IT Security

Security bloggers help keep you up to date on how to protect your network through news, updates, advice, and opinions on how you can stay ahead of hackers.

  • Mike Mullins // April 20, 2008, 11:00 PM PST

    Prevent identity theft by avoiding these seven common mistakes

    Identity theft may be on the rise, but you don't have to make it easy for thieves -- take steps to protect the personally identifiable information (PII) of your employees and clients. You can start by avoiding these seven mistakes.


  • Paul Mah // April 20, 2008, 5:01 PM PST

    Ad-funded software: A potential security vector?

    Last week brought news that Microsoft has quietly released an ad-funded version of Microsoft Works. Called Works "SE" -- which stands for "Sponsored Edition" -- the software is available free to PC makers, though they don't get any cut out of the ad revenue. How do you deal with ad software at the moment?


  • Paul Mah // April 21, 2008, 4:59 PM PST

    Security news roundup: Updates available for Firefox and Safari

    Here’s a collection of recent security vulnerabilities, alerts, and news, which covers news that Microsoft will not prosecute ethical hackers probing its Web site for security holes, an exploitable flaw in the DivX Player involving subtitle files, and minor updates available for both Firefox and Safari Web browsers.


  • Chad Perrin // March 22, 2008, 7:04 AM PST

    The Big Brother Awards

    In Montreal, Canada, at the Computers, Freedom, and Privacy conference in May 2007, Privacy International presented the first International Big Brother Awards. The "winners" of the Big Brother Awards are, in the words of Privacy International, "the government and private sector organisations which have done the most to threaten personal privacy". Read on to find out who Privacy International dubbed the world's worst invaders of privacy in each of five categories.


  • Paul Mah // March 23, 2008, 4:59 PM PST

    Security news roundup: Spybot Search & Destroy scans for rootkits, multiple patches from Apple

    Here’s a collection of recent security vulnerabilities and alerts, which covers news that Spybot Search & Destroy now comes with the ability to detect rootkits, a re-release of a patch that affects Microsoft Office Excel 2003 SP2 and SP3, a slew of patches from Apple, and a warning from Microsoft that Word is a possible vector of a new vulnerability.


  • Chad Perrin // April 11, 2008, 6:07 AM PST

    Use sSMTP to send e-mail simply and securely

    Computer users like me, who prefer daily e-mail dealings to be quick, simple, and devoid of distractions, tend to use a collection of small, separate tools to fulfill each of the critical functions of dealing with e-mail. This article addresses sending e-mail with a simple SMTP client called sSMTP on Unix and Linux systems, including how to use it for secure encrypted connections to your outgoing mail server.


  • Paul Mah // April 14, 2008, 2:55 PM PST

    Security news roundup: Oracle announces bonanza of patches for 41 holes, older WordPress blog succumb en masse

    Here’s a collection of recent security vulnerabilities, alerts, and news, which covers the release of patches by Oracle for 41 security vulnerabilities, a new patched version of rsync, a warning that older insecure WordPress blogs are becoming a vector for the propagation of spam, and news that some spam filtering services are now throtting Gmail.


  • Paul Mah // March 12, 2008, 3:15 AM PST

    Secure your data on the go

    To secure your data on the go, you might want to take a look at the IronKey USB flash drive.


  • Mike Mullins // March 12, 2008, 11:54 PM PST

    Disable NetBIOS and SMB to protect public Web servers

    As the connection between your internal network and the rest of the world, public Web servers always deserve an extra measure of protection. Find out one way to lock down these servers.


  • Chad Perrin // March 13, 2008, 8:03 AM PST

    Ensure basic Web site security with this checklist

    While I normally advocate a principles-based approach to maintaining system security, and deplore the typical "best practices" checklist approach, that does not mean that security checklists are without value. Employing a security procedures checklist is only the first step toward securing a resource, a means of aiding your memory before you apply your critical thinking skills and imagination to the problem of improving on the checklist in each individual case. Sometimes, a checklist can be useful in affecting workplace security policies as well.


  • Erik Eckel // April 27, 2010, 7:14 AM PST

    Improve malware removal routines with the help of this checklist

    Eliminating malware requires a systematic process with no missed steps. This checklist will make it easier to do an effective, thorough job.


  • Chad Perrin // April 26, 2010, 1:00 AM PST

    Does the Chrome OS LiveCD threaten your installed OS?

    At least one person has experienced a problem with Google's Chrome OS LiveCD corrupting a partition table on his computer.


  • Tom Olzak // May 3, 2010, 1:30 AM PST

    Extend risk boundaries to the cloud

    The question is not whether you will integrate cloud services, but how well you will manage the associated risk. Tom Olzak outlines a practical approach to risk management.


  • Chad Perrin // May 3, 2010, 2:00 AM PST

    A simple email filter: getlessmail

    TechRepublic writer Sterling Camden created a configurable email spam filter of his own. Here are the details on how you can get it and configure it for your own needs.


  • Tom Olzak // June 11, 2010, 2:53 AM PST

    Norton Online Backup enables anywhere access and safe sharing

    Norton Online Backup is part of Symantec's efforts to both protect your data and allow you to access it anywhere, anytime.