Interested in encrypting your data? Here’s what you need to know [infographic]

There is more than one way to keep your data safe from prying eyes, but the practice that is most recommended is still the use of encryption. It will ensure that only you will be able to access personal information, requiring a decryption key to unlock your data. Proving just how effective it can be, the US government basically wants both Apple and Google to allow it to bypass the encryption in the latest versions of their mobile operating systems, namely iOS 8 and Android 5.0 Lollipop, respectively, because currently it is unable to directly access that data.

However, there are quite a few things that you should also know about encryption before you decide to go down this road. To learn more about what encryption entails, you can check out the following infographic, called "Protected: A Beginner's Guide To Encryption".

This infographic briefly details the basics of encryption, starting with the encryption key, what encryption software you can use on your PCs and Macs, how to encrypt data stored on cloud storage services, and how to encrypt your emails.

As with cloud-based accounts, the more complex the encryption key, the better your chances of keeping your data private. A strong encryption key will be much, much more difficult to crack than, let's say, "password1234" -- it will not help keep your data safe for long, even if you are using the best encryption around.

Similarly, if you do not use safe browsing habits your data may still be at risk, no matter if it is encrypted. You must also make sure that your devices are protected against unauthorized access when you are not using them -- that means locking them while you are away, using difficult to guess passwords and so on.

Image Credit: VERSUSstudio / Shutterstock

See original here:
Interested in encrypting your data? Here's what you need to know [infographic]

Next gen ransomware: Elliptic cryptic, talks on Tor, demands Bitcoin

Cybercrooks have brewed a strain of ransomware that uses elliptic curve cryptography for file encryption, and Tor for communication.

The malware, dubbed OphionLocker, is spreading using a malicious advertising (malvertising) campaign featuring the RIG exploit kit.

The ransomware encrypts files of particular types on infected systems before using Tor2web URL as a conduit for instructions on how to send the payment and obtain the decryptor tool. The extortionists are asking for a payoff of 1 BTC ($352 at current rates of exchange).

F-Secure reports that if the infection happens on a virtual environment NO ransom payment is requested for a "decryptor tool", which (perhaps unsurprisingly) doesn't work. Virtual environments are commonly used by anti-malware researchers.

The tactic of treating them differently appeared geared towards making analysis that bit more difficult, something ultimately aimed at prolonging the longevity of the scam.

Despite the high profile CryptoLocker takedown, ransomware scams remain an all-too-real threat. Crooks are developing more sophisticated encryption schemes to support their fraud. The use of Tor and elliptic curve cryptography places OphionLocker in the top tier of such scams, but is not unprecedented.

A previous strain of ransomware, CTB-Locker, pioneered the use of elliptic curve cryptography for file encryption and Tor for communication with a command and control server.

OphionLocker was first spotted by Trojan7Malware.

Elliptic curve cryptography (ECC) is a form of encryption based on solving the discrete logarithm of a random elliptic curve element. This, like the more familiar idea of factoring the product of two very large prime numbers, offer a one-way function to underpin the security of public-key cryptography systems.

ECC offers equivalent levels of security with lower key sizes, a particular advantage on systems with limited computing power, such as smartphones.

Visit link:
Next gen ransomware: Elliptic cryptic, talks on Tor, demands Bitcoin

GCHQ spy agency releases code-breaking app on Android

The UKs history ofcryptography is fascinating, with famous cryptanalysts like Alan Turing, Dillwyn Knox, and W. T. Tutte deciphering different code machines used in World War I and II.

To celebrate the achievements of the past and reinvigorate students on cryptography, the GCHQ (Government Communications Headquarters) has released a code-breaking app on Android, named Cryptoy. An iOS versionis set to see a2015 release.

Cryptoy currently focused on four methods of encryption: Shift, Substitution, Vigenre and Enigma. The app makes it especially hard at higher levels, testing students who have the ability to crack code.

