Cyber Defense

Free TechTown Forum Helps Detroit Entrepreneurs “Get India Right”

DETROIT - TechTown's offering Detroit entrepreneurs a unique opportunity to learn how to trade with India the right way. The Indian Business Forum is a free quarterly meeting providing an opportunity to network with entrepreneurs doing business with India, one of the world's largest trading partners. At the March meeting, attendees also get an introduction

By |2009-03-03T00:00:00-05:00March 3rd, 2009|Archive, Cyber Defense|

Data Breach Investigation Report Topic For March 19 Motor City ISSA Meeting

SOUTHFIELD - Data Breach Investigation Report is the topic March 19 for Motor City ISSA, as David Ostertag offers a comprehensive data-driven report on forensics and computer crime investigations - gathered from 500 cases over a 4-year period. RSVP deadline is March 16. Ostertag from the Verizon Business' Investigative Response team will share insights gathered

By |2009-02-27T00:00:00-05:00February 27th, 2009|Archive, Cyber Defense|

SecureWorld Continues Strong In 2009

PORTLAND, Ore. - The Houston SecureWorld event wrapped up with a 20 percent growth in attendance over last year's program! Sponsors included WebSense, Cyveillance, Alcatel-Lucent, CompTIA, Motorola AirDefense, Great Bay Software, Lumension Security, TippingPoint, Bradford Networks, ArcSight, ESET, Gigamon, Configuresoft, and more. "I look forward to next year. I would recommend your conferences to anyone

By |2009-02-27T00:00:00-05:00February 27th, 2009|Archive, Cyber Defense|

Walsh College Workshop March 17 On Workplace Privacy Policies

NOVI - Walsh College is hosting a workshop on March 17 that will examine Workplace Privacy Policies at the Novi Campus. Email and other forms of electronic communication have become valuable business tools. Organizations need to have an understanding of the universe of laws governing their collection, use, disclosure and protection of electronic mail. This

By |2009-02-27T00:00:00-05:00February 27th, 2009|Archive, Cyber Defense|

Defense Agencies List Top 20 Security Controls

WASHINGTON - A group of U.S. government security organizations has listed the top 20 security actions that they recommend organizations should take to improve computer security. Called Twenty Most Important Controls and Metrics for Effective Cyber Defense and Continuous FISMA Compliance, the list was published Monday by a conglomerate of U.S. government agencies, including the

By |2009-02-27T00:00:00-05:00February 27th, 2009|Archive, Cyber Defense|

SMiShing Fishes For Personal Data Over Cell Phones

SAN FRANCISCO - When we think of phishing attacks, in which scammers try to lure sensitive information out of Internet users, we think of fake official-looking e-mails and Web sites. But you don't even need to be online to get phished. A phishing attack making the rounds tries to dupe cell phone users into revealing

By |2009-02-27T00:00:00-05:00February 27th, 2009|Archive, Cyber Defense|

Attack Exploits Unpatched Excel Security Hole

REDMOND - Attackers are attempting to exploit an unpatched security hole in Excel that could allow someone to take control of a compromised computer, Microsoft said in a security advisory. The attack exploiting the Excel Unspecified Remote Code Execution Vulnerability requires a computer user to open an attachment sent via e-mail that has a maliciously

By |2009-02-27T00:00:00-05:00February 27th, 2009|Archive, Cyber Defense|

Credit Card Data Breached At Unnamed Payment Processor

SAN FRANCISCO - Another U.S. payment processor has suffered a database breach that exposed credit card and debit card information, according to several credit unions. The name of the payment processor has not been released and it is unclear how many consumers are affected. Blog site DataBreaches.net has been tracking the reports here and here.

By |2009-02-27T00:00:00-05:00February 27th, 2009|Archive, Cyber Defense|

Adobe Patches Flash Hole

SAN FRANCISCO - Adobe released a patch for a Flash player hole this week that could allow an attacker to remotely take control of a computer. The vulnerability is critical for one for Adobe Flash Player 10.0.12.36 and earlier versions, the company said in an advisory. To exploit the vulnerability, a targeted user must load

By |2009-02-27T00:00:00-05:00February 27th, 2009|Archive, Cyber Defense|