Zoom’s New App Update Combats ‘Zoombombing’ and Boosts Encryption – Newsweek

Video-conferencing application Zoom is set to receive additional security updates that are designed to increase "resistance against tampering."

The software, which experienced a surge in use during the COVID-19 pandemic as users started working, learning, and socializing from home, attracted criticism for security and privacy bugs, including the meetings that were susceptible to hijacking, a process called "Zoombombing."

Now, the team behind the application says a new version will add support for better encryption and give hosts the ability to report other users through a dedicated security icon.

Meeting passwords are now default and administrators will also have the option of defining password complexity, such as length and special character requirements. The suite of security features, previously scattered in meeting menus, is now grouped together in a dedicated area.

"Hosts can require all participants to register for the meeting, where they enter their first name, last name, email address, and other information, which the host can then confirm. Hosts can also use the security icon to disable the ability for participants to rename themselves," the firm said in a blog post.

Zoom said "report a user" and encryption will be supported in Zoom 5.0, which is releasing within the week. To get the update, visit zoom.com/download or follow the steps within the client.

The changes come as part of a 90-day security plan that was put in place after Zoom CEO Eric Yuan conceded the app had "fallen short of the community's privacy and security expectations."

As of March, Zoom said it was used by roughly 200 million daily meeting participants, both free and paid. That was up from approximately 10 million daily meeting participants in December 2019.

The influx of fresh users brought a new set of problems for the software, which was previously focused towards an enterprise audience. The FBI warned public meetings were being disrupted across the U.S., hijacked in real-time to show pornography, hate images or threatening language.

Governments and businesses, including Google, Nasa and SpaceX, urged their employees to avoid the app as a result of mounting security concerns, and Zoom acknowledged calls were vulnerable. In the U.S., police recently arrested a teenager who allegedly targeted a teacher's meetings.

The Intercept reported Zoom's video and audio meetings were not actually being supported by end-to-end encryption, despite claims that were previously made in its own security policies. The BBC reported today multiple meetings this week were hijacked to show footage of child abuse, with Zoom telling the news outlet that it is investigating the incident. Police are also probing the cases.

Zoom executives say the new version of the app is one step towards better protecting the user base, and confirmed that public meeting IDs, used to join calls, have been made less visible.

"From our network to our feature set to our user experience, everything is being put through rigorous scrutiny," said Oded Gal, chief product officer (CPO) of Zoom. "On the back end, AES 256-bit GCM encryption will raise the bar for securing our users' data in transit. On the front end, I'm most excited about the Security icon in the meeting menu bar.

"This takes our security features, existing and new, and puts them front and center for our meeting hosts. With millions of new users, this will make sure they have instant access to important security controls in their meetings." And talking security, CEO Yuan pledged: "This is just the beginning."

See the article here:
Zoom's New App Update Combats 'Zoombombing' and Boosts Encryption - Newsweek

Advanced Encryption Standard (AES): What It Is and How It Works – Hashed Out by The SSL Store – Hashed Out by The SSL Store

Understanding advanced encryption standard on basic level doesnt require a higher degree in computer science or Matrix-level consciousness lets break AES encryption down into laymans terms

Hey, all. We know of security of information to be a hot topic since, well, forever. We entrust our personal and sensitive information to lots of major entities and still have problems with data breaches, data leaks, etc. Some of this happens because of security protocols in networking, or bad practices of authentication management but, really, there are many ways that data breaches can occur. However, the actual process of decrypting a ciphertext without a key is far more difficult. For that, we can thank the encrypting algorithms like the popular advanced encryption standard and the secure keys that scramble our data into indecipherable gibberish.

Lets look into how AES works and different applications for it. Well be getting a little into some Matrix-based math so, grab your red pills and see how far this rabbit hole goes.

Lets hash it out.

You may have heard of advanced encryption standard, or AES for short but may not know the answer to the question what is AES? Here are four things you need to know about AES:

The National Institute of Standards and Technology (NIST) established AES as an encryption standard nearly 20 years ago to replace the aging data encryption standard (DES). After all, AES encryption keys can go up to 256 bits, whereas DES stopped at just 56 bits. NIST could have chosen a cipher that offered greater security, but the tradeoff would have required greater overhead that wouldnt be practical. So, they went with one that had great all-around performance and security.

AESs results are so successful that many entities and agencies have approved it and utilize it for encrypting sensitive information. The National Security Agency (NSA), as well as other governmental bodies, utilize AES encryption and keys to protect classified or other sensitive information. Furthermore, AES is often included in commercial based products, including but limited to:

Although it wouldnt literally take forever, it would take far longer than any of our lifetimes to crack an AES 256-bit encryption key using modern computing technology. This is from a brute force standpoint, as in trying every combination until we hear the click/unlocking sound. Certain protections are put in place to prevent stuff from like this happening quickly, such as a limit on password attempts before a lockdown, which may or may not include a time lapse, to occur before trying again. When we are dealing with computation in milliseconds, waiting 20 minutes to try another five times would seriously add to the time taken to crack a key.

Just how long would it take? We are venturing into a thousand monkeys working on a thousand typewriters to write A Tale of Two Cities territory. The possible combinations for AES 256-bit encryption is 2256. Even if a computer can do multiple quadrillions of instructions per second, then we are still in that eagles-wings-eroding-Mount-Everest time frame.

Needless to say, its waaaaaaaaaaaaaaaaaaay (theres not enough memory on our computers to support the number of a letters that I want to convey) longer than our current universe has been in existence. And thats just for a 16-byte block of data. So, as you can see, brute forcing AES even if it is 128 bits AES is futile.

That would likely change, though, once quantum computing becomes a little more mainstream, available, and effective. Quantum computing is expected to break AES encryption and require other methods to protect our data but thats still a ways down the road.

