temporarily removing bluemonster from all pages

35 Best Computer Security Professors of 2013

Computer Science and Electrical Engineering programs draw the best and brightest professors to colleges and universities across the world.  In 2013, stand-out educators continue to emerge in a specialized area of computer science that requires gifted researchers:  Computer Security.  As technology changes and information becomes more and more portable, security concerns arise as quickly as new smartphone apps.  The solution is to continually update the pool of information used to keep computers and data secure.  For their efforts in this area, the following professors are recognized as some of the top Computer Security educators of the year.

  1. rivest_photoRonald Rivest – As a professor of electrical engineering and computer science at MIT, Ronald L. Rivest participates in several noted academic groups associated with computer security.  He is a member of the school’s CSAIL, Computer Science and Artificial Intelligence Laboratory, and the founder of the organization’s Cryptology and Information Security Group. Professor Rivest’s computer security interests have crossed over into the private sector, where he is responsible for helping found VeriSign, RSA Data Security and other computer security interests. In 2012 Dr. Rivest received the Computer Security Hall of Fame Award for his contributions to the field.
  2. SchouCoryCorey D. Schou – Dr. Schou is a highly regarded computer security specialist at Idaho State University, where he holds titles of University Professor of Infomatics, Professor of Information Systems, and Associate Dean of the College of Business.  Dr. Schou has been recognized extensively for his contributions to the areas of computer security, including and educator of the year nod from the Federal Information Systems Security Educators Association. Corey Schou is currently the director of the National Information Assurance Training and Education Center, as well as the Simplot Decision Support Center.  His books, articles and presentations focus on computer security, privacy and ethics among other related topics.
  3.  Keith Ross – The Polytechnic Institute of NYU is home to Professor Keith Ross, who teaches computer science courses at the school.  Dr. Ross also serves as Department Head for the programs in the Computer Science and Engineering Department at the college.  The scope of his expertise is wide, including past work in privacy and data-mining, as well as general computer and systems security.  Dr. Ross received his PhD from the University of Michigan, and is a current fellow in several prestigious industry organizations, including the ACM and IEEE.  He has received several best paper recognitions for his research.
  4. kohnoTadayoshi Kohno – Dr., Kohno, known as Yoshi to friends and associates is a specialist in certain areas of computer science and engineering.  Security and privacy of information and computers is an area that Yoshi has worked in extensively during his tenure as associate professor in the University of Washington Department of Computer Science and Engineering.  After receiving his PhD from University of California – San Diego, Dr. Kohno embarked on a career recognized with several noted awards including the National Science Foundation CAREER Award and the MIT Technology Innovator Award.  The professor is currently working in areas of emerging technology like cloud security and mobile computer security.  Detecting and Defending Against Third-party Tracking on the Web is a must-read article by professor Kohno.
  5. Matt BishopMatthew Bishop – During his time as a professor of Computer science at the University of California at Davis, Matt Bishop has continued to delve deeply into computer security, an area that has interested him since the late 1970’s.  The professor has spent years looking specifically at vulnerability, calibrating accurate ways to assess our risk as computer users.  Access controls and other specialized studies have guided Dr. Bishop’s career through advanced UNIX security research into his current areas of interest, which include election processes, data sanitization, and other computer security problems.  Dr. Bishop’s book, “Computer Security:  Art and Science” shares his insights on various computer security topics.
  6. D.WagnerDavid Wagner – Professor Wagner continues to pursue research in computer security while maintaining his faculty position at University of California – Berkley.  As a professor of computer science, his research interests focus on large-scale systems and network analysis, including program security analysis and applied cryptology.  Current projects include software and smartphone computer security initiatives, and other efforts focused on emerging technology. David Wagner also participates in the University’s Security Research Group.
  7. marianne-winslettMarianne Winslett – Having served in various capacities on the faculty of the University of Illinois Urbana Campus, Dr. Winslett now works as a research professor in the University’s Department of Computer Science.  She earned her PhD in Computer Science from Stanford University, before working at Bell Labs.  She brought her interest in information security and data management to the University of Illinois in the late 1980’s and has made significant contributions to the field during her time there.  She has served on countless editorial boards and received recognition for her research, earning best paper awards on multiple occasions.
  8.  Greg White – Gregory White has carried enthusiasm for security education and research throughout an impressive career centered in the San Antonio area.  During a thirty-year career with the United States Air Force, on active duty and in the reserves, Dr. White joined the faculty at the University of Texas at San Antonio, where he entered the school’s Information Systems program.  Early in his career at the school, he helped establish the UTSA Cyber-Security Research Center, which has celebrated a ten year anniversary to-date.  The Center sponsors one of the most widely recognized cyber-security competitions for college students, designed to spark innovation and collaboration among the brightest thinkers in the computer security field.
  9. Dana Dachman-Soled – Dr. Dachman-Soled is a relatively new member of the faculty within the A. James Clark School of Engineering – Department of Electrical and Computer Engineering at the University of Maryland.  She brings her PhD from Columbia University to the classrooms and research facilities in Maryland, to continue pressing the envelope within the computer security field.  After receiving a presidential scholarship for her studies at Columbia, Dr. Dachman-Soled continued-on with a fellowship opportunity at Microsoft Research.  Her interests and areas of instruction relate to cryptographic security and other computer science disciplines.
  10. santoroGerry Santoro – Students enrolled at Penn State College of Information Sciences and Technology benefit from Dr. Santoros experience with computer security, but so do others.  Dr. Santoro maintains a page of information helping computer users remain problem-free.  Dr. Santoro has an extensive hands-on history providing security and advice for computers systems, and his courses focus on these areas.  Risk analysis and cyber-forensics are also part of the academic major that Dr. Santoro works closely with. He also holds editorial credentials with noted online journals, and has been recognized with numerous awards.
  11. nicolasNicolas Christin – Dr. Christen acts as an assistant research professor in the Department of Electrical and Computer Engineering and Cylab at Carnegie Mellon University.  He also serves as faculty advisor to several Master’s Degree Programs in computer security fields at the school. His credentials include a PhD from the university of Virginia and extensive service abroad in Japan and other locales.  Through his association with Cylab, Carnegie Mellon’s security laboratory, Dr. Christin continues to push the envelope in critical cyber-security thinking.  Current projects involve online security and crime modeling.
  12. haldermanJ. Alex Halderman – Assistant professor of computer science and electrical engineering at the University of Michigan, Dr. Halderman sometimes blogs about cyber-security issues at Freedom to Tinker.  His main areas of interest lie in computer security and privacy, particularly in software security, network security, data protection and emerging science like computer forensics.  Dr. Halderman earned his Computer science PhD from Princeton University in 2009, and continues to work on projects related to hacking, encryption, and other security issues.  His research on widespread weak keys in network devices earned him a best paper recognition from his peers.
  13. MironLivnyMiron Livny – Working as a research professor at the University of Wisconsin, in Madison, has opened interesting doors for professor Livny, who has been able to work on Department of Homeland Security projects requiring his particular expertise.  One current project works to increase the level of security on software used to control the internet and the cyber infrastructure. Livny is Director of Core Computational Technology at the Morgridge Institute for research in addition to his service at the Wisconsin Institute for Discovery.
  14. sgwetzelSusanne Wetzel – Educated in Germany, this professor brings private sector experience with Daimler Chrysler, Lucent Technologies, and RSA Laboratories to her computer security resume.  Her areas of research interest include cryptography and algorithmic theory.  Her work is conducted as an associate professor at the Stevens Institute of Technology, in the Computer Science Department.  Her publications include books, journals and countless papers presented in academic settings.  Other professional activities include work on anti-phishing research and collaboration with other computer security professionals.
  15. zhang_honggangHomggang Zhang – As an associate professor at Fordham University, Dr. Zhang works in the Department of Computer and Information Science.  While the scope of the internet and world reliance on computers grows, data management and computer security are areas that continue to require innovative solutions – Dr. Zhang helps provide them.  As well as managing the large volumes of data that computer dependence generates, modern computer security professionals are tasked with keeping it private and secure.  Social networking and mobile computing are specialized areas drawing attention, because they represent the next wave of technology requiring security.  Dr. Zhang and other forward-thinking professionals attempt to look into the future to forecast the types of problems that might arise with data sharing practices later on, even as they address problems popping up today.
  16. spaffordEugene Spafford – Purdue University is home to Dr. Spafford, who teaches several classes within the Department of Computer Science.  His areas of specialization include social impacts of computing, including emerging mobile and cloud technologies that constantly create the need for enhanced security.  Ethics, cybercrime and general internet security are the bread and butter for Dr. Spafford, leading to accolades from his peers and teaching honors from Purdue. Dr. Spafford also runs the University’s Center for Education and Research in Information Assurance and Security (CERIAS), which leads research in the field of internet and computer security.  Dr. Stafford made headlines for suggesting users will defect from the World Wide Web due to the inherent dangers it poses to their personal security.
  17. duWeliang (Kevin) Du – Professor Du understands the implications of computer security for mobile devices and other emerging technologies, so he has dedicated his research to these areas.  Dr. Du is a professor in the Department of Engineering and Computer Science at Syracuse University, where he and his research team tackle system security problems and innovate in the area of smartphone system security.  His PhD is from Purdue University, and he currently holds prestigious positions on panels and committees serving the computer security industry.
  18. ahamadMustaque Ahamad – Securing the internet and computer applications for the future is a passion shared by many computer security professionals, including Dr. Ahamad.  In the College of Computing at The Georgia Institute of Technology he works with colleagues to secure future applications, while at the same time innovating secure storage services for personal information.  Dr. Ahamad earned his PhD at the State University of New York.  He has worked with dozens of successful computer security specialists as a mentor and collaborator.
  19. James Burkman – Oklahoma State professor Dr. Jim Burkman works in areas concerned with the ongoing security of computers and networks.  At the Spears School of Business at OSU Dr. Burkman pushes forward research programs for application security.  He has published several journal articles on the subject, and continues to push for solutions for todays, and tomorrow’s problems.  After earning his PhD from Indiana University, Dr. Burkman began teaching and conducting research in information security.
  20. hoffmanLance Hoffman – Throughout his distinguished career in cyber-security, Dr. Hoffman has been on the cutting edge of computer security research and education.  His early accomplishments helped set the stage for a computer education model that was in its infancy, changing faster than traditional educational systems could stay current.  As a Distinguished Research professor at the George Washington University, he continues to share his experience and consultation.  Dr. Hoffman is the author of dozens of journal articles and books, and serves in advisory roles on several prestigious scholarship boards granting funding for promising computer security students
  21. matt-greenMatt Green – Professor Green teaches courses at Johns Hopkins University that are related to the work he does with his research.  Dr. Green’s areas of specialization include developing techniques for effectively storing information with high levels of privacy assurance built-in.  He is an assistant professor at the Johns Hopkins Information Security Institute, where he also works in the fields of bilinear cryptography and cryptographic information.  Specifically, his research uncovers ways to keep databases secure and to allow people access, without compromising their own privacy as they use the resources.  His blog talks about developments in the field.
  22. yi muYi Mu – Dr. Mu specializes in cryptography and related disciplines, including computer and network security.  Professor Mu is faculty at the University of Wollongong, where he plays important roles on committees within the School of Computer Science and Electrical Engineering.  He has published more than two-hundred fifty scholarly papers.  He serves as the head of his school and is also the editor of the International Journal of Applied Cryptography.  His academic credentials include a PhD from the Australian National University.
  23. Jed Crandall – Dr. Crandall and his team of researchers share the belief that internet activities should be more transparent when they involve censorship and controlling information.  He works as an associate professor at the University of New Mexico, guiding research in forward thinking areas that govern internet security and privacy of information.  Dr. Crandall earned his PhD from the University of California at Davis, before entering into research partnerships with prestigious funding entities.
  24. DenningDorothy Denning – Dr. Denning has led a productive career in computer science, dating back to her early innovations at Purdue University in the 1970’s.  She taught there for years, as well as serving on the faculty at Georgetown University.  She is the inaugural member of the Cyber Security Hall of Fame, illustrating the important role her body of work has played in the computer science field for decades.  In addition to her service at Purdue and Georgetown, Dr. Denning worked in the private sector for nearly ten years, helping secure computer systems for corporations.  She has written four books and over 100 scholarly articles, which have been published in industry journals.  She teaches now at the Naval Postgraduate School, enlightening students with classes like Computer Network Attack and Defense.
  25. ckanichChris Kanich – Dr. Kanich studies an area that receives less attention among academics than some other areas of information security – the financial gains made by attackers.  Analyzing the profits and economic motivation behind hacking and cyber attacks helps illuminate solutions to the growing internet concern.  Dr. Kanich works as an associate professor at University of Illinois – Chicago, where he leads a small research team in the Department of Computer Science.  He has participated in several influential committees and has found his ideas featured in mainstream publications like The Economist, The New York Times, and Wired magazine.  Human factors influence computer security is an adjunct area of research for Dr. Kanich.
  26. Kevin_ButlerKevin Butler – Computer security concerns drive Dr. Kevin Butler’s research, particularly in the areas of information storage, large-scale systems security and network privacy.  He is an assistant professor in the Department of Computer and Information Science at the University of Oregon, where he recently landed an award from the NSF to fund his research projects.  The NSF Secure and Trustworthy Cyber Security CAREER Award brings valuable resources to Dr. Butler’s research relating to secure retention and management of sensitive information.  Dr. Butler earned his PhD at Pennsylvania State University.
  27. Paul Dourish – Dr. Dourish is a professor at the University of California Irvine.  His work at the school’s Donald Bren School of Computer and Information Sciences focuses on security issues for computer systems.  Mobile computing is a particular area of interest, as well as the social components associated with human computing behavior. Professor Dourish serves on industry councils and advisory boards, providing cutting edge research results for better computer security.  Dr. Dourish and his research team work closely with social scientists to dissect the interactions between humans and computers, looking for insight into the behaviors behind our work with machines.
  28. ravisandhuRavi Sandhu – Computer security and privacy are areas that have undergone drastic transformations in the ways they are viewed.  Dr. Sandhu has been a first-hand participant in the development of effective strategies for responding to emerging computer threats. His prestigious career in computer security includes over 250 published articles, written with over 100 collaborators.  Dr. Sandhu is the Executive Director and Chief Scientist at University of Texas – San Antonio, where he has been employed since 2007.  Previous faculty positions were held by Dr. Sandhu at Ohio State University and George Mason University. He is also active at the Institute for Cyber Security.
  29. zittrainJonathan Zittrain – Cyber security issues are muddled among those of law, so professionals understanding both aspects of the equation bring unique insight to the table.  Professor Zittrain teaches in both schools at Harvard University, sharing computer security coursework in the School of Engineering and Applied Sciences. He is a founder of Berkman Center for internet and Society and is on the board of advisors for Scientific American. Special areas of interest include governance of new and emerging technologies and other internet policy issues.
  30. swcarterSamuel Carter – Mr. Carter serves as adjunct faculty at NC State University in the Computer Science Department, specializing in issues related to computer and cyber security.  Cryptography and authorization and authentication processes are within Mr. Carter’s areas of research, as well as network security administration and other systems administration issues.  Mr. Carter currently serves as an advisor for the National Collegiate cyber Defense Competition where standout students compete with theories to head-off the next major cyber security issues.
  31. J C Birget – Computer security and cryptography are essential areas of study for Dr. Birget, who earned his PhD from the University of California at Berkeley.  As a professor at Rutgers University – Camden, Dr. Birget draws on international training and theory to dissect advanced algorithms. Dozens of journal publications and conference articles support Dr. Birget’s educational credentials, including editing books and collaborating with other researchers in the discipline.
  32. junjei-ZhangJunjie Zhang – Associate professor Zhang was tapped last year to head the Master’s in cyber security program at Wright State University.  The Department of Computer Science sponsored the initiative to keep pace with the ever-increasing threats to computer security and to facilitate advanced training for the people in the Wright State region.  The Dayton region requires high numbers of computer security personnel, due to the concentration of national security missions in the area.
  33. ContiGreg Conti – Colonel Gregory Conti is an educator and the director of the Information Technology Operations Center.  He has written multiple books and countless magazine and journal entries.  In addition to those publications, Professor Conti is responsible for dozens of conference papers and collaborations with other computer security professionals.  In addition to his service as WestPoint faculty, he is an adjunct professor at the National Cryptologic School and has been recognized for his contributions to the field of computer security.  Of particular interest to Colonel Conti are online privacy issues, creating secure interfaces, and principles of cyber warfare.
  34. engin-kirdaEngin Kirda – Professor Kirda is an associate professor for information assurance at Northeastern University.  He works in the Department of Electrical and Computer Engineering in the College of Information Science.  Dr. Kirda is concerned with academic areas relating to network and systems security, particularly web security and malware analysis.  He also serves as Director of the University’s Information Assurance Institute.  He is one of the founders of the international Secure Systems Lab, a network of professional collaborators that work together to address cyber security concerns. In addition to publishing dozens of scholarly articles, Dr. Kirda is co-founder of a private venture that helps create secure systems for hire.  He sits on influential committees and chairs respected programs as well.
  35. fifeEarl Fife – Dr., Fife is a faculty member at Calvin College, where he teaches computer science.  He earned a PhD from Wesleyan University in 1977, after acquiring his Master’s at the University of North Carolina – Greensboro.  In addition to the formal educational credentials, Dr.  Fife maintains a long list of certifications endorsing him as a professional forensic computer examiner, and systems security expert. Dr. Fife also holds memberships in industry organizations like the International Society of Forensic Computer Examiners, International Associations of Computer Investigative Specialists, and Michigan Section of the Mathematics Association of America.  Professor Fife is one of the co-founders of The Mathematics Archives.

