Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


AA21-200B: Chinese State-Sponsored Cyber Operations: Observed TTPs

Original release date: July 19, 2021

Summary

This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9, and MITRE D3FEND™ framework, version 0.9.2-BETA-3. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques and the D3FEND framework for referenced defensive tactics ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Google Privacy Check-up

Chef’s Special: Blocked Message WyzMail Spoofing Phish

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a ...

Continue Reading →
0

Your Smartphone Is Tracking Your Every Move

The fact that your smartphone is tracking you should not be a surprise.  What is surprising is the astounding depth of detail that is collected about when and where you have been since the day you activated your phone.  Today I am going to show you how to uncover this information.  And delete it if you choose.

The iPhone and Significant Locations

If there ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


GoDaddy – “unauthorized individual” had access to login info

Web hosting behemoth GoDaddy just filed a data breach notification with the US state of California.

On May 4, 2020, GoDaddy, one of the world’s largest website hosting providers, disclosed that the SSH credentials of approximately 28,000 GoDaddy hosting accounts were compromised by an unauthorized attacker.

Continue Reading →

0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Hidden Cobra:  North Korean Malicious Cyber Activity

Original release date: February 14, 2020

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD) have identified the following malware variants used by the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Anniversary of the dedication of the ENIAC computer in 1946.

ENIAC (/ˈiːniæk,  ˈɛ-/; Electronic Numerical Integrator and Computer) was among the earliest electronic general-purpose computers made. It was Turing-complete, digital and able to solve “a large class of numerical problems” through reprogramming.

ENIAC was completed in 1945 and first put to work for practical purposes on December 10, 1945.  ENIAC was formally ...

Continue Reading →
0

Staying Private Online Using Popular Browsers

Is there a way to maintain privacy online, and defeat tracking without resorting to extreme measures?  We have written articles recently about the most private browsers, but using them requires changing habits and abandoning web browsers that you are already familiar with.

I came across this graphic on Pinterest, and thought it was worth sharing.  It shows some ...

Continue Reading →
0

Tomorrow Is Data Privacy Day

Keeping your information private is nearly impossible these days.  The Internet has turned us all into virtual blabbermouths oversharing everything.  And what we aren’t already sharing with wild abandon is being harvested, parsed, analyzed, stored in endless databases, and sold by big Internet companies.  Then that information is stolen by cyber-criminals and sold on the Dark Web.

The task of keeping our information private seems impossible, but there still are actions ...

Continue Reading →
1
Page 1 of 3 123