Cyber Defense

Black Hat Hacker Wins $60,000 For Finding Google Chrome Security Hole

MOUNTAIN VIEW - A hacker named Pinkie Pie won $60,000 for exploiting a security hole in Chrome in the Internet search giant's Pwnium 2 competition. In an effort to shore up its browser's defenses, Google holds the competition to challenge hackers to hack their way through Chrome's security to find previously unknown holes. Tuesday's Pwnium

By |2012-10-15T00:00:00-04:00October 15th, 2012|Archive, Cyber Defense|

Trivalent Group Hosts BiaSurvivor Disaster Recovery Workshop Oct. 25

GRANDVILLE - Trivalent Group, one of Michigan's largest technology firms, will host ?BIASurvivor,? a no-cost disaster recovery workshop for the business community on Oct. 25 at its Grandville headquarters. Disaster recovery experts from Trivalent Group will share strategies to increase an organization?s survivability by building an effective business continuity plan. The program starts at 11:30

By |2012-10-13T00:00:00-04:00October 13th, 2012|Archive, Cyber Defense|

Thousands Of Student Records Stolen In Florida College Breach

TALLAHASSEE - Hackers have accessed the confidential information of nearly 300,000 students, employees, and faculty in a massive security breach at a Florida college, officials announced. The breach was first thought to have been isolated to employees at Northwest Florida State College but may involve student records from across the state, education officials said. More

By |2012-10-11T00:00:00-04:00October 11th, 2012|Archive, Cyber Defense|

Michigan Cyber Range Focus Of October ISACA-Detroit Meeting

DEARBORN ? The Michigan Cyber Range will be the focus of the ISACA-Detroit meeting on Oct. 17 when Merit President Donald Welch explains the newest wrinkle in the fight against cyber crime and terrorism. The after dinner topic will be OSINT Footprinting using Twitter and Phthon, a presentation by Raymond Lilly. Advance registration ends at

By |2012-10-07T00:00:00-04:00October 7th, 2012|Archive, Cyber Defense|

Samsung Galaxy S3 Subject To Security Vulnerability

SAN FRANCISCO - Samsung Galaxy S3 owners are subject to a vulnerability that can actually be fixed with an over-the-air update. Samsung said that users can install a security update over the air that will safeguard them from a vulnerability that could allow someone to remotely delete all of their personal data from the handset.

By |2012-09-30T00:00:00-04:00September 30th, 2012|Archive, Cyber Defense|

Wells Fargo Most Recent Bank Hit With DDoS Attack

SAN FRANCISCO - Wells Fargo is the most recent mega-bank to be hit by a distributed denial-of-service attack. According to the Wall Street Journal, roughly 220 customers filed complaints of outages on its Web site saying they had problems logging on. "The amount of bandwidth that is flooding the websites is very large, much larger

By |2012-09-30T00:00:00-04:00September 30th, 2012|Archive, Cyber Defense|

Motor City ISSA Sept. Meeting Looks At Steganography, Covert Channels

LIVONIA ? Motor City ISSA is hosting its Sept. meeting on Sept. 20 by exploring ways attackers can hide their traffic using steganography and covert channels. The event is hosted by Schoolcraft College. RSVP by Sept. 18. The speaker is J Wolfgang Goerlich the information systems and security manager for a Michigan-based financial institution. He

By |2012-09-14T00:00:00-04:00September 14th, 2012|Archive, Cyber Defense|

CIOs Plan Modest Increase In IT Staffing In Fourth Quarter

MENLO PARK, CA - Chief information officers plan a modest increase in IT staffing activity in the fourth quarter of 2012, according to the just-released Robert Half Technology IT Hiring Index and Skills Report. In the latest quarterly survey, 9 percent of CIOs said they expect to expand their IT departments, and 6 percent anticipate

By |2012-09-13T00:00:00-04:00September 13th, 2012|Archive, Cyber Defense|