Another Successful Information Security Summit

By Michelle Drolet . 19 Jun 2015

Once again, the Information Security Summit hosted by Towerwall and MassBay was a resounding success. Hundreds of attendees and vendors participated in  diverse data security panels and networked with industry leaders and peers. The Summit opened with Michelle Drolet, CEO of Towerwall, and Shamsi Moussav, Computer Science Professor at MassBay Community College, presenting scholarships to … Continue reading Another Successful Information Security Summit

Data Privacy Alert Vol 13.83 – Anthem Healthcare Breach

By Michelle Drolet . 11 Feb 2015

secuProvided by William Gallagher Associates Insurance Brokers, Inc. News broke last week that Anthem, the nation’s second-largest health insurance carrier, was the victim of a data breach by external hackers. This breach affects both current and potentially former clients of Anthem. WGA is monitoring the situation on an ongoing basis, and here is what we … Continue reading Data Privacy Alert Vol 13.83 – Anthem Healthcare Breach

Data Privacy Alert Vol 13.82 – The GHOST vulnerability – what you need to know

By Michelle Drolet . 5 Feb 2015

The funkily-named bug of the week is GHOST. Its official moniker is the less catchy CVE-2015-0235, and it’s a vulnerability caused by a buffer overflow in a system library that is used in many, if not most, Linux distributions. A buffer overflow is where you assume, for example, that when you handle a four-byte network number written out as … Continue reading Data Privacy Alert Vol 13.82 – The GHOST vulnerability – what you need to know

Data Security Alert Vol 13.79 – The Top Hacks of the Year

By Michelle Drolet . 5 Jan 2015

As we approach the end of the year, let’s have a look back at the top hacking incidents of 2014. This year, we might have witnessed the most damaging attack of the decade. It will not be easy beating the Sony attack. SONY On November 24th all of Sony Pictures employees’ computer screens started showing a … Continue reading Data Security Alert Vol 13.79 – The Top Hacks of the Year

Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

By Michelle Drolet . 8 Dec 2014

The rise of malware seems to have passed some people by. As the ranks of cybercriminals grow and they find new ways to exploit our systems and steal our data, a lot of computer users and small-business owners have convinced themselves that it won’t happen to them. Here are five common excuses that explain why … Continue reading Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

Build security into your app development

By Michelle Drolet . 17 Nov 2014

Integrate security testing into your dev process now or else face cyber-attacks later The way we develop software has been radically transformed in the last few years. Agility and speed are vital components for any company that wants to compete in the market. In order to achieve that it has proven necessary to break down … Continue reading Build security into your app development

Towerwall Information Security Update Vol 13.78 – 3 ways to make your Outlook.com account safer

By Michelle Drolet . 31 Oct 2014

3 ways to make your Outlook.com account safer by John Hawes   Following on from our detailed guide to securing your webmail, here’s a quick breakdown of how to make the most important fixes for users of Microsoft’s Outlook.com (formerly known as Hotmail and, for a while, Windows Live Hotmail). Controls affecting Outlook.com security are mainly found … Continue reading Towerwall Information Security Update Vol 13.78 – 3 ways to make your Outlook.com account safer

Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

By Michelle Drolet . 29 Sep 2014

By: Solange_Desc1 Security researchers have discovered a new software bug known as the “Bash Bug” or “Shellshock,” or to those more technically “in-the-know” as GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271)(link is external). This bug, more correctly termed, ‘vulnerability’, potentially allows attackers to gain control over targeted computers. The bug is present in a piece of computer … Continue reading Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

1.2 billion logins scooped up by CyberVor hacking crew – what you need to do

By Michelle Drolet . 7 Aug 2014

Towerwall Application Security Alert Vol 13.73 Hackers have amassed a vast collection of stolen data, including 1.2 billion unique username/password pairs, by compromising over 420,000 websites using SQL injection techniques. Researchers monitored the gang for over seven months, thought to be “fewer than a dozen men in their 20s who know one another personally” based in … Continue reading 1.2 billion logins scooped up by CyberVor hacking crew – what you need to do

Towerwall Application Security Alert Vol 13.73

By Michelle Drolet . 6 Aug 2014

1.2 billion logins scooped up by CyberVor hacking crew – what you need to do   Hackers have amassed a vast collection of stolen data, including 1.2 billion unique username/password pairs, by compromising over 420,000 websites using SQL injection techniques. Researchers monitored the gang for over seven months, thought to be “fewer than a dozen men … Continue reading Towerwall Application Security Alert Vol 13.73

Tags