WikiLeaks releases Manual for Linux Implant Aeris – Ghacks Technology News

WikiLeaks has been fairly steadily releasing documents from what is known as the Vault 7 leaks, and now documentation has been released about a tool known as Aeris which specifically targets POSIX systems such as a couple GNU/Linux Distributions.

Posted on WikiLeaks yesterday, was information regarding the Imperial project of the CIA,

Aeris is an automated implant written in C that supports a number of POSIX-based systems (Debian, RHEL, Solaris, FreeBSD, CentOS). It supports automated file exfiltration, configurable beacon interval and jitter, standalone and Collide-based HTTPS LP support and SMTP protocol support - all with TLS encrypted communications with mutual authentication.

It is compatible with the NOD Cryptographic Specification and provides structured command and control that is similar to that used by several Windows implants.

This article will be focusing specifically on Aeris however.

Aeris appears to be an implant that is designed to allow an agent to retrieve and send information about the infected system through TLS encrypted channels.

There are multiple avenues for information transmission such as mail systems like Postfix, that allow the agent to send heavily encrypted information to the designated destination in a virtually unbreakable fashion using AES256 encryption.

What systems are targeted?

The distribution of Aeris consists of a set of Python utilities and a set of binaries, one per platform that is targeted by Aeris.

Aeris does not have a separate installer. To deploy it, simply place an Aeris binary in the desired directory. Rename the binary in any way that you wish. Note that the configuration is patched in at build time; hence, no additional files (beyond possibly those related to persistence -- see the next section) are needed.

While many people may view this on a political level, or on the topic of privacy advocacy etc, I look at this from a standpoint of future security.

In the past, malware that has caused problems for the general populace has been based on government malware; such as WannaCry for example. WannaCry was initially based on EternalBlue, that many attribute it to the NSA.

Read also: A look at the nano text editor in GNU/Linux

With the release of this information on Aeris, I worry that black-hat (read: bad hackers) may get their hands on / develop something similar, and use the methods described in the documentation in malicious ways.

However, with that being said, most home users would have very little to worry about, and unless a server has a reason to be targeted; again there shouldnt really be any need to worry. But, educating ones-self on the topic is never a bad thing!

In the Manual, there is a rather amusing part of one paragraph that I thought I might point out:

Each implant instance has a unique certificate authority associated with it. The CA's private key is used to sign the implant's certificate as well as certificates for each LP associated with the implant in question.

If anyone actually reads this paragraph, he or she is entitled to a small monetary prize courtesy of the Aeris team lead. Implant- collected data cannot be decrypted without the CA's private key; hence, this key is considered SECRET//NOFORN and must be maintained on a classified network. All keys and certificates (CA, target, and LP) are 2048 bits in size.

Many people like to think that GNU/Linux systems are invincible, and that simply by running a Linux based system you are totally safe from malware and the like; these releases are just further proof that this is not the case; lets just hope that more malicious users out there do not try and take advantage of these new tools!

For those who wish to see the information about Aeris, you can find the manual here (PDF).

Summary

Article Name

WikiLeaks releases Manual for Linux Implant Aeris

Description

WikiLeaks has been releasing documents from what is known as the Vault 7 leaks, and now documentation has been released about a tool known as Aeris

Author

Mike Turcotte

Publisher

Ghacks Technology News

Logo

You are here: Home > Linux > WikiLeaks releases Manual for Linux Implant Aeris

You can support us in many ways, for instance by disabling adblockers. Alternatively, you may support us with a PayPal donation.

Please check out our other support options here.

Advertisement

Recent Updates:

Pale Moon 27.4 Remove Intel True Key Firefox 54.0.1 Windows 10 Privacy Software The best Chrome extensions The best Firefox addons Firefox privacy and security preferences Firefox Release Schedule Firefox multi-process information Windows Backup Software overview Anti-Ransomware Software overview The Best Windows Software Firefox Roadmap 2017

Advertisement

Topics

Apple Development Facebook Games Ghacks Hardware Internet Internet Explorer Linux Microsoft Mobile Computing Music And Video Networks Opera Security Tutorials

Advertisement

Latest Downloads:

WinSuperMaximize Fing Network Discovery

Here is the original post:
WikiLeaks releases Manual for Linux Implant Aeris - Ghacks Technology News

LETTER TO THE EDITOR: Trump right on banning transgender people from military – The News Herald

Allowing Transgenders in the Military will cause a lot of disorganization in the ranks. If the left is going to dictate to America that we are supposed to pretend that men are women and women are men, and that it is okay and normal for transgenders to serve in the military, then they are going to have a fight on their hands. We should not modify basic biology because it threatens their distorted and subjective sense of what they are.

