БЛОГ

Archive for the ‘encryption’ category: Page 23

Aug 7, 2021

AWS taps up Singapore scientists to overcome hurdles facing quantum computing

Posted by in categories: computing, encryption, quantum physics

‘Some forms of encryption used today can be broken by future large-scale quantum computers, which drives a search for alternatives’


“Some forms of encryption used today can be broken by future large-scale quantum computers, which also drives a search for alternatives,” Ling said.

In a canned statement, the NUS said AWS will gain access to the university’s National Quantum-Safe Network, a vendor-neutral platform for developing technology and integrating some of it into local fiber networks.

Continue reading “AWS taps up Singapore scientists to overcome hurdles facing quantum computing” »

Jul 29, 2021

McAfee: Babuk ransomware decryptor causes encryption ‘beyond repair’

Posted by in categories: cybercrime/malcode, encryption

Babuk announced earlier this year that it would be targeting Linux/UNIX and ESXi or VMware systems with ransomware.

Jul 16, 2021

Quantum random number generator sets benchmark for size, performance

Posted by in categories: computing, encryption, quantum physics, security

As pervasive as they are in everyday uses, like encryption and security, randomly generated digital numbers are seldom truly random.

So far, only bulky, relatively slow quantum random generators (QRNGs) can achieve levels of randomness on par with the basic laws of quantum physics, but researchers are looking to make these devices faster and more portable.

In Applied Physics Letters, scientists from China present the fastest real-time QRNG to date to make the devices quicker and more portable. The device combines a state-of-the-art photonic integrated with optimized real-time postprocessing for extracting randomness from quantum entropy source of vacuum states.

Jul 5, 2021

NIST maps out the migration to post-quantum cryptography

Posted by in categories: encryption, information science, mapping, quantum physics

“Because nothing can protect hardware, software, applications or data from a quantum-enabled adversary, encryption keys and data will require re-encrypting with a quantum-resistant algorithm and deleting or physically securing copies and backups.” v/@preskil… See More.


To ease the disruption caused by moving away from quantum-vulnerable cryptographic code, NIST has released a draft document describing the first steps of that journey.

Jun 25, 2021

Amazon acquires encrypted messaging app Wickr

Posted by in categories: biotech/medical, encryption, governance, government, military

“We’re excited to share that AWS has acquired Wickr, an innovative company that has developed the industry’s most secure, end-to-end encrypted, communication technology,” Stephen Schmidt, Amazon Web Services’ vice president, wrote. With a nod to the company’s ever-deepening relationships with the military, and Washington in general, Schmidt added that Wickr’s features give “security conscious enterprises and government agencies the ability to implement important governance and security controls to help them meet their compliance requirements.” Schmidt himself has a background in this space: his LinkedIn profile notes he spent a decade at the FBI.

Wickr’s app — like secure messaging competitor Signal — has been popular with journalists and whistleblowers; it’s also been a go-to for criminals, Motherboard notes. It’s unclear if the proximity to the tech monolith will impact the app’s popularity for free users.

In Amazon’s case, Schmidt indicates the acquisition was at least partially influenced by the need to preserve information security while working remotely. “With the move to hybrid work environments, due in part to the COVID-19 pandemic, enterprises and government agencies have a growing desire to protect their communications,” he wrote.

Jun 24, 2021

Ransomware: Now gangs are using virtual machines to disguise their attacks

Posted by in categories: cybercrime/malcode, encryption, virtual reality

Cyber criminals are increasingly using virtual machines to compromise networks with ransomware.

By using virtual machines as part of the process, ransomware attackers are able to conduct their activity with additional subtlety, because running the payload within a virtual environment reduces the chances of the activity being discovered – until it’s too late and the ransomware has encrypted files on the host machine.

During a recent investigation into an attempted ransomware attack, cybersecurity researchers at Symantec found the ransomware operations had been using VirtualBox – a legitimate form of open-source virtual machine software – to run instances of Windows 7 to aid the installation of ransomware.

Jun 23, 2021

UK company to start sending secret quantum keys with satellites in 2023

Posted by in categories: encryption, quantum physics, satellites

U.K. start-up Arqit expects to launch a worldwide service for sharing unbreakable quantum-encrypted messages using satellites in 2023.

Jun 18, 2021

Quantum Breakthrough: New Invention Keeps Qubits of Light Stable at Room Temperature

Posted by in categories: encryption, energy, quantum physics

Researchers from University of Copenhagen have developed a new technique that keeps quantum bits of light stable at room temperature instead of only working at-270 degrees. Their discovery saves power and money and is a breakthrough in quantum research.

As almost all our private information is digitalized, it is increasingly important that we find ways to protect our data and ourselves from being hacked.

Quantum Cryptography is the researchers’ answer to this problem, and more specifically a certain kind of qubit — consisting of single photons: particles of light.

Jun 11, 2021

Seraphim Capital unveils worlds first listed space technology fund

Posted by in categories: encryption, quantum physics, space

TAMPA, Fla. — Seraphim Capital plans to trade stakes it has amassed in space technology startups on the public market through an investment trust.

The Seraphim Space Investment Trust will eventually comprise bets in 19 international startups, including satellite data specialist Spire Global, quantum encryption firm Arqit and space-based cellular network operator AST Space Mobile.

Those three recently got valuations of more than $1 billion in mergers with special purpose acquisition companies (SPACs), investment vehicles that offer another route to public markets.

Jun 9, 2021

Quantum computing is inevitable, cryptography prepares for the future

Posted by in categories: chemistry, encryption, mathematics, quantum physics, robotics/AI, security

Quantum computing began in the early 1980s. It operates on principles of quantum physics rather than the limitations of circuits and electricity which is why it is capable of processing highly complex mathematical problems so efficiently. Quantum computing could one day achieve things that classical computing simply cannot. The evolution of quantum computers has been slow, but things are accelerating, thanks to the efforts of academic institutions such as Oxford, MIT, and the University of Waterloo, as well as companies like IBM, Microsoft, Google, and Honeywell.

IBM has held a leadership role in this innovation push and has named optimization as the most likely application for consumers and organizations alike.

Honeywell expects to release what it calls the “world’s most powerful quantum computer” for applications like fraud detection, optimization for trading strategies, security, machine learning, and chemistry and materials science.

Page 23 of 58First2021222324252627Last