The IronBox Team Blog

Instagram Stealing App, InstaAgent, Yanked

An app called InstaAgent was published for both iOS and Android that promised users to give them visibility into who’s viewed their profiles. The problem was the app was storing username and passwords and then sending them to a remote

Read More

Two-Factor is Still Missing …

Just read this article about the FBI getting hacked and that had two-factor authentication (2FA) been implemented at the FBI then it could have prevented the hacks against its own systems. No doubt about it, 2FA would have definitely helped. You

Read More

The Biggest Information Security Risk is … Paper? Say What!?

According to the White House Office Management and Budget department, the biggest information security risk to agencies is paper.  Just great, because according to the article about 89% of businesses still use paper to store sensitive information … Enjoy the

Read More

Barely Half of Organisations Require Suppliers and Partners to Pass Security Audits

Here’s an article from the folks over at Tripwire that report based on a survey that only about 53% of organizations require their suppliers and partners to pass security audits. Based on the organizations I’ve worked with, here are some

Read More

How John Brennan’s, CIA Director, Personal Email Got Hacked

Not sure how much of this is accurate, but here’s an article on how the folks who did it was able to pull this off.  If you have the option to do so, use 2-factor authentication. –Kevin  

Read More

Talk Talk Data Breach and Ransom

Talk Talk, a UK telecom, got hacked and received a ransom that put their 4 million customers personal data at risk. Dido Harding, Talk Talk’s Chief Executive Officer, has the right approach: assume that the worst case scenario has happened

Read More

What You Need to Know the Next Time You Read Another “Healthcare Security” Article

Just read through this article called “Healthcare orgs fall short on software security” and had a couple thoughts to share. To start, I’ve been in penetration testing, application development security and research for over 15+ years now so I have

Read More

Biggest Challenge for Healthcare: Security and Privacy

Wow, it’s great to see the problem of healthcare security and privacy get some of the spotlight (check out this article). Some of the key points from the article: Criminals are targeting healthcare, because healthcare records can fetch up to

Read More

Cybersecurity Tips for Business Travelers

If you’re on the road, here are some good cybersecurity tips to follow for travelers.  I’d also add to sign up for a VPN service (ping us if you’d like some recommendations), it’ll help protect your network traffic when connected

Read More

Android Song Hack

Never mind the fact that the video shows an iPhone in all the video footage, but a security bug in the Android mobile phone code can allow the phone to get hacked by just listening to a specially crafted malicious

Read More