The Top Spamming Countries
A little over a week ago, Sophos published a blog post about the countries that sent the most spam in the third quarter of 2012. They found that India was number one on the list with 16% of the spam,...
View ArticleIs the term “cyberwarfare” overstating the case?
At the Virus Bulletin conference last month, Andrew Lee from ESET gave a talk entitled “Cyberwar: Reality or Weapon of Mass Distraction?”In it, Lee talks about how the term “cyberwar” is thrown around...
View ArticleHow to measure False Positive rates
As someone who is in charge of our spam filtering here in Microsoft Forefront (i.e., I’m on the spam team and one of my tasks is to improve the service, but it’s not me all by myself), there are two...
View ArticleU.S. potentially looking to establish a cyber “army” national reserve
<My fist slams down on the desk in a satisfied act of self-congratulations>I knew it!A couple of weeks ago on my blog, I wrote a blog post entitled Will cyberwar create new rules of engagement?...
View ArticleThe relationship between economics, malware and piracy
Today, I read a report released by the Legatum Institute where they published their 2012 Prosperity Index. In their research, they surveyed 142 countries and ranked them against eight variables: their...
View ArticleA promising new antispam technique – does it deliver what it promises?
I’m always skeptical when I read about new antispam techniques, especially those ones coming out of academia. Today, while browsing news stories, I came across the following article entitled Scientists...
View ArticleIsrael also looking to a cyber army national reserve
The same day I wrote my blog post US potentially looking to establish a cyber army national reserve, I stumbled across another article in the Telegraph: Israel invests millions in drive for elite cyber...
View ArticleOh, Microsoft, where art thou?
In its recent Q3 2012 Threat Evolution, Kaspersky reported on the Top Ten Threats that it saw during the previous three months. Here they are with the percentage of users on whose computer the...
View ArticleCyber security conference in Asia
I was contacted by a reader of mine about an upcoming conference in 2013 in Asia – the 3rd Annual Cyber Security for Government Asia 2013, to be held in Kuala Lumpur.I’m always interested by...
View Article10 Simple Things you should do to Protect your Privacy
A couple of months ago, Kashmir Hill over at Forbes published an editorial on 10 simple things you should do to protect your privacy. I thought I would repost them here. I’m not going to go into detail...
View ArticleAre spammers just like high frequency traders? Or is it the other way around?
A couple of weeks ago, we had a problem wherein a spammer signed up for our service tens of thousands of times and started sending out low volume spam. He would send a small blast and then discard the...
View ArticleDo you know this guy? The troll? Internet Explorer fights back.
For years, Internet Explorer has been maligned as the browser that trails the others (Firefox and Chrome). However, to its credit, IE 9 and 10 has always performed very well in security tests, beating...
View ArticleA whole slew of security reports
If you’re looking for something to read, say, the latest trends on Internet threats, I have a whole bunch of them here for your online perusal. I’ve gone through them and I have a highlight from each...
View ArticleGoogle, Apple, Microsoft… why is there such fanboy-ism in tech?
I’m going to depart from my typical security related topics to discuss another issue: fanboy-ism.You all reading this know what I mean – it’s when people have such a devotion to a certain product that...
View ArticleLarge scale spoofing campaign
Over the past week or so we have seen a lot of spoofing going on with campaigns that look like the following:These campaigns have the following characteristics:They are high-volume zero-day campaigns....
View ArticleWhy people keep proposing a Final Ultimate Solution to the Spam Problem (FUSSP)
In the antispam world, from time to time somebody new likes to come in and propose a solution that will wipe out spam: Email authentication! Statistical classifiers! Blacklists! User education!These...
View ArticleAnother day, another phish campaign
Today we are seeing another high volume spam campaign. It is very similar to the one I wrote about yesterday:The IPs are all compromised (i.e., the spam is coming directly from botnets). The URLs point...
View ArticleIT Gangnam Style parody from F5 networks
I found this Gangnam Style parody from F5 networks yesterday entitled “IT Style.” I found it entertaining, hope you do, too, techies.
View ArticleMy behavior has changed when answering my phone due to my suspicious nature...
Nowadays, whenever I get email from someone I don’t recognize, I am instantly suspicious of it. To be sure, there are people I’ve never heard from that I want to hear from, but I am always wary...
View ArticlePractical Cybersecurity, Part 1 – The problem of Education
I thought I’d close out the year by presenting my 2011 Virus Bulletin presentation. It builds upon my 2010 presentation about why we fall for scams which I blogged about earlier this year in my series...
View Article