Security News
As Google security engineers pointed out, these mechanisms do not prevent the Spectre exploit, but rather "Protect sensitive data from being present in parts of the memory from which they can be read by the attacker." To further reduce the risk of data leakage, website owners should add an extra line of defense to protect the actual data in memory in the event that all other security controls.
The REvil ransomware operation has added a new ability to encrypt files in Windows Safe Mode, likely to evade detection by security software and for greater success when encrypting files. Windows Safe Mode is a special startup mode that allows users to run administrative and diagnostic tasks on the operating system.
The Defense Advanced Research Projects Agency, or DARPA, has signed an agreement with Intel to add it to its Data Protection in Virtual Environments project, which aims to create a practically useful form of fully homomorphic encryption. Fully homomorphic encryption has been described as the "Holy grail" of encryption because it allows encrypted data to be used without ever having to decrypt it.
Doctoral student Riccardo Paccagnella, master's student Licheng Luo, and assistant professor Christopher Fletcher, all from the University of Illinois at Urbana-Champaign, delved into the way CPU ring interconnects work, and found they can be abused for side-channel attacks. "It is the first attack to exploit contention on the cross-core interconnect of Intel CPUs," Paccagnella told The Register.
Microsoft adds new security, privacy, and compliance features to the Microsoft Teams chat and collaboration solution, including end-to-end encryption support for one-on-one voice calls. Microsoft Teams is a cloud collaboration platform designed to allow an organization's team to stay organized and communicate via text, audio, and video, all in one place.
After a three-year review process, India has announced strict regulations for instant chat services, social network operators, and video-streaming companies. India's Internet Freedom Foundation has slammed this traceability requirement, claiming it will be impossible to implement strong end-to-end encryption as a result, and thus could harm privacy.
They can also copy the entire database - including files that contain many of the corporate crown jewels. There are a variety of technologies for database encryption.
I like tackling misconceptions relating to innovative technical advancements in my own line of work, and here I'll talk about homomorphic encryption. Here are four misconceptions about homomorphic encryption that should be considered by anyone interested in potential use cases.
One such document is the new EU Cybersecurity Strategy, which mentions quantum computing and encryption as key technologies for achieving resilience, technological sovereignty and leadership. Quantum technology will enable a huge leap forward in many branches of industry, as it can efficiently resolve problems technologies of today are not able to provide a solution for.
FHE has long been described as transformative for data privacy and cloud security as it enables computing on encrypted data sets, thereby keeping the underlying data secure. With Secret Computing technology, data scientists can finally build advanced analytics and Artificial Intelligence models on distributed data sources without ever exposing or transferring sensitive data across departments, organizations, or jurisdictions.