#quantum-resistance

[ follow ]
#quantum-computing
Information security
fromnews.bitcoin.com
2 hours ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Google's whitepaper on quantum threats urges immediate post-quantum preparations, shifting the migration deadline to 2029 and highlighting vulnerabilities in blockchain security.
Science
fromNature
2 days ago

'It's a real shock': quantum-computing breakthroughs pose imminent risks to cybersecurity

Quantum hackers could pose a serious threat to digital security by the end of this decade, much sooner than previously anticipated.
Information security
fromTechRepublic
2 days ago

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
Science
fromArs Technica
3 days ago

New quantum-computing advances heighten threat to elliptic curve cryptosystems

Utility-scale quantum computers can break elliptic curve cryptography much more efficiently than previously thought.
Tech industry
fromFuturism
6 days ago

Google Warns That Quantum Armageddon Is Drawing Closer

Google has moved up its timeline to prepare for quantum computers potentially breaking encryption algorithms to 2029, highlighting significant security threats.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Google's Quantum Advances Bring Bitcoin Security Debate Into Focus

Breaking elliptic curve cryptography may require fewer quantum resources than previously thought, raising urgency in the crypto industry.
Information security
fromnews.bitcoin.com
2 hours ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Google's whitepaper on quantum threats urges immediate post-quantum preparations, shifting the migration deadline to 2029 and highlighting vulnerabilities in blockchain security.
Science
fromNature
2 days ago

'It's a real shock': quantum-computing breakthroughs pose imminent risks to cybersecurity

Quantum hackers could pose a serious threat to digital security by the end of this decade, much sooner than previously anticipated.
Information security
fromTechRepublic
2 days ago

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
Science
fromArs Technica
3 days ago

New quantum-computing advances heighten threat to elliptic curve cryptosystems

Utility-scale quantum computers can break elliptic curve cryptography much more efficiently than previously thought.
Tech industry
fromFuturism
6 days ago

Google Warns That Quantum Armageddon Is Drawing Closer

Google has moved up its timeline to prepare for quantum computers potentially breaking encryption algorithms to 2029, highlighting significant security threats.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Google's Quantum Advances Bring Bitcoin Security Debate Into Focus

Breaking elliptic curve cryptography may require fewer quantum resources than previously thought, raising urgency in the crypto industry.
#bitcoin
fromFast Company
2 days ago
Cryptocurrency

Bitcoin could fall victim to quantum computers sooner than expected. Now crypto investors are turning to these alternative coins

Cryptocurrency
fromBitcoin Magazine
3 days ago

Google's New Quantum Research Renews Push To Secure Bitcoin

Bitcoin's reliance on elliptic curve cryptography faces potential threats from quantum computing advancements, necessitating urgent preparation among developers and investors.
fromBitcoin Magazine
3 days ago
Cryptocurrency

Satoshi's 2010 Quantum Response Is Getting A 2026 Stress Test As Google Warns Timeline May Be Closer Than Expected

Bitcoin's security can adapt to cryptographic threats, with potential upgrades to stronger algorithms if vulnerabilities arise.
fromFortune
2 months ago
Cryptocurrency

Coinbase launches expert board to assess quantum computing threat | Fortune

Quantum computing poses a medium-term threat to current cryptography protecting Bitcoin; Coinbase formed an independent advisory board to prepare.
Cryptocurrency
fromFast Company
2 days ago

Bitcoin could fall victim to quantum computers sooner than expected. Now crypto investors are turning to these alternative coins

Bitcoin's security is threatened by quantum computers, prompting a shift towards quantum-resistant tokens.
Cryptocurrency
fromBitcoin Magazine
3 days ago

Google's New Quantum Research Renews Push To Secure Bitcoin

Bitcoin's reliance on elliptic curve cryptography faces potential threats from quantum computing advancements, necessitating urgent preparation among developers and investors.
Cryptocurrency
fromBitcoin Magazine
3 days ago

Satoshi's 2010 Quantum Response Is Getting A 2026 Stress Test As Google Warns Timeline May Be Closer Than Expected

Bitcoin's security can adapt to cryptographic threats, with potential upgrades to stronger algorithms if vulnerabilities arise.
#privacy
Privacy professionals
fromArs Technica
1 day ago

Perplexity's "Incognito Mode" is a "sham," lawsuit says

Perplexity's AI allegedly shares sensitive user chats with Google and Meta without consent, raising significant privacy concerns.
Privacy professionals
fromArs Technica
1 day ago

Perplexity's "Incognito Mode" is a "sham," lawsuit says

Perplexity's AI allegedly shares sensitive user chats with Google and Meta without consent, raising significant privacy concerns.
DevOps
fromInfoWorld
1 day ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Women in technology
fromInfoQ
1 week ago

Security and Architecture: To Betray One Is To Destroy Both

Architecture and security have evolved from separate entities to a deeply connected partnership focused on resilience and protection against threats.
#cybersecurity
Information security
fromSecurityWeek
1 week ago

Dell and HP Roll Out Quantum-Resistant Device Security and AI-Era Cyber Resilience

HP and Dell Technologies announced new security features to enhance hardware protections against physical attacks and quantum-computing threats.
Information security
fromTelecompetitor
2 days ago

Quantum network supports high-security QKD: How it works, why it matters

Quantum technology presents both risks and benefits for network security, particularly through quantum key distribution (QKD) as a solution to encryption vulnerabilities.
Venture
from24/7 Wall St.
2 weeks ago

Broadcom Just Shipped the World's First Quantum-Safe Network Encryption - 3 Reasons AVGO Investors Should Pay Attention

Broadcom shipped the first quantum-safe network encryption solution embedded at the silicon level, positioning itself as a first-mover in a compliance-driven enterprise infrastructure upgrade cycle.
#quantum-cryptography
Privacy technologies
fromNextgov.com
2 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Information security
fromnews.bitcoin.com
2 days ago

Naoris Protocol Deploys Post-Quantum Mainnet to Secure Global Digital Infrastructure

Naoris Protocol launched its Layer 1 mainnet for decentralized post-quantum security, processing over 106 million transactions to combat quantum computing threats.
Privacy technologies
fromWIRED
2 weeks ago

Signal's Creator Is Helping Encrypt Meta AI

Moxie Marlinspike's privacy platform Confer will integrate its encryption technology into Meta's AI systems to protect user data in AI conversations.
Privacy professionals
fromMedCity News
2 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
DevOps
fromNextgov.com
3 weeks ago

IBM unveils new hybrid quantum computing architecture

IBM introduces a hybrid quantum-classical computing architecture combining quantum processors with classical CPUs and GPUs to solve complex scientific problems currently beyond reach.
Information security
fromSecurityWeek
3 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
fromSecurityWeek
3 weeks ago

Quantro Security Emerges From Stealth With $2.5 Million in Funding

Quantro Security's VM.Analyst modernizes vulnerability management with a purpose-built AI platform that addresses traditional challenges facing security operations teams. The outcome is deep analysis and prioritization that goes beyond human capabilities alone.
Venture
#quantum-information-science
#malware
Information security
fromThe Hacker News
1 week ago

ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories

A sophisticated malware campaign targets Web3 support teams using deceptive links to deliver malicious executables and establish persistent communication with threat actors.
Information security
fromThe Hacker News
1 week ago

ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories

A sophisticated malware campaign targets Web3 support teams using deceptive links to deliver malicious executables and establish persistent communication with threat actors.
#quantum-computing-threat
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Bitcoin's Quantum Risk May Be Real, But The Network Is Preparing: Report

Quantum computing poses a long-term threat to Bitcoin's security through elliptic curve cryptography, but developers are actively building protective solutions before the technology becomes viable.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Bitcoin's Quantum Risk May Be Real, But The Network Is Preparing: Report

Quantum computing poses a long-term threat to Bitcoin's security through elliptic curve cryptography, but developers are actively building protective solutions before the technology becomes viable.
#post-quantum-cryptography
Information security
fromComputerWeekly.com
1 week ago

Google targets 2029 for post-quantum cyber readiness | Computer Weekly

Google plans to migrate to post-quantum cryptography by 2029, accelerating its timeline due to advancements in quantum technology and emerging security threats.
Information security
fromComputerWeekly.com
3 weeks ago

Trump looks to power up post-quantum, AI security | Computer Weekly

The Trump administration's cyber strategy prioritizes maintaining US technological superiority in post-quantum cryptography, artificial intelligence, and securing innovation against emerging threats.
Information security
fromInfoQ
4 weeks ago

Standardizing Post-Quantum IPsec: Cloudflare Adopts Hybrid ML-KEM to Replace Ciphersuite Bloat

Cloudflare implemented hybrid ML-KEM encryption in IPsec to meet NIST's 2030 quantum-resistant deadline without requiring hardware upgrades or complex configurations.
Information security
fromThe Hacker News
4 weeks ago

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

Attackers are collecting encrypted data today to decrypt later using quantum computers, requiring organizations to adopt quantum-resistant encryption now to protect long-term sensitive data.
Information security
fromComputerWeekly.com
1 week ago

Google targets 2029 for post-quantum cyber readiness | Computer Weekly

Google plans to migrate to post-quantum cryptography by 2029, accelerating its timeline due to advancements in quantum technology and emerging security threats.
Information security
fromComputerWeekly.com
3 weeks ago

Trump looks to power up post-quantum, AI security | Computer Weekly

The Trump administration's cyber strategy prioritizes maintaining US technological superiority in post-quantum cryptography, artificial intelligence, and securing innovation against emerging threats.
Information security
fromInfoQ
4 weeks ago

Standardizing Post-Quantum IPsec: Cloudflare Adopts Hybrid ML-KEM to Replace Ciphersuite Bloat

Cloudflare implemented hybrid ML-KEM encryption in IPsec to meet NIST's 2030 quantum-resistant deadline without requiring hardware upgrades or complex configurations.
Information security
fromThe Hacker News
4 weeks ago

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

Attackers are collecting encrypted data today to decrypt later using quantum computers, requiring organizations to adopt quantum-resistant encryption now to protect long-term sensitive data.
Miscellaneous
fromBitcoin Magazine
1 month ago

The Core Issue: Libsecp256k1, Bitcoin's Cryptographic Heart

Libsecp256k1 evolved from a hobby project into essential consensus-critical software protecting Bitcoin's multi-trillion dollar network through secure elliptic curve cryptography implementation.
fromWIRED
1 month ago

How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

The movements of a hard drive's components, keystrokes on a keyboard, even the electric charge in a semiconductor's wires produce radio waves, sound, and vibrations that transmit in all directions and can-when picked up by someone with sufficiently sensitive equipment and enough spycraft to decipher those signals-reveal your private data and activities.
Privacy technologies
Cryptocurrency
fromCointelegraph
3 weeks ago

Bitcoin's Quantum Defense Plan: What BIP-360 Actually Changes

BIP-360 formally adds quantum resistance to Bitcoin's roadmap through Pay-to-Merkle-Root, reducing elliptic curve exposure by eliminating Taproot key path spending while preserving smart contract flexibility.
Information security
fromTheregister
2 weeks ago

Cryptographer fights RustSec ban over bug reports

Nadim Kobeissi filed a complaint against Rust maintainers over critical bugs in cryptography libraries after facing dismissal and bans.
Mental health
fromSecuritymagazine
1 month ago

Security Insights Delivered Through Podcasts

Security professionals face significant mental-health risks and team burnout, requiring leaders to integrate empathetic practices and psychological safety into security operations.
Information security
fromThe Cipher Brief
2 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
Higher education
fromNature
2 months ago

Six steps to protect researchers' digital security

Academic freedom and researchers' safety are deteriorating globally due to harassment, political interference, legal threats, and underreporting.
Information security
fromSecurityWeek
1 month ago

Google Working Towards Quantum-Safe Chrome HTTPS Certificates

Google plans to enhance Chrome's HTTPS certificate resilience against quantum computers using Merkle Tree Certificates that reduce bandwidth while maintaining security and transparency.
Information security
fromThe Hacker News
1 month ago

Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome

Google is developing Merkle Tree Certificates to secure HTTPS against quantum computing threats while maintaining current internet speed and performance.
fromSecuritymagazine
2 months ago