The Top 30 Data Management & Security Blogs

Data management and security are an important part in the daily lives of most people these days. A lack of knowledge on how to keep your data under control and organized can mean your business suffers in productivity or a hacker halfway across the world can loot your bank accounts. Luckily, the number of mostly altruistic experts who want to share their wisdom on data management and security is impressively large, and many of these experts and the companies who employ them maintain blogs that can be easily browsed to keep yourself abreast on the current state of the IT and InfoSec world. This list contains links and quick glimpses into thirty of the best offerings on the web. Blogs are divided into data management blogs, security blogs, and those with content that bridges the gap between the two.

Data Security by Charlie Collis

Data Security by Charlie Collis

Well-Rounded Blogs

  1. Rational Survivability– Originality can make a sometimes-dry topic like technology more bearable for the masses. Rational Survivability makes no apologies that it is a personal blog that will do whatever it wants, whenever it wants to do it. Almost every post can pull a laugh from you while still imparting some knowledge. The posting rate seems to be on the decline over the past few months, but you can still expect a new post per month. The blog has been in existence since 2006, so it is likely going to stick around for a while. Throw it in your monthly blog checklist and you won’t regret it. Must Read: An Ode to Glasses, a somewhat clever and definitely hilarious poetic tribute to Google Glasses.
  2. Rud.is – This blog is a bit of a hard one to place. The subjects range from data security to shiny graphs to random IT subjects, and occasionally it even goes off the grid into something completely different. It does not have the best update rate, and the varying content makes it hard to suggest that you put it on your frequent reading list. That said, it is worth giving a quick look at some of the articles to determine if the blog is something that you might like. Must Read: Security Hobos, a discussion on truly small business owners who are blissfully ignorant that they are creating terrible security problems for their customers.
  3. From the Trenches – There is no substitute for experience, but reading about someone else’s experiences comes in at a close second. From the Trenches is a mix of stories from the owning company, Solera, and related posts on data security and management problems that have had an impact in the real world. The blog is fairly heavy on advertising posts for Solera, but considering that it is all but declared directly in the blog’s mission statement that this will happen, we can forgive it this time. Must Read: Topera, the Sneaky IPv6 Port Scanner, an article that provides an overview of one malicious tool and that serves as a good example of the sort of content you will find here.
  4. Attachmate: Data in Motion – The moment where any sort of information is at the highest risk of falling into the wrong hands is when that information is in transit. Attachmate provides solutions for information security for electronic devices during this vulnerable stage, and their blog provides useful tidbits of information on how to properly secure file transfers. As you would expect from the more pointed focus of the company, the blog is narrow in scope. Unfortunately, the blog does not take advantage of this to provide lengthy or detailed information, instead opting for more general updates on file transfer news and technologies once or twice a month. Even though we think this blog could be great with just a bit more effort, it is still a decent one to have on your monthly checking schedule. Must Read: User-driven File Transfers and You, a brief commentary on why email should not be used as a file transfer system.
  5. Verizon Terremark: Enterprise Cloud Blog – Terremark is a division of Verizon that delivers Cloud and enterprise level solutions to medium and large businesses. Their blog is a mixture of company news and informative articles on the Cloud, big data, and security. One of their more frequent topics is “News to Know,” which contains small excerpts and links to other articles. It isn’t a terrible blog, but with about 40% of the content being company advertising and reposts, it isn’t a great one either. A good amount of information and updates coming every day or so are its main redeeming qualities. Must Read: Encryption Solutions in the Cloud, a post on the encryption options that work best for Cloud technologies.
Weir Data - Photo by Acoustic Dimensions

Weir Data – Photo by Acoustic Dimensions

Data Management Blogs

  1. Obsessive-Compulsive Data Quality Blog – Focused on providing his readers with a very thorough review of the importance of data quality, management, and security, author Jim Harris creates well-written and informative posts on his blog. Posts range from analyzing the costs and issues that stem from poor quality management, new techniques to utilize and protect data, vender reviews and news presented in a neutral way, tools and resources, and much more. An excellent source for anyone involved in the data chain Must Read: Magic Elephants, Data Physics, and Invisible Gorillas – glancing over the excitement surrounding Hadoop (the Magic Elephant), its potential use to predict customer data kept close to the chest (Data Physic), and a warning about getting too far ahead with data changes (the Invisible Gorilla).
  2. Data Quality Pro – Data Quality Pro is a community managed website built with the vision of collecting the insights and ideas of professionals in the world of data quality. The blog itself has a decent color scheme, but the layout and navigation can be more than a pain until you get the feel for it, and it will still likely irk you even then. They make up for the haphazard design with four to five posts a month that are unique and insightful for the world of data management and analysis. Must Read: How to Create a Data Quality Firewall and Data Quality SLA, a useful set of tips and advice for less tech savvy companies looking to hire a data quality company.
  3. Mike 2.0 – Mike 2.0 is an open source information management solution that features community blog project with useful posts from experienced and intelligent members of the data management field. Some of the contributing bloggers appear frequently on other sites or maintain blogs of their own. The layout makes it easy to navigate through the content, but the color scheme is a boring and somewhat irritating choice of primarily white with light blue backgrounds. As with other community blogs, the higher number of contributing authors means the blog is updated with original content fairly frequently. In addition to the blog, you can find a discussion board to communicate with other readers and the contributors.  Must Read: The Increasing Meaninglessness of the Data-Metadata Distinction, a short but thought-provoking post about how much information is really contained within metadata and what it can tell someone about the contents.
  4. Information Management – Information Management, despite the rather bland name, is a massive resource on just about any topic on which you could tack the words “data” or “information.” If you want to know about data encryption, data security, big data, data quality, data analytics, data storage, the Cloud and data, data on the network, or anything else, you can find it here. The layout is incredibly busy and can seem overwhelming, but they do fairly well considering the amount of material that is stored on the site. There are multiple blogs within the site, links to educational resources, a webinar repository, and more. This is a resource that will serve you above and beyond the fields of encryption and security, but it definitely fits in with them as well. Must Read: After a Data Breach It’s Often Business As Usual, a chastising look at companies who do not take data breaches to heart and implement better data management procedures.
  5. Midsize Insider – As the name suggests, Midsize Insider is a blog site and article repository geared towards imparting information management know-how to small and medium business owners, managers, and IT staff. With dozens of contributors and staff members, content on the site is always fresh and is released at least daily. The navigation is a bit jumbled and the main pages are a bit overwhelming with information from Twitter, infographics, trending articles, and article lists. Once you get into the articles, things clean up and do not interfere with reading. Midsize Insider is essentially a normal blog on steroids: a bit harder to keep up with, but it packs more punch. Must Read: PRISM and Encrypted Data Benefits, an article on the recent NSA domestic surveillance fiasco and the importance encryption plays in keeping sensitive data safe when anyone – even the government – may be watching.
  6. The Data Roundtable – The Roundtable is a moderated but open posting ground for experts on data management in all of its forms, including subjects like data analytics, management, encryption, and general security. The blog has a marked informal tone, with topics for the posts having some silly sounding titles like “On Lawnmowers and Data Management.” The levity belies the depth of information, experience, and the ease at which many of the contributors impart their knowledge to readers. The layout is sleek and crisp, and the content is updated on an almost daily basis. This is one of those blogs to keep on the top of your list. Must Read: What’s the Meta with Your Data?, a suave title for an intelligent discussion on the importance of metadata.
Juniper - InfoSec 2013 - Photo by David

