by Greg Scott | Apr 13, 2025 | Cybersecurity, Politics and Religion
In 2016, two years before President Trump started CISA, the Cybersecurity and Infrastructure Security Agency, I answered a reporter query about cybersecurity public/private partnerships. After my history with the FBI bureaucracy and InfraGard, I didn’t think any...
by Greg Scott | Mar 22, 2025 | Cybersecurity, Phish collection
My phish collection posts are usually quick screen shots with commentary. This one, about an Ellen Marie Wiseman impersonator, needs more. I don’t get out much, and so I had never heard of Ellen Marie Wiseman. Turns out, she’s a best selling author. She...
by Greg Scott | Mar 22, 2025 | Cybersecurity, Slice of Life
My buddy, Bob, left this Facebook post in early March, 2025, about how he found a way to recover his Facebook profile and it caught my attention. He lives in Illinois. Here is what he said. EIGHT MONTHS AGO someone tried to hack my account, and in response, facecrook...
by Greg Scott | Nov 29, 2024 | Cybersecurity, Who Says IT is Boring?
In mid October, 2024, a few weeks before this writing, I posted “A SYN flood DDoS attack up close and personal.” In a DDoS (Distributed Denial of Service) attack, somebody orchestrates lots of systems to flood a victim with traffic, denying internet...
by Greg Scott | Oct 15, 2024 | Cybersecurity
I had heard about different DDoS attacks, including SYN flood attacks, for a long time. In fact, I got serious about cybersecurity in November, 2000 after I found my internet-facing DNS server an unwitting part a DDoS attack against the government of Brazil. In a DDoS...
by Greg Scott | Aug 10, 2024 | Cybersecurity
DCIM\100MEDIA\DJI_0141.JPG – from Jan Wildeboer’s camera I liked what Jan Wildeboer had to say about the xz-utils and Crowdstrike incidents so much, I asked Jan’s permission to paste it as a guest blog post right here. I made one minor formatting...
Recent Comments