The Best of Coronet 2016

Posted: December 27, 2016 / Author: Dror Liwer

We wrote them and you loved them. Here’s a recap of the posts you loved, shared, engaged, Tweeted, Liked, repurposed and gave us some feedback on the most in 2016.   1. Cybersecurity Worker Shortage & What We Should Be Doing About It Our most popular post tackled the much discussed issue of supply and demand in the niche of cybersecurity professionals; with the demand being at an all-time high and supply falling short and not by a little – as many as one million cybersecurity positions waiting to be filled. In the meantime, with rates of cybercrime continuing to…

Read More
Recent Posts

For $1400, A Hacker Can Access Any LTE Device

Posted: December 16, 2015 / Author: Dror Liwer

Aside from being capable of streaming high-bandwidth content such as videos and music to mobile devices,  LTE networks are also popular because they are largely considered to be unhackable. But what will device owners think if they realize LTE networks aren’t impenetrable? Researchers recently showed that LTE networks are indeed hackable – and they can be hacked with some very inexpensive equipment at that.   The Unthinkable Happened Taking equipment that only cost around $1400, researchers were able to hack an LTE network by using the radio layer to force the device into giving away its location, thus allowing them…

Read More

Quick Quotes on Cybersecurity and Commjacking

Posted: October 26, 2015 / Author: Dror Liwer

October is Cybersecurity Awareness month in the cyber world. In honor of this exciting and important initiative, we thought it best to take a break from writing our own thoughts on cybersecurity and commjacking and leave it to the industry experts instead. Commjacking in the Work-Anywhere Generation “People want to work anywhere and everywhere. They open their laptop up and it is confidential – they are really not thinking about what they are doing. Yes, we can look at the…

Read More
More Posts

Connected Cars Security Hacks: Hype or Real Cause For Alarm?

Posted: August 12, 2015 / Author: Dror Liwer

In many ways the connected car was the automotive industry’s answer to the smartphone. This was an attempt to innovate and offer game-changing features which would make our lives more convenient and connected than ever before. And while these cars have done just that, they’ve also exposed us to vulnerabilities we never could have imagined. After all, who would have thought a car could be hacked? It’s questionable whether even the biggest and most reputable car manufacturers, saw that coming.…

Read More

Coronet, Commjacking and Why All the Fuss About Wi-Fi Security

Posted: July 15, 2015 / Author: Dror Liwer

The word, ‘commjacking’ is a derivation of hijacking and communications. It is a method of intercepting the data and voice flows, or communication channels, from any device that can connect to cellular or WiFi networks. Once those flows are intercepted, hackers can get to any information you are sharing through that device, including personal details, login credentials and so on. Commjackers can even listen into conversations, intercept and manipulate SMS and email messages and all in real-time too – you…

Read More