Tag Archive for: messaging

The Global Blockchain Messaging Apps Market size is expected to reach $215.7 million by 2028, rising at a market growth of 42.8% CAGR during the forecast period


ReportLinker

ReportLinker

A messaging system that leverages blockchain technology to send and send messages is known as a blockchain-based messaging system. Blockchain is a distributed database that enables transactions that are safe, open, and unchangeable.

New York, Jan. 26, 2023 (GLOBE NEWSWIRE) — Reportlinker.com announces the release of the report “Global Blockchain Messaging Apps Market Size, Share & Industry Trends Analysis Report By End-user, By Application, By Operating System, By Regional Outlook and Forecast, 2022 – 2028” – https://www.reportlinker.com/p06412015/?utm_source=GNW
As a result, it provides the perfect messaging system platform since it can offer a great degree of confidentiality and anonymity.

One of the most often used methods for regular contact is messaging applications. There are several blockchain messaging applications available that include Web3 features. Blockchain messaging applications’ primary objective is to provide consumers with a dependable, decentralized substitute for popular messengers. Blockchains process data via decentralized networks of nodes. Blockchain-based messenger applications provide consumers with very private and secure communication options. Users that seek privacy and security while sending communications are increasingly using these features.

In terms of network topology, blockchain messaging applications are the direct opposite of centralized messengers. To enhance user communication via blockchain transactions, these applications make use of blockchain technology. Distributed ledger technologies, or blockchains, are fundamentally decentralized network architectures. Blockchain messaging applications employ several independent network nodes rather than a single centralized system to handle the traffic.

Data security is one of the key advantages of adopting a blockchain-based messaging system. Messages are far less prone to breaches and hackers when they are kept on a decentralized network. It is considerably more difficult for unauthorized persons to view the messages since each one is encrypted and accessible only with the right key.

COVID-19 Impact Analysis

More than 42 million individuals have been impacted by the COVID-19 pandemic,…

Source…

ESET Threat Report T2 2022: RDP attacks see further drop; ransomware loses war-related messaging


DUBAI, DUBAI, UNITED ARAB EMIRATES, October 6, 2022 /EINPresswire.com/ — ESET released today its T2 2022 Threat Report, summarizing key statistics from ESET detection systems, and highlighting notable examples of ESET’s cybersecurity research. The latest issue of the ESET Threat Report (covering May to August 2022) sheds light on the changes in ideologically motivated ransomware, Emotet activity, the most-used phishing lures, how the plummeting cryptocurrency exchange rates affected online threats, and the continuation of the sharp decline of Remote Desktop Protocol (RDP) attacks. ESET analysts think these attacks continued to lose their steam due to the Russia-Ukraine war, along with the post-COVID return to offices and overall improved security of corporate environments.

Even with declining numbers, Russian IP addresses continued to be responsible for the largest portion of RDP attacks. “In T1 2022, Russia was also the country that was most targeted by ransomware, with some of the attacks being politically or ideologically motivated by the war. However, ESET Threat Report T2 2022 shows that this hacktivism wave has declined in T2, and ransomware operators turned their attention towards the United States, China, and Israel,” explains Roman Kováč, Chief Research Officer at ESET.

According to ESET telemetry, August was a vacation month for the operators of Emotet, the most influential downloader strain. The gang behind it also adapted to Microsoft’s decision to disable VBA macros in documents originating from the internet and focused on campaigns based on weaponized Microsoft Office files and LNK files.

The report also examines threats mostly impacting home users. ESET phishing feeds showed a sixfold increase in shipping-themed phishing lures, most of the time presenting the victims with fake DHL and USPS requests to verify shipping addresses. “In terms of threats directly affecting virtual and physical currencies, a web skimmer known as Magecart remains the leading threat going after online shoppers’ credit card details. We also saw a twofold increase in cryptocurrency-themed phishing lures and a rising number of…

Source…

Unlocking the secret to private messaging apps


Whether you’re sharing confidential information or swapping movie ideas with a friend, people are turning to private messaging apps that offer end-to-end encryption to protect the contents of their conversations.

When data is shared over the internet, it often traverses a series of networks to reach its destination. Apps such as WhatsApp, owned by social media giant Meta (formerly Facebook), provide a level of privacy that even challenges Government agencies from accessing encrypted conversations.

However, with the apps constantly changing their security and privacy policies, are the messages still safe from being decrypted?

Back in May 2021, disapproval by the online community with the changes to WhatsApp’s privacy policy for business entities using the platform, saw many users switch to other private messaging apps such as Signal and Telegram.

Cybersecurity expert, Dr Arash Shaghaghi from UNSW School of Computer Science and Engineering and UNSW Institute for Cyber Security, compares encryption to the likes of having a secret conversation between you and another person.

“To keep our information away from prying eyes, we rely on cryptographic algorithms to encrypt our data. Encryption involves converting human-readable plaintext into an encoded format and the data can only be read after it’s been decrypted,” he says.

“Encryption involves using a key to lock a message, while decryption is using a key to unlock a message.

“In theory, if an outsider observed an encrypted conversation, they could not make sense of it, and they will need the appropriate key to decrypt it.

“Interestingly, with some end-to-end encryption protocols, such as Signal, even if someone steals the encryption keys and taps over the connection, they cannot decrypt messages already sent. In crypto parlance, this is termed as forward secrecy.”

Read more: Camfecting: how hackers attack by gaining access to your webcam

Are our messages fully secure?

Modern encryption algorithms have been battle-tested and shown to have no known vulnerabilities. While it doesn’t mean it’s impossible to crack, the process requires extensive processing powers and could take a significantly long time to do….

Source…

New malware circulating in messaging apps using ‘Darez’ brand name


Once opened, it enables hackers to penetrate through the device firewall and take confidential user information

A malicious software (malware) is making rounds across several messenger apps using an altered name of popular e-commerce platform Daraz.

With the title “Giving gifts to Darez Supporters – Free Gift for Everyone), a suspicious link is guised under the promise of free gifts for its loyal customers, and is being circulated among messaging apps such as Facebook Messenger, WhatsApp, Viber and others.

Once opened, it enables hackers to penetrate through the device firewall and take confidential user information such as photos, contacts and others, all using a variant name of the brand “Darez” instead of “Daraz.”

Khalid Arafat, a WhatsApp user, clicked on the said link on Friday, without crosschecking the brand name or title.

“I thought it came from Daraz. But the link automatically went to my other contacts inbox. Then I realized I just may have given hackers access to my phone,” he said.

Users often overlook a spell-check as the hackers only altered the spelling of Daraz, but used similar logo and URL so that no suspicion is raised on the misspelling.

Malware virus is used to disrupt the normal functioning of a computer or mobile phone, collect confidential information, gain unauthorized access to a protected computer network system, or display unwanted advertisements.

It can also operate secretly for the purpose of stealing information or keeping a close eye on the user.

International internet gateway (IIG) operators said that there are more than 3.5 crore WhatsApp users and around 2 crore Viber users in the country.

So far, the malware has only emerged on Messenger, WhatsApp and Viber. The malware can cause any kind of harm by controlling the contact list, IP (Internet Protocol) address, location, picture etc. of the mobile phone, they added.

Sarowar Alam Sikder, president of the IIG Forum, told Dhaka Tribune that this type of link always comes from different hackers to different OTT platforms to steal people’s personal information for blackmailing later.

However, mobile phone users have to be aware of this as there is no cure from it once infected, he also said.

Talking to…

Source…