- Follow this blog:
- RSS
- Email Alert
IT Security
Selena Frye
TechRepublic Staff
Selena Frye
-
How to start your career as a security pro
Dominic Vogel offers some tips for getting starting in the information security field whether you're just starting out or looking to make a career change.
Posted by Dominic Vogel | July 5, 2012, 7:02 AM PDT | Latest comment by Michael Kassner
-
Microsoft security competition: A model for the future?
Patrick Lambert shares his perspective on Microsoft's BlueHat security competition and its $200,000 prize.
Posted by Patrick Lambert | July 3, 2012, 12:30 PM PDT
-
Google Play: Android's Bouncer can be pwned
Deciding whether to trust apps or not just got more complicated. Michael Kassner asked a pair of researchers why that is.
Posted by Michael Kassner | July 3, 2012, 5:30 AM PDT | Latest comment by Michael Kassner
-
Infographic: Generation gap in computer security
This infographic shows a generation gap in the attitudes of Gen Y users and Baby Boomers in their attitudes toward computer security.
Posted by Selena Frye | June 26, 2012, 12:26 PM PDT
-
Use MS Security Compliance Manager to secure your Windows environment
Alfonso Barreiro recommends Microsoft's Security Compliance Manager tool to help you create and maintain security baselines using Group Policy Objects.
Posted by Alfonso Barreiro | June 25, 2012, 11:14 AM PDT
-
An interview with Giorgio Maone, creator of NoScript
We know all about NoScript, but not much about its developer. Michael Kassner thought it was time to change that.
Posted by Michael Kassner | June 25, 2012, 10:10 AM PDT | Latest comment by boxfiddler
-
Security beyond passwords: What's next?
Patrick Lambert looks at the rash of stolen password exploits and how websites are trying to move beyond passwords only as a security check.
Posted by Patrick Lambert | June 21, 2012, 9:00 AM PDT | Latest comment by bboyd@...
-
Guess who's buying zero-day vulnerabilities?
Finding vulnerabilities in software has become a thriving business. Michael Kassner reports on what that means to users.
Posted by Michael Kassner | June 18, 2012, 7:29 AM PDT | Latest comment by JCitizen
-
Back to basics: Defending against phishing attacks
Alfonso Barreiro notes that phishing attempts are still duping unwary targets. Here are some tips to share with your users to help protect your organization from compromise.
Posted by Alfonso Barreiro | June 12, 2012, 6:00 AM PDT
-
Why we give away our Internet privacy, according to Cory Doctorow
Many bemoan giving up our online privacy, but few provide explanations of why we accept it. Learn what Michael Kassner found out from one who offers answers and a solution.
Posted by Michael Kassner | June 11, 2012, 7:04 AM PDT | Latest comment by Deadly Ernest
-
Infographic: Online threats 101
This infographic is a nice educational tool if you do basic user training as either part of your job or if you are often teaching beginners about computer safety.
Posted by Selena Frye | June 7, 2012, 6:00 AM PDT
-
Security vs. convenience: The case of case-insensitive passwords
Patrick Lambert considers the recent decision by Blizzard to ignore case-sensitivity in user passwords from the perspective of the security vs. convenience debate.
Posted by Patrick Lambert | June 5, 2012, 6:00 AM PDT | Latest comment by kentonr@...
-
Flame malware targets Microsoft Update system: Patch now
Microsoft released a security alert and patch due to the disturbing news that the hugely complex Flame malware has spoofed MS-signed certificates, potentially making Microsoft Update a malware...
Posted by Selena Frye | June 4, 2012, 10:59 AM PDT | Latest comment by VytautasB@...
-
ScriptNo: A preemptive strike against script attacks for Chrome
Google's Chrome browser has a powerful ally in ScriptNo. Michael Kassner talks to the developer about his efforts to curtail scripting attacks.
Posted by Michael Kassner | June 4, 2012, 7:02 AM PDT | Latest comment by Ocie3
-
Infographic: Is free Wi-Fi a friend or foe?
This infographic provides some current usage numbers for Wi-Fi connected devices and offers basic tips and security precautions for those using public Wi-Fi networks.
Posted by Selena Frye | May 30, 2012, 6:00 AM PDT | Latest comment by yodi.collins
-
Security pros: Knowing when it's time to move on (and how to do it)
Dominic Vogel draws on his recent experience to offer advice on job-changing strategies to security pros and others in IT when you realize it's time to recharge your career.
Posted by Dominic Vogel | May 29, 2012, 9:50 AM PDT | Latest comment by mvcandido
-
Chrome extensions are vulnerable: Advantage, bad guys
Chrome may be secure, but if the extensions aren't, it doesn't matter. Michael Kassner asks the experts why extensions are vulnerable and what's being done about it.
Posted by Michael Kassner | May 29, 2012, 6:24 AM PDT | Latest comment by Michael Kassner
-
What you should know about Windows 8 security features
Alfonso Barreiro takes a detailed look at all the security features available in each edition of Windows 8, including what's brand new, improved, and carried over from previous versions.
Posted by Alfonso Barreiro | May 22, 2012, 6:00 AM PDT | Latest comment by stubucks
-
Reading online privacy policies cost us $781 billion per year
Michael Kassner interviews two privacy researchers who feel we are spending too much to understand privacy policies.
Posted by Michael Kassner | May 21, 2012, 7:12 AM PDT | Latest comment by nwallette
-
DNSCrypt for Windows released: Does DNSSEC make it obsolete?
OpenDNS just released a Windows version of DNSCrypt, but does the implementation of the DNSSEC protocol make it obsolete? Patrick Lambert takes a look at what the critics are saying.
