Confining the Enterprise Wi-Fi Cyber Mess

Posted: December 11, 2016 / Author: Dror Liwer

When companies develop Wi-Fi policies, they factor from the outset that everyone from the top executives down to the newest intern will need internet access in all places and all times, even in-flight. Furthermore, if Wi-Fi is for some reason inaccessible, all smartphones have hotspot options, meaning that Wi-Fi surrounds us like the air we breathe. While this constant internet connectivity is convenient and can be great for business, it is a nightmare for the CISOs and the cyber-security team. What are some of the security risks involved and what should a CISO be looking out for? Numbers Don’t Lie…

Read More
Recent Posts

DDoS via Wi-Fi Phisher

Posted: November 2, 2016 / Author: Dror Liwer

Reconnecting to your wireless router? Beware of Wi-Fi Phishing! Enterprise access points are often protected by the network security protocols and policies that cover the entire organization. The level of protection achieved is not similar in all businesses because lack of comprehensive knowledge is common and many businesses lack central control. In an era, in which we all work from mobile devices, connecting and communicating via wireless network, security admins have an even difficulty in achieving proper control over all corporate access points. This creates a unique opportunity for hackers in the vicinity of offices. Cyber criminals both professional and…

Read More

Car-hacking Research Faces Legislative Limits in the U.S.

Posted: December 24, 2015 / Author: Dror Liwer

Consumers are starting to understand that the fun and convenience of connected cars comes with a price tag. As with many WiFi or Cellular connected products, connected cars are at risk of being hacked. In early 2015, BMW discovered a flaw in its ConnectedDrive software, the system that connects a BMW to the Internet for a variety of services including navigation systems, real-time traffic and remote door locking. Researchers imitated the company’s servers and sent unlocking requests remotely. These unlocking…

Read More
More Posts

For $1400, A Hacker Can Access Any LTE Device

Posted: December 16, 2015 / Author: Dror Liwer

Aside from being capable of streaming high-bandwidth content such as videos and music to mobile devices,  LTE networks are also popular because they are largely considered to be unhackable. But what will device owners think if they realize LTE networks aren’t impenetrable? Researchers recently showed that LTE networks are indeed hackable – and they can be hacked with some very inexpensive equipment at that.   The Unthinkable Happened Taking equipment that only cost around $1400, researchers were able to hack…

Read More

Does a Hidden SSID Make You Feel Safe? It Shouldn’t. Here’s Why

Posted: November 26, 2015 / Author: Dror Liwer

The logic makes sense: If it can’t be seen, it can’t be attacked. But that logic doesn’t always work with wireless SSID. Many businesses and individuals hide their SSIDs (known fully as a Service Set Identifier) with the hope of eluding commjackers. A prevailing theory in security has long held that by cloaking an SSID, hackers won’t know your network exists, and thus, can’t penetrate it. Simply put, that theory is wrong. Cloaking your network isn’t as safe as you…

Read More

Attended the Rugby World Cup? Now Is the Time to Digitally Disinfect Your Smartphone

Posted: November 1, 2015 / Author: Dror Liwer

Few experiences unite people from around the world as indiscriminately as the Rugby World Cup. Perhaps because like all major sporting events, it’s the ultimate shared experience capable of turning people with very little in common into comrades. Thanks to technology and social media, fans can share their thoughts and reactions in real-time as try-by-try commentary. More than just passive spectators, fans are now active participants in their own game which plays out online one hashtag at a time. The…

Read More

Trying to Child-Proof the Internet? You’re Missing the Point

Posted: October 7, 2015 / Author: Dror Liwer

October is Cybersecurity Awareness month. In honor of this important initiative, our latest blog post focuses on why you need to make sure your  family – your kids and teenagers – are cyber smart… Being tech savvy is no longer relevant. Much like the floppy disk, it’s outdated and of little use to anyone of consequence. What matters now is digital literacy. Take a look at any U.S. school and you’re likely to find some program devoted to teaching the building blocks of…

Read More

Are You Really at Risk From Organized Cybercrime and Espionage?

Posted: August 3, 2015 / Author: Dror Liwer

Businesses can no longer ignore the threat posed by cybercrime. The potential havoc such security breaches cause is anything but pretty, with recent estimates suggesting that this damage is likely to cost businesses over $2 trillion by 2019. What’s even more disturbing is that it’s no longer just big corporations like Sony, Target and Goodwill that are targets. As cybercrime becomes more prolific and increasingly sophisticated affecting large and small businesses alike, a more nuanced understanding of the threat at…

Read More