You can’t set up a culture of censorship then complain over a banned tampon ad – Independent.ie

It took until Day 11 of the period drama for it to turn out the Tampax ad ban wasn't the fault of the patriarchy after all.

In fact, 83pc of the complaints that got the ad pulled were from women, which came as no surprise to me. Most every woman I know thinks it's awful - because it is.

Not that it's shocking, or embarrassing, or because it "dares" to talk about menstruation. Who cares? The pretence that we're persecuted for periods in 2020 smacks of martyr complex.

It's because the Tampax and Tea ad is degrading, patronising, crass and vacuous. It cheapens women and pretends to be empowering.

It literally suggests many women are so stupid that they can't insert a tampon. It's hackneyed, empty-headed girliness: it does women no favours.

The pathetic attempts at double-entendres - "Get it up there, girls! Not just the tip, up to the grip!" - are puerile and not actually funny.

And no: getting the obvious innuendo is not a case of men "sexualising" women's bodies - but perhaps it's ad executives commodifying them.

Good riddance to the most annoying ad on television. Saves me the bother of having to switch over every time it comes on.

Why is no-one saying this, even though the gender ratio of complaints to the Advertising Standards Authority for Ireland (ASAI) prove it was women themselves who were miffed?

Could it be because the consensus in Ireland has decreed: you must love the Tampax ad, or else you're a body-shaming woman-hater? Failing that, you are suffering from internalised misogyny. And if you don't think it's sexist, then you're sexist.

We're all supposed to cheer for Procter & Gamble, supposed sponsors of the modern-day Seneca Falls Convention, the first women's rights event.

You should be embarrassed at your lack of sisterhood if you thought the ad was tacky. You must realise you're a prude if you felt uncomfortable. If you found it repulsive, you must be full of shame.

I don't feel remotely grossed out about it myself. But I'm not going to judge another woman if they do.

That's not sisterhood. The basis of the majority-female complaints was how it was offensive to women and condescending. If some women think that, we should listen - not shout them down.

It's an alternative - and valid - feminist perspective.

I'm against all censorship, so I don't support the removal of the ad. Yet the loudest voices criticising the ASAI ban are the same ones who cheer petitions calling for Prime Time to pull transgender debates, or call for exclusion zones around hospitals.

You can't set up a culture of censorship and then sneer when it's not always from liberals.

I'm a freedom feminist: joyfully indecorous and without any hang-ups about sex or sexuality.

I'm not a Victorian maiden, so I don't feel shame about female functions. I don't need to tell you stories about my uterine lining to illustrate this.

I'm with Germaine Greer in The Female Eunuch when she challenged women to taste their own blood if they thought they were emancipated, saying: "If it makes you sick, you've a long way to go, baby!"

I thought Donita Sparks' tampon-throw at the Reading music festival in 1992 was one of the best moments of rock history. YouTube it: not to spare you the details - to see it in all its glory.

But as someone who has pride and respect for female fertility, I found the ad slyly demeaning to my sex. I won't apologise for that, or pretend otherwise, in fear of the girls' brigade.

To deliberately misconstrue this as "something from old Catholic Ireland" is disingenuous. Remember, this is the country that gave the world the sheela-na-gig.

Feminism is complex, and a broad church. There isn't a Little Red Book we all read from. Just because a murmuration of middle-class media feminists tell you something is great, doesn't mean it is.

I'm not going to make a global corporation the good guy, while painting Ireland as backward, to prove I'm a female warrior. I'm not going to bleat on about how our vaginas are sexualised and how the removal of a dumb ad is somehow proof of society's need to shame and control women's bodies.

I'm not about to jump to the conclusion that it's evidence of how men are disgusted by women's monthly blood, without first at least waiting to find out who the actual complainants were.

Incidentally, that's a fiction up there with pregnancy being a turn-off: any red-blooded man finds their pregnant partner sexy as all hell. Maybe there's a way we can castigate them for that too.

The whole conversation has veered into the stupidest stereotypes of women: self-absorbed, over-analytical, attention- seeking and obsessed with what men think of us.

The truth might be harder to accept: nobody cares. Period.

Originally posted here:

You can't set up a culture of censorship then complain over a banned tampon ad - Independent.ie

Do TikTok really pose a threat to national security? Heres what we know. – Vox.com

Last week, President Trump seriously escalated his threats toward the social media app TikTok, which he has accused of posing a threat to national security. If the Chinese-owned app doesnt sell to an American company in 45 days, it will effectively be banned in the US.

You may be wondering how an app thats best known as a place where teenagers post viral lip-syncing videos poses a national security threat. That largely comes down to the fact that TikTok is owned by a Chinese company, ByteDance. The US government worries the app could be used not only to surveil US users but to censor political speech and spread misinformation that could hurt democracy in the US.

Many of TikToks users and creators havent been deterred by government warnings. Take Laura Lee Watts, who posts skin care and makeup reviews on the app and has about 2 million followers. What shes worried about is losing access to TikTok.

As a civilian, Im not concerned about it all, Watts told Recode. Even if the Chinese government had my information, what are they going to do with it?

While Wattss data might not expose anything sensitive, shes just one of the apps 100 million US users. Several cybersecurity experts told Recode that the app could pose a risk if indeed the Chinese government forced TikTok to share data. Beijing has been accused of employing hackers to uncover all kinds of intellectually sensitive information in the US and other countries, from Covid-19 vaccine research to defense secrets. So its not a complete stretch to consider how certain TikTok users could be exploited say, a defense contractor who uses TikTok for fun but whose phone could have other hackable, sensitive data on it.

