The Best of Coronet 2016

Posted: December 27, 2016 / Author: Dror Liwer

We wrote them and you loved them. Here’s a recap of the posts you loved, shared, engaged, Tweeted, Liked, repurposed and gave us some feedback on the most in 2016.   1. Cybersecurity Worker Shortage & What We Should Be Doing About It Our most popular post tackled the much discussed issue of supply and demand in the niche of cybersecurity professionals; with the demand being at an all-time high and supply falling short and not by a little – as many as one million cybersecurity positions waiting to be filled. In the meantime, with rates of cybercrime continuing to…

Read More
Recent Posts

Confining the Enterprise Wi-Fi Cyber Mess

Posted: December 11, 2016 / Author: Dror Liwer

When companies develop Wi-Fi policies, they factor from the outset that everyone from the top executives down to the newest intern will need internet access in all places and all times, even in-flight. Furthermore, if Wi-Fi is for some reason inaccessible, all smartphones have hotspot options, meaning that Wi-Fi surrounds us like the air we breathe. While this constant internet connectivity is convenient and can be great for business, it is a nightmare for the CISOs and the cyber-security team. What are some of the security risks involved and what should a CISO be looking out for? Numbers Don’t Lie…

Read More

Why Not Even Google Pixel Can Offer Real Protection

Posted: November 17, 2016 / Author: Dror Liwer

Pixel, the first smartphone made by Google (excluding HTC’s Nexus One) is creating quite a buzz in the marketplace.  Major questions, however, remain regarding the secure nature of the device.  While the waters have yet to be tested, Adrian Ludwig, Android’s director of security, has come out with an announcement declaring  the Pixel to be “as secure as the iPhone.” . While this may reassure some, the comparison between Pixel, iPhone or any other device may not matter at all.…

Read More
More Posts

What’s behind the latest Coronet wireless management platform release?

Posted: November 14, 2016 / Author: Dror Liwer

There is no doubt that companies are struggling to deal with BYOD policies. With the exponential growth of new wireless devices on the market, developing coherent and enforceable policies will soon be impossible. Companies understand that they cannot control the type of devices their employees use, nor gauge the risk levels around those devices. Furthermore, in the event of a cybersecurity event, currently companies are bound the damage control and there are no preventative measures available.    Since employees and…

Read More

DDoS via Wi-Fi Phisher

Posted: November 2, 2016 / Author: Dror Liwer

Reconnecting to your wireless router? Beware of Wi-Fi Phishing! Enterprise access points are often protected by the network security protocols and policies that cover the entire organization. The level of protection achieved is not similar in all businesses because lack of comprehensive knowledge is common and many businesses lack central control. In an era, in which we all work from mobile devices, connecting and communicating via wireless network, security admins have an even difficulty in achieving proper control over all…

Read More

Hackers Can Bypass HTTPS Protection on Windows, Linux, and Mac

Posted: October 9, 2016 / Author: Dror Liwer

If you browse to a major website on the internet, chances are you’ll see something next to the URL—a tiny lock icon, next to the prefix “HTTPS.” This indicates that you’re currently using a secure version of the Hypertext Transfer Protocol. It means that the connection between your web browser and the application you are viewing is encrypted via TLS (Transport Layer Security). In effect, it is very difficult for a potential attacker to eavesdrop on what users are doing…

Read More

The Top 12 Influencers of Network Threats on Twitter

Posted: September 26, 2016 / Author: Dror Liwer

We’ve compiled a top twelve list of the industry journalists you must follow if you’re concerned about network and mobile device threats.Why? Just because we love their work and have no doubt they will be useful to you too. Also, we’ve provided each of their Klout scores, otherwise known as a number (on a scale from 1 to 100) that shows how much interaction each piece of their content receives (with 100 being the most interaction).   1. Brian Krebs @briankrebs…

Read More

The End for SMS-Based Two Factor Authentication

Posted: September 19, 2016 / Author: Dror Liwer

For home users and enterprise professionals alike, SMS-based two-factor authentication (2FA) has become a relatively annoying fact of life. Type your password into your computer, wait while a text is sent to your phone, and then race to type in a second passcode before it expires. It’s a bit of a hassle, but for many it’s been the most important line of defense between hackers and confidential, SaaS applications, and financial information. Now, all of that may be about to…

Read More

You Don’t Need to be so Smart to Hack a ‘Smart’ Lock

Posted: September 14, 2016 / Author: Dror Liwer

The Internet of Things has only just begun but it is quickly gaining momentum. Connected devices are becoming an integral part of our everyday lives. As we become reliant on them, it becomes increasingly difficult to secure the devices. Hackers only need to gain one point of entry to compromise your home and even your work network. As consumers purchase IoT devices to replace banal items in the home, their new found usability quickly outweighs any security implications. On the…

Read More

Coronet joins StarHub’s Cyber Security Centre of Excellence as Newest Partner

Posted: September 6, 2016 / Author: Dror Liwer

 Coronet Tapped For Innovative Cyber Security Solution  That Combats Threats Targeting WiFi and Cellular Networks  Singapore, September 6th, 2016 – Coronet, a cyber security software company, announced it has teamed up with StarHub, Singapore’s second largest info-communications company. Coronet becomes the newest partner to join forces in supporting StarHub’s Cyber Security Centre of Excellence (COE). Introduced in May this year, StarHub’s COE serves as a strategic hub for driving forward Singapore’s cyber security ecosystem in the country. The COE brings together…

Read More