Cyber Defense

Duo Security Says FIDO Ready Product Support Fast IDentity Online

ANN ARBOR - Duo Security announced its FIDO Ready products now support the Fast IDentity Online FIDO Universal Second Factor specifications. Duo Security joins Google, Yubico and other members of the FIDO Alliance to launch this phishing-resistant authentication method to consumers and organizations. The goal of this new authentication standard is to further simplify and

By |2014-10-23T00:00:00-04:00October 23rd, 2014|Archive, Cyber Defense|

ISACA Detroit Chapter Fall Seminar: Cybersecurity Fundamentals Workshop

DEARBORN - The Detroit Chapter of ISACA is hosting a Cybersecurity Fundamentals Workshop in November to provide insight into the importance of cybersecurity, and the integral role of cybersecurity. The protection of information is a critical function for all enterprises. Cybersecurity is a growing and rapidly changing field, and it is crucial that the central

By |2014-10-23T00:00:00-04:00October 23rd, 2014|Archive, Cyber Defense|

SUMIT 14 Raises Awareness Of Cyber Security Threats

ANN ARBOR ? Security focused students, cyber security professionals, and members of the University of Michigan technology staff gathered earlier this month for the 10th annual Security at University of Michigan IT conference hosted every October during National Cyber Security Awareness Month. The program seeks to raise awareness of cyber security threats and hosts nationally

By |2014-10-22T00:00:00-04:00October 22nd, 2014|Archive, Cyber Defense|

Snapchat At Center Of Latest Hack

SAN FRANCISCO - Third-party services that let Snapchat users back up their photos and videos - and that Snapchat claims it tried to shut down - are at the center of the latest Snapchat hack. An enormous, 13-gigabyte library of photos and videos from an estimated 200,000 accounts had been saved through apps and websites

By |2014-10-16T00:00:00-04:00October 16th, 2014|Archive, Cyber Defense|

Russian Hackers Exploit Bug In Microsoft Windows OS

SAN FRANCISCO - Russian hackers have exploited a bug in Microsoft's Windows operating system in order to target computers used by NATO, the European Union, Ukraine and the telecommunications and energy sectors, according to security firm iSight. In a blog post Tuesday, Dallas-based iSight, in collaboration with Microsoft, said the zero-day vulnerability impacts all supported

By |2014-10-16T00:00:00-04:00October 16th, 2014|Archive, Cyber Defense|

CIOs Discuss IT Trends, Tech Careers For Women At Detroit Summit

DETROIT - Technology leaders from some of America?s largest corporations gathered Sept. 23 with more than 500 Michigan IT professionals, business executives and students to discuss IT trends and opportunities at the IT Executive Connection Summit at Detroit?s Westin Book Cadillac. The event focused on thriving in a connected world. Various women role models shared

By |2014-10-02T00:00:00-04:00October 2nd, 2014|Archive, Cyber Defense|

Apple Issues Fix For Shellshock, aka Bash, Bug

CUPERTINO, Ca. - Apple has issued a fix for Shellshock, aka Bash, a bug that could let hackers gain access to some Macintosh computers. But security experts said Tuesday that Apple's patch is incomplete and leaves one vulnerability open. Shellshock affects most computers around the world running Unix and Linux, including Apple's OS X operating-system

By |2014-10-02T00:00:00-04:00October 2nd, 2014|Archive, Cyber Defense|

Apple Says Most Mac Users Safe From Shellshock Bug

CUPERTINO, Ca. - Apple says that most Mac users are safe from a newly discovered security flaw, one that could - in principle - allow hackers to take over an operating system. Known as the "Shellshock" or "Bash" bug, the latest vulnerability for the world's computers involves the execution of malicious code within a bash

By |2014-09-29T00:00:00-04:00September 29th, 2014|Archive, Cyber Defense|

ShellShock Bug Could Spell Diaster For Major Digital Companies

SAN FRANCISCO - A new security vulnerability known as the Bash or Shellshock bug could spell disaster for major digital companies, small-scale Web hosts and even Internet-connected devices. The quarter-century-old security flaw allows malicious code execution within the bash shell (commonly accessed through Command Prompt on PC or Mac's Terminal application) to take over an

By |2014-09-25T00:00:00-04:00September 25th, 2014|Archive, Cyber Defense|