There are reasonable concerns on the security side, Adam Segal, a cybersecurity expert at the Council on Foreign Relations, told Recode. But the issue is, how do you address them, and what precedent are you setting?

Some people have speculated that the president is targeting TikTok to retaliate against the apps users that recently pranked Trumps June campaign rally in Tulsa, Oklahoma, by reportedly registering thousands of tickets that they didnt end up using. But TikTok isnt the only Chinese-owned company to become a Trump target. In the recent past, he has halted Chinese development of 5G networks in the US, and hes banned a Chinese company from buying the dating app Grindr. And last week, he issued an executive order that threatens to ban the popular messaging app WeChat, owned by the Chinese mega-company Tencent. Unlike TikTok, theres no plan for WeChat to sell to a US bidder, making it a potentially more impactful part of Trumps crackdown.

Viewed together, Trumps threats to ban TikTok and WeChat are part of his administrations broader strategy of being tougher on China.

There are two related issues driving the conflict. The first is the US governments concern that the Chinese government could force companies like TikToks ByteDance to surveil Americans. This is a worry shared by Republicans as well as some leading Democrats, like Sen. Richard Blumenthal. The second issue is the Trump administrations perception that China is trying to take over the global technology industry, which has long been dominated by American powerhouses. For years, the Chinese government has banned major US tech companies like Facebook and Google from doing business in the country, and now the US is starting to reciprocate by banning Chinese apps.

Tech is one of the most important battlegrounds for the China-US cold war because wrapped up in tech is the conversation of economic competitive strength and values, said Segal.

Theres a lot that we dont know about what risks Chinese-owned apps like TikTok pose to US citizens, since much of this information is considered classified American intelligence. But whether the risks are small or significant, the recent debates over what to do with TikTok and WeChat are part of what some are calling a new cold war between China and the US, with the US positioning itself as the moral leader upholding an internet that adheres to values of free speech, in contrast to the Chinese Communist Party, which regularly enforces strict censorship online.

Trump has accused ByteDance and other Chinese tech companies like WeChat of posing serious threats to US national security.

The concern is that TikTok could funnel American users personal data to the Chinese Communist Party, potentially allowing China to track the locations of Federal employees and contractors, build dossiers of personal information for blackmail, and conduct corporate espionage, according to Trumps recent executive order. The order makes it illegal for any person or company in the US to do business with TikTok after September 20. If TikTok sells to a US company before then, the ban will no longer apply.

So whats actually going on? Its true that TikTok automatically collects reams of user data, including location and internet address, searching history within the app, and type of device being used, according to its privacy policy. But many other popular social media apps do this, too. (TikTok has said that it collects less data than its competitors, like Facebook and Google, because it doesnt track user activity across devices, which both companies do.)

Last month, a report found that TikTok was accessing users clipboard data and saving what people copy and paste. TikTok said this was an anti-spam measure and that its now stopped the practice. But TikTok wasnt the only app found accessing clipboard data; several other major apps, from ABC News to HotelTonight, were found to be accessing peoples clipboard data as well.

TikTok also sidestepped a privacy safeguard in Googles Android operating system to secretly track users MAC addresses, which are unique identifiers tied to peoples phones, according to a recent Wall Street Journal report. TikTok seems to have stopped tracking these identifiers in November, the Journal reported.

But aside from the specifics of what TikTok does and doesnt track, politicians like Trump are worried that, ultimately, TikTok is beholden to the Chinese government. And the Chinese government has broad authority, significantly more so than the US government does, to snoop on users data as it pleases.

TikTok has repeatedly denied that it has or ever would give up user data to the Chinese government. The company says it stores American user data on servers in the US and Singapore, which ostensibly would make it harder for the Chinese government to tap into. The company has also taken measures to separate its US business overall from its Chinese parent company. For example, TikTok doesnt operate in China (the Chinese version of it, Douyin, does).

The CIA reportedly investigated TikToks security threat and found no proof that Chinese intelligence authorities have been snooping on Americans through TikTok, according to the New York Times. The agencys assessment still found that Chinese authorities could potentially tap into Americans data through the app, according to the Timess summary of the classified report. Thats why last December, the Department of Defense cautioned military personnel to delete TikTok from their smartphones over security concerns. And the Senate voted unanimously to ban federal employees from using TikTok on government devices last week.

Theres no publicly available evidence that TikTok has ever done anything wrong, said Segal, but the concern is that because the Chinese National Intelligence Law of 2017 says any Chinese company can be drafted into espionage, a company could be forced to hand over the data.

TikToks efforts to separate its US business from its parent companys Chinese operations are not enough to placate the growing intensity of anti-China hawks in Trumps administration. And there doesnt seem to be much TikTok can do other than sell to a US company like Microsoft, which is the frontrunner out of a few major US companies that are reportedly in talks to buy TikToks US operations.

A second area of concern is that apps like TikTok and WeChat censor content that the Chinese Communist Party disapproves of. On this front, there are more documented concerns, especially about WeChat.

WeChat has been found to intercept and censor political messages sent by Chinese users to US users. A report in May by Canadian researchers CitizenLab found that the app was blocking certain messages, including a political cartoon depicting the late Nobel laureate Liu Xiaobo, who was critical of the Chinese government. The report also found that WeChat was analyzing messages sent by international users, including those in the US, to scan for and block politically sensitive content before it could circulate among Chinese users.

