What You Need to Know About This New Bank Account Threat

By Michelle Drolet . 19 Dec 2014

Sophos Researcher James Wyke recently did an analysis of the malware Vawtrak. He found that Vawtrak has been targeting financial institutions, especially banks. Vawtrak injects a DLL code into the targeted bank’s website, which allows a bypass of the victim’s two-factor authentication and infects the victim with a mobile malware. The malware then automatically transfers … Continue reading What You Need to Know About This New Bank Account Threat

The 4 Es of Enterprise Security

By Michelle Drolet . 15 Dec 2014

Building a solid security program takes time. Every organization is different. It’s very important to assess your technology, and consider both internal and external threats. An assessment will reveal vulnerabilities. The remediation process will help you take full advantage of your existing security assets and point you at any gaps that need filling. Even once … Continue reading The 4 Es of Enterprise Security

The Cybersecurity Skills Gap

By Michelle Drolet . 9 Dec 2014

The information security profession, which evolved largely in reaction to threats, is now paying the price of an entire “missing generation.” Companies are challenged finding pros with the combination of business and technical savvy that is needed to combat growing threats. Compounding this problem, educational institutions are not graduating enough students with the necessary skills … Continue reading The Cybersecurity Skills Gap

Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

By Michelle Drolet . 8 Dec 2014

The rise of malware seems to have passed some people by. As the ranks of cybercriminals grow and they find new ways to exploit our systems and steal our data, a lot of computer users and small-business owners have convinced themselves that it won’t happen to them. Here are five common excuses that explain why … Continue reading Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

Towerwall Security Alert V13.79 – How to clear out cookies, Flash cookies and local storage

By Michelle Drolet . 5 Dec 2014

by Mark Stockley This quick fix will show you how to clear out cookies and the cookie-like things that can be used to track you online. If you already know what cookies are all about then you can skip the next bit and go straight to the instructions. Why cookies are important Cookies are very small … Continue reading Towerwall Security Alert V13.79 – How to clear out cookies, Flash cookies and local storage

Build security into your app development

By Michelle Drolet . 17 Nov 2014

Integrate security testing into your dev process now or else face cyber-attacks later The way we develop software has been radically transformed in the last few years. Agility and speed are vital components for any company that wants to compete in the market. In order to achieve that it has proven necessary to break down … Continue reading Build security into your app development

Towerwall Information Security Update Vol 13.78 – 3 ways to make your Outlook.com account safer

By Michelle Drolet . 31 Oct 2014

3 ways to make your Outlook.com account safer by John Hawes   Following on from our detailed guide to securing your webmail, here’s a quick breakdown of how to make the most important fixes for users of Microsoft’s Outlook.com (formerly known as Hotmail and, for a while, Windows Live Hotmail). Controls affecting Outlook.com security are mainly found … Continue reading Towerwall Information Security Update Vol 13.78 – 3 ways to make your Outlook.com account safer

Towerwall’s Candy Alexander Receives 2014 ISSA Award for “Hall of Fame”

By Michelle Drolet . 28 Oct 2014

We are proud to announce that our own Candy Alexander will receive the ISSA “Hall of Fame” Award. See below for more information: Honoree to be Recognized Among RSA Founders at ISSA International Conference on Oct. 22 in Orlando BOSTON, MA–(Marketwired – Oct 9, 2014) –  Towerwall (www.towerwall.com), an IT security services provider for small … Continue reading Towerwall’s Candy Alexander Receives 2014 ISSA Award for “Hall of Fame”

More Devices, More Problems.

By Michelle Drolet . 6 Oct 2014

Check out this infographic for the numbers behind BYOD.

Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

By Michelle Drolet . 29 Sep 2014

By: Solange_Desc1 Security researchers have discovered a new software bug known as the “Bash Bug” or “Shellshock,” or to those more technically “in-the-know” as GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271)(link is external). This bug, more correctly termed, ‘vulnerability’, potentially allows attackers to gain control over targeted computers. The bug is present in a piece of computer … Continue reading Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

Tags