here:

The Best Email Encryption Software of 2017 | Top Ten Reviews

Read More..

Ironclad Encryption Corporation Announces New Ticker Symbol OTCQB: IRNC – Yahoo Finance

HOUSTON--(BUSINESS WIRE)--

Ironclad Encryption Corporation (the Company) (OTCQB: IRNC) today announced that it has changed its ticker symbol from BTHI to IRNC. The Company began trading under the ticker symbol IRNC under its new CUSIP number: 46302E107, effective March 2, 2017.

About Ironclad Encryption Corporation

On January 6, 2017, Butte Highland Mining Company changed the focus of the business by acquiring all of the ownership interests of InterLok Key Management, Inc., a Texas corporation engaged in the business of developing and licensing its patented key based encryption methods. To better reflect the new business, the name was changed to Ironclad Encryption Corporation. Ironclad Encryption Corporation focuses on providing global freedom to execute electronic transmissions and store electronic data absent the oppressive intrusion of cyber-terrorism that causes destruction and loss. The company offers cyber security encryption so advanced, it operates without performance degradation or significant band-width usage. To learn more about Ironclad Encryption Corporation, please visit http://ironcladencryption.com.

View source version on businesswire.com: http://www.businesswire.com/news/home/20170302006070/en/

See the original post here:

Ironclad Encryption Corporation Announces New Ticker Symbol OTCQB: IRNC - Yahoo Finance

Read More..

Germany, France lobby hard for terror-busting encryption backdoors … – The Register

The tech industry has hit back at France and Germany's demands for EU laws requiring secret backdoors in file and communications encryption.

Last week, Thomas de Maizire and Bruno Le Roux, respectively the German and French ministers of the interior, sent a letter to the European Commission calling for measures to stem what they see as a tide of terrorism sweeping the land.

These proposed measures include allowing the greater sharing of people's personal information between nations' police forces to fight crime; more reliance on biometrics; and as is depressingly predictable these days demands for technology companies to come up with impossible encryption systems that are secure, strong, and yet easily crackable by law enforcement on demand. That would allow investigators to decrypt suspects' intercepted messages and seized documents without needing the person's passphrase or private keys.

The German-French letter [PDF] calls for new legislation implementing these changes to be considered in October, after both countries have had their national elections.

This isn't the first time the pair have called for such measures, but this time they received support from the European Commission. "Encryption technology should not prevent law enforcement agencies or other competent authorities from intervening in the lawful exercise of their functions," an EC spokesman said in response to the letter, according to Politico.

The remarks brought a swift bite back from the Computer & Communications Industry Association, the non-profit think tank that lobbies for the technology industry. Christian Borggreen, its director of international policy in Brussels, slammed the idea as counterproductive late last week.

"Any backdoors to encrypted data would pose serious risks to the overall security and confidentiality of Europeans' communications, which seems inconsistent with existing legal protections for personal data," he said.

"Weakened security ultimately leaves online systems more vulnerable to all types of attacks, from terrorists to hackers. This should be a time to increase security not weaken it."

It looks as though the encryption wars have moved to Europe. For years now in the US, the FBI and others have been banging on about the need for crimefighters to have secret backdoors into encryption, or even a front door, as the director of the Feds likes to call it.

There may be British readers who are feeling rather smug about this latest European proposal, and think that Brexit UK will be immune from such silliness. Not so Blighty already has legislation that paves the way for mandatory backdoored encryption, it just hasn't worked out how to force the issue yet.

As has been pointed out many times, it isn't mathematically or technologically possible to build a backdoor into encryption that is completely exclusive to a select set of people, and can't be found and exploited by others. The only way under today's technology would be to have a key escrow system, and that would fall down if someone with access to the keys were to be bribed or coerced into handing them over.

Read the original:

Germany, France lobby hard for terror-busting encryption backdoors ... - The Register

Read More..