With TikTok, there have been accusations without definitive proof of censorship at the behest of the Chinese government. Last year, internal company documents showed TikTok was instructing its staff to moderate content in line with the Chinese governments censorship of topics like the Tiananmen Square massacre and Free Tibet, according to leaked guidelines published by the Guardian. But these guidelines were part of broad rules against controversial discussions on international politics across countries, so theres no explicit proof that this was a directive from the Chinese government to TikTok. Another oft-cited concern about potential political censorship on TikTok is that during last years Hong Kong independence protests, there werent a lot of results for popular hashtags of the protest movement. But theres no proof that the company was actively censoring content or whether people just werent posting about it.

Its important to put all of this in context. TikTok and WeChats political troubles in the US dont exist in a vacuum, but rather inside a larger web of complex China-US politics. Since 2018, Trump has waged a trade war with China over free trade policies that he feels disadvantage US manufacturing. And increasingly, tech has become tangled up in this war, involving Chinese-owned dating apps, drone companies, and telecom hardware makers.

There is no bottom to the US-China relationship right now; it keeps getting worse and worse, Segal told Recode. The administration is looking for more and more ways to contain, hurt, and damage China.

And technology, which has helped dramatically strengthen the Chinese economy in the past few decades, is seen as one of the most important areas of competition.

Last August, as China and the US were escalating tit-for-tat tariff increases on imported goods from each country, Trump issued an executive order aimed at the Chinese telecommunications giant Huawei over concerns that the company was a cybersecurity threat. Trump gave Huawei a partial death penalty in the US by putting it on an entity list barred from doing business with US companies.

Huawei is a big deal outside of the US. It sold 250 million phones last year thats more than Apple. So the Trump administrations effective ban had ripple effects. Google had to stop running its Android operating system on Huawei phones and killed its plans to build a smart speaker with the company. The US governments restrictions also rolled back Huaweis plan to manufacture equipment to build out a massive 5G internet network in the US, which the Trump administration worried the company could use to intercept data on behalf of the Chinese government. The US has since offered a reprieve to US companies, allowing them to work with Huawei through temporary licenses on setting 5G standards.

Even Chinese-owned dating apps have attracted the US governments attention. Last April, the US government undid a deal that had sold the popular dating app Grindr to Chinese owners, citing national security concerns. The decision came from a little-known government agency, the Committee on Foreign Investments in the US (CFIUS), which reviews the national security risks of major transactions involving foreign corporations. CFIUS has similarly been reviewing the 2017 merger that led to TikToks creation, when ByteDance acquired the user base of the lip-syncing app Musical.ly and rebranded it as TikTok.

Some of the Trump administrations targets seem to pose a more obvious security threat: roaming drones that could be tapping video feeds and surveilling US turf. The Trump administration is reportedly considering issuing an executive order banning the Chinese drone manufacturer DJI, the most popular drone maker in the world, whose equipment is commonly used for military and rescue purposes. The US Department of the Interior has already grounded at least 800 DJI drones out of fear that the Chinese government could exploit them to spy on Americans. Last month, researchers found major flaws in DJIs security features, which collected large amounts of personal information that could be exploited by the Beijing government, according to the New York Times.

The consequences of these mounting tensions over Chinese-owned tech could have a number of side effects. An obvious possibility is that China could retaliate. The USs actions could also give other countries precedent to start cutting off their app markets from US companies for example, a European country could, citing privacy concerns, bar its citizens from accessing Facebook. Either would be bad for the US economy in the long run, said Bobby Chesney, a professor at the University of Texas who specializes in national security law.

But, Chesney stressed, the US isnt making the first move here. American companies have long been banned in China, where companies that started off by building copycats of major US tech apps Baidu is Chinas answer to Google, Didi its Uber, Weibo its Twitter have grown into tech powerhouses. US social media companies have tried, unsuccessfully, to enter the Chinese market.

Good luck running Twitter in China, said Chesney. The playing field is very much not level in the other direction.

Trump has given both TikTok and WeChat a September 20 deadline before his executive orders will be enforced. If TikTok and WeChat dont follow these orders by then, their business operations could be fined $300,000 per violation, and willful offenders could face criminal charges. TikTok is reportedly planning to sue the administration over the legality of the order.

If TikTok sells its US operations to an American company in a manner thats approved by the Trump administration, it would steer clear of further regulation. The process of unwinding TikTok from its Chinese owner could be a messy process and take up to a year, according to a report from Reuters, but it would leave TikToks valuable US user base intact.

For WeChat, theres no such known escape (for now) from the regulatory crackdown because there are no publicly known potential US buyers. That could mean that some 19 million Americans who use the app will be cut off from it by the end of next month. Many US WeChat users use the app to communicate with family overseas in China, where many other communication apps like Skype and WhatsApp are blocked.

But regardless of what happens with WeChat and TikTok, the Trump-China tech war will likely continue. According to policy analysts, its hard to see a world in which Trump backs down from these escalating restrictions on the Chinese tech sector in the US. And even if Joe Biden wins the presidency, the Democratic candidate has still taken a notably tougher stance on China than in his earlier days in the Obama administration.

The Trump administration is picking new targets beyond TikTok and WeChat and the videoconferencing app Zoom, which has become nearly ubiquitous during the coronavirus pandemic, could be next. Though Zoom is an American company, it has faced criticism for routing some of its US calls through Chinese servers (Zoom said this was a mistake and is no longer routing free video calls in China). Politicians including House Speaker Nancy Pelosi, who referred to the company as a Chinese Entity, have warned of its security risks.

