More stories

  • in

    FBI releases alert about Hive ransomware after attack on hospital system in Ohio and West Virginia

    The FBI has released an alert about the Hive ransomware after the group took down Memorial Health System last week. The alert explains that Hive is an affiliate-operated ransomware first seen in June that deploys “multiple mechanisms to compromise business networks, including phishing emails with malicious attachments to gain access and Remote Desktop Protocol to move laterally once on the network.””After compromising a victim network, Hive ransomware actors exfiltrate data and encrypt files on the network. The actors leave a ransom note in each affected directory within a victim’s system, which provides instructions on how to purchase the decryption software. The ransom note also threatens to leak exfiltrated victim data on the Tor site, ‘HiveLeaks,'” the FBI explained. “Hive ransomware seeks processes related to backups, anti-virus/anti-spyware, and file copying and terminates them to facilitate file encryption. The encrypted files commonly end with a .hive extension.”The alert explains how the ransomware corrupts systems and backups before directing victims to a link to the group’s “sales department” that can be accessed through a TOR browser. The link brings victims to a live chat with the people behind the attack, but the FBI noted that some victims have even been called by the attackers demanding ransoms. Most victims face a payment deadline ranging between two and six days but others were able to extend their deadlines through negotiation. The group operates a leak site that they use to threaten victims into paying. The FBI included indicators of compromise, a link to the leak site and a sample of a ransom note given to a victim. 

    John Riggi, American Hospital Association senior advisor for cybersecurity, said the new Hive ransomware is of particular concern for healthcare organizations. Hive has so far attacked at least 28 organizations, including Memorial Health System, which was hit with a ransomware attack on August 15. The non-profit runs a number of hospitals, clinics and healthcare sites across Ohio and West Virginia.CEO Scott Cantley said in a statement that staff at three hospitals — Marietta Memorial, Selby, and Sistersville General Hospital — were forced to use paper charts while their IT teams worked to restore their systems. All urgent surgical cases and radiology exams for Monday, August 16 were cancelled because of the attack. Memorial Health System Emergency Departments were forced to go on diversion due to the attack, with Marietta Memorial Hospital agreeing only to keep taking patients suffering from strokes and trauma incidents. Anyone else in need of help simply had to be transported to other hospitals. The FBI, CISA and cybersecurity experts helped the hospital respond to the attack. In a statement three days later, Cantley said the hospital system “reached a negotiated solution and are beginning the process that will restore operations as quickly and as safely as possible.”He later admitted to The Marietta Times that the hospital paid a ransom to receive the decryption keys. “We have completed an agreement and received the keys to unlock our servers and begin to process recovery. The FBI has their suspicions of an Eastern European entity that is relatively new and sophisticated,” Cantley explained. “It’s good news for our staff to get our tools back. We have 800 servers and more than 3,000 personal devices that our physicians use to serve patients. We will keep services to essential and next week we should be back to typical services. We continue to serve our patients with great care in the face of adversity.”The hospital’s systems were brought back online by the weekend and Cantley said there was no “indication that any patient or employee data has been publicly released or disclosed.””It is unfortunate that many health care organizations are confronting the impacts of an evolving cyber threat landscape,” Cantley said.  More

  • in

    21-year-old tells WSJ he was behind massive T-Mobile hack

    A 21-year-old Virginia native living in Turkey has admitted to being the main force behind the massive T-Mobile hack that exposed the sensitive information of more than 50 million people.John Binns was originally identified as the possible culprit by Alon Gal, co-founder of cybercrime intelligence firm Hudson Rock. 

    ZDNet Recommends

    On Twitter earlier this month, Gal shared a message he received from Binns that said, “The breach was done to retaliate against the US for the kidnapping and torture of John Erin Binns (CIA Raven-1) in Germany by CIA and Turkish intelligence agents in 2019,” the hacker allegedly told Gal. “We did it to harm US infrastructure,” Binns allegedly told Gal at the time.Binns has now spoken out publicly in an interview with the Wall Street Journal, telling the newspaper he was in fact behind the attack and conducted it from his home in Izmir, Turkey, where he lives with his mother. His father, who died when he was two, was American and his mother is Turkish. They moved back to Turkey when Binns was 18.Through Telegram, Binns provided evidence to the Wall Street Journal proving he was behind the T-Mobile attack and told reporters that he originally gained access to T-Mobile’s network through an unprotected router in July. According to the Wall Street Journal, he had been searching for gaps in T-Mobile’s defenses through its internet addresses and gained access to a data center near East Wenatchee, Washington where he could explore more than 100 of the company’s servers. From there, it took about one week to gain access to the servers that contained the personal data of millions. By August 4 he had stolen millions of files. 

