Gone Phishin’ — An Attacker’s Perspective & Solutions

Intro

You can teach a man how to phish, but.. you can’t make him phish-proof? Aside from the headings in this blog I’ll try to avoid the fish puns to save your forehead from all of the potential for face palms. Why am I creating this blog? I’m hoping to shed some light on some Security 101 Best Practices for techies and non-techies alike from the viewpoint of an…

--

--

--

Passionate geek for Information/Cyber Security! I’m always learning and am happy to contribute anything I can share with the community. Follow me @ Twitter!

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Windows 7 Has Ended

LED them in — infiltrating home networks via smart light controllers

What is a false positive and why is having a few around a good sign?

Grey Box Testing: How I Passed the GIAC GREM Exam Without Taking the Course

Deeper Network Monthly Newsletter:2021/8/1–2020/8/31

USB Drives: Secure Your Crypto

{UPDATE} Idioms Game Hack Free Resources Generator

If you haven't submitted your questions for @The_CryptoArnie 's AMA on Friday, better not be late.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Curtis Brazzell

Curtis Brazzell

Passionate geek for Information/Cyber Security! I’m always learning and am happy to contribute anything I can share with the community. Follow me @ Twitter!

More from Medium

Creating A Perfect Sysmon Configuration File

MY FIRST VULNERABILITY; The One that got away

The Weekly Threat 2–15–2022

With Great Power…