Monthly Archives: May 2015

Hackers For Hire

Don't laugh. It  may sound crazy, but there are actually online marketplaces, online, out in the open, where you can hire a hacker to meet your particular needs. Now, the guidelines seem to indicate that every request should be on the up and up, but taking a look around tells another tale on Hacker's List. (https://nakedsecurity.sophos.com/2015/01/19/hackers-for-hire-hackers-list-for-those-with-no-ethics-or-espionage-skills/) And keep in mind-this is only one website, out in the open. This does not take into account those more unsavory actors operating in [...]

Serious iOS messaging bug can crash your iPhone

Everyone who uses an Apple device should be on the lookout for a new threat that can crash/reboot your device.  Users of Apple’s desktop and mobile operating systems are experiencing crashing computers, phones, and tablets across the internet.  This is caused by a bug in Apple's rendering engine of Arabic text when a message gets shortened. The text that will cause this can be seen in the image below: By the time you’ve received the malicious text, it’s probably too late. [...]

Another High Profile Healthcare Breach

The NY Times recently published a story that yet another major health insurance provider-this time CareFirst, serving the Washington, DC area-had been breached. The attack exposes possibly as many as 1.1 million patients, though the company offers up that things like Social Security numbers and other sensitive financial data did not appear to be grabbed during the attack. That fact may be little comfort to someone who did have their name, e-mail and birthday compromised-it's enough to be annoying, that's [...]

Prevention Trumps Detection

Some of you may see that headline and consider me Captain Obvious, but it's worth saying regardless. For as many IT staffers out there prefer to take the approach of threat prevention and avoidance, there are still plenty  that are content to detect and remedy. And that method has a major flaw-detection time. While some security appliances do provide real time, or near-real time threat detection and reporting, deployment of such tools is not as common as, say, a wireless [...]

Malware… for humans?

Imagine going to your general practitioner's office for an annual physical. Your doctor checks your blood pressure, your heart rate, your temperature. Your doctor likely quizzes you about your diet, exercise, smoking habits, whether your artificial body parts are up-to-date with the latest patches. Wait. What? As if we didn't have enough devices to stay on top of. The benefits of treating chronic conditions with medical devices, such as a pacemaker or an artificial pancreas, are recognized; however, keeping those [...]

Cyber Breaches: Four Different Expert Perspectives

PRESS RELEASE Contact: Kat Jimenez, Sales and Marketing Assistant kat.jimenez@layer8cybersecurity.com May 15, 2015  Exton, Pennsylvania – The Greater Philadelphia Alliance for Capital & Technology (PACT) hosted How will you respond to a Cyber Attack: Observe Incident Response Plans in Action, the final cybersecurity seminar in a three part series, featuring Broadpath PR, Cozen O'Connor, Layer 8 Security, and Morris Risk Management on May 7, 2015 at the Philadelphia Marriott West. One of the panel members, Kevin Hyde, from Layer 8 Security, reflected [...]

Healthcare Breaches Are Big Business

Many people have opined that this year could be the year of the healthcare hack, much like 2014 will be known for the Sony debacle. But these hacks are not about curious kids hacking around in their parent's basement. They have not been for a good while now. Though you will from time to time come across someone actually doing things for fun, the breaches are now, more than ever before, about finding holes, exploiting vulnerabilities and...cashing in. Hackers are [...]

Cybersecurity Firm Securing Children’s Futures – Taking Time to Say Thanks

PRESS RELEASE Contact: Kat Jimenez, Sales and Marketing Assistant kat.jimenez@layer8cybersecurity.com May 15, 2015  Exton, Pennsylvania – Members of Layer 8 Security attended the Marine Corps Scholarship Foundations's Philadelphia Celebratory Ball on April 17, 2015 at the Hilton Philadelphia at Penn's Landing. The Scholarship Foundation provides higher education financial assistance for the children of U.S. Marines killed in action.  Colonel Jeffrey Lipson, Executive Director of Layer 8 Security remarks, "Taking time out from our day-to-day routine to attend events like the MCSF [...]

Can A Good Defense Include…Offense?

When defending one's network resources, things like firewalls and other security appliances are envisioned. Putting walls up, both physical and virtual, to keep the bad guys out-that's the name of the game, right? What if it wasn't? People, and businesses, are hacked with regularity. Some hacks are harmless, some random person just probing things but without malicious intent. Others are testing and probing defenses, searching for a soft spot to exploit. And sometimes, you get the Sony hack that we've [...]

Cyber insurance regulations: Senate probes federal data breach protections bill

Cyber insurance is becoming a significant market force that will drive improved cyber security for both companies and by extension the consumers and the nation as a whole. It is more than just an instrument to transfer risk, it provides incentives to understand and mitigate risks. To wit, attached is a summary of the most recent Senate hearing: U.S. Sen. Jerry Moran (R-Kan.), chair of the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security, held a hearing March [...]