Displaying items by tag: Cryptography

Monday, 24 February 2025 10:21

Predicting the future: what 2035 will look like

GUEST OPINION:  At the start of each new year, it’s customary to make predictions about what the next 12 months has in store. While this is an interesting exercise, because of the exponential rate of change occurring, looking even further ahead also becomes valuable.

Published in Guest Opinion

GUEST RESEARCH:  Only a third of organisations in Australia are preparing and have the necessary scale or technology to transition to post-quantum cryptography

Published in Guest Research
Monday, 07 October 2024 20:34

Be ready for encryption in quantum era: DigiCert

Quantum computers are on their way to surpassing their classical computer counterparts in practical applications. When this happens the bulk of the world's cryptography is rendered null and void. It's time to ensure you are ready for the new era, says DigiCert.

Published in Enterprise Solutions

Cloudflare is on a mission to build a better Internet. And part of how it achieves this is through a wall of lava lamps. Yes, truly. This wall helps generate random numbers for cryptographic keys. It's the Wall of Entropy, and I ventured to CloudFlare HQ to take a look for myself.

Published in The Wired CIO

Once it was unthinkable to use a credit card online. Today, online commerce is booming, and there's a small army working to ensure this trust is not misplaced. However, recent technological advancements mean digital trust must evolve to keep us protected. And the time to act is now.

Published in Security

IBM's new z16 mainframe features an integrated on-chip AI accelerator, allowing inferencing from real-time transactions.

Published in Hardware

Nearly 10 months after it was taken down by authorities in Europe, the US and Canada, the Emotet botnet appears to have returned, with at least one of the bots associated with it being observed by a security firm.

Published in Security

The open-source OpenSSL project has released an updated version of its software, 1.1.1k, to fix two vulnerabilities, the severity of both of which has been described as "high".

Published in Security

Cryptography expert Ronald Rivest has dismissed the idea that blockchains would be of any use in voting systems, saying it was something like bringing a combination lock to a kitchen fire.

Published in Security

Microsoft has released a patch for a vulnerability in crypt32.dll, a library used for authentication, a flaw it rates important, the second rank on its severity rating list, but which the NSA has seen fit to issue an advisory about, something the agency never does.

Published in Security

Turing Award winner Adi Shamir, the renowned cryptographer who provides the initial S in the well-known RSA cryptography algorithm, is missing from the annual RSA Security conference as he apparently could not obtain a visa to enter the United States.

Published in Security

For the first time ever, ICANN is changing the cryptographic keys that secure DNS. ISPs must ensure their software is up-to-date or risk their customers being unable to reach any site on the Internet.

Published in Networking
Thursday, 29 June 2017 10:15

Make your own encrypted chat server

CryptoAUSTRALIA is running a workshop on 5 July to help you build your own end-to-end encrypted chat server ... while you still can.

Published in The Linux Distillery

Australia’s obsession with national security continues to have unintended consequences, with the academic exchange of information about cryptography now in danger.

Published in Security

Canberra-based QuintessenceLabs has been awarded funding in excess of $1 million from the Department of Defence.

Published in Development

Commencing in January 2012, Stanford University is running a number of on-line based courses.  Dive in!  Be educated!

Published in Education
In a significant advance for information security science, the first live quantum key distribution (QKD) network was just demonstrated in Vienna at the SECOQC Demonstration and International Conference.

Published in A Meaningful Look

Subscribe to Newsletter

*  Enter the security code shown: img0

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments