Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Action Required Password Expired Phish

Chef’s Special:  Google Drive Alert Phish

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to ...

Continue Reading →
0

Keeping Your Certifications

Getting certified in an information technology, networking, cybersecurity, or other professional credential is hard work.  Nobody wants to have to do them over.  Hopefully you are earning the Continuing Education Units (CEU or CPE) you need to maintain your certification status.  Industry certifications are typically good for three years.  To keep them in force, every certificate you achieve comes with continuing education ...

Continue Reading →
0

Guest Post – Smishing, Phishing and Whaling

Smishing, vishing, and whaling might sound ominous, but they are simply terms used to describe different types of phishing attacks. Find out how these attacks differ from the classic phishing scam.  Today’s guest post by Tony Chiappetta explains how they work

Most people associate phishing attacks with those annoying emails that pop up in their inboxes. These emails might warn you about the impending closure of your bank account (even ...

Continue Reading →
1

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Fake Forex Phish

Chef’s Special:  Phishing Simulations

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a warning, examples of ...

Continue Reading →
0

Can Your Wireless Keyboard Be Hacked?

Did you know that wireless devices almost always present a security vulnerability?  Wireless signals pass through the air and can be intercepted and read by a savvy attacker.  To protect wireless communication sessions, usually the wireless link is protected with some form of encryption.  Last week I was teaching a CISSP class, and we were discussing the security vulnerabilities inherent in wireless networking, when one of the students asked if wireless keyboards are secure.  The research I did while answering ...

Continue Reading →
0

Which Version of Office is Better?

Are you trying to figure out whether the “pay for it once and install it” version of Office (Office 2019) is better for you, or if the online, connected, “pay for it every month” subscription version is better (Office 365)?  Today’s guest post by Joey Pepka of Peptronics should help you decide.


Which Version of Office is Better?

Due to the installation methods, ...

Continue Reading →
0

Sunday Funnies – Management and other woes

Back in the late 90’s when I worked for USWest, I worked in a call center.  We lost our manager to a promotion, and were an unsupervised “self-directed team” during that time.  We were also the most productive of the 4 teams that made up our section during that same period.  I mentioned this fact to the new boss when he finally was chosen.  More from my Pinterest trove

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Trump Campaign Site Hacked – What We Know & Lessons Learned

This entry was posted on October 27, 2020 by Mark Maunder

On October 27, 2020 at approximately 4:50pm Mountain Time, Donald Trump’s campaign website, www.donaldjtrump.com, was defaced. The attackers left a message claiming they had compromising information on President Trump. The ...

Continue Reading →
0
Page 2 of 197 12345...»