Filtered by: Mobile-security

Thought you were safe with VPN? Think again!

If you’ve been kicking back and basking in your wireless network security zone because you have the most robust VPN in place, this is your wakeup call. It has become increasingly clear that VPNs are not as safe or efficient as everyone thought they once were. It is easier than ever for hackers to hijack (…)

Dror Liwer, January 11, 2017

The Best of Coronet 2016

We wrote them and you loved them. Here’s a recap of the posts you loved, shared, engaged, Tweeted, Liked, repurposed and gave us some feedback on the most in 2016.   1. Cybersecurity Worker Shortage & What We Should Be Doing About It Our most popular post tackled the much discussed issue of supply and (…)

Dror Liwer, December 27, 2016

Why Not Even Google Pixel Can Offer Real Protection

Pixel, the first smartphone made by Google (excluding HTC’s Nexus One) is creating quite a buzz in the marketplace.  Major questions, however, remain regarding the secure nature of the device.  While the waters have yet to be tested, Adrian Ludwig, Android’s director of security, has come out with an announcement declaring  the Pixel to be (…)

Dror Liwer, November 17, 2016

Hackers Can Bypass HTTPS Protection on Windows, Linux, and Mac

If you browse to a major website on the internet, chances are you’ll see something next to the URL—a tiny lock icon, next to the prefix “HTTPS.” This indicates that you’re currently using a secure version of the Hypertext Transfer Protocol. It means that the connection between your web browser and the application you are (…)

Dror Liwer, October 9, 2016

The End for SMS-Based Two Factor Authentication

For home users and enterprise professionals alike, SMS-based two-factor authentication (2FA) has become a relatively annoying fact of life. Type your password into your computer, wait while a text is sent to your phone, and then race to type in a second passcode before it expires. It’s a bit of a hassle, but for many (…)

Dror Liwer, September 19, 2016

Hardware vs Software Mobile Security – Which Keeps Your Device Safer?

Media coverage of cybersecurity tends to focus on major companies which are victims of hacking and data theft. Consequently, there’s a lot of industry focus on enterprise security within offices and data centers i.e. security issues affecting desktop computers, servers, and physical network infrastructure. This rather misses the fact that mobile devices (laptops, smartphones and (…)

Dror Liwer, August 17, 2016

Hackers Are Also Training to Take Over Mobile Devices at the Olympics

Three things will almost certainly happen at the Olympic Games 2016: Rio de Janeiro weather will be beautiful, Russian athletes will surely be missed and a few athletes will win hearts with captivating performances. Another thing is undoubtedly bound to occur during the summer games: Cybercriminals will desperately try to win the gold medal of (…)

Dror Liwer, August 4, 2016

Top 6 Places Your Mobile Device Is Most At Risk of Being Hacked

In 2016, connectivity seems less like a technological feature and more like a birthright. Though limitless WiFi and 4G/LTE may seem like nirvana, it also means hackers have nearly limitless opportunities to take control of your mobile device. While connectivity is a passport to the digital world, it is also a hacker’s gateway to sensitive (…)

Dror Liwer, August 1, 2016
Load More