Manage Digital Certificates like a Boss

14 Certificate Management Best Practices to keep your organization running, secure and fully-compliant.

To better understand what AES is, you need to understand how it works. But in order to see how the advanced encryption standard actually works, however, we first need to look at how this is set up and the rules concerning the process based on the users selection of encryption strength. Typically, when we discuss using higher bit levels of security, were looking at things that are more secure and more difficult to break or hack. While the data blocks are broken up into 128 bits, the key size have a few varying lengths: 128 bits, 196 bits, and 256 bits. What does this mean? Lets back it up for a second here.

We know that encryption typically deals in the scrambling of information into something unreadable and an associated key to decrypt the scramble. AES scramble procedures use four scrambling operations in rounds, meaning that it will perform the operations, and then repeat the process based off of the previous rounds results X number of times. Simplistically, if we put in X and get out Y, that would be one round. We would then put Y through the paces and get out Z for round 2. Rinse and repeat until we have completed the specified number of rounds.

The AES key size, specified above, will determine the number of rounds that the procedure will execute. For example:

As mentioned, each round has four operations.

So, youve arrived this far. Now, you may be asking: why, oh why, didnt I take the blue pill?

Before we get to the operational parts of advanced encryption standard, lets look at how the data is structured. What we mean is that the data that the operations are performed upon is not left-to-right sequential as we normally think of it. Its stacked in a 44 matrix of 128 bits (16 bytes) per block in an array thats known as a state. A state looks something like this:

So, if your message was blue pill or red, it would look something like this:

So, just to be clear, this is just a 16-byte block so, this means that every group of 16 bytes in a file are arranged in such a fashion. At this point, the systematic scramble begins through the application of each AES encryption operation.

As mentioned earlier, once we have our data arrangement, there are certain linked operations that will perform the scramble on each state. The purpose here is to convert the plaintext data into ciphertext through the use of a secret key.

The four types of AES operations as follows (note: well get into the order of the operations in the next section):

As mentioned earlier, the key size determines the number of rounds of scrambling that will be performed. AES encryption uses the Rjindael Key Schedule, which derives the subkeys from the main key to perform the Key Expansion.

The AddRoundKey operation takes the current state of the data and executes the XOR Boolean operation against the current round subkey. XOR means Exclusively Or, which will yield a result of true if the inputs differ (e.g. one input must be 1 and the other input must be 0 to be true). There will be a unique subkey per round, plus one more (which will run at the end).

The SubBytes operation, which stands for substitute bytes, will take the 16-byte block and run it through an S-Box (substitution box) to produce an alternate value. Simply put, the operation will take a value and then replace it by spitting out another value.

The actual S-Box operation is a complicated process, but just know that its nearly impossible to decipher with conventional computing. Coupled with the rest of AES operations, it will do its job to effectively scramble and obfuscate the source data. The S in the white box in the image above represents the complex lookup table for the S-Box.

The ShiftRows operation is a little more straightforward and is easier to understand. Based off the arrangement of the data, the idea of ShiftRows is to move the positions of the data in their respective rows with wrapping. Remember, the data is arranged in a stacked arrangement and not left to right like most of us are used to reading. The image provided helps to visualize this operation.

The first row goes unchanged. The second row shifts the bytes to the left by one position with row wrap around. The third row shifts the bytes one position beyond that, moving the byte to the left by a total of two positions with row wrap around. Likewise, this means that the fourth row shifts the bytes to the left by a total of three positions with row wrap around.

The MixColumns operation, in a nutshell, is a linear transformation of the columns of the dataset. It uses matrix multiplication and bitwise XOR addition to output the results. The column data, which can be represented as a 41 matrix, will be multiplied against a 44 matrix in a format called the Gallois field, and set as an inverse of input and output. That will look something like the following:

As you can see, there are four bytes in that are ran against a 44 matrix. In this case, matrix multiplication has each input byte affecting each output byte and, obviously, yields the same size.

Now that we have a decent understanding of the different operations utilized to scramble our data via AES encryption, we can look at the order in which these operations execute. It will be as such:

Note: The MixColumns operation is not in the final round. Without getting into the actual math of this, theres no additional benefit to performing this operation. In fact, doing so would simply make the decryption process a bit more taxing in terms of overhead.

If we consider the number of rounds and the operations per round that are involved, by the end of it, you should have a nice scrambled block. And that is only a 16-byte block. Consider how much information that equates to in the big picture. Its miniscule when compared to todays file/packet sizes! So, if each 16-byte block has seemingly no discernable pattern at least, any pattern that can be deciphered in a timely manner Id say AES has done its job.

We know the advanced encryption standard algorithm itself is quite effective, but its level of effectiveness depends on how its implemented. Unlike the brute force attacks mentioned above, effective attacks are typically launched on the implementation and not on the algorithm itself. This can be equated to attacking users as in phishing attacks versus attacking the technology behind the service/function that may be hard to breach. These can be considered side-channel attacks where the attacks are being carried out on other aspects of the entire process and not the focal point of the security implementation.

While I always advocate going with a reasonable/effective security option, a lot of AES encryption is happening without you even knowing it. Its locking down spots of the computing world that would otherwise be wide open. In other words, there would be many more opportunities for hackers to capture data if advanced encryption standard wasnt implemented at all. We just need to know how to identify the open holes and figure out how to plug them. Some may be able to use AES and others may need another protocol or process.

Appreciate the encryption implementations we have, use the best ones when needed, and happy scrutinizing!

