请输入您要查询的百科知识:

 

词条 Khalil Sehnaoui
释义

  1. Background

  2. Early life and education

  3. Media and television

     Media  Television 

  4. Books

  5. Controversies

  6. References

  7. External links

{{Infobox person
| name = Khalil Sehnaoui
| image = Khalil Sehnaoui.jpeg
| caption = Khalil Sehnaoui in 2015
| alt =
| birth_name = Khalil Marwan Sehnaoui
| birth_date = {{Birth date and age|1975|5|23}}
| birth_place = Beirut, Lebanon
| death_date =
| death_place =
| nationality = Lebanese, Belgian
| organization = Krypton Security
| occupation = Information Security Consultant Information Technology Consultant
| residence = Beirut, Lebanon
| education = Economics
Business Management
Finance
Computer science
| known_for = Computer Security Consulting, Hacking and Commentary
| mother = Mouna Bassili Sehnaoui
| father = Marwan Sehnaoui
| relatives = Nicolas Sehnaoui (Cousin) Antoun Sehnaoui (Cousin)
| website = [https://khalilsehnaoui.com Khalil Sehnaoui]
| notable_works =
}}Khalil Sehnaoui is a Belgian-Lebanese information security consultant[1] who specialises in the Middle-East[2] and the founder[3] and managing partner of Beirut-based Krypton Security.[4][5] He is also a member of the Chaos Computer Club (CCC),[6] Europe's largest association of hackers.[7]

Background

He co-founded and is a managing partner at the security firm Krypton Security which helps test companies' security strengths, weaknesses, and potential loopholes.

In an online report published on April 6, 2016, Sehnaoui was listed as one of the top 100 influencers in Information Security.[8]

Sehnaoui is often called upon to comment in media about Information Security matters.[9][10][11][12][13][14][15][16][17][18][19]

Early life and education

Sehnaoui was born in Beirut, to parents Marwan Sehnaoui and Mouna Bassili Sehnaoui, on 23 May 1975 and grew up living between Paris, France and Beirut, Lebanon. His father is the President of the Lebanese Order of Malta[20] and his mother is a Middle-East painter.[21]

He attended College Stanislas in Paris as well as Collège Louise Wegman in Beirut, following which he earned a BA in Management from Universite Saint Joseph in Beirut as well as a Masters in Economics.

Media and television

Media

Sehnaoui was featured in The Guardian's video series "The Power of Privacy" in 2015.[22]

In May 2017 Sehnaoui went viral on Twitter[23] and the internet after tweeting about getting revenge on loud and rude customers in a coffee shop.[24] The customers were being loud and rude to waiters, and were having a very voluble conversation about their perfect new business name.[25] As a retaliation Sehnaoui registered the domain name and tweeted about it.[26] According to Mashable, "Twitter users praised Sehnaoui for his act of digital savagery".[27]

Television

Sehnaoui was also featured on National Geographic in 2017 in the series Breakthrough,[28] produced by Ron Howard and Brian Grazer, Season 2 Episode 2, Cyber-Terror. This episode offered "An exclusive look inside the shadowy world of hackers, where good battles evil with the security of the world at stake. This episode follows “white-hat” hackers Jayson Street, Darren Kitchen and Khalil Sehnaoui, security specialists who combine clever coding with “Mission: Impossible”-style “social engineering.” "[29][30]

Books

In 2019 Sehnaoui was featured amongst 70 information security professionals in a book called "Tribe of Hackers"[31], a collection of industry, career, and personal insights from cybersecurity luminaries. The book quickly rose to the #1 spot of new releases on Amazon in the Computer Security and encryption category.[32]

Controversies

In 2015 there was a controversy when Sehnaoui identified that Silent Circle's warrant canary had been removed from their site.[33] Sehnaoui was also prominently featured in a video series by The Guardian about privacy risks [34] and is often called upon to comment on recent Information Security news.[35][36] Before founding an information security firm he attempted to improve patient representation in the Lebanese insurance industry.[37]

Starting January 2016 there were reports that the Islamic State allegedly built a new Android app called Alrawi for exchanging encrypted messages,[38] based on claims from online counter-terrorism firm Ghost Security Group (GSG). The claim was quickly reprinted by Newsweek, Fortune and TechCrunch, among others.[39][40] Sehnaoui was one of the security specialists that helped debunk the myth of this tool, showing that it was just a "bad media mock-up to try and get some attention".[41]

In July 2018, he was arrested for alleged piracy of several Lebanese companies and government institutions, his detention was illegal as there is a legal vacuum in Lebanese laws about cybercrime. He was released after being questioned and no charges were brought against him.

