Guest Post – Benefits of Installing A Home Alarm System

Technological growth has made our life simpler and secure. From the safety and security perspective, you now can choose the best systems that can keep a check on the premises and ensure that there is no unauthorized entry into the premises.  Home alarm systems have become a popular choice of homeowners who wish to ensure the complete safety ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


3 things you might not know about modern ransomware and how Nefilim makes money

Trend Micro case study explains how the new business model works and how the multistep attacks unfold.  A must read.


How could the ...

Continue Reading →
0

Be Alert to Carjacking

Could you become the victim of a carjacking?  Usually when I am discussing hijacking, it is in the context of email hijacking, web account hijacking, or web server hijacking, but I believe this is important to share in it’s entirety.  This post by the Ramey County (Minnesota) Sherriff’s Department is if of important information about the procedures, tactics, and techniques of carjacking ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Google Privacy Check-up

Chef’s Special: Blocked Message WyzMail Spoofing Phish

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a ...

Continue Reading →
0

Reducing Risk When Deploying IoT Devices in Business

The Internet of Things (IoT) has given us a plethora of exciting and helpful computer driven devices.  But the state of IoT security remains a dumpster fire.  As these devices appear in the workplace, businesses are often failing to consider the impact these poorly secured devices have on their carefully crafted cybersecurity programs.  Every one of these devices represents a ...

Continue Reading →
0

Tomorrow Is Data Privacy Day

Keeping your information private is nearly impossible these days.  The Internet has turned us all into virtual blabbermouths oversharing everything.  And what we aren’t already sharing with wild abandon is being harvested, parsed, analyzed, stored in endless databases, and sold by big Internet companies.  Then that information is stolen by cyber-criminals and sold on the Dark Web.

The task of keeping our information private seems impossible, but there still are actions ...

Continue Reading →
1

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


AA20-006A: Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad

Original release date: January 6, 2020

Summary

The Cybersecurity and Infrastructure Security Agency (CISA) is sharing the following information with the cybersecurity community as a primer for assisting in the protection of our Nation’s critical infrastructure in light of the current tensions between the Islamic Republic ...

Continue Reading →
0

Guest Post – WordPress Maintenance Checklist (Infographic)

Since my weblog is running on WordPress, and since about 25% of all websites run on WordPress, I often will post an article on WordPress security.  This guest post is not 100% web site security related, but configuration errors and similar mistakes can create vulnerabilities that often lead to an intrusion or breach.  Good website maintenance is an import part of the ...

Continue Reading →
0
Page 1 of 22 12345...»