Free Newsletters :

More articles by Kenneth van Wyk

Windows 7 vs. Snow Leopard: Which is More Secure?
By Kenneth van Wyk |  Article Published February 17, 2010
Windows 7 represents an advance in Microsoft security, while Snow Leopard enjoys Apple’s traditional security advantage. A security expert compares the operating systems' security on a feature by feature basis.
How to Be Safer on Twitter
By Kenneth van Wyk |  Article Published June 8, 2009
The use of encoded URL services like TinyURL is one of several security challenges facing Twitter users.
How to Make Your iPhone Secure
By Kenneth van Wyk |  Article Published May 6, 2009
Protect your iPhone from the many Wi-fi thieves who are targeting its sensitive data.
How to Use Facebook Safely
By Kenneth van Wyk |  Article Published April 13, 2009
Tips on protecting yourself and your PC as you use Facebook, Twitter and other social networking sites.
Cell Phone Security Updates: Voluntary or Involuntary?
By Kenneth van Wyk |  Article Published March 10, 2009
Should mobile carriers push out updated software to customers regardless of choice, or is it safer to have the users request the updates?
OWASP: Helping Web Developers Develop Securely
By Kenneth van Wyk |  Article Published February 3, 2009
The Open Web Application Security Project (OWASP) is a non-profit that’s aiding Web developers to avoid major security problems in coding. Plus: a Top 10 list of the most common Web security problems.
Van Wyk on the 'Top 25 Programming Errors'
By Kenneth van Wyk |  Article Published January 19, 2009
A noted security expert talks about the larger meaning of the recently released list of top programming errors.
Security Nightmare in the iPhone App Gold Rush
By Kenneth van Wyk |  Article Published January 7, 2009
Just how safe is it to download and use, say, an application that can access an Amazon account and make purchases with “one click”? (Gulp!)
Security Watch: Problems with Penetration Testing
By Kenneth van Wyk |  Article Published November 6, 2008
Security experts conduct countless “pen tests” to secure application systems, yet several problems limit their effectiveness.
When Did Security Pros Forget the User?
By Kenneth van Wyk |  Article Published October 6, 2008
It creates serious risk to require our users to know the difference between, say, WPA and WEP.
Cybersecurity Best Practice: Guilty Until Proven Innocent
By Kenneth van Wyk |  Article Published September 8, 2008
When it comes to our computers, the classic principle of “innocent until proven guilty” is simply too dangerous.
How to Prevent a Coffee Shop Wi-Fi Attack
By Kenneth van Wyk |  Article Published August 4, 2008
Logging on using your mobile device allows hackers to steal your password unless you take basic precautions.
Browser Security: IE vs. Safari vs. Firefox
By Kenneth van Wyk |  Article Published July 8, 2008
Each of the three browsers has strengths in malware protection, but it’s their weaknesses that are the most worrisome.
Why Are IT Security Pros so Bad?
By Kenneth van Wyk |  Article Published June 3, 2008
Have you heard about the security conference where the organizers inadvertently distributed a virus-infected USB stick to the attendees?
Which is More Secure, Leopard or Vista?
By Kenneth van Wyk |  Article Published May 9, 2008
A security expert revisits an earlier examination he made of the relative security of Mac Tiger and Windows XP.
Security Threat: Cross Site Request Forgery (CSRF)
By Kenneth van Wyk |  Article Published April 9, 2008
CSRF affects a huge percentage of today’s Web applications. Left unfixed, CSRF issues provide the attacker with a direct avenue of attack to your customers.
The Boeing Dreamliner "Security"
By Kenneth van Wyk |  Article Published February 5, 2008
In some situations -- like 30,000 feet in the air -- an ironclad firewall is incredibly important.
The Security Concerns of 2008: Get Ready Now
By Kenneth van Wyk |  Article Published January 8, 2008
As the new year dawns, some pressing security threats deserve more attention. For example, Cross Site Request Forgery (CSRF) is remarkably wide spread.
Google's Android vs. Apple's iPhone: Which is More Secure?
By Kenneth van Wyk |  Article Published December 2, 2007
Examining the two platforms on a feature by feature basis, the Android appears far more promising in guarding against hackers.
