This veteran security pro feels more secure now that he's using a password manager, but there are still risks.
Stories by Roger A. Grimes
Follow Microsoft's basic security guidelines for Remote Desktop Protocol and you'll shut down hackers who try to exploit it.
China has stolen US information without using secretly embedded hardware, so why would it jeopardise its massive semiconductor industry?
Traditional firewall software no longer provides meaningful security, but the latest generation now offers both client-side and network protection.
Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.
Quantum computers advance mean we might have only a few years before they can break all public key encryption. The day when every secret is known is near.
To root out persistent hackers, sometimes you have to get a little creative
The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm
Like it or not, your PC is susceptible to malware. These videos will teach you how to locate the bad stuff, then remove it from your system
From secure chips to anonymity services, here’s how to stay safe and private on the web
Here’s how to find out if your child is involved in malicious online activity -- before the authorities do
You're far more vulnerable to hackers than you think. Here are the secrets to staying secure
How to scan every running process on your system for malware in seconds, without installing antimalware software
Forget Nigerian princes -- today’s spearphishing is sophisticated business, fooling even the most seasoned security pros
The default state of Internet privacy is a travesty. But if you're willing to work hard, you can experience the next best thing to absolute Internet anonymity