Cyber Defense

Apple Publishes List Of iOS 8 Security Upgrades

CUPERTINO - Apple published a long list of iOS 8 security changes on Wednesday as the operating system update got delivered to users. While Apple credited many independent security experts, it continued to not differentiate bugs by severity and buried the fix to a major vulnerability. The most notable fix of the Apple Knowledge Base

By |2014-09-18T00:00:00-04:00September 18th, 2014|Archive, Cyber Defense|

Some UIA Debit Cards Possibly Breached, LARA Says

LANSING - Customers who used Unemployment Insurance Agency debit cards at Home Depot between April 2014 and August 2014 could potentially be impacted by the store's recent announcement that its payment data systems were breached, the Department of Licensing and Regulatory Affairs said Tuesday. Some unemployment insurance claimants receive their benefits via debit cards issued

By |2014-09-17T00:00:00-04:00September 17th, 2014|Archive, Cyber Defense|

Same Malware Used To Hack Target Compromised Home Depot

SAN FRANCISCO - The same malware that hacked the accounts of Target customers late last year may have compromised credit card information at Home Depot. In his Krebs on Security blog published late Sunday, security researcher Brian Krebs cited "sources close to the investigation" who told him that two different variants of the same malicious

By |2014-09-11T00:00:00-04:00September 11th, 2014|Archive, Cyber Defense|

Data-Leakage Problems Found In Instagram, Vine, Nimbuzz, OoVoo, Voxer

SAN FRANCISCO - By sniffing out the details of network communications, University of New Haven researchers have uncovered a host of data-leakage problems in Instagram, Vine, Nimbuzz, OoVoo, Voxer and several other Android apps. The problems include storing images and videos in unencrypted form on Web sites, storing chat logs in plaintext on the device,

By |2014-09-11T00:00:00-04:00September 11th, 2014|Archive, Cyber Defense|

Home Depot Probes Possible Customer Data Theft

ATLANTA - Home Depot said Tuesday it is investigating "unusual activity" related to customer data but stopped short of confirming it had fallen victim to a major credit card breach. The home-improvement retailer announced it was working with law enforcement officials after security reporter Brian Krebs reported that "multiple banks" had seen evidence that Home

By |2014-09-04T00:00:00-04:00September 4th, 2014|Archive, Cyber Defense|

Hacker Cracks HealthCare.Gov Web Site, Plants Malicious Code

WASHINGTON DC - A hacker broke into part of the HealthCare.gov insurance enrollment website in July and uploaded malicious software, the Wall Street Journal has reported. A computer hacker broke into part of the HealthCare.gov insurance enrollment website in July and uploaded malicious software, according to federal officials. Investigators found no evidence that consumers' personal

By |2014-09-04T00:00:00-04:00September 4th, 2014|Archive, Cyber Defense|

Big Lineup Of Government, Industry Speakers Set For Michigan Cyber Summit

DETROIT ? A huge line up of government, industry and academic speakers will soon be announced for the November Michigan Summit, says Michigan Chief Information Officer David Behen. Behen, in an interview with MITechNews.Com Editor Mike Brennan, said those announcements will be made sometime this month. Also on tap for the third Cyber Security Summit

By |2014-09-04T00:00:00-04:00September 4th, 2014|Archive, Cyber Defense|

Google Takes Steps To Show Its Cloud Data Is Protected

SAN FRANCISCO - Google is taking unprecedented steps to show its cloud, business, and education customers that data protection is its top priority. To prove its commitment, Google is making the details of an independent security audit and of a security compliance certificate available to the public for the first time on its Google Enterprise

By |2014-09-01T00:00:00-04:00September 1st, 2014|Archive, Cyber Defense|

Anonymity App Secret Victim Of Hacker Attack

SAN FRANCISCO - Anonymity app Secret and an independent security consultant are coming clean about a hack that could have destroyed the entire point of the popular secret-sharing app. Bryan Seely, who made headlines earlier this year with a Google Maps hack that let him listen in on FBI and Secret Service phone calls, figured

By |2014-08-27T00:00:00-04:00August 27th, 2014|Archive, Cyber Defense|