vulnerabilities

Home/Tag: vulnerabilities

Smarter Phones Lead to Smarter Hackers

Smartphones have opened a new world of connectivity, giving users unprecedented and unwavering access to the Internet at the touch of a button. It has been widely reported that the average smartphone owner checks their device around 85 times per day (I do it more than that ;-) ), and many claim that they need their phone to function normally within their work and social lives. Smartphones spread information and ideas in a faster way than was ever possible, but [...]

Bad Rabbit Did a Bad Bad Thing

New Ransomware Bad Rabbit is Wreaking Havoc Bottom Line Up Front: Preparation is your best friend to defend against Ransomware – get a backup system now for your company’s network and your personal computer On October 24th, the U.S. Computer Emergency Readiness Team announced reports of a new ransomware infecting computers around the world. This attack is the third major international ransomware campaign in 2017 alone, with NotPetya and WannaCry preceding it. These fittingly ominous names represent the widespread damage [...]

Layer 8 Security Presents at Rittenhouse Ventures’ Technology Leaders Forum

PRESS RELEASE Contact: Kat Jimenez, Sales and Marketing Assistant  kat.jimenez@layer8cybersecurity.com February 9, 2016 - The Navy Yard, Pennsylvania - Layer 8 Security presented at the inaugural Technology Leaders Forum hosted by Rittenhouse Ventures at their headquarters in Philadelphia. Chief Technology Officers and senior leaders within the Rittenhouse Ventures portfolio of companies attended the event to discuss the challenges and opportunities relating to technology. Following the theme of the forum, Layer 8 Security spoke about Data Security and covered the following [...]

How Much Cybersecurity Do You Need?

With data breaches going public daily and an endless amount of threats being present to nearly every organization, executives are left looking for answers. Can you defend against every threat to your organization? More importantly, is it possible to identify them all on a continual basis? The truth is that you don’t defend against every single threat. You can’t even try or it would burn a hole in the organizations budget faster than you can imagine. In order to be [...]

The Cost of Data Breaches Continue to Rise

Data breaches in 2014 made major headlines as large organizations such as Sony, Neiman Marcus and The Home Depot were compromised. 2015 has proven to be no different with BlueCross, Anthem and Ashley Madison joining the crowd. The biggest issue; however, is that the headlines only show the big fish, ones who can likely recover. What goes unnoticed are the other 1,400+ organizations who have been compromised in the past two years. This has led many C-Level executives of small [...]

Serious iOS messaging bug can crash your iPhone

Everyone who uses an Apple device should be on the lookout for a new threat that can crash/reboot your device.  Users of Apple’s desktop and mobile operating systems are experiencing crashing computers, phones, and tablets across the internet.  This is caused by a bug in Apple's rendering engine of Arabic text when a message gets shortened. The text that will cause this can be seen in the image below: By the time you’ve received the malicious text, it’s probably too late. [...]

Malware… for humans?

Imagine going to your general practitioner's office for an annual physical. Your doctor checks your blood pressure, your heart rate, your temperature. Your doctor likely quizzes you about your diet, exercise, smoking habits, whether your artificial body parts are up-to-date with the latest patches. Wait. What? As if we didn't have enough devices to stay on top of. The benefits of treating chronic conditions with medical devices, such as a pacemaker or an artificial pancreas, are recognized; however, keeping those [...]

Healthcare Breaches Are Big Business

Many people have opined that this year could be the year of the healthcare hack, much like 2014 will be known for the Sony debacle. But these hacks are not about curious kids hacking around in their parent's basement. They have not been for a good while now. Though you will from time to time come across someone actually doing things for fun, the breaches are now, more than ever before, about finding holes, exploiting vulnerabilities and...cashing in. Hackers are [...]

Anti-virus Is Not Enough

It used to be, when you bought a new computer for home or deployed a new machine in an office environment, the only security commonly deployed was an anti-virus package. You had your choice of any number of the popular vendor offerings, as the big dogs were all too eager to bundle their software with a PC builder’s machine to get a foothold. McAfee, Norton and Symantec were quite prevalent, and the yearly subscriptions became the norm. And these and [...]

2017-06-22T20:19:43-04:00By |Tags: , , |

Remember To Cover The Basics

It may seem obvious. It may be old hat. But it’s always worth repeating. Especially in light of a recent Cisco study that reveals that many IT teams fail to take even basic security steps. And what are those most basic of steps? Things like taking the time to apply critical patches when released, or maintaining up-to-date code levels. By being lax in these extremely obvious and supposedly routine procedures, an organization can be left open to major vulnerabilities for [...]