Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Betmaster’s Phish

Chef’s Special:  Facebook Lottery Scam

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a warning, examples ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Fake Forex Phish

Chef’s Special:  Phishing Simulations

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a warning, examples of ...

Continue Reading →
0

Let Jobs Find You With LinkedIn – Part 1

Having trouble finding a job in Information Technology or Cybersecurity?  You may be doing it wrong.  Once you have a fully developed LinkedIn profile, jobs should be finding you.

Having a well developed profile on social network sites seems like a hassle, and if you are avoiding the social scene, LinkedIn needs to be an exception.  Especially if you are sending resumes to ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Porn blast disrupts bail hearing of alleged Twitter hacker

An alleged hacker’s bail hearing held online via Zoom with screen sharing enabled… what could possibly go wrong?  Well, damn near everything as it turns out.  Maybe IT needs to help these judges learn how Zoom works?


Top 5 Questions About Ransomware and ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


CISA Releases Securing Industrial Control Systems: A Unified Initiative

Original release date: July 7, 2020

The Cybersecurity and Infrastructure Security Agency (CISA) has released its five-year industrial control systems (ICS) strategy: Securing Industrial Control Systems: A Unified Initiative. The strategy—developed in collaboration with industry and government partners—lays out CISA’s plan to improve, unify, ...

Continue Reading →
0

Guest Post – Cyber-bullying: A Rising Problem in the Internet Space

The internet comes with plenty of possibilities. As robust as the opportunities are, so are some of the negatives that accompany it. One of such downsides is cyber-bullying. A lot of internet users have suffered several forms of cyber-bullying, and the act has left many with scars that may never heal. Similarly, several others have injured themselves physically, being unable to bear ...

Continue Reading →
0

With “Friends” Like The Saudis, Who Needs Enemies?

Or The Strange Case of Jeff Bezos’ IPhone and the Saudi Crown Prince

The evidence says that the Saudi Arabian Crown Prince, Mohammed bin Salman (aka MBS) engineered a way to hack Jeff Bezos’ cell phone.  Just why MBS would be interested in Jeff, Jeff’s phone, or Jeff’s life is an interesting question, with surprising answers.

It seems that MBS invited Jeff Bezos to a private party, and during the course of ...

Continue Reading →
0
Page 1 of 4 1234