References

1. ^{{cite web |url=http://www.washingtontimes.com/news/2016/jun/23/gun-ownership-religion-and-other-details-millions-/ |title=Gun Ownership, Religion And Other Details For Millions Leaked |date=June 23, 2016 |work=The Washington Times |publisher=The Washington Times, LLC |access-date=24 June 2016}}
2. ^{{cite web |url=http://www.dailydot.com/politics/encryption-backdoors-french-parliament-legislation-paris-attacks-crypto-wars/#pq=hVTJtP |title=French government considers law that would outlaw strong encryption |date=January 12, 2016 |work=The Daily Dot |publisher=SlashDot |access-date=12 January 2016}}
3. ^{{cite web |url=http://www.zdnet.com/article/chryslers-response-to-car-hack-was-slow-and-incredibly-stupid/ |title=Why Chrysler's car hack 'fix' is staggeringly stupid |date=July 27, 2015 |work=ZDnet |publisher=CBS Interactive |access-date=30 November 2015}}
4. ^{{cite web |url=http://www.lecommercedulevant.com/affaires/lebanon-valley-liban/les-banques-sont-elles-l-abri-des-cyberattaques/23173 |title=Les banques sont-elles à l’abri des cyberattaques ? |date=4 March 2014 |work=Le Commerce du Levant |publisher=Société de press et d’édition libanaise S.A.L. |access-date=3 November 2015}}
5. ^{{cite web |url=http://www.dailystar.com.lb/Business/Lebanon/2014/Jan-20/244570-cybersecurity-risks-loom-for-lebanese-banks.ashx#axzz3Izmo19XB |title=Cybersecurity risks loom for Lebanese banks |date=20 January 2014 |work=Daily Star |publisher=Daily Star |access-date=3 November 2015}}
6. ^{{cite web |url=http://www.zdnet.com/article/kazakhstan-forces-its-citizens-into-installing-internet-backdoors/ |title=Kazakhstan will force its citizens to install internet backdoors |date=3 December 2015 |work=ZDNet |publisher=CBS Interactive |access-date=3 December 2015}}
7. ^http://www.ccc.de/en/
8. ^{{cite web |url=http://www.onalytica.com/blog/posts/cyber-security-and-infosec-top-100-influencers-and-brands/ |title=Cyber Security and InfoSec: Top 100 Influencers and Brands |date=6 April 2016 |work=Joe Fields |publisher=OnAlytica |accessdate=8 April 2016}}
9. ^{{cite web |url=http://www.csoonline.com/article/3101024/security/game-of-thrones-can-teach-you-valuable-security-lessons.html |title=Game of Thrones can teach you valuable security lessons |date=1 August 2016 |work=Vincenzo Marsden |publisher=CSO |accessdate=1 August 2016}}
10. ^{{cite web |url=http://www.dailydot.com/layer8/equation-group-shadow-brokers-exploits/ |title=Hack of NSA-linked Group Is Legitimate, Cybersecurity Firm Says |date=16 August 2016 |work=Patrick Howell O'Neill |publisher=The Daily Dot |accessdate=18 August 2016}}
11. ^{{cite web |url=http://www.dailydot.com/layer8/cisco-asa-nsa-shadowbroker-patch/ |title=Cisco patches 'ExtraBacon' zero-day exploit leaked by NSA hackers |date=17 August 2016 |work=Patrick Howell O'Neill |publisher=The Daily Dot |accessdate=18 August 2016}}
12. ^{{cite web |url=http://www.dailydot.com/layer8/comey-crypto-war-business-model |title=FBI director: 'There is no such thing as absolute privacy in America' |date=30 August 2016 |work=Patrick Howell O'Neill |publisher=The Daily Dot |accessdate=1 September 2016}}
13. ^{{cite web |url=http://www.vocativ.com/383029/cybersecurity-experts-trump-profoundly-misunderstands-hacking/ |title=Cybersecurity Experts: Trump Profoundly Misunderstands Hacking' |date=12 December 2016 |work=Kevin Collier |publisher=Vocativ |accessdate=13 December 2016}}
14. ^{{cite web |url=http://www.vocativ.com/396985/trump-potus-twitter-gmail-gov/ |title=After Outcry, Trump’s Twitter Switches From Gmail To Gov Address |date=26 January 2017 |work=Kevin Collier |publisher=Vocativ |accessdate=28 January 2017}}
15. ^{{cite web |url=https://securityintelligence.com/enterprise-intelligence-brief-threat-hunting-takes-center-stage/ |title=Enterprise Intelligence Brief: Threat Hunting Takes Center Stage |date=1 February 2017 |work=Natasha Bishop |publisher=IBM, Inc |accessdate=1 February 2017}}
