All posts by admin

Combat #Ransomware Attacks with #IronCAP

Don’t be left out in the cold – Combat Ransomware Attacks with IronCAP!

Cyber extortions are crippling critical infrastructures, healthcare systems, government agencies and businesses around the world. In 2021 alone we saw some large-scale scum hacks and ransomware attacks. In early May Colonial Pipeline paid $5 million to the DarkSide ransomware gang and in June, the meat processor JBS paid $11 million to the Russia-based REvil gang. Hackers are using simple phishing tools, making you believe it is a legitimate email, to gain access to your sensitive information.

Top US officials have recently ranked ransomware attack as a national security threat. According to The New York Times, President Biden put this issue at the top of his agenda for his June meeting with Russia’s president, Vladimir Putin, and had given him forceful warnings for his inaction against those ransomware operators tied to Russia.  President Biden had also requested his lawmakers to work on several bills that would, among other things, require a wide range of companies including critical infrastructure operators to report attacks to the government.

The F.B.I. Internet Crime Report for 2020 listed 2,474 cyberattacks in the United States, with losses totaling more than $29.1 million. The reality is probably of a much greater magnitude. The German data-crunching firm Statista has estimated that there were 304 million cyberattacks worldwide in 2020, a 62% increase over 2019.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

#IronCAP Completes PoC #QuantumSafe #Blockchain

All the technical objectives necessary to integrate IronCAP™ into the Solana blockchain have been achieved!

Not just by providing a quantum-safe blockchain that supports smart contracts, but also retaining Solana’s ultra-fast throughput. “The technology we developed for this project is independent of the type of blockchain that is in use and as such it can be applied to not only the Solana blockchain but also other public blockchains such as Bitcoin, Ethereum, as well as most private business blockchains. The method of integration is unique and; therefore, we plan to file a patent application along with our partner, Talent Summit who has accepted and paid for the delivery of the Proof of Concept (“PoC”).  Our next step will be to create and demonstrate a quantum-safe wallet while Talent Summit will plan for commercial development and launching of QNT – Quantum Native Token,” said Andrew Cheung, President and CEO of 01 Communique.

As previously announced, the Company was commissioned to develop the World’s First Quantum-Safe Blockchain designed for Tokens, NFTs, Smart Contracts for the Metaverse, De-centralized Finance (DeFi). It is expected that this quantum-safe blockchain will be resilient against cyber-attacks, including attacks from Quantum Computers.

“Unfortunately, virtually all blockchains in the world today are vulnerable to quantum computer attacks.  Since blockchain data is meant to be “forever” it is imperative that it is quantum-safe.  This PoC achievement is a very significant milestone and demonstrates our IronCAP™ technology can transform existing blockchains into a quantum-safe version that can be incorporated in Tokens, NFTs, Smart Contracts for Metaverse, DeFi, and more”, said Andrew Cheung.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

#Crypto is under attack and it’s losing the battle against #hackers

If you own a crypto wallet, then you could be in big trouble!

Nearly 8,000 digital wallets have recently been drained of just over $5.2 million in digital coins including ’s sol token and (USDC), according to blockchain analytics firm Elliptic. The Twitter account Solana Status confirmed the attack, noting that approximately 7,767 wallets have been affected by the exploit. Elliptic’s estimate is slightly higher at 7,936 wallets.

Phantom said on Twitter that it’s investigating the “reported vulnerability in the solana ecosystem” and doesn’t believe it’s a Phantom-specific issue. Blockchain audit firm OtterSec tweeted that the hack has affected multiple wallets “across a wide variety of platforms.”

Quantum-resistant encryption research is a hot topic because it is felt that quantum computers are almost certain to become prevalent and sufficiently powerful to crack existing encryption algorithms. It is therefore prudent to prepare crypto that can survive future attacks, so that data encrypted today remains safe tomorrow, and digital communications can remain secure.

Due to the uncertain and potentially long time frames, and all of the more immediate threats that businesses are dealing with on a daily basis — there’s “always that risk” that some businesses will just ignore the issue, said Boaz Gelbord, chief security officer at Akamai Technologies.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

When it comes to #phishing, you’ve got to be on your toes!

You’ve probably heard of phishing, but do you really know what it is?

Phishing is a type of fraud that involves sending emails that appear to be from a trustworthy source (like your bank) in order to obtain sensitive information like usernames and passwords. The email might look like it’s from your bank but actually directs you to a fake website where you’re asked to enter your personal information.