Juniper – InfoSec 2013 – Photo by David

Security Blogs

  1. Schneier on Security –   Operating since October of 2004, blogger Bruce Schneier has developed a strong following and respect from other bloggers interested in cryptography and related studies. The layout of his blog is very reminiscent of the late ’04 web, but contains a wealth of well-written information relating to everything from computer crime, homeland security, privacy, malware, policy issues, and much more. Frequently updated and easy to navigate, Schneier on Security serves as an excellent resource for those looking to dig up gems from this blog’s archives. The blogger himself is an acclaimed expert in security technology, with recognition for his numerous academic and other published essays, dozen published books, assorted fellowships, media and Congressional appearances, all of which got him dubbed a ‘security guru’ by The Economist. Must Read: Intelligence Analysis and the Connect-the-Dots Metaphor,
  2. Security Bloggers Network – Not a blog in its own right, but rather a collecting house of related blogs, this is a great resource for those looking to take a peek at what is new and exciting in the security blogosphere. They host a blogger hall of fame and annual security blogger award as well as an open feed of new posts to help users find quality blogs of interest. Worth checking out if you are a blogger or an avid consumer of such. Must Read: Security Blogger Awards, for a round-up of regularly updated and well-written security blogs.
  3. CSO– Expert advice on security from a range of experts. Posts cater to organizations and businesses concerned with protecting data.  Regularly updated and well-written, but unfortunately sponsored by intrusive ads that require you to click-through them to get to the content. This site also offers webcasts, white papers, and an emailed newsletter so readers never miss interesting news. Must Read: Are you sure you’re really in control of your servers? This article discusses some of the threats to even owned servers.
  4. Cognitive Dissidents – This security blog features a gorgeous site design with no nonsense commentary on security issues from the perspective of self-declared zombie killer, philosopher, and security strategist. While not frequently or regularly updated, the blog offers a fresh perspective and is well worth a gander. Must Read:  A Replaceability Continuum, an examination of the question, ‘How replaceable is an asset type.’
  5. Uncommon Sense Security – Blogger Jack Daniel, an Information Security Curmudgeon,  writes with a great deal of experience on the InfoSec industry with content that is unsponsored and uncensored. Expect to find no-nonsense posts on a whole range of related topics and the occasional helping of acerbic wit to raise a chuckle. Regularly updated since June of 2007, this site is clean and straightforward to navigate.  Must Read: Managing employees and expectations, for a rant on how to retain quality InfoSec personnel.
  6. Andy Ellis > Protecting a Better Internet –  Primarily targeting the clientele of the information security industry, this blog is an excellent resource to get a handle on trends, methods, terminology, related news, and events. Regularly updated since May of 2006, Andy Ellis has been providing readers with information that is incredibly easy to parse no matter a reader’s experience level. His focus is on internet security and steps that can be taken to tighten up sites to prevent leaks, scams, and other threads.  Must Read: Leveling up Security Awareness, for a solid article addressing one of the biggest weaknesses in security protocol – the human element.
  7. Threatpost – The Kaspersky-owned Threatpost blog is one of those selections that make you do a double-take when you find the tucked-away reference to the parent company. From all appearances, you would believe that Threatpost is run by InfoSec enthusiasts who do their job for the love of it. The update rate is astounding, and checking the blog every day for content is the bare minimum unless you want to fall drastically behind. Topics center on security related news such as malware, cryptography, and hacking. We are confident enough that the great design and implementation of the blog will speak better for itself than we can, so stop by Threatpost as soon as you can. Must Read: Royal Baby Spam Campaign Leads to Black-Hole Infected Site, because it is one article about the royal baby that won’t leave your brain melting out of your ears.
  8. LiquidMatrix – This refreshing InfoSec blog screams “educated and edgy” from the moment you pull up the home page. The layout is slick and beautiful while facilitating easy reading and the glimpsing of information. You will find ten or more posts per month that touch on InfoSec news from around the world. They are accompanied by the podcast which releases episodes every couple of weeks and are amusingly numbered in hexadecimal. In fact, the podcast could be considered the major draw of the site, and you will greatly miss out on the value of LiquidMatrix if you skip over the episodes. Two of the sections we like the most – a list of default passwords on almost 1000 devices and their critical security advisory page – do not get the navigational focus they deserve, so make sure to check the small content box for links to them. Must Read: What to Do If Your iPhone Gets Stolen, a handy read for the millions of users of the Apple smartphone.
  9. Krebs on Security – Krebs’ blog is one of the most popular and active personal sites in the InfoSec blogosphere. The author, Brian Krebs, has years of experience in professional writing, most notably a long stint with the Washington Post. Like many people today, he began in another field and gradually gained interest in the ins and outs of the IT world. His blog contains frequent updates with a focus towards malware, exploit kits, hacking news, and security in general. Most of the articles go above and beyond the brief articles found on other sites, and many of his technical reviews of malware and exploits can prove to be lifesavers. The popularity of Krebs is well-deserved due to the quality and frequency of its postings, and it should easily find a spot in most people’s roundup of InfoSec related readings. Must Read: Web Badness Knows No Bounds, because while you may think that avoiding sites that scream danger will protect you, browsing online always presents some level of risk.
  10. The Falcon’s View–  The Falcon’s View has all the qualities we like in a personal blog: most of the posts are original content authored by the owner, it keeps a good update frequency despite having quality content only created by a single author, and the writer is knowledgeable and legible while seeming approachable. The author is an employee at Gartner and a contributor to their blog, but he still cross-posts his own content to his personal blog. The only real negative that can really be attached to the blog is the background colors are not the best, but that does not detract from the enjoyable and unique content. Must Read: Arguing Against the Absurd, an article where Ben shows the proper way to comment and discuss on a post from another blog or source.

Image by IntelFreePress

  1. TaoSecurity – A growing number of malicious attacks on networks throughout the world are originating from one place: China. TaoSecurity brings all the information related to the threat of Chinese hackers into one spot. The author of TaoSecurity is Richard Betjlich, an experienced InfoSec specialist and author. The blog has been in existence since 2003, pointing to the alertness and awareness of the situation that noted the oncoming problem long before it became the subject of national attention. Due to the narrow scope of the blog, the posting frequency is understandably low and sits at about two per month. Must Read: President Obama Is Right On US-China Hacking, a post with commentary and a link to President Obama discussing some of the ongoing issues with Chinese hackers.
  2. Securosis – With a no-nonsense approach to InfoSec research and education, Securosis skips past the marketing and posturing that other company blogs include so well that we could not even include it in the InfoSec company blog section. Posts tend to come up once or twice a day, and they are typically unique articles with a purpose rather than reposts, links, or brief commentaries. If you finish the daily offerings and want more, the research library contains what they consider their key posts on a variety of security subjects. The library is not updated frequently, but it serves adequately as a secondary resource and a good place for those just getting started. We also love the coloring on the blog since the off-white post backgrounds makes extended reading easier on the eyes. Must Read: Endpoint Security Buyer’s Guide:  Buying Considerations, a post every business owner should read before they sign up for security services.
  3. Network Security Podcast – Sometimes, the medium your information is delivered in can play a big impact on how likely you are to go through it and the level of enjoyment you get out of it. This is where podcasts come into play, as they function essentially like audio blogs. The Network Security Podcast features a lively crew of InfoSec specialists who banter and discuss the most newsworthy topics in network security. While many blogs offer multiple viewpoints, it is difficult to get the same depth of discussion and debate that you do from having multiple people conversing. A new podcast is released around every two weeks, and they make for a great bit of listening while working on other tasks. Must Listen: Their June 18th, 2013 podcast that touches on everything but the immensely covered Snowden case.
  4. Network Security Blog – This blog is maintained by a sole contributor named Martin McKeay, a friendly fellow who works as a “Security Evangelist” in California and is also a regular figure in the podcast noted above. The posting schedule is a bit haphazard, but he does throw up somewhere near five notes a month on average. The articles range from analysis of network security news, tips and advice on proper security methods, and links and commentary to other useful resources. There is nothing noteworthy about the design and scheme of the blog, but there is nothing wrong with using what works. The blog has been in existence since 2003, providing over 1000 posts to rummage through if you want to get caught up. Must Read: Rage Against the Machine, a collection of informative links related to the NSA PRISM project.
  5. HiSoftware: Shooting from the Hip – HiSoftware is an information security company that provides a “Governance, Risk Management and Compliance (GRC)” platform to companies and organizations that want to keep their data safe. The blog for the company focuses on the issues of data management and security, most frequently featuring topics like data breaches, problem technologies, security standards compliance, and news related to data security. The look and feel of the blog has some nice touches, but it remains fairly standard overall. Posting occurs at a fairly nice rate with updates coming in every three or four days. Must Read: This article on the threat SharePoint can pose for data leaks is illuminating even while it highlights the role HiSoftware’s service can play in preventing the same thing from happening to your business.
  6. ThreatVision Labs– ThreatVision is the blog for Solera Networks, an information security company that focuses on providing solutions for Big Data.  The content focuses mostly on reports of malware and other security threats that can wreak havoc on your data, providing higher level overviews that give enough of the technical side of things to point you in the right direction if you want to learn. Articles are posted roughly four times a month. The blog’s design is simplistic and effective, garnering no complaints while not really astounding anyone. You should also hop over to ThreatVision’s sister blog that we mentioned above, From the Trenches, which contains more anecdotal looks at information security in the field. Must Read: Five Cybercrime Trends Likely to Continue in 2013, since it always pays to be up to date on the network attacks you are most likely to experience.
  7. Tenable: Network Security Blog – Tenable’s blog is one of the best company blogs on the list when it comes to the amount of content delivered. They offer a regular podcasts, webcasts, frequent posts, tutorials, white papers, RSS feeds, and newsletters. The blog does push the products of the company fairly hard, but it is relatively tolerable due to the sheer amount of other content. The content is updated almost every day, but you can probably get enough out of the blog by spending a few minutes on it every two or three days. Must Read: Prove You’re Watching 100% of Your Network, a post which points out that even the companies who keep an eye on their networks may not be doing so well enough.
  8. Hacker Academy Blog – The Hacker Academy adheres to the “know your enemy” strategy that has proven itself time and time again. They provide a look at security from the view of those who do their best to circumvent it, and you cannot protect against things you do not know about. The blog is updated roughly every month in a haphazard schedule, but the posts in the blog are less important than the library of information available on the site. The layout is basic with a soft grey background that makes it much easier on the eyes. They offer training modules on a variety of security topics and frequently hold webinars. The information is presented a clear and concise fashion that makes it accessible for newcomers and experts alike. Must Read: Hacking Fundamentals, one of their training modules and a good look at the basics of the hacker mindset and toolkit.
  9. VeraCode Blog – Veracode is a company that offers Security as a Service (SaaS) through their Cloud-based Application Risk Management Platform. They focus on security testing for applications, which is why their blog splits itself between general security news and tips for programmers on how to secure their applications. The layout of the blog is fairly bland, featuring a scheme that is mostly just a white background. Updates come along every two or three days, and they do a good job of keeping obvious plugs for the company to the bare minimum. The blog is minimally useful for security programming tips with a pointed focus towards security news. Must Read: 4 Things You Should Know Before Writing Another Line of Code, a quick list of useful tips to keep in mind for security while programming.
7

The 45 Best Forensic Tech Blogs

Forensic technology encompasses a wide range of fields and technologies and is often used, with some controversy, in criminal trials. The blogs below examine forensic tech from all angles, from professionals active in the field, to journalists covering the impact and evolution of forensic technology, to skeptics concerned about the ramifications of junk science being labeled as forensic science being used to convict in trials.

Forensic Science

West Midlands Police Forensic Science Lab - Photo by West Midlands Police

West Midlands Police Forensic Science Lab – Photo by West Midlands Police

  1. Anti-Polygraph BlogOpened: April 2006 with regular updates in the last few years. Style and Focus: Detailed and supported articles about the ways in which polygraph tests are used and abused, information about the deficiencies of the technology, and news. Also very active on Twitter. What to Read: Polygraph Countermeasures: What Polygraph Operators Say Behind Closed Doors, for a glimpse at the concerns even polygraph operators have with the reliability of the technology.
  2. Zeno’s MonthOpened: July 2004, with biweekly or monthly posts since then. Style and Focus:   Much more of a personal blog than an informative one, this blog, run by a forensic scientist, touches a bit on his work and life. Expect vacation adventures to be mixed in with news and conference details related to the forensics industry. What to Read: October 2012: Some Challenges in Digital Evidence, for a glimpse at what forensic science was concerned with and preparing for in late 2012.
  3. FSN: Forensic Science NewsOpened: April 2008 with post frequency varying but highly active since then. Style and Focus: This frequently updated blog provides opinionated responses to news and events related to forensics from the point of view of a professional forensic scientist. Well written and timely responses to criminal cases and forensic news and advances. What to Read: Institutional Bias Examined, for a great introduction to how insidious institutional bias can be and some thoughts on how it plays out.
  4. All About Forensic ScienceOpened: May 2012 with fairly regular posts each month. Style and Focus: Despite the busy look of this site, it contains a wealth of information for individuals looking at entering the field of forensics. Regular posts focus on information relevant to potential forensic students or those with a casual interest. Posts are short and sweet but informative. What to Read: Mathieu Orfila, for a wonderful brief bio on one of the forefathers of forensic medicine.
  5. UF Forensic Science BlogOpened: March 2012, fairly consistent with bimonthly posts. Style and Focus: This blog provides its readers with reasonably fascinating posts covering different types of forensic science along with forensic analysis in the news. Not the most frequently updated and the author is not a native English speaker (and it shows in the writing), but it is worth a gander. What to Read: Untying the Knots, for a quick and dirty overview of the importance of forensic knot analysis and the rarity of such expects (with a link for more information).
  6. Forensic Odontology: Bitemark EvidenceOpened: January 2011 with regular updates about once a week since. Style and Focus: With a minimalist look and easy to navigate interface, this blog welcomes readers to explore the world of bite mark evidence, with a focus on educating readers to the potential negative legal ramifications of relying on it as evidence. The author is a highly experienced professional forensic odontologist, with plenty of background to provide invaluable expertise to the posts. What to Read: Ted Bundy Bitemarks and Richard Milone: How DNA, bitemark research and failed cases have changed bitemark analysis, for an examination of how these high profile cases used bitemark evidence questionably and how it is used today.
  7. Forensic DNA Testing Blog Opened: December 2007 with irregular posts since then. Style and Focus: This blog allows posts from both DNA Diagnostic Center staff and clients that concern forensic DNA testing. While DDC moderates the posts, the authors can vary and thus the style of writing as well. The blog is easy to navigate and contains a wealth of information for readers interested in keeping up news, advancements, and case studies involving forensic DNA. What to Read: New DNA Test Predicts Eye Color, for a quick article introducing a new advancement in forensic DNA analysis – the ability to predict eye color from samples left at crime scenes. Not strong enough as a sole source of information, but an asset to an investigative team.
  8. Forensic AstrologyOpened: July 2007 with irregular posts that appear at least once a month since. Style and Focus: Admittedly, this site is a bit of an outlier amidst genuine scientific research blogs and companies and the site reinforces this general feel with its dark background and starry banner, but the information presented makes for an interesting read. The author has a 30 year background in utilizing astrology to analyze case files with an eye for forensics and provides detailed case file information, often sent in by readers, as well as the process by which astrology is used to hunt for new details in the case. Even if you do not buy into the premise of astrology, the blog is worth a look. What to Read: Shemika Cosey – Young Lady Leaves Her Aunts Home and Disappears, for a typical case study that details the process of forensic astrology and paints a narrative of what might have happened in this disappearance.
  9. GunSim Ballistics Blog Opened: March of 2009 with irregular but generally biweekly posts since then. It has slowed a bit recently. Style and Focus: No-nonsense style reminiscent of the early days of the internet, this blog’s pared down appearance suits the straight forward information it provides to readers. It focuses specifically on technology and software used in ballistics testing with helpful tips on getting the most out of it, news, and more.  What to Read: Zero in the warm, shoot in the cold, for a quick look at how ballistics information can help improve cold weather sharpshooting.
  10. Empirical Legal Studies Opened: February 2006 with regular and frequent posts ever since.  Style and Focus: Another early internet era styled site, this collaborative effort was founded by a group of professors from a few different Law Schools with the intent to bring together empirical methodologies and legal theory. Posts can greatly vary in length, but are usually well-written and informative. They bring commentary to news, changes in legal policy, useful resources, and more. What to Read: Kahan on National Research Council critique of multivariate regression, for review of one professor’s concerns about the potential problems in research and how they influence policy view.

