IT Gangnam Style parody from F5 networks
I found this Gangnam Style parody from F5 networks yesterday entitled “IT Style.” I found it entertaining, hope you do, too, techies.
View ArticleMy behavior has changed when answering my phone due to my suspicious nature...
Nowadays, whenever I get email from someone I don’t recognize, I am instantly suspicious of it. To be sure, there are people I’ve never heard from that I want to hear from, but I am always wary...
View ArticlePractical Cybersecurity, Part 1 – The problem of Education
I thought I’d close out the year by presenting my 2011 Virus Bulletin presentation. It builds upon my 2010 presentation about why we fall for scams which I blogged about earlier this year in my series...
View ArticlePractical Cybersecurity, Part 2 – Expertise
ExpertiseIf we want to teach people to be cyber aware, they need expertise. But how much is enough? Do we want people to become security experts? Or just good enough to resist most types of scams?In...
View ArticlePractical Cybersecurity, part 3 – Experience
Whenever people learn new information, they do it in a way that fits in to their current experiences of how they view the world. There is a children’s book called Fish is Fish. The book is about a fish...
View ArticlePractical Cybersecurity, part 4 – Metacognition
MetacognitionA third technique that supports transfer is teaching methods that incorporate metacognition. Metacognition is “thinking about thinking” – understanding the reason behind a concept. For...
View ArticlePractical Cybersecurity, Part 5 – What should we teach?
What concepts should we teach?What topics are the most important ones for users to learn? There are so many possibilities that it is hard to narrow down to only a handful. If we only got to pick three,...
View ArticlePractical Cybersecurity, Part 6 – Bringing it all together
How young to start?Where should we teach cyber security? Should it be something that people learn on their own time? Or is it something that should be included into formal education?Paypal recently...
View ArticleTeaching consumers security habits
I thought I’d round out the year with a summary of Randy Abrams’ talk from Virus Bulletin entitled Teaching Consumers Security Habits from this past year’s 2012 Virus Bulletin Conference in Dallas, TX....
View ArticleOut of the office for a while
I’m out of the office for a while so there won’t be many updates to this blog in January, 2013. See you when I return!If you’re wondering where I am, here’s a clue:Yes, experts all say that you...
View ArticlePhishing infographic – how phishing works
A reader sent me the following infographic detailing how phishing works. Check it out:It contains statistics on the prevalence of phishingSome characteristics of phishing messages, and Some advice on...
View ArticleHanging around Buenos Aires
For the last bit of December 2012 and the first part of January 2013, my wife and I were traveling in Argentina and Chile in Patagonia, the southern part of the country. The final two days were spent...
View ArticleStill no blog posts this year
You may have noticed I haven't posted much this year. The reason is that I have been very unmotivated. I don't know why; I guess after six and a half years of writing I am running out of things to say....
View ArticleHow to use Safe Senders in EOP and FOPE
In the EOP (Exchange Online Protection, our newer service) and FOPE (Forefront Online Protection for Exchange, our older service), there are some nuances that end users should be aware of when using...
View ArticleWhy do safe senders in EOP and FOPE operate on the 5321.MailFrom address...
In my previous blog post How to use Safe Senders in EOP and FOPE, I explained that in the EOP and FOPE service, the spam filter inspects the 5321.MailFrom when doing a safe senders check whereas...
View ArticleSmartphone OS market share vs. malware targeted at that OS
I was reading yesterday on Yahoo News (and on Flipboard yesterday on my tablet) that that the Department of Homeland Security issued a report detailing what platform mobile malware targets on your...
View ArticleSupporting email over IPv6, part 1 – An introduction
One of the important projects I have been working on for the past few months is supporting email over IPv6. Long time readers of this blog (all four of you) will remember that last year I wrote a...
View Article4 Reasons to Stop Freaking Out About the NSA
With all the chatter recently about NSA revelations and how they are spying on everyone, I found this funny video on Cracked that made me laugh a few times. I thought you all might enjoy it, too.4...
View ArticleAnother humorous anecdote about the NSA story
I found this, posted by one of my friends on Facebook. I thought it was funny and thought all of you might, too.
View ArticleNew features in Office 365
Recently, in Office 365 we introduced two new features in our Forefront Online Protection for Exchange product (FOPE). I refer to this as FOPE 14 because the service runs on Exchange version 14. This...
View Article