Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


3 ways the CI/CD approach to software has made work better for developers

The software industry has gotten much better at breaking big projects down into smaller chunks, according to one CTO.  (CISSP Domain 8)


When cryptography attacks – how TLS helps malware hide in plain sight

No IT technology feels quite as much of ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Much of this content is from Bruce Schneier


Cell Phone Location Privacy

We all know that our cell phones constantly give our location away to our mobile network operators; that’s how they work. A group of researchers has figured out a way to fix that. “Pretty Good Phone Privacy” (PGPP) protects both user identity ...

Continue Reading →
0

Guest Post – New Android Ransomware Exploit

AndroidOS/MalLocker.B is the newest member of a ransomware family that has a long history of holding Android smartphones for ransom. Learn how MalLocker.B works and what you can do to keep your device safe.

There’s a new troublemaker in town. Its name is AndroidOS/MalLocker.B.

MalLocker.B is the youngest but shrewdest member of a ransomware family that has a long ...

Continue Reading →
1

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


CISA Releases Telework Essentials Toolkit

Original release date: September 30, 2020

The Cybersecurity and Infrastructure Security Agency (CISA) has released the Telework Essentials Toolkit, a comprehensive resource of telework best practices. The Toolkit provides three personalized modules for executive leaders, IT professionals, and teleworkers. Each module outlines distinctive security considerations appropriate for their ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Google Search Fails Again

Chef’s Special:  Sophos Phishing Top Ten

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Porn blast disrupts bail hearing of alleged Twitter hacker

An alleged hacker’s bail hearing held online via Zoom with screen sharing enabled… what could possibly go wrong?  Well, damn near everything as it turns out.  Maybe IT needs to help these judges learn how Zoom works?


Top 5 Questions About Ransomware and ...

Continue Reading →
0

Your Smartphone Is Tracking Your Every Move

The fact that your smartphone is tracking you should not be a surprise.  What is surprising is the astounding depth of detail that is collected about when and where you have been since the day you activated your phone.  Today I am going to show you how to uncover this information.  And delete it if you choose.

The iPhone and Significant Locations

If there ...

Continue Reading →
0
Page 1 of 7 12345...»