Towerwall's InfoSec Blog

Content Type

See all

5 Open Source Intrusion Detection Tools That Are Too Good to Ignore

Android , OSSEC , Open DLP , Phishing , Data Loss Prevention (DLP) , Application Security , Snort , malware , Bro , Windows , Kismet , iOS , cannabis , Enterprise , Open Source

Michelle Drolet

Everyone should employ an intrusion detection system (IDS) to monitor their network and flag any suspicious activity or automatically shut down potentially malicious traffic. We look at five of the best open source options. As cybersecurity professionals, we try to prevent attackers from gaining access to our networks but protecting perimeters that have grown exponentially with the rise of mobile devices, distributed teams, and the internet of things (IoT) is not easy. The unpalatable truth isfalse

Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

network security , Shellshock. Bash bug , passwords , security software , Data Security , Linux , iOS update , Security Threat , Information Security , web server , Bash , Mac , Mac OSX , Hackers , cybercriminals , Security Alert , Data Privacy , security research , iOS , GNU Bash Remote Code Execution Vulnerability , Unix , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

By: Solange_Desc1 Security researchers have discovered a new software bug known as the “Bash Bug” or “Shellshock,” or to those more technically “in-the-know” as GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271)(link is external). This bug, more correctly termed, ‘vulnerability’, potentially allows attackers to gain control over targeted computers. The bug is present in a piece of computer software called, Bash, that is typically found on computers running an operating system calledfalse

Top 10 things to know about mobile security

Security Partners , Verizon , security software , Data Security , Security Regulations , iOS update , credit card security , Mobile Devices , Security Threat , Information Security , iPhone , AT&T , Mobile Apps , Information Security Summit , T-Mobile , Compliance & Privacy , Apple , Big Data , Mobile Protection , Data Privacy , security research , iOS , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

10. Malware is on the rise

Phone 5S Phishing Mail Arrives in time for launch.

Security Services , Data Security , infected phone , threat landscape , iOS update , Mobile Devices , Security Threat , Smartphone , Phishing , Information Security , Security , iPhone , Mobile Apps , cyber-attack , Apple , cybercriminals , Security Alert , information security tips , Big Data , Mobile Protection , Data Privacy , iOS , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

While millions of mobile users are anticipating the launch of the new iPhone (5S and 5C), cybercriminals are already making their move to distribute spam that promise to give away the said devices for free, in the guise of a contest. We saw samples of spammed messages that attempted to spoof an Apple Store email notification. The said message informs recipients that they won the latest iPhone 5S mobile phones and iPad. Figure 1. Fake Apple email To get these prizes, they are asked to go to afalse