Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.

 Falling Chinese Space Station

Sometime around April 3—give or take about a week—China’s 9.5-ton Tiangong-1 space station will fall out of orbit and enter Earth’s atmosphere. While media reports for the last few months have hyped the “uncontrolled” de-orbit as a potential threat, you probably don’t have to worry…much.

Today is World Backup Day

DON’T BE AN APRIL FOOL.  Be prepared. Back up your files on March 31st.

Easter Holiday Phishing Scams and Malware Campaigns

03/30/2018 08:51 PM EDT  Original release date: March 30, 2018

As the Easter holiday approaches, NCCIC/US-CERT reminds users to be aware of potential holiday scams and cyber campaigns, which may include

  • emails and ecards from unknown senders that may contain malicious links,
  • fake advertisements or shipping notifications with attachments infected with malware, and
  • spoofed email messages and phony posts on social networking sites requesting support for fraudulent causes.

NCCIC encourages users and administrators to be cautious of unsolicited messages and to review NCCIC Tips on Using Caution with Email Attachments and Avoiding Social Engineering and Phishing Attacks.

Facebook loses control of 50 million users’ data, suspends analytics firm

Facebook has suspended Cambridge Analytica for violating its platform policies.


Here is an infographic that outlines the most important cybercrime facts all of us should be aware of in 2018.

A history of barrier and defensive walls and fortifications, from the context of the cybersecurity principle of “defense in depth.”

An interesting article worth the read. Early evidence of the same principles of redundant security measures at work in 13th century castles, 17th century star-shaped artillery fortifications, and even “defense in depth” security architecture promoted today by the National Institute of Standards and Technology, the Nuclear Regulatory Commission, and countless other security organizations world-wide.

Linux Foundation unveils open source hypervisor for IoT products

The reference project ACRN is made for resource-constrained devices and focuses on safety.



About the Author:

Cybersecurity guru to business owners in the St Paul, Minneapolis, and western Wisconsin area. Computer security and hacking have been a passion of mine since I entered the computer and networking business in 2000. In 2013 I completed a course of study and certification exam to become a Certified Ethical Hacker (CEH). In 2016 I was certified as a Certified Information Systems Security Professional (CISSP). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of computer security, network security, and web site security. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also provide Cybersecurity Awareness Training for clients and their employees. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. The views expressed on this Web site are mine alone and do not necessarily represent the views of my employer.

Add a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.