Every government, business or organisation releasing data needs to think about how to ensure that the risk of re-identifying an individual or revealing personal information about someone is low.
As the iPhone X rolls out, there are plenty of security expectations and concerns waiting to be verified by users and researchers.
REUTERS/Stephen Lam
While security researchers are yet to perform a thorough analysis of iOS 11 and Face ID, past issues with the hardware and software of the iPhone point to areas of potential concern.
How safe is it to use an iPhone?
Mesk Photography/Shutterstock.com
As companies make quantum computers available through their cloud services, take a look at what it means for computing to move beyond classical mechanics and into quantum physics.
An ion-trap used for quantum computing research in the Quantum Control Laboratory at the University of Sydney.
Michael Biercuk
Governments’ efforts to weaken communications security undermine and distract from the need to protect the real weak points in our online communications.
GnuPGP still has many important uses today.
AAP Image/Mick Tsikas
Cracking down on extremism online won’t solve the problem of extremist violence, will inevitably censor speech that’s important to protect and risks harming political dissidents and democracy itself.
The government wants additional powers to access encrypted messages.
Luis/Flickr
In a security update on the threats facing Australia at home and abroad, Malcolm Turnbull will say that an ‘online civil society is as achievable as an offline one’.
Cybersecurity jargon can be intimidating, but it needn’t be.
www.shutterstock.com
We have never been so connected and we are producing more data than ever before. But how can we manage our data effectively while making sure it remains safe?
New standards and regulations are beginning to govern how companies protect customers’ data. Companies ignore this vital issue at their peril, both financially and legally.
Tor’s improvements can help users stay private and anonymous online.
Anonymous online via shutterstock.com
The Tor Project is upgrading its protections for internet users’ privacy and anonymity. A scholar and volunteer member of the nonprofit effort explains what’s changing and why.
How can investigators get into digital files?
Sherlock Holmes and computer via shutterstock.com
The technical consensus is clear: Adding ‘backdoors’ to encryption algorithms weakens everyone’s security. So what are the police and intelligence agencies to do?