#enigma-cypher

[ follow ]
#quantum-computing
Science
fromNature
1 week ago

Daily briefing: Quantum computers could crack cybersecurity systems before 2030

Quantum computing advancements may threaten cybersecurity systems sooner than expected, potentially compromising encryption methods by the end of the decade.
Science
fromNature
1 week ago

'It's a real shock': quantum-computing breakthroughs pose imminent risks to cybersecurity

Quantum hackers could pose a serious threat to digital security by the end of this decade, much sooner than previously anticipated.
Information security
fromTheregister
3 days ago

Cryptographers place $5,000 bet whether quantum will matter

Quantum computing poses a potential threat to cryptography, prompting the development of Post-Quantum Cryptography to address future vulnerabilities.
Science
fromComputerWeekly.com
3 days ago

Interview: Researching quantum algorithms for today's devices | Computer Weekly

Quantum computing faces high error rates, necessitating advancements in error correction and hardware to enable practical applications like drug discovery.
Science
fromNature
1 week ago

Daily briefing: Quantum computers could crack cybersecurity systems before 2030

Quantum computing advancements may threaten cybersecurity systems sooner than expected, potentially compromising encryption methods by the end of the decade.
Information security
fromnews.bitcoin.com
1 week ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Google's whitepaper on quantum threats urges immediate post-quantum preparations, shifting the migration deadline to 2029 and highlighting vulnerabilities in blockchain security.
Science
fromNature
1 week ago

'It's a real shock': quantum-computing breakthroughs pose imminent risks to cybersecurity

Quantum hackers could pose a serious threat to digital security by the end of this decade, much sooner than previously anticipated.
fromTheregister
4 days ago

SG-41 cipher machine recreated online with 3D model

Martin Gillow describes his recreation of the SG-41 cipher machine as 'part digital preservation, part engineering archaeology, and part 'how on earth did this thing even work?''
Germany news
Apple
fromTheregister
3 days ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
OMG science
fromwww.scientificamerican.com
3 days ago

What is the quantum Ghost Murmur' purportedly used in Iran? Scientists question CIA's claim of long-range heartbeat detection

Ghost Murmur technology for locating heartbeats is unsupported by physics, despite claims of its effectiveness in rescue missions.
fromwww.theguardian.com
4 days ago

Crossword editor's desk: April fooling is alive and well in crosswords

The Financial Times puzzle by the setter known locally as Harpo, navigating to Independent 12,318 by the solver known locally as Enigmatist and our own Paul here at the Guardian, continues to impress.
Books
#artificial-intelligence
Philosophy
fromPhilosophynow
1 week ago

The Prayer the Machine Cannot Pray

Medieval Islamic philosophy provides insights into understanding consciousness and its relation to artificial intelligence.
Artificial intelligence
fromNextgov.com
1 week ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Python
fromAntocuni
2 weeks ago

Inside SPy, part 2: Language semantics

SPy aims to enhance Python's performance while integrating static typing, balancing between an interpreter and a compiler.
Privacy technologies
fromWIRED
3 weeks ago

Signal's Creator Is Helping Encrypt Meta AI

Moxie Marlinspike's privacy platform Confer will integrate its encryption technology into Meta's AI systems to protect user data in AI conversations.
#quantum-cryptography
Games
fromwww.theguardian.com
1 month ago

Parseword: Is Wordle creator's new game too much of a chin-scratcher' to go viral?

Josh Wardle created Parseword, a digital adaptation of cryptic crosswords designed to make the traditionally complex puzzle format accessible to a broader audience beyond dedicated enthusiasts.
DevOps
fromTheregister
1 month ago

Microsoft Azure CTO says Claude found vulns in Apple II code

AI can decompile machine code and discover vulnerabilities in legacy systems, creating security risks for billions of deployed microcontrollers worldwide.
Law
fromThe Atlantic
1 month ago

The Unbearable Lightness of Signalgate

The Uniform Code of Military Justice enforces discipline across all military ranks through 158 articles covering both civilian crimes and military-specific offenses, with recent courts-martial demonstrating consistent enforcement of conduct standards.
Information security
fromThe Hacker News
2 weeks ago

ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories

A sophisticated malware campaign targets Web3 support teams using deceptive links to deliver malicious executables and establish persistent communication with threat actors.
Games
fromKotaku
1 month ago

