One bespoke contact tracing device is a bluetooth 'pen' device, which can be handed in if diagnosed without relying on smartphones.
Even though passcode options include swipe patterns and long passwords, many users still use easy 4-digit PINs. This is because people are often lulled into a false sense of security when they use fingerprint login.
SHUTTERSTOCK
While the data from a fingerprint is very hard to retrieve, cybercriminals can get around biometric technology in various ways. And having a weak passcode is like giving them a hall pass.
Unlike purpose-built data storage systems, a data lake can be used to dump data in its original form. This data usually remains unsupervised.
Shutterstock.com
A major cyber attack on a data lake could have immense consequences for any of us. And the damage could be felt anywhere from banking to the healthcare sector.
Researchers who hold the world record for storing and retrieving data in DNA explain how the building blocks of life can be used to hold digital information as well.
Holograms could be used to create complex 3D brain models.
Shutterstock
We have never been so connected and we are producing more data than ever before. But how can we manage our data effectively while making sure it remains safe?
The ATO crash didn’t involve a fire, but it almost looked that bad for a while.
Shutterstock
With current modes up against their limits, we need new data storage solutions. Tiny defects in diamonds' atomic structure might turn them into a new medium for memory.
Optical elements of the experimental setup allowing to obtain visible-spectrum laser pulses as short as 10 femtoseconds.
Courtesy of Dr. R. Borrego-Varillas and Prof. G. Cerullo, University Politecnico Milan (Italy)
Driverless cars could soon be cruising Australian roads if South Australia gives the go-ahead to reforms to its road legislation. The technology promises to increase safety on our roads, but what happens…
The consent policies of popular websites would take a month to read. Perhaps including a sign like this would be a simpler solution.
Shutterstock
We live in a world increasingly dominated by our personal data. Some of those data we choose to reveal, for example, through social media, email and the billions – yes, billions – of messages, photos and…
The trend towards cloud storage has privacy implications for individuals.
What does privacy mean in an age of ongoing privacy breaches? With new privacy law coming online in Australia on March 12, our Privacy in Practice series explores the practical challenges facing Australian…
Can you ever be anonymous in your doctor’s surgery if your doctor isn’t?
MTSOfan
The debate about uploading nearly all data from UK medical practices to a national database continues to cause concern. Responding to fears that the information held in the care.data database will put…
Press two to cancel your mobile phone contract and revert to your landline.
_Wiedz
Concern over privacy has peaked in recent months, especially in telecommunications, where technological advances appear to bring total surveillance ever closer to reality. In one high-profile case of recent…
Online retail continues to grow, despite the shadow of cybercrime.
Dolinski/Flickr
The recent hack and subsequent data loss by US retailer Target involved the personal information of at least 70 million customers, including names, phone numbers, email and mailing addresses. It follows…