See more here:
Advanced Encryption Standard (AES): What It Is and How It Works - Hashed Out by The SSL Store - Hashed Out by The SSL Store

The EARN IT Act Threatens Privacy, but This Developer Is Fighting Back with an Encrypted Messaging System Based on Bitcoin Cash | Will Heasman -…

Bitcoin Cash developer Chris Troutner has taken the fight for privacy to new levels after creating an encrypted messaging system that harnesses Bitcoin Cash transactions.

Dubbed bch-encrypt, the system works in a similar way to email encryption.

"In email, you get someone's public key, encrypt the message, and only the person with the private key can decrypt the message," Troutner told Decrypt.

Similarly, within bch-encrypt, anyone can encrypt a message as long as they have a Bitcoin Cash address. The message gets written to the blockchain, and only a person with the private key held by that address can decrypt the message.

Troutner developed the messaging system as a response to the Eliminating Abusive and Rampant Neglect of Interactive Technologies (EARN IT) Act, currently the subject of hearings in the US Senate. The bipartisan legislative effort was formulated as a means to fight online child sexual abuse, but privacy advocates such as the Electronic Frontier Foundation have called the Act a disaster for Internet users free speech and security. They argue that EARN IT could be used to eliminate end-to-end encryption in instant messaging apps and other communications platforms.

For Troutner, this was a bridge too far.

"To prove how ineffective these lawmakers will be, I put this video demo of some software I wrote. It lets you encrypt a message and send it to someone using Bitcoin Cash, Troutner wrote on a Reddit thread. "There isn't a damn thing any state actor can do to stop the communication or break the encryption. Bitcoin does not respect laws."

Because the encryption leverages the Bitcoin protocol, he explains, there is no way for any company using it to comply with the EARN IT act.

"The decryption simply wouldn't work if anyone tried to comply with law enforcement on it. The billions of dollars at stake in the Bitcoin forks prove that the encryption can't be broken by any state actor," he said.

As for any limitationssuch as inundating the blockchain with surplus dataTroutner explained that as long as the system omits large files, there shouldn't be an issue.

"This technique could be expanded by leveraging IPFS, in order to encrypt and share large files," he said.

One condition of bch-encrypt is the necessity to provide a private key for payment when sending a message. When asked whether this could pose a security risk, Troutner reasoned that it wouldn't be prudent to store a lot of money on the address that controls encrypted messages.

Right now, bch-encrypt exists only on Github. However, Troutner intends to streamline the system to make it more widely accessible.

"I plan to create a web page on FullStack.cash where people can enter a 12-word mnemonic, someone else's Bitcoin Cash address, and a message, then click send. 1,2,3. That's how easy it will be to send encrypted messages to people on the Bitcoin Cash network."

He also revealed plans to integrate it into two blockchain-based decentralized social media platformsmemo.cash, a Twitter-esque platform, and member.cash, a site reminiscent of Reddit.

Decentralization has been mooted as a solution to the myriad issues currently facing centralized social media platforms. One advocate is Twitter CEO Jack Dorsey, who has announced plans to create an open and decentralized standard for social media.

Dubbed Bluesky, the project aims to tackle entirely new challenges centralized solutions are struggling to meet, including abuse and misleading information.

Now, with the EARN IT act threatening privacy protections, decentralized social media projects could attract greater scrutiny.

This article was reprinted with permission from Decrypt.

More:
The EARN IT Act Threatens Privacy, but This Developer Is Fighting Back with an Encrypted Messaging System Based on Bitcoin Cash | Will Heasman -...

14 Tech Pros Predict The ‘Next Big Thing’ In Cybersecurity And Encryption – Forbes

Cybersecurity is a constant arms race. Because of its continuous evolution, what firms have solved for today might be obsolete by tomorrow. But unfortunately, many media outlets don't focus on the technical innovations of the industry and prefer to look at the failures of cybersecurity.

Instead of covering how encryption technology has evolved, media outlets cover how hackers have bypassed security measures. As a result, people may be less aware of what the current and future trends of cybersecurity and encryption are. To help educate and inform others, 14 experts from Forbes Technology Council explore the latest innovations and trends coming soon in the world of cybersecurity and why they are important.

1. Security By Design

Over the first 20 years of the internet age, security and encryption have been add-on products on top of systems built without it. For the next 20 years we'll see security from the ground up go mainstream. An example in today's world is the Apple iOS for iPhone/iPad or Microsoft Windows 10 with BitLocker and Defender enabled. - Bret Piatt, Jungle Disk

2. Proxy Re-Encryption

Fueled by the rise of distributed applications, new advancements in encryption technologies allow private data to be stored on public, decentralized networks. Exciting developments in proxy re-encryption (PRE) make this possible, and usability is critical. Data owners can grant or revoke access to their encrypted data without having to worry about the complexities of encryption and key management. - Mark Pryor, The Seam

3. Secure Multiparty Computation

This is an exciting time for cryptography. Secure multiparty computation (MPC) replaces dated hardware, realizing operational agility and cost-effectiveness, and is a natural fit for cloud. MPC eliminates single points of failure, and is synergetic with cybersecurity technologies, improving authentication, insider threat mitigation and key management while driving innovation. - Yehuda Lindell, Unbound Tech

4. More Customization And Smarter Solutions

The next big thing in cybersecurity will be responsive and predictive technologies underpinning sector-specific, real-time defense systems. There will be a shift away from reliance on one-size-fits-all security services and toward more intelligent and informative cybersecurity solutions customized to better engage, protect and serve particular industry ecosystems. - Charles Aunger, Health2047 - American Medical Association

5. Artificial Intelligence-Powered Cybersecurity

Expect more AI in cybersecurity, from both the perspective of a hacker and from those trying to defend against attacks. Hackers will be able to infuse AI-powered malware, for example, to infiltrate networks and stay dormant until it finds the optimal time to deploy its payload. On the flipside, security tools will use AI to identify anomalies that we may currently miss. Who will win is anyone's guess. - Jason Lau, Crypto.com

6. A Predictive Model To Eliminate Threat Vectors

The current generation of cyber protection using a solution that is divorced from the asset it is protecting so as to catch the predator in advance of the actual attack on protected resources will continue to be enhanced. Next big thing? The introduction of artificial intelligence and data analytics into a predictive model that will determine threat vectors and shut them down before they even start. - Jerry Nelson, Beyond Impact

7. Increased Focus On Physical Security

The vast majority of breaches and hacks come from a failure to maintain good physical security. The bottom line is most hacks start with someone gaining access to credentials. A hacker will not be successful if you do not invite them in. Want to lessen your risk of intrusion? Get streetwise and make sure your staff is, as well. "Think before you click" is my motto. - Wayne Lonstein, VFT Solutions, Inc.

