Top

Tag: cryptography


Application security, Security

Apple Strengthens iMessage Security with Post-Quantum Encryption

February 22, 2024

Via: SecureWorld

Apple announced this week that it is implementing post-quantum cryptography in its iMessage platform to protect against potential future attacks powered by quantum computers. The new encryption protocol, called PQ3, will roll out later this year. According to an Apple […]


Network security, Security

HM Government has partnered with SANS to train cyber security experts

October 12, 2023

Via: The Register

According to the Cyber Security Breaches Survey 26 percent of medium businesses, 37 percent of large businesses and 25 percent of high-income charities have experienced cyber crime in the last 12 months. With cyber security experts in high demand, finding […]


Access control, Security

Researchers Find Way to Recover Cryptographic Keys by Analyzing LED Flickers

June 26, 2023

Via: The Hacker News

In what’s an ingenious side-channel attack, a group of academics has found that it’s possible to recover secret keys from a device by analyzing video footage of its power LED. “Cryptographic computations performed by the CPU change the power consumption […]


Threats & Malware, Vulnerabilities

How long before quantum computers break encryption?

September 30, 2019

Via: Help Net Security

The verdict is in: quantum computing poses an existential threat to asymmetric cryptography algorithms like RSA and ECC that underpin practically all current Internet security. This comes straight from the National Academy of Science’s Committee on Technical Assessment of the […]


Network security

How quantum computers will destroy and (maybe) save cryptography

August 2, 2018

Via: CSO Online

More than a decade ago, I was giving an introductory presentation on quantum cryptography, as I had done many times before. I discussed the basic concepts of quantum physics, quantum computers, and quantum cryptography. I ended it with the promise […]


Network security

Lessons From the Cold War: Data Security Through Obscurity

May 24, 2018

Via: Security Intelligence

During a long-term project in 2016, my team was tasked with reviewing the security features of a popular Soviet-era GPS satellite constellation. The client used it to obtain more exact positioning for workers who were attempting to locate underground utilities. […]


Access control

My NSA security violation

September 11, 2015

Via: access-control

About a year after I started at the National Security Agency, I suffered the embarrassment of being caught violating #nsa #security procedures. I was totally guilty and it was quite humiliating, as you can imagine. It was made worse by […]


Privacy protection

MIT’s Bitcoin-Inspired ‘Enigma’ Lets Computers Mine Encrypted Data

June 30, 2015

Via: privacy-protection

The cryptography behind bitcoin solved a paradoxical problem: a currency with no regulator that nonetheless can’t be counterfeited. Now a similar mix of math and code promises to pull off another seemingly magical feat by allowing anyone to share their […]


Privacy protection

IRS Encourages Poor Cryptography

February 18, 2015

Via: privacy-protection

I’m not sure what to make of this, or even what it means. The #irs has a standard called IDES: International Data Exchange Service: “The International Data Exchange Service (IDES) is an electronic delivery point where Financial Institutions (FI) and […]