Lorenzo von Matterhorn

I don’t normally comment on things I see on TV… wait a minute, what am I talking about?  I do that all the time.  Anyhow, yesterday I was watching the show “How I Met Your Mother.”  One of the main characters, Barney Stinson, has a scheme that uses in order to meet members of the…

3

If only she knew who she was talking to

This is another vignette that I am posting while I am out traveling. The other day, I popped into Half Price Books to pick up a couple of novels by Michael Crichton.  I don’t know if there’s a Half Price Books in your area, but the one in mine is awesome.  I can get all…

1

Another story about social engineering

I’m still out traveling, so below is a personal vignette about social engineering. A couple of weeks ago, I headed off to a murder mystery free form game. If you’ve never been to one, it’s a ton of fun.  The basic theme is that everyone plays a role in a wider story arc.  This year’s…

0

Some Microsoft humor

Did you ever wonder what it’s like to work at Microsoft?  Click on the link below to check out a humorous parody of what we all go through every day. Click here to watch the video (offsite).

0

Some antispam humour

While I am out, I am posting some random stuff from around the web.  From AppleGeeks:

0

A positive (?) story about social engineering

I’m currently on vacation in South America* so I thought I’d pre-write a few stories about how spam/malware relates to real life. We all know that a big trend in recent years with malware is social engineering.  Social engineering is an attempt to trick the end user into doing something by impersonating someone else or…

2

Traveling for the next little while

I am going to be traveling in Peru for the next little while, but fear not!  I shall still be blogging! I have written a few posts in advance to entertain you all that shall become publically visible over the next few days.  Enjoy.

0

Virus attachments vs email classified as malware

This probably belongs in the “Well, no kidding” category but I thought I would post it anyhow.  Since near the beginning of this year, I have been tracking how much email our filters classify as malware.  I then took those values, broke them down into a weekly chart and compared it to how many mails…

2

Where’s rustock?

Win32/Rustock is a multi-component family of rootkit-enabled backdoor trojans, which were historically developed to aid in the distribution of spam e-mail. First discovered sometime in early 2006, Rustock has evolved to become a prevalent and pervasive threat.  It is the largest spamming botnet that sends mail to our servers. I decided to take a look…

0

FireEye knocks Mega-d offline

From the Register: A botnet that was once responsible for an estimated third of the world’s spam has been knocked out of commission thanks to researchers from security firm FireEye. After carefully analyzing the machinations of the massive botnet, alternately known as Mega-D and Ozdok, the FireEye employees last week launched a coordinated blitz on…

0

Are pirated versions of software more susceptible to malware? Updated!

One of the pieces of conventional wisdom that goes through my head is that if you install pirated versions of software, then your computer is more likely to be infected with malware.  It makes sense; in order for spammers/malware authors to take control machine, they offer users cheap software.  Yet this cheap software comes with…

1

Countries with the most infected computers

All Spammed Up has a new post up referencing an article that security researchers have issued a report indicating that Spain is the country with the most infected computers, at 44.5%.  The United States is second at 14.4%.  The countries with the least infections are Sweden, The Netherlands and Peru. The Microsoft Security and Intelligence…

1

Changing the title of this blog

For the very first time since I created this blog back in July of 2006, I am changing it’s title.  It is no longer “Terry Zink’s Anti-spam Blog”, it is now “Terry Zink’s Anti-malware Blog”. I have not moved out of spam.  Instead, I have decided to broaden the focus of this blog to include…

0

The Story of Conficker, part 3

Setbacks and Triumphs The domain registration task became exponentially more challenging on March 4, 2009, with the discovery of Worm:Win32/Conficker.D. Investigators reverse-engineered the new variant and determined that it was programmed to generate 50,000 new domain names a day across 110 TLDs, beginning on April 1, 2009. Though this seemed at first like an impossible…

0

The Story of Conficker, part 2

 The Conficker Working Group Is Born In January 2009, representatives from a number of security research companies and domain registrars, along with the anti-botnet Shadowserver Foundation, began discussing how best to implement a defensive Domain Name Service (DNS) strategy to handle domain registrations. To coordinate the significant amount of e-mail being generated by these discussions,…

0