8. Integration Of Self-Contained Tools

There is a difference between cybersecurity and digital privacy. But the two need each other to survive. I think the next big thing will be twofold. First, expect tools for communication that are self-containedwith privacy built into be integrated, so that information is kept within company borders. The second will be the growing use of AI to fight the other AI that is and will be most responsible for data breaches. - Gran Wgstrm, Idka

9. Use Of Data Access Security Brokers

Organizations need to separate the tools used for access control, such as encryption, from the data by inserting a layer between them that functions as a data access security broker. The broker will validate policies and authorize the user/application/device/etc. to access the data, allowing organizations to retain control of data at all times. - Jeff Capone, SecureCircle

10. Enhanced Third-Party Vetting

At the heart of many breaches plaguing the news are missteps by third parties many organizations work with. Third parties must be vetted carefully by an organization for their risk management and data protection policies and procedures, because they also use third parties, quickly spreading the original organizations data into a complex spider web. Proper vetting procedures can mitigate such a risk. - Matt Kunkel, LogicGate

11. Quantum-Resistant Cryptography

Encrypting information so only those who should be able to access it can, has been extremely valuable for cybersecurity, but with the coming of quantum computing, brute force attacks could become much more efficient and speedy. Quantum-resistant cryptography (QRC) algorithms will become increasingly important as quantum computing becomes more mainstream in the future with cyber adversaries. - Michael Xie, Fortinet

12. Homomorphic Security

In the ERP world, we battle cybersecurity every day, and for our massive amounts of data in our client databases we want to have an avenue that is more secure than in any other manner. As such, we have begun working with homomorphic encryption. No key stores anywhere for the data inside a database and no key stores for thieves to use data in any way. It would take two trillion years to break - Christopher Carter, Approyo

13. Increased Transparency And Ease Of Use

The biggest problem I've had in my 20-year cybersecurity career is that users will find ways to circumvent security technology if it makes their respective jobs more tedious. Continuous training with the right tech leads to greater adoption and security. For example, with proper training, the Corcoran $400k email scam would've been prevented. - Tim Maliyil, AlertBoot

14. More Focus On Protecting People

The next era of cybersecurity will focus on protecting people, not just the networks and devices they use. Today, most data breaches are caused by human error. Businesses need a people-centric approach to cybersecurity, layering awareness training with advanced machine learning technology to understand human behavior online, and predict and prevent incidents of human error before they happen. - Edward Bishop, Tessian

Continue reading here:
14 Tech Pros Predict The 'Next Big Thing' In Cybersecurity And Encryption - Forbes

Encryption Software Market Overview by 2026: Verified Market Research Cole Reports – Cole of Duty

Microsoft Corporation

Global Encryption Software Market Segmentation

This market was divided into types, applications and regions. The growth of each segment provides an accurate calculation and forecast of sales by type and application in terms of volume and value for the period between 2020 and 2026. This analysis can help you develop your business by targeting niche markets. Market share data are available at global and regional levels. The regions covered by the report are North America, Europe, the Asia-Pacific region, the Middle East, and Africa and Latin America. Research analysts understand the competitive forces and provide competitive analysis for each competitor separately.

To get Incredible Discounts on this Premium Report, Click Here @ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=1826&utm_source=COD&utm_medium=002

Global Encryption Software Market Regions and Countries Level Analysis

The regional analysis is a very complete part of this report. This segmentation highlights Encryption Software sales at regional and national levels. This data provides a detailed and accurate analysis of volume by country and an analysis of market size by region of the world market.

The report provides an in-depth assessment of growth and other aspects of the market in key countries such as the United States, Canada, Mexico, Germany, France, the United Kingdom, Russia and the United States Italy, China, Japan, South Korea, India, Australia, Brazil and Saudi Arabia. The chapter on the competitive landscape of the global market report contains important information on market participants such as business overview, total sales (financial data), market potential, global presence, Encryption Software sales and earnings, market share, prices, production locations and facilities, products offered and applied strategies. This study provides Encryption Software sales, revenue, and market share for each player covered in this report for a period between 2016 and 2020.

Why choose us:

We offer state of the art critical reports with accurate information about the future of the market.

Our reports have been evaluated by some industry experts in the market, which makes them beneficial for the company to maximize their return on investment.

We provide a full graphical representation of information, strategic recommendations and analysis tool results to provide a sophisticated landscape and highlight key market players. This detailed market assessment will help the company increase its efficiency.

The dynamics of supply and demand shown in the report offer a 360-degree view of the market.

Our report helps readers decipher the current and future constraints of the Encryption Software market and formulate optimal business strategies to maximize market growth.

Table of Contents:

Study Coverage: It includes study objectives, years considered for the research study, growth rate and Encryption Software market size of type and application segments, key manufacturers covered, product scope, and highlights of segmental analysis.

