{"id":83913,"date":"2014-04-09T20:21:12","date_gmt":"2014-04-09T17:21:12","guid":{"rendered":"https:\/\/www.technion.ac.il\/blog\/cyber-attacks-technion-seminar-day\/"},"modified":"2014-04-09T20:21:12","modified_gmt":"2014-04-09T17:21:12","slug":"cyber-attacks-technion-seminar-day","status":"publish","type":"post","link":"https:\/\/www.technion.ac.il\/en\/blog\/cyber-attacks-technion-seminar-day\/","title":{"rendered":"Cyber Attacks- Technion Seminar Day"},"content":{"rendered":"

The Solution to Solving Security Vulnerabilities in all Devices and Protocols \u2013 Educating Developers Not to Release a Product until Thoroughly Tested<\/h2>\n

The solution to solving security vulnerabilities in all devices and protocols lies in the proper education of developers, who should be taught not to release a product until it has been thoroughly tested. This is what was said by Professor Eli Biham at the Seminar Day on Cyber & Information Security, held this week at the Technion. The seminar was organized by Professor Biham, Dr. Sara Bitan and the Technion Computer Engineering Center (TCE), which was founded jointly by the Faculty of Computer Science and the Faculty of Electrical Engineering.<\/p>\n

Ohad Bobrov from Lacoon Security said at the seminar that it is very easy to plan a security breach for the purposes of spying on a particular person through any mobile device. “One in a thousand mobile devices contains a dedicated spyware. The problem is that manufacturers are aware of the loopholes, but it takes them a long time to respond,” he emphasized.<\/p>\n

\"\u05e4\u05e8\u05d5\u05e4'<\/a>
\u05e4\u05e8\u05d5\u05e4’ \u05d0\u05e8\u05e0\u05d4 \u05d2\u05e8\u05d9\u05de\u05d1\u05e8\u05d2<\/figcaption><\/figure>\n

According to Professor Biham, the problem is not connected just to the ability of hackers to break into computers and mobile devices, but to the vulnerabilities that make it possible. \u201cThere is a significant problem in the education of programmers around the world; institutions are less concerned about enlightening individuals studying to be programmers about all of the attacks that the software they are learning to develop may suffer from. All those trying to meet product release deadlines almost always sidestep security. The problem is that customers don\u2019t care either, and are willing to buy these products even if it isn\u2019t secure, whether in the mobile market, the PC market and any other product.\u201d<\/p>\n

\u201cOnly after consumers start refusing to buy products that haven\u2019t undergone testing for security aspects will any type of modification be made to programming education,\u201d added Professor Biham. \u201cI have yet to see a person who is ready to go to the post office and buy a transparent envelope at half the price, with which to send his\/her secret mail. But when it comes to telephones or computers, no one asks if it\u2019s see-through.\u201d<\/p>\n

As for the timing of the conference, at a date when massive attacks are plotted and carried out on servers all around Israel, Professor Biham stated that these types of security attacks are ongoing occurrences, usually not planned for any particular date. \u201cToday we are getting ready for DOS attacks (Denial of Service),\u201d he explained. \u201cThis kind of attack only succeeds if numerous requests are sent to a server simultaneously, and therefore, they are usually more coordinated than other kinds of attacks. Many have suggested that we shutdown servers on this day, and my answer to this is that this is precisely the hackers\u2019 intensions \u2013 that we shutdown our servers, why should we help them accomplish their goals?\u201d<\/p>\n

During the first session of the seminar, Professor Orna Grumberg from the Technion\u2019s Faculty of Computer Science presented a system she developed along with Dr. Gabi Nakibly \u2013 an algorithm capable of automatically routing out security breaches in OSPF network traffic protocols, which determines the data routes sent from computer to computer. An OSPF protocol studies the network structure in order to know how to transmit packets, and it is impossible to run a network without such a protocol. Until now, the only way of tracking breaches was by employing experts who examined the protocols manually. The algorithm successfully simulated a security breach event that amazed scientists.<\/p>\n

Ohad Bobrov, co-founder of Lacoon Security, demonstrated how easy it is to download data from a network by simple and common means: how to hack into any phone, view a list of contacts, listen to a microphone, turn on the camera, and anything else that comes to the mind of the hacker.<\/p>\n

\u201cThe examples were astounding. I always knew that it was awfully easy to break into any mobile device, but today I was amazed to see just how easy it is,\u201d concluded Professor Biham.<\/p>\n

In the photo: Professor Eli Biham at the Seminar Day on Cyber & Information Security.<\/p>\n

Photographed by: Shiatzo Photography Services, the Technion\u2019s Spokesperson\u2019s Office<\/p>\n","protected":false},"excerpt":{"rendered":"

