A paper published by researchers at Google claimed that they had achieved computing quantum supremacy, but leaks and counter-claims have created a stir.
On October 23 Google announced that it built a quantum computer thousands of times faster than classic computers. This could have immense impacts on finance, cryptography and other fields.
Computer capabilities have boosted our decryption technology to great heights. How will the future compare to a past, one in which codes were thought to be a means of communicating after death?
The Voynich Manuscript has researchers, the media, and the public hooked. But pseudo-explanations for the book's 'code' reveals a serious problem with society's relationship with science.
It is hard to predict when quantum computers will be strong and fast enough to crack the codes that keep bitcoin safe. But that day is coming.
Prime numbers are a mathematical mystery.
Crypto cash is catnip for criminals and a huge challenge to law enforcement – so it's time to bring in a tough, jurisdiction-busting regulatory body.
Scholars dig in to the debate on whether police should be able to defeat or circumvent encryption systems.
Many Australians are unaware of current police and intelligence powers when it comes to accessing our data.
Pacemakers are Internet of Things devices for the human body, but they're still not particularly secure.
Blockchain technology is familiar to us in the form of digital currency bitcoin. And if it makes it way to the mainstream, could it change the way the world does business forever?
Apple's design decisions don't please everyone, but in the iPhone the company created something truly revolutionary that has lasted.
The first line of cyberdefense is having a good password. What does research say about what that actually means?
The technical consensus is clear: Adding 'backdoors' to encryption algorithms weakens everyone's security. So what are the police and intelligence agencies to do?
A new way to generate random numbers can improve mathematics, cybersecurity and even predictions about the future. How does it work, and what does it mean for us?
Developing tools to weed out would-be attackers from the world's most-used privacy and anonymity system.
The battle between personal privacy and national security online continues.
We increasingly depend on algorithms applied to big data, but even algorithms make mistakes that could label us in worrying ways
With attacks against Tor increasing, prototype anonymising software Vuvuzela takes a different approach.
University researchers broke Tor, briefly, to bring down Silk Road 2.0, and this matters.