Presentations by Roman Zaikim:
-
ICS Cybersec 2018 Conference, Thursday, October 11, 2018, 11:25
Roman Zaikin and Dikla Barda, recently unveiled new vulnerabilities in the popular messaging application that could allow threat actors to intercept and manipulate messages sent in both private and group conversations, giving attackers immense power to create and spread misinformation from what appear to be trusted sources.
They observed three possible methods of attack exploiting this vulnerability – all of which involve social engineering tactics to fool end-users. A threat actor can:
- Use the ‘quote’ feature in a group conversation to change the identity of the sender, even if that person is not a member of the group.
- Alter the text of someone else’s reply, essentially putting words in their mouth.
- Send a private message to another group participant that is disguised as a public message for all, so when the targeted individual responds, it’s visible to everyone in the conversation
More Speakers at ICS Cybersec 2018
-
פלי הנמר
יזם ומנהיגPeople & Computers -
Yoav Tzruya
Partner and CEOJVP Cyber Labs -
Yossi Shavit
Information Security & Cyber Consultantהמשרד להגנת הסביבה -
Mati Epstein
Lead Sales Manager, Critical InfrastructureCheckpoint ישראל -
Nissim Hai
Industry Business Product ManagerSchneider Electric -
Gilad Bandel
VP ProductsRadiflow -
Idan Ivgi
CISO, Cyber 2.0 -
Omri Sagron
Founder & CEO, CISSP, CHP Highdele Consulting & Training -
Moshe Karako
Innovation Coach, NEC Israel Research Center -
Maya Maimon
Cyber Architect - Innovation CoachNEC -
Itay Bochhner
Chief engineerCert -IL -
Gil Groskop
Head of Control DepartmentMekorot -
Tsvi Lev
General ManagerNEC Israel Research Center -
Israel Baron
Head of Cyber Security DepartmentIsrael Railway -
Dr. Damiano Bolzoni
CEOSecurityMatters -
Avi Atzur
Cyber Security ResearcherIAI-ELTA -
Guy Noy
System EngineerPalo Alto Networks -
Alon Barel
VP Sales, EMEA & APAC, Indegy -
Vladimir Zavodchikov
Senior Sales EngineerTred Micro -
Eli Gazit
Executive Director, Critical Infrastructures Division Cyber Robustness