Q-Day Could Lead To Hacking Nuclear Weapons

Q-Day is the unspecified, but inevitable coming day, when quantum computers will be capable of breaking the encryption algorithms we currently rely on to secure the Internet and a host of digital processes.

This is an alarming prospect, as Q-Day could lead to the hacking of countries’ nuclear weapons programs, according to Yigal Unna, former head of  Israel's National Cyber Directorate (INCD) at the recent Cybertech Conference in Tel Aviv.

Q-Day was also coined for the dress rehearsal of the first atom bomb test in 1945. The present Q-day question is about how soon progress in quantum computing will cross a threshold which will allow hacking of virtually all existing online platforms.

While some observers believe that this threshold will only be crossed within a few short years, Unna said there were signs that it might have already been crossed, in a reference to reports that Chinese scientists succeeded in cracking a  military grade computer defence system in late 2024.

Unna was INCD chief from 2018-early 2022, after which he was replaced by Gaby Portnoy, who was INCD chief from early 2022 until February this year, including during the current Gaza conflict. Portnoy warned the conference that, “Iran with a click of a button, can attack Israel and are doing it three times more than before. But they can also attack the US, UK, Albania, and even the UAE and the Saudis... To meet this kind of challenge, we need to build better resilience, improve the culture of sharing, change all of the time…It’s not just about critical infrastructure…but we must also look at our supply chain, our service providers, and the wider range of small and medium business,” Portnoy said.

At the same conference, the current Acting INCD chief Nitzan Amar said that despite a 300% spike in cyber attacks against Israel by Iran and Hezbollah during the war that, we managed a zero success of major cyber attacks against the Israeli since the attack by Hamas terrorists. Amar also said that Israel’s enemies could not harm Israeli national infrastructure. 

JPost   |   MSN  |  Jewish RI   |   facebook  |   Wired   |    @jeremybob1

Image: gerasimov174

You Might Also Read:

Safeguarding Data In The Quantum Computing Era:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 






 

« Cracking Down On Cyber Crime In Africa
BlackLock Hackers Hacked »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Defense Media Group (CDMG)

Cyber Defense Media Group (CDMG)

CDMG is the leading global media group for all things cyber defense.

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

ZyberSafe

ZyberSafe

ZyberSafe is an innovative Danish company specialized within building hardware encryption solutions.

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Cowbell Cyber

Cowbell Cyber

Cowbell Cyber™ offers continuous risk assessment, comprehensive cyber liability coverage, and continuous underwriting through an AI-powered platform.

Narf Industries

Narf Industries

Narf Industries are a small group of reverse engineers, vulnerability researchers and tool developers that specialize in tailored solutions for government and large enterprises.

Druva

Druva

Druva is the industry’s leading SaaS platform for data resiliency, and the only vendor to ensure data protection across the most common data risks backed by a $10m guarantee.

ATHENE National Research Center For Applied Cybersecurity

ATHENE National Research Center For Applied Cybersecurity

ATHENE is the largest research center for cybersecurity and privacy in Europe, conducting application-oriented top-level research for the benefit of the economy, society and the state.

Concorde Technology Group

Concorde Technology Group

Concorde Technology Group is one of the UK’s leading IT support and services providers, delivering cost-effective and innovative IT solutions to businesses across the country.

Brightside AI

Brightside AI

Brightside AI is a Swiss cybersecurity SaaS that helps teams combat AI-enabled phishing threats. Protect your team today.

CovertSwarm

CovertSwarm

Since 2020 CovertSwarm have been radically redefining how enterprise security risks are discovered. We outpace the cyber threats faced by our clients using a constant cyber attack methodology.

Cyberlocke

Cyberlocke

Cyberlocke is dedicated to finding inventive solutions to meet the distinct IT obstacles of each organization we support.

Forensic IT

Forensic IT

Forensic IT is a specialised cyber security firm with expertise in Digital Forensics and Incident Response (DFIR).

London AI Safety Research (LASR)

London AI Safety Research (LASR)

London AI Safety Research Labs is a technical AI Safety research programme focussed on reducing the risk of loss of control to advanced AI.

Sandfly Security

Sandfly Security

Sandfly focuses on Linux security that is high performance, high stability, high compatibility, and low risk.