If you’re not careful, phishing emails can lead to identity theft, credit card fraud, and other problems that can have long-lasting effects on your financial life.

Here are some tips for spotting phishing emails:

  • Look out for typos or strange grammar. If an email seems off or feels fishy in any way, don’t open the link or download any attachments until you’ve confirmed with the company that sent it that they did indeed send it!
  • Look at the sender’s address carefully. Is there an “@” symbol before the “mailto:” symbol? If there isn’t one, then chances are good this isn’t really from who it says it is.
  • Check for signs of urgency (like “act now!”) or threats (“your account has been suspended”). Legitimate companies won’t.

Who hasn’t gotten a phishing email at some point? It’s a common occurrence, and it’s not going away any time soon. But what is phishing? And how can you prevent yourself from being phished?

What is Phishing?

Phishing is a scam that uses fake websites, emails, or texts to trick people into giving up their personal information. These fake sites might look like your bank’s website, for example, but if you enter your login information on them, those thieves can use it to access your accounts.

Phishing is a type of cybercrime where hackers send fake emails pretending to be from a legitimate company or organization in order to trick you into giving up personal information. Phishing emails are often designed to look like they come from a legitimate source, like your bank or a government agency. They might ask you for personal details like your account number, password, or social security number.

It’s easy to fall prey to phishing scams—they’re designed that way! But there are ways you can protect yourself and help stop these harmful attacks from happening. Here’s how:

  • Never click on links in emails that are asking for information about you. If an email asks for sensitive information, go directly to the company’s website (wherever it may be) and log in normally.
  • Look out for typos or bad grammar in emails that ask for personal details. If something looks off, do some more research before responding.
  • Be wary of any email that asks you to reply immediately with sensitive information—that should never happen!

When it comes to phishing, you’ve got to be on your toes.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

What are the risks of #QuantumComputers and how do they work?

Quantum computers are not yet in general use, but they’ve been under development for decades.

Quantum computers are not yet in general use, though they’ve been under development for several decades. Quantum computing works with quantum bits (qubits), which are like regular bits but can be in multiple states at once. While it’s difficult to explain exactly how this works, the basic idea is that qubits can represent both 0 and 1 at the same time, giving them an exponential advantage over traditional binary systems. They’re also very fast—a quantum computer with just 300 qubits could theoretically perform calculations millions of times faster than a supercomputer running on classical logic.

In the world of computing, quantum computing is a game-changer. While traditional computers use binary bits to store information in “yes” or “no” states, quantum computers use qubits that can exist in both states simultaneously. This allows them to perform multiple calculations at once and do so much faster than traditional computers. But while quantum computing has many promising applications, such as developing new drugs and materials, it also presents serious risks for businesses operating in regulated industries—and not just because of its potential impact on encryption methods used to protect data stored on cloud servers.

Creating a functional quantum computer requires complex physical infrastructure.

Physically, the hardware of a functional quantum computer is complex. In order to be able to run computations, it must be cooled to extremely low temperatures and isolated from vibrations and other disturbances. These requirements make it difficult to create large-scale quantum computers as they require an enormous amount of energy and cooling capability. Additionally, these computers need enough memory capabilities in order to communicate with each other and process large amounts of data at once.

A functional quantum computer could be used to break existing encryption methods, potentially exposing much of the world’s data to theft and fraud.

Quantum computers could be used to break encryption methods, potentially exposing much of the world’s data to theft and fraud.

A functional quantum computer would be able to break the encryption algorithms used in most current day communications, including emails and banking transactions. This means that any information encrypted using today’s methods would no longer be secure.

As businesses adopt cloud computing as their primary delivery model for IT services, the security of data stored in cloud environments is of paramount importance.

As businesses adopt cloud computing as their primary delivery model for IT services, the security of data stored in cloud environments is of paramount importance. The cloud offers a tempting target for hackers because it has a large attack surface and is highly vulnerable to all the same types of attacks as a traditional network. But there are also new types of attacks that could be launched against clouds, including quantum computing-based attacks.

The prospect of quantum computing being able to break encryption within the next decade or so represents a risk that companies can’t afford to ignore.

The prospect of quantum computing being able to break encryption within the next decade or so represents a risk that companies can’t afford to ignore.

Data encryption is the only way to protect data from being breached, but quantum computing may be able destroy this protection within our lifetimes. Quantum computers are incredibly fast at solving certain types of problems, and they could theoretically be used for good or evil. If you’re not concerned about the risks associated with quantum computing, you should be!

