cybersecurity

Google Is Adding Passkey Support for Its Most Vulnerable UsersGoogle-Passkey-GettyImages-2147843488.jpg

Google Is Adding Passkey Support for Its Most Vulnerable Users

The password killers known as “passkeys” are now available to users of Google’s Advanced Protection Program, which works to add an additional layer of account protection for people who fear that they could face targeted digital attacks. The company is more than a year into supporting passkeys for all regular individual accounts and made them […]

Google Is Adding Passkey Support for Its Most Vulnerable Users Read More »

Hackers Leaking Taylor Swift Tickets? Don’t Get Your Hopes UpTaylor-Swift-Ticketmaster-GettyImages-1591345225.jpg

Hackers Leaking Taylor Swift Tickets? Don’t Get Your Hopes Up

Proton, the company behind Proton Mail, launched an end-to-end encrypted alternative to Google Docs, seeking to compete with the cloud giant on privacy. We broke down how Apple is taking a similar approach with its implementation of AI, using a system it calls Private Cloud Compute in its new Apple Intelligence features. In other news,

Hackers Leaking Taylor Swift Tickets? Don’t Get Your Hopes Up Read More »

The Tech Crash Course That Trains US Diplomats to Spot ThreatsThe-Tech-Crash-Course-That-Trains-US-Diplomats-to-Spot-Threats.jpg

The Tech Crash Course That Trains US Diplomats to Spot Threats

By the time the Senate unanimously confirmed Nate Fick to be America’s cyber ambassador in September 2022, tech diplomacy headaches were impossible to ignore, and Fick quickly tasked his team with creating a modern training program and embedding it in the FSI’s regular curriculum. “He understood that we needed to do more and better in

The Tech Crash Course That Trains US Diplomats to Spot Threats Read More »

Cryptographers Are Discovering New Rules for Quantum EncryptionScience20-20Quanta20pickup20-20June2030A.jpg

Cryptographers Are Discovering New Rules for Quantum Encryption

The original version of this story appeared in Quanta Magazine. Say you want to send a private message, cast a secret vote, or sign a document securely. If you do any of these tasks on a computer, you’re relying on encryption to keep your data safe. That encryption needs to withstand attacks from code breakers

Cryptographers Are Discovering New Rules for Quantum Encryption Read More »

The US Wants to Integrate the Commercial Space Industry With Its Military to Prevent Cyber Attacks20Science20-20Conversation20pickup20-20June2029_GettyImages-498696374.jpg

The US Wants to Integrate the Commercial Space Industry With Its Military to Prevent Cyber Attacks

THIS ARTICLE IS republished from The Conversation under a Creative Commons license. The US military recently launched a groundbreaking initiative to strengthen ties with the commercial space industry. The aim is to integrate commercial equipment into military space operations, including satellites and other hardware. This would enhance cybersecurity for military satellites. As space becomes more

The US Wants to Integrate the Commercial Space Industry With Its Military to Prevent Cyber Attacks Read More »

Security News This Week: Google Is Piloting Face Recognition for Office SecuritySecurity-News-This-Week-Google-Is-Piloting-Facial-Recognition-for-Office-Security-GettyImages-1252639338.jpg

Security News This Week: Google Is Piloting Face Recognition for Office Security

WIRED learned this week that Amazon Web Services investigated claims that the AI search startup Perplexity may have violated the cloud company’s rules by appearing to pull data from websites that have attempted to shield themselves from such scraping. The news comes after WIRED published findings last week about the AI search chatbot’s indiscriminate data-scraping

Security News This Week: Google Is Piloting Face Recognition for Office Security Read More »