Connect with us

Cyber Security

Multiparty Encryption Allows Companies to Solve Security-Data Conundrum

Published

on

An interdisciplinary research team constructs a way for companies to share breach data without revealing specific details that could exposes businesses to legal risk.

A system that allows companies to submit breach data anonymously and then benefit from the aggregate statistics for their industries could give executives and policymakers a more accurate understanding of how breaches impact businesses and give companies the timely threat intelligence they need to prepare for attacks.

The Secure Cyber Risk Aggregation and Measurement (SCRAM) system — created by an interdisciplinary team of policy, financial, and computer-science researchers at the Massachussetts Institute of Technology (MIT) — uses a special type of encryption to allow various calculations to be performed on protected data in the context of a multiparty computation (MPC) system. An initial proof-of-concept trial not only delivered aggregate breach data for a group of six companies, but it also collected information about the adoption rate of security controls and the controls blamed for the greatest loss. 

The researchers plan to next conduct a larger trial of the technology with 60 to 70 companies in several industries to gather sector-specific data, says Taylor Reynolds, technology policy director of MIT’s Internet Policy Research Initiative.

“We have shown that firms are willing to share this really sensitive data as long as they know it is going to be protected,” he says. “And what that does is it opens up a whole new set of data and statistics for us that will allow us better to better defend our networks.”

The research could solve one of the most enduring problems of cybersecurity: the lack of good data on breaches and information on what controls are working. While several industries — most notably healthcare — are required to disclose information on cybersecurity incidents, the practice remains relatively uncommon and minor cybersecurity events have always been underreported. 

A privacy-preserving system could solve the major hurdle preventing such sharing of data, says Darren Van Booven, lead principal consultant at security-services firm Trustwave.

“One of the things that I’ve always noticed over the course of my career is the difficulty in being able to get quality information on what works and what doesn’t, what have other organizations found to be more effective in the way of controls, and what exactly are the losses that have been occurred,” he says. “This impacts the job of every CISO because they are trying to report to their executive leadership on what exactly the real risk to their company is right now.”

The idea for the system came out of interviews with executives in critical-infrastructure industries, such as financial, oil and gas, and the electric industries. Each industry wanted data, but no executive wanted to put their business at risk by acknowledging breaches, says MIT’s Reynolds

“One of the messages that kept coming out was they needed a better way to share data and share information because the current methods are not working,” he says. “We put our minds together and knew we had the pieces … let’s get together and devise a way that firms can share data securely without having to reveal it or disclose it to anyone else.”

The group of researchers created an MPC system that preserves privacy. The system is enabled by a special type of encryption that allows some types of math to be performed on the encrypted values. Known as threshold homomorphic encryption, the technique is a special way of protecting data by allowing each party to encrypt the information and then decrypt the results of any aggregate calculation. 

The technique solves two problems with other methods of aggregation. Take, for example, a gathering of people who wants to share information on salaries. They could give all the information to a trusted third party, which could then do the calculations and provide an average income for the group. The third party, however, could be compromised or, in the end, found untrustworthy, resulting in a leak of information on a specific person’s salary — a violation of privacy. Alternatively, the group could put all the information into a hat and then aggregate the data, but participants could potentially be identified from just knowing the details of any single incident.

However, if each participant added a large random number to their salary, then passed along the total to the next person, no individual salary would be compromised. In a second round of calculation, each person could subtract the large random amount they had previously added, resulting in the exact sum of their incomes.

“Nowhere along that path did anyone have to reveal their own salary in order for us to run that computation,” Reynolds says. “It is that type of mathematical modeling that allows us to run those computations on the platform.”

The SCRAM system uses a similar approach with homomorphic encryption, a type of privacy-preserving cryptography that allows calculations on encrypted data. 

The pilot project collected data on more than 49 security incidents from the six large private-sector firms and the specific security-control failures that the companies blamed for each incident. Centralized log management was the top control failure linked to breaches, associated with almost $6 million in aggregate losses over the 49 security incidents.

Future trials will attempt to structure the questions and answers to reveal stronger links between controls and breach damages, says Reynolds.

“The Holy Grail here is trying to understand return on investment of security controls,” he says. “If I spend the money on X, what will be the return on investment that I get on that when I do risk modeling?”

