Q-Day Could Lead To Hacking Nuclear Weapons

Q-Day is the unspecified, but inevitable coming day, when quantum computers will be capable of breaking the encryption algorithms we currently rely on to secure the Internet and a host of digital processes.

This is an alarming prospect, as Q-Day could lead to the hacking of countries’ nuclear weapons programs, according to Yigal Unna, former head of  Israel's National Cyber Directorate (INCD) at the recent Cybertech Conference in Tel Aviv.

Q-Day was also coined for the dress rehearsal of the first atom bomb test in 1945. The present Q-day question is about how soon progress in quantum computing will cross a threshold which will allow hacking of virtually all existing online platforms.

While some observers believe that this threshold will only be crossed within a few short years, Unna said there were signs that it might have already been crossed, in a reference to reports that Chinese scientists succeeded in cracking a  military grade computer defence system in late 2024.

Unna was INCD chief from 2018-early 2022, after which he was replaced by Gaby Portnoy, who was INCD chief from early 2022 until February this year, including during the current Gaza conflict. Portnoy warned the conference that, “Iran with a click of a button, can attack Israel and are doing it three times more than before. But they can also attack the US, UK, Albania, and even the UAE and the Saudis... To meet this kind of challenge, we need to build better resilience, improve the culture of sharing, change all of the time…It’s not just about critical infrastructure…but we must also look at our supply chain, our service providers, and the wider range of small and medium business,” Portnoy said.

At the same conference, the current Acting INCD chief Nitzan Amar said that despite a 300% spike in cyber attacks against Israel by Iran and Hezbollah during the war that, we managed a zero success of major cyber attacks against the Israeli since the attack by Hamas terrorists. Amar also said that Israel’s enemies could not harm Israeli national infrastructure. 

JPost   |   MSN  |  Jewish RI   |   facebook  |   Wired   |    @jeremybob1

Image: gerasimov174

You Might Also Read:

Safeguarding Data In The Quantum Computing Era:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 






 

« Cracking Down On Cyber Crime In Africa
BlackLock Hackers Hacked »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ManTech International

ManTech International

ManTech provides comprehensive, integrated cyber security support, which includes computer and network design, implementation, and operations.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

Datacom Systems

Datacom Systems

Datacom Systems is a leading manufacturer of network visibility solutions.

Red Balloon Security (RBS)

Red Balloon Security (RBS)

Red Balloon Security is a leading embedded device security company, delivering deep host-based defense for all devices.

Think Cyber Security (ThinkCyber)

Think Cyber Security (ThinkCyber)

ThinkCyber is a Tel Aviv-based Israeli company with a team of cybersecurity professionals who are experts in both information and operations technology.

Havelsan

Havelsan

HAVELSAN is a leading technology company in Turkey developing indigenous systems for domestic and foreign military, public and private sector clients.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

Attack Research

Attack Research

We go far beyond standard tools and scripted tests. Find out if your network or technology can stand real-world and dedicated attackers.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

Access Venture Partners

Access Venture Partners

Access Venture Partners are an early stage VC firm investing in bold founders and helping every step of the way. Areas we give special focus to include cybersecurity.

DV Cyber Security

DV Cyber Security

DV Cyber (formerly A76) is an innovative cyber security company vertically focused on Threat Intelligence and Cyber Security Research.

Nexio

Nexio

We are Nexio. We help organisations take every NEXT step toward their accelerated digital transformation.

Styx Intelligence

Styx Intelligence

Styx Intelligence’s platform provides visibility and supports remediation against threats targeting your digital assets.