303 Posts

Larry Loeb

Principal, PBC Enterprises

Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek. He wrote for IBM's DeveloperWorks site for seven years and has written a book on the Secure Electronic Transaction Internet protocol. His latest book has the commercially obligatory title of Hack Proofing XML. He's been online since uucp "bang" addressing (where the world existed relative to !decvax), serving as editor of the Macintosh Exchange on BIX and the VARBusiness Exchange.

Written By Larry Loeb

Employee Training Lowers Susceptibility to Phishing Emails, Report Finds

A recent report found that successful phishing emails can be reduced or even stopped completely with security training for employees.

MongoDB Databases May Be Exposed by Security Misconfigurations

A security researcher has discovered that thousands of MongoDB databases are publicly exposed on the Internet, creating vulnerabilities for organizations.

Report: Macro Malware Making a Comeback

A recent study from one security firm indicated that macro malware is experiencing a renaissance among cybercriminals. Here's what you need to know.

ZBot: Android Banking Malware Targets Russian Users

Russian security researchers recently discovered the ZBot malware, which uses phishing schemes to go after Russian onlie banking customers.

Joomla Patches Zero-Day Exploits

The content management system Joomla recently patched vulnerabilities that were contributing to zero-day exploits across websites.

Google No Longer Trusts Symantec’s Root Certificate

Google has recently announced it will not trust Symantec's new root certificate on Chrome, Android and other Google products.

Some Apps Don’t Protect Personal Information With TLS Encryption

Some organizations were found to be letting application security lapse, at least when it came to protecting information via TLS encryption.

EU Rules on Reporting Responsibilities for Cyberattacks

The European Union recently established guidelines for organizations regarding when, how and to whom to report cyberattacks.

Ethereum: A Second-Generation Blockchain for the IoT

Ethereum is an updated blockchain technology that could be well-suited for the IoT. But how does it work, and is it a capable solution?

A SHA-1 Certificate Will Fail Soon

The SHA-1 certificate is still widely used, but it poses a number of cybersecurity issues and will likely cause a major problem soon.