Skip to content
  • Sat. Apr 4th, 2026
Oversitesentry Cyber

Oversitesentry Cyber

Defend Your Systems

  • Store
    • Cart
    • Checkout
    • My account
  • About
    • Contact Us
  • Cybersecurity Overview
    • Small Business PCI Compliance
    • Secure computing solution
    • All It Takes Is One Weak Computer
  • Top30 Security Links to Review
Top Tags
  • CurrentNews
  • HistoryInfo

Latest Post

CRINK APT Cyberattacks Make Unlimited Amount of Money$$$ Using AI!! AI Being Used in Your Company? Good and Bad!!! Need to reduce gmail storage? AI Has to Be Used Correctly
China computersecuritynews securitycommunity

CRINK APT Cyberattacks

April 3, 2026 zafirt
Artificial Intelligence computersecuritynews cyberjokesFriday

Make Unlimited Amount of Money$$$ Using AI!!

March 20, 2026 zafirt
China computersecuritynews Securityexploits

AI Being Used in Your Company? Good and Bad!!!

March 13, 2026 zafirt
computersecuritynews ITSecurity Training

Need to reduce gmail storage?

February 26, 2026 zafirt
computersecuritynews

AI Has to Be Used Correctly

February 9, 2026 zafirt
  • Latest
  • Popular
  • Trending
CRINK APT Cyberattacks
China computersecuritynews securitycommunity
CRINK APT Cyberattacks
Make Unlimited Amount of Money$$$ Using AI!!
Artificial Intelligence computersecuritynews cyberjokesFriday
Make Unlimited Amount of Money$$$ Using AI!!
AI Being Used in Your Company? Good and Bad!!!
China computersecuritynews Securityexploits
AI Being Used in Your Company? Good and Bad!!!
Need to reduce gmail storage?
computersecuritynews ITSecurity Training
Need to reduce gmail storage?
ITSecurity Training securitycompliance
Why Risk Management Model Failed Us
ITSecurity Training
DARKNET- Know it – Learn it
computersecuritynews
Risk management Failed Us!
computersecuritynews Securityexploits
Zero-Day Attacks And Why Patching Means Catching Up
CRINK APT Cyberattacks
China computersecuritynews securitycommunity
CRINK APT Cyberattacks
Make Unlimited Amount of Money$$$ Using AI!!
Artificial Intelligence computersecuritynews cyberjokesFriday
Make Unlimited Amount of Money$$$ Using AI!!
AI Being Used in Your Company? Good and Bad!!!
China computersecuritynews Securityexploits
AI Being Used in Your Company? Good and Bad!!!
Need to reduce gmail storage?
computersecuritynews ITSecurity Training
Need to reduce gmail storage?
computersecuritynews

DDOS Attack Allows Million$ Transferred To Mule

October 21, 2015 zafirt

After seeing a good ISACA presentation today at the Renaissance in Saint Louis (near airport) http://www.isaca.org/chapters5/Saint-Louis/Pages/default.aspx by Josh Vander Veen with SpearTip Here are my notes: Sophistication of criminal attack…

Securityexploits

Internet Explorer is Most Vulnerable Browser

October 20, 2015 zafirt

The Internet Storm Center has a great article on the most common vulnerabilities in web applications (XSS or Cross Site Scripting) https://isc.sans.edu/forums/diary/When+encoding+saves+the+day/20277/ This is where some data is attempted insertion…

SecurityThreats

DDOS Amplification Attack Study Shows Effectiveness

October 19, 2015 zafirt

http://www.christian-rossow.de/publications/tcpamplification-woot2014.pdf written by: Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany The researchers did a variety of scans – udp and tcp…

cyberjokesFriday

#Cyberjoke v1.8 Friday

October 16, 2015 zafirt

From http://www.glasbergen.com/wp-content/gallery/computer-cartoons/toon-1288.gif There are a lot more of many kinds of cartoons at glasbergen.com I like this one: JimmyKimmel – and his Cyber Security 3min on the street worth viewing…

ITSecurity Training

Newsflash: The Internet is Not Secure

October 15, 2015 zafirt

Am reading one of the articles from my Security Analyzed page at Network World http://www.networkworld.com/article/2309917/lan-wan/lan-wan-router-man.html William Yaeger created the multi protocol router from ireport.cnn.com: Christmas 1979 it happened. {Yeager goes…

Posts pagination

1 … 109 110 111 … 196
Older Posts
Categories
  • Artificial Intelligence
  • China
  • computersecuritynews
  • CyberCrowd
  • cyberjokesFriday
  • hackermovies
  • ITSecurity Training
  • oversitesentryapproved
  • Securitybreaches
  • securitycommunity
  • securitycompliance
  • Securityexploits
  • SecurityThreats
  • Uncategorized
Tags
CurrentNews HistoryInfo

Too Late You're Hacked Guide

Too Late You're Hacked Guide

$9.00Buy now

Categories
  • Artificial Intelligence
  • China
  • computersecuritynews
  • CyberCrowd
  • cyberjokesFriday
  • hackermovies
  • ITSecurity Training
  • oversitesentryapproved
  • Securitybreaches
  • securitycommunity
  • securitycompliance
  • Securityexploits
  • SecurityThreats
  • Uncategorized
Recent
  • CRINK APT Cyberattacks
  • Make Unlimited Amount of Money$$$ Using AI!!
  • AI Being Used in Your Company? Good and Bad!!!
  • Need to reduce gmail storage?
  • AI Has to Be Used Correctly
  • Security Policy – What is it good for?
  • Google Gemini is a Hacker’s Dream
  • New Year Same Problems – Hackers Try to Get Clicks
  • If We Do Use AI How Should Small Business do that?
  • Create Guardrails for Company AI usage

You missed

China computersecuritynews securitycommunity

CRINK APT Cyberattacks

April 3, 2026 zafirt
Artificial Intelligence computersecuritynews cyberjokesFriday

Make Unlimited Amount of Money$$$ Using AI!!

March 20, 2026 zafirt
China computersecuritynews Securityexploits

AI Being Used in Your Company? Good and Bad!!!

March 13, 2026 zafirt
computersecuritynews ITSecurity Training

Need to reduce gmail storage?

February 26, 2026 zafirt
Oversitesentry Cyber

Oversitesentry Cyber

Defend Your Systems

Proudly powered by WordPress | Theme: Newsup by Themeansar.

  • Home
  • About
  • All It Takes Is One Weak Computer
  • Book Email List
  • Cart
  • Checkout
  • Contact
  • Contact Us
  • CyberCrowd- to help solve Psychology of Security
  • Cybersecurity Overview
  • Home
  • My account
  • Order Book
  • OversiteSentry Blog page
  • Returns
  • Returns
  • Secure computing solution
  • Shop
  • Small Business PCI Compliance
  • Top30 Security Links to Review
 

Loading Comments...