|
|
NIST Calls for Submissions to Secure Data Against Quantum Computing Practical quantum computing may be decades away, but NIST is putting the call out to cryptographers for new cryptography methods that will stand up to quantum computing. The worry is that quantum computing may become practical sooner and current cryptography will not be secure. Apple gives iOS app developers more time to encrypt communications |
|
Ticno trojan installs via Windows “save” dialog box A new Trojan is tricking users to install malware with a Windows “save” dialog box. The Trojan uses some interesting techniques to stay hidden once installed. Ticno Trojan brings in a sneaky adware package that will be left behind when the Trojan is removed. |
|
Hacker Lexicon: What Is the Attribution Problem? With nation state hacking on the increase, attribution is becoming more important. Knowing who is behind the attack is key to having a proper response. While it is hard to get attribution to cyber-attacks it is not impossible. |
|
CIOs eye automation, platform strategies, cybersecurity for 2017 An interesting way to see what is coming in 2017 for information security is to see where iCIOs plan to spend their security budgets. This article cover the plans of 5 CIOs for 2017. |