9 steps to make you completely anonymous online
The default state of Internet privacy is a travesty. But if you're willing to work hard, you can experience the next best thing to absolute Internet anonymity
Roger A. Grimes | 25 Aug | Read more
The default state of Internet privacy is a travesty. But if you're willing to work hard, you can experience the next best thing to absolute Internet anonymity
Roger A. Grimes | 25 Aug | Read more
In the 10 years since Security Adviser debuted, the threats have changed -- as have the defenses, and no one can argue computer security is safer overall
Roger A. Grimes | 18 Aug | Read more
Any device with a computer chip can be hacked, but not all hacks are created equal. In fact, in a world where tens of millions of computers are compromised by malware every year and nearly every company's network is owned, truly innovative or thought-provoking hacks are few and far between.
Roger A. Grimes | 16 Jun | Read more
Nearly every company in the world has thousands of vulnerabilities that hackers can easily exploit. For anyone working in IT, this is not a bombshell announcement. It's business as usual.
Roger A. Grimes | 29 Apr | Read more
For all the emphasis on tools and gizmos, IT is still very much about the people who develop and use said tools and gizmos. Collaboration, mutual respect, passion for the work -- all this and more are essential to a beneficial outcome, whether your IT group is shipping code, swatting bugs, working with business users, or securing company systems.
Roger A. Grimes | 03 Mar | Read more
Getting fired from an IT security job is a rare event, but there are certainly ways to ensure or accelerate your own unemployment. I'm not talking about garden-variety mistakes here. After all, most IT workers create or live with lots of little mistakes every day. That's the nature of complex, rewarding work.
Roger A. Grimes | 17 Nov | Read more
Nine years ago, I created what I believe was the world's first USB worm. By playing around with a USB thumb drive and placing a hidden file on it, I was able to make any computer in which the "infected" USB drive was plugged into automatically spread the file to the host computer, then back again when a new USB device was plugged in.
Roger A. Grimes | 09 Oct | Read more
Beware bold promises from a multibillion-dollar industry that can't prevent your IT systems from being routinely hacked
Roger A. Grimes | 12 May | Read more
Advanced persistent threats have garnered a lot of attention of late, deservedly so. APTs are arguably the most dangerous security concern for business organizations today, given their targeted nature.
Roger A. Grimes | 24 Feb | Read more
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.
Roger A. Grimes | 03 Feb | Read more
Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users
Roger A. Grimes | 30 Dec | Read more
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.
Roger A. Grimes | 04 Nov | Read more
Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users
Roger A. Grimes | 30 Sep | Read more
Stings, penetration pwns, spy games -- it's all in a day's work along the thin gray line of IT security
Roger A. Grimes | 22 Jul | Read more
The IT security world is full of charlatans and wannabes. And all of us have been "advised" by at least one of them.
Roger A. Grimes | 25 Feb | Read more