Security Analysis of a Thirteenth-Century Venetian Election Protocol
Interesting analysis: This paper discusses the protocol used for electing the Doge of Venice between 1268 and the end of...
Interesting analysis: This paper discusses the protocol used for electing the Doge of Venice between 1268 and the end of...
The potential benefits and pitfalls of generative artificial intelligence technology. The ongoing conflict between Russia and Ukraine and new tension...
A cutting-edge collaboration between tech startup Tide Foundation and RMIT University is translating ground-breaking research into homegrown cybersecurity capability. Australia’s...
In a significant development for Australian cyber security, a collaboration between Tide Foundation, a tech start-up, and RMIT University is...
East-West traffic signifies the flow of data packets between servers within a data centre or across private and public clouds....
Nov 20, 2023NewsroomCryptocurrency / Blockchain Bitcoin wallets created between 2011 and 2015 are susceptible to a new kind of exploit...
New research by Versent, an Australian technology company, reveals a significant discrepancy between Australian adults' expectations of technology and what...
There is an undeniable increase in hacktivism amidst the prevailing geopolitical tensions between Israel-Hamas, Ukraine-Russia, and Taiwan-China, with reports indicating...
A VPN, or a virtual private network, is a mechanism used to establish a secure connection between a device and...
A new strategic partnership has been announced between Blockdaemon, the institutional-grade blockchain infrastructure company, and Ledger, the global expert in...
A meeting between Prime Minister Anthony Albanese and US President Joe Biden has resulted in an 'innovation alliance' and a...
Google is set to deploy two new trans-Pacific subsea cables between the United States and Australia, via Fiji and French...
Scality has announced standardised interoperability between VMware Cloud Director Object Storage Interoperability Service (OSIS) and Scality RING. Through this collaboration, Scality...
The time between a vulnerability being discovered and hackers exploiting it is narrower than ever – just 12 days. So...
All organisations today are striving for an appropriate balance between security and usability when it comes to managing staff access...