Friday Phish Fry

Friday Phish Fry Episode 200

This episode marks the 200th edition of our weekly Friday Phish Fry.  Hopefully you have enjoyed these posts and learned how to recognize and protect yourself from these exploits.

Phishing Email Alerts

Catch of the Day: IONOS Account Suspended Phish
Chef’s Special:  IONOS Voicemail Phiosh
Also serving: Zero-Click Phish with GenAI Worm, Geek Squad Phish

Examples of clever phish that made it past ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day: DMARC Policy Changes
Chef’s Special:  Square Review Phish

Examples of clever phish that made it past my anti-spam nets and into my inbox. Some are contributed by clients or readers like you, and other reliable sources on the Internet.

You can send phishing samples to me at phish@wyzguys.com.

My intention is to provide a warning and show current examples ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day: AI Vishing Phish

Examples of clever phish that made it past my anti-spam nets and into my inbox. Some are contributed by clients or readers like you, and other reliable sources on the Internet.

You can send phishing samples to me at phish@wyzguys.com.

My intention is to provide a warning and show current examples of phishing scams, related articles, ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day: Consultant Phish (Nigerian Prince)
Chef’s Special: DMARC Abuse Phish
Also serving:

Examples of clever phish that made it past my anti-spam nets and into my inbox. Some are contributed by clients or readers like you, and other reliable sources on the Internet.

You can send phishing samples to me at phish@wyzguys.com.

My intention is to provide a warning and ...

Continue Reading →
0

The Role of End-to-End Encryption in Securing Virtual Meetings

By Aaron Smith

Criminals will eventually find vulnerabilities and exploit them. Unsecure virtual meetings are no exception

Companies conduct hundreds of thousands of virtual meetings every day. Many of these meetings include the exchanging of sensitive information that could damage the company if it fell into the wrong hands. Cybercriminals are aware of this and will do everything in their power to access it. Luckily, video conferencing providers are fighting back by equipping their software with end-to-end encryption

Here’s how it works.

From Sender ...

Continue Reading →
0
Page 4 of 275 «...23456...»