Cyber Defense

China Tightens The Screws On Internet Users

BEIJING, China ? China will now require all citizens to use their real names when signing up for an Internet account and force Internet providers to delete posts deemed illegal. A decision approved today by the Standing Committee of the National People's Congress institutes an "identity management policy," according to China's official Xinhua news agency,

By |2013-01-03T00:00:00-05:00January 3rd, 2013|Archive, Cyber Defense|

Four Security Trends Defined 2012, Will Impact 2013

SAN FRANCISCO - Mobile and Mac malware burbles noxiously, data breaches and data mining will cause more havoc with your privacy, and the Web will continue to suffer the ignominy of poorly-written, Swiss-cheesed code as security experts predict lessons from 2012 go unlearned in 2013. The Internet is slowly changing, and security experts say that

By |2013-01-02T00:00:00-05:00January 2nd, 2013|Archive, Cyber Defense|

Wired’s Most Dangerous: Russia’s Cyber-Security Mogul Behind Flame Downfall

SAN FRANCISCO - Two US whistleblowers, Syria's president, a Mexican drug lord ? and Evgeny Kaspersky, the founder of Kaspersky Lab., one of the biggest international malware-fighting companies ? make it into the list of Wired magazine's Most Dangerous People. �Why dangerous though? What brings together Paula Broadwell whose book cost the CIA?s director David

By |2013-01-02T00:00:00-05:00January 2nd, 2013|Archive, Cyber Defense|

Israel Launches Cyber Warfare Training Program

TEL AVIV - Israel is developing a national program that trains young people for cyber warfare to boost its ability to deal with the increasing number of online attacks. According to The Jerusalem Post's report Wednesday, the program named "Magshimim Le'umit" has been in development for the past three years and targets outstanding pupils aged

By |2013-01-02T00:00:00-05:00January 2nd, 2013|Archive, Cyber Defense|

Suspected Security Hole Found In Many Samsung Devices

SAN FRANCISCO - A suspected security hole affecting a handful of Samsung smartphones could give apps access to user data and leave the handset vulnerable to malicious apps and bricking, according to a developer. The vulnerability, which was discovered and detailed by an XDA member with the handle "alephzain," lies in Exynos 4, the ARM-based

By |2012-12-20T00:00:00-05:00December 20th, 2012|Archive, Cyber Defense|

China Reinforces Its Great Firewall To Prevent Encryption

BEIJING - China has begun reinforcing its infamous firewall with new tech designed to prevent encrypted communication. To prevent the more enterprising citizens of China from exploiting holes in the country's firewall through the use of virtual private networks and circumventors, the Chinese government is using new technology to block encryption, according to The Guardian.

By |2012-12-20T00:00:00-05:00December 20th, 2012|Archive, Cyber Defense|

Facebook Helps FBI Take Down $850M Botnet Crime Ring

WASHINGTON DC - FBI credits the social-networking giant with helping take down the suspects behind one of the largest cybercrime hauls in history. Facebook helped the FBI take down an international crime ring that used a botnet to infect 11 million computers and steal more than $850 million, one of the largest cybercrime hauls in

By |2012-12-13T00:00:00-05:00December 13th, 2012|Archive, Cyber Defense|

New Trojan Attempts SMS Fraud On OS X Users

SAN FRANCISCO - The threat is minimal, but perhaps costly for those who fall for it. The Russian security firm Dr. Web has uncovered another malware attempt on OS X systems that tries to exploit users with SMS fraud. The new malware is a Trojan horse, dubbed "Trojan.SMSSend.3666," and is part of a family of

By |2012-12-13T00:00:00-05:00December 13th, 2012|Archive, Cyber Defense|

Kors Engineering Installs Control System That Meet Homeland Security Specs

WATERFORD - Kors Engineering announced the installation of an access control system at Marwood Metal Fabrication which meets Homeland Security requirements. Marwood Metal Fabrication, an automotive stamping and assembly company based in Canada, was seeking a solution that would secure each of its facilities with access control that would meet the U.S. Homeland Securities? Customs-Trade

By |2012-12-07T00:00:00-05:00December 7th, 2012|Archive, Cyber Defense|

Michigan Ranks Third In Nation For High-Tech Job Growth From 2010-2011

LANSING - A new study released Thursday by Engine Advocacy shows that Michigan ranked third in the nation for high-tech job growth from 2010-2011. The report also shows Lansing ranking as the sixth top metropolitan area in the U.S. for high-tech job growth over the same period, and Warren/Troy/Farmington ranked thirteenth. ?This news really captures

By |2012-12-06T00:00:00-05:00December 6th, 2012|Archive, Cyber Defense|