Cybersecurity Tips for Startups

Many people have started new businesses over the last year or so as a result of the pandemic. This could result from people reflecting about their career, looking to earn on the side, or perhaps they have lost their main job. Starting a new business is exciting, but it is vital that every entrepreneur is aware of the threat of cybercrime, particularly in 2021. Cybercrime has skyrocketed as a result of the pandemic, with so many people working remotely, and ...

Continue Reading →
0

Guest Post – What exactly does “code obfuscation” imply?

Code obfuscation is the process of modifying an executable so that it is no longer valuable to a hacker while remaining fully functioning. Although the procedure may alter method instructions or metadata, it has no impact on the program’s output. To be clear, practically any code can be reverse-engineered with enough time and effort. On a number of ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day: Domain Suspension Phish

Chef’s Special:  E-Fax Phish

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a warning, examples of ...

Continue Reading →
0

 Guest Post – Technology’s Impact on Our Homes and Lives

Since the first weapons were made from raw materials and the ability to manufacture fire was perfected, the unstoppable march of technology has had an undeniable impact on human culture and society. We are surrounded by technological innovation. From your automobile and the gadget you’re reading this on to your television, jet planes, and beyond, technology has transformed our environment ...

Continue Reading →
0

Ransomware has become a successful criminal business

Ransomware is a form of malicious software designed to restrict users from accessing their computers or files until they pay a ransom to cybercriminals.  Ransomware typically operates through the crypto virology mechanism by using symmetric as well as asymmetric encryption to prevent users from performing managed file transfers or accessing particular files or directories.  The cybercriminals are using ransomware to lock files from being accessed assuming that the locked files ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Colonial Pipeline CEO: Paying Ransom ‘Right Thing to Do for the Country’

The Colonial Pipeline ransomware saga continues to unfold before our eyes. This week, company CEO Joseph Blount admitted to paying $4.4 million in ransom to cybercriminals following the attack that shut down the largest fuel pipeline in the U.S. In an interview with the Wall ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day: Video Porn Extortion Phish

Chef’s Special: DHL Shipment Phish

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a warning, examples ...

Continue Reading →
0
Page 4 of 211 «...23456...»