What Does SQL Injection Look Like?

SQL injection is one of the top ten web site and web application exploits, according to OWASP, the Online Web Application Security Project.  I use Wordfence, a popular security plugin on my website, and occasionally Wordfence sends sends reports like the one below.  Double clicking on the picture will open it in a photo viewer, and allow you to see it full size.

Continue Reading →

0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Routine Check Phish

Chef’s Special:  Google Finds Thousands of Phish

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Ticketmaster Hacked Competitor to Steal Data and Analytics, Fined Millions

From SecureWorld.  What’s that saying in business? “If you can’t beat ’em… hack ’em.” Newly released court documents show that some executives and employees at Ticketmaster did exactly that. What were they targeting? Access to a competitor’s proprietary data and analytics relating to concert ticket pre-sales. Ticketmaster ...

Continue Reading →
0

Guest Post – What Proactive IT Maintenance Can Do For Your Company

A company’s information technology infrastructure is its most vital intangible asset. Maintaining assurance that every part of it is functioning well is key to running regular business operations. There are different approaches to system maintenance, but one that’s being highlighted now more than ever is proactive maintenance.

Proactive maintenance is a strategy that prioritizes finding the root cause of failure to prevent it ...

Continue Reading →
0

The Exclusive Red Team in the Cyber Security

Guest post contributed by Ester Adams

The Cyber Community – explained.

Cyber communities arise when problems originate digitally. They are engaged in computer-mediated communication. Their language is far more complicated than our local language. But, they possess the skills to translate the computer language in a way that locals can understand.  Online communities are subjected to lesser physical restrictions compared to their ...

Continue Reading →
0

Things to Know About Managed Security Services

A guest post from Emma Smith

Have you ever dealt with cyber-attacks? Do you know the process to save your IT system from ransomware, malware, and virus infections? Your employees could not do anything on your system and your clients will suffer from serious problems due to such cyber-attacks. You cannot provide digital and physical services to your customers, and a cyber-attack can ruin your company’s reputation.

Continue Reading →

0
Page 5 of 93 «...34567...»