Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.

 Falling Chinese Space Station

Sometime around April 3—give or take about a week—China’s 9.5-ton Tiangong-1 space station will fall out of orbit and enter Earth’s atmosphere. While media reports for the last few months have hyped the “uncontrolled” de-orbit as a potential threat, you probably don’t have to worry…much.

Today is World Backup Day

DON’T BE AN APRIL FOOL.  Be prepared. Back up your files on March 31st.

Easter Holiday Phishing Scams and Malware Campaigns

03/30/2018 08:51 PM EDT  Original release date: March 30, 2018

As the Easter holiday approaches, NCCIC/US-CERT reminds users to be aware of potential holiday scams and cyber campaigns, which may include

  • emails and ecards from unknown senders that may contain malicious links,
  • fake advertisements or shipping notifications with attachments infected with malware, and
  • spoofed email messages and phony posts on social networking sites requesting support for fraudulent causes.

NCCIC encourages users and administrators to be cautious of unsolicited messages and to review NCCIC Tips on Using Caution with Email Attachments and Avoiding Social Engineering and Phishing Attacks.

Facebook loses control of 50 million users’ data, suspends analytics firm

Facebook has suspended Cambridge Analytica for violating its platform policies.


Here is an infographic that outlines the most important cybercrime facts all of us should be aware of in 2018.

A history of barrier and defensive walls and fortifications, from the context of the cybersecurity principle of “defense in depth.”

An interesting article worth the read. Early evidence of the same principles of redundant security measures at work in 13th century castles, 17th century star-shaped artillery fortifications, and even “defense in depth” security architecture promoted today by the National Institute of Standards and Technology, the Nuclear Regulatory Commission, and countless other security organizations world-wide.

Linux Foundation unveils open source hypervisor for IoT products

The reference project ACRN is made for resource-constrained devices and focuses on safety.



About the Author:

Cybersecurity analyst, pen-tester, trainer, and speaker. Serving small business owners in the St Paul, Minneapolis, and western Wisconsin area since 2001. Cybersecurity and hacking have been a passion of mine since I entered the computer and networking business in 2000. I hold several cybersecurity certifications including Certified Information Systems Security Professional (CISSP), Certified Advanced Security Pratitioner (CASP), and Certified Ethical Hacker (CEH). Other computer industry certifications include A+, Network+ and Microsoft Certified System Engineer (MCSE). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of security on their computers, networks, and websites. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. We also provide Cybersecurity Awareness Training for clients and their employees. I am a frequent speakers at cybersecurity conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference, the (ISC)2 World Congress, and the ISSA International Conference, and many local community organizations, Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2008.

Add a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.