The focus of this category is online and computer security, which involves the protection of system data and other resources from the clutches of those who are not authorized to have or see the data. Such security measures include anti-virus and anti-spyware software, firewalls, intrusion detection systems, and virtual private networks.
Categories
Spyware & Adware |
Regular Blogs
A software architect shares his knowledge and insight about distributed systems and security as well as software in general.
http://1raindrop.typepad.com/
Provides detailed discussions about security, fraud and privacy including hacking and phishing.
http://dutcherstiles.blogspot.com/
A Johns Hopkins University professor of computer science whose primary research interest is the security of electronic voting is also a cofounder of a computer security consulting firm. In his spare time, he keeps this blog current.
http://avi-rubin.blogspot.com/
Dyman & Associates Risk Management Projects
Discussions on this weblog surround cyber security and risk management and are quite detailed in nature. Some of the topics of posts here include federal cyber security guidelines for American infrastructure providers and Facebook users as targets.
http://dymanassociates.livejournal.com/
Presents the most current news, tips, and insights about security and safety.
http://googleonlinesecurity.blogspot.com/
A blog and weekly podcast on information security which includes tips & tricks, reviews, industry news & events all brought to you by a former NSA Network Engineer.
http://www.infosecpodcast.com
F-Secure, a company which provides anti-virus and security, keeps this blog current. Topics include individual viruses, news which is about security, and identity theft.
http://www.f-secure.com/weblog/
This weblog is about online security of all sorts, including the blogger's areas of expertise: smart cards, chip authentication, security and risk assessment, and advanced authentication for chip specification.
http://petergullberg.wordpress.com/
Tracks malware, one of the worst problems of the Internet era. Learn how to avoid phisihing attacks, cut down on spam and malware through this blog. The website also keeps track of the latest security weaknesses ("exploits") in computer software.
http://blog.trendmicro.com/