Guest Columns

CIA-Backed Startup Finds Government Passwords On Internet

WASHINGTON DC - A CIA-backed startup has discovered login credentials and passwords for 47 US government agencies littered across the Internet - leaving federal agencies potentially at risk of cyberattack. Recorded Future, a Boston-based data mining firm backed by the CIA's venture capital arm, said in a research report that credentials belonging to 47 US

By |2015-06-25T00:00:00-04:00June 25th, 2015|Archive, Guest Columns|

“There Will Be Cyberwar” Excerpts Published

  ANN ARBOR - Over the next few weeks, MITechNews.Com will be publishing excerpts from cybersecurity expert Richard Stiennon's latest book, called There Will Be Cyberwar. The book makes the case that the US military rushed to "network everything" and, like most organizations, neglected to secure its most critical systems, opening the door to a

By |2015-06-25T00:00:00-04:00June 25th, 2015|Archive, Guest Columns|

Google Launches Android Security Awards Program

SAN FRANCISCO - Google on Tuesday launched the Android Security Awards program, offering researchers who seek out bugs and flaws in Android to make some cash on their discoveries. Google has assigned a $500 bounty on "Moderate" severity bugs, but will double that to $1,000 for "High" severity and hand over $2,000 for "Critical" bugs.

By |2022-12-16T14:40:17-05:00June 18th, 2015|Archive, Guest Columns|

Even Kaspersky Lab Gets Hacked

MOSCOW - A spokesman for Kaspersky Lab said Wednesday its systems had been attacked, most likely by hackers working on behalf of a country. But Kaspersky's customer's data is safe, the company said. The sophisticated attack stayed away from user information and focused instead on Kapersky's own systems and intellectual property, the company told CNET.Com.

By |2015-06-12T00:00:00-04:00June 12th, 2015|Archive, Guest Columns|

December Breach Of Government Systems Hits Every Federal Employee

SAN FRANCISCO - A December breach of government systems containing personal information of millions of federal employees - suspected to be the work of China - was worse than originally thought. A union of federal workers said Thursday that the attack, announced last week, had stolen confidential information of every single federal employee, past or

By |2015-06-12T00:00:00-04:00June 12th, 2015|Archive, Guest Columns|

Obama Signs Sweeping Changes To NSA Phone Record Snooping

WASHINGTON DC - The US National Security Agency has had its wings clipped a bit. On Tuesday, the US Senate approved the USA Freedom Act, legislation that will curtail the federal government's sweeping surveillance of millions of Americans' phone records. Later in the day, President Barack Obama signed the bill into law. The legislation, which

By |2015-06-05T00:00:00-04:00June 5th, 2015|Archive, Guest Columns|

Give Cars An Identity, Protect Them From Hackers

  NOVI - Dave Miller, the Chief Security Officer at Covisint, a B2B cloud company, says it is time to start thinking of cars as people. Give cars an identity. Make cars log into the cloud to collect updates, music, personal preferences, the lot. The big difference from today is credentials are not stored in

By |2015-06-03T00:00:00-04:00June 3rd, 2015|Archive, Guest Columns|

Google Ups User-Identity Safety For Apps

MOUNTAIN VIEW - Google wants users to feel safe and secure when accessing websites and apps from their Android devices. It's why Google is encouraging developers will build in security safeguards with its Google Identity Platform. The Google Identity Platform, announced Thursday while developers are in San Francisco for the first day of Google's annual

By |2015-05-29T00:00:00-04:00May 29th, 2015|Archive, Guest Columns|