Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Webinar:  Anatomy of a Phishing Exploit

Cyber-hygiene alert!!  You are invited to a one hour seminar titled Anatomy of a Phishing Exploit.  I will be the presenter

Understand cyber-hygiene essentials to secure your data from phishing attacks in a highly informative, one-hour webinar organized by Vinsys.  The heaping cases of cybercrime worldwide has raised a ...

Continue Reading →
0

Directing Your Career to Work Around Your Personal Life

Different people have different attitudes about how their work life and their personal life should be balanced in relation to each other. Some people place a high degree of importance on hard work within a career context, but that might not apply to the values which you hold true. Instead, you might want to make your career work around your personal life.

There are several ways in which you can make this ideal a reality, and it’s simply about finding the ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Central bank digital currencies: The fiat future of cryptocurrency?

CBDCs are here, and coming on stronger than ever. Their impact on the world is still unknown, but they could transform finance for good.


Plundered bitcoins recovered by FBI – all 3,879-and-one-sixth of them!

Phew! An audacious crime… that didn’t work out.  But $189 million recovered.


Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Outlook Web App Phish

Chef’s Special:  Fake Copyright Phish

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a ...

Continue Reading →
0

Identifying and Authenticating Internet of Things (IoT) Objects

by Arthur Rowley

Explore what identifying and authenticating IoT (Internet of Things) is all about. This article discusses schemes available for IoT identification and authentication in depth. You will also get to know why it is essential to carry out both processes.

IoT refers to technology known as the Internet of Things. It is a transformative and beneficial ...

Continue Reading →
0
Page 1 of 222 12345...»