First – some good news from the Smithsonian. World’s Second-Oldest Person Recovers From Covid-19 in Time for 117th Birthday
Working from home?
Continue Reading →FEB
First – some good news from the Smithsonian. World’s Second-Oldest Person Recovers From Covid-19 in Time for 117th Birthday
Working from home?
Continue Reading →Much of this content is from Bruce Schneier
We all know that our cell phones constantly give our location away to our mobile network operators; that’s how they work. A group of researchers has figured out a way to fix that. “Pretty Good Phone Privacy” (PGPP) protects both user identity ...
Continue Reading →Catch of the Day: Morse Code Attack
Chef’s Special: IONOS Phish
Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.
I would be delighted to accept suspicious phishing examples from you. Please forward your email to phish@wyzguys.com.
My intention is to provide a warning, examples ...
Continue Reading →With another core update scheduled for May this year, webmasters are scrambling to get their websites ready. They’re working furiously to ensure that their sites measure up in terms of the core web vitals (CWV) that Google is targeting this year.
Google’s new CWV are geared toward improving the customer ...
Continue Reading →Some additional cybersecurity issues to worry about from my Pinterest Feed.
Where the heck did he find a pay phone?
Continue Reading →The technically complex landing marks the fifth successful U.S. bid to reach the Martian surface
News of the SolarWinds data breach, where its software management updates were hacked, rocked the cyber world. And now comes news ...
Continue Reading →Catch of the Day: Phishing Dud
Chef’s Special: Phishing for Teachers
Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.
I would be delighted to accept suspicious phishing examples from you. Please forward your email to phish@wyzguys.com.
My intention is to provide a warning, examples ...
Continue Reading →For a long time, “the public cloud,” was a foreign concept many businesses shied away from because of security concerns. In recent years, this has steadily changed. Many reliable and trustworthy third-party cloud vendors have entered the market and, with this competition, the market has matured.
While the concept of the cloud is far more accepted today with increased ...
Continue Reading →Could you become the victim of a carjacking? Usually when I am discussing hijacking, it is in the context of email hijacking, web account hijacking, or web server hijacking, but I believe this is important to share in it’s entirety. This post by the Ramey County (Minnesota) Sherriff’s Department is if of important information about the procedures, tactics, and techniques of carjacking ...
Happy Valentine’s Day, Cheri. You are the light of my life.
From the Smithsonian: Why Do We Kiss?
Continue Reading →