All posts by admin

#QuantumComputers are here and available for anybody to use

Could Quantum Hacks be the “Cyber Pearl Harbor”?

It’s a known fact that quantum computers are here and readily available for anybody to use. You read that right! They’ve arrived – the world’s first portable #quantum computers from #SpinQ. They’re not cheap, find out more at: http://spinquanta.com

Back in 2019, IBM had already unveiled their first commercial quantum computer.  In the same year, Google claimed quantum supremacy, and even Amazon offered their quantum computers for the public to use via their cloud service BRAKET.  In the summer of 2020, Honeywell announced that their quantum computers were superior to IBM’s and Google’s.  They also claimed they would increase their quantum volume 10X each year.  In December 2020, China’s University of Science and Technology announced their version of quantum computers claiming a million times faster than IBM’s and Google’s.  It’s evident that the global quantum computing race has begun some time ago already.

All of the above is just information available to the open world.  We have no idea what the closed world (i.e. national level) entails. Every day we hear news on cyberattacks at companies or government agencies that seemed unreachable before.  A quantum hack could have very well arrived quietly.  What do you think about the SolarWinds hack? The ransomware attack on the US JBS meat processing company and the Colonial Pipeline? The list goes on. Still got doubts? Here are what industry experts said at our latest quantum-safe readiness webinar.

Florin A. F., Director of CGI Innovation Center Montreal said, “…We think quantum computing is in the future and is a future risk. The reality is that every and each document that is stored today somewhere on a system for a financial institution is actually a potential document that is under attack…”

Asif Qayyum, Managing Director, Digital Security Risk & Controls at PwC Canada said, “…However one thing is for sure that everyone is realizing that the Q-day might have already occurred …..and because a breach that could have happened or a database which is encrypted but lying somewhere there, as soon as that readiness or availability of technology comes into the hand of these adversarial players that is going to explode multi-fold…”

These are just a little excerpt from the valuable insight these leaders provided at the webinar. You can watch the complete webinar here: https://www.youtube.com/watch?v=uy0el3lCosU

It’s believed that quantum hacking is approaching fast. This will render all the current encryptions vulnerable and hence make internet data, banking transactions, emails and etc. defenseless. We CANNOT emphasize enough on the urgency to upgrade the entire digital world to become quantum-safe.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

ISACA Now – The #QuantumComputing Threat: Risks and Responses

The Quantum Computing Threat: Risks and Responses

Editor’s note: The ISACA China Hong Kong Chapter hosted a recent webinar on the topic “Quantum Threat: Risks and Response.” The event, moderated by Michael Yung, strategic advisor, Google Cloud, featured panelists Andrew Cheung, president/CEO, 01 Communique Laboratory Inc., Samuel Sinn, partner, digital transformation advisory services, PwC China and Hong Kong, William Gee, advisor, innovation and digitalisation, PwC China and Hong Kong, and Welland Chu, alliance director, Thales. The webinar included more than 130 online and onsite participants from a variety of backgrounds, including government officials, regulators, large corporates, and more. Below is a summary of the insights shared from the panel:

Michael: Quantum computing promises to change the world through many groundbreaking applications. At the same time when the world is already grappling with cybersecurity issues daily, such as data breaches, ransomware and more, will the arrival of quantum computers make matters worse?

With the focus on the quantum threat, our expert panel will share with us their views as well as how we shall respond to this threat. We will discuss the following topics:

  • What is quantum computing?
  • Implications to today’s cybersecurity practices and why these matter?
  • Who is most at risk and how can we implement Post-Quantum Cryptography (PQC) in the real world?
  • What can corporate leaders do today to mitigate the risks and what solutions are available now?

What is quantum computing?

Samuel: Classical computers are fundamentally based on the on/off states of switches called bits, while quantum computing is based on the nature of quantum entanglement and superposition. In simple terms, quantum computers allow on/off at the same time so that it is behaving like having millions of classical computers working in parallel to collectively solve the same problem.

