Guest Columns

Security Questions In Jeopardy After IRS Hack

WASHINGTON DC - Many people rely on security questions like "What's your mother's maiden name?" to protect their personal information online, but hackers are getting better at finding the answers. Case in point: the hackers who raided US Government's Internal Revenue Service data systems. Those attackers were much more successful at answering security questions than

By |2015-08-21T00:00:00-04:00August 21st, 2015|Archive, Guest Columns|

Baker College Student Team Wins Capture The Flag Contest

JACKSON - A Baker College of Jackson student cyber defense team won the annual Capture the Flag contest affiliated with two recent Detroit professional information security (InfoSec) conferences. The team competed against four corporate information security teams. The winning team members are Jackson residents Benjamin Carroll, Benjamin Clark and Jacob Layher. Each was awarded a

By |2015-08-12T00:00:00-04:00August 12th, 2015|Archive, Guest Columns|

Automation Alley Hosts Aerospace, Defense Industry Event

TROY - Automation Alley on Aug. 25 will bring aerospace and defense industry insight to the Southeast Michigan business community with a global business outlook event tailored to small and medium-sized businesses that are looking to diversify. The event will be held from 8 a.m. to noon at Automation Alley headquarters in Troy. "All too

By |2015-08-12T00:00:00-04:00August 12th, 2015|Archive, Guest Columns|

Russians Hack Pentagon eMail System

WASHINGTON DC - It looks like Russian hackers made a significant breach into the Pentagon's email system. Officials tell NBC News that Russia has launched a "sophisticated cyberattack" against the unclassified email system of the Joint Chiefs of Staff. The hack has forced the Pentagon to shut down the email system for almost two weeks

By |2015-08-07T00:00:00-04:00August 7th, 2015|Archive, Guest Columns|

Firmware Vulnerabilities Also Impact MACs

SAN FRANCISCO - The common wisdom when it comes to PCs and Apple computers is that the latter are much more secure. Particularly when it comes to firmware, people have assumed that Apple systems are locked down in ways that PCs aren't. It turns out this isn't true. Two researchers have found that several known

By |2015-08-03T00:00:00-04:00August 3rd, 2015|Archive, Guest Columns|

Affordable Care Act Ruling Fails To Address Cost Of Health Care, Health Insurance

LANSING - The Small Business Association of Michigan said Thursday that the U.S. Supreme Court's ruling on the Affordable Care Act does nothing to address the number one problem facing small businesses and their employees. "Health care, and therefore health insurance, is simply too expensive for all of us and many people are priced out

By |2015-07-29T14:25:52-04:00July 22nd, 2015|Guest Columns|

Michigan Tech 1 Of 5 Universities Chosen To Help Improve Diversity In Mechanical Engineering Education

HOUGHTON - Michigan Technological University's Department of Mechanical Engineering-Engineering Mechanics is one of five mechanical engineering departments nationwide selected by the National Science Foundation (NSF) to participate in a new diversity training program. The others are Purdue, Oregon State, Texas Tech and the University of Oklahoma. The NSF program is called Transforming Engineering Culture to

By |2015-07-29T14:26:13-04:00July 22nd, 2015|Guest Columns|

Chapter 1 Conclusion – There Will Be Cyberwar

ANN ARBOR - Over the next few weeks, MITechNews.Com will be publishing excerpts from cybersecurity expert Richard Stiennon's latest book, called There Will Be Cyberwar. The book makes the case that the US military rushed to "network everything" and, like most organizations, neglected to secure its most critical systems. One point he makes is that an orchestrated

By |2015-07-29T14:26:36-04:00July 22nd, 2015|Guest Columns|

Chapter Two: There Will Be Cyberwar

ANN ARBOR - Over the next few weeks, MITechNews.Com will be publishing excerpts from cybersecurity expert Richard Stiennon's latest book, called There Will Be Cyberwar. The book makes the case that the US military rushed to "network everything" and, like most organizations, neglected to secure its most critical systems. CHAPTERTWO Cautionary Tale. The foregoing fictional scenario

By |2015-07-29T14:27:06-04:00July 22nd, 2015|Guest Columns|