Please turn on your JavaScript for this page to function normally.
Signal app
Signal takes a quantum leap with E2EE protocol upgrade

Signal has announced an upgrade to its end-to-end encryption (E2EE) protocol to protect users of its popular messaging app from encryption-breaking attacks through quantum …

AWS
How to set up and speed up Amazon S3 Replication for cross-region data replication

Amazon S3 is a simple cloud storage solution enabling effortless storage and retrieval of large amounts of data from different geographies. It’s engineered for scalability, …

numbers
New quantum random number generator could revolutionize encryption

Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption developed at …

lock
Why end-to-end encryption matters

In this Help Net Security video, Kayne McGladrey, IEEE Senior Member and Field CISO at Hyperproof, discusses end-to-end encryption (E2EE). E2EE ensures that only two parties – …

blocks
5 ways in which FHE can solve blockchain’s privacy problems

Blockchain technology has gained significant traction due to its decentralized nature and immutability, providing transparency and security for various applications, …

robot
Uncovering a privacy-preserving approach to machine learning

In the era of data-driven decision making, businesses are harnessing the power of machine learning (ML) to unlock valuable insights, gain operational efficiencies, and …

SandboxAQ Sandwich
SandboxAQ launches open-source meta-library of cryptographic algorithms

SandboxAQ launched Sandwich, an open-source framework that simplifies modern cryptography management and enables developers to steer their organizations towards cryptographic …

healthcare
Why data travel is healthcare’s next big cybersecurity challenge

Do you know where your patients’ data lives once it’s in the cloud? Unfortunately, for many healthcare organizations, the answer is no – or, at least, it’s not a definitive …

connected car
How secure is your vehicle with digital key technology?

Digital key technology allows mobile devices to streamline approval for everyday access points, making it a fitting solution for the automotive industry. While there are a few …

Microsoft 365
Phishers use encrypted file attachments to steal Microsoft 365 account credentials

Phishers are using encrypted restricted-permission messages (.rpmsg) attached in phishing emails to steal Microsoft 365 account credentials. “[The campaigns] are low …

ransomware
Refined methodologies of ransomware attacks

Adversaries were able to encrypt data in 76% of the ransomware attacks that were conducted against surveyed organizations, according to Sophos. The survey also shows that when …

encryption
The WhatsApp of secure computation

A key term when discussing encryption these days is end-to-end (E2E) encryption. The idea with E2E encryption is that data is kept confidential between the encryptor and the …

Don't miss

Cybersecurity news