Hardware vs Software Mobile Security – Which Keeps Your Device Safer?

Dror Liwer Blog

Media coverage of cybersecurity tends to focus on major companies which are victims of hacking and data theft. Consequently, there’s a lot of industry focus on enterprise security within offices and data centers i.e. security issues affecting desktop computers, servers, and physical network infrastructure. This rather misses the fact that mobile devices (laptops, smartphones and tablets) have become the achilles …

Hackers Are Also Training to Take Over Mobile Devices at the Olympics

Dror Liwer Blog

Three things will almost certainly happen at the Olympic Games 2016: Rio de Janeiro weather will be beautiful, Russian athletes will surely be missed and a few athletes will win hearts with captivating performances. Another thing is undoubtedly bound to occur during the summer games: Cybercriminals will desperately try to win the gold medal of network hacking. Millions of people …

Top 6 Places Your Mobile Device Is Most At Risk of Being Hacked

Dror Liwer Blog

In 2016, connectivity seems less like a technological feature and more like a birthright. Though limitless WiFi and 4G/LTE may seem like nirvana, it also means hackers have nearly limitless opportunities to take control of your mobile device. While connectivity is a passport to the digital world, it is also a hacker’s gateway to sensitive personal and business data. Hackers …

Commjacking Stories that Rocked Our World

Dror Liwer Blog

Not long ago, we wrote about the commjacking stories that surprised us. They were stories about the realities and possibilities of commjacking from the least-likely places, including smart doorbells and drones. On the surface, they shouldn’t have been shocking. After all, commjackers can figure out almost any security obstacle. All they need is patience and just about any of the …

Cybersecurity Worker Shortage & What We Should Be Doing About It

Dror Liwer Blog

Let’s face it. Cybersecurity professionals are a rare commodity, and the demand for qualified workers in this field is, by many measures, at an all-time high. With more than one million cybersecurity job openings to fill this year, executives and hiring managers are scrambling to find, and retain the right resources to safeguard our networks and enterprises. According to a …

The Time Has Come to Secure the Lower Levels

Dror Liwer Blog

All People Seem To Need Delicious Pizza. Well, that’s one way to remember the Application, Presentation, Session, Transport, Network, Data link and Physical layers that make up the OSI Model. Unfortunately, many organizations seem to be fixated on the upper layers of the OSI Model, while forgetting the lower layers are just as critical. The upper layers — application, presentation, …

Hijacked Drones: Not Even Law Enforcement is Safe from Commjacking

Dror Liwer Blog

Law enforcement agencies are increasingly using drones for surveillance, but a new discovery shows that police will also have to keep an eye out for commjackers. IBM researcher Nils Rodday demonstrated at the RSA Conference in March that he can commjack security drones from a mile away. He took control of a $30,000 professional-grade quadcopter by exploiting an unencrypted on-board …

Ever Wondered What Commjackers Can Actually See When They Hack Into Your Device?

Dror Liwer Blog

If you’ve been following this blog, you’ll be very well-versed in the dangers of connecting to public WiFi and cellular networks. Yes, there is a very real possibility commjackers can eavesdrop on your online activity, putting your personal information and sensitive data in the wrong hands. But what exactly do commjackers see and what can they access when commjacking and …