CyberKitto

Back from hiatus

Back from hiatus

I’m back!

I’ve been on blogging hiatus for several months for multiple reasons, the main of which was burn-out. Now that the mental rest has been completed, I’m ready to get back to the fun!

Continue reading →
Posted by CyberKitto in Blog, Writing, 0 comments
Ready. Set. Gutenberg!

Ready. Set. Gutenberg!

WordPress publishing and development is preparing for a major change. The editor for writing and publishing posts and pages has been fully revamped and soon will be made default.

Continue reading →
Posted by CyberKitto in Articles, Testing Playground, Web Development, 0 comments
Sneaky SEO Scam Targeting Bloggers

Sneaky SEO Scam Targeting Bloggers

One scammer recently tried to get me. What is interesting about this scheme is that they tried to make themselves look like the good guys by comparing themselves to… well… themselves.

Continue reading →
Posted by CyberKitto in Information Security, Web Development, 0 comments
Projects come but never go

Projects come but never go

Building this blog proves to be a huge learning journey and it’s worth it to have a record of what it took to achieve the end result. I created it as a place to keep track of different projects I’ve done or plan to do. The funny thing is that “creating this blog” might turn out to be the largest project I’ve undertaken. I didn’t see this irony coming.

Continue reading →
Posted by CyberKitto in Blog, Web Development, 0 comments

Read it to me

Mission:

Extract text from a series of web pages to use in TTS Reader.

Project status:
Just started
Continue reading →
Posted by CyberKitto in Projects, 0 comments
Devious Facebook Marketplace Scam Unmasked

Devious Facebook Marketplace Scam Unmasked

My family’s recent near-scam experience gave me a new appreciation for how complex fraudulent schemes can be. From compromising Facebook accounts, posting fake listings, all the way to impersonating Amazon services, this mass fraud operation has a strong foothold in Facebook Marketplace world. There is one common theme reverberating through all phases of this multi-part social engineering scam: each stage used different tactics to gain victim’s trust and overcome caution. While researching this incident, I found that we weren’t the only victims. To save you from experiencing the same headache, here’s lessons learned from that incident.

Continue reading →
Posted by CyberKitto in Information Security, 0 comments