Hackers exploited a weakness in the web-based booking system of Family Planning NSW to infect the system with ransomware. Shutterstock Family Planning NSW has taken its website offline for a “security update” after learning that hackers breached its booking system two weeks ago. The organisation notified its clients via email, and journalist Lauren Ingram, […]

Credit: Shutterstock This article was originally published at The Conversation.The publication contributed the article to Live Science’s Expert Voices: Op-Ed & Insights. Here we go again: another Facebook controversy, yet again violating our sense of privacy by letting others harvest our personal information. This flareup is a big one to be sure, leading some […]

GETTY IMAGES IN THE EARLY 2000s, Alex Pentland was running the wearable computing group at the MIT Media Lab—the place where the ideas behind augmented reality and Fitbit-style fitness trackers got their start. Back then, it was still mostly folks wearing computers in satchels and cameras on their heads. “They were basically cell phones, except […]

Tech companies can use differential privacy to collect and share aggregate data about user habits, while maintaining individual privacy. Tim Snell/Flickr, CC BY-ND It’s no secret that big tech companies like Facebook, Google, Apple and Amazon are increasingly infiltrating our personal and social interactions to collect vast amounts of data on […]

Cyber attacks have the potential to cause economic disruption, coerce changes in political behaviour and subvert systems of governance. from www.shutterstock.com, CC BY-ND Cyber security played a prominent role in international affairs in 2017, with impacts on peace and security. Increased international collaboration and new laws that capture the complexity of […]

_96510601_4

Quantum communication uses light to send crucial information SPL As malicious hackers mount ever more sophisticated attacks, China is about to launch a new, “unhackable” communications network – at least in the sense that any attack on it would be quickly detected. The technology it has turned to is quantum […]