ANX Announces Industry’s First PCI QSA Validated Point-to-Point Encryption Solution

ANX Partners with Bluefin to add Validated Point-to-Point Encryption to its Industry-Leading PCI Compliance Solution

SOUTHFIELD, Mich. - ANXeBusiness Corp. (ANX), a trusted provider of managed payment solutions, has formed a strategic partnership with Bluefin Payment Systems, the leading provider of secure payment technology worldwide. The partnership establishes ANX as the first PCI Qualified Security Assessor (QSA) to offer merchants a PCI-validated Point-to-Point Encryption (P2PE) solution that also delivers a comprehensive suite of layered security and tools to simplify PCI compliance.

ANX's solution, SecurePCI Validated P2PE, combines the benefits of encryption with all the other services that a merchant needs to be secure and compliant. SecurePCI Validated P2PE is fully managed and delivers: validated P2PE; POS terminals required to meet the October 2015 EMV mandate; $100,000 of retroactive data breach protection; portal tools to simplify PCI compliance; and enterprise-grade managed security technology for layered security.

"We are excited about partnering with ANX," said Jeffrey Schroeder, Bluefin's Chief of Marketing Strategy. "They have added our Validated P2PE capabilities to their industry-leading SecurePCI package. ANX is known for their operational excellence and ability to help merchants become PCI compliant."

"Bluefin is the worldwide market leader for Validated P2PE," added Mark Wayne, ANX Executive Vice President, Governance, Risk and Compliance. "The Bluefin partnership is great news for ANX stakeholders. Adding validated P2PE to the portfolio positions ANX to deliver the best-in-class layered security and compliance solution while minimizing the merchant effort to achieve and maintain PCI compliance."

The storage and movement of unencrypted credit card data make US merchants a primary target for organized cybercrime. This vulnerability is exploited with documented success resulting in millions of dollars in damages. P2PE represents a major step forward in the battle to secure credit card information. With P2PE, payment card information is encrypted at the merchant Point-of-Sale (POS) and remains encrypted as it is exchanged with the acquiring bank. Encryption actually devalues the data, which lessens the incentive for theft. Hence, validated P2PE reduces the risk of a data breach, positions merchants to meet the October EMV requirements, and makes it easier to become PCI compliant by reducing the scope.

ANX will be accepting orders for SecurePCI Validated P2PE at the Transact 15 event in San Francisco on March 31, 2015. Learn more at http://www.anx.com.

About ANX ANXeBusiness Corp., headquartered in Southfield, Michigan, is a global provider of managed payment, compliance, security and connectivity solutions. ANX is certified by the PCI Security Standards Council as a Qualified Security Assessor (QSA) and an Approved Scanning Vendor (ASV). For more information, visit http://www.anx.com.

About Bluefin Bluefin Payment Systems is the leading provider of secure, integrated, cloud-based payment solutions for Independent Software Vendors and SaaS providers. Bluefin is one of only three companies worldwide to achieve PCI-validation for point-to-point encryption (P2PE). For more information, visit http://www.bluefin.com.

Source ANXeBusiness Corp.

Link:
ANX Announces Industry's First PCI QSA Validated Point-to-Point Encryption Solution

Microsoft Windows vulnerable to ‘FREAK’ encryption flaw too

Previously thought limited to Apple and Google browsers, the flaw leaves communications between affected users and websites open to interception.

Windows machines are also vulnerable to a decade-old encryption flaw.

Computers running all supported releases of Microsoft Windows are vulnerable to "FREAK," a decade-old encryption flaw that leaves device users vulnerable to having their electronic communications intercepted when visiting any of hundreds of thousands of websites, including Whitehouse.gov, NSA.gov and FBI.gov.

The flaw was previously thought to be limited to Apple's Safari and Google's Android browsers. But Microsoft warned that the encryption protocols used in Windows -- Secure Sockets Layer and its successor Transport Layer Security -- were also vulnerable to the flaw.

