Cyber Defense

Twitter Stops US Law Enforcement, Intelligence Services From Analyzing Tweets

WASHINGTON DC - Microblogging platform Twitter has stopped US law enforcement and intelligence services from using a data analytics service that can process and analyze the platform's tweets and messages. On Sunday, a senior US official and other people close to the matter told the Wall Street Journal that Twitter's move, while not made public,

By |2016-05-12T21:45:32-04:00May 12th, 2016|Cyber Defense|

M2 TechCast: ESD Job Fair, Online Tech Disaster Recovery As A Service

FERNDALE - In this segment of M2 TechCast that aired on May 2, Engineering Society of Detroit’s Robert McGee who talks about the latest ESD Job Fair, where thousands of jobs in Science Technology Engineering and Math are available. Also on the show was Online Tech CEO Yan Ness who provides details on Disaster Recovery

By |2016-05-10T14:00:29-04:00May 10th, 2016|Cyber Defense, M2 TechCast, Podcasts|

Duo Security Report: 25 Percent Of Internet Explorer Browsers Open To Hackers

ANN ARBOR - A new report from Duo Security set to be released May 10 will show that 25 percent of all Windows devices are running outdated versions of Internet Explorer, open to 700 known vulnerabilities for hackers. What’s more, the report shows 60 percent of Flash users are running out-of-date versions, while 72 percent have

By |2016-05-05T17:41:52-04:00May 5th, 2016|Cyber Defense|

Hacking Into homes: ‘Smart Home’ Security Flaws Found In Popular System

ANN ARBOR - Cybersecurity researchers at the University of Michigan were able to hack into the leading "smart home" automation system and essentially get the PIN code to a home's front door. Their "lock-pick malware app" was one of four attacks that the cybersecurity researchers leveled at an experimental set-up of Samsung's SmartThings, a top-selling

By |2016-05-02T12:52:42-04:00May 2nd, 2016|Cyber Defense, News|

Motor City ISSA Networking, Recruiting Meeting May 19

NORTHVILLE - Motor City ISSA is hosting its second networking and recruiting event May 19 with special guest CBI to speak about its academy and internship programs. Potential candidates will get a chance to meet CBI officials. The meeting is open to Security minded professionals, Students and those considering a career in Security. It will

By |2016-05-01T18:11:24-04:00May 1st, 2016|Cyber Defense|

Cyber Security: Curiosity Can Kill More Than The Cat

LANSING - Most adults know that washing your hands reduces the risk of spreading germs, and cleaning and bandaging a wound prevents infection. But do you know what can happen when you pick up electronic germs? In 2015, two separate groups of researchers ran experiments to test people’s curiosity and their knowledge of cyber security.

By |2016-04-29T16:01:38-04:00April 29th, 2016|Cyber Defense, Small Business Association of Michigan|

Houses Unanimously Approves Email Privacy Act – Senate Expected To Do Same

WASHINGTON DC - Who says Congress can’t work together? Well   certainly so when it comes to email privacy. On Wednesday the House of Representatives voted 419-0 to approve the Email Privacy Act, an update to a 30-year old law privacy advocates say is long overdue. The bill essentially fills a loophole in the 1986

By |2016-04-28T19:21:38-04:00April 28th, 2016|Cyber Defense, Featured, Politics|

Secret Code For Smart Devices To Keep Black Hats Out Of Internet Of Things

SAN FRANCISCO - Everyone knows that all these smart devices plugging into today’s homes - part of the exploding Internet of Things - also provide black hats with a golden opportunity to hack computer networks. On Wednesday, Samsung and Thales e-Security announced a new system for smart devices that manufacturers can plug into a refrigerator

By |2016-04-28T18:43:20-04:00April 28th, 2016|Cyber Defense|

FBI Maintains Silence On How It Cracked Terrorist iPhone – Israeli Company Suspected

WASHINGTON DC - The FBI is maintaining its silence about a hack that gave it access to data on a terrorist's iPhone, although earlier reports claimed an Israeli company masterminded the exploit. As expected, the agency released a statement Wednesday, reported by CNET.Com, arguing that it doesn't know enough about the hacking method to submit

By |2016-04-28T15:36:34-04:00April 28th, 2016|Cyber Defense, Politics|

May ISACA Detroit Chapter Meeting May 12: Insider Threats, IT Risk

TROY - Insider threats and IT Risk will be the topics discussed at the May ISACA Detroit Chapter meeting May 12 at Michigan State University Management Education Center. Pre-Dinner Topic: Keeping Insider Threats at Bay: Key Steps to Building a Successful Audit Program. Pre Dinner Speaker: Doug Copley CISA, CISM, CISSP, CIPP/US, CIPT After-Dinner Topic:

By |2016-04-28T14:32:01-04:00April 28th, 2016|Cyber Defense|