Cyber Defense

FCC Seeks Public Feedback On Carriers Disabling Cell Service For Public Safety

WASHINGTON D.C. - The Federal Communications Commission wants to know what the public has to say about government officials asking carriers to disable cell service for public safety purposes. The agency's concern is a reaction to last year's cutting of service by San Francisco Bay Area subway police ahead of a protest. "Our democracy, our

By |2012-03-05T00:00:00-05:00March 5th, 2012|Archive, Cyber Defense|

Anonymous Publishes Monsanto Database Of Company Material

SAN FRANCISCO - Anonymous continued its ongoing attack on agricultural biotech giant Monsanto by publishing an outdated database of the company's material. This is the newest in a barrage of strikes from hackers aligned with Anonymous who operate under the "AntiSec" banner. In a statement posted with the database on a Pastebin site, the hacktivist

By |2012-03-05T00:00:00-05:00March 5th, 2012|Archive, Cyber Defense|

MCWT March 22 Annual Membership Meeting Features Fiserv CIO

TROY ? The March 22 annual membership meeting for the Michigan Council For Women in Technology will be focused on networking, learning and growing together. Fiserv Executive VP and CIO Maryann Goebel will deliver a dynamic keynote address discussing leadership, the benefits of mentoring and how to further your career in IT. She'll also provide

By |2012-03-01T00:00:00-05:00March 1st, 2012|Archive, Cyber Defense|

Internet2 Calls For Nominations For Richard Rose Award

ANN ARBOR - Internet2 Monday announced its call for nominations for the 2012 Richard Rose Award, which recognizes outstanding individual efforts aimed at extending the benefits of advanced networking to the education community. Nominations will be accepted until March 26. The award will be presented at the Spring 2012 Internet2 Member Meeting in Arlington, Virginia

By |2012-02-27T00:00:00-05:00February 27th, 2012|Archive, Cyber Defense|

Civil Liberties Groups: Proposed Cybersecurity Bill Is Too Broad

WASHINGTON DC - The cybersecurity bill introduced last week in the U.S. Senate is too broad, say privacy experts who worry that it could authorize wiretapping and curtail civil liberties. The Cybersecurity Act of 2012, introduced by Sens. Joe Lieberman (I-Connecticut), John D. Rockefeller IV (D-West Virginia), Susan Collins (R-Maine), and Dianne Feinstein (D-California), is

By |2012-02-27T00:00:00-05:00February 27th, 2012|Archive, Cyber Defense|

New Flashback Trojan Variant Found For OS X

SAN FRANCISCO - Security and antivirus firm Intego reported that the criminals behind the Flashback Trojan have been hard at work releasing new variants to their malware package. The seventh variant of Flashback has been identified, which shows it is using new and unique techniques for infecting Macs. Flashback is a Trojan horse attack that,

By |2012-02-27T00:00:00-05:00February 27th, 2012|Archive, Cyber Defense|

California Forces Mobil App Makers To Improve Privacy Protections

SAN FRANCISCO - California's Office of the Attorney General has gotten agreements from Apple, Google, Microsoft, Amazon, Hewlett-Packard, and Research In Motion to improve privacy protections on mobile apps. The companies will require developers to include privacy policies in their apps so that users will be informed about the data that apps will access, use,

By |2012-02-23T00:00:00-05:00February 23rd, 2012|Archive, Cyber Defense|

Obama Unveils Consumer Privacy Bill of Rights

WASHINGTON DC - The Obama administration plans to work with Congress to enact legislation to protect peoples' online privacy based on a Consumer Privacy Bill of Rights. At the same time, Google, Yahoo, Microsoft, and AOL are committing to work with Do Not Track technology in most major Web browsers so people can stop companies

By |2012-02-23T00:00:00-05:00February 23rd, 2012|Archive, Cyber Defense|

Liquid Web Passes SSAE-16, SOC 3 Security Exams

LANSING - Liquid Web a managed hosting company with locations in Michigan and Arizona has successfully completed a SSAE-16 (formerly SAS70) and SOC 3 examinations, relevant to security, availability, and processing integrity, and has been issued an Independent Service Auditor's Report for both. The report found that Liquid Web had addressed each of the controls

By |2012-02-23T00:00:00-05:00February 23rd, 2012|Archive, Cyber Defense|

Chinese Hackers Had Access To Nortel’s Computer System For A Decade

TORONTO, Can. - Cyber criminals believed to be based in China have enjoyed nearly unfettered access to Nortel's computer system and access to its most secret intellectual property since as far back as 2000, according to the results of an internal investigation obtained by the Wall Street Journal. Nortel, once Canada?s most valuable company with

By |2012-02-17T00:00:00-05:00February 17th, 2012|Archive, Cyber Defense|