hackers

Home/Tag: hackers

How can I spot an online shopping scam?

Amazon has forever changed how we shop online. With their massive spectrum of products, easy-to-use website, and extremely efficient shipping methods, Amazon has become the face of e-commerce. Fortune estimates that by 2021, Amazon will have been responsible for half of all e-commerce sales! Although Amazon is widely considered a trusted name in e-commerce, it is easy for third party sellers to fool customers into buying phony products. Through false descriptions, fake package tracking information, and luring prices, these deceptive [...]

Smarter Phones Lead to Smarter Hackers

Smartphones have opened a new world of connectivity, giving users unprecedented and unwavering access to the Internet at the touch of a button. It has been widely reported that the average smartphone owner checks their device around 85 times per day (I do it more than that ;-) ), and many claim that they need their phone to function normally within their work and social lives. Smartphones spread information and ideas in a faster way than was ever possible, but [...]

Bad Rabbit Did a Bad Bad Thing

New Ransomware Bad Rabbit is Wreaking Havoc Bottom Line Up Front: Preparation is your best friend to defend against Ransomware – get a backup system now for your company’s network and your personal computer On October 24th, the U.S. Computer Emergency Readiness Team announced reports of a new ransomware infecting computers around the world. This attack is the third major international ransomware campaign in 2017 alone, with NotPetya and WannaCry preceding it. These fittingly ominous names represent the widespread damage [...]

Your Email is the Treasure Hackers Want to Plunder

Personal Data Protection Education is the Best Defense Series 2 of 6 Email is the preferred method of hackers to steal data and extort money. Layer 8 Security wants our community to be safe with their personal information by playing it smart. Please pass this information along to co-workers, family and neighbors. These recommendations will benefit not only yourself but also your workplace. Email C-level executives are often targets of spear phishing attacks. One such scheme attempts to steal money [...]

2017-06-22T20:19:37-04:00By |Tags: , , , , , |

The BEC – Not Your Grandfather’s Phishing Scheme

The BEC - Not Your Grandfather’s Phishing Scheme The FBI has reported cyber criminals are using new tactics to steal millions from US companies. The schemes target companies that do business overseas, and use wire transfer of funds on a regular basis. The schemes is called a Business Email Compromise. As the name implies legitimate business emails are compromised through social engineering or direct cyber attack. This information is then used to make fraudulent wire transfers to banks, usually in [...]

2017-06-22T20:19:37-04:00By |Tags: , , , , , |

Police Pay Ransom

Looks like CNN’s prediction that 2016 will be ‘The Year of the Ransomware’ is coming true, and in spectacular fashion. Cyber criminals are targeting the most unlikely of victims: local U.S. police departments!  (http://www.nbcnews.com/news/us-news/ransomware-hackers-blackmail-u-s-police-departments-n561746)   The attacks are based out of Eastern Europe. Since 2013 departments in seven states have reported attacks. NBC News reports that five Maine police departments were locked out of their records management systems last year. Departments in Alabama and New Hampshire were also breached, but [...]

China Is Cutting the Legs Out from Under American Businesses (but please don’t stop them?)

Businesses and their executives everywhere should be aware of this story run by 60 Minutes on Jan 17, and the blog Jeff Lipson wrote about here. The fact that China is stealing U.S. companies’ intellectual property is not news. The fact that President Obama worked with the Western District of Pennsylvania to indict five Chinese officers of theft of intellectual property is not news. So, what is the real news bite here? Some companies and Americans want to fight back and stop [...]

Protecting Philadelphia Companies from Chinese Hacking – Part 1

Last night, 60 Minutes ran a segment on China’s massive theft of intellectual property from US businesses.  http://www.cbsnews.com/news/60-minutes-great-brain-robbery-china-cyber-espionage/ The episode highlighted that the Chinese government is using its military and intelligence services to give its companies an edge over US business, by stealing our trade secrets.   My Team and I spent a number of years working at US Cyber Command and the National Security Agency. We saw first hand just how prolific this theft was.  I’ve spoken numerous times [...]

Why Companies Respond Slowly To Breaches

You'd think it would be a long, drawn out reason, with lots of calculations and pretty charts. It's not. Per a recent piece in CSO, firms respond slowly to most of these breaches because, in spite of what you might have thought, the costs are relatively low. For an example, the article cited the recent Home Depot credit card debacle. The net cost wound up being around $28 million dollars-which doesn't seem too small to most of us. Take out [...]

Internet of Things presents new challenges

It is, without a doubt, one of the hottest topics in IT. The Internet of Things, or how data networking is going to effectively connect everything to everyone, has been discussed for quite some time, but it was not until recently where current technology was able to catch up to the theoretical ideas that have been out there. Now, we are seeing an explosion in embedded devices-things we would not have previously expected to have connectivity do. And this can [...]