Cyber Defense

Round 4 — Hacker Puts 26 Million New Accounts Up For Sale On Dark Web

DETROIT - A hacker who was selling details of nearly 890 million online accounts stolen from 32 popular websites in three separate rounds has now put up a fourth batch of millions of records originating from 6 other sites for sale on the dark web. The Hacker News today received a new email from the Pakistani hacker,

By |2019-03-20T10:33:19-04:00March 20th, 2019|Cyber Defense|

Cybersecurity Expert Tells Hacker Horror Stories Gleaned From RSA Conference

ROYAL OAK - RSA’s Security Conference last week provided new cyber attack horror stories for Richard Stiennon to tell listeners of M2 Techcast. For instance, hackers gamed a blockchain contest and stole $10 million. Richard also is now a best selling author with his new book, Secure Cloud Transformation. Hear all about it on this

By |2019-03-15T05:52:19-04:00March 14th, 2019|Cyber Defense, M2 TechCast, Podcasts|

NSA Makes Advanced Hacking Tool Open Source – Really

The National Security Agency develops advanced hacking tools in-house for both offense and defense—which you could probably guess even if some notable examples hadn't leaked in recent years. But on Tuesday at the RSA security conference in San Francisco, the agency demonstrated Ghidra, a refined internal tool that it has chosen to open source. And while NSA cybersecurity adviser

By |2019-03-13T14:54:13-04:00March 13th, 2019|Cyber Defense|

Comcast Acquires Artificial Intelligence Company For Network Security

PHILADELPHIA - Comcast has acquired cybersecurity firm BluVector for an undisclosed amount. BluVector has developed an AI/machine learning-enabled cybersecurity detection, visibility, and containment system for network security applications. With the deal, CMCSA is not only acquiring security technology for its internal operations but also intends to support BluVector's continuing business offerings. Target Company Arlington, Virginia-based BluVector was

By |2019-03-10T14:51:04-04:00March 10th, 2019|Cyber Defense|

Facebook Two-Factor Authentication Has Two-Factored Problem

MOUNTAIN VIEW, Ca. - On Facebook two-factor authentication with phone numbers has a two-factored problem. First: The phone number you give to Facebook to help keep your account safe from potential hackers isn't just being used for security. A tweet thread from Jeremy Burge, founder of Emojipedia, on Friday showed that people can find your profile from

By |2019-03-08T19:42:57-05:00March 8th, 2019|Cyber Defense|

Cybersecurity Expert Lohrmann – Not Enough Companies, Governments Take Cybersecurity Seriously

ROYAL OAK - Believe it or not, a lot of businesses and government entities are not taking cybersecurity seriously enough, says cybersecurity expert Dan Lohrmann of Security Mentor. While not a majority, these nay sayers are a large minority of the total business and government universe. What do these attitudes mean for your business and

By |2019-02-28T16:39:19-05:00February 28th, 2019|Cyber Defense, M2 TechCast, Podcasts|

Former State Chief Information Security Officer Joins Plante Moran Cybersecurity Practice

ROYAL OAK – Rajiv Das, formerly the chief information security officer for the State of Michigan, in January joined accounting and consulting firm Plante Moran’s cybersecurity practice. He joins M2 Techcast to talk about what he will bring to the private sector from the public sector. Rajiv Das To listen, click on https://soundcloud.com/mike-brennan-841872555/e159-rajiv-das-plante-moran You can

By |2019-02-27T15:20:19-05:00February 25th, 2019|Cyber Defense, M2 TechCast, Podcasts|

About 17,000 Android Apps Collect Personal Info Without Your Consent

SAN FRANCISCO - Roughly 17,000 Android apps collect identifying information that creates a permanent record of the activity on your device, according to research from the International Computer Science Institute that was shared with CNET. The data collection appears to violate the search giant's policy on collecting data that can be used to target users for advertising in most cases, the researchers said.

By |2019-02-15T16:03:09-05:00February 15th, 2019|Android, Cyber Defense|

Cybersecurity Expert Stiennon’s Latest Book: Secure Cloud Transformation

BIRMINGHAM - IT-Harvest Press, an imprint of analyst firm IT-Harvest, is launching Secure Cloud Transformation: The CIO's Journey at the 2019 RSA Conference in San Francisco, March 4th. The book, written by industry analyst Richard Stiennon, documents the cloud transformation journey of 16 digital pioneers at some of the largest organizations in the world. "When an enterprise embarks on their cloud

By |2019-02-15T13:37:02-05:00February 15th, 2019|Cyber Defense|