Attackers are always looking for new way to get their illicit packages through defences and this research paper outlines how by exploiting Unicode, malicious code can be written into software so that human code reviewers cannot recognise that it is there. Trojan Source: Invisible Vulnerabilities “This work has been under …
Know your Privacy – #BeCyberSmart
I have often written about privacy – it is an important concept that we should all understand – especially if you run a business and process personally identifiable information (PII). Here is a useful article for business owners from The Conversation discussing how UK citizen view and manage their personal …
Designing a contact tracing app
This is an excellent academic article by Susan Landau on the privacy, efficacy, and equity of contract-tracing on smartphone apps. She raises some important points about the social and economic divide when it comes to technology, something that other developers and technologists should consider when creating their apps. Digital exposure …