Commjacking Stories that Rocked Our World

Posted: July 13, 2016 / Author: Dror Liwer

Not long ago, we wrote about the commjacking stories that surprised us. They were stories about the realities and possibilities of commjacking from the least-likely places, including smart doorbells and drones. On the surface, they shouldn’t have been shocking. After all, commjackers can figure out almost any security obstacle. All they need is patience and just about any of the low-budget tools available on the open market. But here are the commjacking stories that really rocked our world because of their impact and implications – past, current and future: You Can’t Checkout of the DarkHotel “DarkHotel” is a type of…

Read More
Recent Posts

Commjacking From the Least Likely Places: Door Bells, Drones and Robin Hood

Posted: July 4, 2016 / Author: Dror Liwer

As we’ve highlighted (more than once…..) before in this blog space, a commjacker needs only WiFi access and some basic tools to gain access to your wireless device. Whether you’re in a café, on an airplane, in a car or at home, if a commjacker has the means, s/he has a way into your device and then your sensitive data. Just when it seems we can’t be surprised by the methods commjackers use, a story comes out revealing a new way to commjack and we’re – surprised. That’s not to say we’re not shocked overall: Because they’re players in a…

Read More

The Time Has Come to Secure the Lower Levels

Posted: May 17, 2016 / Author: Dror Liwer

All People Seem To Need Delicious Pizza. Well, that’s one way to remember the Application, Presentation, Session, Transport, Network, Data link and Physical layers that make up the OSI Model. Unfortunately, many organizations seem to be fixated on the upper layers of the OSI Model, while forgetting the lower layers are just as critical. The upper layers — application, presentation, session — focus on interacting with the user and implementing applications that run on a network. The lower layers –…

Read More
More Posts

Car-hacking Research Faces Legislative Limits in the U.S.

Posted: December 24, 2015 / Author: Dror Liwer

Consumers are starting to understand that the fun and convenience of connected cars comes with a price tag. As with many WiFi or Cellular connected products, connected cars are at risk of being hacked. In early 2015, BMW discovered a flaw in its ConnectedDrive software, the system that connects a BMW to the Internet for a variety of services including navigation systems, real-time traffic and remote door locking. Researchers imitated the company’s servers and sent unlocking requests remotely. These unlocking…

Read More

For $1400, A Hacker Can Access Any LTE Device

Posted: December 16, 2015 / Author: Dror Liwer

Aside from being capable of streaming high-bandwidth content such as videos and music to mobile devices,  LTE networks are also popular because they are largely considered to be unhackable. But what will device owners think if they realize LTE networks aren’t impenetrable? Researchers recently showed that LTE networks are indeed hackable – and they can be hacked with some very inexpensive equipment at that.   The Unthinkable Happened Taking equipment that only cost around $1400, researchers were able to hack…

Read More

Does a Hidden SSID Make You Feel Safe? It Shouldn’t. Here’s Why

Posted: November 26, 2015 / Author: Dror Liwer

The logic makes sense: If it can’t be seen, it can’t be attacked. But that logic doesn’t always work with wireless SSID. Many businesses and individuals hide their SSIDs (known fully as a Service Set Identifier) with the hope of eluding commjackers. A prevailing theory in security has long held that by cloaking an SSID, hackers won’t know your network exists, and thus, can’t penetrate it. Simply put, that theory is wrong. Cloaking your network isn’t as safe as you…

Read More

Are Millennials Really the Biggest Threat to Your Company’s Data Security?

Posted: November 17, 2015 / Author: Dror Liwer

With cybercrime on the rise, more and more companies are on the look out for solutions to prevent security breaches. What many don’t realize is that millennials may be the weak link in the fight against cyber attacks. After all, while millennials or digital natives are tech savvy, their <over?> reliance on mobile devices may be putting companies at risk. With recent estimates suggesting that this demographic will make up at least half of the U.S. workforce by 2020, companies…

Read More

Attended the Rugby World Cup? Now Is the Time to Digitally Disinfect Your Smartphone

Posted: November 1, 2015 / Author: Dror Liwer

Few experiences unite people from around the world as indiscriminately as the Rugby World Cup. Perhaps because like all major sporting events, it’s the ultimate shared experience capable of turning people with very little in common into comrades. Thanks to technology and social media, fans can share their thoughts and reactions in real-time as try-by-try commentary. More than just passive spectators, fans are now active participants in their own game which plays out online one hashtag at a time. The…

Read More

Quick Quotes on Cybersecurity and Commjacking

Posted: October 26, 2015 / Author: Dror Liwer

October is Cybersecurity Awareness month in the cyber world. In honor of this exciting and important initiative, we thought it best to take a break from writing our own thoughts on cybersecurity and commjacking and leave it to the industry experts instead. Commjacking in the Work-Anywhere Generation “People want to work anywhere and everywhere. They open their laptop up and it is confidential – they are really not thinking about what they are doing. Yes, we can look at the…

Read More

Trying to Child-Proof the Internet? You’re Missing the Point

Posted: October 7, 2015 / Author: Dror Liwer

October is Cybersecurity Awareness month. In honor of this important initiative, our latest blog post focuses on why you need to make sure your  family – your kids and teenagers – are cyber smart… Being tech savvy is no longer relevant. Much like the floppy disk, it’s outdated and of little use to anyone of consequence. What matters now is digital literacy. Take a look at any U.S. school and you’re likely to find some program devoted to teaching the building blocks of…

Read More