Click on Scam Email –> Destroy your Data

FireEye Blogpost last week about phishing emails using the iCEDID phishing infection has an interesting image explaining this concept: This is a sophisticated phishing setup and thus it behooves us to review this carefully. If you notice the initial phishing email when opened has several embedded items as well as a password structure so that … Read more

Microsoft Pulls Latest Service Pack Update – Meaning What?

Threatpost has the story Microsoft pulls bad Windows Update After Patch Tuesday headaches . Patch Tuesday this month (February) was the second Tuesday of the month so it was the Feb 9th. Today the 17th is a week later and apparently this story is from yesterday(16th). There were some problems with a service pack update. … Read more

Catfishing Illegal? Spearfishing on Steroids?

Threatpost has the story  in Utah legislation work.   Let’s explain some catfishing: “The practice of catfishing often occurs in online dating or social-networking scenarios in which someone takes someone else’s personally identifiable information–such as photos, addresses, educational history or professions–to pretend to be that person to seem more attractive or interesting to people they … Read more

How About A Cybersecurity Framework By NIST

NIST is the National Institute of Science and Technology and CSF is the Cybersecurity Framework.  There are manypdf’s (v1.1) on this topic, but the changes in versions are not my focus.  Although I did cover this a small bit in a post from 2014: https://oversitesentry.com/cybersecurity-framework-by-nistnational-institute-of-standards-and-technology/ at that point NIST had the major points but not … Read more