Friday Phish Fry

Phishing Email Alerts

Catch of the Day: eFax Phish
Chef’s Special: Geek Squad phish

Examples of clever phish that made it past my spam filters and into my inbox. Some are sent by clients or readers like you, and other reliable sources on the Internet.

You can send phishing samples to me at phish@wyzguys.com.

My intention is to provide a warning and show current examples of phishing ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices

Original release date: June 7, 2022

CISA, the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) have released a joint Cybersecurity Advisory (CSA) to provide information on ways in which People’s Republic of China (PRC) state-sponsored cyber actors continue to exploit publicly known ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  I Took A Survey Phish

Examples of clever phish that made it past my spam filters and into my inbox. Some are sent by clients or readers like you, and other reliable sources on the Internet.

You can send phishing samples to me at phish@wyzguys.com.

My intention is to provide a warning and show current examples of phishing scams, ...

Continue Reading →
0

Technological Trends That Will Define This Decade

The world of technology has changed beyond description in the previous decade. Consider the start of the year 2009. You grew up before the iPad, Uber, and even Instagram. Fitness trackers were, in essence, pedometers. “If the smartphone looks to be more of a slow mobile, hang in there,” Wired encouraged consumers in 2010. The fourth ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Collaboration Solves the Cyber Risk to Business Risk Challenge

[Bob’s comment:  If you have taken a CISSP or other cybersecurity class from me, you already know that the CIS 20 Controls are my favorite cybersecurity framework.  Here is a new set of tools for doing a risk assessment based on the 20 Controls.]

Over the past year, the ...

Continue Reading →
0
Page 1 of 234 12345...»