The Solution to Solving Security Vulnerabilities in all Devices and Protocols \u2013 Educating Developers Not to Release a Product until Thoroughly Tested The solution to solving security vulnerabilities in all devices and protocols lies in the proper education of developers, who should be taught not to release a product until it has been thoroughly tested.… Continue Reading Cyber Attacks- Technion Seminar Day<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-83913","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"\nCyber Attacks- Technion Seminar Day - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.technion.ac.il\/en\/blog\/cyber-attacks-technion-seminar-day\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Attacks- Technion Seminar Day - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc\" \/>\n<meta property=\"og:description\" content=\"The Solution to Solving Security Vulnerabilities in all Devices and Protocols \u2013 Educating Developers Not to Release a Product until Thoroughly Tested The solution to solving security vulnerabilities in all devices and protocols lies in the proper education of developers, who should be taught not to release a product until it has been thoroughly tested.… Continue Reading Cyber Attacks- Technion Seminar Day\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.technion.ac.il\/en\/blog\/cyber-attacks-technion-seminar-day\/\" \/>\n<meta property=\"og:site_name\" content=\"\u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-09T17:21:12+00:00\" \/>\n<meta name=\"author\" content=\"shlomi ben-oz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"shlomi ben-oz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.technion.ac.il\/en\/blog\/cyber-attacks-technion-seminar-day\/\",\"url\":\"https:\/\/www.technion.ac.il\/en\/blog\/cyber-attacks-technion-seminar-day\/\",\"name\":\"Cyber Attacks- Technion Seminar Day - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc\",\"isPartOf\":{\"@id\":\"https:\/\/www.technion.ac.il\/en\/#website\"},\"datePublished\":\"2014-04-09T17:21:12+00:00\",\"author\":{\"@id\":\"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/d65b78b7a7446bdf9fb69078573b8320\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.technion.ac.il\/en\/blog\/cyber-attacks-technion-seminar-day\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.technion.ac.il\/en\/blog\/cyber-attacks-technion-seminar-day\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.technion.ac.il\/en\/blog\/cyber-attacks-technion-seminar-day\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home Page\",\"item\":\"https:\/\/www.technion.ac.il\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Attacks- Technion Seminar Day\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.technion.ac.il\/en\/#website\",\"url\":\"https:\/\/www.technion.ac.il\/en\/\",\"name\":\"\u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.technion.ac.il\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/d65b78b7a7446bdf9fb69078573b8320\",\"name\":\"shlomi ben-oz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/96b13158d164281df14ad8583ec2cb64?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/96b13158d164281df14ad8583ec2cb64?s=96&d=mm&r=g\",\"caption\":\"shlomi ben-oz\"},\"url\":\"https:\/\/www.technion.ac.il\/en\/blog\/author\/ben-ozshlomitechnion-ac-il\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Attacks- Technion Seminar Day - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.technion.ac.il\/en\/blog\/cyber-attacks-technion-seminar-day\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Attacks- Technion Seminar Day - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc","og_description":"The Solution to Solving Security Vulnerabilities in all Devices and Protocols \u2013 Educating Developers Not to Release a Product until Thoroughly Tested The solution to solving security vulnerabilities in all devices and protocols lies in the proper education of developers, who should be taught not to release a product until it has been thoroughly tested.… Continue Reading Cyber Attacks- Technion Seminar Day","og_url":"https:\/\/www.technion.ac.il\/en\/blog\/cyber-attacks-technion-seminar-day\/","og_site_name":"\u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc","article_published_time":"2014-04-09T17:21:12+00:00","author":"shlomi ben-oz","twitter_card":"summary_large_image","twitter_misc":{"Written by":"shlomi ben-oz","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.technion.ac.il\/en\/blog\/cyber-attacks-technion-seminar-day\/","url":"https:\/\/www.technion.ac.il\/en\/blog\/cyber-attacks-technion-seminar-day\/","name":"Cyber Attacks- Technion Seminar Day - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc","isPartOf":{"@id":"https:\/\/www.technion.ac.il\/en\/#website"},"datePublished":"2014-04-09T17:21:12+00:00","author":{"@id":"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/d65b78b7a7446bdf9fb69078573b8320"},"breadcrumb":{"@id":"https:\/\/www.technion.ac.il\/en\/blog\/cyber-attacks-technion-seminar-day\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.technion.ac.il\/en\/blog\/cyber-attacks-technion-seminar-day\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.technion.ac.il\/en\/blog\/cyber-attacks-technion-seminar-day\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home Page","item":"https:\/\/www.technion.ac.il\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Attacks- Technion Seminar Day"}]},{"@type":"WebSite","@id":"https:\/\/www.technion.ac.il\/en\/#website","url":"https:\/\/www.technion.ac.il\/en\/","name":"\u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.technion.ac.il\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/d65b78b7a7446bdf9fb69078573b8320","name":"shlomi ben-oz","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/96b13158d164281df14ad8583ec2cb64?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/96b13158d164281df14ad8583ec2cb64?s=96&d=mm&r=g","caption":"shlomi ben-oz"},"url":"https:\/\/www.technion.ac.il\/en\/blog\/author\/ben-ozshlomitechnion-ac-il\/"}]}},"_links":{"self":[{"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/posts\/83913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/comments?post=83913"}],"version-history":[{"count":0,"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/posts\/83913\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/media?parent=83913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/categories?post=83913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/tags?post=83913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}