Privacy

Top 10 IT Security posts of 2011

Here are the topics that made the Top 10 list of most-read security posts in 2011.

Here is the round-up of the most-viewed posts of 2011. Michael Kassner investigated some of the thorniest security problems, reported on the newest developments in security research, and raised the red flag on privacy issues. Chad Perrin covered one of the worst security debacles of the year: Sony's Playstation Network breach.

1. Dropbox: Convenient? Absolutely, but is it secure?

A potential security lapse and possibly misleading statements are plaguing Dropbox, a hugely popular file-syncing app. What are the issues and is concern justified?

2. Forged memory fools antimalware: A new development in rootkits

Malware developers are deploying a new stealth technology. Michael Kassner interviews an expert who explains how some rootkits forge memory to outwit antimalware programs.

3. LinkedIn: Surprise changes to defaults affect your privacy

Do you know what Social Advertising is? If you use LinkedIn, you may already be part of it. Michael Kassner sorts out LinkedIn's privacy policy and suggests settings you may want to change.

4. Why isn't everyone hacked every day?

Trouble befalls only a fraction of all who ply the Internet. Why is that? Michael Kassner explores the answer with a security researcher.

5. Google hacking: It's all about the dorks

Google Search shows no bias. It will help anyone find anything, including vulnerable Internet-connected devices. You just need to know what to ask.

6. How to use Password Safe on Microsoft Windows 7

Password Safe is an excellent choice of password manager on the MS Windows platform. Using it effectively can save time, effort, and privacy.

7. Scroogle: Adding privacy to Google Search

Google Search is an amazing tool. Even so, to many, it has a dark side. Scroogle may be able to help.

8. Morto: Not your average creepy-crawly worm

As malware goes, Morto has something new to offer. It's conversant in DNS-speak. Michael Kassner describes how it works.

9. What to do about the PlayStation Network breach

The PlayStation Network security compromise is big news, but many may not know what to do about it. A brief overview of Sony's history on such matters may prove helpful.

10. Homomorphic encryption: Can it save cloud computing?

An idea of how to prevent what happened to Sony of late was introduced in 1978. It took thirty years, but homomorphic encryption is no longer a theory.

About

Selena has been at TechRepublic since 2002. She is currently a Senior Editor with a background in technical writing, editing, and research. She edits Data Center, Linux and Open Source, Apple in the Enterprise, The Enterprise Cloud, Web Designer, and...

1 comments
apotheon
apotheon

I forgot the hilarity of the images I used with the article about the Playstation Network breach. I'm glad to see two of my articles made the top-10 list this year.

Editor's Picks