Quantum supremacy is almost uncertainly here
According to recent news, quantum supremacy is reached. What should we do about it?
98 articles
According to recent news, quantum supremacy is reached. What should we do about it?
Is there Internet on the ISS, what is it like, and how long does it take to get a message from Mars — learn about the networks of today and the future.
Dave and Jeff discuss a number of issues ranging from backdooring encrypted chats to POS malware and more.
Facebook suing developers from Ukraine, Apex Legends’ battle against cheaters, Facebook’s double-edged sword on privacy, and more.
In this episode, Dave and Jeff plus some special guests talk travel and keeping your data safe.
KeyPass ransomware is infecting computers worldwide, encrypting almost everything in its path. And it all starts with downloading a seemingly innocuous installer.
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
How can we get prepared for the decryption capabilities of upcoming quantum computers?
This new version of SynAck ransomware uses sophisticated evasion techniques.
We explain what digital certificates are, what types exist, and what problems are associated with them.
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
Love the convenience and features of Dropbox but need better security? Here are some alternatives.
Drones are a part of the Internet of Things, which is widely known to be vulnerable. SEO title: How to hijack a drone
As we see from recent news, quantum computing is evolving faster than anyone could’ve expected. What does this mean for us, the average users?
For a messaging app to be truly private, encryption is not enough. In this post we discuss the necessary features of private messaging.
Cybercriminals are always on the lookout for a new trend to exploit and have developed malware that gives them access to encryption software.
Encrypted messaging comes to Facebook Messenger for Android and iOS
In the second part of our “Ask the expert” session, Jornt van der Wiel answers questions about encryption: how it works, what it is for, and more.
Hacked medical equipment can cost patients a lot — their health or even their lives.