Mitigating the Quantum Risk to Cybersecurity

One of the most fundamental pillars of cybersecurity is cryptography, and most of the cryptography tools used today rely on computational assumptions, such as the difficulty of factoring 2048 bit numbers. Two decades ago, we learned that the quantum paradigm implies that essentially all of the deployed public key cryptography will be completely broken by […]

Continue Reading

More Details on the XcodeGhost Malware and Affected iOS Apps

A few days ago, we investigated a new malware called XcodeGhost that modifies Xcode, infects iOS apps and is seen in the App Store. We also found more than 39 iOS apps were infected, including versions of some pretty popular apps like WeChat or Didi, potentially affecting hundreds of millions iOS users. We also analyzed […]

Continue Reading
%d bloggers like this: