Cover photo
Paul Roberts
Works at The Security Ledger
Attended Vassar College
Lives in Belmont, Massaschusetts
453 followers|43,822 views


Have him in circles
453 people
Russell Jordan's profile photo
Bartosz Prauzner-Bechcicki's profile photo
Paul Moriarty's profile photo
Christopher F Clark's profile photo
Jack Daniel's profile photo
Felicia Cravens's profile photo
Writer, Editor
  • The Security Ledger
    Editor in Chief, 2012 - present
  • Kaspersky Lab
    Editor,, 2010 - 2012
  • 451 Group
    Senior Analyst, Enterprise Security, 2007 - 2010
  • Infoworld
    Editor, 2006 - 2007
  • Ziff Davis
    Senior Writer, 2005 - 2006
  • IDG
    U.S. Correspondent, IDG News Service, 2002 - 2005
  • Cisco Systems, Inc.
    Technical Writer, 2000 - 2002
  • SteelPoint Technologies
    Marketing and Communications Manager, 1996 - 2000
  • Logica PLC
    Technical Writer, 1994 - 1996
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Belmont, Massaschusetts
security blogger | runner | dad
I'm a 40-something living in the suburbs of Boston with my wife, three daughters and a mortgage. I'm Editor in Chief of The Security Ledger, a news blog that covers computer security and privacy, hacking and malware. In past lives, I've worked as a technology analyst and a reporter for a variety of publications including, The 451 Group, Ziff Davis's eWeek, InfoWorld and the IDG News Service. My work has appeared in the Boston Globe,, Forbes Small Business and elsewhere. I was, yes, a guest on The Oprah Show...but it's a long story.
  • Vassar College
  • University of Utah
Basic Information
Paul Roberts's +1's are the things they like, agree with, or want to recommend.
Heartbleed And The Curse Of Third-Party Code | Application Security News...

The recently disclosed vulnerability in OpenSSL pokes a number of enterprise pain points. Chief among them: the proliferation of vulnerable,

CERF: Classified NSA Work Mucked Up Security For Early TCP/IP | Applicat...

Internet pioneer Vint Cerf says that he had access to cutting edge cryptographic technology in the mid 1970s that could have made TCP/IP mor

Hell is Other Contexts: How Wearables Will Transform Application Develop...

Wearable technology is in its infancy. But don't be fooled: the advent of wearables will fundamentally change the job of the application dev

Five Product Security Questions Nobody At CES Wants You To Ask

The annual Consumer Electronics Show kicks off in Las Vegas this week. With rivers of ink spilled on cool, new “smart” products, here are fi

AllSeen Alliance

Enabling the Internet of Everything

Google Unveils Toolkit To Stop Online Oppression

Google said on Monday that a suite of new services will help political activists, small businesses and non-profits defend themselves against

Breaking Bad(ware): Micro-targeting hits the spam world

A new spam run targeting fans of the cult show Breaking Bad proves that for spammers (and other business folk) we are the sum of the niche g

7 ways to beat fingerprint biometrics

Apple's embrace of finger scanning technology in the iPhone could be a breakthrough moment for biometrics. But finger scanners are no panace

DIY security: Cool tools you can build yourself

DIY electronics is entering a golden age with the help of powerful, cheap, programmable devices like the Arduino micro controller and Raspbe

Secure Email Is Dead

Recent revelations about wide ranging and warrantless government surveillance don’t mean that e-mail is dead – just that you can’t ever trus

IPMI: The most dangerous protocol you've never heard of

Another week, another terrifying presentation about security holes in IPMI – a widely used technology for remote management of servers. But

Next up: The Jamming wars

Personal privacy is going to turn from a "right" to a "fight" in the next decade, as individuals take up (digital) arms against government-

Black Hat 2013: Rise of the (Smart) Machines

Don’t let all the light and heat over the NSA’s PRISM program fool you. The big story at this year’s annual Black Hat and DEFCON conferences

Black Hat: Ad Networks Lay Path To Million-Strong Browser Botnet

We long ago surrendered our privacy to the Web. But research presented at this week’s Black Hat Briefings in Las Vegas suggests that structu

Rip and Replace II: The Mobile Device Years

Carriers and mobile device makers are speeding headlong down the road to a future in which patches for mobile devices will be phased out and

Snowden's big truth: We are all less free

Has Mr. Snowden, in his youthful naiveté, helped expose our own passivity, and complicity with a massive surrender of our Constitutionally g

Mobile vendors go their own way on security at FTC event

Mobile phone makers were in agreement that the security and privacy of their customer was their top concern. But that was about all they cou

Missing in Action At BlackHat: The PC

Once the target of choice for hackers of all stripes, hacks aimed at personal computers (PC) will be -at most- a side attraction at this yea

Monoculture 2.0: Will Android's Rise Be A Security Nightmare?

There have been a bunch of interesting articles in recent weeks that highlight the rapid expansion of Google's Android operating system from

Illiquid: Liberty Reserve Gone, Cybercrooks Look For Alternatives

Now that authorities in Spain, Costa Rica and the U.S. have taken down online money transfer service Liberty Reserve, the cyber underground