End-to-end encryption: How secure is it?

End-to-end encryption: How secure is it?

As a security feature that comes with many messaging apps and data sharing software, end-to-end encryption is a way of making sure your communications and data is protected. However, is it as secure as we believe? What is end-to-end encryption? End-to-end encryption...
Will quantum computing be a threat to cybersecurity?

Will quantum computing be a threat to cybersecurity?

As developments in quantum computing lead to greater computing power, many are concerned about its potential impact on cybersecurity. Whilst it will bring benefits, such as identifying and shutting down cyber attacks more quickly, the negative consequences could be...
How to respond to a double extortion attack

How to respond to a double extortion attack

Ransomware attacks are on the rise and now, rather than simply demanding money in return for the release of a company’s data, many cybercriminals are deploying double or even multiple extortion attacks. Not only do they encrypt the victim company’s data, but they also...