Tuesday January 21, 2020
Home Lead Story Google’...

Google’s ‘Chat’ service a gift to cybercriminals: Amnesty

RCS is a communication protocol between mobile-telephone carriers and between phone and carrier

0
//
Google
Google's new Search feature gives single result to certain queries. Pixabay

Google’s decision to launch a new messaging service called “Chat” without end-to-end encryption shows utter contempt for the privacy of Android users and has handed a precious gift to cybercriminals and government spies alike, Amnesty International has said.

Communications on the new “Chat” service will not be sent over the Internet but through mobile phone carriers, like SMS text messages, according to reports.

Google Chat is becoming more famous.

In a statement to The Verge this week, a Google spokesperson confirmed that the new service will not use end-to-end encryption and that Google is “pausing investment” in its existing mobile messaging app “Allo” which has an option for end-to-end encryption.

“Not only does this shockingly retrograde step leave Google lagging behind its closest competitors — Apple’s iMessage and Facebook’s WhatsApp both have end-to-end encryption in place by default — it is also a step backwards from the company’s previous attempts at online messaging,” Joe Westby, a technology and human rights researcher at Amnesty International, said on Friday.

Also Read: Google Will Take Action If Apps Violate Its Policies

Amnesty International considers end-to-end encryption a minimum requirement for technology companies to ensure that private information in messaging apps stays private. End-to-end encryption is a way of scrambling digital data so that only the sender and recipient can see it.

When it is in place, even the company providing the service is unable to access the content of communications. “Following the revelations by CIA whistleblower Edward Snowden, end-to-end encryption has become recognised as an essential safeguard for protecting people’s privacy when using messaging apps. With this new Chat service, Google shows a staggering failure to respect the human rights of its customers,” Westby said in a statement.

A Google picture.
The Chat is a security threat. VOA

In the wake of the recent Facebook data scandal, Westby said that Google’s decision is not only dangerous but also out of step with current attitudes to data privacy. “Google should immediately scrap it in its current form and instead give its customers a product that protects their privacy,” Westby suggested.

Google is going all in on building the Rich Communication Services (RCS). RCS is a communication protocol between mobile-telephone carriers and between phone and carrier, aiming at replacing SMS messages with a text-message system that is more rich, provide phonebook polling and transmit in-call multimedia. IANS

Next Story

Skills Required To Become An Information Security Analyst

Good analytical skills allow information security analyst to respond to incidents quickly

0
Analyst
It is vital that information security analyst is skilled and comfortable with the fundamentals of networking. This skill is specifically employable to maximise damage, malware and other cybersecurity threats are highly dependent on computer networks. Pixabay

Today’s rapid growth of technology comes along with the booming threat of cybercrime, thereby driving demand for more cybersecurity professionals. Here is a list of skills that every security analyst should possess to give the global population a safer tomorrow!

  • Communication

    Documenting incidents and communicating is the most important soft skill that information security analysts should possess. Good communication skills are not only essential during security incidents being escalated and passed around but also while working as part of a larger team. In addition to this, effective communication is needed at times when any records of activity or actions are taken is needed to be properly documented, which may be used in a legal proceeding.

  • Technology networking

      It is vital that information security analysts are skilled and comfortable with the fundamentals of networking. This skill is specifically employable to maximise damage, malware and other cybersecurity threats are highly dependent on computer networks. Besides acquiring basic information from network device logs, analysts should also possess knowledge of the OSI network model and network protocols. As a technology analyst, you should know what each piece of information signifies and how it might impact your analysis.  

  • Cybersecurity

      Understanding security fundamentals is equally important as developing networking knowledge. A solid understanding of various cyber threats can enable you to learn what patterns and behaviours to look for in your analysis. In order to be able to quickly identify suspicious or dangerous activity, you must familiarise yourself with the various patterns and different malware variants that are common to most attacks. A security analyst well versed in security fundamentals would be able to easily identify and deduce infected computers to be removed from the network and cleaned.

Cyber Security, Online, Computer, Cyber, Network
Today’s rapid growth of technology comes along with the booming threat of cybercrime, thereby driving demand for more cybersecurity professionals such as an Analyst. Pixabay
  • Analytical

     Good analytical skills allow information security analyst to respond to incidents quickly. Employers find it valuable when analysts are able to smoothly ability to function within a formal incident detection and response process. This is considered as one of the best practices in defending an organisation’s digital assets from cyber threats and even to prosecute the attackers.

  • Creativity

     This is another crucial soft skills that are critical for information security analysts to be able to anticipate cyber-attacks and always think one step ahead of a cyber threat. Detail-oriented forward-thinking requires a creative approach that may allow analysts to detect threats to cybersecurity, which are typically are hard to detect. Furthermore, information security analysts are expected to be focused on the details of a security system, noting any minor changes and foreseeing any potential problems, no matter the size of it.

ALSO READ: Here’s Why Alphabet CEO Sundar Pichai Believes That Artificial Intelligence Needs To Be Regulated

These skills put emphasis on the importance of IT Security Management degree. So apply today to develop the skills required to become an analyst.