Towerwall's InfoSec Blog

Content Type

See all

How Can you Expose Targeted Attacks and Combat APTs?

network security , Security Services , security software , Data Security , Towerwall , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Security , malware , endpoint security system , Cloud Security , cyber-attack , cybercriminals , penetration testing , financial security , information security tips , Big Data , Data Privacy , APT , vulnerability management , cybersecurity , Data Breach

Michelle Drolet

Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don’t have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing. The risk is that security is breached, typically through manipulation of employees using a technique such as spear phishing, and existing security systems are unable to detect the attack. Data can be harvested forfalse

Read the EDA's Report on Malware Infections

Security Partners , Security Services , Data Security , Security Threat , Information Security , malware , cyber-attack , cybercriminals , Security Alert , information security tips , Big Data , Data Privacy , security research , cybersecurity , Data Breach

Michelle Drolet

Read the EDA's Report on Malware Infections - Malware Infections on EDA’s Systems Were Overstated and the Disruption of IT Operations Was Unwarranted Click here to read.

Is Your Business Taking the Threat of Mobile Malware Seriously?

threat landscape , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , malware , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , information security tips , Mobile Protection , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Don’t underestimate the damage that malware proprietors can unleash if the right security policies aren’t in place. Bring-your-own-device (BYOD) programs and cloud computing — two of the biggest enterprise trends from the last couple of years — go hand in hand. Employees want to be given the latitude to use their smartphones for work, and they want to have round-the-clock access to data and applications. For businesses, there are obvious advantages to both cloud computing and BYOD programs infalse

Top Ten Malicious Lists

network security , security software , Data Security , Security Regulations , credit card security , Information Security , Application Security , Security , malware , endpoint security system , Cloud Security , cyber-attack , security policy , cybercriminals , financial security , information security tips , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Top Ten Malicious URLs Top 10 malicious URLs blocked by the Trend Micro™ Smart Protection Network™ infrastructure in 2012

How to ensure mobile apps are secure for the enterprise

Android , Security Services , security software , Data Security , Security Regulations , threat landscape , Mobile Devices , Security Threat , Security Program , Application Security , Security , malware , iPhone , Mobile Apps , T-Mobile , security policy , Big Data , Mobile Protection , Data Privacy , security research , Mobile Security , cannabis , Enterprise , Data Breach

Michelle Drolet

As the app revolution has gathered pace and smartphones and tablets have become ubiquitous, the importance of testing app security has grown. Many companies have embraced the BYOD trend. They may even have developed applications that enable employees to have 24/7 access to business data and tools. The benefits can be counted in productivity boosts and flexibility, but there is a real and present danger that is being ignored all too often. How many of these enterprise apps have undergonefalse

Microsoft discovers Chinese malware pre-installed on new PCs

Security Partners , network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Information Security , Security , malware , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , Microsoft , information security tips , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Microsoft has published evidence of an extraordinary conspiracy in which potent botnet malware was apparently installed and hidden on PCs during their manufacture in China. This is a big deal, the team at Towerwall has been aware that this level of threat and exploitation existed, but none the less surprised. Read the rest of the article: Microsoft discovers Chinese malware pre-installed on new PCs

Fake Groupon discount emails carry malware

network security , Social Engineering , Phishing , malware , security policy , cybercriminals , cannabis , Enterprise

Michelle Drolet

Cybercriminals have spammed out malware, attached to emails claiming to be related to discounts for offers on Groupon. The emails, which have the poorly spelt subject line of "Groupon discount gifts" (in itself something which should ring alarm bells), pretend to come from Groupon, and claim that one of your friends has found a deal on the website. The website says that your friend has decided to share the deal with you, and that you are receiving a discount code as a result. Part of the emailfalse

Malware attack spread as email from your office's HP scanner

network security , Phishing , Application Security , malware , software updates , penetration testing , cannabis , Enterprise

Michelle Drolet

For those on our Security Alert and Update list we just emailed an article by Graham Cluley on how a malware attack spread as email from your office's HP scanner, yes that's right a scanner! In these high-tech times, scanners and photocopiers aren't just dumb machines sitting in the corner of the office. They are usually connected to the corporate network, and - in some cases - can even email you at your desk to save you having to wear out your shoe leather. And it's precisely thisfalse

Photo.zip - Stolen nude photos and police investigations

network security , Social Engineering , Phishing , malware , cybercriminals , penetration testing , cannabis , Enterprise

Michelle Drolet

Cybercriminals are attempting to infect the computers of internet users, via a spammed-out email that has a malware-infected file attached. Computer users are being warned to be wary of email messages which suggest they contain nude photographs of girlfriends, or claim that they have been reported to the police, as the attached file (Photo.zip) really contains a Trojan horse. There are many different subject lines being used in the malware campaign, including: