Quantum Cryptography Apocalypse: A Timeline and Action Plan
November 14 2022Quantum computing's a clear threat to encryption, and post-quantum crypto means adding new cryptography to hardware and software without being disruptive.
Read moreQuantum computing's a clear threat to encryption, and post-quantum crypto means adding new cryptography to hardware and software without being disruptive.
Read moreThe International Committee of the Red Cross wants some digital equivalent to the iconic red cross, to alert would-be hackers that they are accessing a medical network.
The emblem...
Read more
Perfect for an evening out. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting...
Read moreMilitary veterans tend to have the kind of skills that would make them effective cybersecurity professionals, but making the transition is not that easy.
Read moreI have a new book coming out in February. It’s about hacking.
A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back isn’t about...
Read morePretty much every aspect of the effort to create easy-to-understand labels for Internet-of-Things (IoT) products is up in the air, according to participants in the process.
Read moreMultifactor authentication has gained adoption among organizations as a way of improving security over passwords alone, but increasing theft of browser cookies undermines that security.
Read moreThe bug affects several Aiphone GT models using NFC technology and allows malicious actors to potentially gain access to sensitive facilities.
Read moreChinese government employs spyware to detect so-called "pre-crimes" including using a VPN, religious apps, or WhatsApp, new analysis reveals.
Read moreA bit like leaving the front door keys under the doormat...
Read more
Recent Comments