The Federal Bureau of Investigation recently cracked a locked iPhone in order to procure evidence against one of the San Bernardino shooters. Now, the FBI is refusing to inform Apple how it accomplished this. In this post, I’d like to discuss the implications of the tension between the FBI and Apple, as well as whether the FBI iPhone hack falls under ethical hacking.
Verizon recently released the 2016 Verizon Data Breach Investigations Report. The Verizon Data Breach Investigations Report (DBIR) is an annual publication that provides an analysis of information security incidents, focusing on data breaches. As an active member in the security community I look forward to this report annually. While reading this year’s release, I discovered a hidden message! Read more »
Chances are that unless you are a hermit or have turned yourself into an air-gapped server, you have heard the term “DROWN” kicking around cyberspace. I know that when I see article after article stating that 11 million HTTPS websites are at risk, I tend to get bright-eyed and bushy-tailed. Let’s take a closer look at DROWN and see if your server should be added to that growing list.
NetFlow Security Analytics
Detecting threats and intrusions on your network is an ongoing, evolving process/battle. Keeping up with NetFlow Security Analytics is something we strive for with each rendition of Scrutinizer. Our algorithms were engineered to effectively identify security breaches, suspicious behavior and provide timely incident response. Read below for some of our latest additions.
Read more »
Technical Support Specialist
For a free 30 day trial of Scrutinizer, Download Now!