Zoom privacy and security issues: Here’s everything that’s wrong (so far) – Tom’s Guide

Are you using Zoom yet? It seems that everyone in America who's been forced to work, or do schoolwork, from home during the coronavirus lockdown is using the video-conferencing platform for meetings, classes and even social gatherings.

There are good reasons Zoom has taken off and other platforms haven't. Zoom is easy to set up, easy to use and lets up to 100 people join a meeting for free. It just works.

But there's a downside. Zoom's ease of use has made it easy for troublemakers to "bomb" open Zoom meetings. Information-security professionals say Zoom's security has left a lot of holes open, although it's getting better.

There's also been a lot of scrutiny about Zoom's privacy policy, which until recently seemed to give Zoom the right to do whatever it saw fit with any user's personal data.

That's created a backlash against Zoom. On April 6, New York City public schools moved to ban Zoom meetings, and other school systems did the same, although Singapore now seems to be reversing its ban on Zoom for distance-learning.

With this ton of issues, people are looking for other options, so check out our Skype vs Zoom face-off to see how an old video app has adapted for video conferencing. We've also compared Zoom vs Google Hangouts as well.

Does all this mean that Zoom is unsafe to use? No.

Unless you're discussing state or corporate secrets, or disclosing personal health information to a patient, Zoom should be fine to use. Just ask that meeting participants sign in with a password.

For school classes, after-work get-togethers, or even workplace meetings that stick to routine business, there's not much risk in using Zoom. Kids will probably continue to flock to it, as they can even use Snapchat filters on Zoom.

You just need to be aware that the Zoom software creates a huge "attack surface," as security professionals like to say, and that hackers are going to try to come at it every way they can. They're already registering lots of Zoom-related phony domains and developing Zoom-themed malware.

The upside is that if lots of flaws in Zoom are found now and fixed soon, then Zoom will be the better -- and safer -- for it.

"Zoom will soon be the most secure conferencing tool out there," wrote tech journalist Kim Zetter on Twitter April 1. "But too bad they didn't save themselves some grief and engage in some security assessments of their own to avoid this trial by fire."

In a blog post April 1, Zoom CEO and founder Eric S. Yuan acknowledged Zoom's growing pains and pledged that regular development of the Zoom platform would be put on hold while the company worked to fix security and privacy issues.

"We recognize that we have fallen short of the community's -- and our own -- privacy and security expectations," Yuan wrote, explaining that Zoom had been developed for large businesses with in-house IT staffers who could set up and run the software.

"We now have a much broader set of users who are utilizing our product in a myriad of unexpected ways, presenting us with challenges we did not anticipate when the platform was conceived," he said. "These new, mostly consumer use cases have helped us uncover unforeseen issues with our platform. Dedicated journalists and security researchers have also helped to identify pre-existing ones."

To deal with these issues, Yuan wrote, Zoom would be "enacting a feature freeze, effectively immediately, and shifting all our engineering resources to focus on our biggest trust, safety, and privacy issues."

Among other things, Zoom would also be "conducting a comprehensive review with third-party experts and representative users to understand and ensure the security of all of our new consumer use cases."

Zoom now requires passwords by default for most Zoom meetings, although meetings hosts can turn that feature off. Passwords are the easiest way to stop Zoom bombing.

And on April 8, former Facebook and Yahoo chief security officer Alex Stamos said he would be working with Zoom to improve its security and privacy. Stamos is now an adjunct professor at Stanford and is highly regarded within the information-security community.

To keep ourselves (and you) sane, we're putting the most recent Zoom privacy and security issues up top and separating the problems into those that are open or unresolved, those that have been resolved and those that don't fit into either category.

Zoom-meeting video recordings saved on Zoom's cloud servers can be easily discovered and often viewed, a security researcher told Cnet.

Phil Guimond noticed that online recordings of Zoom meetings have a predictable URL structure and are thus easy to find. (The Washington Post reported last week on a similar issue with Zoom recordings that had been uploaded by users to third-party cloud servers. In those cases, the file names of meeting recordings followed a predictable pattern.)

Until Zoom pushed out a series of updates this past Tuesday, Zoom meeting recordings were not required to be password-protected.

Guimond built a simple tool that automatically searches for Zoom meeting recordings and tries to open them.

If a meeting has a password, his tool tries to brute-force access by running through millions of possible passwords. If a meeting recording is viewable, so is the Zoom meeting ID, and the attacker might be able to access future recurring meetings.

To defeat Guimond's automated tool, Zoom added a Captcha challenge, which forces the would-be meeting-recording watcher to prove they're a human. But, Guimond said, the URL pattern is still the same, and attackers could still try to open each generated result manually.

STATUS: Mitigated with additional obstacles against attack, but not really fixed.

Zoom announced it was hiring Luta Security, a consulting firm headed by Katie Moussouris, to revamp Zoom's "bug bounty" program, which pays hackers to find software flaws.

Moussouris set up the first bug-bounty programs at Microsoft and the Pentagon. In her own blog post, she announced that Zoom was bringing in other well-regarded information-security firms and researchers to improve its security.

In its weekly webinar, according to ZDNet, Zoom also said it would also let meeting hosts report abusive users, and newly hired security consultant Alex Stamos said Zoom would be switching to a more robust encryption standard after Zoom's existing encryption was found to be lacking.

In other news, a congressman has complained that a congressional briefing held over Zoom on April 3 was "zoom-bombed" at least three times.

The head of Standard Chartered, a London-based multinational bank, has warned employees to nut use Zoom or Google Hangouts for remote meetings, citing security concerns, according to Reuters.

Standard Chartered primarily uses the rival Blue Jeans video-conferencing platform, according to two bank staffers who spoke anonymously.

