Cyber Defense

State Technology Leaders Focus On Procurement, Cybersecurity And Agile

BALTIMORE - The National Association of State Chief Information Officers held their Midyear Conference in Baltimore this past week. There were plenty of hot topics on the agenda, including: enabling innovation through agile software development, the continuing need for procurement reform and a big push on cybersecurity. From the opening keynote highlighting what it takes

By |2016-05-13T12:16:14-04:00May 13th, 2016|Cyber Defense|

FCC, FTC Ask Mobile Phone Makers, Wireless Carriers Why Security Fixes Take So Long

WASHINGTON DC - US regulators want to know how mobile phone makers and wireless carriers handle security vulnerabilities and why fixes seem to take so long. The Federal Communications Commission and the Federal Trade Commission on Monday sent letters to fourteen companies, asking for details about how they release security updates. The FCC sent letters

By |2016-05-12T21:35:57-04:00May 12th, 2016|Cyber Defense, Mobile MI, Politics|

Twitter Stops US Law Enforcement, Intelligence Services From Analyzing Tweets

WASHINGTON DC - Microblogging platform Twitter has stopped US law enforcement and intelligence services from using a data analytics service that can process and analyze the platform's tweets and messages. On Sunday, a senior US official and other people close to the matter told the Wall Street Journal that Twitter's move, while not made public,

By |2016-05-12T21:45:32-04:00May 12th, 2016|Cyber Defense|

M2 TechCast: ESD Job Fair, Online Tech Disaster Recovery As A Service

FERNDALE - In this segment of M2 TechCast that aired on May 2, Engineering Society of Detroit’s Robert McGee who talks about the latest ESD Job Fair, where thousands of jobs in Science Technology Engineering and Math are available. Also on the show was Online Tech CEO Yan Ness who provides details on Disaster Recovery

By |2016-05-10T14:00:29-04:00May 10th, 2016|Cyber Defense, M2 TechCast, Podcasts|

Duo Security Report: 25 Percent Of Internet Explorer Browsers Open To Hackers

ANN ARBOR - A new report from Duo Security set to be released May 10 will show that 25 percent of all Windows devices are running outdated versions of Internet Explorer, open to 700 known vulnerabilities for hackers. What’s more, the report shows 60 percent of Flash users are running out-of-date versions, while 72 percent have

By |2016-05-05T17:41:52-04:00May 5th, 2016|Cyber Defense|

Hacking Into homes: ‘Smart Home’ Security Flaws Found In Popular System

ANN ARBOR - Cybersecurity researchers at the University of Michigan were able to hack into the leading "smart home" automation system and essentially get the PIN code to a home's front door. Their "lock-pick malware app" was one of four attacks that the cybersecurity researchers leveled at an experimental set-up of Samsung's SmartThings, a top-selling

By |2016-05-02T12:52:42-04:00May 2nd, 2016|Cyber Defense, News|

Motor City ISSA Networking, Recruiting Meeting May 19

NORTHVILLE - Motor City ISSA is hosting its second networking and recruiting event May 19 with special guest CBI to speak about its academy and internship programs. Potential candidates will get a chance to meet CBI officials. The meeting is open to Security minded professionals, Students and those considering a career in Security. It will

By |2016-05-01T18:11:24-04:00May 1st, 2016|Cyber Defense|

Cyber Security: Curiosity Can Kill More Than The Cat

LANSING - Most adults know that washing your hands reduces the risk of spreading germs, and cleaning and bandaging a wound prevents infection. But do you know what can happen when you pick up electronic germs? In 2015, two separate groups of researchers ran experiments to test people’s curiosity and their knowledge of cyber security.

By |2016-04-29T16:01:38-04:00April 29th, 2016|Cyber Defense, Small Business Association of Michigan|

Houses Unanimously Approves Email Privacy Act – Senate Expected To Do Same

WASHINGTON DC - Who says Congress can’t work together? Well   certainly so when it comes to email privacy. On Wednesday the House of Representatives voted 419-0 to approve the Email Privacy Act, an update to a 30-year old law privacy advocates say is long overdue. The bill essentially fills a loophole in the 1986

By |2016-04-28T19:21:38-04:00April 28th, 2016|Cyber Defense, Featured, Politics|

Secret Code For Smart Devices To Keep Black Hats Out Of Internet Of Things

SAN FRANCISCO - Everyone knows that all these smart devices plugging into today’s homes - part of the exploding Internet of Things - also provide black hats with a golden opportunity to hack computer networks. On Wednesday, Samsung and Thales e-Security announced a new system for smart devices that manufacturers can plug into a refrigerator

By |2016-04-28T18:43:20-04:00April 28th, 2016|Cyber Defense|