Why Not Even Google Pixel Can Offer Real Protection

Posted: November 17, 2016 / Author: Dror Liwer

Pixel, the first smartphone made by Google (excluding HTC’s Nexus One) is creating quite a buzz in the marketplace.  Major questions, however, remain regarding the secure nature of the device.  While the waters have yet to be tested, Adrian Ludwig, Android’s director of security, has come out with an announcement declaring  the Pixel to be “as secure as the iPhone.” . While this may reassure some, the comparison between Pixel, iPhone or any other device may not matter at all. With increasing business related communication and work taking place on a smartphone, security is paramount to success. When it comes…

Read More
Recent Posts

What’s behind the latest Coronet wireless management platform release?

Posted: November 14, 2016 / Author: Dror Liwer

There is no doubt that companies are struggling to deal with BYOD policies. With the exponential growth of new wireless devices on the market, developing coherent and enforceable policies will soon be impossible. Companies understand that they cannot control the type of devices their employees use, nor gauge the risk levels around those devices. Furthermore, in the event of a cybersecurity event, currently companies are bound the damage control and there are no preventative measures available.    Since employees and executives use wireless connectivity in the office, as well as public places, cyber criminals know to attack places with the…

Read More

DDoS via Wi-Fi Phisher

Posted: November 2, 2016 / Author: Dror Liwer

Reconnecting to your wireless router? Beware of Wi-Fi Phishing! Enterprise access points are often protected by the network security protocols and policies that cover the entire organization. The level of protection achieved is not similar in all businesses because lack of comprehensive knowledge is common and many businesses lack central control. In an era, in which we all work from mobile devices, connecting and communicating via wireless network, security admins have an even difficulty in achieving proper control over all…

Read More
More Posts