Saturday , July 24 2021

Example Bezos: piracy of his intimate selfie highlights the vulnerability of billionaires to hackers



business

Even the richest man in the world could not prevent the piracy of intimate self. The revelation of Jeff Bezos, president of the Amazonian administration, that the tabloid illegally obtained his naked photo, shows that billionaires are not in the reach of computer intrusion.

"Nobody is beyond the reach of online exploitation," says Mark Johnson, head of the computer security company Sovereign Intelligence.

For this expert are particularly vulnerable billionaires and big bosses because their personal data are a gold mine for criminals, intelligence agencies and competitors. In his view, these different actors argue that the stolen data will enable them to better understand the innovations and strategies.

"Getting their personal data is like getting the keys to the field," says Johnson.

"If the National Leader (tabloid, NDRL) has pictures of Jeff Bezos's penis, do not tell me that China does not have the Amazon's IP and its strategy," wrote Ian Bremmer, founder of the Eurasia Group of Experts on his Twitter account.

Increase calls

From the disclosure of Mr Bezos, whose wealth is estimated at more than $ 130 billion, computer security experts, who were interviewed by AFP, claimed that they saw an increase in calls from big fates and asked them to verify that their computer systems and devices they were not bumped.

"The current threats are not necessarily aimed at punching the walls of the castle, because they are already inside, especially in personal devices and experiences, that it takes eight months before an intrusion is detected," says Kris Coleman, founder of Red Five Security.

In the era of all related, the great security of large money has been diverted from ultra-sophisticated body guards and security alarms to risk management in order to protect their assets, their image and their "legacy" because more and more personal information is stored online social security, bank details, medical examination, driving license number, personal addresses, etc.

Big fates are usually computer security services, and they also invite external companies to regularly evaluate their device because third parties discover a large number of computer attacks, observers say.

Mark Zuckerberg, CEO of Facebook, spent $ 7.3 million on security in 2017, compared with $ 4.2 million in 2015, the astronomical amount estimated by the social network as normal because of "its rank and importance" "Last July, Facebook said it would give it $ 10 million more a year to strengthen its security.

"Protection from a conspiracy from within, especially from trusted people or against an intelligence agency trying to attack from outside, requires a lot of investment, great experience and attention," says Chris Coleman, who does not want to share the security measures taken for his clients.

escort

For the former US Navy investigator, John John, "no personal information is really well protected," as rich information is often centralized through family offices. heritage), which sometimes lack the advanced technological tools, such as encryption.

The Splinter web site on Monday published racist e-mails from billionaire Joe Ricketts, founder of the TD Ameritrade Holding Corp., without telling them how he got them.

In these exchanges, some of which from 2009, Ricketts shares his Islamophobia and presents himself as a follower of conspiracy theories. Since then, he apologized.

In August of 2015, a cyber attack on Ashley-Madison's unlawful website revealed that the US billionaire Dan Loeb had his own account, an intrusion that would go well with the financier as well as the business manager. USA (Sotheby's) than in Europe (Nestlé).

Jeff Bezos did not say how National Enquirer got his picture, but experts say it is the most common method of deceiving a member of the circle.

"Opponent often sends a message to the target and asks him to click on the link inserted into the body of the message," says Kris Coleman.


Source link