Last year, Standard Chartered agreed to pay British and American regulators $1.1 billion after admitting the bank violated trade sanctions on Iran.

Hackers are apparently offering to sell two "zero-day" exploits in Zoom to the highest bidder, Vice reports.

Zero-days are hacks that take advantage of vulnerabilities the software maker doesn't know about, and which users have little or no defense against.

Sources who told Vice about the zero-days said one exploit is for Windows and lets a remote attacker get full control of a target's computer. The catch is that the attacker and the target have to be on the same Zoom call. Its asking price is $500,000.

"I think it's just kids who hope to make a bang," one unnamed source told Vice.

The other zero-day is said to be for macOS and to be less serious.

STATUS: Apparently unfixed.

Zoom announced April 13 that users of paid Zoom accounts would be able to choose through which region of the world their data would be routed: Australia, Canada, China, Europe, India, Japan/Hong Kong, Latin America or the United States.

This is a reaction to the discovery earlier in April that many Zoom meetings hosted by and involving U.S. residents had been routed through servers based in China, a country that retains the right to see anything happening on a domestically located server without a warrant.

Users of Zoom's free service will have their data handled only by servers in their regions.

Usernames and passwords for more than 500,000 Zoom accounts are being sold or given away in criminal marketplaces.

These accounts were not compromised as the result of a Zoom data breach, but instead through credential stuffing. That's when criminals try to unlock accounts by re-using credentials from accounts compromised in previous data breaches. It works only if an account holder uses the same password for more than one account.

STATUS: Unknown, but this isn't Zoom's fault.

A Kurdish security researcher said Zoom had paid him a bug bounty -- a reward for finding a serious flaw -- after he discovered and privately reported a way for anyone to easily hijack any existing Zoom account if the account email address was known or successfully guessed.

The researcher, who calls himself "s3c" but whose real name may be Yusuf Abdulla, described how if he tried to log into the Zoom website with a Facebook account, Zoom would ask for the email address associated with that Facebook account. Then Zoom would open a new webpage notifying him that a confirmation email message had been sent to that email address.

The URL of the notification webpage would have a unique identification tag in the address bar. As an example that's much shorter than the real thing, let's say it's "zoom.com/signup/123456XYZ".

When s3c received and opened the confirmation email message sent by Zoom, he clicked on the confirmation button in the body of the message. This took him to yet another webpage that confirmed his email address was now associated with a new account. So far, so good.

But then s3c noticed that the unique identification tag in the Zoom confirmation webpage's URL was identical to the first ID tag. Let's use the example "zoom.com/confirmation/123456XYZ".

The matching ID tags, one used before confirmation and the other after confirmation, meant that s3c could have avoided receiving the confirmation email, and clicking on the confirmation button, altogether.

In fact, he could have entered ANY email address -- yours, mine or billgates@gmail.com -- into the original signup form. Then he could have copied the ID tag from the resulting Zoom notification page and pasted the ID tag into an already existing Zoom account-confirmation page.

Boom, he'd have access to any Zoom account created using the targeted email address.

"Even if you already linked your account with a Facebook account Zoom automatically unlink it and link it with the attacker Facebook account," s3c wrote in his imperfect English.

And because Zoom lets anyone using a company email address view all other users signed up with the same email domain, e.g. "company.com", s3c could have leveraged this method to steal ALL of a given company's Zoom accounts.

"So if an attacker create an account with email address attacker@companyname.com and verify it with this bug," s3c wrote, "the attacker can view all emails that created with *@companyname.com in Zoom app in Company contacts so that means the attacker can hack all accounts of the company."

Zoom is fortunate that s3c is one of the good guys and didn't disclose this flaw publicly before Zoom could fix it. But it's such a simple flaw that it's hard to imagine no one else noticed it before.

STATUS: Fixed, thank God.

Researchers from IngSights discovered a set of 2,300 Zoom login credentials being shared in a criminal online forum.

"Aside from personal accounts, there were many corporate accounts belonging to banks, consultancy companies, educational facilities, healthcare providers, and software vendors, amongst others," IntSight's Etay Maor wrote in a blog post April 10.

"While some of the accounts 'only' included an email and password, others included meeting IDs, names and host keys," Maor wrote.

Maor told Threatpost it didn't seem like the credentials came from a Zoom data breach, given their relatively small number. He theorized that they came from "small lists and databases kept by other companies/agencies."

It's also possible that some of the credentials were the result of "credential stuffing." That's the (largely) automated process by which criminals try to log into websites by cycling through likely email addresses and likely passwords, and then harvest whatever yields a positive result.

STATUS: Unknown. This likely isn't a Zoom issue per se.

In an "ask me anything" webinar earlier this week, Zoom CEO Eric S. Yuan said that Zoom had discovered "a potential security vulnerability with file sharing, so we disabled that feature."

Until this week, participants in a Zoom meeting could share files with each other using the meeting's chat function.

STATUS: Fixed.

Zoom has released updates for its Windows, macOS and Linux desktop client software so that meeting IDs will not display onscreen during meetings. British Prime Minister Boris Johnson last week accidentally displayed a Zoom meeting ID in a tweet, and the Belgian cabinet made a similar mistake.

BuzzFeed News reported that Google had banned Zoom from company-owned laptops, the Financial Times reported that the U.S. Senate had advised members and staffers to avoid Zoom, and the German newspaper Handelsblatt said that country's foreign ministry had also asked its staff to stop using Zoom.

However, it's worth keeping in mind that Google has its own videoconferencing application built into its G Suite software for enterprises.

Taiwan's government has banned the use of Zoom for government meetings and for school use, citing "security or privacy concerns." The memo announcing the government ban did not get more specific about the reasons, but last weekend it emerged that some Zoom meetings were being routed through mainland Chinese servers.

