#quantum-resistant

[ follow ]
Cryptocurrency
fromnews.bitcoin.com
2 hours ago

Circle Announces Quantum-Resistant Roadmap to Secure Future Digital Asset Infrastructure

Circle's Arc platform will launch with post-quantum signature support to secure institutional assets against quantum threats.
#quantum-computing
fromNature
4 days ago
Science

'It's a real shock': quantum-computing breakthroughs pose imminent risks to cybersecurity

Information security
fromnews.bitcoin.com
2 days ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Google's whitepaper on quantum threats urges immediate post-quantum preparations, shifting the migration deadline to 2029 and highlighting vulnerabilities in blockchain security.
Science
fromNature
4 days ago

'It's a real shock': quantum-computing breakthroughs pose imminent risks to cybersecurity

Quantum hackers could pose a serious threat to digital security by the end of this decade, much sooner than previously anticipated.
Business
from24/7 Wall St.
6 days ago

1 Top Stock to Buy for the 'Quantum Advantage' in the 2030s

Investors are currently disinterested in quantum computing stocks, which have significantly declined, but opportunities may arise during such downturns.
Information security
fromTechRepublic
4 days ago

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
Tech industry
fromFuturism
1 week ago

Google Warns That Quantum Armageddon Is Drawing Closer

Google has moved up its timeline to prepare for quantum computers potentially breaking encryption algorithms to 2029, highlighting significant security threats.
Science
fromArs Technica
5 days ago

New quantum-computing advances heighten threat to elliptic curve cryptosystems

Utility-scale quantum computers can break elliptic curve cryptography much more efficiently than previously thought.
#privacy
#ai
#bitcoin
fromFast Company
4 days ago
Cryptocurrency

Bitcoin could fall victim to quantum computers sooner than expected. Now crypto investors are turning to these alternative coins

Cryptocurrency
fromBitcoin Magazine
5 days ago

Google's New Quantum Research Renews Push To Secure Bitcoin

Bitcoin's reliance on elliptic curve cryptography faces potential threats from quantum computing advancements, necessitating urgent preparation among developers and investors.
fromBitcoin Magazine
5 days ago
Cryptocurrency

Satoshi's 2010 Quantum Response Is Getting A 2026 Stress Test As Google Warns Timeline May Be Closer Than Expected

Bitcoin's security can adapt to cryptographic threats, with potential upgrades to stronger algorithms if vulnerabilities arise.
Cryptocurrency
fromFast Company
4 days ago

Bitcoin could fall victim to quantum computers sooner than expected. Now crypto investors are turning to these alternative coins

Bitcoin's security is threatened by quantum computers, prompting a shift towards quantum-resistant tokens.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Google's New Quantum Research Renews Push To Secure Bitcoin

Bitcoin's reliance on elliptic curve cryptography faces potential threats from quantum computing advancements, necessitating urgent preparation among developers and investors.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Satoshi's 2010 Quantum Response Is Getting A 2026 Stress Test As Google Warns Timeline May Be Closer Than Expected

Bitcoin's security can adapt to cryptographic threats, with potential upgrades to stronger algorithms if vulnerabilities arise.
#cybersecurity
Information security
fromTechzine Global
4 days ago

AI gives attackers superpowers, so defenders must use it too

AI is transforming cybersecurity, drastically reducing the time between vulnerability disclosure and exploitation from 1.5 years to mere hours.
Information security
fromSecurityWeek
1 week ago

Dell and HP Roll Out Quantum-Resistant Device Security and AI-Era Cyber Resilience

HP and Dell Technologies announced new security features to enhance hardware protections against physical attacks and quantum-computing threats.
Information security
fromTelecompetitor
4 days ago

Quantum network supports high-security QKD: How it works, why it matters

Quantum technology presents both risks and benefits for network security, particularly through quantum key distribution (QKD) as a solution to encryption vulnerabilities.
Venture
from24/7 Wall St.
2 weeks ago

Broadcom Just Shipped the World's First Quantum-Safe Network Encryption - 3 Reasons AVGO Investors Should Pay Attention

Broadcom shipped the first quantum-safe network encryption solution embedded at the silicon level, positioning itself as a first-mover in a compliance-driven enterprise infrastructure upgrade cycle.
#quantum-cryptography
Privacy professionals
fromWIRED
1 week ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
Information security
fromnews.bitcoin.com
4 days ago

Naoris Protocol Deploys Post-Quantum Mainnet to Secure Global Digital Infrastructure

Naoris Protocol launched its Layer 1 mainnet for decentralized post-quantum security, processing over 106 million transactions to combat quantum computing threats.
DevOps
fromNextgov.com
3 weeks ago

