Process of converting plaintext to ciphertext
POPULARITY
Q & A Presents: Maui Online! – Hawaii's Only Computer Talk Show!
We have a special guest, Danno! Dan Visits about VPNs You might remember him as our security and privacy guy. Well he's back! We'll be talking about VPNs, Encryption, and Quantum computing!
Q & A Presents: Maui Online! – Hawaii's Only Computer Talk Show!
Our security and privacy guy is back! More with Dan! We've been talking about VPNs, Encryption, and Quantum computing!
Late last year, speculation around the metaverse fed into a crazy market for virtual real estate. Six months later, values have dropped 80%. What happened? Plus an update on Apple's battle with Ericsson and how some researchers were able to defeat a next-generation encryption strategy. See omnystudio.com/listener for privacy information.
We usually think about the most efficient way to do things while working in production environments. Still, often employees forget about an insecure environment once the work has been completed and they have moved on to another project. “We don't always need to audit things; sometimes you can gauge risk by having a conversation with stakeholders…on how they manage databases,” says Adam Kohnke, Cybersecurity Architect for Charter Next Generation. Adam joins ISACA's Jon Brandt in this episode to discuss his recently released ISACA Journal article, “Managing Security Across Disparate Database Technologies.” Adam breaks down best practices for User Access Management, Encryption, and Logging. He comments on the best ways to start the conversation about security beyond what management considers vital for IT. Tune in now for the full episode! To read the full article, visit www.isaca.org/managing-security-across-disparate-database-technologies. To listen to more ISACA podcasts, visit: www.isaca.org/podcasts
This week Dr. Doug talks: Tears in the Rain, Encryption, Microsoft, LockBit 3.0, Twitter keys, Outlook crashes, 911, and Russ Beauchemin on the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/swn228
Today on the Ether we have a space all about encryption and mining with the Full Spend Yacht Club and Docushield. Recorded on August 3rd 2022. If you enjoy the music at the end of the episodes, you can find the albums streaming on Spotify, and the rest of your favorite streaming platforms. Check out Project Survival, Virus Diaries, and Plan B wherever you get your music. Thank you to everyone in the community who supports TerraSpaces.
This week Dr. Doug talks: Tears in the Rain, Encryption, Microsoft, LockBit 3.0, Twitter keys, Outlook crashes, 911, and Russ Beauchemin on the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/swn228
This week Dr. Doug talks: Tears in the Rain, Encryption, Microsoft, LockBit 3.0, Twitter keys, Outlook crashes, 911, and Russ Beauchemin on the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn228
Oggi vi voglio consigliare un bel libro, "De/cifrare. Come funzionano i più grandi codici della storia, dal cifrario di Cesare alla password del wi-fi".Usciamo dai soliti binari del podcast, e vi consiglio una lettura che mi è davvero piaciuta.https://www.amazon.it/cifrare-funzionano-grandi-cifrario-password/dp/885802298X/
Cryptography comes from the ancient Greek word “cryptos,” meaning “hidden” or “secret.” Encryption is a cybersecurity pillar, a key defense against invasion of our privacy. But it may be underappreciated in practice. Tune in to learn about the growing need for encryption technology to combat the rising tide of cyber-attacks. A recent report by the Port of Los Angeles to the FBI indicated that it suffers from over one million cyber-attacks per day. Dan Draper, CEO and Founder of CipherStash, explains from his home in Sydney, Australia the role of cryptography in protecting sensitive personal and other information. Dan's company provides a data storage platform for sensitive data that uses searchable encryption technology to protect against attacks. Dan discusses how encryption protects personal data and how traditional databases are vulnerable to hacking and other risks. Learn why cryptography is becoming increasingly crucial in guarding data privacy and why Dan is optimistic about the use of encryption even as the age of quantum computing dawns. If you have ideas for more interviews or stories, please email info@thedataprivacydetective.com.
England's European Championship winning footballers are the toast of social media right now after their nail biting extra time 2-1 win over Germany. Hashtags including ‘itscomehome' and ‘womensfootball' have been trending across Twitter and Instagram alongside of course #lionesses. Video clips going viral include the players gatecrashing manager Sarina Weigman's post match press conference and the winning goal from Chloe Kelly. If you're interested in finding out more about women's football on social media, the Lionesses have their own @lionesses Twitter and Instagram accounts and the women's super league is @barclaysWSL. In Scotland you can visit scotwomensfootball.com for an overviews of all levels of the game and you'll find the top flight clubs in the SWPL where the new season kicks off this coming Sunday. In other digital news today Snapchat has launched a new fund to encourage unsigned musicians to share their music on the platform. And WhatsApp is attracting controversy for its stance regarding encryption. The boss of the service says it would never bow to government pressure to weaken security - which could have made it easier for authorities to tackle the spread of illegal images through direct messages. The discussions are part of the debate around the UK government's Online Safety Bill which has now been delayed until the autumn.
Red Hat hints at its future direction, why realtime might finally come to Linux after all these years, and our reaction to Google's ambitious new programing language.
