Terry Zink's Cyber Security Blog

Discussing Internet security in (mostly) plain English

September, 2009

  • Terry Zink's Cyber Security Blog

    I wonder if I’ll ever see this in a spam campaign?

    • 0 Comments
    I’m back from Europe and my body clock is a little messed up.  I got home yesterday a little late (traffic was a pain which is normal for a Tuesday) and I stopped at the grocery store on the way back.  The last 3 hours of the day were tough...
  • Terry Zink's Cyber Security Blog

    Linux botnet discovered

    • 0 Comments
    One of the stories going around the web is the discovery of a botnet that spreads on infected systems running the Linux operating system. The reason that this is a big deal is because historically, computers running Windows have been the most likely victims...
  • Terry Zink's Cyber Security Blog

    More on Operating System Security

    • 0 Comments
    Is Windows insecure by design? In the Security and Intelligence Report, version 6 , Microsoft looks at security vulnerability disclosures.  Vulnerabilities are weaknesses in software that allow an attacker to compromise the integrity, availability...
  • Terry Zink's Cyber Security Blog

    Interesting spam phenomenon

    • 1 Comments
    I came across an interesting type of spam the other day.  Here is a snippet of the headers: Received: from (87.200.53.223) by TX2EHSMHS013.bigfish.com     (10.x.x.x) with Microsoft SMTP Server id 14.0.482.32; Wed, 16    ...
  • Terry Zink's Cyber Security Blog

    How to reclaim your sender reputation, part 2 – The Damage

    • 0 Comments
    This is the second part of a paper that I presented at Virus Bulletin.  Check out their web page here . Outbound Mail The basic assumption for outbound mail is that the people sending it are sending legitimate content. The problem is that this is...
  • Terry Zink's Cyber Security Blog

    How to reclaim your sender reputation - Introduction

    • 0 Comments
    The following document is part of a paper that I presented at Virus Bulletin in Sept, 2009, in Geneva.  It outlines the process that my team has iterated over to clamp down on the problem of outbound spam. How To Reclaim Your Sender Reputation Background...
  • Terry Zink's Cyber Security Blog

    Play the phishing game!

    • 0 Comments
    I came across the following game linked off the Anti-phishing Working Group’s web page .  It’s an educational game that teaches users how to tell the difference between a legitimate web site and a malicious website.  While some of the advice...
  • Terry Zink's Cyber Security Blog

    The 7 habits of highly effective malware

    • 0 Comments
    Originally posted by Larry Seltzer of PCMag: There are probably several new malware variants out per hour somewhere around the world, but only a small fraction have impact.What distinguishes the truly effective malware from the great unwashed malware...
  • Terry Zink's Cyber Security Blog

    Operating System Security

    • 0 Comments
    As I was saying in my other post, I take issue with the claim that Windows is insecure by design.  Is this actually true?  It is a perception that certainly resonates within the software community, particularly among Mac and Linux users. ...
  • Terry Zink's Cyber Security Blog

    It’s a good thing I’m not evil

    • 0 Comments
    I attended the Virus Bulletin 2009 conference this past week in Geneva, Switzerland and had a pretty good time there.  I came away with a number of themes: Spam is not going to go away any time soon, but it is not the growth industry in internet...
  • Terry Zink's Cyber Security Blog

    Information overload

    • 0 Comments
    This morning, while driving into work, I heard an advertisement on the radio from a major bank.  The premise of the commercial was that a father instructed his daughter to use his bank account wisely.  Either he gave her a credit card, or he...
  • Terry Zink's Cyber Security Blog

    Getting stuff done

    • 0 Comments
    You may have noticed that my rate of posting has declined this year, and this month in particular.  That’s because over the past year, my work priorities have expanded (well, maybe shifted is a better term) to include a lot of things that don’t necessarily...
  • Terry Zink's Cyber Security Blog

    How to reclaim your sender reputation, part 3 - Options

    • 0 Comments
    Options Since outbound spam was poisoning our reputation, we decided that there were two angles we had to approach: Disable customers from using our outbound service when we detected they were spamming. Neutralize the effects of their spam so that other...
Page 1 of 1 (13 items)