Why Medical Records Are Hotter Than Credit Card Thefts

Posted: August 31, 2016 / Author: Dror Liwer

Last year, more than 113 million medical records were compromised. Government Health IT indicates that over a third (34%) of U.S. healthcare customer records have already been breached – the highest figure of any industry. Unfortunately, the fact is that hospitals and other healthcare institutions are struggling to adapt to the new threats they face. While health records are galloping into the digital arena at an unprecedented rate, funding for cybersecurity initiatives in healthcare is essentially at a standstill. [Tweet “Why Are Healthcare Network Threats a Problem?”] While it may seem like credit cards, SSNs, and other financial data are…

Read More
Recent Posts

The Art of Hacking: Why Absolutely Anyone Can Be a Hacker

Posted: August 25, 2016 / Author: Dror Liwer

What do hackers and street artists have in common? If you asked that question to the average person, you probably wouldn’t get much of an answer. But it turns out, both the hacker and the artist are equally capable of exploiting gaps in wireless security.   This isn’t hyperbole. In fact, an artist by the name of Kyle McDonald has been making a living as both a street artist and a hacker, albeit with no malicious intentions. With the help of a friend, the North Carolina artist recently created an art installation at Moogfest, which they call the WiFi Whisperer,…

Read More

Hardware vs Software Mobile Security – Which Keeps Your Device Safer?

Posted: August 17, 2016 / Author: Dror Liwer

Media coverage of cybersecurity tends to focus on major companies which are victims of hacking and data theft. Consequently, there’s a lot of industry focus on enterprise security within offices and data centers i.e. security issues affecting desktop computers, servers, and physical network infrastructure. This rather misses the fact that mobile devices (laptops, smartphones and tablets) have become the achilles heel for organizations’ cybersecurity. They are an integral part of the workplace and  used for handling business data are also…

Read More
More Posts

Hackers Are Also Training to Take Over Mobile Devices at the Olympics

Posted: August 4, 2016 / Author: Dror Liwer

Three things will almost certainly happen at the Olympic Games 2016: Rio de Janeiro weather will be beautiful, Russian athletes will surely be missed and a few athletes will win hearts with captivating performances. Another thing is undoubtedly bound to occur during the summer games: Cybercriminals will desperately try to win the gold medal of network hacking. Millions of people will be in Rio to attend Olympic events and they will assuredly seek WiFi connections for their devices. Hackers –…

Read More

Top 6 Places Your Mobile Device Is Most At Risk of Being Hacked

Posted: August 1, 2016 / Author: Dror Liwer

In 2016, connectivity seems less like a technological feature and more like a birthright. Though limitless WiFi and 4G/LTE may seem like nirvana, it also means hackers have nearly limitless opportunities to take control of your mobile device. While connectivity is a passport to the digital world, it is also a hacker’s gateway to sensitive personal and business data. Hackers exploit how mobile devices trust the networks—both wireless and cellular—that they typically connect to. They use readily-available tools to trick…

Read More