Several analysts told Recode that some of the concern about TikTok and other Chinese technology companies is valid. But the way the TikTok order in particular has been executed with Trump going back and forth on whether hed approve a TikTok-Microsoft sale, and at one point demanding a cut of the deal has been haphazard and has given the global business community a sense of distrust toward the US government.

The uncertainty has also impacted TikTok creators like Watts.

For these kids, its their whole life, said Watts of creators on TikTok. In recent weeks, she has put out videos attempting to calm her fans and fellow creators, who worry the app could be shut down overnight. Shes hopeful that Microsoft will reach a deal to buy TikTok. She said she understands the Trump administrations concern that TikTok could be used as a Chinese spy app but she isnt convinced.

Its not that I disagree, but I think theres a presumption of guilt without any proof, said Watts.

Will you become our 20,000th supporter? When the economy took a downturn in the spring and we started asking readers for financial contributions, we werent sure how it would go. Today, were humbled to say that nearly 20,000 people have chipped in. The reason is both lovely and surprising: Readers told us that they contribute both because they value explanation and because they value that other people can access it, too. We have always believed that explanatory journalism is vital for a functioning democracy. Thats never been more important than today, during a public health crisis, racial justice protests, a recession, and a presidential election. But our distinctive explanatory journalism is expensive, and advertising alone wont let us keep creating it at the quality and volume this moment requires. Your financial contribution will not constitute a donation, but it will help keep Vox free for all. Contribute today from as little as $3.

Read the rest here:

Do TikTok really pose a threat to national security? Heres what we know. - Vox.com

Threema joins the ranks of E2EE chat apps that support encrypted video calls – ZDNet

Image: Threema (screengrab)

Secure instant messaging app Threema hasrolled out support this weekfor end-to-end encrypted (E2EE) video calls for its mobile applications.

Monday's update brings the app in the elite echelon of instant messaging applications that support secure encrypted video calls, together with the likes of Signal, WhatsApp, Wickr, and Wire.

Secure E2EE instant messaging applications still lacking support for this feature include Keybase (recently acquired by Zoom) and Telegram (which promised to have it ready by the end of 2020).

Threema said the new E2EE video calling feature is based on theWebRTCstreaming protocol, the same technology that's also included with all major browsers today, and which is also at the base of many video streaming applications.

The difference is that Threema's implementation encrypts video calls between users' devices, using locally stored encryption keys.

This prevents man-in-the-middle attacks, where attackers might want to intercept calls.

Furthermore, the company said that its role in the E2EE video calls is also very limited. Threema says that all E2EE video calls are established directly between users, so traffic flows between the two users directly, without passing through Threema's servers.

The only situation when Threema servers are involved is when Threema users are starting a call with an unverified user, a special case where the connection is proxied through Threema's server in order to avoid having a verified user's IP address "exposed to dubious contacts."

Further, Threema also said that its new E2EE video calling feature doesn't only encrypt the video stream itself, but also its metadata; a design decision that blocks network observers from inferring any type of details about the video call.

Because companies like Threema are always looked at with distrust when announcing new encryption-based features, the Threema dev team also published thetechnical detailsbehind the video calling feature's cryptography protocols.

Threema began working in its E2EE video calling feature last year, and the feature went into abeta testing phase in April. Users can update theirAndroidandiOSapps to take advantage of the new feature.

Also today, the Threema team said that while working on the new feature, its developers also found and helped patch amajor security issuein WebRTC.

Excerpt from:
Threema joins the ranks of E2EE chat apps that support encrypted video calls - ZDNet

Customer personal information is the number one data protection priority in Taiwan reports nCipher – Yahoo Finance

Organizations racing to protect sensitive data as it proliferates across cloud, IoT devices and 5G networks

TAIPEI, Aug.11, 2020 /PRNewswire/ -- The adoption of digital initiatives such as cloud, IoT and 5G networks is growing rapidly as the world adjusts to a "new work-from-home normal" amid the COVID-19 pandemic-- with Taiwan being no exception. This brings even more attention to data protection and encryption strategies, with the protection of customer information the number one priority according to the 2020 Taiwan Encryption Trends Study published today by nCipher Security, an Entrust Datacard company and world leader in hardware security modules (HSMs), based on research by the Ponemon Institute.

nCipher Security Logo

The customer is king, but so too is intellectual property

Organizations in Taiwan have adopted enterprise encryption at a similar rate to their global counterparts: 46% have consistently applied an encryption plan/strategy, only slightly below the global average of 48%.

Protecting customer personal information is the major driver behind encryption adoption for respondents in Taiwan (62%), 8% higher than the global average. Following a close second is the protection of intellectual property (57%), well above the global average (52%). This is not surprising given the emphasis on intellectual property across the Taiwan market.

Data discovery the number one challenge

With the proliferation of data from digital initiatives, cloud use, mobility, IoT devices and 5G networks, data discovery is the biggest challenge in planning and executing a data encryption strategy, with 58% of respondents citing this as their top concern, 9% below the global average. Organizations in Taiwan also rate the challenge of initially deploying encryption technology lower than any other region, 31% vs. 44% globally.

On the other hand, respondents report greater difficulties in data classification (43%) and user training (23%), which are 12% and 9% above global averages respectively.

Trust, integrity, control

The use of hardware security modules (HSMs) to provide higher levels of trust, integrity and control for both data and applications stands at 39% for respondents in Taiwan. Most respondents (61%) say that HSMs are important as part of their organization's encryption or key management activities, with the most prevalent use cases being application level encryption (42%) and encrypting data in the cloud.