16. ^{{cite web |url=https://www.forbes.com/sites/thomasbrewster/2017/02/07/arab-hackers-want-to-make-american-cyber-secure-again/#7046d2ba13b3 |title=These Arab Hackers Want To Make America Safe Again -- Will Trump Let Them? |date=7 February 2017 |work=Thomas Fox-Brewster |publisher=Forbes |accessdate=9 February 2017}}
17. ^{{cite web |url=https://www.cyberscoop.com/isis-malware-telegram-android/ |title=Islamic State Supporters Hit By Android Malware On Telegram |date=9 February 2017 |work=Patrick O'Neill |publisher=Cyberscoop |accessdate=15 February 2017}}
18. ^{{cite web |url=https://www.cyberscoop.com/confide-favorite-app-trumps-white-house-triumph-marketing-substance/ |title=Confide, A Favourite App Of Trump's White House, Is 'A Triumph Of Marketing Over Substance' |date=15 February 2017 |work=Patrick O'Neill |publisher=Cyberscoop |accessdate=15 February 2017}}
19. ^{{cite web |url=http://www.zdnet.com/article/unsecured-servers-at-new-york-airport-left-exposed-for-a-year/ |title=Security lapse exposed New York airport's critical servers for a year |date=24 February 2017 |work=Zack Whittaker |publisher=CBS Interactive |accessdate=24 February 2017}}
20. ^{{cite web |url=http://www.lorientlejour.com/article/955078/rencontres-a-moukhtara-entre-lordre-de-malte-et-lassociation-abou-hassan-aref-halaoui.html |title= Rencontres A Mokhtara Entre l'Ordre De Malte Et L'Association Abou Hassan Aref Halaoui |date=17 November 2015 |work=L'Orient Le Jour |publisher=Orient-Le-Jour |accessdate=17 November 2015}}
21. ^{{cite web |url=https://www.nytimes.com/2010/01/03/travel/03next.html |title=Byblos, Lebanon’s Ancient Port, Is Reborn |date=31 December 2009 |work=The New York Times |publisher=New York Times |access-date=4 December 2015}}
22. ^{{cite web |url=https://www.theguardian.com/media-network/2016/jan/28/the-power-of-privacy-documentary-film |title=The Power of Privacy – film |date=28 January 2016 |work=Aleks Krotoski |publisher=Guardian News and Media Limited |accessdate=18 May 2017}}
23. ^{{cite web |url=https://twitter.com/sehnaoui/status/864895019454484480 |title=Sehnaoui's Tweet |date=17 May 2017 |work=Twitter |publisher=Twitter |accessdate=22 May 2017}}
24. ^{{cite web |url=http://www.huffingtonpost.com/entry/rude-coffee-shop-customer-revenge-funny_us_59201a34e4b094cdba54604b |title=Coffee Shop Customer Delivers ‘Obnoxious’ Table Neighbors A Delicious Lesson |date=20 May 2017 |work=Lee Moran |publisher=TheHuffingtonPost.com, Inc. |accessdate=22 May 2017}}
25. ^{{cite web |url=https://www.telegraph.co.uk/men/the-filter/one-man-wreaked-ingenious-revenge-rude-customers-coffee-shop/ |title=How one man wreaked ingenious revenge on rude customers in a coffee shop |date=19 May 2017 |work=Adam Boult |publisher=Telegraph Media Group Limited |accessdate=22 May 2017}}
26. ^{{cite web |url=http://www.dailymail.co.uk/femail/article-4523728/Man-seeks-revenge-rude-coffee-shop-customers.html |title=King of passive aggressive! |date=19 May 2017 |work=Clemence Michallon |publisher=Associated Newspapers Ltd |accessdate=22 May 2017}}
27. ^{{cite web |url=http://mashable.com/2017/05/19/man-revenge-coffeeshop-goers/#Ur29K5Z8xmqJ |title=Man Gets Revenge On Rude People In Coffee Shop |date=20 May 2017 |work=April Hautea |publisher=Mashable, Inc |accessdate=22 May 2017}}
28. ^{{cite web |url=http://channel.nationalgeographic.com/breakthrough-series/videos/cyber-terror/ |title=Breakthrough - Cyber Terror |date=9 May 2017 |work=National Geographic |publisher=National Geographic Partners, LLC |accessdate=18 May 2017 |archive-url=https://web.archive.org/web/20170517033609/http://channel.nationalgeographic.com/breakthrough-series/videos/cyber-terror/# |archive-date=2017-05-17 |dead-url=yes |df= }}
