action speaks louder than words
Monday to Saturday

News and Information

Defi Protocol Security Landscape

Why Is Quantum-Based Encryption Important to Protect Files Against Data Breach?

Without questioning the measures companies take to arm themselves against cybercrime, it is all too common for companies, despite all efforts made, to fall victim to malware and ransomware.

Thinking it won't happen to you because you employ or have hired the best cybersecurity specialist is a mistake many make. There is no 100% guarantee of cyber security because where people are involved, mistakes can be made. And small mistakes can have large consequences; in other words, security is only as good as its weakest link! 

Of course, you can close and barricade all ports so no one can enter, but that usually has the consequence that working on the network entails the necessary inconveniences.

What you can do, is secure the data in such a way that cybercriminals cannot use it. Data they can't read is worthless to them. Exerting blackmail by threatening that your data will be exposed or sold to fellow criminals does not work if they cannot read any of your data and have no way of accessing the content. You may have been hacked and/or your system is being held hostage, but it is no more than, albeit slightly loaded, "an inconvenience" if your data is safe. There is no risk of data breaches or blackmail pressure, as there is no big deal to negotiate for these cyber criminals.

So, how do you secure your data? At least not with the usual encryption methods, because they will no longer hold up with the advent of quantum computers. With a quantum computer, encrypted files are decrypted in no time and then you nevertheless are screwed.

How to secure and why?

You better consider quantum-secure encryption because, as mentioned, quantum computers have the potential to break through traditional encryption methods. And that was precisely the solution to secure confidential data and communication, was it?

Quantum computers use a different computer architecture than classical computers, allowing them to factor large numbers exponentially faster than classical computers. Quantum computers can break through traditional encryption algorithms such as RSA or elliptic curve cryptography with the greatest ease.

That is why we offer our solution with encryption algorithms to address the potential threat of quantum computers. These algorithms are designed to be guaranteed to be secure against attacks from both classical and quantum computers and several combined techniques are used to encrypt data. For example, you can think of grid-based cryptography or hash-based cryptography.

By implementing quantum-safe encryption, you can ensure that your sensitive data is 100% protected, even if it comes into the hands of cybercriminals using a quantum computer.

The DBV Quantum-Safe Data Encryption provides a four-layer encryption, consisting of a combination of different encryption techniques.

Each encryption system is configured custom-made, so only you can decrypt your data with a self-created “passphrase”. No keys are stored; not on the workstation and not on the network.

It takes only a few milliseconds to generate a key. After that, it disappears and cannot be found by anyone. Files can only be unlocked with your own passphrase.

So what can you encrypt? Well, everything from texts and files to complete databases.

Interested to learn more?

It’s our pleasure to explain more about our quantum-safe solution. Please visit our website and leave us a message with your contact details or call us to schedule a video chat. And of course, this will be without any obligation.

Türkiye Contact

Sirius Kriminal signed a dealership agreement with DFEND [Tech for Secure World] regarding the quantum-based encryption system.
Sirius Criminal signed dealership agreement with Systool Company, which provides world-class, robust and affordable solution services with a focus on guaranteed data security, high data quality recovery, migration to the Cloud and digital forensic solutions and software.



  • Botnet Protection
  • Malware Analysis and Anti-Malware Saolutions
  • Sandboxing and Emulation
  • Application Whitelisting
  • Network Forensic
  • Automated Security Analytics


  • ISO 27001 / HIPAA / PCI & SOC
  • Firewall Compliance and Managemen
  • Configuration Compliance
  • Audit and Compliance Analysis


  • Firewall Management
  • Network Access Control
  • Secure Network Design
  • Unified Thread Management
  • Remote Access Solutions
  • Intrusion Detection and Prevention System
  • Pentest


  • DNS Security
  • Mail Security
  • Unified Communication
  • Security Information and Event Management (SIEM)
  • Zero Day Vulnerability Tracking
  • Logs and False Positive Analysis


  • Web Application Security
  • OWASP Top 10 and SANS CWE Top 25
  • Database Activity Monitoring
  • Content Security
  • Secure File Transfer
  • Web Application Firewall
  • Secure Coding Practices
  • Testing for Vulnerability Validation
  • Application Pentest
  • Secure Code Review


  • Windows / Linux Server Security
  • Vulnerability / Patch Management
  • Automated Vulnerability Scanning


  • Data Encryption
  • Data Leakage Prevention


  • Authentication and Onboarding
  • Rogue Access Point Detection
  • Wireless Security Protocols
  • OWASP Mobile Top 10
  • Mobile App Automated Scanning
  • Dynamic Mobile App Analysis
  • Secure Coding Practices
  • Mobile Pentest
  • Secure Code Review
How safe is your password... Time it would take a computer to crack a password the aforementioned parameters
Whether it is a computer on your desk or a phone in your pocket, your device retain a lot of personal data. And all of that information may be vulnerable to cyber criminals.