What is the black hole information paradox? On this episode, Neil deGrasse Tyson and comic co-host Chuck Nice explore the Higgs Boson, quantum entanglement, and black holes with particle physicist Brian Cox. NOTE: StarTalk+ Patrons can watch or listen to this entire episode commercial-free here: https://startalkmedia.com/show/cosmic-queries-quantum-catastrophe-with-brian-cox/Thanks to our Patrons Detlef Van de Wal, Devon Gogel, Jay Salmon, Jacek Kono, Jordan Hume, Brynjar, M J, and Yoni Liberman for supporting us this week.Photo Credit: XMM-Newton, ESA, NASA, Public domain, via Wikimedia Commons
Work Life Balance Podcast: Business | Productivity | Results
Making sure your business has systems in place to withstand cyberattacks is one of the most important actions you need to do. As a business owner, you have an obligation to protect your company's sensitive information, as well as your clients' information. The Equifax data breach of 2017 exposed the personal data of millions of people. As a result, Equifax had to pay $700 million in settlement fees. This is just one of many unfortunate examples. Smaller businesses may be even easier targets, which is why it's very important to have a solid cybersecurity strategy in place. If you're not sure where to start, let's review 6 tips to help you increase your company's cybersecurity to protect your business. 1. Use Secure Passwords and Multi-factor Authentication Not only should you have a strong password to sign into the various platforms and software that your business uses, it's also good practice to change those passwords regularly and use multi-factor authentication. Longer passwords are better—at least 8 characters, with a mix of uppercase and lowercase letters, numbers, and symbols. Passwords can be hacked with automated software that tries every possible combination, so the longer your password is, the more combinations it has to try. Multi-factor authentication is when you need a password and an additional step. It's also called two-step verification. This reduces the likelihood of a successful attack because there is additional information needed. Typically, this is a code sent to the user's cell phone, or a code generated by a two-factor authentication (2FA) app such as Authy. You can use a password manager to manage the various passwords for your accounts, so you're not reusing the same one, or having to try and remember all the passwords you have for all your accounts. If one account gets hacked, then any other account using the same password can also more easily get hacked. And whatever you do, avoid using the word “password” as your password at all costs. There are many password manger options. Some are: • Dashlane • LastPass • LogMeOnce • Keeper • NordPass • Bitwarden • RememBear • 1Password • PasswordBoss • Enpass • RoboForm • ZohoVault • TrueKey 2. Secure Your Wi-Fi Network Make sure your Wi-Fi is secure and hidden. While your router typically comes with a pre-set password, make sure to change it immediately to something more secure. Additionally, if you offer free Wi-Fi to your guests, create a separate guest network with a different password, so they don't have access to your company's network. You're ultimately responsible for what people do on your network. By securing your guest network with a password, you can control who has access to it and make sure you're not opening up your business to considerable risks. Also check that encryption is enabled on your router. Encryption provides data security for sensitive information, and enabling it scrambles plain text that's sent or stored on the web into unreadable, or “cipher text.” Once it's sent to the end user, the text is unscrambled, or decrypted. If you're out of the office or in a public area, avoid using the free Wi-Fi network. As tempting as it may be to check your email at the airport, there are a lot of potential risks that come with a free public network, such as opening yourself up to hackers. Look for a network that's secured with a strong password, and if you can't find one and absolutely need to hop online, use your phone as a temporarily private hotspot. 3. Backup Your Data Regularly If your system gets hacked, not only will others gain access to sensitive information, but you may lose access to your own data. Backing up your data regularly to the cloud will still give you access to it if anything happens. Ransomware attacks happen by locking you out of your data and preventing access until you pay a ransom fee. If you have a recent copy of your data, you don't need to worry about getting that information back. How often you backup your data depends on your business and how much information you're storing. At the very least, you should back it up after any important task has been completed. Some backup service options are: • https://www.carbonite.com/en/ • https://mozy.com/ • www.mypcbackup.com • www.justcloud.com • www.backupgenie.com • www.zipcloud.com • www5.ibackup.com • www.crashplan.com • www.sosonlinebackup.com • https://www.idrive.com/index.html 4. Create Separate User Accounts for Each Team Member As much as you'd love to retain your team members for as long as possible, the time will sometimes come for them to move on. Hopefully that's on good terms, but in case it's not, it's always safer to make sure you can easily delete their individual user accounts. Having separate user accounts also helps keep track of version history, or who makes changes to what. If anything ever happens to your files or data, you'll be able to track who the last person to make the changes was so you can restore the files. Make sure that when your employees are setting up their user accounts, they understand how to set up a strong password. 5. Encrypt Any Data Sent Via Email Cybersecurity training should be part of any new employee onboarding. This includes training employees on the types of data to send or not to send through email. Any sensitive information, such as login information and passwords, credit card information, or social security information, should never be sent through email. Tools such as Enigmail are useful security tools to encrypt your email. Never email any confidential information to anyone via email. Passwords can be sent through software such as LastPass. The same way you wouldn't want to send sensitive information on a postcard for everyone to see, you should be cautious about what you send through email in case you get hacked. 6. Implement Anti-Virus Software and Firewalls Anti-virus software and firewalls block malicious software from getting into and infecting your computer. They guard your system from any suspicious activity or users trying to make contact with it. It's like a security guard, making sure only the people on your approved list are let in. VPNs mask your identity on the internet and protect your location and online activities. A VPN is like a middleman—when you go to a site, the site sees the VPN's IP address, not your own personal IP address. You get what you pay for, so it's a good idea to pay for a VPN service instead of going with a free one. A decent VPN can cost you between $5-$12 per month, which is a small price to pay for added security. Anti-virus software can protect your computer from things like spyware, adware, or trojan horses. Firewalls, on the other hand, protect your network from suspicious traffic. Together, you have the best chance of fighting cyberattacks from various angles. A few anti-virus software options are: • McAfee • Norton • Total AV • Surfshark • Kaspersky • Bitdefender • AURA • Panda • Avira If you don't already have a cybersecurity strategy in place, now's the time to implement one. Take a look at the systems you have and get a sense of what needs to be done to protect them from all angles, whether that's using two-factor authentication, backing up your data regularly, using a VPN, implementing anti-virus software, or encrypting any sensitive information sent over email. It's your job as a business owner to protect your company and its assets from cyberattacks. Putting in the work now and having the proper tools to build resilience to threats will definitely pay off. For more help with growing your business and accelerating your results, reach out to me today and schedule your complimentary consultation. Aim for what you want each and every day! Anne Bachrach The Accountability Coach™ The Results Accelerator™ Want more from me? Subscribe to my business success tips and resources blog by going to www.acountabilitycoach.com/blog. Go to https://www.accountabilitycoach.com to check out for yourself how I, as your Accountability Coach™, can help you get and stay focused on you highest payoff activities that put you in the highest probability position to achieve your professional and personal goals, so you can enjoy the kind of business and life you truly want and deserve. Get your daily Accountability Minute shot of a single, simple, doable idea, so you can start your day off on the "right foot". You can find The Accountability Minute on https://www.accountabilitycoach.com/my-podcast/ as well as on most podcast platforms and in most English-speaking countries. Take advantage of all the complimentary business tips and tools by joining the Free Silver Membership on https://www.accountabilitycoach.com/coaching-store/inner-circle-store/. If you are getting value from any of Podcasts, please take a minute to leave me a short rating and review. I would really appreciate it, and love to hear from you. To help you stay focused and on track to achieving your goals, check out these other high-value resources. Subscribe to my high-value business success tips and resources Blog https://www.accountabilitycoach.com/blog/) - Subscribe to my YouTube channel with business success principles (https://www.youtube.com/annebachrach) - Connect with me on Facebook (https://www.facebook.com/TheAccountabilityCoach) - Connect with me on Linked-in (https://www.linkedin.com/in/annebachrach) - Connect with me on Pinterest (https://pinterest.com/resultsrule/) - Connect with me on Instagram (https://www.instagram.com/annebachrach/) As an experienced accountability coach and author of 5 books, I help business professionals make more money, work less, and enjoy even better work life balance. Author of Excuses Don't Count; Results Rule, Live Life with No Regrets, No Excuses, and the Work Life Balance Emergency Kit, The Roadmap To Success with Stephen Covey and Ken Blanchard, and more.
