223 Posts

Larry Loeb

Principal, PBC Enterprises

Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek. He wrote for IBM's DeveloperWorks site for seven years and has written a book on the Secure Electronic Transaction Internet protocol. His latest book has the commercially obligatory title of Hack Proofing XML. He's been online since uucp "bang" addressing (where the world existed relative to !decvax), serving as editor of the Macintosh Exchange on BIX and the VARBusiness Exchange.

Written By Larry Loeb

Turkey Impairs Tor Network

Following the statutes on restricting VPNs that was enacted by the Turkish government in November, it seems that the Tor network has also been affected.

Zero-Day Exploits Affect Desktop Linux

A security researcher recently discovered how zero-day exploits could be leveraged to steal private information from desktop Linux systems.

DNSChanger Exploit Targets Routers Through Web Browsers

Although the DNSChanger exploit kit is spread through malvertising, it is designed to target vulnerabilities in victims' physical internet routers.

Microsoft Edge Is Spoofalicious

A security researcher learned how to trick SmartScreen, a subprogram within Microsoft Edge designed to block malicious content, to display spoofed messages

Popcorn Time Wants Your Money, but Will Settle for Your Buddy’s

Ransomware variant Popcorn Time offers its victims a choice: Pay the ransom or sell out your buddy for a free decryption key to recover your stolen data.

August Malware Tries to Steal Credentials

The August malware, a new Trojan recently discovered by Proofpoint, uses macros and Powershell to target customer service employees at retail companies.

Enforcement of iOS’s App Transport Security Is Problematic

Despite Apple's plans to begin enforcing its App Transport Security standard at the start of 2017, many iOS app developers are still dragging their feet.

Malvertising Poisons Banner Ads

A recently discovered malvertising campaign known as Stegano uses steganography and other techniques that researchers have observed in similar attacks.

Global Cybersecurity Survey Shows Confidence Drop

According to a recent cybersecurity survey, companies are losing confidence in their ability to assess security risks and mitigate threats.

A Software Attempt to Mitigate Rowhammer Attacks

German researchers developed two methods for mitigating Rowhammer attacks, which exploit the physical hardware in dynamic random-access memory (DRAM).