Information-security researchers know of several Zoom "zero-day" exploits, according to Vice, which couldn't get anyone to go on the record for its story. Zero-days are exploits for software vulnerabilities that the software maker doesn't know about and hasn't fixed, and hence has "zero days" to prepare before the exploits appear.

However, one Vice source implied that other video-conferencing solutions also had security flaws. Another source said that Zoom zero-days weren't selling for much money due to lack of demand.

Along those lines, Kaspersky researchers said they had found more than 500 suspicious files that pretended to be Zoom-related. Not all the files were malicious, and those that were installed adware, not full-on malware.

Other phony files mimicked WebEx, GoToMeeting and Slack, but by far the biggest target among video-conferencing platforms was Skype. The researchers found 120,000 suspicious files with Skype attributes.

Criminals are trading compromised Zoom accounts on the "dark web," Yahoo News reported.

This information apparently came from Israeli cybersecurity firm Sixgill (not to be confused with an American firm of the same name), which specializes in monitoring underground online-criminal activity. We weren't able to find any mention of the findings on the Sixgill website.

Sixgill told Yahoo it had spotted 352 compromised Zoom accounts that included meeting IDs, email addresses, passwords and host keys. Some of the accounts belonged to schools, and one each to a small business and a large healthcare provider, but most were personal.

STATUS: Not really a bug, but definitely worth worrying about. If you have a Zoom account, make sure its password isn't the same as the password for any other account you have.

Researchers at Trend Micro discovered a version of the Zoom installer that has been bundled with cryptocurrency-mining malware, i.e. a coin-miner.

The Zoom installer will put Zoom version 4.4.0.0 on your Windows PC, but it comes with a coin-miner that Trend Micro has given the catchy name Trojan.Win32.MOOZ.THCCABO. (By the way, the latest Zoom client software for Windows is up to version 4.6.9, and you should get it only from here.)

The coin-miner will ramp up your PC's central processor unit, and its graphics card if there is one, to solve mathematical problems in order to generate new units of cryptocurrency. You'll notice this if you fans suddenly speed up or if Windows Task Manager (hit Ctrl + Shift + Esc) shows unexpectedly heavy CPU/GPU use.

To avoid getting hit with this malware, make sure you're running one of the best antivirus programs, and don't click on any links in emails, social media posts or pop-up messages that promise to install Zoom on your machine.

STATUS: Open, but this isn't Zoom's problem to fix. It can't stop other people from copying and redistributing its installation software.

Not only does Zoom mislead users about its "end-to-end encryption" (see further down), but its seems to be flat-out, um, not telling the truth about the quality of its encryption algorithm.

Zoom says it use AES-256 encryption to encode video and audio data traveling between Zoom servers and Zoom clients (i.e., you and me). But researchers at the Citizen Lab at the University of Toronto, in a report posted April 3, found that Zoom actually uses the somewhat weaker AES-128 algorithm.

Even worse, Zoom uses an in-house implementation of encryption algorithm that preserves patterns from the original file. It's as if someone drew a red circle on a gray wall, and then a censor painted over the red circle with a while circle. You're not seeing the original message, but the shape is still there.

"We discourage the use of Zoom at this time for use cases that require strong privacy and confidentiality," the Citizen Lab report says, such as "governments worried about espionage, businesses concerned about cybercrime and industrial espionage, healthcare providers handling sensitive patient information" and "activists, lawyers, and journalists working on sensitive topics."

STATUS: Unresolved. In a blog post April 3, Zoom CEO Eric S. Yuan acknowledged the encryption issue but said only that "we recognize that we can do better with our encryption design" and "we expect to have more to share on this front in the coming days."

Good software has built-in anti-tampering mechanisms to make sure that applications don't run code that's been altered by a third party.

Zoom has such anti-tampering mechanisms in place, which is good. But those anti-tampering mechanisms themselves are not protected from tampering, said a British computer student who calls himself "Lloyd" in a blog post April 3.

Needless to say, that's bad. Lloyd showed how Zoom's anti-tampering mechanism can easily be disabled, or even replaced with a malicious version that hijacks the application.

If you're reading this with a working knowledge of how Windows software works, this is a pretty damning passage: "This DLL can be trivially unloaded, rendering the anti-tampering mechanism null and void. The DLL is not pinned, meaning an attacker from a 3rd party process could simply inject a remote thread."

In other words, malware already present on a computer could use Zoom's own anti-tampering mechanism to tamper with Zoom. Criminals could also create fully working versions of Zoom that have been altered to perform malicious acts.

STATUS: Unresolved.

Anyone can "bomb" a public Zoom meeting if they know the meeting number, and then use the file-share photo to post shocking images, or make annoying sounds in the audio. The FBI even warned about it a few days ago.

The host of the Zoom meeting can mute or even kick out troublemakers, but they can come right back with new user IDs. The best way to avoid Zoom bombing is to not share Zoom meeting numbers with anyone but the intended participants. You can also require participants to use a password to log into the meeting.

On April 3, the U.S. Attorney's Office for the Eastern District of Michigan said that "anyone who hacks into a teleconference can be charged with state or federal crimes." It's not clear whether that applies only to eastern Michigan.

STATUS: There are easy ways to avoid Zoom bombing, which we go through here.

Excerpt from:
Zoom privacy and security issues: Here's everything that's wrong (so far) - Tom's Guide

Future Growth Of Database Encryption Market By New Business Developments, Innovations, And Top Companies Forecast To 2025 – Express Journal

The research report on Database Encryption market offers a detailed assessment of this industry vertical, with respect to its various market segments. The study details the entire market scenario by outlining the present position and industry size, based on volume and revenue. The study also highlights important insights of the geographical landscape along with the major participants in the Database Encryption market.

