Security

IT Security top 7: Best of 2010

There were lots of tips, controversies, and interesting developments in IT Security this year. The following posts rose to the top based on pageviews, discussion, and community votes.

There were lots of tips, controversies, and interesting developments in IT Security this year. The following posts rose to the top based on pageviews, discussion, and community votes.

#1 Rescue CDs: Tips for fighting malware

Michael Kassner offered tips on the best ways to use Rescue CDs to combat malware and shared some of the mistakes to be avoided. Read the original post.

#2 Hackers and crackers: a lesson in etymology and clear communication

Chad Perrin kicked off another hotly contested debate on terminology: The term "hacker" has a meaning older and more respectable than its common usage in mainstream journalism. Familiarity with that history and its implications can help you make sure your audience understands your meaning when you use the term. Read the original post.

#3 Stealing Social Security Numbers is not identity theft?

Michael Kassner looked at the recent court ruling that declared stealing SSNs wasn't necessarily a crime and wondered about the consequences. Read the original post.

#4 Is there hope for antivirus programs?

Michael Kassner looked at some of the problematic issues with antivirus software and considered what steps could be taken to fix it. Read the original post.

#5 Why you should never trust Facebook

Mark Zuckerberg might be Time's Person of the Year, but on security issues, Chad Perrin knocked his brainchild down a few pegs, and many in the TechRepublic community agreed. Read the original post.

#6 The next front in the cookie wars: Fighting the Evercookie

Michael Kassner did a deep dive on the evolution of the cookie and described the latest developments in the cookie war's measures and countermeasures. Read the original post.

#7 The many eyes that matter for security are the friendly eyes

Nothing stirred up the community like Chad Perrin's post about the "many eyes" approach to security. All hands were on deck for the discussion that ensued. Read the original post.

About

Selena has been at TechRepublic since 2002. She is currently a Senior Editor with a background in technical writing, editing, and research. She edits Data Center, Linux and Open Source, Apple in the Enterprise, The Enterprise Cloud, Web Designer, and...

4 comments
reisen55
reisen55

In the form of Pvt. Bradley Manning. You can have the best security in the world, eye scanners, finger prints, door lock and security keys, etc. And yet all Manning had to do was carry a thumb drive (never should have been permitted in the room) and, well, copy stuff. Easy. And the worst threat of all.

Michael Kassner
Michael Kassner

Should not be a part of a .gov environment. A restore image should be network-based and only reachable by top-end admins.

Neon Samurai
Neon Samurai

Rumour is that Pvt Manning carried a blank CD not a flashdrive. He labeled it as a copied music cd, used the "secure" terminals own CD writer to dump the data and walked out the door. No one thought twice because it's more important for officers to have there copied tunes than to place proper controls on removable media. Going back further and unrelated to the Manning case, the US Mil got stung by a freaking autorun.inf on a flashdrive. It's currently considered the worst info sec breach the Military has had. An operative walked up to a computer over seas, popped in a flashdrive, waited a moment, pulled the flashdrive and went home. US Mil pwned for years before discovery. And, what the hell are they doing running an accessible Windows machine attached to a secure network in the first place?

Michael Kassner
Michael Kassner

IT security is a passion. I feel fortunate to share it with so many learned people.

Editor's Picks