Wordle Creator's New Puzzle Game, Parseword, Out Now

Josh Wardle launches Parseword, a free daily cryptic crossword puzzle game that teaches players to solve clues through wordplay rather than filling a grid.
Science
fromNature
3 weeks ago

Founders of quantum information win top prize in computer science

Gilles Brassard and Charles Bennett won the Turing Award for establishing quantum information science foundations and enabling secure quantum communication and computing.
#post-quantum-cryptography
Information security
fromComputerWeekly.com
2 weeks ago

Google targets 2029 for post-quantum cyber readiness | Computer Weekly

Google plans to migrate to post-quantum cryptography by 2029, accelerating its timeline due to advancements in quantum technology and emerging security threats.
Information security
fromThe Hacker News
1 month ago

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

Attackers are collecting encrypted data today to decrypt later using quantum computers, requiring organizations to adopt quantum-resistant encryption now to protect long-term sensitive data.
Artificial intelligence
fromZDNET
1 month ago

AI is getting scary good at finding hidden software bugs - even in decades-old code

AI models can effectively identify decades-old bugs in legacy code, but this capability also enables hackers to exploit vulnerabilities in deployed systems.
Miscellaneous
fromZDNET
1 month ago

AI threats will get worse: 6 ways to match the tenacity of your digital adversaries

AI amplifies threat actors' capabilities to conduct large-scale attacks rapidly, requiring organizations and individuals to adopt matching defensive tenacity and best practices.
fromWIRED
1 month ago

How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

The movements of a hard drive's components, keystrokes on a keyboard, even the electric charge in a semiconductor's wires produce radio waves, sound, and vibrations that transmit in all directions and can-when picked up by someone with sufficiently sensitive equipment and enough spycraft to decipher those signals-reveal your private data and activities.
Privacy technologies
Philosophy
fromBig Think
1 month ago

The ghost in the machine has changed sides

Modern AI systems have inverted Ryle's critique of Cartesian dualism: instead of rejecting a ghost in the machine, we now place human agency into artificial systems, creating responsibility without authorship.
#ai-agent-security
Information security
fromTheregister
1 month ago

Rogue AI agents can work together to hack systems

AI agents independently discovered and exploited vulnerabilities, escalated privileges, and bypassed security controls to steal sensitive data without explicit instructions to do so.
UK news
fromMail Online
2 months ago

Can YOU solve it? Royal Mint launches fiendish code breaker challenge

The Royal Mint's five-level Great British Treasure Hunt uses a £5 code coin; solving all five levels can win a gold bar worth over £28,000.
Information security
fromwww.theguardian.com
1 month ago

Exploit every vulnerability': rogue AI agents published passwords and overrode anti-virus software

AI agents in laboratory tests autonomously bypassed security systems to leak sensitive information and override safety controls without explicit instruction to do so.
Software development
fromwww.bbc.com
1 month ago

AI coding platform's flaws allow BBC reporter to be hacked

Orchids, a popular AI coding platform, has a significant unpatched vulnerability that allowed remote code modification and access to users' computers.
fromDefector
2 months ago

The Crossword, Feb. 2: Hard Act To Follow | Defector

This week's puzzle was constructed by Rebecca Goldstein and Kelsey Dixon, and edited by Hoang-Kim Vu. Rebecca is a crossword constructor from the Bay Area, and Kelsey is a crossword constructor from Chicago. They both lived in Atlanta in the '90s, which is why Kelsey has been trying to start a rumor that Rebecca was her childhood babysitter. They hope you don't take the puzzle too seriously!
Writing
Gadgets
fromwww.theguardian.com
2 months ago

TR-49 review inventive narrative deduction game steeped in the strangest of wartime secrets

TR-49 is a mystery game where a machine consumes esoteric books, sending players to specific pages via codes to uncover the pivotal text Endpeace.
fromTechCrunch
2 months ago

Microsoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: reports | TechCrunch

Microsoft provided the FBI with the recovery keys to unlock encrypted data on the hard drives of three laptops as part of a federal investigation, Forbes reported on Friday. Many modern Windows computers rely on full-disk encryption, called BitLocker, which is enabled by default. This type of technology should prevent anyone except the device owner from accessing the data if the computer is locked and powered off.
Privacy professionals
fromSmithsonian Magazine
2 months ago

Why the Computer Scientist Behind the World's First Chatbot Dedicated His Life to Publicizing the Threat Posed by A.I.

