Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


From the About Damn Time Dept.

Microsoft purges 3,000 tech support scams hiding on TechNet.  Google removes Tech Support Scam advertisers from their ad platform, too.

Microsoft has taken down thousands of ads for tech support scams that infested the company’s TechNet support domain. Google recently announced that it would require companies advertising tech support to sign up for its advanced verification process that subjects them to manual checks.


Disco Balls in Space

Outer space belongs to all of us.  Inevitably this means people can start putting all kinds of personal crap up there.  Like cremated human remains.  Lately a couple of artists added some “art” of their own creation.  Expect to see more of this trend.


Lego Group built a full-size, drivable Bugatti Chiron

This is the first time you might actually enjoy stepping on a Lego.  Built entirely of Lego Technics, and big enough for a human to drive it at speeds up to 20 kph.  Using Legos.


Understanding Firewalls for Home and Small Office Use

Original release date: September 10, 2018

When your computer is accessible through an internet connection or Wi-Fi network, it is susceptible to attack. However, you can restrict outside access to your computer—and the information on it—with a firewall.  Click through to read more.


 

0

About the Author:

Cybersecurity analyst, pen-tester, trainer, and speaker. Serving small business owners in the St Paul, Minneapolis, and western Wisconsin area since 2001. Cybersecurity and hacking have been a passion of mine since I entered the computer and networking business in 2000. I hold several cybersecurity certifications including Certified Information Systems Security Professional (CISSP), Certified Advanced Security Pratitioner (CASP), and Certified Ethical Hacker (CEH). Other computer industry certifications include A+, Network+ and Microsoft Certified System Engineer (MCSE). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of security on their computers, networks, and websites. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. We also provide Cybersecurity Awareness Training for clients and their employees. I am a frequent speakers at cybersecurity conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference, the (ISC)2 World Congress, and the ISSA International Conference, and many local community organizations, Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2008.
  Related Posts

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.