Google’s Android L to Include Default Encryption

Encryption has been available on Android since 2011, but most users probably didn't know how to turn it on.

And for Google's next trick, the search giant will launch its next-generation Android L operating system with encryption on by default.

"For over three years Android has offered encryption, and keys are not stored off of the device, so they cannot be shared with law enforcement," a company spokeswoman told PCMag. "As part of our next Android release, encryption will be enabled by default out of the box, so you want even have to think about turning it on."

The move was first reported by The Washington Post, which noted that encryption has indeed been available on Android since 2011, but the average user was not really aware of how to turn it on.

Apple is doing something similar with iOS 8.

"On devices running iOS 8, your personal data such as photos, messages (including attachments), email, contacts, call history, iTunes content, notes, and reminders is placed under the protection of your passcode," Apple said on its website. "Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data. So it's not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8."

Tech firms like Google and Apple have been rushing to offer more secure solutions in the wake of Edward Snowden's NSA spying revelations, not to mention hacks like the recent nude celebrity photo leaks.

This summer, the Supreme Court unanimously ruled that police must get a warrant before they can search the contents of your mobile device. It doesn't matter whether you carry the latest smartphone or a dated feature phone: If the cops want to know what secrets it holds, they need to talk to a judge first.

As the Post noted, Apple's iOS updates roll out all at once to eligible handsets, meaning a good number of iPhone owners will have an encrypted device very soon. Apple's iOS 8 rolled out on Wednesday, and the iPhone 6 and 6 Plus, which are pre-loaded with iOS 8, hit stores today in the U.S.

Android updates, meanwhile, are usually at the discretion of mobile carriers, meaning that Android L - and encryption - will be rolling out piecemeal on a device-by-device and carrier-by-carrier basis later this year.

View original post here:
Google's Android L to Include Default Encryption

Google: Android L turns data encryption on by default

Turning on data encryption can make a huge difference in case your Android device is lost or stolen, as it will make it extremely difficult -- if not impossible -- for a third-party to access yourfiles. It also gives you quite a bit of time to remotely wipe your device, which means that your photos, videos, texts and whatnot have a better chance of remaining private.

And if the local authorities want to take a peek, theyare also out of luck -- it's good news for those involved in criminal enterprises, and others as well. All this sounds great from a privacy and security standpoint, except that encryption has never been enabled by default in Android. But that is soon about to change.

In a statement that was just given to The Washington Post, Google spokesperson Niki Christoff revealsthat "As part of [Google's] next Android release, encryption will be enabled by default out of the box, so you won't even have to think about turning it on".

Google's next Android release is known as "Android L" at this stage, and will be ready for prime time later this year, if the launch date of past releases is of any indication. Android L has been made available to beta testers, and features a redesigned user interface, a new default runtime, extra security features, 64-bit support and more. You can read about it here.

The encryption key, which is needed to unlock the contents of the internal storage (and, presumably, the microSD card too), will continue to be only in your control, as it has been the case in the past three years, according to Christoff. This is very similar to how Apple's now doing things with iOS 8, which also only gives you the encryption key. To take advantage of this, a passcode must be set up.

That last bit is extremely important because encrypting an Android device without using any sort of passcode is practically impossible right now, and, frankly, pointless. For instance, Android 4.4 KitKat requires users to set up a PIN in order to encrypt the contents of the internal storage and microSD card.

How strong the PIN is will determine how easy it will be for a third-party to render your encryption efforts useless. Using a complex sequence is recommended, even though it may make the unlocking more difficult. That said, I am using an eight-digit PIN right now and I quickly got used to it.

Photo Credits:Slavoljub Pantelic/Shutterstock

Excerpt from:
Google: Android L turns data encryption on by default

What’s Homomorphic Encryption And Why Did ItWin A MacArthur Genius Grant?

Craig Gentry, a cryptographer working at IBMs Thomas Watson Research Center in the suburbs outside New York City, recently received a phone call that changed his life. His passion, an experimental and mainly theoretical type of encryption called homomorphic encryption, just won a MacArthur Genius Grant.

The complicated encryption method lets users run programs without actually decrypting them. Paul Ducklin, a security researcher working for Sophos, laid out a neat summary of how this works:

Imagine, however, if I could simply take your encrypted search terms, leave them encrypted, search for them directly in the still-encrypted database, and get the same results. If I can perform calulations directly on your encrypted data, yet get the same results that you get from the unencrypted data, we both win enormously from a security and privacy point of view. You don't need to give me any decryption keys at all, so you no longer have to trust me not to lose, steal or sell your data. (You still have to trust me to tell you the truth about any results I work out for you, but that is a completely different issue.) And I no longer need your decryption keys, so I can't lose or abuse your data even if I wanted to.