Dr. Paul R. McHugh, the former psychiatrist-in-chief for Johns Hopkins Hospital, has written that transgenderism is a "mental disorder" that merits treatment and that people who promote "sexual reassignment" surgery are collaborating with and promoting a mental disorder.

How can anyone in their right mind allow anyone diagnosed with even a hint of a "Mental Disorder" to fly a high performance fighter over Europe, to stand on watch in a missile silo in Wyoming, or monitor the health of a sub's nuclear reactor?

Bradley Manning now known as Chelsea Manning is a perfect example of the dangerous decisions that can be made by a person with a mental disorder. She / He leaked over 50,000 classified, military, and diplomatic documents that actually put lives in danger.

The American people deserve the best protection they can get from enemies foreign and domestic. So how can they believe they are in good hands if individuals like Manning are put in extremely sensitive positions?

All of this doesn't even take into account that Veterans all across America are hurting and some even dying from the lack of funds allotted to the Veterans Administration for normal everyday procedures. But still the liberals think the taxpayers should pay for reconstruction surgery for Trangenders. How can this procedure be allowed ahead of all the other Veterans that have served honorably and some even risking their lives to protect our country. Let's see if I got this right, the liberals think it's OK to spend the limited resources of the VA on surgery to change a man into a woman instead of having it available to use for surgery, medication, and rehabilitation to a wounded Military Veteran. What do you think?

William C. Meadows, Parker

Read the original post:
LETTER TO THE EDITOR: Trump right on banning transgender people from military - The News Herald

AMD: Cryptocurrency Mining Isn’t ‘A Long-Term Growth Driver’ – CoinDesk

Chip maker AMD has seen its sales buoyed in recent months by big demand for graphics cards by cryptocurrency miners.

According to its latest financial report, AMD recorded $1.22 billion in revenue duringthe second quarter of 2017, up 19% compared to the same period last year. This increase, the company said, is being spurred "by higher revenue in the computing and graphics segment."

Yet cryptocurrency mining isn't part of its long-term strategy for growth, accordingto Lisa Su, the firm's president and CEO, who remarked on the phenomenon during a Q2earnings call this week.

However, that state of affairs could change depending on how the situation progresses in the months ahead.

Su said during the call:

"Relative to cryptocurrency, we have seen some elevated demand. But it's important to say we didn't have cryptocurrency in our forecast, and we're not looking at it as a long-term growth driver. But we'll certainly continue to watch the developments around the blockchain technologies as they go forward."

Mining is an energy intensive process by which new transactions are added to a blockchain. In return for adding a new blocks, miners are awarded with new tokens, with the profits being derived from the difference between the energy expended and the prevailing exchange rate of those tokens.

Much of the demand for graphics cards, or GPUs, is being driven by ethereum miners. Bitcoin mining, by comparison, is accomplished through special-purpose computers designed for that singular purpose.

Graphics cardsimage via Shutterstock

The leader in blockchain news, CoinDesk is an independent media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. Have breaking news or a story tip to send to our journalists? Contact us at [emailprotected].

More here:
AMD: Cryptocurrency Mining Isn't 'A Long-Term Growth Driver' - CoinDesk

Bitcoin LIVE news: Price latest as top investor warns cryptocurrency is an ‘unfounded FAD’ – Express.co.uk

Getty

Investor Howard Marks, who predicted the financial crisis and dotcom bubble implosion, warned that cryptocurrency is a nothing more than a fad or pyramid scheme style scam.

He said: In my view, digital currencies are nothing but an unfounded fad (or perhaps even a pyramid scheme), based on a willingness to ascribe value to something that has little or none beyond what people will pay for it.

The co-chairman of Oaktree Capital, compared cryptocurrencies to the Tulip mania of 1637, the South Sea bubble of 1720 and the internet bubble of 1999.

In an investor letter, he said: Serious investing consists of buying things because the price is attractive relative to intrinsic value.

Speculation, on the other hand, occurs when people buy something without any consideration of its underlying value or the appropriateness of its price."

