Here’s a pretty good article/video on how easy it is for someone to hack your mobile device (in this example they used an iPhone, but really any mobile device is susceptible to similar attacks). I think there’s definite value for
A friend sent this to me, and it’s a very good (and comical) summary of why the Apple and FBI case is creating the stir that it is.
Normally when you report something like “2015 surpassed all of … ” that’s good news, but not in this case. Risk-Based Security reported that in 2015 the number of reported data breaches experienced that year surpassed all of the previous
Last Friday someone sent a phishing attack email to one of Snapchat’s payroll department employees impersonating their CEO Even Spiegel requesting for employee information. That employee complied and sent the attacker information on 700 current and former employees. One thing
I like the way Apple’s CEO, Tim Cook, recently described the situation of why Apple is choosing not to unlock the iPhone used by the San Bernardino terrorist Syed Farook — he called it the “software equivalent of cancer” in
Yikes, looks like a hacker was able to compromise the databases of a the United States FBI and DHS according to an article from VICE. It’s easy to throw rocks at the US government, but I feel for the them, I
So most of you have probably already seen the news about the US government asking Apple to making it’s iOS devices easier to hack into and Apple not complying. Apple posted this letter to customers a few days ago that
Microsoft’s mobile career website database was left exposed according to this article. This time it wasn’t Microsoft’s fault, but rather a vendor they were using to develop and host the site. And nearly almost every vulnerability scanner out there would have
Last week I wrote about the Absolute Basics of Protecting Data for 2016. If protecting data isn’t your area of expertise, luckily it’s ours. Here’s a checklist of the minimum things you should ask your vendors in 2016 about how
Whether you choose our data protection products or someone else’s, here are the boiled-down-no-marketing-basic things that you need to know about protecting data in 2016: Which encryption technology is used: Data encryption is the process of scrambling data so that it is
IronBox specializes in Internet security, data protection and application security. Our team members are recognized security experts that have helped protect some of the industry’s highest value and most targeted data.
Delighting customers with premium data protection, prompt support and easy-to-use software services is our passion.