Author Archives: Dan Blacharski

About Dan Blacharski

The corporate world unceremoniously booted Dan Blacharski out of his cubicle over 15 years ago, and he’s never looked back. Since that time, he has been a full-time professional freelance writer, public relations consultant and analyst, and has published six books and thousands of articles. He divides his time between South Bend, Indiana and Bangkok, and married the renowned Thai writer Charoenkwan Prakthong in 2005. He and his wife enjoy traveling the world, and spending time with their Boston Terrier, Pladook.

Identity theft is the real thing

Last week, a Wall Street Journal article entitled “The fallacy of identity theft” may have given some people the mistaken impression that there’s nothing to worry about, and that everyone’s identities are safe. Unfortunately, however, that’s not quite the case, and …

Identity theft is the real thing
   

Media overloads with fishing analogies in Operation Phish Phry reports

The FBI, depending on the news story you read, either “netted,” “snared,” “hooked,” “reeled in” or “lured” a huge number of cybercriminals in a massive phishing investigation. We’ll resist the temptation to add to the trend by referring to the …

Media overloads with fishing analogies in Operation Phish Phry reports
   

Email scam steals money by pretending to be IRS

Nobody likes getting a letter from the IRS (except if it has a check in it, that is), and so emails from the IRS are likely to cause a bit of angst as well. But when you get an email …

Email scam steals money by pretending to be IRS
   

Twitter hit by spam wave

Twitter has been in the news the past few days, and it’s not been pretty. On Wednesday, the Mashable blog reported that scads of Twitter accounts were seen sending out Twitter spam with URL links all at once. The spam …

Twitter hit by spam wave
   

Understanding how botnets work

It would be a fair bet to say that scientists at Sandia National Laboratories have seen “Night of the Living Dead.” The Livermore, California researchers embarked on a test to duplicate a zombie network a million strong. The researchers ran …

Understanding how botnets work
   

Most of us have got accustomed to using spam filters, so we never even see most of it. The spam that does get through, we tend to ignore. We just glance past it, delete it, and never bother reading it, …

Who responds to spam?
   

The Conference on E-mail and Anti-Spam, held in Mountain View, California this week, brought to light some interesting trends in spam and research on where it comes from. According to a report in today’s MIT Technology Review, new research highlights …

How do spammers get your email address?
   

New zero-day IE bug triggers mass attacks

Microsoft released a security advisory this week about a dangerous vulnerability in the Microsoft Video ActiveX Control (msvidctl.dll), which is used for streaming video. According to the advisory, an attacker who exploits the vulnerability could gain the same rights to an attacked …

New zero-day IE bug triggers mass attacks
   

Top Ten Anti-Spam Tips for Business

Just about every company has some sort of anti-spam technology in place that filters out suspected spam. The technology is commonplace and inexpensive, and for the most part, effective. But beyond simply putting in some anti-spam software and forgetting about …

Top Ten Anti-Spam Tips for Business
   

Phishing Down Under

The Sydney Morning Herald reported yesterday that a new scam is making the rounds in the land down under. A perpetrator of a phishing scam has created an email scam, claiming to be the Australian Tax Office (ATO). The email …

Phishing Down Under