340 Posts

Larry Loeb

Principal, PBC Enterprises

Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek. He wrote for IBM's DeveloperWorks site for seven years and has written a book on the Secure Electronic Transaction Internet protocol. His latest book has the commercially obligatory title of Hack Proofing XML. He's been online since uucp "bang" addressing (where the world existed relative to !decvax), serving as editor of the Macintosh Exchange on BIX and the VARBusiness Exchange.

Written By Larry Loeb

ZBot: Android Banking Malware Targets Russian Users

Russian security researchers recently discovered the ZBot malware, which uses phishing schemes to go after Russian onlie banking customers.

Joomla Patches Zero-Day Exploits

The content management system Joomla recently patched vulnerabilities that were contributing to zero-day exploits across websites.

Google No Longer Trusts Symantec’s Root Certificate

Google has recently announced it will not trust Symantec's new root certificate on Chrome, Android and other Google products.

Some Apps Don’t Protect Personal Information With TLS Encryption

Some organizations were found to be letting application security lapse, at least when it came to protecting information via TLS encryption.

EU Rules on Reporting Responsibilities for Cyberattacks

The European Union recently established guidelines for organizations regarding when, how and to whom to report cyberattacks.

Ethereum: A Second-Generation Blockchain for the IoT

Ethereum is an updated blockchain technology that could be well-suited for the IoT. But how does it work, and is it a capable solution?

A SHA-1 Certificate Will Fail Soon

The SHA-1 certificate is still widely used, but it poses a number of cybersecurity issues and will likely cause a major problem soon.

Blockchains: Guardians of the Gates

Bitcoin and other cryptocurrencies use blockchains to remain secure and out of the reach of malicious actors. But how does this technology work?

A Security Protocol for the Internet of Things

With the Internet of Things quickly expanding, organizations need to move quickly to ensure the security protocol in place enforces best practices.

ICD-10 and Security: The ICD-10 Transition

ICD-10 has finally been released — making it the perfect time for health care organizations to review and revamp security policies.