This market study covers the global and regional market with detailed analysis of the overall development prospects in the market. Moreover, it sheds light on the comprehensive competitive landscape of the global market. The report further offers a dashboard overview of topmost companies including their successful marketing strategies, market contribution, recent developments in both historic and present contexts. The report offers a detailed evaluation of the market by highlighting information on different aspects which include drivers, restraints, opportunities, and threats. This information can help stakeholders to make appropriate decisions before investing.

Database Encryption Market 2020-2025 describes a detailed evaluation and proficient study on the current and future state of the Database Encryption market across the globe. Database Encryption Market offers information regarding the developing opportunities in the market and the market drivers, trends and upcoming technologies that will increase these development trends.

Request Sample Copy of this Report @ https://www.express-journal.com/request-sample/53886

Database Encryption Market Segment by Manufacturers includes:

By Types, the Database Encryption Market can be Split into:

By Applications, the Database Encryption Market can be Split into:

This report focuses on the Database Encryption in global market, especially in

Global Database Encryption Market has been exhibited in detail in the following chapters

Chapter 1. Database Encryption Market Preface

Chapter 2. Executive Summary

Chapter 3. Database Encryption Industry Analysis

Chapter 4. Database Encryption Market Value Chain Analysis

Chapter 5. Database Encryption Market Analysis by Type

Chapter 6. Database Encryption Market Analysis by Applications

Chapter 7. Database Encryption Market Analysis by Geography

Chapter 8. Competitive Landscape Of Database Encryption Companies

Chapter 9. Company Profiles Of Database Encryption Industry

Key questions answered in the report include:

Request Customization on This Report @ https://www.express-journal.com/request-for-customization/53886

Read more from the original source:
Future Growth Of Database Encryption Market By New Business Developments, Innovations, And Top Companies Forecast To 2025 - Express Journal

Coronavirus: Whistleblower Edward Snowden warns governments are building tools of oppression – Yahoo News

Edward Snowden delivers a speech during the annual Web Summit technology conference in Lisbon, Portugal in 2019. (Photo by Rita Franca/NurPhoto via Getty Images)

Edward Snowden, the whistleblower who leaked information on Americas National Security Agency, has warned that governments may use the coronavirus to curtail freedoms.

Snowden, in an interview with Vice, said that governments may take advantage of the pandemic to impose authoritarian rules on populations.

Snowden said, As authoritarianism spreads, as emergency laws proliferate, as we sacrifice our rights, we also sacrifice our capability to arrest the slide into a less liberal and less free world.

Do you truly believe that when the first wave, this second wave, the 16th wave of the coronavirus is a long-forgotten memory, that these capabilities will not be kept? That these datasets will not be kept?

Live: Follow all the latest updates from the UK and around the world

Fact-checker: The number of COVID-19 cases in your local area

6 charts and maps that explain how coronavirus is spreading

Snowden warned that while Governments may have good intentions as they build technologies such as contact-tracing apps, they are building what he describes as the architecture of oppression.

Snowden also claimed that, based on his experience working for intelligence agencies, the pandemic should have been predicted.

Snowden told Vice, There is nothing more foreseeable as a public health crisis in a world where we are just living on top of each other in crowded and polluted cities, than a pandemic.

Read more: Dying Mums plea for life-prolonging treatment to see her through coronavirus

Every academic, every researcher who's looked at this knew this was coming. And in fact, even intelligence agencies, I can tell you firsthand, because they used to read the reports had been planning for pandemics.

Earlier this month, Apple and Google announced they would work together to create contact tracing technology that aims to slow the spread of the coronavirus by allowing users to opt into a system that catalogs other phones they have been near.

Story continues

They will work together with governments on technology that will allow mobile devices to trade information via Bluetooth connections to alert people when they have been in close proximity with someone who has tested positive for COVID-19, the sometimes deadly respiratory disease associated with the novel coronavirus.

Read more: Coronavirus shows how vulnerable societies are, says Greta Thunberg

The technology will first be available in mid-May as software tools available to contact tracing apps endorsed by public health authorities.

However, Apple and Google also plan to build the tracking technology directly into their underlying operating systems in the coming months so that users do not have to download any apps to begin logging nearby phones.

Read more: British volunteers to be infected with coronavirus

Last month, tech companies including Google, Facebook and Microsoft joined forces to release an unprecedented statement on coronavirus - in the battle against online misinformation.

The statement promises that the tech giants are working together to jointly combating fraud and misinformation about the virus.

The statement was released online, and was signed by Facebook, Google, LinkedIn, Microsoft, Reddit, Twitter and YouTube.

The joint statement said, We are working closely together on COVID-19 response efforts. Were helping millions of people stay connected while also, elevating authoritative content on our platforms, and sharing critical updates in coordination with government healthcare agencies around the world.

We invite other companies to join us as we work to keep our communities healthy and safe.

Facebook said last week that it plans to award $100 million in cash grants and ad credits for up to 30,000 small businesses in over 30 countries, in a move aimed to address the economic impact of the coronavirus outbreak.

Follow this link:
Coronavirus: Whistleblower Edward Snowden warns governments are building tools of oppression - Yahoo News

U.S. judge blocks Twitter’s bid to reveal govt surveillance requests – Reuters

April 18 (Reuters) - Twitter Inc will not be able to reveal surveillance requests it received from the U.S. government after a federal judge accepted government arguments that this was likely to harm national security after a near six-year long legal battle.

The social media company had sued the U.S. Department of Justice in 2014 to be allowed to reveal, as part of its Draft Transparency Report, the surveillance requests it received. It argued its free-speech rights were being violated by not being allowed to reveal the details.

U.S. District Judge Yvonne Gonzalez Rogers granted the governments request to dismiss Twitters lawsuit in an eleven page order filed in the U.S. District Court for Northern California.

