Stories by Roger A. Grimes

9 steps to make you completely anonymous online

The default state of Internet privacy is a travesty. But if you're willing to work hard, you can experience the next best thing to absolute Internet anonymity

10 years on: 5 big changes to computer security

In the 10 years since Security Adviser debuted, the threats have changed -- as have the defenses, and no one can argue computer security is safer overall

Be paranoid: 10 terrifying extreme hacks

Any device with a computer chip can be hacked, but not all hacks are created equal. In fact, in a world where tens of millions of computers are compromised by malware every year and nearly every company's network is owned, truly innovative or thought-provoking hacks are few and far between.

6 hard truths security pros must learn to live with

Nearly every company in the world has thousands of vulnerabilities that hackers can easily exploit. For anyone working in IT, this is not a bombshell announcement. It's business as usual.

7 warning signs an employee has gone rogue

For all the emphasis on tools and gizmos, IT is still very much about the people who develop and use said tools and gizmos. Collaboration, mutual respect, passion for the work -- all this and more are essential to a beneficial outcome, whether your IT group is shipping code, swatting bugs, working with business users, or securing company systems.

10 security mistakes that will get you fired

Getting fired from an IT security job is a rare event, but there are certainly ways to ensure or accelerate your own unemployment. I'm not talking about garden-variety mistakes here. After all, most IT workers create or live with lots of little mistakes every day. That's the nature of complex, rewarding work.

The BadUSB exploit is deadly, but few may be hit

Nine years ago, I created what I believe was the world's first USB worm. By playing around with a USB thumb drive and placing a hidden file on it, I was able to make any computer in which the "infected" USB drive was plugged into automatically spread the file to the host computer, then back again when a new USB device was plugged in.

Security-vendor snake oil: 7 promises that don't deliver

Beware bold promises from a multibillion-dollar industry that can't prevent your IT systems from being routinely hacked

6 lessons learned about the scariest security threats

Advanced persistent threats have garnered a lot of attention of late, deservedly so. APTs are arguably the most dangerous security concern for business organizations today, given their targeted nature.

11 sure signs you've been hacked

In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.

7 sneak attacks used by today's most devious hackers

Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

11 sure signs you've been hacked

In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.

7 sneak attacks used by today's most devious hackers

Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

True tales of (mostly) white-hat hacking

Stings, penetration pwns, spy games -- it's all in a day's work along the thin gray line of IT security

14 dirty IT tricks, security pros edition

The IT security world is full of charlatans and wannabes. And all of us have been "advised" by at least one of them.