Techno Blender
Digitally Yours.
Browsing Tag

Decryption

MeitY tweaks IT rules, surveillance data to be deleted within six months

The government has amended the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules to give the Union and the state home secretary the power to order deletion of the order for interception, monitoring or decryption and the actual information of a person under surveillance after six months. Until now, the power to delete was with the security agency which had requested the surveillance either from the home ministry or a competent court.What do the amended rules…

imessage upgrade: Apple rolls out iMessage upgrade to withstand decryption by quantum computers

Apple is rolling out an upgrade to its iMessage texting platform to defend against future encryption-breaking technologies.The new protocol, known as PQ3, is another sign that U.S. tech firms are bracing for a potential future breakthrough in quantum computing that could make current methods of protecting users' communications obsolete.Elevate Your Tech Prowess with High-Value Skill CoursesOffering CollegeCourseWebsiteIIM LucknowIIML Executive Programme in FinTech, Banking & Applied Risk ManagementVisitIndian School…

Dolphin emulator gives up on Steam — but won’t remove Wii decryption key

Don't wait around for Dolphin to help bring Nintendo GameCube and Wii games to Steam — it's officially no longer happening. Nearly two months after postponing the release “indefinitely,” the Dolphin Emulator team now says it’s completely given up on the idea. “We are abandoning our efforts to release Dolphin on Steam,” they write.Remember when we showed you the receipts where Valve torpedoed the launch, telling Dolphin it would have to get permission from Nintendo if it wanted a place in the store? Today’s Nintendo was…

Ransomware decryption: This tool could help some BianLian ransomware victims get files back

Image: GettyCybersecurity analysts have released a decryptor for BianLian ransomware that could allow victims to retrieve their encrypted files for free -- and avoid paying a ransom demand to cyber criminals. BianLian first appeared in August last year, with a series of attacks claiming victims in industries including media, manufacturing, and healthcare. The attacks have hit organizations around the world, with victims in countries such as the US, Australia, and the UK. Targeting Windows systems, and written in

Ransomware decryption tool: Victims of MegaCortex can now unlock their files for free

Image: GettyVictims of MegaCortex ransomware attacks can now decrypt their files without giving into the ransom demands of cyber criminals, thanks to a free decryption tool that's been released following collaboration between cybersecurity researchers and police. The MegaCortex ransomware decryptor was built by cybersecurity analysts at Bitdefender in cooperation with Europol, the No More Ransom Project, the Zürich Public Prosecutor's Office, and the Zürich Cantonal Police. The decryption tool, which should work with

Police tricked a ransomware gang into handing over its decryption keys. Here’s how they did it

Image: GettyPolice tricked a ransomware gang into handing over decryption keys, providing victims with the ability to unlock their encrypted data for free. Working alongside cybersecurity company Responders.NU, the Dutch National Police obtained 150 decryption keys from ransomware group Deadbolt. With the decryption keys now in the hands of law enforcement, some victims of Deadbolt ransomware attacks can retrieve encrypted files and servers without the need to pay cyber-criminal extortionists. According to the Dutch

As Threat of Quantum Decryption Intensifies, IBM Comes to the Rescue

A quantum computer can decode an RSA encryption in eight hours while it takes years for the fastest supercomputer Quantum cryptography has been proven to be a typical solution to the long unresolved secret key transmission strategy. It is the only known method secure in principles and based on laws of physics. That implies they are safe against the current decrypting techniques. Post Quantum Cryptography (PQC), which is nothing but unlocking the quantum encrypted messages through techniques of quantum computing is…