Blogs

BROWSE: Most Recent | Popular Tags |

Tags > spam

Phishing in Facebook’s Pond

By Mike Loukides
June 5, 2013

A recent blog post inquired about the incidence of Facebook-based spear phishing: the author suddenly started receiving email that appeared to be from friends (though it wasn’t posted from their usual email addresses), making the usual kinds of offers and …

Four short links: 6 February 2013

By Nat Torkington
February 6, 2013

Manipulating Google Scholar Citations and Google Scholar Metrics: simple, easy and tempting (PDF) — scholarly paper on how to citespam your paper up Google Scholar’s results list. Fortunately calling your paper “AAAAAA In-vitro Qualia of …” isn’t one of the …

Stacks get hacked: The inevitable rise of data warfare

By Alistair Croll
January 19, 2013

First, technology is good. Then it gets bad. Then it gets stable. This has been going on for a long time, likely since the invention of fire, knives, or the printed word. But I want to focus specifically on computing …

Stacks get hacked: The inevitable rise of data warfare

By Alistair Croll
January 18, 2013

First, technology is good. Then it gets bad. Then it gets stable. This has been going on for a long time, likely since the invention of fire, knives, or the printed word. But I want to focus specifically on computing …

Deconstructing a Twitter spam attack

By Peter Laflin
October 15, 2012

There has been a lot of discussion recently about the effect fake Twitter accounts have on brands trying to keep track of social media engagement. A recent tweet spam attack offers an instructive example. On the morning of October 1, …

Four short links: 10 May 2012

By Nat Torkington
May 10, 2012

Gravity in the Margins (Got Medieval) -- illuminating illuminated manuscripts with Mario. (via BoingBoing) Hours Days, Who's Counting? (Jon Udell) -- What prompted me to check? My friend Mike Caulfield, who’s been teaching and writing about quantitative literacy, says it’s because in this case I did have some touchstone facts parked in my head, including the number 10 million...

Four short links: 30 September 2011

By Nat Torkington
September 30, 2011

Fingerprinting Cameras Through Sensor Noise -- using the pattern of noise consistent between images taken from the same camera to uniquely identify the device. (via Pete Warden) Stopping Bots with Hashes and Honeypots (Ned Batchelder) -- solid techniques for preventing spambots. (via Andy Baio) Most Popular Infographics Generalized (Flowing Data) -- it's only funny because it's true. London Hospital...

Four short links: 21 June 2011

By Nat Torkington
June 21, 2011

tmux -- GNU Screen-alike, with vertical splits and other goodies. (via Hacker News) Gamifying Education (Escapist) -- a more thoughtful and reasoned approach than crude badgification, but I'd still feel happier meddling with kids' minds if there was research to show efficacy and distribution of results. (via Ed Yong) Rule of 72 (Terry Jones) -- common piece of financial...

Facebook comments: Fewer and better, or just fewer?

By Jenn Webb
March 15, 2011

Facebook's new embedded comments option offers websites an additional social layer, but does it attract or drive away content engagement?

Facebook comments: Fewer and better, or just fewer?

Facebook comments: Fewer and better, or just fewer?
By Jenn Webb
March 15, 2011

Facebook's new embedded comments option offers websites an additional social layer, but does it attract or drive away content engagement?

Four short links: 10 March 2011

By Nat Torkington
March 10, 2011

Everybody is Spamming Everybody Else on MTurk -- one researcher found >40% of HITs are spammy, but this author posted a Mechanical Turk HIT to supply recommendations for visitors to a non-existent French city and got responses from people expecting that every response would be paid regardless of quality. Javascript Garden -- a growing collection of documentation about the...

Four short links: 15 February 2011

By Nat Torkington
February 15, 2011

White House Will Propose New Digital Copyright Laws (CNet) -- If the Internet were truly empowering citizenry and bringing us this new dawn of digital democracy, the people who run it would be able to stop the oppressive grind of the pro-copyright machinery. There's no detail about what the proposed law would include, except that it will be based...

Four short links: 20 December 2010

By Nat Torkington
December 20, 2010

Gawker Tech Team Didn't Adequately Secure Our Platform -- internal memo from CTO to staff after the break-in. Notable for two things: the preventative steps, which include things like two-factor authentication and not collecting commenter details; and the lack of defensiveness. When your executives taunt 4chan and your systems get pwned as a result, it must be mighty hard...

Four short links: 31 December 2009

By Nat Torkington
December 31, 2009

Botnets and the Global Infection Rate (PDF) -- fascinating insights into botnets, control tools, and business models. Atlassian Uses OpenSocial for Internal Integration -- they use it inside their firewall to build a better dashboard. OpenSocial defines two concepts--an API for defining and working with social data (profiles, attributes, relationships) and specification for gadgets. OpenSocial's fundamental promise was interoperability--write...

Four short links: 25 December 2009

By Nat Torkington
December 25, 2009

One Billionth Spam Message Stats -- from the honeypot project comes a pile of stats about which countries spam, what they spam for, when they spam, etc. One intriguing insight our data provides is that bad guys take vacations too. For example, there is a 21% decrease in spam on Christmas Day and a 32% decrease on New Year's...

Four short links: 24 December 2009

By Nat Torkington
December 24, 2009

Jonathan Zittrain on "Minds for Sale" -- video of a presentation he gave at the Computer History Museum about crowdsourcing. In the words of one attendee, Zittrain focuses on the potential alienation and opportunities for abuse that can arise with the growth of distributed online production. He also contemplates the thin line that separates exploitation from volunteering in the...

Obscuring Email Addresses Actually Works

By Kyle Dent
July 25, 2009

I've always wondered if obscuring email addresses on web pages does any good, for example writing "bob at example dot com" instead of displaying the actual email address. It turns out it does

Postfix Postscreen to Increase Your SPF (Spam Protection Factor)

By Kyle Dent
July 7, 2009

Postfix is about to add a new tool to the anti-spam arsenal called "postscreen" for now, but the name is likely to change before it goes into a production release. Among other things postscreen detects when a client starts talking before it's supposed to. It's a daemon that accepts connections ahead of the current SMTP daemon and provides various types of filtering based on the client connection.


1 to 18 of 18
The Watering Hole