5,993 Results for:Protocol
- Sort by:
Apple unveils PQ3 post-quantum encryption for iMessage
21 Feb 2024Apple said its new PQ3 protocol for iMessage is the first of its kind and addresses both future threats from quantum computing as well as "harvest now, decrypt later" attacks. Read More
Apple patches zero-days amid ‘foundational’ post-quantum update
06 Mar 2024Apple’s iOS 17.4 update not only fixes zero-day flaws that are being actively exploited, but includes important new security protocols to safeguard users against future attacks Read More
LoRa Alliance unveils WAN development roadmap
17 Apr 2024Alliance set up to develop and promote standard for secure, carrier-grade IoT low-powered WAN connectivity unveils development roadmap for networking protocol to boost scalability and interoperability, enhancing ... Read More
NFS vs SMB vs CIFS: File storage protocols defined
04 Oct 2022We take a close look at NFS and SMB – the key file storage access protocols – and weigh up their pros, cons and suitability to differing datacentre environments Read More
3 ways to troubleshoot using Wireshark and tcpdump
05 Jul 2023Protocol analyzer tools, such as Wireshark and tcpdump, can help network administrators identify protocols in the network, analyze network performance and discover network devices. Read More
Developed for Big Science in Europe, highly accurate time protocols ensure fair trading in finance
28 Dec 2022Protocols developed for use at the European Organisation for Nuclear Research are now being used for many other applications, including financial services Read More
The Matrix Interoperated: Element fuses growth in open source messaging protocol
18 Jul 2022Matrix is an open network for decentralised communication. The brand has now surpassed sixty-million users worldwide after experiencing 71% growth in the last 12 months. All Matrix-based apps are ... Read More
Build a strong cyber-resilience strategy with existing tools
16 Oct 2023Existing security protocols and processes can be combined to build a cyber-resilience framework, but understanding how these components relate to each other is key. Read More
FCSA appoints independent panel to bolster dispute resolution protocols for umbrella firms
15 Aug 2022In a statement to Computer Weekly, the Freelancer and Contractor Services Association says the panel will provide umbrella companies with a route to appeal against the decisions made by its CEO Read More
What to know about UDP vulnerabilities and security
20 Oct 2023UDP is a simple protocol, but it has inherent vulnerabilities that make it prone to attacks, such as limited packet verification, IP spoofing and DDoS attacks. Read More