Executive Summary: In this section, the report focuses on analysis of macroscopic indicators, market issues, drivers, and trends, competitive landscape, CAGR of the global Encryption Software market, and global production. Under the global production chapter, the authors of the report have included market pricing and trends, global capacity, global production, and global revenue forecasts.

Encryption Software Market Size by Manufacturer: Here, the report concentrates on revenue and production shares of manufacturers for all the years of the forecast period. It also focuses on price by manufacturer and expansion plans and mergers and acquisitions of companies.

Production by Region: It shows how the revenue and production in the global market are distributed among different regions. Each regional market is extensively studied here on the basis of import and export, key players, revenue, and production.

Complete Report is Available @ https://www.verifiedmarketresearch.com/product/global-encryption-software-market-size-and-forecast-to-2025/?utm_source=COD&utm_medium=002

We also offer customization on reports based on specific client requirement:

1- Free country level analysis for any 5 countries of your choice.

2- Free Competitive analysis of any market players.

3- Free 40 analyst hours to cover any other data points

About us:

Verified market research partners with the customer and offer an insight into strategic and growth analyzes, Data necessary to achieve corporate goals and objectives. Our core values are trust, integrity and authenticity for our customers.

Analysts with a high level of expertise in data collection and governance use industrial techniques to collect and analyze data in all phases. Our analysts are trained to combine modern data collection techniques, superior research methodology, expertise and years of collective experience to produce informative and accurate research reports.

Contact us:

Mr. Edwyne FernandesCall: +1 (650) 781 4080Email: [emailprotected]

Tags: Encryption Software Market Size, Encryption Software Market Trends, Encryption Software Market Forecast, Encryption Software Market Growth, Encryption Software Market Analysis

Excerpt from:
Encryption Software Market Overview by 2026: Verified Market Research Cole Reports - Cole of Duty

Hashtag Trending Netflix subscription enters the stratosphere; YouTube to curb misinformation; Zoom updates encryption – IT World Canada

April 23, 2020

New Netflix subscriptions surged in the past three months, YouTube will ban any video that contradicts WHOs guidelines, and Zoom finally introduces robust encryption.

Bored people stuck at home have flocked to Netflix to keep their minds off of social isolation. The numbers dont lie; in the first three months of 2020, Netflix has gained nearly 16 million new subscribers, close to double the number of sign-ups in the same period last year. More than half of the new tenants originated from overseas, including 7 million from Europe and 3.6 million from Asia. Although the pandemic has all but halted filming of new shows, now is the perfect time to discover classics and explore new genres.

Reddit is on fire after YouTube CEO Susan Wojcicki said any coronavirus content thats against WHOs guidelines will be banned from the platform. Its palpable that this move is to curb the spread of misinformation, which is arguably spreading faster than the virus itself. Unfounded advice has been plaguing the internet and social media alike; bogus cures claims like taking vitamin C and drinking bleach solutions have dangerous consequences and obfuscate actual medical advice written by experts. Always follow up on questionable tips to stay safe with proactive research.

Zoom has been desperately trying to recover its reputation after being hounded by security experts for its lackluster security. In its Zoom 5.0 update, Zoom has once again doubled down on addressing call security by introducing AES 256 GCM encryption to guard against data tampering during a meeting. The Zoom client also features a new security icon, which is prominently displayed in the meeting menu bar and groups together all the security and privacy options Zoom has to offer.

Thats all the tech news thats trending right now. Hashtag Trending is a part of the ITWC Podcast network. Add us to your Alexa Flash Briefing or your Google Home daily briefing.

Visit link:
Hashtag Trending Netflix subscription enters the stratosphere; YouTube to curb misinformation; Zoom updates encryption - IT World Canada

Open source platform Jitsi plans to start offering a major security feature that Zoom, Microsoft, and Google lack: End-to-end encryption for video…

Ever since the coronavirus crisis erupted, 8x8's open source video conferencing platform Jitsi has seen a major increase in demand, the company says. Now, it's taking the first steps to become more secure than any of its competitors.

Since Atlassian sold Jitsi to communications company 8x8 in 2018, the platform powers 8x8's Video Meeting product, which has customers like Comcast, Greenpeace, and WeSchool, which has connected 500,000 educators and students in Italy during the coronavirus pandemic.

Jitsi has nearly 12 million monthly active users. That's an admittedly small number compared to giants like Zoom (200 million daily active users), Microsoft Teams (44 million daily active users), and Google's video product, Meet (which said in early April that it had two million new users every day, though it has not reported its total users).

Still, there's one area where Jitsi aims to set itself apart from its larger competitors: Security.

None of its rivals currently support end-to-end encryption, the most private form of communication where only the people participating in a conversation have access to it and potential eavesdroppers aren't able to understand the data. Zoom previously said it supported end-to-end encryption, but walked back those claims and changed its wording after The Interceptreported that it was misleading users.

While Jitsi doesn't offer end-to-end encryption for its meetings yet, it's embarking on a path towards doing so using standards from the open source communication software project WebRTC. Jitsi has published its plans and called on cryptographers to look at them and provide comments and suggestions. From there, Jitsi will review those comments to help it improve its proposed process before implementing it.

Bringing end-to-end encryption to Jitsi will be a massive undertaking it will need to build robust authentication features and encryption key management processes but Emil Ivov, the product's founder and head of video collaboration at 8x8, says that the company is ready for the challenge.

"It's a very complex problem but we're confident we'll get it," he told Business Insider.

While Jitsi published a long post about its process, Ivov mentioned two ways it plans to implement end-to-end encryption:

First, while Jitsi is competing with Google, it's using some of the company's security tools, too. Jitsi plans to use an API called called "Insertable Streams" that Google recently launched in conjunction with other features that it's building in-house. The API scrambles up video and audio in streaming, so that no third party including the service provider will be able to understand it and spy on people in the meeting.

