Is Your Business Taking the Threat of Mobile Malware Seriously?

By Michelle Drolet . 30 Apr 2013

Don’t underestimate the damage that malware proprietors can unleash if the right security policies aren’t in place. Bring-your-own-device (BYOD) programs and cloud computing — two of the biggest enterprise trends from the last couple of years — go hand in hand. Employees want to be given the latitude to use their smartphones for work, and … Continue reading Is Your Business Taking the Threat of Mobile Malware Seriously?

How to ensure mobile apps are secure for the enterprise

By Michelle Drolet . 12 Feb 2013

As the app revolution has gathered pace and smartphones and tablets have become ubiquitous, the importance of testing app security has grown. Many companies have embraced the BYOD trend. They may even have developed applications that enable employees to have 24/7 access to business data and tools. The benefits can be counted in productivity boosts … Continue reading How to ensure mobile apps are secure for the enterprise

Top 10 PHP Security Vulnerabilities

By Michelle Drolet . 23 Oct 2012

Security is not a list of things you do. Security is a way of thinking, a way of looking at things, a way of dealing with the world that says “I don’t know how they’ll do it, but I know they’re going to try to screw me” and then, rather than dissolving into an existential … Continue reading Top 10 PHP Security Vulnerabilities

Introducing Towerwall’s Threat Spotlight

By Michelle Drolet . 15 Oct 2012

We are proud to announce our Threat Spotlight, sign up for our Twitter feed and get the latest threats and how to protect against them.   Threat Spotlights as of October 15, 2012: AutoInf AutoInf is a component used by many malware families, notably Conficker, Sality and AutoRun. AutoInf is used to automatically run associated … Continue reading Introducing Towerwall’s Threat Spotlight

Library file in certain Android Apps connects C&C servers

By Michelle Drolet . 14 Jun 2012

TrendMicro has uncovered certain Android apps (detected as ANDROIDOS_BOTPANDA.A) containing a malicious library file, which when executed, renders the infected device as a zombie device that connects to specific command and control (C&C) servers. What is also noteworthy about this file is that it hides its routines in the dynamic library, making it difficult to … Continue reading Library file in certain Android Apps connects C&C servers

Tags