Cyber Criminals

Home/Tag: Cyber Criminals

How can I spot an online shopping scam?

Amazon has forever changed how we shop online. With their massive spectrum of products, easy-to-use website, and extremely efficient shipping methods, Amazon has become the face of e-commerce. Fortune estimates that by 2021, Amazon will have been responsible for half of all e-commerce sales! Although Amazon is widely considered a trusted name in e-commerce, it [...]

By |2018-03-25T20:39:02+00:00March 25th, 2018|Categories: Blog|Tags: , , , , , , , |Comments Off on How can I spot an online shopping scam?

Providing Cybersecurity Training to Ultra High Net Worth Executives

On December 6th, Kevin Hyde, Managing Director of Layer 8 Security was the guest lecturer at UBS Financial Services Inc.’s ultra high net worth individual meeting on cybersecurity. Kevin provided practical security training to using scenarios executives can imagine themselves in as they encounter their work and personal lives. The training detailed the nature of [...]

By |2017-12-20T00:35:07+00:00December 20th, 2017|Categories: Press Releases|Tags: , , , , , , , |Comments Off on Providing Cybersecurity Training to Ultra High Net Worth Executives

Smarter Phones Lead to Smarter Hackers

Smartphones have opened a new world of connectivity, giving users unprecedented and unwavering access to the Internet at the touch of a button. It has been widely reported that the average smartphone owner checks their device around 85 times per day (I do it more than that ;-) ), and many claim that they need [...]

By |2017-12-20T18:19:10+00:00December 20th, 2017|Categories: Blog|Tags: , , , , , , , , |Comments Off on Smarter Phones Lead to Smarter Hackers

Losses due to recent strains of ransomware; Option A= $62million? or Option B = $310million?

Both sound like bad options, but the choice is obvious. The recent reports of “Bad Rabbit” attacks have put ransomware top of mind in the cybersecurity world. Bad Rabbit is certainly not the first of its kind; in fact, it’s not even the first this year. The ransomware dubbed “Petya” was first discovered in 2016 [...]

By |2017-11-09T12:30:42+00:00November 8th, 2017|Categories: Blog|Tags: , , , , , , , , , |Comments Off on Losses due to recent strains of ransomware; Option A= $62million? or Option B = $310million?

Password Management is More Important Than You Think

Password Management is More Important Than You Think Personal Data Protection Series 3 of 6 Passwords Strong passwords keep apps and online services secure. Layer 8 Security wants our community to be safe with their personal information by playing it smart. Please pass this information along to co-workers, family and neighbors. These recommendations will benefit [...]

By |2017-06-22T20:19:37+00:00September 19th, 2016|Categories: Blog|Tags: , , , , , , |Comments Off on Password Management is More Important Than You Think

Dialing for Personal Data Dollars

Understanding PII and Why Criminals Want It Series 1 of 6 Layer 8 Security wants our community to be safe with their personal information by playing it smart. Please pass this information along to co-workers, family and neighbors. These recommendations will benefit not only yourself but also your workplace. Cyber criminals want your personal data. [...]

By |2017-06-22T20:19:37+00:00August 11th, 2016|Categories: Blog|Tags: , , , , , |Comments Off on Dialing for Personal Data Dollars

ISP Phishing Scam

The BBC is reporting cyber criminals are targeting users with a fake pop-up window designed to look like a legitimate message from the user’s ISP. The message states there is malware on the user’s system and please call the toll free number provided. It’s a scam. But as phishing campaigns go this one is particularly [...]

By |2017-06-22T20:19:38+00:00June 23rd, 2016|Categories: Blog|Tags: , , , , , , , |Comments Off on ISP Phishing Scam

Why Spear Phishing and Social Engineering Work

Why Spear Phishing and Social Engineering Work People are the weakest link when it comes to cybersecurity. Why do they click on an embedded link contained in an email. Why do they open what looks like a suspicious email in the first place? Successful ransomware and spear phishing attacks continue to be on the rise; [...]

By |2016-06-02T16:17:38+00:00June 1st, 2016|Categories: Blog|Tags: , , , , , , , , , |Comments Off on Why Spear Phishing and Social Engineering Work

Tactics of the Attacker – New European Spear Phishing Campaign

Tactics of the Attacker - New European Spear Phishing Campaign Cyber criminals are taking ransomware to a new level. The BBC is reporting consumer personal information is being stolen from unsecured databases. See here for details: http://www.zdnet.com/article/new-phishing-attack-knows-your-address-and-brings-ransomware/ That data is then used to create carefully crafted spear phishing email. The emails have names, addresses, etc [...]

By |2017-06-22T20:19:38+00:00May 25th, 2016|Categories: Blog|Tags: , , , , , |Comments Off on Tactics of the Attacker – New European Spear Phishing Campaign

VPN: Protecting the Business Traveler

Business travelers and anyone who frequent public WiFi hot spots are especially vulnerable to cyber attacks.  You never know who is also on the free WiFi, and what they might be doing. Eavesdropping for user data at these places is easy and can yield a treasure trove of information to a hacker. Businesses have been [...]

By |2017-06-22T20:19:38+00:00May 23rd, 2016|Categories: Blog|Tags: , , , , , |Comments Off on VPN: Protecting the Business Traveler