Zoom’s encryption has ‘serious, well-known weaknesses’, according to report – Android Central

Two separate reports have revealed further issues within popular video-conferencing app Zoom.

First up, a report from The Verge notes that a security professional has used an automated tool that can scour meetings to find ones that are not protected by passwords. Apparently, it was able to find 2,400 calls in a single day, extracting a link to meeting, date, time, organizer and meeting topic information. From the report:

Security professional Trent Lo and members of SecKC, a Kansas City-based security meetup group, made a program called zWarDial that can automatically guess Zoom meeting IDs, which are nine to 11 digits long, and glean information about those meetings, according to the report.

In addition to being able to find around 100 meetings per hour, one instance of zWarDial can successfully determine a legitimate meeting ID 14 percent of the time, Lo told Krebs on Security. And as part of the nearly 2,400 upcoming or recurring Zoom meetings zWarDial found in a single day of scanning, the program extracted a meeting's Zoom link, date and time, meeting organizer, and meeting topic, according to data Lo shared with Krebs on Security.

In a statement to The Verge regarding this issue Zoom said:

"Zoom strongly encourages users to implement passwords for all of their meetings to ensure uninvited users are not able to join... Passwords for new meetings have been enabled by default since late last year, unless account owners or admins opted out. We are looking into unique edge cases to determine whether, under certain circumstances, users unaffiliated with an account owner or administrator may not have had passwords switched on by default at the time that change was made."

A second separate report from The Intercept published today claims that Zoom's encryption algorithm has "serious, well-known weaknesses" and that keys are being issued by servers sometimes based in China, even if all the participants are based in the US.

MEETINGS ON ZOOM, the increasingly popular video conferencing service, are encrypted using an algorithm with serious, well-known weaknesses, and sometimes using keys issued by servers in China, even when meeting participants are all in North America, according to researchers at the University of Toronto.

The researchers also found that Zoom protects video and audio content using a home-grown encryption scheme, that there is a vulnerability in Zoom's "waiting room" feature, and that Zoom appears to have at least 700 employees in China spread across three subsidiaries. They conclude, in a report for the university's Citizen Lab widely followed in information security circles that Zoom's service is "not suited for secrets" and that it may be legally obligated to disclose encryption keys to Chinese authorities and "responsive to pressure" from them.

Zoom has not commented further on this issue, which was also reported by Forbes who note:

"...in an interview published on Forbes on Friday, Chief Executive Eric Yuan said the company was going to check on how it was routing conversations to China, but emphasized the data was protected. As Citizen Lab hadn't sent its findings to Zoom, saying it was in the public interest to release the information as soon as possible, the videoconferencing company wouldn't have been aware of the findings. But Yuan assured that if user data was being transferred to China when users weren't even based there, "we are willing to address that."

Security concerns regarding Zoom are now seemingly well noted in the community. The encouraging sign is that Zoom has taken notice, apologized and vowed to fix all of these issues over the next 90 days, freezing new features in the meantime.

Go here to read the rest:
Zoom's encryption has 'serious, well-known weaknesses', according to report - Android Central

LimeRAT malware is being spread through VelvetSweatshop Excel encryption technique – ZDNet

A new campaign is spreading the LimeRAT Remote Access Trojan by harnessing an old encryption technique in Excel files.

LimeRAT is a simple Trojan designed for Windows machines. The malware is able to install backdoors on infected machines and encrypt files in the same way as typical ransomware strains, add PCs to botnets, and install cryptocurrency miners.

See also:This Trojan hijacks your smartphone to send offensive text messages

In addition, the modular Trojan can spread through connected USB drives, uninstall itself if a virtual machine (VM) is detected -- a typical practice for security researchers attempting to reverse-engineer malware -- lock screens, and steal a variety of data which is then sent to a command-and-control (C2) server via AES encryption.

In a new campaign observed by Mimecast, the Trojan is being hidden as a payload in read-only Excel documents spread via phishing emails. Researchers said in a blog post on Tuesday that the Excel documents are read-only -- rather than locked -- which encrypts the file without making a user type in a password.

To decrypt the file, on open, Excel will attempt to use an embedded, default password, "VelvetSweatshop," which was implemented years ago by Microsoft programmers. If successful, this decrypts the file and allows onboard macros and the malicious payload to launch, while also keeping the document read-only.

CNET:Using Zoom while working from home? Here are the privacy risks to watch out for

Usually, if decryption through VelvetSweatshop fails, then users are required to submit a password. However, read-only mode bypasses this step, thereby reducing the steps required to compromise a Windows machine.

"The advantage of the read-only mode for Excel to the attacker is that it requires no user input, and the Microsoft Office system will not generate any warning dialogs other than noting the file is read-only," the researchers say.

TechRepublic:FBI warns about Zoom bombing as hijackers take over school and business video conferences

The new campaign designed to spread LimeRAT makes use of this technique, which was first spotted back in 2013 and presented at a Virus Bulletin conference. In order to pull off a successful attack, the hardcoded password -- assigned as CVE-2012-0158 -- is exploited.

It is worth noting this issue was addressed a long time ago; however, Sophos notes (.PDF) that the vulnerability has continued to be exploited over the years in a case deemed "remarkable."

Mimecast says the cyberattackers also use a "blend of other techniques in an attempt to fool anti-malware systems by encrypting the content of the spreadsheet hence hiding the exploit and payload."

Microsoft has been made aware that the vulnerability is once again in use.

Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0

The rest is here:
LimeRAT malware is being spread through VelvetSweatshop Excel encryption technique - ZDNet

Zoom’s end-to-end encryption isn’t actually end-to-end at all. Good thing the PM isn’t using it for Cabinet calls. Oh, for f… – The Register

UK Prime Minister Boris Johnson sparked security concerns on Tuesday when he shared a screenshot of the first ever digital Cabinet on his Twitter feed. It revealed the countrys most senior officials and ministers were using bog-standard Zoom to discuss critical issues facing Blighty.

The tweet also disclosed the Zoom meeting ID was 539-544-323, and fortunately that appears to have been password protected. That's a good thing because miscreants hijacking unprotected Zoom calls is a thing.

Crucially, the use of the Zoom software is likely to have infuriated the security services, while also raising questions about whether the UK government has its own secure video-conferencing facilities. We asked GCHQ, and it told us that it was a Number 10 issue. Downing Street declined to comment.

The decision to use Zoom, as millions of others stuck at home during the coronavirus outbreak are doing, comes as concerns are growing about the conferencing app's business model and security practices.

Most notably, the company has been forced to admit that although it explicitly gives users the option to hold an end-to-end encrypted conversation and touts end-to-end encryption as a key feature of its service, in fact it offers no such thing.

Specifically, it uses TLS, which underpins HTTPS website connections and is significantly better than nothing. But it most definitely is not end-to-end encryption (E2E). E2E ensures all communications are encrypted between devices so that not even the organization hosting the service has access to the contents of the connection. With TLS, Zoom can intercept and decrypt video chats and other data.

Despite Zoom offering a meeting host the option to enable an end-to-end (E2E) encrypted meeting, and providing a green padlock that claims Zoom is using an end to end encrypted connection, it appears that the company is able to access data in transit along that connection, and can also be compelled to provide it to governments. So, it's not E2E.

While that is not something that will bother most Zoom users, whose conversations are not highly sensitive nor confidential, for something like a UK Cabinet meeting, the lack of true end-to-end encryption is dangerous.

Under questioning, a Zoom spokesperson admitted: Currently, it is not possible to enable E2E encryption for Zoom video meetings. Zoom video meetings use a combination of TCP and UDP. TCP connections are made using TLS and UDP connections are encrypted with AES using a key negotiated over a TLS connection.

Then they gave their own Zoom version of what the phrase end-to-end encryption actually means: When we use the phrase End to End in our other literature, it is in reference to the connection being encrypted from Zoom end point to Zoom end point, a spokesperson told The Intercept on Tuesday.

The use of end point in this context refers to Zoom servers, not just Zoom clients; a second layer of purposefully misleading semantics.

Thats not the only area where Zoom has been found wanting. As a spotlight has swung on the biz thanks to its enormous take-up in recent weeks, its dodgy data sharing policies were also revealed.

As we reported earlier this month, Zoom granted itself the right to mine your personal data and conference calls to target you with ads, and seemed to have a "creepily chummy" relationship with tracking-based advertisers.

Personal information gathered by the company included, but was not limited to, names, addresses and any other identifying data, job titles and employers, Facebook profiles, and device specifications. It also included "the content contained in cloud recordings, and instant messages, files, whiteboards ... shared while using the service."

In other words, it was, arguably, the Facebook of the video-conferencing world, sucking every piece of data it can from you and any device you install it on.

Speaking of Facebook, Zoom's iOS app sent analytics data to Facebook even if you didn't use Facebook to sign into Zoom, due to the application's use of the social network's Graph API, Vice discovered. The privacy policy stated the software collects profile information when a Facebook account is used to sign into Zoom, though it didn't say anything about what happens if you don't use Facebook. Zoom has since corrected its code to not send analytics to the social network if you don't use it to sign into the video-conferencing app.

Zoom also stupidly glomed users together, as if they were working for the same company, because they used a common email provider, such as xs4all.nl.

Privacy advocacy group Access Now, meanwhile, dug into Zooms privacy policy and practices and didn't like what it saw, sending a letter to the company on March 19 asking it to publish a transparency report along the same lines as other companies that made it plain exactly what the company was doing with its users data.

The growing demand for Zooms services makes it a target for third parties, from law enforcement to malicious hackers, seeking personal data and sensitive information, said Access Nows general counsel Peter Micek. This is why just disclosing privacy policies is not enough its high time for Zoom to tell us how they protect our personal lives and professional activities from exploitation. This starts with a regular transparency report.

The Facebook API kerfuffle resulted in a lawsuit [PDF], filed on Monday in California. The plaintiff in this case, Robert Cullen of Sacramento, California, is looking to bring a class action against Zoom for failing to protect personal data.

He argued Zoom has violated three Californian laws: the Unfair Competition Law, Consumers Legal Remedies Act, and Consumer Privacy Act by collecting and providing personal information to third parties including Facebook.

Had Zoom informed its users that it would use inadequate security measures and permit unauthorized third-party tracking of their personal information, users would not have been willing to use the Zoom app, the lawsuit argued.

In short, while Zooms ease of use, reliability and excellent user interface has made it a godsend for people stuck at home, the company continues to raise red flags about its honesty, its privacy policies and its business model. Something that a countrys head of government would do well to consider before posting screengrabs of online meetings.

Stop press... Zoom has quietly rewritten its privacy policy since our earlier coverage to now stress: "We do not sell your personal data. Whether you are a business or a school or an individual user, we do not sell your data."

It continued: "Your meetings are yours. We do not monitor them or even store them after your meeting is done unless we are requested to record and store them by the meeting host ... We do not use data we obtain from your use of our services, including your meetings, for any advertising. We do use data we obtain from you when you visit our marketing websites, such as zoom.us and zoom.com. You have control over your own cookie settings when visiting our marketing websites."

It, thus, appears to have clarified, among other things, that it, at least now, does not use the content of meetings and messages to generate targeted advertising.