Posted by Patrick Lambert | May 16, 2012, 12:50 PM PDT | Latest comment by seanferd
-
Flame malware targets Microsoft Update system: Patch now
Microsoft released a security alert and patch due to the disturbing news that the hugely complex Flame malware has spoofed MS-signed certificates, potentially making Microsoft Update a malware...
Posted by Selena Frye | June 4, 2012, 10:59 AM PDT | Latest comment by VytautasB@...
-
List open ports and listening services
You should turn off any services you don't actually need so that they will not become avenues of attack for security threats. Different systems will have different services running by default,...
Posted by Chad Perrin | April 15, 2008, 8:47 PM PDT
-
Guess who's buying zero-day vulnerabilities?
Finding vulnerabilities in software has become a thriving business. Michael Kassner reports on what that means to users.
Posted by Michael Kassner | June 18, 2012, 7:29 AM PDT | Latest comment by JCitizen
-
Why we give away our Internet privacy, according to Cory Doctorow
Many bemoan giving up our online privacy, but few provide explanations of why we accept it. Learn what Michael Kassner found out from one who offers answers and a solution.
Posted by Michael Kassner | June 11, 2012, 7:04 AM PDT | Latest comment by Deadly Ernest
-
An interview with Giorgio Maone, creator of NoScript
We know all about NoScript, but not much about its developer. Michael Kassner thought it was time to change that.
Posted by Michael Kassner | June 25, 2012, 10:10 AM PDT | Latest comment by boxfiddler
-
Security beyond passwords: What's next?
Patrick Lambert looks at the rash of stolen password exploits and how websites are trying to move beyond passwords only as a security check.
Posted by Patrick Lambert | June 21, 2012, 9:00 AM PDT | Latest comment by bboyd@...
-
Google Play: Android's Bouncer can be pwned
Deciding whether to trust apps or not just got more complicated. Michael Kassner asked a pair of researchers why that is.
Posted by Michael Kassner | July 3, 2012, 5:30 AM PDT | Latest comment by Michael Kassner
-
How to spoof a MAC address
MAC address filtering for wireless networking isn't real "security". Anyone who pays any attention to current trends in wireless security at all should know that MAC filtering is less effective...
Posted by Chad Perrin | January 22, 2008, 1:28 PM PST | Latest comment by Doug Vitale
-
Infographic: Online threats 101
This infographic is a nice educational tool if you do basic user training as either part of your job or if you are often teaching beginners about computer safety.
Posted by Selena Frye | June 7, 2012, 6:00 AM PDT
-
Use PuTTY as a secure proxy on Windows
Last month, I wrote about using OpenSSH as a secure Web proxy on UNIX and Linux systems. This time, I'll show you how to do the same thing on Microsoft Windows using PuTTY -- probably the single...
Posted by Chad Perrin | March 10, 2008, 4:30 PM PDT | Latest comment by nil_online
-
Infographic: Generation gap in computer security
This infographic shows a generation gap in the attitudes of Gen Y users and Baby Boomers in their attitudes toward computer security.
Posted by Selena Frye | June 26, 2012, 12:26 PM PDT
-
Dropbox: Convenient? Absolutely, but is it secure?
A potential security lapse and possibly misleading statements are plaguing Dropbox, a hugely popular file-syncing app. What are the issues and is concern justified?
Posted by Michael Kassner | June 13, 2011, 8:03 AM PDT | Latest comment by nxb3942
-
10 services to turn off in MS Windows XP
As I pointed out on 19 October, in point number four of the article 10 security tips for all general-purposes OSes, an important step in the process of securing your system is to shut down...
Posted by Chad Perrin | November 7, 2007, 10:02 AM PST | Latest comment by JonB2008
-
Use MS Security Compliance Manager to secure your Windows environment
Alfonso Barreiro recommends Microsoft's Security Compliance Manager tool to help you create and maintain security baselines using Group Policy Objects.
Posted by Alfonso Barreiro | June 25, 2012, 11:14 AM PDT
-
Hacker vs. cracker
The word "hacker" gets used in a pejorative sense by journalists an awful lot. Some people think this is perfectly reasonable; others find it offensive, and recommend an alternative term for that...
Posted by Chad Perrin | April 17, 2009, 1:20 PM PDT | Latest comment by Saurondor
-
Prevent recurring problems with root cause analysis
In this series, we'll step through an easy root cause analysis process that requires no special training -- just a little effort and a lot of common sense.
Posted by Tom Olzak | September 10, 2008, 4:00 AM PDT | Latest comment by credible58
-
Security vs. convenience: The case of case-insensitive passwords
Patrick Lambert considers the recent decision by Blizzard to ignore case-sensitivity in user passwords from the perspective of the security vs. convenience debate.
Posted by Patrick Lambert | June 5, 2012, 6:00 AM PDT | Latest comment by kentonr@...
-
Back to basics: Defending against phishing attacks
Alfonso Barreiro notes that phishing attempts are still duping unwary targets. Here are some tips to share with your users to help protect your organization from compromise.
Posted by Alfonso Barreiro | June 12, 2012, 6:00 AM PDT
-
Infographic: Is free Wi-Fi a friend or foe?
This infographic provides some current usage numbers for Wi-Fi connected devices and offers basic tips and security precautions for those using public Wi-Fi networks.
Posted by Selena Frye | May 30, 2012, 6:00 AM PDT | Latest comment by yodi.collins
-
What you should know about Windows 8 security features
Alfonso Barreiro takes a detailed look at all the security features available in each edition of Windows 8, including what's brand new, improved, and carried over from previous versions.
Posted by Alfonso Barreiro | May 22, 2012, 6:00 AM PDT | Latest comment by stubucks