Towerwall's InfoSec Blog

Content Type

See all

Fake PayPal Emails Distributing Malware

Security Services , security software , Data Security , Security Regulations , Social Engineering , Security Threat , Phishing , Security Program , Information Security , Security , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Everyday there is a new threat with seemingly innocent emails being sent out that look close to an official correspondence from a company, from Paypal, ADP and BBB - to name a few. Cybercriminals are mimicking the online payment processor PayPal in a malicious spam campaign that attempts to dupe customers into downloading malware from links in seemingly authentic emails, according to a Webroot report written by Dancho Danchev. The piece of malware in use here is a backdoor that, oncefalse

Top 10 PHP Security Vulnerabilities

Security Services , security software , Data Security , Security Regulations , threat landscape , Security Threat , Information Security , Application Security , Security , Hackers , cyber-attack , security policy , cybercriminals , penetration testing , Security Alert , information security tips , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

Security is not a list of things you do. Security is a way of thinking, a way of looking at things, a way of dealing with the world that says “I don’t know how they’ll do it, but I know they’re going to try to screw me” and then, rather than dissolving into an existential funk, being proactive to prevent the problem. But, you can’t buck statistics. Nobody is going to read an article entitled “Coding for Security.” Everyone wants an article with a number in it: “The 8 Most Common PHP Securityfalse

Dealing with Phishing Messages

network security , Security Services , security software , Data Security , Security Regulations , Social Engineering , Security Threat , Phishing , Security Program , Information Security , Security , Hackers , cyber-attack , cybercriminals , Security Alert , information security tips , internal emails , security research , Mobile Security , email scam , cannabis , cybersecurity , Enterprise

Michelle Drolet

According to the article in Dark Reading, Study: Phishing Messages Elude Filters, Frequently Hit Untrained Users, many people are still being tripped up by phishing emails. The article summarizes the findings of a survey that was conducted at the Black Hat USA security conference held in July 2012. Of the 250 conference attendees that were polled, 69% said that phishing messages get past spam filters and into users’ inboxes on a weekly basis. Over 25% indicated that top executives and otherfalse

Introducing Towerwall's BYOD Policy Services

Security Partners , Security Services , Data Security , BYOD , Information Security , Security , security policy , information security tips , Mobile Protection , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Introducing Towerwall's VOIP Assessment Services

Security Services , security software , Data Security , Assessment , credit card security , Security Threat , Phishing , Security Program , Information Security , Security , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , financial security , information security tips , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Introducing Towerwall's Threat Spotlight

Security Partners , Security Services , security software , Data Security , Towerwall , Security Regulations , threat landscape , credit card security , Security Threat , Information Security , Security , Information Security Summit , Hackers , cyber-attack , security policy , cybercriminals , information security tips , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

We are proud to announce our Threat Spotlight, sign up for our Twitter feed and get the latest threats and how to protect against them.

BYOD means Bring Your Own Dilemma

network security , Security Services , security software , BYOD , Security Regulations , Security Threat , Information Security , Security , Hackers , cyber-attack , security policy , cybercriminals , Tablets , Security Alert , information security tips , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

It’s becoming more and more common for workers to store work-related documents on their smartphones, tablet computers and other devices they bring to and from work each day. While this can be convenient--employees can access important documents at home or on the road--it also creates greater security risks for businesses.

New Internet Explorer zero day being exploited in the wild

Security Services , security software , Web Storage , Data Security , Security Regulations , Security Threat , Information Security , web server , Security , Internet Explorer , Hackers , Web Application Firewall , cyber-attack , security policy , cybercriminals , penetration testing , information security tips , Web Browser , security research , Mobile Security , web users , cannabis , cybersecurity , Enterprise

Michelle Drolet

After the last zero day exploit on Java we reported some weeks ago it appears that a new 0day has been found in Internet Explorer by the same authors that created the Java one. Yesterday, Eric Romang reported the findings of a new exploit code on the same server that the Java 0day was found some weeks ago. The new vulnerability appears to affect Internet Explorer 7 and 8 and seems to be exploitable at least on Windows XP. The exploit code found in the server works as follow: - The filefalse

Microsoft Windows Update emails try to steal your Gmail, Yahoo, AOL passwords...

Yahoo , Security Services , passwords , security software , Data Security , Social Engineering , Security Threat , AOL , Phishing , Information Security , Security , Hackers , cyber-attack , security policy , cybercriminals , Microsoft , Gmail , Security Alert , information security tips , internal emails , Web Browser , security research , email scam , cannabis , cybersecurity , Enterprise

Michelle Drolet

Beware any emails which claim to come from privacy@microsoft.com - it could be that you're being targeted in an attack designed to steal your AOL, Gmail, Yahoo or Windows Live password. At first glance, if you don't look too carefully, the emails entitled "Microsoft Windows Update" may appear harmless enough. But the grammatical errors and occasional odd language should raise alarms bells that the emails may not really be from Microsoft. Dear Windows User, It has come to our attention thatfalse

Separation of Corporate and Personal: Best Practices for Securing Data on Mobile Devices

Security Partners , Security Services , security software , Data Security , Security Regulations , Security Threat , Security , security policy , Security Alert , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

As the BYOD trend gains momentum, not all employees are comfortable having their personal phones locked down and controlled as tightly as a corporate-issued device. To get around this issue some organizations are turning to separation techniques to securely manage corporate email, apps, and docs on employee devices while keeping personal data out of sight and out of mind.