Search Results for "email account hijacking"


  • Friday Phish Fry
    Phishing Email Alerts Catch of the Day:  QuickBooks Phish Chef’s Special:  Account Verification Phish Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet. I would be delighted to accept suspicious phishing exampl...
  • Friday Phish Fry
    Phishing Email Alerts Catch of the Day: DHL Shipping Phish with a side of Trojan Horse Chef’s Special: Exchange Phish Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet. I would be delighted to accept suspicious ...
  • Friday Phish Fry
    Phishing Email Alerts Catch of the Day:  FedEx Delivery Phish Chef’s Special:  Lazarus Spear Phishing Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet. I would be delighted to accept suspicious phishing examp...
  • Friday Phish Fry
    Phishing Email Alerts Catch of the Day: Wells Fargo Identity Theft Phish  – A trifecta – bank account, personal information, and a credit card.  On the Dark Web this is called a Fullz. Chef’s Special: Phishing attacks impersonate QuickBooks invoices ahead of July 15 tax deadlin...
  • Weekend Update
    A quick Saturday digest of cybersecurity news articles from other sources. TSA Admits Liquid Ban Is Security Theater The TSA is allowing people to bring larger bottles of hand sanitizer with them on airplanes: Passengers will now be allowed to travel with containers of liquid hand sanitizer up to...
  • Friday Phish Fry
    Phishing Email Alerts Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet. I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com. My intention is to provide...
  • Weekend Update
    A quick Saturday digest of cybersecurity news articles from other sources. Next week, WyzGuys Cybersecurity Blog is having its own Scam Week, and will be focusing on scams we see happening to our clients all the time.  A couple are listed below. Coronavirus warning spreads computer virus There...
  • Vigilance – How to Monitor Your Online Security
    There is only one person that you can rely on to keep you protected in your online life – and that person is YOU!  Because the bad actors on the network target people more frequently than machines, this means that we more likely to be the first point of contact in an exploit.  We are ultimat...
  • How Stolen Credentials Are Used
    Someone has stolen your user ID and password from a website where you have an account.  Are you at risk?  What are they going to do with it? Unfortunately, even with the best security,  passwords are stolen all the time from websites and cloud service providers.  There are over 15 billion stolen...
  • New Twists on the Insider Threat
    The most dangerous person to your network security may be sitting in the next cubicle, or working for a trusted vendor.  This is called the Insider Threat.  It is more likely that your computer incident will come from the inside of your organization than from a cyber-criminal gang in the Russian F...
Page 3 of 8 12345...»