Cyber Defense

Hackers Flood Android App Stores – Including Play Store – With 1000 Spyware Apps

SAN FRANCISCO - Hackers have flooded Android app stores - including the official Google Play store - with over one thousand spyware apps which have the capability to monitor almost every action on an infected device. Dubbed SonicSpy, the malware can silently record calls and audio, take photos, make calls, send text messages to numbers

By |2017-08-11T08:18:38-04:00August 10th, 2017|Cyber Defense|

Company Embeds Chip In Employees To Eliminate RFID ID Cards

ROYAL OAK - A vending machine company in Wisconsin shocked the world when it said on Aug. 1 it will embed an RFID chip in the hands of employees who volunteer to pay for snacks, log into the building and other ID tag type digital information. Dan Lohrmann, Chief Strategist & Chief Security Officer at

By |2017-08-08T20:23:26-04:00August 8th, 2017|Cyber Defense, Featured, M2 TechCast, Podcasts|

Defcon Hackers Demonstrate How Easy It Is To Hack US Voting Machines

LAS VEGAS - Defcon, a huge hacker convention held annually in this desert playground, received more than 30 voting machines to play with, providing a rare opportunity for hackers to find the flaws in our democracy's technology. How long did it take to crack them? About 90 minutes.  The security of voting technology was elevated

By |2017-08-04T07:53:39-04:00August 3rd, 2017|Cyber Defense, Featured|

Is A Fear Of New Technology Holding Your Business Back?

ROCHESTER HILLS - According to RightScale, a Cloud Management Trends blog, cloud adoption has grown by 18 percent every year since 2012. Now, more than 77 percent of private users, and more than 40 percent of small to medium sized business owners are moving to the cloud. Truth is, the cloud has the potential to

By |2017-08-03T20:17:19-04:00August 3rd, 2017|Cyber Defense, Guest Columns|

Congress Wants To Fix IoT Security Problems For The Federal Government Only

WASHINGTON DC - Congress wants to fix the notorious security problems associated with the Internet of Things - for the federal government. This week Sens. Mark Warner, Cory Gardner, Ron Wyden and Steve Daines introduced the "Internet of Things Cybersecurity Improvement Act," (PDF) a bill that would force tech companies to ramp up security if

By |2017-08-03T20:06:46-04:00August 3rd, 2017|Cyber Defense, Politics|

Survey: Michigan Has Nearly 7,000 Cybersecurity-Related Job Postings

DETROIT - Michigan has nearly 7,000 cybersecurity-related job postings, a new study shows, while 39 institutions offer programs, degrees, or training related to cybersecurity in the Advance Michigan area, including Clinton, Eaton, Genesee, Ingham, Lapeer, Livingston, Macomb, Monroe, Oakland, St. Clair, Shiawassee, Washtenaw, and Wayne counties. The study also shows that students can choose among

By |2017-08-03T19:07:51-04:00August 3rd, 2017|Cyber Defense|

Ransomware Hackers Now Offer Customers Service, Outsourced Resources

LAS VEGAS - Hackers behind some of the most notorious ransomware around are taking some hints from legit Wall Street companies. Malware strains like Locky and Cerber helped make ransomware a $25 million industry in 2016 and its operators are starting to operate like conventional corporations with "customer" service staff and outsourced resources, researchers explained Wednesday

By |2017-07-27T18:49:11-04:00July 27th, 2017|Cyber Defense|

Report: Hackers Can Take Over Your Phone To Send Text Messages, Make Phone Calls

LAS VEGAS - The Unicorn Team researchers from 360 Technology, China's leading security company, discovered they could hack phones when they switched from modern LTE wireless networks to older, slower 2G technology. Of course, our phones do this all the time when the signal's weak, although you may not notice when it's happening. Still, if hackers take

By |2017-07-27T18:38:45-04:00July 27th, 2017|Cyber Defense|

Feds Shut Down Two Of The Dark Webs’ Biggest Purveyors Of Illegal Goods

WASHINGTON DC - The Department of Justice and Europol announced Thursday that they have shut down AlphaBay and Hansa, two massive marketplaces on the dark web that served hundreds of thousands of customers trying to get their hands on illegal goods online. While you or I can easily buy groceries, electronics and clothes online, when it comes

By |2017-07-20T15:52:48-04:00July 20th, 2017|Cyber Defense, Featured|