With the privacy-preserving system, such data may no longer be out of reach.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Recommended Reading:

More Insights

Source: https://www.darkreading.com/threat-intelligence/multiparty-encryption-allows-companies-to-solve-security-data-conundrum/d/d-id/1338867?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Cyber Security

Galaxy S17

Published

on

Table of Contents

Samsung Galaxy S17 2021: Release Date, Specifications, Price and More!
This is what it looks like!

Samsung Galaxy S172021: Hello Friends. How are you? I hope you are all well. For those who want to buy a replacement phone, it may be great news that Samsung Galaxy S 2021, which is the most famous brand in the world, will bring a new Samsung phone or sell. We heard this phone news via online media. There are many types of videos that can be shared on video sharing media. The Samsung Galaxy S17 2021 smartphone is one of the most awaited mobiles in the world.

This phone will be the most expensive mobile of the year. If you are able to understand the phone, the Samsung Galaxy S17 will come with a replacement Android OS model. This smartphone’s Release Date, Price and Full Specification is shared. Keep reading and stay with us.

Samsung Galaxy 17’s display contains many types of news that we know. However, not all information is accurate. Experts have stated that this collection will have a full-screen display. The display resolution will be 1445×3040 pixels. Let’s take a look at the full specifications of this phone. The Galaxy S17 specifications include a 6. 1-inch Super AMOLED full-screen display with 1445×3040 pixels. This smartphone also features a 19:5:9 ratio.

Full Specification for Samsung Galaxy S17

A chipset snapdragon 870+ processor will be found. The storage will be 12GB RAM and 256GB ROM. Support for 1TB external SD cards will be provided. 6G Network technology could be added to it with support for 5G, 4G and 3G Networks, but that’s a rumor. No one can guarantee it. The specifications for the Samsung Galaxy S17 include:

  • 48 MP Front Camera
  • 5 Cameras with LED Flash (96MP + 64MP+ 48MP + 32MP+ 32MP + 16MP).
  • 16 K video Opportunity
  • Super AMOLED Display with 1440×3040 Pixel Resolution
  • Water and scratch-resistant glass (Corning Gorilla Glass7+), Light sensor Proximity sensor, Accelerometer Compass, Gyroscope
  • Processor: Octa-core, 2840 MHz, Kryo 500, 64-bit, 7nm.
  • Android Q 10 OS
  • 7000 mAh Battery
  • Fast Charging supported
  • Support via wireless
  • video 3840×2160 (4K HD) (60 FPS), 1920×1080(Full HD), (240fps), 1280×720(HD) (1280fps), 960 FPS)
  • Dimension: 5.90×2.77×0.31 inches (149.4×7.8 mm).
  • Fingerprint Sensor
  • Face ID
  • Waterproof
  • Dual Nano SIM Card
  • Many more features

Samsung Galaxy S17 2021: Battery and RAM.

Samsung Galaxy 17 2021 battery is a great choice for those who use the internet and want to play online games. The batteries are fast and can be charged quickly and last a long time. The massive 6360mAh battery in this Samsung smartphone is impressive. The massive 6360mAh lithium-ion battery in this Samsung smartphone is impressive. The Samsung Galaxy S17 has a 64MP + 43MP + 32MP + 16MP rear camera. There’s also a 48MP camera for video calls and selfies. Two storage options and two RAM options are available on the Samsung smartphone. This smartphone has 10GB/12GB RAM and 256GB or 512GB internal memory. A MicroSD card can be used to expand storage up to 1TB.

Samsung Galaxy S17 Price

This phone is not expensive, and it’s usually $1270. When Samsung officially announces the value, we will keep you informed. Keep watching our website to see all the latest updates and get the ultimate phone, the most capable.

Samsung Galaxy S17 Release Date

It is expected to be released 10 Oct 2020, but we will inform you about the exact date after the official announcement by Samsung, the largest worldwide company. We will have to wait and see.

Samsung Galaxy S17 Price

This phone is expected to be $1270. We will keep you informed about the official announcement by Samsung. Keep checking our website for all the latest information.

