Share via


Terry Zink: Security Talk

Discussing Internet security in (mostly) plain English

Out of the office for a while

I’m out of the office for a while so there won’t be many updates to this blog in January, 2013. See...

Author: tzink Date: 12/31/2012

Practical Cybersecurity, Part 6 – Bringing it all together

How young to start? Where should we teach cyber security? Should it be something that people learn...

Author: tzink Date: 12/30/2012

Practical Cybersecurity, Part 5 – What should we teach?

What concepts should we teach? What topics are the most important ones for users to learn? There are...

Author: tzink Date: 12/30/2012

Practical Cybersecurity, part 4 – Metacognition

Metacognition A third technique that supports transfer is teaching methods that incorporate...

Author: tzink Date: 12/30/2012

Practical Cybersecurity, Part 2 – Expertise

Expertise If we want to teach people to be cyber aware, they need expertise. But how much is enough?...

Author: tzink Date: 12/30/2012

Practical Cybersecurity, Part 1 – The problem of Education

I thought I’d close out the year by presenting my 2011 Virus Bulletin presentation. It builds...

Author: tzink Date: 12/30/2012

My behavior has changed when answering my phone due to my suspicious nature of unsolicited email

Nowadays, whenever I get email from someone I don’t recognize, I am instantly suspicious of it. To...

Author: tzink Date: 12/22/2012

IT Gangnam Style parody from F5 networks

I found this Gangnam Style parody from F5 networks yesterday entitled “IT Style.” I found it...

Author: tzink Date: 12/21/2012

Another day, another phish campaign

Today we are seeing another high volume spam campaign. It is very similar to the one I wrote about...

Author: tzink Date: 12/18/2012

Large scale spoofing campaign

Over the past week or so we have seen a lot of spoofing going on with campaigns that look like the...

Author: tzink Date: 12/17/2012

Google, Apple, Microsoft… why is there such fanboy-ism in tech?

I’m going to depart from my typical security related topics to discuss another issue: fanboy-ism....

Author: tzink Date: 12/09/2012

A whole slew of security reports

If you’re looking for something to read, say, the latest trends on Internet threats, I have a...

Author: tzink Date: 12/07/2012

Do you know this guy? The troll? Internet Explorer fights back.

For years, Internet Explorer has been maligned as the browser that trails the others (Firefox and...

Author: tzink Date: 11/30/2012

Oh, Microsoft, where art thou?

In its recent Q3 2012 Threat Evolution, Kaspersky reported on the Top Ten Threats that it saw during...

Author: tzink Date: 11/21/2012

A promising new antispam technique – does it deliver what it promises?

I’m always skeptical when I read about new antispam techniques, especially those ones coming out of...

Author: tzink Date: 11/21/2012

How to measure False Positive rates

As someone who is in charge of our spam filtering here in Microsoft Forefront (i.e., I’m on the spam...

Author: tzink Date: 10/31/2012

Is the term “cyberwarfare” overstating the case?

At the Virus Bulletin conference last month, Andrew Lee from ESET gave a talk entitled “Cyberwar:...

Author: tzink Date: 10/26/2012

The modern face of mobile malware

At the Virus Bulletin Conference last month in Dallas, Grayson Milbourne and Armando Orozco...

Author: tzink Date: 10/25/2012

A couple of unsurprising tidbits on passwords

Digital Trends published an article yesterday entitled What’s the Worst Password of 2012? Retaining...

Author: tzink Date: 10/24/2012

Evaluating anti-virus products with field studies

Did you ever wonder how people get malware onto their computer? Or how effective real life A/V...

Author: tzink Date: 10/19/2012

How should large financial institutions use hosted filtering?

This post is an opinion piece that reflects what I think are best practices. Should large financial...

Author: tzink Date: 10/18/2012

Will cyberwar create new rules of engagement? And will there be a draft?

I read an interesting article on ReadWriteWeb yesterday entitled New Cyberwar Rules Of Engagement:...

Author: tzink Date: 10/16/2012

The pros and cons of Bring Your Own D(evice|estruction)

At the Virus Bulletin conference this past September in Dallas, Righard Zwienenberg from ESET gave a...

Author: tzink Date: 10/09/2012

Do tech-savvy readers practice what they preach?

While at the Virus Bulletin conference in Dallas last week, Sabina Raluca Datcu and Ioana Jelea of...

Author: tzink Date: 10/04/2012

A Plan for Email over IPv6, part 5 – Removals, Key differences and standards

What happens if spammers get on the whitelists? The question arises – what happens if a...

Author: tzink Date: 10/01/2012

A Plan for Email over IPv6, part 4 – Population of the whitelists

Population of the whitelists How do email receivers go about populating whitelists? The whole...

Author: tzink Date: 10/01/2012

A Plan for Email over IPv6, part 3 – A solution

A solution How do we deal with it? Eventually, the Internet community will come up with a permanent...

Author: tzink Date: 10/01/2012

A Plan for Email over IPv6, part 2 – Why we use IP blocklists in IPv4, and why we can’t in IPv6

IP Blocklists Blocklists are populated in a number of different ways. Some use spam traps to capture...

Author: tzink Date: 10/01/2012

A Plan for Email over IPv6, part 1 – Introduction, and How Filters Work in IPv4

Last week, myself and a colleague from work did a presentation at the Virus Bulletin conference...

Author: tzink Date: 10/01/2012

What do consumers know about Antivirus?

I’ve been at the Virus Bulletin 2012 conference in Dallas, Texas this week and there have been a lot...

Author: tzink Date: 09/28/2012

Mail from legitimate webmail sources

For many years, I have tracked spam from botnets and reported on it on this blog. I have analyzed...

Author: tzink Date: 09/18/2012

The Psychology of Spamming, part 5 - Solutions

Solutions So how do we get people to stop falling for scams? Will Cognition Save Us? Thinking about...

Author: tzink Date: 09/15/2012

The Psychology of Spamming, part 4 - Why we fall for scams

Impact We humans had Stone Age ancestors for a long time and our limbic systems kept us alive; when...

Author: tzink Date: 09/15/2012

The Psychology of Spamming, part 3 - External factors that influence our decisions

Spam, Emotion and Decision Researchers distinguish between two types of emotions – expected...

Author: tzink Date: 09/14/2012

The psychology of spamming, part 1 - How our brains work

In honor of the Virus Bulletin conference next week in Dallas, at which I am presenting my ideas for...

Author: tzink Date: 09/13/2012

Combating phishing

From time to time, customers call in and ask us what we are doing to combat phishing attacks. My...

Author: tzink Date: 08/30/2012

How rainbow tables work

This year, I heard the term “rainbow tables” in regards to passwords and how hackers use them to...

Author: tzink Date: 08/29/2012

<Previous Next>