Forensic Medicine

Medical evidence collection - Photo by Army Medicine

Medical evidence collection – Photo by Army Medicine

  1. Forensic Science for NursesOpened: February 2011 with consistent weekly posts. Style and Focus: RN Patricia Bemis provides her readers with straightforward, to the point blog posts that give other nurses tips on how to preserve potential evidence, information on forensic nursing, and news related to the field. She also discusses the importance of keeping forensics in mind as a nurse of any stripe. What to Read: Evidence Collection in the ED, for a quick review of simple steps ED nurses can take to preserve potential evidence.
  2. Digital Pathology BlogOpened: Active since 2007. Style and Focus: More like an information hub than a typical blog, this site features regular posts from experts in digital pathology on news, advancements, cast studies, and educational information. The site is a bit busy, but easy to navigate and features a lot of resources for those with an interest in the field. What to Read: The Anxiety of the Biopsy from NY Times Health Blog, for Dr. Kaplan’s response to a NY Times article on the mental health effects biopsies can have on patients.
  3. Forensic Medicine with Dr. Cox Opened: Started September of 2009 with semi-sporadic posts, generally once a month. Style and Focus: While sporadically updated, this blog is nevertheless a wonderful resource for those with an interest in forensics, particularly with a medical bent. Written by professional forensic pathologist and neuropathologist, Dr. Cox, each post is designed to inform and instruct readers on an aspect of forensics. Often, the blog posts are short introductions to longer papers linked in the post. What to Read: Human Skeletal Remains – An Introduction to Forensic Anthropology, for an introduction to a well-written and informative article introducing readers to the important concepts in forensic anthropology.

Forensic Museums and Historians

Forensic Anthropology Lab - National Museum of Natural History - Photo by Leticia  (Tech Savvy Mama)

Forensic Anthropology Lab – National Museum of Natural History – Photo by Leticia (Tech Savvy Mama)

  1. Crime Museum’s Criminal Convictions BlogOpened: February 2009 with consistent weekly posts since. Style and Focus: This blog is run by a museum and readers can expect highly entertaining, detailed, and well-written posts covering crime, criminals, and forensics. Recently, they posted the story of a potential real-life inspiration for the American mythical hero the Lone Ranger. The site itself is well designed and easy to navigate and offers readers more than just a lively and engaging blog. What to Read: The Vidocq Society: ‘The Heirs of Sherlock Holmes’? A glimpse into first real life French undercover detective agency and the fascinating character who helped found it, former criminal reformed into detective, Eugene Vidocq.
  2. The Writer’s Forensics BlogOpened: May 2009 with regular posts since. Style and Focus: This blog’s intended audience is writers who want realistic, informative advice and information on forensics. It includes general writing advice, like how to make your first few pages shine, and detailed information on a whole range of forensic science. A fascinating read if you have an interest in forensics at all. The design is clean and easy to navigate, with lots of resources and great organizational tools. What to Read: Connecticut Massacre Not New, Just Disturbing, for a quick and dirty guide to the assorted classifications of multiple murderers and real-life examples of such.
  3. Jen J. Danna ~ Forensic Crime WriterOpened: April 2011 with regular posts since, generally updated Tuesday evenings. Style and Focus: Another writer’s blog, this one expands beyond simply advice for authors, it chronicles this author’s journey in writing, provides information on research, writing processes, and the path to publication. She also does an excellent job in covering forensic science and how it can be effectively used in writing. She has a particular focus on forensic anthropology. What to Read: Forensic Case Files: Cannibalism in Jamestown in the Early 17th Century, for a gruesome look, figuratively and literally, at some of the evidence illuminating the meal-times at Jamestown colony, courtesy one 14 year old immigrant.

Computer Forensics

Digital Recovery Storage for Child Online Safeguarding Team in the West Midlands Police Dept.

Photo by West Midlands Police

  1. Computer Forensics BlogOpened: August 2008 with very frequent posts ever since, generally more than twice a week. Style and Focus: This highly active blog is a fantastic resource for any computer forensics professional or individual interested. They keep readers informed of product information, news, and events while also providing lots of tips and guides to improve one’s computer forensic tool bag. What to Read: Four Focus Areas of Malware Analysis, for an informative post briefly explaining one method of analyzing malware.
  2. Digital Forensics BlogOpened: November 2010 with sporadic updates, generally once a month. Style and Focus: While this blog isn’t frequently updated, it does provide excellent information and tips targeting other computer forensic personnel. The author provides advice born from practice, events relevant to the field, news, advancements, and more. What to Read: No Partition Table? No Problem, for a helpful post targeting newer computer forensic professionals who need a way around disks lacking partitions they need to mount.
  3. Random Thoughts of ForensicsOpened: February 2010 with posts generally updated once a month. Style and Focus: More of a personal blog than one designed to provide a great deal of professional advice and resources, it provides a glimpse into the journey of one student of computer forensics and includes his experiences with different forensics techniques and triumphs along with personal and professional experiences alike.What to Read: Tools in the Toolbox Mandiant Red Curtain, a quick and dirty overview of a free software for Incident Responders analyzing malware.
  4. Didier StevensOpened: June 2006 with regular posts from that point forward. Style and Focus: This is not a blog for those with a casual interest, it is full of technical details and step-by-step instructions designed to share ideas, tactics, and resources with other professionals.  Regularly updated and  on a wide variety of related topics, this is a highly useful tool for any computer professional interested in forensics. What to Read: Quickpost: TeamViewer and Proxies, a quick and dirty how-to post.
  5. Windows Incident Response BlogOpened: December 2004 with very active and regular posts, at least one a week, frequently more. Style and Focus: This long running blog is focused on providing resources to professionals involved in computer and digital forensics with Windows systems. Most posts are focused on explaining different analysis approaches or techniques, but it also informs readers of news updates, products, and events. What to Read: There Are Four Lights: The Analysis Matrix, for an explanation of analysis matrix and how it can be used to more effectively analyze data.
  6. Forensic Focus Blog Opened: November 2007, generally updates often. Style and Focus: Focused on providing news and tools for other computer forensic professionals, this blog features well written and tool-packed articles, interviews with folks in the industry, news, reviews, and more. The site itself is slightly busy, but well organized and easy to navigate. What to Read: Generating computer forensic supertimelines under Linux: A comprehensive guide for Windows-based disk images, for a guide to the assorted solutions available to assist with creating digital forensic timelines with code files.
  7. Forensic 4:castOpened: January 2008 with regular and fairly consistent weekly updates. Style and Focus: This sleek and well-designed site offers its visitors a wealth of information related to digital forensics delivered in podcast format with discussions from a range of industry experts. They also run a regular newsletter that supplements the information provided in the podcasts. They also host the 4:cast awards to acknowledge great forensic tools, resources, and individuals in the field.   What to Read: How to do the worst job possible, presenting a very poorly written forensic report.
  8. Mobile & Technology eDiscoveryOpened: November 2006, with somewhat sporadic posts, but generally at least one a week since open. Style and Focus: While it doesn’t present the most elegant design ever, the blog delivers excellent content for readers involved or interested in digital forensics. It features regular articles on tools, best practices, resources, case studies, and more.  What to Read: Signal Strength and Distance, for a discussion on what cellular signal strength and distance is and how to discuss it in court.
  9. CSItechOpened: May of 2008, with bimonthly posts since. Style and Focus: The clean layout allows readers to focus on the content, which is focused on informing readers about newly developed tools and tactics designed to improve the computer forensics industry. Expect lots of reviews and guides on using new tech and practices. What to Read: Password extraction fun, for a good review of a program that can help uncover passwords on devices first responders need to access quickly.

Forensic Technology & Techniques

Fingerprint - Image by CPOA

Fingerprint – Image by CPOA

  1. Crime Scene TrainingOpened: December 2010 with fairly consistent, frequent posts. Style and Focus: This very well organized blog has been regularly providing advice, insight, product reviews, and more targeting any investigators who do any part of their work directly at the crime scene. Articles are informative and practically useful. What to Read: Avoiding Hazards at the Crime Scene, for a well-written, thorough, and extremely handy article for any forensic tech who goes on scene.
  2. The Truth about Forensic ScienceOpened: February 2010, with frequent and regular updates. Style and Focus: This blog targets DUI lawyers and criminal defense attorneys and helps educate its readers on the different types of forensic evidence that can be brought to a trial, with a focus on weaknesses and defenses against them. The blog is authored by a highly respected criminal defense and DUI attorney. What to Read: Limitations of Forensic Odontology, for an overview of the problems with forensic odontology.
  3. The Hacker Factor BlogOpened: November of 2006, with fairly regular posts at least once a month since then. In the last two years, it has trended towards weekly updates. Style and Focus: This blog is a treasure, with entertaining and informative posts that are often designed to generate discussion amidst the readers. The primary focus is on the tools and techniques designed to help computer techs of all sorts, but it occasionally drifts into completely unrelated but often fascinating territory.  What to Read: Chasing Rainbows, for a really fascinating article discussing super-senses.
  4. Forensic MethodsOpened: August 2009 with sporadic but fairly regular posts since then. Style and Focus: The layout of this blog makes it feel more like a digital magazine than a traditional blog, and its posts take a non-traditional spin too. Some are simply quick Twitter updates; others are snippets of a great article found elsewhere with a shortened link to the primary article. Still, the original content here is not to be missed; the articles are well-written and informative and often offer a behind the scenes glance at the writing process. What to Read: Digital Forensics Magazine: Big Brother Forensics, for an article on an article, also a brief introduction to the potential ramifications of geo-location technologies.
  5. Forensic ResourcesOpened: July 2011 with frequent posts, often more than once a week, since then. Style and Focus: A sleek and well-written blog providing detailed information about forensic science, including techniques, news, legal issues, and advancements. It caters primarily to attorneys based in North Carolina, but is a worthy read for anyone who needs to increase their armchair knowledge of the science. What to Read: Improving Arson Investigations, a resource-filled article pointing readers towards new developments in science that shook up fire investigation.

Cold Cases & Wrongful Convictions

  1. Defrosting Cold CasesOpened: November of 2009 with prolific posting habits, though slightly slower in recent months. Style and Focus: The blogger clearly cares about justice for victims who have been left behind by time. Posts are frequently focused on bringing light to cold cases that may have been gathering dust, telling the stories of the victims, and sharing information about the crimes. The author also focuses on wrongful convictions and forensic information that may help solve some of these cases. The site is beautifully designed, easy to navigate, and the articles are well-written. What to Read: In Loving Memory: Jimmy Stanaway, for a heartfelt memorial to a cold-case victim, providing a personal face to a dusty file.
  2. The Wrongful Convictions BlogOpened: It’s hard to pinpoint the open date of this blog, but it is currently highly prolific, with often multiple posts in a day. Style and Focus: Informative, well-written, and prolific, this blog features a panel of expert authors from a variety of backgrounds to bring readers the latest in news about wrongful convictions, including forensic analysis changes, case studies, legal changes, and more. The site is a little difficult to navigate, as it lacks a proper archive; users can search, or sort through categories to find what they are after. What to Read: Calculating Bad Math’s Contribution to Wrongful Convictions, for an interesting analysis of how a judge or jury’s failure to comprehend mathematics might lead to miscarriages of justice.

Fraud & Crime Blogs

Fraud Tech on a $20 - Image by Jack Spades

Fraud Tech on a $20 – Image by Jack Spades

  1. The Fraud Files BlogOpened: November 2005, with prolific and regular posts since. Style and Focus: This blog is focused on fraud of all kinds, from small to massive, on a national scale. Expect lots of links to related information, quality writing, and informative posts. What to Read: MckMama House Fire is Not Suspicious In the Least, for a tale of a bloggess gone bad.
  2. Expert Witness BlogOpened: March of 2007, with near daily posts. Style and Focus: Most posts are very brief and present readers with information about what expert witnesses are testifying about in trials around the nation. Some posts focus on preparing witnesses for trial, news, or other relevant information. What to Read: Environmental Health Expert Witnesses & Hanford Nuclear Reservation, for a typical post example.
  3. Grits for BreakfastOpened: January 2004, with highly prolific and regular posts since then. Style and Focus: A very well-respected blog focused on Texas criminal justice. The author has been recognized for his excellence from a number of Texas newspapers, organizations, and other criminal justice bloggers and even won a handful of awards over the years. Except quality writing, well-researched content, and no-nonsense (and often contrary) opinion delivered near daily. What to Read: A forensic science ‘blockbuster’ and limits of accreditation, taking a glance at several forensic science news articles and points to the shaky ground some forensic data is built upon.

