. Military Space News .
CYBER WARS
Bezos case exposes billionaires' vulnerability to hackers
By Luc OLINGA
New York (AFP) Feb 10, 2019

The stunning revelation that a tabloid obtained below-the-belt selfies of Amazon founder Jeff Bezos -- the world's richest man -- suggests that even billionaires are not out of the reach of hackers.

Bezos came out fighting this week, accusing the National Enquirer of blackmailing him with lurid pictures of him and his mistress, and pre-empting the threat to publish by releasing details of the images himself.

But for Mark Johnson, CEO of Sovereign Intelligence, the incident makes clear that "no one is beyond the reach of cyber exploitation."

"It's a curious irony that billionaires demonstrate astounding acumen related to their own industries, and yet seemingly ignore the minutiae of common-place security measures."

Johnson sees billionaires and top executives as especially vulnerable because their personal information is a gold mine for criminals, intelligence agencies and competitors.

"Obtaining their personal data is like having keys to the kingdom," said Johnson, potentially providing priceless insight into the thinking and strategies of the world's most powerful business leaders.

Ian Bremmer, the founder of the Eurasia Group think tank, put it more bluntly.

"If the National Enquirer has @JeffBezos dick pics, don't tell me China doesn't have @Amazon IP and strategy," he tweeted.

- Increase in calls -

Since the revelations about Bezos, whose fortune is estimated at more than $130 billion, computer security experts interviewed by AFP report an increase in calls from wealthy clients asking them to verify that their computer systems and devices were not hacked.

"Today's threats however are not necessarily trying to breach the walls of the castle -- they are already inside, residing on personal devices," said Kris Coleman, the founder of Red Five Security. "Experience has shown that the typical breach is not discovered for eight months."

In this ever-more connected age, more and more personal data is stored online -- from social security numbers to bank details, driver's license numbers and personal addresses.

As a result the focus of security measures for the ultra-wealthy has shifted from bodyguards and sophisticated alarms towards risk management to protect their assets, their image and their "legacy."

The super-wealthy will typically have their own computer security service and also call on external companies for regular evaluation of their devices because a large number of hacks are detected by third parties, according to observers.

Mark Zuckerberg, Facebook's CEO, spent $7.3 million on his security in 2017, up from $4.2 million in 2015 -- astronomical sums that the social network deemed justified due to his prominence.

Last July, Facebook said it would give him $10 million more per year to strengthen his security.

"Protection from colluding insiders working from positions of trust; or, against an intelligence agency trying to attack from the outside is going to require a large investment, a lot of experience, and vigilance," said Coleman.

- Entourage -

For Johnson, "no one's data is that well protected. Think of all the third-party platforms that have your social security number, or banking information, or that hold your personal pictures."

Just days before Bezos disclosed that a tabloid had obtained his intimate selfies, a fellow billionaire -- Joe Ricketts, the founder of the broker TD Ameritrade Holding Corporation -- was ensnared in scandal following the release of private messages.

The American news site Splinter published a series of racist emails from Ricketts, without saying how it obtained them.

The exchanges, some of which date back to 2009, show the 77-year-old sharing and apparently endorsing racist jokes and conspiracy theories. He has since apologized.

Back in August 2015, a cyber attack on the Ashley-Madison extramarital dating site revealed that American billionaire Dan Loeb had an account there.

Bezos did not say how the National Enquirer obtained his pictures, but experts say the most common method is for a hacker to usurp the identity of a member of a person's entourage.

"The adversary would send a message to the target asking them to click on a link in a text or email," Coleman explained. "The sender's real identity is hidden but the target trusts the message from their 'friend' and clicks the link unlocking malware or another type of attack on that device."

lo/wd/ec

NESTLE

Facebook

SOTHEBY'S

AMAZON.COM


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
France to tighten 5G security: minister
Paris (AFP) Feb 6, 2019
France will soon make proposals to reinforce the security of mobile telephone networks, Economy Minister Bruno Le Maire said Wednesday after the US stepped up pressure on Europe to block China's Huawei from building 5G networks. "The role of the nation is to protect the economic interests of the country, 5G could lead us to taking strong decisions in this area," Le Maire said on the France 2 television network. Several Western nations have already barred China's Huawei from participating in cont ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
U.S. Army to purchase Israel's Iron Dome anti-missile system

US Army to buy two Israeli Iron Dome air defense systems

Raytheon, Lockheed contracted for Patriot systems for foreign customers

Japan approved for $2.15B buy of Aegis Ashore missile defense systems

CYBER WARS
Rafael test-launches precision-guided missile from light vehicle in Israel

General Atomics awarded $30.9M more for MQ-9 missile defense testing

BAE awarded $225M for APKWS kits rocket upgrades

Iran in 'successful test' of new cruise missile on revolution anniversary

CYBER WARS
German Forces Begin Training Courses on Armed Israeli Surveillance Drones

Airborne Response supports fire and rescue exercise with drones and aerostats

ZX Lidars achieves world-first wind Lidar measurements from a drone

Ecuador eradicates Galapagos rats using drones

CYBER WARS
Lockheed Martin to develop cyber electronic warfare pod for UAVs

Britain to spend $1.3M for satellite antennas in light of Brexit

Reflectarray Antenna offers high performance in small package: DARPA

BAE signs $79.8M contract with Navy for Pacific comms support

CYBER WARS
Denmark, France, Netherlands receive first land munitions through NATO pact

Honeywell awarded $85.7M for C-5 software, hardware support

BAE Systems wins $21M contract to supply artillery to British army

Marine Corps distributing 1,300 new night vision devices at base

CYBER WARS
Federal budget to be released mid-March, Pentagon expects nearly $750B

Senators urge Pentagon to continue its internal audit

Report: Pentagon allowed $28B in available funds to expire

Croatia threatens to axe plans to buy F-16 jets from Israel

CYBER WARS
Ukraine amends constitution to cement EU, NATO course

Macedonia takes major step on road to NATO membership

Billionaire's ban seen as pushback against Chinese foreign influence ops

Top general not consulted before Trump's Syria pull-out decision

CYBER WARS
Research details sticky situations at the nanoscale

Aerosol-assisted biosynthesis strategy enables functional bulk nanocomposites

Platinum forms nano-bubbles

New applications for encapsulated nanoparticles with promising properties









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.