News

If you use the best secure messaging apps like Signal or WhatsApp, you may have seen that messages you send on these apps are ...
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection ...
As the National Institute of Standards and Technology is slated to soon debut the first round of encryption algorithms it has deemed suited for the potential arrival of a viable quantum computer, ...
This post is somewhat related to my Wells Fargo thread in the lounge. It got me wondering exactly what depth of encryption is used on cell-streams. To quote a friend who works for VZW, "We use a 26 ...
USB flash drives, iPods and other portable storage devices are pervasive in the workplace and a real threat. They can introduce viruses or malicious code to the network and be used to store sensitive ...
I remember back in the '90s there was a considerably controversy around encryption and encryption algorithms. I think there was a law in the US that forbid implementation of higher than 1024-bit ...
A couple of weeks ago, my home office ground to a standstill because my trusty Wi-Fi router of nearly six years decided to irrevocably quit on me. Not surprisingly, years of service and the internal ...
Raw code for “unbreakable†encryption, based on the principles of quantum physics, has been generated at record speed over optical fiber at the National Institute of Standards and Technology (NIST) ...