Dial 211 for cyberattacks
US consumers and businesses in a few states can now dial 211 for help when victimized by cybercrime. What's needed is a nationwide rollout.
Roger A. Grimes | 31 Oct | Read more
US consumers and businesses in a few states can now dial 211 for help when victimized by cybercrime. What's needed is a nationwide rollout.
Roger A. Grimes | 31 Oct | Read more
These eight patching best practices mistakes get in the way of effective risk mitigation. Here's how to fix them.
Roger A. Grimes | 03 Oct | Read more
Breach Clarity ranks the risk of stolen or exposed personal data. It's a much needed work in progress.
Roger A. Grimes | 20 Jun | Read more
Use this two-part test to convince romance scam victims that their “true love” is a fraud.
Roger A. Grimes | 13 Dec | Read more
This veteran security pro feels more secure now that he's using a password manager, but there are still risks.
Roger A. Grimes | 06 Dec | Read more
If you get this digital certificate error using Chrome, then Google now considers that website's Symantec PKI certificate untrustworthy.
Roger A. Grimes | 22 Nov | Read more
Follow Microsoft's basic security guidelines for Remote Desktop Protocol and you'll shut down hackers who try to exploit it.
Roger A. Grimes | 07 Nov | Read more
Bloomberg's China spy chip story underscores weaknesses in computer supply chain security. The solution needs to be global.
Roger A. Grimes | 16 Oct | Read more
We need a system for data breaches that rates the real risk associated with the compromised data.
Roger A. Grimes | 13 Sep | Read more
Traditional firewall software no longer provides meaningful security, but the latest generation now offers both client-side and network protection.
Roger A. Grimes | 05 Sep | Read more
Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.
Roger A. Grimes | 15 Aug | Read more
Quantum computers could crack public-key encryption in as little as five years. Here's how to prepare for the post-quantum world.
Roger A. Grimes | 08 Aug | Read more
Quantum computers advance mean we might have only a few years before they can break all public key encryption. The day when every secret is known is near.
Roger A. Grimes | 02 Aug | Read more
Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit
Roger A. Grimes | 24 Jul | Read more
Online account fraud is a big, automated business. NuData Security looks at hundreds of data points to identify malicious login attempts.
Roger A. Grimes | 17 Jul | Read more