Cyber Defense

Cyber Pearl Harbor Versus The Real Pearl Harbor

BIRMINGHAM - December 7, is a good day to re-think the implications of a “cyber Pearl Harbor.”  Leon Panetta, famously used the term in 2011, when it seemed like all of our generals had become cyber experts overnight. "The potential for the next Pearl Harbor could very well be a cyber-attack," the CIA Director testified before the

By |2017-12-14T20:15:34-05:00December 14th, 2017|Cyber Defense, Guest Columns|

99 Percent Of All Office Workers Admit To Taking Actions That Threaten Company’s Cybersecurity

MOUNTAIN VIEW, Ca. - Virtually all office workers — 99 percent — admit to making at least one action that could threaten a company's cybersecurity, a new report from Intermedia found. Out of more than 1,000 office workers interviewed, nearly all said they did at least one potentially dangerous activity, such as sharing or autosaving passwords or

By |2017-12-14T18:35:28-05:00December 14th, 2017|Cyber Defense|

Get Ready For More Hacks In 2018

SAN FRANCISCO - After the year we've had, do you need any more convincing that your personal information is constantly being exposed to hackers? It wasn't just the Equifax hack, which leaked 145.5 million Social Security numbers, or the WannaCry ransomware attackthat locked up our computers and demanded a ransom paid in bitcoins. Even the security software

By |2017-12-07T21:36:18-05:00December 7th, 2017|Cyber Defense|

Stiennon Leaves Blancco To Resume Private Cybersecurity Practice

ROYAL OAK - Cybersecurity pro Richard Stiennon rejoined M2 TechCast after leaving Blancco Technology Group in November where he served as Chief Strategy Officer. Stiennon will appear monthly to update listeners on the latest cybersecurity threats. Stiennon, who lives in Birmingham, Michigan, also will resume his former activities which includes providing video interviews with top

By |2017-12-04T08:42:27-05:00December 4th, 2017|Cyber Defense, M2 TechCast, Podcasts|

2-Factor Voice Authentication To Verify Your Identity

DETROIT - Robert Capps isn NuData Security’s Vice President of Business Development, Robert is responsible for developing and nurturing company partnerships and channels. He is a recognized technologist, thought leader and advisor with over 20 years of experience in the design, management and protection of complex information systems. Researchers at the University of Michigan created 2-factor voice authentication by creating a wearable device like

By |2017-11-29T16:31:45-05:00November 29th, 2017|Cyber Defense, Internet Advisor, M2 TechCast, Podcasts|

OnePlus Phones Can Be Hacked Through Testing Tool Called EngineerMode

SAN FRANCISCO - Hackers who get hold of some OnePlus phones can obtain virtually unlimited access to files and software through use of a testing tool called EngineerMode that the company evidently left on the devices. Robert Baptiste, a freelance security researcher who goes by the name Elliot Alderson on Twitter after the "Mr. Robot" TV show

By |2017-11-16T20:22:29-05:00November 16th, 2017|Cyber Defense|

State CISO Das Talks Highlights Of North American International Cyber Summit

ROYAL OAK - Rajiv Das, Michigan’s chief information security officer (CISO), provides the highlights of the sixth North American International Cyber Summit 2017 hosted Oct. 30 by Michigan Governor Rick Snyder. The event at Cobo Center drew nearly a thousand people to downtown Detroit, including experts from across the globe to address a variety of

By |2017-11-13T13:26:30-05:00November 13th, 2017|Cyber Defense, M2 TechCast, Podcasts|

U.S. Senators Unimpressed With Facebook, Google, Twitter Efforts To Staunch Russian Misinformation Campaign

WASHINGTON DC - Facebook, Google and Twitter came to Capitol Hill to argue they're ready to fight back against the scourge of fake news and the Russian misinformation campaign that influenced the 2016 US presidential election. The senators were left unimpressed.   "You showed a lack of resources, commitment and a lack of genuine effort," said Sen.

By |2017-11-02T19:50:31-04:00November 2nd, 2017|Cyber Defense|