Media coverage of cybersecurity tends to focus on major companies which are victims of hacking and data theft. Consequently, there’s a lot of industry focus on enterprise security within offices and data centers i.e. security issues affecting desktop computers, servers, and physical network infrastructure. This rather misses the fact that mobile devices (laptops, smartphones and tablets) have become the achilles …
Hackers Are Also Training to Take Over Mobile Devices at the Olympics
Three things will almost certainly happen at the Olympic Games 2016: Rio de Janeiro weather will be beautiful, Russian athletes will surely be missed and a few athletes will win hearts with captivating performances. Another thing is undoubtedly bound to occur during the summer games: Cybercriminals will desperately try to win the gold medal of network hacking. Millions of people …
Top 6 Places Your Mobile Device Is Most At Risk of Being Hacked
In 2016, connectivity seems less like a technological feature and more like a birthright. Though limitless WiFi and 4G/LTE may seem like nirvana, it also means hackers have nearly limitless opportunities to take control of your mobile device. While connectivity is a passport to the digital world, it is also a hacker’s gateway to sensitive personal and business data. Hackers …
Commjacking Stories that Rocked Our World
Not long ago, we wrote about the commjacking stories that surprised us. They were stories about the realities and possibilities of commjacking from the least-likely places, including smart doorbells and drones. On the surface, they shouldn’t have been shocking. After all, commjackers can figure out almost any security obstacle. All they need is patience and just about any of the …
Commjacking From the Least Likely Places: Door Bells, Drones and Robin Hood
As we’ve highlighted (more than once…..) before in this blog space, a commjacker needs only WiFi access and some basic tools to gain access to your wireless device. Whether you’re in a café, on an airplane, in a car or at home, if a commjacker has the means, s/he has a way into your device and then your sensitive data. …
Cybersecurity Worker Shortage & What We Should Be Doing About It
Let’s face it. Cybersecurity professionals are a rare commodity, and the demand for qualified workers in this field is, by many measures, at an all-time high. With more than one million cybersecurity job openings to fill this year, executives and hiring managers are scrambling to find, and retain the right resources to safeguard our networks and enterprises. According to a …
The Time Has Come to Secure the Lower Levels
All People Seem To Need Delicious Pizza. Well, that’s one way to remember the Application, Presentation, Session, Transport, Network, Data link and Physical layers that make up the OSI Model. Unfortunately, many organizations seem to be fixated on the upper layers of the OSI Model, while forgetting the lower layers are just as critical. The upper layers — application, presentation, …
Hijacked Drones: Not Even Law Enforcement is Safe from Commjacking
Law enforcement agencies are increasingly using drones for surveillance, but a new discovery shows that police will also have to keep an eye out for commjackers. IBM researcher Nils Rodday demonstrated at the RSA Conference in March that he can commjack security drones from a mile away. He took control of a $30,000 professional-grade quadcopter by exploiting an unencrypted on-board …
Ever Wondered What Commjackers Can Actually See When They Hack Into Your Device?
If you’ve been following this blog, you’ll be very well-versed in the dangers of connecting to public WiFi and cellular networks. Yes, there is a very real possibility commjackers can eavesdrop on your online activity, putting your personal information and sensitive data in the wrong hands. But what exactly do commjackers see and what can they access when commjacking and …
Commjacking a Child’s World
We know the dangers of using laptops, smartphones and tablets on unsecure WiFi. And now we see that commjackers can infiltrate our lives through other WiFi-enabled products like cars and TVs. Kids’ toys and baby products bring commjackers right into the house, creating a terrifying reality where strangers can spy on the average family. Hello Barbie Barbie, the mainstay …