Cyber Defense

Google Offers $200,000 Bounty To Anyone Who Can Hack Nexus 6P, 5X Phones

MOUNTAIN VIEW, Ca. - Google has launched its Project Zero Security Contest that will award the winner $200,000 if they can hack a Nexus 6P and 5X knowing only the devices’ phone number and email address. For the exploit to occur, a user can open an email in Gmail or an SMS text in Messenger.

By |2016-09-15T16:34:29-04:00September 15th, 2016|Cyber Defense, Featured|

Report: Half Of Devices In Healthcare Sector Susceptible To Malware, Ransomeware

ANN ARBOR - In a study of 250,000 mobile devices, PCs and Macs used in the healthcare sector are running out of date versions of Flash, which are susceptible to vulnerabilities and malware like the Cerber or Locky ransomware strains. Attackers target doctors’ and other healthcare workers’ out-of-date devices to install malware that encrypts patient

By |2016-09-15T14:38:15-04:00September 15th, 2016|Cyber Defense, Life Sciences|

CloudTech1 Sept. 21 Free Lunch And Learn: Network Security

ROCHESTER HILLS – Join CloudTech1 University at its Education Center on September 21st at 11am to enjoy some food, to have some fun and learn about Network Security, a strategy no business can afford to ignore. CloudTech1 University has become an ideal place to learn cloud basics and ask questions about the security of your

By |2016-09-09T17:14:53-04:00September 9th, 2016|Cyber Defense, News|

iPhone 7 – Does It Protect User Privacy?

CUPERTINO, Ca. - What more can Apple say to convince customers it's protecting their personal information? As of Wednesday, it seems the company ran short of new ways to reassure us. Apple CEO Tim Cook announced the iPhone 7 this week, but never listed its privacy features. In a video before the main presentation, late-night

By |2016-09-08T21:29:38-04:00September 8th, 2016|Cyber Defense, New Products / Contracts|

Apple Issues Urgent Security Update For OS X and Safari

CUPERTINO, Ca. - Apple issued an urgent security update on Thursday for OS X and Safari after finding the same vulnerabilities in its desktop operating system that were discovered last week in its mobile operating system and that allow attackers to remotely take control of a device. The patch for OS X 10.11.6 "El Capitan"

By |2016-09-08T21:20:31-04:00September 8th, 2016|Cyber Defense|

Internet Advisor: Duo Security Helps Companies Prepare For Phishing Attacks

DETROIT - Jordan Wright, is an R&D Engineer at Duo Security, who recently developed a phishing assessment tool that helps companies evaluate how vulnerable they are to phishing attacks. The results of their study were shocking: 31 percent of employees clicked the link in the phishing campaign that went into their email. 17 percent clicked the link

By |2016-09-07T15:46:28-04:00September 7th, 2016|Cyber Defense, Internet Advisor, Podcasts|

Details Released On North American International Cyber Summit 2016

DETROIT - Details on the North American International Cyber Summit 2016 were released Thursday. What’s new is the High School Cyber Challenge. Also on tap is the Annual International Invitation Cyber Competition. As in previous year’s the Summit, scheduled for Oct. 17, will bring together experts from across the globe to address a variety of

By |2016-09-01T19:16:59-04:00September 1st, 2016|Cyber Defense, Featured|

Cyber-Security Certificate Courses Launching at Macomb-OU INCubator

AUBURN HILLS - The Macomb-Oakland University Incubator is launching the first cyber-security certificate courses at its Velocity Hub of the Michigan Cyber range powered by Merit Network, the nation’s largest unclassified training cyber range. These certifications provide the proper tools students and IT professionals need in order to stand out and excel in the cyber-security

By |2016-08-30T20:07:33-04:00August 30th, 2016|Cyber Defense|

Trident Spyware Invades Apple iPhones Unless You Update Immediately

CUPERTINO - If you have an iPhone be afraid, be very afraid. A terrifying new spyware, dubbed Trident, can break through the security protection to read texts and email, record calls (including WhatsApp and Viber calls), track your location and turn on your phone's camera and microphone. Trident exploits three zero-day vulnerabilities in iOS 9 to form

By |2016-08-26T09:48:31-04:00August 26th, 2016|Cyber Defense, News|

Getting Middle And High School Students Inspired By STEM Topic Of ISACA Detroit Meeting

TROY - Inspiring middle and high school student to study STEM (Science Technology Engineering and Math) will be the pre-dinner topic for the Sept. 21 ISACA Detroit chapter meeting. Also on the agenda is a talk by Tamara and Daniel Shoemaker from the University of Detroit-Mercy.  Deadline to register is Sept. 16. The after dinner

By |2016-08-26T07:40:36-04:00August 26th, 2016|Cyber Defense|