{"id":194686,"date":"2017-05-23T23:27:25","date_gmt":"2017-05-24T03:27:25","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/how-quantum-computing-increases-cybersecurity-risks-network-network-world\/"},"modified":"2017-05-23T23:27:25","modified_gmt":"2017-05-24T03:27:25","slug":"how-quantum-computing-increases-cybersecurity-risks-network-network-world","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/quantum-computing\/how-quantum-computing-increases-cybersecurity-risks-network-network-world\/","title":{"rendered":"How quantum computing increases cybersecurity risks | Network &#8230; &#8211; Network World"},"content":{"rendered":"<p><p>          By Scott          Totzke, Network World | May 23,          2017 9:00 AM PT        <\/p>\n<p>          Opinions expressed by ICN authors are their own.        <\/p>\n<p>          Your message has been sent.        <\/p>\n<p>          There was an error emailing this page.        <\/p>\n<p>      Imagine you wake up one morning, assuming everything is as      you left it the night before. But overnight, attackers with a      quantum computer capable of breaking current cryptography      standards have targeted millions of people and stolen their      personal data.    <\/p>\n<p>      Experts have estimated that a commercial quantum computer capable of      breaking the cryptography we rely on today will be      available by 2026. In fact, IEEE Spectrum reported last year      that a quantum computer is close to cracking RSA      encryption.    <\/p>\n<p>      To many people, a nine-year timeline doesnt sound alarming,      and the consequences of not updating our security technology      with quantum-safe solutions may not be clear. Heres why the      work to upgrade to quantum-safe security needs to start now      to keep our data safe once quantum computers arrive.    <\/p>\n<p>      On any given day, you might engage in any of the following      common activities as a typical technology user, and if      attackers with a quantum computer break the cryptography      these transactions rely on, your sensitive data could be      leaked, leading to serious consequences for you and the      institutions responsible for safeguarding that data:    <\/p>\n<p>      1. Sending email: You log in to your laptop      and send a few personal emails. Your messages can now be read      by the attackers and posted publicly for anyone to read.    <\/p>\n<p>      2. Checking an online bank account: You log      in to your bank account and transfer money. Your financial      data is now accessible by the attackers who can use it to      drain your accounts.    <\/p>\n<p>      3. Updating your social media accounts: You      log in to Facebook and post a personal update about your      upcoming vacation and some pictures of your family, assuming      you are sharing only with your friends. All photos and      personal information are now publicly visible and can be      modified by people other than you.    <\/p>\n<p>      4. Updating software on a smartphone: You      get a software update to your smartphone and accept it, not      realizing that the authentication process that assures the      update comes from a trusted source (i.e. Google or Apple) is      now broken. Malware can now be pushed to your smartphone in      the guise of a trusted update, giving the attackers further      access to any login credentials for apps you have stored, as      well as your data.    <\/p>\n<p>      5. Driving your connected car: You get into      your car to drive to work. Your cars computer accepts      software updates automatically. Those updates could now come      from the attackers, without your knowledge, allowing a third      party to take control of the embedded systems in your car and      override your navigation, cut power to your vehicle, and      more.    <\/p>\n<p>      Many other daily transactions we take for granted could      immediately become vulnerable. For example, using a formerly      secure IoT-connected device, such as a thermostat, home      security system, or baby monitor; transferring funds to a      pre-loaded payment for a public transportation system; or      using a VPN to log in to a corporate network. Many public      safety risks that are also introduced when public transport      vehicles, safety systems, and physical access systems can be      compromised.    <\/p>\n<p>      We already see rapidly increasing numbers of data breaches as      more connected devices make more attack surfaces available.      As companies and governments work continually to protect      against cybersecurity attacks through advances in technology,      the advent of quantum computing could create a free for all      for cybercriminals.    <\/p>\n<p>      But there is a solution in the form of quantum-safe      cryptography. The key will be updating quantum-vulnerable      solutions in time, and that means understanding now which      systems will be affected by quantum risk and planning a      migration to potential quantum-safe security solutions that      includes appropriate testing and piloting.    <\/p>\n<p>      The transition can begin with hybrid solutions that allow for      agile cryptography implementations designed to augment the      classical cryptography we use today.    <\/p>\n<p>      This article is published as part of the IDG      Contributor Network. Want to Join?    <\/p>\n<p>    Sponsored Links  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.networkworld.com\/article\/3197366\/security\/how-quantum-computing-increases-cybersecurity-risks.html\" title=\"How quantum computing increases cybersecurity risks | Network ... - Network World\">How quantum computing increases cybersecurity risks | Network ... - Network World<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> By Scott Totzke, Network World | May 23, 2017 9:00 AM PT Opinions expressed by ICN authors are their own. Your message has been sent. There was an error emailing this page <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/quantum-computing\/how-quantum-computing-increases-cybersecurity-risks-network-network-world\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[257742],"tags":[],"class_list":["post-194686","post","type-post","status-publish","format-standard","hentry","category-quantum-computing"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/194686"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=194686"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/194686\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=194686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=194686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=194686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}