Forensic Anthropology & Psychology

Bones in the Monasterio de San Francisco, Lime, Peru. Photo by Phil Whitehouse.

Bones in the Monasterio de San Francisco, Lime, Peru. Photo by Phil Whitehouse.

  1. Forensic PsychologistOpened: April of 2007, with at least a post a week consistently since then. Style and Focus: The site itself is a little aged, but that has no impact on the quality of its contents. Blogger Karen Franklin, Ph.D. is an experienced forensic psychologist and adjunct professor who has served as a criminal investigator and legal journalist. She has the chops and the ability to write effectively about what she knows. Her posts cover news, resources, case studies, methodologies, and more in the fields of criminology, forensic psychology, and psychology law. What to Read: Beware “voodoo” brain science, for an examination of some of the controversial claims made by proponents of brain imaging as a way to distinguish potentially dangerous traits in an individual.
  2. Mind HacksOpened: November 2004 with consistent and prolific posts since. Style and Focus: Clean design with easy navigation introduces readers to a site loaded with information presented from very prolific bloggers. Posts focus on the fascinating world of neuroscience and psychology. Well-written responses to news articles, explanations of weird brain quirks, neuroscience history and notable figures, and much more can be found here. What to Read: A brief history of narcoanalysis, for a fascinating introduction to the use and history of the administering of ‘truth drugs’ to elicit supposedly truthful confessions.
  3. Smith ForensicOpened: September of 2004 with consistent and prolific posts since. Style and Focus: This blog offers a simple, clean style and easy navigation with a focus on forensic pathology as presented by blogger Harold Levy, a Toronto Star investigative journalist who gained an interest through his reporting on once famed doctor Charles Smith. His blog examines flawed pathology and delves into the cases they impact around the world. He also examines junk science and its impact in criminology broadly.  What to Read: Marvin Wilson: How Texas is using literature rather than scientific methodology to kill a clearly retarded man – to circumvent the U.S. Supreme Court. – For a heart-rending examination of an abuse of the justice system, forensic science, and one man’s life.
  4. Bones Don’t LieOpened: Style and Focus: Written by mortuary archaeology and bioarchaeology graduate student Katy, this blog shares her discoveries, like a recent dig in Oakington containing the burials of over 100 Saxons. She also writes about forensic techniques, archeological history, news, and more on a blog that is beautiful and easy to navigate. What to Read: Displaying the Famous Political Dead, for an interesting glimpse into the practice of preserving the notable dead for public display.

Forensic Companies

  1. Forensic Technology NewswireOpened: April 2009 with frequent but irregular posts. Style and Focus: Their style is much more like a newsfeed than a personal blog, they keep readers up to date on how their products are being used and received around the world, as expected from a company blog, but they do so with solid and informative writing.  What to Read: CSI: Miami & Real Forensics: We Won’t Get Fooled Again, for a post examining the relationship between CSI and real life crime solving.
  2. Forensics Blog (BCIT)Opened: July 2010 with consistent weekly posts since. Style and Focus: A simple interface greets visitors in this Forensic Institute’s blog focused on forensic education, Canadian forensics, news, events, and advancements in forensic science. Most posts are short and sweet. Those local to the area will also find timely related job postings and course updates. What to Read: Forensics’ Grad Bringing Backpacks to the Homeless, for a lovely quick bio on a recent BCIT graduate doing good for her community.
  3. The Forensic GroupOpened: Style and Focus: Clean and straightforward writing designed to inform and educate readers on the methods and developments in computer forensics tactics and technology. Some news and events are introduced as well as case studies. Clean interface but somewhat difficult to navigate. What to Read: Computer Forensic Artifacts: Windows 7 Shellbags, for an informative introduction to how Win7 Shellbags can be used to trace activity and contents in computer forensics.

Forensic Imagery & Artists

1940 Mugshot - Image by Lisa Bailey

1940 Mugshot – Image by Lisa Bailey

  1. Four And SixOpened: June 2011 with regular posts, about one a week, consistently since day one. Style and Focus: Four and Six offers its readers a clean style with useful posts ranging from image forensics techniques to thoughtful posts on ethical treatment of imaging tools and news and information related to image tampering.   What to Read: The Case of the Pole in the Middle of the Road, for a nifty inside glimpse into what photographic forensic investigation.
  2. Forensic Video and Image AnalysisOpened: September 2007 with consistent and prolific posts ever since. Style and Focus: An absolutely fantastic resource for anyone who is involved or interested in image forensics, this highly active blog provides readers with information or resources on tools, software, product reviews, technique basics, image forensic cases, educational opportunities, and a mix of personal insight. Very informative, well-written, and easy to navigate. What to Read: Learn new Photoshop features in a click, for an introduction to a free and handy tool available to improve your Photoshop CS6 experience.
  3. Ask a Forensic ArtistOpened: January 2010 with regular and prolific posts since. Style and Focus: This well-designed blog is a great tool for other forensic artists, those who want to be, and those who are just simply fascinated by the process. It includes techniques, news, educational opportunities, fascinating interviews from other forensic artists, and more. What to Read: The “Pencil Trick” for Edentulous Skulls… Debunked, for a great breakdown of what the pencil trick is, and why it doesn’t at all work as it is supposed to, with photographic evidence.

 

Top 30 Privacy Blogs

With the recent unveiling of the intense Internet surveillance operation being carried out by the NSA, more people than ever are interested in keeping up to date on the latest laws, news, software, and other information related to maintaining privacy online. There is an immense number of blogs related to information security in all of its incarnations, so we have picked through the offerings to find you the best blogs that deal specifically with personal privacy law and technologies. These are listed mostly without any indication of which is better than any other and are instead separated into categories based on their focus. The focus of the blogs includes hacking methods, ways to protect yourself from identity theft, news on information security topics, and discussion about censorship and identity law.

 Privacy image by Sean MacEntee

Cream of the Crop

  1. The Privacy Blog – In a list of privacy blogs, one named The Privacy Blog would clearly seem to fit the criteria. Luckily, it is also one of the best in the genre for details on privacy in the technological world. Updates are posted weekly, and most of the content is original. This includes a podcast for those who would rather listen to news on the latest security threats. Content covers security technologies, opinions on privacy and hacking litigation, and news related to privacy threats and tools. Check out their latest podcast to get a taste of the monthly episodes.
  2. Electronic Frontier Foundation – The EFF is an organization dedicated to the defense of the right to privacy in a world where everyone from the hacker kid down the street to the government can snoop on you. Their Deeplinks blog includes almost everything related to privacy and personal rights with an impressive amount of content delivered daily. If there is news that remotely touches on electronic privacy – whether its copyright laws, government surveillance, hacker tricks, or even just swag – you can find it here, but the blog does have a marked legal focus. Check out this article on the issue of warrantless DNA acquisition.

Privacy on the Net

  1. The Online Privacy Blog – This blog is run by the company Abine, an Internet privacy software developer with products like DeleteMe and DoNotTrackMe. The content is a mix of news about online privacy laws, security breaches, tips for keeping yourself secure while using social media and other common online services, and press releases for the company. Two articles a week is the rough release schedule. Check out a report on the surveillance capabilities of Microsoft’s next console, the Xbox One.
  2. EPIC: Electronic Privacy Information Center – EPIC is an organization that provides information with a focus on online privacy, though they do branch out into related technological fields such as biometric data, drones, and other hot button issues. The majority of the site content is in their static information, but their news feed does provide short updates on current news and events. If you want to get a quick synopsis of privacy related news without excess analysis or reading, then their blog should come in handy. The rest of the site is also extremely valuable for its large amount of educational material. Check out their news report on a Supreme Court ruling on DNA privacy.
  3. WIRED: Threat Level Blog – WIRED is a site renowned for its news and insights into the world of technology, and their Threat Level blog applies the same quality of content to the dedicated topic of privacy and the law within the context of technology. Thanks to WIRED being a news organization, the tone of the articles stays more subjective than personal or company blogs, though opinion always bleeds through in writing. Check out this opinion article on email privacy law and the lack of protection that electronic communications receive legally.
  4. Freedom to Tinker – FtT posts focus on news related to technological privacy and law alongside a large amount of insightful commentary and opinion pieces. The number of writers is smaller than you will find on some bigger websites, while still being large enough to provide more variety of opinion than a single user blog and a decent update schedule. Check out this article from 2006 on wiretapping abuse and the NSA that foretells some of the recent privacy related news.
  5. ACLU on Technology and Liberty – The ACLU is a well-known American organization dedicated to the preservation of civil liberties in every form they take. Their blog is a robust and well-developed collection of useful and informational content on a variety of topics, and because of the volume of information they cover, the blog has several subsections to help those looking for information on a specific topic. For online privacy related news, the Technology and Liberty section is where you want to go. Check out this article on metadata to see just how important it can be in light of the NSA surveillance issue.
  6. Center for Democracy & Technology Blog – The CDT is an organization similar to the ACLU but with a focus on influencing policy related to the freedom to privacy and expression on the Internet. Unlike most of the above blogs, the CDT has a broad, worldwide view and will often discuss online privacy policy from nations other than the US. There is still more focus on American and EU news, but it is refreshing to get a glimpse of the world at large. Check out one of their weekly looks at global policy for news from Syria, Japan, China, Taiwan, and Australia.
'Eyeing John Marshall Law School' photo by Seth Anderson.

Photo by Seth Anderson

Privacy Law & Policy

  1. FCC Blog – The Federal Communications Commission is an organization with which most American are familiar due to its role in radio and television broadcasts as well as the Internet. As it is a government website, you can expect a lot of dry content and not so much in the way of unique viewpoints, but it is a good idea for Americans to stay abreast of an organization that influences their online privacy to a large degree. Check out this article detailing some of the consumer protection services the FCC offers.
  2. Privacy Law Blog – The Privacy Law Blog is managed by the Proskauer law firm, a group with a focus on international privacy law. The blog content does trend to US and EU policy and law. The topics covered are usually about informing about laws concerning privacy, patents, and security and updates to them. Though the release schedule is low compared to some of the others on the list, they still tend to release an article every week. Check out this report on the conundrum of when European privacy law applies to American companies.
  3. Privacy & Security Law Blog – The editors and contributors of this blog belong to the Davis Wright Tremaine law firm, a nationwide entity with over 500 associates. Their firm handles cases covering a wide variety of subjects, but the privacy and security blog is managed by their resident expert associates on the topic. Articles range from discussion on cybersecurity, discussion of data standards like HIPAA, and news related to changing laws regarding privacy and technology. Check out their report on a recently introduced federal data breach law.
  4. Law and Terrorism – Gregory S McNeal is a security specialist and university professor who has received national recognition by news corporations, Congress, the military, and other notable organizations. His blog only features content he writes himself, leading to a low update rate with articles that trend towards his focus and activities at the time, but this does mean the content covers topics that might not be the focus of other privacy blogs at the time. Check out his article on drones and due process to see the focus of his latest work.
  5. CERIAS Blog – The Center for Education and Research in Information Assurance and Security is an organization ran by several Perdue university professors and contributors. They broach topics ranging from the technical aspects of ensuring privacy in a digital world to the ethical, moral, and legal guidelines that govern the behavior of individuals and organizations when it comes to information privacy. The blogs content is updated one or two times a month, but every article is unique, lengthy, and full of useful information on security and privacy topics. Check out their objective look at NSA’s PRISM program.
  6. beSpacific – Most of the content on beSpacific is collected news and information about privacy, law, technology, copyrights, and finance. Rather than a blog to go to for original content, beSpacific is an amazing resource and repository for documents, press releases, and other articles in the topics it covers. Content is added daily, and on many days you will find up to ten new posts. Check out the main page. There is no better way to get an idea of the bevy of information hosted on the blog.
See ID - Photo by Bryan Rosengrant

See ID – Photo by Bryan Rosengrant

Privacy & Identity

  1. Privacy Rights Clearinghouse – The PRC is a nonprofit organization based out of California whose mission is to “engage, educate and empower individuals to protect their privacy.” The blog itself is not updated frequently, but the amount of information available regarding privacy concerns on the site in general is staggering. Check out this article for a few simple tips on keeping your privacy private.
  2. Bruce Schneier’s Blog – Bruche Schneier is an internationally reknowned security specialist, a member of the board of directors of the EFF, and has published multiple books concerning security and cryptography. His blog content includes recordings of his speaking events, articles and opinions written by him, links to interesting security and cryptography articles, and important news on the same. All of his articles are well-cited and in a format that makes them both look professional and easily understood. His insights are great, and if you like his blog then you should definitely check out his published work. Check out his comparison of the privacy abuse of online companies to the Game of Thrones.
  3. Identity Theft Blog – The entire purpose of this blog and the other portions of its site is to educate people on the dangers of identity theft and how to protect themselves from those who would steal their information and put it to nefarious use. The updates are a bit slow, averaging two posts to the blog per month, but the extra content value in the rest of the site more than makes up for it. If you want to get educated on identity law, identity theft tactics, and how to protect yourself from identity theft, stop by this site. Check out this article showing how something as simple as filling in the information necessary for an insurance quote can give up compromising data.
  4. Spaf Blog – The Spaf Blog contains content written or reposted by Professor Eugene H. Spafford, an educator who specializes in digital forensics, privacy, and information security. He is also the founder and director of the CERIAS web blog listed in the above section. The original content is published roughly on a monthly schedule, but reposting occurs daily. There are over 5,000 article links on the over 500 pages of the blog. Check out the very first page for links to over a dozen high quality privacy articles.
  5. IdentityWoman – The alter ego of Kaliya Hamlin, IdentityWoman, is an intensely active force in the field of privacy information security. Her grammar and punctuation may not be perfect – meaning grammar nuts should avoid the blog – but it is to be expected given the busy schedule the super-heroine keeps. The content on the blog ranges from videos of her talks at various conferences (and “un”conferences), updates on notable privacy events, and her work in an astounding number of IT groups, consortiums, and organizations. Check out the collection of her speaking appearances for some good audio on user-centric identity.

Safety Awareness Week 2011 – NASA Goddard Space flight Center

Security

  1. Krebs on Security – Brian Krebs got into information security for the same reasons many people do these days: thanks to the attacks of hackers on his personal computer network. This sparked a long career of security writing for the Bachelor of Arts, including a long stint as a major security author for the Washington Post with several front page appearances. As far as the blog goes, it is one of the best for quality, the amount of information presented, and originality. The frequency is also very good for the general quality and being a personal blog. Check out his article on the Styx exploit package and the article detailing the story behind its creation and marketing for a look at the brazen offering of script-kiddie tools.
  2. 1 Raindrop – This blog, written and maintained by Gunner Peterson, focuses on security more from a business standpoint than it does on individual privacy and identity. The posts are long and informative, but they assume some familiarity with security issues and the technologies from which they derive. This makes it not so friendly to newcomers to the world of security, but it is more useful to those who want high level information. The blog is updated roughly three to four times a month with mostly original articles of notable length. Check out this article on mobile APIs and security, a useful and important consideration for any business.
  3. CERT – The US government’s Computer Emergency Readiness Team’s site does not officially call itself a blog, but the main page is comprised of time-ordered updates that keep you posted on the latest patches for notable applications like WordPress, Adobe, Java, and Google apps. The site should be on every CEO’s and CISO’s short list to check frequently to see if they happened to miss any important updates. They also occasionally post security bulletins and information from themselves and large IT companies. In addition to their tracking of security updates, the site features a number of resources on protecting yourself from online threats and general security information. Check out the National Cyber Awareness System, a springboard for links to information on security.
  4. Bleeping Computer – While the main page does feature a blog roll of updates and articles, Bleeping Computer is far more than just a security blog. The blog updates themselves are standard fare for a security focused blog, though the focus is clearly on education and teaching for people who might not be as tech savvy as some professionals or enthusiasts.  Once you have gotten your daily update, swing over to the forums and other information resources to get help on understanding and fixing computer problems ranging from security issues to day to day malfunctions. A great overall resource for computer users of all skill levels. Check out their guide on how to remove a tricky bit of disguised malware that disguises itself as antivirus software.
  5. Malware Don’t Need Coffee – While the writing style is haphazard and points to someone using English as a second language, there is no better blog out there if you want to know everything there is to know about the latest malware and exploit kits on the streets. The posts are extremely tech heavy, so less savvy readers will likely need to do additional research when reading. Posts come roughly every two weeks, but they are loaded with content and worth the wait. Check out this detailed and lengthy article on the ransomware called Urausy.
  6. InfoWorld’s Security Articles – InfoWorld is a news site, similar to Wired, which focuses on everything technology. Just like Wired, they also feature a dedicated section for security related articles. As with other news sites, you can expect frequent updates and original content with a more neutral tone overall. You can also branch out from security related articles into general technology news when you finish getting updated. This is a great resource to keep on hand and check daily. Check out this article on bug bounties, the new method larger IT companies are using to hunt down security vulnerabilities in their applications.

Company Blogs

Most of these companies function in the Information Security world in some form or fashion. They usually maintain fairly decent blogs as a way to generate site traffic, keep their users informed, and to increase their appearance as “leaders” in the field. You do have to watch out for product placement in some of them, but they are self-motivated to provide good and reliable information that keeps people coming back.

  1. Fortinet Blog – Fortinet is a company that produces physical and virtual firewalls alongside other network security equipment and applications. The blog sees regular contributions from five different writers, keeping things both fresh and current. Article topics are typically educational pieces on malicious IT attack forms, patch updates for major IT organizations, and security and privacy related news.Check out this post on how to determine if a seemingly innocuous email in your inbox might just be a phishing attempt or other scam.
  2. FireEye Blog – FireEye is an Information Security company with a focus on antimalware applications, penetration testing, and overall system protection. Their blog focuses on the latest trends and tools in malicious cyber activity, and there is a definitive slant towards tech-heavy articles. A great resource, but those less inundated in the world of IT may have to spend some time with Google to get the full value that the articles represent. The speed of their updates is a bit slow for a company blog, averaging two to three posts a month. Check out this informative post concerning a Trojan that recently swept across Asia.
  3. Kaspersky Blog – Kaspersky is most widely known for their antivirus and antimalware applications. There is a bit more “Yay Kaspersky products!” in this blog compared to some of the other companies, but it still manages to get balanced out by the actual information. Check out their article detailing the dangers and costs of employees misusing networked devices while on the job.
  4. SANS Securing the Human – SANS is a company that works to increase security on what is most often the biggest weak point in a network, the human user. On their blog, you will usually find articles relating to attacks that attempt to take advantage of the user, such as phishing attempts and other social engineering scams. They also have a monthly newsletter full of extra material. Check out their look at passwords, one of the biggest mistreated tools in keeping things secure.
  5. TrendMicro Blog – Like Kaspersky, TrendMicro focuses on malware detection, prevention, and removal software. The blog itself tends to focus on preventative measures against malware and other security related issues. The update schedule is fairly slow for having multiple writers, but there is no rehashed content. Check out a post on the dangers of media overflow when it comes to your pictures and other digital information that ends up stored on the Internet, forever.
21

30 Best Fictional Detectives

Introduction

 

A good mystery should be a treasured find. Accompanying an investigator on their adventures as they try to undercover the truth or track down a criminal is an experience like no other, no matter what style of detective they are. Nothing works up adrenaline like accompanying a hard-hitting detective tracking down a murderer.  Nothing excites the logical parts of the mind like seeing a skill sleuth unravel the convoluted trappings of a mastermind’s schemes. And nothing is quite as hilarious as watching a bumbling detective stumble through an investigation, cause mayhem, and still somehow end up solving the enigma. While it is hard to whittle off many of the great detectives that have been created for humanity by the minds of writers throughout the years, we have undertaken that difficult task and came up with 30 of the best fictional detectives in history.

In No Particular Order…

 

Picture courtesy of Flickr user dynamosquito

Sherlock Holmes – No list about the best fictional detectives will ever be complete without this infamous gentleman detective from the mind of Sir Author Conan Doyle.  Detective Holmes has been the inspiration for many, many investigative characters since his birth in the late 1800s. He has been reimagined on stage, in radio shows, and quite a few movies.  As a detective, he is known for his logical reasoning, early use of forensic science, and penchant for costume.  Quote: “Elementary, my dear Watson” In truth, this was never uttered by our esteemed Holmes but it is nevertheless representative of the character and his attitude.

The Hardy Boys – Inspiring the adventures of young boys since 1927, Frank and Joe Hardy, the teenage brother detectives, have appeared continuously in print, have starred in computer games, television shows, and even been parodied in South Park. The earliest books were praised for the excellent writing of a caliber not normally found in children’s books of the era. Surrounded in a rather felonious small American town, they play perfectly bonded intelligent young men with free access to cash as they weave their way through the mystery and action that lands in their path.  Quote:  “A secret door!” Joe said. “We haven’t’ seen one of these in, oh, several months,” Frank said.

Nancy Drew – Much like theHardy Boys, Nancy Drew has been inspiring girls since the 30s. The character was even the brainchild of the Stratemeyer Syndicate, the same group responsible for the Hardy Boys. Nancy was an immediate hit and has seen continued popularity ever since. My like the Boys, she’s appeared in television, movies, and video games. She has been an inspiration for a number of other girl detectives, and kick started a genre all its own. She is well known for having a can-do attitude, especially noticeable in her ability to drive and fix up her own car. Despite attempts to keep her domesticated by generations of ghost writers, Nancy has managed to maintain her independent quality. Quote: “If a guy’s hunch results in a dead-end, don’t flaunt your better judgment and intuition in front of him. Smirk secretly to yourself.” – The Phantom of Pine Hill

Miss Marple  – The brainchild of Agatha Christie, Jane Marple appeared in 12 novels and 20 short stories as an elderly spinster who fills up her free time resolving the assorted mysteries in her home of St. Mary Mead. She is the counterpart to the gentlemen detective genre, a well-bred, well-educated older woman applying her keen wit, experience, and knowledge to the challenges of solving crime. The character evolved markedly over 40 years, starting off as a shrill and nasty gossip and growing to a more dynamic and well-rounded genteel lady. She had a remarkable tendency to connect every case to a story of her past and casual comments to key details of her current case. Quote: “People with a grudge against the world are always dangerous. They seem to think life owes them something. I’ve known many an invalid who has suffered worse and been cut off from life much more… and they’ve managed to lead happy contented lives. It’s what’s in yourself that makes you happy or unhappy.” – A Murder is Announced

Dirk Gently– This fictional detective created by Douglas Adams was introduced in the books Dirk Gently’s Holisitc Detective Agency and the Long Dark Tea-Time of the Soul. His real name is Svlad Cjelli which, as Dirk puts it, has a ‘Scottish dagger feel’ to it. Known for his ‘holistic’ approach to investigations, Dirk uses this to justify his extensive bills which include things like tropical vacations. Surprisingly, none of his clients ever manage to actually pay him. He is also a psychic in denial, believing himself to have a ‘depressingly accurate knack for making wild assumptions.’ He was supposed to appear in a third book, The Salmon of Doubt: Hitchhiking the Galaxy One Last Time, but it was never completed. Quote: “Don’t you understand that we need to be childish in order to understand? Only a child sees things with perfect clarity, because it hasn’t developed all those filters which prevent us from seeing things that we don’t expect to see.” – Dirk Gently’s Holistic Detective Agency

Philip Marlowe – Arguably one of the most significant figures in the ‘hardboiled crime fiction’ genre, Marlowe was first created by Raymond Chandler in 1939 for The Big Sleep. He also appeared in Farewell, My Lovely, and The Long Goodbye. This was followed by a number of films, radio shows, television adaptations, and one videogame. Philip is the hard drinking, gruff yet oddly charming PI. His rough personality is rounded out with a thoughtful mind well versed in poetry, philosophy, and a fair hand at chess. He drinks whiskey and is finicky over his coffee. The femme fatales common to the genre aren’t nearly as adept at distracting him.  Quote: “I don’t mind your showing me your legs. They’re very swell legs and it’s a pleasure to make their acquaintance. I don’t mind if you don’t like my manners. They’re pretty bad. I grieve over them during the long winter nights.”  – The Big Sleep

Picture courtesy of Flickr user California Cthulhu (Will Hart)

Sam Spade – Though not as widely appearing as some of his peers on this list, Sam Spade nevertheless left an indeliable mark upon the detective genre. Famously portrayed by Humphrey Bogart in one of the movie adaptations of his book, The Maltese Falcon, Sam Spade is not at all a gentlemen detective. He’s a shifty character capable of getting himself in and out of fixes with equal skill. Despite disliking his partner, even sleeping with the man’s wife, he goes all out when the man is murdered to bring his killers to justice. Quote: “The cheaper the crook, the gaudier the patter.” – The Maltese Falcon

Lord Peter Wimsey – Lord Wimsey is an archtypical representative of the British gentleman detective as conceived by Dorothy L. Sayers. He appeared first in Whose Body? In 1923 and subsequently solved murder mysteries in another 13 novels, 5 short stories, and assorted stage, television, film, and radio adaptations. In addition to solving assorted murders in his spare time, the great Lord Wimsey authors his own books, including ‘Notes on the Collecting of Incanabula’, his other genteel hobby. He is also a wine, fashion, and classical music aficionado. The character was in part a light satire on the British upper class.  Quote: “It’s all right, Helen. That’s not swearing, that’s an adjective of quality.” – Clouds of Witness

Hercule Poirot– Around for a remarkable 55 years and appearing in 33 novels and over 50 short stories, Mr. Poirot has been a fixture in the detective genre for many years. Created by Agatha Christie alongside Miss Marple, this dignified Belgian detective solves crimes with the use of logical reasoning, or as he puts it ‘order and method’. Mr. Poirot also appeared on stage, in a number of film adaptations, several television shows, an animated series, and a number of radio dramas. Quote: “Chief Inspector, you have been thinking again. I have warned you of this before.” – Hercule Poirot’s Christmas (#6.1)