"Our investigation has verified that the vulnerability could allow an attacker to force the downgrading of the cipher suites used in an SSL/TLS connection on a Windows client system," Microsoft said in its advisory. "The vulnerability facilitates exploitation of the publicly disclosed FREAK technique, which is an industrywide issue that is not specific to Windows operating systems."

Microsoft said it will likely address the flaw in its regularly scheduled Patch Tuesday update or with an out-of-cycle patch. In the meantime, Microsoft suggested disabling the RSA export ciphers.

The FREAK (Factoring RSA Export Keys) flaw surfaced a few weeks ago when a group of researchers discovered they could force websites to use intentionally weakened encryption, which they were able to break within a few hours. Once a site's encryption was cracked, hackers could then steal data such as passwords, and hijack elements on the page.

Researchers said there was no evidence hackers had exploited the vulnerability, which they blamed on a former US policy that banned US companies from exporting the strongest encryption standards available. The restrictions were lifted in the late 1990s, but the weaker standards were already part of software used widely around the world, including Windows and the web browsers.

"The export-grade RSA ciphers are the remains of a 1980s-vintage effort to weaken cryptography so that intelligence agencies would be able to monitor," Matthew Green, a Johns Hopkins cryptographer who helped investigate the encryption flaw, wrote in a blog post explaining the flaw's origins and effects. "This was done badly. So badly, that while the policies were ultimately scrapped, they're still hurting us today."

Follow this link:
Microsoft Windows vulnerable to 'FREAK' encryption flaw too

Demand for Linux jobs shooting up fast

The Linux Foundation released a report this week that says employees with Linux skills are in high demand, with hiring managers working hard to bring them in.

If you're an open-source expert, the job market is your oyster the Linux Foundation released a report this week that says that employees with Linux skills are in high demand, with hiring managers working hard to bring them in.

According to the survey, the prevalence of open-source in the cloud and other important areas of business technology is helping to push the demand for Linux- and open-source-savvy workers higher. Forty-two percent of respondents said that CloudStack or OpenStack experience would be a valuable addition to a resume, and 19% said the same about open-source SDN skills.

+ALSO ON NETWORK WORLD: 5G, net neutrality may be headed for a showdown | Why the enterprise cloud needs shadow IT to succeed +

Demand is higher than supply, according to the Linux Foundation. Nearly nine in 10 88% - of hiring managers said that it's difficult to find workers with those qualifications, and 70% said that they're working hard to retain the open-source talent they already have, by offering better pay and more flexible working schedules.

Nine out of 10 Linux-skilled workers who responded to the survey said that those skills had helped them advance their careers, and 55% said that they expected finding a new job would be relatively easy in 2015.

Jay Lyman, an open-source analyst with 451 Research, said that the survey's findings are similar to his understanding of the job market as it relates to open-source technology.

"We certainly see continued demand and dearth for talent when it comes to open source cloud software such as OpenStack, which is consistent with the report," he said. "I also think that Linux and open source software are intertwined with some key trends -- cloud computing, DevOps and big data for example -- that continue to drive this type of demand for experience and talent."

Error: Please check your email address.

Tags linux foundationcareersIT management

Original post:
Demand for Linux jobs shooting up fast

FREAK show: Apple and Android SSL WIDE OPEN to snoopers

Security researchers are warning of a flaw in OpenSSL and Apple's SecureTransport a hangover from the days when the US government was twitchy about the spread of cryptography.

It's a flaw that allows an attacker to decrypt your login cookies, and other sensitive information, from your HTTPS connections if you use a vulnerable browser such as Safari.

Apple's SecureTransport is a library used by applications on iOS and OS X, including Safari for iPhones, iPads and Macs. OpenSSL is open source, and used by Android browsers, and many other things.

OpenSSL and SecureTransport encrypt connections to online banking, webmail, and other HTTPS websites, and so much else on the internet, to thwart eavesdroppers.

It turns out the encryption used by OpenSSL and SecureTransport can be crippled by an attacker on your network: apps can be tricked into using weak encryption keys, allowing determined miscreants to pluck login cookies and other sensitive information out of your SSL-protected traffic.

