Cryptocurrency: Ways to Enhance Your Privacy
infosec tweaks

Cryptocurrency: Ways to Enhance Your Privacy

Privacy and privacy on the internet are of great importance. It is not enough to take one or two measures to protect ...
Read More
infosec

KnowBe4: The world's largest security awareness training and simulated phishing platform

KnowBe4 is the provider of the world's largest security awareness training and simulated phishing platform. Sales of KnowBe4 ...
Read More
infosec

What are the most common passwords? Risk of violation

Passwords are a matter that has been discussed many times. The National Security Center in the UK presented a ...
Read More
infosec

Windows Update: Caused problems with Sophos, Avira and Avast

9 April released the new Windows security update. However, it was noticed that after installing the update some ...
Read More
infosec

The Weather Channel Global Weather Channel was attacked by ransomware

The Weather Channel Global Weather Channel was attacked by ransomware resulting in the live broadcast being interrupted for about 90 minutes ....
Read More
Latest Posts

Bezos case: Billionaires are also victims of hackers

Bezos case: Today it was revealed that the tabooid National Enquirer gained selfies from its founder Amazon, Jeff Bezos showing personal details of himself with his mistress. This incident shows that even billionaires are no exception to hackers.

Bezos

In particular, Bezos accused the National Enquirer of blackmailing because of the leak of personal photos and information. According to Mark Johnson, who is CEO of Sovereign Intelligence, the case of the Bezos case, shows us that no one is an exception to the exploitation on the internet. Many security experts have agreed with him and said it is ironic that several billionaires show amazing dignity to the public but when it comes to details of each person's personal security measures, they seem to ignore them. In addition, Johnson said he saw billionaires and top executives as the weakest members of society, as their personal information is "gold" for hackers, attackers and competitors. In addition to Johnson's statements, Ian Bremmer, his founder Eurasia Group said if the National Enquirer could access Bezos' personal photos, then it would certainly be very easy for China to discover the IP and Amazon strategy.

After the revelations of the Bezos case, whose fortune is estimated to be over 130 billion dollars, computer security experts have been researching their wealthy customers to confirm that their computer systems and devices have not gone bad. At the time we live, the information on our personal devices is particularly important as it includes data for bank accounts and more general personal data. Now, especially rich people have increased security measures and by bodyguards and simple alarms have switched to risk management services to further protect their assets and their heritage. Apart from the Bezos case, similar cases have also been reported in the past, and so many have increased their security measures. For example, Mark Zuckerberg, his founder Facebook gave 7,3 millions of dollars for the security of 2017.

However, Johnson said that no data is best protected, as there are many third-party platforms that have social security numbers, bank information or personal photos. As for the Bezos case, a few days before Bezos revealed that he was in jeopardy, the founder of TD Ameritrade Holding Corporation, Joe Ricketts, was trapped in a scandal following the release of his personal messages. More specifically, the Splinter news site has published a series of racist emails by Ricketts without mentioning the source.

Note that Bezos did not say anything about how National Enquirer acquired his photographs, but experts said the most common method for a hacker is to get the identity of the person who is targeting the target person. Logically, the hacker sent a message to the target and asked him to click on a link in a text or one E-mail, from which the hacker received the information he wanted.

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *