Colorful spams are back!

Yeeesss, the Spam/Trash folder is no longer so boring! Finally, the spammers are now using all the features of the email clients and have made the subjects to look much nicer. Do you know how they do that? They add UTF8 characters in the subject and then they encode the entire string using Quoted-Printable encoding: Content-Type: text/html; charset=”utf-8″ Content-Transfer-Encoding: quoted-printable Subject: =?utf-8?q?=F0=9F=91=B6_Free_Trial_of_Diapers_from_The_Honest_Company_?= =?utf-8?b?8J+Rtg==?= This is the output:   Another example: Content-Type: text/html; charset=”utf-8″ Content-Transfer-Encoding: quoted-printable Subject: =?utf-8?b?8J+YqCBXaWZlIFdhbGtlZCBJbiAtIE9PUHMhISEhISDwn5io?=


How to get rid of disturbing and traumatizing “children” films on YouTube

If you have children, then you must allow them from time to time to watch some children films on Youtube. They must have missed some episodes of their favorite series and you definitely can find them there. In any language you want. Just search for “Caillou”, “Barbie”, “Batman” , “Elsa” , “Spiderman” or anything alike and you will get something. There is a huge market for “children’s” YouTube content. But, what happens when the results are not for children?   How do you filter them? You can’t… So, what do you do ? You ban them from using the tablet…


I received the first “nigerian scam” on XING

As a premiere, I received the first Nigerian Scam on XING. It is quite common to receive such requests on LinkedIn, but for me it is the first time on XING. This is the text: Hello Sorin Mustaca, I have partners who I front for to assist source for a foreign partner who could be of help to receive fund for the purpose of various viable investment abroad on their behalf, they are all still in service and want anonymity to protect their reputation in service.I will furnish you with their mode of operations after receiving your readiness. Regards, Dr….


Google Search Console fail over notifications for the WordPress updates

I have quite a lot of WordPress based websites which I run and maintain. One of these is this blog: www.SorinMustaca.com All my WordPress websites are configured to autoupdate to the latest WordPress update. The same applies to their plugins and themes. Google Search Console (GSC) is a tool I used to manage better the registration of my websites with the search engine and their advertising platform Adsense. Yesterday evening I received a couple of emails, one for each of my websites registered with the GSC : Here is the text: Recommended WordPress update available for http://sorinmustaca.com/ To: Webmaster of…


The pros and cons of new tech: Science fiction collides with reality

“The pros and cons of new tech: Science fiction collides with reality” by Michael O’Dwyer As Sorin Mustaca, an independent IT security consultant, says, “Adopting new technologies is never a mistake, if done properly.” Assess the pros and cons of new tech There’s rarely a one-size-fits-all solution in technology, and repercussions are never as severe or life-threatening as in pop culture. However, there are repercussions for ill-chosen solutions in terms of business continuity or process interruption. Mustaca advises businesses to consider all the following before adopting new tech: Know what you want. Find and clearly define the planned use of…


Romanians Abroad: Sorin Mustaca on www.TheGoldenRomania.com

Sorin Mustaca in Entrepreneur IT Professional RO – Constanta GER – Tettnang Sorin is one of the many IT professionals Romania has produced in recent years. He is unique however since he had the courage to partially differentiate from his employer and start his own business somewhere in Germany. He realized his vast expertise can help any company learn about the importance of IT security and in the same time can offer a better future for his two children in one of the healthiest environment in the world.   Read more here: http://thegoldenromania.com/Romanians-Abroad?post=sorin-mustaca


Why does “everybody” think they are being/were hacked by Russian hackers?

Short answer: See the column “Country”. When I say “Russia”, I mean all Russian speaking countries, from the ex sovietic block. “Everybody” in quotes means the vast majority.   Long answer: Some time ago, I was writing that China is massively attacking my blogs. Now, it seems that the situation has changed a lot. But, what is the reason why this changed? Can it be that the Russian hackers are becoming more aggressive ?  Can be that they are “hungrier”. Or are these attacks sponsored by some entity? It might be, but then why my sites ? 🙂 Or did…


Healthcare mobile device security 101—solving modernization risk factors

Source: “Healthcare mobile device security 101—solving modernization risk factors” by Michael O’Dwyer | December 22, 2016 Many of these devices aren’t designed for business use, which is another cause for concern. According to Sorin Mustaca, CSSLP, Security+, Project+, owner of Sorin Mustaca IT Security Consulting, “Most of these devices are taken from the consumer world and quickly adapted to use in healthcare. For this reason, these devices are not always properly secured, making the threat landscape pretty much unknown.” Mustaca agreed, adding that recognizing the dangers is paramount and includes dealing with risks, such as lost or stolen devices, and…


Stock spam is back!

After many years, the penny stock spam is back. Hello, info! <name> needs your attention. This is the only stock you need to buy today. Keep on reading to find out why.. <name>(ticker: <tick>) is a mobile games developer that has built some of the most popular games on the planet. The games have been downloaded more than 100 million times and the company is planning to launch 5 new titles in January 2017 (next month). <tick> is extremely undervalued and there are serious rumors circulating that the maker of Candy Crush (King, a multi billion dollar company) is about…


Why most, if not all, “New Generation” endpoint security product are not self-sustained?

Fire Eye, Sentinel One, Crowdstrike, HackerOne, Cylance, Cyphort, Trustlook, Venafi, Clavister, Invincea,  Code42,  just to name a few,  are so called NG Cybersecurity startups. NG comes from “New Generation” or “Next Generation”… (Yeah, just like in StarTrek. 🙂 )   What exactly are these “NG” products and services? There is no single definition that fits them all. Here are the common features: All of them have a cloud backend. Some install an agent on each machine, some install an appliance that acts as a sniffer in the network. Some others must be installed on the default gateway where they take…


By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close