Hackers Can Bypass HTTPS Protection on Windows, Linux, and Mac

Posted: October 9, 2016 / Author: Dror Liwer

If you browse to a major website on the internet, chances are you’ll see something next to the URL—a tiny lock icon, next to the prefix “HTTPS.” This indicates that you’re currently using a secure version of the Hypertext Transfer Protocol. It means that the connection between your web browser and the application you are viewing is encrypted via TLS (Transport Layer Security). In effect, it is very difficult for a potential attacker to eavesdrop on what users are doing on a site that’s protected by the HTTPS protocol.   HTTPS Has Never Been Unbreakable Difficult as it may be,…

Read More
Recent Posts

The End for SMS-Based Two Factor Authentication

Posted: September 19, 2016 / Author: Dror Liwer

For home users and enterprise professionals alike, SMS-based two-factor authentication (2FA) has become a relatively annoying fact of life. Type your password into your computer, wait while a text is sent to your phone, and then race to type in a second passcode before it expires. It’s a bit of a hassle, but for many it’s been the most important line of defense between hackers and confidential, SaaS applications, and financial information. Now, all of that may be about to change. A new draft of the Digital Authentication Guideline issued by the U.S. National Institute for Standards and Technology (NIST)…

Read More

Why Medical Records Are Hotter Than Credit Card Thefts

Posted: August 31, 2016 / Author: Dror Liwer

Last year, more than 113 million medical records were compromised. Government Health IT indicates that over a third (34%) of U.S. healthcare customer records have already been breached – the highest figure of any industry. Unfortunately, the fact is that hospitals and other healthcare institutions are struggling to adapt to the new threats they face. While health records are galloping into the digital arena at an unprecedented rate, funding for cybersecurity initiatives in healthcare is essentially at a standstill. [Tweet…

Read More
More Posts

The Art of Hacking: Why Absolutely Anyone Can Be a Hacker

Posted: August 25, 2016 / Author: Dror Liwer

What do hackers and street artists have in common? If you asked that question to the average person, you probably wouldn’t get much of an answer. But it turns out, both the hacker and the artist are equally capable of exploiting gaps in wireless security.   This isn’t hyperbole. In fact, an artist by the name of Kyle McDonald has been making a living as both a street artist and a hacker, albeit with no malicious intentions. With the help…

Read More

Hardware vs Software Mobile Security – Which Keeps Your Device Safer?

Posted: August 17, 2016 / Author: Dror Liwer

Media coverage of cybersecurity tends to focus on major companies which are victims of hacking and data theft. Consequently, there’s a lot of industry focus on enterprise security within offices and data centers i.e. security issues affecting desktop computers, servers, and physical network infrastructure. This rather misses the fact that mobile devices (laptops, smartphones and tablets) have become the achilles heel for organizations’ cybersecurity. They are an integral part of the workplace and  used for handling business data are also…

Read More

Hackers Are Also Training to Take Over Mobile Devices at the Olympics

Posted: August 4, 2016 / Author: Dror Liwer

Three things will almost certainly happen at the Olympic Games 2016: Rio de Janeiro weather will be beautiful, Russian athletes will surely be missed and a few athletes will win hearts with captivating performances. Another thing is undoubtedly bound to occur during the summer games: Cybercriminals will desperately try to win the gold medal of network hacking. Millions of people will be in Rio to attend Olympic events and they will assuredly seek WiFi connections for their devices. Hackers –…

Read More

Commjacking Stories that Rocked Our World

Posted: July 13, 2016 / Author: Dror Liwer

Not long ago, we wrote about the commjacking stories that surprised us. They were stories about the realities and possibilities of commjacking from the least-likely places, including smart doorbells and drones. On the surface, they shouldn’t have been shocking. After all, commjackers can figure out almost any security obstacle. All they need is patience and just about any of the low-budget tools available on the open market. But here are the commjacking stories that really rocked our world because of…

Read More