A couple more from Pinterest
Continue Reading →
JUN
A quick Saturday digest of cybersecurity news articles from other sources.
If the cyberattack against meat giant JBS was a game of Clue, it would be over already. The winner would have cracked the whodunnit: “It was the Russians, in the meatpacking plant, with the ransomware.” The attack this week led to a cascading series of shift cancellations, ...
Continue Reading →Catch of the Day: Domain Suspension Phish
Chef’s Special: E-Fax Phish
Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.
I would be delighted to accept suspicious phishing examples from you. Please forward your email to phish@wyzguys.com.
My intention is to provide a warning, examples of ...
Continue Reading →Since the first weapons were made from raw materials and the ability to manufacture fire was perfected, the unstoppable march of technology has had an undeniable impact on human culture and society. We are surrounded by technological innovation. From your automobile and the gadget you’re reading this on to your television, jet planes, and beyond, technology has transformed our environment ...
Ransomware is a form of malicious software designed to restrict users from accessing their computers or files until they pay a ransom to cybercriminals. Ransomware typically operates through the crypto virology mechanism by using symmetric as well as asymmetric encryption to prevent users from performing managed file transfers or accessing particular files or directories. The cybercriminals are using ransomware to lock files from being accessed assuming that the locked files ...
The Colonial Pipeline ransomware saga continues to unfold before our eyes. This week, company CEO Joseph Blount admitted to paying $4.4 million in ransom to cybercriminals following the attack that shut down the largest fuel pipeline in the U.S. In an interview with the Wall ...
Continue Reading →Catch of the Day: Video Porn Extortion Phish
Chef’s Special: DHL Shipment Phish
Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.
I would be delighted to accept suspicious phishing examples from you. Please forward your email to phish@wyzguys.com.
My intention is to provide a warning, examples ...
Continue Reading →E-waste and the reckless disposal of IT properties is a global problem. Although we can’t stop technology from progressing, we can certainly monitor how we dispose of our e-waste. You can do it yourself (which is risky) or employ an IT Asset Disposition (ITAD) firm. For a variety of purposes, we will recommend the latter. For one ...
This is the first of two articles on ITAD. Recently, many companies have undertaken large deployments and purchases of equipment in order to enable employees and students to efficiently work from home. As lockdown rules are starting to be relaxed all over the world, it’s really important to ask “what is going to happen to all the extra ...