    “I was panicking because I had access to something big. Their security is awful,” Binns told the Wall Street Journal. “Generating noise was one goal.”He would not confirm if the data he stole has already been sold or if someone else paid him to hack into T-Mobile. While Binns did not explicitly say he worked with others on the attack, he did admit that he needed help in acquiring login credentials for databases inside T-Mobile’s systems. The Wall Street Journal story also noted that T-Mobile was initially notified of the breach by a cybersecurity company called Unit221B LLC, which said their customer data was being marketed on the dark web. Binns repeated his assertion that the attack was done because he was angry about how he was treated by US law enforcement agencies in recent years. Binns filed a lawsuit against the FBI, CIA and Justice Department in November where he said he was being investigated for various cybercrimes, including participation in the Satori botnet conspiracy. In the lawsuit, he said he had been tortured and spied on for being an alleged member of the Islamic State militant group. He denied being a member of the group in his lawsuit.He repeated his claims that he had been abducted in both Germany and Turkey and unfairly placed in a mental institution against his will by US law enforcement agencies. “I have no reason to make up a fake kidnapping story and I’m hoping that someone within the FBI leaks information about that,” he explained in his messages to the Wall Street Journal.T-Mobile did not respond to requests for comment but released a statement last week confirming that the names, dates of birth, SSNs, driver’s licenses, phone numbers, as well as IMEI and IMSI information for about 7.8 million customers had been stolen in the breach.Another 40 million former or prospective customers had their names, dates of birth, SSNs and driver’s licenses leaked. More than 5 million “current postpaid customer accounts” also had information like names, addresses, date of births, phone numbers, IMEIs and IMSIs illegally accessed. T-Mobile said another 667,000 accounts of former T- Mobile customers had their information stolen alongside a group of 850,000 active T-Mobile prepaid customers, whose names, phone numbers and account PINs were exposed. The names of 52,000 people with Metro by T-Mobile accounts may also have been accessed, according to T-Mobile. The telecom giant, which is the second largest in the US behind Verizon, is offering victims two years of free identity protection services with McAfee’s ID Theft Protection Service.  More

  • in

    Chinese developers expose data belonging to Android gamers

    The Chinese developers of popular Android gaming apps exposed information belonging to users through an unsecured server.

    In a report shared with ZDNet, vpnMentor’s cybersecurity team, led by Noam Rotem and Ran Locar, revealed EskyFun as the owner of a 134GB server exposed and made public online. EskyFun is the developer of Android games including Rainbow Story: Fantasy MMORPG, Adventure Story, The Legend of the Three Kingdoms, and Metamorph M. On Thursday, the team said that users of the following games were involved in the data leak: Rainbow Story: Fantasy MMORPG, Metamorph M, and Dynasty Heroes: Legends of Samkok. Together, they account for over 1.6 million downloads.  In total, the team said that an alleged 365,630,387 records contained data from June 2021 onward, leaking user data collected on a seven-day rolling system. The team says that the developers impose “aggressive and deeply troubling tracking, analytics, and permissions settings” when their software is downloaded and installed, and as a result, the variety of data collected was, perhaps, far more than you would expect mobile games to require.  The records included IP and IMEI numbers, device information, phone numbers, the OS in use, mobile device event logs, whether or not a handset was rooted; game purchase and transaction reports, email addresses, EskyFun account passwords stored in plaintext, and support requests, among other data. 
    vpnMentor

    vpnMentor suspects that up to, or more than, one million users may have had their information exposed. The unsecured server was discovered on July 5 and EskyFun was contacted two days later. However, after receiving no response, vpnMentor made a second attempt on July 27.  Continued silence required the team to also reach out to Hong Kong CERT and the server was secured on July 28.  “Much of this data was incredibly sensitive, and there was no need for a video game company to be keeping such detailed files on its users,” the researchers commented. “Furthermore, by not securing the data, EskyFun potentially exposed over one million people to fraud, hacking, and much worse.”ZDNet has reached out to EskyFun and we will update when we hear back. Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Cloud storage deal: Get 2TB of storage with end-to-end encryption for only $10

    StackCommerce
    With the frequency and severity of cyber threats increasing practically by the day, it’s become more important than ever to put strong measures in place to protect your privacy and your most confidential data. The most effective way to do this is to protect yourself online with an excellent VPN, and protect the files on your computer with encrypted cloud storage such as Internxt Drive offers. Since both of those services are ridiculously inexpensive, there is no excuse for leaving you and your data vulnerable.

