Archives for Security

Podcast 1806 Falcon Super Heavy Soars and Meteorites Fall on Michigan

[vc_row][vc_column][vc_images_carousel images=”15026,15029,15030,15032,15033,15034,15013″ img_size=”medium” autoplay=”yes” wrap=”yes”][vc_separator color=”black” border_width=”5″][vc_cta h2=”Click the menu below to make sure that you get this week’s podcast. Clicking on the link at the bottom of this page or Subscribing to Internet Advisor Podcast Feed at iTunes or with your favorite podcast app will get you our show. “]

[/vc_cta][vc_separator color=”black” border_width=”5″][vc_column_text]

Show Notes:

Hour 1: Publicity Stunt or Historic First Step

 

Joining us today to talk about the Space X Heavy Falcon launch and its historic impact are a team of three experts from the aeronautics field.

Richard Stiennon may surprise you as a member of this panel but he received his BS from the University of Michigan in Aerospace Engineering before becoming the international cybersecurity expert and author. Richard will be with us as a guest expert for the whole show.

 

 

 

 

Patrick Stiennon , a patent lawyer in Madison, WI, was another surprise guest.  Patrick, however, has extensive knowledge and experience in the design of …


Read More

Podcast 1638: Dress Up Day, Yahoo’s Blowout, Tesla Sues Michigan and Mike Ammann Tours Facebook

[vc_row][vc_column][vc_single_image image=”13087″ img_size=”full” add_caption=”yes” alignment=”center” title=”IA Crew 2016 Sporting New Shirts”][vc_separator color=”black” border_width=”3″][vc_cta h2=”Click below to listen to this week’s full two hour podcast.”]

Five Ways to listen to our weekly podcast.

  1. Click here to listen to this week’s podcast
  2. Clicking on the link at the bottom of this page
  3. Subscribe to “Internet Advisor Podcast Feed”  on iTunes
  4. Use your favorite Podcast App or
  5. Find our shows at Podcast Detroit
[/vc_cta][vc_separator color=”black” border_width=”3″][vc_column_text]yahoo-spooky

Yahoo announced this week that it had suffered a breach of 500,000 usernames and passwords….wait for it….in 2014!

 

Interworks logo

Caston ThomasCaston Thomas, The Chuck Norris of Securing & Managing Mobile & Networks, is the CEO of InterWorks Technology,  a computer and security company based in Rochester, MI. Mr. Thomas tackles questions like: Why did Yahoo wait two years?  They claim that this was a “state sponsored attack” but where is the proof?  

Listen to the conversation here:1638-yahoo-break-in-caston-thomas [/vc_column_text][vc_separator color=”black” border_width=”3″][vc_column_text]iot


cal-headshot-9-24-16Cal Carson
, one of our tech experts, is on a mission:  He wants to see how many different devices he can connect in his home through the Internet of Things (IoT)  This could include a Nest Thermostat, LED lights, a remote


Read More

Microsoft to add ‘enterprise grade’ biometric security to Windows 10

Summary:At the WinHEC conference in China today, Microsoft showed off a new biometric authentication feature called Windows Hello. The ambitious technology, which uses fingerprint and iris recognition to replace passwords, will debut in Windows 10 devices later this year.

red-hand.jpg

For years, biometric authentication has been a sci-fi staple. Bits and pieces of biometric technology already exist in popular technology, most notably the TouchID fingerprint sensors used on late-model iPhones and iPads.

With Windows 10, coming later this fall, Microsoft plans to go big with biometric technology. The new OS will introduce system support for biometric authentication, the company says, “using your face, iris, or fingerprint to unlock your devices … with technology that is much safer than traditional passwords.”

At the WinHEC conference in China today, Microsoft executives showed off the new feature, called Windows Hello. At first glance, it sounds like Microsoft’s response to TouchID — biometric authentication that can use a fingerprint reader, illuminated IR sensor, or other biometric sensor to provide instant access to a Windows 10 device. Show your face or touch a finger, Microsoft says, and you’ll be


Read More

TrustPipe Offers New Security Solution for $5/Year

There are four key metrics for evaluating computer security solutions; TrustPipe provides greater than 10X improvements across all four:

