Friday Phish Fry

Phishing Email Alerts

Catch of the Day: Contact Form Survey Scam Phish

Chef’s Special:  Consent Phishing

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a warning, ...

Continue Reading →
0

IP Addressing and Subnetting for Certification Students

If you are an information technology or cybersecurity professional, and you are planning to study for and take a networking certification such as CompTIA’s Network+ or Cisco’s CCENT, CCNA, or CCNP, then you will need to know and understand IP addressing, subnetting, and supernetting inside and out.  When I was studying for the CCNA years ago, I put together a set of subnetting spreadsheets, and eventually shared it on my ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


CISA Releases Securing Industrial Control Systems: A Unified Initiative

Original release date: July 7, 2020

The Cybersecurity and Infrastructure Security Agency (CISA) has released its five-year industrial control systems (ICS) strategy: Securing Industrial Control Systems: A Unified Initiative. The strategy—developed in collaboration with industry and government partners—lays out CISA’s plan to improve, unify, ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Google Privacy Check-up

Chef’s Special: Blocked Message WyzMail Spoofing Phish

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a ...

Continue Reading →
0

Comparing Virtual Meeting Apps

In the age of the COVID-19 pandemic, it seems that everything we used to do in-person in large groups has moved to online video conferences.  Public and private schools, colleges and universities, other training and educational organizations are delivering instruction using software and the Internet.  All business meetings have moved online as well.  Even family gatherings are happening using phone ...

Continue Reading →
0

Guest Post – Picking A Virtual Meeting App

The COVID-19 pandemic has prompted a surge in the number of virtual meetings being held. Virtual meetings provide a safe way for companies to communicate and interact with employees who are working from home, business associates, and even customers.

While this reason for holding virtual meetings is new, the solutions enabling these meetings are not. For years businesses have been holding ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Maersk, me & notPetya

A great post and a must read by Gavin Ashton.  If you are tasked with Identity and Access Management, you at least have to read the Do the Basics section at the end of the article.

Maersk is the world’s largest integrated shipping and container logistics company. I was ...

Continue Reading →
1
Page 5 of 192 «...34567...»