Cyber Defense

U.S. Senators Push Encryption Bill Opponents Say Pits National Security V Cybersecurity

WASHINGTON DC - U.S. Sens. Diane Feinstein and Richard Burr are pushing an encryption bill, opponents say, furthers a fight that pits national security against cybersecurity. Feinstein and Burr’s bill gives law enforcement and government investigators access to encrypted devices and communications. Opponents like Chris Doggett, senior vice president of cybersecurity company Carbonite, argue the

By |2016-04-14T19:14:25-04:00April 14th, 2016|Cyber Defense|

Israeli Company Offers Detroit Chip-Technology To Prevent Car Hacking

TEL AVIV, Israel - Karamba wants to keep hackers from crashing your new connected car. The Israeli company hopes to sell Detroit automakers a tool that installs anti-hacking technology into chip-bearing auto parts before they hit the assembly line. And now the company has the money to expand production.  On Thursday, YL Ventures announced it

By |2016-04-08T16:08:39-04:00April 7th, 2016|Autonomous Vehicles, Cyber Defense, Featured|

FBI Director Acknowledges Agency Used Private Party to Hack Terrorist’s iPhone

WASHINGTON DC - FBI director James Comey acknowledged Thursday that the agency bought an unspecified tool from an outside private party after Apple refused to create new software to allow access to a terrorist’s iPhone 5C, CNN money reported. Apple had argued that a special-purpose version of iOS would not only offer access to the

By |2016-04-07T19:18:43-04:00April 7th, 2016|Cyber Defense|

Internet Advisor: Snowden Disclosures Mean Europeans Don’t Trust U.S. Cyber Security Practices

DETROIT - On the Internet Advisor, Steven Fox, a Senior Cyber Security Officer, US Dept. of Treasury outlined changes that have occurred in exchanging security information with Europe since the Edward Snowden revelations. Safe Harbor originally allowed very liberal boundaries for exchanging data but the new regulations under Privacy Shield provide for very serious penalties for

By |2016-03-30T14:40:47-04:00March 30th, 2016|Cyber Defense, Internet Advisor, Podcasts|

FBI Cracks Apple iPhone Used In Terrorist Attack With Help Of “Third Party” – Suspected To Be Israeli Company

WASHINGTON DC - In a court filing Monday, the US Department of Justice, with the help of a third party suspected to be an Israeli company, hacked the iPhone used by a terrorist in a December attack in California. Now the feds say they no longer need Apple’s help. The move Monday ends the legal

By |2016-03-28T21:24:56-04:00March 28th, 2016|Cyber Defense, Featured|

Report: Israeli Cybersecurity Company Helps FBI Hack Apple iPhone

WASHINGTON DC - Cellebrite, a privately held Israeli company that specializes in transferring or extracting data from phones, is helping the FBI unlock the iPhone, according to a report in the Yedioth Ahronoth newspaper on Wednesday. If its method is successful, the FBI will no longer need Apple's help with the iPhone, unnamed industry sources

By |2016-03-25T11:55:12-04:00March 25th, 2016|Cyber Defense|

FBI Issues Advisory That Connected Cars Increasingly Vulnerable To Cyberattack

WASHINGTON DC - If you're not already worried about your car being hacked, you really should be, the US government says. Connected cars are becoming "increasingly vulnerable" to cyberattack, according to an advisory issued Thursday by the FBI and the US National Highway Traffic Safety Administration. They are just two of the latest organizations to voice

By |2016-03-25T10:08:47-04:00March 25th, 2016|Autonomous Vehicles, Cyber Defense|

Internet Advisor: Remove Malware Free

DETROIT - What in the world is going on?  Is Microsoft really forcing Windows 7 users to switch to Windows 10?  We let our listeners call in to tell us about their experiences and got some confirmations.  We also received information from one of our listeners on how to avoid the forced upgrade completely.  Shane Hamelin

By |2016-03-23T16:15:03-04:00March 23rd, 2016|Cyber Defense, Internet Advisor, Podcasts|

Richard Stiennon RSA Video Updates Information Technology Security Landscape

SAN FRANCISCO - Richard Stiennon, Chief Research Analyst, IT-Harvest, gave this talk at the RSA Conference. He called it  Myth Busting the Security Landscape and Development Cycle. Stiennon's point is myths abound in the security landscape, from what a vendor or product does to how to build security into software in the first place. While it

By |2016-03-22T16:12:36-04:00March 22nd, 2016|Cyber Defense|

Merit Network To Celebrate Golden Anniversary In May With Special Celebration

ANN ARBOR - Merit Network is celebrating its 50th anniversary throughout 2016. To mark the milestone, Merit has launched a dynamic new web site and will host a special celebration during its annual Merit Member Conference in May. Established in 1966, Merit has been at the forefront of networking technology throughout its history. Merit's engineers

By |2016-03-22T15:42:38-04:00March 22nd, 2016|Cyber Defense, Featured|