Profile

paulfroberts
Member since: August 2012
Bio:
I'm an experienced writer with a decade of work as a reporter and industry analyst covering IT security, cyber security and hacking. Prior to donning the reporter's cap, I spent close to a decade in the technology field, providing technical communications, product training and marketing and communications services to firms including Cisco Systems, Logica and SteelPoint Technologies (now part of Autonomy Corp. PLC).
More recently, I served as editor of the computer security blog Threatpost.com. My writing has appeared in The Boston Globe, Salon.com, Fortune Small Business, as well as ZDNet, Computerworld, InfoWorld, eWeek, CIO , CSO , ITworld as well as long format analysis for The 451 Group. I have provided expert commentary on cyber security and emerging threats for leading news outlets including NPR's Marketplace TechReport. Finally 'yes,' I was a guest on The Oprah Show — but it’s a long story.
Areas of Interest:
Activity
-
AV companies have been at war with the bad guys for much of the last two decades. And guess what? The bad guys won. Now that the days of antivirus software being in the front line of defense against malware are over, what companies are ready to step in and take up arms against sophisticated attacks and malware? Here are five to keep your eye on.
5 days 11 hours ago
-
As chaos reigned in the hours after twin explosions at the finish line of the storied Boston Marathon, social media outlets became a lifeline between runners, spectators and the outside world.
3 weeks 1 day ago
-
The IRS is scaring taxpayers silly this season with boasts about its Big Data prowess and 'robo audits.' But recent reports suggest the agency is struggling to keep its IT operations afloat.
3 weeks 6 days ago
-
With the federal government proposing airplane style "black boxes" in every automobile, a crowd-funded project wants to design a lock that will allow car owners to secure their data from snooping and tampering.
5 weeks 2 days ago
-
Microsoft's Windows operating system spent close to two decades as the 'problem child' of the IT world - ubiquitous, buggy and easy to hack. But this week brought more evidence that Google and its Android mobile operating system may be taking that mantle from the folks in Redmond, Washington.
6 weeks 6 hours ago
-
The U.S. military relies heavily on distributed, wireless networks to communicate in combat zones. Now DARPA is looking for ideas on how to keep enemies off these networks.
7 weeks 1 day ago
-
paulfroberts wrote PC cleanup scammer calls Microsoft Malware Protection Center expert. Hilarity ensues. What's a bad day for a scammer selling bogus Windows PC clean up services? How about accidentally dialing a guy who works in Microsoft's Malware Protection Center!8 weeks 2 days ago
-
A security researcher claims to have found five, new vulnerabilities in Oracle's Java technology that could allow a malicious hacker to bypass safety features in the latest version of the Java technology.
9 weeks 2 days ago
-
A steady drumbeat of news about sophisticated cyber attacks against our government and leading institutions has attendees at this year's RSA conference in a fever. And that may be bad for security.
10 weeks 2 days ago
-
As if you didn't know it already: antivirus software isn't doing its job, even though it sucks up around 30% of IT security budgets. But where can companies turn next? Two firms think they have an answer.
10 weeks 2 days ago
-
paulfroberts wrote Security stories to watch: Security firm Bit9 hacked. Also: Microsoft megapatch and identity management The hack of security firm Bit9 reminds us that application whitelists work great at stopping malware ... until they don't. And: Microsoft prepares a mystery 'double patch' of the Internet Explorer web browser, fueling speculation.12 weeks 2 days ago
-
Last week's revelations about hacks of prominent media outlets continues. Plus: new questions about the security of encrypted communications will dominate the news this week.
13 weeks 2 days ago
-
D.C. wonks warm up to a new Cold War: this one fought with computers. Plus: Death of Aaron Swartz inspires Anonymous back to action.
14 weeks 2 days ago
-
Plan on hearing a lot more about the world's most famous (and audacious) Internet tycoon: Kim Dotcom this week, following the launch of his new cloud-based storage service: Mega. And: more stories about the computer security threat posed by things you didn't even know were computers.
15 weeks 2 days ago
-
Forget "PC LOAD LETTER," a vulnerability in a standard component of modern office printers may make hardware from a wide range of vendors vulnerable to denial of service attacks and data theft, according to a researcher for security firm ViaForensics.
15 weeks 2 days ago
-
The patches are out for both Java and Internet Explorer, but this is hardly the end of the story - or the hand wringing. Also: a SCADA-pocalypse!
16 weeks 1 day ago
-
There are a lot of reasons to be skeptical of a future in which smart devices of every shape and size do our thinking for us. Here are five good reasons the Internet of Things might just make our lives worse.
16 weeks 2 days ago
-
Privacy regulations like HIPAA and GLB are mind boggling in their complexity, and that makes complying with them difficult. But what if you could automate compliance audits, harnessing heavy compute power to measure compliance with privacy laws and spot violations? Researchers from CMU may have found a way to do so.
16 weeks 5 days ago
-
paulfroberts wrote 3 security things to watch: A Turkish twist, IE's quick fix, Anonymous takes action in high school assault case Look for continued fallout from the security lapse at Turkish Certificate Authority TurkTrust this week in security. Also: pressure on Microsoft over IE flaw, and hacktivists take action in high profile high school rape case.17 weeks 2 days ago
-
For much of the past quarter century, computer crime has been a decidedly First World problem. But that's about to change, security experts say.
18 weeks 6 days ago
-
A new week is upon us and, with it, new challenges. Here are some of the big security stories to watch for in the coming days.
20 weeks 2 days ago
-
The onslaught of sophisticated cyber espionage against the U.S. and its allies has roused both lawmakers and private sector firms to tackle supply chain security.
21 weeks 2 days ago
-
[chunklet] Would-be lovers - stop using e-mail to communicate.
24 weeks 1 day ago
-
Consider this scene: it's October, 2011. Security researchers gathered in Louisville, Kentucky for the annual DerbyCon security conference. On the schedule that year, alongside presentations on “Advanced Nmap Scripting” and “anti forensic techniques,” was a humble birthday party for, of all things, a software vulnerability.
25 weeks 6 days ago
-
[chunklet]
27 weeks 3 days ago
- 1 of 2
- ››
Friends' Activity
Follow other ITworld members or sign in with your Facebook account in order to view your friends' activity.
Activity
- Comments: 0
- Friends: 0
- Likes: 0
- Following: 0
- Questions Asked: 0
- Followers: 2
- Questions Answered: 0