The GCHQ is interested in finding the next batch of code-breakers for the future. It is unclear how the GCHQ will get in contact with the potential candidates, or how the GCHQ will be able to identify actual codebreakers from cheaters.

Thisis not the first time the GCHQ has used public routes to employ new code-breakers, the Daily Telegraph ran a cryptic crossword and those who solved itreceived a chance to work at the GCHQ.

Encryption has moved from a wartime function designed to hide messages, to a way for Internet services to provide security against surveillance. This has blackened the GCHQs reputation when it comes to codebreaking, and now the next generation will most likely be cracking Facebook or Apple code.

New encryption techniques are on the rise, as more people worry about who is reading their private messages. Apple and Google recently announced new encryption on mobile devices, set to stop the FBI from accessing the devices without a warrant.

Terrorist organizations still use some encryption techniques when messaging, but some have been caught chatting on Facebook about potential attacks. The attack on UK soldier Lee Rigby was reportedly plannedon Facebook a year beforehand the incident.

Published under license from ITProPortal.com, a Net Communities Ltd Publication. All rights reserved.

Read the rest here:
GCHQ spy agency releases code-breaking app on Android

GCHQ has made an Android app — but it won’t spy on you

Cryptoy

GCHQ has released its own "fun, free, educational" Android app to teach secondary school students about cryptography.

The Cryptoy app, which has no permissions to access confidential information on Android devices, helps children understand basic encryption techniques and create their own encoded messages.

The government hopes the app could help find the next generation of cyber-spies. Minister for the cabinet office Francis Maude said that it was a "creative solution in the hunt for expertise, but with a 21st century spin".

Cryptoy is only available on Android at the moment, but an iOS version for iPads will be available in 2015, GCHQ said. It is aimed at Key Stage 4 students and covers both the theory and practice of cryptography as well its history.

The idea was first developed by GCHQ's industrial placement students as a test project for the Cheltenham Science Festival but growing interest from teachers to use the app in schools persuaded GCHQ to make it publicly available. The spy-agency said examples of cryptography used in the app are from an "earlier era" but were still relevant to today's techniques.

"Building maths and cyber skills in the younger generation is essential for maintaining the cyber security of the UK and growing a vibrant digital economy," said GCHQ director Robert Hannigan.

He described Cryptoy as a "colourful, interactive way" for students and teachers to explore cryptography. The app is compatible with Android 4.1 and up and is available to download now.

Visit link:
GCHQ has made an Android app -- but it won't spy on you

Bitcoin stalls after hitting record prices in 2013

A Bitcoin sign in a Toronto shop window in May, in better times. Photograph: Mark Blinch/Reuters

After skyrocketing to more than a thousand dollars in price late last year and attracting global attention, bitcoin, the leading digital currency, has stalled.

Figures obtained by Reuters show that while wallets cyberspeak for accounts are being created at a steady clip, many of them are empty.

Analysts also provided Reuters with data that shows liquidity in the cryptocurrency remains limited.

Bitcoin, a virtual currency created through a mining process where a computers resources are used to perform millions of calculations, has been hailed as revolutionary because of its lack of ties to a central bank and its potential as an alternative to credit cards for paying for goods and services.

However, the currencys volatility has slowed broader acceptance. The price of bitcoin has plummeted roughly 50% so far this year. It most recently traded at $356.26, down from a peak of $1,163 in December 2013.

Two of its primary appeals the lower transaction fees compared to credit cards and its use in cross-border transactions have not been enough to offset its ups and downs.

Until a unique application emerges that separates it from credit cards, online payments or other currencies, the expansion may remain slow, many market insiders said.

There has to be some motivation that would help this whole bitcoin system explode, like really good applications for consumers, said Jonathan Levin, a London-based digital currency consultant and co-founder of the Oxford Virtual Currency Group. At the moment, there isnt.

