Telegram loses appeal to keep encryption keys from Russian government

How Complete Beginners are using an ‘Untapped’ Google Network to create Passive Income ON DEMAND

Telegram is a popular messaging service in Russia, partially because of its encrypted communication capabilities. However, the company may be forced to disclose its encryption keys if a new court ruling stands. Russian Supreme Court Judge Alla Nazarova denied Telegram’s appeal today, ordering Telegram to hand over the keys to the Federal Security Service (FSB).

Russia is in the midst of a crackdown on secure messaging clients following the implementation of new anti-terrorism laws in 2016.

Read More

Telegram loses appeal to keep encryption keys from Russian government was written by the awesome team at Android Police.

Android Police – Android news, reviews, apps, games, phones, tablets

Cash For Apps: Make money with android app

Apple officially moves its Chinese iCloud operations and encryption keys to China

Today Apple formally transferred its Chinese iCloud operations to a local firm in southern China. It also began hosting its iCloud encryption keys in China, instead of the US, for the first time. The move has been expected since last year when Apple announced its partnership with Guizhou-Cloud Big Data (GCBD), a Chinese firm supervised by a board ran by government-owned businesses, with close ties to the government and Chinese Communist Party.

Apple users with iCloud accounts registered in China will now have their data hosted by the GCBD center. Users who don’t want their data handed over can choose to delete their Chinese iCloud accounts. Apple has told Reuters that it won’t transfer accounts over to the new data center unless users…

Continue reading…

The Verge – All Posts

EnvKey wants to create a smarter place to store a company’s API keys and credentials

The Best Guide To Selling Your Old Phones With High Profit

 If an engineer ends up leaving a company, on their own, or for any other reason, the company work is going to have to quickly work to change all of their keys for their credentials and keys application components. That’s a huge hassle, because often times it’s hard to know where they are stored, who can access what, and how to change everything at a massive scale — especially… Read More
Mobile – TechCrunch

Apple’s China data migration includes iCloud keys, making data requests easier for authorities

Apple announced last year that it was moving Chinese customer iCloud operations to China in an effort to comply with local laws, with the move officially taking place at the end of this month. Reuters today reports that among the information being are iCloud customer keys…

more…

9to5Mac

Apple will store China’s iCloud keys on local servers

Apple has already bent over backwards in a bid to keep doing business in China, but it'll have to bend a little further. As of the end of February, the company will host mainland Chinese users' iCloud keys on servers located within the country — an…
Engadget RSS Feed

Apple to move Chinese iCloud keys to China servers, opens door to government data requests

Article Image

In order to conform with Chinese cybersecurity laws, Apple will for the first time move cryptographic iCloud account keys out of the U.S. and into China when it migrates customer data to a local server farm in late February.
AppleInsider – Frontpage News

Nokia 6 (2018) loses capacitive keys and moves fingerprint sensor to back

It’s been about a year since we first heard about the new Nokia phones, including the Nokia 6. Although it took a bit longer for the phone to hit stateside, it rounded out HMD Global’s new Android portfolio reasonably well. What few disadvantages we might have seen appear to be fixed in the 2018 version, which just leaked in a detailed product listing by Chinese retailer Suning.

Specs

SoC 2.2GHz Qualcomm Snapdragon 630
RAM 4GB
Storage 32/64GB, microSD
Software Android Nougat 7.1.1, Oreo 8.0 promised
Primary Camera 16MP f/2.0 w/”OZO Audio” recording
Front-facing Camera 8MP f/2.0
Battery 3,000mAh (Micro-USB)
Dimensions 148.8mm (5.85″) x 75.8mm (2.98″) x 8.15mm (0.32″)
Price 32GB CNY1,499, 64GB CNY1,699

On paper, the 2018 version of the Nokia 6 is nearly identical to its forebear, with only a few tweaks such as the chipset and some trickle-down features like the “bothie” from the Nokia 7 and 8.

Read More

Nokia 6 (2018) loses capacitive keys and moves fingerprint sensor to back was written by the awesome team at Android Police.

Android Police – Android News, Apps, Games, Phones, Tablets

IK Multimedia ships iRig Keys I/O keyboard MIDI interface that can record microphones and other instruments

Article Image

K Multimedia has added another device to its audio interface line, introducing the iRig Keys I/O as pair of MFi-certified MIDI controllers that can be used to create music on an iPhone or iPad, using its included keyboard or via another instrument or microphone using the device as a preamp.
AppleInsider – Frontpage News

Google rumored to replace 2-factor with ‘Advanced Protection’ keys

According to Bloomberg, Google is close to rolling out a hardware replacement for current 2-factor authentication setups. Right now, adding the need for a constantly changing code is one of the best ways to protect your account beyond just a password…
Engadget RSS Feed

Frost & Sullivan: AI and big data hold keys to IoT security

AI and big data hold keys to IoT security, says Frost & Sullivan

A Frost & Sullivan report identifies key trends to address connected device security concerns.

Emerging technologies such as artificial intelligence, big data and context-aware computing could help in fixing the security problems associated with the IoT, according to a report published by analyst company Frost & Sullivan.

Its new report, Cybersecurity Innovations in the Connected World, says that pervasive security through context-aware access control is one of the future areas currently being explored by developers.

By using such technologies, developers can “accurately analyse user data at every node of the network, thereby delivering an all-in-one packaged security solution that offers user application and flexibility across any sector for optional interoperability in a connected world”, the analyst firm said.

Read more: HPE Aruba weaves new fabric for analytics-driven IoT security

Burgeoning biometrics

The report identifies the key technology development areas within cybersecurity ecosystems and highlights security and technology innovations, challenges, primary attack surfaces, major standardisation activities, and alliances that enhance security.

Frost & Sullivan TechVision senior industry analyst Swapnadeep Nayak said that, despite fingerprint technology’s higher growth and significant revenue contribution in the past, new technologies such as iris, face and vein recognition are witnessing strong adoption across industries.

“These new forms of biometric authentication are primarily focused toward improving the accuracy and flexibility of usage for end-users,” he said. “In addition, advanced analytics is playing a vital role in empowering businesses to draw fast, actionable insights from connected ecosystems while delivering granular segmentation for more accurate analysis.”

Read more: Security researchers warn of ‘airborne’ IoT malware, Blueborne

Data integrity and security

Confidentiality and integrity of data and systems can be compromised at any point of time by hackers attacking the connected ecosystem. These security breaches could lead to significant costs for enterprises by disrupting services thereby reducing satisfaction for customers and hampering brand image.

Security challenges often faced by organisations include lack of security standards, lack of comprehensive security solution to mitigate threats, and lack of cross-platform security technology.

“The lack of secured integrated systems for cross-industry applicability is hindering the adoption of Internet of Things. The future Internet of Everything is expected to leverage a common secure cloud infrastructure with a unified application programming interface (API) for all application sectors,” said Nayak.

The post Frost & Sullivan: AI and big data hold keys to IoT security appeared first on Internet of Business.

Internet of Business