Alongside any huge breakthrough in technology brings new risk: Quantum computing, with its unique powers, will render today’s encryption technologies obsolete. Since these encryption technologies formed the security bedrock of all digital activities today, our day-to-day functions such as financial transactions, money transfers, data protection, etc., would be impacted.

There is no 100 percent secure encryption in the world; we consider an encryption algorithm “safe” if the time required to break it is longer than the average lifespan of a human. With quantum computing, many of the encryption algorithms we rely on today would become unsafe overnight.

Andrew: Today’s encryption is based on prime number factorization, which is easy one way but extremely difficult in reverse.  It just takes milliseconds to multiply two very large 250-digit prime numbers to give a very large semi-prime number, but it will take over 150 years to do the reverse to brute force all the combinations. In the last 40-plus years, the strategy to keep ahead of advances in computation power is simply to extend the key size. The emergence of quantum computing made this approach ineffective: regardless of the key size, quantum computers can reduce the time to crack certain encryption algorithms from hundreds of years to merely seconds.

Implications and why we should care now

Welland: In 2019 Google reported that its 53-qubit Sycamore processor had completed in 3.3 minutes a task that would have taken a traditional supercomputer at least 2.5 days. In 2021, IBM announced Eagle, a 127 qubits processor, and that by 2023 a quantum processor with >1,000 qubits would be available. Major technology providers like Microsoft and Amazon have also started to offer quantum computers and simulators on their cloud services platforms. The global enterprise quantum computing market is estimated to grow at a CAGR >33%, reflecting the resources that are being directed into this field.

William: The race to “quantum supremacy” will significantly compress the development timeframe of quantum computers, and the availability of quantum computing capability in the cloud will not only further advance developments but also mean that bad actors could also easily access this technology. While there is still debate over when “Q-Day” will arrive, this is becoming less relevant when increasingly hackers adopt a “grab and wait” strategy by simply stealing the data first and decrypting once they can get hold of the cracking tools.

Who is most at risk and how we should implement PQC?

William: Asymmetric cryptographic systems are most at risk, implying that today’s public key infrastructure that form the basis of almost all of our security infrastructure would be compromised. That being said, the level of risk may be different depending on the data to be protected – for instance, a life insurance policy that will be valid for many years to come; a smart city that is built for our next generation. Similarly, the financial system, both centralized and decentralized, may have different vulnerabilities. For this reason, post-quantum security should be addressed as part of an organization’s overall cybersecurity strategy. It is of such importance that both the C-suite and the board should pay attention.

While blockchain-based infrastructures are still considered safe, being largely hash-based, transactions are digitally signed using traditional encryption technologies such as elliptic curve and therefore could be quantum-vulnerable at the end points. Blockchain with quantum-safe features will no doubt gain more traction as NFTs, metaverse and crypto-assets continue to mature.

Finally, the unique features of quantum computers is such that one would not use these for tasks such as word processing, thus implying that classical computers and quantum computers will likely co-exist for some time, making it even more important for everyone to address this quantum threat.

Welland: Companies and experts in the cybersecurity space have joined forces to combat this imminent threat. One aspect to note is the time needed to standardize cryptography in a global context: many of our audience may still remember the duration and effort taken to migrate 3DES to AES two decades ago!

It may be decades before the community replaces most of the vulnerable public-key systems currently in use today with new post-quantum cryptography. In the cybersecurity world, we should establish a robust set of preventive controls from enhancing awareness to taking a range of precautionary, detective and corrective measures so as to minimize the impact of the quantum threat.

What can be done today and what solutions are available?
Andrew: Many international organizations such as The National Institute of Standards and Technology (NIST); European Telecommunication Standards Institute (ETSI); PQCrypto; SAFEcrypto; and CREST Crypto-Math have been taking actions to find and recommend the next generation of cryptographic systems that are safe against quantum computers.