The race to the cloud

Cloud is extremely popular in the region, with 86% of respondents reporting that they transfer sensitive data to the cloud, or plan to do so within the next 12 to 24 months. Nearly every responding organization (99%) rates support for both cloud and on-premise deployment from their encryption solutions as being important, significantly higher than the global average of 67%.

Organizations in Taiwan are also deploying HSMs for cloud use cases at much higher rates than many other regions, including the ownership and operation of HSMs to generate and manage Bring Your Own Key (BYOK) and integration with a Cloud Access Security Broker (CASB) to manage keys and cryptographic operations. Taiwan also has the highest planned increase in the use of HSMs in conjunction with public cloud-based applications over the next 12 months.

Story continues

Looking ahead-- blockchain, quantum and adoption of new encryption technologies

While the surge in remote working has increased the risk of data exposure, how are organizations looking ahead? In the near term, 65% of responding organizations plan to use blockchain, with asset transaction, identity, supply chain and smart contracts cited as the top use cases.

Other much-hyped technologies are not on Taiwan IT organizations' near-term radar. Most IT professionals see the mainstream adoption of multi-party computation at least six years away, with mainstream adoption of homomorphic encryption nearly seven years away, and quantum resistant algorithms eight years out, all of which are in line with global trends.

"Consumers expect brands to protect their data from breaches and always have their best interests at heart. Our survey found that IT leaders take this trust very seriously, and often place protection of consumer data as a top priority when pursuing encryption growth," says Dr Larry Ponemon, chairman and founder of Ponemon Institute. "Encryption use is at an all-time high right now, with 46% of respondents from Taiwan this year saying their organization has an encryption plan that is applied consistently across the entire enterprise, with a further 36% saying they have a basic plan or strategy applied to certain applications and data types."

"With ongoing digitalization, organizations are under relentless pressure to deliver high security, seamless access to protect customer data and business information, while ensuring reliable business continuity. The 2020 Taiwan Encryption Trends Study highlights how critical security and identity have become for organizations and individuals both in the workplace and at home," said Percy Tu, sales manager, Taiwan, nCipher Security. "nCipher empowers customers by providing a high assurance security foundation that ensures the integrity and trustworthiness of their data, applications and intellectual property."

Other key findings from the Taiwan Encryption Trends Study include:

Download the 2020 Taiwan Encryption Trends Study

2020 Taiwan Encryption Trends Study methodology

The 2020 Taiwan Encryption Trends Study surveyed 302 IT professionals in Taiwan and is part of a larger global study, based on research by the Ponemon Institute. The report captures how organizations around the world are dealing with compliance, increased threats, and the implementation of encryption to protect their business-critical information and applications.

6,457 IT professionals were surveyed across multiple industry sectors in 17 countries/regions: Australia, Brazil, France, Germany, India, Japan, Hong Kong, Mexico, the Middle East (which is a combination of respondents located in Saudi Arabia and the United Arab Emirates), the Russian Federation, Southeast Asia (Indonesia, Malaysia, Philippines, Thailand, and Vietnam), South Korea, Taiwan, the United Kingdom, the United States and two new regions for the first time, Netherlands and Sweden.

Percy Tu, sales manager, Taiwan, nCipher Security

Percy Tu, sales manager, Taiwan, nCipher Security(Click hereto download high-resolution image)

About nCipher Security

nCipher Security, an Entrust Datacard company, is a leader in the general-purpose hardware security module (HSM) market, empowering world-leading organizations by delivering trust, integrity and control to their business-critical information and applications. Today's fast-moving digital environment enhances customer satisfaction, gives competitive advantage and improves operational efficiency-- it also multiplies the security risks. Our cryptographic solutions secure emerging technologies such as cloud, IoT, blockchain, and digital payments and help meet new compliance mandates. We do this using our same proven technology that global organizations depend on today to protect against threats to their sensitive data, network communications and enterprise infrastructure. We deliver trust for your business-critical applications, ensure the integrity of your data and put you in complete control-- today, tomorrow, always. http://www.ncipher.com

Follow us on LinkedIn, Twitter, Facebook and Instagram-- search nCipherSecurity.

Photo - https://photos.prnasia.com/prnh/20200810/2880970-1Logo - https://photos.prnasia.com/prnh/20200810/2880970-1logo

SOURCE nCipher Security

Read the original post:
Customer personal information is the number one data protection priority in Taiwan reports nCipher - Yahoo Finance

Virtru and Area 1 Security Partner to Deliver Comprehensive Cloud Email Protection – GlobeNewswire

WASHINGTON and REDWOOD CITY, Calif., Aug. 11, 2020 (GLOBE NEWSWIRE) -- Virtru, the new standard in data protection, and Area 1 Security, the first and only preemptive email security company, today announced a partnership to deliver comprehensive enterprise-class email protection. Available now, the joint offering combines Virtrus seamless email encryption with Area 1s advanced anti-phishing capabilities to help enterprises strengthen their security posture and ensure privacy and compliance while maximizing cloud collaboration and ROI.

Organizations have rapidly adopted cloud email infrastructures. According to Gartners most recent Email Security Market Guide, more than 70 percent of corporate email will be cloud-native principally Microsoft Office 365 and Google Gmail by 2021. However, the majority of these organizations use email to share and store sensitive data; 90 percent have cloud data governance challenges due to limited visibility and control; and most organizations are not compliant with data privacy regulations.