The judge ruled on Friday that granting Twitters request would be likely to lead to grave or imminent harm to the national security.

The Governments motion for summary judgment is GRANTED and Twitters motion for summary judgment is DENIED, the judge said in her order.

Twitter had sued the Justice Department in its battle with federal agencies as the internet industrys self-described champion of free speech seeking the right to reveal the extent of U.S. government surveillance.

The lawsuit had followed months of fruitless negotiations with the government and had marked an escalation in the internet industrys battle over government gag orders on the nature and number of requests for private user information.

Tech companies were seeking to clarify their relationships with U.S. law enforcement and spying agencies in the wake of revelations by former National Security Agency contractor Edward Snowden that outlined the depth of U.S. spying capabilities.

Twitters legal battle spanned the tenures of four U.S. attorneys general - Eric Holder, Loretta Lynch, Jeff Sessions and William Barr.

Through the use of confidential declarations, the Justice Department was able to show that revealing the exact number of national security letters from 2014, as requested by Twitter, posed a risk to national security, Fridays order said.

Twitter did not immediately respond to Reuters request for comment. (Reporting by Kanishka Singh in Bengaluru; Editing by Toby Chopra)

Read the rest here:
U.S. judge blocks Twitter's bid to reveal govt surveillance requests - Reuters

Infinity Optics Lauded by Frost & Sullivan for Enriching Biometric Authentication Processes with its Novel QuantumCrypt Platform – PRNewswire

"The QuantumCrypt platform allows iris, fingerprint, and 2D/3D facial images to generate biometric codes, also known as True Biometric Hash technology. These codes act as key management solutions, such as blockchain-based identity. Its technology for biometric cryptography enables easy verification of users at any given point during a transaction, which makes it more secure as the registration can be easily revoked if the data is found to be compromised," said Nandini Bhattacharya Industry Analyst. "The solution also ensures that the user identification process does not rely on stored biometric information, and is therefore not likely to be compromised."

QuantumCrypt is ideal for use within cloud-based biometric solutions and authentication processes. Infinity has already made significant progress in its iris biometric solution by developing depth-of-field (DOF) iris authentication technology. Its single lens technology can capture DOF images at a distance of between 150mm and 600mm in a single shot using a single element lens. Its technology combines custom optics and image processing capability to offer better performance, making extended DOF (EDOF) solutions highly convenient for IoT-based iris recognition systems.

Infinity has also developed QuantumCrypt modules for fingerprint, 2D face, iris recognition, and is working on other modalities such as 3D face recognition. Furthermore, Infinity's also has its proprietary Extended Depth of Field iris recognition algorithm which maps the random iris patterns and then generates a unique biometric code for identification. The technology, due to its superior hardware performance, provides an exceptional user experience by capturing high-quality EDOF images.

"Infinity has taken the biometrics industry forward by transforming the way biometric authentication has traditionally been achieved," noted Bhattacharya. "The EDOF technology by Infinity makes iris recognition solutions much more user friendly, thereby creating huge opportunities for mobile device-based applications where mobile phone cameras can be used for iris recognition. As Infinity is developing QuantumCrypt solutions for 2D and 3D facial recognition, it is expected to unlock the potential of facial recognition biometric solutions in mobile and IoT-based applications across numerous industries, smart homes, smart cities, and connected cars."

Each year, Frost & Sullivan presents this award to the company that has developed an innovative element in a product by leveraging leading-edge technologies. The award recognizes the value-added features/benefits of the product and the increased return on investment (ROI) it gives customers, which, in turn, raises customer acquisition and overall market penetration potential.

Frost & Sullivan Best Practices awards recognize companies in a variety of regional and global markets for demonstrating outstanding achievement and superior performance in areas such as leadership, technological innovation, customer service, and strategic product development. Industry analysts compare market participants and measure performance through in-depth interviews, analysis, and extensive secondary research to identify best practices in the industry.

About Frost & Sullivan

For over five decades, Frost & Sullivan has become world-renowned for its role in helping investors, corporate leaders and governments navigate economic changes and identify disruptive technologies, Mega Trends, new business models and companies to action, resulting in a continuous flow of growth opportunities to drive future success. Contact us: Start the discussion.

Contact:

Harley GadomskiP: 12104778469E: [emailprotected]

SOURCE Frost & Sullivan

http://www.frost.com

See original here:
Infinity Optics Lauded by Frost & Sullivan for Enriching Biometric Authentication Processes with its Novel QuantumCrypt Platform - PRNewswire

Quantum Technologies 2020: Impact on COVID-19, Ecosystem & Supply Chain Analysis, Industry Best Practices, Technology Roadmap and Growth…

DUBLIN, April 20, 2020 /PRNewswire/ -- The "Emerging Opportunities of Quantum Technologies in Electronics Industry" report has been added to ResearchAndMarkets.com's offering.

Key Questions Addressed

Quantum technology, which enables the manipulation of atoms and sub-atomic particles, will allow for a new class of ultra-sensitive devices with key potential to profoundly impact and disrupt significant applications in areas such as defense, aerospace, industrial, commercial, infrastructure, transportation and logistics markets.

The ability to control and predict the behavior of atoms and ions has key opportunities to enable exquisitely sensitive sensors for application such as ultra-precise navigation, improved location of buried objects, enhanced geophysical or resource exploration, as well as ultra-precise measurement of time, computers able to solve very complex problems much faster than classical computers, considerably more secure and rapid data communications, and imaging in previously impossible conditions with greatly enhanced resolution.

Quantum technology is also driving advancements in more compact lasers, microfabricated atom/ion traps and diffraction gratings for trapping and cooling atoms, single-photon detectors for applications such as enhanced imaging and quantum cryptography, microfabricated vapor cells containing atomic vapors or optically cooled atoms.

