• The Gulf Information Security Expo and Conference (Gisec) kicks off in Dubai. Photos by Chris Whiteoak / The National
    The Gulf Information Security Expo and Conference (Gisec) kicks off in Dubai. Photos by Chris Whiteoak / The National
  • People visit the STM stand at GISEC at the Dubai World Trade Centre.
    People visit the STM stand at GISEC at the Dubai World Trade Centre.
  • In the past year, the UAE has seen a 300 per cent increase in cyberattacks.
    In the past year, the UAE has seen a 300 per cent increase in cyberattacks.
  • The average resident in the Emirates spent seven hours and 24 minutes online per day in 2020. according to data from the World Digital Report 2021.
    The average resident in the Emirates spent seven hours and 24 minutes online per day in 2020. according to data from the World Digital Report 2021.
  • People visit Gisec at the Dubai World Trade Centre on Monday.
    People visit Gisec at the Dubai World Trade Centre on Monday.
  • The Covid-19 outbreak exposed a barrage of cyber security vulnerabilities as hackers took advantage of the uptake in digital adoption.
    The Covid-19 outbreak exposed a barrage of cyber security vulnerabilities as hackers took advantage of the uptake in digital adoption.
  • Experts said while hackers will always find ways to breach systems, international knowledge sharing will help keep abreast of new attacks.
    Experts said while hackers will always find ways to breach systems, international knowledge sharing will help keep abreast of new attacks.
  • Ahmed Saleh, sales engineer at Recorded Future, speaks on the sidelines of Gisec.
    Ahmed Saleh, sales engineer at Recorded Future, speaks on the sidelines of Gisec.

25,000 e-crime reports registered in Dubai as cyber attacks increase during pandemic


Kelly Clarke
  • English
  • Arabic

Dubai Police registered 25,000 e-crime reports last year, as cyber criminals exploited the disruption caused by Covid-19 around the world.

The pandemic exposed a barrage of cyber security vulnerabilities in the Middle East and hackers took advantage of the uptake in digital adoption, a senior official said on Monday.

Col Saeed Al Hajri, director of the Cybercrime Department at Dubai Police, said that since the e-crime platform was established in 2018, reports have increased each year, with 2020 accounting for the highest case numbers yet.

He said phishing and ransomware incidents were some of the most common forms of attack in the country.

When it comes to cyber security, it's a cat and mouse game between criminals and policing authorities

“As well as facing a biological pandemic, we have been faced with a cyber pandemic too,” Col. Al Hajri said at the Gulf Information Security Expo and Conference (Gisec) in Dubai.

“When it comes to cyber security, it’s a cat and mouse game between criminals and policing authorities. We have to keep implementing preventive and proactive methods to keep data and individuals safe.

“In 2018 we introduced a unified reporting platform for transparency for the public, the e-crime service. In its first year we registered 3,000 cases, in 2019 that number increased to 14,000, and last year a record 25,000 cases were reported.”

The comments offer an insight into the increasingly challenging cyber security environment in the Middle East.

A life spent online

Dr Mohamed Al-Kuwaiti, head of cyber security for the UAE government. Supplied
Dr Mohamed Al-Kuwaiti, head of cyber security for the UAE government. Supplied

The UAE has one of the highest digital adoption rates in the region. Data from the World Digital Report 2021 shed light on the web-based lifestyle of 43 countries in 2020, including the UAE.

The average resident in the Emirates spent seven hours and 24 minutes online a day last year. According to the report, 99 per cent of people in the UAE are active on social media and 97.6 per cent are smartphone owners.

Speaking at Gisec, Dr Mohamed Al-Kuwaiti, head of cyber security for the UAE government, said Covid-19 had fundamentally changed the way we work and live.

In the past year, the UAE has recorded a “300 per cent increase in cyber attacks”, and that frequency is likely to grow as the digital revolution continues.

“This past year has taught us that we are not only in the midst of a pandemic but in the midst of a digital revolution too,” he said.

“While technology advancement may be deemed a saviour in that it allowed us to continue working and learning remotely from home, the heavier reliance on technology and the internet has exposed new vulnerabilities.

“Securing the cyber landscape is a necessity in protecting the connected population.”

He said as cyber threats become increasingly sophisticated, it is crucial that countries collaborate to be more resilient.

While hackers will always find ways to breach systems, international knowledge sharing will help governments keep abreast of new attacks.

Speaking alongside Col. Al-Hajri, Craig Jones, cyber crime director for Interpol in Singapore, said countries need to be more "willing to share data" - from policing authorities to public or private entities - to help understand how criminals are attacking local communities.

“It is about understanding local communities and what crimes are specifically impacting a population,” he said.

“We can analyse this activity with vital data, so the priority is on how we can change policing models and introduce and encourage this ‘dare to share’ model internationally.

“Nowadays, cyber criminals work as a business model so we want to disrupt that model. It is very challenging.”

