Terry Zink's Cyber Security Blog

Discussing Internet security in (mostly) plain English

  • Terry Zink's Cyber Security Blog

    I'm Gonna Git You Spamma!

    • 1 Comments
    A friend of mine sent me this link to a spoof of a 70's type B-movie starring a spammer, or rather, how to get a spammer.  I thought it was clever.
  • Terry Zink's Cyber Security Blog

    Spoofing inside a walled garden

    • 4 Comments
    Microsoft chairman Bill Gates has described Facebook as a walled garden, that is to say, inside is very nice but only certain people can get in.  Facebook is based on trust, only friends can view your profile and not just any old person can talk...
  • Terry Zink's Cyber Security Blog

    A comparison of antispam vendors

    • 3 Comments
    InfoWorld recently released a report where they compared the effectiveness of various spam filters.  It's mostly about on-premise anti-spam appliances.  They do touch on hosted solutions but don't go into much detail.  At the end, they...
  • Terry Zink's Cyber Security Blog

    Websense reports on breaking Hotmail's CAPTCHA

    • 1 Comments
    I've blogged about broken CAPTCHA's in the past, but I thought I'd touch on it again.  Websense is reporting on their discovery that a new botnet is breaking Hotmail's CAPTCHA in order to send out spam.  It really is a nice report and demonstrates...
  • Terry Zink's Cyber Security Blog

    Comcast's defense

    • 1 Comments
    I just posted on e360 losing its case against Comcast, so I thought I would look a bit into Comcast's defense, available at this link here . e360 had a long list of allegations against Comcast.  Many of them were answered by Comcast saying "Comcast...
  • Terry Zink's Cyber Security Blog

    E360 gets its cased tossed out

    • 3 Comments
    I'm always the last spam blogger to comment on these legal cases.  I'll continue in that tradition by throwing in my two cents.  SpamSuite has a copy of the ruling which is only seven pages long.  Some highlights from the document: Plaintiff...
  • Terry Zink's Cyber Security Blog

    A little bit more on security and back doors

    • 3 Comments
    Continuing on from my previous posts, I thought I'd talk a bit more about one of the hallmarks of my designs - the ability to override automated algorithms. As a stock trader, there are two types of systems.  Mechanical trading and discretionary...
  • Terry Zink's Cyber Security Blog

    A little more on security and back doors

    • 4 Comments
    Following on from my previous post, I thought I'd talk a little bit about the designs of the projects that I am in charge of.  Now to any of my Microsoft superiors who may be reading this post, fear not.  I have never put any security back doors...
  • Terry Zink's Cyber Security Blog

    Security and back doors

    • 1 Comments
    The other day I was talking to one of our new Program Managers who comes from a computer security company.  I jokingly said to him "Great!  We use your products, now you can tell us all the back doors to get around your product's security...
  • Terry Zink's Cyber Security Blog

    The Kniz paradox

    • 1 Comments
    One of the reasons I sometimes refer to Safe Senders is that there is a misconception, I believe, that with enough Safe Senders you can become more aggressive on spam. This might sound good in theory but it doesn't work in practice.  In fact, it...
  • Terry Zink's Cyber Security Blog

    More on Safe Senders

    • 1 Comments
    Following up from my previous post , how do we do safe senders?  On the MAIL FROM in the SMTP conversation?  Or the one in the message headers?  The message headers is more intuitive but there are drawbacks. Consider the SMTP protocol. ...
  • Terry Zink's Cyber Security Blog

    The origins of hacker attacks

    • 1 Comments
    Here's an article from the March 31, 2008 issue of Investors Business Daily: About half of all hacker attacks originate from the .edu domain used by colleges, according to data recently compiled by network security experts at Microsoft.  The software...
  • Terry Zink's Cyber Security Blog

    Spoof-and-compromise spam technique

    • 3 Comments
    An antispam technique that has caused some pain in recent days for some customers is that of compromising a user's email account and then using it to send out spam.  This is an example of what I have earlier referred to as diplomatic immunity - hiding...
  • Terry Zink's Cyber Security Blog

    Spammers have broken my Email form

    • 2 Comments
    If you want to contact me through this blog, you can click the Email link at the top of the page, fill out a form and send it to me.  This prevents my personal email alias from being exposed and spammers harvesting it.  In theory it should prevent...
  • Terry Zink's Cyber Security Blog

    The concept of Safe Senders

    • 2 Comments
    Sometimes an end user wants to flag a specific sender as a safe sender, that is, they always want messages from that user to go to their inbox.  You've probably seen this in some newsletters where they say at the top or bottom of the message to please...
  • Terry Zink's Cyber Security Blog

    The dip

    • 1 Comments
    I finished reading Michael Crichton's book Prey the other day.  I blogged about this a week and a half ago.  Basically, a cloud of molecular particles was learning to interact with its environment. Near the end of the book, the main character...
  • Terry Zink's Cyber Security Blog

    Email storage and legal requirements

    • 4 Comments
    One of the trends (might I say minimal requirements) in the hosted email filtering space today is that of email storage and archiving.  Exchange Hosted Services does it, and a number of our competitors do as well. Government regulations often spring...
  • Terry Zink's Cyber Security Blog

    Spammer pleads guilty to charges

    • 0 Comments
    I blogged a couple of weeks ago that accused spammer Robert Soloway's trial was beginning but that I didn't think it was likely that much would come of it.  Well, I think I have been proven wrong.  According to IDG , Soloway plead guilty and...
  • Terry Zink's Cyber Security Blog

    Spammers aren't always creative

    • 1 Comments
    I first started actively fighting spam in 2004. In the beginning we were dealing exclusively with English language spam but only a couple of months later we expanded our tool set to include support for foreign languages. Foreign language spam differs...
  • Terry Zink's Cyber Security Blog

    Some updates on traffic statistics

    • 1 Comments
    An interesting pattern has occurred over the year-to-date. We saw an up-tick in spam in the month of December that was outside the rise in the number of customers that we acquired.  However, in January, we saw a week-over-week decline for four consecutive...
  • Terry Zink's Cyber Security Blog

    Consumer vs Enterprise

    • 0 Comments
    Recently, at a Sharepoint conference in early March, Microsoft co-founder and chairman made the following comments regarding Google: “In terms of Google, not to overstate it, but they really don’t understand the special needs of business....
  • Terry Zink's Cyber Security Blog

    Nanobots and fighting spam

    • 6 Comments
    One of my favorite fiction writers is Michael Crichton.  His books often center around technology and how when humans try to control or influence the physical environment, things go awry.  In Jurassic Park, humans recreated dinosaurs and attempted...
  • Terry Zink's Cyber Security Blog

    The resurrection of zip attachment spam

    • 2 Comments
    Beginning March 4, I started seeing a "new" type of spam in my inbox: spam with zip attachment that contain sexually suggestive subject lines.  The body contents of the messages are very short, only a single sentence and without punctuation...
  • Terry Zink's Cyber Security Blog

    Spammers and environmentalists?

    • 1 Comments
    This is a rather strange story that has come to my attention. I live near Seattle and the other day I was reading a story about a suspected domestic terror organization that set fire to several multimillion dollar homes in Woodinville, a Seattle suburb...
  • Terry Zink's Cyber Security Blog

    To outsource or not to outsource

    • 0 Comments
    This is a point I have touched on a number of times in the past.  One of the selling points that I point out about outsourcing your spam management to someone else as opposed to doing it in-house is that when it comes to spam, you really do want...
Page 34 of 45 (1,125 items) «3233343536»