    The Internxt – 2TB Decentralized Cloud Storage: 1-Year Subscription that is currently available for just $9.99 offers zero-knowledge decentralized cloud storage with end-to-end encryption that provides uncompromising security. It encrypts your uploaded files and then divides them into fragments on your end so that you’re the only one with the decryption key that is required to retrieve them.However, in spite of its complex power, Internxt is very easy to use. The user interface is quite intuitive and the service is convenient to access. An app is available for all of your devices, including desktop and browser, as well as Android and iOS mobile devices.Also, while your files are supremely protected, sharing them is still a simple matter. Internxt Drive users can share their data over other cloud storage services such as Dropbox, Google Drive, Apple iCloud, and Microsoft OneDrive. That makes it easy for teams to privately collaborate with customized features and user-to-user solutions.If you want truly private and secure cloud storage, it’s hard to beat what Internxt offers, especially when you can get a year’s subscription at a discount. As TechRadar notes: “Unlike popular cloud storage services like Google Drive, Dropbox, and Microsoft OneDrive, Internxt is a zero-knowledge file storage service that supports end-to-end encryption.”Don’t pass up this chance to enjoy the peace of mind that a vast amount of high-security storage can offer. Get Internxt – 2TB Decentralized Cloud Storage: 1-Year Subscription while it’s on sale for just $9.99, instead of the normal price of $126.

    ZDNet Recommends More

  • in

    Data protection: UK to diverge from GDPR in post-Brexit overhaul of privacy rules

    The UK has announced plans to change data protection and privacy laws in what the government describes as a new mandate that promotes innovation and economic growth.A new series of ‘data adequacy partnerships’ will allow Britain to drive international trade with countries and bodies including the United States, Australia, the Republic of Korea, Singapore, the Dubai International Finance Centre and Colombia, the Department for Digital, Culture, Media & Sport (DCMS) has said.

    more on GDPR

    According to the government, the data adequacy partnerships will remove the need for costly measures around data compliance when transferring personal data to other countries. In a statement, DCMS said this will happen while also ensuring that “high data protection standards are maintained”.Any changes to data transfer rules will also need to be deemed adequate by the European Union — if they’re not, there’s a risk that data transfers between the United Kingdom and the EU will be affected.The proposed changes form part of the government’s plans to “use the power of data to drive growth and create jobs”, although some data privacy experts have voiced concerns that the changes could be used to roll back data privacy for consumers brought in as part of General Data Protection Regulation (GDPR). GDPR was brought in across the European Union in May 2018, and despite the UK having voted to leave the EU, the data protection laws were applied. But now the government claims that, following Brexit, the country can benefit from diverging its data protection laws from the rest of Europe. “Now that we have left the EU I’m determined to seize the opportunity by developing a world-leading data policy,” said Secretary of State for Digital, Culture Media and Sport Oliver Dowden.

    “It means reforming our own data laws so that they’re based on common sense, not box-ticking,” he added  In an interview with The Telegraph, Dowden singled out policies around “pointless” cookie requests as something the UK could now diverge from — but several data privacy experts have pointed out that cookies come under a completely different directive to GDPR.Data privacy experts have also voiced concerns that the proposed plans will change the role of the Information Commissioner’s Office (ICO) from being a privacy regulator to promoting economic growth.A DCMS spokesperson told ZDNet “we’re not going to compromise our high data standards and people’s privacy and data protection”.The government is set to launch a consultation on the role of the ICO in September so that “it can be empowered to encourage the responsible use of data to achieve economic and social goals as well as preventing privacy breaches before they occur”.DCMS has also announced a preferred successor to Elizabeth Denham as Information Commissioner: John Edwards, who is currently New Zealand’s Privacy Commissioner. “There is a great opportunity to build on the wonderful work already done and I look forward to the challenge of steering the organisation and the British economy into a position of international leadership in the safe and trusted use of data for the benefit of all,” said Edwards. According to Oliver Dowden, Edwards brings the experienced required to “pursue a new era of data-driven growth and innovation at the ICO”. “John Edwards’s vast experience makes him the ideal candidate to ensure data is used responsibly to achieve those goals,” Dowden added. MORE ON CYBERSECURITY More

  • in

    Cybersecurity warning: Realtek flaw exposes dozens of brands to supply chain attacks

    A recently disclosed flaw in chipsets from Taiwanese semiconductor company Realtek is being targeted by a botnet based on the old IoT malware, Mirai.German security firm IoT Inspector reports that the Realtek bug, tracked as CVE-2021-35395, affects over 200 wi-fi and router products from 65 vendors, including Asus, Belkin, China Mobile, Compal, D-Link, LG, Logitec, Netgear, ZTE, and Zyxel. The flaw is located in a Realtek software developer kit (SDK) and is currently under attack from a group using a variant of the IoT malware, Mirai, which is designed to function on devices with budget processors and little memory.  Should an attack be successful, it would give the attacker full control of the wi-fi module and root access to the device’s operating system.  

    Internet of Things

    The attacks highlight vulnerabilities in the software supply chain that US president Joe Biden hopes to patch up with billions of dollars promised this week by Microsoft and Google. This follows recent cyberattacks on US critical infrastructure, which have compromised top US cybersecurity firms and classical critical infrastructure providers, such as east coast fuel distributor Colonial Pipeline.While Mirai poses some threat to information stored on devices such as routers, the greater damage is caused by high-powered distributed denial of service (DDoS) attacks on websites using compromised devices. In 2016, Mirai was used to launch the world’s biggest DDoS attack on Dyn — a domain name service (DNS) provider that matches website names with numerical internet addresses. Oracle acquired the firm shortly after the Mirai attack. Researchers at IoT Inspector found a bug within the Realtek RTL819xD module that allows hackers to gain “complete access to the device, installed operating systems and other network devices”. The firm identified multiple vulnerabilities within the SDK. 

    Realtek has released a patch, but device brands (OEMs) need to distribute them to end-users on devices that, for the most part, lack a user interface, and therefore can’t be used to communicate that a patch is available. Vendors need to analyse their firmware to check for the presence of the vulnerability. “Manufacturers using vulnerable Wi-Fi modules are strongly encouraged to check their devices and provide security patches to their users,” warned Florian Lukavsky, managing director of IoT Inspector.   The attacker generally needs to be on the same wi-fi network as the vulnerable device, but IoT Inspector noted that faulty ISP configurations can expose vulnerable devices directly to the internet. Per security firm Recorded Future, IoT security firm SAM said that attackers were observed remotely exploiting CVE-2021-35395 over the web on August 18.IoT Inspector notes that Realtek’s poor software development practices and lack of testing allowed “dozens of critical security issues to remain untouched in Realtek’s codebase for more than a decade”. More

  • in

    Quantum computers could read all your encrypted data. This 'quantum-safe' VPN aims to stop that

    The trial successfully demonstrated, according to Verizon, that it is possible to replace current security processes with protocols that are quantum-proof.    
    Image: Bloomberg / Contributor / Getty Images
    To protect our private communications from future attacks by quantum computers, Verizon is trialing the use of next-generation cryptography keys to protect the virtual private networks (VPNs) that are used every day by companies around the world to prevent hacking. Verizon implemented what it describes as a “quantum-safe” VPN between one of the company’s labs in London in the UK and a US-based center in Ashburn, Virginia, using encryption keys that were generated thanks to post-quantum cryptography methods – meaning that they are robust enough to withstand attacks from a quantum computer. According to Verizon, the trial successfully demonstrated that it is possible to replace current security processes with protocols that are quantum-proof.  VPNs are a common security tool used to protect connections made over the internet, by creating a private network from a public internet connection. When a user browses the web with a VPN, all of their data is redirected through a specifically configured remote server run by the VPN host, which acts as a filter that encrypts the information.

    This means that the user’s IP address and any of their online activities, from sending emails to paying bills, come out as gibberish to potential hackers – even on insecure networks like public WiFi, where eavesdropping is much easier. Especially in the last few months, which have seen many employees switching to full-time working from home, VPNs have become an increasingly popular tool to ensure privacy and security on the internet. The technology, however, is based on cryptography protocols that are not un-hackable. To encrypt data, VPN hosts use encryption keys that are generated by well-established algorithms such as RSA (Rivest–Shamir–Adleman). The difficulty of cracking the key, and therefore of reading the data, is directly linked to the algorithm’s ability to create as complicated a key as possible.  

    In other words, encryption protocols as we know them are essentially a huge math problem for hackers to solve. With existing computers, cracking the equation is extremely difficult, which is why VPNs, for now, are still a secure solution. But quantum computers are expected to bring about huge amounts of extra computing power – and with that, the ability to hack any cryptography key in minutes. “A lot of secure communications rely on algorithms which have been very successful in offering secure cryptography keys for decades,” Venkata Josyula, the director of technology at Verizon, tells ZDNet. “But there is enough research out there saying that these can be broken when there is a quantum computer available at a certain capacity. When that is available, you want to be protecting your entire VPN infrastructure.” One approach that researchers are working on consists of developing algorithms that can generate keys that are too difficult to hack, even with a quantum computer. This area of research is known as post-quantum cryptography, and is particularly sought after by governments around the world. In the US, for example, the National Institute of Standards and Technology (NIST) launched a global research effort in 2016 calling on researchers to submit ideas for algorithms that would be less susceptible to a quantum attack. A few months ago, the organization selected a group of 15 algorithms that showed the most promise. “NIST is leading a standardization process, but we didn’t want to wait for that to be complete because getting cryptography to change across the globe is a pretty daunting task,” says Josyula. “It could take 10 or even 20 years, so we wanted to get into this early to figure out the implications.”  Verizon has significant amounts of VPN infrastructure and the company sells VPN products, which is why the team started investigating how to start enabling post-quantum cryptography right now and in existing services, Josyula adds.One of the 15 algorithms identified by NIST, called Saber, was selected for the test. Saber generated quantum-safe cryptography keys that were delivered to the endpoints – in London and Ashburn – of a typical IPsec VPN through an extra layer of infrastructure, which was provided by a third-party vendor. Whether Saber makes it to the final rounds of NIST’s standardization process, in this case, doesn’t matter, explains Josyula. “We tried Saber here, but we will be trying others. We are able to switch from one algorithm to the other. We want to have that flexibility, to be able to adapt in line with the process of standardization.” In other words, Verizon’s test has shown that it is possible to implement post-quantum cryptography candidates on infrastructure links now, with the ability to migrate as needed between different candidates for quantum-proof algorithms. This is important because, although a large-scale quantum computer could be more than a decade away, there is still a chance that the data that is currently encrypted with existing cryptography protocols is at risk.  The threat is known as “harvest now, decrypt later” and refers to the possibility that hackers could collect huge amounts of encrypted data and sit on it while they wait for a quantum computer to come along that could read all the information.  “If it’s your Amazon shopping cart, you may not care if someone gets to see it in ten years,” says Josyula. “But you can extend this to your bank account, personal number, and all the way to government secrets. It’s about how far into the future you see value for the data that you own – and some of these have very long lifetimes.” For this type of data, it is important to start thinking about long-term security now, which includes the risk posed by quantum computers. A quantum-safe VPN could be a good start – even though, as Josyula explains, many elements still need to be smoothed out. For example, Verizon still relied on standard mechanisms in its trial to deliver quantum-proof keys to the VPN end-points. This might be a sticking point, if it turns out that this phase of the process is not invulnerable to quantum attack. The idea, however, is to take proactive steps to prepare, instead of waiting for the worst-case scenario to happen. Connecting London to Ashburn was a first step, and Verizon is now looking at extending its quantum-safe VPN to other locations. 

    Quantum Computing More

  • in

    RingCentral's new features aimed at improving hybrid work

    RingCentral
    RingCentral has revealed several new capabilities for its Message Video Phone (MVP) unified communications platform to make meetings more secure, feature-rich, and easier to use. The pandemic drove the adoption of products such as RingCentral’s, and the usage of it has remained high as the world remains in an indefinite hybrid work mode. UC apps enable workers to collaborate when they are physically distant, often with better results than if they were in the same room. 

    ZDNet Recommends

    The best VoIP services: Replicate a traditional office phone at home

    Are you transitioning your on-premises workforce to a work-at-home powerhouse? Do you need to put a business phone on every desk, even if those desks are in the corner of a spare bedroom? If you’re trying to replicate a traditional office phone PBX remotely, we have 12 recommendations that should get you talking.

