Crypto cash is catnip for criminals and a huge challenge to law enforcement – so it's time to bring in a tough, jurisdiction-busting regulatory body.
Who should be allowed inside?
Scholars dig in to the debate on whether police should be able to defeat or circumvent encryption systems.
Are Australian police doing enough with the data they have?
Many Australians are unaware of current police and intelligence powers when it comes to accessing our data.
Embedded medical devices will continue to be vulnerable to cybersecurity threats. The pacemaker depicted is not made by Abbott’s.
Pacemakers are Internet of Things devices for the human body, but they're still not particularly secure.
Blockchain technology is familiar to us in the form of digital currency bitcoin. And if it makes it way to the mainstream, could it change the way the world does business forever?
Apple's design decisions don't please everyone, but in the iPhone the company created something truly revolutionary that has lasted.
How secure are you?
Rawpixel.com via shutterstock.com
The first line of cyberdefense is having a good password. What does research say about what that actually means?
How can investigators get into digital files?
Sherlock Holmes and computer via shutterstock.com
The technical consensus is clear: Adding 'backdoors' to encryption algorithms weakens everyone's security. So what are the police and intelligence agencies to do?
What if the person flipping the coin cheats?
Coin and hand via shutterstock.com
A new way to generate random numbers can improve mathematics, cybersecurity and even predictions about the future. How does it work, and what does it mean for us?
An Internet of the future, where every network connection could be secure.
Padlock network via shutterstock.com
Developing tools to weed out would-be attackers from the world's most-used privacy and anonymity system.
The battle between personal privacy and national security online continues.
We know what we look like, but how do algorithms see us?
We increasingly depend on algorithms applied to big data, but even algorithms make mistakes that could label us in worrying ways
Communicating by Vuvuzela, for when anonymity could be a matter of life and death.
With attacks against Tor increasing, prototype anonymising software Vuvuzela takes a different approach.
Will Tor’s chopped onions lead to tears?
University researchers broke Tor, briefly, to bring down Silk Road 2.0, and this matters.
Anyone teaching encryption without first getting clearance from the government could soon be wearing these.
The government's Defence Trade Controls Act effectively makes teaching encryption a criminal act and considers even a simple calculator as a potential weapon.
Bright colours, dumb ideas.
Oast House Archive
A word of advice: don't try and build your own cryptography. It's hard and others have done it better.
Vote early, vote often - but if it’s not secure people won’t vote at all.
vote by Feng Yu/shutterstock.com
Online voting could boost turnout, but a flawed system could destroy faith in the voting process.
Cryptographic algorithms have been in a constant arms race with systems seeking to crack them.
Encryption has come a long way since the days of Sparta and Rome, but it's still not 100% secure.
After decades of cracking, the cracks are appearing in cryptography.
We have always been been intrigued by keeping secrets and uncovering the secrets of others, whether that’s childhood secret messages, or secrets and codebreaking of national importance. With a film, The…
German soldiers man a wireless telegraph.
Military intelligence has relied on observing and reading enemy messages since the earliest times of conflict. But it was during World War I that great leaps were made in the technology needed to intercept…