Roger A. Grimes

Columnist

Roger A. Grimes is a contributing editor. Roger holds more than 40 computer certifications and has authored ten books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He specializes in protecting host computers from hackers and malware, and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for KnowBe4 as the Data-Driven Defense Evangelist and is the author of Cryptography Apocalypse.


8 types of malware and how to recognise them

This concise malware bestiary will help you get your malware terms right when you hang out with geeks - with basic advice for finding and removing malware when you've been hit

Foiled! 15 tricks to hold off the hackers

Foiled! 15 tricks to hold off the hackers

To root out persistent hackers, sometimes you have to get a little creative

Nowhere to hide: 9 new hacks coming to get you

Nowhere to hide: 9 new hacks coming to get you

The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm

Sniff out and kick out Windows malware for free

Sniff out and kick out Windows malware for free

Like it or not, your PC is susceptible to malware. These videos will teach you how to locate the bad stuff, then remove it from your system

17 essential tools to protect your online identity, privacy

17 essential tools to protect your online identity, privacy

From secure chips to anonymity services, here’s how to stay safe and private on the web

Essential certifications for smart security pros

Essential certifications for smart security pros

Expand your skills, know-how, and career horizons with these highly respected security certs

11 signs your kid is hacking -- and what to do about it

11 signs your kid is hacking -- and what to do about it

Here’s how to find out if your child is involved in malicious online activity -- before the authorities do

Effective IT security habits of highly secure companies

Effective IT security habits of highly secure companies

You're far more vulnerable to hackers than you think. Here are the secrets to staying secure

The 10 Windows group policy settings you need to get right

The 10 Windows group policy settings you need to get right

Configure these 10 group policy settings carefully, and enjoy better Windows security across the office

A free, almost foolproof way to check for malware

A free, almost foolproof way to check for malware

How to scan every running process on your system for malware in seconds, without installing antimalware software

10 reasons why phishing attacks are nastier than ever

10 reasons why phishing attacks are nastier than ever

Forget Nigerian princes -- today’s spearphishing is sophisticated business, fooling even the most seasoned security pros

Load More