Believe it or not but ‘123456’ and ‘password’ are still used by people today as passwords.
Flickr/alexljackson
Tech giant Microsoft wants to rid the world of “dumb” passwords to improve online security. But maybe it’s the password itself we should dump.
British soldiers on exercises.
Ben Birchall/PA Archive
Unpicking the gap between rhetoric and reality.
Horoscope/shutterstock
Your mobile number is all a hacker needs to read your texts, listen to your calls and even track your whereabouts.
All falling down.
ell brown/flickr.com
Membership of the EU guarantees Britain’s political power in Europe and beyond.
Victoria Canning
Researchers explain how tolerance in Turin’s Olympic village is helping refugees to help themselves.
Brussels in mourning.
EPA/Olivier Hoslet
The focus has for a long time been on protecting aircraft. We’ve just been reminded how vulnerable pre-check-in areas can be.
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing.
REUTERS/Lucy Nicholson
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect’s iPhone?
Apple is refusing to back down in its fight with the FBI.
Reuters
Apple’s refusal to back down in its fight with the FBI is a sharp reversal from just a few years ago when it was the government urging tech companies to do more to protect consumer privacy.
Belen Desmaison
How the borrowed concept of gated communities is dividing rich from poor in the Peruvian capital.
There has been a rapid expansion of the tasks now carried out on a daily basis around Australia by private security personnel.
AAP/Julian Smith
The legal status of private security staff is, for the most part, decidedly uncertain.
We know what we look like, but how do algorithms see us?
Cracksinthestreet
We increasingly depend on algorithms applied to big data, but even algorithms make mistakes that could label us in worrying ways
Turning fingers into keys.
kaprik/shutterstock.com
Biometrics in schools may compromise pupils’ life-long security for the sake of short term ease of administration.
These participants in a seminar on advocacy and peacebuilding are part of a generation of young people working for global peace and security.
Institute for Inclusive Security/flickr
When nearly half the world’s people are under 24 years old, they clearly have a critical role to play in working for peace and security around the world.
Pedestrians walk across the Mexican border.
Mike Blake/REUTERS/
Like France, the US faces the possibility that ISIS will attack an American city sooner or later.
Reuters/Jacky Naegelen
Recent events show that you can’t always stop an attack, even when you prepare for one.
Afghan refugee children returning from Pakistan learn about the dangers of mines and explosives at a UNHCR registration centre in Kabul.
Reuters/Ahmad Masood
As Western nations increasingly focus elsewhere, the battle for Afghanistan rages on.
Quantum key distribution technology can be implemented with single photons using an optical channel to encrypt any data transmission.
Supplied
There will be a quantum leap in securing online confidentiality with key distribution technology.
Walking in sync.
Leonhard Foeger/Reuters
A scholars’ panel looks at the diplomacy, the science and the pragmatism behind the Joint Comprehensive Plan of Action signed between Iran and six world powers.
The end of privacy?
Shutterstock
Israel is suspected of spying on Iran’s nuclear talks using a virus to hack the devices that are all around us.
When Australians hear about Foreign Minister Julie Bishop’s dire warnings and counter-terrorism raids, they could lose historical perspective on the threat posed by Islamic State.
AAP/Mal Fairclough
Dire government warnings and counter-terrorism raids in our suburbs paint a picture of the worst threat Western nations have ever faced. A little historical perspective is in order.