Key Topics Covered

1. Executive Summary1.1 Scope of Research1.2 Research Methodology1.3 Research Methodology Explained1.4 Key Findings - Quantum Electronics Finds Applications in Submarines and Satellites1.5 Key Findings - Quantum Magnetometers Generate Interest in Navigation

2. Quantum Electronics Technology Landscape - Status Review2.1 Quantum Electronics will Disrupt Industrial, Defense, Security, and Healthcare Markets2.2 Applications of Different Types of Quantum Electronics2.3 Factors Driving the Adoption of Quantum Electronics2.4 Miniaturization is a Major Challenge for Adoption of Quantum Electronics

3. Quantum Inertial Sensors3.1 Quantum Gyroscopes and Accelerometers Provide Enhanced Sensitivity3.2 Quantum Inertial Sensors Have Opportunities to Disrupt Conventional Navigation Systems and MEMS Sensors3.3 Application Impact of Quantum Inertial Sensors3.4 Recent Developments with Stakeholders - Quantum Inertial Sensors3.5 Quantum Inertial Sensors are Gaining Investments

4. Quantum Gravity Sensors4.1 Quantum Gravity Sensors - Overview4.2 Gravity Sensing: An Earlier Opportunity for Quantum Accelerometers4.3 Application Landscape of Quantum Gravity Sensors4.4 Gap Analysis: Quantum Gravity Sensors Opportunities and Challenges4.5 Recent Developments with Stakeholders - Quantum Gravity Sensors

5. Quantum Magnetometers5.1 Quantum Magnetometers - Overview5.2 Application Diversity of Quantum Magnetometers5.3 Quantum Magnetometers find Applications in Precision Location Detection5.4 Opportunities Driving Adoption of Quantum Magnetometers5.5 Factors Hindering Adoption of Quantum Magnetometers5.6 Stakeholder Developments - Quantum Magnetometers

6. Quantum Clocks6.1 Quantum Clocks Enable Precision Timing6.2 Opportunities of Quantum Clocks6.3 Challenges Hindering Adoption of Quantum Atomic Clocks6.4 Applications for Quantum Atomic Clocks6.5 Stakeholder Developments - Quantum Magnetometers6.6 Stakeholders are Collaborating with Universities for Quantum Developments

7. Quantum Computing7.1 Quantum Computers have Unprecedented Computational Power7.2 Opportunities of Quantum Computing7.3 Factors Hindering Adoption of Quantum Computing7.4 Applications of Quantum Computing Across Different Industries7.5 Stakeholder Developments and Recent Research in Quantum Computing7.6 Kagome Metal finds Applications in Quantum Computers7.7 Nitrogen-Vacancy Diamonds have the Potential to Retain Quantum Information

8. Quantum Communications8.1 Quantum Repeaters and Quantum Key Distribution play Key Roles in Enabling Quantum Communication8.2 Opportunities Driving Quantum Communications8.3 Factors Hindering Adoption of Quantum Communications8.4 Stakeholder Developments - Quantum Computing8.5 Recent Research in Quantum Computing Enables Development of Quantum Random Number Generator

9. Impact of Quantum Technologies on COVID-199.1 Opportunities to Combat Coronavirus (COVID-19)9.2 Use of Supercomputers to Study COVID-19 Impact Creates Potential Applications of Quantum Computing

10. Quantum Electronics Ecosystem and Supply Chain Analysis10.1 Quantum Technology Ecosystem Components10.2 Key Types of Participants in the Quantum Supply Chain10.3 Other Participants in the Quantum Supply Chain

11. Industry Best Practices - Assessment of Partnerships/Alliances and Recent Developments11.1 Advancements in Quantum Entanglement Pave the Way for Quantum Internet11.2 Recent Partnerships Drive Developments in Quantum Computing

12. Technology Roadmap & Growth Opportunities12.1 Quantum Electronics Roadmap12.2 Strategic Investments Drive Adoption of Quantum Technologies

13. Industry Contacts13.1 Key Industry Contacts

For more information about this report visit https://www.researchandmarkets.com/r/hkrsq0

Research and Markets also offers Custom Research services providing focused, comprehensive and tailored research.

Media Contact:

Research and Markets Laura Wood, Senior Manager press@researchandmarkets.com

For E.S.T Office Hours Call +1-917-300-0470 For U.S./CAN Toll Free Call +1-800-526-8630 For GMT Office Hours Call +353-1-416-8900

U.S. Fax: 646-607-1907 Fax (outside U.S.): +353-1-481-1716

View original content:http://www.prnewswire.com/news-releases/quantum-technologies-2020-impact-on-covid-19-ecosystem--supply-chain-analysis-industry-best-practices-technology-roadmap-and-growth-opportunities-301043523.html

SOURCE Research and Markets

Continued here:
Quantum Technologies 2020: Impact on COVID-19, Ecosystem & Supply Chain Analysis, Industry Best Practices, Technology Roadmap and Growth...

Social Distancing and the Use of Electronic Signatures under Turkish Law – Lexology

As a precaution against the rapid spread of the global pandemic, many of the companies switched to remote working strategies and started to apply social distance rules to mitigate the effect of the Covid-19. With the increase in the number of people working remotely, companies and organizations will undoubtedly have to think about how to execute documents and contracts, along with the measures taken against the Covid-19. Even though economic life will slow down in this process, many routine contracts will be renewed, works and services will continue where they left off to adjust this new life, whenever possible. Providing flexibility and efficiency in cross-border transactions, electronic signatures (e-signatures) can eliminate many of these problems and provide more security than scanning and e-mailing wet signatures.

What are the Types of E-Signatures?

