Skip to content
  • Fri. Apr 17th, 2026
Oversitesentry Cyber

Oversitesentry Cyber

Defend Your Systems

  • Store
    • Cart
    • Checkout
    • My account
  • About
    • Contact Us
  • Cybersecurity Overview
    • Small Business PCI Compliance
    • Secure computing solution
    • All It Takes Is One Weak Computer
  • Top30 Security Links to Review
Top Tags
  • CurrentNews
  • HistoryInfo

Latest Post

April 10th Cyberjoke Friday edition CRINK APT Cyberattacks Make Unlimited Amount of Money$$$ Using AI!! AI Being Used in Your Company? Good and Bad!!! Need to reduce gmail storage?
computersecuritynews cyberjokesFriday

April 10th Cyberjoke Friday edition

April 10, 2026 zafirt
China computersecuritynews securitycommunity

CRINK APT Cyberattacks

April 3, 2026 zafirt
Artificial Intelligence computersecuritynews cyberjokesFriday

Make Unlimited Amount of Money$$$ Using AI!!

March 20, 2026 zafirt
China computersecuritynews Securityexploits

AI Being Used in Your Company? Good and Bad!!!

March 13, 2026 zafirt
computersecuritynews ITSecurity Training

Need to reduce gmail storage?

February 26, 2026 zafirt
  • Latest
  • Popular
  • Trending
April 10th Cyberjoke Friday edition
computersecuritynews cyberjokesFriday
April 10th Cyberjoke Friday edition
CRINK APT Cyberattacks
China computersecuritynews securitycommunity
CRINK APT Cyberattacks
Make Unlimited Amount of Money$$$ Using AI!!
Artificial Intelligence computersecuritynews cyberjokesFriday
Make Unlimited Amount of Money$$$ Using AI!!
AI Being Used in Your Company? Good and Bad!!!
China computersecuritynews Securityexploits
AI Being Used in Your Company? Good and Bad!!!
ITSecurity Training securitycompliance
Why Risk Management Model Failed Us
ITSecurity Training
DARKNET- Know it – Learn it
computersecuritynews
Risk management Failed Us!
computersecuritynews Securityexploits
Zero-Day Attacks And Why Patching Means Catching Up
April 10th Cyberjoke Friday edition
computersecuritynews cyberjokesFriday
April 10th Cyberjoke Friday edition
CRINK APT Cyberattacks
China computersecuritynews securitycommunity
CRINK APT Cyberattacks
Make Unlimited Amount of Money$$$ Using AI!!
Artificial Intelligence computersecuritynews cyberjokesFriday
Make Unlimited Amount of Money$$$ Using AI!!
AI Being Used in Your Company? Good and Bad!!!
China computersecuritynews Securityexploits
AI Being Used in Your Company? Good and Bad!!!
SecurityThreats

Block All Traffic From China improves your Defense

March 3, 2015 zafirt

What if you could block all China originating traffic? As you see there was a Forbes Internet attack survey done for Q2 2014. China was the top source of attack…

securitycompliance

Federal Laws May Affect Cybersecurity Legal

March 2, 2015 zafirt

Security Magazine has the story: http://www.securitymagazine.com/articles/86057-understanding-the-new-federal-cyber-laws The CEA(Cybersecurity Enhancement Act 2014) is the most significant of the December bills both in breadth and likely in significance. Where NIST(National Institute of…

computersecuritynews Securityexploits

Vulnerabilities Can Be Exploited

March 1, 2015 zafirt

(Sunday reflections and current news) Specifically the Seagate NAS Business Storage Line Today’s Internet Storm Center has the story. This is the method the attackers can use to hack the…

computersecuritynews SecurityThreats

Exploit Home Routers Then Pharm DNS servers

February 27, 2015 zafirt

Yes another slightly new style of attack: http://www.networkworld.com/article/2889933/hackers-exploit-router-flaws-in-unusual-pharming-attack.html There are a couple of slightly new twists in this hacker style attack. Proofpoint found the attack (as a spam protection company…

securitycompliance

How do we improve Security?

February 26, 2015 zafirt

We need a Renaissance of focus on Security. I’m a Systems Engineer (http://www.fixvirus.com/about-us-full-story/) and teacher of Security Architecture (SEC020 at Professional Education Technology & Leadership Center at Washington university in…

Posts pagination

1 … 144 145 146 … 196
Older Posts
Categories
  • Artificial Intelligence
  • China
  • computersecuritynews
  • CyberCrowd
  • cyberjokesFriday
  • hackermovies
  • ITSecurity Training
  • oversitesentryapproved
  • Securitybreaches
  • securitycommunity
  • securitycompliance
  • Securityexploits
  • SecurityThreats
  • Uncategorized
Tags
CurrentNews HistoryInfo

Too Late You're Hacked Guide

Too Late You're Hacked Guide

$9.00Buy now

Categories
  • Artificial Intelligence
  • China
  • computersecuritynews
  • CyberCrowd
  • cyberjokesFriday
  • hackermovies
  • ITSecurity Training
  • oversitesentryapproved
  • Securitybreaches
  • securitycommunity
  • securitycompliance
  • Securityexploits
  • SecurityThreats
  • Uncategorized
Recent
  • April 10th Cyberjoke Friday edition
  • CRINK APT Cyberattacks
  • Make Unlimited Amount of Money$$$ Using AI!!
  • AI Being Used in Your Company? Good and Bad!!!
  • Need to reduce gmail storage?
  • AI Has to Be Used Correctly
  • Security Policy – What is it good for?
  • Google Gemini is a Hacker’s Dream
  • New Year Same Problems – Hackers Try to Get Clicks
  • If We Do Use AI How Should Small Business do that?

You missed

computersecuritynews cyberjokesFriday

April 10th Cyberjoke Friday edition

April 10, 2026 zafirt
China computersecuritynews securitycommunity

CRINK APT Cyberattacks

April 3, 2026 zafirt
Artificial Intelligence computersecuritynews cyberjokesFriday

Make Unlimited Amount of Money$$$ Using AI!!

March 20, 2026 zafirt
China computersecuritynews Securityexploits

AI Being Used in Your Company? Good and Bad!!!

March 13, 2026 zafirt
Oversitesentry Cyber

Oversitesentry Cyber

Defend Your Systems

Proudly powered by WordPress | Theme: Newsup by Themeansar.

  • Home
  • About
  • All It Takes Is One Weak Computer
  • Book Email List
  • Cart
  • Checkout
  • Contact
  • Contact Us
  • CyberCrowd- to help solve Psychology of Security
  • Cybersecurity Overview
  • Home
  • My account
  • Order Book
  • OversiteSentry Blog page
  • Returns
  • Returns
  • Secure computing solution
  • Shop
  • Small Business PCI Compliance
  • Top30 Security Links to Review
 

Loading Comments...