cyber security Archives - Сoronet
Filtered by: Cyber-security

The Best of Coronet 2016

We wrote them and you loved them. Here’s a recap of the posts you loved, shared, engaged, Tweeted, Liked, repurposed and gave us some feedback on the most in 2016.   1. Cybersecurity Worker Shortage & What We Should Be Doing About It Our most popular post tackled the much discussed issue of supply and (…)

Dror Liwer, December 27, 2016

For $1400, A Hacker Can Access Any LTE Device

Aside from being capable of streaming high-bandwidth content such as videos and music to mobile devices,  LTE networks are also popular because they are largely considered to be unhackable. But what will device owners think if they realize LTE networks aren’t impenetrable? Researchers recently showed that LTE networks are indeed hackable – and they can (…)

Dror Liwer, December 16, 2015

Quick Quotes on Cybersecurity and Commjacking

October is Cybersecurity Awareness month in the cyber world. In honor of this exciting and important initiative, we thought it best to take a break from writing our own thoughts on cybersecurity and commjacking and leave it to the industry experts instead. Commjacking in the Work-Anywhere Generation “People want to work anywhere and everywhere. They (…)

Dror Liwer, October 26, 2015

Connected Cars Security Hacks: Hype or Real Cause For Alarm?

In many ways the connected car was the automotive industry’s answer to the smartphone. This was an attempt to innovate and offer game-changing features which would make our lives more convenient and connected than ever before. And while these cars have done just that, they’ve also exposed us to vulnerabilities we never could have imagined. (…)

Dror Liwer, August 12, 2015

Coronet, Commjacking and Why All the Fuss About Wi-Fi Security

The word, ‘commjacking’ is a derivation of hijacking and communications. It is a method of intercepting the data and voice flows, or communication channels, from any device that can connect to cellular or WiFi networks. Once those flows are intercepted, hackers can get to any information you are sharing through that device, including personal details, (…)

Dror Liwer, July 15, 2015
Load More