Cyber Defense

IoT Cybersecurity – Caston Thomas From InterWorks Explains The Ins And Outs

ROYAL OAK - Caston Thomas, CEO of InterWorks Technology, has taken the lead on developing the IoT Cybersecurity track for IoT TechConnect April 4 at the Troy Marriott. Caston talks about the cybersecurity risks posed by the Internet of Things - what he calls Ransomware on steroids. Caston’s definition of IoT includes smart thermostats, smart

By |2018-02-17T14:21:26-05:00February 17th, 2018|Cyber Defense, M2 TechCast, Podcasts|

Cybersecurity Update: 2018 Cybersecurity Attacks Will Be Worse, More Sophisticated Than 2017

ROYAL OAK - When you look at 2018, most cybersecurity experts predict the cybersecurity attacks will be worse than 2017. Ransomware, Artificial Intelligence driven malware, security holes in the Intel chips that serve as the brains of our technology. Cybersecurity expert Dan Lohrmann, with Security Mentor, explains it all this segment of M2 TechCast. Unsecured

By |2018-02-08T11:58:30-05:00February 4th, 2018|Cyber Defense, Featured, M2 TechCast, Podcasts|

Duo Security Announces Record-Breaking Year, Tops $100 Million Revenue

ANN ARBOR — Cybersecurity company Duo Security said it topped $100 million in annual recurring revenue in 2017, following news in October its valuation topped $1 Billion after a $70 million venture capital investment. “2017 was an important and exciting year for Duo, during which we expanded our leadership position and further solidified our place

By |2018-02-01T19:26:19-05:00February 1st, 2018|Cyber Defense, ESD, Featured|

Malware Lab Warning: Healthcare Providers Need To Protect Medical Imaging Equipment From Cyber Threats

BEER-SHEVA, Israel – Ben-Gurion University of the Negev Malware Lab researchers are warning medical imaging device manufacturers and healthcare providers to become more diligent in protecting medical imaging equipment from cyber threats. In their new paper, “Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices,” Malware Lab researchers demonstrate the relative ease of exploiting unpatched medical devices,

By |2018-01-31T19:46:01-05:00January 31st, 2018|Cyber Defense, Life Sciences|

Michigan Individual Income Tax Filing Season Has Begun: Hackers Seek To Steal Your Refund

LANSING - Michigan’s individual income tax filing season officially has begun and an army of hackers are waiting to steal your identity and your refund, warns the Michigan Treasury Department. In an effort to protect Michigan taxpayers, the state Treasury Department continues to implement security measures to stop tax-related identity theft. As a result, some

By |2018-01-31T19:18:33-05:00January 31st, 2018|Cyber Defense, Politics, Politics/Government|

What To Do When Your Smartphone Tells You A Ballistic Missile Is Headed Your Way

HONOLULU, Hawaii - In mid-January Hawaiian residents and visitors received a text that warned a ballistic missile was on its way, driving them into a panic as they searched for shelter and contact loved ones. Trouble was the alert was a mistake. The warning resulted when someone pushed the wrong button on a computer screen.

By |2018-01-25T16:18:01-05:00January 25th, 2018|Cyber Defense|

Alphabet Parent Google Launches Machine Learning Platform To Thwart Hackers

MOUNTAIN VIEW, Ca. - Alphabet, the parent company of Google, has launched a machine learning technology called Chronicle that aims to find hackers faster than they can attack computer networks. Chronicle isn't the first to turn to machine learning to solve this problem. The company joins a crowded field of cybersecurity firms that are trying to

By |2018-01-25T16:18:02-05:00January 25th, 2018|Cyber Defense|

Latest Cybersecurity Threats Can Steal Your Password And Give Hackers Access To Your Computer Network

ROYAL OAK - Cybersecurity expert Richard Stiennon joined us on M2 TechCast to scare the heck out of us on what the bad folks are doing in 2018 to hack your computer network. The two latest villains are Meltdown and Spector, which exploit fundamental flaws in the way memory chips are designed. As it turns

By |2018-01-24T15:25:35-05:00January 24th, 2018|Cyber Defense, Featured, M2 TechCast, Podcasts|

Google Dumps 60 Apps Containing Hidden Pornographic Malware Aimed At Kids

MOUNTAIN VIEW, CA. - Google removed roughly 60 apps that contained hidden pornographic malware from its Play Store after a security research company found the code. Many of the games were aimed at kids.  Researchers at Check Point Software Technologies reported the malware on Friday. Dubbed AdultSwine, the malware displayed pornographic images that looked like ads but

By |2018-01-19T11:34:47-05:00January 19th, 2018|Cyber Defense|

Williams Named Cybersecurity Team Project Manager At Michigan Manufacturing Technology Center

PLYMOUTH – Jeff Williams has joined the Michigan Manufacturing Technology Center cybersecurity team as Program Manager. Williams leads The Center’s effort to ensure small to medium-sized manufacturers around Michigan are meeting the latest cybersecurity standards. A focus of Williams’ work includes the updated list of specifications that must be met by contractors who work with

By |2018-01-18T19:44:08-05:00January 18th, 2018|Cyber Defense|