The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) has chosen the first set of quantum-resistant encryption algorithms that are designed to "withstand the assault of a future quantum computer."
The post-quantum cryptography (PQ…
Today matters so much because of everyone's dependence on technology, from collaboration, communication and collecting data to e-commerce and entertainment. Every organisation that needs to deliver services to their customers and employees must protect their IT '…
In 2020 alone, over 23,000 new software vulnerabilities were discovered and publicly reported. As staggering as this figure might sound to the uninitiated, numbers like this no longer raise eyebrows t…
In July 2015 English comedian Michael McIntyre found himself the unexpected subject of a spying row.
The National Police Air Support unit (NPAS) spotted the foppish funnyman crossing the road, snapped his picture from the sky and then posted the image to Twitter,…
Posted on September 2nd, 2022.
Apple users have been advised to immediately update their iPhones, iPads and Macs to protect against a pair of security vulnerabilities that can allow attackers to take complete control of their devices.
In both cases, Apple said, …
Posted on September 2nd, 2022.
Security researchers have discovered a high severity vulnerability in TikTok’s Android app which could allow attackers to remotely hijack user accounts.
Microsoft reported CVE-2022-28799 to the social media giant in February 2022, …