by Greg Scott | Nov 28, 2020 | Phish collection
For more phishing samples, see my phishy email collection. What could possibly go wrong with this offer? Just feed my Social Security Number to a website with a Chinese TLD (Top Level Domain name), blocked by default by the open source intrusion detection system,...
by Greg Scott | Nov 26, 2020 | Phish collection
For more phishing samples, see my phishy email collection. What a surprise; somebody impersonating Amazon. How original. No, Amazon is not offering free $100 gift cards. Note where the link really goes. This will be the gift that keeps on taking. I give this one...
by Greg Scott | Nov 25, 2020 | Phish collection
For more phishing samples, see my phishy email collection. Don’t phall for phishing! Oh no. Somebody compromised Zoom videoconferencing and caught me in a compromising position. Should I pay extortion money to save my rear end from exposure? Don’t let...
by Greg Scott | Nov 25, 2020 | Phish collection
Deep dark secrets! For more phishing samples, see my phishy email collection. I give this one a B+. Maybe an A-. This one will score with conspiracy theory lovers. And there are plenty of conspiracy theory lovers these days. Click here to reveal a deep dark secret....
by Greg Scott | Nov 14, 2020 | Technology
People outside the IT industry occasionally ask me what RAID is all about. I finally took the time to write it up. RAID is an acronym for Redundant arrays of independent disks. The acronym in the original 1980s paper stood for “Redundant Arrays of Inexpensive...
Recent Comments