Cyber Defense

Malicious Hackers Inject Click-Fraud Adware Into Chrome Browsers Using Windows

SUNNYVALE, Ca. - Malicious hackers are breaking into poorly-protected websites, according to research by the security firm Proofpoint, and inserting JavaScript that waits for Chrome browsers to be referred to the sites via search engines. The script then inserts unrecognized characters that break the font rendering on the webpage, making all text unreadable. At that

By |2017-02-24T06:37:58-05:00February 24th, 2017|Cyber Defense|

Trust And Risks Both Growing in Government Clouds

GRAND LEDGE - As the 2017 RSA Security Conference kicked off in San Francisco, Intel Security released the results of its second annual survey on cloud security practices. The report outlines the current state of cloud adoption, the primary concerns with private and public cloud services, security implications, and the evolving impact of shadow IT

By |2017-02-23T20:13:25-05:00February 23rd, 2017|Cyber Defense|

Yahoo Tells Users They Were Hit With Cookie Attack

SAN FRANCISCO - Yahoo users found out Wednesday that hackers used a technical trick with cookies to log into their accounts without passwords. "Based on the ongoing investigation, we believe a forged cookie may have been used in 2015 or 2016 to access your account," Yahoo users were told in an email. Yahoo revealed the

By |2017-02-17T08:20:06-05:00February 17th, 2017|Cyber Defense|

Hack My Car? Most Believe It Can Happen

ANN ARBOR - Most Americans have some concerns that self-driving cars can be hacked to cause crashes, disable the vehicle in some way or even be used as weapons by terrorists, according to researchers at the University of Michigan. Large percentages of people are at least slightly concerned that these kinds of vehicles can be

By |2017-02-13T13:20:23-05:00February 13th, 2017|Autonomous Vehicles, Cyber Defense|

ISACA Chapter Meeting Features Security Leadership, Securing Connected Vehicles

TROY - Registration closes today for the Feb. 15 ISACA Chapter Meeting that features discussions on preparing your leadership, and security the connected vehicle. The meeting will be held at the Michigan State University Management Education Center in Troy, starting at 4:30 pm. Pre Dinner Topic: Preparing Your Leadership Pre Dinner Speakers:   Matt Kipp CISA,

By |2017-02-10T07:31:40-05:00February 10th, 2017|Cyber Defense|

Secrecy Surrounds White House Cybersecurity Staff Shakeup

WASHINGTON DC - The chief information security officer for the White House's Executive Office of the President has been removed from his position, sources have confirmed. Cory Louie was appointed to the position by former President Obama in 2015, charged with keeping safe the staff closest to the president -- including the president himself --

By |2017-02-10T06:45:07-05:00February 10th, 2017|Cyber Defense|

U.S. Visitors May Be Asked To Give Up Social Media Passwords To Border Agents

WASHINGTON DC - Visitors to the US might be asked to relinquish their social media passwords to border agents as part of an attempt to tighten security checks. "We want to get on their social media, with passwords: What do you do, what do you say?" Homeland Security Secretary John Kelly told the House Homeland

By |2017-02-09T18:23:51-05:00February 9th, 2017|Cyber Defense|

Caston Thomas Explains New Ransomeware Threat

DETROIT - Caston Thomas, CEO of InterWorks, is a noted cybersecurity expert from the Ann Arbor area who has been called the Chuck Norris of Securing and Managing Mobile and Networks.  There are new forms of ransomeware that now lock out your entire operating system unless you pay up. Caston also explained the new wireless

By |2017-02-08T11:10:23-05:00February 8th, 2017|Cyber Defense, Internet Advisor, Podcasts|

State Reports Software Snafu Exposes Personal Info On 1.87 Million Michigan Workers

LANSING - Upwards of 1.87 million Social Security numbers, names and wage information for active employees in Michigan could have been accessed by unauthorized users after a software update done in October exposed these confidential records, state officials announced late Friday. What this means is the vulnerability could impact two-fifths of the state’s workforce since

By |2017-02-03T19:57:24-05:00February 3rd, 2017|Cyber Defense, Featured|

Cybersecurity Expert Lohrmann: What Will Be Trump’s Cybersecurity Strategy?

ROYAL OAK - What will be President Trump’s cybersecurity strategy? Cybersecurity expert Dan Lohrmann with Security Mentor offers his thoughts in this M2 TechCast podcast. Even though Lohrmann notes the new cybersecurity strategist Rudy Giuliani has very limited cybersecurity background, he is encouraged that Giuliani will manage the nation’s cybersecurity strategy well. Lohrmann likes the

By |2017-02-01T14:13:17-05:00February 1st, 2017|Cyber Defense, M2 TechCast, Podcasts|