For security-conscious cloud and SaaS providers, this is a very big deal. Gentry has been working on homomorphic encryption for years, and the first big steps to commercialization came out last year when IBM released an open source software package for developers called HElib. The HE stands for homomorphic encryption.

John Launchbury, a DARPA program manager, told Co.Labs that "Originally cryptography was all about keeping communications private. Then it became standard to use cryptography for securing stored data, in case someone steals your computer. Now with the prevalence of cloud computing, it is becoming clear that we also need to be serious about data confidentiality even while computing with it--in case someone is able to observe the computation as it proceeds."

"Homomorphic encryption," he added, "Is one way to enable this: it is a form of encryption that allows computations to be performed on data without having to decrypt the data. You could store information on a cloud server, have the cloud provider perform some tasks on the data, without the cloud provider ever learning anything about your data. This could have profound implications for improving our privacy. Unfortunately, the performance challenges are so serious that it cannot yet be used in practice."

Writing back in 2009, security expert Bruce Schneier explained that homomorphic encryption is important because it could potentially make security much easier for distributed software systems:

Any computation can be expressed as a Boolean circuit: a series of additions and multiplications. Your computer consists of a zillion Boolean circuits, and you can run programs to do anything on your computer. This algorithm means you can perform arbitrary computations on homomorphically encrypted data. More concretely: if you encrypt data in a fully homomorphic cryptosystem, you can ship that encrypted data to an untrusted person and that person can perform arbitrary computations on that data without being able to decrypt the data itself. Imagine what that would mean for cloud computing, or any outsourcing infrastructure: you no longer have to trust the outsourcer with the data.

Although Schneier went on to be critical about practical applications for homomorphic encryption (which, to be fair, was written years ago), IBM has been taking out patents on the method that hint at eventual commercialization.

Gentry didnt invent homomorphic encryption, but his research is going a long way to making it usable. Over the next five years, Gentry will receive a no-strings-attached grant of $625,000 from the MacArthur Foundation to follow his passions. In a few years, if his work makes its way to the marketplace, it might solve a lot of our current problems with privacy protection and data security.

Read more:
What's Homomorphic Encryption And Why Did ItWin A MacArthur Genius Grant?

Porticor Helps Healthcare Organizations Meet HIPAA Compliance and Protect Private Information …

Porticor's Data Encryption and Key Management Solution Enables Health Organizations to Secure Protected Health Information in the Cloud and Meet Safe Harbor Compliance

CAMPBELL, Calif. Porticor, a leading cloud data security company delivering the only cloud-based key management and data encryptionsolution that infuses trust into the cloud and keeps cloud data confidential, today announced growing customer traction in the healthcare industry due to its innovative solution enabling health organizations to secure cloud-based Protected Health Information (PHI) and helping them meet HIPAA and Safe Harbor compliance.

The Porticor Virtual Private Data (VPD) platform is a cloud key management and encryption solution that delivers the healthcare industry's most secure cloud encryption key management by enabling health organizations to securely maintain control of their own encryption keys. Unlike traditional data encryption solutions, which are complicated and expensive to deploy and manage, Porticor's split-key encryption and homomorphic key management system is offered as the industry's first cloud data protection service of its kind, delivering true confidentiality of data in cloud, virtual and hybrid environments by ensuring encryption keys are never exposed.

"HIPAA requires us to protect data at rest and in motion," said Kathleen Sidenblad, VP of Engineering at Amplify Health, LLC, of San Francisco. "We have found Porticor's cloud data security and performance to be very good. Managing our own data encryption keys is important to us and Porticor lets us do that. We take security very seriously, and other solutions don't allow us to easily control our own keys."

Over the years, a variety of factors have led to an increase in healthcare organizations embracing cloud computing, including the need to do more with less money and the need to leverage data analytics to drive better care and reduce costs. Today many health apps such as EMR/EHRs are now cloud based, giving health workers computing resources available on demand, and allowing for scalable implementations, high availability and faster rollout of services.

"Porticor offers a unique blend of technical, cloud, key management and affordability features," said Christine Sublett, President of Sublett Consulting, a Porticor partner and HIPAA compliance expert assisting healthcare and technology companies with security, privacy and compliance issues. "The price point is reasonable, and their key management technology is superior to anything else we explored. Prior to Porticor we had to manage our own encryption keys, and it was something we didn't do well."

