Quantum of Lies
The complete story of the hype, panic, and misunderstanding surrounding attacks on cryptographic algorithms using quantum computers.
Economics. Eschatology. Infosec.
100 articles
The complete story of the hype, panic, and misunderstanding surrounding attacks on cryptographic algorithms using quantum computers.
Hundreds of new gadgets and smart appliances are traditionally unveiled every January at the Consumer Electronics Show in Vegas. How will they affect our cybersecurity?
How to avoid giving away your password to scammers when logging in to third-party sites or viewing “encrypted” or “confidential” documents.
Attacks on companies via their suppliers and contractors are becoming increasingly widespread. How can you manage this risk?
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
The best privacy-focused services that make practical gifts for friends and family.
How a simple, well-known general threat became a key targeted-attack vector on companies.
Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.
Hidden logic, data poisoning, and other targeted attack methods via AI systems.
Five dead simple tips to greatly improve your defenses against cybercriminals.
Analyzing incidents and drawing lessons from them should be an integral part of the incident response process. This can help improve the overall security level of a company.
Web pages often disappear, move, or change content. How to keep them the way you want, or easily locate a web archive?
Discontinuing mandatory password rotations, banning outdated MFA methods, and other updates in the NIST SP 800-63 standards for digital account authentication and management.
Many of us have dozens of online subscriptions and recurring payments. How to take control, save money, and stay on top of expenses?
Where and why quantum-resistant cryptography has already been implemented, and what compatibility issues it caused.
Why and how to create a local backup of cloud data, taking Notion as an example.
Worried about your access to Telegram and its privacy after Pavel Durov’s arrest? Here’s what you should (and shouldn’t!) do right now.
Windows Downdate is an attack that can roll back updates to your OS to reintroduce vulnerabilities and allow attackers to take full control of your system. How to mitigate the risk?
How to protect the less obvious parts of your IT infrastructure (and from what) — from printers and video surveillance kit to insulin pumps.