NIST started in 2016 with five categories of technology and a total of 82 candidates. Earlier in July, NIST announced the first four candidate algorithms that have been selected for standardization and four additional algorithms will continue into the next round. The final announcement of NIST PQC standard will likely to be in 2024.

It is important to note that the single most important factor on the robustness of an encryption method is how long it has been time-tested without a cracking theory because all encryption algorithms are safe until such a cracking theory is discovered.

Given the pace of technological advancement, going forward, “crypto-agility” – the ability of an organization to change cryptographic algorithms quickly to adapt to evolving security landscape – will be critical. A handful of forward-thinking companies have been taking meaningful actions by creating the API and solutions based on the remaining candidates of NIST.  This means, on day 0 when NIST announces the final recommendations, there will be a solution that companies can use the next day, rather than having to wait another few years for the tools to be developed.

Final thoughts

Andrew: There are quantum-resistant solutions available today that comply with industry standards such as PKCS#11, OpenSSL, but are not yet openly endorsed. This is still way better than standing naked in front of the quantum threat.

Samuel: Business leaders should address the quantum threat at the earliest opportunity. Rapid transition to new information security technologies are unrealistic as much of our infrastructure and network systems today are interconnected, often on a global level. Responding to the quantum threat will require significant infrastructural, cultural and procedural change, as well as funding on a scale that has not seen since the Y2K threat.

Welland: Stay agile and be flexible. Ensuring adequate protection for the future while complying with today’s standard is crucial for any business to keep up with compliance and regulatory requirements. There is a need to deploy applications and network equipment that are able to accommodate both pre-quantum and post-quantum cryptography at the same time, with the ability to switch swiftly to a different algorithm as the need arises.

William: Know your data and information assets that you need to protect, and take a risk-based approach to achieve a balance between cost and security. Plan ahead while remaining flexible as preparations need to be highly responsive and dynamic given the pace of technological advancement.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

#BNBChain Halted After Suspected $536M Hack

A wallet worth over $536 million started acting erratically, prompting the #BNBChain to halt completely!

BNB Chain has been halted after a large BNB holder started displaying erratic on-chain behaviour, suggesting a hack. The erratic nature of the wallet’s on-chain activity suggests it may have been compromised. Stablecoin issuer #Tether has also already stepped in to blacklist the address, preventing it from sending USDT to new wallets.

While the hackers were able to get away with roughly $100 million, the potential amount could have been as much as $570 million.

Patrick Hillmann, chief communications officer at crypto exchange Binance, commented that BNB validators noticed some strange activity taking place on BSC Token Hub, one of the platform’s bridges ,and came to the conclusion the bridge was being utilized to mint additional BNB tokens. He compared the exploit to a group of thieves breaking into the U.S. Federal Reserve, printing their own money and then walking away with it. “What we’re seeing here is that as we see more of these attacks on bridges, the communities that rally around these blockchains are getting much better at shutting them down quickly, updating their systems and being able to prevent a worst case scenario from happening,” Hillmann said.

This hack has a strong smell of a quantum hack although no one can say for sure. This is because the cause of the hack was most likely that the private key of a huge account was compromised. This is exactly the weakest link of crypto facing quantum.

“While it is unknown about what exactly is the cause, this must be some how related to the private key being compromised whether it is bug in the wallet or a reverse engineering of the public key via quantum computer. It is now crystal clear what would happen when a private key is compromised by a quantum hack” said Andrew Cheung, President, 01 Communique.

Quantum-resistant encryption research is a hot topic because it is felt that quantum computers are almost certain to become prevalent and sufficiently powerful to crack existing encryption algorithms. It is therefore prudent to prepare crypto that can survive future attacks, so that data encrypted today remains safe tomorrow, and digital communications can remain secure.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

You Can Stop #Ransomware Attacks Today. So Why Wait?

Disruptive ransomware attacks are on the rise.