Integrating with major players such as HP, AWS and VMware, Porticor provides the industry's only software-defined, automated solution that uniquely eliminates the need for cumbersome, non-scalable, and expensive hardware security modules for the cloud. Uniquely combining data encryption with patented split-key encryption and homomorphic key management technologies, Porticor protects critical data in public, private and hybrid cloud environments. It provides the strong security needed for healthcare compliance in a convenient, cost-effective, fully cloud-based solution.

"The cloud is no less secure inherently than a traditional data center, and of primary concern from a logical standpoint would be encryption of data in the cloud," said Sublett. "There are two places where I see Porticor out in front of the competition. First, its key management solution is truly elegant. Key management is an ongoing challenge for companies, and Porticor's homomorphic key management solution solves this problem. Porticor's solution also has implications for an organization that wishes to utilize the protections afforded it under Safe Harbor."

"In the event of a security incident that is a suspected breach, and if the healthcare company is utilizing Porticor's API application-level integration for data encryption, there is a reasonable likelihood that, after performing a breach risk assessment, they could make the determination that there is a low probability that the PHI has been compromised and thereby claim safe harbor," Sublett continued. "This means that the onus of reporting a breach is largely ameliorated, with fines and reputation loss avoided."

While other solutions require encryption keys to be manually managed for every disk, distributed storage or database record, or to be owned by a cloud provider, Porticor's homomorphic split-key encryption technology eliminates both complexity and compromises. Porticor restores key ownership to customers while automatically managing customer encryption keys with maximum security. With homomorphic key management, the keys are protected at all times even while they are in use. Porticor protects the entire data layer stack, including virtual disks, distributed storage, databases, and applications. It dynamically encrypts and decrypts virtual data whenever the application needs access, and delivers a key management system that is fully hosted in the cloud, yet offers the confidentiality, security and trust of a system that is hosted inside the datacenter. Within minutes, customers can encrypt their entire data layer with the proven AES 256-bit encryption algorithm.

View post:
Porticor Helps Healthcare Organizations Meet HIPAA Compliance and Protect Private Information ...

Encryption goof fixed in TorrentLocker file-locking malware

The developers of a type of malicious software that encrypts a computers files and demands a ransom have fixed an error security experts said allowed files to be recovered without paying.

The malware, called TorrentLocker, popped up last month, targeting users in Australia, according to iSight Partners, a security consultancy. It now appears to be also geo-targeting victims in the U.K.

TorrentLockers developers ironically made a similar mistake as the creators of another ransomware program, CryptoDefense. Researchers found earlier this year that CryptoDefense left a decryption key on a persons computer, although the error was soon fixed.

Earlier this month, researchers with the consultancy Nixu found that TorrentLocker used the same keystream to encrypt all of a computers files. That was a mistake, as a keystream should never be used more than once, according to a writeup on the SANS Institute blog.

As the encryption was done by combining the keystream with the plaintext file using the XOR operation, we were able to recover the keystream used to encrypt those files by simply applying XOR between the encrypted file and the plaintext file, they wrote.

With the error out in the open, it was only a matter of time before it was fixed.

Richard Hummel, a senior technical analyst with iSight, wrote that a variant of TorrentLocker without that bug has now been found, which shows the extremely high pace of innovation of our collective adversaries.

The latest version also scans profiles in the Thunderbird email client for email addresses and passwords, he wrote. This will almost certainly be used to further the spam campaign for TorrentLocker, he wrote.

TorrentLocker asks for US$500 to unlock the files, payable in bitcoin. Hummel wrote that although the percentage of people who pay is low, a look at the bitcoin address associated with TorrentLocker showed that the attackers are making many bitcoins, he wrote.

Jeremy is the Australia correspondent for IDG News Service, which distributes content to IDG's more than 300 websites and magazines in more than 60 countries. More by Jeremy Kirk

Originally posted here:
Encryption goof fixed in TorrentLocker file-locking malware

Sookasa’s Dropbox Encryption Solution Named by Blog HIPAA as One of “5 Key Tools to Help Achieve HIPAA Compliance”

San Mateo, CA (PRWEB) September 16, 2014

Sookasa, Inc., an innovator in encryption and compliance for popular cloud applications and mobile devices, is excited to announce that Sookasas Dropbox encryption solution has been selected by Blog HIPAA as one of 5 Key Tools to Help Achieve HIPAA Compliance. Also featured in the top 5 were Compliancy Group, DataMotion, qliqSoft, and Online Tech. Blog HIPAA is an industry leading resource center for news, best practices, case studies and guides for achieving HIPAA compliance.

Blog HIPAA reports that over 25% of all healthcare entities utilize external storage for Protected Health Information (PHI). Cloud storage and synchronization solutions like Dropbox offer many benefits to healthcare providers, such as file synchronization across multiple sites and devices, and seamless mobile access. However, utilizing services like Dropbox without an extra layer of encryption and compliance can pose significant risks to healthcare providers, because the loss of a single device that is connected to a cloud account can cause a catastrophic data breach and significant legal liability.

Sookasa provides healthcare organizations with a self-service transparent Dropbox encryption and compliance solution that enables their employees to safely use their favorite mobile devices and cloud services. Sookasa enables healthcare providers to remain HIPAA compliant, by encrypting sensitive data anywhere it resides, and providing organizations with centralized cloud-based access control and auditing that guarantee that only authorized people and devices can access Protected Health Information. Blog HIPAA described Sookasas Dropbox encryption solution as a key tool for healthcare providers and business associates that need to achieve HIPAA compliance while enjoying the productivity benefits of cloud-connected mobile devices.

###

About Sookasa Sookasa is the industrys first Compliance as a Service that transparently protects files across popular cloud services and mobile devices. Sookasa enables professionals to use their favorite cloud services, such as Dropbox and Gmail, and mobile devices, while transparently encrypting sensitive data and addressing regulations such as HIPAA and FERPA. The company is led by a team of academics, serial entrepreneurs and seasoned security veterans. Headquartered in San Mateo, Calif., Sookasa is backed by Accel Partners and other top-tier investors, including Andreessen Horowitz and First Round Capital. For more information about Sookasa and its solutions, call (888) 675-4998.

Visit link:
Sookasa’s Dropbox Encryption Solution Named by Blog HIPAA as One of “5 Key Tools to Help Achieve HIPAA Compliance”

Open-source project promises easy-to-use encryption for email, instant messaging and more

A software development project launched Monday aims to create free tools that simplify the encryption of online forms of communication like email, instant messaging, SMS and more by solving the complexity associated with the exchange and management of encryption keys.

Called Pretty Easy Privacy (PEP), the projects goal is to integrate the technology with existing communication tools on different desktop and mobile platforms. The development team launched a preview PEP implementation Monday for the Microsoft Outlook email client, but plans to build similar products to encrypt communications in Android, iOS, Firefox OS, Thunderbird, Apple Mail, Jabber, IRC (Internet Relay Chat), WhatsApp, Facebook Messenger, Snapchat and Twitter.

The PEP developers launched a crowdfunding campaign on Indiegogo to raise funds that would allow them to set up a foundation to support the project and speed up the development of the various implementations for different platforms.

While most PEP software will be released under the GNU General Public License version 3 and will be free to use, the team will also develop business products that will be commercialized through a new Luxembourg-based company called PEP Security.

The PEP engine relies on existing open-source technologies like GnuPG, an implementation of the OpenPGP encryption standard; GNUnet, a framework for decentralized, peer-to-peer networking; and NetPGP, an OpenPGP implementation for platforms like iOS, where GnuPG is not supported. However, its primary goal is to provide no hassle privacy through a zero-touch user experience, according to its developers.

On installation PEP automatically generates encryption keys for the user or imports them from a local PGP client. It is also able to discover the keys for the users communication partners if they uploaded them on public keyservers or already sent signed emails in the past. This means PEP will start encrypting communications straight away with some users and works even if the other side doesnt use PEP, but other PGP, S/MIME or CMS implementations.

The PEP engine is doing exactly what a hacker does when he or she is using PGP: create a good keypair with reliable algorithms, handle it safely, manage public keys of other people, and operate the crypto solution in the best known way to keep it safe, said Volker Birk, a German software architect and one of the projects founders, in a blog post.

The PEP plug-in for Outlook uses color-coded trust indicators for email contacts. The default one is grey and signifies that encrypted communication is not yet possible with the selected contact. When the recipients keys are known and already in the keystore, the trust indicator switches to yellow, which means encrypted communication is possible, but potentially vulnerable to man-in-the-middle attacks.

In order to achieve the highest level of protection, signaled by a green indicator, the two parties need to exchange PEP-generated safe words over the phone. Once this handshake is confirmed, the communication is protected against all known attacks, the PEP developers said on the projects Indiegogo page.

The technology does not rely on centralized infrastructure and uses peer-to-peer technology for anonymous transport. When both parties use it, its not just the content of messages that get encrypted, but metadata like the subject line in the case of emails.

See the article here:
Open-source project promises easy-to-use encryption for email, instant messaging and more