News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

Quantum Computers: The Future of Critical Infrastructure?

Quantum computers have the potential to crack existing encryption algorithms, compromising the security of critical infrastructure such as electronic payments, ecommerce, satellite communications, and more. This could lead to widespread disruptions in the digital world, making sensitive information vulnerable to theft and exploitation. As quantum computing advances, it's essential to develop strategies for protecting against these threats.

See Also

What Is Quantum Computing and How It Could Change the Tech World Δ1.86

Quantum computing is rapidly advancing as major technology companies like Amazon, Google, and Microsoft invest in developing their own quantum chips, promising transformative capabilities beyond classical computing. This new technology holds the potential to perform complex calculations in mere minutes that would take traditional computers thousands of years, opening doors to significant breakthroughs in fields such as material sciences, chemistry, and medicine. As quantum computing evolves, it could redefine computational limits and revolutionize industries by enabling scientists and researchers to tackle previously unattainable problems.

Where Will Rigetti Computing Stock Be in 5 Years? Δ1.76

Rigetti Computing's stock price may experience significant fluctuations as the company navigates the challenges of developing practical applications for its quantum computing technology. The firm's platform, Quantum Cloud Services (QCS), has already shown promise, but it will need to demonstrate tangible value and overcome technical hurdles before investors can confidently bet on its growth prospects. As the industry continues to evolve, Rigetti will likely face intense competition from established players and new entrants.

Under the Hood of Data Sovereignty Δ1.74

Organizations are increasingly grappling with the complexities of data sovereignty as they transition to cloud computing, facing challenges related to compliance with varying international laws and the need for robust cybersecurity measures. Key issues include the classification of sensitive data and the necessity for effective encryption and key management strategies to maintain control over data access. As technological advancements like quantum computing and next-generation mobile connectivity emerge, businesses must adapt their data sovereignty practices to mitigate risks while ensuring compliance and security.

Fortifying the UK’s Energy Sector: The Cybersecurity Imperative in an AI-Driven Future. Δ1.74

The UK's push to advance its position as a global leader in AI is placing increasing pressure on its energy sector, which has become a critical target for cyber threats. As the country seeks to integrate AI into every aspect of its life, it must also fortify its defenses against increasingly sophisticated cyberattacks that could disrupt its energy grid and national security. The cost of a data breach in the energy sector is staggering, with the average loss estimated at $5.29 million, and the consequences of a successful attack could be far more severe.

Tech Giants Face Off in Ai and Quantum Chips Δ1.73

Apple's DEI defense has been bolstered by a shareholder vote that upheld the company's diversity policies. The decision comes as tech giants invest heavily in artificial intelligence and quantum computing. Apple is also expanding its presence in the US, committing $500 billion to domestic manufacturing and AI development.

Amazon Credits Analog with Making Ocelot a More-Efficient Quantum Chip Δ1.73

Amazon Web Services has announced a breakthrough in quantum computing with the development of the Ocelot chip, which uses analog circuits to create a more efficient quantum chip. The Ocelot chip's design is based on cat qubits, an approach that was first explored by researchers over 20 years ago. By using this approach, Amazon claims that its chip can achieve quantum error correction with fewer physical qubits than traditional digital qubit devices.

Uk Will neither Confirm nor Deny that It’s Killing Encryption Δ1.73

The UK government's reported demand for Apple to create a "backdoor" into iCloud data to access encrypted information has sent shockwaves through the tech industry, highlighting the growing tension between national security concerns and individual data protections. The British government's ability to force major companies like Apple to install backdoors in their services raises questions about the limits of government overreach and the erosion of online privacy. As other governments take notice, the future of end-to-end encryption and personal data security hangs precariously in the balance.

Advanced Cyber Threats on Network Devices Worry Global Internet Security Δ1.73

Sophisticated, advanced threats have been found lurking in the depths of the internet, compromising Cisco, ASUS, QNAP, and Synology devices. A previously-undocumented botnet, named PolarEdge, has been expanding around the world for more than a year, targeting a range of network devices. The botnet's goal is unknown at this time, but experts have warned that it poses a significant threat to global internet security.

Ransomware Dominates Cybersecurity Threats in 2024 Δ1.73

The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.