Making sure your business has systems in place to withstand cyberattacks is one of the most important actions you need to do. As a business owner, you have an obligation to protect your company's sensitive information, as well as your clients' information. The Equifax data breach of 2017 exposed the personal data of millions of people. As a result, Equifax had to pay $700 million in settlement fees. This is just one of many unfortunate examples. Smaller businesses may be even easier targets, which is why it's very important to have a solid cybersecurity strategy in place. If you're not sure where to start, let's review 6 tips to help you increase your company's cybersecurity to protect your business. 1. Use Secure Passwords and Multi-factor Authentication Not only should you have a strong password to sign into the various platforms and software that your business uses, it's also good practice to change those passwords regularly and use multi-factor authentication. Longer passwords are better—at least 8 characters, with a mix of uppercase and lowercase letters, numbers, and symbols. Passwords can be hacked with automated software that tries every possible combination, so the longer your password is, the more combinations it has to try. Multi-factor authentication is when you need a password and an additional step. It's also called two-step verification. This reduces the likelihood of a successful attack because there is additional information needed. Typically, this is a code sent to the user's cell phone, or a code generated by a two-factor authentication (2FA) app such as Authy. You can use a password manager to manage the various passwords for your accounts, so you're not reusing the same one, or having to try and remember all the passwords you have for all your accounts. If one account gets hacked, then any other account using the same password can also more easily get hacked. And whatever you do, avoid using the word “password” as your password at all costs. There are many password manger options. Some are: • Dashlane • LastPass • LogMeOnce • Keeper • NordPass • Bitwarden • RememBear • 1Password • PasswordBoss • Enpass • RoboForm • ZohoVault • TrueKey 2. Secure Your Wi-Fi Network Make sure your Wi-Fi is secure and hidden. While your router typically comes with a pre-set password, make sure to change it immediately to something more secure. Additionally, if you offer free Wi-Fi to your guests, create a separate guest network with a different password, so they don't have access to your company's network. You're ultimately responsible for what people do on your network. By securing your guest network with a password, you can control who has access to it and make sure you're not opening up your business to considerable risks. Also check that encryption is enabled on your router. Encryption provides data security for sensitive information, and enabling it scrambles plain text that's sent or stored on the web into unreadable, or “cipher text.” Once it's sent to the end user, the text is unscrambled, or decrypted. If you're out of the office or in a public area, avoid using the free Wi-Fi network. As tempting as it may be to check your email at the airport, there are a lot of potential risks that come with a free public network, such as opening yourself up to hackers. Look for a network that's secured with a strong password, and if you can't find one and absolutely need to hop online, use your phone as a temporarily private hotspot. 3. Backup Your Data Regularly If your system gets hacked, not only will others gain access to sensitive information, but you may lose access to your own data. Backing up your data regularly to the cloud will still give you access to it if anything happens. Ransomware attacks happen by locking you out of your data and preventing access until you pay a ransom fee. If you have a recent copy of your data, you don't need to worry about getting that information back. How often you backup your data depends on your business and how much information you're storing. At the very least, you should back it up after any important task has been completed. Some backup service options are: • https://www.carbonite.com/en/ • https://mozy.com/ • www.mypcbackup.com • www.justcloud.com • www.backupgenie.com • www.zipcloud.com • www5.ibackup.com • www.crashplan.com • www.sosonlinebackup.com • https://www.idrive.com/index.html 4. Create Separate User Accounts for Each Team Member As much as you'd love to retain your team members for as long as possible, the time will sometimes come for them to move on. Hopefully that's on good terms, but in case it's not, it's always safer to make sure you can easily delete their individual user accounts. Having separate user accounts also helps keep track of version history, or who makes changes to what. If anything ever happens to your files or data, you'll be able to track who the last person to make the changes was so you can restore the files. Make sure that when your employees are setting up their user accounts, they understand how to set up a strong password. 5. Encrypt Any Data Sent Via Email Cybersecurity training should be part of any new employee onboarding. This includes training employees on the types of data to send or not to send through email. Any sensitive information, such as login information and passwords, credit card information, or social security information, should never be sent through email. Tools such as Enigmail are useful security tools to encrypt your email. Never email any confidential information to anyone via email. Passwords can be sent through software such as LastPass. The same way you wouldn't want to send sensitive information on a postcard for everyone to see, you should be cautious about what you send through email in case you get hacked. 6. Implement Anti-Virus Software and Firewalls Anti-virus software and firewalls block malicious software from getting into and infecting your computer. They guard your system from any suspicious activity or users trying to make contact with it. It's like a security guard, making sure only the people on your approved list are let in. VPNs mask your identity on the internet and protect your location and online activities. A VPN is like a middleman—when you go to a site, the site sees the VPN's IP address, not your own personal IP address. You get what you pay for, so it's a good idea to pay for a VPN service instead of going with a free one. A decent VPN can cost you between $5-$12 per month, which is a small price to pay for added security. Anti-virus software can protect your computer from things like spyware, adware, or trojan horses. Firewalls, on the other hand, protect your network from suspicious traffic. Together, you have the best chance of fighting cyberattacks from various angles. A few anti-virus software options are: • McAfee • Norton • Total AV • Surfshark • Kaspersky • Bitdefender • AURA • Panda • Avira If you don't already have a cybersecurity strategy in place, now's the time to implement one. Take a look at the systems you have and get a sense of what needs to be done to protect them from all angles, whether that's using two-factor authentication, backing up your data regularly, using a VPN, implementing anti-virus software, or encrypting any sensitive information sent over email. It's your job as a business owner to protect your company and its assets from cyberattacks. Putting in the work now and having the proper tools to build resilience to threats will definitely pay off. For more help with growing your business and accelerating your results, reach out to me today and schedule your complimentary consultation. Aim for what you want each and every day! Anne Bachrach The Accountability Coach™ The Results Accelerator™ To help you stay focused and on track to achieving your goals, check out these other high-value resources. Subscribe to my high-value business success tips and resources Blog https://www.accountabilitycoach.com/blog/) - Subscribe to my YouTube channel with business success principles (https://www.youtube.com/annebachrach) - Connect with me on Facebook (https://www.facebook.com/TheAccountabilityCoach) - Connect with me on Linked-in (https://www.linkedin.com/in/annebachrach) - Connect with me on Pinterest (https://pinterest.com/resultsrule/) - Connect with me on Instagram (https://www.instagram.com/annebachrach/) If you are getting value from any of Podcasts, please take a minute to leave me a short rating and review. I would really appreciate it, and love to hear from you. Go to https://www.accountabilitycoach.com to check out for yourself how I, as your Accountability Coach™, can help you get and stay focused on you highest payoff activities that put you in the highest probability position to achieve your professional and personal goals, so you can enjoy the kind of business and life you truly want and deserve. Get your daily Accountability Minute shot of a single, simple, doable idea, so you can start your day off on the "right foot". You can find The Accountability Minute on https://www.accountabilitycoach.com/my-podcast/ as well as on most podcast platforms and in most English-speaking countries. As an experienced accountability coach and author of 5 books, I help business professionals make more money, work less, and enjoy even better work life balance. Check out my proven business accelerator resources by going to https://www.accountabilitycoach.com/coaching-store/. Author of Excuses Don't Count; Results Rule, Live Life with No Regrets, No Excuses, and the Work Life Balance Emergency Kit, The Roadmap To Success with Stephen Covey and Ken Blanchard, and more.
