Cyber Defense

Heard Of The Game Bad Pigs? Or Is It Bad Piggies?

SAN FRANCISCO - Some clever hacker decided to create a malicious app deceivingly similar to one of the top games in the Google Play store. And, it was downloaded more than 10,000 times before people took notice. Security company F-Secure wrote on that it had located Bad Pigs - which had the same artwork and

By |2013-06-17T00:00:00-04:00June 17th, 2013|Archive, Cyber Defense|

Obama Orders Security Officials To Create List Of Possible Cyberattack Targets

WASHINGTON DC - Senior U.S. national security officials have created a list of possible cyberattack targets on the orders of President Barack Obama, according to a secret document obtained by the Guardian dating back to last fall. The report's authors say they obtained "Presidential Policy Directive 20," an 18-page top-secret paper written in October 2012

By |2013-06-13T00:00:00-04:00June 13th, 2013|Archive, Cyber Defense|

Monroe County Activates Interactive Communications System For Severe Weather

MONROE - Monroe County has activated an interactive communication and mass notification system to be used during severe weather emergencies. Monroe County already has a well-developed outdoor warning siren system, but was looking for an alternative in less populated areas. Key criteria included reliability, redundancy, cost effectiveness, use of web-based technology, ease of use, and

By |2013-06-12T00:00:00-04:00June 12th, 2013|Archive, Cyber Defense|

Mobile Tech Association Searching For Security Advisory Committee Members

DETROIT - The Mobile Technology Association of Michigan is launching a statewide Mobile Security Advisory Committee to develop resources, events, educational, networking and business development opportunities to create national and international engagement with Michigan companies in the mobile security sector. The committee will consist of members who: * Work in the security sector of the

By |2013-06-11T00:00:00-04:00June 11th, 2013|Archive, Cyber Defense|

Washington Post Report: NSA, FBI Tapping Servers At U.S. Internet Companies

WASHINGTON DC - The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post. The program, code-named PRISM,

By |2013-06-07T00:00:00-04:00June 7th, 2013|Archive, Cyber Defense|

Clampzok.A Malware Attacks OS X

SAN FRANCISCO - Security researchers have found a proof-of-concept attack that appears to be the first true viral malware approach for compromising OS X. The malware is called "Clampzok.A" and is a cross-platform malware package that alters the binary files on an affected system so when executed, the binary will infect neighboring binary files. The

By |2013-06-06T00:00:00-04:00June 6th, 2013|Archive, Cyber Defense|

Windows 8.1 Will Natively Support Fingerprint Readers For Secure Authentication

REDMOND, WA. - One of Monday's sessions at Microsoft's TechEd conference highlighted the support that Windows 8.1 will offer for fingerprint recognition, as described by The Verge, CNET News.Com reported. Prior versions of Windows handled fingerprint readers through third-party software. But Windows 8.1 will be the first edition of Windows to natively support the technology.

By |2013-06-04T00:00:00-04:00June 4th, 2013|Archive, Cyber Defense|

Antisec Hacktivist Takes Responsibility For Conspiracy To Commit Access Fraud

SAN FRANCISCO - Jeremy Hammond was arrested in a major federal sweep last year on charges of computer hacking conspiracy, computer hacking, and conspiracy to commit access device fraud. The self-described hacktivist pled guilty to these counts in court on Tuesday, according to the Associated Press. "As part of each of these hacks, I took

By |2013-06-03T00:00:00-04:00June 3rd, 2013|Archive, Cyber Defense|

Chinese Hackers Access U.S. Weapons Systems Designs

SAN FRANCISCO - The designs for some of the most sensitive advanced U.S. weapons systems were reportedly accessed by Chinese hackers, according to a confidential report prepared by the Defense Science Board for the Pentagon. The report, a copy of which was obtained by the Washington Post, listed more than two dozen compromised weapons systems,

By |2013-05-31T00:00:00-04:00May 31st, 2013|Archive, Cyber Defense|