E-signature can be defined as a concept that includes methods based on people's biometric features (such as voice, eye retina scan, fingerprint scan); handwritten signature which has been scanned to be transmitted to the electronic environment, a signature made with a pen on the computer screen or a digital signature created by double key cryptography.

Are E- Signatures Valid Under Turkish Law?

E-signature is regulated under Electronic Signature Law No. 5070 (Law No. 5070). Unlike the European Union Regulation on Electronic Identification and Trust Services for Electronic Transactions in the Internal Market No. 910/2014, Law No. 5070 accepts only secure electronic signature as the valid electronic signature and does not make a distinction between simple, qualified and advanced electronic signature.

As per the article 4 of the Law No. 5070, secure electronic signature is defined as an electronic signature (i) which is specifically designated to the signatory, (ii) which is only at the disposal of the signatory and created with the secure electronic signature creation tool, (iii) which provides the identification of the signatory based on the qualified electronic certificate and (iv) capable of indicating whether any alterations have been made to the document after the creation of the electronic signature. Accordingly, the electronic signature must be a secure electronic signature in order for it to create same legal effects as a handwritten signature. Meaning that documents signed using a secured e-signature has the same conclusive force as the handwritten signature thus qualify as a material evidence in legal proceedings.

Are There any Restrictions to Use E-Signature?

While Contracts, where the law does not require written form, can be easily established through electronic communication tools as per freedom of form principle; in cases where the law mandates a written form, the contracts to be made without complying this condition will be deemed invalid. Under article 5 of the Law No. 5070, certain contracts may not be signed electronically such as guarantee letters, real estate sales contracts and motor vehicles sales contracts. Further, Turkish Commercial Code (TCC) article 1526 sets forth additional restrictions. Accordingly; policies, bonds, check receipts, warrants and bills of exchange and transactions regarding to these cannot be issued with a secure e-signature.

Choosing the Type of E-Signature to be Used

In order to choose what type of e-signature to use, it is crucial to determine the most practical way while using the type which provides security measures that is capable to authenticate the signatory. The commonly used, secure and known form of electronic signature today is secure electronic signature (digital signature). Secure electronic signature weakens claims that the signatory has not read the document or has not signed by using double key cryptography technique and thus creates a bore reliable business relationship. E-signatures can be acquired from an electronic certificate provider authorized by Turkish Information and Communication Technologies Authority.

There is another type of an electronic signature called biometric signature which is mostly used when signing e-commerce home delivery service agreements on a tablet or computer. Biometric signature is an e- signature application in the form of data obtained by digitizing some of the personal characteristics of people such as voice, fingerprint, eye retina scan, movements, speed, acceleration, pencil strokes and lifts to the text to be signed. Although it is seen in practice that some companies and public administrations provide services by using biometric signatures, it does not have a conclusive force by itself unlike wet signature or a secure electronic signature under Turkish law. In order to provide this conclusive force, strict measures must be taken using biometric signature panels that can access private databases. With the use of these panels, personal data such as pressure, azimuth angle, height, velocity, acceleration, coordinates and signing time are also collected, as well as the personal data received to verify signatures from the person when signing that signature. Additionally, it will not be enough to collect this information, it must also be stored in encrypted form and it is necessary to develop a strict data protection policy and follow the operation of this policy in order to avoid any problems in case of a possible conflict due to the uncertainty in the legislation.

Is it Possible to E-Sign a Document with a Foreign Entity?

As per the article 14 of Law No. 5070, the legal results of electronic certificates (e-certificate) issued by an e-certificate provider established in a foreign country shall be determined by international agreements. Additionally, in case that an e-certificate issued by a foreign e-certificate provider shall be recognized as a qualified e-certificate provided that the admissibility of foreign e-certificate is recognized by a Turkish e-certificate provider. In this respect, it is possible to sign a document using e-signature with European Countries since the European Union E-Signature Directive No. 99/93 (Directive) and countries such as United Kingdom, Hong Kong and China, United States and Russian Federation which recognizes the admissibility of qualified e-certificates as long as the concerned Turkish e-certificate provider fulfils relevant requirements of such countries.

Read more:
Social Distancing and the Use of Electronic Signatures under Turkish Law - Lexology

CollabNet VersionOne, XebiaLabs, and Arxan combine to form Digital.ai – IBS Intelligence

LinkedInWhatsAppFacebook Twitter EmailPrint

Arxan, a provider of application protection solutions has been acquired to come together with CollabNet VersionOne and XebiaLabs to form Digital.ai, a new software company bringing together business agility, software delivery, and application security into one integrated value stream platform. Terms of the combination are not being disclosed.

Backed by TPG Capital, Digital.ai is aimed to revolutionise how enterprises manage digital products that provide value, accelerate revenue growth and enable innovation in todays world. With the addition of Arxan Technologies, Digital.ai platform offers Security by Design as an integral part of the software development lifecycle. Arxan provides patented security capabilities such as a dynamic app policy engine, obfuscation, code hardening, threat analytics, white-box cryptography and encryption, and rapid app protection deployment designed for DevOps processes. The addition is expected to help organisations in innovating without worrying about performance and security and enhance their speed to market.

The Digital.ai value stream platform integrates disparate tools and processes across value streams, uses data and AI/ML to create connective tissue between them, and provides enterprises with the real-time, contextual insights for their digital transformation and enable them to produce enhanced business outcomes. By streamlining processes across teams and providing continuous feedback loops throughout the development lifecycle, organisations can provide valuable service to customers ensuring efficiency and optimise cost.

In these challenging times, your digital presence is your business. Digital.ai enables enterprises to focus on business outcomes instead of outputs, unifying value creation, delivery, and protection practices to drive efficiencies and create engaging, secure digital experiences that customers value and trust. Now more than ever, it is critical that organisations leverage the power of business agility to optimize processes and make decisions rooted in customer centricity. Doing so will result in higher quality, more secure products that are delivered faster and drive stronger customer and employee engagement, said Ashok Reddy, CEO of Digital.ai.

