Cyber Defense

Flaws In Chip Design Could Make Computers, Smartphones Vulnerable To Hackers

SAN FRANCISCO - A newly discovered exploit in most modern processors could make your computer or smartphone vulnerable to attacks. The problem impacts processors going back more than two decades and could let hackers access passwords, encryption keys or sensitive information open in applications.  The flaws, known by the names Spectre and Meltdown, aren't unique to one particular

By |2018-01-04T19:49:30-05:00January 4th, 2018|Cyber Defense|

Cybersecurity In Self-Driving Cars: U-M Releases Threat Identification Tool

ANN ARBOR - Instead of taking you home from work, your self-driving car delivers you to a desolate road, where it pulls off on the shoulder and stops. You call your vehicle to pick you up from a store and instead you get a text message: Send $100 worth of Bitcoin to this account and

By |2018-01-04T14:30:36-05:00January 4th, 2018|Autonomous Vehicles, Cyber Defense, Featured, IoT|

The Dark Side Of The Internet Of Things – Most Devices Are Easy To Hack

LAS VEGAS - While gadget makers see IoT devices powering our future, security experts view the potential pitfalls from all those connected gadgets as more of a sleeping giant. And watch out when it wakes up. It's the dark side of connected devices that nobody wants to talk about during a week when the consumer

By |2018-01-03T19:22:03-05:00January 3rd, 2018|Cyber Defense, IoT|

No More Ransom Database Helps Those Compromised By Ransomware

AMSTERDAM, Netherlands - No More Ransom is a joint effort by Europol, the Dutch police, Kaspersky and McAfee to help people who've been compromised by ransomware get their data back without paying off criminals. It's "a repository of keys and applications that can decrypt data locked by different types of ransomware." There's still ransomware out

By |2017-12-28T19:39:17-05:00December 28th, 2017|Cyber Defense|

Unhackable Computer Under Development With $3.6 Million DARPA Grant

ANN ARBOR - By turning computer circuits into unsolvable puzzles, a University of Michigan team aims to create an unhackable computer with a new $3.6 million grant from the Defense Advanced Research Projects Agency. Todd Austin, U-M professor of computer science and engineering, leads the project, called MORPHEUS. Its cybersecurity approach is dramatically different from

By |2017-12-19T19:26:35-05:00December 19th, 2017|Cyber Defense, Featured|

Cyber Pearl Harbor Versus The Real Pearl Harbor

BIRMINGHAM - December 7, is a good day to re-think the implications of a “cyber Pearl Harbor.”  Leon Panetta, famously used the term in 2011, when it seemed like all of our generals had become cyber experts overnight. "The potential for the next Pearl Harbor could very well be a cyber-attack," the CIA Director testified before the

By |2017-12-14T20:15:34-05:00December 14th, 2017|Cyber Defense, Guest Columns|

99 Percent Of All Office Workers Admit To Taking Actions That Threaten Company’s Cybersecurity

MOUNTAIN VIEW, Ca. - Virtually all office workers — 99 percent — admit to making at least one action that could threaten a company's cybersecurity, a new report from Intermedia found. Out of more than 1,000 office workers interviewed, nearly all said they did at least one potentially dangerous activity, such as sharing or autosaving passwords or

By |2017-12-14T18:35:28-05:00December 14th, 2017|Cyber Defense|

Get Ready For More Hacks In 2018

SAN FRANCISCO - After the year we've had, do you need any more convincing that your personal information is constantly being exposed to hackers? It wasn't just the Equifax hack, which leaked 145.5 million Social Security numbers, or the WannaCry ransomware attackthat locked up our computers and demanded a ransom paid in bitcoins. Even the security software

By |2017-12-07T21:36:18-05:00December 7th, 2017|Cyber Defense|

Stiennon Leaves Blancco To Resume Private Cybersecurity Practice

ROYAL OAK - Cybersecurity pro Richard Stiennon rejoined M2 TechCast after leaving Blancco Technology Group in November where he served as Chief Strategy Officer. Stiennon will appear monthly to update listeners on the latest cybersecurity threats. Stiennon, who lives in Birmingham, Michigan, also will resume his former activities which includes providing video interviews with top

By |2017-12-04T08:42:27-05:00December 4th, 2017|Cyber Defense, M2 TechCast, Podcasts|