theDocumentId => 1128999 A Security Primer for the Average Joe

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:00 AM
Connect Directly

A Security Primer for the Average Joe

'Security Mike' wants to help Grandma and the kids lock down their PCs and get rid of their commercial AV software

Let's face it: We're all probably going to fall victim to identity thieves eventually (if you haven't already). At least security pros know the signs, and how to protecting themselves. But what about your next-door neighbor, whose credit-card number is already circulating in the black market while his bot-infected PC spews spam?

Security Mike wants to help your neighbor -- and the kids, too.

That would be Mike Rothman, principal of Security Incite, and famed blogger (and ranter), who has just published a new book called Security Mike’s Guide to Internet Security ($37) that spells out the real risks -- and tips for protecting yourself against them -- in non-geekspeak.

Oh, yeah: Security Mike also tells them how to safely uninstall Symantec and McAfee antivirus software and replace it with free utilities that he says do a better job of securing client machines.

"It makes me sick to think about how much money the security software companies make -- and their customers are still not protected. Something has to be done. Someone has to tell the truth," he says in the introduction to his new book, which includes an update service for $20 a year.

Security Mike teaches consumers how to secure home networks and devices, set up their apps securely, get free security software, and recover from an attack. "Listen, I don’t have a Chicken Little suit, and I’m not here to tell you about how dangerous the world is. You wouldn’t believe me even if I told you how bad it is," Rothman says.

But wait, there's more: If you purchase the guide from Security Mike before October 15, it's $27. He's also offering a bonus guide on how to talk to your kids about Internet safety.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-07-23
All versions of package gitlogplus are vulnerable to Command Injection via the main functionality, as options attributes are appended to the command to be executed without sanitization.
PUBLISHED: 2021-07-23
A stored cross site scripting (XSS) vulnerability in the /sys/attachment/uploaderServlet component of Landray EKP V12.0.9.R.20160325 allows attackers to execute arbitrary web scripts or HTML via a crafted SVG, SHTML, or MHT file.
PUBLISHED: 2021-07-23
Arbitrary file upload vulnerability in Victor CMS v 1.0 allows attackers to execute arbitrary code via the file upload to \CMSsite-master\admin\includes\admin_add_post.php.
PUBLISHED: 2021-07-23
Cross-site scripting (XSS) vulnerability in SourceCodester E-Commerce Website v 1.0 allows remote attackers to inject arbitrary web script or HTM via the subject field to feedback_process.php.
PUBLISHED: 2021-07-23
Arbitrary file upload vulnerability in SourceCodester Responsive Ordering System v 1.0 allows attackers to execute arbitrary code via the file upload to Product_model.php.