Sections

Services

Information

US United States

Encryption

Analysis and Comment (8)

While the NSA leaks keep coming, major email providers have tightened up security. But is encryption completely beneficial? mrbill78636

Encryption ethics: are email providers responsible for privacy?

Ex-National Security Agency (NSA) employee Edward Snowden’s various leaks – the most recent being a slide showing that the NSA infected 50,000 of computer networks with remote-controlled spyware – confirm…
Teleportation is still well and truly entrenched in science fiction, unless you’re a photon. Photon™

Teleportation just got easier – but not for you, unfortunately

Thanks to two studies published in Nature last Thursday, the chance of successful teleportation has considerably increased. Which is a good thing, right? Whether or not you’ve ever been on a long-haul…
Having trouble remembering all your passwords? Don’t expect respite any time soon. Jonno Witts

Passwords: how to choose one and why we need them

I just did a count of the systems I use that require a password and gave up at 40. I know I’m not alone; for many of us, it often seems we have too many passwords to manage. They are, however, required…
Open and poorly secured Wi-Fi networks are vulnerable to exploitation by others. doommeer

Wardriving and surviving: who else is using your Wi-Fi?

Late last month the Queensland Police started a new project to highlight the urgent need for secure wireless internet connections. The “wardriving” project involves police driving the streets of Queensland…
Recovering information from Osama’s hard drives may be impossible. wokka/Flickr

Cracking bin Laden’s computer code: unlikely

It has been reported that Osama bin Laden’s hard drives have been seized, hard drives that could conceivably contain information regarding the membership, funding and future plans of al-Qaeda. Information…

Research Briefs (1)