Vulnerability Scanning Capabilities
ITS Information Assurance (IA) conducts regular scans of all University of Michigan owned and managed networks. All U-M networks are scanned once every two months from within U-M network space and once every two months from a scanner positioned outside the university. The scans alternate, with one scan performed each month. Units enrolled in Tenable can also create their own scheduled and on-demand scans as detailed below.
An A.I. Granny Is Phone Scammers’ Worst Nightmare
Date
Source
The New York Times
Categories
Fraud, Scams & Disinformation
How to Add Extra Security Layers to Your Phone or Tablet
Date
Source
The New York Times
Categories
Tips & Advice
U.K. Competition Watchdog Recommends Investigating Apple, Google Mobile Ecosystems
Date
Source
The Wall Street Journal
Categories
Laws, Regulations & Compliance
Technology Impact
Vulnerability to financial scams in aging adults could be an early indicator of Alzheimer’s disease, new research shows
Date
Source
The Conversation
Categories
Fraud, Scams & Disinformation
Technology Impact
Generative AI: Separating Hype From Reality
Date
Source
The Wall Street Journal
Categories
Technology Impact
AI harm is often behind the scenes and builds over time – a legal scholar explains how the law can adapt to respond
Date
Source
The Conversation
Categories
Technology Impact
Musk Unleashes Online Army on Federal Workers. ‘A Tough Way to Find Out She’s Losing Her Job.’
Date
Source
The Wall Street Journal
Categories
Technology Impact