{"html":"\u003cli data-metadata=\"{\u0026quot;id\u0026quot;:2192,\u0026quot;title\u0026quot;:\u0026quot;Two data points enough to spot you in open transport records\u0026quot;,\u0026quot;original_channel\u0026quot;:\u0026quot;Engineering \\u0026 Technology\u0026quot;,\u0026quot;individuals\u0026quot;:\u0026quot;Associate Professor Benjamin Rubinstein, Associate Professor Vanessa Teague and Dr Chris Culnane\u0026quot;,\u0026quot;word_count\u0026quot;:1000}\"\u003e\u003ca class=\"pr-collection-item\" href=\"/articles/two-data-points-enough-to-spot-you-in-open-transport-records\"\u003e\u003cdiv class=\"pr-collection-item__img-wrap\"\u003e\u003cdiv class=\"pr-collection-item__img\" style=\"background-image: url(https://res-5.cloudinary.com/the-university-of-melbourne/image/upload/s--qwaYW0Nc--/c_fill,f_auto,h_180,q_75,w_270/v1/pursuit-uploads/04f/871/5f6/04f8715f674c80b3c814f65dd95e6ac1da2bccead2e3159f340eafa74f88.jpg);\"\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"pr-collection-item__content\"\u003e\u003cdiv class=\"pr-collection-item__meta pr-channel-name\"\u003e\u003cspan class=\"pr-tag-wrapper\"\u003e\u003c/span\u003e\u003cspan class=\"pr-collection-item__date\"\u003e15 August 2019\u003c/span\u003e\u003cspan\u003e - Engineering \u0026amp; Technology\u003c/span\u003e\u003c/div\u003e\u003ch2 class=\"pr-collection-item__title\"\u003eTwo data points enough to spot you in open transport records\u003c/h2\u003e\u003cp class=\"pr-collection-item__excerpt\"\u003eUniversity of Melbourne researchers have re-identified themselves and others in supposedly anonymous Myki datasets - highlighting a risk to privacy and safety.\u003c/p\u003e\u003c/div\u003e\u003c/a\u003e\u003c/li\u003e\u003cli data-metadata=\"{\u0026quot;id\u0026quot;:2013,\u0026quot;title\u0026quot;:\u0026quot; What a second flaw in Switzerland’s sVote means for NSW’s iVote\u0026quot;,\u0026quot;original_channel\u0026quot;:\u0026quot;Engineering \\u0026 Technology\u0026quot;,\u0026quot;individuals\u0026quot;:\u0026quot;Associate Professor Vanessa Teague, Professor Olivier Pereira and Sarah Jamie Lewis\u0026quot;,\u0026quot;word_count\u0026quot;:939}\"\u003e\u003ca class=\"pr-collection-item\" href=\"/articles/what-a-second-flaw-in-switzerland-s-svote-means-for-nsw-s-ivote\"\u003e\u003cdiv class=\"pr-collection-item__img-wrap\"\u003e\u003cdiv class=\"pr-collection-item__img\" style=\"background-image: url(https://res-5.cloudinary.com/the-university-of-melbourne/image/upload/s--ojy64egK--/c_fill,f_auto,h_180,q_75,w_270/v1/pursuit-uploads/f2b/efe/a41/f2befea411095fb9e637af5b92e49d1876f5d836e4311c4cc90830b6d07f.jpg);\"\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"pr-collection-item__content\"\u003e\u003cdiv class=\"pr-collection-item__meta pr-channel-name\"\u003e\u003cspan class=\"pr-tag-wrapper\"\u003e\u003c/span\u003e\u003cspan class=\"pr-collection-item__date\"\u003e25 March 2019\u003c/span\u003e\u003cspan\u003e - Engineering \u0026amp; Technology\u003c/span\u003e\u003c/div\u003e\u003ch2 class=\"pr-collection-item__title\"\u003e What a second flaw in Switzerland’s sVote means for NSW’s iVote\u003c/h2\u003e\u003cp class=\"pr-collection-item__excerpt\"\u003eA team including a University of Melbourne expert finds a second flaw in the verification process of the SwissVote system that could exist in NSW\u0026#39;s iVote.