Hacking a powered-off iPhone: vulnerabilities never sleep

Hacking a powered-off iPhone: vulnerabilities never sleep

Hacking a powered-off iPhone: vulnerabilities never sleep . Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible. Researchers from the Secure Mobile Networking Lab at the University of Darmstadt, Germany, have...
Catch Up with Forcepoint at RSAC 2022

Catch Up with Forcepoint at RSAC 2022

Alot of us here at Forcepoint look forward to the annual RSA Conference – particularly this year as it is back in person! Once again, we’ll be on the show floor in the North Expo of the Moscone Center (Booth N-5965) and on the 4th floor of the nearby St. Regis Hotel....
Dark Data: Out of Sight, Out of Mind

Dark Data: Out of Sight, Out of Mind

Businesses are creating and collecting more data than ever. Far too much of this data is saved and stored – on file shares, network drives, and cloud services – “just in case” it happens to be needed later. Shockingly, upwards of 70 percent of this data holds no...
What is USB Blocker and How Do You Use It?

What is USB Blocker and How Do You Use It?

What is USB Blocker and How Do You Use It? Posted byAndrada Coos February 22, 2022Posted inData Loss Prevention Device Control USB flash drives have been the root cause of some of the biggest data breaches of the last twenty years. USBs are not only easy to lose,...