Just in the last few years, we witnessed the LinkedIn data breach, the JBS attack, the SolarWinds hack, the Kaseya ransomware attack and many more. It is evident that making cybersecurity front and center is critical. Industry experts are expecting the global cybersecurity market to surpass USD $400 billion in 2028. All these signal that not only business leaders but ordinary people using the internet should not wait for a bad incident to occur before making a move.

In June 2021, LinkedIn data was compromised. The records of 700 million clients are now for sale on the dark web. This happened in the blink of an eye but what is worse is the ripple effect for users that used important passwords for LinkedIn. Even if their passwords were not breached, there is still valuable data that can be used for identity theft and phishing attempts. Hackers are constantly phishing for data, sending out millions of fake security alerts and bank alerts email everyday. If they can provide some “legitimate” information (from the breached data) on their phishing email, they will look more convincing and recipients are more prompted to click on the malicious links.

Think about this – LinkedIn, JBS, Colonial Pipeline and all other multi-billion-dollar corporations have unlimited resources to safeguard their data but still got hacked, what are the chances that smaller companies can secure their data? The answer is, you have good chances if you secure you email communications.

Most ransomware attacks come from phishing emails. You click on just one malicious link and you risk having your private information breached, email message content and attachment being intercepted and altered, and suffering financial and creditability damages. Therefore, you should secure your emails today. IronCAP X™ is THE SOLUTION TO STOP PHISHING!

IronCAP X™ is easy to install, a is user-friendly and a cost-effective solution. Its quantum safe, end-to-end email encryption eliminates the intermediary server, and its digital signature feature authenticates a legitimate sender from a malicious one. IronCAP X™ will be your armor to eliminate ransomware attacks. An ounce of prevention (IronCAP X™) is worth a pound of cure (data loss). The choice is yours!

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

#IronCAP is your #PostQuantum #Encryption Solution

Get protected now with IronCAP™ – designed to operate on conventional computers!

Cryptographic technologies are utilized by all industries and government bodies to verify the source and protect the data that they store. With the rapid advancement in quantum computing, we should be aware that our widely deployed cryptographic algorithms that are used to protect our data privacy and communications today will be threatened. It’s anticipated that a quantum hack is around the corner if not here already. Business leaders and government officials need to understand the risks and damages associated with quantum hacks and act NOW! Cryptographic algorithm transitions take time and involve massive coordination effort across many stakeholders in different industries. By preparing now and adopting post-quantum cryptography solutions like IronCAP™ can ensure a more orderly, less costly, and modestly disruptive changeover.

IronCAP™ is designed to operate on conventional computers. It is built on the longest time-tested Goppa code-based theory recognized by the world of post-quantum cryptography study field. By introducing sophisticated linear codes and error syndromes into your data, our cryptography confuses even quantum computers and prevents any of your information from being compromised. Hence IronCAP™ can safeguard against cyberattacks from today’s classical computers as well as quantum computers.

IronCAP™’s post-quantum cryptography can be used in all kinds of vertical solutions such as digital identity, email/file encryption, remote access/VPN, cloud storage, 5G/IoT, blockchains, financial transactions, etc. The IronCAP™ API is compliant with the PKCS#11 and OpenPGP (RFC4880) industry standards, allowing vendors to transform their applications or systems seamlessly to quantum-safe.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

All Data Today is #Quantum Vulnerable, act now!

Quantum threats are very real and we must become quantum-safe now in order to beat Q-day.

In the last few years we have seen a continuous upward trend in the number of cybersecurity breaches, with the record high being broken month-over-month. It is about time companies need to improve their cybersecurity defenses. The number one thing they need to be aware of is that the current encryption that protects their data is NOT GOOD ENOUGH.

In 2021, approximately 281.5 million people have been affected by a data breach.  More than 60% of the U.S. information security professionals said ransomware is as serious as terrorism. According to IBM, the average cost of a data breach is over $4 million and Mimecast estimates the average ransomware demand against US companies is over $6 million.  Even more alarming, Cybersecurity Ventures expects global cybercrime cost to reach $10.5 trillion USD annually by 2025.

It has been proven in the last two years that it’s a child’s play to phish individual’s private data; and no magic to breach the cybersecurity defenses of a multimillion-dollar company. This will get even more disastrous with quantum advancements headed our way.  Nation states and tech giants are already spending millions on quantum advancements. For example, on August 26th 2020, the U.S. Department of Energy (DOE) budgeted $625 million for quantum advancements. In 2021, Honeywell Quantum Solutions and Cambridge Quantum achieved a quantum volume of 1,024 and demonstrated real-time error correction that enables quantum machines to do more significant calculations with fewer qubits. And most recently in 2022, research led by the University of New South Wales, Sydney has proven that a near error-free quantum computing is possible, paving the way for large silicon-based quantum processors for real-world manufacturing and application.

Q-day, the day when quantum computers render all current encryption meaningless will soon be here, and may have even arrived already.

Government agencies across the globe are scrambling to find the best quantum-safe methodology. Among them the highly regarded NIST (National Institute of Standards and Technology) in the US is still two years away from announcing their “preferred method”.  It will be a big mistake to leave our data at risk of quantum threats now and wait for two more years.   Fortunately, a group of crypto-scientists have pioneered the development of IronCAP™ starting several years ago.  It’s a patent-protected quantum-safe encryption technology based on Goppa code-based system – 1 of the 5 favorable post-quantum cryptographic approaches recommended by NIST at this time.  IronCAPTM is readily available for people to deploy on their classical computers today. It can be integrated with all kinds of vertical solutions such as email/file encryption, remote access/VPN, cloud storage, 5G/IoT, blockchains, financial transactions, etc., and safeguard you from cyber threats today and in the soon to arrive quantum computing era.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Combat #Ransomware Attacks with #IronCAP

Don’t be left out in the cold – Combat Ransomware Attacks with IronCAP!

Cyber extortions are crippling critical infrastructures, healthcare systems, government agencies and businesses around the world. In 2021 alone we saw some large-scale scum hacks and ransomware attacks. In early May Colonial Pipeline paid $5 million to the DarkSide ransomware gang and in June, the meat processor JBS paid $11 million to the Russia-based REvil gang. Hackers are using simple phishing tools, making you believe it is a legitimate email, to gain access to your sensitive information.

Top US officials have recently ranked ransomware attack as a national security threat. According to The New York Times, President Biden put this issue at the top of his agenda for his June meeting with Russia’s president, Vladimir Putin, and had given him forceful warnings for his inaction against those ransomware operators tied to Russia.  President Biden had also requested his lawmakers to work on several bills that would, among other things, require a wide range of companies including critical infrastructure operators to report attacks to the government.

The F.B.I. Internet Crime Report for 2020 listed 2,474 cyberattacks in the United States, with losses totaling more than $29.1 million. The reality is probably of a much greater magnitude. The German data-crunching firm Statista has estimated that there were 304 million cyberattacks worldwide in 2020, a 62% increase over 2019.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

#IronCAP Completes PoC #QuantumSafe #Blockchain

All the technical objectives necessary to integrate IronCAP™ into the Solana blockchain have been achieved!

Not just by providing a quantum-safe blockchain that supports smart contracts, but also retaining Solana’s ultra-fast throughput. “The technology we developed for this project is independent of the type of blockchain that is in use and as such it can be applied to not only the Solana blockchain but also other public blockchains such as Bitcoin, Ethereum, as well as most private business blockchains. The method of integration is unique and; therefore, we plan to file a patent application along with our partner, Talent Summit who has accepted and paid for the delivery of the Proof of Concept (“PoC”).  Our next step will be to create and demonstrate a quantum-safe wallet while Talent Summit will plan for commercial development and launching of QNT – Quantum Native Token,” said Andrew Cheung, President and CEO of 01 Communique.

As previously announced, the Company was commissioned to develop the World’s First Quantum-Safe Blockchain designed for Tokens, NFTs, Smart Contracts for the Metaverse, De-centralized Finance (DeFi). It is expected that this quantum-safe blockchain will be resilient against cyber-attacks, including attacks from Quantum Computers.

