Peter Loshin, TechTarget

Peter Loshin

TechTarget

Massachusetts, United States

Contact Peter

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • TechTarget

Past articles by Peter:

Return of Bleichenbacher: ROBOT attack means trouble for TLS

ROBOT attack: The PKCS #1 v1.5 flaw discovered in 1998 still plagues TLS, as research reveals vendors don't even attempt to test for the vulnerability. → Read More

Top cybersecurity conferences for when Black Hat and RSA aren't right

Not everyone needs to go to Black Hat and RSA, especially with the grand selection of smaller, local or specialized information security conferences. → Read More

GDPR breach notification rule could complicate compliance

Punishing GDPR penalties mean it's time to stop skimping on compliance, especially considering new 72-hour GDPR breach notification rule. → Read More

EU GDPR compliance puts focus on data tracking, encryption

EU GDPR compliance calls for respecting the data, tracking the data down and keeping it encrypted, according to experts. → Read More

Q&A: Talking bug bounty programs with Bugcrowd's Casey Ellis

Bugcrowd CEO Casey Ellis explains how and why bug bounty programs work, as well as the path forward as they become more mainstream. → Read More

Dropbox passwords breach exposed 68 million users

Confirming 68 million Dropbox passwords were exposed in 2012, the cloud provider continued to urge users to update credentials and enable 2FA. → Read More

Windows Bash could open the door to more Linux-based attacks

Windows Subsystem for Linux adds the Windows Bash native Ubuntu command line to Windows 10, but will it increase the attack surface? → Read More

Browser vulnerabilities, Office flaws lead August 2016 Patch Tuesday

Browser vulnerabilities in Microsoft's Internet Explorer and Edge top August 2016 Patch Tuesday, plus more on the Windows 10 Anniversary update. → Read More

KeySniffer vulnerability enables eavesdropping on wireless keyboards

KeySniffer is a new wireless vulnerability, similar to MouseJack, that exposes wireless keyboard users to key sniffing, injection attacks. → Read More

John Curran explains benefits of IPv6 connectivity progress

ARIN chief John Curran talks IPv6 connectivity progress, IPv6 security issues and why IPv6 is set to take off. → Read More

Responsible disclosure of latest named vulnerability, 'httpoxy'

'Httpoxy,' vulnerability in server-side web apps using HTTP_PROXY environment variable; experts say it was a responsible disclosure. → Read More

Enterprise encryption strategies rise as firms' use of encryption grows

As use of encryption rises, firms increasingly deploy enterprise encryption strategies; also, Bart ransomware, IRS ends e-file PIN tool, and more. → Read More

Angler exploit kit skips Microsoft EMET to subvert Flash, Silverlight

The Angler exploit kit is bypassing Microsoft EMET version 5.5 to deliver Flash and Silverlight exploits on Windows 7. → Read More

Paul Vixie on IPv6 NAT, IPv6 security and Internet of Things

Paul Vixie, Internet pioneer and architect of key DNS extensions, spoke with SearchSecurity about IPv6 NAT, IPv6 and the Internet of Things. → Read More

ImageMagick calls into question responsible disclosure reporting

A serious ImageMagick vulnerability still raises questions regarding responsible disclosure, as the flaw exposes millions of websites to an actively exploited weakness. → Read More

Report: 1.5 million Verizon Enterprise customer records stolen

Verizon Enterprise Solutions was hit by a breach, which saw 1.5 million customer contact records offered for sale. Customers face increased phishing attack risks. → Read More

Security startups vie for honors in RSA Innovation Sandbox

At RSA Conference 2016, the top security startup will be named 'most innovative' in the RSA 2016 Innovation Sandbox competition. → Read More

Google to adopt strictest DMARC policy to fight spam, phishing

News roundup: Google's anti-phishing effort ratchets up with stricter DMARC policy. Plus: Senate to vote on CISA, health care industry lags, and SHA-1 goes critical. → Read More