Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Guidance on Sharing Cyber Incident Information

Original release date: April 7, 2022

CISA’s Sharing Cyber Event Information Fact Sheet provides our stakeholders with clear guidance and information about what to share, who should share, and how to share information about unusual cyber incidents or activity.

CISA uses this information from partners to build a common understanding of ...

Continue Reading →
0

Weekend Update

Happy New Year!!

A quick Saturday digest of cybersecurity news articles from other sources.


Serious Security: OpenSSL fixes “error conflation” bugs – how mixing up mistakes can lead to trouble

Have you ever seen the message “An error occurred”? Even worse, the message “This error cannot occur”? Facts matter!


Security and Your Phone:  What the Risks Are and How to Stay Safe

A great article and infographic ...

Continue Reading →
0

Weekend Update

Merry Christmas!!

A quick Saturday digest of cybersecurity news articles from other sources.


Office 2021 Provides On-Premises Productivity Apps

Microsoft has released a new version of its on-premises productivity suite for those customers who are not interested in using cloud-based productivity apps. Find out what [more…]

The post Office 2021 Provides On-Premises Productivity Apps appeared first on CHIPS


What you should ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


3 ways the CI/CD approach to software has made work better for developers

The software industry has gotten much better at breaking big projects down into smaller chunks, according to one CTO.  (CISSP Domain 8)


When cryptography attacks – how TLS helps malware hide in plain sight

No IT technology feels quite as much of ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Much of this content is from Bruce Schneier


Cell Phone Location Privacy

We all know that our cell phones constantly give our location away to our mobile network operators; that’s how they work. A group of researchers has figured out a way to fix that. “Pretty Good Phone Privacy” (PGPP) protects both user identity ...

Continue Reading →
0

Guest Post – New Android Ransomware Exploit

AndroidOS/MalLocker.B is the newest member of a ransomware family that has a long history of holding Android smartphones for ransom. Learn how MalLocker.B works and what you can do to keep your device safe.

There’s a new troublemaker in town. Its name is AndroidOS/MalLocker.B.

MalLocker.B is the youngest but shrewdest member of a ransomware family that has a long ...

Continue Reading →
1

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


CISA Releases Telework Essentials Toolkit

Original release date: September 30, 2020

The Cybersecurity and Infrastructure Security Agency (CISA) has released the Telework Essentials Toolkit, a comprehensive resource of telework best practices. The Toolkit provides three personalized modules for executive leaders, IT professionals, and teleworkers. Each module outlines distinctive security considerations appropriate for their ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Google Search Fails Again

Chef’s Special:  Sophos Phishing Top Ten

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Porn blast disrupts bail hearing of alleged Twitter hacker

An alleged hacker’s bail hearing held online via Zoom with screen sharing enabled… what could possibly go wrong?  Well, damn near everything as it turns out.  Maybe IT needs to help these judges learn how Zoom works?


Top 5 Questions About Ransomware and ...

Continue Reading →
0
Page 1 of 7 12345...»