Monthly Archives: March 2016
Verizon’s “Data breach digest. Scenarios from the field.” document includes a description of a successful attack on a water utility running on an “AS/400” (a.k.a. IBM i.) It describes how a suspected Syrian “hacktivist” group broke into an IBM i … Continue reading
Lately I’ve found myself wondering…. does the FBI really need Apple’s help to decrypt a bad guy’s iPhone? Something seems fishy about the dust up between the FBI and Apple over the encrypted iPhone previously used by one of the … Continue reading