\u003c/p\u003e\u003c/div\u003e\u003c/a\u003e\u003c/li\u003e\u003cli data-metadata=\"{\u0026quot;id\u0026quot;:1933,\u0026quot;title\u0026quot;:\u0026quot;Is it really a myth that our data isn’t safe?\u0026quot;,\u0026quot;original_channel\u0026quot;:\u0026quot;Engineering \\u0026 Technology\u0026quot;,\u0026quot;individuals\u0026quot;:\u0026quot;Associate Professor Vanessa Teague\u0026quot;,\u0026quot;word_count\u0026quot;:1485}\"\u003e\u003ca class=\"pr-collection-item\" href=\"/articles/is-it-really-a-myth-that-our-data-isn-t-safe\"\u003e\u003cdiv class=\"pr-collection-item__img-wrap\"\u003e\u003cdiv class=\"pr-collection-item__img\" style=\"background-image: url(https://res-4.cloudinary.com/the-university-of-melbourne/image/upload/s--1DYwDJ6E--/c_fill,f_auto,h_180,q_75,w_270/v1/pursuit-uploads/020/669/583/0206695836bad1b8fd2aed7c4c6f097180f94c88c68606c6e2723a46e2cc.jpg);\"\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"pr-collection-item__content\"\u003e\u003cdiv class=\"pr-collection-item__meta pr-channel-name\"\u003e\u003cspan class=\"pr-tag-wrapper\"\u003e\u003c/span\u003e\u003cspan class=\"pr-collection-item__date\"\u003e11 February 2019\u003c/span\u003e\u003cspan\u003e - Engineering \u0026amp; Technology\u003c/span\u003e\u003c/div\u003e\u003ch2 class=\"pr-collection-item__title\"\u003eIs it really a myth that our data isn’t safe?\u003c/h2\u003e\u003cp class=\"pr-collection-item__excerpt\"\u003eA University of Melbourne expert argues that new Australian encryption legislation aimed exposing serious criminals might undermine our data security too.\u003c/p\u003e\u003c/div\u003e\u003c/a\u003e\u003c/li\u003e\u003cli data-metadata=\"{\u0026quot;id\u0026quot;:1695,\u0026quot;title\u0026quot;:\u0026quot;Patients and the data breach notification maze\u0026quot;,\u0026quot;original_channel\u0026quot;:\u0026quot;Legal Affairs\u0026quot;,\u0026quot;individuals\u0026quot;:\u0026quot;Dr Megan Prictor\u0026quot;,\u0026quot;word_count\u0026quot;:799}\"\u003e\u003ca class=\"pr-collection-item\" href=\"/articles/patients-and-the-data-breach-notification-maze\"\u003e\u003cdiv class=\"pr-collection-item__img-wrap\"\u003e\u003cdiv class=\"pr-collection-item__img\" style=\"background-image: url(https://res-4.cloudinary.com/the-university-of-melbourne/image/upload/s--YKdfSMSb--/c_fill,f_auto,h_180,q_75,w_270/v1/pursuit-uploads/8e1/935/195/8e19351950ae9bc5f0142d709607343cfd171cd9f5f730c41b416509170c.jpg);\"\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"pr-collection-item__content\"\u003e\u003cdiv class=\"pr-collection-item__meta pr-channel-name\"\u003e\u003cspan class=\"pr-tag-wrapper\"\u003e\u003c/span\u003e\u003cspan class=\"pr-collection-item__date\"\u003e10 August 2018\u003c/span\u003e\u003cspan\u003e - Legal Affairs\u003c/span\u003e\u003c/div\u003e\u003ch2 class=\"pr-collection-item__title\"\u003ePatients and the data breach notification maze\u003c/h2\u003e\u003cp class=\"pr-collection-item__excerpt\"\u003ePrivacy laws (including the Notifiable Data Breaches scheme) are confusing, particularly when it comes to health records, says a University of Melbourne expert.