Comedy, satire, opinion, political humor, and stories for your entertainment
Continue Reading →
Developers who contribute code to the popular repository will have to implement two-factor authentication by the end of 2023.
Identity theft ...Continue Reading →
Catch of the Day: Code of Conduct Phish
Chef’s Special: Invoice Phish
Examples of clever phish that made it past my spam filters and into my inbox. Some are send by clients or readers like you, and other reliable sources on the Internet.
You can send phishing samples to me at firstname.lastname@example.org.
My intention is to provide a warning and show current examples ...Continue Reading →
If you missed Part 1 of this article, it can be found at last week’s post on May 5
When we use two or more cryptographic methods together, it is called Hybrid Cryptography. Common forms of Hybrid Cryptography included the creation and sharing of Symmetric session keys, through using Asymmetric Encryption.
Not all key exchange methods require using the PKI. Diffey-Helman, Oakley and other non-PKI key ...Continue Reading →
[Editor comments: I feel like we all have become experts on using conferencing applications such as Zoom, Teams, and WebEx. I had an opportunity last moth to participate in a Zoom session that used breakout rooms, thanks to Jackie Mene at Micro Business Alliance. Joey’s article just seemed to hit a point where many of us ...Continue Reading →
A friend of mine recently wrote about the “joys” of having slow Internet in Grand Bahamas. Of course, he was there on vacation; for me, vacation is just ...Continue Reading →
Catch of the Day: Voicemail Message Phish
Chef’s Special: HR Notification Phish
Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.
I would be delighted to accept suspicious phishing examples from you. Please forward your email to email@example.com.
My intention is to provide a warning, examples ...Continue Reading →
By Bob Weiss
May the Force be with you! It’s May the fourth, Star Wars Day.
I received an email from a CASP+ Student asking for some help with encryption. This is what I sent.
Encryption can be a mind bender. And then like magic, it is not.
If you are up for some outside reading (what! More reading? Sorry) there are a couple of books that helped me
The Code Book, by Simon Singh
Crypto ...Continue Reading →
(Editor’s Note: This is a little off-topic for our cybersecurity blog, but many of my readers are small business owners, and this topic may be something you have been considering for your business)
Instagram, which is anticipated to have 1.2 billion users by 2023, provides a huge opportunity for small business owners to expand their marketing ...Continue Reading →