Quantcast
Channel: Terry Zink: Security Talk
Browsing all 243 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

IT Gangnam Style parody from F5 networks

I found this Gangnam Style parody from F5 networks yesterday entitled “IT Style.” I found it entertaining, hope you do, too, techies. 

View Article


Image may be NSFW.
Clik here to view.

My behavior has changed when answering my phone due to my suspicious nature...

Nowadays, whenever I get email from someone I don’t recognize, I am instantly suspicious of it. To be sure, there are people I’ve never heard from that I want to hear from, but I am always wary...

View Article


Image may be NSFW.
Clik here to view.

Practical Cybersecurity, Part 1 – The problem of Education

I thought I’d close out the year by presenting my 2011 Virus Bulletin presentation. It builds upon my 2010 presentation about why we fall for scams which I blogged about earlier this year in my series...

View Article

Image may be NSFW.
Clik here to view.

Practical Cybersecurity, Part 2 – Expertise

ExpertiseIf we want to teach people to be cyber aware, they need expertise. But how much is enough? Do we want people to become security experts? Or just good enough to resist most types of scams?In...

View Article

Image may be NSFW.
Clik here to view.

Practical Cybersecurity, part 3 – Experience

Whenever people learn new information, they do it in a way that fits in to their current experiences of how they view the world. There is a children’s book called Fish is Fish. The book is about a fish...

View Article


Image may be NSFW.
Clik here to view.

Practical Cybersecurity, part 4 – Metacognition

MetacognitionA third technique that supports transfer is teaching methods that incorporate metacognition. Metacognition is “thinking about thinking” – understanding the reason behind a concept. For...

View Article

Image may be NSFW.
Clik here to view.

Practical Cybersecurity, Part 5 – What should we teach?

What concepts should we teach?What topics are the most important ones for users to learn? There are so many possibilities that it is hard to narrow down to only a handful. If we only got to pick three,...

View Article

Image may be NSFW.
Clik here to view.

Practical Cybersecurity, Part 6 – Bringing it all together

How young to start?Where should we teach cyber security? Should it be something that people learn on their own time? Or is it something that should be included into formal education?Paypal recently...

View Article


Image may be NSFW.
Clik here to view.

Teaching consumers security habits

I thought I’d round out the year with a summary of Randy Abrams’ talk from Virus Bulletin entitled Teaching Consumers Security Habits from this past year’s 2012 Virus Bulletin Conference in Dallas, TX....

View Article


Image may be NSFW.
Clik here to view.

Out of the office for a while

I’m out of the office for a while so there won’t be many updates to this blog in January, 2013. See you when I return!If you’re wondering where I am, here’s a clue:Yes, experts all say that you...

View Article

Image may be NSFW.
Clik here to view.

Phishing infographic – how phishing works

A reader sent me the following infographic detailing how phishing works. Check it out:It contains statistics on the prevalence of phishingSome characteristics of phishing messages, and Some advice on...

View Article

Image may be NSFW.
Clik here to view.

Hanging around Buenos Aires

For the last bit of December 2012 and the first part of January 2013, my wife and I were traveling in Argentina and Chile in Patagonia, the southern part of the country. The final two days were spent...

View Article

Image may be NSFW.
Clik here to view.

Still no blog posts this year

You may have noticed I haven't posted much this year. The reason is that I have been very unmotivated. I don't know why; I guess after six and a half years of writing I am running out of things to say....

View Article


Image may be NSFW.
Clik here to view.

How to use Safe Senders in EOP and FOPE

In the EOP (Exchange Online Protection, our newer service) and FOPE (Forefront Online Protection for Exchange, our older service), there are some nuances that end users should be aware of when using...

View Article

Image may be NSFW.
Clik here to view.

Why do safe senders in EOP and FOPE operate on the 5321.MailFrom address...

In my previous blog post How to use Safe Senders in EOP and FOPE, I explained that in the EOP and FOPE service, the spam filter inspects the 5321.MailFrom when doing a safe senders check whereas...

View Article


Image may be NSFW.
Clik here to view.

Smartphone OS market share vs. malware targeted at that OS

I was reading yesterday on Yahoo News (and on Flipboard yesterday on my tablet) that that the Department of Homeland Security issued a report detailing what platform mobile malware targets on your...

View Article

Image may be NSFW.
Clik here to view.

Supporting email over IPv6, part 1 – An introduction

One of the important projects I have been working on for the past few months is supporting email over IPv6. Long time readers of this blog (all four of you) will remember that last year I wrote a...

View Article


Image may be NSFW.
Clik here to view.

4 Reasons to Stop Freaking Out About the NSA

With all the chatter recently about NSA revelations and how they are spying on everyone, I found this funny video on Cracked that made me laugh a few times. I thought you all might enjoy it, too.4...

View Article

Image may be NSFW.
Clik here to view.

Another humorous anecdote about the NSA story

I found this, posted by one of my friends on Facebook. I thought it was funny and thought all of you might, too.

View Article

Image may be NSFW.
Clik here to view.

New features in Office 365

Recently, in Office 365 we introduced two new features in our Forefront Online Protection for Exchange product (FOPE). I refer to this as FOPE 14 because the service runs on Exchange version 14. This...

View Article
Browsing all 243 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>