[TechRepublic] How quantum cryptography works (but it isn't unbreakable)

IT Security

TechRepublic Member | May 01, 2012

Editor's note
With expanded coverage from ZDNet, the IT Security newsletter will now deliver each week on Tuesday and Thursday.

How quantum cryptography works (but it isn't unbreakable)

Quantum cryptography is not infallible. But before getting to how it can be compromised, Michael Kassner calls on some experts to explain how Quantum Key Distribution works. Read more

Resource of the day

2012 Sophos security report: The threat landscape

Patrick Lambert breaks down the threat types that the Sophos 2012 security report identified in their annual survey. What's still around and what threats are on the rise? Read more

Posts from TechRepublic

 

Maybe it is time you actually read that Google Drive Terms of Service

Perhaps it is the proverbial mountain out of a molehill, but the wording of the Google Drive TOS just doesn't seem right. Read more

Let Super Security Standard protect your Android mobile

Jack Wallen takes a look at the Super Security Standard application. Find out why he believes this is one of the finest security apps for Android platform. Read more

Posts from ZDNet

 

Kaspersky: Apple '10 years behind Microsoft in terms of security'

Eugene Kaspersky believes Apple Mac OS X is 10 years behind Microsoft Windows in terms of security. He arguesCupertino will have to go through the security overhaul that Redmond once did. Read more

Warning: Fake Biophilla app on Android is malware

Cyber criminals have created a fake Biophilla app for Android that is really just malware in disguise. Your first red flag should be that Biophilla is officially available on iOS, but not on Android. Read more

Featured multimedia

 

Five uninstallers to degunk your computer

Uninstalling programs often leaves a mess behind. These tools will make sure all traces are removed. View on site



Today's recommended downloads

Introducing the New VMware Management Solution Portfolio (VMware)

Automating Infrastructure and Operations Management with VMware (VMware)

Simplified Management in the Real World with VMware vCenter Operations (VMware)

Enable Administrators to Morph into Managers by Leveraging Real-time Analytics and Automation (VMware)

Live Webcast Your Next 3 Ladder Rungs to Doubling Your Business (Citrix Online)


 

Message to subscribers

The IT Security newsletter is now a co-branded TechRepublic and ZDNet offering. In addition to TechRepublic IT Security bloggers' tips on how to protect your network, you will get ZDNet Zero Day bloggers' posts about the latest in vulnerabilities, software/hardware security research, and more. We hope you enjoy this expanded security coverage.


TechRepublic's IT Security blog

ZDNet's Zero Day blog

Connect with TechRepublic

TechRepublic  Facebook Fan Page

Follow  TechRepublic on Twitter

How Indian outsourcing's hunt for skills is boosting women and cutting bias

What started with the Indian services industry's attempts to attract talent through women-friendly policies now extends to all parts of the equality agenda.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic UK

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is techsubscriptionss@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic and ZDNet are registered service marks of CBS Interactive, Inc.

TechRepublic
ZDNet
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment