Cyber Defense

Defcon Hackers Demonstrate How Easy It Is To Hack US Voting Machines

LAS VEGAS - Defcon, a huge hacker convention held annually in this desert playground, received more than 30 voting machines to play with, providing a rare opportunity for hackers to find the flaws in our democracy's technology. How long did it take to crack them? About 90 minutes.  The security of voting technology was elevated

By |2017-08-04T07:53:39-04:00August 3rd, 2017|Cyber Defense, Featured|

Is A Fear Of New Technology Holding Your Business Back?

ROCHESTER HILLS - According to RightScale, a Cloud Management Trends blog, cloud adoption has grown by 18 percent every year since 2012. Now, more than 77 percent of private users, and more than 40 percent of small to medium sized business owners are moving to the cloud. Truth is, the cloud has the potential to

By |2017-08-03T20:17:19-04:00August 3rd, 2017|Cyber Defense, Guest Columns|

Congress Wants To Fix IoT Security Problems For The Federal Government Only

WASHINGTON DC - Congress wants to fix the notorious security problems associated with the Internet of Things - for the federal government. This week Sens. Mark Warner, Cory Gardner, Ron Wyden and Steve Daines introduced the "Internet of Things Cybersecurity Improvement Act," (PDF) a bill that would force tech companies to ramp up security if

By |2017-08-03T20:06:46-04:00August 3rd, 2017|Cyber Defense, Politics|

Survey: Michigan Has Nearly 7,000 Cybersecurity-Related Job Postings

DETROIT - Michigan has nearly 7,000 cybersecurity-related job postings, a new study shows, while 39 institutions offer programs, degrees, or training related to cybersecurity in the Advance Michigan area, including Clinton, Eaton, Genesee, Ingham, Lapeer, Livingston, Macomb, Monroe, Oakland, St. Clair, Shiawassee, Washtenaw, and Wayne counties. The study also shows that students can choose among

By |2017-08-03T19:07:51-04:00August 3rd, 2017|Cyber Defense|

Ransomware Hackers Now Offer Customers Service, Outsourced Resources

LAS VEGAS - Hackers behind some of the most notorious ransomware around are taking some hints from legit Wall Street companies. Malware strains like Locky and Cerber helped make ransomware a $25 million industry in 2016 and its operators are starting to operate like conventional corporations with "customer" service staff and outsourced resources, researchers explained Wednesday

By |2017-07-27T18:49:11-04:00July 27th, 2017|Cyber Defense|

Report: Hackers Can Take Over Your Phone To Send Text Messages, Make Phone Calls

LAS VEGAS - The Unicorn Team researchers from 360 Technology, China's leading security company, discovered they could hack phones when they switched from modern LTE wireless networks to older, slower 2G technology. Of course, our phones do this all the time when the signal's weak, although you may not notice when it's happening. Still, if hackers take

By |2017-07-27T18:38:45-04:00July 27th, 2017|Cyber Defense|

Feds Shut Down Two Of The Dark Webs’ Biggest Purveyors Of Illegal Goods

WASHINGTON DC - The Department of Justice and Europol announced Thursday that they have shut down AlphaBay and Hansa, two massive marketplaces on the dark web that served hundreds of thousands of customers trying to get their hands on illegal goods online. While you or I can easily buy groceries, electronics and clothes online, when it comes

By |2017-07-20T15:52:48-04:00July 20th, 2017|Cyber Defense, Featured|

Don’t Be Forced Out Of Business By Cybercrime

ROCHESTER HILLS - According to the National Cyber Security Alliance, one out of every five small-and-medium sized businesses is hit by cybercrime each year. Roughly 60% of these SMBs are out of business within six months of an attack. Today's cybercriminal doesn't discriminate by business type or size. They look for exposed security cracks and

By |2017-07-16T16:02:47-04:00July 16th, 2017|Cyber Defense, Guest Columns|

LeakerLocker Ransomware Attacks Android Phones From Apps Downloaded From Play Store

SAN FRANCISCO - Security firm McAfee discovered the latest attack, called LeakerLocker, which affects Android phones through apps downloaded from the Google Play store. Most ransomware locks up your files or hard drive, but LeakerLocker takes your private data and browsing history and threatens to share it with the friends and family on your contact

By |2017-07-13T21:46:40-04:00July 13th, 2017|Cyber Defense|