Cyber Criminals

Home/Tag: Cyber Criminals

How can I spot an online shopping scam?

Amazon has forever changed how we shop online. With their massive spectrum of products, easy-to-use website, and extremely efficient shipping methods, Amazon has become the face of e-commerce. Fortune estimates that by 2021, Amazon will have been responsible for half of all e-commerce sales! Although Amazon is widely considered a trusted name in e-commerce, it is easy for third party sellers to fool customers into buying phony products. Through false descriptions, fake package tracking information, and luring prices, these deceptive [...]

Providing Cybersecurity Training to Ultra High Net Worth Executives

On December 6th, Kevin Hyde, Managing Director of Layer 8 Security was the guest lecturer at UBS Financial Services Inc.’s ultra high net worth individual meeting on cybersecurity. Kevin provided practical security training to using scenarios executives can imagine themselves in as they encounter their work and personal lives. The training detailed the nature of the current threat landscape, ways in which attackers gather information on targets, and the different methods used to exploit this information. Executives were also given [...]

Smarter Phones Lead to Smarter Hackers

Smartphones have opened a new world of connectivity, giving users unprecedented and unwavering access to the Internet at the touch of a button. It has been widely reported that the average smartphone owner checks their device around 85 times per day (I do it more than that ;-) ), and many claim that they need their phone to function normally within their work and social lives. Smartphones spread information and ideas in a faster way than was ever possible, but [...]

Losses due to recent strains of ransomware; Option A= $62million? or Option B = $310million?

Both sound like bad options, but the choice is obvious. The recent reports of “Bad Rabbit” attacks have put ransomware top of mind in the cybersecurity world. Bad Rabbit is certainly not the first of its kind; in fact, it’s not even the first this year. The ransomware dubbed “Petya” was first discovered in 2016 and morphed into the still more dangerous “NotPetya” in March of 2017. NotPetya wreaked havoc for thousands of users worldwide, taking advantage of weaknesses in [...]

Password Management is More Important Than You Think

Password Management is More Important Than You Think Personal Data Protection Series 3 of 6 Passwords Strong passwords keep apps and online services secure. Layer 8 Security wants our community to be safe with their personal information by playing it smart. Please pass this information along to co-workers, family and neighbors. These recommendations will benefit not only yourself but also your workplace. Passwords are a key component of keeping yourself protected from bad guys trying to steal your personally identifiable [...]

Dialing for Personal Data Dollars

Understanding PII and Why Criminals Want It Series 1 of 6 Layer 8 Security wants our community to be safe with their personal information by playing it smart. Please pass this information along to co-workers, family and neighbors. These recommendations will benefit not only yourself but also your workplace. Cyber criminals want your personal data. It is money to them. Stolen data is bought from and sold to other cyber criminals from the black market. There’s a whole network of [...]

ISP Phishing Scam

The BBC is reporting cyber criminals are targeting users with a fake pop-up window designed to look like a legitimate message from the user’s ISP. The message states there is malware on the user’s system and please call the toll free number provided. It’s a scam. But as phishing campaigns go this one is particularly nasty. Criminals are using the credibility of real ISPs to attack consumers. http://www.bbc.com/news/technology-36084989 The attacks so far have occurred in the US, Canada, and Great [...]

Why Spear Phishing and Social Engineering Work

Why Spear Phishing and Social Engineering Work People are the weakest link when it comes to cybersecurity. Why do they click on an embedded link contained in an email. Why do they open what looks like a suspicious email in the first place? Successful ransomware and spear phishing attacks continue to be on the rise; in February a Los Angeles hospital paid $17,000 to hackers in order to “free” their computers. http://www.latimes.com/business/technology/la-me-ln-hollywood-hospital-bitcoin-20160217-story.html So far this year the FBI estimates $200 [...]

Tactics of the Attacker – New European Spear Phishing Campaign

Tactics of the Attacker - New European Spear Phishing Campaign Cyber criminals are taking ransomware to a new level. The BBC is reporting consumer personal information is being stolen from unsecured databases. See here for details: http://www.zdnet.com/article/new-phishing-attack-knows-your-address-and-brings-ransomware/ That data is then used to create carefully crafted spear phishing email. The emails have names, addresses, etc of the user. The email comes in the form of a collection letter,demanding money for an unspecified service or overdue bill. The email looks legitimate. [...]

VPN: Protecting the Business Traveler

Business travelers and anyone who frequent public WiFi hot spots are especially vulnerable to cyber attacks.  You never know who is also on the free WiFi, and what they might be doing. Eavesdropping for user data at these places is easy and can yield a treasure trove of information to a hacker. Businesses have been using Virtual Private Networks (VPN) for years; enabling employees to safely connect to the business network from a remote location. Company laptops are routinely supplied [...]