Bitcoin suffered a crash earlier this month but has since bounced back and is now up by almost nearly 160 per cent this year.

On Wednesday Bitcoin briefly fell as low as $2,433.83, its lowest price since the cryptocurrency dramatically rebounded last week.

The volatile digital currency saw a surge last Thursday after miners backed a new upgrade of the system designed to solve the cryptocurrencys scaling issue.

CoinDesk

Although Bitcoin narrowly avoided a fork this month, there are still concerns that digital currency is at risk of splitting into two versions.

Here is the latest Bitcoin news, prices and live updates (All times BST).

1pm:The value of Bitcoin is rising.Today's high is $2,822.24 andtoday's low is $2,682.87, according to CoinDesk. Bitcoin opened at$2,697.47.

8.30am: Hong Kong-based digital currency exchange Bitfinex claims that a minority of Bitcoin miners will be "forking" to create a new blockchain called Bitcoin Cash on August 1.

A "fork" is when a blockchain splits into two potential paths. Bitfinex said the fork does not impact Bitcoin balances, but it creates a new token.

Midnight: Thursday'shigh was $2,715.69 and its low was $2,541.71, according to CoinDesk. Bitcoin opened at $2,550.18 and closed at $2,697.47.

9.15pm: The provider of a publicly traded bitcoin exchange-traded note (ETN) has been fined more than 93,000 ($120,000) by Nasdaq Stockholm for infractions of exchange rules and financial regulations.

The stock exchange's Disciplinary Committee announced that it had levied the fine because the company, XBT Provider, violated provisions in its Internal Rule Book and certain regulations of the Financial Instruments Trading Act.

Among those violations, according to the statement, were "failing to ensure that the risk function reports to the board" and "failing to implement an audit of the company's internet and IT security."

The release also pointed to infractions related to annual reporting requirements.

CoinDesk

8.20pm:Bank of America Managing Director Francisco Blanch thinks that Bitcoin cannot successfully expand around the world without being subjected to some regulatory guidelines.

He says: "A key step for Bitcoin would be for it to become pledgeable collateral.

However, large inherent risks to digital tokens such as fraud, hacking, theft, new protocol adoption, limited acceptance and that it is not legal tender many places in the world make it an unlikely development."

Mr Blanchs position is supported by other financial services industry players like Morgan Stanley.

However, the efforts by several governments around the world to regulate the digital currencies have been relatively unsuccessful so far.

CoinDesk

11.30am: Bitcoin briefly fell below $2,500 on Tuesday and Wednesday. Last Thursday the price rose sharply after most developers backed BIP 91, a upgrade to the bitcoin system.

The BIP 91 lock-in was hailed as a victory as miners agreed to cement the first part of a larger effort to upgrade bitcoin, called Segwit2x.

Alex Sunnarborg, research analyst at CoinDesk, told CNBC: "I believe the market is currently somewhat torn between the optimism around BIP 91 locking in, which could lead to SegWit activating if all goes smoothly, and the fear of the second half of SegWit2x proposal, the 2MB block size hard fork, still being contested.

9am:A US jury has indicted a Russian man as the operator of a digital currency exchange he allegedly used to launder more than $4 billion for people involved in crimes ranging from computer hacking to drug trafficking.

Alexander Vinnik was arrested in a small beachside village in northern Greece on Tuesday, according to local authorities.

AFP Getty

US officials described Vinnik in a Justice Department statement as the operator of BTC-e, an exchange used to trade the digital currency bitcoin since 2011.

They alleged Vinnik and his firm "received" more than $4 billion in bitcoin and did substantial business in the US without following appropriate protocols to protect against money laundering and other crimes.

US authorities also linked him to the failure of Mt. Gox, a Japan-based bitcoin exchange that collapsed in 2014 after being hacked.

Vinnik "obtained" funds from the hack of Mt. Gox and laundered them through BTC-e and Tradehill, another San Francisco-based exchange he owned, they said in the statement.

8.30am: According to Sheba Jafari, head of technical strategy at Goldman Sachs, bitcoin needs a "few more swings" before the upward trend continues.

"Anything above 3,000 (Jun 13th high) will suggest potential to have already started wave V, which again has a minimum target at 2,988 and scope to reach 3,691 (the latter being a preferred target as this assumes a new high)," Ms Jafari wrote in a note to clients.

