hackers

Britain, France, US Lead 35 Nation Agreement On Controlling Spyware, Hackers

LONDON - Countries led by Britain, France and the United States and tech firms including Google, Microsoft and Meta on Tuesday signed a joint statement recognising the need for more action to tackle malicious use of cyber spying tools. The declaration was signed by 35 nations at a conference hosted by both Britain and France

By |2024-02-07T11:00:20-05:00February 7th, 2024|Cyber Defense|

Report: Two-Thirds Of U.S. Adults Received Notice Personal Data Compromised

NEW YORK - Americans largely understand the risks of using the internet – identity theft, spam, phishing, loss of personal or financial information, and more. Yet a relatively small percentage are taking steps recommended by experts to protect their data, such as using password managers to set strong passwords or pursuing credit monitoring after a

By |2024-01-24T12:33:56-05:00January 24th, 2024|Cyber Defense|

Artificial Intelligence Gives Hackers New Ways To Hack You

NEW YORK - Artificial intelligence has become a game changer in many areas of our daily lives, including cybersecurity. With the rising use of new AI-driven tools like ChatGPT, the number of cyberattacks has doubled and became more sophisticated. Cybersecurity experts say that AI-powered cybersecurity tools could help protect your privacy in the new reality, but

By |2024-01-07T14:09:55-05:00January 7th, 2024|Artificial Intelligence, Cyber Defense|

Hackers Use AI To Bypass Biometrics Security

NEW YORK - Hackers are hard at work using advances in artificial intelligence (AI) and other technologies to overcome the biometric defenses increasingly being deployed by banks. This is according to law firm Backer McKenzie, which asked three experts about the use of biometrics in finance: Elizabeth Roper, partner at Baker McKenzie; Chris Allgrove, director

By |2023-11-26T13:35:03-05:00November 26th, 2023|Artificial Intelligence, Cyber Defense|

University of Michigan Discloses 230,000 People Impacted By August Data Breach

ANN ARBOR - Hackers gained access to the personal information of up to 230,000 individuals through certain University of Michigan systems from Aug. 23 to Aug. 27, a UM spokesperson said Monday, the first the university has described the impact of the security breach. The unauthorized third party was able to access personal information about

By |2023-10-24T17:27:28-04:00October 24th, 2023|Cyber Defense, Featured|

New CodeDefender Challenge To Test Cyber Business Vulnerabilities

MIAMI –  ThriveDX, the global leader in cybersecurity training and awareness, announced a new partnership between its Kontra Application Security Training and JustCode, a state-of-the-art technology skills assessment platform, to launch the CodeDefender Challenge. This exercise is designed to allow businesses of all sizes and practitioners of all skill levels to assess their secure code

By |2023-10-23T10:36:46-04:00October 23rd, 2023|Cyber Defense|

WormGPT: ChatGPT Rival With No Ethical Limits

ANN ARBOR - Experts have been warning that large language models such as OpenAI's ChatGPT can be leveraged for nefarious ends by using them for tasks like cranking out phishing emails at incredible scale. Now, the barrier for entry has gone even lower with the arrival of a ChatGPT-like artificial intelligence bot that you can easily prompt to create

By |2023-07-19T08:56:40-04:00July 19th, 2023|Artificial Intelligence, Cyber Defense, Featured|

Cyber Patriot Year End Update With Tamara Shoemaker

DETROIT - Cyber Patriot is a cyber training program for not only grade-school students, but also senior citizens who want to use the Internet to keep in touch with their children and grandchildren. Plus Michigan Director Tamara Shoemaker works with auto companies to teach engineers how to design vehicles that won't get hacked. Tamara answer

By |2022-12-11T16:01:23-05:00December 11th, 2022|Cyber Defense, mitechtv|

Common Software Vulnerabilities Of 2023 and How to Prevent Them

Software security threats and vulnerabilities result in disastrous security compromises. The victims of these compromises vary from individuals, companies, and government secrecy agencies. The frustrating aspect of common software vulnerabilities is that they often manifest themselves in a concealed manner that software developers cannot trace, detect, and mitigate. But even more alarming is the increased

By |2022-12-12T11:00:12-05:00December 8th, 2022|Guest Columns|

Computers Can Become Infected By Malware By Viewing Certain Images

DETROIT - New evidence has emerged that shows it may now be possible that your computer can become infected by malware simply by viewing PNG images. Researchers have found that the files can contain something called ‘threat actors’ that then deliver malicious payloads, as per Tech Radar. Reports show that a prevalent cyber threat actor called Worok is active at the

By |2022-11-28T18:11:53-05:00November 28th, 2022|Cyber Defense|