Towerwall's InfoSec Blog

Content Type

See all

Library file in certain Android Apps connects C&C servers

Android , network security , Data Security , Security Regulations , threat landscape , Security Threat , Security Program , Security , cyber-attack , security policy , cybercriminals , Security Alert , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

TrendMicro has uncovered certain Android apps (detected as ANDROIDOS_BOTPANDA.A) containing a malicious library file, which when executed, renders the infected device as a zombie device that connects to specific command and control (C&C) servers. What is also noteworthy about this file is that it hides its routines in the dynamic library, making it difficult to analyze. The malicious library libvadgo contained in ANDROIDOS_BOTPANDA.A was developed via NDK and loaded using Java Native Interface.false

Patch as Patch Can: All Software Is Flawed

Patch as Patch Can: All Software Is Flawed

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Security , cyber-attack , security policy , cybercriminals , cybersecurity , Enterprise

Michelle Drolet

Many IT departments have weak patching processes - especially on the client-side. And it's no wonder - patching is tough. Across all industries and platforms, the Window of Exploit (WOE) - that is, the time lag between announced discovery and the availability of a patch - for web-based vulnerabilities is a whopping 233 days, according to WhiteHat Security. This leaves your organization exposed for an unacceptably long period of time. It may not be glamorous, but a meticulous patching program isfalse

U.S. Outgunned in Hacker War

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Security , Hackers , cyber-attack , security policy , cybercriminals , penetration testing , financial security , information security tips , Compliance , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

There was a recent article in the Wall Street Journal in which the top cyber cop Shawn Henry, spoke how we are loosing the battle with the hackers. At times the hackers can keep up us all night worrying about our networks, employee actions whether intentional or not, we need to remain vigilant and on the offensive to prevent attacks. Government regulations are not going to control hackers in fact they probably will make companies less secure. Vigilance on the part of organizations will helpfalse

Loss Of Customer Personal Information Damages Banks’ Credibility

network security , Security Services , security software , Data Security , ID Theft , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Security , Hackers , Cloud Security , cyber-attack , Compliance & Privacy , cybercriminals , Security Alert , information security tips , Compliance , security research , cybersecurity , Enterprise

Michelle Drolet

On Jan. 5, federal law enforcement seized several automobiles worth about $100,000 in value. They had belonged to the former president of the Massachusetts Bank and Trust Company and were taken as restitution for his defrauding the bank in 1997. It seems that not a day passes by when news of banking-related fraud, money laundering, or a privacy violation is reported. Last year in May, Bank of America sustained a $10-million loss when an insider sold the bank’s customer data to organizedfalse