Goldman Sachs said Bitcoin is "still within the limits of a well-defined range", adding: "At this point, it seems reasonable to assume that the market is in a corrective process until there's been real evidence of an impulsive advance."

Read this article:
Bitcoin LIVE news: Price latest as top investor warns cryptocurrency is an 'unfounded FAD' - Express.co.uk

What Does Net Neutrality Mean for the Future of Cryptocurrency? – Futurism

Net Neutrality

Americans are slowly realizing the significance of the potential consequences of the FCCs current net neutrality regulations being repealed. These regulations once protected small businesses and content providers from intrusion by private, monopolistic internet service providers (ISPs), such as Verizon and Comcast. Before net neutrality, ISPs could disrupt, slow, and even censor content on the internet without any liability. This controversy reached its climax in 2007 when Verizon was exposed for blocking group chat conversations coming from a large pro-choice abortion group. However, many defenders of net neutrality are currently overlooking the political dynamic between net neutrality and the development of cryptocurrencies.

Blockchain and cryptocurrencies like Bitcoin have greatly benefited from past net neutrality regulations. Bitcoins price has increased 300 percent since Obamas regulations were put in place in February 2015. This growth has been attributed to many factors, including the governments of Japan and China becoming more tolerant of cryptocurrency use. Not to mention countless initial coin offerings (ICOs) also hitting the worldwide market. The last two years have been the most profitable and evolutionary period for cryptocurrencies since their inception. However, Bitcoin and other cryptocurrencies have been in the middle of a financial bubble, and a series of interventions from ISPs could force that bubble to implode which may not be a bad thing. Without net neutrality regulations, ISPs can function without any accountability. What that will mean for cryptocurrencies remains yet unknown.

Its no secret that many American corporations lean staunchly conservative, and would happily wipe out a disruptive technology that works against their interests something like cryptocurrencies. ISPs and the U.S. government maintain close ties, something which has become increasingly obvious in the past few months. The appointment of former Verizon lawyers such as Ajit Pai, as the head of the FCC is just one example, and state policies continue to keep 60 percent of Americans confined to just a single internet provider option.

The concentration of power amongst ISPs allows the government to more effectively regulate and influence the internets evolution. When and if cryptocurrencies are viewed as a problem by the U.S. government, the internet service provider will be looked at to find the solution. Under the current status quo, Bitcoin will not be considered as an alternative monetary system because it is too difficult to control and tax. Not to mention that Congress position on virtual currencies is still unclear, and interpretations of the Stamp Payments Act of 1862 may provide Congress with the legal footing to leverage against cryptocurrencies.

The Act states that:

Whoever makes, issues, circulates, or pays out any note, check, memorandum, token, or other obligation for a less sum than $1, intended to circulate as money or to be received or issued in lieu of lawful money of the United States, shall be fined under this title or imprisoned not more than six months, or both.

A simple way in which an ISP can affect the attractiveness of cryptocurrency investment is by slowing down broadband speeds of blockchain sites, which would in turn slow down transaction speeds. Yet, the speed (or lack thereof) of transactions has seemingly had zero effect on investment. Thus, cryptocurrencies themselves arent necessarily at risk unless ISPs conduct structural attacks on blockchain servers. By nature, blockchains are immune to human intervention. However, the internet provider holds the ability to implement a partition or delay attack. These attacks could effectively create a blackhole, where all bitcoin transactions are lost and made impossible to track. This could lead to wasted processing power and doubled spending for miners. However, these concerns are coming from the lawyers and businessmen, not the engineers.

Engineers see this problem as a perfect example of why blockchain was designed the way it was. To them, repealing net neutrality regulations would invite the possibility of having to reposition themselves back onto an I2P network, like Kovri.

Net neutrality while it does embody the decentralization mantra of blockchainis far from a requirement for the functionality of blockchain. The future of the monetary system is a global currency free from human intervention. If Bitcoin fails to survive the coming storm, it would be because of structural errors not ISP intervention. In addition, if the ISPs start a war against blockchain and cryptocurrencies, the internet may experience an accelerated evolution of decentralization. In the context of blockchain and cryptocurrencies, net neutrality may be a blessing in disguise, forcing further development in the industry.

More here:
What Does Net Neutrality Mean for the Future of Cryptocurrency? - Futurism

Wikileaks: CIA targets Red Hat with hacking tool – WRAL Tech Wire

Updated Jul. 28, 2017 at 8:49 a.m.

Published: 2017-07-28 08:47:00 Updated: 2017-07-28 08:49:21

By RICK SMITH, WRAL TechWire Editor

Raleigh, N.C. The top software product from Raleigh-based Red Hat is the target of a hacking tool developed by the CIA, according to documents published by WikiLeaks.

Red Hat Enterprise Linux is one of the world's most popular software platforms used by global financial firms, and services related to RHEL is among Red Hat's most profitable revenue streams. Red Hat is the world's best-known developer of Open Source Linux software.

WikiLeaks says Red Hat's RHEL was targeted under a CIA program called "Imperial."

National Security Agency-born hacking programs were utilized in two major global ransomware attacks, according to researchers.

The program taking aim at RHEL is called Aeris, perhaps named after a character in the Final Fantasy VII game. And it appears to be quite dangerous. (An image of Aeris from the game is included with the "users guide" Wikileaks published.)

"The malware includes features for data exfiltration and can be used to build customized attacks," says tech news site Inquirer.

Led by Julian Assange, WikiLeaks did not identify the source of the latest document dump.

"RELEASE: CIA 'Aeris' implant targeting Debian, Red Hat, Solaris, FreeBSD and Centos users," WikiLeaks declared in a tweet on Thursday.

The targets

The software targets two versions of Red Hat Enterprise Linux.

Red Hat calls RHEL"the leading open source platform for modern datacenters" and says it "delivers military-grade security, 99.999% uptime, support for business-critical workloads, and so much more. Ultimately, the platform helps you reallocate resources from maintaining the status quo to tackling new challenges. It's just 1 reason why more than 90% of Fortune Global 500 companiesuse Red Hat products and solutions."

According to Wikileaks, Aeris is an "automated implant" that "supports automated file exfiltration."

Written in "C" programming language, Aeris also targets other software: Debian, Solaris, FreeBSD and CentOS.

Wikileaks adds that Aeris is "similar" to "implants" also used to penetrate Windows systems.

WRAL TechWire has reached out to Red Hat for reaction.

The full explanation

Here's the description about Aeris as published by Wikileaks:

"Aeris is an automated implant written in C that supports a number of POSIX-based systems (Debian, RHEL, Solaris, FreeBSD, CentOS). It supports automated file exfiltration, configurable beacon interval and jitter, standalone and Collide-based HTTPS LP support and SMTP protocol support - all with TLS encrypted communications with mutual authentication. It is compatible with the NOD Cryptographic Specification and provides structured command and control that is similar to that used by several Windows implants."

Other hacking tools

Aeris is one of three tools unveiled by WikiLeaks in its latest expose, include one that penetrates Apple Mac operating systems.

The tools are called "Achilles" and "SeaPea."

"Achilles is a capability that provides an operator the ability to trojan an OS X disk image (.dmg) installer with one or more desired operator specified executables for a one-time execution," Wikileaks says.

"SeaPea is an OS X Rootkit that provides stealth and tool launching capabilities. It hides files/directories, socket connections and/or processes. It runs on Mac OSX 10.6 and 10.7."

Read more at:

https://wikileaks.org/vault7/releases/#Imperial

WRAL TechWire any time: Twitter, Facebook

Read more:
Wikileaks: CIA targets Red Hat with hacking tool - WRAL Tech Wire

Chelsea Manning: President Trump, Trans People in the Military Are … – New York Times

What does this mean? Well, for now we dont exactly know, since it is clear that the presidents tweets were not exactly well thought out. But it could mean that trans people will have to pack up and go home for pretty much no reason other than you cant stay here. For no other reason than, we feel like using you as political pawns today, or we dont understand you, or you simply are not welcome here.

Money is the excuse today. It was supposed to be expensive to provide trans people with adequate health care. The reality is that the costs are negligible. Military spending wastes billions of dollars on projects that are canceled or dont work, every day.

Medicine was the old excuse. The old military regulations were laced with medical terms to justify discrimination. They psychopathologized us trans people as having manifestations of paraphilias, and psychosexual conditions, transsexual, gender identity disorder to include major abnormalities or defects of the genitalia such as change of sex or a current attempt to change sex, that would render an individual administratively unfit to serve.

These old regulations could come back. The rhetoric about trans people having mental disorders could come back, too. Its the same thing we see in state houses across the country. Trans people are mentally ill. We are predators. We are the ethereal enemy of the moment. Even though there is a medical consensus, a legal consensus, a military consensus that none of this is true.

