Menu

Blog

Archive for the ‘encryption’ category

May 15, 2023

Quantum Entanglement Shatters Einstein’s Local Causality: The Future of Computing and Cryptography

Posted by in categories: computing, encryption, quantum physics

ETH Zurich researchers have succeeded in demonstrating that quantum mechanical objects that are far apart can be much more strongly correlated with each other than is possible in conventional systems. For this experiment, they used superconducting circuits for the first time.

May 14, 2023

IBM announces end-to-end solution for quantum-safe cryptography

Posted by in categories: computing, encryption, information science, quantum physics, security

During its ongoing Think 2023 conference, IBM today announced an end-to-end solution to prepare organisations to adopt quantum-safe cryptography. Called Quantum Safe technology, it is a set of tools and capabilities that integrates IBM’s deep security expertise. Quantum-safe cryptography is a technique to identify algorithms that are resistant to attacks by both classical and quantum computers.

Under Quantum Safe technology, IBM is offering three capabilities. First is the Quantum Safe Explorer to locate cryptographic assets, dependencies, and vulnerabilities and aggregate all potential risks in one central location. Next is the Quantum Safe Advisor which allows the creation of a cryptographic inventory to prioritise risks. Lastly, the Quantum Safe Remidiator lets organisations test quantum-safe remediation patterns and deploy quantum-safe solutions.

In addition, the company has also announced IBM Safe Roadmap, which will serve as the guide for industries to adopt quantum technology. IBM Quantum Safe Roadmap is the company’s first blueprint to help companies in dealing with anticipated cryptographic standards and requirements and protect systems from vulnerabilities.

May 12, 2023

OneNote documents have emerged as a new malware infection vector

Posted by in categories: cybercrime/malcode, encryption

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.

Intro

In February 2022, Microsoft disabled VBA macros on documents due to their frequent use as a malware distribution method. This move prompted malware authors to seek out new ways to distribute their payloads, resulting in an increase in the use of other infection vectors, such as password-encrypted zip files and ISO files.

May 7, 2023

Google is testing a Chrome browser that adds post-quantum encryption

Posted by in categories: encryption, quantum physics, security

Google is using its enormous Chrome browser testing base to help examine the prospect of continuing the security of the digital age into the uncertainty of the quantum one.

May 1, 2023

What is the true potential impact of artificial intelligence on cybersecurity?

Posted by in categories: cybercrime/malcode, encryption, information science, robotics/AI

Greater scale and symbolic models are necessary before AI and machine learning can meet big challenges like breaking the best encryption algorithms.

Apr 25, 2023

Ransomware Hackers Using AuKill Tool to Disable EDR Software Using BYOVD Attack

Posted by in categories: cybercrime/malcode, encryption, engineering

Play ransomware is notable for not only utilizing intermittent encryption to speed up the process, but also for the fact that it’s not operated on a ransomware-as-a-service (RaaS) model. Evidence gathered so far points to Balloonfly carrying out the ransomware attacks as well as developing the malware themselves.

Grixba and VSS Copying Tool are the latest in a long list of proprietary tools such as Exmatter, Exbyte, and PowerShell-based scripts that are used by ransomware actors to establish more control over their operations, while also adding extra layers of complexity to persist in compromised environments and evade detection.

Another technique increasingly adopted by financially-motivated groups is the use of the Go programming language to develop cross-platform malware and resist analysis and reverse engineering efforts.

Apr 19, 2023

Could Aluminum Nitride Produce Quantum Bits?

Posted by in categories: encryption, quantum physics, supercomputing

Quantum computers have the potential to break common cryptography techniques, search huge datasets and simulate quantum systems in a fraction of the time it would take today’s computers. But before this can happen, engineers need to be able to harness the properties of quantum bits or qubits.

Currently, one of the leading methods for creating qubits in materials involves exploiting the structural atomic defects in diamond. But several researchers at the University of Chicago and Argonne National Laboratory believe that if an analogue defect could be engineered into a less expensive material, the cost of manufacturing quantum technologies could be significantly reduced. Using supercomputers at the National Energy Research Scientific Computing Center (NERSC), which is located at the Lawrence Berkeley National Laboratory (Berkeley Lab), these researchers have identified a possible candidate in aluminum nitride. Their findings were published in Nature Scientific Reports.

“Silicon semiconductors are reaching their physical limits—it’ll probably happen within the next five to 10 years—but if we can implement qubits into semiconductors, we will be able to move beyond silicon,” says Hosung Seo, University of Chicago Postdoctoral Researcher and a first author of the paper.

Apr 14, 2023

A new way to share secret information, using quantum mechanics

Posted by in categories: encryption, quantum physics

Quantum information is a powerful technology for increasing the amount of information that can be processed and communicated securely. Using quantum entanglement to securely distribute a secret quantum state among multiple parties is known as “quantum state sharing.”

An important in and cryptography, sharing works like this (in simple terms): a secret quantum state is divided into n shares and given to n players. The secret state can only be reconstructed if k (where kn/2) players cooperate, while the remaining n-k players cannot access the information. This protocol can also be used for , allowing the reconstruction of the secret state even if some of the information is lost.

In quantum information, there are two types of systems: discrete variable and continuous variable systems. Discrete variable systems are good because they don’t lose information easily, while continuous variable systems are good because the generation and processing of quantum states are deterministic rather than probabilistic, which enables a high degree of precision.

Apr 10, 2023

Researchers Have Developed an Incredible New Method of Producing Realistic Holograms

Posted by in categories: encryption, holograms

Researchers have developed a new method for creating realistic 3D holographic projections that are three orders of magnitude better than the current state-of-the-art technology. Previous attempts to improve the resolution of holograms have run into three basic roadblocks. However, this new ultrahigh-density method shows that two of those have now been solved, dramatically improving the overall quality, resolution, and appearance of holographic projections.

“Our new method overcomes two long-existing bottlenecks in current digital holographic techniques — low axial resolution and high interplane crosstalk — that prevent fine depth control of the hologram and thus limit the quality of the 3D display,” said Lei Gong, who led a research team from the University of Science and Technology of China. “Our approach could also improve holography-based optical encryption by allowing more data to be encrypted in the hologram.”

Limitations of Current Methods for Generating Holograms.

Apr 6, 2023

Rorschach Ransomware Emerges: Experts Warn of Advanced Evasion Strategies

Posted by in categories: cybercrime/malcode, encryption

Cybersecurity researchers have taken the wraps off a previously undocumented ransomware strain called Rorschach that’s both sophisticated and fast.

“What makes Rorschach stand out from other ransomware strains is its high level of customization and its technically unique features that have not been seen before in ransomware,” Check Point Research said in a new report. “In fact, Rorschach is one of the fastest ransomware strains ever observed, in terms of the speed of its encryption.”

The cybersecurity firm said it observed the ransomware deployed against an unnamed U.S.-based company, adding it found no branding or overlaps that connect it to any previously known ransomware actors.

Page 1 of 4812345678Last