The Right for Privacy in a World Where Everything is Shared

hackingteam_1-100594937-orig.jpg

 

The latest revelations about “Hacking Team” (an Italian offensive-cyber company), its products (snooping SW for every type of digital communication, from email to whatsapp) and it its clientele (mostly dark regimes) seems to shock everyone. Lets’ look at the facts and see how truly shocking this is:

Governments want to have the capacity to spy on their citizens- nothing new here. since the dawn of time the ruler’s no. intelligence priority was to spy not on his enemy from abroad but on his enemies from within (opposition, subversive elements).

Governments can now do this in a scale that was incomprehensible before: they can pretty much collect and store every piece of digital communication they can get there sniffers on.

Governments can analyze and understand the information like never before- The East-German Statsi was notorious for eavesdropping on large segments of the population. They were so obsessed with this that the accumulated so much recorded material that they were never able to listen or dissect it. Fast forward 30 years- machines do it almost instantly today, identifying key phrases, mapping links between seemingly unconnected people and are rapidly gaining in machine intelligence. But….

  • We share everything online- are locations, friends, images and desires
  • We wear mobile tracking devices with us most times
  • We are now loving the idea of having a wearable tracking devices, which we will never take off and will transmit not only our location but our vital signs
  • We disregard any common sense when it comes to online safety (using same password for all our social media accounts for example).

So why are we surprised? We are simply making it easier for any nation state (be it our own or an adversary) to collect information about us. What’s the solution? We’ll, if you don’t want anyone to access a piece of information (sensitive correspondence, nude selfies) please refrain from posting it anywhere online. Otherwise- consider everything you’ve ever posted as “free for all” (regardless of privacy settings). If you still consider sharing after all this- don’t act surprised…  


Yotam Gutman is Director Product Marketing at Cytegichttp://owntrepreneurship.com/
 

« NATO missile system hacked remotely by ‘foreign source’
The Focus on Terror has Distorted the Debate on Encryption »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

Stormshield

Stormshield

Stormshield is a European leader in digital infrastructure security. We offer smart, connected solutions in order to anticipate attacks and protect digital infrastructures.

Protection Group International (PGI)

Protection Group International (PGI)

PGI helps organisations and governments to manage digital risk. From cyber security services to business intelligence, we help reduce the risks to your finances, reputation, assets and people.

Think Cyber Security (ThinkCyber)

Think Cyber Security (ThinkCyber)

ThinkCyber is a Tel Aviv-based Israeli company with a team of cybersecurity professionals who are experts in both information and operations technology.

Halon

Halon

Halon is a flexible security and operations platform for in-transit email.

LEADS

LEADS

LEADS is considered as a leading ICT Solution Provider and an IT partner of choice in Bangladesh.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

Foundries.io

Foundries.io

Foundries.io have built a secure, open source platform for the world's connected devices, and a cloud service to configure this to any hardware and any cloud.

Fusion Cyber

Fusion Cyber

Fusion Cyber educates students in Zero Trust Risk Management, Defense, and Cyber Offense that lead to taking industry-accepted cybersecurity certifications.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

DESCERT

DESCERT

DESCERT offers you an extended IT, cyber security, risk advisory & compliance audit team which provides strategic guidance, engineering and audit services.

Bleach Cyber

Bleach Cyber

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security.

SOC-E

SOC-E

SOC-E is a leading technology provider for high-availability and deterministic networking, sub-microsecond synchronization and cybersecurity solutions for critical sectors.