Monthly Archives: March 2016

Verizon’s “Data breach digest. Scenarios from the field.” document includes a description of a successful attack on a water utility running on an “AS/400” (a.k.a. IBM i.)  It describes how a suspected Syrian “hacktivist” group broke into an IBM i … Continue reading

Posted in IBM i Security, Info Security Mgmt | Tagged , , , , | Leave a comment

Lately I’ve found myself wondering…. does the FBI really need Apple’s help to decrypt a bad guy’s iPhone? Something seems fishy about the dust up between the FBI and Apple over the encrypted iPhone previously used by one of the … Continue reading

Posted in IBM i Security, Security Breach | Tagged , , , , , | Leave a comment