Towerwall's InfoSec Blog

Content Type

See all

Security Alert - Anonymous’ #OpPetrol: What is it, What to Expect, Why Care?

security software , Data Security , Security Threat , Information Security , Application Security , Security , security policy , Security Alert , information security tips , cybersecurity , Enterprise

Michelle Drolet

by Darin Dutcher (Threat Research) Last month, the hacker collective Anonymous announced their intention to launch cyber-attacks against the petroleum industry (under the code name #OpPetrol) that is expected to last up to June 20. Their claimed reason for this attack is primarily due to petroleum being sold with the US dollar instead of currency of the country where petroleum originates. However, some chatter indicates there was a desire to launch new attacks due to both #OpIsrael and #OpUSAfalse

Towerwall Security / Vulnerability Alert: Microsoft announces five Bulletins for Patch Tuesday, including Office for Mac

Security Services , Data Security , Office , Towerwall , Security Regulations , Security Threat , Security Program , Information Security , Security , Mac , security policy , Microsoft , Security Alert , information security tips , Big Data , Data Privacy , vulnerability management , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Midsummer Patch Tuesday (or midwinter, depending on your latitude) takes place on Tuesday 11 June 2013. As you probably already know, Microsoft publishes an official Advance Notification each month to give you early warning of what's coming. These early notifications generally don't give any details, summarizing only the basics, such as:

Towerwall Security / Vulnerability Alert

Security Partners , Security Services , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , cannabis , cybersecurity , Enterprise

Michelle Drolet

Security researchers from the Vulnerability Lab have identified a serious security hole that could affect a number of companies which rely on Barracuda products. They’ve discovered a high severity validation filter and exception handling bypass vulnerability in Barracuda’s appliances. According to the experts, the input filter that’s designed to block out persistent input attacks is flawed, exposing all security appliances.

BYOD Brings on a War of Worry

BYOD Brings on a War of Worry

network security , Security Services , security software , Data Security , BYOD , Mobile Devices , Security Threat , Security Program , Information Security , Security , Mobile Apps , Hackers , T-Mobile , cyber-attack , security policy , cybercriminals , Tablets , Security Alert , information security tips , Mobile Protection , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

It appears that BYOD, “Bring Your Own Device” to work, is beyond just being a growing trend if not currently a sanctioned practice within the corporate walls. It may seem that bowing to this desire on the parts of employees would have a lot to offer, not the least of which is a reduction in costs for employee-issued hardware. Unfortunately that is not entirely the case.

Warning: Java vulnerable to hackers, U.S. government says

Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Security , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , Big Data , Data Privacy , security research , cybersecurity , Enterprise , Data Breach , Java

Michelle Drolet

Jan 11 (Reuters) - The U.S. Department of Homeland Security urged computer users to disable Oracle Corp's (ORCL:$34.8625,$-0.0475,-0.14%) Java software, amplifying security experts' prior warnings to hundreds of millions of consumers and businesses that use it to surf the Web.

Towerwall Security Alert 2013

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Security , cyber-attack , security policy , cybercriminals , Security Alert , Data Privacy , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

As the year draws to a close, it's time for us to take a step back, absorb the lessons of 2012, and look at what 2013 and beyond will bring for users, the security industry, and even cybercriminals. We know this time of year is incredibly busy and as a trusted advisor, you expect Towerwall to stay on the cutting edge of security information and share our findings. To help you understand the impacts of threats to your business, we would like to share Trend Micro's 2013 forecast report, "Securityfalse

Beware of BYOD trend wreaking havoc

BYOD , Mobile Devices , Security Threat , GDPR , Information Security , Security , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , Tablets , Security Alert , information security tips , Mobile Protection , COVID-19 , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Bringing mobile devices to work? Not so fast. Like it or not, the line between the workplace and the home is blurring. Work-at-home arrangements are becoming more common and cloud services make it easier to co-ordinate teams online. People are constantly on call, with the ability to check their emails and stay in touch wherever they are. The days of having a personal mobile and a work device are fast disappearing as the BYOD (Bring Your Own Device) trend continues to grow. A recent SkyDoxfalse

Trust Your Third-Party Applications? Think Again….

security software , Data Security , Security Threat , Security Program , Information Security , Security , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Compliance , security research , Mobile Security , Third-party Vendor , cannabis , cybersecurity , Enterprise

Michelle Drolet

Don’t assume those third-party apps you buy are fully secure. Despite the promise of cloud computing, companies are still buying software. And it is more cost effective to buy an application and plug it into your system than it is to develop anew. How many third-party applications has your company bought off the shelf? How secure are they? Have you conducted any actual testing? Too many organizations are oblivious to the need for stringent security testing. Many third-party apps are purchasedfalse

Fake PayPal Emails Distributing Malware

Security Services , security software , Data Security , Security Regulations , Social Engineering , Security Threat , Phishing , Security Program , Information Security , Security , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Everyday there is a new threat with seemingly innocent emails being sent out that look close to an official correspondence from a company, from Paypal, ADP and BBB - to name a few. Cybercriminals are mimicking the online payment processor PayPal in a malicious spam campaign that attempts to dupe customers into downloading malware from links in seemingly authentic emails, according to a Webroot report written by Dancho Danchev. The piece of malware in use here is a backdoor that, oncefalse

Top 10 PHP Security Vulnerabilities

Security Services , security software , Data Security , Security Regulations , threat landscape , Security Threat , Information Security , Application Security , Security , Hackers , cyber-attack , security policy , cybercriminals , penetration testing , Security Alert , information security tips , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

Security is not a list of things you do. Security is a way of thinking, a way of looking at things, a way of dealing with the world that says “I don’t know how they’ll do it, but I know they’re going to try to screw me” and then, rather than dissolving into an existential funk, being proactive to prevent the problem. But, you can’t buck statistics. Nobody is going to read an article entitled “Coding for Security.” Everyone wants an article with a number in it: “The 8 Most Common PHP Securityfalse