Cyber Defense

More Than Half Of Small Businesses Have No Disaster Preparedness Plan

BOSTON - Most small businesses recognize the impact data loss could have on their business. But more than half (57 percent) do not have a disaster preparedness plan for business data, according to new research from Carbonite, which makes online backup solutions for both consumers and small to medium businesses. The Carbonite study is based

By |2011-09-27T00:00:00-04:00September 27th, 2011|Archive, Cyber Defense|

Microsoft Hands Rustock Botnet Case To FBI

REDMOND, Wa. - Microsoft is hoping that federal agents will bring to justice one of the world's most notorious spammers, known to the company only as Cosma2k, the handle for the ringleader of the Rustock botnet, sending as many as 30 billion messages a day at its peak. In March, Microsoft worked with federal law

By |2011-09-22T00:00:00-04:00September 22nd, 2011|Archive, Cyber Defense|

Hacktivist Anonymous To Hold “Day Of Vengeance” In US Saturday

SAN FRANCISCO - Hacktivist group Anonymous is planning to hold a special "Day of Vengeance" in several US cities on Saturday, including New York. It was unknown if Detroit would be subject to cyberattack. Late last night, Anonymous--or at least people claiming to be from Anonymous--posted a press release on Pastebin, saying that Saturday will

By |2011-09-22T00:00:00-04:00September 22nd, 2011|Archive, Cyber Defense|

Researchers Finds Dozen Security Flaws In Software Used By Utilities

SAN FRANCSICO - An Italian researcher has uncovered at least a dozen security flaws in software used in utilities and other critical infrastructure systems, prompting security advisories from the U.S. government. Luigi Auriemma released information about the previously unknown vulnerabilities and proof of concept exploit code earlier this week on his Web site, CNET News.Com

By |2011-09-19T00:00:00-04:00September 19th, 2011|Archive, Cyber Defense|

Windows 8 To Offer Built-In Malware Protection

REDMOND, Wa. - Microsoft is including a beefier version of its malware protection in Windows 8. The company is tweaking its Windows Defender tool, which has been part of the last few versions of Windows, by essentially adding some of the more robust features from its free Security Essentials product. Launched in 2009, Security Essentials

By |2011-09-15T00:00:00-04:00September 15th, 2011|Archive, Cyber Defense|

Google To Let Users Opt Out Of Location Data Collection

MOUNTAIN VIEW, Ca. - In a bid to play nice with European regulatory authorities, Google announced yesterday that it will soon launch an opt-out option for owners of wireless access points the company uses to gather smartphone location data. "Even though the wireless access point signals we use in our location services don't identify people,

By |2011-09-15T00:00:00-04:00September 15th, 2011|Archive, Cyber Defense|

Cyber Security & Continuing Education

MIDLAND - Continuing education (CPEs) can be the key to keep you up-to-date on emerging IT security threats. However, if you don't take the time to posture your IT defense and offense (not to mention earn the credits you need), you could expose your company to attack and lose your certification. To read the rest

By |2011-09-09T00:00:00-04:00September 9th, 2011|Archive, Cyber Defense|

Michigan Cyber Expert Stiennon Named To Most Powerful Voices in Security List

WOODCLIFF LAKE, N.J. ? IT-Harvest.Com Publisher Richard Stiennon has been named to the Most Powerful Voices in Security as both a security analyst and blogger. Stiennon is the technical advisor on a new cyber crime novella, called Cyber Styletto, that predicts a terrorist attack on the nation's traffic and railroad computer controls. Stiennon was ranked

By |2011-09-08T00:00:00-04:00September 8th, 2011|Archive, Cyber Defense|

Online Tech Sponsors IT Disaster Recovery Webinar Sept. 20

ANN ARBOR - Online Tech is sponsoring an IT disaster recovery webinar and a 7x24 Exchange event presentation Sept. 20 at 2 pm. During the webinar and presentation, Steven Gold that will share expertise learned from living through an actual IT disaster. Steven Gold, Principal Infrastructure Consultant at SJG Consultants, has over 30 years of

By |2011-09-08T00:00:00-04:00September 8th, 2011|Archive, Cyber Defense|

Twitter Accounts Spamming Malicious Links

SAN FRANCISCO - New spamming campaign has been observed by TrendMicro that is spreading on twitter, the malicious shortened URLs contain a JPEG file from a Facebook domain. Files with extension .JPEG are usually image and pictures extension but here link lead to a worm detected by Trend Micro as WORM_KOLAB.SMQX. The interesting point that

By |2011-09-06T00:00:00-04:00September 6th, 2011|Archive, Cyber Defense|