Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


AA20-209A: Potential Legacy Risk from Malware Targeting QNAP NAS Devices

Original release date: July 27, 2020

CISA and NCSC are investigating a strain of malware known as QSnatch, which attackers used in late 2019 to target Network Attached Storage (NAS) devices manufactured by the firm QNAP.

All QNAP NAS devices are potentially vulnerable to QSnatch malware if not ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day: Why We Don’t Do Product Endorsements

Chef’s Special: Spoofing SharePoint Phish

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Happy Independence Day

This is the day we celebrate our liberation from the King of England and the British Empire.  The United States was founded through civil disobedience and even warfare against a government that some considered oppressive and unfair.  Consider this: if the British crown had won, the “founding fathers” would have been considered terrorists, and hanged.  Your terrorists ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  DNSSEC Upgrade Phish.  One exploit using many popular brands.

Chef’s Special:  Slack Phish.  A new phishing vector via the popular collaboration app.

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward ...

Continue Reading →
0

Guest Post – How to Use Your Laptop’s Bluetooth Connection Securely

Using Bluetooth to connect devices to your laptop is convenient but also risky. Discover what those risks are and how to minimize them.

Many laptops come with Bluetooth connectivity. Thanks to this wireless technology, you can easily connect a keyboard, mouse, headset, or other peripheral to your laptop. You can even use it to send files to a printer ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


UL Pushes Security Standards For The Internet Of Broken Things

from the internet-of-very-broken-things dept

If you hadn’t noticed yet, the internet of things is a security and privacy shit show. Millions of poorly-secured internet-connected devices are now being sold annually, introducing massive new attack vectors and vulnerabilities into home and business networks nationwide. Thanks to IOT companies ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


The FBI Says Your TV Is Probably Spying On You

Last week, the FBI, that bastion of sage privacy and security advice, issued a blog post out of its Portland field office warning cyber Monday shoppers that their smart TV is a little too smart, and likely watches you as much as you watch it. ...

Continue Reading →
0

Top 10 Most Popular Endpoint Anti-Malware Products

Which anti-malware product is the best?  Test results from companies like AV-Test and AV-Comparatives are great places to find that answer, and we outline that below.  OPSWAT recently released their 2019 Windows Anti-Malware Market Share Report, which takes a look at the most popular anti-malware products, or at least the most frequently installed. OPSWAT did not include Windows ...

Continue Reading →
2

What The Heck Is A Zero-Day?

What is a “zero-day,” exactly?   In information security, occasionally there is a brand new cybersecurity vulnerability or exploit in the news, and the reporter calls it a “zero-day” exploit.  What are they talking about.  This is a concept similar to “patient zero” in medical epidemiology. This is where the bad thing started to happen.

A zero-day vulnerability is a ...

Continue Reading →
0
Page 1 of 10 12345...»