IBM unveils new hybrid quantum computing architecture

IBM introduces a hybrid quantum-classical computing architecture combining quantum processors with classical CPUs and GPUs to solve complex scientific problems currently beyond reach.
Information security
fromSecurityWeek
5 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Privacy professionals
fromMedCity News
2 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
fromSecurityWeek
3 weeks ago

Quantro Security Emerges From Stealth With $2.5 Million in Funding

Quantro Security's VM.Analyst modernizes vulnerability management with a purpose-built AI platform that addresses traditional challenges facing security operations teams. The outcome is deep analysis and prioritization that goes beyond human capabilities alone.
Venture
#quantum-information-science
#malware
Information security
fromThe Hacker News
1 week ago

ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories

A sophisticated malware campaign targets Web3 support teams using deceptive links to deliver malicious executables and establish persistent communication with threat actors.
Information security
fromThe Hacker News
1 week ago

ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories

A sophisticated malware campaign targets Web3 support teams using deceptive links to deliver malicious executables and establish persistent communication with threat actors.
fromZDNET
1 month ago

Why encrypted backups may fail in an AI-driven ransomware era

What if I told you that everything you know and everything you do to ensure quality backups is no longer viable? In fact, what if I told you that in an era of generative AI, when it comes to backups, we're all pretty much screwed?
Miscellaneous
fromWIRED
1 month ago

How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

The movements of a hard drive's components, keystrokes on a keyboard, even the electric charge in a semiconductor's wires produce radio waves, sound, and vibrations that transmit in all directions and can-when picked up by someone with sufficiently sensitive equipment and enough spycraft to decipher those signals-reveal your private data and activities.
Privacy technologies
#quantum-computing-threat
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Bitcoin's Quantum Risk May Be Real, But The Network Is Preparing: Report

Quantum computing poses a long-term threat to Bitcoin's security through elliptic curve cryptography, but developers are actively building protective solutions before the technology becomes viable.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Bitcoin's Quantum Risk May Be Real, But The Network Is Preparing: Report

Quantum computing poses a long-term threat to Bitcoin's security through elliptic curve cryptography, but developers are actively building protective solutions before the technology becomes viable.
#post-quantum-cryptography
Information security
fromComputerWeekly.com
1 week ago

Google targets 2029 for post-quantum cyber readiness | Computer Weekly

Google plans to migrate to post-quantum cryptography by 2029, accelerating its timeline due to advancements in quantum technology and emerging security threats.
Information security
fromComputerWeekly.com
3 weeks ago

Trump looks to power up post-quantum, AI security | Computer Weekly

The Trump administration's cyber strategy prioritizes maintaining US technological superiority in post-quantum cryptography, artificial intelligence, and securing innovation against emerging threats.
Information security
fromInfoQ
1 month ago

Standardizing Post-Quantum IPsec: Cloudflare Adopts Hybrid ML-KEM to Replace Ciphersuite Bloat

Cloudflare implemented hybrid ML-KEM encryption in IPsec to meet NIST's 2030 quantum-resistant deadline without requiring hardware upgrades or complex configurations.
Information security
fromThe Hacker News
1 month ago

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

Attackers are collecting encrypted data today to decrypt later using quantum computers, requiring organizations to adopt quantum-resistant encryption now to protect long-term sensitive data.
Information security
fromComputerWeekly.com
1 week ago

Google targets 2029 for post-quantum cyber readiness | Computer Weekly

Google plans to migrate to post-quantum cryptography by 2029, accelerating its timeline due to advancements in quantum technology and emerging security threats.
Information security
fromComputerWeekly.com
3 weeks ago

Trump looks to power up post-quantum, AI security | Computer Weekly

The Trump administration's cyber strategy prioritizes maintaining US technological superiority in post-quantum cryptography, artificial intelligence, and securing innovation against emerging threats.
Information security
fromInfoQ
1 month ago

Standardizing Post-Quantum IPsec: Cloudflare Adopts Hybrid ML-KEM to Replace Ciphersuite Bloat

Cloudflare implemented hybrid ML-KEM encryption in IPsec to meet NIST's 2030 quantum-resistant deadline without requiring hardware upgrades or complex configurations.
Information security
fromThe Hacker News
1 month ago

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

Attackers are collecting encrypted data today to decrypt later using quantum computers, requiring organizations to adopt quantum-resistant encryption now to protect long-term sensitive data.
Cryptocurrency
fromCointelegraph
3 weeks ago

Bitcoin's Quantum Defense Plan: What BIP-360 Actually Changes

BIP-360 formally adds quantum resistance to Bitcoin's roadmap through Pay-to-Merkle-Root, reducing elliptic curve exposure by eliminating Taproot key path spending while preserving smart contract flexibility.
Mental health
fromSecuritymagazine
1 month ago

Security Insights Delivered Through Podcasts

Security professionals face significant mental-health risks and team burnout, requiring leaders to integrate empathetic practices and psychological safety into security operations.
fromEntrepreneur
1 month ago

AI Can Delete Your Data. Here's Your Prevention Plan.