\u003c/p\u003e\u003c/div\u003e\u003c/a\u003e\u003c/li\u003e\u003cli data-metadata=\"{\u0026quot;id\u0026quot;:1622,\u0026quot;title\u0026quot;:\u0026quot;This is not a drill: A cyberthreat reality check\u0026quot;,\u0026quot;original_channel\u0026quot;:\u0026quot;Public Affairs\u0026quot;,\u0026quot;individuals\u0026quot;:\u0026quot;Ali Moore\u0026quot;,\u0026quot;word_count\u0026quot;:1210}\"\u003e\u003ca class=\"pr-collection-item\" href=\"/articles/this-is-not-a-drill-a-cyberthreat-reality-check\"\u003e\u003cdiv class=\"pr-collection-item__img-wrap\"\u003e\u003cdiv class=\"pr-collection-item__img\" style=\"background-image: url(https://res-4.cloudinary.com/the-university-of-melbourne/image/upload/s--xnmkp_Hq--/c_fill,f_auto,h_180,q_75,w_270/v1/pursuit-uploads/d33/ea0/938/d33ea093851cfa47fe5c9e41a3aa2ba22c03805455cf2afce8c45b266bb6.jpg);\"\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"pr-collection-item__content\"\u003e\u003cdiv class=\"pr-collection-item__meta pr-channel-name\"\u003e\u003cspan class=\"pr-tag-wrapper\"\u003e\u003c/span\u003e\u003cspan class=\"pr-collection-item__date\"\u003e14 June 2018\u003c/span\u003e\u003cspan\u003e - Public Affairs\u003c/span\u003e\u003c/div\u003e\u003ch2 class=\"pr-collection-item__title\"\u003eThis is not a drill: A cyberthreat reality check\u003c/h2\u003e\u003cp class=\"pr-collection-item__excerpt\"\u003eCybersecurity is now an official national priority for Australia, but what makes us vulnerable? A University of Melbourne special explores our cyber risk.\u003c/p\u003e\u003c/div\u003e\u003c/a\u003e\u003c/li\u003e\u003cli data-metadata=\"{\u0026quot;id\u0026quot;:1516,\u0026quot;title\u0026quot;:\u0026quot;The key to unlocking your privacy\u0026quot;,\u0026quot;original_channel\u0026quot;:\u0026quot;Engineering \\u0026 Technology\u0026quot;,\u0026quot;individuals\u0026quot;:\u0026quot;Associate Professor Vanessa Teague and Dr Chris Culnane\u0026quot;,\u0026quot;word_count\u0026quot;:1133}\"\u003e\u003ca class=\"pr-collection-item\" href=\"/articles/the-key-to-unlocking-your-privacy\"\u003e\u003cdiv class=\"pr-collection-item__img-wrap\"\u003e\u003cdiv class=\"pr-collection-item__img\" style=\"background-image: url(https://res-1.cloudinary.com/the-university-of-melbourne/image/upload/s--ZgcctLiC--/c_fill,f_auto,h_180,q_75,w_270/v1/pursuit-uploads/6f4/925/525/6f492552571ac8611f11314abdb2cfb4cc85d6be4086b8783cef54f8abd6.jpg);\"\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"pr-collection-item__content\"\u003e\u003cdiv class=\"pr-collection-item__meta pr-channel-name\"\u003e\u003cspan class=\"pr-tag-wrapper\"\u003e\u003c/span\u003e\u003cspan class=\"pr-collection-item__date\"\u003e25 April 2018\u003c/span\u003e\u003cspan\u003e - Engineering \u0026amp; Technology\u003c/span\u003e\u003c/div\u003e\u003ch2 class=\"pr-collection-item__title\"\u003eThe key to unlocking your privacy\u003c/h2\u003e\u003cp class=\"pr-collection-item__excerpt\"\u003eMore government services, like the New Zealand census, are moving online; University of Melbourne experts look at whether we should trust that our data is safe.