Towerwall's InfoSec Blog

Content Type

See all

Another Successful Information Security Summit

passwords , Smart Device , Data Security , COSO Cube , IT Infrastructure , Government Compliance Regulations , Virtual CISO , Assessment , Mobile Devices , CISO , Information Security , Application Security , Mobile Apps , Information Security Summit , Hackers , cybercriminals , Compliance , cloud services , Big Data , Mobile Protection , Data Privacy , Mobile Security , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

Once again, the Information Security Summit hosted by Towerwall and MassBay was a resounding success. Hundreds of attendees and vendors participated in diverse data security panels and networked with industry leaders and peers. The Summit opened with Michelle Drolet, CEO of Towerwall, and Shamsi Moussav, Computer Science Professor at MassBay Community College, presenting scholarships to MassBay students Kirk Barge and Julius Newton. Michelle Drolet said,

Towerwall Security Alert V13.79 - How to clear out cookies, Flash cookies and local storage

HTTP , Linkedin , Web Storage , Cache , KISSmetrics , Data Security , DOM , Security Regulations , Twitter , Add-ons , Chrome , Cookies , eBay , Fingerprinting , Security Program , Information Security , Settings , Application Security , Security , HTML , Internet Explorer , LSO , Facebook , Private Browsing , Flash Cookies , Amazon , security policy , Gmail , Windows , Safari , Wikipedia , Data Privacy , Web Browser , WordPress , Pinterest , ETag , cybersecurity , Firefox , Enterprise , Data Breach , PayPal

Michelle Drolet

by Mark Stockley This quick fix will show you how to clear out cookies and the cookie-like things that can be used to track you online. If you already know what cookies are all about then you can skip the next bit and go straight to the instructions.

Build security into your app development

Security Partners , Security Services , Data Security , IAST , Mobile Devices , Security Threat , Establish , Security Program , Information Security , Application Security , Security , software systems , DevOps , software updates , Mobile Apps , Hackers , Big Data , Data Privacy , OWASP , Mobile Security , Gap Assessment

Michelle Drolet

Integrate security testing into your dev process now or else face cyber-attacks later

Towerwall Information Security Update Vol 13.78 - 3 ways to make your Outlook.com account safer

network security , Data Security , Security Regulations , Outlook , Security Threat , Security Program , Information Security , Security , Hackers , Cloud Security , security policy , cybercriminals , Security Alert , internal emails , Data Privacy , cybersecurity , Data Breach

Michelle Drolet

3 ways to make your Outlook.com account safer by John Hawes

Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

network security , Shellshock. Bash bug , passwords , security software , Data Security , Linux , iOS update , Security Threat , Information Security , web server , Bash , Mac , Mac OSX , Hackers , cybercriminals , Security Alert , Data Privacy , security research , iOS , GNU Bash Remote Code Execution Vulnerability , Unix , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

By: Solange_Desc1 Security researchers have discovered a new software bug known as the “Bash Bug” or “Shellshock,” or to those more technically “in-the-know” as GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271)(link is external). This bug, more correctly termed, ‘vulnerability’, potentially allows attackers to gain control over targeted computers. The bug is present in a piece of computer software called, Bash, that is typically found on computers running an operating system calledfalse

Firefox 32.0 fixes holes, shakes out some old SSL certs, introduces certificate pinning

security software , Data Security , Twitter , certificates , Information Security , Application Security , Security , cybercriminals , Data Privacy , cannabis , cybersecurity , Firefox , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

by Paul Ducklin on September 3, 2014

Towerwall Application Security Alert Vol 13.73

network security , passwords , Web Storage , Data Security , Security Regulations , Botnet , credit card security , Security Threat , bot-infected , two-factor authentification , Information Security , web server , Application Security , Security , Hackers , Cloud Security , Web Application Firewall , security policy , cybercriminals , penetration testing , Cryptolocker , Security Alert , Data Privacy , Web Browser , web users , cybersecurity , Enterprise , Data Breach

Michelle Drolet

1.2 billion logins scooped up by CyberVor hacking crew - what you need to do Hackers have amassed a vast collection of stolen data, including 1.2 billion unique username/password pairs, by compromising over 420,000 websites using SQL injection techniques. Researchers monitored the gang for over seven months, thought to be "fewer than a dozen men in their 20s who know one another personally" based in a small city in central Russia. They found that the group, working together since at least 2011,false

Towerwall Security/Malware Alert Vol 13.71

Data Security , Information Security , Security , cybercriminals , Big Data , Data Privacy , cybersecurity , Enterprise , Data Breach

Michelle Drolet

GameOver Zeus P2P Malware Original release date: June 02, 2014 Systems Affected Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8 Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012 Overview GameOver Zeus (GOZ), a peer-to-peer (P2P) variant of the Zeus family of bank credential-stealing malware identified in September 2011, [1] uses a decentralized network infrastructure of compromised personal computers and web servers to execute command-and-control. The United Statesfalse

Towerwall and MassBay Host Another Successful Information Security Summit

Security Partners , Security Services , security software , Data Security , Government Compliance Regulations , Security Regulations , Security Threat , Information Security , Security , Compliance & Privacy , Events , Compliance , Big Data , Data Privacy , security research , Data Breach

Michelle Drolet

Towerwall teamed up with MassBay Community College on May 29 to present the second annual Information Security Summit at MassBay’s Wellesley Hills campus from 8 a.m. to 1 p.m. Over 250 individuals attended the Summit where they interacted with industry experts and participated in various security panel discussions. After a presentation on the "Anatomy of a Malware Attack" by Sophos, and the keynote by Chris Logan of Care New England Health Systems, the Summit offered a number of breakoutfalse

10 things I know about preventing ID theft

network security , Security Services , Data Security , ID Theft , Gift Cards , credit card security , Security Threat , Information Security , Application Security , Security , PCI , endpoint security system , Cloud Security , security policy , financial security , Security Alert , information security tips , Compliance , Big Data , Data Privacy , Mobile Security , Cash , cybersecurity , Data Breach

Michelle Drolet

10. Use cash or gift cards The threat of identity theft is reduced dramatically if you don't use your credit card for all your purchases, so consider using cash or even gift cards to pay your way.