Roger A. Grimes

Columnist

Roger A. Grimes is an InfoWorld contributing editor. Roger holds more than 40 computer certifications and has authored eight books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He currently runs eight honeypots to track hacker and malware behavior and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for Microsoft as a principal security architect.

A quick fix for stupid password reset questions

Seagate NAS hack should scare us all

Seagate NAS hack should scare us all

An under-the-radar news story proves that computers are far from the only devices prey to attack

Afraid of online hacks? Worry more about your phone

Afraid of online hacks? Worry more about your phone

An entire industry is devoted to protecting you online. It's about time we took phone scams as seriously

Voting machines are still too easy to hack

Voting machines are still too easy to hack

Worried about a 'rigged' election? You should be, but the risk lies in outdated technology and untrained bureaucrats, not voter fraud

Essential certifications for smart security pros

Essential certifications for smart security pros

Expand your skills, know-how, and career horizons with these highly respected security certs

Hollywood's 5 biggest hacking myths

Hollywood's 5 biggest hacking myths

Press Enter and watch the magic happen -- as if! Why does Hollywood's portrayal of hacking have to be so far off the mark?

Paranoia rules! 5 types of imaginary malware

Paranoia rules! 5 types of imaginary malware

Computer security attracts all sorts of skeptical personalities. A little doubt is healthy; a lot may mean you should seek professional help

6 security advances worth celebrating

6 security advances worth celebrating

In a world besieged by criminal hackers, we'll take all the good security news we can get. Here are six advances that can improve your defenses

SHA-2 shortcut: Easy certificate management for Linux

SHA-2 shortcut: Easy certificate management for Linux

Due to the rollover from SHA-1 to SHA-2, a ton of digital certificate work is needed. With CertAccord, it's as easy to do on Linux as on Windows

Profiles in cryptographic courage

Profiles in cryptographic courage

Security problems sometimes seem depressingly intractable. The cure? Read about the fascinating people responsible for seminal breakthroughs

3 ways websites get pwned -- and threaten you

3 ways websites get pwned -- and threaten you

Hackers are maliciously manipulating both sides of the web experience, but a little due diligence goes a long way to thwart them

4 basic security facts everyone should know

4 basic security facts everyone should know

The bad news: It's you against an army of cybercriminals around the world. The good news: A little knowledge can provide an effective defense

Load More