\u003c/p\u003e\u003c/div\u003e\u003c/a\u003e\u003c/li\u003e\u003cli data-metadata=\"{\u0026quot;id\u0026quot;:1406,\u0026quot;title\u0026quot;:\u0026quot;Human dignity and digital identity\u0026quot;,\u0026quot;original_channel\u0026quot;:\u0026quot;Eavesdrop on Experts\u0026quot;,\u0026quot;individuals\u0026quot;:\u0026quot;Dr Andi Horvath and Professor Luciano Floridi\u0026quot;,\u0026quot;word_count\u0026quot;:85}\"\u003e\u003ca class=\"pr-collection-item\" href=\"/podcasts/human-dignity-and-digital-identity\"\u003e\u003cdiv class=\"pr-collection-item__img-wrap\"\u003e\u003cdiv class=\"pr-collection-item__img\" style=\"background-image: url(https://res-5.cloudinary.com/the-university-of-melbourne/image/upload/s--cVjbhnbG--/c_fill,f_auto,h_180,q_75,w_270/v1/pursuit-uploads/548/c00/d65/548c00d6541171f123d0555609c000cfb55f24c811f62bac15fd16967ecd.jpg);\"\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"pr-collection-item__content\"\u003e\u003cdiv class=\"pr-collection-item__meta pr-channel-name\"\u003e\u003cspan class=\"pr-tag-wrapper\"\u003e\u003cspan class=\"pr-tag pr-tag--podcast pr-tag--inline\"\u003e\u003cspan class=\"pr-tag__icon small\" data-icon=\"pr-microphone\"\u003e\u003c/span\u003e Podcast\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"pr-collection-item__date\"\u003e30 January 2018\u003c/span\u003e\u003cspan\u003e - Eavesdrop on Experts\u003c/span\u003e\u003c/div\u003e\u003ch2 class=\"pr-collection-item__title\"\u003eHuman dignity and digital identity\u003c/h2\u003e\u003cp class=\"pr-collection-item__excerpt\"\u003eIn this episode of the University of Melbourne\u0026#39;s Eavesdrop on Experts, Professor Luciano Floridi explores the ethical implications of our online identities.\u003c/p\u003e\u003c/div\u003e\u003c/a\u003e\u003c/li\u003e\u003cli data-metadata=\"{\u0026quot;id\u0026quot;:1369,\u0026quot;title\u0026quot;:\u0026quot;The simple process of re-identifying patients in public health records \u0026quot;,\u0026quot;original_channel\u0026quot;:\u0026quot;Engineering \\u0026 Technology\u0026quot;,\u0026quot;individuals\u0026quot;:\u0026quot;Associate Professor Benjamin Rubinstein, Associate Professor Vanessa Teague and Dr Chris Culnane\u0026quot;,\u0026quot;word_count\u0026quot;:1052}\"\u003e\u003ca class=\"pr-collection-item\" href=\"/articles/the-simple-process-of-re-identifying-patients-in-public-health-records\"\u003e\u003cdiv class=\"pr-collection-item__img-wrap\"\u003e\u003cdiv class=\"pr-collection-item__img\" style=\"background-image: url(https://res-5.cloudinary.com/the-university-of-melbourne/image/upload/s--_ZP3d0Ht--/c_fill,f_auto,h_180,q_75,w_270/v1/pursuit-uploads/a2d/fa8/352/a2dfa8352a1f6f38b5d3f5293b790e89edfdfa774d5bcbc4f390f2e08682.jpg);\"\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"pr-collection-item__content\"\u003e\u003cdiv class=\"pr-collection-item__meta pr-channel-name\"\u003e\u003cspan class=\"pr-tag-wrapper\"\u003e\u003c/span\u003e\u003cspan class=\"pr-collection-item__date\"\u003e18 December 2017\u003c/span\u003e\u003cspan\u003e - Engineering \u0026amp; Technology\u003c/span\u003e\u003c/div\u003e\u003ch2 class=\"pr-collection-item__title\"\u003eThe simple process of re-identifying patients in public health records \u003c/h2\u003e\u003cp class=\"pr-collection-item__excerpt\"\u003eIn 2016, doctors’ identities were decrypted in Australian medical records. Now, a University of Melbourne team finds patients’ records can also be re-identified\u003c/p\u003e\u003c/div\u003e\u003c/a\u003e\u003c/li\u003e\u003cli