And the winners …
… were announced after a six-year effort managed by the National Institute of Standards and Technology (NIST). In 2016, NIST called upon the world’s cryptographers to devise and then vet encryption methods that could resist an attack from a future quantum computer that is more powerful than the comparatively limited machines available today. The selection constitutes the beginning of the finale of the agency’s post-quantum cryptography standardization project.
At long last, NIST has announced the first four quantum-resistant algorithms that will become part of the post-quantum-cryptographic standard. The chosen algorithms are CRYSTALS-Kyber for general encryption to access secure websites and CRYSTALS-Dilithium, FALCON, and SPHINCS+ for digital signatures.
Do you want to know more about the post-quantum cryptography program by NIST? Then check out the findings below ⬇
- NIST Announces First Four Quantum-Resistant Cryptographic Algorithms (nist.gov)
- NIST Picks 4 Quantum-Resistant Cryptographic Algorithms (darkreading.com)
The three biggest cybersecurity threats – Make sure you aren’t ignoring them
With this Call, Zdnet.com draws attention to certain less focused cybersecurity threats: Having all benefits of remote work in mind, it should not be forgotten that it also comes with certain risks – and hackers use that to their advantage. Moreover, even simple cybersecurity updates are ignored: Log4j, WannaCry and NotPetya are not completely off the market, just to name a few. This gap is, of course, gratefully seized upon by cybercriminals. And the same applies to the point of phishing: super simple, an email lure, a well-designed fake version of a real website or other online service – and the money starts to flow. The conclusion: Stick to cybersecurity basics as applying security patches as soon as possible and rolling out multi-factor authentication.
The complete article can be read here:
Updates on Chrome Browser
Google has released version 103.0.5060.114 for Chrome, now available in the Stable Desktop channel worldwide. The main goal of this new version is to patch CVE-2022-2294.
CVE-2022-2294 is a high severity heap-based buffer overflow weakness in the Web Real-Time Communications (WebRTC) component which is being exploited in the wild. This is the fourth Chrome zero-day to be patched in 2022.
Updated now! Sources here:
- Update now! Chrome patches ANOTHER zero-day vulnerability (blog.malwarebytes.com)
- CVE – CVE-2022-2294 (mitre.org)
Through acquisition of new powerful European security distributor
The Swiss Infinigate Group has reached an agreement with the British Nuvias Group to acquire the latter’s networking and security business. The merger will form one of the leading distributors for cybersecurity in Europe.
The leaders of both VADs are convinced that the merger will enable them to achieve their growth targets more effectively than either company could on its own.
Are you not yet convinced and/or do you want to learn more about the merger? Then these sources are just right for you:
- Infinigate übernimmt das Security-Geschäft von Nuvias (it-business.de)
- Infinigate to create extensive pan-European cyber security platform with purchase of the Nuvias Group (businessleader.co.uk)
Is cybersecurity a topic of interest for your company? As an independent entity with a portfolio of proven security providers, CyberCompare can provide you with comparative offers at no charge and with no obligation. Reach out to us or use our diagnostic to learn more about your cyber risk profile.
Please remember: this article is based our knowledge at the time it was written – but we learn more every day. Do you think important points are missing or do you see the topic from a different perspective? We would be happy to discuss current developments in greater detail with you and your company’s other experts and welcome your feedback and thoughts.
And one more thing: the fact that an article mentions (or does not mention) a provider does not represent a recommendation from CyberCompare. Recommendations always depend on the customer’s individual situation.