  1. ACCURACY — In years of testing and real-world usage, there have been zero false positives (acceptable traffic blocked) and zero false negatives: no device protected by TrustPipe has eversuffered a remote root compromise. (but…)
    We’ve caught every “zero-day” event (a “new” attack vector) since we began testing – even ones no other technology detected. (but…)
    We are unaware of any other technology that can support these claims.
  2. EFFICIENCY — TrustPipe’s footprint is actually more than two orders of magnitude smaller than traditional solutions. And its impact on overall system performance is nearly undetectable.
  3. RESILIENCE — TrustPipe automatically adapts to changes in the threat environment, in real time. Within minutes of detecting a true zero-day event, the entire global hive of TrustPipes is inoculated against it.
  4. COST — TrustPipe’s technology allows us to operate far more efficiently as a business. We do not require the teams of people most security technologies need to stay current. And by keeping the team small and focused, we didn’t have to raise the large amounts of capital most security companies require

Read More

Security for the Holidays

grinch-security

October 29, 2014

By Joel Rosenblatt
The holiday season is filled with opportunities for the Bad Guys to take advantage of people who are filled with the holiday spirit, out and about having a good time and letting their guard down.  Since I work at a university, I sometimes get asked to pass along tips to increase the awareness of how easy it is to be taken advantage of. Here are some of my “Seasons Greetings:”

Read full article


Read More

Five ways to keep your student's digital life safe

As students return to school, technology goes with them. That technology—and the data generated by it—is valuable not simply as a means for getting school work done, but also as entertainment for those brief hours between one assignment and the next. It’s for this reason that it pays to plan for disaster. With a single massive power burst, storage media that suddenly heads south, or interaction with a light-fingered ne’er-do-well, the technology your student depends on can vanish. Take these five tips to heart, however, and the loss of a device or data need not be catastrophic.

Click here for full article

 


Read More

Finally A Good Use for Touch ID:1Password

ZDNET

By Jason D. O’Grady for The Apple Core |

At WWDC14 Apple announced that it was opening up Touch ID to all developers.AgileBits, developer popular password vault 1Password, has demonstrated several promising new applications of the biometric fingerprint sensor built into the home button on the iPhone 5s.

In a blog post and accompanying video, AgileBits shows how Touch ID can be used to:

  1. unlock the 1Password app (replacing the master password)
  2. enter passwords in Safari (via the 1Password browser extension), and
  3. enter login credentials into third-party iOS apps (via the 1Password app extension)

Make no mistake about it, this is revolutionary. These three features alone make Touch ID a viable and powerful security technology, a generation ahead of the anemic unlock code and App Store purchases that Touch ID is limited to today.

Read Full Article


Read More

Bad USB

CNET Logo 

 for Between the Lines |

It’s a common scene from TV: Our hero sneaks into the villain’s office, plugs in a USB stick and — flash! — all the secret plans to conquer Chicago are sucked down into the thumb-drive. The only fiction is how fast it takes to download data. In the real world, office data thieves walk out with stolen data everyday on their flash drives.

Skull-Crossbones-USB
USB memory sticks may prove far more dangerous for your company than you’d ever imagined.

It could be worse. USB sticks can also carry malware. Or, as SRLabs security researchers Karsten Nohl and Jakob Lell propose to show at Black Hat, an ordinary USB pen drive can be turned into an automated hacking tool.

The base problem, according to the pair, is “USB has become so commonplace that we rarely worry about its security implications. USB sticks undergo the occasional virus scan, but we consider USB to be otherwise perfectly safe — until now.”

Read Full Article


Read More

Ebay Hacked!

(Reuters) – E-commerce company eBay Inc said hackers stole email addresses, birthdays and other identity information between late February and early March in a data breach that may have affected a “large number” of accounts.

In the latest major cyber attack at a U.S. company, eBay said it had found no evidence of unauthorized access to financial or credit card information, which is stored separately in encrypted formats.

Full Article

Thanks to Ed Rudel for lead


Read More

How to protect yourself in Heartbleed's aftershocks

heartbleed-200x242

By  for Networking |

Businesses should not only know about Heartbleed, they should have already implemented Heartbleed fixes by now.  If your bank, favorite online merchant, or software provider hasn’t yet, close your accounts and find new ones. That’s my first bit of advice on how users should handle Heartbleed.

Heartbleed really is that bad. Your user-ids, your passwords, your credit-card numbers, everything you place online is potentially in play for hackers. You can not fool around with this.

So, as I said earlier, get ready to change all your passwords. Yes, every last damn one of them. Were your favorite sites vulnerable? You can check specific sites with the Heartbleed testLastPass Heartbleed checker, or the Qualys SSL Labs test. The first two just check on Heartbleed while the last checks for other possible Secure-Socket Layer/Transport Layer Security (SSL/TLS) and awards sites a grade from A (the best) to F (failure).

Full Article


Read More