Friday Phish Fry

Phishing Email Alerts

Catch of the Day: Code of Conduct Phish
Chef’s Special:  Invoice Phish 

Examples of clever phish that made it past my spam filters and into my inbox. Some are send by clients or readers like you, and other reliable sources on the Internet.

You can send phishing samples to me at

My intention is to provide a warning and show current examples ...

Continue Reading →

Encryption can be a mind bender – Part 2

By Bob Weiss

If you missed Part 1 of this article, it can be found at last week’s post on May 5

Hybrid Cryptography

When we use two or more cryptographic methods together, it is called Hybrid Cryptography.  Common forms of Hybrid Cryptography included the creation and sharing of Symmetric session keys, through using Asymmetric Encryption.

Not all key exchange methods require using the PKI.  Diffey-Helman, Oakley and other non-PKI key ...

Continue Reading →

Using Zoom Conference Rooms

By Joey Pepka of Peptronics

[Editor comments: I feel like we all have become experts on using conferencing applications such as Zoom, Teams, and WebEx.  I had an opportunity last moth to participate in a Zoom session that used breakout rooms, thanks to Jackie Mene at Micro Business Alliance.  Joey’s article just seemed to hit a point where many of us ...

Continue Reading →

Encryption can be a mind bender – Part 1

By Bob Weiss

May the Force be with you!  It’s May the fourth, Star Wars Day.

I received an email from a CASP+ Student asking for some help with encryption.  This is what I sent.

Encryption can be a mind bender.  And then like magic, it is not.

If you are up for some outside reading (what! More reading?  Sorry) there are a couple of books that helped me

The Code Book, by Simon Singh

Crypto ...

Continue Reading →
Page 1 of 231 12345...»