How to ensure mobile apps are secure for the enterprise

By Michelle Drolet . 12 Feb 2013

As the app revolution has gathered pace and smartphones and tablets have become ubiquitous, the importance of testing app security has grown. Many companies have embraced the BYOD trend. They may even have developed applications that enable employees to have 24/7 access to business data and tools. The benefits can be counted in productivity boosts … Continue reading How to ensure mobile apps are secure for the enterprise

Mobile Devices Get Means For Tamper-Evident Forensic Auditing

By Michelle Drolet . 5 Feb 2013

The convenience of mobile devices has led to their rapid proliferation in the work place. But along with that convenience come security and compliance issues contributing to the degeneration of trust. Risk management for mobile devices is of rising concern, particularly in highly regulated industries such as healthcare and finance. In order to detect security … Continue reading Mobile Devices Get Means For Tamper-Evident Forensic Auditing

Towerwall Security / Vulnerability Alert

By Michelle Drolet . 28 Jan 2013

Security researchers from the Vulnerability Lab have identified a serious security hole that could affect a number of companies which rely on Barracuda products. They’ve discovered a high severity validation filter and exception handling bypass vulnerability in Barracuda’s appliances. According to the experts, the input filter that’s designed to block out persistent input attacks is … Continue reading Towerwall Security / Vulnerability Alert

Warning: Java vulnerable to hackers, U.S. government says

By Michelle Drolet . 11 Jan 2013

Jan 11 (Reuters) – The U.S. Department of Homeland Security urged computer users to disable Oracle Corp’s (ORCL:$34.8625,$-0.0475,-0.14%) Java software, amplifying security experts’ prior warnings to hundreds of millions of consumers and businesses that use it to surf the Web. Hackers have figured out how to exploit Java to install malicious software enabling them to … Continue reading Warning: Java vulnerable to hackers, U.S. government says

Towerwall Security Alert 2013

By Michelle Drolet . 19 Dec 2012

As the year draws to a close, it’s time for us to take a step back, absorb the lessons of 2012, and look at what 2013 and beyond will bring for users, the security industry, and even cybercriminals. We know this time of year is incredibly busy and as a trusted advisor, you expect Towerwall … Continue reading Towerwall Security Alert 2013

Mobile Devices Get Means for Tamper-evident Forensic Auditing

By Michelle Drolet . 11 Dec 2012

Providing early evidence of tampering can shorten investigation times for breaches and audits. The convenience of mobile devices has led to their rapid proliferation in the workplace. But along with that convenience comes security and compliance issues contributing to the degeneration of trust. Risk management for mobile devices is of rising concern, particularly in highly … Continue reading Mobile Devices Get Means for Tamper-evident Forensic Auditing

Fake PayPal Emails Distributing Malware

By Michelle Drolet . 31 Oct 2012

Everyday there is a new threat with seemingly innocent emails being sent out that look close to an official correspondence from a company, from Paypal, ADP and BBB – to name a few. Cybercriminals are mimicking the online payment processor PayPal in a malicious spam campaign that attempts to dupe customers into downloading malware from … Continue reading Fake PayPal Emails Distributing Malware

Top 10 PHP Security Vulnerabilities

By Michelle Drolet . 23 Oct 2012

Security is not a list of things you do. Security is a way of thinking, a way of looking at things, a way of dealing with the world that says “I don’t know how they’ll do it, but I know they’re going to try to screw me” and then, rather than dissolving into an existential … Continue reading Top 10 PHP Security Vulnerabilities

Dealing with Phishing Messages

By Michelle Drolet . 18 Oct 2012

According to the article in Dark Reading,  Study: Phishing Messages Elude Filters, Frequently Hit Untrained Users, many people are still being tripped up by phishing emails. The article summarizes the findings of a survey that was conducted at the Black Hat USA security conference held in July 2012. Of the 250 conference attendees that were polled, … Continue reading Dealing with Phishing Messages

Introducing Towerwall’s Threat Spotlight

By Michelle Drolet . 15 Oct 2012

We are proud to announce our Threat Spotlight, sign up for our Twitter feed and get the latest threats and how to protect against them.   Threat Spotlights as of October 15, 2012: AutoInf AutoInf is a component used by many malware families, notably Conficker, Sality and AutoRun. AutoInf is used to automatically run associated … Continue reading Introducing Towerwall’s Threat Spotlight

Tags