Cyber Defense

Inaugural Global Automotive Cybersecurity Summit Coming To Detroit July 22

DETROIT - A new cutting-edge technology event with cybersecurity solutions for connected and autonomous cars is being organized by Billington CyberSecurity. The cyber summit will include CEOs in the auto industry as well as top government and technology leaders from around the world. Something new is coming to Detroit, but it is based on something

By |2016-06-07T07:31:51-04:00June 7th, 2016|Cyber Defense, Featured, Guest Columns|

Beyond Spear Phishing: How to Address Whaling And More

LANSING - First, there was phishing … then came spear phishing … and now there is whaling — and other new sophisticated social engineering techniques. The bad guys are modifying their deceptive practices. Here’s what you need to know. Just when you thought you had seen it all regarding online phishing scams, along comes a

By |2016-05-24T17:43:40-04:00May 24th, 2016|Cyber Defense, Guest Columns|

M2 TechCast: McGraw, Lohrmann, Stiennon Talk About How Washington Needs To Focus On Building Better Cyber Defenses

FERNDALE - Gary McGraw, the CTO of Cigital, joins two other cyber security experts, Dan Lohrmann of Security Mentor and Richard Stiennon of IT Harvest, to talk how Washington DC has become transfixed with building better cyber weapons, but not better cyber defenses. Cyber threats cost Americans billions of dollars each year and put U.S.

By |2016-05-24T16:36:26-04:00May 24th, 2016|Cyber Defense, M2 TechCast, Podcasts|

Inspector General Gives TSA Failing Marks On Cybersecurity

WASHINGTON DC - Five years of Department of Homeland Security audits have revealed, to the surprise of few and the dismay of all, that the TSA is as great at cybersecurity as it is at customer service. The final report from the DHS Office of Inspector General details serious persistent problems with TSA staff's handling

By |2016-05-22T12:50:02-04:00May 22nd, 2016|Cyber Defense|

Apple Kills iPhone Diagnostic App That Reveals If Device Infected By Malware

CUPERTINO - A new iPhone diagnostic app - aimed to reveal if your device had been infected by malware - has been given the cold shoulder by Apple. Released little more than a week ago, an app dubbed System and Security Info aimed to deliver core details about your iPhone, including your CPU, memory and

By |2016-05-20T07:50:54-04:00May 19th, 2016|Cyber Defense, Mobile MI, News|

Change Your Password If You Have LinkedIn Account – Hackers May Have It

SAN FRANCISCO - LinkedIn announced Wednesday that more than 100 million members' email and password combinations stemming from a 2012 data breach have been posted online, residual fallout from hackers stealing and publicly releasing a separate set of 6.5 million encrypted passwords. "Yesterday, we became aware of an additional set of data that had just

By |2016-05-19T20:18:13-04:00May 19th, 2016|Cyber Defense, Featured|

Michigan Mobile Musings: Cybersecurity: Across The Board How Much Is It Truly An Issue?

GRAND RAPIDS - Security breaches and cyber threats, they are increasingly a concern for companies, governments and consumers. With the advent of the Internet of Things, smart devices are being brought into consumers homes, and cars are becoming connected devices. Are our companies safe? What about our homes and our cars? What about our medical records at the

By |2016-05-18T17:12:48-04:00May 18th, 2016|Cyber Defense, Michigan Mobile Musings, Podcasts|

7 Reasons You Should Care if the United Kingdom Leaves the European Union

LANSING - On June 23, the world will be watching as the citizens of the UK decide whether to remain in the EU. The ramifications of this vote go far beyond Great Britain or Europe. History shows us that American interests and our future security are directly tied to this “special relationship.” Here’s why you

By |2016-05-13T12:16:12-04:00May 13th, 2016|Cyber Defense|

State Technology Leaders Focus On Procurement, Cybersecurity And Agile

BALTIMORE - The National Association of State Chief Information Officers held their Midyear Conference in Baltimore this past week. There were plenty of hot topics on the agenda, including: enabling innovation through agile software development, the continuing need for procurement reform and a big push on cybersecurity. From the opening keynote highlighting what it takes

By |2016-05-13T12:16:14-04:00May 13th, 2016|Cyber Defense|

FCC, FTC Ask Mobile Phone Makers, Wireless Carriers Why Security Fixes Take So Long

WASHINGTON DC - US regulators want to know how mobile phone makers and wireless carriers handle security vulnerabilities and why fixes seem to take so long. The Federal Communications Commission and the Federal Trade Commission on Monday sent letters to fourteen companies, asking for details about how they release security updates. The FCC sent letters

By |2016-05-12T21:35:57-04:00May 12th, 2016|Cyber Defense, Mobile MI, Politics|