Threat Posed by New VMware Hyperjacking Vulnerabilities Is Hard to Overstate Δ1.73

A recently discovered trio of vulnerabilities in VMware's virtual machine products can grant hackers unprecedented access to sensitive environments, putting entire networks at risk. If exploited, these vulnerabilities could allow a threat actor to escape the confines of one compromised virtual machine and access multiple customers' isolated environments, effectively breaking all security boundaries. The severity of this attack is compounded by the fact that VMware warned it has evidence suggesting the vulnerabilities are already being actively exploited in the wild.

Dutch Startup QuantWare Seeks to Fast-Track Quantum Computing. Δ1.73

Dutch startup QuantWare, founded in 2020, is making strides in the quantum computing space with its vertical integration and optimization (VIO) technology, which aims to overcome scaling challenges in quantum processing units (QPUs). The company has raised €20 million in funding to expand its team and enhance its chip fabrication facilities, positioning itself as a key player in the European quantum ecosystem. QuantWare's approach focuses on commercial accessibility and the development of its own QPUs while collaborating with other startups to advance quantum technology.

Apple Refuses to Break Encryption, Seeks Reversal of UK Demand for Backdoor Δ1.73

Apple's appeal to the Investigatory Powers Tribunal may set a significant precedent regarding the limits of government overreach into technology companies' operations. The company argues that the UK government's power to issue Technical Capability Notices would compromise user data security and undermine global cooperation against cyber threats. Apple's move is likely to be closely watched by other tech firms facing similar demands for backdoors.

Rare Earth Metal Could Be the Next Big Thing in Data Storage Δ1.72

Scientists at the University of Chicago's Pritzker School of Molecular Engineering have developed a new atomic-scale data storage method that manipulates microscopic gaps in crystals to hold electrical charges, allowing for terabytes of bits in a single millimeter cube. This approach combines quantum science, optical storage, and radiation dosimetry to store data as ones and zeroes, representing the next frontier in digital system storage. The breakthrough has significant implications for advancing storage capacity and reducing device size.

Is RISC-V the Future of Compute? Alibaba Thinks so as It Launches a New Server-Grade Chip that Will Revolutionize High-Performance Computing Δ1.72

Alibaba's latest move with the launch of its C930 server processor demonstrates the company's commitment to developing its own high-performance computing solutions, which could significantly impact the global tech landscape. By leveraging RISC-V's open-source design and avoiding licensing fees and geopolitical restrictions, Alibaba is well-positioned to capitalize on the growing demand for AI and cloud infrastructure. The new chip's development by DAMO Academy reflects the increasing importance of homegrown innovation in China.

UK Quietly Scrubs Encryption Advice From Government Websites Δ1.71

The U.K. government has removed recommendations for encryption tools aimed at protecting sensitive information for at-risk individuals, coinciding with demands for backdoor access to encrypted data stored on iCloud. Security expert Alec Muffet highlighted the change, noting that the National Cyber Security Centre (NCSC) no longer promotes encryption methods such as Apple's Advanced Data Protection. Instead, the NCSC now advises the use of Apple’s Lockdown Mode, which limits access to certain functionalities rather than ensuring data privacy through encryption.

Microsoft Warns of Chinese Hackers Targeting Cloud Apps to Steal Business Data Δ1.71

Microsoft's Threat Intelligence has identified a new tactic from Chinese threat actor Silk Typhoon towards targeting "common IT solutions" such as cloud applications and remote management tools in order to gain access to victim systems. The group has been observed attacking a wide range of sectors, including IT services and infrastructure, healthcare, legal services, defense, government agencies, and many more. By exploiting zero-day vulnerabilities in edge devices, Silk Typhoon has established itself as one of the Chinese threat actors with the "largest targeting footprints".

Top Bluetooth Chip Security Flaw Could Put a Billion Devices at Risk Worldwide Δ1.71

A "hidden feature" was found in a Chinese-made Bluetooth chip that allows malicious actors to run arbitrary commands, unlock additional functionalities, and extract sensitive information from millions of Internet of Things (IoT) devices worldwide. The ESP32 chip's affordability and widespread use have made it a prime target for cyber threats, putting the personal data of billions of users at risk. Cybersecurity researchers Tarlogic discovered the vulnerability, which they claim could be used to obtain confidential information, spy on citizens and companies, and execute more sophisticated attacks.

