By Mary Smith of the Killarney Hotels Group
Continue Reading →
JAN
HomeWyzGuys Tech Talk
The delivery of cloud-based malware also shot up in 2022, triggered by an increase in the volume of apps being exploited to launch malware and the number of malicious downloads ...
Continue Reading →Examples of clever phish that made it past my spam filters and into my inbox. Some are sent by clients or readers like you, and other reliable sources on the Internet.
You can send phishing samples to me at phish@wyzguys.com.
My intention is ...
Continue Reading → Its that time of year again when cyber-criminals turn to a handful of seasonal favorite – tax refund fraud and W-2 information theft. The IRS maintains a tax scams page on their website at https://www.irs.gov/newsroom/tax-scams-consumer-alerts. There you can find information on:
The following article appeared in this blog two years ago, and deserves a reprint.
CAPTCHAS are getting harder!!
[2022.12.19] The Ukrainian army has released an instructional video explaining how Russian soldiers should surrender to a drone:
“Seeing the drone in the field of view, make eye contact ...
Continue Reading →Examples of clever phish that made it past my spam filters and into my inbox. Some are sent by clients or readers like you, and other reliable sources on the Internet.
You can send phishing samples to me at phish@wyzguys.com.
My intention is to provide a warning and show current examples of ...
Continue Reading →This post is for my cybersecurity students, and anyone else taking a cybersecurity class or studying for a certification exam.
From Jason Dion: “The most common type of code injection is SQL injection. An SQL injection attempts to modify one or more of an SQL query’s four basic functions: select, insert, delete, or update. Two common methods of performing an SQL injection are either using a single apostrophe (‘) or submitting an always true statement like 1=1. As a penetration tester, you ...
Continue Reading →