Ivov says that Jitsi also plans to use the Double Ratchet Algorithm, which is used by the encrypted messaging app Signal.

Ivov started Jitsi while working on his PhD at Louis Pasteur University in France. Jitsi is an open source project, meaning that it's free for anyone to use, download, or modify. Soon enough, a community of developers started using it and building upon it.

Ivov and other teammates then started the company around the project called Blue Jimp, which Atlassian acquired in 2015. Atlassian sold Jitsi to 8x8 in 2018 when it decided to exit the videoconferencing space.

8x8 CEO Vik Verma 8x8

Today, Jitsi's open source code has over a million downloads and has been used for video conferencing in banking, education, and home security applications.

Ivov says that being open source is one of Jitsi's greatest strengths.

"From a security perspective, this is the only way you can truly know if you can trust something or not," Ivov said. "Unless you're open source, how else are you going to know this thing is secure?"

When software is open source, a user can peruse the code and verify themselves how secure it is, or trust that other people have already checked, he says. Misleading marketing isn't as effective with open source, since someone can more easily check the claims against the code. Also, with an open source project, there's an entire community of developers to collaborate on making the product as secure as possible.

Even before it rolls out end-to-end encryption, Jitsi has other features that make it more secure than competitors, Ivov says.

For example, a threat called Zoombombing has become popular during the coronavirus pandemic, where bad actors access meetings by correctly generating the URL and password. Jitsi is trying to mitigate the potential for these kinds of attacks in several ways: It provides a random meeting name generator that helps users pick hard-to-guess meeting names.

It also doesn't require meetings to be created in advance.

"For many platforms out there, in order to have a meeting, you have to create it first," Ivov says. "They end up being discoverable."

It can create meetings that are only active once the first person enters the meeting and deactivate when the last person leaves, giving bad actors less advance time to break in.

Finally, Ivov says that Jitsi also balances security with ease of use. Unlike Zoom or Microsoft Teams, users don't need to download anything when they want to use Jitsi.

"We specialize a lot in removing friction," Ivov said. "We want to make sure there's going to be nothing for you to download. It works in your browser."

Got a tip?Contact this reporter via email atrmchan@businessinsider.com, Signal at646.376.6106,Telegram at @rosaliechan, orTwitter DM at@rosaliechan17. (PR pitches by email only, please.) Other types of secure messaging available upon request.

See the original post:
Open source platform Jitsi plans to start offering a major security feature that Zoom, Microsoft, and Google lack: End-to-end encryption for video...

Mobile Encryption Technology Market Analysis by Size, Share, Top Key Manufacturers, Demand Overview, Regional Outlook And Growth Forecast to 2026 -…

Adeya Sa

Global Mobile Encryption Technology Market Segmentation

This market was divided into types, applications and regions. The growth of each segment provides an accurate calculation and forecast of sales by type and application in terms of volume and value for the period between 2020 and 2026. This analysis can help you develop your business by targeting niche markets. Market share data are available at global and regional levels. The regions covered by the report are North America, Europe, the Asia-Pacific region, the Middle East, and Africa and Latin America. Research analysts understand the competitive forces and provide competitive analysis for each competitor separately.

To get Incredible Discounts on this Premium Report, Click Here @ https://www.marketresearchintellect.com/ask-for-discount/?rid=195481&utm_source=COD&utm_medium=888

Global Mobile Encryption Technology Market Regions and Countries Level Analysis

The regional analysis is a very complete part of this report. This segmentation highlights Mobile Encryption Technology sales at regional and national levels. This data provides a detailed and accurate analysis of volume by country and an analysis of market size by region of the world market.

The report provides an in-depth assessment of growth and other aspects of the market in key countries such as the United States, Canada, Mexico, Germany, France, the United Kingdom, Russia and the United States Italy, China, Japan, South Korea, India, Australia, Brazil and Saudi Arabia. The chapter on the competitive landscape of the global market report contains important information on market participants such as business overview, total sales (financial data), market potential, global presence, Mobile Encryption Technology sales and earnings, market share, prices, production locations and facilities, products offered and applied strategies. This study provides Mobile Encryption Technology sales, revenue, and market share for each player covered in this report for a period between 2016 and 2020.

Why choose us:

We offer state of the art critical reports with accurate information about the future of the market.

Our reports have been evaluated by some industry experts in the market, which makes them beneficial for the company to maximize their return on investment.

We provide a full graphical representation of information, strategic recommendations and analysis tool results to provide a sophisticated landscape and highlight key market players. This detailed market assessment will help the company increase its efficiency.

The dynamics of supply and demand shown in the report offer a 360-degree view of the market.

Our report helps readers decipher the current and future constraints of the Mobile Encryption Technology market and formulate optimal business strategies to maximize market growth.

Have Any Query? Ask Our Expert @ https://www.marketresearchintellect.com/need-customization/?rid=195481&utm_source=COD&utm_medium=888

Table of Contents:

Study Coverage: It includes study objectives, years considered for the research study, growth rate and Mobile Encryption Technology market size of type and application segments, key manufacturers covered, product scope, and highlights of segmental analysis.

Executive Summary: In this section, the report focuses on analysis of macroscopic indicators, market issues, drivers, and trends, competitive landscape, CAGR of the global Mobile Encryption Technology market, and global production. Under the global production chapter, the authors of the report have included market pricing and trends, global capacity, global production, and global revenue forecasts.

Mobile Encryption Technology Market Size by Manufacturer: Here, the report concentrates on revenue and production shares of manufacturers for all the years of the forecast period. It also focuses on price by manufacturer and expansion plans and mergers and acquisitions of companies.

Production by Region: It shows how the revenue and production in the global market are distributed among different regions. Each regional market is extensively studied here on the basis of import and export, key players, revenue, and production.

