Thought you were safe with VPN? Think again!
If you’ve been kicking back and basking in your wireless network security zone because you have the most robust VPN in place, this is your wakeup call. It has become increasingly clear that VPNs are not as safe or efficient as everyone thought they once were. It is easier than ever for hackers to hijack (…)
The Best of Coronet 2016
We wrote them and you loved them. Here’s a recap of the posts you loved, shared, engaged, Tweeted, Liked, repurposed and gave us some feedback on the most in 2016. 1. Cybersecurity Worker Shortage & What We Should Be Doing About It Our most popular post tackled the much discussed issue of supply and (…)
Why Not Even Google Pixel Can Offer Real Protection
Pixel, the first smartphone made by Google (excluding HTC’s Nexus One) is creating quite a buzz in the marketplace. Major questions, however, remain regarding the secure nature of the device. While the waters have yet to be tested, Adrian Ludwig, Android’s director of security, has come out with an announcement declaring the Pixel to be (…)
Hackers Can Bypass HTTPS Protection on Windows, Linux, and Mac
If you browse to a major website on the internet, chances are you’ll see something next to the URL—a tiny lock icon, next to the prefix “HTTPS.” This indicates that you’re currently using a secure version of the Hypertext Transfer Protocol. It means that the connection between your web browser and the application you are (…)
The End for SMS-Based Two Factor Authentication
For home users and enterprise professionals alike, SMS-based two-factor authentication (2FA) has become a relatively annoying fact of life. Type your password into your computer, wait while a text is sent to your phone, and then race to type in a second passcode before it expires. It’s a bit of a hassle, but for many (…)
Hardware vs Software Mobile Security – Which Keeps Your Device Safer?
Media coverage of cybersecurity tends to focus on major companies which are victims of hacking and data theft. Consequently, there’s a lot of industry focus on enterprise security within offices and data centers i.e. security issues affecting desktop computers, servers, and physical network infrastructure. This rather misses the fact that mobile devices (laptops, smartphones and (…)
Hackers Are Also Training to Take Over Mobile Devices at the Olympics
Three things will almost certainly happen at the Olympic Games 2016: Rio de Janeiro weather will be beautiful, Russian athletes will surely be missed and a few athletes will win hearts with captivating performances. Another thing is undoubtedly bound to occur during the summer games: Cybercriminals will desperately try to win the gold medal of (…)
Top 6 Places Your Mobile Device Is Most At Risk of Being Hacked
In 2016, connectivity seems less like a technological feature and more like a birthright. Though limitless WiFi and 4G/LTE may seem like nirvana, it also means hackers have nearly limitless opportunities to take control of your mobile device. While connectivity is a passport to the digital world, it is also a hacker’s gateway to sensitive (…)