Guest Columns

Microsoft Takes Action Against Revenge Porn

SEATTLE - Microsoft is taking a stand against one of the more vile behaviors on the Internet: revenge porn. The software maker opened a dedicated reporting websiteWednesday for those who have fallen victim to the malicious posting online of sexually explicit photos or videos, often alongside sensitive private information like a phone number or address.

By |2015-07-22T00:00:00-04:00July 22nd, 2015|Archive, Guest Columns|

Fiat Chrysler Releases Software Update For Vehicle Electronic Security

AUBURN HILLS - On Thursday, Fiat Chrysler Automobiles' Embedded System Quality Engineering team released a Technical Service Bulletin for a software update that offers customers improved vehicle electronic security and communications system enhancements. Similar to a smartphone or tablet, vehicle software can require updates for improved security protection to reduce the potential risk of unauthorized

By |2015-07-16T00:00:00-04:00July 16th, 2015|Archive, Guest Columns|

Feds Shut Down Worldwide Malware Marketplace Darkode.com

MILWAUKEE - A 27-year-old suburban Milwaukee man created an Internet site used as a worldwide malware marketplace that was shut down Wednesday after an investigation by 20 law enforcement agencies across the globe, federal documents filed Wednesday show. The site, known as Darkode.com, was seized by federal authorities Tuesday. A dozen people, including Daniel Placek

By |2015-07-16T00:00:00-04:00July 16th, 2015|Archive, Guest Columns|

Trivalent Group To Host Free Disaster Recovery and Business Continuity Planning Workshop

GRAND RAPIDS - Trivalent Group is hosting a free workshop designed to help businesses prevent loss of data in a technology disruption on July 30 at Trivalent Group Headquarters in Grandville. Trivalent Group is a leading cloud and managed services, IT support, business continuity and network services company in Michigan. The free workshop, BIASurvivor (Be

By |2015-07-13T00:00:00-04:00July 13th, 2015|Archive, Guest Columns|

Apple Beefs Up Security For iOS, Macs

SAN FRANCISCO - Apple is shaking up the way it confirms whether you're the rightful owner of your iOS device or Mac. Built directly into iOS 9 and OS X El Capitan, a system called "two-factor authentication" will add an extra layer of security that can keep your Apple account more secure, even if someone

By |2015-07-10T00:00:00-04:00July 10th, 2015|Archive, Guest Columns|

Federal Hack ID Theft Now At 22 Million

WASHIGTON DC - The federal government announced Thursday that the total number of people affected by cyberattacks on the US government's personnel office was more than 22 million. The agency said 21.5 million Social Security numbers were stolen from one source and 4.2 million from another. Both attacks were announced in June. Some people were

By |2015-07-10T00:00:00-04:00July 10th, 2015|Archive, Guest Columns|

CIA-Backed Startup Finds Government Passwords On Internet

WASHINGTON DC - A CIA-backed startup has discovered login credentials and passwords for 47 US government agencies littered across the Internet - leaving federal agencies potentially at risk of cyberattack. Recorded Future, a Boston-based data mining firm backed by the CIA's venture capital arm, said in a research report that credentials belonging to 47 US

By |2015-06-25T00:00:00-04:00June 25th, 2015|Archive, Guest Columns|

“There Will Be Cyberwar” Excerpts Published

  ANN ARBOR - Over the next few weeks, MITechNews.Com will be publishing excerpts from cybersecurity expert Richard Stiennon's latest book, called There Will Be Cyberwar. The book makes the case that the US military rushed to "network everything" and, like most organizations, neglected to secure its most critical systems, opening the door to a

By |2015-06-25T00:00:00-04:00June 25th, 2015|Archive, Guest Columns|

Google Launches Android Security Awards Program

SAN FRANCISCO - Google on Tuesday launched the AndroidSecurity Awards program, offering researchers who seek out bugs and flaws in Android to make some cash on their discoveries. Google has assigned a $500 bounty on "Moderate" severity bugs, but will double that to $1,000 for "High" severity and hand over $2,000 for "Critical" bugs. Google

By |2015-06-18T00:00:00-04:00June 18th, 2015|Archive, Guest Columns|