Can you pass this Phishing quiz? Quiz at Google
Latest
Car theft ring used software to steal hundreds of vehicles without the physical key fob, say police
For your convenience, it does not even take a key (or physical force) to steal your car these days. Story on ZDNet
Researchers Keep a Wary Eye on Critical New Vulnerability in Apache Commons Text
Apache Commons Text… Story on Dark Reading
InfoSec Handlers Diary Blog – Python Obfuscation
When you are a cybercriminal and need some obfuscation… Story on SANS
Linux dodges serious Wi-Fi security exploits
Errors in the Linux kernel were set to allow serious security exploits – but Linux got lucky… Story on ZDNet
Do You Really Need to Buy an Antivirus App or a VPN Anymore?
The nature of the beast – in most cases you are still better off purchasing third-party add-ons. Story on PCMag
Small businesses need more help with tech. Here are five ways to get it
If you are a small business and you need tech help, here are some things to assist you in that search. Story on ZDNet
Connecting to public Wi-Fi: Here’s how to protect your data and your device
Always, always, always, be suspicious and protect yourself accordingly. Story on ZDNet
How to Protect Your Smart Home From Hackers
Nothing says chaotic grief like the Internet of Things. Your Smart Home is a vast field of exploits, so take the time to protect yourself. Story on PCMag
InfoSec Handlers Diary Blog – A Powershell Exploit illustrated
Here is one way that Powershell Exploits can operate. Story on SANS