Be Alert to Carjacking

Could you become the victim of a carjacking?  Usually when I am discussing hijacking, it is in the context of email hijacking, web account hijacking, or web server hijacking, but I believe this is important to share in it’s entirety.  This post by the Ramey County (Minnesota) Sherriff’s Department is if of important information about the procedures, tactics, and techniques of carjacking ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Google Privacy Check-up

Chef’s Special: Blocked Message WyzMail Spoofing Phish

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a ...

Continue Reading →
0

Reducing Risk When Deploying IoT Devices in Business

The Internet of Things (IoT) has given us a plethora of exciting and helpful computer driven devices.  But the state of IoT security remains a dumpster fire.  As these devices appear in the workplace, businesses are often failing to consider the impact these poorly secured devices have on their carefully crafted cybersecurity programs.  Every one of these devices represents a ...

Continue Reading →
0

Tomorrow Is Data Privacy Day

Keeping your information private is nearly impossible these days.  The Internet has turned us all into virtual blabbermouths oversharing everything.  And what we aren’t already sharing with wild abandon is being harvested, parsed, analyzed, stored in endless databases, and sold by big Internet companies.  Then that information is stolen by cyber-criminals and sold on the Dark Web.

The task of keeping our information private seems impossible, but there still are actions ...

Continue Reading →
1

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


AA20-006A: Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad

Original release date: January 6, 2020

Summary

The Cybersecurity and Infrastructure Security Agency (CISA) is sharing the following information with the cybersecurity community as a primer for assisting in the protection of our Nation’s critical infrastructure in light of the current tensions between the Islamic Republic ...

Continue Reading →
0

Guest Post – WordPress Maintenance Checklist (Infographic)

Since my weblog is running on WordPress, and since about 25% of all websites run on WordPress, I often will post an article on WordPress security.  This guest post is not 100% web site security related, but configuration errors and similar mistakes can create vulnerabilities that often lead to an intrusion or breach.  Good website maintenance is an import part of the ...

Continue Reading →
0

Guest Post – Cybercriminals Like Going Mobile Too

It’s something that we hear a lot about – mobile devices have become an integral part of our society. Can you remember the last time that you switched your phone off for the weekend? Can you even imagine not having your phone with you all the time? If you’re like most people, the idea is ludicrous. We keep everything on our phones.

It’s convenient for us – you don’t have to ...

Continue Reading →
0
Page 1 of 22 12345...»