5,993 Results for:Protocol

  • Sort by: 

Apple unveils PQ3 post-quantum encryption for iMessage

By Alexander Culafi 21 Feb 2024

Apple said its new PQ3 protocol for iMessage is the first of its kind and addresses both future threats from quantum computing as well as "harvest now, decrypt later" attacks. Read More

Apple patches zero-days amid ‘foundational’ post-quantum update

By Alex Scroxton 06 Mar 2024

Apple’s iOS 17.4 update not only fixes zero-day flaws that are being actively exploited, but includes important new security protocols to safeguard users against future attacks Read More

LoRa Alliance unveils WAN development roadmap

By Joe O’Halloran 17 Apr 2024

Alliance set up to develop and promote standard for secure, carrier-grade IoT low-powered WAN connectivity unveils development roadmap for networking protocol to boost scalability and interoperability, enhancing ... Read More

NFS vs SMB vs CIFS: File storage protocols defined

By Antony Adshead 04 Oct 2022

We take a close look at NFS and SMB – the key file storage access protocols – and weigh up their pros, cons and suitability to differing datacentre environments Read More

3 ways to troubleshoot using Wireshark and tcpdump

By Damon Garn 05 Jul 2023

Protocol analyzer tools, such as Wireshark and tcpdump, can help network administrators identify protocols in the network, analyze network performance and discover network devices. Read More

Developed for Big Science in Europe, highly accurate time protocols ensure fair trading in finance

By Pat Brans 28 Dec 2022

Protocols developed for use at the European Organisation for Nuclear Research are now being used for many other applications, including financial services Read More

The Matrix Interoperated: Element fuses growth in open source messaging protocol 

By Adrian Bridgwater 18 Jul 2022

Matrix is an open network for decentralised communication. The brand has now surpassed sixty-million users worldwide after experiencing 71% growth in the last 12 months. All Matrix-based apps are ... Read More

Build a strong cyber-resilience strategy with existing tools

By Paul Kirvan 16 Oct 2023

Existing security protocols and processes can be combined to build a cyber-resilience framework, but understanding how these components relate to each other is key. Read More

FCSA appoints independent panel to bolster dispute resolution protocols for umbrella firms

By Caroline Donnelly 15 Aug 2022

In a statement to Computer Weekly, the Freelancer and Contractor Services Association says the panel will provide umbrella companies with a route to appeal against the decisions made by its CEO Read More

What to know about UDP vulnerabilities and security

By David Jacobs 20 Oct 2023

UDP is a simple protocol, but it has inherent vulnerabilities that make it prone to attacks, such as limited packet verification, IP spoofing and DDoS attacks. Read More