"A connection is vulnerable if the server accepts RSA_EXPORT cipher suites and the client either offers an RSA_EXPORT suite or is using a version of OpenSSL that is vulnerable to CVE-2015-0204," according to freakattack.com, a website explaining the security flaw.

"Vulnerable clients include many Google and Apple devices (which use unpatched OpenSSL), a large number of embedded systems, and many other software products that use TLS behind the scenes without disabling the vulnerable cryptographic suites."

You can visit freakattack.com to check if your web browser is vulnerable. Reg readers have told us that Google Chrome for OS X prior to version 41.0.2272.76, BlackBerry OS 10.3, and Internet Explorer 11 in the Windows 10 Technical Preview, are flagged up as vulnerable.

Back in the early 1990s, the US government banned Americans from selling software overseas unless the code used so-called "export cipher suites" that involved encryption keys no longer than 512 bits.

At the time, this was supposed to ensure that Uncle Sam exported relatively weak encryption to the rest of the world, and kept the stronger stuff for itself.

Read more:
FREAK show: Apple and Android SSL WIDE OPEN to snoopers

Why OneCoin is NOT a Bitcoin Copy – OneCoinOneConcept – OneCoin – CryptoCurrency – Video


Why OneCoin is NOT a Bitcoin Copy - OneCoinOneConcept - OneCoin - CryptoCurrency
OneCoin Rocks http://www.bit.ly/TTCReward Latest Updates Master Card Union Pay Card, linked directly to your #OneCoin Crypto Currency account in 30 da...

By: OneCoin One Concept

See the original post here:
Why OneCoin is NOT a Bitcoin Copy - OneCoinOneConcept - OneCoin - CryptoCurrency - Video

Free Chelsea Manning, Blowing the Whistle on War Crime is …

Chelsea Manning Support at TeddyAward 2015 SchwuZ Berlin opening night. Information Support, pictures and postcards for Chelsea. Next on FRIDAY, 2015.02.13, 23PM TEDDY CLOSING PARTY at SchwuZ, Rollbergstrae 26, 12053 BerlinMore Info: http://blog.teddyaward.tv/en/2015/01/13/teddy-events-2015/

Read more

Chelsea Manning Support @TeddyAward @Berlinale FRIDAY, 2015.02.06, 22PM TEDDY GRAND OPENING NIGHT at SchwuZ, Rollbergstrae 26, 12053 Berlin >>> Facebook event and FRIDAY, 2015.02.13, 23PM TEDDY CLOSING PARTY at SchwuZ, Rollbergstrae 26, 12053 Berlin >>> Facebook event More Info: http://blog.teddyaward.tv/en/2015/01/13/teddy-events-2015/

Read more

31c3 talk The case of Chelsea Manning Attorneys Nancy Hollander, Ahmed Ghapour , Chase Strango moderation Alexa OBrien @carwinb starts 0:3:21 to 1:02:22 full length short cut: Relive! The case of Chelsea Manning Panel #31c3 Nancy Hollander @mantislady Ahmed

Read more

Venice, 15 December, called by Associazione E solo linizio [Its just the beginning] London, 17 Dec, called by Payday mens network and Queer Strike San Francisco, 17 Dec, called by Queer Strike It rained but between 35-40 people came and

Read more

Go here to see the original:
Free Chelsea Manning, Blowing the Whistle on War Crime is ...

Joseph Gordon-Levitt Portrays Edward Snowden in Oliver Stone’s Biopic – Video


Joseph Gordon-Levitt Portrays Edward Snowden in Oliver Stone #39;s Biopic
The first photo of Joseph Gordon-Levitt portraying Edward Snowden in Oliver Stone #39;s upcoming biopic was released Tuesday morning. The thriller is based on Luke Harding #39;s book The Snowden Files:.

By: wochit

Read the rest here:
Joseph Gordon-Levitt Portrays Edward Snowden in Oliver Stone's Biopic - Video