Back

Not just BTC, quantum can beat encryption of every app and software in the world. None were designed against such strong computational power Quantum computers are used to achieve ultra high computational speeds in research labs using extreme low tem

See More

Sajin

ย โ€ขย 

Foundationย โ€ขย 4m

Hopeful. But a known threat that can use known solutions to break the entire integrity of the system, while very heavy counter measures to be implemented with no much probability as in to what extent can it practically defend such attacks

0 replies

More like this

Recommendations from Medial

gray man

I'm just a normal gu...ย โ€ขย 7d

Pakistan-based cyber groups have reportedly launched coordinated attacks on several Indian defence websites, compromising login credentials and gaining unauthorized access to sensitive information related to defence personnel. According to NDTV, th

See More
0 replies10 likes
Anonymous
Image Description
Image Description

๐Ÿšจ National Security Adviser of india Ajit Doval urged people's to defend and counter Anti - india narrative on all social media ๐Ÿ‡ฎ๐Ÿ‡ณ ๐Ÿ”ฅ National Security Adviser Ajit Doval emphasized the need for strong counter-narrative measures on social media

See More
3 replies2 likes

Vasvi Seth

Cyber Security Stude...ย โ€ขย 1y

๐Ÿ”’ Cybersecurity, also known as security, is paramount in today's digital age. It's the practice of safeguarding the confidentiality, integrity, and availability of information by fortifying networks, devices, and data against unauthorized access o

See More
0 replies4 likes

Ankit Joshi

Hey I am on Medialย โ€ขย 7m

๐—ง๐—ต๐—ฒ ๐—ฅ๐—ถ๐˜€๐—ฒ ๐—ผ๐—ณ ๐—”๐—œ-๐—•๐—ฎ๐˜€๐—ฒ๐—ฑ ๐—ฃ๐—ต๐—ถ๐˜€๐—ต๐—ถ๐—ป๐—ด ๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€: AI-based phishing is an emerging cyber threat leveraging machine learning to craft realistic, personalized phishing attacks that bypass traditional defenses. By analyzing languag

See More
0 replies3 likes
1
Image Description

Vasvi Seth

Cyber Security Stude...ย โ€ขย 11m

๐Ÿ’ผ Understanding Risks in Cybersecurity ๐Ÿ’ผ Risks are the backbone of cybersecurity strategy โ€“ they're what we guard against, mitigate, and manage every day. But what exactly is a risk? ๐Ÿ”’ A risk is anything that can affect the confidentiality, inte

See More
1 replies5 likes

Download the medial app to read full posts, comements and news.