data-metadata=\"{\u0026quot;id\u0026quot;:1351,\u0026quot;title\u0026quot;:\u0026quot;How small details can create a big problem \u0026quot;,\u0026quot;original_channel\u0026quot;:\u0026quot;Engineering \\u0026 Technology\u0026quot;,\u0026quot;individuals\u0026quot;:\u0026quot;Associate Professor Benjamin Rubinstein, Associate Professor Vanessa Teague and Dr Chris Culnane\u0026quot;,\u0026quot;word_count\u0026quot;:1251}\"\u003e\u003ca class=\"pr-collection-item\" href=\"/articles/how-small-details-can-create-a-big-problem\"\u003e\u003cdiv class=\"pr-collection-item__img-wrap\"\u003e\u003cdiv class=\"pr-collection-item__img\" style=\"background-image: url(https://res-4.cloudinary.com/the-university-of-melbourne/image/upload/s--JXiGEHFy--/c_fill,f_auto,h_180,q_75,w_270/v1/pursuit-uploads/f89/25d/6f9/f8925d6f938387078e927eb238691de135c7d44a45f72ad7692177e878f9.jpg);\"\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"pr-collection-item__content\"\u003e\u003cdiv class=\"pr-collection-item__meta pr-channel-name\"\u003e\u003cspan class=\"pr-tag-wrapper\"\u003e\u003c/span\u003e\u003cspan class=\"pr-collection-item__date\"\u003e13 December 2017\u003c/span\u003e\u003cspan\u003e - Engineering \u0026amp; Technology\u003c/span\u003e\u003c/div\u003e\u003ch2 class=\"pr-collection-item__title\"\u003eHow small details can create a big problem \u003c/h2\u003e\u003cp class=\"pr-collection-item__excerpt\"\u003eA University of Melbourne cyber-security analysis of a British government agency found system flaws, stressing the need for adequate information protection.\u003c/p\u003e\u003c/div\u003e\u003c/a\u003e\u003c/li\u003e\u003cli data-metadata=\"{\u0026quot;id\u0026quot;:1009,\u0026quot;title\u0026quot;:\u0026quot;Q\\u0026amp;A: The ransomware cyber-attack fallout\u0026quot;,\u0026quot;original_channel\u0026quot;:\u0026quot;Engineering \\u0026 Technology\u0026quot;,\u0026quot;individuals\u0026quot;:\u0026quot;Associate Professor Toby Murray, Associate Professor Vanessa Teague and Dr Chris Culnane\u0026quot;,\u0026quot;word_count\u0026quot;:1884}\"\u003e\u003ca class=\"pr-collection-item\" href=\"/articles/q-amp-a-the-ransomware-cyber-attack-fallout\"\u003e\u003cdiv class=\"pr-collection-item__img-wrap\"\u003e\u003cdiv class=\"pr-collection-item__img\" style=\"background-image: url(https://res-4.cloudinary.com/the-university-of-melbourne/image/upload/s--g4qxBRuA--/c_fill,f_auto,h_180,q_75,w_270/v1/pursuit-uploads/72a/593/3b8/72a5933b88bf76aba4d358bad102ab1c1017ce2ca17b2130bc26fab7df8a.jpg);\"\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"pr-collection-item__content\"\u003e\u003cdiv class=\"pr-collection-item__meta pr-channel-name\"\u003e\u003cspan class=\"pr-tag-wrapper\"\u003e\u003c/span\u003e\u003cspan class=\"pr-collection-item__date\"\u003e16 May 2017\u003c/span\u003e\u003cspan\u003e - Engineering \u0026amp; Technology\u003c/span\u003e\u003c/div\u003e\u003ch2 class=\"pr-collection-item__title\"\u003eQ\u0026amp;A: The ransomware cyber-attack fallout\u003c/h2\u003e\u003cp class=\"pr-collection-item__excerpt\"\u003eComputers in 150 countries were attacked by the WannaCry ransomware – we ask University of Melbourne computer experts what we’ve learned from the hack.\u003c/p\u003e\u003c/div\u003e\u003c/a\u003e\u003c/li\u003e","next":"/topics/cybersecurity.js?page=3"}