Quick Quotes on Cybersecurity and Commjacking

Dror Liwer Blog

October is Cybersecurity Awareness month in the cyber world. In honor of this exciting and important initiative, we thought it best to take a break from writing our own thoughts on cybersecurity and commjacking and leave it to the industry experts instead. Commjacking in the Work-Anywhere Generation “People want to work anywhere and everywhere. They open their laptop up and …

Trying to Child-Proof the Internet? You’re Missing the Point

Dror Liwer Blog

October is Cybersecurity Awareness month. In honor of this important initiative, our latest blog post focuses on why you need to make sure your  family – your kids and teenagers – are cyber smart… Being tech savvy is no longer relevant. Much like the floppy disk, it’s outdated and of little use to anyone of consequence. What matters now is digital literacy. Take …

Connected Cars Security Hacks: Hype or Real Cause For Alarm?

Dror Liwer Blog

In many ways the connected car was the automotive industry’s answer to the smartphone. This was an attempt to innovate and offer game-changing features which would make our lives more convenient and connected than ever before. And while these cars have done just that, they’ve also exposed us to vulnerabilities we never could have imagined. After all, who would have …

Are You Really at Risk From Organized Cybercrime and Espionage?

Dror Liwer Blog

Businesses can no longer ignore the threat posed by cybercrime. The potential havoc such security breaches cause is anything but pretty, with recent estimates suggesting that this damage is likely to cost businesses over $2 trillion by 2019. What’s even more disturbing is that it’s no longer just big corporations like Sony, Target and Goodwill that are targets. As cybercrime …

Coro, Commjacking and Why All the Fuss About Wi-Fi Security

Dror Liwer Blog

The word, ‘commjacking’ is a derivation of hijacking and communications. It is a method of intercepting the data and voice flows, or communication channels, from any device that can connect to cellular or WiFi networks. Once those flows are intercepted, hackers can get to any information you are sharing through that device, including personal details, login credentials and so on. …

Welcome to the CoroNet blog!

Dror Liwer Blog

Our goal in having the blog is to provide you with ongoing updates on news and developments regarding radio attacks, defenses, our expert’s opinions on the field of radio security, and many other things that should interest anyone dealing with Cyber security.Clearly, our aim is not to cover ALL of cyber – there are many fantastic blogs and publications out …