Cyber Defense

Apple Publishes New Guidelines Regarding How Law Enforcement Can Request Data

CUPERTINO, Ca. - Apple has published a new set of guidelines regarding how law enforcement agencies and other government entities may request information from the company about user data. The new rules, which were posted to Apple's website late Wednesday, reflect Apple's move toward notifying its customers when it receives law enforcement requests for user

By |2014-05-08T00:00:00-04:00May 8th, 2014|Archive, Cyber Defense|

Former NSA Chief Defends Government Spying On US Citizens

WASHINGTON DC - It didn't take long for Gen. Keith Alexander, the recently retired director of the National Security Agency, to speak out about the government intelligence agency. The four-star general, who retired last month, touched on a wide range of subjects in an interview published Thursday by the Australian Financial Review, including the NSA's

By |2014-05-08T00:00:00-04:00May 8th, 2014|Archive, Cyber Defense|

aimWest Panel To Explore IT Security, Privacy May 21

GRAND RAPIDS - Technology is something that every business today depends upon in one way or another. Attend the May aimWest event as the group discusses the latest trends in IT Security and Privacy, what the greatest risks are, and how you can defend yourself, your family, and your business. The Panel includes: Stuart Berman,

By |2014-05-07T00:00:00-04:00May 7th, 2014|Archive, Cyber Defense|

DHS Releases Solicitation For Small Business Innovation Research Program

WASHINGTON DC - The Department of Homeland Security has issued its solicitation for the 14.2 Small Business Innovation Research Program addressing the needs of seven DHS operational units. DHS's Science and Technology Directorate and the Domestic Nuclear Detection Office participate in the SBIR Program as well. This solicitation covers the S&T Directorate's SBIR Program only.

By |2014-05-06T00:00:00-04:00May 6th, 2014|Archive, Cyber Defense|

Capture The Flag At MCRCon Cybersecurity Conference

ANN ARBOR- MCRCon Cybersecurity Conference, hosted by Merit Network, is challenging IT pros and computer enthusiasts to a Capture the Flag competition on May 20 at the Michigan Cyber Range. The competition will test the speed and skill of competitors within this virtual Internet environment. Participants will search for clues and collect flags to win

By |2014-05-05T00:00:00-04:00May 5th, 2014|Archive, Cyber Defense|

IT Security, Privacy Focus Of aimWest May 21

GRAND RAPIDS - Technology is something that every business today depends upon in one way or another. The Internet has opened up a new era of connectivity and communication for both our professional and personal lives. These great benefits & advancements, however, have also come with new risks & privacy concerns that are greater than

By |2014-04-30T00:00:00-04:00April 30th, 2014|Archive, Cyber Defense|

Malware At Google Play Store Mines For Bitcoins

SAN FRANCISCO - Researchers have identified more malware at the Google Play store that secretly harnesses users' devices to perform the arduous computational process of mining for bitcoins. The malware, dubbed BadLepricon, was found masquerading as wallpaper apps that had hundreds of installs each, according to Lookout, a mobile security firm. Google promptly removed five

By |2014-04-28T00:00:00-04:00April 28th, 2014|Archive, Cyber Defense|