A new type of computer means we'll need a new way to make our data secure.
Try to make this the only time you see a ransomware warning notice.
Ransomware – which encrypts your files and offers to sell you the key – operates differently from other malicious software. Those differences turn out to give potential victims a fighting chance.
An Internet of the future, where every network connection could be secure.
Padlock network via shutterstock.com
Developing tools to weed out would-be attackers from the world's most-used privacy and anonymity system.
Scientists have found a way to encrypt messages using common chemicals such as cola and mouthwash.
How many attempts will it take to unlock this phone?
Phone with lock and keys via shutterstock.com
The FBI has accessed the data on a shooter's iPhone. What if the device had been running Android?
Even talking to a colleague at an academic conference overseas could have harsh ramifications.
Researchers face stiff fines or even jail time if they inadvertently communicate with foreign colleagues about matters deemed to have a military use.
How hard should it be for the FBI to get access to your iPhone’s data?
The court order to Apple is consistent with the existing law and previous Supreme Court decisions.
Apple is refusing to back down in its fight with the FBI.
Apple's refusal to back down in its fight with the FBI is a sharp reversal from just a few years ago when it was the government urging tech companies to do more to protect consumer privacy.
What does it take to get at the secrets within an iPhone 5c?
Apple says it won't comply with a court order to unlock a terrorism suspect's iPhone for the FBI. Here's the technology at play.
The US government is asking Apple to effectively hack it’s own phone.
If Apple concedes to the US government's request to hack its own product, it could end up undermining security and privacy for all of us.
Who’s got the keys to the door?
If our homes and property are protected from the law, by the law, then our digital devices should be, too.
It’s a lot of grains of sand, but numbers can get a whole lot bigger….
Scientific advances – including the recent discovery of gravitational waves – force us to deal with numbers so extreme they're virtually inconceivable.
What would you do if your files were locked away?
Here's how to protect yourself from the latest online scourge of hackers encrypting your files and demanding a ransom to unlock them.
Western governments are threatening to undermine the encryption that keeps our online communications private.
An open letter signed by security experts from around the world is calling on governments to protect encryption rather than undermine it in a quixotic attempt to tackle terrorism.
Banning encryption won't help, and probably isn't possible anyway.
Communicating by Vuvuzela, for when anonymity could be a matter of life and death.
With attacks against Tor increasing, prototype anonymising software Vuvuzela takes a different approach.
The Investigatory Powers Bill raises plenty of questions. Here are the answers.
Under the new bill spooks needn’t listen in, they can catch up with up to a year’s stored data.
The snooper's charter is here, and it's as bad as expected. Here's three problems that need fixing.
There’s a dark side to the internet.
There's a dark side of the internet, where almost anything goes, or can be bought for the right price.
In what has been labelled as poetic justice by some, the Hacking Team, an Italian company that sells mass computer and mobile device surveillance software has itself been hacked. The alleged hackers, tweeting…