It is one thing to stand before a podium, as Moses did on the mount, and promulgate laws. It is quite another thing to put those laws into effect, especially when they cover encryption.
Australia has announced that it will promulgate laws to force companies like Google and Facebook to decrypt messages sent by suspected terrorists and other criminals.
An exclusive report this morning says that Australian Prime Minister Malcolm Turnbull plans to ask US President Donald Trump to demand that US technology companies break into encrypted messages sent by suspected terrorists.
Eighty-three organisations and experts from the Five Eyes countries have called on ministers responsible for security to respect the right to use and develop strong encryption.
CryptoAUSTRALIA is running a workshop on 5 July to help you build your own end-to-end encrypted chat server ... while you still can.
The person or people behind the latest Windows ransomware attack have not gained much in terms of money as the email address given for receiving Bitcoin was shut down by the email provider.
In a statement that brings to mind the valour of Don Quixote, Australian Prime Minister Malcolm Turnbull has flagged "a crackdown on ungoverned spaces online".
Australia will use a meeting this week to try and get the co-operation of its partners in the Five Eyes alliance to "thwart" the use of encryption by terrorists.
Free encrypted email service ProtonMail has launched an equally free encrypted ProtonVPN service designed specifically to combat online surveillance and censorship. It promises it won’t abuse user trust like Google, Facebook, et al.
In what can only be termed a curious coincidence, the NBN Co, the company building the national broadband network, has published a blog post about the benefits of using a VPN - right at the time when the government is making noises about bringing in curbs on encryption.
A lobby group for IT workers has slammed the Coalition government over its proposal to introduce laws to gain access to encrypted communications, saying such moves were completely unworkable.
A lobby group for IT workers has slammed the Coalition government over its proposal to introduce laws to gain access to encrypted communications, saying such moves were completely unworkable.
Attorney-General George Brandis has created a tremendous amount of confusion over what the government plans to do about encryption in the wake of the London attacks – but, given his famous bid to explain metadata, one should, perhaps, not be surprised.
The Australian Greens have slammed Prime Minister Malcolm Turnbull's "knee-jerk reaction" of lending support to a push by his British counterpart, Theresa May, for a limit on access to encrypted communication services, in the wake of the terrorist attack in London on Saturday.
British Prime Minister Theresa May has used Saturday's terrorist attack to again push for a ban on encryption.
As it did in March, the British government is again trying to lay the blame on encryption in the wake of the terrorist attack in Manchester. This time, social media is also in its sights.
Digital security firm Gemalto asks, "Do you know where your data is?", revealing 1792 disclosed data breaches in 2016 led to almost 1.4 billion data records being compromised.
Every time an act of terrorism is committed, there is an outcry about encryption. This time, following the UK incident last week, is no different with some publications bringing WhatsApp into the picture.
Organisations and commercial firms have 90 days to switch to safer cryptographic hashes after researchers from a Dutch institute and Google jointly announced a method to crack the SHA-1 algorithm that has been used for a long time to verify the authenticity of digital documents.
Cryptkeeper, a system tray applet for Linux users to manage EnCFS encrypted folders, has been found to have an embarrassing bug that sets the password for decrypting locked content as "p".
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]