Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.
KRACK can only be used in certain circumstances, and there are some steps you can take to keep your internet traffic safe.
Every government, business or organisation releasing data needs to think about how to ensure that the risk of re-identifying an individual or revealing personal information about someone is low.
While security researchers are yet to perform a thorough analysis of iOS 11 and Face ID, past issues with the hardware and software of the iPhone point to areas of potential concern.
Some of the iPhone's innovations have made users less secure.
Many Australians are unaware of current police and intelligence powers when it comes to accessing our data.
As companies make quantum computers available through their cloud services, take a look at what it means for computing to move beyond classical mechanics and into quantum physics.
Quantum computing is being described as "just around the corner". Is it?
Governments' efforts to weaken communications security undermine and distract from the need to protect the real weak points in our online communications.
Most people have never heard of the software that makes up the machinery of the internet
- especially the tools that keep us safe.
The Australian government's proposed law that would force technology companies to decrypt messages could make Australians more vulnerable.
Cracking down on extremism online won’t solve the problem of extremist violence, will inevitably censor speech that's important to protect and risks harming political dissidents and democracy itself.
The Australian government wants to access encrypted messages, but don't call it a "backdoor".
In a security update on the threats facing Australia at home and abroad, Malcolm Turnbull will say that an 'online civil society is as achievable as an offline one'.
To protect ourselves online, we should all understand a few key terms.
Movies tell us that paying a ransom means the bad guys win, but in the real world it's not that simple.
We have never been so connected and we are producing more data than ever before. But how can we manage our data effectively while making sure it remains safe?
A way in for government would also allow hackers access.
New standards and regulations are beginning to govern how companies protect customers' data. Companies ignore this vital issue at their peril, both financially and legally.
The Tor Project is upgrading its protections for internet users' privacy and anonymity. A scholar and volunteer member of the nonprofit effort explains what's changing and why.