1. Home
  2. Cybersecurity

Cybersecurity

  1. 27 August 2019 - Engineering & Technology

    Where’s the proof internet voting is secure?

    Victoria’s Electoral Matters Committee is looking into internet voting as a real option. But a University of Melbourne expert says there's no proof it's secure.

  2. 15 August 2019 - Engineering & Technology

    Two data points enough to spot you in open transport records

    University of Melbourne researchers have re-identified themselves and others in supposedly anonymous Myki datasets - highlighting a risk to privacy and safety.

  3. 25 March 2019 - Engineering & Technology

    What a second flaw in Switzerland’s sVote means for NSW’s iVote

    A team including a University of Melbourne expert finds a second flaw in the verification process of the SwissVote system that could exist in NSW's iVote.

  4. 14 June 2018 - Public Affairs

    This is not a drill: A cyberthreat reality check

    Cybersecurity is now an official national priority for Australia, but what makes us vulnerable? A University of Melbourne special explores our cyber risk.

  5. 25 April 2018 - Engineering & Technology

    The key to unlocking your privacy

    More government services, like the New Zealand census, are moving online; University of Melbourne experts look at whether we should trust that our data is safe.

  6. Podcast30 January 2018 - Eavesdrop on Experts

    Human dignity and digital identity

    In this episode of the University of Melbourne's Eavesdrop on Experts, Professor Luciano Floridi explores the ethical implications of our online identities.

  7. 18 December 2017 - Engineering & Technology

    The simple process of re-identifying patients in public health records

    In 2016, doctors’ identities were decrypted in Australian medical records. Now, a University of Melbourne team finds patients’ records can also be re-identified

  8. 13 December 2017 - Engineering & Technology

    How small details can create a big problem

    A University of Melbourne cyber-security analysis of a British government agency found system flaws, stressing the need for adequate information protection.