Visit Austria's most impactful tech-networking event
EBSCON 2024
(Bild: frei lizenziert) Erfahren Sie, wie die EU-Richtlinie NIS2 die Sicherheitsbestimmungen für KRITIS-Unternehmen verändert und welche Maßnahmen erforderlich sind.
AI is evolving at a rapid pace, and the uptake of Generative AI (GenAI) is revolutionising the way humans interact and leverage this technology. GenAI is
AI is evolving at a rapid pace, and the uptake of Generative AI (GenAI) is revolutionising the way humans interact and leverage this technology. GenAI is
Innovation, digitale Souveränität und internationale Zusammenarbeit - die Themen des Digital-Gipfels 2024 der Bundesregierung, der heute und morgen in Frankfurt stattfindet.
Current encryption methods, including military-grade AES-256, could be in danger following the discovery of a team of researchers from Shanghai University, who managed to successfully breach SPN (Substitution-Permutation Network) encryption using a quantum computer. As mentioned on the “Genbeta” web portal, this vulnerability poses a significant challenge to cryptographic standards used in strategic sectors such […]
IT-Profis setzen sich zudem intensiv mit dem Thema Künstliche Intelligenz auseinander. Im Cybersecurity Surveys 2024 haben IT-Profis angegeben, dass
IET Quantum Communication, EarlyView.
The number of IoT devices has grown significantly in recent years, and edge computing in IoT is considered a new and growing trend in the technology industry. While cryptography is widely used to enhance the security of IoT devices, it also carries limitations such as resource constraints or latency. Therefore, lightweight cryptography (LWC) balances commensurate resource usage and maintaining security while minimizing system costs. The ASCON stands out among the LWC algorithms as a potential target for implementation and cryptoanalysis. It provides authenticated encryption with associated data (AEAD) and hashing functionalities in many variants, aiming for various applications. In this brief, we present an implementation of Ascon cryptography as a peripheral of a RISC-V System-on-a-Chip (SoC). The ASCON crypto core occupies 1,424 LUTs in FPGA and 17.4 kGE in 180nm CMOS technology while achieving 417 Gbits/J energy efficiency at a supply voltage of 1.0V and frequency of 2 MHz.
Salesforce acquires Israeli data company Own for $1.9 billion in cash, enhancing their data protection and management solutions. Israel's Tower Semiconductor...
(Bild: Dall-E / KI-generiert) Qualcomm hat eine Sicherheitslücke in seinen mobilen Prozessoren bestätigt und einen Patch bereitgestellt. Erfahren Sie mehr über die Auswirkungen und den Patch-Prozess.
Cybersecurity has gained a lot of attention in today's security issues due to the increased popularity of the Internet of Things, the quick growth of computer n
A team of researchers has managed to breach SPN encryption using a quantum computer, which could compromise the security of key sectors such as banking and the military.
Discover the top cybersecurity startups of 2024, protecting digital assets and data with pioneering security solutions and cutting-edge technologies.
Unfortunately, many technologies that may have proven dependable in other contexts fall short when they’re applied to IoT networks.
AI is evolving at a rapid pace, and the uptake of Generative AI (GenAI) is revolutionising the way humans interact and leverage this technology. GenAI is
(Bild: rangizzz - stock.adobe.com) Unsere Artikelserie erläutert die zehn Schritte zur NIS-2-Konformität und stärkt damit das Cybersicherheitsniveau im EU-Wirtschaftsraum.
Der «Q-Day» rückt näher: Unter Hochdruck arbeiten Cybersecurity-Experten weltweit an der Post-Quanten-Sicherheit. Ihr besonderes Augenmerk liegt dabei auf der Kryptografie. Bereits heute gibt es quantensichere Verschlüsselungslösungen.
End-to-End Encryption: Protecting Communications While Balancing Privacy and Security in Modern Cybersecurity.
OpenAI hat in einem offiziellen Bericht bestätigt, dass ChatGPT in mehreren Fällen nachweislich zur Entwicklung von Malware eingesetzt wurde.
In den USA häufen sich Fälle, in denen gehackte Saugroboter offenbar fremdgesteuert Beleidigungen zurufen und Bilder über die interne Kamera übertragen.
AI cybersecurity is advancing with CrowdStrike and Accenture's partnership, integrating AI tools and expert services to enhance real-time threat detection.
Die US-amerikanische IT-Sicherheitsbehörde CISA warnt, dass eine ältere Lücke in Fortinet-Produkten aktuell angegriffen wird.
Qualcomm has confirmed this week that hackers exploited a zero-day flaw — a vulnerability that was unknown to the manufacturer at the time it was
Der Rat der EU-Innenministerinnen und Innenminister hat den Cyber Resilience Act (CRA) verabschiedet.
This latest investment brings the company's total funding to US$29 million.