
Passkeys for your Google account: what, where, how, and why
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.
19 articles
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
We explain for laypeople what end-to-end encryption is and how it enables private, secure communication for us all.
We explore how encryption protects your data and why quantum computers might shake things up.
Quantum computers are set to change our approaches to data encryption. When that will happen is not yet clear, but we do know when companies need to start preparing — right now.
Researcher Fabian Ising, speaking at the Chaos Communication Congress, showed the limits of PDF encryption’s strength.
Researchers try to modify the contents of a signed PDF file without invalidating the signature.
According to recent news, quantum supremacy is reached. What should we do about it?
Want to protect your intimate photos from ever going public? Facebook has a suggestion: Upload them yourself!
About a year ago, a number of people, truly passionate enthusiasts and straight-up frauds alike, started manically preaching the coming of the Blockchain Almighty. It will change the world forever,
If you’ve been our faithful reader and your memory has not been damaged by digital amnesia, you may remember that one of the key insights from Kaspersky Security Bulletin 2015 was
Quantum computers are said to be coming quite soon and will change the world forever. While that phrase would typically mean a revolution in physics and medicine, the change which
The majority of ciphers referenced in historical or fiction works belong to the same family of ciphers — monoalphabetic ciphers. We have already dove into the main vulnerability of this
The so-called book cipher has always been in favor with authors of spy novels and detective stories, who usually try to mimic reality but are not ready to feed hardcore
Everyone has heard of the German cipher machine called Enigma, mostly due to the fact its story fascinates all kinds of writers and filmmakers – most recently in the Oscar-nominated
World War II revolutionized many technologies, including those that shaped the modern InfoSec industry. Back then, methods and machines utilizing modern cryptography principles were often coupled with ‘amateur’ ciphering methods.
Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.