The Accountability Coach: Business Acceleration|Productivity
Making sure your business has systems in place to withstand cyberattacks is one of the most important actions you need to do. As a business owner, you have an obligation to protect your company's sensitive information, as well as your clients' information. The Equifax data breach of 2017 exposed the personal data of millions of people. As a result, Equifax had to pay $700 million in settlement fees. This is just one of many unfortunate examples. Smaller businesses may be even easier targets, which is why it's very important to have a solid cybersecurity strategy in place. If you're not sure where to start, let's review 6 tips to help you increase your company's cybersecurity to protect your business. 1. Use Secure Passwords and Multi-factor Authentication Not only should you have a strong password to sign into the various platforms and software that your business uses, it's also good practice to change those passwords regularly and use multi-factor authentication. Longer passwords are better—at least 8 characters, with a mix of uppercase and lowercase letters, numbers, and symbols. Passwords can be hacked with automated software that tries every possible combination, so the longer your password is, the more combinations it has to try. Multi-factor authentication is when you need a password and an additional step. It's also called two-step verification. This reduces the likelihood of a successful attack because there is additional information needed. Typically, this is a code sent to the user's cell phone, or a code generated by a two-factor authentication (2FA) app such as Authy. You can use a password manager to manage the various passwords for your accounts, so you're not reusing the same one, or having to try and remember all the passwords you have for all your accounts. If one account gets hacked, then any other account using the same password can also more easily get hacked. And whatever you do, avoid using the word “password” as your password at all costs. There are many password manger options. Some are: • Dashlane • LastPass • LogMeOnce • Keeper • NordPass • Bitwarden • RememBear • 1Password • PasswordBoss • Enpass • RoboForm • ZohoVault • TrueKey 2. Secure Your Wi-Fi Network Make sure your Wi-Fi is secure and hidden. While your router typically comes with a pre-set password, make sure to change it immediately to something more secure. Additionally, if you offer free Wi-Fi to your guests, create a separate guest network with a different password, so they don't have access to your company's network. You're ultimately responsible for what people do on your network. By securing your guest network with a password, you can control who has access to it and make sure you're not opening up your business to considerable risks. Also check that encryption is enabled on your router. Encryption provides data security for sensitive information, and enabling it scrambles plain text that's sent or stored on the web into unreadable, or “cipher text.” Once it's sent to the end user, the text is unscrambled, or decrypted. If you're out of the office or in a public area, avoid using the free Wi-Fi network. As tempting as it may be to check your email at the airport, there are a lot of potential risks that come with a free public network, such as opening yourself up to hackers. Look for a network that's secured with a strong password, and if you can't find one and absolutely need to hop online, use your phone as a temporarily private hotspot. 3. Backup Your Data Regularly If your system gets hacked, not only will others gain access to sensitive information, but you may lose access to your own data. Backing up your data regularly to the cloud will still give you access to it if anything happens. Ransomware attacks happen by locking you out of your data and preventing access until you pay a ransom fee. If you have a recent copy of your data, you don't need to worry about getting that information back. How often you backup your data depends on your business and how much information you're storing. At the very least, you should back it up after any important task has been completed. Some backup service options are: • https://www.carbonite.com/en/ • https://mozy.com/ • www.mypcbackup.com • www.justcloud.com • www.backupgenie.com • www.zipcloud.com • www5.ibackup.com • www.crashplan.com • www.sosonlinebackup.com • https://www.idrive.com/index.html 4. Create Separate User Accounts for Each Team Member As much as you'd love to retain your team members for as long as possible, the time will sometimes come for them to move on. Hopefully that's on good terms, but in case it's not, it's always safer to make sure you can easily delete their individual user accounts. Having separate user accounts also helps keep track of version history, or who makes changes to what. If anything ever happens to your files or data, you'll be able to track who the last person to make the changes was so you can restore the files. Make sure that when your employees are setting up their user accounts, they understand how to set up a strong password. 5. Encrypt Any Data Sent Via Email Cybersecurity training should be part of any new employee onboarding. This includes training employees on the types of data to send or not to send through email. Any sensitive information, such as login information and passwords, credit card information, or social security information, should never be sent through email. Tools such as Enigmail are useful security tools to encrypt your email. Never email any confidential information to anyone via email. Passwords can be sent through software such as LastPass. The same way you wouldn't want to send sensitive information on a postcard for everyone to see, you should be cautious about what you send through email in case you get hacked. 6. Implement Anti-Virus Software and Firewalls Anti-virus software and firewalls block malicious software from getting into and infecting your computer. They guard your system from any suspicious activity or users trying to make contact with it. It's like a security guard, making sure only the people on your approved list are let in. VPNs mask your identity on the internet and protect your location and online activities. A VPN is like a middleman—when you go to a site, the site sees the VPN's IP address, not your own personal IP address. You get what you pay for, so it's a good idea to pay for a VPN service instead of going with a free one. A decent VPN can cost you between $5-$12 per month, which is a small price to pay for added security. Anti-virus software can protect your computer from things like spyware, adware, or trojan horses. Firewalls, on the other hand, protect your network from suspicious traffic. Together, you have the best chance of fighting cyberattacks from various angles. A few anti-virus software options are: • McAfee • Norton • Total AV • Surfshark • Kaspersky • Bitdefender • AURA • Panda • Avira If you don't already have a cybersecurity strategy in place, now's the time to implement one. Take a look at the systems you have and get a sense of what needs to be done to protect them from all angles, whether that's using two-factor authentication, backing up your data regularly, using a VPN, implementing anti-virus software, or encrypting any sensitive information sent over email. It's your job as a business owner to protect your company and its assets from cyberattacks. Putting in the work now and having the proper tools to build resilience to threats will definitely pay off. For more help with growing your business and accelerating your results, reach out to me today and schedule your complimentary consultation. Aim for what you want each and every day! Anne Bachrach The Accountability Coach™ The Results Accelerator™ To help you stay focused and on track to achieving your goals, check out these other high-value resources. Subscribe to my high-value business success tips and resources Blog https://www.accountabilitycoach.com/blog/) - Subscribe to my YouTube channel with business success principles (https://www.youtube.com/annebachrach) - Connect with me on Facebook (https://www.facebook.com/TheAccountabilityCoach) - Connect with me on Linked-in (https://www.linkedin.com/in/annebachrach) - Connect with me on Pinterest (https://pinterest.com/resultsrule/) - Connect with me on Instagram (https://www.instagram.com/annebachrach/) If you are getting value from any of Podcasts, please take a minute to leave me a short rating and review. I would really appreciate it, and love to hear from you. Go to https://www.accountabilitycoach.com to check out for yourself how I, as your Accountability Coach™, can help you get and stay focused on you highest payoff activities that put you in the highest probability position to achieve your professional and personal goals, so you can enjoy the kind of business and life you truly want and deserve. Get your daily Accountability Minute shot of a single, simple, doable idea, so you can start your day off on the "right foot". You can find The Accountability Minute on https://www.accountabilitycoach.com/my-podcast/ as well as on most podcast platforms and in most English-speaking countries. As an experienced accountability coach and author of 5 books, I help business professionals make more money, work less, and enjoy even better work life balance. Check out my proven business accelerator resources by going to https://www.accountabilitycoach.com/coaching-store/. Author of Excuses Don't Count; Results Rule, Live Life with No Regrets, No Excuses, and the Work Life Balance Emergency Kit, The Roadmap To Success with Stephen Covey and Ken Blanchard, and more.
