Cyber Defense

Hacktivist Anonymous To Hold “Day Of Vengeance” In US Saturday

SAN FRANCISCO - Hacktivist group Anonymous is planning to hold a special "Day of Vengeance" in several US cities on Saturday, including New York. It was unknown if Detroit would be subject to cyberattack. Late last night, Anonymous--or at least people claiming to be from Anonymous--posted a press release on Pastebin, saying that Saturday will

By |2011-09-22T00:00:00-04:00September 22nd, 2011|Archive, Cyber Defense|

Researchers Finds Dozen Security Flaws In Software Used By Utilities

SAN FRANCSICO - An Italian researcher has uncovered at least a dozen security flaws in software used in utilities and other critical infrastructure systems, prompting security advisories from the U.S. government. Luigi Auriemma released information about the previously unknown vulnerabilities and proof of concept exploit code earlier this week on his Web site, CNET News.Com

By |2011-09-19T00:00:00-04:00September 19th, 2011|Archive, Cyber Defense|

Windows 8 To Offer Built-In Malware Protection

REDMOND, Wa. - Microsoft is including a beefier version of its malware protection in Windows 8. The company is tweaking its Windows Defender tool, which has been part of the last few versions of Windows, by essentially adding some of the more robust features from its free Security Essentials product. Launched in 2009, Security Essentials

By |2011-09-15T00:00:00-04:00September 15th, 2011|Archive, Cyber Defense|

Google To Let Users Opt Out Of Location Data Collection

MOUNTAIN VIEW, Ca. - In a bid to play nice with European regulatory authorities, Google announced yesterday that it will soon launch an opt-out option for owners of wireless access points the company uses to gather smartphone location data. "Even though the wireless access point signals we use in our location services don't identify people,

By |2011-09-15T00:00:00-04:00September 15th, 2011|Archive, Cyber Defense|

Cyber Security & Continuing Education

MIDLAND - Continuing education (CPEs) can be the key to keep you up-to-date on emerging IT security threats. However, if you don't take the time to posture your IT defense and offense (not to mention earn the credits you need), you could expose your company to attack and lose your certification. To read the rest

By |2011-09-09T00:00:00-04:00September 9th, 2011|Archive, Cyber Defense|

Michigan Cyber Expert Stiennon Named To Most Powerful Voices in Security List

WOODCLIFF LAKE, N.J. ? IT-Harvest.Com Publisher Richard Stiennon has been named to the Most Powerful Voices in Security as both a security analyst and blogger. Stiennon is the technical advisor on a new cyber crime novella, called Cyber Styletto, that predicts a terrorist attack on the nation's traffic and railroad computer controls. Stiennon was ranked

By |2011-09-08T00:00:00-04:00September 8th, 2011|Archive, Cyber Defense|

Online Tech Sponsors IT Disaster Recovery Webinar Sept. 20

ANN ARBOR - Online Tech is sponsoring an IT disaster recovery webinar and a 7x24 Exchange event presentation Sept. 20 at 2 pm. During the webinar and presentation, Steven Gold that will share expertise learned from living through an actual IT disaster. Steven Gold, Principal Infrastructure Consultant at SJG Consultants, has over 30 years of

By |2011-09-08T00:00:00-04:00September 8th, 2011|Archive, Cyber Defense|

Twitter Accounts Spamming Malicious Links

SAN FRANCISCO - New spamming campaign has been observed by TrendMicro that is spreading on twitter, the malicious shortened URLs contain a JPEG file from a Facebook domain. Files with extension .JPEG are usually image and pictures extension but here link lead to a worm detected by Trend Micro as WORM_KOLAB.SMQX. The interesting point that

By |2011-09-06T00:00:00-04:00September 6th, 2011|Archive, Cyber Defense|

National Launch of Virtual Security Service

TROY - The Huffmaster Companies, a nationwide provider of security technologies and services, announced the nationwide launch of its newest division; VirSec. VirSec provides virtual security, including remote video monitoring, remote access management, and hosted security services via the VirSec Operations Center. The VOC houses state-of-the-art security video and access control technology, monitored and managed

By |2011-09-01T00:00:00-04:00September 1st, 2011|Archive, Cyber Defense|

More Hack Attacks Targeting Social Networks

SAN FRANCISCO - Cybercriminals are increasingly targeting social networks, prompting people to take more steps to protect their online privacy, according to a new survey from security company Webroot. A survey of nearly 4,000 social-network users in the U.S., U.K., and Australia found that the number of people hit by Koobface and other social-networking malware

By |2011-08-18T00:00:00-04:00August 18th, 2011|Archive, Cyber Defense|