Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


How to expand your search sources

Explore search services beyond Google and Bing for a wider range of results, customization and privacy options.

If you search the web in English, you most likely use Google. Search engine market share ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.  250th edition

It is nearly five years since I started curating this weekly Saturday cybersecurity news round-up.  I hope you are finding this column useful.


“Change Password”

[2022.03.17] Oops: – Instead of telling you when it’s safe to cross the street, the walk signs in Crystal City, VA are just repeating ‘CHANGE PASSWORD.’ Something’s gone ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Elephant Phish

Chef’s Special:  BitB Phish

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a warning, examples of ...

Continue Reading →
0

Is Russia Ready To Turn Out Our Lights?

By Bob Weiss

CISA issued a bulletin last week (see below) about Russian capabilities to attack the US energy sector.  I have been warning about this danger since 2016, when I read Ted Koppel’s book Lights Out.  The timeframe of the current alert (2011 to 2018) coincides with the Obama/Biden Administration, interestingly enough.  Not the Trump administration though ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


NSA Releases Network Infrastructure Security Guidance

Original release date: March 3, 2022

The National Security Agency (NSA) has released a new Cybersecurity Technical Report (CTR): Network Infrastructure Security Guidance. The report captures best practices based on the depth and breadth of experience in supporting customers and responding to threats. Recommendations include perimeter and internal network ...

Continue Reading →
0
Page 1 of 4 1234