Traditional defenses such as secure email gateways (SEGs) are woefully inadequate in protecting todays cloud-driven, distributed global workforces. These approaches cannot proactively hunt threats or protect messages and attachments shared through cloud-based workflows beyond applications and perimeters, and lack the critical ease of use capabilities that ensure adoption and ROI. Further underscoring their limitations, legacy SEGs, as well as cloud email suites, routinely miss more than 30 percent of phishing campaigns the root cause of 95 percent of cyber breaches.

With a best-of-breed, comprehensive solution comprising Virtru Email Protection and Area 1 Horizon, Virtru and Area 1 seamlessly combine end-to-end encryption and advanced cloud email security. Area 1 discovers malicious sites and payloads under construction an average of 24 days before phishing campaigns launch, blocking attacks from ever reaching the inbox. Beyond the inbox, Virtru protects email messages and attachments through user friendly, end-to-end encryption that is transparently integrated into the most commonly used productivity applications, including Gmail, Google Drive, and Microsoft Outlook.

Legacy on-premise defenses that try to bolt-on features to mirror cloud architectures fail to deliver on the promise of the cloud. Traditional email gateways dont scale, dont offer anything new to Office 365 and Gmail users, and most importantly, dont prevent breaches, said Area 1 Security President and CEO Patrick Sweeney. Organizations ready to take their cloud email and messaging to the next level need cloud-native, API-first security solutions like Area 1 and Virtru.

More than 20,000 organizations worldwide trust Virtru for data security and privacy protection. And were excited to join forces with Area 1 to deliver an advanced email solution, said Virtru Co-founder and CEO John Ackerly. Though vital for connection and communication, traditional and cloud email offerings remain deficient in data-centric security controls. Area 1 and Virtru are closing the chasm between promise and protection with best-in-class email security that fosters faster adoption, facilitates secure collaboration among remote workforces, and accelerates ROI for enterprises.

Together, Virtru and Area 1 are providing organizations with:

The complete solution will be available via both companies direct sales organizations and channel partnerships.For more information on Virtrus partnership and joint solution with Area 1, please visit http://www.virtru.com/partners/area-1-security/.

About Area 1 SecurityArea 1 Security is the only company that preemptively stops Business Email Compromise, malware, ransomware and other targeted phishing attacks. By focusing on the earliest stages of an attack, Area 1 stops phish the root cause of 95 percent of breaches 24 days (on average) before they launch. Area 1 also offers the cybersecurity industrys first and only performance-based pricing model, Pay-per-Phish.

Area 1 is trusted by Fortune 500 enterprises across financial services, healthcare, critical infrastructure and other industries, to preempt targeted phishing attacks, improve their cybersecurity posture, and change outcomes.

Area 1 is cloud-native, a Certified Microsoft Partner, and Google Cloud Technology Partner of the Year for Security. To learn more, visit http://www.area1security.com, follow us on LinkedIn, or subscribe to the Phish of the Week newsletter.

About VirtruAt Virtru, we empower organizations to easily unlock the power of data while maintaining control, everywhere its stored and shared. Creators of TDF (Trusted Data Format), the open industry standard for persistent data protection, Virtru provides flexible, easy to use, and trusted privacy technologies built on its data protection platform that govern access to data throughout its full lifecycle from creation to transmission, storage, analysis, and sharing.For more information, visit http://www.virtru.com or follow us on Twitter at @virtruprivacy.

All product and company names herein may be trademarks of their respective owners.

Contact:Shannon KelleyCHEN PR for Virtruskelley@chenpr.com781.672.3132

View post:
Virtru and Area 1 Security Partner to Deliver Comprehensive Cloud Email Protection - GlobeNewswire

Bill Gates advocates for stopping end-to-end encryption (to tackle misinformation) – Reclaim The Net

Tech billionaire Bill Gates seems more present in the media these days than he has been for a long time, but hes not talking about what he knows best: how to make a lot of money in tech, stifle competition, and get away with it.

Gates is inserting himself in the debate around a medical crisis, the coronavirus epidemic, and if Wireds tone is to be believed, he is to be taken as an authoritative source on medical issues, as a self-thought epidemiologist of sorts.

This belief may stem from the fact Gates, as the report suggests, announced an upcoming pandemic in the past, and it happened just as he predicted but hes also presented as a victim of conspiracy theories and misinformation.

On that note, Gates was asked how he explains the fact that so many people are receptive to what is referred to as this anti-science worldview. But in his response, more than anything, Gates takes a swipe at end-to-end encryption and this is not the first time hes done that. It appears as if his dislike of privacy and security enjoyed by users online is as strong, if not stronger, than his self-confessed crusade against everything that anti-science is fighting. Im involved with climate change, GMOs, and vaccines.

Double your web browsing speed with today's sponsor. Get Brave.

But Gates quickly shifts gears from anti-science to calling on the government to kill off encryption in private conversations (as supposedly the reason his critics are able to communicate their thoughts and reactions to his and similar activities). And once again, Gates says this crackdown on misinformation is essential for the health and security of the web in the same breath as fraud or child pornography in an obvious attempt to vilify encryption as such.

One of the guilty apps mentioned in this context is the Facebook-owned WhatsApp, while Facebook is owned by his friend, Mark Zuckerberg.

Asked whether he has spoken about this (i.e., shuttering encryption on the messenger app) with Zuckerberg, Gates acknowledges that he has made the war on encryption his talking point now, and that Zuckerberg emailed him after he said pretty much the same things recently.

He and I do disagree on the trade-offs involved there, Gates said cryptically (probably referring to the trade-offs between security and privacy, and stomping out any (mis) information he dislikes, by any means.)

Here is the original post:
Bill Gates advocates for stopping end-to-end encryption (to tackle misinformation) - Reclaim The Net

Editor’s Pick: Here’s Why You Need an iPhone VPN – PC Tech Magazine

iPhones already come with tons of useful features, so why should you bother adding a VPN to your already-lengthy list of apps?

Well tell you exactly why you should do that in this quick article. If you were just looking for some recommendations, though, we suggest checking out some VPNs for iPhones here. Youll definitely find the best services on the market.

Not 100% Sure What a VPN Is? Heres a Quick Intro

If youre new to VPNs, or you already heard of them but are not completely sure how they work, dont skip this section. Well do our best to explain what a VPN is and how it works in very simple terms.

To start off, a VPN is an online tool that hides your IP address and encrypts your traffic. By tool, we just mean its an app you download and install on your iPhone.

Now, heres how a VPN hides your IP address:

Its pretty simple. The VPN app and the server you connect to negotiate and establish a secure connection between them (often called a VPN tunnel). Any data that passes through it is encrypted end-to-end. That means onlythe app and server can encryptand decrypt it. Thats basically why nobody can spy on your traffic when you use a VPN.

What about the encryption part?

So Why Should You Use a VPN for iPhone?

Here are fourgood reasons to head to the iTunes store and download a VPN app:

1. Unblock All the Online Content You Want

Ever tried visiting a site or watching a video only to be hit with a message saying something along the lines of Sorry, this content isnt available in your area.?

Thats geo-blocking in action content control technology that lets websites blacklist your access to certain web pages if youre not from a whitelisted geo-location. And all sites know your geo-location because they can see your IP address, which tells them:

Well, since a VPN can hide your IP address from all the sites you visit, it can help you bypass their geo-blocks. Just use a VPN server in a country where the content you want to see is available, and youre good to go.

So if you wanted tobingeshows from the US Netflix library, youd have to use a VPN server in the US.

2. Secure Your Traffic on Public Networks

Heres the thing about public WiFi its extremely convenient, but extremely dangerous too. Many networks dont even bother using encryption, so all your traffic is exposed. That means any run-of-the-mill hacker could use packet sniffers to steal sensitive data from you (like login credentials, for example).

Whats more, even the networks that use encryption arent 100% safe. The current standard (WPA2) actually has a serious vulnerability, and its successor (WPA3) isnt doing any better.

Not to mention that a hacker could easily set up their own fake network, and trick your iPhone into connecting to it. If that happens, they can monitor all your online communications.

If you use a VPN, though, you need not worry about that. It encrypts your traffic end-to-end, so nobody can compromise it not even on networks with no encryption or fake hotspots.

3. Avoid Some Phishing Attacks

By encrypting your traffic, VPNs offer some level of protection against a form of MITM (Man-in-the-Middle) attacks specifically when hackers try to redirect your connection requests to phishing sites.

Because your data packets are encrypted end-to-end, cybercriminals cant use packet sniffers to find out what sites youre visiting. Without that information, they cant successfully redirect your requests to fake sites.

After all, if youwanted to visit Twitter, and you ended up on a PayPal-looking site, youd be pretty suspicious. You might even check the URL bar and see the address looks something like this: paipaL.xy.org. At thatpoint,youdbe able to tell youre on a phishing site.

Besides that, some VPNs also offer firewall-like features that automatically block your connections to malicious domains. So hackers redirects wouldnt even work because the VPN will automatically stop your connection to their fake sites.

IMPORTANT: VPNs cant protect you from all phishing attacks. So please use antivirus protection (like Avira Mobile Security), password managers (like 1Password), and enable 2FA/MFA on all your accounts.

4. Stop Bandwidth Throttling

Thats when your ISP intentionally slows down your speeds because youre using too much data on a web app or site. They cando that because they cansee all your traffic.

With a VPN for iPhone, thats no longer a problem. Heres why:

Without that valuable information, they wont be able to selectively throttle your bandwidth anymore.

Need Help Finding a Good iPhone VPN?

We know how hard that is what with 100+ VPN services on the market.

Instead of doing hours of tiresome research, we recommend checking out some VPNs for iPhones here. Its an easy-to-scan guide from ProPrivacy that compares the best iPhone VPNs on the market.

Why Else Do You Use iPhone VPNs?

Tell us other reasons why someone should use a VPN on their iPhone in the comments. Also, if you have other information about using VPNs on iPhones, please let us know.

Read the original here:
Editor's Pick: Here's Why You Need an iPhone VPN - PC Tech Magazine

What Is Cryptocurrency Trading and How to Earn With It? – FinSMEs

The Internet offers us a lot of possibilities to work online, and with the emergence of blockchain, the list of possible sources of income has increased. The biggest part of remote earning comes from cryptocurrency trading.

Virtual money or cryptocurrency is in high demand for traders who are ready to invest money to get profit.

Cryptocurrency trading is one of the main sources of getting profit from cryptocurrency. This type of online trading is almost the same as stocks, currencies, or commodities trading. The main task is to buy when the price is low and to sell when it is higher (or vice versa, when you open the short position).

The biggest difference between this type of trading and other ones is the high volatility. A lot of traders, especially newcomers, want to get thousands of percent as a profit, and with Forex trading, for example, you need to wait for years to get such sums, and crypto can offer you a higher speed of getting profits.

And where do you need to start?