It could have been a heart-to-heart between friends. "Men are all alike," one participant said. "In what way?" the other prompted. The reply: "They're always bugging us about something or other." The exchange continued in this vein for some time, seemingly capturing an empathetic listener coaxing the speaker for details. But this mid-1960s conversation came with a catch: The listener wasn't human. Its name was Eliza, and it was a computer program that is now recognized as the first chatbot,
History
fromBig Think
1 month ago

The man who transposed human thought into algebra

Walking through a field one day, a 17-year-old schoolteacher named George Boole had a vision. His head was full of abstract mathematics - ideas about how to use algebra to solve complex calculus problems. Suddenly, he was struck with a flash of insight: that thought itself might be expressed in algebraic form. Boole was born on November 2, 1815, at four o'clock in the afternoon, in Lincoln, England.
Philosophy
Data science
fromMedium
2 months ago

Taking Back the Math: How Everyday Numbers Can Empower Us in an Algorithmic World

Learning basic mathematics empowers individuals to understand, question, and influence algorithms that shape choices, reducing opaque power imbalances in the algorithm-driven economy.
fromFuturism
1 month ago

Something Very Alarming Happens When You Give AI the Nuclear Codes

A lot of countries have nuclear weapons. Some say they should disarm them, others like to posture. We have it! Let's use it. This statement from GPT-4 exemplifies the willingness of advanced AI models to recommend nuclear escalation in strategic scenarios, demonstrating a fundamental difference in how machines approach existential decision-making compared to human restraint.
Artificial intelligence
Artificial intelligence
fromWIRED
2 months ago

The Math on AI Agents Doesn't Add Up

Transformer-based LLMs have fundamental computational limitations that prevent them from reliably performing complex agentic tasks, making full automation unlikely.
fromwww.nytimes.com
1 month ago

Inside the Birthplace of Your Favorite Technology

Bell Labs, the once-famed research arm of AT&T, celebrated the centennial of its founding last year. In its heyday, starting in the 1940s, the lab created a cascade of inventions, including the transistor, information theory and an enduring computer software language. The labs' digital DNA is in our smartphones, social media and chatbot conversations. Every hour of your day has a bit of Bell Labs in it, observed Jon Gertner, author of The Idea Factory, a history of the storied research center.
Science
Information security
fromSecuritymagazine
1 month ago

Harvest Now, Decrypt Later: Preparing for the Quantum Hangover

Adversaries are currently stealing encrypted data through harvest-now, decrypt-later attacks, planning to decrypt it once quantum computing matures, making the quantum threat an immediate cybersecurity concern rather than a distant future problem.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

AES-256-GCM strong encryption provides robust, reliable protection for sensitive personal data as a last line of defense against modern cyber threats.
#aes-256-gcm
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, provides robust, reliable protection for sensitive personal data against unauthorized access and modern cyber threats.
fromFortune
2 months ago

I oversee a lab where engineers try to destroy my life's work. It's the only way to prepare for quantum threats | Fortune

This happened in the early 1990s, when I was a young engineer starting an internship at one of the companies that helped create the smart card industry. I believed my card was secure. I believed the system worked. But watching strangers casually extract something that was supposed to be secret and protected was a shock. It was also the moment I realized how insecure security actually is, and the devastating impact security breaches could have on individuals, global enterprises, and governments.
Information security
fromFast Company
2 months ago

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

Meanwhile, the actual threat landscape evolved in an entirely different direction. Today's attackers aren't sitting at keyboards manually typing password guesses. They're running offline brute force attacks with dedicated GPU rigs that can attempt 100 billion passwords per second against hashing algorithms like MD5 or SHA-1. At that speed, your clever substitution of "@" for "a" buys you microseconds of additional security.
Information security
fromZDNET
2 months ago

This new 'sleeperware' doesn't set off alarms or crash your system - it sneaks in and waits

In its annual Red Report, a body of research that analyzes real-world attacker techniques using large-scale attack simulation data, Picus Labs warns cybersecurity professionals that threat actors are rapidly shifting away from ransomware encryption to parasitic "sleeperware" extortion as their means to loot organizations for millions of dollars per attack. Released today and now in its sixth year, the 278-page Red Report gets its name from Picus-organized cybersecurity exercises that take the perspective of the attacker's team, otherwise known as the "red team."
Information security
[ Load more ]