News

The Security Think Tank assesses the state of encryption technology, exploring topics such as cryptographic techniques, data-masking, the legal ramifications of end-to-end encryption, and the ...
The world’s six largest computer drive makers Tuesday published the final specifications (download PDF) for a single, full-disk encryption standard that can be used across all hard disk drives ...
Quantum Computers Could Help Hackers Defeat Encryption. Here’s How to Protect Your Data New tools are available in the fight against the formidable power of quantum computers.
The Security Think Tank assesses the state of encryption technology, exploring topics such as cryptographic techniques, data-masking, the legal ramifications of end-to-end encryption, and the ...
One of the most well-established and disruptive uses for a future quantum computer is the ability to crack encryption. A new algorithm could significantly lower the barrier to achieving this. Despite ...
Another step for any type of computer is making sure your files are encrypted—scrambled in a mathematical operation based on very long strings of random numbers and letters called encryption keys.
Encryption is potentially dead and alive Chinese boffins have used a D-Wave quantum computer to mount a successful quantum attack on widely used encryption algorithms.