Previous Internet pirate “Kevin Mitnick”: the attacks “social engineering” 99.5% effective




Previous Internet pirate “Kevin Mitnick”: the attacks “social engineering” 99.5% effective

Previous Internet pirate “Kevin Mitnick” speech in the “Gulf Conference for Information Security”

Highlighted Kevin Mitnick, the world-renowned consultant in the field of information security, the light in his lecture during the “Gulf Conference Exhibition for Information Security”, which concludes Wednesday at the Dubai World Trade Centre, the points where the attacker uses the victim to enter the system properties. Advance a presentation about cyber attacks, among which the participants practically how easy it is to bypass security measures at international banks and get them on the important information.

According to this offer within the framework of the definition of “social engineering”, which is a way to attack the strong exploit the weaknesses of psychological users to access sensitive information about companies through the manipulation of personnel or consumers, while the different nature of the exploitation of weaknesses technical in security system the same, according to Mitnick, who pointed out that criminals in favor of social engineering because it involves the lowest cost and risk scores and higher levels of profit and interest.

He said Mitnick, who is considered one of the leading Internet hackers former worldwide, the market lacks a bouquet single security could have put an end to the risk of social engineering, or a single application that can be downloaded to limit the results of the ignorance of the staff and their greed and سذاجتهم, and added that engineers social workers were exploiting those points in human nature, calling on companies to explore solutions to be centered on the human element, as do secretly conduct mock electronic attacks on their own networks, to assess the reactions of employees and teach them effective behavior in the face of such attacks.

Among the most prominent experts who led the helm of discussions and meetings during the conference and participated in the dialogue, Roger Cressey, President of the Conference and former president of the Board of Directors to protect critical infrastructure in the management of each of the presidents Americans Bill Clinton and George W. Bush, in addition to Kurt Ople, senior vice president and head of technology and the creativity of the company “Lockheed Martin” specialized in the field of information security, who discussed the issue of “the implications of cloud computing,” and Rberto Deniz, head of operational risk management in Qatar Islamic Bank, which raised the issue of exploring the security of the electronic network through human behavior, and Neeraj Mathur, Director security operations at the company “Gulf Business Machine”, which was presented to the participants look at regional cyber attacks, and Ahmed Hassan Mohamed Nur, director of security risk management Intelligent management operations compliance in the telecommunications company “du”, which explained the presence of the reality of compliance developments in the electronic network effects implications of connecting employees to their mobile devices their own corporate networks in which they operate.

For his part, said Kurt Ople that cloud computing has received increasing demand, attributed because of its important role in the process of institution-building and innovation, and added that the possibility of the application of cloud computing in the security sector may change the rules of the game, and gives greater safety factor and safety. In a world where cyber attacks abound, everyone should address those attacks teamwork. The companies should also understand the reality around them and implement solutions and practices to anticipate the course of the game.

Turning speakers at the conference to the most serious threats facing the region, particularly in light of the increasing pace of coordination between the vital services public, such as water, electricity and shuttle service within the city and between cities and centers for emergency response services application of the law, what makes those sectors targets desirable to the perpetrators of cyber attacks. And increasing fears of Gulf governments, according to the speakers, the rhythm of the continuous rise in cyber attacks in the region in recent months, which creates a new maze of complexities of the political, social and economic, in addition to the current technical challenges.

It is noteworthy that the market has revealed poles unveiled the dynamic range of intelligent security software, has the ability to detect cyber attacks and response. It is the most important of the new program of anti-malware launched “Kasadian Saybrskaorta,” which addresses the advanced persistent threats, according to Mr. Guy ماغور, general manager of the company in the Middle East. It should be noted that the company “Zarudi” initiative was launched cooperation with its partner strategy “Osprska”, designed to integrate together in the European markets to provide solutions in the world of e-commerce, ranging from shopping and watch the latest technology in the world of mobile devices and sales operations and the end of the technology to communicate near-term .

And the keenness of the participants in the event to derive insights and ideas about landscape digital from the perspective of regional and international; has said Mohammed Mansour, a delegate participating in the Conference of the State of Qatar, the conference and exhibition Gulf of information security, launched this year to become one of the best events on information security in the Middle East, in providing the most powerful and correct and useful information and meet the expectations of the participants and their hopes, and he put it.

Commenting on the event, said Philip Ortodoro, Vice President Watch Gard, The convening of this event comes at a time of increasing the cyber attacks in the region, and louder demands the need to control mobile devices for staff and change the rules of the game and bring the media more light on the issues of security and information.

According to the research firm “IDC”, is expected to grow at the rate of annual spending on cyber security at a rate of 15.1% over the next five years in the Middle East, Africa and Turkey. He added Ortodoro It was a flowing wave of new customers during the first quarter of the year, during which they replace new systems Bonizthm the current security. We have achieved sales ratio was the highest ever, and reached 65% compared with the past. This reflects the growing awareness among businesses of the importance of information security.
Related Topics:

Threats Alelkronah the
Social engineering
Kevin Mitnick
Gulf Exhibition and Conference for Information Security


Tags: ,

In: A Technology & Gadgets Asked By: [20314 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »

Star Points Scale

Earn points for Asking and Answering Questions!

Grey Sta Levelr [1 - 25 Grey Star Level]
Green Star Level [26 - 50 Green Star Level]
Blue Star Level [51 - 500 Blue Star Level]
Orange Star Level [501 - 5000 Orange Star Level]
Red Star Level [5001 - 25000 Red Star Level]
Black Star Level [25001+ Black Star Level]