Every government, business or organisation releasing data needs to think about how to ensure that the risk of re-identifying an individual or revealing personal information about someone is low.
While security researchers are yet to perform a thorough analysis of iOS 11 and Face ID, past issues with the hardware and software of the iPhone point to areas of potential concern.
As companies make quantum computers available through their cloud services, take a look at what it means for computing to move beyond classical mechanics and into quantum physics.
Governments’ efforts to weaken communications security undermine and distract from the need to protect the real weak points in our online communications.
Cracking down on extremism online won’t solve the problem of extremist violence, will inevitably censor speech that’s important to protect and risks harming political dissidents and democracy itself.
In a security update on the threats facing Australia at home and abroad, Malcolm Turnbull will say that an ‘online civil society is as achievable as an offline one’.
We have never been so connected and we are producing more data than ever before. But how can we manage our data effectively while making sure it remains safe?
New standards and regulations are beginning to govern how companies protect customers’ data. Companies ignore this vital issue at their peril, both financially and legally.
The Tor Project is upgrading its protections for internet users’ privacy and anonymity. A scholar and volunteer member of the nonprofit effort explains what’s changing and why.
The technical consensus is clear: Adding ‘backdoors’ to encryption algorithms weakens everyone’s security. So what are the police and intelligence agencies to do?