Click on Scam Email –> Destroy your Data
FireEye Blogpost last week about phishing emails using the iCEDID phishing infection has an interesting image explaining this concept: This is a sophisticated phishing setup and thus it behooves us…
Defend Your Systems
Discussion of public breaches of security
FireEye Blogpost last week about phishing emails using the iCEDID phishing infection has an interesting image explaining this concept: This is a sophisticated phishing setup and thus it behooves us…
Threatpost has the story Microsoft pulls bad Windows Update After Patch Tuesday headaches . Patch Tuesday this month (February) was the second Tuesday of the month so it was the…
Threatpost has the story in Utah legislation work. Let’s explain some catfishing: “The practice of catfishing often occurs in online dating or social-networking scenarios in which someone takes someone else’s…
Wait a second … I thought that MFA (Multi-Factor Authentication) was set up to prevent some attacks? The Googleblog post from a couple of years ago: Security Google blog had…
Is it possible to make something more complex? IoT and Blockchain with a sprinkle of AI (Artificial Intelligence). From the post at telecomcircle.com : IoT, Blockchain & Artificial intelligence –…