PS: Zoom has an attention-tracking feature, which can be turned on by a meeting host, that alerts the host if you click away from the Zoom conference for more than 30 seconds.

PPS: It appears you can snaffle people's Windows local login usernames and hashed passwords via Zoom by getting them to click on a URL in a chat message that connects to a malicious SMB file server. A link such as \evil.server.comfoorbar.jpg will, when clicked on, cause Windows to connect to evil.server.com, supplying the logged-in user's credentials in hope of fetching foobar.jpg. Swap foobar.jpg for malware.exe and you could get code execution on the victim's computer.

Sponsored: Webcast: Build the next generation of your business in the public cloud

Read more here:
Zoom's end-to-end encryption isn't actually end-to-end at all. Good thing the PM isn't using it for Cabinet calls. Oh, for f... - The Register

Hardware-based Full Disk Encryption Market 2019 Global Share, Trend, Segmentation and Forecast to 2025 – Science In Me

A new research study has been presented by UpMarketResearch.com offering a comprehensive analysis on the Global Hardware-based Full Disk Encryption Market where user can benefit from the complete market research report with all the required useful information about this market. This is a latest report, covering the current COVID-19 impact on the market. The pandemic of Coronavirus (COVID-19) has affected every aspect of life globally. This has brought along several changes in market conditions. The rapidly changing market scenario and initial and future assessment of the impact is covered in the report. The report discusses all major market aspects with expert opinion on current market status along with historic data. This market report is a detailed study on the growth, investment opportunities, market statistics, growing competition analysis, major key players, industry facts, important figures, sales, prices, revenues, gross margins, market shares, business strategies, top regions, demand, and developments.

The Hardware-based Full Disk Encryption Market report provides a detailed analysis of the global market size, regional and country-level market size, segment growth, market share, competitive landscape, sales analysis, impact of domestic and global market players, value chain optimization, trade regulations, recent developments, opportunity analysis, strategic market growth analysis, product launches, and technological innovations.

Get a Free Sample Copy of the Hardware-based Full Disk Encryption Market Report with Latest Industry Trends @ https://www.upmarketresearch.com/home/requested_sample/10552

Major Players Covered in this Report are: Seagate Technology PLCWestern Digital CorpSamsung ElectronicsToshibaKingstonMicron Technology IncIntel

Global Hardware-based Full Disk Encryption Market SegmentationThis market has been divided into Types, Applications, and Regions. The growth of each segment provides an accurate calculation and forecast of sales by Types and Applications, in terms of volume and value for the period between 2020 and 2026. This analysis can help you expand your business by targeting qualified niche markets. Market share data is available on the global and regional level. Regions covered in the report are North America, Europe, Asia Pacific, the Middle East & Africa, and Latin America. Research analysts understand the competitive strengths and provide competitive analysis for each competitor separately.

By Types:Hard Disk Drive (HDD) FDESolid State Drives (SSD) FDE

By Applications:IT & TelecomBFSIGovernment & Public UtilitiesManufacturing EnterpriseOthers

To get Incredible Discounts on this Premium Report, Click Here @ https://www.upmarketresearch.com/home/request_for_discount/10552

Global Hardware-based Full Disk Encryption Market Regions and Countries Level AnalysisRegional analysis is a highly comprehensive part of this report. This segmentation sheds light on the sales of the Hardware-based Full Disk Encryption on regional- and country-level. This data provides a detailed and accurate country-wise volume analysis and region-wise market size analysis of the global market.

The report offers an in-depth assessment of the growth and other aspects of the market in key countries including the US, Canada, Mexico, Germany, France, the UK, Russia, Italy, China, Japan, South Korea, India, Australia, Brazil, and Saudi Arabia. The competitive landscape chapter of the global market report provides key information about market players such as company overview, total revenue (financials), market potential, global presence, Hardware-based Full Disk Encryption sales and revenue generated, market share, prices, production sites and facilities, products offered, and strategies adopted. This study provides Hardware-based Full Disk Encryption sales, revenue, and market share for each player covered in this report for a period between 2016 and 2020.

Make an Inquiry of this Report @ https://www.upmarketresearch.com/home/enquiry_before_buying/10552

Why Choose Us:

Table of Contents1. Executive Summary2. Assumptions and Acronyms Used3. Research Methodology4. Market Overview5. Global Market Analysis and Forecast, by Types6. Global Market Analysis and Forecast, by Applications7. Global Market Analysis and Forecast, by Regions8. North America Market Analysis and Forecast9. Latin America Market Analysis and Forecast10. Europe Market Analysis and Forecast11. Asia Pacific Market Analysis and Forecast12. Middle East & Africa Market Analysis and Forecast13. Competition Landscape

About UpMarketResearch:Up Market Research (https://www.upmarketresearch.com) is a leading distributor of market research report with more than 800+ global clients. As a market research company, we take pride in equipping our clients with insights and data that holds the power to truly make a difference to their business. Our mission is singular and well-defined we want to help our clients envisage their business environment so that they are able to make informed, strategic and therefore successful decisions for themselves.

Contact Info UpMarketResearchName Alex MathewsEmail [emailprotected]Organization UpMarketResearchAddress 500 East E Street, Ontario, CA 91764, United States.

Read the original:
Hardware-based Full Disk Encryption Market 2019 Global Share, Trend, Segmentation and Forecast to 2025 - Science In Me

Securing Corporate Data When Remote Working is the Norm – Security Boulevard

While many companies have deployed extra measures to secure employees remote access to corporate resources and apps, it is important to think of all the necessary security measures to be taken in protecting sensitive data. Careful planning and forward-thinking security is the best way to protect your most precious asset your data either while it is in transit or at rest. Data breaches are usually the result of stolen identity or IT configuration errors that allows access to unauthorized users, resulting in the loss of control of our most sensitive Personal Identifiable Information (PII) data about employees, customers, and partners. Whether the data breach is from stolen identities or human error, privacy breaches of unencrypted data can result in severe penalties under data protection regulations such as GDPR or CCPA.

