Towerwall's InfoSec Blog

Content Type

See all

Data Privacy Alert Vol 13.82 – The GHOST vulnerability - what you need to know

network security , Linux , Security Program , Information Security , Hackers , GHOST , Security Alert , cannabis , Enterprise , Data Breach

Michelle Drolet

The funkily-named bug of the week is GHOST. Its official moniker is the less catchy CVE-2015-0235, and it's a vulnerability caused by a buffer overflow in a system library that is used in many, if not most, Linux distributions. A buffer overflow is where you assume, for example, that when you handle a four-byte network number written out as decimal digits, you will never get anything longer than 255. 255. 255. 255. That takes up 15 characters, so you may decide that you'll never need more thanfalse

Data Security Alert Vol 13.79 - The Top Hacks of the Year

Security Regulations , Security Program , Information Security , Application Security , Hackers , Cloud Security , security policy , Security Alert , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

As we approach the end of the year, let’s have a look back at the top hacking incidents of 2014. This year, we might have witnessed the most damaging attack of the decade. It will not be easy beating the Sony attack.

What You Need to Know About This New Bank Account Threat

Social Engineering , Phishing , Security Program , Information Security , Security , malware , Cloud Security , Security Alert , Mobile Security , cybersecurity

Michelle Drolet

Sophos Researcher James Wyke recently did an analysis of the malware Vawtrak. He found that Vawtrak has been targeting financial institutions, especially banks. Vawtrak injects a DLL code into the targeted bank’s website, which allows a bypass of the victim’s two-factor authentication and infects the victim with a mobile malware. The malware then automatically transfers money out of the victims account and hides any traces of the transfer. If you notice unusual activity in your bank account orfalse

The 4 Es of Enterprise Security

Security Partners , network security , Security Services , IT Infrastructure , Assessment , Security Regulations , Enforce , Establish , Security Program , Information Security , Evaluate , Application Security , Security , Cloud Security , security policy , 4E Methodology , Educate , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

Building a solid security program takes time. Every organization is different. It's very important to assess your technology, and consider both internal and external threats. An assessment will reveal vulnerabilities. The remediation process will help you take full advantage of your existing security assets and point you at any gaps that need filling. Even once your defenses are in place, vigilance is an ongoing requirement because new threats are emerging all the time. In the face of ourfalse

The Cybersecurity Skills Gap

IT Infrastructure , Virtual CISO , Assessment , Security Program , Information Security , security policy , cybercriminals , cybersecurity , vCISO , Data Breach

Michelle Drolet

The information security profession, which evolved largely in reaction to threats, is now paying the price of an entire “missing generation.” Companies are challenged finding pros with the combination of business and technical savvy that is needed to combat growing threats. Compounding this problem, educational institutions are not graduating enough students with the necessary skills or experience for entry-level positions. It is estimated that between 300,000 and 1,000,000 currentfalse

Towerwall Security Alert V13.79 - How to clear out cookies, Flash cookies and local storage

HTTP , Linkedin , Web Storage , Cache , KISSmetrics , Data Security , DOM , Security Regulations , Twitter , Add-ons , Chrome , Cookies , eBay , Fingerprinting , Security Program , Information Security , Settings , Application Security , Security , HTML , Internet Explorer , LSO , Facebook , Private Browsing , Flash Cookies , Amazon , security policy , Gmail , Windows , Safari , Wikipedia , Data Privacy , Web Browser , WordPress , Pinterest , ETag , cybersecurity , Firefox , Enterprise , Data Breach , PayPal

Michelle Drolet

by Mark Stockley This quick fix will show you how to clear out cookies and the cookie-like things that can be used to track you online. If you already know what cookies are all about then you can skip the next bit and go straight to the instructions.

Build security into your app development

Security Partners , Security Services , Data Security , IAST , Mobile Devices , Security Threat , Establish , Security Program , Information Security , Application Security , Security , software systems , DevOps , software updates , Mobile Apps , Hackers , Big Data , Data Privacy , OWASP , Mobile Security , Gap Assessment

Michelle Drolet

Integrate security testing into your dev process now or else face cyber-attacks later

Towerwall Information Security Update Vol 13.78 - 3 ways to make your Outlook.com account safer

network security , Data Security , Security Regulations , Outlook , Security Threat , Security Program , Information Security , Security , Hackers , Cloud Security , security policy , cybercriminals , Security Alert , internal emails , Data Privacy , cybersecurity , Data Breach

Michelle Drolet

3 ways to make your Outlook.com account safer by John Hawes

Cork That App or Face Attack

Cork That App or Face Attack

passwords , Data Security , Government Compliance Regulations , Assessment , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Application Security , Mobile Apps , Hackers , endpoint security system , security policy , cybercriminals , penetration testing , information security tips , Compliance , Mobile Security , cybersecurity , Enterprise , Gap Assessment

Michelle Drolet

Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they have been hacked at least once in the last two years. While most large businesses have begun application vulnerability testing, there is still a long way to go. After all, you are only asfalse

Test All Apps to Keep Hackers from Penetrating Castle Walls

Test All Apps to Keep Hackers from Penetrating Castle Walls

security software , Data Security , Security Regulations , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , Security , Mobile Apps , Hackers , Cloud Security , security policy , cybercriminals , Tablets , information security tips , Compliance , Mobile Protection , Mobile Security , cybersecurity

Michelle Drolet

Four major challenges when protecting apps and how to solve them Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they have been hacked at least once in the last two years. While most large businesses have begun application vulnerability testing,false