The Scooby Gang – The gang of animated teenaged friends (and one oversized dog) solve mysteries much to the dismay of the perpetrators whose plots they foil. These meddling kids include an unlikely array of friends, the All-American teen couple Daphne and Fred, the intelligent and shy Velma, the fumbling and perpetually starving Shaggy and his trusted sidekick and trouble-maker Scooby. These teens have a knack for shattering attempts to use fear of the supernatural to conceal criminal activity. Their antics inspired many television series, a number of films, video games, and stage performances. Quote: “Velma, here’s the only thing you ever need to know about boys. They are stupid. If you give a boy two choices, a smart one and a stupid one, he will always make the stupid one every time. That’s why you never give them a choice.” – Daphne Blake in Scooby-Do! Mystery Incorporated

Picture courtesy of Flickr user ostromentsky

Columbo – A homicide detective for the LAPD, Peter Falk is a gregarious, slightly rumpled detective who manages to get the job done in part because most of his targets underestimate him. He tends to talk too much and often seems to be a bit of an airhead, though in reality he has a keen attention to detail and a quick wit that helps him piece together the events of the crimes he investigates. The series ran for 10 seasons from 1972 till 1990 and continued in special runs as recently as 2003. Quote: “Perfect murder, sir? Oh, I’m sorry. There is no such thing as a perfect murder. That’s just an illusion.” – Columbo: Now You See Him (#5.5)

V.I. Warshawski  – Warshawski is a woman in charge: sexy, smart, and packing heat. After earning a law degree and serving as a public defender, she decides to go the route of the one pursuing justice on the streets, particularly in the case of white-collar crimes that might not get as much attention from the police in the gritty world of Chicago politics. The fierce detective is not afraid to get into the melee, making it quite amusing that her best friend is the one who treats the war wounds from her escapades. Due to her ferocity and strength, Washawski is considered by many to be a strong, feminist detective. Quote: “Never underestimate a man’s ability to underestimate a woman.” – V.I. Warshawski

Dr. Temperance “Bones” Brennan – Based loosely on real life real life anthropologist and author, Kathy Reichs, Dr. Brennan represents a very unique sort of detective on this list. She solves crimes current and ancient with her companion FBI agent, Seeley Booth and a crew of brilliant and eccentric scientists housed at the Jeffersonian Institute on the TV show Bones. Her top-of-field expertise in forensic anthropology allows her to unravel clues from the bones of the victims. Her no-nonsense attitude and adherence to an absolutely logical worldview both aides in her field investigations, generating a lot of unintentional hilarity along the way. The character also applies her professional knowledge to her writing career, becoming a bestselling author of crime novels during the course of her show. Quote:  “I’ve noticed that very few people are scary once they’ve been poked in the eye.” [to murderer who is trying to put a voodoo curse on her, so she pokes him in the eye to shut him up] – “Bones: The Man in the Morgue (#1.9)

Perry Mason – Mason is one of the most famous and prolific figures in recent detective fiction. Featured in close to 100 novels, a radio series, two television series, and over 30 made-for-TV movies. As a defense attorney, he was known for not shying away from the most difficult and hopeless cases and always fighting to the end for his clients. He does engage in some questionable actions early on in his history, but for the majority of his existence, Mason is an ethical idealist who sticks to the books and wins his cases by his wits and the evidence. The Mason stories do conform to a predictable pattern, but the enjoyment is in the details. Quote: “She’s more of a legitimate fake than I thought she was.” – The Case of the Curious Bride

Elijah Baley– Though he does not appear in a large number of works, Baley’s impact on the world Isaac Asimov created is profound. There are only four stories that feature Baley: The Caves of Steel, The Naked Sun, Robots of Dawn, and a short story titled Mirror Image. He operates in a world far different from ours, where robots are commonplace and Earth is filled with humans who live in enclosed cities. The mysteries Baley investigates are worthwhile for their whodunit quality, but they also investigate questions of a sci-fi nature and connect to the greater works of Asimov. Quote: ““The work of each individual contributes to a totality and so becomes an undying part of the totality. That totality of human lives–past and present and to come–forms a tapestry that has been in existence now for many tens of thousands of years and has been growing more elaborate and, on the whole, more beautiful in all that time. Even the Spacers are an offshoot of the tapestry and they, too, add to the elaborateness and beauty of the pattern. An individual life is one thread in the tapestry and what is one thread compared to the whole?” – Robots and Empire

Harry Dresden – Part detective, part fireball-throwing wizard, Harry Dresden has the unenviable task of solving mysteries in a world where things do not always conform to the rules of nature and science. The Dresden Files, the name for the book series and the short-lived television series, follows Harry through a world of vampires, werewolves, spirits, and crimes both mystical and mundane. Harry himself is a tough, stubborn young man with a sharp wit he used for detective work and pithy remarks against antagonists. Did we mention he can shoot fireballs? Quote: “Laugh whenever you can. Keeps you from killing yourself when things are bad. That and vodka.” – Changes

Kinsey Millhone – The main character in Sue Grafton’s alphabetically named series of detective stories, Kinsey Millhone is a feisty woman who has never quite played by anyone’s rules but her own. She was a delinquent as a teenager, dropped out of academics to pursue police work for more action, became an insurance investigator after that proved boring, and finally went on to become a private detective. The books are well-written murder mysteries that pit Millhone into tough situations only to prove she is tougher and smarter than anything that comes her way. Quote: “You can’t save others from themselves because those who make a perpetual muddle of their lives don’t appreciate your interfering with the drama they’ve created. They want your poor-sweet-baby sympathy, but they don’t want to change.” – T is for Trespass

Photo courtesy of Flickr user cdrummbks

Dave Robicheaux – James Lee Burke’s bad boy detective patrols the swamps of New Iberia, Louisiana, managing to break most of the rules, fight off his inner demons, and still catches the criminals at the end of the day. Some readers may find Robicheaux an overly cynical and irritable antihero, but the character is rounded underneath the wooden exterior. The murder and mayhem in the books is as gritty and dark as Dave, setting the stage for an enjoyably gruesome world of murder mystery. Quote:  “When people make a contract with the devil and give him an air-conditioned office to work in, he doesn’t go back home easily.” — In the Electric Mist With Confederate Dead

Photo courtesy of Flickr user Jeffrey Beall.

Charlie Parker – It is difficult enough to be a detective, and dealing with supernatural horrors at the same time makes it a true challenge. John Connolly’s underappreciated work is a wonderful world to dive into for those looking for a more obscure detective series. Parker himself is a bad boy in a bad world, and Connolly masterfully blends the touch of supernatural horror alongside the shadow of mystery. The horror and supernatural elements do come to take on a greater focus as the series progresses, so if you are looking for a realistic detective series, the Charlie Parker series may not be the best bet. Quote: “Why did you shoot him?” “You weren’t around,” I replied, my teeth gritted in pain. “If you’d been here I’d have shot you instead.” – Every Dead Thing

Image courteys of Flickr user scampion

Harry Bosch – Hieronymus Bosch, called Harry by most, had a rough time as he grew up. He was born to a prostitute, did not know his father until much later, his mother died when he was 11, he bounced between foster homes, and ended up in Vietnam while still a teenager. Despite the fires Michael Connelly put his detective through, Bosch turns out to be an all-around good guy who believes in doing the right thing, even if it means going against the norm or the boss. If you find yourself making it through all 16 Bosch novels and still wanting more, check out Connelly’s Mickey Haller series. Quote: “Everybody counts or nobody counts.” – Personal motto of Harry Bosch.

Bobby Goren – A main character in the Law and Order spinoff Criminal Intent, Goren is a dogged investigator with an attitude and a sometimes violent temper. His passion for justice is the main cause of his occasional rages, but there is no questioning that he gets the job done, even if criminals have to be wary of him for more than just the high likelihood of him putting them in chains. Law and Order stories are always gripping, and Bobby Goren is one of our favorite lead investigators throughout all of the spinoffs for blending humor and skill while being vulnerable enough in his emotional issues to be relatable. Quote:  “The only medical condition you have is denial.” – Law & Order: Criminal Intent: Jones (#1.5)

Batman – The Dark Kinght might seem to be a poor example of a detective if you were to base your opinion off just the recent movies starring Christian Bale, but the real Batman does just as much investigation as he does bad-guy stomping. Armed with the latest in technology  for whatever era he is in at the time, photographic memory, and sharp analytical skills, Bruce Wayne is the only one who can root out the hidden plots of the nefarious super criminals in Gotham City. Of course, once he does find out what they are up to, he puts the fear of the bat into them. Between multiple comic book series, cartoons, live action shows, movies, and games, you will have trouble getting through all of the available material on Batman without devoting time to him every day. Quote: ­­­­“He thinks he can scare me. He thinks he can stop me. There’s nothing wrong with him a bullet in the head won’t fix.” – Batman Detective Comics Vol 1 734, Mark of Cain:2

Dick Tracy – The world of Dick Tracy is a dark one inspired by the feel of Chicago in the 1930s, full of grotesque and cruel villains, backstabbing, and the hopelessness of the fight against crime. You can draw many parallels between Batman and Dick Tracy: both are detectives, fancy gadgetry becomes important later on in the Tracy series, and both have cities plagued by demented criminals. Tracy is the less skilled detective, though that could be due to his cases being relatively simple, but he has the everyman spirit that billionaire Wayne can never have. Quote: Breathless Mahoney: “Thanks for calling. I was beginning to wonder what a girl had to do to get arrested.” Dick Tracy: “Wearing that dress is a step in the right direction.” – Dick Tracy (1990)

Dr. R. Quincy, M.E. – One of the first shows to include hard forensic science, Quincy M.E. follows the work of forensic pathologist R. Quincy, whose first name was never clearly given. A gentleman and a scholar, Quincy uses his position as a medical examiner to probe into their deaths and root out the real killer. Later on in the series, he even finds himself in the middle of deep social issues of the time. If you want a taste of the original version of CSI, check out Quincy M.E. Quote:  “Gentlemen, you are about to enter the most important and fascinating sphere of police work: the world of forensic medicine, where untold victims of many homicides will reach back from the grave and point back a finger accusingly at their assailant.” – Quincy M.E.: Go Fight City Hall… to the Death (#1.1)

Lennie Briscoe – A major character in the Law and Order universe, Briscoe was the head detective in the original series and had appearances in both the Trial by Jury and Special Victims Unit spinoffs. His quips at the crime scene, sharp one-liners, cool demeanor, and dry wit belie his dedication to his work and getting to the truth. The best part about getting to know Briscoe is that you have almost 300 episodes in which to do it. You will also likely come to enjoy Briscoe’s interactions with his two partners: the stodgy and moral Curtis, and the brash rule-bender Green. Quote: “Love: a devastating disease instantly cured by marriage.” – Law & Order: Couples (#13.23)

Inspector Gadget – Another on our list who began as a cartoon, Inspector Gadget could be considered a defective detective, reminiscent of other simpleton detectives like our next one. Luckily, being a cyborg full of interesting tools like a helicopter, spring-loaded feet, and other crime-fighting tools keeps him going in the crazy situations in which he puts himself, and the crimes always end up being solved thanks to the work of his daughter, Penny, and their intelligent and aptly named dog, Brain. Quote: “It’s like I always say, Penny: If you can’t lick ’em, join ’em. Then lick ’em.” – Inspector Gadget, Down on the Farm

Inspector Clouseau– Proving that you do not have to be smart to be a successful detective, at least in the world of fiction, Clouseau is the epitome of the bumbling detective archetype. Even the above detective’s outfit was based on Clouseau’s typical attire, as homage to the older compatriot. Despite Clouseau failing at even the most basic investigative tasks in dramatic fashion, he always seems to come out ahead and solve the case. His unlikely successes are so far beyond the realm of reason that they even drive other characters in the story insane. To catch the first appearance of Inspector Clouseau, watch the original The Pink Panther from 1963. Quote: ”There is a time to laugh and a time not to laugh, and this is not one of them.” – Inspector Clouseau (1968)

Adrian Monk – Portrayed by actor Tony Shalhoub, Adrian Monk is a neurotic mess. Once a successful detective, the death of his wife due to a car bomb possibly intended for him exacerbated his obsessive compulsive disorder and various phobias to the point that he could no longer function on the force. Eventually, his keen powers of observation and great detective work get him pulled back in as a consultant, though his issues make every adventure even more challenging than it is for a saner person. The show and Shalhoub have won multiple awards, and there are several connected books if you finish the series and crave more. Quote: Sharona Fleming: “Are you sure you’re not getting your hopes up?” Adrian Monk: “That’s what hopes are for.” – Monk: Mr. Monk Goes to the Carnival (#1.5)

Spencer is pictured sitting in the front and center.

Shawn Spencer – Spencer is the lead character in the television series Psych. A child at heart, Shawn never professionally studied how to be a detective, instead learning the powers of observation – to the level of an almost photographic memory – and deduction from his detective father. After a string of failed jobs as an adult and with no credibility to his name, he does what any would-be detective would do: pass off his heightened awareness as extra sensory perception. Accompanied by his best friend, a pharmaceutical salesman named Burton Guster, Shawn begins to solve cases for the Santa Barbara PD while maintaining a façade of supernatural power, delivering pithy humor, childish antics, and daredevil actions. While his appearance is limited to the show, he is still one of the best and most entertaining detectives you will find. Quote – “Oh, you mean my pilot’s license? That’s out back in the Cessna. Or perhaps you’re referring to my license to kill. Revoked. Trouble at the Kazakhstan border. I could give you the details but then I’d have to kill you, which I can’t do because my license to kill has been revoked.” – Psyched: Poker? I Barely Know Her!

