Here’s a story about how IBM apparently asked a security researcher (Maurizio Agazzini) to pull their exploit code after working with that researcher to address vulnerabilities in some IBM software: http://www.zdnet.com/article/ibm-pressures-security-researchers-vulnerability-exploit-code-pulled. As a security researcher myself, I just want to say “good job”
Love innovative products that are simple and elegant. Check out this idea of a rotating CVV code on the back of credit cards called Motion Code: http://www.zdnet.com/article/this-number-changing-credit-card-may-help-eliminate-fraud. Definitely would help with online fraud (where when you purchase something it asks you
Love it — just read this story about Apple submitting a patent for a technique for capturing the fingerprints and photos of thieves in the event an iPhone is stolen. http://www.zdnet.com/article/apple-patents-technique-for-grabbing-iphone-thieves-fingerprints-and-photo This makes me happy 🙂 –Kevin
Panasonic is the newest major player that has joined the bug bounty industry according to http://www.zdnet.com/article/panasonic-launches-big-bounty-program. The bug bounty will focus on avionics, in particular the in-flight entertainment systems. Which is interesting, because those systems are supposed to be completely air-gapped and
Fiat-Chrysler is encouraging hackers to hack their vehicles and responsibly report security findings to them. If it’s a legitimate security vulnerability they’ll pay you $1500. Tesla will pay you $10k. Check out the article from Patch at http://patch.com/michigan/rochester/fiat-chrysler-wants-be-hacked-automaker-will-pay-1-500. The money is one
Netflix and Facebook recently forced reset certain accounts due to the MySpace, LinkedIn and Tumblr hacks, and that it was found that users were using the same passwords everywhere. The big gorilla-in-the-room-lesson-learned here: don’t re-use passwords. I get it, manually
This one came across the desk today, TeamViewer confirms extent of their recent hack. This one is going to be an interesting one, because I know of many, let’s just say ‘high-valued targets’, that use this remote control and desktop sharing
IronBox specializes in Internet security, data protection and application security. Our team members are recognized security experts that have helped protect some of the industry’s highest value and most targeted data.
Delighting customers with premium data protection, prompt support and easy-to-use software services is our passion.