<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-04-30T19:14:00+00:00</dc:date>

	
	<item>
		<title> Is The Term "Cyberwarfare" Overstating the Case? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20121027_is_the_term_cyberwarfare_overstating_the_case</guid>
		<link>https://circleid.com/posts20121027_is_the_term_cyberwarfare_overstating_the_case</link>
		<description><![CDATA[At the Virus Bulletin conference last month, Andrew Lee from ESET gave a talk entitled "Cyberwar: Reality or Weapon of Mass Distraction?" In it, Lee talks about how the term "cyberwar" is thrown around a lot these days. However, he disagreed with the use of the term because it uses inflationary language and overstates the case; today's "cyberwar" is not the same as a conventional ware. <a href="https://circleid.com/posts20121027_is_the_term_cyberwarfare_overstating_the_case">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> The Pros and Cons of BYOD (Bring Your Own Device) (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20121010_the_pros_and_cons_of_byod_bring_your_own_device</guid>
		<link>https://circleid.com/posts20121010_the_pros_and_cons_of_byod_bring_your_own_device</link>
		<description><![CDATA[At the Virus Bulletin conference this past September in Dallas, Righard Zwienenberg from ESET gave a presentation entitled BYOD. BYOD stands for Bring Your Own Device, but he reframed the acronym to "Bring Your Own Destruction", that is, he alluded to the security implications of bringing your own device. BYOD is the latest trend sweeping business and schools. <a href="https://circleid.com/posts20121010_the_pros_and_cons_of_byod_bring_your_own_device">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Measuring the Cost of Cybercrime (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20121005_measuring_the_cost_of_cybercrime</guid>
		<link>https://circleid.com/posts20121005_measuring_the_cost_of_cybercrime</link>
		<description><![CDATA[Last week at Virus Bulletin in 2012, Tyler Moore of Southern Methodist University (SMU) gave a talk entitled "Measuring the cost of cyber crime." It was a study done in collaboration with multiple individuals in multiple countries. The study sought to answer this question - How much does cyber crime cost? Up until this point, nobody really knew. <a href="https://circleid.com/posts20121005_measuring_the_cost_of_cybercrime">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> A Look at Mail Patterns from Legitimate Webmail Sources (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20120919_a_look_at_mail_patterns_from_legitimate_webmail_sources</guid>
		<link>https://circleid.com/posts20120919_a_look_at_mail_patterns_from_legitimate_webmail_sources</link>
		<description><![CDATA[For many years, I have tracked spam from botnets and reported on it. I have analyzed those botnets' distribution patterns by number of IPs, number of messages per email envelope and geographical distribution. While spam from botnets is interesting, and the main source of spam, it is not the only source of spam. What about spam that originates from the MAGY sources? <a href="https://circleid.com/posts20120919_a_look_at_mail_patterns_from_legitimate_webmail_sources">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Why Passwords Have Never Been Weaker and Crackers Have Never Been Stronger (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20120822_why_passwords_never_been_weaker_and_crackers_never_been_stronger</guid>
		<link>https://circleid.com/posts20120822_why_passwords_never_been_weaker_and_crackers_never_been_stronger</link>
		<description><![CDATA[The past few weeks, I've been on this security kick particularly when it comes to encryption. I'm developing my own app in my spare time. So I'm trying a whole bunch of things, no doubt making plenty of mistakes in the process. Luckily, the data I am protecting is only quasi-valuable so I can afford to take a hit due to my own conscious incompetence. Anyhow, I ran across this article on Ars Technica yesterday entitled "Why Passwords have never been weaker - and crackers have never been stronger." It's a long article and it will take you a while to read it, but here is my summary. <a href="https://circleid.com/posts20120822_why_passwords_never_been_weaker_and_crackers_never_been_stronger">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Israeli Officials Dispute Claims of Stuxnet's Joint US/Israel Effort (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20120725_israeli_officials_dispute_claims_of_stuxnets_us_israel_effort</guid>
		<link>https://circleid.com/posts20120725_israeli_officials_dispute_claims_of_stuxnets_us_israel_effort</link>
		<description><![CDATA[A few weeks ago, the New York Times published an article saying that the Stuxnet worm, which infected a large number of Iran's nuclear power plants, was a joint effort between the United States and Israel. The program began under former president George W. Bush and continued under President Obama. Last month, the Washington Post ran an article saying that the US and Israel collaborated in a joint effort to develop Flame and that work included Stuxnet. <a href="https://circleid.com/posts20120725_israeli_officials_dispute_claims_of_stuxnets_us_israel_effort">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Cyber Criminals Infiltrate Even Small Businesses (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20120706_cyber_criminals_infiltrate_even_small_businesses</guid>
		<link>https://circleid.com/posts20120706_cyber_criminals_infiltrate_even_small_businesses</link>
		<description><![CDATA[I read an interesting article in the Wall Street Journal today entitled Cyber Criminals Sniff out Vulnerable Firms. It's a story of a small business owner in New York whose company was broken into by cyber criminals and stole $1.2 million from its bank accounts, although the owner was able to later recover about $800,000 of that. The moral of the story is that small businesses feel like they are not a major target for online thefts like these. <a href="https://circleid.com/posts20120706_cyber_criminals_infiltrate_even_small_businesses">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Who Says You Can't Have Fun at The IETF? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20120627_who_says_you_cant_have_fun_at_the_ietf</guid>
		<link>https://circleid.com/posts20120627_who_says_you_cant_have_fun_at_the_ietf</link>