Even if a data breach is not a privacy violation, it may entail industrial espionage by state-sponsored actors who may take advantage of the crisis to steal precious sensitive or secret data. In either case, any data breach will harm your business reputation significantly, which also means loss of revenue when customer trust is damaged.

Below are a few tips for your IT and security operations teams, even when working remotely, to proactively protect your business as you expand the secure support of remote workers.

Before implementing any cybersecurity strategy, its important to first conduct a data sweep. This will help you understand what data you have collected or produced and where the most sensitive and valuable data resides. If your business is taking an encrypt everything approach, data discovery with risk analysis will help prioritize where to deploy data security solutions first.

Once you understand the data you have and produce, the next step is to identify the risks associated with all the different file servers and databases that used across your many different IT environments. While there is no silver bullet to defend against a cyberattack, having a risk-based approach is essential to prioritize where to focus your data security investment. This has never been more important than now, as the surge of cloud adoption is often leaving IT and security teams blind to where the riskiest data now resides.

While it is critical that your business restrict who can access sensitive data, it is encryption and tokenization that ensures this data cannot be used in the event it is accessed by unauthoriszed parties. Data discovery, classification and risk analysis helps set priorities for data security implementation. However, regardless of where it is stored or where it migrates (on your own servers, in a public cloud, or a hybrid environment) encryption must always be used to protect sensitive data. Some U.S. states have recently joined various countries around the world in adopting data privacy or data protection regulations, mandating (or at least recommending) that sensitive data should be protected with encryption. In addition, most data breach notification regulations dont apply to compromised encrypted data. Therefore, the best way to protect your business from post-breach legal costs, IT fire drills, fines and embarrassment is to have an encryption strategy in place.

When data is encrypted, an encryption key is created that must be used to decrypt and access the data. Consequently, securely storing these encryption keys is of utmost importance to your business. But some forget that encryption is only as good as the key management strategy employed, therefore keys must be protected in a FIPS 140-2 validated solution, separate from the data itself, and support strong separation of duties. The based laid plans for encryption deployment come undone very quickly when encryption keys are found in spreadsheets or cloud storage buckets.

Its important that your business adopt strong access management techniques that at minimum supports two-factor authentication, to help ensure only authorized employees have access to data and systems. Two-factor authentication involves an individual having something they possess like a message on their smartphone and something they know, rather than simply relying on one form of protection such as a static password, which can be easily hacked. Now with the accelerated migration to cloud services and the increased support of remote workers, you should consider deploying an access management solution that goes beyond two-factor to determine access privileges, and deploy a SaaS solution that doesnt require on-site IT to support.

However, these previous steps only protect a business data from attempts to steal it. When it comes to disaster recovery, it may be required to transfer operations to alternate locations. The best way to mitigate this potential situation is to back up all critical business data that can ensure a return to normal operations quickly. Back up is also important as a countermeasure to attacks such as ransomware. The backed-up data should be stored either in the cloud or offsite and kept secure with two-factor authentication and encryption. It is all too often that hackers breach a companys assets because they gain access to less protected back up or archived data.

Reduce risk with a security partner

Partnering with a third party, like a MSSP or a specialized cybersecurity company, can reduce data security risks businesses face. Not only can having the right partner reduce risk, it reduces strain on your business, enables you to focus on running the business, and provides a competitive advantage.

To ensure the effectiveness of the above steps, IT security professionals should seek leadership buy-in. Only if the C-Suite understands the importance and fully supports the implementation of these security precautionary measures will they be successful. Business executives need to realize that business continuity in times of crisis is a corporate responsibility and that any security risks are enterprise risks.

Thales recently released the 2020 Thales Data Threat Report-Global Edition that outlines many of the security challenges organizations face today. It also provides concrete recommendations to improve security especially as more data and applications are moved to the cloud. Thales also offers a great resource to help you plan an encryption strategy, The Enterprise Encryption Blueprint.

The post Securing Corporate Data When Remote Working is the Norm appeared first on Data Security Blog | Thales eSecurity.

Recent Articles By Author

*** This is a Security Bloggers Network syndicated blog from Data Security Blog | Thales eSecurity authored by Charles Goldberg. Read the original post at: https://blog.thalesesecurity.com/2020/04/07/securing-corporate-data-when-remote-working-is-the-norm/

Go here to see the original:
Securing Corporate Data When Remote Working is the Norm - Security Boulevard

Senator Blumenthal Is Super Mad That Zoom Isn’t Actually Offering The End To End Encryption His Law Will Outlaw – Techdirt

from the also-should-acquaint-himself-with-the-1st-amendment dept

Richard Blumenthal has been attacking internet services he doesn't understand since before he was even a US Senator. It has carried over into his job as a Senator, and was abundantly obvious in his role as a co-sponsor for FOSTA. His hatred of the internet was on clear display during a hearing over FOSTA in which he flat out said that if smaller internet companies couldn't put in place the kind of infrastructure required to comply with FOSTA, that they should go out of business. Blumenthal's latest ridiculous bit of legislation lose your Section 230 protections. And while Blumenthal likes to pretend that the EARN IT Act doesn't target encryption, he also lied about FOSTA and insisted it had no impact on CDA 230 (which it directly amended).