Lessons Learned: People in Glass Houses Shouldn't Brick Phones
By Kenneth van Wyk |  Article Published November 14, 2007
Let’s hope other mobile vendors paid close attention to Apple’s big blunder – but don’t ask me to bet on it.
Those "Helpful" Emails that Big Tech Firms Send
By Kenneth van Wyk |  Article Published October 9, 2007
They appear to be valid - though it’s hard to say. But all they do is sow confusion. What are they thinking?
Mozilla Thunderbird vs. Microsoft Outlook
By Kenneth van Wyk |  Article Published October 5, 2007
A security expert examines the relative security of the two programs on a point-by-point basis.
Mozilla Firefox vs. Internet Explorer: Which is Safer?
By Kenneth van Wyk |  Article Published September 10, 2007
Based on a point-by-point security comparison, a security expert lays out his opinion.
Will the iPhone be a Security Nightmare?
By Kenneth van Wyk |  Article Published June 12, 2007
Sure, it will be pretty. But hackers are waiting for it just as eagerly as the gadget geeks
Stakes are High for Vista Security
By Kenneth van Wyk |  Article Published April 12, 2007
As the first Vista-related security snafus emerge, all eyes are on the OS update. Will Redmond’s new Security Development Lifecycle (SDL) hold up?
Linux vs. Windows: Which is Most Secure?
By Kenneth van Wyk |  Article Published March 16, 2007
A point by point comparison of the two OSes, with a subjective conclusion as to which offers better security. Plus: some thoughts on Apple security.
Mac vs. Linux: Which is More Secure?
By Kenneth van Wyk |  Article Published March 9, 2007
A feature-by-feature comparison of the two OSes, with a highly subjective conclusion as to which is better.
Email Security and Passwords -- It's Time for Change
By Kenneth van Wyk |  Article Published January 3, 2006
Columnist Ken van Wyk says it's about time we make some progress when it comes to passwords and email security.
Separating Functions makes Desktops Safer
By Kenneth van Wyk |  Article Published December 5, 2005
Columnist Ken van Wyk says operating systems would be safer places if we did a better job separating the functions of software installation and software execution.
Developers Held Liable for Software Bugs?
By Kenneth van Wyk |  Article Published November 7, 2005
Columnist Ken van Wyk talks about the notion that developers should be held liable for bugs in their software? Is this the right road to better security?
Software Bugs: To Disclose or Not to Disclose
By Kenneth van Wyk |  Article Published October 3, 2005
Columnist Ken van Wyk takes on the question of whether to disclose software defects. What's best for the industry? Who gets hurt?
Security Tips from an Embattled Road Warrior
By Kenneth van Wyk |  Article Published September 6, 2005
eSecurityPlanet columnist Ken van Wyk tells us how to protect our data when we're on the road... whether we're using a laptop, a PDA or a smart phone.
Paranoid or Just Securing Your Data?
By Kenneth van Wyk |  Article Published May 31, 2005
eSecurityPlanet columnist Ken van Wyk says friends and family tell him he's paranoid. But who has the secure network?
How to Protect a Vanishing Perimeter?
By Kenneth van Wyk |  Article Published April 4, 2005
Columnist Ken van Wyk says the idea of a perimeter is quickly fading away. And considering it a solid border is a dangerous way of thinking. Now, it's time, he says, to focus on the software.
Digital Signatures Key to Solving Email Woes
By Kenneth van Wyk |  Article Published January 31, 2005
Some say spam and phishing schemes are killing email. Columnist Ken van Wyk says the key to saving it is to start using digital signatures.
Protecting the Enterprise from Users' New, Cool Tools
By Kenneth van Wyk |  Article Published January 3, 2005
As employees head back to the office, many of them will be coming in with new, cool gadgets in hand -- straight from Santa's sack. Could these new smart phones, PDAs and MP3 players be a security risk? Yes, they can, and here's what to do about it.
Blaming Users for Virus Chaos?
By Kenneth van Wyk |  Article Published July 6, 2004
Columnist Ken van Wyk takes a look at our tendancy to blame users for being duped -- continually -- into opening attachments and infecting the network. But are users really the only ones to blame?