Click on Scam Email –> Destroy your Data

Posted on securitycompliance

FireEye Blogpost last week about phishing emails using the iCEDID phishing infection has an interesting image explaining this concept: This is a sophisticated phishing setup and thus it behooves us to review this carefully. If you notice the initial phishing email when opened has several embedded items as well as a password structure so that […]

Read more >

Catfishing Illegal? Spearfishing on Steroids?

Posted on ITSecurity Training

Threatpost has the story  in Utah legislation work.   Let’s explain some catfishing: “The practice of catfishing often occurs in online dating or social-networking scenarios in which someone takes someone else’s personally identifiable information–such as photos, addresses, educational history or professions–to pretend to be that person to seem more attractive or interesting to people they […]

Read more >

How About A Cybersecurity Framework By NIST

Posted on ITSecurity Training

NIST is the National Institute of Science and Technology and CSF is the Cybersecurity Framework.  There are manypdf’s (v1.1) on this topic, but the changes in versions are not my focus.  Although I did cover this a small bit in a post from 2014: https://oversitesentry.com/cybersecurity-framework-by-nistnational-institute-of-standards-and-technology/ at that point NIST had the major points but not […]

Read more >