Here’s a story about how IBM apparently asked a security researcher (Maurizio Agazzini) to pull their exploit code after working with that researcher to address vulnerabilities in some IBM software: http://www.zdnet.com/article/ibm-pressures-security-researchers-vulnerability-exploit-code-pulled. As a security researcher myself, I just want to say “good job”
Love innovative products that are simple and elegant. Check out this idea of a rotating CVV code on the back of credit cards called Motion Code: http://www.zdnet.com/article/this-number-changing-credit-card-may-help-eliminate-fraud. Definitely would help with online fraud (where when you purchase something it asks you
Love it — just read this story about Apple submitting a patent for a technique for capturing the fingerprints and photos of thieves in the event an iPhone is stolen. http://www.zdnet.com/article/apple-patents-technique-for-grabbing-iphone-thieves-fingerprints-and-photo This makes me happy 🙂 –Kevin
Panasonic is the newest major player that has joined the bug bounty industry according to http://www.zdnet.com/article/panasonic-launches-big-bounty-program. The bug bounty will focus on avionics, in particular the in-flight entertainment systems. Which is interesting, because those systems are supposed to be completely air-gapped and
Fiat-Chrysler is encouraging hackers to hack their vehicles and responsibly report security findings to them. If it’s a legitimate security vulnerability they’ll pay you $1500. Tesla will pay you $10k. Check out the article from Patch at http://patch.com/michigan/rochester/fiat-chrysler-wants-be-hacked-automaker-will-pay-1-500. The money is one
IronBox specializes in Internet security, data protection and application security. Our team members are recognized security experts that have helped protect some of the industry’s highest value and most targeted data.
Delighting customers with premium data protection, prompt support and easy-to-use software services is our passion.