Country Price (Expected)
1. Samsung Galaxy S17 Price in India 54900 INR.
2. Samsung Galaxy S17 Price in Pakistan 119500 PAK.
3. Samsung Galaxy S17 Price in USA Country 1270 USD

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/galaxy-s17/

Continue Reading

Cyber Security

How To Connect AirPods To Lenovo Laptop?

Published

on

We now live in a wireless earbud era, which has revolutionized and changed the way we listen to and experience music. Apple AirPods are one of the most popular wireless earbuds on the market, and they’ve completely transformed our way of listening to and consuming music, especially as we learned to use Bluetooth to connect directly with our ThinkPad.

One of the amazing features of the AirPods that people don’t seem to talk about is their ability to connect to non-Apple devices that accept Bluetooth, such as a ThinkPad or other Lenovo laptop.

In this article, I’ll go through how to connect AirPods to a Lenovo laptop, as well as what to do if they refuse to pair. I’ll also show you what you can do if your Lenovo laptop doesn’t have Bluetooth capability and you want to connect your Airpods.

In a few simple steps, learn how to connect your AirPods to your Windows PC.

Apple’s AirPods are Bluetooth earbuds that are completely cordless and developed specifically for iOS devices like the iPhone and iPad. However, AirPods are compatible with a wide range of other devices, including Android phones and computers.

Of course, if you use AirPods with a PC, you won’t be able to use Siri because that feature is only available when the buds are connected to an iPhone or iPad.

SEE ALSO:

Top 5 Best Text to Speech (TTS) Softwares

However, if you want to use your AirPods with your |along with your > PC while they aren’t paired with your iPhone, here’s how to do it.

It is extremely possible to connect any type of AirPods to your Lenovo laptop or ThinkPad, and if you are in a hurry, follow these instructions.

How to connect AirPods to a Lenovo laptop is as follows:

  1. To access settings, press Windows key + I.
  2. Select Devices from the Settings menu.
  3. Bluetooth should be enabled.
  4. Add Bluetooth or other devices is the option to choose.
  5. Bluetooth is a good option.
  6. Now, take your AirPods case and open the cover.
  7. Press and hold the button on the back of your AirPods case.
  8. When you see a white light, release the button.
  9. Choose your AirPods from the list of devices that have been discovered.
  10. To finish, click Done.

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/how-to-connect-airpods-to-lenovo-laptop/

Continue Reading

Cyber Security

Bitdefender Ransomware Vaccine

Published

on

The “Bitdefender ransomware vaccine” can be seen here.

To address the escalating ransomware menace, Bitdefender is distributing a ‘vaccine.’

Bitdefender, a Romanian security software provider, has released a free replacement programme to prevent your machine from being infected by ransomware.

Table of Contents

Bitdefender Ransomware Vaccine

The Bitdefender Antiransomware vaccine protects your system from crypto-ransomware such as CTB-Locker, Locky, and TeslaCrypt by making it appear as though it has already been infected with malware.

Various ransomware strains, such as variants of Locky and TeslaCrypt, frequently employ a mechanism that detects if a computer has already been infected with the malware and had its files encrypted. Bitdefender’s new software, on the other hand, claims to be able to mimic these checks, meaning that if your computer is ever infected with ransomware, the virus will bypass it.

“In some ways, the new technology is an offshoot of the Cryptowall vaccine programme,” said Catalin Cosoi, Bitdefender’s senior security strategist. “We had been looking for a solution to prevent this ransomware from encrypting files even on PCs that were not covered by Bitdefender antivirus, and we recognised we could expand the thought.”

SEE ALSO:

Dell informed customers that updates released patch to fix critical vulnerabilities

The original Cryptowall vaccine tool functioned similarly, but it may soon become obsolete and in need of an upgrade to keep up with how ransomware evolves and becomes more complex.

Bitdefender’s latest tool covers many more ransomware variants than before, but it’s not an all-in-one solution or blatant prevention tool.

Ransomware has recently taken on new forms, including a strain that targets WordPress sites rather than computers. As a result, this new anti-ransomware vaccine should not be viewed as a long-term solution, as more sophisticated threats may arise sooner rather than later.

