Security

There's been a recent scare that Unicode reading direction characters could be used to conceal malicious code in open-source projects. This is undoubtedly true, but that fact doesn't make it significantly harder to ensure the security of open-source code than it already is.
Categories: software development, security

It's an old scam, but it's recently resurfaced in a slicker, more convincing form
Categories: security

It's not that difficult, but there's no built-in support.

It's not my fault that my avoidance of social media makes me hard to contact. It's your fault for letting yourself become hooked on it.
Categories: degoogling, security

Juice-jacking is the alleged practice of getting unauthorized access to the contents of a cellphone by subverting public USB charging points. It doesn't happen, and probably never has; so why has there been a recent increase in scare stories?
Categories: science and technology, security

What can the software industry learn from the Log4J security debacle?
Categories: software development, Java, security

For too long, mega-corporations have been able to avoid liability for defective software. But will upcoming changes to the law adversely affect those who distribute open-source software free-of-charge?
Categories: general computing, security

How an oddity in the way UTF-8 encoding works can cause all sorts of problems for unwary developers, including security weaknesses.
Categories: software development, security

This question is not particularly easy to answer, but understanding the implications helps.
Categories: degoogling, security

Is it safe to sell a used hard drive without securely erasing all the data? And is it even possible to erase all the data, even if we want to?
Categories: general computing, security