Follow this blog:
RSS
Email Alert

IT Security

Selena Frye

Selena Frye

TechRepublic Staff

Selena Frye

Selena Frye
Selena has been at TechRepublic since 2002. She is currently a Senior Editor with a background in technical writing, editing, and research. She edits Network Administrator, Linux and Open Source, Macs in Business, and Security blogs.
  • 21

    Flame malware targets Microsoft Update system: Patch now

    Microsoft released a security alert and patch due to the disturbing news that the hugely complex Flame malware has spoofed MS-signed certificates, potentially making Microsoft Update a malware...

    Posted by Selena Frye | June 4, 2012, 10:59 AM PDT | Latest comment by VytautasB@...

  • 0

    List open ports and listening services

    You should turn off any services you don't actually need so that they will not become avenues of attack for security threats. Different systems will have different services running by default,...

    Posted by Chad Perrin | April 15, 2008, 8:47 PM PDT

  • 82

    Guess who's buying zero-day vulnerabilities?

    Finding vulnerabilities in software has become a thriving business. Michael Kassner reports on what that means to users.

    Posted by Michael Kassner | June 18, 2012, 7:29 AM PDT | Latest comment by JCitizen

  • 91

    Why we give away our Internet privacy, according to Cory Doctorow

    Many bemoan giving up our online privacy, but few provide explanations of why we accept it. Learn what Michael Kassner found out from one who offers answers and a solution.

    Posted by Michael Kassner | June 11, 2012, 7:04 AM PDT | Latest comment by Deadly Ernest

  • 24

    An interview with Giorgio Maone, creator of NoScript

    We know all about NoScript, but not much about its developer. Michael Kassner thought it was time to change that.

    Posted by Michael Kassner | June 25, 2012, 10:10 AM PDT | Latest comment by boxfiddler

  • 16

    Security beyond passwords: What's next?

    Patrick Lambert looks at the rash of stolen password exploits and how websites are trying to move beyond passwords only as a security check.

    Posted by Patrick Lambert | June 21, 2012, 9:00 AM PDT | Latest comment by bboyd@...

  • 19

    Google Play: Android's Bouncer can be pwned

    Deciding whether to trust apps or not just got more complicated. Michael Kassner asked a pair of researchers why that is.

    Posted by Michael Kassner | July 3, 2012, 5:30 AM PDT | Latest comment by Michael Kassner

  • 63

    How to spoof a MAC address

    MAC address filtering for wireless networking isn't real "security". Anyone who pays any attention to current trends in wireless security at all should know that MAC filtering is less effective...

    Posted by Chad Perrin | January 22, 2008, 1:28 PM PST | Latest comment by Doug Vitale

  • 1

    Infographic: Online threats 101

    This infographic is a nice educational tool if you do basic user training as either part of your job or if you are often teaching beginners about computer safety.

    Posted by Selena Frye | June 7, 2012, 6:00 AM PDT

  • 66

    Use PuTTY as a secure proxy on Windows

    Last month, I wrote about using OpenSSH as a secure Web proxy on UNIX and Linux systems. This time, I'll show you how to do the same thing on Microsoft Windows using PuTTY -- probably the single...

    Posted by Chad Perrin | March 10, 2008, 4:30 PM PDT | Latest comment by nil_online

  • 1

    Infographic: Generation gap in computer security

    This infographic shows a generation gap in the attitudes of Gen Y users and Baby Boomers in their attitudes toward computer security.

    Posted by Selena Frye | June 26, 2012, 12:26 PM PDT

  • 60

    Dropbox: Convenient? Absolutely, but is it secure?

    A potential security lapse and possibly misleading statements are plaguing Dropbox, a hugely popular file-syncing app. What are the issues and is concern justified?

    Posted by Michael Kassner | June 13, 2011, 8:03 AM PDT | Latest comment by nxb3942

  • 74

    10 services to turn off in MS Windows XP

    As I pointed out on 19 October, in point number four of the article 10 security tips for all general-purposes OSes, an important step in the process of securing your system is to shut down...

    Posted by Chad Perrin | November 7, 2007, 10:02 AM PST | Latest comment by JonB2008

  • 0

    Use MS Security Compliance Manager to secure your Windows environment

    Alfonso Barreiro recommends Microsoft's Security Compliance Manager tool to help you create and maintain security baselines using Group Policy Objects.

    Posted by Alfonso Barreiro | June 25, 2012, 11:14 AM PDT

  • 99

    Hacker vs. cracker

    The word "hacker" gets used in a pejorative sense by journalists an awful lot. Some people think this is perfectly reasonable; others find it offensive, and recommend an alternative term for that...

    Posted by Chad Perrin | April 17, 2009, 1:20 PM PDT | Latest comment by Saurondor

  • 4

    Prevent recurring problems with root cause analysis

    In this series, we'll step through an easy root cause analysis process that requires no special training -- just a little effort and a lot of common sense.

    Posted by Tom Olzak | September 10, 2008, 4:00 AM PDT | Latest comment by credible58

  • 4

    Security vs. convenience: The case of case-insensitive passwords

    Patrick Lambert considers the recent decision by Blizzard to ignore case-sensitivity in user passwords from the perspective of the security vs. convenience debate.

    Posted by Patrick Lambert | June 5, 2012, 6:00 AM PDT | Latest comment by kentonr@...

  • 1

    Back to basics: Defending against phishing attacks

    Alfonso Barreiro notes that phishing attempts are still duping unwary targets. Here are some tips to share with your users to help protect your organization from compromise.

    Posted by Alfonso Barreiro | June 12, 2012, 6:00 AM PDT

  • 3

    Infographic: Is free Wi-Fi a friend or foe?

    This infographic provides some current usage numbers for Wi-Fi connected devices and offers basic tips and security precautions for those using public Wi-Fi networks.

    Posted by Selena Frye | May 30, 2012, 6:00 AM PDT | Latest comment by yodi.collins

  • 2

    What you should know about Windows 8 security features

    Alfonso Barreiro takes a detailed look at all the security features available in each edition of Windows 8, including what's brand new, improved, and carried over from previous versions.

    Posted by Alfonso Barreiro | May 22, 2012, 6:00 AM PDT | Latest comment by stubucks