Monthly Archives: May 2015

Hackers For Hire

Don't laugh. It  may sound crazy, but there are actually online marketplaces, online, out in the open, where you can hire a hacker to meet your particular needs. Now, the guidelines seem to indicate that every request should be on the up and up, but taking a look around tells another tale on Hacker's List. [...]

By |2017-06-22T20:19:42+00:00May 29th, 2015|Categories: Blog|Tags: , , , , , , , , , , , , |Comments Off on Hackers For Hire

Serious iOS messaging bug can crash your iPhone

Everyone who uses an Apple device should be on the lookout for a new threat that can crash/reboot your device.  Users of Apple’s desktop and mobile operating systems are experiencing crashing computers, phones, and tablets across the internet.  This is caused by a bug in Apple's rendering engine of Arabic text when a message gets shortened. [...]

By |2017-06-22T20:19:42+00:00May 28th, 2015|Categories: Blog|Tags: , , , , , , , , , , |Comments Off on Serious iOS messaging bug can crash your iPhone

Another High Profile Healthcare Breach

The NY Times recently published a story that yet another major health insurance provider-this time CareFirst, serving the Washington, DC area-had been breached. The attack exposes possibly as many as 1.1 million patients, though the company offers up that things like Social Security numbers and other sensitive financial data did not appear to be grabbed [...]

By |2017-06-22T20:19:42+00:00May 28th, 2015|Categories: Blog|Tags: , , , , , , , , , , , |Comments Off on Another High Profile Healthcare Breach

Prevention Trumps Detection

Some of you may see that headline and consider me Captain Obvious, but it's worth saying regardless. For as many IT staffers out there prefer to take the approach of threat prevention and avoidance, there are still plenty  that are content to detect and remedy. And that method has a major flaw-detection time. While some [...]

By |2017-06-22T20:19:42+00:00May 28th, 2015|Categories: Blog|Tags: , , , , , , , , , , , , , , , |Comments Off on Prevention Trumps Detection

Malware… for humans?

Imagine going to your general practitioner's office for an annual physical. Your doctor checks your blood pressure, your heart rate, your temperature. Your doctor likely quizzes you about your diet, exercise, smoking habits, whether your artificial body parts are up-to-date with the latest patches. Wait. What? As if we didn't have enough devices to stay [...]

By |2017-06-22T20:19:42+00:00May 19th, 2015|Categories: Blog|Tags: , , , , , , , , , , |Comments Off on Malware… for humans?

Cyber Breaches: Four Different Expert Perspectives

PRESS RELEASE Contact: Kat Jimenez, Sales and Marketing Assistant kat.jimenez@layer8cybersecurity.com May 15, 2015  Exton, Pennsylvania – The Greater Philadelphia Alliance for Capital & Technology (PACT) hosted How will you respond to a Cyber Attack: Observe Incident Response Plans in Action, the final cybersecurity seminar in a three part series, featuring Broadpath PR, Cozen O'Connor, Layer 8 Security, [...]

By |2017-05-25T21:28:51+00:00May 15th, 2015|Categories: Press Releases|Tags: , , , , , , , , , , , , |Comments Off on Cyber Breaches: Four Different Expert Perspectives

Healthcare Breaches Are Big Business

Many people have opined that this year could be the year of the healthcare hack, much like 2014 will be known for the Sony debacle. But these hacks are not about curious kids hacking around in their parent's basement. They have not been for a good while now. Though you will from time to time [...]

By |2015-06-03T19:24:25+00:00May 15th, 2015|Categories: Blog|Tags: , , , , , , , , , , , , , |Comments Off on Healthcare Breaches Are Big Business

Cybersecurity Firm Securing Children’s Futures – Taking Time to Say Thanks

PRESS RELEASE Contact: Kat Jimenez, Sales and Marketing Assistant kat.jimenez@layer8cybersecurity.com May 15, 2015  Exton, Pennsylvania – Members of Layer 8 Security attended the Marine Corps Scholarship Foundations's Philadelphia Celebratory Ball on April 17, 2015 at the Hilton Philadelphia at Penn's Landing. The Scholarship Foundation provides higher education financial assistance for the children of U.S. Marines killed [...]

By |2017-05-25T21:29:17+00:00May 15th, 2015|Categories: Press Releases|Tags: , , , , , , , , |Comments Off on Cybersecurity Firm Securing Children’s Futures – Taking Time to Say Thanks

Can A Good Defense Include…Offense?

When defending one's network resources, things like firewalls and other security appliances are envisioned. Putting walls up, both physical and virtual, to keep the bad guys out-that's the name of the game, right? What if it wasn't? People, and businesses, are hacked with regularity. Some hacks are harmless, some random person just probing things but [...]

By |2017-06-22T20:19:42+00:00May 11th, 2015|Categories: Blog|Tags: , , , , , , , , , , |Comments Off on Can A Good Defense Include…Offense?

Cyber insurance regulations: Senate probes federal data breach protections bill

Cyber insurance is becoming a significant market force that will drive improved cyber security for both companies and by extension the consumers and the nation as a whole. It is more than just an instrument to transfer risk, it provides incentives to understand and mitigate risks. To wit, attached is a summary of the most [...]

By |2017-06-22T20:19:42+00:00May 4th, 2015|Categories: Blog|Tags: , , , , , , , , |Comments Off on Cyber insurance regulations: Senate probes federal data breach protections bill