Starting in 1996, Alexa Internet has been donating their crawl data to the Internet Archive. Flowing in every day, these data are added to the Wayback Machine after an embargo period.
Starting in 1996, Alexa Internet has been donating their crawl data to the Internet Archive. Flowing in every day, these data are added to the Wayback Machine after an embargo period.
TIMESTAMPS
The Wayback Machine - https://web.archive.org/web/20160731173736/http://www.computerworld.com:80/blog/security-levity
If you've been glued to the World Cup, you'll know that there's more to the matches than soccer (football for our international audience). I'm talking about those incessant horns -- the vuvuzelas. They're really catching people's...
"You Could Save up to 50% on Your Phone Bill!" screamed an email from Vonage. Naturally, users complained this unsolicited, bulk email was spam. But some spam filters weren't having it -- a surprising number of these messages reached...
In this week's Security Levity, I want to talk about the recent AT&T Apple iPad privacy breach, as discovered by Goatse Security. I also want to talk more generally about how companies often leak their customers' email addresses....
In today's Security Levity, I've got more on the outbound spam problem. Back in April, I argued that it's critical for networks to block outbound spam, to protect your reputation and the deliverability of your email. I also said that...
In this week's Security Levity, I want to address the fears raised about a new phishing trick. Dubbed tabnapping, it was recently dreamed up by Mozilla's Aza Raskin. Commentators around the web are worrying about its potential. But...
In this week's Security Levity: a reply to a couple of reader questions about spam filtering techniques. Specifically, the types of techniques that can be used when the sender's reputation is 'gray'. What do I mean by 'gray'...
In this week's Security Levity, the second part of my interview with Abhilash V. Sonwane, vice president of product management at Cyberoam. Abhilash has extensive experience building data-loss-prevention solutions that help...
This week's Security Levity is a follow-on from last week's. I want to talk about one more spammer trick: how they misuse spam filters, to try to get delivered to the inbox. Spam filters are great. The best ones protect our inboxes...
In the next two weeks' Security Levity, I want to cover some more tricks that spammers employ to avoid spam filters. This time: messing around with the embedded web links in their messages. Most spam filters include a link...
In this week's Security Levity, I'm interviewing Cameron Brown, the VP of engineering at Sendio. Cameron has been architecting email protection systems for many years; he has an interesting perspective on balancing simplicity with...
In this week's Security Levity, I want to talk more about zombies and botnets, sharing the results of some research we've been doing into this problem. I'll also pass on some encouraging recent news that hasn't gotten the attention...
This week in Security Levity, I'm digging further into the topic of spam filtering technology. Today, I want to talk about why spam filtering seems to be such a continual challenge for filter vendors. I mean, we've been filtering...
Earlier in Security Levity, I argued that you should block outbound spam, because otherwise your legitimate email may go unread. Here's another reason why you should control outbound spam. As I'll explain in this post, it isn't only...
This week on Security Levity, I want to talk about a recent trend in spamming and spam filtering, which has important implications for people who run email networks -- be they corporate or consumer. In summary: it's now critical for...
In this week's Security Levity, I want to talk about spam again -- not email spam, but spam sent via SMS. Also known as text message spam. I want to get to the bottom of whether SMS spam is as big a problem as email spam -- and if...
This week in Security Levity, I want to talk about 'Web reputation' and how it's used to protect users from malicious Web sites, or sites with malicious content for some other reason. History tweetmeme_source = "AmirLev";...
In this week's Security Levity, I'm interviewing Abhilash V. Sonwane, vice president of product management at Cyberoam. Abhilash has extensive experience building credit card data loss-prevention solutions that help organizations...
When you look at security vendors that detect malware, you can split them into two separate camps. Vendors differentiate themselves in many ways, but this week in Security Levity, I want to talk about one particular philosophical...
This week in Security Levity, I want to respond to a request to talk about a particular anti-spam technique. A technique that claims "100% spam detection." Throughout the history of spam filtering, we've seen countless ways of...
From time to time, I hear security vendors make claims that make no sense. In fact, let's not mince words: I sometimes hear security vendors lie. There, I said it.This week on Security Levity, I want to talk about one such example....