Analysis: Thanks to Pretty Good Privacy encryption creator Phil Zimmermann for software that undermines suppression -- and for keeping me out of jail.
Analysis: Firefox, Internet Explorer, and Safari browsers don't fare as well.
Analysis: Computer espionage headlines abound, but you can fight back by following a few simple steps.
A modest proposal to make the Net more secure uses existing standards for Web services, security, identity, and authentication.
The only way to truly come clean: Back up your data, format your hard drive, and begin again
The newest Windows browser leads the pack in anti-phishing filtering and pop-up blocking, and works on a variety of platforms.
Internet Explorer has lost market share to worthy competitors over the last few years, but it's still dominant enough that it remains the browser to attack.
Mozilla's popular Web browser is long on user-friendly features and third-party extensions, and short on granular security controls
Google's new open source Web browser is a frustrating blend of excellent security model and questionable decisions.
In 2009 computer crimes will get worse, according to security adviser columnist Roger Grimes.
When McColo was taken down, worldwide spam volume dropped by 75 percent. Roger A. Grimes looks at how the spam-loving ISP was taken down, and lessons we can learn from this rare anti-spam success.
The most commonly used protocol for securing wireless networks has been cracked. How much risk does this development mean for your network? You shouldn't lose any sleep over the hack -- but you shouldn't ignore it, either.
Red Condor provides good spam blocking, but can you live with the minimal configuration?
Five products strive to trap drive-by downloads and other threats in a virtual Web browsing space, with mixed results.
The Adobe Flash Clipboard Hijack and the XP Antivirus exploit throw "state-of-the-art" Web security clients for a loop.