About Us:

Market Research Intellect provides syndicated and customized research reports to clients from various industries and organizations with the aim of delivering functional expertise. We provide reports for all industries including Energy, Technology, Manufacturing and Construction, Chemicals and Materials, Food and Beverage and more. These reports deliver an in-depth study of the market with industry analysis, market value for regions and countries and trends that are pertinent to the industry.

Contact Us:

Mr. Steven Fernandes

Market Research Intellect

New Jersey ( USA )

Tel: +1-650-781-4080

Tags: Mobile Encryption Technology Market Size, Mobile Encryption Technology Market Growth, Mobile Encryption Technology Market Forecast, Mobile Encryption Technology Market Analysis

See the original post here:
Mobile Encryption Technology Market Analysis by Size, Share, Top Key Manufacturers, Demand Overview, Regional Outlook And Growth Forecast to 2026 -...

Global Hardware Encryption Market (2020 to 2025) – Industry Trends, Share, Size, Growth, Opportunity and Forecast – ResearchAndMarkets.com – Yahoo…

The "Hardware Encryption Market: Global Industry Trends, Share, Size, Growth, Opportunity and Forecast 2020-2025" report has been added to ResearchAndMarkets.com's offering.

The global hardware encryption market is currently experiencing robust growth. Encryption refers to the process of utilizing an algorithm to convert information or data into codes to prevent any unauthorized access. It protects sensitive data by transforming it into an unreadable ciphertext which can be decrypted using an encryption key. These types of encryption utilize a dedicated processor, which aids in the tasks of authentication and encryption. This processor is physically located on the encrypted drive which often generates the encryption key that can be unlocked using the user's password. Since it protects the data against threats, such as cold boot, malicious code and brute force attacks, it is widely being adopted across diverse industry verticals, including banking, corporate, IT & Telecom, healthcare, etc.

Escalating adoption rates of portable storage devices which are used to transfer information between computers and create backup are one of the major factors contributing to the market growth. Hardware encryption devices offer efficient confidentiality of personal data from unauthorized access, which has positively influenced their sales globally. Furthermore, the rising cases of cyber-attacks have led private organizations as well as governments to make a shift toward hardware encryption as these systems are more resilient and deliver faster performance when compared with software encryptions.

Moreover, the increasing sales of consumer electronics have led smartphone manufacturers to include fingerprint scanners in their devices. This protects the privacy of the users as well as makes the process of encryption and decryption faster. Looking forward, the publisher expects the market to exhibit a CAGR of around 28% during 2020-2025.

Companies Mentioned

Key Questions Answered in This Report:

Key Topics Covered:

1 Preface

2 Scope and Methodology

2.1 Objectives of the Study

2.2 Stakeholders

2.3 Data Sources

2.3.1 Primary Sources

2.3.2 Secondary Sources

2.4 Market Estimation

2.4.1 Bottom-Up Approach

2.4.2 Top-Down Approach

2.5 Forecasting Methodology

3 Executive Summary

4 Introduction

4.1 Overview

4.2 Key Industry Trends

5 Global Hardware Encryption Market

5.1 Market Overview

5.2 Market Performance

5.3 Market Forecast

6 Market Breakup by Algorithm and Standard

6.1 Advanced Encryption Standard (AES)

6.1.1 Market Trends

6.1.2 Market Forecast

6.2 Rivest-Shamir-Adleman (RSA)

6.2.1 Market Trends

6.2.2 Market Forecast

6.3 Others

6.3.1 Market Trends

6.3.2 Market Forecast

7 Market Breakup by Architecture

7.1 Field-Programmable Gate Arrays (FPGA)

7.1.1 Market Trends

7.1.2 Market Forecast

7.2 Application-Specific Integrated Circuits (ASIC)

7.2.1 Market Trends

7.2.2 Market Forecast

8 Market Breakup by Product

8.1 External Hard Disk Drives

8.1.1 Market Trends

8.1.2 Market Forecast

8.2 Internal Hard Disk Drives

8.2.1 Market Trends

8.2.2 Market Forecast

8.3 lnline Network Encryptors

8.3.1 Market Trends

8.3.2 Market Forecast

8.4 USB Flash Drives

8.4.1 Market Trends

8.4.2 Market Forecast

8.5 Others

8.5.1 Market Trends

8.5.2 Market Forecast

9 Market Breakup by Application

9.1 Consumer Electronics

9.1.1 Market Trends

9.1.2 Market Forecast

9.2 IT & Telecom

9.2.1 Market Trends

9.2.2 Market Forecast

9.3 Transportation

9.3.1 Market Trends

9.3.2 Market Forecast

9.4 Aerospace and Defense

9.4.1 Market Trends

9.4.2 Market Forecast

9.5 Healthcare

9.5.1 Market Trends

9.5.2 Market Forecast

9.6 BFSI

9.6.1 Market Trends

9.6.2 Market Forecast

9.7 Others

9.7.1 Market Trends

9.7.2 Market Forecast

10 Market Breakup by Region

10.1 Asia Pacific

10.2 North America

10.3 Europe

10.4 Latin America

10.5 Middle East and Africa

11 SWOT Analysis

12 Value Chain Analysis

13 Porters Five Forces Analysis

13.1 Overview

13.2 Bargaining Power of Buyers

13.3 Bargaining Power of Suppliers

13.4 Degree of Competition

13.5 Threat of New Entrants

13.6 Threat of Substitutes

14 Competitive Landscape

14.1 Market Structure

14.2 Key Players

14.3 Profiles of Key Players

Read more:
Global Hardware Encryption Market (2020 to 2025) - Industry Trends, Share, Size, Growth, Opportunity and Forecast - ResearchAndMarkets.com - Yahoo...

