Articles By Roger A. Grimes

Honeypot software simplifies intrusion detection

Intrusion detection is a complex business. Whether you deploy an intrusion detection system (IDS), or you collect and analyze the computer and device logs on your network, identifying malicious traffic in a sea

Published on: November 18th, 2010 Roger A. Grimes

How to fight the malware pandemic

If malware were biological, the world would be in the grip of the worst pandemic in history. In 2009, more than 25 million different unique malware programs were identified, more than all the

Published on: August 10th, 2010 Roger A. Grimes

Don’t mess with malware – a clean wipe of your system is the best response

Most people I meet who have found malware on their computer regale me with a cat-and-mouse story of the fight and the painstaking steps they had to take to remove it. When it

Published on: March 10th, 2009 Roger A. Grimes

Browser plug-ins get bad rap as not all pose security risks

In my recent series of articles on Web browser security (see the special report), I indicated that browser add-ons (or plug-ins) could bring additional risk to a browser. One browser add-on provider, Giorgio

Published on: February 10th, 2009 Roger A. Grimes

IE8 proves its mettle with impressive security features

Although Microsoft's Internet Explorer (IE) Web browser has lost market share to worthy competitors over the last few years, it is still the market leader and remains the browser to beat. IE has

Published on: January 30th, 2009 Roger A. Grimes

One man’s 12-year battle against malware

I first started fighting computer malware back in 1987. Back then, it was a lot easier. We didn't have the Internet (in widespread use). Viruses and Trojans were limited to an even dozen

Published on: January 26th, 2009 Roger A. Grimes

Protecting end-users from themselves

The recent OS X-specific Mac Trojan ignited many hot conversations on various security mailing lists last week. Supposedly, the excitement regarding the Trojan is that it is the first time profit-seeking criminals have

Published on: November 13th, 2007 Roger A. Grimes

User see, user do

The recent OS X-specific Mac Trojan ignited many hot conversations on various security mailing lists last week. Supposedly, the excitement regarding the Trojan is that it is the first time profit-seeking criminals have

Published on: November 12th, 2007 Roger A. Grimes