Roger A. Grimes

Columnist

Roger A. Grimes is an InfoWorld contributing editor. Roger holds more than 40 computer certifications and has authored eight books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He currently runs eight honeypots to track hacker and malware behavior and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for Microsoft as a principal security architect.

Paranoia rules! 5 types of imaginary malware

6 security advances worth celebrating

6 security advances worth celebrating

In a world besieged by criminal hackers, we'll take all the good security news we can get. Here are six advances that can improve your defenses

SHA-2 shortcut: Easy certificate management for Linux

SHA-2 shortcut: Easy certificate management for Linux

Due to the rollover from SHA-1 to SHA-2, a ton of digital certificate work is needed. With CertAccord, it's as easy to do on Linux as on Windows

Profiles in cryptographic courage

Profiles in cryptographic courage

Security problems sometimes seem depressingly intractable. The cure? Read about the fascinating people responsible for seminal breakthroughs

3 ways websites get pwned -- and threaten you

3 ways websites get pwned -- and threaten you

Hackers are maliciously manipulating both sides of the web experience, but a little due diligence goes a long way to thwart them

4 basic security facts everyone should know

4 basic security facts everyone should know

The bad news: It's you against an army of cybercriminals around the world. The good news: A little knowledge can provide an effective defense

Spotted! 9 signs of a malicious download

Spotted! 9 signs of a malicious download

You've heard the advice: Don't download or run software you're unsure of. Here's a quick review of the warning signs to stop you from taking unnecessary risks

11 signs your kid is hacking -- and what to do about it

11 signs your kid is hacking -- and what to do about it

Here’s how to find out if your child is involved in malicious online activity -- before the authorities do

11 essential data security tips for travelers

11 essential data security tips for travelers

Your data and privacy are never more at risk than when you travel; here's how to protect them

Not so fast: Some security defaults shouldn't change

Not so fast: Some security defaults shouldn't change

Contrary to popular belief, changing default settings doesn't always improve security -- and often backfires

Interview with a Craigslist scammer

Interview with a Craigslist scammer

Ever wondered what motivates people who swindle others on Craigslist? Read on for a fascinating look into the mind of a small-time criminal

Big data will fix internet security ... eventually

Big data will fix internet security ... eventually

Security analytics have been with us for a while, but with the latest tech, it's much easier to detect malicious attacks

Load More