An app called InstaAgent was published for both iOS and Android that promised users to give them visibility into who’s viewed their profiles. The problem was the app was storing username and passwords and then sending them to a remote
Just read this article about the FBI getting hacked and that had two-factor authentication (2FA) been implemented at the FBI then it could have prevented the hacks against its own systems. No doubt about it, 2FA would have definitely helped. You
According to the White House Office Management and Budget department, the biggest information security risk to agencies is paper. Just great, because according to the article about 89% of businesses still use paper to store sensitive information … Enjoy the
Here’s an article from the folks over at Tripwire that report based on a survey that only about 53% of organizations require their suppliers and partners to pass security audits. Based on the organizations I’ve worked with, here are some
Not sure how much of this is accurate, but here’s an article on how the folks who did it was able to pull this off. If you have the option to do so, use 2-factor authentication. –Kevin
Talk Talk, a UK telecom, got hacked and received a ransom that put their 4 million customers personal data at risk. Dido Harding, Talk Talk’s Chief Executive Officer, has the right approach: assume that the worst case scenario has happened
Just read through this article called “Healthcare orgs fall short on software security” and had a couple thoughts to share. To start, I’ve been in penetration testing, application development security and research for over 15+ years now so I have
Wow, it’s great to see the problem of healthcare security and privacy get some of the spotlight (check out this article). Some of the key points from the article: Criminals are targeting healthcare, because healthcare records can fetch up to
If you’re on the road, here are some good cybersecurity tips to follow for travelers. I’d also add to sign up for a VPN service (ping us if you’d like some recommendations), it’ll help protect your network traffic when connected
Never mind the fact that the video shows an iPhone in all the video footage, but a security bug in the Android mobile phone code can allow the phone to get hacked by just listening to a specially crafted malicious
IronBox specializes in Internet security, data protection and application security. Our team members are recognized security experts that have helped protect some of the industry’s highest value and most targeted data.
Delighting customers with premium data protection, prompt support and easy-to-use software services is our passion.