Making sure your business has systems in place to withstand cyberattacks is one of the most important actions you need to do. As a business owner, you have an obligation to protect your company's sensitive information, as well as your clients' information. The Equifax data breach of 2017 exposed the personal data of millions of people. As a result, Equifax had to pay $700 million in settlement fees. This is just one of many unfortunate examples. Smaller businesses may be even easier targets, which is why it's very important to have a solid cybersecurity strategy in place. If you're not sure where to start, let's review 6 tips to help you increase your company's cybersecurity to protect your business. 1. Use Secure Passwords and Multi-factor Authentication Not only should you have a strong password to sign into the various platforms and software that your business uses, it's also good practice to change those passwords regularly and use multi-factor authentication. Longer passwords are better—at least 8 characters, with a mix of uppercase and lowercase letters, numbers, and symbols. Passwords can be hacked with automated software that tries every possible combination, so the longer your password is, the more combinations it has to try. Multi-factor authentication is when you need a password and an additional step. It's also called two-step verification. This reduces the likelihood of a successful attack because there is additional information needed. Typically, this is a code sent to the user's cell phone, or a code generated by a two-factor authentication (2FA) app such as Authy. You can use a password manager to manage the various passwords for your accounts, so you're not reusing the same one, or having to try and remember all the passwords you have for all your accounts. If one account gets hacked, then any other account using the same password can also more easily get hacked. And whatever you do, avoid using the word “password” as your password at all costs. There are many password manger options. Some are: • Dashlane • LastPass • LogMeOnce • Keeper • NordPass • Bitwarden • RememBear • 1Password • PasswordBoss • Enpass • RoboForm • ZohoVault • TrueKey 2. Secure Your Wi-Fi Network Make sure your Wi-Fi is secure and hidden. While your router typically comes with a pre-set password, make sure to change it immediately to something more secure. Additionally, if you offer free Wi-Fi to your guests, create a separate guest network with a different password, so they don't have access to your company's network. You're ultimately responsible for what people do on your network. By securing your guest network with a password, you can control who has access to it and make sure you're not opening up your business to considerable risks. Also check that encryption is enabled on your router. Encryption provides data security for sensitive information, and enabling it scrambles plain text that's sent or stored on the web into unreadable, or “cipher text.” Once it's sent to the end user, the text is unscrambled, or decrypted. If you're out of the office or in a public area, avoid using the free Wi-Fi network. As tempting as it may be to check your email at the airport, there are a lot of potential risks that come with a free public network, such as opening yourself up to hackers. Look for a network that's secured with a strong password, and if you can't find one and absolutely need to hop online, use your phone as a temporarily private hotspot. 3. Backup Your Data Regularly If your system gets hacked, not only will others gain access to sensitive information, but you may lose access to your own data. Backing up your data regularly to the cloud will still give you access to it if anything happens. Ransomware attacks happen by locking you out of your data and preventing access until you pay a ransom fee. If you have a recent copy of your data, you don't need to worry about getting that information back. How often you backup your data depends on your business and how much information you're storing. At the very least, you should back it up after any important task has been completed. Some backup service options are: • https://www.carbonite.com/en/ • https://mozy.com/ • www.mypcbackup.com • www.justcloud.com • www.backupgenie.com • www.zipcloud.com • www5.ibackup.com • www.crashplan.com • www.sosonlinebackup.com • https://www.idrive.com/index.html 4. Create Separate User Accounts for Each Team Member As much as you'd love to retain your team members for as long as possible, the time will sometimes come for them to move on. Hopefully that's on good terms, but in case it's not, it's always safer to make sure you can easily delete their individual user accounts. Having separate user accounts also helps keep track of version history, or who makes changes to what. If anything ever happens to your files or data, you'll be able to track who the last person to make the changes was so you can restore the files. Make sure that when your employees are setting up their user accounts, they understand how to set up a strong password. 5. Encrypt Any Data Sent Via Email Cybersecurity training should be part of any new employee onboarding. This includes training employees on the types of data to send or not to send through email. Any sensitive information, such as login information and passwords, credit card information, or social security information, should never be sent through email. Tools such as Enigmail are useful security tools to encrypt your email. Never email any confidential information to anyone via email. Passwords can be sent through software such as LastPass. The same way you wouldn't want to send sensitive information on a postcard for everyone to see, you should be cautious about what you send through email in case you get hacked. 6. Implement Anti-Virus Software and Firewalls Anti-virus software and firewalls block malicious software from getting into and infecting your computer. They guard your system from any suspicious activity or users trying to make contact with it. It's like a security guard, making sure only the people on your approved list are let in. VPNs mask your identity on the internet and protect your location and online activities. A VPN is like a middleman—when you go to a site, the site sees the VPN's IP address, not your own personal IP address. You get what you pay for, so it's a good idea to pay for a VPN service instead of going with a free one. A decent VPN can cost you between $5-$12 per month, which is a small price to pay for added security. Anti-virus software can protect your computer from things like spyware, adware, or trojan horses. Firewalls, on the other hand, protect your network from suspicious traffic. Together, you have the best chance of fighting cyberattacks from various angles. A few anti-virus software options are: • McAfee • Norton • Total AV • Surfshark • Kaspersky • Bitdefender • AURA • Panda • Avira If you don't already have a cybersecurity strategy in place, now's the time to implement one. Take a look at the systems you have and get a sense of what needs to be done to protect them from all angles, whether that's using two-factor authentication, backing up your data regularly, using a VPN, implementing anti-virus software, or encrypting any sensitive information sent over email. It's your job as a business owner to protect your company and its assets from cyberattacks. Putting in the work now and having the proper tools to build resilience to threats will definitely pay off. For more help with growing your business and accelerating your results, reach out to me today and schedule your complimentary consultation. Aim for what you want each and every day! Anne Bachrach The Accountability Coach™ The Results Accelerator™ To help you stay focused and on track to achieving your goals, check out these other high-value resources. Subscribe to my high-value business success tips and resources Blog https://www.accountabilitycoach.com/blog/) - Subscribe to my YouTube channel with business success principles (https://www.youtube.com/annebachrach) - Connect with me on Facebook (https://www.facebook.com/TheAccountabilityCoach) - Connect with me on Linked-in (https://www.linkedin.com/in/annebachrach) - Connect with me on Pinterest (https://pinterest.com/resultsrule/) - Connect with me on Instagram (https://www.instagram.com/annebachrach/) If you are getting value from any of Podcasts, please take a minute to leave me a short rating and review. I would really appreciate it, and love to hear from you. Go to https://www.accountabilitycoach.com to check out for yourself how I, as your Accountability Coach™, can help you get and stay focused on you highest payoff activities that put you in the highest probability position to achieve your professional and personal goals, so you can enjoy the kind of business and life you truly want and deserve. Get your daily Accountability Minute shot of a single, simple, doable idea, so you can start your day off on the "right foot". You can find The Accountability Minute on https://www.accountabilitycoach.com/my-podcast/ as well as on most podcast platforms and in most English-speaking countries. As an experienced accountability coach and author of 5 books, I help business professionals make more money, work less, and enjoy even better work life balance. Check out my proven business accelerator resources by going to https://www.accountabilitycoach.com/coaching-store/. Author of Excuses Don't Count; Results Rule, Live Life with No Regrets, No Excuses, and the Work Life Balance Emergency Kit, The Roadmap To Success with Stephen Covey and Ken Blanchard, and more.
