Roger A. GrimesColumnist, InfoWorld

Roger A. Grimes is an InfoWorld contributing editor. Roger holds over 40 computer certifications and has authored eight books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He currently runs eight honeypots to track hacker and malware behavior and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for Microsoft as a principal security architect.

7 top tactics of hack attacks

Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

Inside a state-sponsored U.S. cyber warrior's secret universe

A cyber warrior under contract with the U.S. government provides some extraordinary glimpses into his background, training, the hardware he uses, and the boundaries of his mission.

10 Crazy IT Security Tricks That Actually Work

IT security threats are constantly evolving. It's time for IT security pros to get ingenious.

After Infection: New Schemes to Restore Your Systems

Antimalware software can detect infections, but fixing those problems still means wiping and rebuilding your hardware.

Typosquatting Hacks: Finger Slips Sink Ships

By setting up bogus domains, cyber criminals can intercept messages containing sensitive personal and proprietary information.

No Contest: Mac vs. Windows Security

Cloud computing, mobile technology, and Web 2.0 have altered the debate on whether Microsoft or Apple offers superior security

The Cybercrime Tide is Turning

Cyber criminals are facing more tech-savvy law-enforcement agents and harsher sentences.

A Mouse Can Infect Your Network

Analysis: "Trojan mouse" was just a hint -- almost any hardware device that can be plugged into a computer can compromise its security

Mac Malware Scare: 7 Questions

A few answers help clarify what the MacDefender scareware plague really means for Mac users and administrators

Intrusion Detection Honeypots Simplify Network Security

Low-cost, low-fuss honeypots are highly effective early-warning systems against external attacks and insider threats: A look at KFSensor, HoneyPoint, and Honeyd.

Expert's Guide to Windows 7 Security

How to configure Microsoft's operating system to beat malware and keep data secure.

on techhive.com

Fighting Today's Malware

How bad is it? Worse than you think. Here's what the new breed of malware looks like -- and what you can do to stop it

The Ultimate Guide to Windows 7 Security

Learn how to put AppLocker, BitLocker to Go, security accounts, and other key Windows 7 security improvements to good use

on techhive.com

Twitter Hack: The Danger of Chained Apps

Analysis: Linking apps to other software and platforms is inevitable -- but it opens a security hole.

Can Google Release a Perfectly Secure OS? Nope.

Analysis: There's no such thing as a bulletproof OS, especially one that people will actually want to use.

on techhive.com