But Blumenthal has now taken his ridiculousness up a notch. Following the (legitimately concerning) reports that the suddenly incredibly popular videoconferencing software Zoom was not actually providing end-to-end encrypted video chats (despite its marketing claims), Blumenthal decided to step in and play the hero sending an angry letter to the company, while linking to the Intercept's original story about Zoom's misleading claims about encryption:

The letter highlights a number of recent claims that have been made about Zoom's security and privacy practices -- some of which are very significant (and a few that aren't as big a deal) -- including the end to end encryption claims:

Does Zoom provide end-to-end encryption, as the term is commonly understood by cybersecurity experts, for video conferences? Please describe when end-to-end encryption is available for users and how the personal data is encrypted?

And this is a legit question and I think it's good that a Senator is asking that. I just think that this particular Senator is the wrong messenger, given his active role in trying to make it impossible for companies like Zoom to offer end-to-end encryption in the first place, as Riana Pfefferkorn (the Associate Director Surveillance & Cybersecurity at Stanford's Center for Internet and Society) pointed out:

And it gets worse. As Pfefferkorn also points out, Blumenthal's claims to be so concerned about cybersecurity and privacy ring hollow when just last month he straight up claimed that you have no right to privacy online:

This was in a weak attempt to "respond to concerns" raised about the EARN IT Act. In one of the responses, concerning government mandates for scanning content and how that interacts with the 4th Amendment, Blumenthal, quoting Neil Gorsuch, claims that there's no reasonable expectation of privacy for any content you put online:

In the Ackerman opinion cited by tech companies as raising Fourth Amendment concerns,Gorsuch suggested that the third-party doctrine will protect evidence of CSAM found by acompany that privately searched. When a company has terms and conditions that enable it toprivately search, there is no Fourth Amendment violation because users lose their reasonableexpectation of privacy. Gorsuch stated that The [Supreme] Court has, after all, suggested thatindividuals lack any reasonable expectation of privacy and so forfeit any FourthAmendment protections in materials they choose to share with third parties.

Of course, as Pfefferkorn further points out, Blumenthal's broken analysis of the Ackerman opinion leaves out some important information. But, still, Blumenthal seems to constantly be talking out of both sides of his mouth. He doesn't believe in an expectation of privacy for content posted online, but he also wants to slam a company for not keeping information private. He doesn't want companies to have end-to-end encryption, but he's angry at Zoom for not having end-to-end encryption.

And that's not the end of the problems with Blumenthal's approach here. While some of the privacy concerns he raises are legit, he lumps them in with ones that are not. For example, for reasons that make no sense at all, he seems to think the relatively new practice of Zoombombing -- in which (often racist trolls from the worst parts of the internet) find publicly linked Zoom events and pop in to be total assholes -- is on par with the other (often legit) security questions raised by Zoom's security practices. Right after his question about end-to-end encryption he asks:

What measures has Zoom put into place to detect and prevent Zoombombing -- intrusions and abuse targeting Zoom meetings? What are the policies governing such abusive behavior, what detection mechanisms are in place, how can users report abusive intrusions, and how quickly does Zoom respond to such incidents?

While there are plenty of questions about how companies can deal with such things, this is not an issue that is under the government's purview. Indeed, as annoying as Zoombombing is, and as quickly as I'm sure Zoom has been working on technology tools to allow meeting hosts to deal with the issue, most Zoombombing is still 1st Amendment protected speech, and a Senator has no business insisting that Zoom silence such activities. And yet, that seems to be exactly what he's focused on doing:

In that tweet he says: "I am calling on Zoom to take urgent & aggressive action to stop the racists, trolls, & peddlers of hate that are silencing & bullying communities." Yeah, the 1st Amendment (the one you swore to defend) might want to have a word with you about that, Senator. I'm all for Zoom coming up with tools for users of its service to help prevent such trollish behavior, but seriously, these kinds of stunts are not at all new on the internet and have been around for literally decades. That doesn't make the juvenile behavior any less annoying or problematic, but it's not the role of any government official to insist that a company censor people for protected speech, no matter how trollish.

Separately, of course, this ignores that Zoom had already put in place a detailed plan for how to stop Zoombombing over a week before Blumenthal sent the letter. The company still could do more, and it's worth noting that it has since released a detailed plan to deal with the newly raised security and privacy concerns, including a 90 day freeze on all feature development to have the engineering team focus on privacy and security issues. That didn't take Senator Blumenthal's grandstanding -- and, of course, if Blumenthal's EARN IT Act passes, that would make Zoom's job that much more difficult.

I know that Senator Blumenthal loves to grandstand over tech issues, but it might help if he understood the technology, the law, and the Constitution before making such a fool of himself. Unfortunately, for over a decade he's shown a decided lack of interest in doing any of those things, and I guess he has no intention of starting now.

Filed Under: earn it, encryption, fosta, free speech, privacy, richard blumenthal, section 230, security, trolls, zoombombingCompanies: zoom

Read more here:
Senator Blumenthal Is Super Mad That Zoom Isn't Actually Offering The End To End Encryption His Law Will Outlaw - Techdirt

Encryption Software Market Trends Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 – Germany English News

New Jersey, United States: Verified Market Research has added a new research report titled, Encryption Software Market Professional Survey Report 2020 to its vast collection of research reports. The Encryption Software market is expected to grow positively for the next five years 2020-2026.

The Encryption Software market report studies past factors that helped the market to grow as well as, the ones hampering the market potential. This report also presents facts on historical data from 2011 to 2019 and forecasts until 2026, which makes it a valuable source of information for all the individuals and industries around the world. This report gives relevant market information in readily accessible documents with clearly presented graphs and statistics. This report also includes views of various industry executives, analysts, consultants, and marketing, sales, and product managers.

