'Harvesting Attacks' & the Quantum Revolution

'Harvesting Attacks' & the Quantum Revolution
Stockpiles of stolen information sitting in foreign databases are ready to be exposed the minute there's a working quantum computer in five to ten years. The time to act is now.

The Information Age replaced industrial equipment with data. Today, data isn't just information; it's process and interaction. Software commands robots to build things in factories. Sensors in fields trigger watering when crops are too dry. Code runs power plants. We're developing smart cars and smart cities. And it's all connected to the Internet — the Internet of Things.


But with this progress comes a pitfall: the opportunity for nation-state hackers to beat even our best cybersecurity systems and steal everything from source code to aeronautical blueprints, and have the ability to damage into the physical world as never before.


Attackers constantly find their way into sensitive networks around the globe. Hackers working for China, Russia, Iran, North Korea, and other nations are doing reconnaissance, stealing data, and hiding backdoors and malware in the networks of US agencies and military contractors, nuclear power plants and dams, banks, and Nasdaq. Russia shut down the Ukraine electric grid two years in a row. The US allegedly attacked Russia's electric power grid, and a decade ago Stuxnet crippled Iran's nuclear program. These attacks have affected people's lives — such as turning Ukrainian cities dark for days. Not only do such attacks put sensitive data and intellectual property at risk, but the chances of an attack that could shut down systems that citizens rely on to survive are only increasing.  


In the cat-and-mouse game between cybersecurity and cybercriminals (nation-state or otherwise), a game-changer is in the ..

Support the originator by clicking the read the rest link below.