TechBizWebTechBizWeb

    Subscribe to Updates

    Get the latest news about Technology and Business from all around the web..

    What's Hot

    Crypto hedge fund Three Arrows files for bankruptcy

    July 2, 2022

    There’s a better way to bypass Windows 11 install restrictions

    July 2, 2022

    Biden administration floats new oil leasing plan in Gulf of Mexico

    July 1, 2022
    Facebook Twitter Instagram
    • About Us
    • Privacy Policy
    • Guest Post
    • Terms
    • Contact
    Facebook Twitter Instagram
    TechBizWebTechBizWeb
    Subscribe
    • Home
    • Technology

      There’s a better way to bypass Windows 11 install restrictions

      July 2, 2022

      What is the best controller for Xbox consoles?

      July 1, 2022

      The GPU shortage is over

      July 1, 2022

      Google will start auto-deleting abortion clinic visits from user location history

      July 1, 2022

      The government’s going after alleged crypto scammers as market crashes

      July 1, 2022
    • Business
    • Cyber Security

      Tips to bolster cybersecurity, incident response this 4th of July weekend

      July 1, 2022

      Jon Raper named CISO at Costco

      July 1, 2022

      2022 RSAC takeaways: Risk management vs compliance

      July 1, 2022

      3 security lessons we haven’t learned from the Kaseya breach

      July 1, 2022

      Auston Davis named CISO at Versant Health

      June 30, 2022
    • Blockchain
    • Vulnerabilities
    • Social Engineering
    • Malware
    • Cyber Security Alerts
    TechBizWebTechBizWeb
    Home»Cyber Security»Bezos Case Exposes Billionaires’ Vulnerability to Hackers
    Cyber Security

    Bezos Case Exposes Billionaires’ Vulnerability to Hackers

    February 11, 2019Updated:February 11, 2019No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp
    Share
    Facebook Twitter LinkedIn Pinterest Email


    The stunning revelation that a tabloid obtained below-the-belt selfies of Amazon founder Jeff Bezos — the world’s richest man — suggests that even billionaires are not out of the reach of hackers.

    Bezos came out fighting this week, accusing the National Enquirer of blackmailing him with lurid pictures of him and his mistress, and pre-empting the threat to publish by releasing details of the images himself.

    But for Mark Johnson, CEO of Sovereign Intelligence, the incident makes clear that “no one is beyond the reach of cyber exploitation.” 

    “It’s a curious irony that billionaires demonstrate astounding acumen related to their own industries, and yet seemingly ignore the minutiae of common-place security measures.” 

    Johnson sees billionaires and top executives as especially vulnerable because their personal information is a gold mine for criminals, intelligence agencies and competitors.

    “Obtaining their personal data is like having keys to the kingdom,” said Johnson, potentially providing priceless insight into the thinking and strategies of the world’s most powerful business leaders.

    Ian Bremmer, the founder of the Eurasia Group think tank, put it more bluntly.

    “If the National Enquirer has @JeffBezos dick pics, don’t tell me China doesn’t have @Amazon IP and strategy,” he tweeted.

    – Increase in calls –

    Since the revelations about Bezos, whose fortune is estimated at more than $130 billion, computer security experts interviewed by AFP report an increase in calls from wealthy clients asking them to verify that their computer systems and devices were not hacked.

    “Today’s threats however are not necessarily trying to breach the walls of the castle — they are already inside, residing on personal devices,” said Kris Coleman, the founder of Red Five Security. “Experience has shown that the typical breach is not discovered for eight months.”

    In this ever-more connected age, more and more personal data is stored online — from social security numbers to bank details, driver’s license numbers and personal addresses.

    As a result the focus of security measures for the ultra-wealthy has shifted from bodyguards and sophisticated alarms towards risk management to protect their assets, their image and their “legacy.”

    The super-wealthy will typically have their own computer security service and also call on external companies for regular evaluation of their devices because a large number of hacks are detected by third parties, according to observers.

    Mark Zuckerberg, Facebook’s CEO, spent $7.3 million on his security in 2017, up from $4.2 million in 2015 — astronomical sums that the social network deemed justified due to his prominence.

    Last July, Facebook said it would give him $10 million more per year to strengthen his security.

    “Protection from colluding insiders working from positions of trust; or, against an intelligence agency trying to attack from the outside is going to require a large investment, a lot of experience, and vigilance,” said Coleman.

    – Entourage –

    For Johnson, “no one’s data is that well protected. Think of all the third-party platforms that have your social security number, or banking information, or that hold your personal pictures.”

    Just days before Bezos disclosed that a tabloid had obtained his intimate selfies, a fellow billionaire — Joe Ricketts, the founder of the broker TD Ameritrade Holding Corporation — was ensnared in scandal following the release of private messages.

    The American news site Splinter published a series of racist emails from Ricketts, without saying how it obtained them.

    The exchanges, some of which date back to 2009, show the 77-year-old sharing and apparently endorsing racist jokes and conspiracy theories. He has since apologized.

    Back in August 2015, a cyber attack on the Ashley-Madison extramarital dating site revealed that American billionaire Dan Loeb had an account there.

    Bezos did not say how the National Enquirer obtained his pictures, but experts say the most common method is for a hacker to usurp the identity of a member of a person’s entourage.

    “The adversary would send a message to the target asking them to click on a link in a text or email,” Coleman explained. “The sender’s real identity is hidden but the target trusts the message from their ‘friend’ and clicks the link unlocking malware or another type of attack on that device.”

    © AFP 2019

    Tags:



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Tips to bolster cybersecurity, incident response this 4th of July weekend

    July 1, 2022 Cyber Security

    Jon Raper named CISO at Costco

    July 1, 2022 Cyber Security

    2022 RSAC takeaways: Risk management vs compliance

    July 1, 2022 Cyber Security

    3 security lessons we haven’t learned from the Kaseya breach

    July 1, 2022 Cyber Security

    Auston Davis named CISO at Versant Health

    June 30, 2022 Cyber Security

    Lessons learned from slew of recent data breaches

    June 30, 2022 Cyber Security
    Editors Picks

    There’s a better way to bypass Windows 11 install restrictions

    July 2, 2022

    Biden administration floats new oil leasing plan in Gulf of Mexico

    July 1, 2022

    What is the best controller for Xbox consoles?