This is about bias and prejudice. This is about systemic discrimination. Like the integration of people of color and women in the past, this was a sign of progress that threatens the social order, and the president is reacting against that progress.

But we will move forward. We will make sure that all trans people in the military, and all people outside the military after serving, receive the medical care they need. We will not back down. Our progress will continue. Our organizing and activism will grow stronger.

We are neither disruptive nor expensive. We are human beings, and we will not be erased or ignored.

Chelsea Manning (@xychelsea) is a former United States Army intelligence analyst who was convicted in 2013 by court martial under the Espionage Act. Her sentence was commuted by President Obama in January and she was released in May.

Follow The New York Times Opinion section on Facebook and Twitter (@NYTopinion), and sign up for the Opinion Today newsletter.

See the article here:
Chelsea Manning: President Trump, Trans People in the Military Are ... - New York Times

Another Way To Address Leaks – FITSNews

VIA TOBY ZIEGLER

We ran a big report today on the latest implosion associated with the administration of U.S. president Donald Trump. It involved Trumps new White House communications directorAnthony Scaramuccibasically losing his mind while speaking with a reporter.

Scaramucci was upset over leaks emanating from the White House, which reminded us of one of our favorite scenes (above) from The West Wingstarring Richard Schiff as White House communications director Toby Ziegler.

We know what youre probably thinking

This is the real world. Syrupy mellifluousness creating momentary feel-good vibes isnt a realistic long-term strategy for addressing systemic breakdowns in intelligence security.

And youd be correct

Obviously anyone caught maliciously leaking information from within the White House should be prepared to lose their jobs. Of course that reminds of us another favorite West Wing scene involving a leaker

(Click to view)

(Via: YouTube)

Again, we know things are vastly different in Hollywoods fantasy White House than they are in real life. But still, there is something to be said for an approach like this.

Seriously, leaks happen. From Teapot Dome to Watergate to Monica Lewinsky to Edward Snowden to the present day. The challenge is weighing their significance and (assuming the leaker is identified) dealing with them properly based on the content and intention of the information that was disseminated without authorization.

Not all leakers are the same, either. Some like Snowden are heroes. Others like many senior staffers in the Trump White House, it would appear are purely self-interested.

Politics is a game of addition. As is life. Subtraction is often necessary and justified but in many cases there is far greater power to be found in measured consideration than reflexive condemnation (i.e. the currency of those who go all in).

Politics and life are also examples of the long game, something were still learning after more than a decade of covering it here in our rough-and-tumble home state of South Carolina.

Anyway were not foolish enough to belief the leak responses encapsulated in these clips are necessarily applicable to modern-day Washington, D.C., but we certainly wouldnt commend Scaramuccis approach, either.

Got something youd like to say in response to one of our stories? In addition to our always lively comments section (below), please feel free to submit your own guest column or letter to the editor via-email HERE or via our tip-line HERE

Banner via Text

Continue reading here:
Another Way To Address Leaks - FITSNews

Venafi Study: Consumers Conflicted About Encryption Backdoors – ISBuzz News

Sixty-five percent believe they shouldnt be forced to hand over encrypted private data to government

SALT LAKE CITY Venafi,the leading provider of machine identity protection,today announced the findings of a study that evaluated attitudes and opinions of 3,000 adult consumers from the United States, the United Kingdom and Germany on initiatives that would grant governments more access to private, encrypted data.

According to the study, half of consumers (51 percent) do not believe their government can protect their personal data, and nearly two-thirds of respondents (65 percent) suspect their government already abuses its powers to access the data of citizens. Additionally, 68 percent of respondents believe governments should not force private companies to hand over encrypted personal data without consumer consent.

The study also found that consumers are concerned about the impact encryption backdoors would have on their personal privacy. Sixty fire percent of respondents state that governments should not be able to force citizens to turn over personal data, such as the contents of mobile phones, social media, email and online activity, without consent.

The results of this research indicate that security and privacy are probably going to get a lot worse before they get better, said Jeff Hudson, CEO of Venafi. Its very clear that consumers are confused about what access to encrypted data will mean to their privacy, and its equally clear that governments dont understand how encryption backdoors will be used to undermine our global digital economy. The negative impact encryption backdoors will have on every aspect of security and privacy is tremendous.