Bitdefender isn’t the only company working on a ransomware vaccination. Sean Williams, a developer, is working on a tool called Cryptostalker to prevent ransomware from infecting Linux systems, while researcher Sylvain Sarméjeanne is working on a Locky-fighting tool.

Bitdefender Antivirus Free Edition with Combination Crypto-Ransomware Vaccine User Questions

Bitdefender Antivirus Free Edition is what I’m using. Is it required or suggested to utilise this Bitdefender tool in addition?

The Position of Bitdefender on Ransomware and Decryptors

Remediation for Ransomware: Bitdefender Ransomware Protection can help you recover ransomware-encrypted files (& etc.)
Does BitDefender Anti-Virus Free come with the ransomware protection that BitDefender Anti-Ransomware Free offers?

Vaccine Against Crypto-Ransomware in Combination Has Been Released

By leveraging gaps in the crypto ransomware families’ spreading mechanisms, Bitdefender anti-malware experts have created a replacement vaccine tool that may guard against known and possibly future versions of the CTB-Locker, Locky, and TeslaCrypt crypto ransomware families.

SEE ALSO:

Microsoft Detailed the Steps Involved in the Processing of Vulnerability Reports

“In some ways, the new tool is an offshoot of the Cryptowall vaccine programme.” Catalin Cosoi, the Chief Security Strategist, explained. “We had been looking for a solution to prevent this ransomware from encrypting files even on PCs that were not covered by Bitdefender antivirus, and we recognised we could expand the thought.”

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/bitdefender-ransomware-vaccine/

Continue Reading

Cyber Security

Windows Firewall Allow Ping

Published

on

Table of Contents

Using Group Policy, enable ICMP (PING) over the Windows Firewall with Advanced Security

Prerequisites

On Windows 7, Windows 8, Windows Server 2008, Windows, or Server 2012, you’ll need the Group Policy Management Tools. These are part of the Remote Server Administration Tools (RSAT), which may be downloaded from Microsoft’s website.

Instructions

Please follow these instructions to activate ICMP on devices using Windows Firewall with Advanced Security (Windows Vista, Windows 7, Windows 8, Windows Server 2008, Windows Server 2012).

  1. Using the Group Policy Management Tool, you can edit an existing Group Policy object or create a new one.
  2. Expand the node pc Configuration/Policies/Windows Settings/Security Settings/Windows Firewall with Advanced Security/Windows Firewall with Advanced Security/Inbound Rules in the pc Configuration/Policies/Windows Settings/Security Settings/Windows Firewall with Advanced Security/Windows Firewall with Advanced Security/Windows Firewall with Advanced Security/Windows Firewall with Advanced Security/
  3. Click Next after selecting the Custom radio button.
  4. Select the radio box for All Programs and then click Next.
  5. Select ICMPv4 from the Protocol Type: sink list and click Customize…
  6. Check the radio selection for All ICMP types and then click OK.
  7. Note: If you want to limit ICMP to specific types, you need allow at least Echo Request.
  8. You can either limit which IP addresses ICMP can and cannot communicate with, or tick the Any IP address radio buttons to allow all, then click Next.
  9. Click Next after checking the Allow Connection radio option.
  10. Select which profiles will be affected by the rule. At the very least, tick the Domain profile checkbox and then click Next.
  11. Remove the Name: field from the rule and give it a relevant name. If desired, create an outline and then click Finish to depart and save the new law.
  12. Using the Group Policy Management Tool, verify that the Group Policy Object is applied to the appropriate computers.
    Allow pings over the Windows firewall.

SEE ALSO:

Top 10 Best Android Emulator for Windows Mobile Applications-2019

Overview

Ping requests are prohibited by default if you have the Windows Firewall Allow Ping option activated. The University Information Security Office’s (ISO) vulnerability scanners are unable to work as a result of this. Follow the procedures below to configure your firewall to allow pings.

To complete these tasks, you may be asked for administrator access.

Firewall in Windows

  1. Open Windows Firewall by searching for it and clicking on it.
  2. On the left, select Advanced Settings.
  3. Click Inbound Rules in the left pane of the resultant window.
  4. File and Printer Sharing (Echo Request – ICMPv4-In) is one of the fundamentals.
  5. Enable each rule by right-clicking it and selecting Enable Rule.

