The IronBox Team Blog

Video: Watch how easy it is for someone to hack your iPhone

Here’s a pretty good article/video on how easy it is for someone to hack your mobile device (in this example they used an iPhone, but really any mobile device is susceptible to similar attacks). I think there’s definite value for

Read More

The Apple Issue as Explained by John Oliver

A friend sent this to me, and it’s a very good (and comical) summary of why the Apple and FBI case is creating the stir that it is.

Read More

Um … Awesome?

Normally when you report something like “2015 surpassed all of … ” that’s good news, but not in this case. Risk-Based Security reported that in 2015 the number of reported data breaches experienced that year surpassed all of the previous

Read More

Snapchat’s Employee Data Stolen

Last Friday someone sent a phishing attack email to one of Snapchat’s payroll department employees impersonating their CEO Even Spiegel requesting for employee information. That employee complied and sent the attacker information on 700 current and former employees. One thing

Read More

The “Software Equivalent of Cancer”

I like the way Apple’s CEO, Tim Cook, recently described the situation of why Apple is choosing not to unlock the iPhone used by the San Bernardino terrorist Syed Farook — he called it the “software equivalent of cancer” in

Read More

Hacker Publishes the Personal Info of 20k FBI Agents and 9K DHS Employees

Yikes, looks like a hacker was able to compromise the databases of a the United States FBI and DHS according to an article from VICE. It’s easy to throw rocks at the US government, but I feel for the them, I

Read More

Apple and the San Bernadino Case

So most of you have probably already seen the news about the US government asking Apple to making it’s iOS devices easier to hack into and Apple not complying. Apple posted this letter to customers a few days ago that

Read More

Microsoft Careers Database Exposed by Vendor

Microsoft’s mobile career website database was left exposed according to this article. This time it wasn’t Microsoft’s fault, but rather a vendor they were using to develop and host the site. And nearly almost every vulnerability scanner out there would have

Read More

2016 Data Protection Minimum Checklist: What to Ask Your Vendor if We Were You

Last week I wrote about the Absolute Basics of Protecting Data for 2016. If protecting data isn’t your area of expertise, luckily it’s ours. Here’s a checklist of the minimum things you should ask your vendors in 2016 about how

Read More

The Absolute Basics of Protecting Data in 2016

Whether you choose our data protection products or someone else’s, here are the boiled-down-no-marketing-basic things that you need to know about protecting data in 2016: Which encryption technology is used: Data encryption is the process of scrambling data so that it is

Read More