Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Action Required Password Expired Phish

Chef’s Special:  Google Drive Alert Phish

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to ...

Continue Reading →
0

Keeping Your Certifications

Getting certified in an information technology, networking, cybersecurity, or other professional credential is hard work.  Nobody wants to have to do them over.  Hopefully you are earning the Continuing Education Units (CEU or CPE) you need to maintain your certification status.  Industry certifications are typically good for three years.  To keep them in force, every certificate you achieve comes with continuing education ...

Continue Reading →
0

Guest Post – Smishing, Phishing and Whaling

Smishing, vishing, and whaling might sound ominous, but they are simply terms used to describe different types of phishing attacks. Find out how these attacks differ from the classic phishing scam.  Today’s guest post by Tony Chiappetta explains how they work

Most people associate phishing attacks with those annoying emails that pop up in their inboxes. These emails might warn you about the impending closure of your bank account (even ...

Continue Reading →
1

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Fake Forex Phish

Chef’s Special:  Phishing Simulations

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a warning, examples of ...

Continue Reading →
0

Can Your Wireless Keyboard Be Hacked?

Did you know that wireless devices almost always present a security vulnerability?  Wireless signals pass through the air and can be intercepted and read by a savvy attacker.  To protect wireless communication sessions, usually the wireless link is protected with some form of encryption.  Last week I was teaching a CISSP class, and we were discussing the security vulnerabilities inherent in wireless networking, when one of the students asked if wireless keyboards are secure.  The research I did while answering ...

Continue Reading →
0
Page 83 of 278 «...6070808182838485...»