    Read More

    When the pandemic began, most of the UC-as-a-Service (UCaaS) providers — RingCentral included — had basic functions. Since then, there has been a mad dash to add more features to improve the products. This set of product updates adds several innovations that address some of the key aspects of remote work.Specifically, RingCentral announced the following: Dynamic end-to-end encryption (E2EE): This is a term that has caused great confusion in the UC industry because some vendors stretched the definition. E2EE is not just about encrypting data in flight. It also requires encrypting data at rest and at every point in the journey. There is a debate as to where and when the data should be encrypted. One might think all calls but then some of the vendor tools, such as transcription, may not work because the data is encrypted. RingCentral now offers dynamic E2EE, in which users can turn E2EE on or off mid-meeting across its mobile and desktop clients or through the browser. With other vendors, the user needs to shut down the meeting, turn on encryption, and then start the meeting again. Now it can be used whenever necessary. C5:2020 certification compliance: The Cloud Computing Compliance Criteria Catalog, or C5, is a set of security controls that was developed by the Federal Office for Information Security (BSI) in Germany. The certification was first published in 2016 and was BSI’s guideline for cloud computing security. With this release, RingCentral announced that its MVP, Video Pro, Video Pro+, Engage Digital, and Engage Voice products are all compliant with C5:2020. Buyers should do their homework on this; most UCaaS providers claim to be C5 compliant, but most only meet the 2016 certification. RingCentral Add-Ins: This brings a number of leading apps into RingCentral Team Messaging for an integrated workflow. For example, instead of having to download a file from RingCentral and then upload it into DocuSign for a digital signature, users can sign directly in RingCentral through the DocuSign add-in. In addition to DocuSign, RingCentral will have add-ins with Akazio, Asana, BugSnag, Github, Hubspot, Jira, Keeper AI, Prodoscore, RingClone, and Trello with more coming. These are in addition to the more than 250 apps integrations in the RingCentral AppGallery.  Add-in integrations will be available mid-October, but developers can build now. Microsoft Teams embedded dialer: Microsoft Teams has seen a significant boost in usage with the pandemic, because the bundling with Office 365 made it fast and easy for businesses to adopt it. While Teams is adequate in the areas of messaging and video, its calling function is expensive and lacks many of the key features that businesses now require. RingCentral for Microsoft Teams brings Ring’s best-in-class enterprise calling capabilities to Teams. The integration makes the RingCentral dial pad available directly in Teams; this lets customers use Teams for messaging but will have a significantly better calling experience than with Teams calling. Mobile Heads Up Display (HUD): Earlier this year, RingCentral added HUD functionality to its desktop app enabling power users, such as admins and receptionists, to have a centralized view of all callable extensions. The HUD will be available on the mobile client by year-end. Two years ago, this feature wasn’t needed, but now that more of the world is working from home, the ability to manage call queues and other information from a mobile device is necessary. Team huddle capabilities: This is an interesting extension to MVP, because it enables users to create ad-hoc collaborative spaces in which users can pop in and out as they desire. A good analogy is how Discord works, where gamers can jump into and out of collaborative sessions. This is targeted at use cases where a person or team would want to let people drop in at their leisure. IT service desks, HR departments, or break-out rooms at events are good examples. Enhancements to immersive experiences: Last year RingCentral launched its own video capabilities as an alternative to the Zoom partnership. Since then, it has quickly added capabilities that have brought it to par with much of the field. This week it added the following video experiences: breakout rooms for small group discussions within meetings; transparent speaker when overlay mode is used.  Without this, the active speaker can often block on-screen content;  new immersive scenes such as virtual conference rooms and newsrooms to better replicate an in-person session; auto-framing capabilities that continuously center the speaker. While many cameras do this, RingCentral does this in software and will work with any camera; touch up appearances, where users can touch up their skin, add virtual makeup, color their lips and whiten their teeth. This is an example where virtual meetings can have an advantage over in person. It’s been a busy few months for RingCentral, but in a pre-briefing, the company told me to be on the lookout for more news soon. The Enterprise Connect event is at the end of September, and RingCentral is a major sponsor, so I’m expecting news there. Buyers of UCaaS products are the real winners here because RingCentral and its competitors have all stepped on the innovation pedal and are rolling out new features at an unprecedented rate. More