Terry Zink: Security Talk
Discussing Internet security in (mostly) plain English
What Apple’s security response can learn from Microsoft
A couple of days ago, Ed Bott posted an article on ZDNet entitled What Microsoft can teach Apple...
Author: tzink Date: 05/11/2012
Floating villages of Cambodia
While we were in Cambodia, we visited the floating villages, located not too far from the city of...
Author: tzink Date: 05/06/2012
Statistics on spoofed mail
The other day, I decided to investigate some potential efficacy rates of using DMARC. Would...
Author: tzink Date: 04/12/2012
Spam levels still lower a year after Rustock
Arstechnica wrote an article this past weekend entitled Spam levels still low a year after Rustock...
Author: tzink Date: 04/12/2012
Mac users hit by another wave of malware
In case you haven’t been watching cyber news recently, last week various security researchers...
Author: tzink Date: 04/11/2012
SOPA fears risk blocking new cyber-security bill
Building on my previous post about upcoming proposed cyber legislation, a couple of other articles...
Author: tzink Date: 04/11/2012
Upcoming proposed cyber legislation
Yesterday I read the article Cybersecurity is entangled in Washington turf wars on Politico. ...
Author: tzink Date: 04/05/2012
Pinterest spammer finds it easy to make money
About a week ago, I read an article on SecurityNewsDaily where a spammer gave an interview to The...
Author: tzink Date: 04/05/2012
U.S. Outgunned in Hacker War
The Wall Street Journal has an article up today with an interview with outgoing head of the FBI’s...
Author: tzink Date: 03/29/2012
Top Anonymous/LulzSec hacker caught
This is an old story (where old > 2 weeks), but I still want to write about it. Nine months ago,...
Author: tzink Date: 03/28/2012
Spam catch rates drop
I was reading All Spammed Up’s recent post entitled Are Spam Filters really that Bad? It is...
Author: tzink Date: 03/28/2012
Has the Zeus disruption affected spam at all?
I’ve written a number of times in the past about which botnets send us the most spam. Cutwail...
Author: tzink Date: 03/26/2012
Think SPF is widely deployed? Think again.
With all the hoopla surrounding DMARC, I thought I would take the time to see how SPF is functioning...
Author: tzink Date: 03/20/2012
The pros and cons of graylisting
Graylisting is an antispam technique that works by taking advantage of sender reputation. ...
Author: tzink Date: 03/16/2012
Predicting the future of abuse, part 2
Following on from my previous post, what does the future of Internet abuse look like? Here’s...
Author: tzink Date: 03/12/2012
Predicting the future of abuse
A couple of months ago, I wrote about IBM’s predictions for 2016, and one of those was that there...
Author: tzink Date: 03/12/2012
Argh! Spoofed email got me again!
A couple of weeks ago, I was checking email on my phone and I got a spoofed email from Stratfor...
Author: tzink Date: 03/07/2012
How Google is fighting back against Android threats
Following on from my previous post on Android threats (this post is based upon research of Google’s...
Author: tzink Date: 03/07/2012
What Android threats look like
I’ve been doing some reading recently on Android threats, specifically some stuff by Eric Chien,...
Author: tzink Date: 03/07/2012
The Top 3 Emerging Threats on the Internet
Last week at RSA, Bruce Schneier gave a talk on the top 3 emerging threats on the Internet. ...
Author: tzink Date: 03/05/2012
I’m a SpamCop
Below is a 6-minute video, starring me (among others) about what it’s like to be a SpamCop. ...
Author: tzink Date: 02/28/2012
How did WikiLeaks get the Stratfor emails?
As a follow up to my previous post, I’d like to comment on the Reuters article where WikiLeaks is...
Author: tzink Date: 02/27/2012
MAAWG updates its name
If you’ve been to the MAAWG web page lately, you may have noticed that they have updated their name...
Author: tzink Date: 02/16/2012
Hotmail and Gmail are tied in antispam effectiveness
A couple of days ago, the New York Times reported on a study by Cascade Insights that measured the...
Author: tzink Date: 02/16/2012
How frequently do botnets reuse IP addresses?
I wonder how much botnets reuse IP addresses. Do they infect a system and spam, get blocked,...
Author: tzink Date: 02/10/2012
Top bots in 2012 so far
Sometimes I read articles about the size of botnets. For example, this article on Krebs on...
Author: tzink Date: 02/09/2012
Real or fake?
The other day, security writer/worker (what doesn’t that guy work on these days?) developed a...
Author: tzink Date: 02/09/2012
What do ordinary people think of the Gmail man?
A couple of days ago, I posted a link to a video by Microsoft parodying Gmail – the Gmail man. ...
Author: tzink Date: 02/06/2012
The Stratfor hack is not over yet
Thanks to Anonymous and their Christmas hacking of Stratfor, I have not only had to change my credit...
Author: tzink Date: 02/06/2012
The Gmail man!
I have to admit that this advertisement by Microsoft, poking fun at Google and Gmail – with an...
Author: tzink Date: 02/03/2012
Spam campaign morphs again
I earlier wrote about an eTrade spam campaign that morphed into a Bank of America spam...
Author: tzink Date: 01/25/2012
Hotmail rolls out features to help deal with gray mail
In a story announced last week, Hotmail has released a new version of itself to help users deal with...
Author: tzink Date: 01/24/2012
My views on SOPA
During my 4-part series write up on SOPA, I approached it with a neutral tone. I was hearing...
Author: tzink Date: 01/19/2012