29. ^{{cite web |url=http://tvseriesfinale.com/tv-show/breakthrough-season-two-announced-nat-geo-series/ |title=Breakthrough: Season Two Announced for Nat Geo Series |date=14 April 2017 |work=Jessica Pena |publisher=TV Series Finale. |accessdate=18 May 2017}}
30. ^{{cite web |url=http://observer.com/2017/05/national-geographic-breakthrough-hacking-trust/ |title=Nat Geo’s Next Ep of ‘Breakthrough’ Proves We Can’t Afford to Trust Each Other |date=5 May 2017 |work= Brady Dale |publisher=Observer |accessdate=18 May 2017}}
31. ^{{cite web |url=https://www.threatcare.com/tribe-of-hackers/ |title=Tribe of Hackers |date=9 February 2019 |work=Marcus J. Carey |publisher=Threatcare |accessdate=9 February 2019}}
32. ^{{cite web |url=https://www.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1793464189 |title=Tribe of Hackers |date=9 February 2019 |work=Marcus J. Carey |publisher=Independently Published |accessdate=9 February 2019}}
33. ^{{cite web |url=http://www.zdnet.com/article/silent-circle-denies-secret-gag-order-data-warrant/ |title=Silent Circle: We haven't been served a single demand for data |date=8 March 2015 |work=ZDNet |publisher=CBS Interactive |access-date=3 November 2015}}
34. ^{{cite web |url=https://www.theguardian.com/media-network/2016/jan/28/the-power-of-privacy-documentary-film |title=The power of privacy (2/5): Hacking exposed: the tricks of the trade |date=29 September 2015 |work=The Guardian |publisher=Guardian News and Media |access-date=3 November 2015}}
35. ^{{cite web |url=http://www.zdnet.com/article/tango-down-bbc-was-this-the-largest-ddos-web-attack |title=#TangoDown: The 'Biggest Ever' Web Attack That Wasn't |date=14 January 2016 |work=ZDnet |publisher=CBS Interactive |access-date=15 January 2016}}
36. ^{{cite web |url=http://www.csoonline.com/article/3018912/security/18-million-targeted-voter-records-exposed-by-database-error.html |title=18 Million Targeted Voter Records Exposed By Database Error |date=4 January 2016 |work=CSO Online |publisher=IDG Enterprise |access-date=4 January 2016}}
37. ^{{cite web |url=http://www.executive-magazine.com/society/healthcare-between-patient-and-payment |title=Healthcare -- Between Payment and Patient |date=1 August 2008 |work=Executive Magazine |publisher=Newsmedia S.A.L. |accessdate=3 November 2015 }}{{dead link|date=May 2017 |bot=InternetArchiveBot |fix-attempted=yes }}
38. ^{{cite web |url=http://www.defenseone.com/technology/2016/01/Researchers-isis-now-has-new-secure-messaging-app/125062// |title=Researchers: ISIS Has Built A Secure Messaging App |date=16 January 2016 |work=Defense One |publisher=National Journal Group, Inc |accessdate=27 January 2016}}
39. ^{{cite web |url=http://europe.newsweek.com/isis-creates-its-own-secure-messaging-app-415565?rm=eu |title=ISIS Creates Its Own Secure Messaging App |date=14 January 2016 |work=NewsWeek |publisher=Newsweek LTD |accessdate=27 January 2016}}
40. ^{{cite web |url=https://techcrunch.com/2016/01/16/isis-app/ |title=ISIS Has Its Own Encrypted Chat App |date=16 January 2016 |work=TechCrunch |publisher=AOL,Inc |accessdate=27 January 2016}}
41. ^{{cite web |url=http://www.dailydot.com/politics/isis-alrawi-encryption-messaging-app/ |title=The myth of the ISIS Encrypted Messaging App |date=27 January 2016 |work=The Daily Dot |publisher=SlashDot |accessdate=27 January 2016}}

External links

  • [https://twitter.com/sehnaoui Khalil Sehnaoui's Twitter]
  • Khalil Sehnaoui's Personal Website
  • [https://www.kryptonsecurity.com Krypton Security Official Website]
{{DEFAULTSORT:Sehnaoui, Khalil}}

6 : 1975 births|Living people|Lebanese Melkite Greek Catholics|People associated with computer security|Belgian people of Lebanese descent|Saint Joseph University alumni

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/25 0:35:33