What’s Government’s Role In Protecting Wireless Networks?

Posted: April 6, 2017 / Author: Dror Liwer

Both private businesses and governmental agencies are increasingly concerned about the mounting threats to wireless devices and networks. However, government approaches to dealing with the problem vary dramatically. From India, through the United States to the United Kingdom steps have taken range from full blown bans on use of wireless devices in the government workplace to the expansion of BYOD policies.  In a previous blog post, we detailed how BYOD-friendly companies have declined by 20% since 2013, with 53% of all companies now banning private devices altogether. However, with reliance on the devices far from a downward trend, which government…

Read More
Recent Posts

How Good Wireless Visibility Can Beat the Rogue Access Points

Posted: January 26, 2017 / Author: Dror Liwer

With wireless security, it’s all about visibility. Look around a coffee shop, airport, or even an office building and it’s impossible to miss all the smartphones, tablets and laptop computers. Just about everyone has a wireless device. But the downside to all these devices – and thus the downside to BYOD also – is a security threat that’s not clearly visible: rogue access points. The proliferation of mobile devices prompted a surge of wireless access points, enabling people to connect anywhere and at any time. While an abundance of access points – including the hot spots on personal devices –…

Read More

Confining the Enterprise Wi-Fi Cyber Mess

Posted: December 11, 2016 / Author: Dror Liwer

When companies develop Wi-Fi policies, they factor from the outset that everyone from the top executives down to the newest intern will need internet access in all places and all times, even in-flight. Furthermore, if Wi-Fi is for some reason inaccessible, all smartphones have hotspot options, meaning that Wi-Fi surrounds us like the air we breathe. While this constant internet connectivity is convenient and can be great for business, it is a nightmare for the CISOs and the cyber-security team.…

Read More
More Posts

Top 6 Places Your Mobile Device Is Most At Risk of Being Hacked

Posted: August 1, 2016 / Author: Dror Liwer

In 2016, connectivity seems less like a technological feature and more like a birthright. Though limitless WiFi and 4G/LTE may seem like nirvana, it also means hackers have nearly limitless opportunities to take control of your mobile device. While connectivity is a passport to the digital world, it is also a hacker’s gateway to sensitive personal and business data. Hackers exploit how mobile devices trust the networks—both wireless and cellular—that they typically connect to. They use readily-available tools to trick…

Read More

Commjacking From the Least Likely Places: Door Bells, Drones and Robin Hood

Posted: July 4, 2016 / Author: Dror Liwer

As we’ve highlighted (more than once…..) before in this blog space, a commjacker needs only WiFi access and some basic tools to gain access to your wireless device. Whether you’re in a café, on an airplane, in a car or at home, if a commjacker has the means, s/he has a way into your device and then your sensitive data. Just when it seems we can’t be surprised by the methods commjackers use, a story comes out revealing a new…

Read More