		<description><![CDATA[A new IETF draft has been published that specifies a new HTTP status code for legally restricted resources. That is, if the government restricts your access to the web page, return this code (similar to how something not found is a 404). The error code: 451. From the Internet Draft, if the user tries to access a page, but access to the page is restricted by the government, display the following... <a href="https://circleid.com/posts20120627_who_says_you_cant_have_fun_at_the_ietf">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Spammers' Aid Program (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20120615_spammers_aid_program</guid>
		<link>https://circleid.com/posts20120615_spammers_aid_program</link>
		<description><![CDATA[A couple of months ago, Microsoft Sweden launched a program called Spammers' Aid. This is a program (created and provided by Microsoft?) that is designed to help spammers reform their ways. The idea is that since spam is continually decreasing in email and spammers are finding it more and more difficult to get their mail delivered into the inbox, why not use the skills they acquired while spamming (sales and marketing, tech skills) and apply it for good? This program teaches them how. <a href="https://circleid.com/posts20120615_spammers_aid_program">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> According to the Department of Homeland Security, Cybercrime Is a Bigger Threat Than Terrorism (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20120607_homeland_security_cybercrime_bigger_threat_than_terrorism</guid>
		<link>https://circleid.com/posts20120607_homeland_security_cybercrime_bigger_threat_than_terrorism</link>
		<description><![CDATA[An article in Forbes the other day reports on US Secretary of Homeland Security Janet Napolitano's comments that 'cybercrime represents the "greatest threat and actual activity that we have seen aimed at the west and at the United States" in addition to "or other than Al Qaeda and Al Qaeda-related groups."' ..."Napolitano cited a study commissioned by Symantec that put the total worldwide cost of cybercrime at $388 billion -- higher than the global market for heroin, cocaine and marijuana combined." <a href="https://circleid.com/posts20120607_homeland_security_cybercrime_bigger_threat_than_terrorism">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Spam Levels Still Lower a Year After Rustock (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20120429_spam_levels_still_lower_a_year_after_rustock</guid>
		<link>https://circleid.com/posts20120429_spam_levels_still_lower_a_year_after_rustock</link>
		<description><![CDATA[Arstechnica wrote an article recently entitled Spam levels still low a year after Rustock botnet takedown. The article is more detailed that numerous things have contributed to the decline in spam since then. However, the article misrepresents Rustock's effect on the spam levels. It's completely true that Rustock was the largest botnet and sent the most spam (by total individual spam connections). <a href="https://circleid.com/posts20120429_spam_levels_still_lower_a_year_after_rustock">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Mac Hit by Another Wave of Malware... Users in Denial? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20120412_mac_hit_by_another_wave_of_malware_users_in_denial</guid>
		<link>https://circleid.com/posts20120412_mac_hit_by_another_wave_of_malware_users_in_denial</link>
		<description><![CDATA[In case you haven't been watching cyber news recently, last week various security researchers published that Macs were infected by the Flashback Trojan and that the total number of infections worldwide was 600,000. This number was published by a couple of blogs. I debated writing about this topic since we had a previous Mac outbreak last year that initially spiked up, caused Apple to go into denial about the affair before issuing a fix, and then the malware kind of went away. Will this follow the same pattern? <a href="https://circleid.com/posts20120412_mac_hit_by_another_wave_of_malware_users_in_denial">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> U.S. Outgunned in Hacker War (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20120330_us_outgunned_in_hacker_war</guid>
		<link>https://circleid.com/posts20120330_us_outgunned_in_hacker_war</link>
		<description><![CDATA[The Wall Street Journal has an interview with the outgoing head of the FBI's cyber crime investigation Shawn Henry. In it, he has a blunt assessment of the US's capabilities when it comes to combatting online crime, especially data theft and hacking... The more I read around the Internet, the more clear it's becoming at how cyber security is becoming a central focus. This has pretty big implications for the cloud. <a href="https://circleid.com/posts20120330_us_outgunned_in_hacker_war">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Microsoft Disrupts the Zeus Infrastructure (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20120326_microsoft_disrupts_the_zeus_infrastructure</guid>
		<link>https://circleid.com/posts20120326_microsoft_disrupts_the_zeus_infrastructure</link>
		<description><![CDATA[Over the weekend and this morning, Microsoft, working in conjunction with others, issued civil lawsuits to sinkhole numerous domains associated with the Zeus botnet. When I say "botnet", I use the term loosely because Zeus is not a botnet in the sense that Rustock or Waledac is (or was). Rather, Zeus is a tool kit that online criminals can buy that lets them create phishing pages, perform fast fluxing, host drive-by downloads in addition to spamming. It's more like infrastructure than a botnet, although it does have a large botnet under its control. <a href="https://circleid.com/posts20120326_microsoft_disrupts_the_zeus_infrastructure">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Good Study by UCSD on Economic Realities of Spam and Profit Motives (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20120307_good_study_by_ucsd_on_economic_realities_of_spam_profit_motives</guid>
		<link>https://circleid.com/posts20120307_good_study_by_ucsd_on_economic_realities_of_spam_profit_motives</link>
		<description><![CDATA[I recently had a chance to read a report titled, "Show Me the Money: Characterizing Spam-advertised Revenue" produced as a joint effort from the University of California, San Diego (UCSD), International Computer Science Institute, and UC Berkeley by Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker and Stefan Savage. I also had a chance to hear Chris Kanich speak about the topic - Show Me The Money! This post contains my notes with some photos taken from that report. <a href="https://circleid.com/posts20120307_good_study_by_ucsd_on_economic_realities_of_spam_profit_motives">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>