Cyber Defense

Wearables To Boost Security Of Voice-Based Log-In

ANN ARBOR - A security-token necklace, ear buds or eyeglasses developed at the University of Michigan could eliminate vulnerabilities in voice authentication—the practice of logging in to a device or service with your voice alone. Talking to electronics has become a popular—even essential—way to command them. In this era of the internet of things, voice

By |2017-10-18T19:42:35-04:00October 18th, 2017|Cyber Defense|

North American Cyber Summit Names Keynotes, Featured Speakers

LANSING - The North American International Cyber Summit 2017 hosted by Michigan Governor Rick Snyder, is once again set to take place in the heart of Downtown Detroit at Cobo Center. As in previous year’s, this event will bring together experts from across the globe to address a variety of cyber-security issues impacting the world.

By |2017-10-18T19:34:21-04:00October 18th, 2017|Cyber Defense|

Israeli Telecom Researchers Develop Firewall To Protect Against Android Hacks

BEER-SHEVA, Israel - Cyber security researchers at Ben-Gurion University of the Negev developed an innovative firewall program that adds a missing layer of security in Android cellphones and monitors for malicious code.   Earlier this year, Dr. Yossi Oren and his team of researchers in the BGU Department of Software and Information Systems Engineering, discovered a

By |2017-10-10T17:38:17-04:00October 8th, 2017|Cyber Defense|

Hardware Hacks On Smartphones Give Hackers Access To Your Personal Info

BEER-SHEVA, Israel - When mobile phone users crack a touchscreen, often they will buy a new one online, or at a local repair shop, rather than from the company that originally built the phone. By doing so, they open the door to hackers who sell compromised screens that let them take control of a users

By |2017-10-08T14:49:00-04:00October 8th, 2017|Cyber Defense|

Your Yahoo Account Info Was Definitely Hacked: Here’s What To Do – Advice From CNET

SAN FRANCISCO - If you're wondering what to do after hearing about the massive data breach, follow these steps to make sure you're safe. In September 2016, Yahoo revealed a hack that compromised 500 million user accounts. In December, the company revealed yet another hack, this time affecting a record 1 billion accounts. On Tuesday,

By |2017-10-06T12:11:18-04:00October 6th, 2017|Cyber Defense|

State’s Cybersecurity Efforts Nab National Awards From CIO Association

LANSING – Michigan took two top honors in the annual state IT awards competition sponsored by the National Association of State Chief Information Officers. The state’s efforts to assemble and train a corps of volunteer civilians to assist in cyber emergencies and its development of a mobile resource to inventory Michigan’s forests were chosen as

By |2017-10-05T20:02:30-04:00October 5th, 2017|Cyber Defense|

Snyder Proclaims October Michigan Cybersecurity Awareness Month

LANSING - Gov. Rick Snyder has proclaimed October as Michigan’s Cybersecurity Awareness Month, to highlight the need for all Michiganders to be vigilant of their online activities to avoid cyber-crimes. “Cybersecurity has grown to become a vital priority for the protection of families and businesses,” Snyder said. “We should all use Cybersecurity Awareness Month as

By |2017-10-03T21:00:50-04:00October 3rd, 2017|Cyber Defense|

Lohrmann Backgrounds Equifax Hack – Why It Happened, What’s Next?

ROYAL OAK - Cyber security pro Dan Lohrmann explores the Equifax data breech, and explores stories that some Equifax executives sold stock before disclosing the hack. When the news of the hack - impacting more than 140 million people - was disclosed also is questionable. The news was posted during Hurricane Harvey when it devastated

By |2017-10-01T14:52:38-04:00October 1st, 2017|Cyber Defense, M2 TechCast, Podcasts|

US Signal Offers Enhanced Disaster Recover As A Service

GRAND RAPIDS - US Signal has enhanced its disaster recovery as a service offering to include two service tiers: standard and premium. With both tiers, a customer’s primary production environment is continuously replicated to a US Signal cloud environment or between multiple US Signal data centers. When needed, a replicated instance of the environment can

By |2017-09-28T18:47:22-04:00September 28th, 2017|Cyber Defense|