Last weeks second auction of bitcoins by the US marshals service, which showed a drastic drop in bidders from the first sale in June, demonstrated just how far bitcoin has fallen off the radar. The first auction attracted 45 unique bidders, with 63 bids, while the December sale showed just 11 buyers and 27 bids.

Go here to read the rest:
Bitcoin stalls after hitting record prices in 2013

‘Timecop’ Reboot Snags ‘Journey 2’ Writers (Exclusive)

Courtesy Everett Collection

1994's "Timecop"

Universals Timecop reboot has found a pair of writers.

Mark and Brian Gunn, who wrote the screenplay for Journey 2: The Mysterious Island, have been tapped to write the script for Timecop, which is a remake of the 1994 Jean-Claude Van Damme time travel action movie.

Marc Shmuger will produce the film under his Universal-based Global Produce, his shingle that was involved in making We Steal Secrets: The Story of WikiLeaks and The Spectacular Now.

Mike Richardson of Dark Horse, the company that published the comic the movie is based on, will serve as an executive producer.

FILM REVIEW: RoboCop

Timecop, a Universal library title, was set in the near future where time travel is regulated by a police force. One officer (Van Damme) runs into a crooked politician (played by Ron Silver), who uses time travel to further his political career.

The first movie had the sci-fi elements very much in the foreground; however, this version ofTimecop is a more gritty and grounded police story with the sci-fi in the background, though it will still have the main character on a personal journey.

Tonally it could end up sharing a similar sensibility to Looper, Rian Johnsons time travel movie, but would be bigger in scope and ambition.

Read the original:
'Timecop' Reboot Snags 'Journey 2' Writers (Exclusive)

Chelsea Manning Was Transgender “In Secret” While …

At left, Chelsea Manning, then known as Bradley, leaving court in Kansas in 2013. At right, a recent portrait by Alicia Neal. (Photograph: Patrick Semansky/AP)

Excerpted from The Guardian: Chelsea Manning, the soldier jailed for her part in the Wikileaks affair, has revealed that she was transgender in secret while serving in the US army.

At the time of her May 2010 arrest over the leaking military and diplomatic documents, Manning was known as Bradley. Until now, very little has been known about Mannings history of gender identity, despite her very public legal battle with the US military over her civil rights the army private won the right to change her name, and her push for medical treatment while in prison has become something of a cause clbre for transgender rights in the military and even worldwide.

Writing for the Guardian from military prison in Fort Leavenworth, Kansas, in a passionate essay about largely invisible discrimination against transgender people, Manning declares: Were banned from serving our country in the armed services unless we serve as trans people in secret, as I did.

In August 2013, Manning was jailed for 35 years, for passing files to Wikileaks. The following day, Manning said she would from then on be known as Chelsea. In April 2014, a Kansas judge formally granted her request to change her name.

Mannings request for clemency was denied, before proceeding to appeal. She has formally applied to President Barack Obama for a pardon or reduced sentence.

Separately, she is suing the US military over its denial to her of gender dysphoria treatment, despite defense secretary Chuck Hagel having approved the process in July.

In Mannings case, gender dysphoria refers to an innate sense of being female though her sex at birth was male. Treatment includes psychotherapy, hormone therapy and surgery to change her primary and/or secondary sex characteristics.

A hearing in the case, in which Manning is also seeking to be allowed to grow her hair long and use cosmetics, is scheduled for January.

Last week, in a case heralded by the American Civil Liberties Union, the US army fully recognised the new names of two transgender veterans from New Jersey. The decision cleared a path for the two, who were named only as Jennifer and Nicolas, to receive veterans benefits.

View original post here:
Chelsea Manning Was Transgender “In Secret” While ...

