Tag Archive for: Advanced

Scientists install encryption shield to protect advanced Chinese quantum computer from attack


The new methods are to replace the conventional public-key cryptography system, which could be vulnerable in the face of quantum computers with powerful computing capabilities.

01:58

China denies accusations of state-sponsored hacking from US, UK and New Zealand

China denies accusations of state-sponsored hacking from US, UK and New Zealand

The report quoted Dou Menghan, deputy director of the Anhui Quantum Computing Engineering Research Centre, as saying the “anti-quantum attack shield” was developed and used for the first time by Origin Quantum, the developer of the computer named after the Monkey King of Chinese mythology.

“This shows that China’s home-grown superconducting quantum computer can play both offence and defence in the field of quantum computing,” he said.

“This is also an important exploration of the application of new data security technologies in China.”

Origin launched its first superconducting quantum computer in 2020. The next year, the company delivered the 24-qubit Wuyuan second-generation machine – the country’s first practical quantum computer – making China the third country capable of delivering a complete quantum computing system after Canada and the United States.

The third-generation Wukong is powered by a 72-qubit home-grown superconducting quantum chip, also known as the Wukong chip.

In January, the superfast computer opened remote access to the world, attracting global users from countries such as the US, Bulgaria, Singapore, Japan, Russia and Canada to perform quantum computing tasks.

In traditional computing, a bit is the basic unit of information that represents either zero or one. A quantum bit, or qubit, takes it a step further by being able to represent zero, one, or both simultaneously.

Lawmaker urges China to safeguard tech production chain for a quantum edge

Because quantum computers can simultaneously represent multiple possibilities, they hold theoretical potential for significantly faster and more powerful computation compared to the everyday computers we use now.

But the subatomic particles central to this technology are fragile, short-lived and prone to errors if exposed to minor disturbances from the surroundings. Most…

Source…

Advanced Insights into Digital Credentials to Fortify Internet Security


As we navigate the complex landscape of the digital realm, the importance of securing all our online interactions has become paramount. The exchange of sensitive information and execution of financial transactions underscore the critical need for advanced digital security measures.

Digital credentials are at the forefront of establishing digital trust—a concept we have delved into previously in  ‘The Evolution of Digital Trust’. In this blog, we zero in on the role of digital credentials within Transport Layer Security (TLS), supported by Public Key Infrastructure (PKI), which has been a fundamental aspect of internet security for over three decades.

In today’s AI-driven era, fostering trust in digital transactions and interactions presents a unique set of challenges. With cyber threats rapidly evolving and on the rise, the urgency to adopt advanced security frameworks has never been more acute, necessitating a proactive approach to safeguard our digital interactions and ecosystem.

Client-Server and The Man-in-the-Middle

Long before the evolution of the modern internet as we know it today, security and privacy in digital transactions were of paramount concern. This was the era of Web 1.0, the first version of the internet, where digital users were merely consumers of information; web developers were the only content creators, and ubiquitous ‘http’ protocol governed browser addresses.

Afiinidi

In the traditional client-server communication model, powered by http, anyone with basic networking tools can decipher every bit of the un-encrypted interaction between a browser (i.e. client) and the website (i.e. server). Fortunately, browsers ensure that users are cautioned that such interactions are not innately secure.

Affinidi

Client-Server and HTTPS

It did not take long before Netscape, in 1995, introduced Hyper Text Transfer Protocol Secure (HTTPS), which was HTTP secured by SSL 2.0 – a cryptographic protocol that provided end-to-end communication security over networks. This protocol has evolved significantly since then and is now known as TLS (Transport Layer Security), with the most recent version being TLS 1.3.

When you visit a…

Source…

U.S. still finding victims of advanced China-linked hacking campaign, NSA official says


The U.S. is still identifying victims targeted by an extensive China-backed hacking campaign that became the subject of a recent FBI takedown operation and other advisories from officials over the past year, a top NSA cyber official said.

Rob Joyce, the agency’s outgoing cybersecurity director, said on Friday that the U.S. is still finding victims of the Volt Typhoon hacking collective that’s been latching onto critical infrastructure through compromised equipment including internet routers and cameras, and that NSA is not yet done with efforts to eradicate such threats.

The clandestine activities, which are said to be backed by the Chinese government, have allowed the hackers to conceal their intrusions into U.S. and foreign allies’ systems for at least five years, officials have previously said. 

The FBI in January announced it had jettisoned a significant portion of the group’s operations from compromised equipment it had burrowed into. These claims were subsequently affirmed by analysis from the private sector. But Friday’s remarks indicate there is still a way to go before Volt Typhoon is completely eradicated from U.S. networks.

Joyce, who was speaking to a group of reporters, declined to give a precise account of how many victims were remaining, but said the Chinese cyberspies are using tradecraft that’s difficult to uncover because of its reliance on stolen administrator credentials which allow them to more easily mask exploits.

The Volt Typhoon group has been carrying out “station keeping” activities, in an effort to preposition themselves to take down key infrastructure like transportation networks, he said. As for when the dismantling order would come down from Chinese authorities, the agency assesses it would be a “pretty high bar” reserved for major conflict like a possible Chinese invasion of Taiwan, he said.

The Volt Typhoon hackers have been using “living off the land techniques” that allow them to hide inside systems and bypass detection, previous U.S. reports said, noting that they have breached American facilities in Guam, as well as other key infrastructure in facilities both inside and outside the U.S.

Joyce added that NSA has been able to…

Source…

Become a Cyber Virtuoso: Master the Art of Defense with Lumify Work’s Advanced Digital Security Training for Tomorrow’s Defenders


Image By Freepik

Introduction

In the ever-evolving landscape of digital threats, the need for adept cybersecurity professionals has never been more critical. As cyber adversaries continue to grow in sophistication, mastering the art of defense becomes paramount for safeguarding digital landscapes. In this article, we embark on a journey into the realm of Lumify Work’s Advanced Digital Security Training, exploring how it equips aspiring defenders to navigate the complex challenges of tomorrow’s cybersecurity landscape.

The Digital Battlefield: Understanding the Stakes

Before delving into the intricacies of Lumify Work’s cyber security training, it’s crucial to grasp the high-stakes nature of the digital battlefield. Cyber threats have transcended mere nuisances; they now pose existential risks to businesses, governments, and individuals alike. As technology advances, so do the techniques of malicious actors seeking to exploit vulnerabilities for financial gain, data breaches, or even acts of cyber warfare.

Lumify Work’s Pioneering Approach to Cybersecurity Training

Comprehensive Curriculum Designed for Tomorrow’s Threats

Lumify Work’s Advanced Digital Security Training adopts a forward-thinking approach, ensuring that participants are equipped to face emerging threats head-on. The curriculum goes beyond the basics, immersing learners in real-world scenarios that mirror the complexity of modern cyber threats.

Hands-On Labs and Simulations

The program places a strong emphasis on practical experience. Participants engage in hands-on labs and simulations that replicate actual cyber-attack scenarios. This immersive learning approach not only reinforces theoretical knowledge but also hones the practical skills necessary to combat evolving threats effectively.

 Expert-Led Instruction

Led by industry experts with a wealth of experience, Lumify Work’s training provides invaluable insights into the latest cybersecurity trends, tactics, and best practices. Learners benefit from the wisdom of seasoned professionals who have navigated the front lines of cyber defense.

Continuous Updates to Stay Ahead

The digital landscape…

Source…