344 Posts

Larry Loeb

Principal, PBC Enterprises

Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek. He wrote for IBM's DeveloperWorks site for seven years and has written a book on the Secure Electronic Transaction Internet protocol. His latest book has the commercially obligatory title of Hack Proofing XML. He's been online since uucp "bang" addressing (where the world existed relative to !decvax), serving as editor of the Macintosh Exchange on BIX and the VARBusiness Exchange.

Written By Larry Loeb

Mutated Exploit Kits Arrive for the New Year

Exploit kits using outdated versions of Adobe Flash and Acrobat are on the rise, and users must be aware of the malicious websites they connect to.

Image Storage Gets Colder With Freeze-Rays

Panasonic and Facebook recently partnered to produce what have been dubbed freeze-ray discs for more efficient, cost-effective image storage.

Getting Rid of the Password: Smartphones to the Rescue

New approaches to authentication by Google and Yahoo will likely supplant the traditional password with messages sent to smartphones.

Quantum Cryptography May Not Be as Secure as Previously Thought

Quantum cryptography's assumptions can be hacked through the use of a bright light and some fancy calculations, according to security researchers.

Cross-Platform Cryptoware Is Here

A new malware called Ransom32 is a piece of cryptoware written in what is essentially JavaScript, making it tough to detect on all operating systems.

Cybercrime Has a New Entry Point: Smart TVs

Smart TVs are a soft entry point for those intent on cybercrime, especially attackers who prey on a user's ignorance of IT security practices.

Personal Data of 191 Million Voters Compromised by Misconfigured Database

A security researcher recently found 191 million people's personal data is available on the Internet thanks to a misconfigured voter database.

Business Offers Raspberry Pi Money to Preload Malware

The Raspberry Pi Foundation was offered money by an unknown party that asked to include malware files in its downloads, an offer it rebuffed.

Sharing Threat Information Is Easier With STIX

STIX is the language used to share cyberthreats, and all security professionals and organizations should know how to use it effectively.

Whaling Dominates the Latest Wave of Phishing Attacks

Phishing attacks combined with social engineering aimed at employees is called whaling, and it's the latest hot cybercrime trend.