The New Battleground of Cybersecurity

I've always had what I would consider a hacker mindset, a curiosity to take things apart, understand them, and use that knowledge to solve problems. That mindset took me on a circuitous route into the cybersecurity industry; after being kicked out of high school for hacking computer systems, I worked a range of jobs, managing office supply companies by day and cracking Wi-Fi networks by night until I started a Digital Forensics degree which led me to the world of security research.
Science
fromTheregister
2 months ago

How hackers fight back against ICE surveillance tech

The Electronic Frontier Foundation (EFF) has rounded up several of these counter surveillance projects, and perhaps unsurprisingly many of these have to do with Flock, best known for its automated license plate reader (ALPR). Flock operates the largest network of surveillance cameras in America, and, while it has contracts with thousands of police departments and municipalities across the US, sometimes ICE gains access to this footage, according to US Senator Ron Wyden (D-OR) and those who have looked into Flock's misuse.
Privacy technologies
Science
fromWIRED
2 months ago

A New Bridge Links the Strange Math of Infinity to Computer Science

Problems in descriptive set theory can be reformulated as equivalent problems about communication in distributed computer networks, linking infinite-set logic with finite algorithms.
#bitlocker
fromZDNET
2 months ago
Information security

How to keep your PC encryption key safe - from Microsoft and the FBI

fromZDNET
2 months ago
Information security

How to keep your PC encryption key safe - from Microsoft and the FBI

Science
fromBig Think
1 month ago

The most important quantum advance of the 21st century

The Pusey-Barrett-Rudolph theorem supports an ontic interpretation of the quantum state and constrains hidden-variable and epistemic models of quantum reality.
fromSecurityWeek
1 month ago

NIST's Quantum Breakthrough: Single Photons Produced on a Chip

NIST has developed a chip that reliably emits a single photon on demand. This ability will improve the efficiency of QKD (quantum key distribution) as we prepare for the arrival of quantum computers. Quantum computers will upend current cryptology by using Shor's algorithm to rapidly negate the current public/private key secure encryption methods. This has largely been solved by NIST's post quantum cryptology (PQC) algorithms.
Information security
fromZDNET
1 month ago

Half of all cyberattacks start in your browser: 10 essential tips for staying safe

Web browsers are among the top targets for today's cybercriminals, playing a role in nearly half of all security incidents, new research reveals. According to Palo Alto Networks' 2026 Global Incident Response report, an analysis of 750 major cyber incidents recorded last year across 50 countries found that, in total, 48% of cybercrime events involved browser activity. Individuals trying to connect to the web, including business employees, are exposed to cyberthreats on a daily basis.
Information security
fromFortune
2 months ago

I oversee a lab where engineers try to destroy my life's work. It's the only way to prepare for quantum threats | Fortune

This happened in the early 1990s, when I was a young engineer starting an internship at one of the companies that helped create the smart card industry. I believed my card was secure. I believed the system worked. But watching strangers casually extract something that was supposed to be secret and protected was a shock. It was also the moment I realized how insecure security actually is, and the devastating impact security breaches could have on individuals, global enterprises, and governments.
Information security
#aes-256-gcm
fromFast Company
1 month ago

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

Meanwhile, the actual threat landscape evolved in an entirely different direction. Today's attackers aren't sitting at keyboards manually typing password guesses. They're running offline brute force attacks with dedicated GPU rigs that can attempt 100 billion passwords per second against hashing algorithms like MD5 or SHA-1. At that speed, your clever substitution of "@" for "a" buys you microseconds of additional security.
Information security
Information security
fromNextgov.com
2 months ago

NIST releases a new draft cybersecurity framework for systems that never stop moving

Transportation cybersecurity lags behind other critical infrastructure sectors, creating evacuation and public-safety risks as transit systems become more digitalized.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, provides robust, reliable protection for sensitive personal data against unauthorized access and modern cyber threats.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

AES-256-GCM strong encryption provides robust, reliable protection for sensitive personal data as a last line of defense against modern cyber threats.
Information security
fromThe Hacker News
2 months ago

Cybersecurity Predictions 2026: The Hype We Can Ignore (And the Risks We Can't)

Organizations must prioritize evidence-based cybersecurity predictions focusing on targeted ransomware, internal AI-related risks, and skepticism about AI-orchestrated attacks.
[ Load more ]