Cyber Defense

NSA Makes Advanced Hacking Tool Open Source – Really

The National Security Agency develops advanced hacking tools in-house for both offense and defense—which you could probably guess even if some notable examples hadn't leaked in recent years. But on Tuesday at the RSA security conference in San Francisco, the agency demonstrated Ghidra, a refined internal tool that it has chosen to open source. And while NSA cybersecurity adviser

By |2019-03-13T14:54:13-04:00March 13th, 2019|Cyber Defense|

Comcast Acquires Artificial Intelligence Company For Network Security

PHILADELPHIA - Comcast has acquired cybersecurity firm BluVector for an undisclosed amount. BluVector has developed an AI/machine learning-enabled cybersecurity detection, visibility, and containment system for network security applications. With the deal, CMCSA is not only acquiring security technology for its internal operations but also intends to support BluVector's continuing business offerings. Target Company Arlington, Virginia-based BluVector was

By |2019-03-10T14:51:04-04:00March 10th, 2019|Cyber Defense|

Facebook Two-Factor Authentication Has Two-Factored Problem

MOUNTAIN VIEW, Ca. - On Facebook two-factor authentication with phone numbers has a two-factored problem. First: The phone number you give to Facebook to help keep your account safe from potential hackers isn't just being used for security. A tweet thread from Jeremy Burge, founder of Emojipedia, on Friday showed that people can find your profile from

By |2019-03-08T19:42:57-05:00March 8th, 2019|Cyber Defense|

Cybersecurity Expert Lohrmann – Not Enough Companies, Governments Take Cybersecurity Seriously

ROYAL OAK - Believe it or not, a lot of businesses and government entities are not taking cybersecurity seriously enough, says cybersecurity expert Dan Lohrmann of Security Mentor. While not a majority, these nay sayers are a large minority of the total business and government universe. What do these attitudes mean for your business and

By |2019-02-28T16:39:19-05:00February 28th, 2019|Cyber Defense, M2 TechCast, Podcasts|

Former State Chief Information Security Officer Joins Plante Moran Cybersecurity Practice

ROYAL OAK – Rajiv Das, formerly the chief information security officer for the State of Michigan, in January joined accounting and consulting firm Plante Moran’s cybersecurity practice. He joins M2 Techcast to talk about what he will bring to the private sector from the public sector. Rajiv Das To listen, click on https://soundcloud.com/mike-brennan-841872555/e159-rajiv-das-plante-moran You can

By |2019-02-27T15:20:19-05:00February 25th, 2019|Cyber Defense, M2 TechCast, Podcasts|

About 17,000 Android Apps Collect Personal Info Without Your Consent

SAN FRANCISCO - Roughly 17,000 Android apps collect identifying information that creates a permanent record of the activity on your device, according to research from the International Computer Science Institute that was shared with CNET. The data collection appears to violate the search giant's policy on collecting data that can be used to target users for advertising in most cases, the researchers said.

By |2019-02-15T16:03:09-05:00February 15th, 2019|Android, Cyber Defense|

Cybersecurity Expert Stiennon’s Latest Book: Secure Cloud Transformation

BIRMINGHAM - IT-Harvest Press, an imprint of analyst firm IT-Harvest, is launching Secure Cloud Transformation: The CIO's Journey at the 2019 RSA Conference in San Francisco, March 4th. The book, written by industry analyst Richard Stiennon, documents the cloud transformation journey of 16 digital pioneers at some of the largest organizations in the world. "When an enterprise embarks on their cloud

By |2019-02-15T13:37:02-05:00February 15th, 2019|Cyber Defense|

Project Raven – US Mercenaries Working For UAE To Hack Enemies – Stiennon Tells All

ROYAL OAK - Cybersecurity experts Richard Stiennon takes a deep dive into Project Raven - a team of American mercenaries hired by the United Arab Emirates to hack its enemies. The story is non-fiction, but sounds like a fictionalized cyber spy novel.  He also updates other scary cyber threats like the Apple Facetime bug that

By |2019-02-09T18:07:15-05:00February 9th, 2019|Cyber Defense, M2 TechCast, Podcast - Diva Tech Talk, Podcasts|

WMU To Offer Online IT Security Certification Program

KALAMAZOO —Western Michigan University plans to launch an online program designed to improve the ability of I.T. professionals to protect against and mitigate hacks and data breaches. The eight-week, online certification program from WMU’s Haworth College of Business and College of Engineering and Applied Sciences starts in March and consists of four courses in high-demand cybersecurity specialties. WMU

By |2019-01-28T08:09:07-05:00January 28th, 2019|Cyber Defense, IoT|