Cyber Defense

How Cybersleuths Decided Russian Hacked The DNC And Impacted US Election

WASHINGTON DC - It was a bombshell. Operatives from two Russian spy agencies had infiltrated computers of the Democratic National Committee, months before the US national election. One agency -- nicknamed Cozy Bear by cybersecurity company CrowdStrike -- used a tool that was "ingenious in its simplicity and power" to insert malicious code into the

By |2017-05-04T20:54:45-04:00May 4th, 2017|Cyber Defense|

Smartphone Security Hole: ‘Open Port’ Backdoors Widespread

ANN ARBOR- A sweeping study of an internet communication mechanism common in mobile devices has revealed that so-called 'open ports' are much more vulnerable to security breaches than previously thought. The vulnerability the University of Michigan researchers highlighted is most pronounced in Android apps that let users share data across devices and connect to their

By |2017-05-02T08:01:27-04:00May 2nd, 2017|Cyber Defense, Featured|

Applications Now Open For Women In Defense Horizons – Michigan Scholarships

SOUTHFIELD – The Michigan Chapter of Women in Defense, an organization for women in the defense industry, announces applications are being accepted for the 2017 Women in Defense Horizons – Michigan Scholarship. The scholarship is available to women who are United States citizens, residents of Michigan, enrolled at an accredited Michigan college or university, have

By |2017-04-28T11:08:40-04:00April 28th, 2017|Cyber Defense, ESD|

Red Level Security Expert Explains How Businesses Can Keep Networks Safe

ROYAL OAK - Mark Dreyer, a Senior Consultant at Red Level, just returned from a Microsoft security conference before he appeared April 17 on M2 TechCast providing him with a lot of information about ways in which businesses can keep the bad guys out of their networks. In this interview, Dryer answers the following questions:

By |2017-04-25T12:47:47-04:00April 25th, 2017|Cyber Defense, M2 TechCast, Podcasts|

Report: Phishing, Hacking, Malware Top Cyber Security Incidents In 2016

NEW YORK – Phishing, hacking and malware incidents accounted for the plurality of cyber security incidents for the second year in a row, at 43 percent – a 12 percentage point jump from a year earlier, a report contends. In finance and insurance, employee action or mistakes were cited as the top reason for cyber

By |2017-04-20T20:25:15-04:00April 20th, 2017|Cyber Defense|

Cyber Security Breakfast Seminar Set For May 3 At James B. Henry Center

LANSING - ASK, an IT and security consulting company, and Foster Swift Collins & Smith, PC, a Michigan law firm, announced this week they will hosting a complimentary cyber security breakfast seminar for clients and professionals May 3 at the James B. Henry Center. The event will feature Information Security Professionals from ASK and attorneys

By |2017-04-20T20:01:59-04:00April 20th, 2017|Cyber Defense|

Report: Fingerprints Common Enough To Fool Mobile Phone Security Systems

EAST LANSING - No two people are believed to have identical fingerprints, but researchers from New York University and Michigan State University have found that partial similarities between prints are common enough that the fingerprint-based security systems used in mobile phones and other devices can be more vulnerable than previously thought. The vulnerability lies in

By |2017-04-14T10:52:25-04:00April 14th, 2017|Cyber Defense|

Go Phish Webinar On Demand

LANSING - Go Phish, as in Phishing attacks and how to thwart them, was live webinar that aired March 30 presented by NuWave Technology Partners. It is now available on-demand. To watch, click on https://www.sbam.org/Resources/tabid/97/ArtMID/2980/ArticleID/2784/Go-Phish.aspx  

By |2017-04-07T12:24:00-04:00April 7th, 2017|Cyber Defense|

How Do The New Internet Privacy Rules Affect You?

ANN ARBOR - Congress recently passed a law repealing a set of Internet privacy rules, in a move that’s taken the media by storm and for good reason. In the wake of this new legislation, there’s been a lot of confusion over what it means for the privacy of consumer Internet data. President Donald Trump

By |2017-04-07T08:49:15-04:00April 7th, 2017|Cyber Defense, Guest Columns|

Protecting Privacy Online?

DETROIT - Caston Thomas, CEO of InterWorks Technology, thinks the whole hubbub in the press about Congress giving away our rights to online privacy is overblown.  Plenty of other players than ISP’s have been gathering and selling our information to the highest bidder. That is just the price of being online. To listen, click on http://internetadvisor.net/wp-content/uploads/2017/04/1712-Privacy-Debate.mp3  

By |2017-04-04T20:30:52-04:00April 4th, 2017|Cyber Defense, Internet Advisor, Podcasts|