Freigeben über


Terry Zink: Security Talk

Discussing Internet security in (mostly) plain English

What Apple’s security response can learn from Microsoft

A couple of days ago, Ed Bott posted an article on ZDNet entitled What Microsoft can teach Apple...

Author: tzink Date: 05/11/2012

Floating villages of Cambodia

While we were in Cambodia, we visited the floating villages, located not too far from the city of...

Author: tzink Date: 05/06/2012

Statistics on spoofed mail

The other day, I decided to investigate some potential efficacy rates of using DMARC.  Would...

Author: tzink Date: 04/12/2012

Spam levels still lower a year after Rustock

Arstechnica wrote an article this past weekend entitled Spam levels still low a year after Rustock...

Author: tzink Date: 04/12/2012

Mac users hit by another wave of malware

In case you haven’t been watching cyber news recently, last week various security researchers...

Author: tzink Date: 04/11/2012

SOPA fears risk blocking new cyber-security bill

Building on my previous post about upcoming proposed cyber legislation, a couple of other articles...

Author: tzink Date: 04/11/2012

Upcoming proposed cyber legislation

Yesterday I read the article Cybersecurity is entangled in Washington turf wars on Politico. ...

Author: tzink Date: 04/05/2012

Pinterest spammer finds it easy to make money

About a week ago, I read an article on SecurityNewsDaily where a spammer gave an interview to The...

Author: tzink Date: 04/05/2012

U.S. Outgunned in Hacker War

The Wall Street Journal has an article up today with an interview with outgoing head of the FBI’s...

Author: tzink Date: 03/29/2012

Top Anonymous/LulzSec hacker caught

This is an old story (where old > 2 weeks), but I still want to write about it. Nine months ago,...

Author: tzink Date: 03/28/2012

Spam catch rates drop

I was reading All Spammed Up’s recent post entitled Are Spam Filters really that Bad?  It is...

Author: tzink Date: 03/28/2012

Has the Zeus disruption affected spam at all?

I’ve written a number of times in the past about which botnets send us the most spam.  Cutwail...

Author: tzink Date: 03/26/2012

Think SPF is widely deployed? Think again.

With all the hoopla surrounding DMARC, I thought I would take the time to see how SPF is functioning...

Author: tzink Date: 03/20/2012

The pros and cons of graylisting

Graylisting is an antispam technique that works by taking advantage of sender reputation. ...

Author: tzink Date: 03/16/2012

Predicting the future of abuse, part 2

Following on from my previous post, what does the future of Internet abuse look like?  Here’s...

Author: tzink Date: 03/12/2012

Predicting the future of abuse

A couple of months ago, I wrote about IBM’s predictions for 2016, and one of those was that there...

Author: tzink Date: 03/12/2012

Argh! Spoofed email got me again!

A couple of weeks ago, I was checking email on my phone and I got a spoofed email from Stratfor...

Author: tzink Date: 03/07/2012

How Google is fighting back against Android threats

Following on from my previous post on Android threats (this post is based upon research of Google’s...

Author: tzink Date: 03/07/2012

What Android threats look like

I’ve been doing some reading recently on Android threats, specifically some stuff by Eric Chien,...

Author: tzink Date: 03/07/2012

The Top 3 Emerging Threats on the Internet

Last week at RSA, Bruce Schneier gave a talk on the top 3 emerging threats on the Internet. ...

Author: tzink Date: 03/05/2012

I’m a SpamCop

Below is a 6-minute video, starring me (among others) about what it’s like to be a SpamCop.  ...

Author: tzink Date: 02/28/2012

How did WikiLeaks get the Stratfor emails?

As a follow up to my previous post, I’d like to comment on the Reuters article where WikiLeaks is...

Author: tzink Date: 02/27/2012

MAAWG updates its name

If you’ve been to the MAAWG web page lately, you may have noticed that they have updated their name...

Author: tzink Date: 02/16/2012

Hotmail and Gmail are tied in antispam effectiveness

A couple of days ago, the New York Times reported on a study by Cascade Insights that measured the...

Author: tzink Date: 02/16/2012

How frequently do botnets reuse IP addresses?

I wonder how much botnets reuse IP addresses.  Do they infect a system and spam, get blocked,...

Author: tzink Date: 02/10/2012

Top bots in 2012 so far

Sometimes I read articles about the size of botnets.  For example, this article on Krebs on...

Author: tzink Date: 02/09/2012

Real or fake?

The other day, security writer/worker (what doesn’t that guy work on these days?) developed a...

Author: tzink Date: 02/09/2012

What do ordinary people think of the Gmail man?

A couple of days ago, I posted a link to a video by Microsoft parodying Gmail – the Gmail man. ...

Author: tzink Date: 02/06/2012

The Stratfor hack is not over yet

Thanks to Anonymous and their Christmas hacking of Stratfor, I have not only had to change my credit...

Author: tzink Date: 02/06/2012

The Gmail man!

I have to admit that this advertisement by Microsoft, poking fun at Google and Gmail – with an...

Author: tzink Date: 02/03/2012

Spam campaign morphs again

I earlier wrote about an eTrade spam campaign that morphed into a Bank of America spam...

Author: tzink Date: 01/25/2012

Hotmail rolls out features to help deal with gray mail

In a story announced last week, Hotmail has released a new version of itself to help users deal with...

Author: tzink Date: 01/24/2012

My views on SOPA

During my 4-part series write up on SOPA, I approached it with a neutral tone.  I was hearing...

Author: tzink Date: 01/19/2012

<Previous Next>