In recognition of Labor Day we are delaying our usual Monday post until tomorrow. See you then!
Continue Reading →SEP
HomeWyzGuys Tech Talk
In recognition of Labor Day we are delaying our usual Monday post until tomorrow. See you then!
Continue Reading →Sounds like a problem I might have. I’ve spent 30 minutes looking for the glasses perched on the top of my head. Pinterest, again.
It’s a toll free “Apple Care” number, meaning that in theory it shouldn’t cost you a thing – so what’s the harm in calling just in case?
These guys give lawyers a bad name, if that isn’t an ...
Continue Reading →Have you ever wondered just what an attacker can do once they gain access to your computer? A 21 year old software coder is facing prison time for developing the ultimate Swiss Army knife of an “administrators'” tool-kit. This tool was sold to over 6,000 people through an extensive affiliate marketing network. Many of his customers were cyber-criminals who used ...
Cyber-criminals are using a botnet to send phishing emails with the apparent purpose to test a new email attachment type. Over the course of three weeks starting August 10th, this cyber-gang released seven different types of phishing emails to over 3,000 banks around the world. They appear to be testing which of these several approaches is most successful at tricking recipients into opening the email attachment.
The attachment itself is also something different – Microsoft Excel Web Query files that use ...
Continue Reading →Often, when I am dealing with a malware-infected computer, I find that the malware has compromised the currently installed anti-malware product, and simply scanning the computer with the installed software does not work. When that happens, my go-to choice for malware remediation has been to download and install a copy of Malwarebytes, and run scans until the Malwarebytes reports the system is clean.
In the course of research for another article, ...
Continue Reading →In a new skirmish, Microsoft took control of six internet domains that were about to be used by the group to spoof US political organizations.
New research reveals that SamSam ransomware has affected far more victims, and raised far more ransom, than previously ...
Continue Reading →While the US Cyber Command has been focusing on the Chinese, North Koreans, and the Russians, and their respective intrusions into the networks of US companies, energy utilities, our military, and government agencies, Iran has been creating a world-class cyber-ops unit of their own. Details about what is being called “Operation Cleaver” has been released by security company Cylance.
The ...
Continue Reading →In our last post we looked at a great way to set up a pen-testing lab. Fortunately, the quandary over finding a safe place to practice your pen-testing skills has led to the creation of dozens of hacker-friendly learning sites. Several have been provided by OWASP, and there are other contributors out there with multiple sites. Here are a bunch of good ...