Never feel that you are totally safe. In July 2025, one company learned the hard way after an AI coding assistant it dearly trusted from Replit ended up breaching a "code freeze" and implemented a command that ended up deleting its entire product database. This was a huge blow to the staff. It effectively meant that months of extremely hard work, comprising 1,200 executive records and 1,196 company records, ended up going away.
Artificial intelligence
fromTheregister
2 months ago

How hackers fight back against ICE surveillance tech

The Electronic Frontier Foundation (EFF) has rounded up several of these counter surveillance projects, and perhaps unsurprisingly many of these have to do with Flock, best known for its automated license plate reader (ALPR). Flock operates the largest network of surveillance cameras in America, and, while it has contracts with thousands of police departments and municipalities across the US, sometimes ICE gains access to this footage, according to US Senator Ron Wyden (D-OR) and those who have looked into Flock's misuse.
Privacy technologies
#bitlocker
fromZDNET
2 months ago
Privacy technologies

Your BitLocker-secured Windows PC isn't so secure after all - unless you do this

fromZDNET
2 months ago
Information security

How to keep your PC encryption key safe - from Microsoft and the FBI

fromZDNET
2 months ago
Privacy technologies

Your BitLocker-secured Windows PC isn't so secure after all - unless you do this

fromZDNET
2 months ago
Information security

How to keep your PC encryption key safe - from Microsoft and the FBI

Information security
fromSecurityWeek
1 month ago

Google Working Towards Quantum-Safe Chrome HTTPS Certificates

Google plans to enhance Chrome's HTTPS certificate resilience against quantum computers using Merkle Tree Certificates that reduce bandwidth while maintaining security and transparency.
fromSecuritymagazine
2 months ago

The New Battleground of Cybersecurity

I've always had what I would consider a hacker mindset, a curiosity to take things apart, understand them, and use that knowledge to solve problems. That mindset took me on a circuitous route into the cybersecurity industry; after being kicked out of high school for hacking computer systems, I worked a range of jobs, managing office supply companies by day and cracking Wi-Fi networks by night until I started a Digital Forensics degree which led me to the world of security research.
Science
Information security
fromThe Hacker News
1 month ago

Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome

Google is developing Merkle Tree Certificates to secure HTTPS against quantum computing threats while maintaining current internet speed and performance.
Science
fromBig Think
2 months ago

The most important quantum advance of the 21st century

The Pusey-Barrett-Rudolph theorem supports an ontic interpretation of the quantum state and constrains hidden-variable and epistemic models of quantum reality.
fromSecurityWeek
1 month ago

NIST's Quantum Breakthrough: Single Photons Produced on a Chip

NIST has developed a chip that reliably emits a single photon on demand. This ability will improve the efficiency of QKD (quantum key distribution) as we prepare for the arrival of quantum computers. Quantum computers will upend current cryptology by using Shor's algorithm to rapidly negate the current public/private key secure encryption methods. This has largely been solved by NIST's post quantum cryptology (PQC) algorithms.
Information security
fromFortune
2 months ago

I oversee a lab where engineers try to destroy my life's work. It's the only way to prepare for quantum threats | Fortune

This happened in the early 1990s, when I was a young engineer starting an internship at one of the companies that helped create the smart card industry. I believed my card was secure. I believed the system worked. But watching strangers casually extract something that was supposed to be secret and protected was a shock. It was also the moment I realized how insecure security actually is, and the devastating impact security breaches could have on individuals, global enterprises, and governments.
Information security
#aes-256-gcm
fromFast Company
1 month ago

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

Meanwhile, the actual threat landscape evolved in an entirely different direction. Today's attackers aren't sitting at keyboards manually typing password guesses. They're running offline brute force attacks with dedicated GPU rigs that can attempt 100 billion passwords per second against hashing algorithms like MD5 or SHA-1. At that speed, your clever substitution of "@" for "a" buys you microseconds of additional security.
Information security
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

AES-256-GCM strong encryption provides robust, reliable protection for sensitive personal data as a last line of defense against modern cyber threats.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, provides robust, reliable protection for sensitive personal data against unauthorized access and modern cyber threats.
Information security
fromThe Hacker News
2 months ago

Cybersecurity Predictions 2026: The Hype We Can Ignore (And the Risks We Can't)

Organizations must prioritize evidence-based cybersecurity predictions focusing on targeted ransomware, internal AI-related risks, and skepticism about AI-orchestrated attacks.
[ Load more ]