Hinweis
Für den Zugriff auf diese Seite ist eine Autorisierung erforderlich. Sie können versuchen, sich anzumelden oder das Verzeichnis zu wechseln.
Für den Zugriff auf diese Seite ist eine Autorisierung erforderlich. Sie können versuchen, das Verzeichnis zu wechseln.
Discussing Internet security in (mostly) plain English
Out of the office for a while
I’m out of the office for a while so there won’t be many updates to this blog in January, 2013. See...
Author: tzink Date: 12/31/2012
Practical Cybersecurity, Part 6 – Bringing it all together
How young to start? Where should we teach cyber security? Should it be something that people learn...
Author: tzink Date: 12/30/2012
Practical Cybersecurity, Part 5 – What should we teach?
What concepts should we teach? What topics are the most important ones for users to learn? There are...
Author: tzink Date: 12/30/2012
Practical Cybersecurity, part 4 – Metacognition
Metacognition A third technique that supports transfer is teaching methods that incorporate...
Author: tzink Date: 12/30/2012
Practical Cybersecurity, Part 2 – Expertise
Expertise If we want to teach people to be cyber aware, they need expertise. But how much is enough?...
Author: tzink Date: 12/30/2012
Practical Cybersecurity, Part 1 – The problem of Education
I thought I’d close out the year by presenting my 2011 Virus Bulletin presentation. It builds...
Author: tzink Date: 12/30/2012
My behavior has changed when answering my phone due to my suspicious nature of unsolicited email
Nowadays, whenever I get email from someone I don’t recognize, I am instantly suspicious of it. To...
Author: tzink Date: 12/22/2012
IT Gangnam Style parody from F5 networks
I found this Gangnam Style parody from F5 networks yesterday entitled “IT Style.” I found it...
Author: tzink Date: 12/21/2012
Another day, another phish campaign
Today we are seeing another high volume spam campaign. It is very similar to the one I wrote about...
Author: tzink Date: 12/18/2012
Large scale spoofing campaign
Over the past week or so we have seen a lot of spoofing going on with campaigns that look like the...
Author: tzink Date: 12/17/2012
Google, Apple, Microsoft… why is there such fanboy-ism in tech?
I’m going to depart from my typical security related topics to discuss another issue: fanboy-ism....
Author: tzink Date: 12/09/2012
A whole slew of security reports
If you’re looking for something to read, say, the latest trends on Internet threats, I have a...
Author: tzink Date: 12/07/2012
Do you know this guy? The troll? Internet Explorer fights back.
For years, Internet Explorer has been maligned as the browser that trails the others (Firefox and...
Author: tzink Date: 11/30/2012
Oh, Microsoft, where art thou?
In its recent Q3 2012 Threat Evolution, Kaspersky reported on the Top Ten Threats that it saw during...
Author: tzink Date: 11/21/2012
A promising new antispam technique – does it deliver what it promises?
I’m always skeptical when I read about new antispam techniques, especially those ones coming out of...
Author: tzink Date: 11/21/2012
How to measure False Positive rates
As someone who is in charge of our spam filtering here in Microsoft Forefront (i.e., I’m on the spam...
Author: tzink Date: 10/31/2012
Is the term “cyberwarfare” overstating the case?
At the Virus Bulletin conference last month, Andrew Lee from ESET gave a talk entitled “Cyberwar:...
Author: tzink Date: 10/26/2012
The modern face of mobile malware
At the Virus Bulletin Conference last month in Dallas, Grayson Milbourne and Armando Orozco...
Author: tzink Date: 10/25/2012
A couple of unsurprising tidbits on passwords
Digital Trends published an article yesterday entitled What’s the Worst Password of 2012? Retaining...
Author: tzink Date: 10/24/2012
Evaluating anti-virus products with field studies
Did you ever wonder how people get malware onto their computer? Or how effective real life A/V...
Author: tzink Date: 10/19/2012
How should large financial institutions use hosted filtering?
This post is an opinion piece that reflects what I think are best practices. Should large financial...
Author: tzink Date: 10/18/2012
Will cyberwar create new rules of engagement? And will there be a draft?
I read an interesting article on ReadWriteWeb yesterday entitled New Cyberwar Rules Of Engagement:...
Author: tzink Date: 10/16/2012
The pros and cons of Bring Your Own D(evice|estruction)
At the Virus Bulletin conference this past September in Dallas, Righard Zwienenberg from ESET gave a...
Author: tzink Date: 10/09/2012
Do tech-savvy readers practice what they preach?
While at the Virus Bulletin conference in Dallas last week, Sabina Raluca Datcu and Ioana Jelea of...
Author: tzink Date: 10/04/2012
A Plan for Email over IPv6, part 5 – Removals, Key differences and standards
What happens if spammers get on the whitelists? The question arises – what happens if a...
Author: tzink Date: 10/01/2012
A Plan for Email over IPv6, part 4 – Population of the whitelists
Population of the whitelists How do email receivers go about populating whitelists? The whole...
Author: tzink Date: 10/01/2012
A Plan for Email over IPv6, part 3 – A solution
A solution How do we deal with it? Eventually, the Internet community will come up with a permanent...
Author: tzink Date: 10/01/2012
A Plan for Email over IPv6, part 2 – Why we use IP blocklists in IPv4, and why we can’t in IPv6
IP Blocklists Blocklists are populated in a number of different ways. Some use spam traps to capture...
Author: tzink Date: 10/01/2012
A Plan for Email over IPv6, part 1 – Introduction, and How Filters Work in IPv4
Last week, myself and a colleague from work did a presentation at the Virus Bulletin conference...
Author: tzink Date: 10/01/2012
What do consumers know about Antivirus?
I’ve been at the Virus Bulletin 2012 conference in Dallas, Texas this week and there have been a lot...
Author: tzink Date: 09/28/2012
Mail from legitimate webmail sources
For many years, I have tracked spam from botnets and reported on it on this blog. I have analyzed...
Author: tzink Date: 09/18/2012
The Psychology of Spamming, part 5 - Solutions
Solutions So how do we get people to stop falling for scams? Will Cognition Save Us? Thinking about...
Author: tzink Date: 09/15/2012
The Psychology of Spamming, part 4 - Why we fall for scams
Impact We humans had Stone Age ancestors for a long time and our limbic systems kept us alive; when...
Author: tzink Date: 09/15/2012
The Psychology of Spamming, part 3 - External factors that influence our decisions
Spam, Emotion and Decision Researchers distinguish between two types of emotions – expected...
Author: tzink Date: 09/14/2012
The psychology of spamming, part 1 - How our brains work
In honor of the Virus Bulletin conference next week in Dallas, at which I am presenting my ideas for...
Author: tzink Date: 09/13/2012
Combating phishing
From time to time, customers call in and ask us what we are doing to combat phishing attacks. My...
Author: tzink Date: 08/30/2012
How rainbow tables work
This year, I heard the term “rainbow tables” in regards to passwords and how hackers use them to...
Author: tzink Date: 08/29/2012