The Time Has Come to Secure the Lower Levels

Posted: May 17, 2016 / Author: Dror Liwer

All People Seem To Need Delicious Pizza. Well, that’s one way to remember the Application, Presentation, Session, Transport, Network, Data link and Physical layers that make up the OSI Model. Unfortunately, many organizations seem to be fixated on the upper layers of the OSI Model, while forgetting the lower layers are just as critical. The upper layers — application, presentation, session — focus on interacting with the user and implementing applications that run on a network. The lower layers — transport, network, data link and physical — deal with the formatting, encoding and transmission of data over the network. Without…

Read More
Recent Posts

Hijacked Drones: Not Even Law Enforcement is Safe from Commjacking

Posted: May 9, 2016 / Author: Dror Liwer

Law enforcement agencies are increasingly using drones for surveillance, but a new discovery shows that police will also have to keep an eye out for commjackers. IBM researcher Nils Rodday demonstrated at the RSA Conference in March that he can commjack security drones from a mile away. He took control of a $30,000 professional-grade quadcopter by exploiting an unencrypted on-board chip. Add drones to the list of devices that can be commjacked: Personal devices such as smartphones and laptops, cars, airplanes and even children’s toys are all vulnerable. Rodday showed that no matter the technology, with the right tools just…

Read More