The Biden administration has made a policy commitment to promote US leadership in the emerging technology of quantum computing. The National Security Memo on quantum computing, published...
Hackers commonly exploit vulnerabilities in corporate networks to gain access, but a researcher has turned the table by finding exploits in the most common ransomware and...
Intentional and unintentional data breaches in emails are not unusual, and since they are the backbone of communication, organizations need to keep their data protected. Echoworx’s...
A catastrophic vulnerability in the implementation of certain encryption operations in Java JDK makes it easy for attackers to forge counterfeit credentials. The cryptographic weakness – which affects...
Developers of the OpenSSH secure networking utility are ‘future proofing’ the technology by adopting post-quantum cryptography. The latest OpenSSH 9.0 release defaults to the NTRU Prime algorithm – a...
A WatchGuard report shows a record number of evasive network malware detections with advanced threats increasing by 33%, indicating a higher level of zero day threats than ever...
Microsoft says that Windows 11 will get more security improvements in upcoming releases, which will add more protection against cybersecurity threats, offer better encryption, and block malicious...
A report of the European Union Agency for Cybersecurity (ENISA) explores how pseudonymization techniques can help increase the protection of health data. The healthcare sector has highly benefited...
A research from Thales has found that malware, ransomware and phishing continues to plague global organizations. In fact, 21% have experienced a ransomware attack in the last year;...
Researchers have conducted a technical experiment, testing ten ransomware variants to determine how fast they encrypt files and evaluate how feasible it would be to timely...
Recent Comments