How to Expose Cyber-Attacks and Combat Threats

By Michelle Drolet . 31 Oct 2013

Published by Michele Drolet, CEO of Towerwall Proper analysis will flag suspicious behavior and allow the IT department to assess the threat and take action to close it down Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don’t have the protection they really need to safeguard … Continue reading How to Expose Cyber-Attacks and Combat Threats

Towerwall Information Security Alert Vol 13.50 – Making phishing more complex – on purpose

By Michelle Drolet . 25 Oct 2013

Earlier this week a colleague pointed out an intriguing phishing sample that he had come across. It was interesting not because of any great sophistication or complexity, but rather that it illustrated the reuse of an old social engineering trick. The brand being targeted in the phish campaign is Poste Italiane, a well-known Italian group … Continue reading Towerwall Information Security Alert Vol 13.50 – Making phishing more complex – on purpose

Critical fixes for Office, Outlook and IE in September Patch Tuesday

By Michelle Drolet . 11 Sep 2013

Windows admins will have their hands full with the large number of security updates in this month’s Patch Tuesday. There are fixes for 47 vulnerabilities in 13 bulletins for September’s Patch Tuesday cycle. Four of this month’s bulletins are critical. This year’s total for bulletins is up to 79, a considerable increase from 62 at … Continue reading Critical fixes for Office, Outlook and IE in September Patch Tuesday

First malicious apps to exploit critical Android bug found in the wild

By Michelle Drolet . 29 Jul 2013

Researchers have spotted the first in-the-wild apps to exploit a critical Android vulnerability allowing attackers to inject malicious code into legitimate programs without invalidating their digital signature. The two apps, distributed on unofficial Android marketplaces in China, help people find doctors and make appointments, according to a blog post published Tuesday by researchers from security … Continue reading First malicious apps to exploit critical Android bug found in the wild

Four Steps to Respond & Recover from Sophisticated Security Attacks

By Michelle Drolet . 29 Jul 2013

Great information in SC Magazine’s latest whitepaper report, ‘Four steps to respond and recover from sophisticated security attacks’, it discusses the four proactive steps that you can – and should – take now to help keep your organization safe. Click here to view more details: http://bit.ly/131uu2J As we all know, cyber-attacks are becoming more sophisticated … Continue reading Four Steps to Respond & Recover from Sophisticated Security Attacks

Views from the Inside: Is your data safe with free cloud services? (guest post)

By Michelle Drolet . 12 Jul 2013

The overwhelming advantages of cloud-based file storage are not in dispute. You have an automatic backup of your files, which can be accessed on any device, at any time. Small amounts of storage are generally free, and large swathes of server space are coming down in price all the time. They absolve your business from … Continue reading Views from the Inside: Is your data safe with free cloud services? (guest post)

New LinkedIn E-Mail Scam

By Michelle Drolet . 3 Jul 2013

Hi all, there is an e-mail scam doing the rounds. The message is an invite from some random person you won’t know with a link (how original). If you get such a message don’t use the link, check your LinkedIn account as if it’s a legit request it will be there waiting for approval. Even … Continue reading New LinkedIn E-Mail Scam

Introducing Towewall’s Alternative Cloud-based File Sharing Solutions

By Michelle Drolet . 27 Jun 2013

Towerwall is proud to offer our new Alternative Cloud-based File Sharing Solutions Cloud based file synchronization services have exploded. Organizations need to be able to provide a modern collaboration experience with the infrastructure that they’ve already invested in, and that they already know how to manage and protect. Watch the video below for more:     … Continue reading Introducing Towewall’s Alternative Cloud-based File Sharing Solutions

Tips for testing your mobile app security

By Michelle Drolet . 26 Jun 2013

Wherever an app originates from, it is vital that you can vouch for its security before it is circulated The enterprise has gone mobile and there’s no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The … Continue reading Tips for testing your mobile app security

Security Alert – Anonymous’ #OpPetrol: What is it, What to Expect, Why Care?

By Michelle Drolet . 26 Jun 2013

by Darin Dutcher (Threat Research) Last month, the hacker collective Anonymous announced their intention to launch cyber-attacks against the petroleum industry (under the code name #OpPetrol) that is expected to last up to June 20. Their claimed reason for this attack is primarily due to petroleum being sold with the US dollar instead of currency … Continue reading Security Alert – Anonymous’ #OpPetrol: What is it, What to Expect, Why Care?

Tags