Magnum P.I. – Despite being somehow down and out regardless of a string of private cases, Magnum lives one of the most lavish lifestyles of any detective on the list. Set in the scenic Hawaii and in the same fictional universe as Hawaii Five-0, Thomas Magnum is equipped with a number of useful tools: a helicopter pilot friend, an amazing sports car, a glorious mustache, and the best Hawaiian shirts available.  He is also notable for being one of the first depictions of a Vietnam veteran. With beautiful women, interesting cases, and tons of action, Magnum P.I. should be on the short list for anyone looking for a detective series to watch. Quote:  ”I’m not really sure which kind of private investigator I am. The Holmesian-type with the constant deductive mind, or one with a Marlowe-type intuitive sense of the darker side of human nature? Hopefully a combination of both. At any rate, it doesn’t matter. Not when you have a “little voice”. I don’t know, maybe a gently nagging “little voice” is just another way of adding what you know, to what you feel, but right now mine wasn’t “gently nagging”. It was screaming.” (Narration) Magnum P.I., Round and Around (#6.6)

 

25 Best Privacy Apps

Looking for the best apps to protect yourself and your family on your mobile devices? Check out this list, which brings you the best in anti-spyware, anti-virus, phone trackers, data lockdown, and more.

Educate

  1. Clueful – Applications aren’t often clear about what information they are accessing, nor how they intend to use and distribute it once obtained. Clueful helps illuminate this process by running audits on all your existing applications and providing you with clear cut, no-nonsense reports on what applications are leaking about you. It gives you a quick-look at your app’s security with a score, and alerts you promptly when an app is abusing privacy standards. For a subscription fee, you can upgrade the service to include a constant monitor that will lock, locate, and wipe your phone in the event it gets stolen. Also available for iOS. Price: Free.
  2. Protect My Privacy – This application is being developed by UC San Diego as a way of helping them examine privacy on mobile devices. To that end, they collect anonymous data transmitted securely over SSL. Users can choose to not provide data to the study. For users with cracked iPhones, any application attempting to acces your data must first get approval. A message pops up informing users of what data the app is attempting to access, and allows you to fake credentials in some cases, deny access, or allow it. Some data is scrambled to provide an additional layer of protection. Only available for iOS. Price: Free.

Eraser

  1. History Eraser – This simple application makes it easy to wipe sensitive information from your phone, including browser history, call logs, text messages, market searches, clipboard data, and more. Useful for those interested in protecting privacy, but also for those who want to free up storage on their phone. One quick tap will clear your data. Also available for Chrome. Price: Free.
  2. Last Pass – This application has demonstrated its effectiveness for browsers, its mobile version is equally powerful. It automatically fills in forms for every saved site, generates powerful passwords, allows users to add and alter notes and sites easily. Audio and images can be attached to secure notes as well. Also available for iOS, Windows 8, Mac, Linux, BlackBerry, and most other mobile OS. Price: Free 14 day trial, $1 per month pass afterwards.
  3. Delete Me – While not quite a mobile application, this exceptional service can completely remove your sensitive and personal data from the hands of data brokers online, ensuring that private photographs and personal data stay secured. Price: $129 annually for one person, $229 for two people annually.

Photo courtesy of Flickr user Robbert van der Steeg

AntiVirus

  1. McAfee WaveSecure – Recognized in 2010 for excellence from CNET, The NY Times, PC World, Lifehacker, and others WaveSecure offers a solid mobile security package for a good price. It includes lock and wipe features that give you control over a lost or stolen phone, backup and restore to allow you to store important data on the cloud, even after the phone has gone missing, and recover it when necessary from a web-based application.  Locate and track features help you pinpoint the lost phone on a map, set it screaming to make it easy to snag, and allows you to track calls being made on the phone.  Also available for BlackBerry, Symbian OS, Windows Phone, iOS, and Java. Price: 7 day free trial, after which it costs $19.99 annually.
  2. Lookout Security & Antivirus – This application gained recognition from PC Mag Editor’s Choice for being excellent, from TechCrunch as one of the top 10 best free apps, and PCWorld ranked it 5 out of 5 stars. It offers excellent antivirus and malware protection in apps, email attachments, or files. It scans number for dangers and alerts users to potential hazards, blocks  websites that could potentially be harmful, and offers a Privacy Advisor to alert users to what information their apps are attempting to access. It also features a web-based phone finder that utilizes Google Maps to pintpoint your lost phone, lets you make your phone scream to identify it, snap photos of users who attempt to access it while lost, and even remotely lock or wipe your phone. Users also can backup vital phone data and restore it in the event of a wipe. Also available for iOS. Price: A free two-week trial, users can continue using a pared down version for as long as they like after. Premium has a monthly fee.
  3. Webroot Security & Antivirus – Webroot was recognized as one of the best free android apps of 2011 by PCWorld, recognized for its unique features from PC Magazine, for being one fo the best security applications by Tech of Web, and Uberphones said it was ‘a must for Android users.’ It features a powerful antivirus that automatically scans and blocks malware, viruses, spyware, and Trojans and alerts users to settings that put the device at risk. It offers remote access to lock, wipe, scream, or locate your phone when it is lost or stolen. Premier grants the use of App Inspector, which alerts users to apps that access private info, drain money, track location, or drain the battery. It helps maximize battery usage and network access. The program itself is lightweight and not a drain on battery life. Available for iOS and Android devices. Price: $19.99 per device in a year.
  4. NQ Mobile Security & Antivirus – This app offers a powerful antivirus that scans and protects users from all the typical threats, as well as keeping users up to date with security databases. It protects while web browsing against phishing, fraud, and other dangers. A real-time app scanner alerts users to potential problems, and it includes anti-eavesdropping protection designed to detect spyware programs installed on the phone. It features a remote phone locator and offers backup of sensitive data as well as a call and SMS blocker to protect against harassing calls and messages. A system optimizer keeps your device operating smoothly. Only available for Android devices. Price:  Free trial for blah weeks, $19.99 per device, per year after for access to Premium features after.
  5. Norton Mobile Security Lite – As with its competitors, Norton Mobile Security offers a powerful antivirus that keeps users safe when browsing the web, accepting files, or downloading apps. It also offers remote wipe, tracking, and locking capability and SD card scanning.  It continuously scans and alerts users to potentially dangerous apps. Also available for iOS. Price: Free pared down version, and Premium access costs $29.99 for one year on one device (currently on sale for $17.99)

 

Photo courtesy of Flickr user briggz5d

  1. Avast! – This top-rated security app offers both anti-virus and anti-theft capabilities to ensure your phone is well protected against most eventualities.  The software developer has been around for 20 years and the app has been recognized for its excellence by PCAdvisor, Droid-Life, AndroidPolice, AndroidAuthority, and Android and Me. Lost your phone? Use a web-based interface to control your phone remotely, locate it on a map, and lock the device till you can snag it. You can even activate a siren and wipe its memory. Only available for Android devices. Price: Free.
  2. Kaspersky – A fairly straightforward anti-virus and security application that offers its users a powerful defense against viruses, Trojans, malware, and spyware which runs over-the-air to keep the program lightweight. It offers GPS location services to locate the phone if it goes missing or stolen, and remote access to lock and wipe your phone, take a ‘Mugshot’ of anyone who uses it, and remotely activate an alarm. Users can filter incoming calls and text messages to screen unwanted contacts.  In addition, users can conceal calls, contacts, and other data from casual snoopers. Available for Android only. Price: One year subscription costs $14.95.
  3. F-Secure – A European based application that protects mobile devices with a combination of antivirus, anti-theft, and screening tools. Users can filter out adult and other unsuitable content from web content and applications, block unwanted calls and text messages, remote locking and wiping, and remote location detecting. Available for Android and Symbian. Price: 14,95€ for a one year subscription with a free 30 day trial.
  4. Virus Barrier – This Gizmodo app of the day offers iOS users a solid and intuitive antivirus to protect them against intrusions from files, web browsing, and applications. It automatically updates to keep on top of new threats, repairs infected files, and keeps logs of scans, detected threats, and repairs. Only available for iOS. Price:  $0.99

App & Data Lockers

Photo courtesy of Flickr user flakeparadigm

  1. Smart AppLock – Smart Lock is a lightweight application designed to give you greater control over privacy on your mobile device. Set a list of protected applications, then create a lock pattern or password, and your friends and family can no longer access apps you don’t want them in, including SMS, mail, photos, and contacts. Only available for Android devices. Price: Free.
  2. Gallery Lock – Named app of the year by Times Magazine, this handy application makes it easy to keep your private photos away from the eyes of phone snoops. The intuitive program makes it easy to create your own folders and conceal your photos and videos in a beautiful and feature rich application. It has the capacity to run in stealth mode to keep others from being aware of your hidden images. Use a PIN pattern to access your data. Only available on Android. Price:  Lite version is free, Premium unlocks additional features.
  3. App Defender – This straightforward app prevents access to applications. Users can set a unique password for each individual app. After three failed attempts to access an application, it displays the number of failed attempts to alert the owner to the access attempts. Only available for Android. Price:  Free trial, after which it costs $3.13.
  4. Picture Safe –   This application offers advanced protection for your mobile device’s private information. It allows you to create custom folders to organize your data how you wish, decoy icons and screenshots to fool snoopers, a fake calculator entry screen with 8 digit PINs for highly secure access, dual passwords to allow access to ‘safe’ and protected photos, and much more. Hide everything from phone records, photos, and web access. Only available for iOS, including iPhone, iPod Touch, and iPod. iOS 5.0 or later editions, optimized for iPhone 5. Price: $1.99 (currently on sale for $0.99)
  5. Snap Secure – This application offers a range of unique and helpful features designed to make your mobile device a powerful security tool. It features real-time tracking of members that can be viewed on a map from a related mobile device or the web, helpful for keeping track of children or partners. Have teenagers? The motion-activated driver safety feature stops users from texting, calling, or web surfing while on the road. Footprints allows you to track the movement of the device using GPS, giving a clear picture of the movement history for any attached device. It also allows you to create safety zones and sends alerts when a device moves out of that defined territory. Finally, if a user finds themselves in dire circumstances, it offers a panic button that promptly calls 911 or alerts an emergency contact with location information via email, phone, or text. Available for Android, iOS, Windows, or Blackberry. Price: Free basic account, after which it costs $499 a month for a single user and $9.99 a month for a family plan.

 

Other Nifty Apps

Photo courtesy of Flickr user geoffeg

  1. Gibberbot – Recognized by PC Mag as one of the 100 best Android Apps of 2013, this application allows you to securely chat with friends across a range of platforms in one streamlined place, with powerful off-the-record encryption. No ads, easy to use, and available in many languages. Plus the chat program has fun built-in features like custom icons and wallpapers. Also available for iOS, Mac, Linux, and PC. Price: Free.
  2. Anti-Spy Mobile – Homebrewed spies are being blessed with a wide variety of tools to dig into your private and personal information. One growing method is to conceal an application on your mobile device to intercept communication, application use, and web browsing habits.  Stop that in its tracks with this application, which scans for and automatically removes any of these applications. Also available for iOS. Free: This version is completely free, a premium version offers a few additional features.

Locate Lost Phones

Photo courtesy of Flickr user gorbould

  1. SeekDroid: Find My Phone – While many of the antivirus programs offer a basic phone finder program, this one goes above and beyond. In addition to remote location, locking, and wiping, it allows users to create GPS breadcrumbs to track the movement of the lost or stolen phone, access recent calls, retrieve important data, and remotely wipe SD cards. The program itself can be hidden from display and made impossible to remove. It has almost no battery drain. Only available for Android devices. Price: $4.99
  2. Plan B – Many of these applications are focused on preventing loss and damage to your phone. Plan B is for follks who were not quite as proactive. If your phone gets lost or stolen, Plan B helps you locate it after the fact. You can install it remotely and it will start utilizing cell towers and your phone’s GPS to track its location every ten minutes. Users will get an email or text message with the current location of the phone each time it is located. Once the phone is recommended, you can revert back to the preferred ‘plan A’ and download any of the other excellent security apps that include tracking and other security features. Only available for Android devices. Price: $1.99
  3. iHound Software – Utilzing GPS, Wifi, 3G, or Edge signals built into your mobile device, iHound tracks its location every 10 minutes and reports it to a web application. Users can remotely lock and wipe their phone and directly instant message their phone to communicate with anyone who picks it up. Further, users can set it up to automatically alert opted-in programs like Facebook, Foursquare, and Twitter to keep friends up to date on their location. Also available for Android and iOS. Price: They offer a free 7 day trial, after which the program costs $3.99 for an annual subscription.
  4. GadgetTrak – This iOS-focused app will help you keep your phone secure in the unfortunate event it gets lost or stolen. It uses a combination of GPS and WiFi  alongside cell tower triangulation to keep accurate tracking of the phone’s location. Each time the phone is tracked, it will send users a detailed account of its location. Automatic camera captures will let you know who has the phone. Once the tracking has been activated, no software settings can be modified, and all collected data is sent through a secure SSL connection. Only available for iOS. Price: $3.99

 

 

 

Solitary Confinement in the United States is Worse then Iran [INFOGRAPHIC]

EMBED THIS INFOGRAPHIC ON YOUR SITE

(use this code to ensure proper source attribution)

PRISM: Everything you need to know [Infographic]

EMBED THIS INFOGRAPHIC ON YOUR SITE 

(use this code to ensure proper source attribution)