Digital.ai serves industries in diverse verticals including automotive, banking and finance, digital media, gaming, insurance, medical devices, and more. Its solution is already being used by customers such as ABN AMRO Bank, KeyBank, KLM/Air France, Siemens, and Toyota.

Digital.ai is bringing together leaders in their fields from Agile business planning, to delivery, to application security to create an integrated, end-to-end software platform that enables large enterprises to create, adapt, and excel in todays digital markets. The company is introducing a new level of connectivity, visibility, and security into the software development lifecycle, and we are excited to see the impact that Digital.ai will have on Global 5000 businesses and their digital transformations. We look forward to continuing to work with management to support and build this differentiated platform, said Nehal Raj and Art Heidrich of TPG Capital.

See more here:
CollabNet VersionOne, XebiaLabs, and Arxan combine to form Digital.ai - IBS Intelligence

Cardano News Today – Statistics Reveal That Cardano is the Foremost Cryptocurrency With Developer Activity – April 18th, 2020 – Smartereum

Cardano News Today The last few months have been tough for individuals and businesses across sectors around the world. We all know that Coronavirus pandemic is the primary reason behind the current global meltdown. In the blockchain space, development and new launches have slowed down but the Cardano Foundation is still working hard to meet its deadlines irrespective of the crisis. IOHK has worked so hard along with other organizations related to Cardano to meet its goals despite the spread of the Coronavirus. Now, Cardano is reportedly the top blockchain in terms of developer activity.

Yesterday, CryptoDiffer published data from Github reflecting the development activity over the last 30 days. The publication revealed that out of all the cryptocurrencies in the space, Cardano has the most development activity. This is in line with all the effort the Cardano development team has been making to fulfill their roadmap goals. Last month, Cardano made two major developments that paved the way for the endgame; Cardano Shelley.

Cardano (ADA) Price Today ADA / USD

Cardano has been taking the lead on the platform since March and from the look of things, it will continue to take the lead for months to come until it upgrades to Cardano Shelley testnet. There have been 383 open-source commits from Cardano developers since the middle of March. Unfortunately, despite all the effort, the Cardano development community is putting into ensuring that they meet their deadlines, the Cardano ADA token is not making any significant progress in price. The difference between the blockchains development and the price of the ADA token is rather discouraging and it is causing investors to lose faith in the project.

As stated before, the price of the Cardano ADA token isnt doing well. Over the last few years, the token has struggled against the USD. This time around, the token is falling along with the rest of the cryptocurrency market. After the bulls managed to take the price of ADA as high as $0.037 last week, it started to fall slowly against the USD. At the time of writing, the price of the token was bullish at $0.0353. This shows that it is up by 2.39% against the USD and up by 1.56% against the price of BTC. Just yesterday, the token was struggling to move above the $0.033 level. So, the rise to $0.035 is commendable. If the bulls maintain the momentum, the token might retest the $0.037 level by the weekend.

Max writes about blockchain projects and regulation with a special focus on United States and China. He joined Smarterum after years of writing for various media outlets.

See the original post:
Cardano News Today - Statistics Reveal That Cardano is the Foremost Cryptocurrency With Developer Activity - April 18th, 2020 - Smartereum

Report: XRP Is the Most Popular Cryptocurrency Among eToro Users – BTCMANAGER

Trading behemoth eToro recently published its latest quarterly report for cryptocurrencies titled The State of Digital Assets Q1 2020. Interestingly, data from the report suggests that XRP is the most popular cryptocurrency among the platforms user base as more than half of them hold Ripple Inc.s digital token.

Cryptocurrency exchange platforms are typically dominated by digital assets including Bitcoin (BTC) and Ether (ETH), thanks to their immense popularity among the crypto-enthusiasts.

While Bitcoin is the original poster boy of digital currencies, the brainchild of Satoshi Nakamoto, Ethereum is the undisputed leader of smart-contracts and has opened myriad opportunities for blockchain technologys application across industries. For close followers of the industry, decentralized finance (DeFi) is just one of the many examples of the unparalleled potential of the Ethereum blockchain.

However, new data published by eToro suggests that rather than the aforementioned big guns of crypto, it is XRP that is the most popular digital currency among the trading venues user base. Specifically, about 54.5% of eToros users are invested in XRP. Notably, the data only accounts for users counted until April 1, 2020.

According to data published, XRP is followed by Bitcoin, Ether, and Litecoin, with 35.1%, 23.9%, and 14.5% users invested in them, respectively.

The immense popularity of XRP shouldnt come as a surprise to the crypto community. The third-largest cryptocurrency in terms of reported market cap, XRP is one of the front-runners when it comes to digital currencies seeking to make an impactful presence in the multi-billion dollar remittance market.

As reported by BTCManager on March 30, 2020, Spanish banking giant, Santander had announced it would be bringing Ripples blockchain-powered international remittance platform RippleNet to Mexico to tap the countrys remittance market.

On a more recent note, BTCManager informed its audience on April 16, 2020, how Ripple had inked a strategic partnership with Malaysian cross-border payment platform MoneyMatch. The partnership essentially allows Ripple to expand the reach of RippleNet to more than 120 countries.

At press time, XRP ranks 3rd on the CoinMarketCap crypto table with a market cap of more than $8 billion trading at $0.18.

Like BTCMANAGER? Send us a tip!

Our Bitcoin Address: 3AbQrAyRsdM5NX5BQh8qWYePEpGjCYLCy4

See more here:
Report: XRP Is the Most Popular Cryptocurrency Among eToro Users - BTCMANAGER