Cyber Defense

Trident Spyware Invades Apple iPhones Unless You Update Immediately

CUPERTINO - If you have an iPhone be afraid, be very afraid. A terrifying new spyware, dubbed Trident, can break through the security protection to read texts and email, record calls (including WhatsApp and Viber calls), track your location and turn on your phone's camera and microphone. Trident exploits three zero-day vulnerabilities in iOS 9 to form

By |2016-08-26T09:48:31-04:00August 26th, 2016|Cyber Defense, News|

Getting Middle And High School Students Inspired By STEM Topic Of ISACA Detroit Meeting

TROY - Inspiring middle and high school student to study STEM (Science Technology Engineering and Math) will be the pre-dinner topic for the Sept. 21 ISACA Detroit chapter meeting. Also on the agenda is a talk by Tamara and Daniel Shoemaker from the University of Detroit-Mercy.  Deadline to register is Sept. 16. The after dinner

By |2016-08-26T07:40:36-04:00August 26th, 2016|Cyber Defense|

NSA Whistle Blower Snowden Says Russian Hack Of Democrat Party Server Diplomatic Signaling

MOSCOW - NSA whistle blower Edward Snowden said his old employer was likely hacked by his new host, Russia. Snowden tweeted Tuesday that the auction of malicious software files allegedly stolen from the NSA may actually be diplomatic signaling by Russia. The software, a set of digital tools, is being auctioned by a group that

By |2016-08-19T11:13:08-04:00August 19th, 2016|Cyber Defense, Featured|

Research Shows 30 Percent Of Employees May Fall For Phishing Attacks

ANN ARBOR - The Ann Arbor two-factor security developer Duo Security this week published research that illustrates the risk phishing attacks present to business. Since its July 2016 launch, about 400 companies have begun using Duo Insight, a free tool that lets IT teams run internal phishing simulations. Of the 11,542 users who received a

By |2016-08-16T20:28:07-04:00August 16th, 2016|Cyber Defense, ESD|

CloudTech1 Sept. 21 Free Lunch And Learn: Network Security

ROCHESTER HILLS - Join CloudTech1 University at its Education Center on September 21st at 11am to enjoy some food, to have some fun and learn about Network Security, a strategy no business can afford to ignore. CloudTech1 University has become an ideal place to learn cloud basics and ask questions about the security of your

By |2016-09-09T17:01:13-04:00August 11th, 2016|Cyber Defense|

M2 TechCast: Beckers Talks Disaster Recovery Event Aug. 23 At Automation Alley

ROYAL OAK - Rick Beckers, CEO of CloudTech1, talks about his brain child, the CloudTech1 University. His company is a managed service provider that evolved into a cloud service provider. So he wanted to help folks understand all about the cloud and what it can do. In June he launched his CloudTech1 University to teach

By |2016-08-10T15:34:59-04:00August 10th, 2016|Cyber Defense, Featured, M2 TechCast, Podcasts|

Understanding New Hacktivism: Where Next for Hackers With a Cause?

LANSING - In 2016, hacktivism has become a mainstream force impacting millions of global lives. ‘Hacking for a cause’ has now become a weapon that transcends far beyond ‘antisocial geek misfit’ boundaries. From the DNC email hack to the Panama Papers, a surge in new hacktivism is now the top anti-establishment online tool for achieving

By |2016-08-08T22:36:49-04:00August 8th, 2016|Cyber Defense, Guest Columns|

CloudTech1 University’s Next Showcase – Business Continuity And Disaster Recovery

TROY - Managed service provider CloudTech1 on Aug. 23 at Automation Alley headquarters will be discussing Business Continuity and Disaster Recovery. A disaster doesn't have to be a disaster.  Disasters happen. It is part of life. Hopefully you and your company never have to go through one. The key is preparedness. How do you prepare and

By |2016-08-04T12:58:12-04:00August 4th, 2016|Cyber Defense, News|

Report: Keysniffer Hack Can Detect Passwords From Wireless Keyboards

SAN FRANCISCO - Using an attack that researchers at cybersecurity firm Bastille are calling "keysniffer," hackers can detect every key you press on your wireless keyboard. Think about that next time you’re using your laptop in a coffee shop. That means they can pick up your passwords and maybe the answers to your security questions,

By |2016-07-28T16:32:43-04:00July 28th, 2016|Cyber Defense|