{"id":29895,"date":"2025-08-29T02:27:17","date_gmt":"2025-08-29T02:27:17","guid":{"rendered":"https:\/\/www.europesays.com\/ie\/29895\/"},"modified":"2025-08-29T02:27:17","modified_gmt":"2025-08-29T02:27:17","slug":"with-apac-as-quantum-hub-kaspersky-highlights-top-risks-of-quantum-computing","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ie\/29895\/","title":{"rendered":"With APAC as Quantum Hub, Kaspersky highlights top risks of Quantum Computing"},"content":{"rendered":"<p>            <a href=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/08\/Introducing-First-2kA-ProtectionThyristor-in-Compact-DO-214AB-Package-from-Littelfuse-2025-08-28T120.jpeg\" data-caption=\"\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" class=\"entry-thumb td-modal-image\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/08\/Introducing-First-2kA-ProtectionThyristor-in-Compact-DO-214AB-Package-from-Littelfuse-2025-08-28T120.jpeg\"   alt=\"Quantum Computing\" title=\"Quantum Computing\"\/><\/a>            <\/p>\n<p>The Asia Pacific (APAC) region\u00a0<a href=\"https:\/\/pamirllc.com\/blog\/asia-pacific-is-becoming-a-hotbed-for-quantum-computing-development\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">has long been considered<\/a>\u00a0as a fertile breeding ground for the potentially revolutionary technology quantum computing. Countries such as China, Japan, India, Australia, South Korea, Singapore, and Taiwan are recognized global leaders in this frontier fuelled by strong government support and rapid adoption, particularly in finance, pharmaceuticals, and start-up sectors.<\/p>\n<p>At the heart of this technological shift lies a powerful and double-edged capability quantum computers could eventually break many of today\u2019s encryption methods, raising concerns over <a href=\"https:\/\/timestech.in\/tag\/cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cybersecurity<\/a>. Yet, the same technology also holds the promise of creating new, quantum-resistant encryption standards, which can reshape how we secure digital information in the future.\u00a0 For now, these capabilities exist largely in laboratory settings and proof-of-concept demonstrations, making the timeline for both the threats and benefits uncertain, though the need for preparation remains urgent.<\/p>\n<p>\u201cThe quantum computing market in APAC is currently on a steep growth trajectory. From USD 392.1 million last year,\u00a0experts\u00a0foresee a massive growth to USD 1.78 billion by 2032, soaring at a robust CAGR of 24.2%. This is both exciting and worrying. Organizations here should remember that quantum computing is the next cyber frontier. It could unlock ground-breaking innovations, but also usher the region to a new era of cybersecurity threats,\u201d says Sergey Lozhkin, Head of Global Research &amp; Analysis Team for META and APAC at Kaspersky.<\/p>\n<p>To better understand the scope of the evolving threat, Lozhkin identified three of the most urgent quantum-related risks that demand attention and action from the cybersecurity community during Kaspersky APAC Cyber Security Weekend in Da Nang, Vietnam.<\/p>\n<p><strong>The top three risks<\/strong><\/p>\n<p>Quantum computers could be used to compromise the traditional encryption methods that<\/p>\n<p>currently protect data in countless digital systems \u2014 posing a direct threat to global cybersecurity infrastructures. Threats include the interception and decoding of sensitive diplomatic, military, and financial communications, as well as the real-time decryption of private negotiations \u2013 something quantum systems could handle much faster than classical machines, turning secure conversations into open books.<\/p>\n<p><strong>1. Store now, decrypt later the key threat of the coming years<\/strong><\/p>\n<p>Threat actors are already harvesting encrypted data today, with the intention of decrypting it in the future once quantum capabilities advance. This \u201cstore now, decrypt later\u201d tactic could expose sensitive information years after it was originally transmitted \u2014 including diplomatic exchanges, financial transactions, and private communications.<\/p>\n<p><strong>2. Sabotage in blockchain and cryptocurrency<\/strong><\/p>\n<p>Blockchain <a href=\"https:\/\/timestech.in\/tag\/networks\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">networks<\/a> are not immune to quantum threats. Bitcoin\u2019s Elliptic Curve Digital Signature Algorithm (ECDSA), which relies on elliptic curve cryptography (ECC), is especially vulnerable.<br \/>\u00a0<br \/>Potential risks include forging digital signatures, which threatens Bitcoin, Ethereum, and other cryptocurrencies; attacks on ECDSA that secure crypto wallets; and tampering with blockchain transaction history, undermining trust and integrity.<\/p>\n<p><strong>3. Quantum-resistant ransomware: a new front<\/strong><\/p>\n<p>Looking ahead, developers and operators of advanced ransomware may begin adopting post-quantum cryptography to protect their own malicious payloads. So-called \u201cquantum-resistant\u201d ransomware would be designed to resist decryption by both classical and quantum computers \u2014 potentially making recovery without paying a ransom nearly impossible.<br \/>\u00a0<br \/>At present, quantum computing does not offer a way to decrypt files locked by current ransomware. Data protection and recovery still rely on traditional security solutions and collaboration among law enforcement agencies, quantum researchers, and international organizations.<\/p>\n<p><strong>Building quantum-safe defenses<\/strong><\/p>\n<p>Quantum computers are not yet a direct threat \u2014 but by the time they are, it may be too late to<\/p>\n<p>respond. Transitioning to post-quantum cryptography will take years. Preparations must begin today.<\/p>\n<p>The cybersecurity community, IT companies, and governments must coordinate to address the risks ahead. Policymakers should develop clear strategies to migrate to post-quantum algorithms. Businesses and researchers need to begin implementing new security standards now.<\/p>\n<p>\u201cThe most critical risk lies not really in the future, but in the present encrypted data with long-term value is already at risk from future decryption. While practical quantum computers capable of breaking current encryption don\u2019t yet exist, the threat is real because malicious actors can store encrypted data today and decrypt it once the technology matures. The security decisions we make today will define the resilience of our digital infrastructure for decades. Governments, businesses, and infrastructure providers must begin adapting now, or risk systemic vulnerabilities that cannot be retroactively fixed,\u201d adds Lozhkin.<\/p>\n<p><a class=\"gofollow\" data-track=\"NDIxLDAsMSw2MA==\" href=\"https:\/\/timestech.in\/accelerate-wire-harness-design-for-complex-electronic-systems\/\" target=\"_blank\" rel=\"nofollow noopener\"><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/08\/1756434437_355_Altium-Webinar-Banner_600x400.jpg\"\/><\/a>        <\/p>\n","protected":false},"excerpt":{"rendered":"The Asia Pacific (APAC) region\u00a0has long been considered\u00a0as a fertile breeding ground for the potentially revolutionary technology quantum&hellip;\n","protected":false},"author":2,"featured_media":29896,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[262],"tags":[314,982,18,18465,19,17,23746,751,23747,82],"class_list":{"0":"post-29895","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-computing","8":"tag-computing","9":"tag-cybersecurity","10":"tag-eire","11":"tag-electronics-news","12":"tag-ie","13":"tag-ireland","14":"tag-kaspersky","15":"tag-quantum-computing","16":"tag-quantum-hub","17":"tag-technology"},"share_on_mastodon":{"url":"","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/29895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/comments?post=29895"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/29895\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media\/29896"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media?parent=29895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/categories?post=29895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/tags?post=29895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}