Global Encryption Software Market was valued at USD 3.32 billion in 2016 and is projected to reach USD 30.54 billion by 2025, growing at a CAGR of 27.96% from 2017 to 2025.

Get | Download Sample Copy @ https://www.verifiedmarketresearch.com/download-sample/?rid=1826&utm_source=GEN&utm_medium=002

The main players featured in the Encryption Software market report are:

Market Segment as follows:

The global Encryption Software Market report highly focuses on key industry players to identify the potential growth opportunities, along with the increased marketing activities is projected to accelerate market growth throughout the forecast period. Additionally, the market is expected to grow immensely throughout the forecast period owing to some primary factors fuelling the growth of this global market. Finally, the report provides detailed profile and data information analysis of leading Encryption Software company.

Encryption Software Market by Regional Segments:

The chapter on regional segmentation describes the regional aspects of the Encryption Software market. This chapter explains the regulatory framework that is expected to affect the entire market. It illuminates the political scenario of the market and anticipates its impact on the market for Encryption Software .

The Encryption Software Market research presents a study by combining primary as well as secondary research. The report gives insights on the key factors concerned with generating and limiting Encryption Software market growth. Additionally, the report also studies competitive developments, such as mergers and acquisitions, new partnerships, new contracts, and new product developments in the global Encryption Software market. The past trends and future prospects included in this report makes it highly comprehensible for the analysis of the market. Moreover, The latest trends, product portfolio, demographics, geographical segmentation, and regulatory framework of the Encryption Software market have also been included in the study.

Ask for Discount @ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=1826&utm_source=GEN&utm_medium=002

Table of Content

1 Introduction of Encryption Software Market1.1 Overview of the Market1.2 Scope of Report1.3 Assumptions

2 Executive Summary

3 Research Methodology 3.1 Data Mining3.2 Validation3.3 Primary Interviews3.4 List of Data Sources

4 Encryption Software Market Outlook4.1 Overview4.2 Market Dynamics4.2.1 Drivers4.2.2 Restraints4.2.3 Opportunities4.3 Porters Five Force Model4.4 Value Chain Analysis

5 Encryption Software Market, By Deployment Model5.1 Overview

6 Encryption Software Market, By Solution6.1 Overview

7 Encryption Software Market, By Vertical7.1 Overview

8 Encryption Software Market, By Geography8.1 Overview8.2 North America8.2.1 U.S.8.2.2 Canada8.2.3 Mexico8.3 Europe8.3.1 Germany8.3.2 U.K.8.3.3 France8.3.4 Rest of Europe8.4 Asia Pacific8.4.1 China8.4.2 Japan8.4.3 India8.4.4 Rest of Asia Pacific8.5 Rest of the World8.5.1 Latin America8.5.2 Middle East

9 Encryption Software Market Competitive Landscape9.1 Overview9.2 Company Market Ranking9.3 Key Development Strategies

10 Company Profiles10.1.1 Overview10.1.2 Financial Performance10.1.3 Product Outlook10.1.4 Key Developments

11 Appendix11.1 Related Research

Complete Report is Available @ https://www.verifiedmarketresearch.com/product/global-encryption-software-market-size-and-forecast-to-2025/?utm_source=GEN&utm_medium=002

We also offer customization on reports based on specific client requirement:

1- Free country level analysis for any 5 countries of your choice.

2- Free Competitive analysis of any market players.

3- Free 40 analyst hours to cover any other data points

About us:

Verified market research partners with the customer and offer an insight into strategic and growth analyzes, Data necessary to achieve corporate goals and objectives. Our core values are trust, integrity and authenticity for our customers.

Analysts with a high level of expertise in data collection and governance use industrial techniques to collect and analyze data in all phases. Our analysts are trained to combine modern data collection techniques, superior research methodology, expertise and years of collective experience to produce informative and accurate research reports.

Contact us:

Mr. Edwyne FernandesCall: +1 (650) 781 4080Email: [emailprotected]

Get Our Trending Report

https://www.marketresearchblogs.com/

https://www.marktforschungsblogs.com/

Tags: Encryption Software Market Size, Encryption Software Market Trends, Encryption Software Market Forecast, Encryption Software Market Growth, Encryption Software Market Analysis

See more here:
Encryption Software Market Trends Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 - Germany English News

The Global Email Encryption Market is expected to grow from USD 2,180.27 Million in 2018 to USD 5,139.28 Million by the end of 2025 at a Compound…

The Global Email Encryption Market is expected to grow from USD 2,180.27 Million in 2018 to USD 5,139.28 Million by the end of 2025 at a Compound Annual Growth Rate (CAGR) of 13.03%.

NEW YORK, April 6, 2020 /PRNewswire/ --

Read the full report: https://www.reportlinker.com/p05871804/?utm_source=PRN

The positioning of the Global Email Encryption Market vendors in FPNV Positioning Matrix are determined by Business Strategy (Business Growth, Industry Coverage, Financial Viability, and Channel Support) and Product Satisfaction (Value for Money, Ease of Use, Product Features, and Customer Support) and placed into four quadrants (F: Forefront, P: Pathfinders, N: Niche, and V: Vital).

The report deeply explores the recent significant developments by the leading vendors and innovation profiles in the Global Email Encryption Market including are BAE Systems, Cryptzone, Echoworx, Egress Software, Entrust Datacard, Intemedia, Lux Sci, Micro Focus International PLC, Mimecast, Proofpoint, Inc., Sophos Group PLC, Symantec Corporation, Trend Micro Incorporated, Virtru, and Zix.

On the basis of Type, the Global Email Encryption Market is studied across Boundary Email Encryption, Client Plugins, End-to-End Email Encryption, Gateway Email Encryption, and Hybrid Email Encryption.

On the basis of Component, the Global Email Encryption Market is studied across Services and Solution.

On the basis of Industry, the Global Email Encryption Market is studied across Aerospace & Defense, Automotive & Transportation, Banking, Financial Services & Insurance, Building, Construction & Real Estate, Consumer Goods & Retail, Education, Energy & Utilities, Government & Public Sector, Healthcare & Life Sciences, Information Technology, Manufacturing, Media & Entertainment, Telecommunication, and Travel & Hospitality.

On the basis of Deployment, the Global Email Encryption Market is studied across On-Cloud and On-Premises.

For the detailed coverage of the study, the market has been geographically divided into the Americas, Asia-Pacific, and Europe, Middle East & Africa. The report provides details of qualitative and quantitative insights about the major countries in the region and taps the major regional developments in detail.

In the report, we have covered two proprietary models, the FPNV Positioning Matrix and Competitive Strategic Window. The FPNV Positioning Matrix analyses the competitive market place for the players in terms of product satisfaction and business strategy they adopt to sustain in the market. The Competitive Strategic Window analyses the competitive landscape in terms of markets, applications, and geographies. The Competitive Strategic Window helps the vendor define an alignment or fit between their capabilities and opportunities for future growth prospects. During a forecast period, it defines the optimal or favorable fit for the vendors to adopt successive merger and acquisitions strategies, geography expansion, research & development, new product introduction strategies to execute further business expansion and growth.

Research Methodology:Our market forecasting is based on a market model derived from market connectivity, dynamics, and identified influential factors around which assumptions about the market are made. These assumptions are enlightened by fact-bases, put by primary and secondary research instruments, regressive analysis and an extensive connect with industry people. Market forecasting derived from in-depth understanding attained from future market spending patterns provides quantified insight to support your decision-making process. The interview is recorded, and the information gathered in put on the drawing board with the information collected through secondary research.

The report provides insights on the following pointers:1. Market Penetration: Provides comprehensive information on sulfuric acid offered by the key players in the Global Email Encryption Market 2. Product Development & Innovation: Provides intelligent insights on future technologies, R&D activities, and new product developments in the Global Email Encryption Market 3. Market Development: Provides in-depth information about lucrative emerging markets and analyzes the markets for the Global Email Encryption Market 4. Market Diversification: Provides detailed information about new products launches, untapped geographies, recent developments, and investments in the Global Email Encryption Market 5. Competitive Assessment & Intelligence: Provides an exhaustive assessment of market shares, strategies, products, and manufacturing capabilities of the leading players in the Global Email Encryption Market

The report answers questions such as:1. What is the market size of Email Encryption market in the Global?2. What are the factors that affect the growth in the Global Email Encryption Market over the forecast period?3. What is the competitive position in the Global Email Encryption Market?4. Which are the best product areas to be invested in over the forecast period in the Global Email Encryption Market?5. What are the opportunities in the Global Email Encryption Market?6. What are the modes of entering the Global Email Encryption Market?

Read the full report: https://www.reportlinker.com/p05871804/?utm_source=PRN

About Reportlinker ReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________ Contact Clare: clare@reportlinker.com US: (339)-368-6001 Intl: +1 339-368-6001

View original content:http://www.prnewswire.com/news-releases/the-global-email-encryption-market-is-expected-to-grow-from-usd-2-180-27-million-in-2018-to-usd-5-139-28-million-by-the-end-of-2025-at-a-compound-annual-growth-rate-cagr-of-13-03-301035759.html

SOURCE Reportlinker

Read the rest here:
The Global Email Encryption Market is expected to grow from USD 2,180.27 Million in 2018 to USD 5,139.28 Million by the end of 2025 at a Compound...

PS5 is better than Xbox Series X in terms of encryption according to Crytek – Asap Land

The creators of the first Far Cry and the Crysis saga are clear: not everything is muscle when it comes to providing something interesting on a console. Also on a technical level. In fact, Crytek claims that, at least in terms of coding, PS5 it is better than Xbox Series X. Or in other words, they consider that it is easier to program with it, which makes it more accessible for developers.

Statements that come from the company's rendering engineer, Ali Salehi, and which also provide other interesting data from both consoles. Here we tell you all the details of the interview that the developer has given in the Persian medium Vigiato and whose translation has taken place in ResetEra. Something important considering that it has subsequently been deleted from the original site.

The fact is that according to Salehi, the PS5 is a console with which it is much easier to code and develop compared to Xbox Series X. And to explain it, he cites multiple reasons. For example, the fact that Xbox Series X, like its predecessor, splits RAM in two, and they both have different bandwidths, which will be one of several factors that will create bottlenecks and prevent the console from reaching maximum capacity.

On the other hand, Salehi has also commented that the variable clock speed of the PS5 will offer another solution. "logic" compared to your competitor because you can decide what to prioritize based on each situation. Below you can read their statements in this regard.

"What Sony has done is much more logical because it decides whether the graphics card frequency is higher, or whether the CPU frequency is higher at certain times, depending on the processing load. For example, on a loading page , only the CPU is needed and the GPU is not used. Or in a close-up scene of the character's face, the GPU gets involved and the CPU plays a very small role. On the other hand, it is good that the Xbox Series X have good cooling and guarantees to keep the frequency constant. ".

Finally, when asked which console he prefers, Salehi has also been very forceful: "As a programmer, I would say that the PlayStation 5 is much better. For the Xbox, they have to put DirectX and Windows in the console, which are many years old, but for each new console that Sony builds, it also rebuilds the software and APIs of way you want. It is in your interest and in our interest. ".

