Towerwall's InfoSec Blog

Content Type

See all

Is Your Business Taking the Threat of Mobile Malware Seriously?

threat landscape , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , malware , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , information security tips , Mobile Protection , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Don’t underestimate the damage that malware proprietors can unleash if the right security policies aren’t in place. Bring-your-own-device (BYOD) programs and cloud computing — two of the biggest enterprise trends from the last couple of years — go hand in hand. Employees want to be given the latitude to use their smartphones for work, and they want to have round-the-clock access to data and applications. For businesses, there are obvious advantages to both cloud computing and BYOD programs infalse

How to ensure mobile apps are secure for the enterprise

Android , Security Services , security software , Data Security , Security Regulations , threat landscape , Mobile Devices , Security Threat , Security Program , Application Security , Security , malware , iPhone , Mobile Apps , T-Mobile , security policy , Big Data , Mobile Protection , Data Privacy , security research , Mobile Security , cannabis , Enterprise , Data Breach

Michelle Drolet

As the app revolution has gathered pace and smartphones and tablets have become ubiquitous, the importance of testing app security has grown. Many companies have embraced the BYOD trend. They may even have developed applications that enable employees to have 24/7 access to business data and tools. The benefits can be counted in productivity boosts and flexibility, but there is a real and present danger that is being ignored all too often. How many of these enterprise apps have undergonefalse

Top 10 PHP Security Vulnerabilities

Security Services , security software , Data Security , Security Regulations , threat landscape , Security Threat , Information Security , Application Security , Security , Hackers , cyber-attack , security policy , cybercriminals , penetration testing , Security Alert , information security tips , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

Security is not a list of things you do. Security is a way of thinking, a way of looking at things, a way of dealing with the world that says “I don’t know how they’ll do it, but I know they’re going to try to screw me” and then, rather than dissolving into an existential funk, being proactive to prevent the problem. But, you can’t buck statistics. Nobody is going to read an article entitled “Coding for Security.” Everyone wants an article with a number in it: “The 8 Most Common PHP Securityfalse

Introducing Towerwall's Threat Spotlight

Security Partners , Security Services , security software , Data Security , Towerwall , Security Regulations , threat landscape , credit card security , Security Threat , Information Security , Security , Information Security Summit , Hackers , cyber-attack , security policy , cybercriminals , information security tips , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

We are proud to announce our Threat Spotlight, sign up for our Twitter feed and get the latest threats and how to protect against them.

Library file in certain Android Apps connects C&C servers

Android , network security , Data Security , Security Regulations , threat landscape , Security Threat , Security Program , Security , cyber-attack , security policy , cybercriminals , Security Alert , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

TrendMicro has uncovered certain Android apps (detected as ANDROIDOS_BOTPANDA.A) containing a malicious library file, which when executed, renders the infected device as a zombie device that connects to specific command and control (C&C) servers. What is also noteworthy about this file is that it hides its routines in the dynamic library, making it difficult to analyze. The malicious library libvadgo contained in ANDROIDOS_BOTPANDA.A was developed via NDK and loaded using Java Native Interface.false