Revisions eyed for rushed Australia encryption law

Australia's top legal body on Friday warned of police and intelligence "overreach" after Canberra rushed through parliament controversial laws allowing authorities to circumvent encrypted communications.

How to certify a quantum computer

Quantum computers are being developed by teams working not only at universities but also at Google, IBM, Microsoft and D-Wave, a start-up company. And things are evolving quickly, says Nicolas Sangouard, SNSF Professor at ...

Security gaps identified in internet protocol IPsec

In collaboration with colleagues from Opole University in Poland, researchers at Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum (RUB) have demonstrated that the internet protocol IPsec is vulnerable ...

Password managers vulnerable to insider hacking

A new study shows that communication channels between different parts and pieces of computer software are prone to security breaches. Anyone with access to a shared computer – co-workers, family members, or guests – can ...

page 8 from 21