Troublesome Ransomware, Overconfidence in Security: Observations from RSA

Dror Liwer Blog

It seems like only yesterday I enjoyed the cool San Francisco air while making new acquaintances and renewing old friendships at RSA Conference 2016 USA. The conference was as usual, a whirlwind filled with so many people to meet and companies to explore. Here are my takeaways on the trends and highlights from this year’s conference, and how I believe …

A Case Against City WiFi

Dror Liwer Blog

The advantages of city-wide, free WiFi seem obvious. Internet access for people of all income levels, convenience and constant connectivity are attractive to most urban-dwellers. However, municipal WiFi is one of the most dangerous places to conduct online activity. It is a hotbed of lurking commjackers. These commjackers take advantage of the open network and the thousands of trusting users. …

CISCO EIR Lands in Israel for a Behind The Scenes Look Into The Startup Nation

Dror Liwer Blog

Austria, San Jose, France, UK and now Israel. Cisco’s EIR program lands in the country most renowned for its cultivation of tech startups. We kicked off the week with startup and social media magnet, Hillel Fuld, for his take on the Israeli tech eco system, discussing the drivers of success for a country to become a hub. This includes an …

Car-hacking Research Faces Legislative Limits in the U.S.

Dror Liwer Blog

Consumers are starting to understand that the fun and convenience of connected cars comes with a price tag. As with many WiFi or Cellular connected products, connected cars are at risk of being hacked. In early 2015, BMW discovered a flaw in its ConnectedDrive software, the system that connects a BMW to the Internet for a variety of services including …

For $1400, A Hacker Can Access Any LTE Device

Dror Liwer Blog

Aside from being capable of streaming high-bandwidth content such as videos and music to mobile devices,  LTE networks are also popular because they are largely considered to be unhackable. But what will device owners think if they realize LTE networks aren’t impenetrable? Researchers recently showed that LTE networks are indeed hackable – and they can be hacked with some very …

Does a Hidden SSID Make You Feel Safe? It Shouldn’t. Here’s Why

Dror Liwer Blog

The logic makes sense: If it can’t be seen, it can’t be attacked. But that logic doesn’t always work with wireless SSID. Many businesses and individuals hide their SSIDs (known fully as a Service Set Identifier) with the hope of eluding commjackers. A prevailing theory in security has long held that by cloaking an SSID, hackers won’t know your network …

Are Millennials Really the Biggest Threat to Your Company’s Data Security?

Dror Liwer Blog

With cybercrime on the rise, more and more companies are on the look out for solutions to prevent security breaches. What many don’t realize is that millennials may be the weak link in the fight against cyber attacks. After all, while millennials or digital natives are tech savvy, their <over?> reliance on mobile devices may be putting companies at risk. …

Attended the Rugby World Cup? Now Is the Time to Digitally Disinfect Your Smartphone

Dror Liwer Blog

Few experiences unite people from around the world as indiscriminately as the Rugby World Cup. Perhaps because like all major sporting events, it’s the ultimate shared experience capable of turning people with very little in common into comrades. Thanks to technology and social media, fans can share their thoughts and reactions in real-time as try-by-try commentary. More than just passive …

Quick Quotes on Cybersecurity and Commjacking

Dror Liwer Blog

October is Cybersecurity Awareness month in the cyber world. In honor of this exciting and important initiative, we thought it best to take a break from writing our own thoughts on cybersecurity and commjacking and leave it to the industry experts instead. Commjacking in the Work-Anywhere Generation “People want to work anywhere and everywhere. They open their laptop up and …