Skip to main content

E2E Encryption Could Make WhatsApp a Spam Magnet

Facebook's WhatsApp last week
announced it would roll out end-to-end encryption for its users to better protect their privacy, but the move could make the service more attractive to spammers,too.

While encryption can safeguard
information from data thieves, it also can block data protectors from detecting malicious activity on their networks.

"WhatsApp's encryption policy is a win for privacy advocates, but it will not stop the growth of spam on the platform and could make the problem worse," said Simeon Coney, chief strategy officer for
AdaptiveMobile.

"WhatsApp has always had limited spam control in place," he told TechNewsWorld, "and encryption will make detecting spam and malicious links with malware that
much more difficult."

Spam Magnet
Over the last three to four years, mobile carriers have made it harder for spammers to deliver their junk messages,Coney noted. That's prodded them to look for greener pastures.

"We've seen spammers move from
services like SMS, MMS and RCS to
services like WhatsApp," he said.

Not only does it cost spammers less to spew their rubbish on WhatsApp, but it's easier to find targets there.

"WhatsApp is a very friendly service to spammers because it allows them to validate phone numbers to see if they have a WhatsApp account," Coney explained,"so they can upload large number ranges to test who has a WhatsApp account and just send bulk messages to them."

Because end-to-end encryption prevents protection systems from seeing what's in a spam message, they can't guard against
malicious activity like phishing, account hijacking, spam and malware.

"It's simple economics," Coney said. "As certain channels get closed off to these spammers, they're finding other ways to reach their targets. They only make money if they get their messages through and they get a reasonable conversion rate."

Making Sense of Mossack Fonseca
Data
If you're a journalist and someone drops 2.6 TB of hot data in your lap, where do you begin to make sense of it?

For the International Consortium of Investigative Journalists, the answer was Nuix.

Nuix provides services for turning large pots of data into searchable pools of information.

With its software, which the company donated to the ICIJ and the German newspaper Süddeutsche Zeitung, the investigative journalists were able to process, index and analyze the Panama Papers, 11.5 million documents taken from the Panama offices of Mossack Fonseca, an international law firm and a major
player in the offshore asset industry.

Much of the data in the dump was scanned documents, which were turned into searchable information with Nuix's optical character recognition software. Other
Nuix analytical tools helped identify and cross-reference Mossack Fonseca clients throughout the document cache.

1,500 Data Types
Nuix's search technology was developed in 2000 at the request of the Australian government. "They had a huge cache of Lotus Notes emails, and they didn't have a way to tag them, format them and make
them easily searchable," said Keith Lowry,Nuix's senior vice president of threat intelligence and a former chief of staff at the U.S. Department of Defense.

"Over the years, we have been able to absorb a lot more types of information,"he told TechNewsWorld. "It has grown to
the point where we can natively ingest over 1,500 different file types and flatten the data and make it presentable to whomever is analyzing the data."

Although 2.6 TB of data is immense by journalistic standards, it's only a medium-sized data set compared to some Nuix has been enlisted to massage in its e-discovery and regulatory investigative work. "On
any given day, our software is sorting through petabytes of data," Lowry said.

Nuix gave the ICIJ and Süddeutsche
Zeitung technical assistance in processing the data stolen from Mossack Fonseca,but no employees ever handled the data, the company said.

"We didn't participate in the collection of the data," Lowry said. "We just processed it for them."

Source: technewsworld

For more on this, click www.technewsworld.com/story/E2E-Encryption-Could-Make-WhatsApp-a-Spam-Magnet-83370.html
www.josiahdele.blogspot.com

Comments

Popular posts from this blog

Dangerous sex Positions For Men

The most common cause of pénile injury is found among the variety of potentially dangerous positions used for séxual intercourse. The most popular is the ‘woman-on-top’. This type of position can result in an impact between the pénis against the female pelvis or perineum that can easily traumatize the pénile cylinders. A pénis becomes érect when the lining of the cylinder within it is engorged with blood.  A pénis fracture can occur when there is trauma to the eréct pénis, resulting in a rupture of the cylinder lining. This very painful injury is often accompanied by an abrupt, distressing cracking noise that is immediately followed by dark bruising of the pénis due to blood escaping the cylinder. In ten to 30% of pénis fractures, the urethra is damaged and blood may be visible at the urinary opening. Given these signs, an injury should be relatively simple to diagnose, right? You would be surprised, even with the unsettling sounds of a fracture occurring, many men...

Google Authenticator, a formidable layer of protection to your account.

​Google Authenticator is a free security app that can protect your accounts against password theft. It's easy to set up and can be used in a process called two-factor authentication (2FA) offered on popular social media services like Gmail, Facebook, Twitter, Instagram, etc.  The app ( iOS / Android ) generates a random code used to verify your identity when you're logging into various services. The code can technically be sent to your phone via text message every time— but the Google Authenticator app provides an extra level of security.  SMS-based 2FA has a  known security flaw , and any devoted hacker can attempt to  socially engineer  an attack against your phone company. The Google Authenticator app eliminates the possibility of an SMS-based attack  using algorithms  to generate the codes on your phone. Here's how to set it up: 1. Download Google Authenticator from either the Apple App Store or the Android Google Play store. It's free. 2. Nex...

AWS Battles Rivals: Advertising Campaign

Amazon Web Services has defeated IBM in a competition for lucrative federal contracts, threatened Microsoft's core businesses, and reshaped corporate technology. In the last few months, the pioneering cloud-computing unit of the online retail giant has taken a page from the playbook of some of its more traditional competitors: It started advertising. Ads have been splashed across billboards and in airport terminals, television spots and web videos, featuring a whiteboard full of sketches of software architecture and appeals to invent something using Amazon's collection of rented computing services. The advertising campaign, which bears the "Build On" tagline, represents a milestone in AWS' march from technology upstart to one of the major players in business software, technologists and marketers say. For many years, AWS didn't advertise, partly because it didn't have to. The service held a wide lead over the competition, and word-of-mouth was enough to...