Comedy, satire, opinion, political humor, and stories for your entertainment
Continue Reading →
MAY
Continue Reading →
A quick Saturday digest of cybersecurity news articles from other sources.[2023.04.17] Motherboard is reporting on AI-generated voices being used for “swatting”:
In fact, Motherboard has found, this synthesized call and another against Hempstead High School were just one small part of ...
Continue Reading →
Happy 40th Birthday Star Wars!Phishing Email Alerts
Catch of the Day: Amex Phish
Examples of clever phish that made it past my spam filters and into my inbox. Some are sent by clients or readers like you, and other reliable sources on the Internet.
You can send phishing samples to me at phish@wyzguys.com.
My intention is to provide a warning and show current examples of phishing ...
Continue Reading →Here is another article authored using ChatGPT. Here is what I asked for:
I want you to act as a cybersecurity blogger. You are writing an 800 word article about using artificial intelligence in cybersecurity products and services. It should contain the following topic sections. 1 Using AI in endpoint malware detection and prevention. 2 Using AI in intrusion ...
Continue Reading →More contributions from my Uncle Ron.
A quick Saturday digest of cybersecurity news articles from other sources.Here’s chart of the top-level DNS domain names. Originally there were only COM, ORG, GOV, MIL and NET. Check out this comprehensive article on TLDs in Wikipedia
There are also 308 delegated ccTLDs. ...
Continue Reading →
Phishing Email AlertsExamples of clever phish that made it past my spam filters and into my inbox. Some are sent by clients or readers like you, and other reliable sources on the Internet.
You can send phishing samples to me at phish@wyzguys.com.
My intention is to provide a warning and show current examples of phishing scams, related articles, ...
Continue Reading →As we approach 2023, we must be aware of the changing cybersecurity landscape and the top ten threats that await us. Among the primary threats to be mindful of are ransomware, phishing, supply chain attacks, IoT vulnerabilities, and social engineering.
To prevent these risks, it is vital to stay educated, update security protocols, and build a cybersecurity-aware culture. Individuals and organizations can better protect themselves from potential cyberattacks in the coming year by taking proactive measures and staying ahead of developing ...
Continue Reading →In a local area network for a typical business network, the DNS resolvers that would be the first used by computers on the network would be placed behind a firewall inside the LAN, or in a DMZ. If necessary, DNS resolution would be passed up the hierarchy until a server is found that has the answer.
Continue Reading →
My uncle Ron has made many contributions to the Sunday Funnies. This page is all him. Thanks Ron
Continue Reading →