Global Email Encryption Market: Industry Analysis and Forecast (2018-2026) – Research Columnist

Global Email Encryption Marketwas valued at US$ 2.4Bn in 2017 and is expected to reach US$ 9.2Bn by 2026, at a CAGR of 18.29% during a forecast period.

The report study has analyzed revenue impact of covid-19 pandemic on the sales revenue of market leaders, market followers and disrupters in the report and same is reflected in our analysis.

REQUEST FOR FREE SAMPLE REPORT:https://www.maximizemarketresearch.com/request-sample/28090/

The objective of the report is to present a comprehensive assessment of the market and contains thoughtful insights, facts, historical data, industry-validated market data and projections with a suitable set of assumptions and methodology. The report also helps in understanding Global Email Encryption Market dynamics, structure by identifying and analyzing the market segments and project the global market size. Further, the report also focuses on the competitive analysis of key players by product, price, financial position, product portfolio, growth strategies, and regional presence. The report also provides PEST analysis, PORTERs analysis, SWOT analysis to address the question of shareholders to prioritizing the efforts and investment in the near future to the emerging segment in the Global Email Encryption Market.

An increasing number of data breaches is the major factor which is driving the growth of email encryption market. The rising need for security against increasing bot traffic is also one of the major factors which fuel the growth of email encryption market globally. Additionally, with the increase in the number of smartphone users at the workplace, the enterprise is adopting email encryption tools for the protection of their sensitive information. Also, strict regulatory requirements for data protection is also creating potential growth opportunities for email encryption market.

Device compatibility issues and lack of common standards are the most important factors which hinder the growth of email encryption market. Lack of skilled professionals is also one of the main challenges for the growth of email encryption market. Furthermore, the reluctance of small and medium-sized companies towards the adoption of email encryption because of the low budget is a major factor which hampers the growth of email encryption market globally.

The BFSI (Banking, Financial Services, and Insurance) industry vertical segment is expected to generate major share of revenue during the forecast period owing to the growing adoption of security solutions driven by the increasing financial security threats across the organizations, which can lead to theft, hamper the reputation of organizations, and can cause massive financial losses. Moreover, email encryption is expected to play a key role in healthcare enterprises.

DO INQUIRY BEFORE PURCHASING REPORT HERE:https://www.maximizemarketresearch.com/inquiry-before-buying/28090/

Cloud deployment mode segment is estimated to grow at the highest CAGR throughout the forecast period as they help reduce overall costs, while they also provide highly flexible and scalable access to the email encryption solution over IT infrastructures hosted by cloud service providers. Enterprises are increasingly using their email encryption solution on cloud to improve mobility and decentralize data storage and computing.

Region-wise, North America is dominating the global email encryption market followed by Europe owing to the many standards and privacy regulations such as HIPAA and PCI DSS followed in those regions. The global market is emerging in the regions, for instance, Japan, Korea, Russia, China, and India because of the growing demand for advanced technological email encryption processes in those regions. The Asia Pacific region will witness a huge growth in the global market owing to the escalating demand for low-cost cloud-based services for encryption in the region.Scope of the Global Email Encryption Market

Global Email Encryption Market, by Type

End-To-End Email Encryption Gateway Email Encryption Boundary Email Encryption Hybrid Email Encryption Client PluginsGlobal Email Encryption Market, by Component

Solution Serviceso Training and Educationo Support and MaintenanceGlobal Email Encryption Market, by Deployment Mode

On-Premises CloudGlobal Email Encryption Market, by Organization Size

Small and Medium-Sized Enterprises Large EnterprisesGlobal Email Encryption Market, by Industrial Vertical

BFSI Government and Defense IT and Telecom Healthcare Manufacturing Energy and Utilities Retail OthersGlobal Email Encryption Market, by Region

North America Europe Asia Pacific Middle East & Africa South AmericaKey players in Global Email Encryption Market

Micro Focus Symantec Cisco Trend Micro Sophos Proofpoint BAE Systems ZIX Entrust Datacard Mimecast Egress Software Intermedia Virtru Lux Scientiae (Lux Sci) Cryptzone Echoworx

MAJOR TOC OF THE REPORT

Chapter One: Email Encryption Market Overview

Chapter Two: Manufacturers Profiles

Chapter Three: Global Email Encryption Market Competition, by Players

Chapter Four: Global Email Encryption Market Size by Regions

Chapter Five: North America Email Encryption Revenue by Countries

Chapter Six: Europe Email Encryption Revenue by Countries

Chapter Seven: Asia-Pacific Email Encryption Revenue by Countries

Chapter Eight: South America Email Encryption Revenue by Countries

Chapter Nine: Middle East and Africa Revenue Email Encryption by Countries

Chapter Ten: Global Email Encryption Market Segment by Type

Chapter Eleven: Global Email Encryption Market Segment by Application

Chapter Twelve: Global Email Encryption Market Size Forecast (2019-2026)

Browse Full Report with Facts and Figures of Email Encryption Market Report at:https://www.maximizemarketresearch.com/market-report/global-email-encryption-market/28090/

About Us:

Maximize Market Research provides B2B and B2C market research on 20,000 high growth emerging technologies & opportunities in Chemical, Healthcare, Pharmaceuticals, Electronics & Communications, Internet of Things, Food and Beverages, Aerospace and Defense and other manufacturing sectors.

Contact info:

Name: Vikas Godage

Organization: MAXIMIZE MARKET RESEARCH PVT. LTD.

Email: sales@maximizemarketresearch.com

Contact: +919607065656/ +919607195908

Website:www.maximizemarketresearch.com

Read this article:
Global Email Encryption Market: Industry Analysis and Forecast (2018-2026) - Research Columnist