Towerwall's InfoSec Blog

Content Type

See all

Phone 5S Phishing Mail Arrives in time for launch.

Security Services , Data Security , infected phone , threat landscape , iOS update , Mobile Devices , Security Threat , Smartphone , Phishing , Information Security , Security , iPhone , Mobile Apps , cyber-attack , Apple , cybercriminals , Security Alert , information security tips , Big Data , Mobile Protection , Data Privacy , iOS , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

While millions of mobile users are anticipating the launch of the new iPhone (5S and 5C), cybercriminals are already making their move to distribute spam that promise to give away the said devices for free, in the guise of a contest. We saw samples of spammed messages that attempted to spoof an Apple Store email notification. The said message informs recipients that they won the latest iPhone 5S mobile phones and iPad. Figure 1. Fake Apple email To get these prizes, they are asked to go to afalse

10 Things I Know About... Mobile Security

Security Services , passwords , Web Storage , Data Security , Security Regulations , Mobile Devices , Security Threat , Information Security , web server , Application Security , Security , iPhone , Mobile Apps , Cloud Security , T-Mobile , Web Application Firewall , cyber-attack , Apple , cybercriminals , Security Alert , information security tips , Mobile Protection , Data Privacy , Web Browser , security research , Mobile Security , web users , cybersecurity , Data Breach

Michelle Drolet

10. Malware Is On The Rise The threat of malware on mobile platforms is growing steadily as more cybercriminals target mobile devices in increasingly sophisticated ways.

First malicious apps to exploit critical Android bug found in the wild

Android , network security , Security Regulations , Mobile Devices , Security Threat , Phishing , Security Program , Information Security , Application Security , Security , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , Tablets , Mobile Protection , security research , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

Researchers have spotted the first in-the-wild apps to exploit a critical Android vulnerability allowing attackers to inject malicious code into legitimate programs without invalidating their digital signature. The two apps, distributed on unofficial Android marketplaces in China, help people find doctors and make appointments, according to a blog post published Tuesday by researchers from security firm Symantec. By exploiting the recently disclosed "master key" vulnerability—or possibly a false

Four Steps to Respond & Recover from Sophisticated Security Attacks

Security Partners , network security , security software , Data Security , BYOD , Security Regulations , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , Mobile Apps , Hackers , endpoint security system , Cloud Security , cyber-attack , security policy , cybercriminals , financial security , Security Alert , information security tips , Compliance , Big Data , Mobile Protection , Data Privacy , security research , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Great information in SC Magazine’s latest whitepaper report, ‘Four steps to respond and recover from sophisticated security attacks’, it discusses the four proactive steps that you can – and should – take now to help keep your organization safe. Click here to view more details: http://bit.ly/131uu2J As we all know, cyber-attacks are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applications and datafalse

Views from the Inside: Is your data safe with free cloud services? (guest post)

Security Partners , network security , Security Services , security software , Data Security , threat landscape , Security Threat , Security Program , Security , Hackers , Cloud Security , cyber-attack , HIPAA , security policy , cybercriminals , Security Alert , cloud services , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

The overwhelming advantages of cloud-based file storage are not in dispute. You have an automatic backup of your files, which can be accessed on any device, at any time. Small amounts of storage are generally free, and large swathes of server space are coming down in price all the time. They absolve your business from the headache of backup management, disaster recovery, and bandwidth for instant anytime access. Convenient? Yes, most definitely. Safe and suitable for the enterprise? Well ...false

New LinkedIn E-Mail Scam

Linkedin , security software , Security Regulations , Social Engineering , credit card security , Security Threat , Information Security , web server , Security , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Web Browser , security research , Mobile Security , web users , email scam , cybersecurity , Enterprise

Michelle Drolet

Hi all, there is an e-mail scam doing the rounds. The message is an invite from some random person you won’t know with a link (how original). If you get such a message don’t use the link, check your LinkedIn account as if it’s a legit request it will be there waiting for approval. Even if it is legit, make sure you vet all invite requests carefully. I have had several dodgy requests from what I believe to be bogus profiles who are likely up to no good. LinkedIn is about the quality of yourfalse

Tips for testing your mobile app security

Security Partners , Security Services , Data Security , Towerwall , Security Regulations , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , Security , Mobile Apps , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , penetration testing , information security tips , cloud services , Mobile Protection , vulnerability management , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Wherever an app originates from, it is vital that you can vouch for its security before it is circulated The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is " bring your own application" (BYOA), because many public app stores have serious malware problems. Enterprise app stores could be the answer. false

Towerwall and the Information Security Summit highlighted in SearchSecurity.com Article

Security Partners , network security , Security Services , security software , Data Security , Towerwall , Security Regulations , threat landscape , credit card security , Mobile Devices , Security Threat , Information Security , Application Security , Security , Mobile Apps , Information Security Summit , endpoint security system , Cloud Security , HIPAA , penetration testing , financial security , information security tips , Compliance , Mobile Protection , vulnerability management , Mobile Security

Michelle Drolet

Check out Search Security's article - "HIPAA Omnibus Rule, PPACA challenge enterprise compliance management", where our own Natalie Kmit and the Information Security Summit 2013 are highlighted:

Are mobile apps truly enterprise-secure?

network security , Security Services , security software , Data Security , threat landscape , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , Mobile Apps , Web Application Firewall , security policy , information security tips , Mobile Protection , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Many companies have embraced the BYOD trend. They may even have developed applications that enable employees to have 24/7 access to business data and tools. The benefits can be counted in productivity boosts and flexibility, but there is a real and present danger that is being ignored all too often. How many of these enterprise apps have undergone security penetration testing? Could the mobile apps your business uses be jeopardising your data security or even regulatory compliance?

Views from the Inside: A successful BYOD policy is not just about security

security software , Data Security , BYOD , Security Regulations , threat landscape , Mobile Devices , Security Threat , Security Program , Information Security , infected computer , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , Tablets , information security tips , Big Data , Mobile Protection , Data Privacy , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

The BYOD trend shows no sign of abating as more and more organizations recognize the potential benefits in terms of cost and convenience. According to a recent surveyby Good Technology, 76 percent of enterprises are now supporting BYOD and the majority of those that still don’t are planning to do so in the near future. When we look closer, we find that 75 percent of those supporting BYOD employ at least 2,000 people, and 46 percent have 10,000 or more employees. Large organizations andfalse