One of the biggest concerns among cybersecurity people is the advent of quantum computers. The theory is, quantum will be so powerful it will easily crack encryption algorithms conventional computers would take thousands of years to crack. Now, the National Institute of Standards and Technology has issued four cryptographic algorithms researchers believe are quantum resistant. Joining the Federal Drive with details, NIST mathematician Dustin Moody.
Today we have an amazing episode. I interviewed Dan Draper the CEO and Founder of Cipherstash, a cybersecurity startup and Executive Producer of the documentary Debugging Diversity. We chat about his journey in cybersecurity, his work Cipherstash and the importance of encryption, the documentary series Debugging Diversity, and diversity in cybersecurity. You can visit the show's website at nothingaboutyou.com
Enterprise encryption is a cybersecurity first principle strategy. Encryption is like mortar to our first principle wall. It holds together resilience and zero trust for material data. Rick explains the history of famous cryptographic techniques, dives into SolarWinds as an example of zero trust and encryption failure, and identifies some strategies to help implement encryption for data at rest and data in motion. The Hash Table reveals a risk-based approach to deploying encryption and makes a solid case for extensive enterprise encryption to defend against ransomware extortion. With Rick Howard, the Cyberwire's CSO and Chief Analyst, joined by Don Welch, the Penn State University Interim VP for IT and CIO, and Wayne Moore, the Simply Business CISO discuss Enterprise encryption as a first principle strategy. Cybersecurity professional development and continued education. You will learn about: cryptographic techniques, data at rest and in motion, encryption for data islands, open source and commercial encryption tools, protection against ransomware and extortion. CyberWire is the world's most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram Additional first principles resources for your cybersecurity program. For more encryption and cybersecurity first principles resources, check the topic essay.
Not sure what encryption is? Here's a quick explanation, plus how to tell if your texts are encrypted. In this episode, you'll get the scoop on new Netflix ads, the creepiest tech to watch out for and how to hide your phone number when making a call. Learn more about your ad choices. Visit megaphone.fm/adchoices
Rachel-Rose O'Leary was an artist before getting into crypto through Nick Land and Julian Assange. She's now a programmer working with Amir Taaki to build a crypto-anarchist DeFi ecosystem called DarkFi.✦ DarkFi✦ Rachel-Rose on TwitterOther Life✦ Subscribe to the coolest newsletter in the world OtherLife.co✦ Get a free Urbit planet at imperceptible.computer✦ We're building a new country at imperceptible.countryIndieThinkers.org✦ If you're working on independent intellectual work, join the next cohort of IndieThinkers.org
Ransomware Update, Quantum Resistant Encryption, China leak & TikTok Cybersecurity News CyberHub Podcast July 6th, 2022 Today's Headlines and the latest #cybernews from the desk of the #CISO: Hive Ransomware Upgrades to Rust for More Sophisticated Encryption Method New RedAlert Ransomware targets Windows, Linux VMware ESXi servers NIST selects first group of quantum-resistant encryption tools Human Error Blamed for Leak of 1 Billion Records of Chinese Citizens US Senators Call for Close Look at TikTok Story Links: https://thehackernews.com/2022/07/hive-ransomware-upgrades-to-rust-for.html https://www.bleepingcomputer.com/news/security/new-redalert-ransomware-targets-windows-linux-vmware-esxi-servers/ https://therecord.media/nist-selects-first-group-of-quantum-resistant-encryption-tools/ https://threatpost.com/hbillion-records/180125/ https://www.securityweek.com/us-senators-call-close-look-tiktok “The Microsoft Doctrine” by James Azar now on Substack https://jamesazar.substack.com/p/the-microsoft-doctrine The Practitioner Brief is sponsored by: Your BRAND here - Contact us for opportunities today! ****** Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Digital Debate, and Other Side of Cyber James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/ Telegram: CyberHub Podcast ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/c/TheCyberHubPodcast Rumble: https://rumble.com/c/c-1353861 s Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen here: https://linktr.ee/cyberhubpodcast The Hub of the Infosec Community. Our mission is to provide substantive and quality content that's more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. Thank you for watching and Please Don't forget to Like this video and Subscribe to my Channel! #cybernews #infosec #cybersecurity #cyberhubpodcast #practitionerbrief #cisotalk #ciso #infosecnews #infosec #infosecurity #cybersecuritytips #podcast #technews #tinkertribe #givingback #securitytribe #securitygang #informationsecurity
Enterprise encryption is a cybersecurity first principle strategy. Encryption is like mortar to our first principle wall. It holds together resilience and zero trust for material data. Rick explains the history of famous cryptographic techniques, dives into SolarWinds as an example of zero trust and encryption failure, and identifies some strategies to help implement encryption for data at rest and data in motion. Cybersecurity professional development and continued education. You will learn about: cryptographic techniques, data at rest and in motion, encryption for data islands, open source and commercial encryption tools, protection against ransomware and extortion. CyberWire is the world's most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram Additional first principles resources for your cybersecurity program. For more encryption and cybersecurity first principles resources, check the topic essay.
Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing The Loop The "Hertzbleed" Attack We invite you to read our show notes at https://www.grc.com/sn/SN-877-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: drata.com/twit barracuda.com/securitynow Melissa.com/twit
Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing The Loop The "Hertzbleed" Attack We invite you to read our show notes at https://www.grc.com/sn/SN-877-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: drata.com/twit barracuda.com/securitynow Melissa.com/twit
Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing The Loop The "Hertzbleed" Attack We invite you to read our show notes at https://www.grc.com/sn/SN-877-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: drata.com/twit barracuda.com/securitynow Melissa.com/twit
Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing The Loop The "Hertzbleed" Attack We invite you to read our show notes at https://www.grc.com/sn/SN-877-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: drata.com/twit barracuda.com/securitynow Melissa.com/twit
Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing The Loop The "Hertzbleed" Attack We invite you to read our show notes at https://www.grc.com/sn/SN-877-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: drata.com/twit barracuda.com/securitynow Melissa.com/twit
Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing The Loop The "Hertzbleed" Attack We invite you to read our show notes at https://www.grc.com/sn/SN-877-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: drata.com/twit barracuda.com/securitynow Melissa.com/twit
Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing The Loop The "Hertzbleed" Attack We invite you to read our show notes at https://www.grc.com/sn/SN-877-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: drata.com/twit barracuda.com/securitynow Melissa.com/twit
Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing The Loop The "Hertzbleed" Attack We invite you to read our show notes at https://www.grc.com/sn/SN-877-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: drata.com/twit barracuda.com/securitynow Melissa.com/twit
Lithuania sustains a major DDoS attack. Lessons from NotPetya. Conti's brand appears to have gone into hiding. Online extortion now tends to skip the ransomware proper. Josh Ray from Accenture on how social engineering is evolving for underground threat actors. Rick Howard looks at Chaos Engineering. US financial institutions conduct a coordinated cybersecurity exercise. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/122 Selected reading. Russia's Killnet hacker group says it attacked Lithuania (Reuters) The hacker group KillNet has published an ultimatum to the Lithuanian authorities (TDPel Media) 5 years after NotPetya: Lessons learned (CSO Online) The cyber security impact of Operation Russia by Anonymous (ComputerWeekly) Conti ransomware finally shuts down data leak, negotiation sites (BleepingComputer) The Conti Enterprise: ransomware gang that published data belonging to 850 companies (Group-IB) Fake copyright infringement emails install LockBit ransomware (BleepingComputer) NCC Group Monthly Threat Pulse – May 2022 (NCC Group) We're now truly in the era of ransomware as pure extortion without the encryption (Register) Wall Street Banks Quietly Test Cyber Defenses at Treasury's Direction (Bloomberg)
Josh and Kurt talk about what the actual purpose of signing artifacts is. This is one of those spaces where the chain of custody for signing content is a lot more complicated than it sometimes seems to be. Is delivering software over https just as good as using a detached signature? How did we end up here, what do we think the future looks like? This episode will have something for everyone to complain about! Show Notes Twitter thread Kurt's security advisory page Bug 998
Not sure what encryption is? Here's all you need to know, in 60 seconds. Learn more about your ad choices. Visit megaphone.fm/adchoices
Daycare apps found insecure Encryption flaws found in Mega Microsoft retires cloud facial recognition Thanks to today's episode sponsor, Optiv Modernizing your identity control plane from AD to the cloud is complex. Ralph Martino, who is leading the identity and access management (IAM) group for Optiv, discusses what challenges CISOs are facing in today's ever-changing climate: • Increasing security • Decreasing risk • Lowering cost Learn more at www.optiv.com/IAM-Microsoft.
Billions of people use Google products for their personal and professional needs -- their products are high quality after all! For example, Google Docs Editors Suite allows you to collaborate in real time with anyone in the world in a seamless experience!Unfortunately, it's not at all private -- Google gets access to ALL your personal information. In this video we look at two alternatives to Google docs that are private: Skiff and Cryptpad.00:00: Intro01:28: Why look for alternatives?03:04: Cryptpad Deep Dive06:34: Cryptpad TLDR07:15: Skiff Deep Dive10:50: Skiff TLDR 11:03: SummaryBoth platforms are free, and are secured with end-to-end encryption, so not even Skiff or Cryptpad can see what you're writing. Try them out, and let us know if you have other e2ee google-docs-alternatives that you recommend!https://cryptpad.fr/https://skiff.com/pagesHuge thank you to Andrew Milich for his time!Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
The NSA pinky swears there is "No Backdoor" in their new encryption! by Nick Espinosa, Chief Security Fanatic
SELF 2022 is a wrap! It was a blast and now the countdown begins for SELF 2023. Has technology become so complicated that it's not approachable for many people or is there a solution? The best PDF editor for Linux, a self hosted, secure, private, cloud camera system. K9 mail becomes Thunderbird for Android, Element call enters beta 2, and KDE 5.25 is out! -- During The Show -- 01:50 Jeremy H SOGO (https://www.sogo.nu/) 03:08 Keith S * Linux BackBlaze Client? Local Encryption GPG VeraCrypt (https://www.veracrypt.fr/en/Home.html) encfs (https://en.wikipedia.org/wiki/EncFS) and cryfs (https://www.cryfs.org/) TarSnap (https://www.tarsnap.com/) Spider Oak (https://spideroak.com/) Encryption gets weaker over time 10:06 Zac Signing PDFs? Okular (https://okular.kde.org/) PDF Studio (https://www.qoppa.com/pdfstudio/) Pick of the Week E2E Cloud Surveillance system using Raspberry Pis and Matrix Backend (https://github.com/Open-Source-Videos/Matrix-surveillance-camera-controller) Front End (https://github.com/Open-Source-Videos/Matrix-surveillant-camera-security-web) Prototype 16:56 Gadget of the Week ZimaBoard (https://www.zimaboard.com/) $119 USD 6W Power OpenWrt and PFSense/OPNSense Netgate SG1100 Designed to be used as a personal server Preinstalled with Casa OS PFSense Install Guide (https://www.martinrowan.co.uk/2022/05/installing-pfsense-2-6-on-zimaboard/) 20:00 Gov Buys Your Data EFF (https://www.eff.org/deeplinks/2022/06/how-federal-government-buys-our-cell-phone-location-data) Apps and Data Brokers Follow the money 3rd Party Doctrine Companies are secretive about data collection and sale Many apps are 'required' today Venntel, subsidiary of Gravy Analytics 30:40 K9 Mail to Become Thunderbird for Android Thunderbird (https://blog.thunderbird.net/2022/06/revealed-thunderbird-on-android-plans-k9/) ArsTechnica (https://arstechnica.com/gadgets/2022/06/email-client-k-9-mail-will-become-thunderbird-for-android/) Had to be Open Source Have Power User features Respect the user Blue Mail (https://bluemail.me/) Contribute Here (https://mzla.link/k9-give) 34:00 Element Call Beta 2 Matrix Blog (https://matrix.org/blog/posts) Everything is now E2E Experimental Spatial Audio Rendering Walkie-Talkie Mode (PTT) 37:00 Mozilla Enables Firefox Total Cookie Protection by Default 9 to 5 Linux (https://9to5linux.com/mozilla-enables-firefoxs-total-cookie-protection-privacy-feature-by-default-on-desktop) Firefox is leaving Chrome and Edge in the dust! 39:00 KDE Plasma 5.25 is Out! [KDE Plasma Blog]https://kde.org/announcements/plasma/5/5.25.0/ New "Floating Mode" for panels (Dock) Tablet Mode Improved input KDE Neon (https://neon.kde.org/) 43:00 2022 SELF Wrap Up Huge Thank You to the entire team People come on their own time and dime Family Friendly went well, more next year Diverse level of skill sets Where Technology is headed -- The Extra Credit Section -- For links to the articles and material referenced in this week's episode check out this week's page from our podcast dashboard! This Episode's Podcast Dashboard (http://podcast.asknoahshow.com/290) Phone Systems for Ask Noah provided by Voxtelesys (http://www.voxtelesys.com/asknoah) Join us in our dedicated chatroom #GeekLab:linuxdelta.com on Matrix (https://element.linuxdelta.com/#/room/#geeklab:linuxdelta.com) -- Stay In Touch -- Find all the resources for this show on the Ask Noah Dashboard Ask Noah Dashboard (http://www.asknoahshow.com) Need more help than a radio show can offer? Altispeed provides commercial IT services and they're excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show! Altispeed Technologies (http://www.altispeed.com/) Contact Noah live [at] asknoahshow.com -- Twitter -- Noah - Kernellinux (https://twitter.com/kernellinux) Ask Noah Show (https://twitter.com/asknoahshow) Altispeed Technologies (https://twitter.com/altispeed)
SUSE Enterprise is already switching to the new NVIDIA open kernel driver, a Matrix-powered Walkie-Talkie, and the details on Apple's Rosetta for Linux.
