Tag Archive for: Apocalypse

The Internet Security Apocalypse You Probably Missed – The New York Times

The Internet Security Apocalypse You Probably Missed  The New York Times

Last week was an online security nightmare and few people noticed. Here’s what you need to know.

“internet security news” – read more

The Internet Security Apocalypse You Probably Missed

This article is part of a limited-run newsletter. You can sign up here. Instead of my usual monologue, this week I’ve invited my colleague, the editorial writer Sarah Jeong, to have a conversation …
internet security – read more

Review: ‘Zero Days’ Examines Cyberwarfare’s Potential Online Apocalypse – New York Times


New York Times

Review: 'Zero Days' Examines Cyberwarfare's Potential Online Apocalypse
New York Times
Technology: With every seemingly miraculous advance comes the potential for its catastrophic misuse. If you're inclined toward paranoia, Alex Gibney's sobering documentary “Zero Days,” about the spread of malware, exposes a whole arena of potential …
Q&A: Oscar-winner Gibney on cyberwarfare in 'Zero Days'Salon
In 'Zero Days,' Alex Gibney tells the secret history of Stuxnet, cyberwarfare's Hiroshima momentRecode
Alex Gibney's 'Zero Days' is a chilling account of cyberwarfareLos Angeles Times
Gwinnettdailypost.com –Yahoo News
all 52 news articles »

cyber warfare – read more

IDG Contributor Network: Quantum computing breakthrough renews concerns of cybersecurity apocalypse

The term “cryptopocalypse” was probably first coined at the Black Hat USA information security convention in 2013.

A talk presented by four security and technology experts at the show explored cryptographic weaknesses and attempted to answer the hypothetical question: “What happens the day after RSA is broken?

RSA is a widely used public-key cryptosystem used in digital signatures.

The answer, they determined then, was: “almost total failure of trust in the Internet,” for one thing. The reason? Almost everything we do on the Internet is in some way protected by cryptography.

To read this article in full or to leave a comment, please click here

Network World Security