Specialists in computer and network security have warned of electronic games that children play on the Internet, due to the large number of trolls, “hackers”, who may infiltrate children’s devices to obtain data and information about the family, by using the method of soliciting through direct correspondence and taking Financial and other valuable information.
A dark market
The assistant professor at Imam Abdulrahman bin Faisal University, specializing in computer and network security, Dr. Al-Bandari Al-Sumait revealed that many financial issues have occurred and the existence of a “dark market” for selling information has contributed to raising the number of cases of selling credit card information globally, in addition to selling people’s information for the benefit of “hackers”. In scams, explaining that about 70% of people agree to the terms of using programs or applications without reading the agreement, which allows sharing information and data with other parties that the user cannot sue.
During her participation in a hypothetical seminar entitled (Social Engineering) organized by the Saudi Library and Information Association, she pointed out that mobile devices may disappear during the next ten years, and be replaced by “wearable” smart devices such as watches and glasses. They will have a future in our lives, but it may not work. With all groups, noting at the same time that foldable devices and “wearable” devices are the future for what they possess by being an alternative to the computer, stressing that the Internet has become the control in all parts of the house, and the magnitude of the expected changes in future life cannot be absorbed by the human mind at present. .
She showed that electronic robbery increased with the use of the Internet, especially during the Corona pandemic, which increased its use as a result of sitting at home, indicating that social engineering is the most effective way to steal confidential data from organizations, as 85% of office employees of a company were deceived through a tamper test. Recently conducted by a specialized electronic company in Germany.
She explained that most “hackers” resort to using social engineering for ease of preparation and implementation, lack of protection, awareness, and the difficulty of detection and tracking, that is, it is a “clean theft”, and is carried out in several ways, including electronic fraud, voice fraud, spam, or programs. Or, by electronic publishing, phishing, baiting, bartering, following the footsteps, or claiming the presence of hosting locally for government agencies and major national companies through the storage of cloud computing, in order to preserve the security and confidentiality of information and data, in line with With the Kingdom’s development in cybersecurity.