View original post here:
PS5 is better than Xbox Series X in terms of encryption according to Crytek - Asap Land

Julian Assange: Judge refuses to grant Wikileaks founders partner anonymity in extradition case – The Independent

A judge has refused to grant legal anonymity to Julian Assanges partner after hearing claims the US had tried to obtain their childrens DNA.

Representatives of the Wikileaks founder submitted evidence to Westminster Magistrates Court claiming that American agencies had expressed interest in testing nappies discarded when Mr Assanges partner and children visited him at the Ecuadorian embassy.

District Judge Vanessa Baraitser found that, even if the allegation were true, there was no reason to believe US agencies meant toharm his young family.

Sharing the full story, not just the headlines

She referred to the claim while rejecting the bid to anonymise Mr Assanges partner, who the court heard wishes to live quietly with her young children away from publicity.

Following a submission by the Press Association news agency to the court, Judge Baraitser ruled that the womans right to a private family life was outweighed by the need for open justice.

Assange was arrested after Metropolitan Police officers were invited into the Ecuadorian embassy on April 11 2019. How did it come to this?

Ruptly TV

Assange shows the front page of the Guardian on July 26 2010, the day that they broke the story of the thousands of military files leaked by WikiLeaks

AFP/Getty

A warrant for Assange's arrest was issued in August 2010 for counts of rape and molestation in Sweden

AFP/Getty

The UK's Supreme Court ruled in 2012 that Assange should be extradited to Sweden to face trial

Getty

Following the ruling, Assange was given asylum by the Ecuadorian governement over fears that his human rights would be violated if he were extradited, he has since remained in the embassy in London

Getty

Friend Pamela Anderson delivers lunch to Assange at the embassy in October 2016. She has since spoken against his arrest

Getty

A UN panel found in 2016 that Assange had been arbitrarily detained and that he had not been able to claim his full right to asylum. It urged Sweden to withdraw the charges against him

Getty

Last year, the Ecuadorian embassy threatened to revoke Assange's internet access unless he stopped making political statements online and started taking better care of James, his pet cat. Assange accused Ecuador of violating his rights

Reuters

Assange was arrested on April 11 2019. Ecuador revoked his asylum status and invited the Metropolitan Police in to the embassy to arrest him.

Reuters

Assange was arrested after Metropolitan Police officers were invited into the Ecuadorian embassy on April 11 2019. How did it come to this?

Ruptly TV

Assange shows the front page of the Guardian on July 26 2010, the day that they broke the story of the thousands of military files leaked by WikiLeaks

AFP/Getty

A warrant for Assange's arrest was issued in August 2010 for counts of rape and molestation in Sweden

AFP/Getty

The UK's Supreme Court ruled in 2012 that Assange should be extradited to Sweden to face trial

Getty

Following the ruling, Assange was given asylum by the Ecuadorian governement over fears that his human rights would be violated if he were extradited, he has since remained in the embassy in London

Getty

Friend Pamela Anderson delivers lunch to Assange at the embassy in October 2016. She has since spoken against his arrest

Getty

A UN panel found in 2016 that Assange had been arbitrarily detained and that he had not been able to claim his full right to asylum. It urged Sweden to withdraw the charges against him

Getty

Last year, the Ecuadorian embassy threatened to revoke Assange's internet access unless he stopped making political statements online and started taking better care of James, his pet cat. Assange accused Ecuador of violating his rights

Reuters

Assange was arrested on April 11 2019. Ecuador revoked his asylum status and invited the Metropolitan Police in to the embassy to arrest him.

Reuters

But the judge delayed making the womans identity public until 4pm on 14 April, pending a possible judicial review at the High Court.

Mr Assange was previously denied bail amid concerns over the spread of coronavirus in British jails, and the application had been supported by the unnamed woman.

The 48-year-old is being held on remand at HMP Belmarsh, in south-east London, ahead of an extradition hearing on 18 May.

During the virtual hearing, the judge also rejected a bid to delay the hearing because of the coronavirus crisis.

Mr Assanges barrister, Edward Fitzgerald QC, said there were insuperable difficulties preparing his case because of the pandemic, and requested an adjournment until September.

No hype, just the advice and analysis you need

He told the court that he had not been able to see Mr Assange in jail and could see no viable way his client could be present in court to hear witnesses.

On Mr Assanges mental state, he told the judge: There are difficulties of the pandemic with the defendant himself. You are aware he has well documented problems of clinical depression.

Mr Assanges treatment was on hold during the lockdown and he had been unable to see his family.

Mr Fitzgerald said: In those circumstances, in his vulnerable condition, to force him to enter a full evidential hearing in May, we respectfully submit it would be unjust. We respectfully submit it would be oppressive.

Sweden discontinues Assange rape investigation

He stressed it was an exceptional circumstance, adding: This is not a case where second best will do, where we should just try to muddle through. The difficulties are insuperable in the current crisis.

Ruling against him, Judge Baraitser said the extradition hearing was still five weeks away and it was expected courts would resume in a fortnight despite the continuing lockdown.

She added: I cannot assume the courts will not be operating normally by then.

Mr Assange is in custody and there is some urgency of this case being heard to its conclusion.

If there was a need for a third and final hearing after the hearing on 18 May, it will be held in July.

Mr Assange is fighting extradition to the US, where he would face 17 charges under the Espionage Act and conspiracy to commit computer intrusion, over the publication of hundreds of thousands of classified documents in 2010 and 2011.

He has been held in custody since being arrested at the Ecuadorian embassy in London almost exactly a year ago.

He sought asylum there in 2012 while wanted under a European Arrest Warrant for interview in a Swedish rape investigation which has since been dropped.

Additional reporting by PA

Read the original post:
Julian Assange: Judge refuses to grant Wikileaks founders partner anonymity in extradition case - The Independent