The big fear in the data encryption community is the advent of quantum computing. Computers so powerful they can crack any algorithm. The National Institute of Standards and Technology is in the midst of choosing among algorithms those its experts deem most resistant to quantum, as it develops post-quantum cryptography standards. Here with some pointers for federal IT security practitioners who want to better understand this technology, Federal News Network's Tom Temin spoke with the head of quantum cybersecurity at a company called Quantinuum, Duncan Jones.
As many of our readers and listeners already know, the Scotts Bluff County Scanner has been broadcasting over the internet since 2009 and has gone through lots of changes over the years.Scanner enthusiasts, and law enforcement officials both know that eventually the publicly available scanner signal could, and likely will, go encrypted. This means that the general public would simply not be able to get the signal. Only official media outlets will have access to it and they are not allowed to re-transmit it during the live event. There are varying laws as to how much they can use from an archived event in their reporting after the fact.So, someday you will not be able to listen to the Scotts Bluff County Scanner.HOWEVER, that day is not here yet and has not been voted on at the County level.– per scotts bluff county commissionersThe expense to change to all encrypted is enormous, and Scotts Bluff County ALREADY has ENCRYPTED channels installed for both SWAT and WING. The police officers also use their cell phones on many occasions when they don't want something broadcast over the scanner. IF the County would decide to move forward on a proposal of this nature, we predict there would be a large uprising against this huge, seemingly unnecessary expenditure, especially if we already employ encryption and other secure communications techniques.That's GOOD NEWS for those who follow the scanner for various reasons. Many of us believe it should remain classified as public information and encryption should only happen when the officers deem it necessary. We trust their judgement on that call, but the public information should remain public, inasmuch as it does not AID a criminal in the COMMISSION of a CRIME.It should also go without saying too many times, “PLEASE STAY AWAY FROM ANY SCENE WHENEVER POSSIBLE” and “PLEASE YIELD TO ALL EMERGENCY PERSONNEL”.Although the “Scotts Bluff County Scanner” volunteer group is NOT associated with the county or any government agency, we have always had a good working relationship with the county. We have informed them of our full cooperation on the reporting of individuals that are found to be obstructing the scene of any crime, accident or otherwise.If anyone is cited for obstruction, or any other charge related to getting in the way of our dedicated officers, firemen and volunteers, they will earn for themselves a lifetime ban from our facebook page, twitter feed, instagram feed, website and all other @sbcoscanner properties.Now, we titled this article a new era because we have alot going on behind the scenes for you. In case you missed it, we do have a small but growing scanner gear merchandise store where you can purchase T-shirts, Coffee Mugs and Totes. We'll be adding Hats, Hoodies, Tumblers and other cool items in the near future.We are also working hard on a business plan to increase our team and improve our service to the community. For instance, not only do we have a full website for the scanner, but it includes a SPONSORS section that will soon be filling up. That means YOUR BUSINESS could advertise on this fastest growing news service in the valley – The Scotts Bluff County Scanner!If you would like to volunteer to contribute local news to us, please let us know by sending an email through our parent company to Brian Hale, Business Manager at brian@halemultimedia.com directly.Look for more improvements and changes and thank you for following, sharing and listening to the Scotts Bluff County Scanner!
Listener The Gregolas asked if I might explain The Illegal Number. What makes a number illegal? Can numbers actually be illegal? Isn't that absurd? YES! See omnystudio.com/listener for privacy information.
We take a sneak peek at some future tech coming to Linux, and share details on HP's new laptop that runs POP!
In the Enterprise Security News: The latest cybersecurity fundraising, We discuss the impact of the market downturn on the cybersecurity startup industry, Crypto muggings, Security researchers researching researchers simulating attackers, & Evil Encryption! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw274
In this episode Josh interviews Cory Doctorow, science fiction author, activist and journalist. Cory has written dozens of books including the bestselling Little Brother and the critically acclaimed How To Destroy Surveillance Capitalism. Josh and Cory have a wide-ranging conversation diving into everything from anti-trust law to secure hardware in computing to Cory's years-long activism fighting for transparency and accountability in tech. Cory also shares what it was like working at the Electronic Frontier Foundation during the thick of the battle to legalize encryption, a technology that many of us now take for granted.
David Williams is the Founder, Chairman, and CEO at Arqit. In this episode, David joins host Steve Morgan to discuss why Arqit was started, what the company offers, who benefits most from their technology, and more. Arqit supplies a unique quantum encryption Platform-as-a-Service which makes the communications links of any networked device secure against current and future forms of attack – even from a quantum computer. Arqit's product, QuantumCloud™, enables any device to download a lightweight software agent of less than 200 lines of code, which can create encryption keys in partnership with any other device. The keys are computationally secure, one-time use and zero trust. QuantumCloud™ can create limitless volumes of keys in limitless group sizes and can regulate the secure entrance and exit of a device in a group. The addressable market for QuantumCloud™ is every connected device. To learn more about our sponsor, visit https://arqit.uk/
New firmware superpowers are coming to a future Linux kernel, why Google is working on encrypted hibernation support, and a sneak peek at SteamOS 3.
It's a strange situation when someone can hold something hostage from halfway around the world. It's tragic when your own pictures and files are remotely encrypted. But when it's a hospital's system? Ransomware becomes a problem about life or death. Eddy Willems recounts his involvement in defeating an early ransomware attack that targeted AIDS researchers. At the time, there was a way to discover the encryption key. But as Moti Yung warned, asymmetric encryption would change everything. In the years since, ransomware attacks have become much more popular—thanks in part to the rise of cryptocurrencies. While criminals think it's an anonymous way to collect payment, Sheila Warren tells us that the opposite is actually true.If you want to read up on some of our research on ransomware, you can check out all our bonus material over at redhat.com/commandlineheroes. Follow along with the episode transcript.