Canada is well positioned to gain far-reaching economic and social benefits from the rapidly developing quantum industry, but it must act now to secure its success.
European Commissioner for Home Affairs Ylva Johansson announced a set of proposed regulations requiring tech companies to report child sexual abuse material.
AP Photo/Francisco Seco
The EU’s proposed regulations don’t align with existing technology. They’re likely to fail – or to break the internet as we know it.
Organizations have significantly increased their use of data and the internet because of the pandemic, leading to new cyberattack and cybersecurity risks.
THE CANADIAN PRESS/Jonathan Hayward
Camélia Radu, Université du Québec à Montréal (UQAM) and Nadia Smaili, Université du Québec à Montréal (UQAM)
An integrative cybersecurity and data protection program will help firms adjust their management protocols and be better prepared for future cybersecurity trends.
The secret recipe came from Arthur Dee, 17th-century alchemist and royal physician to the Tsar.
Apple has developed the means to scan images on your phone. Can you trust the company to protect your privacy?
Sheldon Cooper/SOPA Images/LightRocket via Getty Images
Big Tech makes a lot of promises about protecting privacy, but the reality is that using the industry’s products is a matter of trust.
If you have an Apple device and upload photos to iCloud, the company will use some clever math to sniff them for instances of child abuse – without actually looking at the photos.
Vinicius "amnx" Amano/Unsplash
Apple will scan all photos uploaded to the cloud for child sexual abuse without actually looking at the photos. Privacy experts are concerned by the lack of public accountability.
The AN0M app was programmed by law enforcement to allow ‘back-door’ access. This led to the retrieval of information that culminated in hundreds of search warrants.
Researchers tried several times to have the document declassified, including in 1992, 2004 and 2016. It was initially written to help American NSA agents crack difficult coded messages.
Having an end-to-end encrypted messaging ‘ecosystem’ is a great way for Facebook to evade the full wrath of the law. It has come at a convenient time, too.
Facebook’s initiative places the company in a complicated situation, as increased user privacy, while positive, could come with potential impunity for offenders.
SHUTTERSTOCK
Facebook is planning to put end-to-end encryption on all its messaging services soon. But governments aren’t happy about it, as it could make it harder to catch criminals.
This SDS Sigma 7 computer sent the first message over the predecessor of the internet in 1969.
Andrew 'FastLizard4' Adams/Wikimedia Commons
The first internet communication was underwhelming, thanks to a computer crash. But a lot has happened since then – including key decisions that helped build the internet of today.
The American Survival Research Foundation offered a reward of $1,000 for cracking one of Thouless’s two codes within three years of his death. It was not claimed.
Shutterstock.com
Computer capabilities have boosted our decryption technology to great heights. How will the future compare to a past, one in which codes were thought to be a means of communicating after death?
United Kingdom officials suggest that messaging apps should build in law enforcement access to encrypted text, raising concerns about user privacy.
Shutterstock
A recent proposal by the United Kingdom’s Government Communications Headquarters agency suggests building in law enforcement access to encrypted communications. This has implications for users’ digital rights and privacy.
Telegram was targeted in a distributed denial-of-service (DDoS) attack during the protests.
Jerome Favre/AAP
Telegram enabled protesters in Hong Kong to evade surveillance, but a DDoS attack and the arrest of a group administrator undermined the ability of protesters to organise and communicate.
As police face greater obstacles with encryption, courts are divided on whether compelling people to reveal their passwords is legal.
Shutterstock
In a recent Canadian court case, defence and prosecution argued over whether a suspect was required to provide his password to allow for a search warrant to be executed on his phone.
Atlassian boss Scott Farquhar says the government’s encryption laws ‘threatens jobs’.
AAP Image/Erik Anderson
A forum of Australian tech companies this week was told the government’s encryption laws could see Australian jobs moved overseas. Labor’s promised to “fix” the laws, but that could be too late.
We need a cyber safety equivalent to the Slip! Slop! Slap! campaign to nudge behavioural change in the community.
Shutterstock
If the next government is serious about protecting Australian businesses and families, here are seven concrete actions it should take immediately upon taking office.
New legislation allows Australian government agencies to access encrypted WhatsApp messages.
from www.shutterstock.com
The government can access your phone metadata, drivers licence photo and much more. And new research shows Australians are OK about it. But that might change.
Secure communications are increasingly important.
maxuser/Shutterstock.com
Virtual private network companies make lots of promising claims about their services. Most people don’t have the skills to double-check their providers. So this group of researchers did the testing.
Prepare to protect yourself.
FXQuadro/Shutterstock.com