What are the top cyber vulnerabilities in 2021?

Social engineering, phishing and spear phishing are three ways in which a web user's data might be stolen. REUTERS /Kacper Pempel
Social engineering, phishing and spear phishing are three ways in which a web user's data might be stolen. REUTERS /Kacper Pempel

1. Social engineering

Social engineering is the term used for a broad range of malicious activities accomplished through human interactions, rather than technical hacking techniques. It is one of the most common forms of attacks on individuals.

It uses psychological manipulation to trick users into making security mistakes or give away sensitive information, such as bank account details and passwords. Social engineering attacks happen in one or more steps.

  • On the phone - a social engineer might call and pretend to be a fellow employee or a trusted outside authority (such as law enforcement or bank employee).
  • In the office – a criminal might claim to have forgotten their access card to enter a building. While the person asking may not seem suspicious, this is a very common tactic used by social engineers.
  • Online - social networking sites have made social engineering attacks easier to conduct. Today's attackers can go to sites like LinkedIn and find all of the users that work at a company and gather plenty of detailed information that can be used to further an attack.

2. Phishing

This is a technical attack where a victim is targeted via email or text message by someone posing as a legitimate institution to lure them into providing sensitive data.

This could include personally identifiable information, banking and credit card details, and passwords.

3. Spear phishing

Spear phishing is an email or electronic communications scam targeting a specific individual, organisation or business.

Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user’s computer.

The biogs

Name: Zinah Madi

Occupation: Co-founder of Dots and links

Nationality: Syrian

Family: Married, Mother of Tala, 18, Sharif, 14, Kareem, 2

Favourite Quote: “There is only one way to succeed in anything, and that is to give it everything.”

 

Name: Razan Nabulsi

Occupation: Co-founder of Dots and Links

Nationality: Jordanian

Family: Married, Mother of Yahya, 3.5

Favourite Quote: A Chinese proverb that says: “Be not afraid of moving slowly, be afraid only of standing still.”

How to wear a kandura

Dos

  • Wear the right fabric for the right season and occasion 
  • Always ask for the dress code if you don’t know
  • Wear a white kandura, white ghutra / shemagh (headwear) and black shoes for work 
  • Wear 100 per cent cotton under the kandura as most fabrics are polyester

Don’ts 

  • Wear hamdania for work, always wear a ghutra and agal 
  • Buy a kandura only based on how it feels; ask questions about the fabric and understand what you are buying
TECH%20SPECS%3A%20APPLE%20WATCH%20SERIES%208
%3Cp%3E%3Cstrong%3EDisplay%3A%3C%2Fstrong%3E%2041mm%2C%20352%20x%20430%3B%2045mm%2C%20396%20x%20484%3B%20Retina%20LTPO%20OLED%2C%20up%20to%201000%20nits%2C%20always-on%3B%20Ion-X%20glass%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EProcessor%3A%3C%2Fstrong%3E%20Apple%20S8%2C%20W3%20wireless%2C%20U1%20ultra-wideband%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3ECapacity%3A%3C%2Fstrong%3E%2032GB%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EMemory%3A%3C%2Fstrong%3E%201GB%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EPlatform%3A%3C%2Fstrong%3E%20watchOS%209%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EHealth%20metrics%3A%3C%2Fstrong%3E%203rd-gen%20heart%20rate%20sensor%2C%20temperature%20sensing%2C%20ECG%2C%20blood%20oxygen%2C%20workouts%2C%20fall%2Fcrash%20detection%3B%20emergency%20SOS%2C%20international%20emergency%20calling%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EConnectivity%3A%3C%2Fstrong%3E%20GPS%2FGPS%20%2B%20cellular%3B%20Wi-Fi%2C%20LTE%2C%20Bluetooth%205.3%2C%20NFC%20(Apple%20Pay)%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EDurability%3A%3C%2Fstrong%3E%20IP6X%2C%20water%20resistant%20up%20to%2050m%2C%20dust%20resistant%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EBattery%3A%3C%2Fstrong%3E%20308mAh%20Li-ion%2C%20up%20to%2018h%2C%20wireless%20charging%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3ECards%3A%3C%2Fstrong%3E%20eSIM%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EFinishes%3A%3C%2Fstrong%3E%20Aluminium%20%E2%80%93%20midnight%2C%20Product%20Red%2C%20silver%2C%20starlight%3B%20stainless%20steel%20%E2%80%93%20gold%2C%20graphite%2C%20silver%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EIn%20the%20box%3A%3C%2Fstrong%3E%20Watch%20Series%208%2C%20magnetic-to-USB-C%20charging%20cable%2C%20band%2Floop%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EPrice%3A%3C%2Fstrong%3E%20Starts%20at%20Dh1%2C599%20(41mm)%20%2F%20Dh1%2C999%20(45mm)%3C%2Fp%3E%0A