Car-hacking Research Faces Legislative Limits in the U.S.

Posted: December 24, 2015 / Author: Dror Liwer

Consumers are starting to understand that the fun and convenience of connected cars comes with a price tag. As with many WiFi or Cellular connected products, connected cars are at risk of being hacked. In early 2015, BMW discovered a flaw in its ConnectedDrive software, the system that connects a BMW to the Internet for a variety of services including navigation systems, real-time traffic and remote door locking. Researchers imitated the company’s servers and sent unlocking requests remotely. These unlocking requests, which also affected Rolls Royce and Mini Coopers, are just the beginning of car hacking dangers.   Researchers Charlie…

Read More
Recent Posts

For $1400, A Hacker Can Access Any LTE Device

Posted: December 16, 2015 / Author: Dror Liwer

Aside from being capable of streaming high-bandwidth content such as videos and music to mobile devices,  LTE networks are also popular because they are largely considered to be unhackable. But what will device owners think if they realize LTE networks aren’t impenetrable? Researchers recently showed that LTE networks are indeed hackable – and they can be hacked with some very inexpensive equipment at that.   The Unthinkable Happened Taking equipment that only cost around $1400, researchers were able to hack an LTE network by using the radio layer to force the device into giving away its location, thus allowing them…

Read More

Does a Hidden SSID Make You Feel Safe? It Shouldn’t. Here’s Why

Posted: November 26, 2015 / Author: Dror Liwer

The logic makes sense: If it can’t be seen, it can’t be attacked. But that logic doesn’t always work with wireless SSID. Many businesses and individuals hide their SSIDs (known fully as a Service Set Identifier) with the hope of eluding commjackers. A prevailing theory in security has long held that by cloaking an SSID, hackers won’t know your network exists, and thus, can’t penetrate it. Simply put, that theory is wrong. Cloaking your network isn’t as safe as you…

Read More
More Posts

Are Millennials Really the Biggest Threat to Your Company’s Data Security?

Posted: November 17, 2015 / Author: Dror Liwer

With cybercrime on the rise, more and more companies are on the look out for solutions to prevent security breaches. What many don’t realize is that millennials may be the weak link in the fight against cyber attacks. After all, while millennials or digital natives are tech savvy, their <over?> reliance on mobile devices may be putting companies at risk. With recent estimates suggesting that this demographic will make up at least half of the U.S. workforce by 2020, companies…

Read More

Attended the Rugby World Cup? Now Is the Time to Digitally Disinfect Your Smartphone

Posted: November 1, 2015 / Author: Dror Liwer

Few experiences unite people from around the world as indiscriminately as the Rugby World Cup. Perhaps because like all major sporting events, it’s the ultimate shared experience capable of turning people with very little in common into comrades. Thanks to technology and social media, fans can share their thoughts and reactions in real-time as try-by-try commentary. More than just passive spectators, fans are now active participants in their own game which plays out online one hashtag at a time. The…

Read More

Quick Quotes on Cybersecurity and Commjacking

Posted: October 26, 2015 / Author: Dror Liwer

October is Cybersecurity Awareness month in the cyber world. In honor of this exciting and important initiative, we thought it best to take a break from writing our own thoughts on cybersecurity and commjacking and leave it to the industry experts instead. Commjacking in the Work-Anywhere Generation “People want to work anywhere and everywhere. They open their laptop up and it is confidential – they are really not thinking about what they are doing. Yes, we can look at the…

Read More

Trying to Child-Proof the Internet? You’re Missing the Point

Posted: October 7, 2015 / Author: Dror Liwer

October is Cybersecurity Awareness month. In honor of this important initiative, our latest blog post focuses on why you need to make sure your  family – your kids and teenagers – are cyber smart… Being tech savvy is no longer relevant. Much like the floppy disk, it’s outdated and of little use to anyone of consequence. What matters now is digital literacy. Take a look at any U.S. school and you’re likely to find some program devoted to teaching the building blocks of…

Read More

Connected Cars Security Hacks: Hype or Real Cause For Alarm?

Posted: August 12, 2015 / Author: Dror Liwer

In many ways the connected car was the automotive industry’s answer to the smartphone. This was an attempt to innovate and offer game-changing features which would make our lives more convenient and connected than ever before. And while these cars have done just that, they’ve also exposed us to vulnerabilities we never could have imagined. After all, who would have thought a car could be hacked? It’s questionable whether even the biggest and most reputable car manufacturers, saw that coming.…

Read More

Are You Really at Risk From Organized Cybercrime and Espionage?

Posted: August 3, 2015 / Author: Dror Liwer

Businesses can no longer ignore the threat posed by cybercrime. The potential havoc such security breaches cause is anything but pretty, with recent estimates suggesting that this damage is likely to cost businesses over $2 trillion by 2019. What’s even more disturbing is that it’s no longer just big corporations like Sony, Target and Goodwill that are targets. As cybercrime becomes more prolific and increasingly sophisticated affecting large and small businesses alike, a more nuanced understanding of the threat at…

Read More

Coronet, Commjacking and Why All the Fuss About Wi-Fi Security

Posted: July 15, 2015 / Author: Dror Liwer

The word, ‘commjacking’ is a derivation of hijacking and communications. It is a method of intercepting the data and voice flows, or communication channels, from any device that can connect to cellular or WiFi networks. Once those flows are intercepted, hackers can get to any information you are sharing through that device, including personal details, login credentials and so on. Commjackers can even listen into conversations, intercept and manipulate SMS and email messages and all in real-time too – you…

Read More