Terry Zink's Cyber Security Blog

Discussing Internet security in (mostly) plain English

July, 2010

  • Terry Zink's Cyber Security Blog

    Context matters

    • 0 Comments
    A few weeks back, me and my crazy co-worker (the one who insists that all mail must have SMTP AUTH in order to not be considered spam regardless of its content or what proportion of the target end user considers it spam) were in another discussion about...
  • Terry Zink's Cyber Security Blog

    Internet Explorer – 1 billion malware blocked

    • 0 Comments
    Over at the IE8 team blog, they’ve hit a milestone – using the Smartscreen filter, they have recently blocked their 1 billionth piece of malware from being downloaded. 1 billion malware blocks is an amazing milestone and an example of two things. First...
  • Terry Zink's Cyber Security Blog

    What constitutes a spam, anyhow?

    • 4 Comments
    Today, myself and my co-worker got into a pretty big discussion about what constitutes spam and what doesn’t. At issue was a message that was flagged as spam when sent to an internal Microsoft alias.  What happened is a researcher sent around a message...
  • Terry Zink's Cyber Security Blog

    Cyberwar vs no cyberwar

    • 2 Comments
    I was browsing CircleID the other day and came across Bruce Schneier’s article on cyberwar. Schneier’s article, and the crux of his point, is that the term cyber war and the threat of cyber warfare has been greatly exaggerated. The real problem...
  • Terry Zink's Cyber Security Blog

    What not to publish on Facebook

    • 0 Comments
    Zionsbank has an article up on the types of personal privacy information that you should never publish on Facebook (or any other social networking site for that matter).  I thought that I would republish it here and add some of my own comments. Many...
  • Terry Zink's Cyber Security Blog

    On using multiple blocklists

    • 2 Comments
    All Spammed Up has an article up the other day about whether or not a filtering service should consider using multiple blocklists as part of their spam filtering solution.  Quoting the article: The biggest benefit to using more than one block list...
  • Terry Zink's Cyber Security Blog

    Yahoo now does SPF checks

    • 0 Comments
    Well, what do you know? I don’t know if they have been doing them all along and have only finally decided to expose the result, but I logged into my Yahoo mail the other day and checked out the message headers of a mail in my inbox.  I was surprised...
  • Terry Zink's Cyber Security Blog

    Yet another Facebook spoof

    • 0 Comments
    You know that as a service you are really popular and you’ve truly made it when spammers start abusing your brand and use it to spoof and send out spam.  Below is a screen shot of a spam message that I received in my Yahoo account this past Sunday...
  • Terry Zink's Cyber Security Blog

    Latest Facebook scamming

    • 0 Comments
    The other day on Facebook, I saw that one of my friends like a very bizarre page: Right off the bat, I kind of figured that this was a scam.  Or a link to malware, or something.  All those xxx’s was my first clue, and the misspelling of Facebook...
  • Terry Zink's Cyber Security Blog

    Today is my six year mark

    • 1 Comments
    Today, July 12, 2010, marks the six year anniversary of the day I started to fight spam professionally.  It’s also close enough to the four year anniversary of this blog.  It’s well over 500 posts later and I am still going strong. Looking back...
  • Terry Zink's Cyber Security Blog

    Credit card hackers and hotels

    • 0 Comments
    Last week, the New York Times reported an interesting story: the hotel industry is a favorite target of hackers. A study released this year by SpiderLabs, a part of the data-security consulting company Trustwave, found that 38 percent of the credit card...
  • Terry Zink's Cyber Security Blog

    The Google-China Detente Continues

    • 2 Comments
    Investor’s Business Daily had a Friday story about how China renewed the Internet search king Google’s license to operate in China for another year: China and Google reached an uneasy truce Friday as the country with the most Web users renewed the Internet...
  • Terry Zink's Cyber Security Blog

    Can you break the code?

    • 1 Comments
    I read this on Yahoo! News The newly formed U.S. Cyber Command is supposed to centralize and focus the military's ability to wage war over the Internet, but so far it's basically famous for brainteasers. The command's fancy logo contains a super-secret...
  • Terry Zink's Cyber Security Blog

    When did it all begin?

    • 0 Comments
    Continuing on from my theme of Futurama-related posts, most people who watch the show will no doubt know that the show is very clever for the amount of humorous inside jokes referring to science and mathematics.  For example, one time Bender has...
  • Terry Zink's Cyber Security Blog

    The voluntary discarding of privacy

    • 0 Comments
    When I heard that Futurama was being brought back on the air for new episodes, it was a very happy day for me.  Futurama is one of cartoons I have watched that is actually still funny (Simpsons?  Nope.  South Park?  It was for a long...
  • Terry Zink's Cyber Security Blog

    Microsoft .NET vs Java – trailer

    • 1 Comments
    Okay, a friend sent me this and I found it really funny.  Enjoy!
Page 1 of 1 (16 items)