If the next government is serious about protecting Australian businesses and families, here are seven concrete actions it should take immediately upon taking office.
The government can access your phone metadata, drivers licence photo and much more. And new research shows Australians are OK about it. But that might change.
Virtual private network companies make lots of promising claims about their services. Most people don't have the skills to double-check their providers. So this group of researchers did the testing.
Think defensively about your online accounts and data security – and don't assume you'll avoid harm.
Speaking to The Conversation, Albanese wouldn't comment on Bill Shorten's unpopularity with voters, arguing instead that it's a matter of whether the Labor team is “seen as worthy of election".
Both the Coalition and Labor agreed to new laws that will give law enforcement agencies the power to access encrypted systems.
As both sides played the tactics, a remarkable thing happened in the House of Representatives. Behaviour improved 100%, with
none of the usual screaming and exchanges of insults.
Begun as part of efforts to preserve online anonymity and privacy, Freenet, Tor and the Invisible Internet Project are, like the rest of the web, home to both crime and free expression.
The broad and ill-defined new powers outlined in the government's new telecommunications bill are neither necessary nor proportionate – and contain significant scope for abuse.
The strengths of blockchain technologies could help address the weaknesses of health care systems to store and secure medical records.
It is hard to predict when quantum computers will be strong and fast enough to crack the codes that keep bitcoin safe. But that day is coming.
It is hard to know whether metadata retention has been effective or necessary. We can only hope that the debate over accessing and analysing encrypted services is a little more enlightening.
The ban on Queensland Members of Parliament using encrypted messaging apps for government business should be accompanied by a willingness to strengthen official accountability across the board.
Could an employer or platform claim copyright in a chat group? We’d first have to accept that conversations in a chat group are protected by copyright.
Storing data in the cloud is convenient, but how secure is it? And what are users' options for stepping up their data security?
Prime numbers are a mathematical mystery.
Scholars dig in to the debate on whether police should be able to defeat or circumvent encryption systems.
The FBI and police officials say they need to decrypt secure communications to fight crime. But they have other options, and modern threats make clear the importance of strong encryption.
Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.
KRACK can only be used in certain circumstances, and there are some steps you can take to keep your internet traffic safe.