Category Archives: Cyber Security

Ensuring the Security of Quantum Computers 🔒

Quantum computers are a type of computer that utilizes quantum mechanics to store and process data. They have the potential to significantly increase processing speeds for certain tasks, making them a promising technology for fields such as artificial intelligence, weather forecasting, and financial modeling.

There are two main types of quantum computers:

  1. Quantum Annealers: These computers use quantum effects to find the lowest energy state of a system, which can be used to solve optimization problems.
  2. Universal Quantum Computers: These computers are able to run any quantum algorithm and have the potential to perform any computation that a classical computer can. They are the more versatile type of quantum computer, but are also more complex and difficult to build.

There are also hybrid quantum computers, which combine elements of both quantum annealers and universal quantum computers.

Quantum computers have the potential to revolutionize the field of computing by offering significantly faster processing speeds for certain tasks. However, with this increased power comes the need for stronger security measures to protect against potential threats.

One of the unique security challenges presented by quantum computers is the ability to perform “quantum hacking.” This refers to the use of quantum algorithms to break through traditional security protocols, such as those used in cryptography.

To combat this threat, researchers are exploring the use of quantum-resistant algorithms. These algorithms are designed to be secure even against attacks by quantum computers.

Another potential security concern is the physical security of the quantum computers themselves. These systems can be delicate and sensitive to outside interference, making them vulnerable to tampering or sabotage. Ensuring the secure handling and storage of quantum computers is crucial to prevent any unauthorized access.

In addition to these measures, it is important to regularly update and patch any software used on quantum computers to prevent against vulnerabilities.

Overall, the security of quantum computers will require a combination of both technological and physical safeguards to ensure their protection against potential threats. By staying vigilant and proactive in addressing security concerns, we can fully realize the potential of these groundbreaking technologies.


The Next Step in Google Account Security Settings

Hi Guys,

As you may be aware that October is National Cybersecurity Awareness Month (NCSAM). In this year 2019, NCSAM is emphasizing on personal accountability and stress the importance of taking proactive steps to enhance cybersecurity at home and in the workplace. As a contribution to this initiative, I would like to share few focus areas you would be required to check in your Google Account after performing basic security settings (such as updating recovery phone number and recovery email).

Before reading below you have to understand what Google Account is. It is a user account with a username and password you used to access consumer products like Gmail, AdSense, YouTube, Docs etc. Alternatively, if you have any of these products, you have a Google account.

1. Third-party apps with Google Account access

You would have gone through situations like “Sign-in with Google Account” for quick sign up for any third-party apps or websites. It’s here Apps with access to your account page where you see all such apps and websites you did sign up in this way. Basically, in this process, you are sharing some sort of your account information and permissions such as:

  • See basic profile information
  • Modify account information
  • Edit, upload & create content in your Google Account

It is possible for these apps to have full access to your account. But don’t worry, these third-party apps can’t change your password, delete your account, or use Google Pay to send, request and receive money. But it could impersonate you if any malicious apps have access to your account by modifying your account information. So, revoke their access if you think any app or website is suspicious.

Read more here – Third-party sites & apps with access to your account

2. Devices that have used your account

It’s here Your devices page you see all such devices that is currently accessing your account and used to access your account. If you find any device you no longer use, use the sign out option to revoke their access. Incase, if you find any unknown device accessing your account, immediately use the sign out option for that device and change password. There is a high chance that someone got your password. Also do not forget to recheck recovery option, the hacker might have changed that too.

Read more here – See devices that have used your account

3. Less secure app access

If you use email clients like Outlook, Thunderbird etc. this option would have turned on. If this option is turned on, you are less secure and it can make hackers to get in to your account easily. You can find this setting at Less secure app access page.

Less secure apps basically mean the apps that use insecure communication protocol (OAuth) for authentication and authorization. It is always recommended to use latest apps which support latest OAuth 2.0 and turn off “less secure app access” option

4. Password manager

You can see the passwords that you save in your Google account here. The Password Checkup tool help you to check the security of your passwords. The Password Checkup tool generate 3 types of report indicating:

  • Whether your password is compromised or not by checking list of data breach information directories
  • Whether your passwords are reused or not
  • Whether your password is weak or not

Reference Links:

Article Written by:
Gem George