First, you need to know that it is impossible to start successful crypto trading with zero experience. If you want to invest in virtual coins, you will need to get the basic knowledge. You need to learn the following moments:

I think that the most important moment is the first one.

So what do you need to know to analyze the coin?

You need to know the idea of this coin and how popular it is. In the beginning, I wont recommend you to work with unknown coins.

If we speak about coins, its time to talk about wallets where you will store your assets. There are a lot of different storages. I advise you to choose the wallet with high quality and popularity, that is developed by an experienced custom software development company.

If you are looking for the safest Bitcoin wallet, I will recommend you to buy the hardware wallet like Trezor or Ledger. And if you want to have a convenient wallet, you can choose the mobile wallet but it should be non-custodial only.

Cryptocurrency trading offers high opportunities for getting income. The good news is that you can start trading with minimal investments but to get a profit you need to learn a lot and test every strategy.

Wish you successful trading!

Read the rest here:
What Is Cryptocurrency Trading and How to Earn With It? - FinSMEs

Australian woman jailed over crypto theft – ACS

Kathryn Nguyen being arrested in 2018. Source: NSW Police

A 25-year-old Sydney female has been sentenced to a maximum two years and three months in jail for stealing over 100,000 'Ripple' cryptocurrency in January 2018.

Kathryn Nguyen and an associate hacked into a 56-year-old mans cryptocurrency account and swapped the two-factor authentication to her mobile phone, according to News Corp.

She then transferred the large sum of cryptocurrency to an overseas exchange where it was traded for bitcoin and shuffled into different wallets.

The heist took place at the height of the cryptocurrency boom when Ripple coins peaked at just over $4 each netting Nguyen some $400,000 in Ripple at the time.

Ripple is now worth a tenth of what it was.

Police raided Nguyens home in Epping last year, seizing computers, phones, and money.

She was the first Australian charged over cryptocurrency theft.

Presiding judge Chris Craigie said it was a difficult and troubling decision to send Nguyen to prison and that her references reflected a generous and hardworking personality, according to News Corp.

A common thread was the offenders willingness to help others, Craigie said.

This takes on a different meaning in her willingly participating and assisting in a criminal enterprise.

He said the offending appeared out of character and that her moral judgement was distorted at the time of cryptocurrency theft.

After losing money trading bitcoin she began a business repairing designer handbags and shoes.

Nguyen will be eligible for parole in October 2021.

Reporting cybercrime

Police began their nearly year-long investigation into Nguyen after the victim reported being locked out of his trading account.

Commander of NSW Cybercrime Squad, Detective Superintendent Matthew Craft, told Information Age it was imperative for potential cybercrime victims to make a report.

The problem we have nationally not just in New South Wales is that the reporting rate for cyber related crimes is very low, Craft said.

The NSW Cybercrime Squad has assisted with numerous arrests over the past 12 months, helping bust local scam syndicates and identity thieves.

But cybercrime transcends borders which makes the job of police more difficult.

Sometimes you do have offenders that are overseas, which means theres not much law enforcement can do, Craft said.

But unless you report it and we know about it, were not in a position to make that determination.

Report Cyber is the official channel for reporting cyber crimes and covers a range of cyber issues including abuse, identity theft, compromised accounts, and malware.

Read the original post:
Australian woman jailed over crypto theft - ACS

Cryptocurrency Market Update: Bitcoin losing the fight to $12,000, IOTA and Tezos rocket – FXStreet

Bitcoin encountered an imbalance at $12,000 following the rejection witnessed on Monday from $12,084. The tug of war between the bears and the bulls continued with buyers aiming to reclaim the ground above $12,000. However, the re-energized sellers were not prepared to see Bitcoin claiming any inch of the ground above $12,000. Most analysts believe that a Bitcoin break above $13,000 would actualize the push for the run to $20,000 as the year comes to an end in less than five months.

Bitcoin retreated further on Tuesday losing 1.37% on the day to trade at $11,735 from an opening value of $11,899. Support at $11,700 is still intact but the potential for losses targeting $10,500 continues to grow as explored in the price prediction article earlier in the day.

Read more:Bitcoin Price Prediction: BTC/USD 'life-threatening' plunge to $10,500 lingers Confluence Detector

Tezos is raising eyebrows across the cryptocurrency market following its consistent surge in the last few days. Besides breaking above the critical hurdle at $4.0, the token also roared to new all-time highs at $4.4. Buying interest has remained high as reflected by the surge in the volume from $342 million on Sunday to $525 million on Monday and $564 million at the time of writing (data by CoinMarketCap).

A minor retreat from $4.4 has forced Tezos to trade closer to the confirmed support at $4.0. XTZ/USD is trading at $4.14 amid a building bullish momentum. The RSI holds at 53 following the slide from overbought levels. The MACD is moving to the south while the increasing bearish divergence highlights a stronger bearish grip.

IOTA also broke out massively following the launch of the first phase of its Chrysalis project. The network has planned a series of upgrades that will eventually lead to the IOTA 1.5 protocol. Various features have been brought into the network including atomic transactions, autopeering, Binary Transaction Layout, UTXO and Whiteflag among others. The launch saw a reflective movement in the price of IOT token with gains of over 5% on the day.

IOTA is trading at $0.3975 at the time of writing. It is up 5.36% on the day from an opening of $0.3773. An intraday high has been traded at $0.40. The fight for support above $0.40 is set to continue as the bulls focus on the action above $0.50.

See more here:
Cryptocurrency Market Update: Bitcoin losing the fight to $12,000, IOTA and Tezos rocket - FXStreet