What’s behind the latest Coronet wireless management platform release?

Posted: November 14, 2016 / Author: Dror Liwer

There is no doubt that companies are struggling to deal with BYOD policies. With the exponential growth of new wireless devices on the market, developing coherent and enforceable policies will soon be impossible. Companies understand that they cannot control the type of devices their employees use, nor gauge the risk levels around those devices. Furthermore, in the event of a cybersecurity event, currently companies are bound the damage control and there are no preventative measures available.    Since employees and executives use wireless connectivity in the office, as well as public places, cyber criminals know to attack places with the…

Read More
Recent Posts

DDoS via Wi-Fi Phisher

Posted: November 2, 2016 / Author: Dror Liwer

Reconnecting to your wireless router? Beware of Wi-Fi Phishing! Enterprise access points are often protected by the network security protocols and policies that cover the entire organization. The level of protection achieved is not similar in all businesses because lack of comprehensive knowledge is common and many businesses lack central control. In an era, in which we all work from mobile devices, connecting and communicating via wireless network, security admins have an even difficulty in achieving proper control over all corporate access points. This creates a unique opportunity for hackers in the vicinity of offices. Cyber criminals both professional and…

Read More

The Art of Hacking: Why Absolutely Anyone Can Be a Hacker

Posted: August 25, 2016 / Author: Dror Liwer

What do hackers and street artists have in common? If you asked that question to the average person, you probably wouldn’t get much of an answer. But it turns out, both the hacker and the artist are equally capable of exploiting gaps in wireless security.   This isn’t hyperbole. In fact, an artist by the name of Kyle McDonald has been making a living as both a street artist and a hacker, albeit with no malicious intentions. With the help…

Read More
More Posts

Hackers Are Also Training to Take Over Mobile Devices at the Olympics

Posted: August 4, 2016 / Author: Dror Liwer

Three things will almost certainly happen at the Olympic Games 2016: Rio de Janeiro weather will be beautiful, Russian athletes will surely be missed and a few athletes will win hearts with captivating performances. Another thing is undoubtedly bound to occur during the summer games: Cybercriminals will desperately try to win the gold medal of network hacking. Millions of people will be in Rio to attend Olympic events and they will assuredly seek WiFi connections for their devices. Hackers –…

Read More

Commjacking Stories that Rocked Our World

Posted: July 13, 2016 / Author: Dror Liwer

Not long ago, we wrote about the commjacking stories that surprised us. They were stories about the realities and possibilities of commjacking from the least-likely places, including smart doorbells and drones. On the surface, they shouldn’t have been shocking. After all, commjackers can figure out almost any security obstacle. All they need is patience and just about any of the low-budget tools available on the open market. But here are the commjacking stories that really rocked our world because of…

Read More

Troublesome Ransomware, Overconfidence in Security: Observations from RSA

Posted: March 10, 2016 / Author: Dror Liwer

It seems like only yesterday I enjoyed the cool San Francisco air while making new acquaintances and renewing old friendships at RSA Conference 2016 USA. The conference was as usual, a whirlwind filled with so many people to meet and companies to explore. Here are my takeaways on the trends and highlights from this year’s conference, and how I believe the cybersecurity landscape will be shaped going forward. Ransomware is on the Rise The threat of ransomware continues to increase,…

Read More

Are You Really at Risk From Organized Cybercrime and Espionage?

Posted: August 3, 2015 / Author: Dror Liwer

Businesses can no longer ignore the threat posed by cybercrime. The potential havoc such security breaches cause is anything but pretty, with recent estimates suggesting that this damage is likely to cost businesses over $2 trillion by 2019. What’s even more disturbing is that it’s no longer just big corporations like Sony, Target and Goodwill that are targets. As cybercrime becomes more prolific and increasingly sophisticated affecting large and small businesses alike, a more nuanced understanding of the threat at…

Read More

Coronet, Commjacking and Why All the Fuss About Wi-Fi Security

Posted: July 15, 2015 / Author: Dror Liwer

The word, ‘commjacking’ is a derivation of hijacking and communications. It is a method of intercepting the data and voice flows, or communication channels, from any device that can connect to cellular or WiFi networks. Once those flows are intercepted, hackers can get to any information you are sharing through that device, including personal details, login credentials and so on. Commjackers can even listen into conversations, intercept and manipulate SMS and email messages and all in real-time too – you…

Read More