The second of the Kosovo Turkey Forensic Sciences Days, the first of which was held in Prizren-Kosovo in 2014 was held in Foça-İzmir on 25/26 April. We took part in the event with our presentation "Identification of Disaster Victims in Afghanistan Plane Crash and Kosovo Mass Graves".

Polislikle ilgili Kitap Kataloğu

1-	Practical Crime Scene Investigations for Hot Zones; J.T.Fish, R.N.Stout, E.W.Wallace; Practical aspects of criminal and forensic investigations series; CRC Press; Taylor&Francis Group
2-	Emergency Response Handbook for Chemical and Biological Agents and Weapons; John R. Cashman; CRC Press; Taylor&Francis Group
3-	Women Who Sexually Abuse Children; Hannah Ford; NSPCC
4-	The Explanation of Crime; Context, mechanisms and development, Cambridge edited by Per Olaf W. Wikstrom and Robert J. Sampson
5-	The Information Security Dictionary Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology; Urs E. Gattiker; Kluwer Academic Publishers
6-	Terrorism and Organised Hate Crimes; Intelligence gathering, analysis and investigatios; Michael R. Ronczkowski; CRC Press
7-	Techniques of the Professional Pickpocket; Wayne B. Yeager
8-	Sexual Murder; Catathymic and Compulsive Homicides, Louis B. Schlesinger; CRC Press
9-	Serial Offenders, Current Thought, Recent Findings; Edited by Louis B. Schlesinger, Ph.D. ; CRC Press
10-	The Human Skeleton in Forensic Medicine; Third Edition; Mehmet Yaşar İşçan, Maryna Steyn
11-	Manual of Forensic Odontology; Edited by David R. Senn
12-	Adli Bilimlerin Temeli; Mea M. Houck, Jay A. Siegel, Çeviri Editörü Yeşim Doğan
13-	Advances in Forensic Human Identification; Edited by Xanthe Mallett, Teri Blythe, Rachel Berry
14-	Adli Dil Bilimi; Editörler Prof. Dr. Selma Elyıldırım, Prof. Dr. İsmail Hamit Hancı, Seçkin Yaınları
15-	Crime Scene Analysis and Reconsruction; Ross M. Gardner, Tom Bevel
16-	Cadavar Dog Handbook; Forensic training and tactics for the recovery of human remains; Andrew Rebmann, Edward David, Marcella H. Song
17-	Crime Scene Reconstruction; W. Jerry Chisum, Brent E. Turvey

DNA Phonetyping

By comparing samples, DNA collected at a crime scene can be matched to a suspect as well as used to identify what a suspect looks like physically. Forensic scientistcan sequence a DNA sample and give investigators information about the suspect's distinguishing characteristics such as hair, eye, skin colour, age and biological backround.


Immunochromatography tests are used in forensics to detect drugs and pharmeceuticals in a subject’s bodily fluids.  A smartphone-based sensor has even been developed to perform immunochromatography on a saliva without the requirement for a lab visit.

Geolocoting a suspect or victim using stable isotopes of water.

Scientist can pinpoint where a sample came from by isolating the isotopes in a water sample found on a suspect or victim, according to recent findings. If there are enough samples, the isotopes can even reconstruct the subject’s route. Other methods of isotopes detection can be used to ascertain the number of persons present.

Dijital araç adli bilimler

Dijital araç adli bilimler bir araç sisteminden dijital verilerin (dijital kanıt) tespit edilmesi ve analizi; dijital araç adli bilim araştırması olarak adlandırılır. Bu bilgiler, araçların karıştığı kazalar, hırsızlık, dolandırıcılık ve araçların dahil olduğu cezai davranışlarla ilgili davalarda çalışan hukuk ve cezai soruşturmacıları için yararlı bilgiler sağlayabilir.

Digital surveillance for XBOX (XFT device)

Most people do not think of a gaming system as possible spot to store illegal data, which is why criminals have become so reliant on them. The XFT is being created to give authorities visual Access to hidden files on the XBOX hard drive, making it one of the most groundbreaking forensic Technologies for digital forensic specialist