Terry Zink's Cyber Security Blog

Discussing Internet security in (mostly) plain English

Browse by Tags

Tagged Content List
  • Blog Post: Edward Snowden on the defensive?

    I was reading in the New York Times the other day an article entitled Snowden Defends Query to Putin on Surveillance . The article references a question-and-answer session with Russian President Vladimir Putin. In the interview, Snowden shows up unexpectedly and asks President Putin and asks him whether...
  • Blog Post: Life in the cloud seems… overrated

    You can call me cynical but the latest digital revolution – putting your life in the cloud where you interact with it using devices – seems overrated to me. You know what I mean; if you’re a member of the tech industry, the latest major trend is cloud computing. This is where all of your data is stored...
  • Blog Post: What I’ve been up to lately

    It’s been a long time since I have written anything on this blog. I haven’t been idle, though. I’ve been doing several things that I have prioritized over blogging. Here's a summary: Trying to get an iPad app developed As I wrote about in February , I launched a Kickstarter project...
  • Blog Post: Out of the office for a while

    I’m out of the office for a while so there won’t be many updates to this blog in January, 2013. See you when I return! If you’re wondering where I am, here’s a clue: Yes, experts all say that you shouldn’t tell others you’re gone when you’re gone. Well, I have virtually nothing of value back in my home...
  • Blog Post: My behavior has changed when answering my phone due to my suspicious nature of unsolicited email

    Nowadays, whenever I get email from someone I don’t recognize, I am instantly suspicious of it. To be sure, there are people I’ve never heard from that I want to hear from, but I am always wary whenever I see an email address that is unfamiliar to me. I never open any attachments, I don’t click on links...
  • Blog Post: Measuring the cost of cybercrime

    Last week at Virus Bulletin in 2012, Tyler Moore of Southern Methodist University (SMU) gave a talk entitled " Measuring the cost of cyber crime .” It was a study done in collaboration with multiple individuals in multiple countries. The study sought to answer this question – How much does cyber...
  • Blog Post: Floating villages of Cambodia

    While we were in Cambodia, we visited the floating villages, located not too far from the city of Siem Reap.  We took a boat ride down the muddy river which took about 30 minutes: Along the way, I was reminded that we were definitely in the 3rd world.  As I said, and as you can see, the water...
  • Blog Post: Pictures of Angkor Wat

    This post has nothing to do with spam, malware or security.  Instead, you can file this under It’s-my-blog-and-I’ll-post-what-I-want-to. Anyhow, the past couple of weeks I was in Cambodia and Bali (Indonesia).  It’s been my life long dream (for the past 18 months – every time I achieve one...
  • Blog Post: Was gone, but back now

    I was gone for the past couple of weeks in Cambodia and Indonesia, but I’m back now and ready to post some more. Whenever I travel overseas, I like to look at the various pieces of technology that people are using.  After going to these two countries in the developing world, I have two things to...
  • Blog Post: No posting for a couple of weeks

    I’m going to be gone for a couple of weeks so you won’t see any new posts on here until late December.  Until then, ho-ho-ho and have a Merry Christmas (or Happy Holidays, if you’re so inclined to celebrate something else)!  
  • Blog Post: Browser market share–who’s visiting me?

    An article on Geekwire today reports on Internet browser usage amongst the various population.  Internet Explorer continues to with 55%, Firefox is second with 22.5%, Chrome is third with 15% with others picking up about 5%.  The overall trend in browsers is that Internet Explorer has slowly...
  • Blog Post: My thoughts on Google+

    From a friend who posted it on imgur :   And now from xkcd :   My own experience with Google+ is the following: I don’t get it.  Don’t get me wrong, I understand that it combines everything that Google does like Buzz, Picasa, and Chat (but thankfully not Wave).  But I still don’t...
  • Blog Post: Son of computer security expert kidnapped, ransom demanded

    Here’s a couple of short, interesting articles.  The 20-year old son of the founder of security software company Kaspersy (Yevgeny Kaspersky) was kidnapped last week and his kidnappers asked for a ransom of over $4 million.  Kaspersky's Son 'Kidnapped' 22 April 2011 The Moscow Times Ivan Kaspersky...
  • Blog Post: My writing skills need improvement. Seriously.

    Ever since I published my first post on evaluating talent  a couple of weeks ago, I’ve been thinking about how to apply it to my own life.  The only way to get good at anything – seriously good – is through deliberate practice.  Deliberate practice is working on specific skills and getting...
  • Blog Post: Getting rid of legacy stuff is hard

    Microsoft recently released it latest version of Internet Explorer, IE9.  I’ve been running the Release Candidate for a while and I like it.  This may be heresy, but while I like IE9 I think I still prefer Firefox.  Sorry Microsoft folks, that’s just my preference.  But you can take...
  • Blog Post: Introspection – evaluating talent, part 1

    This post is not going to be related to cybersecurity at all.  It is going to be about another topic that I am interested in.  However, since it’s my blog and I can write about what I want, i will write what I want. Recently, I finished reading the book Outliers by Malcolm Gladwell.  In...
  • Blog Post: I’m still around

    I haven’t written any posts in a while, but I am still around.  I’m just taking a break.  I wrote over 200 posts on this blog last year, and nearly 200 on my personal blog.  I also wrote several articles for Virus Bulletin.  I decided to start 2011 with a couple of weeks off from...
  • Blog Post: Email getting a makeover!

    The New York Times (publishing on Yahoo Finance) recently posted an article about how email is getting a makeover and how the communication medium is being shunned by the younger crowd as they move more and more towards other platforms.  If you like using email, that means you’re an old fogey. ...
  • Blog Post: Request for input on a survey

    I received this request from a member of the team I work in to post this survey request on my blog.  If you, the reader, could have a gander and answer the survey if you are so inclined, I would appreciate it.  You don’t have to be a Forefront user in order to take the survey. Microsoft Forefront...
  • Blog Post: The death of email? Hardly.

    Well, I’ve currently got a bit of spare time at work so I thought I’d write up a blog post.  Last week, I alluded to Facebook’s new messaging platform and how it wouldn’t lead to the death of email.  The reason why it wouldn’t is because email isn’t intended to be instant communication. Well...
  • Blog Post: Facebook’s new messaging platform

    Yesterday, Facebook announced that they were introducing a new messaging platform.  You can read all about it on a blog post here .  Facebook is careful to point out that this is not a replacement for email; it is not email, so they claim.  So what is it? This messaging platform is basically...
  • Blog Post: CAUCE and cyber crime

    Joseph Menn recently wrote a follow up article to his book Fatal System Error .  The book tells the story of an individual in the security industry who made the mistake of working with the local police, investigating cyber crime over in Russia.  In response, the individual’s daughter was kidnapped...
  • Blog Post: Russian cybercrime is organized / Russian cybercrime is not organized

    I like to read other people’s stories when it comes to spam, and I like Box of Meat.  It’s always alerting me to interesting stories around the web that deals with cyber security.  But the more I read, the more I see conflicting views on the state of the criminal cybercrime world.  On...
  • Blog Post: What if Sideshow Bob were a spammer?

    Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 ...
  • Blog Post: Why are there so few spam lawsuits?

    Following up from my previous post on the requirements for the CAN SPAM Act, John Levine has written an article about why there are so few spam lawsuits when the law has been in effect for almost seven years.  Levine’s point (in this article) essentially is that antispam lawsuits are difficult to...
Page 1 of 5 (108 items) 12345