Advertisement

encryption

Visitors look at China Telecom’s quantum computing at the China Telecom stand at the Shanghai New International Expo Centre in Shanghai, China, on June 19, 2025, during the first day of the Mobile World Conference. (Photo by Ying Tang/NurPhoto via Getty Images)

Why is the timeline to quantum-proof everything constantly shrinking?

Experts say advancements in hardware, mathematics and growing fear of Chinese scientific breakthroughs are pushing Google and others to call for speedier migration.
“Akira” art and animation cells at the The Academy of Motion Picture Arts and Sciences Presents Special Screening of “Akira” at Samuel Goldwyn Theater on December 02, 2019 in Beverly Hills, California. (Photo by Rodin Eckenroth/Getty Images)

Akira ransomware group can achieve initial access to data encryption in less than an hour

A new report from Halcyon finds that the group also puts more effort than usual into developing working decryptors, likely to incentivize businesses to pay up. 
The interior of the IBM Quantum System Two is seen at IBM Thomas J. Watson Research Center on June 6, 2025 in Yorktown Heights, New York. A guide aims to help tech buyers navigate their switch to post-quantum encryption, but experts cautioned that most products and backend internet protocols have yet to be updated. (Photo by ANGELA WEISS / AFP) (Photo by ANGELA WEISS/AFP via Getty Images)

CISA publishes a post-quantum shopping list for agencies. Security professionals aren’t sold

A guide aims to help tech buyers navigate their switch to post-quantum encryption, but experts cautioned that most products and backend internet protocols have yet to be…
Advertisement
Advertisement
Advertisement