CNET

About CNET

This author has not yet filled in any details.
So far CNET has created 186 blog entries.

Remote Pilot Certificate Tests – Commercial Drone Wings – Now Available

SAN FRANCISCO - Would you like to make money flying commercial drones? Well now you can. On Aug. 29, the Federal Aviation Administration offered drone pilot license testing nationwide, including 17 locations in Michigan. You can apply for your very own license by passing a multiple-choice test and paying a small fee. No experience necessary!

By |2016-08-30T21:05:54-04:00August 30th, 2016|Drones, Featured|

Trident Spyware Invades Apple iPhones Unless You Update Immediately

CUPERTINO - If you have an iPhone be afraid, be very afraid. A terrifying new spyware, dubbed Trident, can break through the security protection to read texts and email, record calls (including WhatsApp and Viber calls), track your location and turn on your phone's camera and microphone. Trident exploits three zero-day vulnerabilities in iOS 9 to form

By |2016-08-26T09:48:31-04:00August 26th, 2016|Cyber Defense, News|

NSA Whistle Blower Snowden Says Russian Hack Of Democrat Party Server Diplomatic Signaling

MOSCOW - NSA whistle blower Edward Snowden said his old employer was likely hacked by his new host, Russia. Snowden tweeted Tuesday that the auction of malicious software files allegedly stolen from the NSA may actually be diplomatic signaling by Russia. The software, a set of digital tools, is being auctioned by a group that

By |2016-08-19T11:13:08-04:00August 19th, 2016|Cyber Defense, Featured|

Report: Keysniffer Hack Can Detect Passwords From Wireless Keyboards

SAN FRANCISCO - Using an attack that researchers at cybersecurity firm Bastille are calling "keysniffer," hackers can detect every key you press on your wireless keyboard. Think about that next time you’re using your laptop in a coffee shop. That means they can pick up your passwords and maybe the answers to your security questions,

By |2016-07-28T16:32:43-04:00July 28th, 2016|Cyber Defense|

Obama Makes FBI Lead Government Agency To Respond To Cyberattacks

WASHINGTON DC - Who's in charge of responding to "cyber incidents" in the US? As of today, it's the Federal Bureau of Investigation. President Barack Obama outlined a new policy for responding to cyberattacks on both the government and US industry on Tuesday, making the FBI the lead agency regardless of where the attack seems

By |2016-07-28T16:12:43-04:00July 28th, 2016|Cyber Defense, Politics|

10 Million Android Smartphones Hit With HummingBad Malware – Is Yours One?

SAN FRANCISCO - A malicious app called HummingBad has taken hold of about 10 million Android phones around the world, and it collects your personal data, plus makes it act like you’ve clicked on ads that, well, you haven’t. Fortunately, there are steps you can take to see if HummingBad has roosted with you and

By |2016-07-07T17:56:40-04:00July 7th, 2016|Cyber Defense|

U.S. Senate Could Give FBI Power To View Your Internet Activity Without A Warrant

WASHINGTON DC - Everything you view on the Internet, from websites to how long your browsed a particular page, could be viewed by the FBI without the need for a warrant in terrorism and spy cases, if this legislation is enacted this week in the U.S. Senate. At stake is access to your personal "electronic

By |2016-06-09T15:39:29-04:00June 9th, 2016|Cyber Defense, News, Politics|

Apple Kills iPhone Diagnostic App That Reveals If Device Infected By Malware

CUPERTINO - A new iPhone diagnostic app - aimed to reveal if your device had been infected by malware - has been given the cold shoulder by Apple. Released little more than a week ago, an app dubbed System and Security Info aimed to deliver core details about your iPhone, including your CPU, memory and

By |2016-05-20T07:50:54-04:00May 19th, 2016|Cyber Defense, Mobile MI, News|

Change Your Password If You Have LinkedIn Account – Hackers May Have It

SAN FRANCISCO - LinkedIn announced Wednesday that more than 100 million members' email and password combinations stemming from a 2012 data breach have been posted online, residual fallout from hackers stealing and publicly releasing a separate set of 6.5 million encrypted passwords. "Yesterday, we became aware of an additional set of data that had just

By |2016-05-19T20:18:13-04:00May 19th, 2016|Cyber Defense, Featured|

FCC, FTC Ask Mobile Phone Makers, Wireless Carriers Why Security Fixes Take So Long

WASHINGTON DC - US regulators want to know how mobile phone makers and wireless carriers handle security vulnerabilities and why fixes seem to take so long. The Federal Communications Commission and the Federal Trade Commission on Monday sent letters to fourteen companies, asking for details about how they release security updates. The FCC sent letters

By |2016-05-12T21:35:57-04:00May 12th, 2016|Cyber Defense, Mobile MI, Politics|