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Businesses must address the risks of #QuantumComputing NOW!

The #QuantumThreat is real, and needs to be on the agenda of every company board!

We are still in the early days of quantum computing technology, but it’s clear that this is an area that businesses should be paying attention to. The potential threats and risks associated with quantum computing are serious, but they can be mitigated with proper planning and preparation. It’s time for companies to start taking steps now in order to protect themselves from future problems—and if you don’t believe us, just ask Google!

Remember, quantum computers already exist. And, while today’s commercially-created quantum machines are nowhere near powerful enough to approach quantum supremacy, absolutely nobody knows the true extent of the quantum capabilities of all of the technologically-advanced governments around the world.

The risks of quantum computing are real and growing. As a business operating in a regulated industry, you may think that the threat of quantum computing is theoretical or limited to other industries such as finance or research. However, this is not the case—the risk of quantum computing will affect every industry.

Quantum computers are coming and they’re going to change the way we work. If you’re an executive or a business owner, it’s important that you understand the risks associated with quantum computing and begin taking steps now in order to prepare for what lies ahead.

To get started, consider these tips:

  • Know your options (and don’t be afraid to explore new ones). You may think that your company is too small or too large for quantum-safe encryption, but if this isn’t true then it’s worth exploring all of your options before making assumptions about what can be done.
  • There may also be other technologies available that can help protect against quantum attacks, such as hardware security modules (HSMs). HSM devices connect directly into a company’s systems via USB ports in order to provide additional security measures against any type of cyberattack—including those from quantum computers!
  • It’s important not only that companies understand their own needs when it comes time for new technology but also how these needs fit into larger trends happening within industries like healthcare where patients’ privacy concerns need addressing urgently before any potential interference occurs due specifically because they were unprepared beforehand.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Why haven’t we managed to curtail the #Ransomware menace?

#Ransomware is the biggest cybersecurity threat facing the world today.

Ransomware is the biggest cybersecurity threat facing the world today, with the potential to significantly affect whole societies and economies – and the attacks are unrelenting, the head of the National Cyber Security Centre (NCSC) has warned.

“Even with a war raging in Ukraine – the biggest global cyber threat we still face is ransomware. That tells you something of the scale of the problem. Ransomware attacks strike hard and fast. They are evolving rapidly, they are all-pervasive, they’re increasingly offered by gangs as a service, lowering the bar for entry into cyber crime,” said Lindy Cameron, CEO of the NCSC In a speech at Tel Aviv Cyber Week. She added that the NCSC has dealt with “nationally significant incidents” along with hundreds of general cyber incidents that “affect the UK more widely every year”.

Working alongside other law enforcement agencies, Cameron said that the NCSC is working to understand the criminal system that helps drive ransomware attacks – and how the nature of ransomware gangs and the techniques they’re using to facilitate ransomware campaigns continue to evolve.

“We want to make ransomware an unprofitable and unattractive business,” said Cameron, who argued it’s not all doom and gloom when it comes to cybersecurity, going on to detail how the NCSC’s Active Cyber Defence Program has helped to disrupt cyberattacks targeting citizens.

According to newly released figures from cybersecurity company WatchGuard, the volume of ransomware has risen significantly with the amount of detected activity in the first quarter of 2022 more than three times what was detected during the same period last year. The report suggests that the emergence of aggressive ransomware and extortion operations including  #LAPSUS$ and #BlackCat are behind what’s described as “an ever-increasing ransomware and cyber-extortion threat landscape.”

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Why does #Blockchain need to be #QuantumSafe?

Blockchain is currently extremely vulnerable!

01 Communique Laboratory Inc. has been commissioned to develop the World’s First Quantum-Safe Blockchain designed for Tokens, NFTs, Smart Contracts for the Metaverse, De-centralized Finance (DeFi). It is expected that this best-in-class quantum-safe blockchain will be resilient against cyber adversaries, including quantum attacks.

Blockchain technology is vulnerable to cyber-attacks, including quantum threats. A recent crypto hack reported a loss of over $300 million due to hackers forging a wrong signature to fake a transaction1. These hacks have now become commonplace and it is anticipated that the introduction of quantum computing will increase them dramatically.

After an extensive global search, a consortium of highly successful crypto experts has selected the Company as their technology partner and Post-Quantum Cryptography (PQC) provider. The consortium (Talent Summit) is pursuing the new blockchain aggressively and is planning a Proof-of-Concept (PoC) within three months. The PoC of this new venture is the first step towards protecting the de-centralized eco-system.