Julian Assange Unleashed: Hillary Clinton Is A Threat, Google Is A Monopoly And Should Be Broken Up, BoA Data Taken By …

Julian Assange of WikiLeaks makes a balcony appearance with Noam Chomsky at the Ecuadorian Embassy in London - (AP Photo/Yui Mok, PA Wire)

Always controversial, Julian Assange gave an interview in London, where hes exiled in the Ecuadorian embassy, where he lambasted Hillary Clinton, who he called a threat to the resolution of his issues. Beyond delving on Hillarys relationship with Google, Assange also said the search giant should be broken up by regulators due to its dominant position. Assange also spoke of a secret trove of Bank of America Bank of America data he threatened to release three years ago, and of course touched on the situations of Edward Snowden, whos pursuit by the U.S. government was larger than Osama Bin Ladens, and Chelsea Manning.

Its imperative that we solve this situation before Hillary Clinton has an opportunity to become President, Assange told Argentine newspaper Perfil in an interview published Sunday. Shes been building a financial reserve and an infrastructure to run for the Presidency for the past two years and shes even reposition the Clinton Global Initiative around this aim. [] Hillary Clinton is a threat for the resolution of this situation, explained the founder of WikiLeaks, who in the past has said Google will massively support her run for President. Clinton was Secretary of State from 2009 to 2013, during which WikiLeaks released confidential cables showing she had approved the spying on foreign diplomats, United Nations officials, and U.S. allies.

Assange looked notoriously older, with longer, grey hair and a beard, as a consequence of living in exile for two years in a crammed mezzanine in central London, where the embassy is located. Speaking shortly after the publication of his latest book, When Google Met WikiLeaks, Assange called for the dismantling of the search giant. Google has become the largest lobbying group in Washington, larger than Lockheed Martin, Raytheon, and Boeing, he noted, after acknowledging that due to its power, its highly unlikely that anti-trust regulation would force the company run by Larry Page to break up.

Apple is the largest company in terms of market capitalization in the U.S., Google is number two. Its interesting that the natural conflict between those two, and between Microsoft and Google, hasnt led to regulatory action in the U.S., Assange said. [Google] is becoming a distributor, taking over networks of fiber optic cables, and also trying to become an editor, diving deeper into content production. That vertical integration, along with economies of scale, is reducing the capacity for people to get the information that audience wants to see. Extremely distrustful of government, Assange notes that Google was partially funded by the U.S. Defense complex in its early years, and that it is in bed with the National Security Agency (NSA). The NSA spies on companies that compete with U.S. companies, he explained mentioning the case of Brazilian energy company Petrobras, and on regulators, Assange said, noting that the NSA has hacked Europes antitrust regulators, which coincidentally are investigating Google.

A few years ago in an excellent interview with Forbes Andy Greenberg, Assange revealed that he was sitting on a trove of data from a major U.S. financial institution that could bring down a bank. The speculation was that it was Bank of America, but the data was never leaked. Assange confirmed it was Bank of America, but indicated the information was ultimately taken by a former German employee who got scared, and ultimately left WikiLeaks.

On NSA whistleblower Edward Snowden, currently under asylum in Russia, Assange explained that he negotiated on behalf of Snowden with countries like Venezuela, Nicaragua, and Bolivia, but their intention was to put him in Cuba. Ultimately, though, only Russia had the capacity to counteract the infiltration of the U.S. bounty hunters. When Snowden escaped to Hong Kong, we saw the largest intelligence hunt in history, even though Osama Bin Ladens was longer, for a period of two weeks, the hunt for Edward Snowden was larger.

Speaking of the former Bradley Manning, who was convicted for espionage and sentenced to 35 years behind bars, Assange explained that he expects his release after about seven years in prison. This, whether he serves seven or 35 years of his sentence, is a political matter based on political interests.

Do you feel responsible for Mannings situation, Assange was asked. Not in a causal way because the accusations against Manning are that he didnt follow security protocols. He spoke with other people, not just [WikiLeaks], and he was betrayed by someone pretending to be a journalist. Now, in terms of us being in this together, definitely.

Read the original post:
Julian Assange Unleashed: Hillary Clinton Is A Threat, Google Is A Monopoly And Should Be Broken Up, BoA Data Taken By ...