Despite concerns regarding government abuse, many consumers remain conflicted over how encryption backdoors would impact both their privacy and national security:

Hudson continued: Giving governments access to encryption will not make us safer from terrorism in fact, the opposite is true. Most people dont trust the government to protect data and they dont believe the government is effective at fighting cybercrime. Its ironic that we believe we would be safer if governments were given more power to access private encrypted data because this will undermine the security of our entire digital economy.

Encryption backdoors create vulnerabilities that can be exploited by a wide range of malicious actors, including hostile or abusive government agencies. Billions of people worldwide rely on encryption to protect a wide range of critical infrastructure, including global financial systems, electrical grid and transportation systems, from cybercriminals who steal data for financial gain or espionage.

The study was conducted by One Poll and completed in July 2017. It analyzed responses from three thousand adult consumers from the United States, United Kingdom and Germany.

About Venafi

Continued here:
Venafi Study: Consumers Conflicted About Encryption Backdoors - ISBuzz News

Fornetix and Cyphre Security Solutions LLC, a RigNet Company, Join Forces to Deliver Advanced Key Protection … – PR Newswire (press release)

"One of the core issues facing organizations today is the onslaught of cybersecurity products and capabilities in the marketplace and the inability to objectively understand which are needed and which are best. Powerful encryption has been proven to be the best protector of sensitive data-at-rest and data-in-transit. With powerful encryption comes the need for a policy-based advanced encryption key management ecosystem that operates with groundbreaking precision and speed. Together, Cyphre and Fornetix provide that holistic encryption solution," said Chuck White, CTO of Fornetix.

Fornetix Key Orchestration is an advanced key management ecosystem that takes traditionally long, manual encryption processes and transforms them into automated, easy-to-use solutions. Benefits include reduced costs, process consistency, enhanced use of encryption, and enterprise modifiability. Fornetix's Key Orchestration appliance integrates with Cyphre's BlackTIE-powered offerings to deliver high-performance security solutions that protect the integrity of your encrypted data from continuously evolving threats. The integrated solutions are available immediately.

Cyphre's BlackTIE technology augments vulnerable single encryption keys with hardware-encrypted Black Keys to render hijacked keys useless, thus neutralizing the threat. Chip-resident Black Keys are completely isolated from hacker exposure, even hidden from Cyphre itself. For heightened security, BlackTIE uses a key-per-file protection approach to encrypt all data-at-rest and data-in-transit.

"As businesses continue to demand data protection beyond a classic software based encryption, the integration of Cyphre's BlackTIE technology and Fornetix's Key Orchestration appliance, provide RigNet an opportunity to meet our customer demands for best-in-class cybersecurity solutions," said Steve Pickett, President and CEO of RigNet, Inc. "By fully integrating heightened data protection and key management with other security elements within a multilayered posture, organizations can further narrow gaps between their security layers, while implementing strong cryptographic protections for their most sensitive, and vulnerable, data."

About FornetixFornetix is helping organizations unleash the full potential of encryption by conquering the key management bottleneck. Our Key Orchestration ecosystem automates the key lifecycle across the entire enterprise with groundbreaking precision and speed. Policy-driven automation of the key rotation lifecycle reduces human error and empowers your organization to remain secure and avoid costly data breaches. As global use of encryption rapidly expands, you can be prepared for the future with unparalleled scalability. Please call 1-844-KEY-ORCH or visit http://www.fornetix.com for more information.

About Cyphre Security Solutions LLCCyphre, a wholly owned subsidiary of RigNet, Inc. (NASDAQ: RNET), is a cybersecurity company deploying disruptive data protection innovations by enhancing industry standard encryption protocols with our patent pending BlackTIE technology. Product offerings include Encrypted Cloud Storage and Enterprise Collaboration services, Secure Integration with IoT devices and applications, and the Enterprise Cloud Encryption Gateway. For more information, visit http://www.cyphre.com and follow us on Twitter: @getcyphre.

View original content with multimedia:http://www.prnewswire.com/news-releases/fornetix-and-cyphre-security-solutions-llc-a-rignet-company-join-forces-to-deliver-advanced-key-protection-management-and-encryption-solutions-300495894.html

SOURCE Fornetix

Home

Go here to see the original:
Fornetix and Cyphre Security Solutions LLC, a RigNet Company, Join Forces to Deliver Advanced Key Protection ... - PR Newswire (press release)