Share via


Terry Zink: Security Talk

Discussing Internet security in (mostly) plain English

The Backscatterer.org IP list

Office 365 (Exchange Online Protection, or EOP) frequently receives questions about the...

Author: tzink Date: 08/22/2012

Designing my app with more anti-tampering in mind

As I have been writing on my blog before, I’m designing an app for the iPad and I am trying to...

Author: tzink Date: 08/17/2012

An updated look at botnets

Today I looked up the most prolific botnets for the month of July.  Earlier this year the grum...

Author: tzink Date: 08/15/2012

Hotmail to offer strong method for authentication

Recently, I read an article that says that Microsoft is going to use a better method than Gmail for...

Author: tzink Date: 08/15/2012

Microsoft ends up #1 on SpamRankings.net for July

Last month, I stumbled upon SpamRankings.net and was surprised to discover that Microsoft was listed...

Author: tzink Date: 08/09/2012

Is my friend is too overconfident in his ability to remain secure?

The other day, I had to change my Windows login password on my work computer.  As usual,...

Author: tzink Date: 08/07/2012

Designing my app with (anti) tampering in mind

As I continue on in my series about how I’m designing my app (because designing software is fun, and...

Author: tzink Date: 08/06/2012

Designing my app with sanity checks in mind

As I’ve been writing before, I’m currently working on an iPad and I’ve got security in mind. ...

Author: tzink Date: 08/05/2012

Designing secure data transfer

As I have mentioned before on this blog, I’m currently designing an iPad app and I want to build it...

Author: tzink Date: 08/01/2012

Designing my app with security in mind

As I wrote about on this blog previously, I am working on an app for iPad.  It has nothing...

Author: tzink Date: 07/25/2012

Israeli officials dispute claims of Stuxnet’s joint US/Israel effort

A few weeks ago, the New York Times published an article saying that the Stuxnet worm, which...

Author: tzink Date: 07/25/2012

A couple of helpful security tools you can use

Every once in a while, I find a great tool on the Internet that you can use to help you be more...

Author: tzink Date: 07/24/2012

Researchers knock out the grum botnet

Over on the New York Times blogs page, writer Nicole Perlroth writes about how security company...

Author: tzink Date: 07/19/2012

Today is my 8-year anniversary of fighting spam

Today is my 8-year anniversary of fighting spam.  It was July 12, 2004, that I got the job at...

Author: tzink Date: 07/12/2012

My credit card information was leaked to the Internet and all I got was this interesting eBook

This past December, private geopolitical analyst firm Stratfor was hacked when hackers from the...

Author: tzink Date: 07/12/2012

Hotmail looking to combat gray mail

Wired yesterday reported about an initiative that Hotmail is working on that combats gray mail –...

Author: tzink Date: 07/12/2012

Breaking into the security field

Brian Krebs is running a series on how to break into the Computer Security field. These are in...

Author: tzink Date: 07/06/2012

Cyber criminals infiltrate even small businesses

I read an interesting article in the Wall Street Journal today entitled Cyber Criminals Sniff out...

Author: tzink Date: 07/06/2012

A bit more on that spam from an Android botnet

A quick follow up on my previous post about spam from an Android botnet, there are a few things I...

Author: tzink Date: 07/05/2012

Who says you can’t have fun at the IETF?

A new IETF draft has been published that specifies a new HTTP status code for legally restricted...

Author: tzink Date: 06/26/2012

I’m planning an iPad app – now help me out here

Okay, let’s get specific. You read this blog because you’re interested in security so most of you...

Author: tzink Date: 06/20/2012

Android taking over as the malware author target-of-choice

A couple of weeks ago, Der Westen, a German online news magazine, published an articled entitled...

Author: tzink Date: 06/15/2012

Spammers’ Aid

A couple of months ago, Microsoft Sweden launched a program called Spammers’ Aid. This is a program...

Author: tzink Date: 06/14/2012

Evolution of the antivirus industry

I found the following elsewhere on the web.  I bumped up the original dates in the graphic by 3...

Author: tzink Date: 06/08/2012

Homeland Security, Cybercrime and terrorism, part 2

I started rambling in my previous post about the article in Forbes.  I had something else to...

Author: tzink Date: 06/06/2012

Tough week to be LinkedIn

It’s a tough week to be LinkedIn.  Today, it’s revealed that over 6 million passwords from...

Author: tzink Date: 06/06/2012

Six steps to sending email over IPv6 – my Internet Draft

A couple of weeks ago, I published my first Internet Draft to the Internet Engineering Task Force...

Author: tzink Date: 05/23/2012

What’s up with Yahoo Mail’s spam filter?

What’s wrong with Yahoo Mail’s spam filter recently?  The company has gone through CEO after...

Author: tzink Date: 05/23/2012

Spammers ruining it for everyone

Last week we had an incident with our outbound reputation that caused delivery issues to various US...

Author: tzink Date: 05/22/2012

New spam trend

A new spam trend that we have seen over the past month or so are 419’s with Word attachments. ...

Author: tzink Date: 05/21/2012

Wonder what China is doing with all of those APTs? Now you know.

Did you ever wonder what China is doing with all of those Advanced Persistent Threats that they are...

Author: tzink Date: 05/15/2012

<Previous Next>