Cyber Defense

Yahoo Tells Users They Were Hit With Cookie Attack

SAN FRANCISCO - Yahoo users found out Wednesday that hackers used a technical trick with cookies to log into their accounts without passwords. "Based on the ongoing investigation, we believe a forged cookie may have been used in 2015 or 2016 to access your account," Yahoo users were told in an email. Yahoo revealed the

By |2017-02-17T08:20:06-05:00February 17th, 2017|Cyber Defense|

Hack My Car? Most Believe It Can Happen

ANN ARBOR - Most Americans have some concerns that self-driving cars can be hacked to cause crashes, disable the vehicle in some way or even be used as weapons by terrorists, according to researchers at the University of Michigan. Large percentages of people are at least slightly concerned that these kinds of vehicles can be

By |2017-02-13T13:20:23-05:00February 13th, 2017|Autonomous Vehicles, Cyber Defense|

ISACA Chapter Meeting Features Security Leadership, Securing Connected Vehicles

TROY - Registration closes today for the Feb. 15 ISACA Chapter Meeting that features discussions on preparing your leadership, and security the connected vehicle. The meeting will be held at the Michigan State University Management Education Center in Troy, starting at 4:30 pm. Pre Dinner Topic: Preparing Your Leadership Pre Dinner Speakers:   Matt Kipp CISA,

By |2017-02-10T07:31:40-05:00February 10th, 2017|Cyber Defense|

Secrecy Surrounds White House Cybersecurity Staff Shakeup

WASHINGTON DC - The chief information security officer for the White House's Executive Office of the President has been removed from his position, sources have confirmed. Cory Louie was appointed to the position by former President Obama in 2015, charged with keeping safe the staff closest to the president -- including the president himself --

By |2017-02-10T06:45:07-05:00February 10th, 2017|Cyber Defense|

U.S. Visitors May Be Asked To Give Up Social Media Passwords To Border Agents

WASHINGTON DC - Visitors to the US might be asked to relinquish their social media passwords to border agents as part of an attempt to tighten security checks. "We want to get on their social media, with passwords: What do you do, what do you say?" Homeland Security Secretary John Kelly told the House Homeland

By |2017-02-09T18:23:51-05:00February 9th, 2017|Cyber Defense|

Caston Thomas Explains New Ransomeware Threat

DETROIT - Caston Thomas, CEO of InterWorks, is a noted cybersecurity expert from the Ann Arbor area who has been called the Chuck Norris of Securing and Managing Mobile and Networks.  There are new forms of ransomeware that now lock out your entire operating system unless you pay up. Caston also explained the new wireless

By |2017-02-08T11:10:23-05:00February 8th, 2017|Cyber Defense, Internet Advisor, Podcasts|

State Reports Software Snafu Exposes Personal Info On 1.87 Million Michigan Workers

LANSING - Upwards of 1.87 million Social Security numbers, names and wage information for active employees in Michigan could have been accessed by unauthorized users after a software update done in October exposed these confidential records, state officials announced late Friday. What this means is the vulnerability could impact two-fifths of the state’s workforce since

By |2017-02-03T19:57:24-05:00February 3rd, 2017|Cyber Defense, Featured|

Cybersecurity Expert Lohrmann: What Will Be Trump’s Cybersecurity Strategy?

ROYAL OAK - What will be President Trump’s cybersecurity strategy? Cybersecurity expert Dan Lohrmann with Security Mentor offers his thoughts in this M2 TechCast podcast. Even though Lohrmann notes the new cybersecurity strategist Rudy Giuliani has very limited cybersecurity background, he is encouraged that Giuliani will manage the nation’s cybersecurity strategy well. Lohrmann likes the

By |2017-02-01T14:13:17-05:00February 1st, 2017|Cyber Defense, M2 TechCast, Podcasts|

Cybersecurity Requirements Looming For Michigan Manufacturers – Defense Department Requirements Take Effect This Year

PLYMOUTH - Cybersecurity guidelines required by the Department of Defense are likely to have an enormous impact on the 800 Michigan manufacturers that received a DoD contract in 2016. By December 31, 2017, all DoD contractors (including small businesses) must meet minimum cybersecurity requirements or risk losing DoD business. Alarmingly, most manufacturers aren’t even aware

By |2017-01-27T14:44:35-05:00January 27th, 2017|Cyber Defense|

5 Tips For Secure Passwords That Are Easy To Remember…And A Little Extra Advice

ROCHESTER HILLS - Just about every business these days is getting hacked. For example, at the beginning of June, the Twitter and Pinterest accounts of Facebook CEO Mark Zuckerberg were breached because he used a common password: “dadada”. Zuckerberg was lucky, however, since the hack was conducted by a company testing his security. Zuckerberg is not alone.

By |2017-01-26T20:37:23-05:00January 26th, 2017|Cyber Defense, Guest Columns|