Firewalls from third parties

See Vulnerability Scanners if you use a third-party firewall application or appliance.

It’s difficult to hide all conceivable ways of enabling ping on all possible firewalls because each third-party firewall is set differently.

However, to fill out the form to configure your firewall, you’ll need the following information:

  • Many firewalls allow you to whitelist specific IP addresses or ranges. Vulnerability Scanners has the IP ranges for UISO scanners.
  • Some firewalls allow specified protocols or services to pass through. You should enable ping in certain instances. The setting is known as “ping” or “incoming ping” on some firewalls. Others inquire about it using the technical term “ICMP Echo Reply.” Allow this protocol in either case.
  • Many firewalls also include options for allowing specific ports to communicate (do not confuse networking TCP ports with the physical serial, parallel, USB, or Ethernet ports). Don’t worry about those settings for the UISO scanner; only “ping” (ICMP Echo Reply), which doesn’t require ports, has to be enabled. With other reasons, you’ll want to allow or disallow specific ports, but it’s pointless to try to do so for the UISO scanner.

SEE ALSO:

Windows Defender Mistakenly Considered Citrix Services as Malware

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/windows-firewall-allow-ping/

Continue Reading
Energy19 mins ago

AutoGrid To Provide Turnkey ‘Virtual Power Plant’ to Clean Power Alliance’s Power Response Program to Improve Reliability of California Grid

Energy36 mins ago

Silvercorp to Highlight Innovative Waste Reduction Initiatives in Upcoming Annual Sustainability Report

Esports2 hours ago

Will New World be released on console?

Esports2 hours ago

How to watch today’s ALGS Pro League qualifiers

Energy2 hours ago

Ranked: The 50 Companies That Use the Highest Percentage of Green Energy

Esports2 hours ago

Asuna’s VALORANT settings: Keybinds and crosshair

Esports2 hours ago

How to add a lurk command on Twitch

Esports2 hours ago

How to add a lurk command on Twitch

Esports2 hours ago

Visitors from Verdansk: How Apex gained viewers and players as Warzone struggled

Esports2 hours ago

Visitors from Verdansk: How Apex gained viewers and players as Warzone struggled

Esports2 hours ago

The top 10 players at Worlds 2021

Esports2 hours ago

The top 10 players at Worlds 2021

Australia
Esports2 hours ago

IEM Fall initial matchups announced

Esports2 hours ago

Hard vs. soft mouse pads: Which is better for gaming?

Esports3 hours ago

Best full-backs in FIFA 22 Ultimate Team

Esports3 hours ago

5 Things We Don’t Want in League of Legends Patch 11.20

Esports3 hours ago

League of Legends Patch 11.20 Release Date

Esports3 hours ago

Pokemon GO Master League Breakdown: Sept. 27-Oct. 11

Esports3 hours ago

How to get ‘No Shirt’ in NBA 2K22

Esports3 hours ago

When Does League of Legends Season 11 End?

Esports3 hours ago

5 Things We Want in League of Legends Patch 11.20

Esports3 hours ago

Overwatch 2 Erases All Mention of Jeff Kaplan Following New Reference Protocol

Esports3 hours ago

Overwatch 2 Erases All Mention of Jeff Kaplan Following New Reference Protocol

Esports3 hours ago

VALORANT fans can watch NA VCT Last Chance Qualifier in select theaters

Energy3 hours ago

Stealth Power Launches Electric Power Take-Off (ePTO) Solution Expanding the Company’s Offerings for Utilities Sector

Esports3 hours ago

VALORANT player prevents double kill with perfectly timed Sage wall

Esports4 hours ago

Pokemon UNITE Mamoswine Release Date Revealed

Esports4 hours ago

Pokemon UNITE Mamoswine Release Date Revealed

Energy4 hours ago

Insights on the Boron Carbide Global Market to 2027 – Featuring CoorsTek, Electro Abrasives and Kyocera Among Others

Energy4 hours ago

Household Insecticides Market size to increase by almost $ 5 Bn during 2021-2025 | Growing Opportunities in Household Products Industry | 17,000+ Technavio Research Reports

Trending