The BYOD – Trend Continues to Grow

By Michelle Drolet . 2 Jul 2012

Like it or not, the line between the workplace and the home is blurring. Work-at-home arrangements are becoming more common and cloud services make it easier to coordinate teams online. People are constantly on call, with the ability to check their emails and stay in touch wherever they are. The days of having a personal … Continue reading The BYOD – Trend Continues to Grow

Photo.zip – Stolen nude photos and police investigations

By Michelle Drolet . 27 Jun 2012

Cybercriminals are attempting to infect the computers of internet users, via a spammed-out email that has a malware-infected file attached.  Computer users are being warned to be wary of email messages which suggest they contain nude photographs of girlfriends, or claim that they have been reported to the police, as the attached file (Photo.zip) really … Continue reading Photo.zip – Stolen nude photos and police investigations

Library file in certain Android Apps connects C&C servers

By Michelle Drolet . 14 Jun 2012

TrendMicro has uncovered certain Android apps (detected as ANDROIDOS_BOTPANDA.A) containing a malicious library file, which when executed, renders the infected device as a zombie device that connects to specific command and control (C&C) servers. What is also noteworthy about this file is that it hides its routines in the dynamic library, making it difficult to … Continue reading Library file in certain Android Apps connects C&C servers

Patch as Patch Can: All Software Is Flawed

By Michelle Drolet . 29 May 2012

Many IT departments have weak patching processes – especially on the client-side. And it’s no wonder – patching is tough. Across all industries and platforms, the Window of Exploit (WOE) – that is, the time lag between announced discovery and the availability of a patch – for web-based vulnerabilities is a whopping 233 days, according … Continue reading Patch as Patch Can: All Software Is Flawed

Beware the wild west of Web applications

By Michelle Drolet . 2 May 2012

Web applications – particularly those facilitating collaboration and communication – are a boon to sales, marketing and productivity. Teams work together more effectively, salespeople enjoy better leads and marketing tools and customer service reps can more closely connect with those they serve. All of these gains, though, come at a cost: risk. By their very … Continue reading Beware the wild west of Web applications

U.S. Outgunned in Hacker War

By Michelle Drolet . 28 Mar 2012

There was a recent article in the Wall Street Journal in which the top cyber cop Shawn Henry, spoke how we are loosing the battle with the hackers. At times the hackers can keep up us all night worrying about our networks, employee actions whether intentional or not, we need to remain vigilant and on … Continue reading U.S. Outgunned in Hacker War

Event: Don’t be a stooge when it comes to data security.

By Michelle Drolet . 12 Mar 2012

Join us for an unprecedented security event! Friday, April 13th, 8:00 am – AMC Movie Theatre Framingham, MA Join Towerwall, Trend Micro, Application Security Inc., Sophos, Varonis, Vormetric and WAVE for a brief presentation on data and network security followed by a free breakfast and screening of the world premiere movie: The Three Stooges. Click … Continue reading Event: Don’t be a stooge when it comes to data security.

Recommended Reading for Every Entrepreneur

By Michelle Drolet . 12 Mar 2012

Boston Business Journal asked Towerwall for required reading for every entrepreneur. Michelle Drolet recommends “The Power of Nice” by Linda Kaplan Thaler and Robin Koval. Nice companies have lower turnover and higher productivity. Click here to read the article.

IP Wars: Who’s The Real Enemy?

By Michelle Drolet . 20 Feb 2012

Thanks to the blackout of Wikipedia and the efforts of Google and Facebook, the federal bills known as SOPA (Stop Online Piracy Act) and PIPA (Protect IP Act) have been put on the back burner for revision. The actions last month by the three websites generated millions of protest emails against the controversial legislation. But … Continue reading IP Wars: Who’s The Real Enemy?

Can you stamp out spambots? No, but you can help

By Michelle Drolet . 16 Feb 2012

The headline reads, “FBI warns of new malware targeting bank accounts,” but it could just as well say, “More new victims born from opening emails.” From the simple act of opening an email and clicking on an attachment, the victim’s username and password to their bank accounts are stolen by a process called keylogging, where … Continue reading Can you stamp out spambots? No, but you can help

Tags