264 Posts

Larry Loeb

Principal, PBC Enterprises

Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek. He wrote for IBM's DeveloperWorks site for seven years and has written a book on the Secure Electronic Transaction Internet protocol. His latest book has the commercially obligatory title of Hack Proofing XML. He's been online since uucp "bang" addressing (where the world existed relative to !decvax), serving as editor of the Macintosh Exchange on BIX and the VARBusiness Exchange.

Written By Larry Loeb

Airline Phishing Attack Targets Businesses

Barracuda Networks observed a phishing attack that used fraudulent airline tickets to trick victims into volunteering corporate credentials.

Security Tools Must Adapt to Fileless, Nonmalware Attacks

An attack doesn't need a special file to be malicious; it can use previously existing system structures, prompting the need for new security tools.

Security Professionals Leave Social Media Accounts Vulnerable, Survey Reveals

Security professionals who fail to secure their social media accounts create openings for cybercriminals to access more critical, work-related data.

Malware Attack Targets Open Source Developers

A recent phishing campaign targeted GitHub developers with Dimnie malware, which enables fraudsters to alter open source code packages.

FBI Warns About FTP Server Vulnerability

An FTP server, and especially anonymous FTP services, can be a significant security flaw that puts health care offices at risk.

Symantec’s SSL Certificate May Get Cut Off by Chrome

In response to alleged violations, Google announced that its Chrome web browser will not trust an SSL certificate from Symantec for more than 279 days.

ICS Infections Are Fewer Than Previously Thought

Recent research from the firm Dragos has shed some light on the actual number malware infections affecting industrial control systems (ICS).

Pucker Up: Lips Can Now Provide Biometric Authentication

Researchers from Hong Kong Baptist University have developed a new method of biometric authentication where devices read lip patterns.

Petya Ransomware Gets Hijacked

A new version of Petya ransomware, called PetrWrap, has been spotted by security researchers. This Trojan leverages old tricks to make fast money.

Vehicle Location Services Cloaked in MOPs

MOPs may allow a vehicle to cloak its position information from location services by using all radio communication channels available to it.