Thought you were safe with VPN? Think again!

Posted: January 11, 2017 / Author: Dror Liwer

If you’ve been kicking back and basking in your wireless network security zone because you have the most robust VPN in place, this is your wakeup call. It has become increasingly clear that VPNs are not as safe or efficient as everyone thought they once were. It is easier than ever for hackers to hijack VPN ports and take advantage of the gap between VPN startup and connection in order to plant malware. Furthermore, many servers keep Server Logs, which means that hackers get easy access to see everything you do and can do anything they want with the information.…

Read More
Recent Posts

The Best of Coronet 2016

Posted: December 27, 2016 / Author: Dror Liwer

We wrote them and you loved them. Here’s a recap of the posts you loved, shared, engaged, Tweeted, Liked, repurposed and gave us some feedback on the most in 2016.   1. Cybersecurity Worker Shortage & What We Should Be Doing About It Our most popular post tackled the much discussed issue of supply and demand in the niche of cybersecurity professionals; with the demand being at an all-time high and supply falling short and not by a little – as many as one million cybersecurity positions waiting to be filled. In the meantime, with rates of cybercrime continuing to…

Read More

Why Not Even Google Pixel Can Offer Real Protection

Posted: November 17, 2016 / Author: Dror Liwer

Pixel, the first smartphone made by Google (excluding HTC’s Nexus One) is creating quite a buzz in the marketplace.  Major questions, however, remain regarding the secure nature of the device.  While the waters have yet to be tested, Adrian Ludwig, Android’s director of security, has come out with an announcement declaring  the Pixel to be “as secure as the iPhone.” . While this may reassure some, the comparison between Pixel, iPhone or any other device may not matter at all.…

Read More
More Posts

Hackers Can Bypass HTTPS Protection on Windows, Linux, and Mac

Posted: October 9, 2016 / Author: Dror Liwer

If you browse to a major website on the internet, chances are you’ll see something next to the URL—a tiny lock icon, next to the prefix “HTTPS.” This indicates that you’re currently using a secure version of the Hypertext Transfer Protocol. It means that the connection between your web browser and the application you are viewing is encrypted via TLS (Transport Layer Security). In effect, it is very difficult for a potential attacker to eavesdrop on what users are doing…

Read More

The End for SMS-Based Two Factor Authentication

Posted: September 19, 2016 / Author: Dror Liwer

For home users and enterprise professionals alike, SMS-based two-factor authentication (2FA) has become a relatively annoying fact of life. Type your password into your computer, wait while a text is sent to your phone, and then race to type in a second passcode before it expires. It’s a bit of a hassle, but for many it’s been the most important line of defense between hackers and confidential, SaaS applications, and financial information. Now, all of that may be about to…

Read More

Hardware vs Software Mobile Security – Which Keeps Your Device Safer?

Posted: August 17, 2016 / Author: Dror Liwer

Media coverage of cybersecurity tends to focus on major companies which are victims of hacking and data theft. Consequently, there’s a lot of industry focus on enterprise security within offices and data centers i.e. security issues affecting desktop computers, servers, and physical network infrastructure. This rather misses the fact that mobile devices (laptops, smartphones and tablets) have become the achilles heel for organizations’ cybersecurity. They are an integral part of the workplace and  used for handling business data are also…

Read More

Hackers Are Also Training to Take Over Mobile Devices at the Olympics

Posted: August 4, 2016 / Author: Dror Liwer

Three things will almost certainly happen at the Olympic Games 2016: Rio de Janeiro weather will be beautiful, Russian athletes will surely be missed and a few athletes will win hearts with captivating performances. Another thing is undoubtedly bound to occur during the summer games: Cybercriminals will desperately try to win the gold medal of network hacking. Millions of people will be in Rio to attend Olympic events and they will assuredly seek WiFi connections for their devices. Hackers –…

Read More

Top 6 Places Your Mobile Device Is Most At Risk of Being Hacked

Posted: August 1, 2016 / Author: Dror Liwer

In 2016, connectivity seems less like a technological feature and more like a birthright. Though limitless WiFi and 4G/LTE may seem like nirvana, it also means hackers have nearly limitless opportunities to take control of your mobile device. While connectivity is a passport to the digital world, it is also a hacker’s gateway to sensitive personal and business data. Hackers exploit how mobile devices trust the networks—both wireless and cellular—that they typically connect to. They use readily-available tools to trick…

Read More