close
Advertisement
Can't connect right now! retry

add The News to homescreen

tap to bring up your browser menu and select 'Add to homescreen' to pin the The News web app

Got it!

add The News to homescreen

tap to bring up your browser menu and select 'Add to homescreen' to pin the The News web app

Got it!
AFP
February 11, 2019

Bezos case exposes vulnerability to hackers

World

AFP
February 11, 2019

NEW YORK: The stunning revelation that a tabloid obtained below-the-belt selfies of Amazon founder Jeff Bezos — the world´s richest man — suggests that even billionaires are not out of the reach of hackers. Bezos came out fighting this week, accusing the National Enquirer of blackmailing him with lurid pictures of him and his mistress, and pre-empting the threat to publish by releasing details of the images himself.

But for Mark Johnson, CEO of Sovereign Intelligence, the incident makes clear that “no one is beyond the reach of cyber exploitation.” “It´s a curious irony that billionaires demonstrate astounding acumen related to their own industries, and yet seemingly ignore the minutiae of common-place security measures.” Johnson sees billionaires and top executives as especially vulnerable because their personal information is a gold mine for criminals, intelligence agencies and competitors.

“Obtaining their personal data is like having keys to the kingdom,” said Johnson, potentially providing priceless insight into the thinking and strategies of the world´s most powerful business leaders. Ian Bremmer, the founder of the Eurasia Group think tank, put it more bluntly. “If the National Enquirer has @JeffBezos dick pics, don´t tell me China doesn´t have @Amazon IP and strategy,” he tweeted. - Increase in calls - Since the revelations about Bezos, whose fortune is estimated at more than $130 billion, computer security experts interviewed by AFP report an increase in calls from wealthy clients asking them to verify that their computer systems and devices were not hacked. “Today´s threats however are not necessarily trying to breach the walls of the castle — they are already inside, residing on personal devices,” said Kris Coleman, the founder of Red Five Security. “Experience has shown that the typical breach is not discovered for eight months.” In this ever-more connected age, more and more personal data is stored online — from social security numbers to bank details, driver´s license numbers and personal addresses. As a result the focus of security measures for the ultra-wealthy has shifted from bodyguards and sophisticated alarms towards risk management to protect their assets, their image and their “legacy.” The super-wealthy will typically have their own computer security service and also call on external companies for regular evaluation of their devices because a large number of hacks are detected by third parties, according to observers.

Topstory minus plus

Opinion minus plus

Newspost minus plus

Editorial minus plus

National minus plus

World minus plus

Sports minus plus

Business minus plus

Karachi minus plus

Lahore minus plus

Islamabad minus plus

Peshawar minus plus