Hackers Can Bypass HTTPS Protection on Windows, Linux, and Mac

Posted: October 9, 2016 / Author: Dror Liwer

If you browse to a major website on the internet, chances are you’ll see something next to the URL—a tiny lock icon, next to the prefix “HTTPS.” This indicates that you’re currently using a secure version of the Hypertext Transfer Protocol. It means that the connection between your web browser and the application you are viewing is encrypted via TLS (Transport Layer Security). In effect, it is very difficult for a potential attacker to eavesdrop on what users are doing on a site that’s protected by the HTTPS protocol.   HTTPS Has Never Been Unbreakable Difficult as it may be,…

Read More
Recent Posts

You Don’t Need to be so Smart to Hack a ‘Smart’ Lock

Posted: September 14, 2016 / Author: Dror Liwer

The Internet of Things has only just begun but it is quickly gaining momentum. Connected devices are becoming an integral part of our everyday lives. As we become reliant on them, it becomes increasingly difficult to secure the devices. Hackers only need to gain one point of entry to compromise your home and even your work network. As consumers purchase IoT devices to replace banal items in the home, their new found usability quickly outweighs any security implications. On the whole, consumers of connected baby monitors and door bells did not give a second thought to the safety of these…

Read More

Why Medical Records Are Hotter Than Credit Card Thefts

Posted: August 31, 2016 / Author: Dror Liwer

Last year, more than 113 million medical records were compromised. Government Health IT indicates that over a third (34%) of U.S. healthcare customer records have already been breached – the highest figure of any industry. Unfortunately, the fact is that hospitals and other healthcare institutions are struggling to adapt to the new threats they face. While health records are galloping into the digital arena at an unprecedented rate, funding for cybersecurity initiatives in healthcare is essentially at a standstill. [Tweet…

Read More
More Posts

For $1400, A Hacker Can Access Any LTE Device

Posted: December 16, 2015 / Author: Dror Liwer

Aside from being capable of streaming high-bandwidth content such as videos and music to mobile devices,  LTE networks are also popular because they are largely considered to be unhackable. But what will device owners think if they realize LTE networks aren’t impenetrable? Researchers recently showed that LTE networks are indeed hackable – and they can be hacked with some very inexpensive equipment at that.   The Unthinkable Happened Taking equipment that only cost around $1400, researchers were able to hack…

Read More

Are You Really at Risk From Organized Cybercrime and Espionage?

Posted: August 3, 2015 / Author: Dror Liwer

Businesses can no longer ignore the threat posed by cybercrime. The potential havoc such security breaches cause is anything but pretty, with recent estimates suggesting that this damage is likely to cost businesses over $2 trillion by 2019. What’s even more disturbing is that it’s no longer just big corporations like Sony, Target and Goodwill that are targets. As cybercrime becomes more prolific and increasingly sophisticated affecting large and small businesses alike, a more nuanced understanding of the threat at…

Read More