Sign in / up
The Register

Topics

Security

Security

All SecurityCyber-crimePatchesResearchCSO
Off-Prem

Off-Prem

All Off-PremEdge + IoTChannelPaaS + IaaSSaaS
On-Prem

On-Prem

All On-PremSystemsStorageNetworksHPCPersonal TechCxOPublic Sector
Software

Software

All SoftwareAI + MLApplicationsDatabasesDevOpsOSesVirtualization
Offbeat

Offbeat

All OffbeatDebatesColumnistsScienceGeek's GuideBOFHLegalBootnotesSite NewsAbout Us
Special Features

Special Features

All Special Features Nvidia GTC Agentic AI The Future of the Datacenter AWS Re:invent SC25 Supercomputing Month

Vendor Voice

Vendor Voice

Vendor Voice

All Vendor Voice AWS Capgemini Money Movement Hub ZTE Nutanix: Scale Kubernetes. Not Chaos. Amazon Web Services (AWS) New Horizon in Cloud Computing
Resources

Resources

Whitepapers Webinars & Events Newsletters

Scott Granneman

Security analogies: the key to educating laymen

Comment Explaining tech concepts to the masses
Security31 May 2007 | 2

The Fear biz is the computer security biz

Comment Lies, damn lies...
OSes11 Feb 2007 |

Security, privacy and DRM: My wishes for 2007

Scott Granneman sets out his stall
Channel13 Jan 2007 |

A hard lesson in privacy

Comment The importance of keeping personal matters personal
Security28 Nov 2006 |

Surprises inside Microsoft Vista's EULA

Analysis Not a thing of beauty
Channel29 Oct 2006 |

LinuxWorld, virtually speaking

The future's in virtualisation
Channel19 Aug 2006 |

CafePress for wall art?

Review ImageKind beta hits the web
Bootnotes01 Aug 2006 |

Moore's the modern Weegee

'Credit hole by HD Moore the famous'
Security26 Jul 2006 |

WiMAX in the UK. Here's why it won't fly

Comment Spectrum is rare
Networks03 Jul 2006 |

MySpace, a place without MyParents

Comment Parental supervision - the real issue
Legal03 Jul 2006 |

Why phishing catches punters

Comment Hook, line and sinker
Security07 Jun 2006 |

Innovative ways to fool people

Comment 'Your data or your life'
Channel05 May 2006 |

Virtualization for security

Vista of fluffy white clouds
Channel13 Apr 2006 |

As Emperor of Security, I hereby decree...

Comment Benovolence is my middle name
Security28 Mar 2006 |

The big DRM mistake

Comment It just doesn't make sense...
Legal03 Mar 2006 |

Wi-Fi for dummies

Securing network access while on the run
Channel10 Feb 2006 |

Users inundated with pop-ups

Configure me out
Channel13 Dec 2005 |

Sony fiasco: More questions than answers

Rootkit rumpus rumbles on
Channel23 Nov 2005 |

Beware eBay bearing Skype

Comment Ominous security omens
Channel23 Sep 2005 |

On blocking Chinese IP addresses

Comment The Great Firewall of China
Channel31 Aug 2005 |

Greasemonkey wobbles but it doesn't fall down

Analysis Security issues, yes, but...
Security09 Aug 2005 |

Microsoft and Claria: together at last?

Comment The sound of spleen venting
Security15 Jul 2005 |

Your fingerprints are everywhere

Comment The library, Disneyland, Lady Liberty...
Channel16 Jun 2005 |

Live CD paradise

Important security tools
Channel07 May 2005 |

Privacy from the trenches

How the public are inured to data breaches
Channel20 Apr 2005 |

How shall I own your mobile phone today?

Comment Bluesnarfing, bluejacking, bluebugging
Security25 Mar 2005 |

Google AutoLink: enemy of the people?

Don't be evil ... mostly
Security03 Mar 2005 |

Beware the unexpected attack vector

Threats from all sides
Security10 Feb 2005 |

Exploring the law of unintended consequences

Column DRM and asbestos curtains meet the Shah of Iran
Security21 Jan 2005 |

Trojan Horse Christmas

Column That shiny new Windows PC
Security31 Dec 2004 |

Online extortion works

Opinion Pay up, or your server gets it
Security14 Dec 2004 |

Stunned pundit agrees with Gates over passwords

Biometrics and smartcards are the future
Security22 Nov 2004 |

Phishing for dummies: hook, line and sinker

Too tech-savvy to get caught? Think again
Security02 Nov 2004 |

Fighting the army of byte-eating zombies

Internet Security Threat Report
Security08 Oct 2004 |

Academia battles forces of IT anarchy

Unending security headaches
Security16 Sep 2004 |

Infected in 20 minutes

Opinion Stepping in and taking charge
Personal Tech19 Aug 2004 |

The battle for email privacy

You've got company
Security30 Jul 2004 |

Would you trade your password for chocolate?

If yes, click here sharpish
Security28 May 2004 |

Working up an appetite for destruction

Data disposal without tears
Storage15 Apr 2004 |

Security patches via modem? Forget it!

Opinion 11.3MB at 56kbps - you work it out
Security26 Mar 2004 |

The perils of Googling

A tool for good and evil
Security10 Mar 2004 |

A visit from the FBI

We come in Peace
Security28 Jan 2004 |

Electronic Voting Debacle

Opinion American democracy at stake, no less
Security18 Nov 2003 |

Joe Average User Is In Trouble

Opinion Where's my security blanket?
Security27 Oct 2003 |

Linux vs. Windows Viruses

Opinion Let's go to work
Security06 Oct 2003 |

RFID Chips Are Here

Your privacy is at stake
Security27 Jun 2003 |

The Register icon Biting the hand that feeds IT

About Us

  • Contact us
  • Advertise with us
  • Who we are

Our Websites

  • The Next Platform
  • DevClass
  • Blocks and Files

Your Privacy

  • Cookies Policy
  • Privacy Policy
  • Ts & Cs
  • Do not sell my personal information
Situation Publishing

Copyright. All rights reserved © 1998–2025