270 Posts

Larry Loeb

Principal, PBC Enterprises

Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek. He wrote for IBM's DeveloperWorks site for seven years and has written a book on the Secure Electronic Transaction Internet protocol. His latest book has the commercially obligatory title of Hack Proofing XML. He's been online since uucp "bang" addressing (where the world existed relative to !decvax), serving as editor of the Macintosh Exchange on BIX and the VARBusiness Exchange.

Written By Larry Loeb

Study: Users Cleaning Up Password Security Habits

Upon analyzing a massive password dump, Duo Labs concluded that users are slowly but surely adopting recommended password security best practices.

Locky’s Distributors Launch Jaff Ransomware

Jaff ransomware is a new variant from the authors of Locky. It works in a similar manner, but is much more expensive for its victims.

Fatboy Ransomware Targets Users With Big Mac Index

Fatboy ransomware recently added location-based pricing along with extra service for cybercriminals looking for ransomware-as-a-service.

The Calm Before the Storm: Achieving GDPR Compliance Before It’s Too Late

Companies in the EU and organizations that conduct business in the region must achieve GDPR compliance before the regulation takes effect next May.

Nowhere to Hide: The Tor Browser Profiles Itself

Security researcher Dr. Neal Krawetz reported that the Tor browser discloses details that could enable fraudsters to deduce individual use patterns.

New Mac Malware Targets User Communications

A new Mac malware has appeared, targeting mostly German users through a phishing email scheme and aiming to collect private, encrypted communications.

Did An IoT Device War Take Down Sierra Tel?

On April 10, Sierra Tel discovered that its IoT device modems had been bricked, possibly by a vigilante trying to neutralize rogue devices.

Stealthy Remote Access Trojan Resurfaces

A remote access Trojan remained undetected for several years due to its unconventional operating methods. Here's what to know about the Cardinal RAT.

Stuxnet: The Computer Worm That Keeps on Living

Kapersky Labs explained that the life of a computer worm exploit doesn't end with the release of a security patch. Stuxnet is one example.

Big Changes Around the Corner for the IoT

The IoT is transforming before our eyes due to increasing regulations, growing demand for security standards and advancements in the telecom industry.