Towerwall's InfoSec Blog

Content Type

See all

Towerwall Security Alert V13.79 - How to clear out cookies, Flash cookies and local storage

HTTP , Linkedin , Web Storage , Cache , KISSmetrics , Data Security , DOM , Security Regulations , Twitter , Add-ons , Chrome , Cookies , eBay , Fingerprinting , Security Program , Information Security , Settings , Application Security , Security , HTML , Internet Explorer , LSO , Facebook , Private Browsing , Flash Cookies , Amazon , security policy , Gmail , Windows , Safari , Wikipedia , Data Privacy , Web Browser , WordPress , Pinterest , ETag , cybersecurity , Firefox , Enterprise , Data Breach , PayPal

Michelle Drolet

by Mark Stockley This quick fix will show you how to clear out cookies and the cookie-like things that can be used to track you online. If you already know what cookies are all about then you can skip the next bit and go straight to the instructions.

New Internet Explorer zero day being exploited in the wild

Security Services , security software , Web Storage , Data Security , Security Regulations , Security Threat , Information Security , web server , Security , Internet Explorer , Hackers , Web Application Firewall , cyber-attack , security policy , cybercriminals , penetration testing , information security tips , Web Browser , security research , Mobile Security , web users , cannabis , cybersecurity , Enterprise

Michelle Drolet

After the last zero day exploit on Java we reported some weeks ago it appears that a new 0day has been found in Internet Explorer by the same authors that created the Java one. Yesterday, Eric Romang reported the findings of a new exploit code on the same server that the Java 0day was found some weeks ago. The new vulnerability appears to affect Internet Explorer 7 and 8 and seems to be exploitable at least on Windows XP. The exploit code found in the server works as follow: - The filefalse