encryption
Encryption Evolution is on the Horizon
Quantum computers are an emerging technology that will revolutionize several aspects of computational power across countless fields. One of the more concerning predictions is the likelihood that quantum computers will eventually break ...
AI-Generated Steganography
New research suggests that AIs can produce perfectly secure steganographic images: Abstract: Steganography is the practice of encoding secret information into innocuous content in such a manner that an adversarial third party ...
3 Ways Hackers Can Exploit Your Encrypted Tunnels
It wasn’t that long ago when the ‘crown jewels’ of Equifax, the sensitive data, were up for grabs by the hackers who “masked their incursions by using encrypted communications.” Leveraging encryption to ...
Strengthening Crypto Account Security: Beyond SMS 2FA
As Bitcoin Week kicks off in Miami today, we are reminded the rise of cryptocurrencies is revolutionizing the financial landscape and providing individuals with unprecedented control over their digital assets. However, this ...
Governments Try to Ban Encryption (Yet Again)
Déjà vu: Yet again, they’re tugging on the “think of the children” strings. But you can’t make math illegal ...
Enterprise Organizations Must go Back to Cybersecurity Basics
With more than $170 billion spent on cybersecurity in 2022 (Gartner), enterprise organizations are still struggling to adequately protect their data. From the medical sector to the financial industry, education sector and ...
Show Me the Coverage: Ransomware Actors Demand Cyberinsurance Policies
The landscape of cybersecurity threats is continuously evolving, and ransomware attacks have emerged as a significant concern for organizations of all sizes. In a ransomware attack, cybercriminals encrypt the victim’s files, rendering ...
Understanding Hashing Algorithms: A Beginner’s Guide
Understanding the importance of hashing algorithms in securing your data, different types of hashing algorithms, and their unique features ...
Avoid The Hack: 4 Best Secure Cloud Storage Providers
While convenient, many of the most well-known and popular cloud storage providers have direct access to your files - in some cases, third-parties may have access to your files as well. Encrypted ...
Security Analysis of Threema
A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users ...