“Unfortunately, virtually all blockchains in the world today are vulnerable to quantum computer attacks.  Since blockchain data is meant to be “forever” it is imperative that it is quantum-safe.  This PoC achievement is a very significant milestone and demonstrates our IronCAP™ technology can transform existing blockchains into a quantum-safe version that can be incorporated in Tokens, NFTs, Smart Contracts for Metaverse, DeFi, and more”, said Andrew Cheung.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

#Crypto is under attack and it’s losing the battle against #hackers

If you own a crypto wallet, then you could be in big trouble!

Nearly 8,000 digital wallets have recently been drained of just over $5.2 million in digital coins including ’s sol token and (USDC), according to blockchain analytics firm Elliptic. The Twitter account Solana Status confirmed the attack, noting that approximately 7,767 wallets have been affected by the exploit. Elliptic’s estimate is slightly higher at 7,936 wallets.

Phantom said on Twitter that it’s investigating the “reported vulnerability in the solana ecosystem” and doesn’t believe it’s a Phantom-specific issue. Blockchain audit firm OtterSec tweeted that the hack has affected multiple wallets “across a wide variety of platforms.”

Quantum-resistant encryption research is a hot topic because it is felt that quantum computers are almost certain to become prevalent and sufficiently powerful to crack existing encryption algorithms. It is therefore prudent to prepare crypto that can survive future attacks, so that data encrypted today remains safe tomorrow, and digital communications can remain secure.

Due to the uncertain and potentially long time frames, and all of the more immediate threats that businesses are dealing with on a daily basis — there’s “always that risk” that some businesses will just ignore the issue, said Boaz Gelbord, chief security officer at Akamai Technologies.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

When it comes to #phishing, you’ve got to be on your toes!

You’ve probably heard of phishing, but do you really know what it is?

Phishing is a type of fraud that involves sending emails that appear to be from a trustworthy source (like your bank) in order to obtain sensitive information like usernames and passwords. The email might look like it’s from your bank but actually directs you to a fake website where you’re asked to enter your personal information.

If you’re not careful, phishing emails can lead to identity theft, credit card fraud, and other problems that can have long-lasting effects on your financial life.

Here are some tips for spotting phishing emails:

  • Look out for typos or strange grammar. If an email seems off or feels fishy in any way, don’t open the link or download any attachments until you’ve confirmed with the company that sent it that they did indeed send it!
  • Look at the sender’s address carefully. Is there an “@” symbol before the “mailto:” symbol? If there isn’t one, then chances are good this isn’t really from who it says it is.
  • Check for signs of urgency (like “act now!”) or threats (“your account has been suspended”). Legitimate companies won’t.

Who hasn’t gotten a phishing email at some point? It’s a common occurrence, and it’s not going away any time soon. But what is phishing? And how can you prevent yourself from being phished?

What is Phishing?

Phishing is a scam that uses fake websites, emails, or texts to trick people into giving up their personal information. These fake sites might look like your bank’s website, for example, but if you enter your login information on them, those thieves can use it to access your accounts.

Phishing is a type of cybercrime where hackers send fake emails pretending to be from a legitimate company or organization in order to trick you into giving up personal information. Phishing emails are often designed to look like they come from a legitimate source, like your bank or a government agency. They might ask you for personal details like your account number, password, or social security number.

It’s easy to fall prey to phishing scams—they’re designed that way! But there are ways you can protect yourself and help stop these harmful attacks from happening. Here’s how:

  • Never click on links in emails that are asking for information about you. If an email asks for sensitive information, go directly to the company’s website (wherever it may be) and log in normally.
  • Look out for typos or bad grammar in emails that ask for personal details. If something looks off, do some more research before responding.
  • Be wary of any email that asks you to reply immediately with sensitive information—that should never happen!

When it comes to phishing, you’ve got to be on your toes.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.