Towerwall's InfoSec Blog

Content Type

See all

Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

network security , Shellshock. Bash bug , passwords , security software , Data Security , Linux , iOS update , Security Threat , Information Security , web server , Bash , Mac , Mac OSX , Hackers , cybercriminals , Security Alert , Data Privacy , security research , iOS , GNU Bash Remote Code Execution Vulnerability , Unix , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

By: Solange_Desc1 Security researchers have discovered a new software bug known as the “Bash Bug” or “Shellshock,” or to those more technically “in-the-know” as GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271)(link is external). This bug, more correctly termed, ‘vulnerability’, potentially allows attackers to gain control over targeted computers. The bug is present in a piece of computer software called, Bash, that is typically found on computers running an operating system calledfalse

Towerwall Security/Malware Alert Vol 13.72

Security Threat , Information Security , Security , malware , ransomware , Hackers , cybercriminals , Security Alert , information security tips , security research , cybersecurity , Enterprise

Michelle Drolet

When an international law enforcement action earlier this month knocked out theGameover botnet, one happy consequence was the takedown of the servers that the CryptoLocker ransomware needed in order to do its dirty work. Well, any celebration over CryptoLocker’s demise is certainly premature - encrypting ransomware is alive and well. With many victims paying up, ransomware is a lucrative business for the crooks, and CryptoLocker has inspired copycats who want in on the loot.

Towerwall and MassBay Host Another Successful Information Security Summit

Security Partners , Security Services , security software , Data Security , Government Compliance Regulations , Security Regulations , Security Threat , Information Security , Security , Compliance & Privacy , Events , Compliance , Big Data , Data Privacy , security research , Data Breach

Michelle Drolet

Towerwall teamed up with MassBay Community College on May 29 to present the second annual Information Security Summit at MassBay’s Wellesley Hills campus from 8 a.m. to 1 p.m. Over 250 individuals attended the Summit where they interacted with industry experts and participated in various security panel discussions. After a presentation on the "Anatomy of a Malware Attack" by Sophos, and the keynote by Chris Logan of Care New England Health Systems, the Summit offered a number of breakoutfalse

Towerwall listed among “20 Most Promising Security Consulting Companies”

Security Partners , network security , Security Services , security software , Data Security , credit card security , Security Threat , Security Program , Information Security , Application Security , Security , Cloud Security , security policy , information security tips , cloud services , Big Data , Data Privacy , security research , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Also named to CRN’s “Women in the Channel” and “The Power 50” BOSTON – May 12, 2014 – Towerwall (www.towerwall.com), an IT security services provider for small to mid-size businesses, today announced it was selected for inclusion in a list of the 20 “Most Promising Enterprise Security Consulting Companies.” The list was compiled by the editors of CIO Review, a magazine published in Fremont, Calif. “Presently, the time is apt to identify some of the right security players in the market. Wefalse

Reminder: Please join us at the Information Security Summit 2014

Security Partners , network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Information Security Summit , Hackers , endpoint security system , Cloud Security , Compliance & Privacy , security policy , cybercriminals , financial security , Events , information security tips , Compliance , Big Data , Data Privacy , security research , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Towerwall Information/Vulnerability Alert Vol 13.69: Cisco Security Notice

security software , Security Regulations , Security Threat , Security Program , Information Security , Security , security policy , penetration testing , Security Alert , information security tips , security research , cybersecurity , Enterprise

Michelle Drolet

Cisco Security Notice Cisco WebEx Business Suite HTTP GET Parameters Include Sensitive Information

Top 10 things to know about mobile security

Security Partners , Verizon , security software , Data Security , Security Regulations , iOS update , credit card security , Mobile Devices , Security Threat , Information Security , iPhone , AT&T , Mobile Apps , Information Security Summit , T-Mobile , Compliance & Privacy , Apple , Big Data , Mobile Protection , Data Privacy , security research , iOS , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

10. Malware is on the rise

Introducing our Quarterly Newsletter: the Data Security Review

Security Partners , network security , Security Services , security software , Web Storage , Data Security , Government Compliance Regulations , Security Regulations , Heartbleed , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , web server , Application Security , Security , malware , Mobile Apps , Hackers , endpoint security system , Cloud Security , T-Mobile , Web Application Firewall , Apple , Shockwave. Internet Explorer , security policy , cybercriminals , penetration testing , financial security , Security Alert , information security tips , Big Data , Mobile Protection , Data Privacy , Web Browser , security research , vulnerability management , Mobile Security , Third-party Vendor , web users , cybersecurity , Data Breach

Michelle Drolet

I am excited to announce the launch of our quarterly newsletter, the Data Security Review.

Please join us at the Information Security Summit 2014

Security Partners , network security , security software , Data Security , Security Regulations , credit card security , Mobile Devices , Security Threat , Information Security , Mobile Apps , Information Security Summit , Hackers , endpoint security system , Cloud Security , Compliance & Privacy , security policy , cybercriminals , financial security , Events , information security tips , Compliance , Mobile Protection , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Towerwall Security/Vulnerability Alert Vol 13.62

Data Security , Security Threat , Information Security , Application Security , Security , Hackers , cybercriminals , Security Alert , information security tips , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

Recent vulnerabilities for which exploits are available compiled by the Qualys Vulnerability Research Team. This is a list of recent vulnerabilities for which exploits are available. System administrators can use this list to help in prioritization of their remediation activities. The Qualys Vulnerability Research Team compiles this information based on various exploit frameworks, exploit databases, exploit kits and monitoring of internet activity.