Build security into your app development

By Michelle Drolet . 17 Nov 2014

Integrate security testing into your dev process now or else face cyber-attacks later The way we develop software has been radically transformed in the last few years. Agility and speed are vital components for any company that wants to compete in the market. In order to achieve that it has proven necessary to break down … Continue reading Build security into your app development

Towerwall Information Security Update Vol 13.78 – 3 ways to make your Outlook.com account safer

By Michelle Drolet . 31 Oct 2014

3 ways to make your Outlook.com account safer by John Hawes   Following on from our detailed guide to securing your webmail, here’s a quick breakdown of how to make the most important fixes for users of Microsoft’s Outlook.com (formerly known as Hotmail and, for a while, Windows Live Hotmail). Controls affecting Outlook.com security are mainly found … Continue reading Towerwall Information Security Update Vol 13.78 – 3 ways to make your Outlook.com account safer

More Devices, More Problems.

By Michelle Drolet . 6 Oct 2014

Check out this infographic for the numbers behind BYOD.

Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

By Michelle Drolet . 29 Sep 2014

By: Solange_Desc1 Security researchers have discovered a new software bug known as the “Bash Bug” or “Shellshock,” or to those more technically “in-the-know” as GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271)(link is external). This bug, more correctly termed, ‘vulnerability’, potentially allows attackers to gain control over targeted computers. The bug is present in a piece of computer … Continue reading Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

Towerwall Application Security Alert Vol 13.73

By Michelle Drolet . 6 Aug 2014

1.2 billion logins scooped up by CyberVor hacking crew – what you need to do   Hackers have amassed a vast collection of stolen data, including 1.2 billion unique username/password pairs, by compromising over 420,000 websites using SQL injection techniques. Researchers monitored the gang for over seven months, thought to be “fewer than a dozen men … Continue reading Towerwall Application Security Alert Vol 13.73

Cork That App or Face Attack

By Michelle Drolet . 1 Aug 2014

Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they have been hacked at least once in the last two years. … Continue reading Cork That App or Face Attack

Test All Apps to Keep Hackers from Penetrating Castle Walls

By Michelle Drolet . 23 Jul 2014

Four major challenges when protecting apps and how to solve them Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they … Continue reading Test All Apps to Keep Hackers from Penetrating Castle Walls

Towerwall Security/Malware Alert Vol 13.72

By Michelle Drolet . 22 Jul 2014

When an international law enforcement action earlier this month knocked out theGameover botnet, one happy consequence was the takedown of the servers that the CryptoLocker ransomware needed in order to do its dirty work. Well, any celebration over CryptoLocker’s demise is certainly premature – encrypting ransomware is alive and well. With many victims paying up, ransomware is a … Continue reading Towerwall Security/Malware Alert Vol 13.72

CryptoLocker ransomware – learn what it is and how to prevent it

By Michelle Drolet . 1 Jul 2014

A new ransomware program, known as Cryptolocker, was identified recently. Ransomware can freeze your computer and ask you to pay a fee, but this malicious ransomware does more than just that. (You can use a anti-virus tool to remove the virus.) Cryptolocker is different from other ransomware due to the fact that it allows your … Continue reading CryptoLocker ransomware – learn what it is and how to prevent it

Towerwall and MassBay Host Another Successful Information Security Summit

By Michelle Drolet . 13 Jun 2014

Towerwall teamed up with MassBay Community College on May 29 to present the second annual Information Security Summit at MassBay’s Wellesley Hills campus from 8 a.m. to 1 p.m. Over 250 individuals attended the Summit where they interacted with industry experts and participated in various security panel discussions. After a presentation on the “Anatomy of a … Continue reading Towerwall and MassBay Host Another Successful Information Security Summit

Tags