Cyber Defense

Breaking Down The WannaCry Ransomware Attack

ANN ARBOR - Companies across the globe are still reeling and recovering from the global ransomware attack known as WannaCry on Friday, which took down tens of thousands of machines in 150 countries, including Britain’s National Health System. How and why did this happen? I've mentioned ransomware before and how it’s distributed, how it particularly affects healthcare, and the rise of ransomware as

By |2017-05-23T19:27:38-04:00May 23rd, 2017|Cyber Defense, Guest Columns|

Baker College Adds Online Graduate Degrees In Cloud Security Risk Management

FLINT — Baker College will launch two graduate degrees fall 2017 for those wishing to enter or advance in the cybersecurity field: an MBA in cloud security risk management and a Master of Science in information systems (MSIS) in cloud security risk management. Enrollment is now open for courses that begin Aug. 28. “These new

By |2017-05-19T12:47:22-04:00May 19th, 2017|Cyber Defense, ESD|

How Mobile Is Your Workforce? How Secure Is Your Network? Red Level’s Coffey Answers Both Questions

ROYAL OAK - Justin Coffey, the Red Level Microsoft Solutions Manager, asked the questions: “How Mobile is Your Workforce?” In light of the Ransomeware attack earlier this month that swept through Europe and Asia, he also asks how secure is your network. Both of these questions also will be dealt with on May 24 when

By |2017-05-18T08:13:47-04:00May 18th, 2017|Cyber Defense, M2 TechCast, Podcasts|

The Bridge – Unique Commercialization Program For Startups

DETROIT - Alan Boehme, is the Chief Technology Officer, Chief Innovation Officer & Chief Architect at the Coca-Cola Company and the visionary behind THE BRIDGE, a unique Commercialization Program for startups, acting as a bridge between the entrepreneurial community and major global markets including the US, Europe, Africa/Eurasia and the Pacific.  The vision began three years

By |2017-05-17T16:37:57-04:00May 17th, 2017|Cyber Defense, Internet Advisor, Podcasts|

Red Level Free Webinar May 24 Will Show Businesses How To Make Workforce Mobile, And Secure

NOVI - Can you ensure your data is secure while your workforce is on the go? Red Level will show you how to make your workforce mobile, and secure, during a free webinar May 24 at 1 pm. In this webinar, Red Level will discuss how Microsoft’s cloud-based security solutions (including Office 365, Enterprise Mobility

By |2017-05-17T16:12:59-04:00May 17th, 2017|Cyber Defense, Featured|

Trump Signs Order To Bolster U.S. Cybersecurity, Protect Critical Infrastructure

WASHINGTON DC - President Donald Trump signed an executive order on Thursday to bolster the government's cyber security and protect critical infrastructure from cyber attacks, marking his first significant action to address what he has called a top priority. The order seeks to improve the often-maligned network security of U.S. government agencies, from which foreign

By |2017-05-11T19:50:47-04:00May 11th, 2017|Cyber Defense, Featured|

CyberSecurity Headlines: French Election Email Bomb…Computer Apps Eavesdropping…Two Factor Banking Hacked

DETROIT - Richard Stiennon is an internationally recognized security analyst and author with a sharp eye for security weaknesses and trends. He is the Chief Strategy Officer at Blancco Technology Group, former industry analyst and author of There Will Be Cyberwar, a Washington Post Bestseller. He joined the Internet Advisor gang to talk about the biggest

By |2017-05-09T19:37:42-04:00May 9th, 2017|Cyber Defense, Internet Advisor, Podcasts|

Google Shuts Down Massive Google Docs Phishing Scam

MOUNTAIN VIEW - Google shut down a massive phishing scam that targeted users of its Google Docs service. You know, basically everyone. The sophisticated phishing scam spread across the web on Wednesday afternoon, tricking people into giving up access to their Google accounts. Some people, like Reddit user JakeSteam, said the scam is so sophisticated

By |2017-05-04T21:03:16-04:00May 4th, 2017|Cyber Defense|

How Cybersleuths Decided Russian Hacked The DNC And Impacted US Election

WASHINGTON DC - It was a bombshell. Operatives from two Russian spy agencies had infiltrated computers of the Democratic National Committee, months before the US national election. One agency -- nicknamed Cozy Bear by cybersecurity company CrowdStrike -- used a tool that was "ingenious in its simplicity and power" to insert malicious code into the

By |2017-05-04T20:54:45-04:00May 4th, 2017|Cyber Defense|

Smartphone Security Hole: ‘Open Port’ Backdoors Widespread

ANN ARBOR- A sweeping study of an internet communication mechanism common in mobile devices has revealed that so-called 'open ports' are much more vulnerable to security breaches than previously thought. The vulnerability the University of Michigan researchers highlighted is most pronounced in Android apps that let users share data across devices and connect to their

By |2017-05-02T08:01:27-04:00May 2nd, 2017|Cyber Defense, Featured|