Sections

Services

Information

US United States

Encryption

Articles (1 - 9 of 9)

While the NSA leaks keep coming, major email providers have tightened up security. But is encryption completely beneficial? mrbill78636

Encryption ethics: are email providers responsible for privacy?

Ex-National Security Agency (NSA) employee Edward Snowden’s various leaks – the most recent being a slide showing that the NSA infected 50,000 of computer networks with remote-controlled spyware – confirm…
Teleportation is still well and truly entrenched in science fiction, unless you’re a photon. Photon™

Teleportation just got easier – but not for you, unfortunately

Thanks to two studies published in Nature last Thursday, the chance of successful teleportation has considerably increased. Which is a good thing, right? Whether or not you’ve ever been on a long-haul…
Having trouble remembering all your passwords? Don’t expect respite any time soon. Jonno Witts

Passwords: how to choose one and why we need them

I just did a count of the systems I use that require a password and gave up at 40. I know I’m not alone; for many of us, it often seems we have too many passwords to manage. They are, however, required…
The new virtual postman: Australia Post is about to launch its Digital MailBox. www.shutterstock.com

Australia Post’s digital delivery scheme may yield few returns to spender

Australia Post have every reason to be pleased with their role in the online shopping revolution. They are central to the process by providing a means of converting the virtual into the real, by delivering…
Open and poorly secured Wi-Fi networks are vulnerable to exploitation by others. doommeer

Wardriving and surviving: who else is using your Wi-Fi?

Late last month the Queensland Police started a new project to highlight the urgent need for secure wireless internet connections. The “wardriving” project involves police driving the streets of Queensland…
Having precious data split in two could keep it safer from prying eyes. dorena_wm

Cloud Shredder: hiding data better or making life more complicated?

Your data is out there, somewhere – all of your data. Encryption can protect files on your laptop or PC. Storing them on a remote server – such as DropBox is another option. And … well, that’s about it…
Recovering information from Osama’s hard drives may be impossible. wokka/Flickr

Cracking bin Laden’s computer code: unlikely

It has been reported that Osama bin Laden’s hard drives have been seized, hard drives that could conceivably contain information regarding the membership, funding and future plans of al-Qaeda. Information…

Top contributors

More