Skype's Encryption Legacy Lives On as It Shuts Down Δ1.71

In 2003, Skype pioneered end-to-end encryption in the internet phone-calling app space, offering users unprecedented privacy. The company's early emphasis on secure communication helped to fuel global adoption and sparked anger among law enforcement agencies worldwide. Today, the legacy of Skype's encryption can be seen in the widespread use of similar technologies by popular messaging apps like iMessage, Signal, and WhatsApp.

Web DDoS Attacks See Major Surge as AI Allows More Powerful Attacks Δ1.71

Layer 7 Web DDoS attacks have surged by 550% in 2024, driven by the increasing accessibility of AI tools that enable even novice hackers to launch complex campaigns. Financial institutions and transportation services reported an almost 400% increase in DDoS attack volume, with the EMEA region bearing the brunt of these incidents. The evolving threat landscape necessitates more dynamic defense strategies as organizations struggle to differentiate between legitimate and malicious traffic.

Seagate Hard Drive Controversy Persists as Scammers Discover Methods to Alter Reliability Metrics Δ1.71

Seagate's ongoing issues with counterfeit hard drive sales have taken a new turn, as scammers have discovered methods to manipulate Field Accessible Reliability Metrics (FARM) values, making it difficult for consumers to detect tampered devices. This latest development presents a significant challenge for Seagate and its customers, who must now find alternative ways to verify the authenticity of their purchases. The company has advised resellers to buy drives only from certified distribution partners to ensure authenticity.

US Authorities Begin Releasing some Seized Cryptocurrency Miners, Industry Executives Say Δ1.71

U.S. authorities have begun releasing seized Chinese-made equipment used for cryptocurrency mining, with thousands of units already freed from ports of entry, according to two industry executives. The release of these machines comes amid ongoing trade tensions and security concerns raised by U.S. authorities, although the exact reasons behind their detention remain unclear. The situation highlights the complex relationships between technology companies, governments, and global supply chains.

QUALCOMM (QCOM) Is Undervalued, Predicts ‘Resurgence’ in 2025 Δ1.71

QUALCOMM Incorporated's unique position in AI technology, particularly in low-power, power-efficient chips for phones, PCs, cars, and IoT devices, makes it an attractive investment opportunity. Aswath Damodaran, a professor of finance at NYU Stern School of Business, believes that innovation in AI technology will commoditize AI products, leading to lower spending and reduced competition. Qualcomm's dominance in the premium Android market and its growing presence in automotive and commercial IoT segments are expected to drive its resurgence in 2025.

Developing Hybrid Quantum Application for Autonomous Farming Optimized Δ1.70

D-Wave Quantum Inc. has collaborated with Staque to develop a hybrid-quantum system designed to optimize the movements of autonomous agricultural vehicles at scale, streamlining farming operations and enhancing efficiency in large-scale farming. The application, built with support from Canada's DIGITAL Global Innovation Cluster and Verge Ag, aims to address the challenge of real-time route optimization in complex environments. By leveraging D-Wave's annealing quantum computing capabilities, the technology seeks to accelerate autonomy in agriculture and provide real-time optimization solutions.

The Future of Human-Computer Interfaces Raises Ethical Concerns Δ1.70

Cortical Labs has unveiled a groundbreaking biological computer that uses lab-grown human neurons with silicon-based computing. The CL1 system is designed for artificial intelligence and machine learning applications, allowing for improved efficiency in tasks such as pattern recognition and decision-making. As this technology advances, concerns about the use of human-derived brain cells in technology are being reexamined.

Businesses Are Worried About AI Use in Cyberattacks Δ1.70

Artificial Intelligence (AI) is increasingly used by cyberattackers, with 78% of IT executives fearing these threats, up 5% from 2024. However, businesses are not unprepared, as almost two-thirds of respondents said they are "adequately prepared" to defend against AI-powered threats. Despite this, a shortage of personnel and talent in the field is hindering efforts to keep up with the evolving threat landscape.