IronBox specializes in Internet security, data protection and application security. Our team members are recognized security experts that have helped protect some of the industry’s highest value and most targeted data.
Delighting customers with premium data protection, prompt support and easy-to-use software services is our passion.
Video: Watch how easy it is for someone to hack your iPhone
Here’s a pretty good article/video on how easy it is for someone to hack your mobile device (in this example they used an iPhone, but really any mobile device is susceptible to similar attacks). I think there’s definite value for
Um … Awesome?
Normally when you report something like “2015 surpassed all of … ” that’s good news, but not in this case. Risk-Based Security reported that in 2015 the number of reported data breaches experienced that year surpassed all of the previous
Snapchat’s Employee Data Stolen
Last Friday someone sent a phishing attack email to one of Snapchat’s payroll department employees impersonating their CEO Even Spiegel requesting for employee information. That employee complied and sent the attacker information on 700 current and former employees. One thing
The “Software Equivalent of Cancer”
I like the way Apple’s CEO, Tim Cook, recently described the situation of why Apple is choosing not to unlock the iPhone used by the San Bernardino terrorist Syed Farook — he called it the “software equivalent of cancer” in
Hacker Publishes the Personal Info of 20k FBI Agents and 9K DHS Employees
Yikes, looks like a hacker was able to compromise the databases of a the United States FBI and DHS according to an article from VICE. It’s easy to throw rocks at the US government, but I feel for the them, I
Apple and the San Bernadino Case
So most of you have probably already seen the news about the US government asking Apple to making it’s iOS devices easier to hack into and Apple not complying. Apple posted this letter to customers a few days ago that
Microsoft Careers Database Exposed by Vendor
Microsoft’s mobile career website database was left exposed according to this article. This time it wasn’t Microsoft’s fault, but rather a vendor they were using to develop and host the site. And nearly almost every vulnerability scanner out there would have
2016 Data Protection Minimum Checklist: What to Ask Your Vendor if We Were You
Last week I wrote about the Absolute Basics of Protecting Data for 2016. If protecting data isn’t your area of expertise, luckily it’s ours. Here’s a checklist of the minimum things you should ask your vendors in 2016 about how
The Absolute Basics of Protecting Data in 2016
Whether you choose our data protection products or someone else’s, here are the boiled-down-no-marketing-basic things that you need to know about protecting data in 2016: Which encryption technology is used: Data encryption is the process of scrambling data so that it is
These Companies Lost Your Data in 2015
Great little roundup from ZDNet of some of the notable data breaches in 2015. Sad that data breaches are so common these days. http://www.zdnet.com/pictures/biggest-hacks-security-data-breaches-2015/ –Kevin