Towerwall's InfoSec Blog

Content Type

See all

Towerwall Security/Malware Alert Vol 13.72

Security Threat , Information Security , Security , malware , ransomware , Hackers , cybercriminals , Security Alert , information security tips , security research , cybersecurity , Enterprise

Michelle Drolet

When an international law enforcement action earlier this month knocked out theGameover botnet, one happy consequence was the takedown of the servers that the CryptoLocker ransomware needed in order to do its dirty work. Well, any celebration over CryptoLocker’s demise is certainly premature - encrypting ransomware is alive and well. With many victims paying up, ransomware is a lucrative business for the crooks, and CryptoLocker has inspired copycats who want in on the loot.

CryptoLocker ransomware - learn what it is and how to prevent it

Security Threat , Information Security , Security , ransomware , cybercriminals , Security Alert , cybersecurity , Enterprise

Michelle Drolet

A new ransomware program, known as Cryptolocker, was identified recently. Ransomware can freeze your computer and ask you to pay a fee, but this malicious ransomware does more than just that. (You can use a anti-virus tool to remove the virus.) Cryptolocker is different from other ransomware due to the fact that it allows your computer and software to run while your personal files, such as documents, spreadsheets, and images, are encrypted. The only copy of the decryption key is then saved ontofalse

Towerwall Security/Malware Alert Vol 13.71

Data Security , Information Security , Security , cybercriminals , Big Data , Data Privacy , cybersecurity , Enterprise , Data Breach

Michelle Drolet

GameOver Zeus P2P Malware Original release date: June 02, 2014 Systems Affected Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8 Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012 Overview GameOver Zeus (GOZ), a peer-to-peer (P2P) variant of the Zeus family of bank credential-stealing malware identified in September 2011, [1] uses a decentralized network infrastructure of compromised personal computers and web servers to execute command-and-control. The United Statesfalse

Deciding Between Vulnerability Scanning And Penetration Testing

Security Services , security software , Data Security , Assessment , Security Regulations , Security Threat , Information Security , Application Security , Security , Hackers , security policy , cybercriminals , penetration testing , Big Data , Data Privacy , vulnerability management , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

My clients often confuse scanning and penetration testing. Organisations should be conducting both external vulnerability scans and penetration tests. If you are storing or transmitting data on the Internet, particularly sensitive data such as credit card details, then quarterly scanning is required to validate your PCI compliance. You also need to conduct a penetration test at least once a year. These are the minimum requirements to remain compliant; it is prudent to scan and test more often.false

The Benefits of Cloud-Based Endpoint Security

The Benefits of Cloud-Based Endpoint Security

security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , endpoint security system , security policy , Big Data , Data Privacy , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

The cloud computing revolution is well underway and there are lots of benefits to be realized. According to Awesome Cloud research the industry will be worth more than $150 billion this year, compared to $46 billion just six years ago. Mirroring the general trend for SaaS solutions, cloud-based IT security systems can be an ideal fit for smaller businesses, freeing them from internal IT overhead, cutting complexity, and providing scalability. Here are five reasons that switching to afalse

Why security professionals need to get more creative with penetration testing (and how to do it)

network security , Security Services , security software , Data Security , Security Regulations , Social Engineering , Security Threat , Cloud Security , penetration testing , Big Data , Data Privacy , vulnerability management , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Criminals are evolving with their techniques for hacking and breaching corporate assets, so security managers need to as well. Here are some ways companies are going beyond standard pen testing in order to increase awareness By Maria Korolov Security professionals have long been running penetration tests against their firewalls and other security systems to find weaknesses that need to be addressed. The Common Vulnerability Scoring System is an industry standard, but has been around for afalse

Is Blind Trust Making You Unsafe?

network security , security software , Data Security , Security Regulations , credit card security , Security Threat , Phishing , Security Program , Information Security , Application Security , Security , endpoint security system , Compliance , Big Data , Data Privacy , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Personal and business relationships rely on trust to function, but blind trust in the digital world is downright dangerous. We’re asked to trust companies all the time. We trust them with personal details and they promise to keep them safe. It’s the same story in the enterprise. One company will entrust another to backup and store data, keeping it accessible for employees, but shutting out criminals and spies. Sometimes that trust proves to be misplaced, with disastrous results. On a personalfalse

Towerwall Heartbleed Vulnerability Alert

network security , Data Security , Security Regulations , Heartbleed , credit card security , Security Threat , Information Security , Security , security policy , cybercriminals , penetration testing , Security Alert , information security tips , Big Data , Data Privacy , vulnerability management , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Good Afternoon: The IT infrastructure your organization may use for day-to-day business may be vulnerable because of the Heartbleed vulnerability. Sophos a Towerwall partner has prepared a podcast of the Heartbleed vulnerability, which addresses who is likely affected, workarounds and an offer to help determine if you are vulnerable. http://nakedsecurity.sophos.com/2014/04/10/sscc-142-heartbleed-explained-patches-evaluated-apple-chastised-podcast/ If you think you may be affected and don't knowfalse

Towerwall Information/Vulnerability Alert Vol 13.69: Cisco Security Notice

security software , Security Regulations , Security Threat , Security Program , Information Security , Security , security policy , penetration testing , Security Alert , information security tips , security research , cybersecurity , Enterprise

Michelle Drolet

Cisco Security Notice Cisco WebEx Business Suite HTTP GET Parameters Include Sensitive Information

Patch Tuesday wrap-up, March 2014 - critical fixes from Microsoft and Adobe

network security , security software , Data Security , Security Threat , Information Security , Security , Microsoft , Security Alert , Big Data , Data Privacy , Enterprise , Data Breach

Michelle Drolet

by Paul Ducklin on March 12, 2014 We already wrote about Microsoft's March 2014 patches, noting that, as usually happens, there was an All-Points Bulletin for Internet Explorer coming up. Microsoft doesn't call them APBs, of course - they are Cumulative Security Updates, with one bulletin covering all the numerous versions, bitnesses and CPU flavors of Redmond's IE browser. What we weren't able to tell you in advance was whether the widely-publicized (but fortunately not widely-exploited) false