“01 has taken a minority position in Talent Summit and in addition will be compensated for the development project by way of a payment of $250,000 cash plus a 10% royalty for the ongoing share of the “Tokens” per transaction,” said Andrew Cheung, the President and CEO of 01 Communique. 01 will protect the integrity of this state-of-the-art blockchain by using its patent-protected, quantum-safe, IronCAP™ technology. In addition to being quantum-safe and supporting smart contracts, this new blockchain is aiming at high-performance with the ability to process tens of thousands of transactions/second (TPS). “This revolutionary blockchain is essentially a transformation of the proven Solana blockchain into a quantum-safe version to be incorporated in Tokens, NFTs, Smart Contracts for Metaverse, DeFi, and more”, said Andrew Cheung.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Is IBM accelerating the #quantumcomputer development trajectory?

IBM has unveiled 4 new quantum processors that it plans to use in a quantum supercomputer!

Last week IBM updated its quantum computing roadmap for the 3rd time since the first one was published. In this new roadmap, IBM has provided new tools for kernel developers, algorithm developers, and model developers. These developments all require new hardware, software, and new architecture.

The roadmap suggests that IBM will accelerate quantum’s expected trajectory by developing quantum processors that have the potential to scale to hundreds of thousands of qubits several years earlier than expected – and that’s a problem for current security, when it’s not quantum safe!

If IBM’s roadmap is implemented, it will change the landscape of quantum computing. 10 years ago, CPU-centric supercomputing was the exclusive domain of government and researchers for solving large and complex scientific problems. Since then, it has been democratized and transformed into various types of AI-centric supercomputing used in almost every industry today.

This roadmap is IBM’s plan to create a new family of quantum processors, software, and services that will lead to the realization of the next generation of supercomputers, a quantum-centric supercomputer. The combined resources of quantum processors, CPUs, and GPUs are expected to solve some of the world’s most challenging problems. In short the Quantum timeline is no longer science fiction – it now looks like this …

  • 2023 – Condor with 1121 Qubits
  • 2024 – Flamingo with 1386 Qubits
  • 2025 – Kookaburra with 4158+ Qubits
  • 2026 onward – hundreds of thousands Qubits!

… and there’s the problem, all encryption is now rendered useless! – That’s why The White House has announced that President Joe Biden has signed a National Security Memorandum (NSM) aimed at maintaining U.S. leadership in quantum information sciences and to mitigate the risks of quantum computing to the Nation’s security. “A cryptanalytically relevant quantum computer could jeopardize civilian and military communications as well as undermine supervisory and control systems for critical infrastructure,” said GEN Paul M. Nakasone, Commander, USCYBERCOM, Director, NSA/Chief, CSS. “The No. 1 defense against this quantum computing threat is to implement quantum-resistant cryptography on our most important systems.”

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Who is the #Ransomware Bad Guy?

So what is the biggest cause of Ransomware? Who’s the culprit? Email #Phishing has to be the answer!

Global Ransomware damage costs are predicted to exceed $265 Billion by 2031 (cybersecurityventures.com) Ransomware has been topping headline news on a daily basis and is becoming our No. 1 “cyber-enemy”. According to Harvard Business Review in May 2021, ransomware attacks were up 150% over the previous year. The amount paid by victims of these attacks increased more than 300% in 2020. This massive uptrend is further fuelled by accelerated digitalisation creating fertile soil for such attacks. The risk of data exposure will only grow given that remote workers’ personal devices are more vulnerable. According to the Cybercrime Magazine, ransomware damage costs are predicted to exceed USD265B annually and attacking a business, consumer, or device every 2 seconds by 203

Governments and critical infrastructure are not the only targets, ransomware attackers are less concerned about the industry and more focused on scope and scale. They go after large enterprise networks to secure the biggest possible ransom. Therefore, big enterprises e.g., banks, manufacturers and even high-tech companies and cybersecurity providers themselves are popular targets.

We believe enterprises should adopt a holistic approach, addressing the essential aspects including enhancing awareness and governance, while adopting suitable and robust technology solutions that best suit the technical environment that support the entity’s business operations. The adoption of true end-to-end encryption would be a key preventive measure, and leveraging the latest verifiable digital credentials would provide the average email user the means to verify the purported identity of the party sending the email.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.