다음을 통해 공유


Terry Zink: Security Talk

Discussing Internet security in (mostly) plain English

Origins of the word spam

I have Yahoo set as my home page, and from time to time they have a decent article on...

Author: tzink Date: 06/21/2010

Spamhaus settlement knocked down from millions to thousands

Via TechDirt: Many years back, an "email marketing" company called e360 Insight got upset...

Author: tzink Date: 06/16/2010

Why are *.edu’s compromised so much?

When it comes to the problem of outbound spam, one of the experiences that I have, and this was...

Author: tzink Date: 06/15/2010

Security starts with not doing stupid things

Or rather, with me not doing stupid things. I’m currently at a conference in New Orleans (TechEd, a...

Author: tzink Date: 06/07/2010

Welcome to our world, Adobe

One of the problem that plagues free sites that permit user content uploading – Windows Live Spaces,...

Author: tzink Date: 06/01/2010

More Scareware indictments

From R&D: Posted by Tim Cranton Associate General Counsel, Microsoft Digital Crimes Unit Today...

Author: tzink Date: 05/28/2010

Don’t send from the cloud?

Over at MailChimp, Ben Chestnut writes about their frustrations from sending mail from the...

Author: tzink Date: 05/26/2010

A little bit of humor

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 I came across this...

Author: tzink Date: 05/25/2010

Keeping Safe Online

Last week, the New York Times (via Yahoo) posted an article on five ways to keep safe online. They...

Author: tzink Date: 05/25/2010

FTC kills porn/spam ISP

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 Via Mashable: Today [ie,...

Author: tzink Date: 05/21/2010

No cyberattack on Wall Street

In case you missed it, last Thursday, May 6, we saw a remarkable day on the stock markets.  The...

Author: tzink Date: 05/12/2010

Email rules to live by, for marketers

One of my personal friends works in the non-profit space. He has a blog post put up about the rules...

Author: tzink Date: 05/06/2010

Comparison: Top malware threats

All Spammed Up published a post this week highlighting the top seven malware threats for that (May...

Author: tzink Date: 05/04/2010

My secrets for making presentations

Some of you may not know this, but I really enjoy making presentations for audiences.  When I...

Author: tzink Date: 05/01/2010

Should we trust the libertarians?

One of the RSS feeds that I read is Reason magazine, which is a web site for libertarians.  In...

Author: tzink Date: 04/28/2010

Microsoft releases its Security Intelligence Report, version 8

Today, Microsoft released its Security Intelligence Report, version 8.  The SIR is a...

Author: tzink Date: 04/26/2010

Newest round of Twitter spam

This one fooled me for a half second. I got an email to my work account indicating that I had 3...

Author: tzink Date: 04/23/2010

CallService.biz shut down by the FBI

Gary Warner over at Cyber Crime and Doing Time has a good post up this week about the...

Author: tzink Date: 04/21/2010

More details on the Google cyberattack

The New York times has some more details on the Chinese cyberattack that hit Google back in January,...

Author: tzink Date: 04/20/2010

Sarah Palin to take the stand in “hacking” trial

From the Associated Press: KNOXVILLE, Tenn. – A former college student charged with hacking Sarah...

Author: tzink Date: 04/20/2010

Why bother changing your password?

Last month, DarkReading had an article about how end users’ tend not to choose strong passwords, and...

Author: tzink Date: 04/19/2010

Twitter’s efforts paying off

I’m proud of Twitter. Last year they started taking action to reduce the amount of spammers on their...

Author: tzink Date: 04/15/2010

US Air Force adds training in cyberwar

I read an interesting article today that the US Air Force is adding the basics of cyberwarfare for...

Author: tzink Date: 04/13/2010

Out of office spam

This past week we started seeing some examples of out-of-office or vacation reply spams being...

Author: tzink Date: 04/11/2010

How traffic shaping works, part 1

With all of the brou-ha-ha of the past couple of years surrounding Net Neutrality, and especially...

Author: tzink Date: 04/09/2010

Apparently my reputation precedes me

I recently made a slight shift in the team I report to at work.  I’m still in anti-spam but the...

Author: tzink Date: 04/08/2010

Federal Appeals Court rejects FCC’s bid to enforce Net Neutrality

Yesterday, a federal appeals court ruled that Internet traffic regulators like the FCC had limited...

Author: tzink Date: 04/07/2010

An ominous warning

Those of you who have been following my blog for a few months know that this past November while I...

Author: tzink Date: 04/07/2010

Assessing the botnet threat

I came across this video today.  Botnet researcher Joe Stewart discusses the current threat...

Author: tzink Date: 04/02/2010

Geeks all trust each other but not in China

Brian Krebs has a post up today on his blog indicating that the amount of spam ending in .cn has...

Author: tzink Date: 03/31/2010

Survey request from Forefront Server Protection team

My friends over in the Forefront Server Protection team have asked me to post a survey on my blog,...

Author: tzink Date: 03/26/2010

A bit about Zeus

As I posted a couple of weeks ago, the Zeus botnet was partially taken down after researchers worked...

Author: tzink Date: 03/25/2010

<Previous Next>