Commvault Strengthens Post-Quantum Encryption Algorithms

Commvault Strengthens Post-Quantum Encryption Algorithms

Commvault has added the HQC algorithm to its platform to complement the potential security vulnerabilities of ML-KEM, aiming to provide customers with comprehensive protection that allows for “data collection before decryption.” Commvault has expanded its support for post-quantum cryptography on its platform, as current encryption algorithms will inevitably be compromised—whether the time has come is … Read more

How to Protect Critical Data After Power Failure? Best Practices for Data Backup and Power Failure Protection in PLCs!

How to Protect Critical Data After Power Failure? Best Practices for Data Backup and Power Failure Protection in PLCs!

How to Protect Critical Data After Power Failure? Best Practices for Data Backup and Power Failure Protection in PLCs! Have you ever experienced a situation where your carefully debugged PLC program lost all count values and parameter settings due to an unexpected power failure, requiring the production line to be recalibrated? Or a voltage fluctuation … Read more

Five Major Myths About IoT Security

Five Major Myths About IoT Security

The value generated by data far exceeds the value of global goods trade —— McKinsey, “Digital Globalization” (2016) There are billions of connected IoT devices globally. These devices span multiple industries, whether they are security cameras, health monitoring devices, or simple office printers, they possess transformative power. However, with the explosive growth of connected technology, … Read more

Your Phone is Exposed! The Hidden Dangers of Public Wi-Fi

Your Phone is Exposed! The Hidden Dangers of Public Wi-Fi

Nowadays, public places such as airports, train stations, and shopping malls commonly offer free Wi-Fi services, allowing users to easily connect to the internet and enjoy a convenient online experience. However, this convenience hides significant security risks that cannot be ignored. It is important to note that if these open networks are exploited by malicious … Read more

The Trap of ‘Free’ Wi-Fi Scams

The Trap of 'Free' Wi-Fi Scams

Click the blue text Follow us Scam Analysis Providing “free” Wi-Fi access points in public places without a password is actually a trap set by hackers to capture users’ data transmissions, credit card information, and more. Classic CaseMr. Chen, while waiting at the airport, wanted to pass the time and handle some urgent work. He … Read more

How to Prevent Data Loss During Sudden Power Loss in ARM Systems?

How to Prevent Data Loss During Sudden Power Loss in ARM Systems?

From the small-scale power cycling and reset during controller debugging to the large-scale unforeseen shutdowns of power networks, every situation constantly tests the reliability of devices. High-end and complex control systems particularly highlight engineers’ attention to detail in their response mechanisms and protective measures against sudden power loss. NAND Flash/eMMC (NAND Flash with a Flash … Read more

New National Standard for Vehicle Networking Security Officially Takes Effect! Is Your Smart Car Still Safe?

New National Standard for Vehicle Networking Security Officially Takes Effect! Is Your Smart Car Still Safe?

Abstract On April 1, 2025, the Chinese vehicle networking industry will witness a historic moment—the national standard “Detection Mechanism for Abnormal Behavior in Vehicle Networking Security” (GB/T 45181-2024) will officially be implemented!This standard, led by 360 Group and the China Academy of Information and Communications Technology, was jointly developed with industry giants such as China … Read more

Automotive Internet Security Perspectives (2025 Issue 2)

Automotive Internet Security Perspectives (2025 Issue 2)

Table of Contents International Perspectives Upstream, an autonomous driving technology developer, releases the “2025 Global Automotive Cybersecurity Report” Arkansas, USA, sues General Motors for collecting data without user consent The European Commission plans to legislate to grant automotive service groups access to vehicle data Domestic Developments Premier Li Qiang emphasizes the vigorous development of smart … Read more

How to Solve Backup Time Issues with Large Virtualization Capacity?

How to Solve Backup Time Issues with Large Virtualization Capacity?

◉ How to Solve Backup Time Issues with Large Virtualization Capacity?Whether it is domestic or foreign virtualization, performing a full backup can result in a large capacity. Sometimes, based on requirements, off-site backups are also needed, which may require dedicated lines, not considering the cost issue for now. In reality, for example, when performing a … Read more

Understanding 3DES Encryption Algorithm

Understanding 3DES Encryption Algorithm

3DES is the common name for the Triple Data Encryption Standard. It is an enhanced version of the DES algorithm, equivalent to applying the DES operation three times to each data block. Due to the increased key length, the security level and difficulty of cracking are higher than that of the DES algorithm. The encryption … Read more