Z Trek: The Alan Zeichick Weblog

No, the UN and IMF aren’t sending you $2.6 million or anything

Such an obvious scam, but for some reason, I find it amusing. Is it that they don’t know how to spell out $2.6 million? Is it that they keep repeating the amount over and over again? Is it the implied legitimacy because of the FedEx link?…
, ,

Smartphones are all about the camera nowadays

New phones are arriving nearly every day. Samsung unveiled its latest Galaxy S9 flagship. Google is selling lots of its Pixel 2 handset. Apple continues to push its iPhone X. The Vivo Apex concept phone, out of China, has a pop-up selfie camera.…
,

Patch. Sue. Repeat. That’s the plan with Spectre and Meltdown

Spectre and Meltdown are two separate computer security problems. They are often lumped together because they were revealed around the same time – and both exploit vulnerabilities in many modern microprocessors. The website MeltdownAttack,…
, , ,

Software Defined Perimeter (SDP), not Virtual Private Networks (VPN)

The VPN model of extending security through enterprise firewalls is dead, and the future now belongs to the Software Defined Perimeter (SDP). Firewalls imply that there's an inside to the enterprise, a place where devices can communicate in…
, ,

Most routine IT operations will soon be handled autonomously

Companies can’t afford downtime. Employees need access to their applications and data 24/7, and so do other business applications, manufacturing and logistics management systems, and security monitoring centers. Anyone who thinks that the…

From beyond the grave, Baron von Bismark has fake money for you

He died in 1898, but that doesn’t stop Baron Otto von Bismark from wanting to scam you from beyond the grave. Sure, he’s calling himself Diplomat Otto Bismark, but that can’t fool me: We know he’s the First Chancellor of the German Empire,…
,

Business partners and vendors might disclose your data

On February 7, 2018, the carrier Swisscom admitted that a security lapse revealed sensitive information about 800,000 customers was exposed. The security failure was at one of Swisscom’s sales partners. This is what can happen when a…

Are you dead or Alive?

Here’s a scam attempt noteworthy only for its inadvertent humor. Needless to say, any email like this is trying to defraud you. Don’t respond to such messages; simply delete them without asking why an allegedly South African email is coming…
,

Pornography is a huge security risk – especially in the workplace

Savvy businesses have policies that prevent on-site viewing of pornography, in part to avoid creating a hostile work environment — and to avoid sexual harassment lawsuits. For security professionals, porn sites are also a dangerous source…
, ,

You are not the user of the software you are designing or approving

You are not the user. If you are the CEO, CTO, chief network architect, software developer – you aren’t the user of the software or systems that you are building, or at least, you aren’t the primary user. What you are looking for…

Being scammed in French – mais non!

This just in, via Facebook Messenger, from an account called “Clemond Fernand.” It’s a scam. Don’t reply to messages like this – block the account instead. Bonjour, Je réponds a tous ceux qui sont dans la mélasse comme moi niveau…

Oklahoma is not okay for spam scammers

It’s like this scammer isn’t even trying. Dr. George is disappointed in me for setting up and missing an appointment. Fortunately he went to bat and convinced someone to pay some fees to save my $5.5 million ATM card. If I reply soon and…
,

The magnificent lunar eclipse of January 31, 2018

We had a good show this morning! Enjoy these photographs, taken with a Canon EOS 1D Mk IV with a 500mm prime lens. The first image was cropped, and the last one had its exposure boosted in post-processing by 4 stops. Otherwise, these are untouched. …
, ,

How to build trust into a connected car

Nobody wants bad guys to be able to hack connected cars. Equally importantly, they shouldn't be able to hack any part of the multi-step communications path that lead from the connected car to the Internet to cloud services – and back again.…
, , ,

Five tech predictions for 2018

We all have heard the usual bold predictions for technology in 2018: Lots of cloud computing, self-driving cars, digital cryptocurrencies, 200-inch flat-screen televisions, and versions of Amazon’s Alexa smart speaker everywhere on the planet.…

Dell’s predictions for 2018: open networking digital transformation, merchant silicon

Tom Burns, VP and General Manager of Dell EMC Networking, doesn’t want 2018 to be like 2017. Frankly, none of us in tech want to hit the “repeat” button either. And we won’t, not with increased adoption of blockchain, machine learning/deep…
, ,

More than a billion exposed and breached data records

From January 1, 2005 through December 27, 2017, the Identity Theft Resource Center (ITRC) reported 8,190 breaches, with 1,057,771,011 records exposed. That’s more than a billion records. Billion with a B. That's not a problem. That's an epidemic. That…

I don't think this is a real job offer via LinkedIn

Hello, Terry, whatever your email address is. I don't think you really have a job offer for me. For one thing, if you really connected via LinkedIn, you'd have messaged me through the service. For another, email addresses often match names.…
, ,

The ketchup bottle meets cloud computing

The pattern of cloud adoption moves something like the ketchup bottle effect: You tip the bottle and nothing comes out, so you shake the bottle and suddenly you have ketchup all over your plate. That’s a great visual from Frank Munz, software…
,

The benefits of being a lazy Java programmer

“The functional style of programming is very charming,” insists Venkat Subramaniam. “The code begins to read like the problem statement. We can relate to what the code is doing and we can quickly understand it.” Not only that, Subramaniam…
,

Alan in Swedish

At least, I think it's Swedish! Just stumbled across this. I hope they bought the foreign rights to one of my articles...
, ,

IBNS and ASN: Intent-Based Networking Systems and Application-Specific Networking

With lots of inexpensive, abundant computation resources available, nearly anything becomes possible. For example, you can process a lot of network data to identify patterns, identify intelligence, and product insight that can be used to automate…

All the Russian girls love me!

So many women in Russia are vying for my attention… and all of them, from Alina to Veronika, are using the exact same language. Needless to say, this is a scam. The scammers try too hard. One message might have gotten someone’s attention…
, ,

Artificial Intelligence is everywhere!

When the little wireless speaker in your kitchen acts on your request to add chocolate milk to your shopping list, there’s artificial intelligence (AI) working in the cloud, to understand your speech, determine what you want to do, and carry…

Nothing says fake success like a pay-to-play fake executive award

“Proudly not pay-to-play, we invite all of this years’ recipients to share their success through a complementary digital certificate and copyright to the title.” So claims the award letter. We received this email to our corporate info@…
,

Artificial Intelligence and Machine Learning are the future of software development

Millions of developers are using Artificial Intelligence (AI) or Machine Learning (ML) in their projects, says Evans Data Corp. Evans’ latest Global Development and Demographics Study, released in January 2018, says that 29% of developers…
, , ,

Let's applaud the new Wi-Fi security standard, WPA3

Wireless Ethernet connections aren’t necessarily secure. The authentication methods used to permit access between a device and a wireless router aren’t very strong. The encryption methods used to handle that authentication, and then the…
,

How Arizona got its almost-square shape west of New Mexico

A fascinating website, “How Did Arizona Get its Shape?,” shows that continental expansion in North America led to armed conflicts with Native American groups. Collectively known as the American Indian Wars, the conflicts began in the 1600s,…
,

Use the proper Wi-Fi cable for best quality of service

A friend insists that “the Internet is down” whenever he can’t get a strong wireless connection on his smartphone. With that type of logic, enjoy this photo found on the afore-mentioned Internet: “Wi-Fi” is apparently now synonymous…