    July 1, 2022

    Klarna valuation crashes to $6.5bn from $46bn

    July 1, 2022
    Trending Now

    Mexico presses ahead with multibillion-dollar bet on fossil fuels

    By techbizweb

    Sprint’s network has been officially retired

    By techbizweb

    TikTok says it is working to ‘safeguard’ US data and national security

    By techbizweb

    https://www.nationalsportsacademy.com

    slot gacor hari ini

    http://www.inadesfo.org/

    http://www.eueomgbissau.org/

    http://www.congo-mai-mai.net/

    http://www.angelesdelafrontera.org/

    http://fifaworldcup2018schedule.com/

    http://tony4gtrmcr.co.uk/

    http://www.standrewsagreement.org/

    http://www.bob-russell.co.uk/

    http://davidmulholland.co.uk/

    http://railwayhotelenniskillen.com/

    http://www.fantasysportstrades.com/

    http://www.rainleaf-flooring.com

    http://mothersagainstguns.org/

    http://ma-coc.org/

    slot online

    http://www.paradoxmag.com/situs-judi-slot-online-gampang-menang-2021/

    http://www.paradoxmag.com/situs-judi-slot-online-terbaru-2021/

    http://slot-terbaru.net/

    Slot Gacor

    Slot Online

    Situs Slot Gacor

    http://www.appdexterity.com/

    https://cars4kids-deutschland.de/

    https://www.stretchingculture.com/

    https://www.b-123-hp.com/slot-gacor/

    https://denzstaffing.nl/

    https://ezbbqcooking.com/slot-gacor/

    https://www.mbahelp24.com/slot-gacor

    https://minhtanstore.com/slot-jackpot-terbesar/

    https://njbpusupplierdiversity.com/slot-gacor-gampang-menang/

    https://www.floridaspecialtycropfoundation.org/slot-gampang-menang/

    https://childrenscornerpreschool.org/slot-gacor-gampang-menang/

    https://cryptoquoter.com/slot-online-terbaik/

    https://alorkantho24.com/slot-gacor/

    https://ellas.xyz/slot-gacor/

    https://it.dougamatome.xyz/slot-online/

    https://www.daltercume.com/slot-gacor/

    https://josi-ana.dougamatome.xyz/slot88/

    https://josi-ana.dougamatome.xyz/slot-gacor/

    https://fastobserver.com/slot-jackpot-terbesar/

    https://www.planetexperts.com/slot-gacor/

    https://bfsolution.group/slot-bet-kecil/

    https://rustleva.co/slot/

    https://bfsolution.group/slot-bet-kecil/

    https://www.hotelcalimareal.com/togel-online/

    https://anime-game.dougamatome.xyz/slot-gacor-gampang-menang/

    https://anime-game.dougamatome.xyz/togel-online/

    https://bourbonbarrelfoods.com/slot/

    http://suneo39.wp.xdomain.jp/slot/

    https://techbizweb.com/slot-gacor/

    https://www.generalcatalyst.com/18-daftar-slot-gacor-terbaik-gampang-menang-jackpot-hari-ini/

    https://www.hotelcalimareal.com/slot-online/

    https://www.blockgates.io/slot-gacor/

    https://l12.com.br/slot-gacor/

    slot paling gacor

    https://www.donalds-hobby.com/slot-online/

    https://thecryptodirt.com/slot-gacor-hari-ini/

    http://iseta.edu.ar/aulavirtual/app/upload/users/1/1205/my_files/sbobet.html

    http://escuelavirtual.mincit.gov.co/app/upload/users/1/194/my_files/slot.html

    https://www.dev.medecinesfax.org/courses/JUDICASINO/document/slot.html

    http://www.e-archivos.org/cursos/courses/JUDICASINO/document/slot-gacor.html

    http://iesma.com.br/ead/main/upload/users/4/447/my_files/slot.html

    https://www.fundacoop.org/chamilo/app/upload/users/1/1185/my_files/slot.html

    https://fata-aatf.org/eskola/main/upload/users/3/31/my_files/slot.html

    https://uancv.edu.pe/ofinvestigacion/app/upload/users/3/328/my_files/slot-terlengkap.html

    https://micost.edu.my/EL/app/upload/users/2/209/my_files/slot-gacor.html

    https://www.academiacoderdojo.ro/elearningdev/app/upload/users/2/2442/my_files/slot-online.html

    http://campus-cidci.ulg.ac.be/courses/JUDICASINO/document/slot-termurah.html

    https://www.escueladerobotica.misiones.gob.ar/aula-ste/courses/LIVECASINO/document/slot-tergacor.html

    http://ccdipeepccqqfar.usac.edu.gt/chamilo/app/upload/users/3/358/my_files/slot-online.html

    https://cunori.edu.gt/campus/app/upload/users/7/7334/my_files/slot-online.html

    http://u-rus.com.ar/aula/app/upload/users/1/1322/my_files/slot.html

    http://icrodarisoveria.edu.it/chamilo/app/upload/users/1/1855/my_files/slot.html

    https://iestpliliagutierrez.edu.pe/clarolgm/courses/CASINO/document/slot.html

    http://pva.cobach.edu.mx/app/upload/users/7/7379/my_files/slot.html

    http://www.imb-pc-online.edu.gt/PL/app/upload/users/3/373/my_files/slot.html

    http://avcs.upeu.edu.pe/main/upload/users/3333/my_files/slot.html

    https://chamilo.fca.uas.edu.mx/app/upload/users/1/11186/my_files/slot-online/

    TechBizWeb
    Facebook Twitter Instagram Pinterest Vimeo YouTube
    • Home
    • Guest Post
    • About Us
    • Privacy Policy
    • Our Authors
    • Terms and Conditions
    • Contact
    © 2022 Tech Biz Web. Developed by Sawah Dev.

    Type above and press Enter to search. Press Esc to cancel.