Cyber Defense

Auxiom Hosts Free Cybersecurity Seminar For Business Sept. 12 At Bamboo Detroit

DETROIT - An educational event to show small to medium-sized businesses how to protect their clients’ data from cyberattack will be held Sept. 12 at Bamboo Detroit by Auxiom. And the best part is SMBS-101 is free. “Small and medium-sized businesses are extremely vulnerable to coming under attack,” said Auxiom CEO Matt Loria. “Especially because

By |2017-09-01T07:43:44-04:00September 1st, 2017|Cyber Defense|

White House Approves Plan To Turn US Cyber Command Into Its Own Military Unit

WASHINGTON DC - The White House has approved a plan to turn the US Cyber Command into its own military command. Cyber Command will be elevated to the status of "Unified Combatant Command," President Donald Trump said in a statement Friday. This puts it on par with the nine other unified commands of the military, like Central Command,

By |2017-08-25T03:14:39-04:00August 25th, 2017|Cyber Defense|

Hackers Flood Android App Stores – Including Play Store – With 1000 Spyware Apps

SAN FRANCISCO - Hackers have flooded Android app stores - including the official Google Play store - with over one thousand spyware apps which have the capability to monitor almost every action on an infected device. Dubbed SonicSpy, the malware can silently record calls and audio, take photos, make calls, send text messages to numbers

By |2017-08-11T08:18:38-04:00August 10th, 2017|Cyber Defense|

Company Embeds Chip In Employees To Eliminate RFID ID Cards

ROYAL OAK - A vending machine company in Wisconsin shocked the world when it said on Aug. 1 it will embed an RFID chip in the hands of employees who volunteer to pay for snacks, log into the building and other ID tag type digital information. Dan Lohrmann, Chief Strategist & Chief Security Officer at

By |2017-08-08T20:23:26-04:00August 8th, 2017|Cyber Defense, Featured, M2 TechCast, Podcasts|

Defcon Hackers Demonstrate How Easy It Is To Hack US Voting Machines

LAS VEGAS - Defcon, a huge hacker convention held annually in this desert playground, received more than 30 voting machines to play with, providing a rare opportunity for hackers to find the flaws in our democracy's technology. How long did it take to crack them? About 90 minutes.  The security of voting technology was elevated

By |2017-08-04T07:53:39-04:00August 3rd, 2017|Cyber Defense, Featured|

Is A Fear Of New Technology Holding Your Business Back?

ROCHESTER HILLS - According to RightScale, a Cloud Management Trends blog, cloud adoption has grown by 18 percent every year since 2012. Now, more than 77 percent of private users, and more than 40 percent of small to medium sized business owners are moving to the cloud. Truth is, the cloud has the potential to

By |2017-08-03T20:17:19-04:00August 3rd, 2017|Cyber Defense, Guest Columns|

Congress Wants To Fix IoT Security Problems For The Federal Government Only

WASHINGTON DC - Congress wants to fix the notorious security problems associated with the Internet of Things - for the federal government. This week Sens. Mark Warner, Cory Gardner, Ron Wyden and Steve Daines introduced the "Internet of Things Cybersecurity Improvement Act," (PDF) a bill that would force tech companies to ramp up security if

By |2017-08-03T20:06:46-04:00August 3rd, 2017|Cyber Defense, Politics|

Survey: Michigan Has Nearly 7,000 Cybersecurity-Related Job Postings

DETROIT - Michigan has nearly 7,000 cybersecurity-related job postings, a new study shows, while 39 institutions offer programs, degrees, or training related to cybersecurity in the Advance Michigan area, including Clinton, Eaton, Genesee, Ingham, Lapeer, Livingston, Macomb, Monroe, Oakland, St. Clair, Shiawassee, Washtenaw, and Wayne counties. The study also shows that students can choose among

By |2017-08-03T19:07:51-04:00August 3rd, 2017|Cyber Defense|

Ransomware Hackers Now Offer Customers Service, Outsourced Resources

LAS VEGAS - Hackers behind some of the most notorious ransomware around are taking some hints from legit Wall Street companies. Malware strains like Locky and Cerber helped make ransomware a $25 million industry in 2016 and its operators are starting to operate like conventional corporations with "customer" service staff and outsourced resources, researchers explained Wednesday

By |2017-07-27T18:49:11-04:00July 27th, 2017|Cyber Defense|