Cyber Defense

MobileConfig Files Used To Hack Apple’s Mobile Devices

SAN FRANCISCO - iOS profiles, aka mobileconfig files, are used by mobile carriers to configure key settings for e-mail, Wi-Fi, and other features. But these files could be abused by attackers to sneak past Apple's normally tight security and and hijack a mobile device, researchers at Skycure Security contend. The process would be similar to

By |2013-03-12T00:00:00-04:00March 12th, 2013|Archive, Cyber Defense|

Massive Cyberattacks Hit Tech Companies, Automakers, U.S. Government

SAN FRANCISCO - More details have been revealed about the massive cyberattack that hit several tech companies last month. Not only were Apple, Facebook, Microsoft, and Twitter hit -- but other industries' computer systems were also hacked, including prominent car manufacturers, U.S. government agencies, and a candy company. According to The Security Ledger, people familiar

By |2013-03-12T00:00:00-04:00March 12th, 2013|Archive, Cyber Defense|

Russia Preparing For Cyber War

MOSCOW - Cyberspace is rapidly becoming, if not a battlefield in the direct sense of the word, then a central arena for future wars. In this context, the decision by the Russian Ministry of Defense to create a specialized network command is justified and timely. According to media reports, Russia?s Defense Minister Sergei Shoigu recently

By |2013-03-06T00:00:00-05:00March 6th, 2013|Archive, Cyber Defense|

ImageSoft Selected By Michigan State Court For eFiling Initiative

SOUTHFIELD - The State Court Administrative Office has selected ImageSoft TrueFiling platform as the Electronic Filing Manager for a statewide eFiling initiative in Michigan. The decision means that a central Electronic Filing Manager platform will soon be available to all courts throughout the State, including District, Circuit, Probate, Court of Appeals and the Supreme Court.

By |2013-03-05T00:00:00-05:00March 5th, 2013|Archive, Cyber Defense|

Lansing ISSA Presents: The 4th Annual Netwars Challenge March 16

LANSING - Benefit from the expertise of the GE-CERT team as they provide a fun and meaningful scenario focusing on incident response. The scenario, exercises, instructional assistance, and summary will be provided by two highly seasoned and time tested IT security experts from GE-CERT. The venue this year is the amazing Technical Training Center at

By |2013-03-05T00:00:00-05:00March 5th, 2013|Archive, Cyber Defense|

New Cyber Attack Targeting European Governments Through Adobe Reader

SAN FRANCISCO - A new attack is targeting European governments through flaws exploited in Adobe's Reader software, according to security researchers. Kaspersky Lab and CrySys Lab today detailed a new malicious program in the wild, called "MiniDuke," that has been attacking government entities and institutions across Europe. Government entities in the Ukraine, Portugal, Romania, and

By |2013-02-28T00:00:00-05:00February 28th, 2013|Archive, Cyber Defense|

Troop Health Initiatives Gets Contract For Disaster Relief Telehealth System

BAY CITY - Troop Health Initiatives has received a contract from the Office of Emergency Management of the Department of Veterans Affairs in Ann Arbor for the JEMS Technology Disaster Relief Telehealth System. The JEMS systems will be used by the VA as a disaster relief telehealth unit, connecting medical professionals and first responders in

By |2013-02-27T00:00:00-05:00February 27th, 2013|Archive, Cyber Defense|

Center For Computer Resources Successfully Completes SOC 2 Examination

TROY - Center for Computer Resources announced Wednesday said that it has successfully completed a secondary SOC reporting examination in regards to its security and availability. The examination, which was performed by Godfrey Hammell, Danneels & Company, P.C., a nationally recognized, independent auditing firm located in St. Clair Shores, Michigan, involves testing the design and

By |2013-02-27T00:00:00-05:00February 27th, 2013|Archive, Cyber Defense|

Google: Not Just China Hacking U.S., It’s Hackers Everywhere

SAN FRANCISCO - The New York Times' report Monday of state-sponsored hacking in China drew new attention to the sophisticated techniques that would-be infiltrators use to gain access to victims' accounts. But it's not just China, Google said - the techniques used against U.S. government agencies and corporations are being used increasingly by hackers around

By |2013-02-21T00:00:00-05:00February 21st, 2013|Archive, Cyber Defense|